pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,48 +20,48 @@ __all__ = ['NomadSecretBackendArgs', 'NomadSecretBackend']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class NomadSecretBackendArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
address: Optional[pulumi.Input[str]] = None,
|
23
|
-
backend: Optional[pulumi.Input[str]] = None,
|
24
|
-
ca_cert: Optional[pulumi.Input[str]] = None,
|
25
|
-
client_cert: Optional[pulumi.Input[str]] = None,
|
26
|
-
client_key: Optional[pulumi.Input[str]] = None,
|
27
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
28
|
-
description: Optional[pulumi.Input[str]] = None,
|
29
|
-
disable_remount: Optional[pulumi.Input[bool]] = None,
|
30
|
-
local: Optional[pulumi.Input[bool]] = None,
|
31
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
32
|
-
max_token_name_length: Optional[pulumi.Input[int]] = None,
|
33
|
-
max_ttl: Optional[pulumi.Input[int]] = None,
|
34
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
35
|
-
token: Optional[pulumi.Input[str]] = None,
|
36
|
-
ttl: Optional[pulumi.Input[int]] = None):
|
23
|
+
address: Optional[pulumi.Input[builtins.str]] = None,
|
24
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
25
|
+
ca_cert: Optional[pulumi.Input[builtins.str]] = None,
|
26
|
+
client_cert: Optional[pulumi.Input[builtins.str]] = None,
|
27
|
+
client_key: Optional[pulumi.Input[builtins.str]] = None,
|
28
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
|
29
|
+
description: Optional[pulumi.Input[builtins.str]] = None,
|
30
|
+
disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
|
31
|
+
local: Optional[pulumi.Input[builtins.bool]] = None,
|
32
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
|
33
|
+
max_token_name_length: Optional[pulumi.Input[builtins.int]] = None,
|
34
|
+
max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
35
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
36
|
+
token: Optional[pulumi.Input[builtins.str]] = None,
|
37
|
+
ttl: Optional[pulumi.Input[builtins.int]] = None):
|
37
38
|
"""
|
38
39
|
The set of arguments for constructing a NomadSecretBackend resource.
|
39
|
-
:param pulumi.Input[str] address: Specifies the address of the Nomad instance, provided
|
40
|
+
:param pulumi.Input[builtins.str] address: Specifies the address of the Nomad instance, provided
|
40
41
|
as "protocol://host:port" like "http://127.0.0.1:4646".
|
41
|
-
:param pulumi.Input[str] backend: The unique path this backend should be mounted at. Must
|
42
|
+
:param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at. Must
|
42
43
|
not begin or end with a `/`. Defaults to `nomad`.
|
43
|
-
:param pulumi.Input[str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
|
44
|
+
:param pulumi.Input[builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
|
44
45
|
x509 PEM encoded.
|
45
|
-
:param pulumi.Input[str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
|
46
|
-
:param pulumi.Input[str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
|
47
|
-
:param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
|
48
|
-
:param pulumi.Input[str] description: Human-friendly description of the mount for the Active Directory backend.
|
49
|
-
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
46
|
+
:param pulumi.Input[builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
|
47
|
+
:param pulumi.Input[builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
|
48
|
+
:param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
|
49
|
+
:param pulumi.Input[builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
|
50
|
+
:param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
50
51
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
51
|
-
:param pulumi.Input[bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
52
|
+
:param pulumi.Input[builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
52
53
|
replication.Tolerance duration to use when checking the last rotation time.
|
53
|
-
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
54
|
-
:param pulumi.Input[int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
|
54
|
+
:param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
55
|
+
:param pulumi.Input[builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
|
55
56
|
generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
|
56
57
|
by the Nomad version.
|
57
|
-
:param pulumi.Input[int] max_ttl: Maximum possible lease duration for secrets in seconds.
|
58
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
58
|
+
:param pulumi.Input[builtins.int] max_ttl: Maximum possible lease duration for secrets in seconds.
|
59
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
59
60
|
The value should not contain leading or trailing forward slashes.
|
60
61
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
61
62
|
*Available only for Vault Enterprise*.
|
62
|
-
:param pulumi.Input[str] token: Specifies the Nomad Management token to use.
|
63
|
-
:param pulumi.Input[int] ttl: Specifies the ttl of the lease for the generated token.
|
63
|
+
:param pulumi.Input[builtins.str] token: Specifies the Nomad Management token to use.
|
64
|
+
:param pulumi.Input[builtins.int] ttl: Specifies the ttl of the lease for the generated token.
|
64
65
|
"""
|
65
66
|
if address is not None:
|
66
67
|
pulumi.set(__self__, "address", address)
|
@@ -95,7 +96,7 @@ class NomadSecretBackendArgs:
|
|
95
96
|
|
96
97
|
@property
|
97
98
|
@pulumi.getter
|
98
|
-
def address(self) -> Optional[pulumi.Input[str]]:
|
99
|
+
def address(self) -> Optional[pulumi.Input[builtins.str]]:
|
99
100
|
"""
|
100
101
|
Specifies the address of the Nomad instance, provided
|
101
102
|
as "protocol://host:port" like "http://127.0.0.1:4646".
|
@@ -103,12 +104,12 @@ class NomadSecretBackendArgs:
|
|
103
104
|
return pulumi.get(self, "address")
|
104
105
|
|
105
106
|
@address.setter
|
106
|
-
def address(self, value: Optional[pulumi.Input[str]]):
|
107
|
+
def address(self, value: Optional[pulumi.Input[builtins.str]]):
|
107
108
|
pulumi.set(self, "address", value)
|
108
109
|
|
109
110
|
@property
|
110
111
|
@pulumi.getter
|
111
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
112
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
112
113
|
"""
|
113
114
|
The unique path this backend should be mounted at. Must
|
114
115
|
not begin or end with a `/`. Defaults to `nomad`.
|
@@ -116,12 +117,12 @@ class NomadSecretBackendArgs:
|
|
116
117
|
return pulumi.get(self, "backend")
|
117
118
|
|
118
119
|
@backend.setter
|
119
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
120
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
120
121
|
pulumi.set(self, "backend", value)
|
121
122
|
|
122
123
|
@property
|
123
124
|
@pulumi.getter(name="caCert")
|
124
|
-
def ca_cert(self) -> Optional[pulumi.Input[str]]:
|
125
|
+
def ca_cert(self) -> Optional[pulumi.Input[builtins.str]]:
|
125
126
|
"""
|
126
127
|
CA certificate to use when verifying the Nomad server certificate, must be
|
127
128
|
x509 PEM encoded.
|
@@ -129,60 +130,60 @@ class NomadSecretBackendArgs:
|
|
129
130
|
return pulumi.get(self, "ca_cert")
|
130
131
|
|
131
132
|
@ca_cert.setter
|
132
|
-
def ca_cert(self, value: Optional[pulumi.Input[str]]):
|
133
|
+
def ca_cert(self, value: Optional[pulumi.Input[builtins.str]]):
|
133
134
|
pulumi.set(self, "ca_cert", value)
|
134
135
|
|
135
136
|
@property
|
136
137
|
@pulumi.getter(name="clientCert")
|
137
|
-
def client_cert(self) -> Optional[pulumi.Input[str]]:
|
138
|
+
def client_cert(self) -> Optional[pulumi.Input[builtins.str]]:
|
138
139
|
"""
|
139
140
|
Client certificate to provide to the Nomad server, must be x509 PEM encoded.
|
140
141
|
"""
|
141
142
|
return pulumi.get(self, "client_cert")
|
142
143
|
|
143
144
|
@client_cert.setter
|
144
|
-
def client_cert(self, value: Optional[pulumi.Input[str]]):
|
145
|
+
def client_cert(self, value: Optional[pulumi.Input[builtins.str]]):
|
145
146
|
pulumi.set(self, "client_cert", value)
|
146
147
|
|
147
148
|
@property
|
148
149
|
@pulumi.getter(name="clientKey")
|
149
|
-
def client_key(self) -> Optional[pulumi.Input[str]]:
|
150
|
+
def client_key(self) -> Optional[pulumi.Input[builtins.str]]:
|
150
151
|
"""
|
151
152
|
Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
|
152
153
|
"""
|
153
154
|
return pulumi.get(self, "client_key")
|
154
155
|
|
155
156
|
@client_key.setter
|
156
|
-
def client_key(self, value: Optional[pulumi.Input[str]]):
|
157
|
+
def client_key(self, value: Optional[pulumi.Input[builtins.str]]):
|
157
158
|
pulumi.set(self, "client_key", value)
|
158
159
|
|
159
160
|
@property
|
160
161
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
161
|
-
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[int]]:
|
162
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
|
162
163
|
"""
|
163
164
|
Default lease duration for secrets in seconds.
|
164
165
|
"""
|
165
166
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
166
167
|
|
167
168
|
@default_lease_ttl_seconds.setter
|
168
|
-
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
|
169
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
|
169
170
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
170
171
|
|
171
172
|
@property
|
172
173
|
@pulumi.getter
|
173
|
-
def description(self) -> Optional[pulumi.Input[str]]:
|
174
|
+
def description(self) -> Optional[pulumi.Input[builtins.str]]:
|
174
175
|
"""
|
175
176
|
Human-friendly description of the mount for the Active Directory backend.
|
176
177
|
"""
|
177
178
|
return pulumi.get(self, "description")
|
178
179
|
|
179
180
|
@description.setter
|
180
|
-
def description(self, value: Optional[pulumi.Input[str]]):
|
181
|
+
def description(self, value: Optional[pulumi.Input[builtins.str]]):
|
181
182
|
pulumi.set(self, "description", value)
|
182
183
|
|
183
184
|
@property
|
184
185
|
@pulumi.getter(name="disableRemount")
|
185
|
-
def disable_remount(self) -> Optional[pulumi.Input[bool]]:
|
186
|
+
def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
|
186
187
|
"""
|
187
188
|
If set, opts out of mount migration on path updates.
|
188
189
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -190,12 +191,12 @@ class NomadSecretBackendArgs:
|
|
190
191
|
return pulumi.get(self, "disable_remount")
|
191
192
|
|
192
193
|
@disable_remount.setter
|
193
|
-
def disable_remount(self, value: Optional[pulumi.Input[bool]]):
|
194
|
+
def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
|
194
195
|
pulumi.set(self, "disable_remount", value)
|
195
196
|
|
196
197
|
@property
|
197
198
|
@pulumi.getter
|
198
|
-
def local(self) -> Optional[pulumi.Input[bool]]:
|
199
|
+
def local(self) -> Optional[pulumi.Input[builtins.bool]]:
|
199
200
|
"""
|
200
201
|
Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
201
202
|
replication.Tolerance duration to use when checking the last rotation time.
|
@@ -203,24 +204,24 @@ class NomadSecretBackendArgs:
|
|
203
204
|
return pulumi.get(self, "local")
|
204
205
|
|
205
206
|
@local.setter
|
206
|
-
def local(self, value: Optional[pulumi.Input[bool]]):
|
207
|
+
def local(self, value: Optional[pulumi.Input[builtins.bool]]):
|
207
208
|
pulumi.set(self, "local", value)
|
208
209
|
|
209
210
|
@property
|
210
211
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
211
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[int]]:
|
212
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
|
212
213
|
"""
|
213
214
|
Maximum possible lease duration for secrets in seconds.
|
214
215
|
"""
|
215
216
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
216
217
|
|
217
218
|
@max_lease_ttl_seconds.setter
|
218
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
|
219
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
|
219
220
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
220
221
|
|
221
222
|
@property
|
222
223
|
@pulumi.getter(name="maxTokenNameLength")
|
223
|
-
def max_token_name_length(self) -> Optional[pulumi.Input[int]]:
|
224
|
+
def max_token_name_length(self) -> Optional[pulumi.Input[builtins.int]]:
|
224
225
|
"""
|
225
226
|
Specifies the maximum length to use for the name of the Nomad token
|
226
227
|
generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
|
@@ -229,24 +230,24 @@ class NomadSecretBackendArgs:
|
|
229
230
|
return pulumi.get(self, "max_token_name_length")
|
230
231
|
|
231
232
|
@max_token_name_length.setter
|
232
|
-
def max_token_name_length(self, value: Optional[pulumi.Input[int]]):
|
233
|
+
def max_token_name_length(self, value: Optional[pulumi.Input[builtins.int]]):
|
233
234
|
pulumi.set(self, "max_token_name_length", value)
|
234
235
|
|
235
236
|
@property
|
236
237
|
@pulumi.getter(name="maxTtl")
|
237
|
-
def max_ttl(self) -> Optional[pulumi.Input[int]]:
|
238
|
+
def max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
238
239
|
"""
|
239
240
|
Maximum possible lease duration for secrets in seconds.
|
240
241
|
"""
|
241
242
|
return pulumi.get(self, "max_ttl")
|
242
243
|
|
243
244
|
@max_ttl.setter
|
244
|
-
def max_ttl(self, value: Optional[pulumi.Input[int]]):
|
245
|
+
def max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
245
246
|
pulumi.set(self, "max_ttl", value)
|
246
247
|
|
247
248
|
@property
|
248
249
|
@pulumi.getter
|
249
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
250
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
250
251
|
"""
|
251
252
|
The namespace to provision the resource in.
|
252
253
|
The value should not contain leading or trailing forward slashes.
|
@@ -256,79 +257,79 @@ class NomadSecretBackendArgs:
|
|
256
257
|
return pulumi.get(self, "namespace")
|
257
258
|
|
258
259
|
@namespace.setter
|
259
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
260
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
260
261
|
pulumi.set(self, "namespace", value)
|
261
262
|
|
262
263
|
@property
|
263
264
|
@pulumi.getter
|
264
|
-
def token(self) -> Optional[pulumi.Input[str]]:
|
265
|
+
def token(self) -> Optional[pulumi.Input[builtins.str]]:
|
265
266
|
"""
|
266
267
|
Specifies the Nomad Management token to use.
|
267
268
|
"""
|
268
269
|
return pulumi.get(self, "token")
|
269
270
|
|
270
271
|
@token.setter
|
271
|
-
def token(self, value: Optional[pulumi.Input[str]]):
|
272
|
+
def token(self, value: Optional[pulumi.Input[builtins.str]]):
|
272
273
|
pulumi.set(self, "token", value)
|
273
274
|
|
274
275
|
@property
|
275
276
|
@pulumi.getter
|
276
|
-
def ttl(self) -> Optional[pulumi.Input[int]]:
|
277
|
+
def ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
277
278
|
"""
|
278
279
|
Specifies the ttl of the lease for the generated token.
|
279
280
|
"""
|
280
281
|
return pulumi.get(self, "ttl")
|
281
282
|
|
282
283
|
@ttl.setter
|
283
|
-
def ttl(self, value: Optional[pulumi.Input[int]]):
|
284
|
+
def ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
284
285
|
pulumi.set(self, "ttl", value)
|
285
286
|
|
286
287
|
|
287
288
|
@pulumi.input_type
|
288
289
|
class _NomadSecretBackendState:
|
289
290
|
def __init__(__self__, *,
|
290
|
-
address: Optional[pulumi.Input[str]] = None,
|
291
|
-
backend: Optional[pulumi.Input[str]] = None,
|
292
|
-
ca_cert: Optional[pulumi.Input[str]] = None,
|
293
|
-
client_cert: Optional[pulumi.Input[str]] = None,
|
294
|
-
client_key: Optional[pulumi.Input[str]] = None,
|
295
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
296
|
-
description: Optional[pulumi.Input[str]] = None,
|
297
|
-
disable_remount: Optional[pulumi.Input[bool]] = None,
|
298
|
-
local: Optional[pulumi.Input[bool]] = None,
|
299
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
300
|
-
max_token_name_length: Optional[pulumi.Input[int]] = None,
|
301
|
-
max_ttl: Optional[pulumi.Input[int]] = None,
|
302
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
303
|
-
token: Optional[pulumi.Input[str]] = None,
|
304
|
-
ttl: Optional[pulumi.Input[int]] = None):
|
291
|
+
address: Optional[pulumi.Input[builtins.str]] = None,
|
292
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
293
|
+
ca_cert: Optional[pulumi.Input[builtins.str]] = None,
|
294
|
+
client_cert: Optional[pulumi.Input[builtins.str]] = None,
|
295
|
+
client_key: Optional[pulumi.Input[builtins.str]] = None,
|
296
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
|
297
|
+
description: Optional[pulumi.Input[builtins.str]] = None,
|
298
|
+
disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
|
299
|
+
local: Optional[pulumi.Input[builtins.bool]] = None,
|
300
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
|
301
|
+
max_token_name_length: Optional[pulumi.Input[builtins.int]] = None,
|
302
|
+
max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
303
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
304
|
+
token: Optional[pulumi.Input[builtins.str]] = None,
|
305
|
+
ttl: Optional[pulumi.Input[builtins.int]] = None):
|
305
306
|
"""
|
306
307
|
Input properties used for looking up and filtering NomadSecretBackend resources.
|
307
|
-
:param pulumi.Input[str] address: Specifies the address of the Nomad instance, provided
|
308
|
+
:param pulumi.Input[builtins.str] address: Specifies the address of the Nomad instance, provided
|
308
309
|
as "protocol://host:port" like "http://127.0.0.1:4646".
|
309
|
-
:param pulumi.Input[str] backend: The unique path this backend should be mounted at. Must
|
310
|
+
:param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at. Must
|
310
311
|
not begin or end with a `/`. Defaults to `nomad`.
|
311
|
-
:param pulumi.Input[str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
|
312
|
+
:param pulumi.Input[builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
|
312
313
|
x509 PEM encoded.
|
313
|
-
:param pulumi.Input[str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
|
314
|
-
:param pulumi.Input[str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
|
315
|
-
:param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
|
316
|
-
:param pulumi.Input[str] description: Human-friendly description of the mount for the Active Directory backend.
|
317
|
-
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
314
|
+
:param pulumi.Input[builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
|
315
|
+
:param pulumi.Input[builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
|
316
|
+
:param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
|
317
|
+
:param pulumi.Input[builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
|
318
|
+
:param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
318
319
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
319
|
-
:param pulumi.Input[bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
320
|
+
:param pulumi.Input[builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
320
321
|
replication.Tolerance duration to use when checking the last rotation time.
|
321
|
-
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
322
|
-
:param pulumi.Input[int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
|
322
|
+
:param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
323
|
+
:param pulumi.Input[builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
|
323
324
|
generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
|
324
325
|
by the Nomad version.
|
325
|
-
:param pulumi.Input[int] max_ttl: Maximum possible lease duration for secrets in seconds.
|
326
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
326
|
+
:param pulumi.Input[builtins.int] max_ttl: Maximum possible lease duration for secrets in seconds.
|
327
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
327
328
|
The value should not contain leading or trailing forward slashes.
|
328
329
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
329
330
|
*Available only for Vault Enterprise*.
|
330
|
-
:param pulumi.Input[str] token: Specifies the Nomad Management token to use.
|
331
|
-
:param pulumi.Input[int] ttl: Specifies the ttl of the lease for the generated token.
|
331
|
+
:param pulumi.Input[builtins.str] token: Specifies the Nomad Management token to use.
|
332
|
+
:param pulumi.Input[builtins.int] ttl: Specifies the ttl of the lease for the generated token.
|
332
333
|
"""
|
333
334
|
if address is not None:
|
334
335
|
pulumi.set(__self__, "address", address)
|
@@ -363,7 +364,7 @@ class _NomadSecretBackendState:
|
|
363
364
|
|
364
365
|
@property
|
365
366
|
@pulumi.getter
|
366
|
-
def address(self) -> Optional[pulumi.Input[str]]:
|
367
|
+
def address(self) -> Optional[pulumi.Input[builtins.str]]:
|
367
368
|
"""
|
368
369
|
Specifies the address of the Nomad instance, provided
|
369
370
|
as "protocol://host:port" like "http://127.0.0.1:4646".
|
@@ -371,12 +372,12 @@ class _NomadSecretBackendState:
|
|
371
372
|
return pulumi.get(self, "address")
|
372
373
|
|
373
374
|
@address.setter
|
374
|
-
def address(self, value: Optional[pulumi.Input[str]]):
|
375
|
+
def address(self, value: Optional[pulumi.Input[builtins.str]]):
|
375
376
|
pulumi.set(self, "address", value)
|
376
377
|
|
377
378
|
@property
|
378
379
|
@pulumi.getter
|
379
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
380
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
380
381
|
"""
|
381
382
|
The unique path this backend should be mounted at. Must
|
382
383
|
not begin or end with a `/`. Defaults to `nomad`.
|
@@ -384,12 +385,12 @@ class _NomadSecretBackendState:
|
|
384
385
|
return pulumi.get(self, "backend")
|
385
386
|
|
386
387
|
@backend.setter
|
387
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
388
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
388
389
|
pulumi.set(self, "backend", value)
|
389
390
|
|
390
391
|
@property
|
391
392
|
@pulumi.getter(name="caCert")
|
392
|
-
def ca_cert(self) -> Optional[pulumi.Input[str]]:
|
393
|
+
def ca_cert(self) -> Optional[pulumi.Input[builtins.str]]:
|
393
394
|
"""
|
394
395
|
CA certificate to use when verifying the Nomad server certificate, must be
|
395
396
|
x509 PEM encoded.
|
@@ -397,60 +398,60 @@ class _NomadSecretBackendState:
|
|
397
398
|
return pulumi.get(self, "ca_cert")
|
398
399
|
|
399
400
|
@ca_cert.setter
|
400
|
-
def ca_cert(self, value: Optional[pulumi.Input[str]]):
|
401
|
+
def ca_cert(self, value: Optional[pulumi.Input[builtins.str]]):
|
401
402
|
pulumi.set(self, "ca_cert", value)
|
402
403
|
|
403
404
|
@property
|
404
405
|
@pulumi.getter(name="clientCert")
|
405
|
-
def client_cert(self) -> Optional[pulumi.Input[str]]:
|
406
|
+
def client_cert(self) -> Optional[pulumi.Input[builtins.str]]:
|
406
407
|
"""
|
407
408
|
Client certificate to provide to the Nomad server, must be x509 PEM encoded.
|
408
409
|
"""
|
409
410
|
return pulumi.get(self, "client_cert")
|
410
411
|
|
411
412
|
@client_cert.setter
|
412
|
-
def client_cert(self, value: Optional[pulumi.Input[str]]):
|
413
|
+
def client_cert(self, value: Optional[pulumi.Input[builtins.str]]):
|
413
414
|
pulumi.set(self, "client_cert", value)
|
414
415
|
|
415
416
|
@property
|
416
417
|
@pulumi.getter(name="clientKey")
|
417
|
-
def client_key(self) -> Optional[pulumi.Input[str]]:
|
418
|
+
def client_key(self) -> Optional[pulumi.Input[builtins.str]]:
|
418
419
|
"""
|
419
420
|
Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
|
420
421
|
"""
|
421
422
|
return pulumi.get(self, "client_key")
|
422
423
|
|
423
424
|
@client_key.setter
|
424
|
-
def client_key(self, value: Optional[pulumi.Input[str]]):
|
425
|
+
def client_key(self, value: Optional[pulumi.Input[builtins.str]]):
|
425
426
|
pulumi.set(self, "client_key", value)
|
426
427
|
|
427
428
|
@property
|
428
429
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
429
|
-
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[int]]:
|
430
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
|
430
431
|
"""
|
431
432
|
Default lease duration for secrets in seconds.
|
432
433
|
"""
|
433
434
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
434
435
|
|
435
436
|
@default_lease_ttl_seconds.setter
|
436
|
-
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
|
437
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
|
437
438
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
438
439
|
|
439
440
|
@property
|
440
441
|
@pulumi.getter
|
441
|
-
def description(self) -> Optional[pulumi.Input[str]]:
|
442
|
+
def description(self) -> Optional[pulumi.Input[builtins.str]]:
|
442
443
|
"""
|
443
444
|
Human-friendly description of the mount for the Active Directory backend.
|
444
445
|
"""
|
445
446
|
return pulumi.get(self, "description")
|
446
447
|
|
447
448
|
@description.setter
|
448
|
-
def description(self, value: Optional[pulumi.Input[str]]):
|
449
|
+
def description(self, value: Optional[pulumi.Input[builtins.str]]):
|
449
450
|
pulumi.set(self, "description", value)
|
450
451
|
|
451
452
|
@property
|
452
453
|
@pulumi.getter(name="disableRemount")
|
453
|
-
def disable_remount(self) -> Optional[pulumi.Input[bool]]:
|
454
|
+
def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
|
454
455
|
"""
|
455
456
|
If set, opts out of mount migration on path updates.
|
456
457
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -458,12 +459,12 @@ class _NomadSecretBackendState:
|
|
458
459
|
return pulumi.get(self, "disable_remount")
|
459
460
|
|
460
461
|
@disable_remount.setter
|
461
|
-
def disable_remount(self, value: Optional[pulumi.Input[bool]]):
|
462
|
+
def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
|
462
463
|
pulumi.set(self, "disable_remount", value)
|
463
464
|
|
464
465
|
@property
|
465
466
|
@pulumi.getter
|
466
|
-
def local(self) -> Optional[pulumi.Input[bool]]:
|
467
|
+
def local(self) -> Optional[pulumi.Input[builtins.bool]]:
|
467
468
|
"""
|
468
469
|
Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
469
470
|
replication.Tolerance duration to use when checking the last rotation time.
|
@@ -471,24 +472,24 @@ class _NomadSecretBackendState:
|
|
471
472
|
return pulumi.get(self, "local")
|
472
473
|
|
473
474
|
@local.setter
|
474
|
-
def local(self, value: Optional[pulumi.Input[bool]]):
|
475
|
+
def local(self, value: Optional[pulumi.Input[builtins.bool]]):
|
475
476
|
pulumi.set(self, "local", value)
|
476
477
|
|
477
478
|
@property
|
478
479
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
479
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[int]]:
|
480
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
|
480
481
|
"""
|
481
482
|
Maximum possible lease duration for secrets in seconds.
|
482
483
|
"""
|
483
484
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
484
485
|
|
485
486
|
@max_lease_ttl_seconds.setter
|
486
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
|
487
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
|
487
488
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
488
489
|
|
489
490
|
@property
|
490
491
|
@pulumi.getter(name="maxTokenNameLength")
|
491
|
-
def max_token_name_length(self) -> Optional[pulumi.Input[int]]:
|
492
|
+
def max_token_name_length(self) -> Optional[pulumi.Input[builtins.int]]:
|
492
493
|
"""
|
493
494
|
Specifies the maximum length to use for the name of the Nomad token
|
494
495
|
generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
|
@@ -497,24 +498,24 @@ class _NomadSecretBackendState:
|
|
497
498
|
return pulumi.get(self, "max_token_name_length")
|
498
499
|
|
499
500
|
@max_token_name_length.setter
|
500
|
-
def max_token_name_length(self, value: Optional[pulumi.Input[int]]):
|
501
|
+
def max_token_name_length(self, value: Optional[pulumi.Input[builtins.int]]):
|
501
502
|
pulumi.set(self, "max_token_name_length", value)
|
502
503
|
|
503
504
|
@property
|
504
505
|
@pulumi.getter(name="maxTtl")
|
505
|
-
def max_ttl(self) -> Optional[pulumi.Input[int]]:
|
506
|
+
def max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
506
507
|
"""
|
507
508
|
Maximum possible lease duration for secrets in seconds.
|
508
509
|
"""
|
509
510
|
return pulumi.get(self, "max_ttl")
|
510
511
|
|
511
512
|
@max_ttl.setter
|
512
|
-
def max_ttl(self, value: Optional[pulumi.Input[int]]):
|
513
|
+
def max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
513
514
|
pulumi.set(self, "max_ttl", value)
|
514
515
|
|
515
516
|
@property
|
516
517
|
@pulumi.getter
|
517
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
518
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
518
519
|
"""
|
519
520
|
The namespace to provision the resource in.
|
520
521
|
The value should not contain leading or trailing forward slashes.
|
@@ -524,31 +525,31 @@ class _NomadSecretBackendState:
|
|
524
525
|
return pulumi.get(self, "namespace")
|
525
526
|
|
526
527
|
@namespace.setter
|
527
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
528
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
528
529
|
pulumi.set(self, "namespace", value)
|
529
530
|
|
530
531
|
@property
|
531
532
|
@pulumi.getter
|
532
|
-
def token(self) -> Optional[pulumi.Input[str]]:
|
533
|
+
def token(self) -> Optional[pulumi.Input[builtins.str]]:
|
533
534
|
"""
|
534
535
|
Specifies the Nomad Management token to use.
|
535
536
|
"""
|
536
537
|
return pulumi.get(self, "token")
|
537
538
|
|
538
539
|
@token.setter
|
539
|
-
def token(self, value: Optional[pulumi.Input[str]]):
|
540
|
+
def token(self, value: Optional[pulumi.Input[builtins.str]]):
|
540
541
|
pulumi.set(self, "token", value)
|
541
542
|
|
542
543
|
@property
|
543
544
|
@pulumi.getter
|
544
|
-
def ttl(self) -> Optional[pulumi.Input[int]]:
|
545
|
+
def ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
545
546
|
"""
|
546
547
|
Specifies the ttl of the lease for the generated token.
|
547
548
|
"""
|
548
549
|
return pulumi.get(self, "ttl")
|
549
550
|
|
550
551
|
@ttl.setter
|
551
|
-
def ttl(self, value: Optional[pulumi.Input[int]]):
|
552
|
+
def ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
552
553
|
pulumi.set(self, "ttl", value)
|
553
554
|
|
554
555
|
|
@@ -557,21 +558,21 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
557
558
|
def __init__(__self__,
|
558
559
|
resource_name: str,
|
559
560
|
opts: Optional[pulumi.ResourceOptions] = None,
|
560
|
-
address: Optional[pulumi.Input[str]] = None,
|
561
|
-
backend: Optional[pulumi.Input[str]] = None,
|
562
|
-
ca_cert: Optional[pulumi.Input[str]] = None,
|
563
|
-
client_cert: Optional[pulumi.Input[str]] = None,
|
564
|
-
client_key: Optional[pulumi.Input[str]] = None,
|
565
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
566
|
-
description: Optional[pulumi.Input[str]] = None,
|
567
|
-
disable_remount: Optional[pulumi.Input[bool]] = None,
|
568
|
-
local: Optional[pulumi.Input[bool]] = None,
|
569
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
570
|
-
max_token_name_length: Optional[pulumi.Input[int]] = None,
|
571
|
-
max_ttl: Optional[pulumi.Input[int]] = None,
|
572
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
573
|
-
token: Optional[pulumi.Input[str]] = None,
|
574
|
-
ttl: Optional[pulumi.Input[int]] = None,
|
561
|
+
address: Optional[pulumi.Input[builtins.str]] = None,
|
562
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
563
|
+
ca_cert: Optional[pulumi.Input[builtins.str]] = None,
|
564
|
+
client_cert: Optional[pulumi.Input[builtins.str]] = None,
|
565
|
+
client_key: Optional[pulumi.Input[builtins.str]] = None,
|
566
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
|
567
|
+
description: Optional[pulumi.Input[builtins.str]] = None,
|
568
|
+
disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
|
569
|
+
local: Optional[pulumi.Input[builtins.bool]] = None,
|
570
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
|
571
|
+
max_token_name_length: Optional[pulumi.Input[builtins.int]] = None,
|
572
|
+
max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
573
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
574
|
+
token: Optional[pulumi.Input[builtins.str]] = None,
|
575
|
+
ttl: Optional[pulumi.Input[builtins.int]] = None,
|
575
576
|
__props__=None):
|
576
577
|
"""
|
577
578
|
## Example Usage
|
@@ -601,31 +602,31 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
601
602
|
|
602
603
|
:param str resource_name: The name of the resource.
|
603
604
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
604
|
-
:param pulumi.Input[str] address: Specifies the address of the Nomad instance, provided
|
605
|
+
:param pulumi.Input[builtins.str] address: Specifies the address of the Nomad instance, provided
|
605
606
|
as "protocol://host:port" like "http://127.0.0.1:4646".
|
606
|
-
:param pulumi.Input[str] backend: The unique path this backend should be mounted at. Must
|
607
|
+
:param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at. Must
|
607
608
|
not begin or end with a `/`. Defaults to `nomad`.
|
608
|
-
:param pulumi.Input[str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
|
609
|
+
:param pulumi.Input[builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
|
609
610
|
x509 PEM encoded.
|
610
|
-
:param pulumi.Input[str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
|
611
|
-
:param pulumi.Input[str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
|
612
|
-
:param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
|
613
|
-
:param pulumi.Input[str] description: Human-friendly description of the mount for the Active Directory backend.
|
614
|
-
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
611
|
+
:param pulumi.Input[builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
|
612
|
+
:param pulumi.Input[builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
|
613
|
+
:param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
|
614
|
+
:param pulumi.Input[builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
|
615
|
+
:param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
615
616
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
616
|
-
:param pulumi.Input[bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
617
|
+
:param pulumi.Input[builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
617
618
|
replication.Tolerance duration to use when checking the last rotation time.
|
618
|
-
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
619
|
-
:param pulumi.Input[int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
|
619
|
+
:param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
620
|
+
:param pulumi.Input[builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
|
620
621
|
generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
|
621
622
|
by the Nomad version.
|
622
|
-
:param pulumi.Input[int] max_ttl: Maximum possible lease duration for secrets in seconds.
|
623
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
623
|
+
:param pulumi.Input[builtins.int] max_ttl: Maximum possible lease duration for secrets in seconds.
|
624
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
624
625
|
The value should not contain leading or trailing forward slashes.
|
625
626
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
626
627
|
*Available only for Vault Enterprise*.
|
627
|
-
:param pulumi.Input[str] token: Specifies the Nomad Management token to use.
|
628
|
-
:param pulumi.Input[int] ttl: Specifies the ttl of the lease for the generated token.
|
628
|
+
:param pulumi.Input[builtins.str] token: Specifies the Nomad Management token to use.
|
629
|
+
:param pulumi.Input[builtins.int] ttl: Specifies the ttl of the lease for the generated token.
|
629
630
|
"""
|
630
631
|
...
|
631
632
|
@overload
|
@@ -674,21 +675,21 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
674
675
|
def _internal_init(__self__,
|
675
676
|
resource_name: str,
|
676
677
|
opts: Optional[pulumi.ResourceOptions] = None,
|
677
|
-
address: Optional[pulumi.Input[str]] = None,
|
678
|
-
backend: Optional[pulumi.Input[str]] = None,
|
679
|
-
ca_cert: Optional[pulumi.Input[str]] = None,
|
680
|
-
client_cert: Optional[pulumi.Input[str]] = None,
|
681
|
-
client_key: Optional[pulumi.Input[str]] = None,
|
682
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
683
|
-
description: Optional[pulumi.Input[str]] = None,
|
684
|
-
disable_remount: Optional[pulumi.Input[bool]] = None,
|
685
|
-
local: Optional[pulumi.Input[bool]] = None,
|
686
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
687
|
-
max_token_name_length: Optional[pulumi.Input[int]] = None,
|
688
|
-
max_ttl: Optional[pulumi.Input[int]] = None,
|
689
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
690
|
-
token: Optional[pulumi.Input[str]] = None,
|
691
|
-
ttl: Optional[pulumi.Input[int]] = None,
|
678
|
+
address: Optional[pulumi.Input[builtins.str]] = None,
|
679
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
680
|
+
ca_cert: Optional[pulumi.Input[builtins.str]] = None,
|
681
|
+
client_cert: Optional[pulumi.Input[builtins.str]] = None,
|
682
|
+
client_key: Optional[pulumi.Input[builtins.str]] = None,
|
683
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
|
684
|
+
description: Optional[pulumi.Input[builtins.str]] = None,
|
685
|
+
disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
|
686
|
+
local: Optional[pulumi.Input[builtins.bool]] = None,
|
687
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
|
688
|
+
max_token_name_length: Optional[pulumi.Input[builtins.int]] = None,
|
689
|
+
max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
690
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
691
|
+
token: Optional[pulumi.Input[builtins.str]] = None,
|
692
|
+
ttl: Optional[pulumi.Input[builtins.int]] = None,
|
692
693
|
__props__=None):
|
693
694
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
694
695
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -725,21 +726,21 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
725
726
|
def get(resource_name: str,
|
726
727
|
id: pulumi.Input[str],
|
727
728
|
opts: Optional[pulumi.ResourceOptions] = None,
|
728
|
-
address: Optional[pulumi.Input[str]] = None,
|
729
|
-
backend: Optional[pulumi.Input[str]] = None,
|
730
|
-
ca_cert: Optional[pulumi.Input[str]] = None,
|
731
|
-
client_cert: Optional[pulumi.Input[str]] = None,
|
732
|
-
client_key: Optional[pulumi.Input[str]] = None,
|
733
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
734
|
-
description: Optional[pulumi.Input[str]] = None,
|
735
|
-
disable_remount: Optional[pulumi.Input[bool]] = None,
|
736
|
-
local: Optional[pulumi.Input[bool]] = None,
|
737
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
738
|
-
max_token_name_length: Optional[pulumi.Input[int]] = None,
|
739
|
-
max_ttl: Optional[pulumi.Input[int]] = None,
|
740
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
741
|
-
token: Optional[pulumi.Input[str]] = None,
|
742
|
-
ttl: Optional[pulumi.Input[int]] = None) -> 'NomadSecretBackend':
|
729
|
+
address: Optional[pulumi.Input[builtins.str]] = None,
|
730
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
731
|
+
ca_cert: Optional[pulumi.Input[builtins.str]] = None,
|
732
|
+
client_cert: Optional[pulumi.Input[builtins.str]] = None,
|
733
|
+
client_key: Optional[pulumi.Input[builtins.str]] = None,
|
734
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
|
735
|
+
description: Optional[pulumi.Input[builtins.str]] = None,
|
736
|
+
disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
|
737
|
+
local: Optional[pulumi.Input[builtins.bool]] = None,
|
738
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
|
739
|
+
max_token_name_length: Optional[pulumi.Input[builtins.int]] = None,
|
740
|
+
max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
741
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
742
|
+
token: Optional[pulumi.Input[builtins.str]] = None,
|
743
|
+
ttl: Optional[pulumi.Input[builtins.int]] = None) -> 'NomadSecretBackend':
|
743
744
|
"""
|
744
745
|
Get an existing NomadSecretBackend resource's state with the given name, id, and optional extra
|
745
746
|
properties used to qualify the lookup.
|
@@ -747,31 +748,31 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
747
748
|
:param str resource_name: The unique name of the resulting resource.
|
748
749
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
749
750
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
750
|
-
:param pulumi.Input[str] address: Specifies the address of the Nomad instance, provided
|
751
|
+
:param pulumi.Input[builtins.str] address: Specifies the address of the Nomad instance, provided
|
751
752
|
as "protocol://host:port" like "http://127.0.0.1:4646".
|
752
|
-
:param pulumi.Input[str] backend: The unique path this backend should be mounted at. Must
|
753
|
+
:param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at. Must
|
753
754
|
not begin or end with a `/`. Defaults to `nomad`.
|
754
|
-
:param pulumi.Input[str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
|
755
|
+
:param pulumi.Input[builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
|
755
756
|
x509 PEM encoded.
|
756
|
-
:param pulumi.Input[str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
|
757
|
-
:param pulumi.Input[str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
|
758
|
-
:param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
|
759
|
-
:param pulumi.Input[str] description: Human-friendly description of the mount for the Active Directory backend.
|
760
|
-
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
757
|
+
:param pulumi.Input[builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
|
758
|
+
:param pulumi.Input[builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
|
759
|
+
:param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
|
760
|
+
:param pulumi.Input[builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
|
761
|
+
:param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
761
762
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
762
|
-
:param pulumi.Input[bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
763
|
+
:param pulumi.Input[builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
763
764
|
replication.Tolerance duration to use when checking the last rotation time.
|
764
|
-
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
765
|
-
:param pulumi.Input[int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
|
765
|
+
:param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
766
|
+
:param pulumi.Input[builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
|
766
767
|
generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
|
767
768
|
by the Nomad version.
|
768
|
-
:param pulumi.Input[int] max_ttl: Maximum possible lease duration for secrets in seconds.
|
769
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
769
|
+
:param pulumi.Input[builtins.int] max_ttl: Maximum possible lease duration for secrets in seconds.
|
770
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
770
771
|
The value should not contain leading or trailing forward slashes.
|
771
772
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
772
773
|
*Available only for Vault Enterprise*.
|
773
|
-
:param pulumi.Input[str] token: Specifies the Nomad Management token to use.
|
774
|
-
:param pulumi.Input[int] ttl: Specifies the ttl of the lease for the generated token.
|
774
|
+
:param pulumi.Input[builtins.str] token: Specifies the Nomad Management token to use.
|
775
|
+
:param pulumi.Input[builtins.int] ttl: Specifies the ttl of the lease for the generated token.
|
775
776
|
"""
|
776
777
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
777
778
|
|
@@ -796,7 +797,7 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
796
797
|
|
797
798
|
@property
|
798
799
|
@pulumi.getter
|
799
|
-
def address(self) -> pulumi.Output[Optional[str]]:
|
800
|
+
def address(self) -> pulumi.Output[Optional[builtins.str]]:
|
800
801
|
"""
|
801
802
|
Specifies the address of the Nomad instance, provided
|
802
803
|
as "protocol://host:port" like "http://127.0.0.1:4646".
|
@@ -805,7 +806,7 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
805
806
|
|
806
807
|
@property
|
807
808
|
@pulumi.getter
|
808
|
-
def backend(self) -> pulumi.Output[Optional[str]]:
|
809
|
+
def backend(self) -> pulumi.Output[Optional[builtins.str]]:
|
809
810
|
"""
|
810
811
|
The unique path this backend should be mounted at. Must
|
811
812
|
not begin or end with a `/`. Defaults to `nomad`.
|
@@ -814,7 +815,7 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
814
815
|
|
815
816
|
@property
|
816
817
|
@pulumi.getter(name="caCert")
|
817
|
-
def ca_cert(self) -> pulumi.Output[Optional[str]]:
|
818
|
+
def ca_cert(self) -> pulumi.Output[Optional[builtins.str]]:
|
818
819
|
"""
|
819
820
|
CA certificate to use when verifying the Nomad server certificate, must be
|
820
821
|
x509 PEM encoded.
|
@@ -823,7 +824,7 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
823
824
|
|
824
825
|
@property
|
825
826
|
@pulumi.getter(name="clientCert")
|
826
|
-
def client_cert(self) -> pulumi.Output[Optional[str]]:
|
827
|
+
def client_cert(self) -> pulumi.Output[Optional[builtins.str]]:
|
827
828
|
"""
|
828
829
|
Client certificate to provide to the Nomad server, must be x509 PEM encoded.
|
829
830
|
"""
|
@@ -831,7 +832,7 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
831
832
|
|
832
833
|
@property
|
833
834
|
@pulumi.getter(name="clientKey")
|
834
|
-
def client_key(self) -> pulumi.Output[Optional[str]]:
|
835
|
+
def client_key(self) -> pulumi.Output[Optional[builtins.str]]:
|
835
836
|
"""
|
836
837
|
Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
|
837
838
|
"""
|
@@ -839,7 +840,7 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
839
840
|
|
840
841
|
@property
|
841
842
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
842
|
-
def default_lease_ttl_seconds(self) -> pulumi.Output[int]:
|
843
|
+
def default_lease_ttl_seconds(self) -> pulumi.Output[builtins.int]:
|
843
844
|
"""
|
844
845
|
Default lease duration for secrets in seconds.
|
845
846
|
"""
|
@@ -847,7 +848,7 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
847
848
|
|
848
849
|
@property
|
849
850
|
@pulumi.getter
|
850
|
-
def description(self) -> pulumi.Output[Optional[str]]:
|
851
|
+
def description(self) -> pulumi.Output[Optional[builtins.str]]:
|
851
852
|
"""
|
852
853
|
Human-friendly description of the mount for the Active Directory backend.
|
853
854
|
"""
|
@@ -855,7 +856,7 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
855
856
|
|
856
857
|
@property
|
857
858
|
@pulumi.getter(name="disableRemount")
|
858
|
-
def disable_remount(self) -> pulumi.Output[Optional[bool]]:
|
859
|
+
def disable_remount(self) -> pulumi.Output[Optional[builtins.bool]]:
|
859
860
|
"""
|
860
861
|
If set, opts out of mount migration on path updates.
|
861
862
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -864,7 +865,7 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
864
865
|
|
865
866
|
@property
|
866
867
|
@pulumi.getter
|
867
|
-
def local(self) -> pulumi.Output[Optional[bool]]:
|
868
|
+
def local(self) -> pulumi.Output[Optional[builtins.bool]]:
|
868
869
|
"""
|
869
870
|
Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
870
871
|
replication.Tolerance duration to use when checking the last rotation time.
|
@@ -873,7 +874,7 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
873
874
|
|
874
875
|
@property
|
875
876
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
876
|
-
def max_lease_ttl_seconds(self) -> pulumi.Output[int]:
|
877
|
+
def max_lease_ttl_seconds(self) -> pulumi.Output[builtins.int]:
|
877
878
|
"""
|
878
879
|
Maximum possible lease duration for secrets in seconds.
|
879
880
|
"""
|
@@ -881,7 +882,7 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
881
882
|
|
882
883
|
@property
|
883
884
|
@pulumi.getter(name="maxTokenNameLength")
|
884
|
-
def max_token_name_length(self) -> pulumi.Output[int]:
|
885
|
+
def max_token_name_length(self) -> pulumi.Output[builtins.int]:
|
885
886
|
"""
|
886
887
|
Specifies the maximum length to use for the name of the Nomad token
|
887
888
|
generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
|
@@ -891,7 +892,7 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
891
892
|
|
892
893
|
@property
|
893
894
|
@pulumi.getter(name="maxTtl")
|
894
|
-
def max_ttl(self) -> pulumi.Output[int]:
|
895
|
+
def max_ttl(self) -> pulumi.Output[builtins.int]:
|
895
896
|
"""
|
896
897
|
Maximum possible lease duration for secrets in seconds.
|
897
898
|
"""
|
@@ -899,7 +900,7 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
899
900
|
|
900
901
|
@property
|
901
902
|
@pulumi.getter
|
902
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
903
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
903
904
|
"""
|
904
905
|
The namespace to provision the resource in.
|
905
906
|
The value should not contain leading or trailing forward slashes.
|
@@ -910,7 +911,7 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
910
911
|
|
911
912
|
@property
|
912
913
|
@pulumi.getter
|
913
|
-
def token(self) -> pulumi.Output[Optional[str]]:
|
914
|
+
def token(self) -> pulumi.Output[Optional[builtins.str]]:
|
914
915
|
"""
|
915
916
|
Specifies the Nomad Management token to use.
|
916
917
|
"""
|
@@ -918,7 +919,7 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
918
919
|
|
919
920
|
@property
|
920
921
|
@pulumi.getter
|
921
|
-
def ttl(self) -> pulumi.Output[int]:
|
922
|
+
def ttl(self) -> pulumi.Output[builtins.int]:
|
922
923
|
"""
|
923
924
|
Specifies the ttl of the lease for the generated token.
|
924
925
|
"""
|