pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,56 +20,56 @@ __all__ = ['SecretBackendArgs', 'SecretBackend']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class SecretBackendArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
credentials: Optional[pulumi.Input[str]] = None,
|
23
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
24
|
-
description: Optional[pulumi.Input[str]] = None,
|
25
|
-
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
26
|
-
disable_remount: Optional[pulumi.Input[bool]] = None,
|
27
|
-
identity_token_audience: Optional[pulumi.Input[str]] = None,
|
28
|
-
identity_token_key: Optional[pulumi.Input[str]] = None,
|
29
|
-
identity_token_ttl: Optional[pulumi.Input[int]] = None,
|
30
|
-
local: Optional[pulumi.Input[bool]] = None,
|
31
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
32
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
33
|
-
path: Optional[pulumi.Input[str]] = None,
|
34
|
-
rotation_period: Optional[pulumi.Input[int]] = None,
|
35
|
-
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
36
|
-
rotation_window: Optional[pulumi.Input[int]] = None,
|
37
|
-
service_account_email: Optional[pulumi.Input[str]] = None):
|
23
|
+
credentials: Optional[pulumi.Input[builtins.str]] = None,
|
24
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
|
25
|
+
description: Optional[pulumi.Input[builtins.str]] = None,
|
26
|
+
disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
|
27
|
+
disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
|
28
|
+
identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
|
29
|
+
identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
|
30
|
+
identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
31
|
+
local: Optional[pulumi.Input[builtins.bool]] = None,
|
32
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
|
33
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
34
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
35
|
+
rotation_period: Optional[pulumi.Input[builtins.int]] = None,
|
36
|
+
rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
|
37
|
+
rotation_window: Optional[pulumi.Input[builtins.int]] = None,
|
38
|
+
service_account_email: Optional[pulumi.Input[builtins.str]] = None):
|
38
39
|
"""
|
39
40
|
The set of arguments for constructing a SecretBackend resource.
|
40
|
-
:param pulumi.Input[str] credentials: JSON-encoded credentials to use to connect to GCP
|
41
|
-
:param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials
|
41
|
+
:param pulumi.Input[builtins.str] credentials: JSON-encoded credentials to use to connect to GCP
|
42
|
+
:param pulumi.Input[builtins.int] default_lease_ttl_seconds: The default TTL for credentials
|
42
43
|
issued by this backend. Defaults to '0'.
|
43
|
-
:param pulumi.Input[str] description: A human-friendly description for this backend.
|
44
|
-
:param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
44
|
+
:param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
|
45
|
+
:param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
45
46
|
*Available only for Vault Enterprise*.
|
46
|
-
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
47
|
+
:param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
47
48
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
48
|
-
:param pulumi.Input[str] identity_token_audience: The audience claim value for plugin identity
|
49
|
+
:param pulumi.Input[builtins.str] identity_token_audience: The audience claim value for plugin identity
|
49
50
|
tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
|
50
51
|
Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
51
|
-
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin identity
|
52
|
+
:param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin identity
|
52
53
|
tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
53
|
-
:param pulumi.Input[int] identity_token_ttl: The TTL of generated tokens.
|
54
|
-
:param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
55
|
-
:param pulumi.Input[int] max_lease_ttl_seconds: The maximum TTL that can be requested
|
54
|
+
:param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated tokens.
|
55
|
+
:param pulumi.Input[builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
56
|
+
:param pulumi.Input[builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
|
56
57
|
for credentials issued by this backend. Defaults to '0'.
|
57
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
58
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
58
59
|
The value should not contain leading or trailing forward slashes.
|
59
60
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
60
61
|
*Available only for Vault Enterprise*.
|
61
|
-
:param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
|
62
|
+
:param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
|
62
63
|
not begin or end with a `/`. Defaults to `gcp`.
|
63
|
-
:param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
64
|
+
:param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
64
65
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
65
66
|
*Available only for Vault Enterprise*.
|
66
|
-
:param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
67
|
+
:param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
67
68
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
|
68
|
-
:param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
|
69
|
+
:param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
69
70
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
70
71
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
|
71
|
-
:param pulumi.Input[str] service_account_email: Service Account to impersonate for plugin workload identity federation.
|
72
|
+
:param pulumi.Input[builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
|
72
73
|
Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
73
74
|
"""
|
74
75
|
if credentials is not None:
|
@@ -106,19 +107,19 @@ class SecretBackendArgs:
|
|
106
107
|
|
107
108
|
@property
|
108
109
|
@pulumi.getter
|
109
|
-
def credentials(self) -> Optional[pulumi.Input[str]]:
|
110
|
+
def credentials(self) -> Optional[pulumi.Input[builtins.str]]:
|
110
111
|
"""
|
111
112
|
JSON-encoded credentials to use to connect to GCP
|
112
113
|
"""
|
113
114
|
return pulumi.get(self, "credentials")
|
114
115
|
|
115
116
|
@credentials.setter
|
116
|
-
def credentials(self, value: Optional[pulumi.Input[str]]):
|
117
|
+
def credentials(self, value: Optional[pulumi.Input[builtins.str]]):
|
117
118
|
pulumi.set(self, "credentials", value)
|
118
119
|
|
119
120
|
@property
|
120
121
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
121
|
-
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[int]]:
|
122
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
|
122
123
|
"""
|
123
124
|
The default TTL for credentials
|
124
125
|
issued by this backend. Defaults to '0'.
|
@@ -126,24 +127,24 @@ class SecretBackendArgs:
|
|
126
127
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
127
128
|
|
128
129
|
@default_lease_ttl_seconds.setter
|
129
|
-
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
|
130
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
|
130
131
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
131
132
|
|
132
133
|
@property
|
133
134
|
@pulumi.getter
|
134
|
-
def description(self) -> Optional[pulumi.Input[str]]:
|
135
|
+
def description(self) -> Optional[pulumi.Input[builtins.str]]:
|
135
136
|
"""
|
136
137
|
A human-friendly description for this backend.
|
137
138
|
"""
|
138
139
|
return pulumi.get(self, "description")
|
139
140
|
|
140
141
|
@description.setter
|
141
|
-
def description(self, value: Optional[pulumi.Input[str]]):
|
142
|
+
def description(self, value: Optional[pulumi.Input[builtins.str]]):
|
142
143
|
pulumi.set(self, "description", value)
|
143
144
|
|
144
145
|
@property
|
145
146
|
@pulumi.getter(name="disableAutomatedRotation")
|
146
|
-
def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
|
147
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
|
147
148
|
"""
|
148
149
|
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
149
150
|
*Available only for Vault Enterprise*.
|
@@ -151,12 +152,12 @@ class SecretBackendArgs:
|
|
151
152
|
return pulumi.get(self, "disable_automated_rotation")
|
152
153
|
|
153
154
|
@disable_automated_rotation.setter
|
154
|
-
def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
|
155
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
|
155
156
|
pulumi.set(self, "disable_automated_rotation", value)
|
156
157
|
|
157
158
|
@property
|
158
159
|
@pulumi.getter(name="disableRemount")
|
159
|
-
def disable_remount(self) -> Optional[pulumi.Input[bool]]:
|
160
|
+
def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
|
160
161
|
"""
|
161
162
|
If set, opts out of mount migration on path updates.
|
162
163
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -164,12 +165,12 @@ class SecretBackendArgs:
|
|
164
165
|
return pulumi.get(self, "disable_remount")
|
165
166
|
|
166
167
|
@disable_remount.setter
|
167
|
-
def disable_remount(self, value: Optional[pulumi.Input[bool]]):
|
168
|
+
def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
|
168
169
|
pulumi.set(self, "disable_remount", value)
|
169
170
|
|
170
171
|
@property
|
171
172
|
@pulumi.getter(name="identityTokenAudience")
|
172
|
-
def identity_token_audience(self) -> Optional[pulumi.Input[str]]:
|
173
|
+
def identity_token_audience(self) -> Optional[pulumi.Input[builtins.str]]:
|
173
174
|
"""
|
174
175
|
The audience claim value for plugin identity
|
175
176
|
tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
|
@@ -178,12 +179,12 @@ class SecretBackendArgs:
|
|
178
179
|
return pulumi.get(self, "identity_token_audience")
|
179
180
|
|
180
181
|
@identity_token_audience.setter
|
181
|
-
def identity_token_audience(self, value: Optional[pulumi.Input[str]]):
|
182
|
+
def identity_token_audience(self, value: Optional[pulumi.Input[builtins.str]]):
|
182
183
|
pulumi.set(self, "identity_token_audience", value)
|
183
184
|
|
184
185
|
@property
|
185
186
|
@pulumi.getter(name="identityTokenKey")
|
186
|
-
def identity_token_key(self) -> Optional[pulumi.Input[str]]:
|
187
|
+
def identity_token_key(self) -> Optional[pulumi.Input[builtins.str]]:
|
187
188
|
"""
|
188
189
|
The key to use for signing plugin identity
|
189
190
|
tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
@@ -191,36 +192,36 @@ class SecretBackendArgs:
|
|
191
192
|
return pulumi.get(self, "identity_token_key")
|
192
193
|
|
193
194
|
@identity_token_key.setter
|
194
|
-
def identity_token_key(self, value: Optional[pulumi.Input[str]]):
|
195
|
+
def identity_token_key(self, value: Optional[pulumi.Input[builtins.str]]):
|
195
196
|
pulumi.set(self, "identity_token_key", value)
|
196
197
|
|
197
198
|
@property
|
198
199
|
@pulumi.getter(name="identityTokenTtl")
|
199
|
-
def identity_token_ttl(self) -> Optional[pulumi.Input[int]]:
|
200
|
+
def identity_token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
200
201
|
"""
|
201
202
|
The TTL of generated tokens.
|
202
203
|
"""
|
203
204
|
return pulumi.get(self, "identity_token_ttl")
|
204
205
|
|
205
206
|
@identity_token_ttl.setter
|
206
|
-
def identity_token_ttl(self, value: Optional[pulumi.Input[int]]):
|
207
|
+
def identity_token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
207
208
|
pulumi.set(self, "identity_token_ttl", value)
|
208
209
|
|
209
210
|
@property
|
210
211
|
@pulumi.getter
|
211
|
-
def local(self) -> Optional[pulumi.Input[bool]]:
|
212
|
+
def local(self) -> Optional[pulumi.Input[builtins.bool]]:
|
212
213
|
"""
|
213
214
|
Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
214
215
|
"""
|
215
216
|
return pulumi.get(self, "local")
|
216
217
|
|
217
218
|
@local.setter
|
218
|
-
def local(self, value: Optional[pulumi.Input[bool]]):
|
219
|
+
def local(self, value: Optional[pulumi.Input[builtins.bool]]):
|
219
220
|
pulumi.set(self, "local", value)
|
220
221
|
|
221
222
|
@property
|
222
223
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
223
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[int]]:
|
224
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
|
224
225
|
"""
|
225
226
|
The maximum TTL that can be requested
|
226
227
|
for credentials issued by this backend. Defaults to '0'.
|
@@ -228,12 +229,12 @@ class SecretBackendArgs:
|
|
228
229
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
229
230
|
|
230
231
|
@max_lease_ttl_seconds.setter
|
231
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
|
232
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
|
232
233
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
233
234
|
|
234
235
|
@property
|
235
236
|
@pulumi.getter
|
236
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
237
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
237
238
|
"""
|
238
239
|
The namespace to provision the resource in.
|
239
240
|
The value should not contain leading or trailing forward slashes.
|
@@ -243,12 +244,12 @@ class SecretBackendArgs:
|
|
243
244
|
return pulumi.get(self, "namespace")
|
244
245
|
|
245
246
|
@namespace.setter
|
246
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
247
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
247
248
|
pulumi.set(self, "namespace", value)
|
248
249
|
|
249
250
|
@property
|
250
251
|
@pulumi.getter
|
251
|
-
def path(self) -> Optional[pulumi.Input[str]]:
|
252
|
+
def path(self) -> Optional[pulumi.Input[builtins.str]]:
|
252
253
|
"""
|
253
254
|
The unique path this backend should be mounted at. Must
|
254
255
|
not begin or end with a `/`. Defaults to `gcp`.
|
@@ -256,12 +257,12 @@ class SecretBackendArgs:
|
|
256
257
|
return pulumi.get(self, "path")
|
257
258
|
|
258
259
|
@path.setter
|
259
|
-
def path(self, value: Optional[pulumi.Input[str]]):
|
260
|
+
def path(self, value: Optional[pulumi.Input[builtins.str]]):
|
260
261
|
pulumi.set(self, "path", value)
|
261
262
|
|
262
263
|
@property
|
263
264
|
@pulumi.getter(name="rotationPeriod")
|
264
|
-
def rotation_period(self) -> Optional[pulumi.Input[int]]:
|
265
|
+
def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
|
265
266
|
"""
|
266
267
|
The amount of time in seconds Vault should wait before rotating the root credential.
|
267
268
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
@@ -270,12 +271,12 @@ class SecretBackendArgs:
|
|
270
271
|
return pulumi.get(self, "rotation_period")
|
271
272
|
|
272
273
|
@rotation_period.setter
|
273
|
-
def rotation_period(self, value: Optional[pulumi.Input[int]]):
|
274
|
+
def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
|
274
275
|
pulumi.set(self, "rotation_period", value)
|
275
276
|
|
276
277
|
@property
|
277
278
|
@pulumi.getter(name="rotationSchedule")
|
278
|
-
def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
|
279
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
|
279
280
|
"""
|
280
281
|
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
281
282
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
|
@@ -283,12 +284,12 @@ class SecretBackendArgs:
|
|
283
284
|
return pulumi.get(self, "rotation_schedule")
|
284
285
|
|
285
286
|
@rotation_schedule.setter
|
286
|
-
def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
|
287
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
|
287
288
|
pulumi.set(self, "rotation_schedule", value)
|
288
289
|
|
289
290
|
@property
|
290
291
|
@pulumi.getter(name="rotationWindow")
|
291
|
-
def rotation_window(self) -> Optional[pulumi.Input[int]]:
|
292
|
+
def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
|
292
293
|
"""
|
293
294
|
The maximum amount of time in seconds allowed to complete
|
294
295
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
@@ -297,12 +298,12 @@ class SecretBackendArgs:
|
|
297
298
|
return pulumi.get(self, "rotation_window")
|
298
299
|
|
299
300
|
@rotation_window.setter
|
300
|
-
def rotation_window(self, value: Optional[pulumi.Input[int]]):
|
301
|
+
def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
|
301
302
|
pulumi.set(self, "rotation_window", value)
|
302
303
|
|
303
304
|
@property
|
304
305
|
@pulumi.getter(name="serviceAccountEmail")
|
305
|
-
def service_account_email(self) -> Optional[pulumi.Input[str]]:
|
306
|
+
def service_account_email(self) -> Optional[pulumi.Input[builtins.str]]:
|
306
307
|
"""
|
307
308
|
Service Account to impersonate for plugin workload identity federation.
|
308
309
|
Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
@@ -310,65 +311,65 @@ class SecretBackendArgs:
|
|
310
311
|
return pulumi.get(self, "service_account_email")
|
311
312
|
|
312
313
|
@service_account_email.setter
|
313
|
-
def service_account_email(self, value: Optional[pulumi.Input[str]]):
|
314
|
+
def service_account_email(self, value: Optional[pulumi.Input[builtins.str]]):
|
314
315
|
pulumi.set(self, "service_account_email", value)
|
315
316
|
|
316
317
|
|
317
318
|
@pulumi.input_type
|
318
319
|
class _SecretBackendState:
|
319
320
|
def __init__(__self__, *,
|
320
|
-
accessor: Optional[pulumi.Input[str]] = None,
|
321
|
-
credentials: Optional[pulumi.Input[str]] = None,
|
322
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
323
|
-
description: Optional[pulumi.Input[str]] = None,
|
324
|
-
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
325
|
-
disable_remount: Optional[pulumi.Input[bool]] = None,
|
326
|
-
identity_token_audience: Optional[pulumi.Input[str]] = None,
|
327
|
-
identity_token_key: Optional[pulumi.Input[str]] = None,
|
328
|
-
identity_token_ttl: Optional[pulumi.Input[int]] = None,
|
329
|
-
local: Optional[pulumi.Input[bool]] = None,
|
330
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
331
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
332
|
-
path: Optional[pulumi.Input[str]] = None,
|
333
|
-
rotation_period: Optional[pulumi.Input[int]] = None,
|
334
|
-
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
335
|
-
rotation_window: Optional[pulumi.Input[int]] = None,
|
336
|
-
service_account_email: Optional[pulumi.Input[str]] = None):
|
321
|
+
accessor: Optional[pulumi.Input[builtins.str]] = None,
|
322
|
+
credentials: Optional[pulumi.Input[builtins.str]] = None,
|
323
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
|
324
|
+
description: Optional[pulumi.Input[builtins.str]] = None,
|
325
|
+
disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
|
326
|
+
disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
|
327
|
+
identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
|
328
|
+
identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
|
329
|
+
identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
330
|
+
local: Optional[pulumi.Input[builtins.bool]] = None,
|
331
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
|
332
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
333
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
334
|
+
rotation_period: Optional[pulumi.Input[builtins.int]] = None,
|
335
|
+
rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
|
336
|
+
rotation_window: Optional[pulumi.Input[builtins.int]] = None,
|
337
|
+
service_account_email: Optional[pulumi.Input[builtins.str]] = None):
|
337
338
|
"""
|
338
339
|
Input properties used for looking up and filtering SecretBackend resources.
|
339
|
-
:param pulumi.Input[str] accessor: The accessor of the created GCP mount.
|
340
|
-
:param pulumi.Input[str] credentials: JSON-encoded credentials to use to connect to GCP
|
341
|
-
:param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials
|
340
|
+
:param pulumi.Input[builtins.str] accessor: The accessor of the created GCP mount.
|
341
|
+
:param pulumi.Input[builtins.str] credentials: JSON-encoded credentials to use to connect to GCP
|
342
|
+
:param pulumi.Input[builtins.int] default_lease_ttl_seconds: The default TTL for credentials
|
342
343
|
issued by this backend. Defaults to '0'.
|
343
|
-
:param pulumi.Input[str] description: A human-friendly description for this backend.
|
344
|
-
:param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
344
|
+
:param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
|
345
|
+
:param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
345
346
|
*Available only for Vault Enterprise*.
|
346
|
-
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
347
|
+
:param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
347
348
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
348
|
-
:param pulumi.Input[str] identity_token_audience: The audience claim value for plugin identity
|
349
|
+
:param pulumi.Input[builtins.str] identity_token_audience: The audience claim value for plugin identity
|
349
350
|
tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
|
350
351
|
Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
351
|
-
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin identity
|
352
|
+
:param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin identity
|
352
353
|
tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
353
|
-
:param pulumi.Input[int] identity_token_ttl: The TTL of generated tokens.
|
354
|
-
:param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
355
|
-
:param pulumi.Input[int] max_lease_ttl_seconds: The maximum TTL that can be requested
|
354
|
+
:param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated tokens.
|
355
|
+
:param pulumi.Input[builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
356
|
+
:param pulumi.Input[builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
|
356
357
|
for credentials issued by this backend. Defaults to '0'.
|
357
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
358
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
358
359
|
The value should not contain leading or trailing forward slashes.
|
359
360
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
360
361
|
*Available only for Vault Enterprise*.
|
361
|
-
:param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
|
362
|
+
:param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
|
362
363
|
not begin or end with a `/`. Defaults to `gcp`.
|
363
|
-
:param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
364
|
+
:param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
364
365
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
365
366
|
*Available only for Vault Enterprise*.
|
366
|
-
:param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
367
|
+
:param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
367
368
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
|
368
|
-
:param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
|
369
|
+
:param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
369
370
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
370
371
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
|
371
|
-
:param pulumi.Input[str] service_account_email: Service Account to impersonate for plugin workload identity federation.
|
372
|
+
:param pulumi.Input[builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
|
372
373
|
Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
373
374
|
"""
|
374
375
|
if accessor is not None:
|
@@ -408,31 +409,31 @@ class _SecretBackendState:
|
|
408
409
|
|
409
410
|
@property
|
410
411
|
@pulumi.getter
|
411
|
-
def accessor(self) -> Optional[pulumi.Input[str]]:
|
412
|
+
def accessor(self) -> Optional[pulumi.Input[builtins.str]]:
|
412
413
|
"""
|
413
414
|
The accessor of the created GCP mount.
|
414
415
|
"""
|
415
416
|
return pulumi.get(self, "accessor")
|
416
417
|
|
417
418
|
@accessor.setter
|
418
|
-
def accessor(self, value: Optional[pulumi.Input[str]]):
|
419
|
+
def accessor(self, value: Optional[pulumi.Input[builtins.str]]):
|
419
420
|
pulumi.set(self, "accessor", value)
|
420
421
|
|
421
422
|
@property
|
422
423
|
@pulumi.getter
|
423
|
-
def credentials(self) -> Optional[pulumi.Input[str]]:
|
424
|
+
def credentials(self) -> Optional[pulumi.Input[builtins.str]]:
|
424
425
|
"""
|
425
426
|
JSON-encoded credentials to use to connect to GCP
|
426
427
|
"""
|
427
428
|
return pulumi.get(self, "credentials")
|
428
429
|
|
429
430
|
@credentials.setter
|
430
|
-
def credentials(self, value: Optional[pulumi.Input[str]]):
|
431
|
+
def credentials(self, value: Optional[pulumi.Input[builtins.str]]):
|
431
432
|
pulumi.set(self, "credentials", value)
|
432
433
|
|
433
434
|
@property
|
434
435
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
435
|
-
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[int]]:
|
436
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
|
436
437
|
"""
|
437
438
|
The default TTL for credentials
|
438
439
|
issued by this backend. Defaults to '0'.
|
@@ -440,24 +441,24 @@ class _SecretBackendState:
|
|
440
441
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
441
442
|
|
442
443
|
@default_lease_ttl_seconds.setter
|
443
|
-
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
|
444
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
|
444
445
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
445
446
|
|
446
447
|
@property
|
447
448
|
@pulumi.getter
|
448
|
-
def description(self) -> Optional[pulumi.Input[str]]:
|
449
|
+
def description(self) -> Optional[pulumi.Input[builtins.str]]:
|
449
450
|
"""
|
450
451
|
A human-friendly description for this backend.
|
451
452
|
"""
|
452
453
|
return pulumi.get(self, "description")
|
453
454
|
|
454
455
|
@description.setter
|
455
|
-
def description(self, value: Optional[pulumi.Input[str]]):
|
456
|
+
def description(self, value: Optional[pulumi.Input[builtins.str]]):
|
456
457
|
pulumi.set(self, "description", value)
|
457
458
|
|
458
459
|
@property
|
459
460
|
@pulumi.getter(name="disableAutomatedRotation")
|
460
|
-
def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
|
461
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
|
461
462
|
"""
|
462
463
|
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
463
464
|
*Available only for Vault Enterprise*.
|
@@ -465,12 +466,12 @@ class _SecretBackendState:
|
|
465
466
|
return pulumi.get(self, "disable_automated_rotation")
|
466
467
|
|
467
468
|
@disable_automated_rotation.setter
|
468
|
-
def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
|
469
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
|
469
470
|
pulumi.set(self, "disable_automated_rotation", value)
|
470
471
|
|
471
472
|
@property
|
472
473
|
@pulumi.getter(name="disableRemount")
|
473
|
-
def disable_remount(self) -> Optional[pulumi.Input[bool]]:
|
474
|
+
def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
|
474
475
|
"""
|
475
476
|
If set, opts out of mount migration on path updates.
|
476
477
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -478,12 +479,12 @@ class _SecretBackendState:
|
|
478
479
|
return pulumi.get(self, "disable_remount")
|
479
480
|
|
480
481
|
@disable_remount.setter
|
481
|
-
def disable_remount(self, value: Optional[pulumi.Input[bool]]):
|
482
|
+
def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
|
482
483
|
pulumi.set(self, "disable_remount", value)
|
483
484
|
|
484
485
|
@property
|
485
486
|
@pulumi.getter(name="identityTokenAudience")
|
486
|
-
def identity_token_audience(self) -> Optional[pulumi.Input[str]]:
|
487
|
+
def identity_token_audience(self) -> Optional[pulumi.Input[builtins.str]]:
|
487
488
|
"""
|
488
489
|
The audience claim value for plugin identity
|
489
490
|
tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
|
@@ -492,12 +493,12 @@ class _SecretBackendState:
|
|
492
493
|
return pulumi.get(self, "identity_token_audience")
|
493
494
|
|
494
495
|
@identity_token_audience.setter
|
495
|
-
def identity_token_audience(self, value: Optional[pulumi.Input[str]]):
|
496
|
+
def identity_token_audience(self, value: Optional[pulumi.Input[builtins.str]]):
|
496
497
|
pulumi.set(self, "identity_token_audience", value)
|
497
498
|
|
498
499
|
@property
|
499
500
|
@pulumi.getter(name="identityTokenKey")
|
500
|
-
def identity_token_key(self) -> Optional[pulumi.Input[str]]:
|
501
|
+
def identity_token_key(self) -> Optional[pulumi.Input[builtins.str]]:
|
501
502
|
"""
|
502
503
|
The key to use for signing plugin identity
|
503
504
|
tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
@@ -505,36 +506,36 @@ class _SecretBackendState:
|
|
505
506
|
return pulumi.get(self, "identity_token_key")
|
506
507
|
|
507
508
|
@identity_token_key.setter
|
508
|
-
def identity_token_key(self, value: Optional[pulumi.Input[str]]):
|
509
|
+
def identity_token_key(self, value: Optional[pulumi.Input[builtins.str]]):
|
509
510
|
pulumi.set(self, "identity_token_key", value)
|
510
511
|
|
511
512
|
@property
|
512
513
|
@pulumi.getter(name="identityTokenTtl")
|
513
|
-
def identity_token_ttl(self) -> Optional[pulumi.Input[int]]:
|
514
|
+
def identity_token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
514
515
|
"""
|
515
516
|
The TTL of generated tokens.
|
516
517
|
"""
|
517
518
|
return pulumi.get(self, "identity_token_ttl")
|
518
519
|
|
519
520
|
@identity_token_ttl.setter
|
520
|
-
def identity_token_ttl(self, value: Optional[pulumi.Input[int]]):
|
521
|
+
def identity_token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
521
522
|
pulumi.set(self, "identity_token_ttl", value)
|
522
523
|
|
523
524
|
@property
|
524
525
|
@pulumi.getter
|
525
|
-
def local(self) -> Optional[pulumi.Input[bool]]:
|
526
|
+
def local(self) -> Optional[pulumi.Input[builtins.bool]]:
|
526
527
|
"""
|
527
528
|
Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
528
529
|
"""
|
529
530
|
return pulumi.get(self, "local")
|
530
531
|
|
531
532
|
@local.setter
|
532
|
-
def local(self, value: Optional[pulumi.Input[bool]]):
|
533
|
+
def local(self, value: Optional[pulumi.Input[builtins.bool]]):
|
533
534
|
pulumi.set(self, "local", value)
|
534
535
|
|
535
536
|
@property
|
536
537
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
537
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[int]]:
|
538
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
|
538
539
|
"""
|
539
540
|
The maximum TTL that can be requested
|
540
541
|
for credentials issued by this backend. Defaults to '0'.
|
@@ -542,12 +543,12 @@ class _SecretBackendState:
|
|
542
543
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
543
544
|
|
544
545
|
@max_lease_ttl_seconds.setter
|
545
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
|
546
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
|
546
547
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
547
548
|
|
548
549
|
@property
|
549
550
|
@pulumi.getter
|
550
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
551
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
551
552
|
"""
|
552
553
|
The namespace to provision the resource in.
|
553
554
|
The value should not contain leading or trailing forward slashes.
|
@@ -557,12 +558,12 @@ class _SecretBackendState:
|
|
557
558
|
return pulumi.get(self, "namespace")
|
558
559
|
|
559
560
|
@namespace.setter
|
560
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
561
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
561
562
|
pulumi.set(self, "namespace", value)
|
562
563
|
|
563
564
|
@property
|
564
565
|
@pulumi.getter
|
565
|
-
def path(self) -> Optional[pulumi.Input[str]]:
|
566
|
+
def path(self) -> Optional[pulumi.Input[builtins.str]]:
|
566
567
|
"""
|
567
568
|
The unique path this backend should be mounted at. Must
|
568
569
|
not begin or end with a `/`. Defaults to `gcp`.
|
@@ -570,12 +571,12 @@ class _SecretBackendState:
|
|
570
571
|
return pulumi.get(self, "path")
|
571
572
|
|
572
573
|
@path.setter
|
573
|
-
def path(self, value: Optional[pulumi.Input[str]]):
|
574
|
+
def path(self, value: Optional[pulumi.Input[builtins.str]]):
|
574
575
|
pulumi.set(self, "path", value)
|
575
576
|
|
576
577
|
@property
|
577
578
|
@pulumi.getter(name="rotationPeriod")
|
578
|
-
def rotation_period(self) -> Optional[pulumi.Input[int]]:
|
579
|
+
def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
|
579
580
|
"""
|
580
581
|
The amount of time in seconds Vault should wait before rotating the root credential.
|
581
582
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
@@ -584,12 +585,12 @@ class _SecretBackendState:
|
|
584
585
|
return pulumi.get(self, "rotation_period")
|
585
586
|
|
586
587
|
@rotation_period.setter
|
587
|
-
def rotation_period(self, value: Optional[pulumi.Input[int]]):
|
588
|
+
def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
|
588
589
|
pulumi.set(self, "rotation_period", value)
|
589
590
|
|
590
591
|
@property
|
591
592
|
@pulumi.getter(name="rotationSchedule")
|
592
|
-
def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
|
593
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
|
593
594
|
"""
|
594
595
|
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
595
596
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
|
@@ -597,12 +598,12 @@ class _SecretBackendState:
|
|
597
598
|
return pulumi.get(self, "rotation_schedule")
|
598
599
|
|
599
600
|
@rotation_schedule.setter
|
600
|
-
def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
|
601
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
|
601
602
|
pulumi.set(self, "rotation_schedule", value)
|
602
603
|
|
603
604
|
@property
|
604
605
|
@pulumi.getter(name="rotationWindow")
|
605
|
-
def rotation_window(self) -> Optional[pulumi.Input[int]]:
|
606
|
+
def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
|
606
607
|
"""
|
607
608
|
The maximum amount of time in seconds allowed to complete
|
608
609
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
@@ -611,12 +612,12 @@ class _SecretBackendState:
|
|
611
612
|
return pulumi.get(self, "rotation_window")
|
612
613
|
|
613
614
|
@rotation_window.setter
|
614
|
-
def rotation_window(self, value: Optional[pulumi.Input[int]]):
|
615
|
+
def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
|
615
616
|
pulumi.set(self, "rotation_window", value)
|
616
617
|
|
617
618
|
@property
|
618
619
|
@pulumi.getter(name="serviceAccountEmail")
|
619
|
-
def service_account_email(self) -> Optional[pulumi.Input[str]]:
|
620
|
+
def service_account_email(self) -> Optional[pulumi.Input[builtins.str]]:
|
620
621
|
"""
|
621
622
|
Service Account to impersonate for plugin workload identity federation.
|
622
623
|
Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
@@ -624,7 +625,7 @@ class _SecretBackendState:
|
|
624
625
|
return pulumi.get(self, "service_account_email")
|
625
626
|
|
626
627
|
@service_account_email.setter
|
627
|
-
def service_account_email(self, value: Optional[pulumi.Input[str]]):
|
628
|
+
def service_account_email(self, value: Optional[pulumi.Input[builtins.str]]):
|
628
629
|
pulumi.set(self, "service_account_email", value)
|
629
630
|
|
630
631
|
|
@@ -633,22 +634,22 @@ class SecretBackend(pulumi.CustomResource):
|
|
633
634
|
def __init__(__self__,
|
634
635
|
resource_name: str,
|
635
636
|
opts: Optional[pulumi.ResourceOptions] = None,
|
636
|
-
credentials: Optional[pulumi.Input[str]] = None,
|
637
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
638
|
-
description: Optional[pulumi.Input[str]] = None,
|
639
|
-
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
640
|
-
disable_remount: Optional[pulumi.Input[bool]] = None,
|
641
|
-
identity_token_audience: Optional[pulumi.Input[str]] = None,
|
642
|
-
identity_token_key: Optional[pulumi.Input[str]] = None,
|
643
|
-
identity_token_ttl: Optional[pulumi.Input[int]] = None,
|
644
|
-
local: Optional[pulumi.Input[bool]] = None,
|
645
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
646
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
647
|
-
path: Optional[pulumi.Input[str]] = None,
|
648
|
-
rotation_period: Optional[pulumi.Input[int]] = None,
|
649
|
-
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
650
|
-
rotation_window: Optional[pulumi.Input[int]] = None,
|
651
|
-
service_account_email: Optional[pulumi.Input[str]] = None,
|
637
|
+
credentials: Optional[pulumi.Input[builtins.str]] = None,
|
638
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
|
639
|
+
description: Optional[pulumi.Input[builtins.str]] = None,
|
640
|
+
disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
|
641
|
+
disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
|
642
|
+
identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
|
643
|
+
identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
|
644
|
+
identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
645
|
+
local: Optional[pulumi.Input[builtins.bool]] = None,
|
646
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
|
647
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
648
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
649
|
+
rotation_period: Optional[pulumi.Input[builtins.int]] = None,
|
650
|
+
rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
|
651
|
+
rotation_window: Optional[pulumi.Input[builtins.int]] = None,
|
652
|
+
service_account_email: Optional[pulumi.Input[builtins.str]] = None,
|
652
653
|
__props__=None):
|
653
654
|
"""
|
654
655
|
## Example Usage
|
@@ -680,38 +681,38 @@ class SecretBackend(pulumi.CustomResource):
|
|
680
681
|
|
681
682
|
:param str resource_name: The name of the resource.
|
682
683
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
683
|
-
:param pulumi.Input[str] credentials: JSON-encoded credentials to use to connect to GCP
|
684
|
-
:param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials
|
684
|
+
:param pulumi.Input[builtins.str] credentials: JSON-encoded credentials to use to connect to GCP
|
685
|
+
:param pulumi.Input[builtins.int] default_lease_ttl_seconds: The default TTL for credentials
|
685
686
|
issued by this backend. Defaults to '0'.
|
686
|
-
:param pulumi.Input[str] description: A human-friendly description for this backend.
|
687
|
-
:param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
687
|
+
:param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
|
688
|
+
:param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
688
689
|
*Available only for Vault Enterprise*.
|
689
|
-
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
690
|
+
:param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
690
691
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
691
|
-
:param pulumi.Input[str] identity_token_audience: The audience claim value for plugin identity
|
692
|
+
:param pulumi.Input[builtins.str] identity_token_audience: The audience claim value for plugin identity
|
692
693
|
tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
|
693
694
|
Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
694
|
-
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin identity
|
695
|
+
:param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin identity
|
695
696
|
tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
696
|
-
:param pulumi.Input[int] identity_token_ttl: The TTL of generated tokens.
|
697
|
-
:param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
698
|
-
:param pulumi.Input[int] max_lease_ttl_seconds: The maximum TTL that can be requested
|
697
|
+
:param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated tokens.
|
698
|
+
:param pulumi.Input[builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
699
|
+
:param pulumi.Input[builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
|
699
700
|
for credentials issued by this backend. Defaults to '0'.
|
700
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
701
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
701
702
|
The value should not contain leading or trailing forward slashes.
|
702
703
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
703
704
|
*Available only for Vault Enterprise*.
|
704
|
-
:param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
|
705
|
+
:param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
|
705
706
|
not begin or end with a `/`. Defaults to `gcp`.
|
706
|
-
:param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
707
|
+
:param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
707
708
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
708
709
|
*Available only for Vault Enterprise*.
|
709
|
-
:param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
710
|
+
:param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
710
711
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
|
711
|
-
:param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
|
712
|
+
:param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
712
713
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
713
714
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
|
714
|
-
:param pulumi.Input[str] service_account_email: Service Account to impersonate for plugin workload identity federation.
|
715
|
+
:param pulumi.Input[builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
|
715
716
|
Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
716
717
|
"""
|
717
718
|
...
|
@@ -763,22 +764,22 @@ class SecretBackend(pulumi.CustomResource):
|
|
763
764
|
def _internal_init(__self__,
|
764
765
|
resource_name: str,
|
765
766
|
opts: Optional[pulumi.ResourceOptions] = None,
|
766
|
-
credentials: Optional[pulumi.Input[str]] = None,
|
767
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
768
|
-
description: Optional[pulumi.Input[str]] = None,
|
769
|
-
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
770
|
-
disable_remount: Optional[pulumi.Input[bool]] = None,
|
771
|
-
identity_token_audience: Optional[pulumi.Input[str]] = None,
|
772
|
-
identity_token_key: Optional[pulumi.Input[str]] = None,
|
773
|
-
identity_token_ttl: Optional[pulumi.Input[int]] = None,
|
774
|
-
local: Optional[pulumi.Input[bool]] = None,
|
775
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
776
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
777
|
-
path: Optional[pulumi.Input[str]] = None,
|
778
|
-
rotation_period: Optional[pulumi.Input[int]] = None,
|
779
|
-
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
780
|
-
rotation_window: Optional[pulumi.Input[int]] = None,
|
781
|
-
service_account_email: Optional[pulumi.Input[str]] = None,
|
767
|
+
credentials: Optional[pulumi.Input[builtins.str]] = None,
|
768
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
|
769
|
+
description: Optional[pulumi.Input[builtins.str]] = None,
|
770
|
+
disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
|
771
|
+
disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
|
772
|
+
identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
|
773
|
+
identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
|
774
|
+
identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
775
|
+
local: Optional[pulumi.Input[builtins.bool]] = None,
|
776
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
|
777
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
778
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
779
|
+
rotation_period: Optional[pulumi.Input[builtins.int]] = None,
|
780
|
+
rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
|
781
|
+
rotation_window: Optional[pulumi.Input[builtins.int]] = None,
|
782
|
+
service_account_email: Optional[pulumi.Input[builtins.str]] = None,
|
782
783
|
__props__=None):
|
783
784
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
784
785
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -817,23 +818,23 @@ class SecretBackend(pulumi.CustomResource):
|
|
817
818
|
def get(resource_name: str,
|
818
819
|
id: pulumi.Input[str],
|
819
820
|
opts: Optional[pulumi.ResourceOptions] = None,
|
820
|
-
accessor: Optional[pulumi.Input[str]] = None,
|
821
|
-
credentials: Optional[pulumi.Input[str]] = None,
|
822
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
823
|
-
description: Optional[pulumi.Input[str]] = None,
|
824
|
-
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
825
|
-
disable_remount: Optional[pulumi.Input[bool]] = None,
|
826
|
-
identity_token_audience: Optional[pulumi.Input[str]] = None,
|
827
|
-
identity_token_key: Optional[pulumi.Input[str]] = None,
|
828
|
-
identity_token_ttl: Optional[pulumi.Input[int]] = None,
|
829
|
-
local: Optional[pulumi.Input[bool]] = None,
|
830
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
831
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
832
|
-
path: Optional[pulumi.Input[str]] = None,
|
833
|
-
rotation_period: Optional[pulumi.Input[int]] = None,
|
834
|
-
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
835
|
-
rotation_window: Optional[pulumi.Input[int]] = None,
|
836
|
-
service_account_email: Optional[pulumi.Input[str]] = None) -> 'SecretBackend':
|
821
|
+
accessor: Optional[pulumi.Input[builtins.str]] = None,
|
822
|
+
credentials: Optional[pulumi.Input[builtins.str]] = None,
|
823
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
|
824
|
+
description: Optional[pulumi.Input[builtins.str]] = None,
|
825
|
+
disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
|
826
|
+
disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
|
827
|
+
identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
|
828
|
+
identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
|
829
|
+
identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
830
|
+
local: Optional[pulumi.Input[builtins.bool]] = None,
|
831
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
|
832
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
833
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
834
|
+
rotation_period: Optional[pulumi.Input[builtins.int]] = None,
|
835
|
+
rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
|
836
|
+
rotation_window: Optional[pulumi.Input[builtins.int]] = None,
|
837
|
+
service_account_email: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretBackend':
|
837
838
|
"""
|
838
839
|
Get an existing SecretBackend resource's state with the given name, id, and optional extra
|
839
840
|
properties used to qualify the lookup.
|
@@ -841,39 +842,39 @@ class SecretBackend(pulumi.CustomResource):
|
|
841
842
|
:param str resource_name: The unique name of the resulting resource.
|
842
843
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
843
844
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
844
|
-
:param pulumi.Input[str] accessor: The accessor of the created GCP mount.
|
845
|
-
:param pulumi.Input[str] credentials: JSON-encoded credentials to use to connect to GCP
|
846
|
-
:param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials
|
845
|
+
:param pulumi.Input[builtins.str] accessor: The accessor of the created GCP mount.
|
846
|
+
:param pulumi.Input[builtins.str] credentials: JSON-encoded credentials to use to connect to GCP
|
847
|
+
:param pulumi.Input[builtins.int] default_lease_ttl_seconds: The default TTL for credentials
|
847
848
|
issued by this backend. Defaults to '0'.
|
848
|
-
:param pulumi.Input[str] description: A human-friendly description for this backend.
|
849
|
-
:param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
849
|
+
:param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
|
850
|
+
:param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
850
851
|
*Available only for Vault Enterprise*.
|
851
|
-
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
852
|
+
:param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
852
853
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
853
|
-
:param pulumi.Input[str] identity_token_audience: The audience claim value for plugin identity
|
854
|
+
:param pulumi.Input[builtins.str] identity_token_audience: The audience claim value for plugin identity
|
854
855
|
tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
|
855
856
|
Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
856
|
-
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin identity
|
857
|
+
:param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin identity
|
857
858
|
tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
858
|
-
:param pulumi.Input[int] identity_token_ttl: The TTL of generated tokens.
|
859
|
-
:param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
860
|
-
:param pulumi.Input[int] max_lease_ttl_seconds: The maximum TTL that can be requested
|
859
|
+
:param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated tokens.
|
860
|
+
:param pulumi.Input[builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
861
|
+
:param pulumi.Input[builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
|
861
862
|
for credentials issued by this backend. Defaults to '0'.
|
862
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
863
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
863
864
|
The value should not contain leading or trailing forward slashes.
|
864
865
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
865
866
|
*Available only for Vault Enterprise*.
|
866
|
-
:param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
|
867
|
+
:param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
|
867
868
|
not begin or end with a `/`. Defaults to `gcp`.
|
868
|
-
:param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
869
|
+
:param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
869
870
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
870
871
|
*Available only for Vault Enterprise*.
|
871
|
-
:param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
872
|
+
:param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
872
873
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
|
873
|
-
:param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
|
874
|
+
:param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
874
875
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
875
876
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
|
876
|
-
:param pulumi.Input[str] service_account_email: Service Account to impersonate for plugin workload identity federation.
|
877
|
+
:param pulumi.Input[builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
|
877
878
|
Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
878
879
|
"""
|
879
880
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -901,7 +902,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
901
902
|
|
902
903
|
@property
|
903
904
|
@pulumi.getter
|
904
|
-
def accessor(self) -> pulumi.Output[str]:
|
905
|
+
def accessor(self) -> pulumi.Output[builtins.str]:
|
905
906
|
"""
|
906
907
|
The accessor of the created GCP mount.
|
907
908
|
"""
|
@@ -909,7 +910,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
909
910
|
|
910
911
|
@property
|
911
912
|
@pulumi.getter
|
912
|
-
def credentials(self) -> pulumi.Output[Optional[str]]:
|
913
|
+
def credentials(self) -> pulumi.Output[Optional[builtins.str]]:
|
913
914
|
"""
|
914
915
|
JSON-encoded credentials to use to connect to GCP
|
915
916
|
"""
|
@@ -917,7 +918,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
917
918
|
|
918
919
|
@property
|
919
920
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
920
|
-
def default_lease_ttl_seconds(self) -> pulumi.Output[Optional[int]]:
|
921
|
+
def default_lease_ttl_seconds(self) -> pulumi.Output[Optional[builtins.int]]:
|
921
922
|
"""
|
922
923
|
The default TTL for credentials
|
923
924
|
issued by this backend. Defaults to '0'.
|
@@ -926,7 +927,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
926
927
|
|
927
928
|
@property
|
928
929
|
@pulumi.getter
|
929
|
-
def description(self) -> pulumi.Output[Optional[str]]:
|
930
|
+
def description(self) -> pulumi.Output[Optional[builtins.str]]:
|
930
931
|
"""
|
931
932
|
A human-friendly description for this backend.
|
932
933
|
"""
|
@@ -934,7 +935,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
934
935
|
|
935
936
|
@property
|
936
937
|
@pulumi.getter(name="disableAutomatedRotation")
|
937
|
-
def disable_automated_rotation(self) -> pulumi.Output[Optional[bool]]:
|
938
|
+
def disable_automated_rotation(self) -> pulumi.Output[Optional[builtins.bool]]:
|
938
939
|
"""
|
939
940
|
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
940
941
|
*Available only for Vault Enterprise*.
|
@@ -943,7 +944,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
943
944
|
|
944
945
|
@property
|
945
946
|
@pulumi.getter(name="disableRemount")
|
946
|
-
def disable_remount(self) -> pulumi.Output[Optional[bool]]:
|
947
|
+
def disable_remount(self) -> pulumi.Output[Optional[builtins.bool]]:
|
947
948
|
"""
|
948
949
|
If set, opts out of mount migration on path updates.
|
949
950
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -952,7 +953,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
952
953
|
|
953
954
|
@property
|
954
955
|
@pulumi.getter(name="identityTokenAudience")
|
955
|
-
def identity_token_audience(self) -> pulumi.Output[Optional[str]]:
|
956
|
+
def identity_token_audience(self) -> pulumi.Output[Optional[builtins.str]]:
|
956
957
|
"""
|
957
958
|
The audience claim value for plugin identity
|
958
959
|
tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
|
@@ -962,7 +963,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
962
963
|
|
963
964
|
@property
|
964
965
|
@pulumi.getter(name="identityTokenKey")
|
965
|
-
def identity_token_key(self) -> pulumi.Output[Optional[str]]:
|
966
|
+
def identity_token_key(self) -> pulumi.Output[Optional[builtins.str]]:
|
966
967
|
"""
|
967
968
|
The key to use for signing plugin identity
|
968
969
|
tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
@@ -971,7 +972,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
971
972
|
|
972
973
|
@property
|
973
974
|
@pulumi.getter(name="identityTokenTtl")
|
974
|
-
def identity_token_ttl(self) -> pulumi.Output[Optional[int]]:
|
975
|
+
def identity_token_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
|
975
976
|
"""
|
976
977
|
The TTL of generated tokens.
|
977
978
|
"""
|
@@ -979,7 +980,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
979
980
|
|
980
981
|
@property
|
981
982
|
@pulumi.getter
|
982
|
-
def local(self) -> pulumi.Output[Optional[bool]]:
|
983
|
+
def local(self) -> pulumi.Output[Optional[builtins.bool]]:
|
983
984
|
"""
|
984
985
|
Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
985
986
|
"""
|
@@ -987,7 +988,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
987
988
|
|
988
989
|
@property
|
989
990
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
990
|
-
def max_lease_ttl_seconds(self) -> pulumi.Output[Optional[int]]:
|
991
|
+
def max_lease_ttl_seconds(self) -> pulumi.Output[Optional[builtins.int]]:
|
991
992
|
"""
|
992
993
|
The maximum TTL that can be requested
|
993
994
|
for credentials issued by this backend. Defaults to '0'.
|
@@ -996,7 +997,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
996
997
|
|
997
998
|
@property
|
998
999
|
@pulumi.getter
|
999
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
1000
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
1000
1001
|
"""
|
1001
1002
|
The namespace to provision the resource in.
|
1002
1003
|
The value should not contain leading or trailing forward slashes.
|
@@ -1007,7 +1008,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1007
1008
|
|
1008
1009
|
@property
|
1009
1010
|
@pulumi.getter
|
1010
|
-
def path(self) -> pulumi.Output[Optional[str]]:
|
1011
|
+
def path(self) -> pulumi.Output[Optional[builtins.str]]:
|
1011
1012
|
"""
|
1012
1013
|
The unique path this backend should be mounted at. Must
|
1013
1014
|
not begin or end with a `/`. Defaults to `gcp`.
|
@@ -1016,7 +1017,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1016
1017
|
|
1017
1018
|
@property
|
1018
1019
|
@pulumi.getter(name="rotationPeriod")
|
1019
|
-
def rotation_period(self) -> pulumi.Output[Optional[int]]:
|
1020
|
+
def rotation_period(self) -> pulumi.Output[Optional[builtins.int]]:
|
1020
1021
|
"""
|
1021
1022
|
The amount of time in seconds Vault should wait before rotating the root credential.
|
1022
1023
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
@@ -1026,7 +1027,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1026
1027
|
|
1027
1028
|
@property
|
1028
1029
|
@pulumi.getter(name="rotationSchedule")
|
1029
|
-
def rotation_schedule(self) -> pulumi.Output[Optional[str]]:
|
1030
|
+
def rotation_schedule(self) -> pulumi.Output[Optional[builtins.str]]:
|
1030
1031
|
"""
|
1031
1032
|
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
1032
1033
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
|
@@ -1035,7 +1036,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1035
1036
|
|
1036
1037
|
@property
|
1037
1038
|
@pulumi.getter(name="rotationWindow")
|
1038
|
-
def rotation_window(self) -> pulumi.Output[Optional[int]]:
|
1039
|
+
def rotation_window(self) -> pulumi.Output[Optional[builtins.int]]:
|
1039
1040
|
"""
|
1040
1041
|
The maximum amount of time in seconds allowed to complete
|
1041
1042
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
@@ -1045,7 +1046,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1045
1046
|
|
1046
1047
|
@property
|
1047
1048
|
@pulumi.getter(name="serviceAccountEmail")
|
1048
|
-
def service_account_email(self) -> pulumi.Output[Optional[str]]:
|
1049
|
+
def service_account_email(self) -> pulumi.Output[Optional[builtins.str]]:
|
1049
1050
|
"""
|
1050
1051
|
Service Account to impersonate for plugin workload identity federation.
|
1051
1052
|
Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|