pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +19 -1
- pulumi_vault/_inputs.py +873 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +1016 -439
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +1057 -285
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +887 -256
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +426 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +878 -336
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +400 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +1006 -227
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +431 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +732 -693
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +380 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +909 -271
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +234 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +205 -159
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +902 -231
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +217 -124
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +833 -155
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +377 -350
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0.dist-info/RECORD +270 -0
- pulumi_vault-7.1.0.dist-info/RECORD +0 -268
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,101 +19,102 @@ __all__ = ['SecretBackendArgs', 'SecretBackend']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class SecretBackendArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
binddn: pulumi.Input[
|
24
|
-
bindpass: pulumi.Input[
|
25
|
-
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
26
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
27
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
28
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
29
|
-
certificate: Optional[pulumi.Input[
|
30
|
-
client_tls_cert: Optional[pulumi.Input[
|
31
|
-
client_tls_key: Optional[pulumi.Input[
|
32
|
-
connection_timeout: Optional[pulumi.Input[
|
33
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
34
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[
|
35
|
-
description: Optional[pulumi.Input[
|
36
|
-
disable_automated_rotation: Optional[pulumi.Input[
|
37
|
-
disable_remount: Optional[pulumi.Input[
|
38
|
-
external_entropy_access: Optional[pulumi.Input[
|
39
|
-
|
40
|
-
|
41
|
-
|
42
|
-
|
43
|
-
|
44
|
-
|
45
|
-
|
46
|
-
|
47
|
-
|
48
|
-
|
49
|
-
|
50
|
-
|
51
|
-
|
52
|
-
|
53
|
-
|
54
|
-
|
55
|
-
|
56
|
-
|
57
|
-
|
58
|
-
|
59
|
-
|
60
|
-
|
61
|
-
|
22
|
+
binddn: pulumi.Input[_builtins.str],
|
23
|
+
bindpass: pulumi.Input[_builtins.str],
|
24
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
25
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
26
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
27
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
28
|
+
certificate: Optional[pulumi.Input[_builtins.str]] = None,
|
29
|
+
client_tls_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
30
|
+
client_tls_key: Optional[pulumi.Input[_builtins.str]] = None,
|
31
|
+
connection_timeout: Optional[pulumi.Input[_builtins.int]] = None,
|
32
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
33
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
34
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
35
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
36
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
37
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
38
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
39
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
40
|
+
insecure_tls: Optional[pulumi.Input[_builtins.bool]] = None,
|
41
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
42
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
43
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
44
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
45
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
46
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
47
|
+
password_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
48
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
49
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
50
|
+
request_timeout: Optional[pulumi.Input[_builtins.int]] = None,
|
51
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
52
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
53
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
54
|
+
schema: Optional[pulumi.Input[_builtins.str]] = None,
|
55
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
56
|
+
skip_static_role_import_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
57
|
+
starttls: Optional[pulumi.Input[_builtins.bool]] = None,
|
58
|
+
upndomain: Optional[pulumi.Input[_builtins.str]] = None,
|
59
|
+
url: Optional[pulumi.Input[_builtins.str]] = None,
|
60
|
+
userattr: Optional[pulumi.Input[_builtins.str]] = None,
|
61
|
+
userdn: Optional[pulumi.Input[_builtins.str]] = None):
|
62
62
|
"""
|
63
63
|
The set of arguments for constructing a SecretBackend resource.
|
64
|
-
:param pulumi.Input[
|
65
|
-
:param pulumi.Input[
|
66
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
67
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
68
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
69
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
70
|
-
:param pulumi.Input[
|
64
|
+
:param pulumi.Input[_builtins.str] binddn: Distinguished name of object to bind when performing user and group search.
|
65
|
+
:param pulumi.Input[_builtins.str] bindpass: Password to use along with binddn when performing user search.
|
66
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
67
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
68
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
69
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
70
|
+
:param pulumi.Input[_builtins.str] certificate: CA certificate to use when verifying LDAP server certificate, must be
|
71
71
|
x509 PEM encoded.
|
72
|
-
:param pulumi.Input[
|
73
|
-
:param pulumi.Input[
|
74
|
-
:param pulumi.Input[
|
72
|
+
:param pulumi.Input[_builtins.str] client_tls_cert: Client certificate to provide to the LDAP server, must be x509 PEM encoded.
|
73
|
+
:param pulumi.Input[_builtins.str] client_tls_key: Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
|
74
|
+
:param pulumi.Input[_builtins.int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
|
75
75
|
the next URL in the configuration.
|
76
|
-
:param pulumi.Input[
|
77
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
78
|
-
:param pulumi.Input[
|
79
|
-
:param pulumi.Input[
|
80
|
-
:param pulumi.Input[
|
81
|
-
:param pulumi.Input[
|
82
|
-
:param pulumi.Input[
|
83
|
-
:param pulumi.Input[
|
76
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
77
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
78
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
79
|
+
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
80
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
81
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
82
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
83
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
84
|
+
:param pulumi.Input[_builtins.bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
|
84
85
|
Defaults to `false`.
|
85
|
-
:param pulumi.Input[
|
86
|
-
:param pulumi.Input[
|
87
|
-
|
88
|
-
:param pulumi.Input[
|
89
|
-
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
86
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
87
|
+
:param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
88
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
89
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
90
90
|
The value should not contain leading or trailing forward slashes.
|
91
91
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
92
92
|
*Available only for Vault Enterprise*.
|
93
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
94
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
95
|
-
:param pulumi.Input[
|
96
|
-
:param pulumi.Input[
|
93
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
94
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
95
|
+
:param pulumi.Input[_builtins.str] password_policy: Name of the password policy to use to generate passwords.
|
96
|
+
:param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
|
97
97
|
not begin or end with a `/`. Defaults to `ldap`.
|
98
|
-
:param pulumi.Input[
|
99
|
-
:param pulumi.Input[
|
98
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
99
|
+
:param pulumi.Input[_builtins.int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
|
100
100
|
before returning back an error.
|
101
|
-
:param pulumi.Input[
|
101
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
102
102
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
103
|
-
:param pulumi.Input[
|
103
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
104
104
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
105
|
-
:param pulumi.Input[
|
105
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
106
106
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
107
107
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
108
|
-
:param pulumi.Input[
|
109
|
-
:param pulumi.Input[
|
110
|
-
:param pulumi.Input[
|
108
|
+
:param pulumi.Input[_builtins.str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
|
109
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
110
|
+
:param pulumi.Input[_builtins.bool] skip_static_role_import_rotation: If set to true, static roles will not be rotated during import.
|
111
111
|
Defaults to false. Requires Vault 1.16 or above.
|
112
|
-
:param pulumi.Input[
|
113
|
-
:param pulumi.Input[
|
114
|
-
:param pulumi.Input[
|
112
|
+
:param pulumi.Input[_builtins.bool] starttls: Issue a StartTLS command after establishing unencrypted connection.
|
113
|
+
:param pulumi.Input[_builtins.str] upndomain: Enables userPrincipalDomain login with [username]@UPNDomain.
|
114
|
+
:param pulumi.Input[_builtins.str] url: LDAP URL to connect to. Multiple URLs can be specified by concatenating
|
115
115
|
them with commas; they will be tried in-order. Defaults to `ldap://127.0.0.1`.
|
116
|
-
:param pulumi.Input[
|
117
|
-
:param pulumi.Input[
|
116
|
+
:param pulumi.Input[_builtins.str] userattr: Attribute used when searching users. Defaults to `cn`.
|
117
|
+
:param pulumi.Input[_builtins.str] userdn: LDAP domain to use for users (eg: ou=People,dc=example,dc=org)`.
|
118
118
|
"""
|
119
119
|
pulumi.set(__self__, "binddn", binddn)
|
120
120
|
pulumi.set(__self__, "bindpass", bindpass)
|
@@ -146,6 +146,8 @@ class SecretBackendArgs:
|
|
146
146
|
pulumi.set(__self__, "disable_remount", disable_remount)
|
147
147
|
if external_entropy_access is not None:
|
148
148
|
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
149
|
+
if force_no_cache is not None:
|
150
|
+
pulumi.set(__self__, "force_no_cache", force_no_cache)
|
149
151
|
if identity_token_key is not None:
|
150
152
|
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
151
153
|
if insecure_tls is not None:
|
@@ -193,81 +195,81 @@ class SecretBackendArgs:
|
|
193
195
|
if userdn is not None:
|
194
196
|
pulumi.set(__self__, "userdn", userdn)
|
195
197
|
|
196
|
-
@property
|
198
|
+
@_builtins.property
|
197
199
|
@pulumi.getter
|
198
|
-
def binddn(self) -> pulumi.Input[
|
200
|
+
def binddn(self) -> pulumi.Input[_builtins.str]:
|
199
201
|
"""
|
200
202
|
Distinguished name of object to bind when performing user and group search.
|
201
203
|
"""
|
202
204
|
return pulumi.get(self, "binddn")
|
203
205
|
|
204
206
|
@binddn.setter
|
205
|
-
def binddn(self, value: pulumi.Input[
|
207
|
+
def binddn(self, value: pulumi.Input[_builtins.str]):
|
206
208
|
pulumi.set(self, "binddn", value)
|
207
209
|
|
208
|
-
@property
|
210
|
+
@_builtins.property
|
209
211
|
@pulumi.getter
|
210
|
-
def bindpass(self) -> pulumi.Input[
|
212
|
+
def bindpass(self) -> pulumi.Input[_builtins.str]:
|
211
213
|
"""
|
212
214
|
Password to use along with binddn when performing user search.
|
213
215
|
"""
|
214
216
|
return pulumi.get(self, "bindpass")
|
215
217
|
|
216
218
|
@bindpass.setter
|
217
|
-
def bindpass(self, value: pulumi.Input[
|
219
|
+
def bindpass(self, value: pulumi.Input[_builtins.str]):
|
218
220
|
pulumi.set(self, "bindpass", value)
|
219
221
|
|
220
|
-
@property
|
222
|
+
@_builtins.property
|
221
223
|
@pulumi.getter(name="allowedManagedKeys")
|
222
|
-
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
224
|
+
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
223
225
|
"""
|
224
226
|
List of managed key registry entry names that the mount in question is allowed to access
|
225
227
|
"""
|
226
228
|
return pulumi.get(self, "allowed_managed_keys")
|
227
229
|
|
228
230
|
@allowed_managed_keys.setter
|
229
|
-
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
231
|
+
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
230
232
|
pulumi.set(self, "allowed_managed_keys", value)
|
231
233
|
|
232
|
-
@property
|
234
|
+
@_builtins.property
|
233
235
|
@pulumi.getter(name="allowedResponseHeaders")
|
234
|
-
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
236
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
235
237
|
"""
|
236
238
|
List of headers to allow and pass from the request to the plugin
|
237
239
|
"""
|
238
240
|
return pulumi.get(self, "allowed_response_headers")
|
239
241
|
|
240
242
|
@allowed_response_headers.setter
|
241
|
-
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
243
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
242
244
|
pulumi.set(self, "allowed_response_headers", value)
|
243
245
|
|
244
|
-
@property
|
246
|
+
@_builtins.property
|
245
247
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
246
|
-
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
248
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
247
249
|
"""
|
248
250
|
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
249
251
|
"""
|
250
252
|
return pulumi.get(self, "audit_non_hmac_request_keys")
|
251
253
|
|
252
254
|
@audit_non_hmac_request_keys.setter
|
253
|
-
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
255
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
254
256
|
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
255
257
|
|
256
|
-
@property
|
258
|
+
@_builtins.property
|
257
259
|
@pulumi.getter(name="auditNonHmacResponseKeys")
|
258
|
-
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
260
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
259
261
|
"""
|
260
262
|
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
261
263
|
"""
|
262
264
|
return pulumi.get(self, "audit_non_hmac_response_keys")
|
263
265
|
|
264
266
|
@audit_non_hmac_response_keys.setter
|
265
|
-
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
267
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
266
268
|
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
267
269
|
|
268
|
-
@property
|
270
|
+
@_builtins.property
|
269
271
|
@pulumi.getter
|
270
|
-
def certificate(self) -> Optional[pulumi.Input[
|
272
|
+
def certificate(self) -> Optional[pulumi.Input[_builtins.str]]:
|
271
273
|
"""
|
272
274
|
CA certificate to use when verifying LDAP server certificate, must be
|
273
275
|
x509 PEM encoded.
|
@@ -275,36 +277,36 @@ class SecretBackendArgs:
|
|
275
277
|
return pulumi.get(self, "certificate")
|
276
278
|
|
277
279
|
@certificate.setter
|
278
|
-
def certificate(self, value: Optional[pulumi.Input[
|
280
|
+
def certificate(self, value: Optional[pulumi.Input[_builtins.str]]):
|
279
281
|
pulumi.set(self, "certificate", value)
|
280
282
|
|
281
|
-
@property
|
283
|
+
@_builtins.property
|
282
284
|
@pulumi.getter(name="clientTlsCert")
|
283
|
-
def client_tls_cert(self) -> Optional[pulumi.Input[
|
285
|
+
def client_tls_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
|
284
286
|
"""
|
285
287
|
Client certificate to provide to the LDAP server, must be x509 PEM encoded.
|
286
288
|
"""
|
287
289
|
return pulumi.get(self, "client_tls_cert")
|
288
290
|
|
289
291
|
@client_tls_cert.setter
|
290
|
-
def client_tls_cert(self, value: Optional[pulumi.Input[
|
292
|
+
def client_tls_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
|
291
293
|
pulumi.set(self, "client_tls_cert", value)
|
292
294
|
|
293
|
-
@property
|
295
|
+
@_builtins.property
|
294
296
|
@pulumi.getter(name="clientTlsKey")
|
295
|
-
def client_tls_key(self) -> Optional[pulumi.Input[
|
297
|
+
def client_tls_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
296
298
|
"""
|
297
299
|
Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
|
298
300
|
"""
|
299
301
|
return pulumi.get(self, "client_tls_key")
|
300
302
|
|
301
303
|
@client_tls_key.setter
|
302
|
-
def client_tls_key(self, value: Optional[pulumi.Input[
|
304
|
+
def client_tls_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
303
305
|
pulumi.set(self, "client_tls_key", value)
|
304
306
|
|
305
|
-
@property
|
307
|
+
@_builtins.property
|
306
308
|
@pulumi.getter(name="connectionTimeout")
|
307
|
-
def connection_timeout(self) -> Optional[pulumi.Input[
|
309
|
+
def connection_timeout(self) -> Optional[pulumi.Input[_builtins.int]]:
|
308
310
|
"""
|
309
311
|
Timeout, in seconds, when attempting to connect to the LDAP server before trying
|
310
312
|
the next URL in the configuration.
|
@@ -312,96 +314,108 @@ class SecretBackendArgs:
|
|
312
314
|
return pulumi.get(self, "connection_timeout")
|
313
315
|
|
314
316
|
@connection_timeout.setter
|
315
|
-
def connection_timeout(self, value: Optional[pulumi.Input[
|
317
|
+
def connection_timeout(self, value: Optional[pulumi.Input[_builtins.int]]):
|
316
318
|
pulumi.set(self, "connection_timeout", value)
|
317
319
|
|
318
|
-
@property
|
320
|
+
@_builtins.property
|
319
321
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
320
|
-
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
322
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
321
323
|
"""
|
322
|
-
Default lease duration for secrets in seconds
|
324
|
+
Default lease duration for tokens and secrets in seconds
|
323
325
|
"""
|
324
326
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
325
327
|
|
326
328
|
@default_lease_ttl_seconds.setter
|
327
|
-
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
329
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
328
330
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
329
331
|
|
330
|
-
@property
|
332
|
+
@_builtins.property
|
331
333
|
@pulumi.getter(name="delegatedAuthAccessors")
|
332
|
-
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
334
|
+
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
333
335
|
"""
|
334
336
|
List of headers to allow and pass from the request to the plugin
|
335
337
|
"""
|
336
338
|
return pulumi.get(self, "delegated_auth_accessors")
|
337
339
|
|
338
340
|
@delegated_auth_accessors.setter
|
339
|
-
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
341
|
+
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
340
342
|
pulumi.set(self, "delegated_auth_accessors", value)
|
341
343
|
|
342
|
-
@property
|
344
|
+
@_builtins.property
|
343
345
|
@pulumi.getter
|
344
|
-
def description(self) -> Optional[pulumi.Input[
|
346
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
345
347
|
"""
|
346
|
-
Human-friendly description of the mount
|
348
|
+
Human-friendly description of the mount
|
347
349
|
"""
|
348
350
|
return pulumi.get(self, "description")
|
349
351
|
|
350
352
|
@description.setter
|
351
|
-
def description(self, value: Optional[pulumi.Input[
|
353
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
352
354
|
pulumi.set(self, "description", value)
|
353
355
|
|
354
|
-
@property
|
356
|
+
@_builtins.property
|
355
357
|
@pulumi.getter(name="disableAutomatedRotation")
|
356
|
-
def disable_automated_rotation(self) -> Optional[pulumi.Input[
|
358
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
357
359
|
"""
|
358
360
|
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
359
361
|
"""
|
360
362
|
return pulumi.get(self, "disable_automated_rotation")
|
361
363
|
|
362
364
|
@disable_automated_rotation.setter
|
363
|
-
def disable_automated_rotation(self, value: Optional[pulumi.Input[
|
365
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
364
366
|
pulumi.set(self, "disable_automated_rotation", value)
|
365
367
|
|
366
|
-
@property
|
368
|
+
@_builtins.property
|
367
369
|
@pulumi.getter(name="disableRemount")
|
368
|
-
def disable_remount(self) -> Optional[pulumi.Input[
|
370
|
+
def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
369
371
|
"""
|
370
372
|
If set, opts out of mount migration on path updates.
|
371
373
|
"""
|
372
374
|
return pulumi.get(self, "disable_remount")
|
373
375
|
|
374
376
|
@disable_remount.setter
|
375
|
-
def disable_remount(self, value: Optional[pulumi.Input[
|
377
|
+
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
376
378
|
pulumi.set(self, "disable_remount", value)
|
377
379
|
|
378
|
-
@property
|
380
|
+
@_builtins.property
|
379
381
|
@pulumi.getter(name="externalEntropyAccess")
|
380
|
-
def external_entropy_access(self) -> Optional[pulumi.Input[
|
382
|
+
def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
381
383
|
"""
|
382
384
|
Enable the secrets engine to access Vault's external entropy source
|
383
385
|
"""
|
384
386
|
return pulumi.get(self, "external_entropy_access")
|
385
387
|
|
386
388
|
@external_entropy_access.setter
|
387
|
-
def external_entropy_access(self, value: Optional[pulumi.Input[
|
389
|
+
def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
388
390
|
pulumi.set(self, "external_entropy_access", value)
|
389
391
|
|
390
|
-
@property
|
392
|
+
@_builtins.property
|
393
|
+
@pulumi.getter(name="forceNoCache")
|
394
|
+
def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
395
|
+
"""
|
396
|
+
If set to true, disables caching.
|
397
|
+
"""
|
398
|
+
return pulumi.get(self, "force_no_cache")
|
399
|
+
|
400
|
+
@force_no_cache.setter
|
401
|
+
def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
402
|
+
pulumi.set(self, "force_no_cache", value)
|
403
|
+
|
404
|
+
@_builtins.property
|
391
405
|
@pulumi.getter(name="identityTokenKey")
|
392
|
-
def identity_token_key(self) -> Optional[pulumi.Input[
|
406
|
+
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
393
407
|
"""
|
394
408
|
The key to use for signing plugin workload identity tokens
|
395
409
|
"""
|
396
410
|
return pulumi.get(self, "identity_token_key")
|
397
411
|
|
398
412
|
@identity_token_key.setter
|
399
|
-
def identity_token_key(self, value: Optional[pulumi.Input[
|
413
|
+
def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
400
414
|
pulumi.set(self, "identity_token_key", value)
|
401
415
|
|
402
|
-
@property
|
416
|
+
@_builtins.property
|
403
417
|
@pulumi.getter(name="insecureTls")
|
404
|
-
def insecure_tls(self) -> Optional[pulumi.Input[
|
418
|
+
def insecure_tls(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
405
419
|
"""
|
406
420
|
Skip LDAP server SSL Certificate verification. This is not recommended for production.
|
407
421
|
Defaults to `false`.
|
@@ -409,49 +423,48 @@ class SecretBackendArgs:
|
|
409
423
|
return pulumi.get(self, "insecure_tls")
|
410
424
|
|
411
425
|
@insecure_tls.setter
|
412
|
-
def insecure_tls(self, value: Optional[pulumi.Input[
|
426
|
+
def insecure_tls(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
413
427
|
pulumi.set(self, "insecure_tls", value)
|
414
428
|
|
415
|
-
@property
|
429
|
+
@_builtins.property
|
416
430
|
@pulumi.getter(name="listingVisibility")
|
417
|
-
def listing_visibility(self) -> Optional[pulumi.Input[
|
431
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
418
432
|
"""
|
419
433
|
Specifies whether to show this mount in the UI-specific listing endpoint
|
420
434
|
"""
|
421
435
|
return pulumi.get(self, "listing_visibility")
|
422
436
|
|
423
437
|
@listing_visibility.setter
|
424
|
-
def listing_visibility(self, value: Optional[pulumi.Input[
|
438
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
425
439
|
pulumi.set(self, "listing_visibility", value)
|
426
440
|
|
427
|
-
@property
|
441
|
+
@_builtins.property
|
428
442
|
@pulumi.getter
|
429
|
-
def local(self) -> Optional[pulumi.Input[
|
443
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
430
444
|
"""
|
431
|
-
|
432
|
-
replication.Tolerance duration to use when checking the last rotation time.
|
445
|
+
Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
433
446
|
"""
|
434
447
|
return pulumi.get(self, "local")
|
435
448
|
|
436
449
|
@local.setter
|
437
|
-
def local(self, value: Optional[pulumi.Input[
|
450
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
438
451
|
pulumi.set(self, "local", value)
|
439
452
|
|
440
|
-
@property
|
453
|
+
@_builtins.property
|
441
454
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
442
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
455
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
443
456
|
"""
|
444
|
-
Maximum possible lease duration for secrets in seconds
|
457
|
+
Maximum possible lease duration for tokens and secrets in seconds
|
445
458
|
"""
|
446
459
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
447
460
|
|
448
461
|
@max_lease_ttl_seconds.setter
|
449
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
462
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
450
463
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
451
464
|
|
452
|
-
@property
|
465
|
+
@_builtins.property
|
453
466
|
@pulumi.getter
|
454
|
-
def namespace(self) -> Optional[pulumi.Input[
|
467
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
455
468
|
"""
|
456
469
|
The namespace to provision the resource in.
|
457
470
|
The value should not contain leading or trailing forward slashes.
|
@@ -461,48 +474,48 @@ class SecretBackendArgs:
|
|
461
474
|
return pulumi.get(self, "namespace")
|
462
475
|
|
463
476
|
@namespace.setter
|
464
|
-
def namespace(self, value: Optional[pulumi.Input[
|
477
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
465
478
|
pulumi.set(self, "namespace", value)
|
466
479
|
|
467
|
-
@property
|
480
|
+
@_builtins.property
|
468
481
|
@pulumi.getter
|
469
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
482
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
470
483
|
"""
|
471
484
|
Specifies mount type specific options that are passed to the backend
|
472
485
|
"""
|
473
486
|
return pulumi.get(self, "options")
|
474
487
|
|
475
488
|
@options.setter
|
476
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
489
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
477
490
|
pulumi.set(self, "options", value)
|
478
491
|
|
479
|
-
@property
|
492
|
+
@_builtins.property
|
480
493
|
@pulumi.getter(name="passthroughRequestHeaders")
|
481
|
-
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
494
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
482
495
|
"""
|
483
496
|
List of headers to allow and pass from the request to the plugin
|
484
497
|
"""
|
485
498
|
return pulumi.get(self, "passthrough_request_headers")
|
486
499
|
|
487
500
|
@passthrough_request_headers.setter
|
488
|
-
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
501
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
489
502
|
pulumi.set(self, "passthrough_request_headers", value)
|
490
503
|
|
491
|
-
@property
|
504
|
+
@_builtins.property
|
492
505
|
@pulumi.getter(name="passwordPolicy")
|
493
|
-
def password_policy(self) -> Optional[pulumi.Input[
|
506
|
+
def password_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
|
494
507
|
"""
|
495
508
|
Name of the password policy to use to generate passwords.
|
496
509
|
"""
|
497
510
|
return pulumi.get(self, "password_policy")
|
498
511
|
|
499
512
|
@password_policy.setter
|
500
|
-
def password_policy(self, value: Optional[pulumi.Input[
|
513
|
+
def password_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
|
501
514
|
pulumi.set(self, "password_policy", value)
|
502
515
|
|
503
|
-
@property
|
516
|
+
@_builtins.property
|
504
517
|
@pulumi.getter
|
505
|
-
def path(self) -> Optional[pulumi.Input[
|
518
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
506
519
|
"""
|
507
520
|
The unique path this backend should be mounted at. Must
|
508
521
|
not begin or end with a `/`. Defaults to `ldap`.
|
@@ -510,24 +523,24 @@ class SecretBackendArgs:
|
|
510
523
|
return pulumi.get(self, "path")
|
511
524
|
|
512
525
|
@path.setter
|
513
|
-
def path(self, value: Optional[pulumi.Input[
|
526
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
514
527
|
pulumi.set(self, "path", value)
|
515
528
|
|
516
|
-
@property
|
529
|
+
@_builtins.property
|
517
530
|
@pulumi.getter(name="pluginVersion")
|
518
|
-
def plugin_version(self) -> Optional[pulumi.Input[
|
531
|
+
def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
|
519
532
|
"""
|
520
533
|
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
521
534
|
"""
|
522
535
|
return pulumi.get(self, "plugin_version")
|
523
536
|
|
524
537
|
@plugin_version.setter
|
525
|
-
def plugin_version(self, value: Optional[pulumi.Input[
|
538
|
+
def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
|
526
539
|
pulumi.set(self, "plugin_version", value)
|
527
540
|
|
528
|
-
@property
|
541
|
+
@_builtins.property
|
529
542
|
@pulumi.getter(name="requestTimeout")
|
530
|
-
def request_timeout(self) -> Optional[pulumi.Input[
|
543
|
+
def request_timeout(self) -> Optional[pulumi.Input[_builtins.int]]:
|
531
544
|
"""
|
532
545
|
Timeout, in seconds, for the connection when making requests against the server
|
533
546
|
before returning back an error.
|
@@ -535,12 +548,12 @@ class SecretBackendArgs:
|
|
535
548
|
return pulumi.get(self, "request_timeout")
|
536
549
|
|
537
550
|
@request_timeout.setter
|
538
|
-
def request_timeout(self, value: Optional[pulumi.Input[
|
551
|
+
def request_timeout(self, value: Optional[pulumi.Input[_builtins.int]]):
|
539
552
|
pulumi.set(self, "request_timeout", value)
|
540
553
|
|
541
|
-
@property
|
554
|
+
@_builtins.property
|
542
555
|
@pulumi.getter(name="rotationPeriod")
|
543
|
-
def rotation_period(self) -> Optional[pulumi.Input[
|
556
|
+
def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
544
557
|
"""
|
545
558
|
The amount of time in seconds Vault should wait before rotating the root credential.
|
546
559
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
@@ -548,12 +561,12 @@ class SecretBackendArgs:
|
|
548
561
|
return pulumi.get(self, "rotation_period")
|
549
562
|
|
550
563
|
@rotation_period.setter
|
551
|
-
def rotation_period(self, value: Optional[pulumi.Input[
|
564
|
+
def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
552
565
|
pulumi.set(self, "rotation_period", value)
|
553
566
|
|
554
|
-
@property
|
567
|
+
@_builtins.property
|
555
568
|
@pulumi.getter(name="rotationSchedule")
|
556
|
-
def rotation_schedule(self) -> Optional[pulumi.Input[
|
569
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
|
557
570
|
"""
|
558
571
|
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
559
572
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
@@ -561,12 +574,12 @@ class SecretBackendArgs:
|
|
561
574
|
return pulumi.get(self, "rotation_schedule")
|
562
575
|
|
563
576
|
@rotation_schedule.setter
|
564
|
-
def rotation_schedule(self, value: Optional[pulumi.Input[
|
577
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
|
565
578
|
pulumi.set(self, "rotation_schedule", value)
|
566
579
|
|
567
|
-
@property
|
580
|
+
@_builtins.property
|
568
581
|
@pulumi.getter(name="rotationWindow")
|
569
|
-
def rotation_window(self) -> Optional[pulumi.Input[
|
582
|
+
def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
|
570
583
|
"""
|
571
584
|
The maximum amount of time in seconds allowed to complete
|
572
585
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
@@ -575,36 +588,36 @@ class SecretBackendArgs:
|
|
575
588
|
return pulumi.get(self, "rotation_window")
|
576
589
|
|
577
590
|
@rotation_window.setter
|
578
|
-
def rotation_window(self, value: Optional[pulumi.Input[
|
591
|
+
def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
|
579
592
|
pulumi.set(self, "rotation_window", value)
|
580
593
|
|
581
|
-
@property
|
594
|
+
@_builtins.property
|
582
595
|
@pulumi.getter
|
583
|
-
def schema(self) -> Optional[pulumi.Input[
|
596
|
+
def schema(self) -> Optional[pulumi.Input[_builtins.str]]:
|
584
597
|
"""
|
585
598
|
The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
|
586
599
|
"""
|
587
600
|
return pulumi.get(self, "schema")
|
588
601
|
|
589
602
|
@schema.setter
|
590
|
-
def schema(self, value: Optional[pulumi.Input[
|
603
|
+
def schema(self, value: Optional[pulumi.Input[_builtins.str]]):
|
591
604
|
pulumi.set(self, "schema", value)
|
592
605
|
|
593
|
-
@property
|
606
|
+
@_builtins.property
|
594
607
|
@pulumi.getter(name="sealWrap")
|
595
|
-
def seal_wrap(self) -> Optional[pulumi.Input[
|
608
|
+
def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
596
609
|
"""
|
597
610
|
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
598
611
|
"""
|
599
612
|
return pulumi.get(self, "seal_wrap")
|
600
613
|
|
601
614
|
@seal_wrap.setter
|
602
|
-
def seal_wrap(self, value: Optional[pulumi.Input[
|
615
|
+
def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
603
616
|
pulumi.set(self, "seal_wrap", value)
|
604
617
|
|
605
|
-
@property
|
618
|
+
@_builtins.property
|
606
619
|
@pulumi.getter(name="skipStaticRoleImportRotation")
|
607
|
-
def skip_static_role_import_rotation(self) -> Optional[pulumi.Input[
|
620
|
+
def skip_static_role_import_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
608
621
|
"""
|
609
622
|
If set to true, static roles will not be rotated during import.
|
610
623
|
Defaults to false. Requires Vault 1.16 or above.
|
@@ -612,36 +625,36 @@ class SecretBackendArgs:
|
|
612
625
|
return pulumi.get(self, "skip_static_role_import_rotation")
|
613
626
|
|
614
627
|
@skip_static_role_import_rotation.setter
|
615
|
-
def skip_static_role_import_rotation(self, value: Optional[pulumi.Input[
|
628
|
+
def skip_static_role_import_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
616
629
|
pulumi.set(self, "skip_static_role_import_rotation", value)
|
617
630
|
|
618
|
-
@property
|
631
|
+
@_builtins.property
|
619
632
|
@pulumi.getter
|
620
|
-
def starttls(self) -> Optional[pulumi.Input[
|
633
|
+
def starttls(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
621
634
|
"""
|
622
635
|
Issue a StartTLS command after establishing unencrypted connection.
|
623
636
|
"""
|
624
637
|
return pulumi.get(self, "starttls")
|
625
638
|
|
626
639
|
@starttls.setter
|
627
|
-
def starttls(self, value: Optional[pulumi.Input[
|
640
|
+
def starttls(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
628
641
|
pulumi.set(self, "starttls", value)
|
629
642
|
|
630
|
-
@property
|
643
|
+
@_builtins.property
|
631
644
|
@pulumi.getter
|
632
|
-
def upndomain(self) -> Optional[pulumi.Input[
|
645
|
+
def upndomain(self) -> Optional[pulumi.Input[_builtins.str]]:
|
633
646
|
"""
|
634
647
|
Enables userPrincipalDomain login with [username]@UPNDomain.
|
635
648
|
"""
|
636
649
|
return pulumi.get(self, "upndomain")
|
637
650
|
|
638
651
|
@upndomain.setter
|
639
|
-
def upndomain(self, value: Optional[pulumi.Input[
|
652
|
+
def upndomain(self, value: Optional[pulumi.Input[_builtins.str]]):
|
640
653
|
pulumi.set(self, "upndomain", value)
|
641
654
|
|
642
|
-
@property
|
655
|
+
@_builtins.property
|
643
656
|
@pulumi.getter
|
644
|
-
def url(self) -> Optional[pulumi.Input[
|
657
|
+
def url(self) -> Optional[pulumi.Input[_builtins.str]]:
|
645
658
|
"""
|
646
659
|
LDAP URL to connect to. Multiple URLs can be specified by concatenating
|
647
660
|
them with commas; they will be tried in-order. Defaults to `ldap://127.0.0.1`.
|
@@ -649,134 +662,135 @@ class SecretBackendArgs:
|
|
649
662
|
return pulumi.get(self, "url")
|
650
663
|
|
651
664
|
@url.setter
|
652
|
-
def url(self, value: Optional[pulumi.Input[
|
665
|
+
def url(self, value: Optional[pulumi.Input[_builtins.str]]):
|
653
666
|
pulumi.set(self, "url", value)
|
654
667
|
|
655
|
-
@property
|
668
|
+
@_builtins.property
|
656
669
|
@pulumi.getter
|
657
|
-
def userattr(self) -> Optional[pulumi.Input[
|
670
|
+
def userattr(self) -> Optional[pulumi.Input[_builtins.str]]:
|
658
671
|
"""
|
659
672
|
Attribute used when searching users. Defaults to `cn`.
|
660
673
|
"""
|
661
674
|
return pulumi.get(self, "userattr")
|
662
675
|
|
663
676
|
@userattr.setter
|
664
|
-
def userattr(self, value: Optional[pulumi.Input[
|
677
|
+
def userattr(self, value: Optional[pulumi.Input[_builtins.str]]):
|
665
678
|
pulumi.set(self, "userattr", value)
|
666
679
|
|
667
|
-
@property
|
680
|
+
@_builtins.property
|
668
681
|
@pulumi.getter
|
669
|
-
def userdn(self) -> Optional[pulumi.Input[
|
682
|
+
def userdn(self) -> Optional[pulumi.Input[_builtins.str]]:
|
670
683
|
"""
|
671
684
|
LDAP domain to use for users (eg: ou=People,dc=example,dc=org)`.
|
672
685
|
"""
|
673
686
|
return pulumi.get(self, "userdn")
|
674
687
|
|
675
688
|
@userdn.setter
|
676
|
-
def userdn(self, value: Optional[pulumi.Input[
|
689
|
+
def userdn(self, value: Optional[pulumi.Input[_builtins.str]]):
|
677
690
|
pulumi.set(self, "userdn", value)
|
678
691
|
|
679
692
|
|
680
693
|
@pulumi.input_type
|
681
694
|
class _SecretBackendState:
|
682
695
|
def __init__(__self__, *,
|
683
|
-
accessor: Optional[pulumi.Input[
|
684
|
-
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
685
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
686
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
687
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
688
|
-
binddn: Optional[pulumi.Input[
|
689
|
-
bindpass: Optional[pulumi.Input[
|
690
|
-
certificate: Optional[pulumi.Input[
|
691
|
-
client_tls_cert: Optional[pulumi.Input[
|
692
|
-
client_tls_key: Optional[pulumi.Input[
|
693
|
-
connection_timeout: Optional[pulumi.Input[
|
694
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
695
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[
|
696
|
-
description: Optional[pulumi.Input[
|
697
|
-
disable_automated_rotation: Optional[pulumi.Input[
|
698
|
-
disable_remount: Optional[pulumi.Input[
|
699
|
-
external_entropy_access: Optional[pulumi.Input[
|
700
|
-
|
701
|
-
|
702
|
-
|
703
|
-
|
704
|
-
|
705
|
-
|
706
|
-
|
707
|
-
|
708
|
-
|
709
|
-
|
710
|
-
|
711
|
-
|
712
|
-
|
713
|
-
|
714
|
-
|
715
|
-
|
716
|
-
|
717
|
-
|
718
|
-
|
719
|
-
|
720
|
-
|
721
|
-
|
722
|
-
|
696
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
697
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
698
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
699
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
700
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
701
|
+
binddn: Optional[pulumi.Input[_builtins.str]] = None,
|
702
|
+
bindpass: Optional[pulumi.Input[_builtins.str]] = None,
|
703
|
+
certificate: Optional[pulumi.Input[_builtins.str]] = None,
|
704
|
+
client_tls_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
705
|
+
client_tls_key: Optional[pulumi.Input[_builtins.str]] = None,
|
706
|
+
connection_timeout: Optional[pulumi.Input[_builtins.int]] = None,
|
707
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
708
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
709
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
710
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
711
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
712
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
713
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
714
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
715
|
+
insecure_tls: Optional[pulumi.Input[_builtins.bool]] = None,
|
716
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
717
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
718
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
719
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
720
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
721
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
722
|
+
password_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
723
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
724
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
725
|
+
request_timeout: Optional[pulumi.Input[_builtins.int]] = None,
|
726
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
727
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
728
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
729
|
+
schema: Optional[pulumi.Input[_builtins.str]] = None,
|
730
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
731
|
+
skip_static_role_import_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
732
|
+
starttls: Optional[pulumi.Input[_builtins.bool]] = None,
|
733
|
+
upndomain: Optional[pulumi.Input[_builtins.str]] = None,
|
734
|
+
url: Optional[pulumi.Input[_builtins.str]] = None,
|
735
|
+
userattr: Optional[pulumi.Input[_builtins.str]] = None,
|
736
|
+
userdn: Optional[pulumi.Input[_builtins.str]] = None):
|
723
737
|
"""
|
724
738
|
Input properties used for looking up and filtering SecretBackend resources.
|
725
|
-
:param pulumi.Input[
|
726
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
727
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
728
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
729
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
730
|
-
:param pulumi.Input[
|
731
|
-
:param pulumi.Input[
|
732
|
-
:param pulumi.Input[
|
739
|
+
:param pulumi.Input[_builtins.str] accessor: Accessor of the mount
|
740
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
741
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
742
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
743
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
744
|
+
:param pulumi.Input[_builtins.str] binddn: Distinguished name of object to bind when performing user and group search.
|
745
|
+
:param pulumi.Input[_builtins.str] bindpass: Password to use along with binddn when performing user search.
|
746
|
+
:param pulumi.Input[_builtins.str] certificate: CA certificate to use when verifying LDAP server certificate, must be
|
733
747
|
x509 PEM encoded.
|
734
|
-
:param pulumi.Input[
|
735
|
-
:param pulumi.Input[
|
736
|
-
:param pulumi.Input[
|
748
|
+
:param pulumi.Input[_builtins.str] client_tls_cert: Client certificate to provide to the LDAP server, must be x509 PEM encoded.
|
749
|
+
:param pulumi.Input[_builtins.str] client_tls_key: Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
|
750
|
+
:param pulumi.Input[_builtins.int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
|
737
751
|
the next URL in the configuration.
|
738
|
-
:param pulumi.Input[
|
739
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
740
|
-
:param pulumi.Input[
|
741
|
-
:param pulumi.Input[
|
742
|
-
:param pulumi.Input[
|
743
|
-
:param pulumi.Input[
|
744
|
-
:param pulumi.Input[
|
745
|
-
:param pulumi.Input[
|
752
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
753
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
754
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
755
|
+
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
756
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
757
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
758
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
759
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
760
|
+
:param pulumi.Input[_builtins.bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
|
746
761
|
Defaults to `false`.
|
747
|
-
:param pulumi.Input[
|
748
|
-
:param pulumi.Input[
|
749
|
-
|
750
|
-
:param pulumi.Input[
|
751
|
-
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
762
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
763
|
+
:param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
764
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
765
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
752
766
|
The value should not contain leading or trailing forward slashes.
|
753
767
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
754
768
|
*Available only for Vault Enterprise*.
|
755
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
756
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
757
|
-
:param pulumi.Input[
|
758
|
-
:param pulumi.Input[
|
769
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
770
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
771
|
+
:param pulumi.Input[_builtins.str] password_policy: Name of the password policy to use to generate passwords.
|
772
|
+
:param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
|
759
773
|
not begin or end with a `/`. Defaults to `ldap`.
|
760
|
-
:param pulumi.Input[
|
761
|
-
:param pulumi.Input[
|
774
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
775
|
+
:param pulumi.Input[_builtins.int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
|
762
776
|
before returning back an error.
|
763
|
-
:param pulumi.Input[
|
777
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
764
778
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
765
|
-
:param pulumi.Input[
|
779
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
766
780
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
767
|
-
:param pulumi.Input[
|
781
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
768
782
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
769
783
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
770
|
-
:param pulumi.Input[
|
771
|
-
:param pulumi.Input[
|
772
|
-
:param pulumi.Input[
|
784
|
+
:param pulumi.Input[_builtins.str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
|
785
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
786
|
+
:param pulumi.Input[_builtins.bool] skip_static_role_import_rotation: If set to true, static roles will not be rotated during import.
|
773
787
|
Defaults to false. Requires Vault 1.16 or above.
|
774
|
-
:param pulumi.Input[
|
775
|
-
:param pulumi.Input[
|
776
|
-
:param pulumi.Input[
|
788
|
+
:param pulumi.Input[_builtins.bool] starttls: Issue a StartTLS command after establishing unencrypted connection.
|
789
|
+
:param pulumi.Input[_builtins.str] upndomain: Enables userPrincipalDomain login with [username]@UPNDomain.
|
790
|
+
:param pulumi.Input[_builtins.str] url: LDAP URL to connect to. Multiple URLs can be specified by concatenating
|
777
791
|
them with commas; they will be tried in-order. Defaults to `ldap://127.0.0.1`.
|
778
|
-
:param pulumi.Input[
|
779
|
-
:param pulumi.Input[
|
792
|
+
:param pulumi.Input[_builtins.str] userattr: Attribute used when searching users. Defaults to `cn`.
|
793
|
+
:param pulumi.Input[_builtins.str] userdn: LDAP domain to use for users (eg: ou=People,dc=example,dc=org)`.
|
780
794
|
"""
|
781
795
|
if accessor is not None:
|
782
796
|
pulumi.set(__self__, "accessor", accessor)
|
@@ -812,6 +826,8 @@ class _SecretBackendState:
|
|
812
826
|
pulumi.set(__self__, "disable_remount", disable_remount)
|
813
827
|
if external_entropy_access is not None:
|
814
828
|
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
829
|
+
if force_no_cache is not None:
|
830
|
+
pulumi.set(__self__, "force_no_cache", force_no_cache)
|
815
831
|
if identity_token_key is not None:
|
816
832
|
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
817
833
|
if insecure_tls is not None:
|
@@ -859,93 +875,93 @@ class _SecretBackendState:
|
|
859
875
|
if userdn is not None:
|
860
876
|
pulumi.set(__self__, "userdn", userdn)
|
861
877
|
|
862
|
-
@property
|
878
|
+
@_builtins.property
|
863
879
|
@pulumi.getter
|
864
|
-
def accessor(self) -> Optional[pulumi.Input[
|
880
|
+
def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
|
865
881
|
"""
|
866
882
|
Accessor of the mount
|
867
883
|
"""
|
868
884
|
return pulumi.get(self, "accessor")
|
869
885
|
|
870
886
|
@accessor.setter
|
871
|
-
def accessor(self, value: Optional[pulumi.Input[
|
887
|
+
def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
|
872
888
|
pulumi.set(self, "accessor", value)
|
873
889
|
|
874
|
-
@property
|
890
|
+
@_builtins.property
|
875
891
|
@pulumi.getter(name="allowedManagedKeys")
|
876
|
-
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
892
|
+
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
877
893
|
"""
|
878
894
|
List of managed key registry entry names that the mount in question is allowed to access
|
879
895
|
"""
|
880
896
|
return pulumi.get(self, "allowed_managed_keys")
|
881
897
|
|
882
898
|
@allowed_managed_keys.setter
|
883
|
-
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
899
|
+
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
884
900
|
pulumi.set(self, "allowed_managed_keys", value)
|
885
901
|
|
886
|
-
@property
|
902
|
+
@_builtins.property
|
887
903
|
@pulumi.getter(name="allowedResponseHeaders")
|
888
|
-
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
904
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
889
905
|
"""
|
890
906
|
List of headers to allow and pass from the request to the plugin
|
891
907
|
"""
|
892
908
|
return pulumi.get(self, "allowed_response_headers")
|
893
909
|
|
894
910
|
@allowed_response_headers.setter
|
895
|
-
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
911
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
896
912
|
pulumi.set(self, "allowed_response_headers", value)
|
897
913
|
|
898
|
-
@property
|
914
|
+
@_builtins.property
|
899
915
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
900
|
-
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
916
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
901
917
|
"""
|
902
918
|
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
903
919
|
"""
|
904
920
|
return pulumi.get(self, "audit_non_hmac_request_keys")
|
905
921
|
|
906
922
|
@audit_non_hmac_request_keys.setter
|
907
|
-
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
923
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
908
924
|
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
909
925
|
|
910
|
-
@property
|
926
|
+
@_builtins.property
|
911
927
|
@pulumi.getter(name="auditNonHmacResponseKeys")
|
912
|
-
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
928
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
913
929
|
"""
|
914
930
|
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
915
931
|
"""
|
916
932
|
return pulumi.get(self, "audit_non_hmac_response_keys")
|
917
933
|
|
918
934
|
@audit_non_hmac_response_keys.setter
|
919
|
-
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
935
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
920
936
|
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
921
937
|
|
922
|
-
@property
|
938
|
+
@_builtins.property
|
923
939
|
@pulumi.getter
|
924
|
-
def binddn(self) -> Optional[pulumi.Input[
|
940
|
+
def binddn(self) -> Optional[pulumi.Input[_builtins.str]]:
|
925
941
|
"""
|
926
942
|
Distinguished name of object to bind when performing user and group search.
|
927
943
|
"""
|
928
944
|
return pulumi.get(self, "binddn")
|
929
945
|
|
930
946
|
@binddn.setter
|
931
|
-
def binddn(self, value: Optional[pulumi.Input[
|
947
|
+
def binddn(self, value: Optional[pulumi.Input[_builtins.str]]):
|
932
948
|
pulumi.set(self, "binddn", value)
|
933
949
|
|
934
|
-
@property
|
950
|
+
@_builtins.property
|
935
951
|
@pulumi.getter
|
936
|
-
def bindpass(self) -> Optional[pulumi.Input[
|
952
|
+
def bindpass(self) -> Optional[pulumi.Input[_builtins.str]]:
|
937
953
|
"""
|
938
954
|
Password to use along with binddn when performing user search.
|
939
955
|
"""
|
940
956
|
return pulumi.get(self, "bindpass")
|
941
957
|
|
942
958
|
@bindpass.setter
|
943
|
-
def bindpass(self, value: Optional[pulumi.Input[
|
959
|
+
def bindpass(self, value: Optional[pulumi.Input[_builtins.str]]):
|
944
960
|
pulumi.set(self, "bindpass", value)
|
945
961
|
|
946
|
-
@property
|
962
|
+
@_builtins.property
|
947
963
|
@pulumi.getter
|
948
|
-
def certificate(self) -> Optional[pulumi.Input[
|
964
|
+
def certificate(self) -> Optional[pulumi.Input[_builtins.str]]:
|
949
965
|
"""
|
950
966
|
CA certificate to use when verifying LDAP server certificate, must be
|
951
967
|
x509 PEM encoded.
|
@@ -953,36 +969,36 @@ class _SecretBackendState:
|
|
953
969
|
return pulumi.get(self, "certificate")
|
954
970
|
|
955
971
|
@certificate.setter
|
956
|
-
def certificate(self, value: Optional[pulumi.Input[
|
972
|
+
def certificate(self, value: Optional[pulumi.Input[_builtins.str]]):
|
957
973
|
pulumi.set(self, "certificate", value)
|
958
974
|
|
959
|
-
@property
|
975
|
+
@_builtins.property
|
960
976
|
@pulumi.getter(name="clientTlsCert")
|
961
|
-
def client_tls_cert(self) -> Optional[pulumi.Input[
|
977
|
+
def client_tls_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
|
962
978
|
"""
|
963
979
|
Client certificate to provide to the LDAP server, must be x509 PEM encoded.
|
964
980
|
"""
|
965
981
|
return pulumi.get(self, "client_tls_cert")
|
966
982
|
|
967
983
|
@client_tls_cert.setter
|
968
|
-
def client_tls_cert(self, value: Optional[pulumi.Input[
|
984
|
+
def client_tls_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
|
969
985
|
pulumi.set(self, "client_tls_cert", value)
|
970
986
|
|
971
|
-
@property
|
987
|
+
@_builtins.property
|
972
988
|
@pulumi.getter(name="clientTlsKey")
|
973
|
-
def client_tls_key(self) -> Optional[pulumi.Input[
|
989
|
+
def client_tls_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
974
990
|
"""
|
975
991
|
Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
|
976
992
|
"""
|
977
993
|
return pulumi.get(self, "client_tls_key")
|
978
994
|
|
979
995
|
@client_tls_key.setter
|
980
|
-
def client_tls_key(self, value: Optional[pulumi.Input[
|
996
|
+
def client_tls_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
981
997
|
pulumi.set(self, "client_tls_key", value)
|
982
998
|
|
983
|
-
@property
|
999
|
+
@_builtins.property
|
984
1000
|
@pulumi.getter(name="connectionTimeout")
|
985
|
-
def connection_timeout(self) -> Optional[pulumi.Input[
|
1001
|
+
def connection_timeout(self) -> Optional[pulumi.Input[_builtins.int]]:
|
986
1002
|
"""
|
987
1003
|
Timeout, in seconds, when attempting to connect to the LDAP server before trying
|
988
1004
|
the next URL in the configuration.
|
@@ -990,96 +1006,108 @@ class _SecretBackendState:
|
|
990
1006
|
return pulumi.get(self, "connection_timeout")
|
991
1007
|
|
992
1008
|
@connection_timeout.setter
|
993
|
-
def connection_timeout(self, value: Optional[pulumi.Input[
|
1009
|
+
def connection_timeout(self, value: Optional[pulumi.Input[_builtins.int]]):
|
994
1010
|
pulumi.set(self, "connection_timeout", value)
|
995
1011
|
|
996
|
-
@property
|
1012
|
+
@_builtins.property
|
997
1013
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
998
|
-
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
1014
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
999
1015
|
"""
|
1000
|
-
Default lease duration for secrets in seconds
|
1016
|
+
Default lease duration for tokens and secrets in seconds
|
1001
1017
|
"""
|
1002
1018
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
1003
1019
|
|
1004
1020
|
@default_lease_ttl_seconds.setter
|
1005
|
-
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
1021
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
1006
1022
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
1007
1023
|
|
1008
|
-
@property
|
1024
|
+
@_builtins.property
|
1009
1025
|
@pulumi.getter(name="delegatedAuthAccessors")
|
1010
|
-
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
1026
|
+
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
1011
1027
|
"""
|
1012
1028
|
List of headers to allow and pass from the request to the plugin
|
1013
1029
|
"""
|
1014
1030
|
return pulumi.get(self, "delegated_auth_accessors")
|
1015
1031
|
|
1016
1032
|
@delegated_auth_accessors.setter
|
1017
|
-
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1033
|
+
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
1018
1034
|
pulumi.set(self, "delegated_auth_accessors", value)
|
1019
1035
|
|
1020
|
-
@property
|
1036
|
+
@_builtins.property
|
1021
1037
|
@pulumi.getter
|
1022
|
-
def description(self) -> Optional[pulumi.Input[
|
1038
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1023
1039
|
"""
|
1024
|
-
Human-friendly description of the mount
|
1040
|
+
Human-friendly description of the mount
|
1025
1041
|
"""
|
1026
1042
|
return pulumi.get(self, "description")
|
1027
1043
|
|
1028
1044
|
@description.setter
|
1029
|
-
def description(self, value: Optional[pulumi.Input[
|
1045
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1030
1046
|
pulumi.set(self, "description", value)
|
1031
1047
|
|
1032
|
-
@property
|
1048
|
+
@_builtins.property
|
1033
1049
|
@pulumi.getter(name="disableAutomatedRotation")
|
1034
|
-
def disable_automated_rotation(self) -> Optional[pulumi.Input[
|
1050
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1035
1051
|
"""
|
1036
1052
|
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
1037
1053
|
"""
|
1038
1054
|
return pulumi.get(self, "disable_automated_rotation")
|
1039
1055
|
|
1040
1056
|
@disable_automated_rotation.setter
|
1041
|
-
def disable_automated_rotation(self, value: Optional[pulumi.Input[
|
1057
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1042
1058
|
pulumi.set(self, "disable_automated_rotation", value)
|
1043
1059
|
|
1044
|
-
@property
|
1060
|
+
@_builtins.property
|
1045
1061
|
@pulumi.getter(name="disableRemount")
|
1046
|
-
def disable_remount(self) -> Optional[pulumi.Input[
|
1062
|
+
def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1047
1063
|
"""
|
1048
1064
|
If set, opts out of mount migration on path updates.
|
1049
1065
|
"""
|
1050
1066
|
return pulumi.get(self, "disable_remount")
|
1051
1067
|
|
1052
1068
|
@disable_remount.setter
|
1053
|
-
def disable_remount(self, value: Optional[pulumi.Input[
|
1069
|
+
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1054
1070
|
pulumi.set(self, "disable_remount", value)
|
1055
1071
|
|
1056
|
-
@property
|
1072
|
+
@_builtins.property
|
1057
1073
|
@pulumi.getter(name="externalEntropyAccess")
|
1058
|
-
def external_entropy_access(self) -> Optional[pulumi.Input[
|
1074
|
+
def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1059
1075
|
"""
|
1060
1076
|
Enable the secrets engine to access Vault's external entropy source
|
1061
1077
|
"""
|
1062
1078
|
return pulumi.get(self, "external_entropy_access")
|
1063
1079
|
|
1064
1080
|
@external_entropy_access.setter
|
1065
|
-
def external_entropy_access(self, value: Optional[pulumi.Input[
|
1081
|
+
def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1066
1082
|
pulumi.set(self, "external_entropy_access", value)
|
1067
1083
|
|
1068
|
-
@property
|
1084
|
+
@_builtins.property
|
1085
|
+
@pulumi.getter(name="forceNoCache")
|
1086
|
+
def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1087
|
+
"""
|
1088
|
+
If set to true, disables caching.
|
1089
|
+
"""
|
1090
|
+
return pulumi.get(self, "force_no_cache")
|
1091
|
+
|
1092
|
+
@force_no_cache.setter
|
1093
|
+
def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1094
|
+
pulumi.set(self, "force_no_cache", value)
|
1095
|
+
|
1096
|
+
@_builtins.property
|
1069
1097
|
@pulumi.getter(name="identityTokenKey")
|
1070
|
-
def identity_token_key(self) -> Optional[pulumi.Input[
|
1098
|
+
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1071
1099
|
"""
|
1072
1100
|
The key to use for signing plugin workload identity tokens
|
1073
1101
|
"""
|
1074
1102
|
return pulumi.get(self, "identity_token_key")
|
1075
1103
|
|
1076
1104
|
@identity_token_key.setter
|
1077
|
-
def identity_token_key(self, value: Optional[pulumi.Input[
|
1105
|
+
def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1078
1106
|
pulumi.set(self, "identity_token_key", value)
|
1079
1107
|
|
1080
|
-
@property
|
1108
|
+
@_builtins.property
|
1081
1109
|
@pulumi.getter(name="insecureTls")
|
1082
|
-
def insecure_tls(self) -> Optional[pulumi.Input[
|
1110
|
+
def insecure_tls(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1083
1111
|
"""
|
1084
1112
|
Skip LDAP server SSL Certificate verification. This is not recommended for production.
|
1085
1113
|
Defaults to `false`.
|
@@ -1087,49 +1115,48 @@ class _SecretBackendState:
|
|
1087
1115
|
return pulumi.get(self, "insecure_tls")
|
1088
1116
|
|
1089
1117
|
@insecure_tls.setter
|
1090
|
-
def insecure_tls(self, value: Optional[pulumi.Input[
|
1118
|
+
def insecure_tls(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1091
1119
|
pulumi.set(self, "insecure_tls", value)
|
1092
1120
|
|
1093
|
-
@property
|
1121
|
+
@_builtins.property
|
1094
1122
|
@pulumi.getter(name="listingVisibility")
|
1095
|
-
def listing_visibility(self) -> Optional[pulumi.Input[
|
1123
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1096
1124
|
"""
|
1097
1125
|
Specifies whether to show this mount in the UI-specific listing endpoint
|
1098
1126
|
"""
|
1099
1127
|
return pulumi.get(self, "listing_visibility")
|
1100
1128
|
|
1101
1129
|
@listing_visibility.setter
|
1102
|
-
def listing_visibility(self, value: Optional[pulumi.Input[
|
1130
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1103
1131
|
pulumi.set(self, "listing_visibility", value)
|
1104
1132
|
|
1105
|
-
@property
|
1133
|
+
@_builtins.property
|
1106
1134
|
@pulumi.getter
|
1107
|
-
def local(self) -> Optional[pulumi.Input[
|
1135
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1108
1136
|
"""
|
1109
|
-
|
1110
|
-
replication.Tolerance duration to use when checking the last rotation time.
|
1137
|
+
Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
1111
1138
|
"""
|
1112
1139
|
return pulumi.get(self, "local")
|
1113
1140
|
|
1114
1141
|
@local.setter
|
1115
|
-
def local(self, value: Optional[pulumi.Input[
|
1142
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1116
1143
|
pulumi.set(self, "local", value)
|
1117
1144
|
|
1118
|
-
@property
|
1145
|
+
@_builtins.property
|
1119
1146
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
1120
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
1147
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
1121
1148
|
"""
|
1122
|
-
Maximum possible lease duration for secrets in seconds
|
1149
|
+
Maximum possible lease duration for tokens and secrets in seconds
|
1123
1150
|
"""
|
1124
1151
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
1125
1152
|
|
1126
1153
|
@max_lease_ttl_seconds.setter
|
1127
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
1154
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
1128
1155
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
1129
1156
|
|
1130
|
-
@property
|
1157
|
+
@_builtins.property
|
1131
1158
|
@pulumi.getter
|
1132
|
-
def namespace(self) -> Optional[pulumi.Input[
|
1159
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1133
1160
|
"""
|
1134
1161
|
The namespace to provision the resource in.
|
1135
1162
|
The value should not contain leading or trailing forward slashes.
|
@@ -1139,48 +1166,48 @@ class _SecretBackendState:
|
|
1139
1166
|
return pulumi.get(self, "namespace")
|
1140
1167
|
|
1141
1168
|
@namespace.setter
|
1142
|
-
def namespace(self, value: Optional[pulumi.Input[
|
1169
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1143
1170
|
pulumi.set(self, "namespace", value)
|
1144
1171
|
|
1145
|
-
@property
|
1172
|
+
@_builtins.property
|
1146
1173
|
@pulumi.getter
|
1147
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
1174
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
1148
1175
|
"""
|
1149
1176
|
Specifies mount type specific options that are passed to the backend
|
1150
1177
|
"""
|
1151
1178
|
return pulumi.get(self, "options")
|
1152
1179
|
|
1153
1180
|
@options.setter
|
1154
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
1181
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
1155
1182
|
pulumi.set(self, "options", value)
|
1156
1183
|
|
1157
|
-
@property
|
1184
|
+
@_builtins.property
|
1158
1185
|
@pulumi.getter(name="passthroughRequestHeaders")
|
1159
|
-
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
1186
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
1160
1187
|
"""
|
1161
1188
|
List of headers to allow and pass from the request to the plugin
|
1162
1189
|
"""
|
1163
1190
|
return pulumi.get(self, "passthrough_request_headers")
|
1164
1191
|
|
1165
1192
|
@passthrough_request_headers.setter
|
1166
|
-
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1193
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
1167
1194
|
pulumi.set(self, "passthrough_request_headers", value)
|
1168
1195
|
|
1169
|
-
@property
|
1196
|
+
@_builtins.property
|
1170
1197
|
@pulumi.getter(name="passwordPolicy")
|
1171
|
-
def password_policy(self) -> Optional[pulumi.Input[
|
1198
|
+
def password_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1172
1199
|
"""
|
1173
1200
|
Name of the password policy to use to generate passwords.
|
1174
1201
|
"""
|
1175
1202
|
return pulumi.get(self, "password_policy")
|
1176
1203
|
|
1177
1204
|
@password_policy.setter
|
1178
|
-
def password_policy(self, value: Optional[pulumi.Input[
|
1205
|
+
def password_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1179
1206
|
pulumi.set(self, "password_policy", value)
|
1180
1207
|
|
1181
|
-
@property
|
1208
|
+
@_builtins.property
|
1182
1209
|
@pulumi.getter
|
1183
|
-
def path(self) -> Optional[pulumi.Input[
|
1210
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1184
1211
|
"""
|
1185
1212
|
The unique path this backend should be mounted at. Must
|
1186
1213
|
not begin or end with a `/`. Defaults to `ldap`.
|
@@ -1188,24 +1215,24 @@ class _SecretBackendState:
|
|
1188
1215
|
return pulumi.get(self, "path")
|
1189
1216
|
|
1190
1217
|
@path.setter
|
1191
|
-
def path(self, value: Optional[pulumi.Input[
|
1218
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1192
1219
|
pulumi.set(self, "path", value)
|
1193
1220
|
|
1194
|
-
@property
|
1221
|
+
@_builtins.property
|
1195
1222
|
@pulumi.getter(name="pluginVersion")
|
1196
|
-
def plugin_version(self) -> Optional[pulumi.Input[
|
1223
|
+
def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1197
1224
|
"""
|
1198
1225
|
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1199
1226
|
"""
|
1200
1227
|
return pulumi.get(self, "plugin_version")
|
1201
1228
|
|
1202
1229
|
@plugin_version.setter
|
1203
|
-
def plugin_version(self, value: Optional[pulumi.Input[
|
1230
|
+
def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1204
1231
|
pulumi.set(self, "plugin_version", value)
|
1205
1232
|
|
1206
|
-
@property
|
1233
|
+
@_builtins.property
|
1207
1234
|
@pulumi.getter(name="requestTimeout")
|
1208
|
-
def request_timeout(self) -> Optional[pulumi.Input[
|
1235
|
+
def request_timeout(self) -> Optional[pulumi.Input[_builtins.int]]:
|
1209
1236
|
"""
|
1210
1237
|
Timeout, in seconds, for the connection when making requests against the server
|
1211
1238
|
before returning back an error.
|
@@ -1213,12 +1240,12 @@ class _SecretBackendState:
|
|
1213
1240
|
return pulumi.get(self, "request_timeout")
|
1214
1241
|
|
1215
1242
|
@request_timeout.setter
|
1216
|
-
def request_timeout(self, value: Optional[pulumi.Input[
|
1243
|
+
def request_timeout(self, value: Optional[pulumi.Input[_builtins.int]]):
|
1217
1244
|
pulumi.set(self, "request_timeout", value)
|
1218
1245
|
|
1219
|
-
@property
|
1246
|
+
@_builtins.property
|
1220
1247
|
@pulumi.getter(name="rotationPeriod")
|
1221
|
-
def rotation_period(self) -> Optional[pulumi.Input[
|
1248
|
+
def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
1222
1249
|
"""
|
1223
1250
|
The amount of time in seconds Vault should wait before rotating the root credential.
|
1224
1251
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
@@ -1226,12 +1253,12 @@ class _SecretBackendState:
|
|
1226
1253
|
return pulumi.get(self, "rotation_period")
|
1227
1254
|
|
1228
1255
|
@rotation_period.setter
|
1229
|
-
def rotation_period(self, value: Optional[pulumi.Input[
|
1256
|
+
def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
1230
1257
|
pulumi.set(self, "rotation_period", value)
|
1231
1258
|
|
1232
|
-
@property
|
1259
|
+
@_builtins.property
|
1233
1260
|
@pulumi.getter(name="rotationSchedule")
|
1234
|
-
def rotation_schedule(self) -> Optional[pulumi.Input[
|
1261
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1235
1262
|
"""
|
1236
1263
|
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
1237
1264
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
@@ -1239,12 +1266,12 @@ class _SecretBackendState:
|
|
1239
1266
|
return pulumi.get(self, "rotation_schedule")
|
1240
1267
|
|
1241
1268
|
@rotation_schedule.setter
|
1242
|
-
def rotation_schedule(self, value: Optional[pulumi.Input[
|
1269
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1243
1270
|
pulumi.set(self, "rotation_schedule", value)
|
1244
1271
|
|
1245
|
-
@property
|
1272
|
+
@_builtins.property
|
1246
1273
|
@pulumi.getter(name="rotationWindow")
|
1247
|
-
def rotation_window(self) -> Optional[pulumi.Input[
|
1274
|
+
def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
|
1248
1275
|
"""
|
1249
1276
|
The maximum amount of time in seconds allowed to complete
|
1250
1277
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
@@ -1253,36 +1280,36 @@ class _SecretBackendState:
|
|
1253
1280
|
return pulumi.get(self, "rotation_window")
|
1254
1281
|
|
1255
1282
|
@rotation_window.setter
|
1256
|
-
def rotation_window(self, value: Optional[pulumi.Input[
|
1283
|
+
def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
|
1257
1284
|
pulumi.set(self, "rotation_window", value)
|
1258
1285
|
|
1259
|
-
@property
|
1286
|
+
@_builtins.property
|
1260
1287
|
@pulumi.getter
|
1261
|
-
def schema(self) -> Optional[pulumi.Input[
|
1288
|
+
def schema(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1262
1289
|
"""
|
1263
1290
|
The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
|
1264
1291
|
"""
|
1265
1292
|
return pulumi.get(self, "schema")
|
1266
1293
|
|
1267
1294
|
@schema.setter
|
1268
|
-
def schema(self, value: Optional[pulumi.Input[
|
1295
|
+
def schema(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1269
1296
|
pulumi.set(self, "schema", value)
|
1270
1297
|
|
1271
|
-
@property
|
1298
|
+
@_builtins.property
|
1272
1299
|
@pulumi.getter(name="sealWrap")
|
1273
|
-
def seal_wrap(self) -> Optional[pulumi.Input[
|
1300
|
+
def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1274
1301
|
"""
|
1275
1302
|
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1276
1303
|
"""
|
1277
1304
|
return pulumi.get(self, "seal_wrap")
|
1278
1305
|
|
1279
1306
|
@seal_wrap.setter
|
1280
|
-
def seal_wrap(self, value: Optional[pulumi.Input[
|
1307
|
+
def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1281
1308
|
pulumi.set(self, "seal_wrap", value)
|
1282
1309
|
|
1283
|
-
@property
|
1310
|
+
@_builtins.property
|
1284
1311
|
@pulumi.getter(name="skipStaticRoleImportRotation")
|
1285
|
-
def skip_static_role_import_rotation(self) -> Optional[pulumi.Input[
|
1312
|
+
def skip_static_role_import_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1286
1313
|
"""
|
1287
1314
|
If set to true, static roles will not be rotated during import.
|
1288
1315
|
Defaults to false. Requires Vault 1.16 or above.
|
@@ -1290,36 +1317,36 @@ class _SecretBackendState:
|
|
1290
1317
|
return pulumi.get(self, "skip_static_role_import_rotation")
|
1291
1318
|
|
1292
1319
|
@skip_static_role_import_rotation.setter
|
1293
|
-
def skip_static_role_import_rotation(self, value: Optional[pulumi.Input[
|
1320
|
+
def skip_static_role_import_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1294
1321
|
pulumi.set(self, "skip_static_role_import_rotation", value)
|
1295
1322
|
|
1296
|
-
@property
|
1323
|
+
@_builtins.property
|
1297
1324
|
@pulumi.getter
|
1298
|
-
def starttls(self) -> Optional[pulumi.Input[
|
1325
|
+
def starttls(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1299
1326
|
"""
|
1300
1327
|
Issue a StartTLS command after establishing unencrypted connection.
|
1301
1328
|
"""
|
1302
1329
|
return pulumi.get(self, "starttls")
|
1303
1330
|
|
1304
1331
|
@starttls.setter
|
1305
|
-
def starttls(self, value: Optional[pulumi.Input[
|
1332
|
+
def starttls(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1306
1333
|
pulumi.set(self, "starttls", value)
|
1307
1334
|
|
1308
|
-
@property
|
1335
|
+
@_builtins.property
|
1309
1336
|
@pulumi.getter
|
1310
|
-
def upndomain(self) -> Optional[pulumi.Input[
|
1337
|
+
def upndomain(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1311
1338
|
"""
|
1312
1339
|
Enables userPrincipalDomain login with [username]@UPNDomain.
|
1313
1340
|
"""
|
1314
1341
|
return pulumi.get(self, "upndomain")
|
1315
1342
|
|
1316
1343
|
@upndomain.setter
|
1317
|
-
def upndomain(self, value: Optional[pulumi.Input[
|
1344
|
+
def upndomain(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1318
1345
|
pulumi.set(self, "upndomain", value)
|
1319
1346
|
|
1320
|
-
@property
|
1347
|
+
@_builtins.property
|
1321
1348
|
@pulumi.getter
|
1322
|
-
def url(self) -> Optional[pulumi.Input[
|
1349
|
+
def url(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1323
1350
|
"""
|
1324
1351
|
LDAP URL to connect to. Multiple URLs can be specified by concatenating
|
1325
1352
|
them with commas; they will be tried in-order. Defaults to `ldap://127.0.0.1`.
|
@@ -1327,31 +1354,31 @@ class _SecretBackendState:
|
|
1327
1354
|
return pulumi.get(self, "url")
|
1328
1355
|
|
1329
1356
|
@url.setter
|
1330
|
-
def url(self, value: Optional[pulumi.Input[
|
1357
|
+
def url(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1331
1358
|
pulumi.set(self, "url", value)
|
1332
1359
|
|
1333
|
-
@property
|
1360
|
+
@_builtins.property
|
1334
1361
|
@pulumi.getter
|
1335
|
-
def userattr(self) -> Optional[pulumi.Input[
|
1362
|
+
def userattr(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1336
1363
|
"""
|
1337
1364
|
Attribute used when searching users. Defaults to `cn`.
|
1338
1365
|
"""
|
1339
1366
|
return pulumi.get(self, "userattr")
|
1340
1367
|
|
1341
1368
|
@userattr.setter
|
1342
|
-
def userattr(self, value: Optional[pulumi.Input[
|
1369
|
+
def userattr(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1343
1370
|
pulumi.set(self, "userattr", value)
|
1344
1371
|
|
1345
|
-
@property
|
1372
|
+
@_builtins.property
|
1346
1373
|
@pulumi.getter
|
1347
|
-
def userdn(self) -> Optional[pulumi.Input[
|
1374
|
+
def userdn(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1348
1375
|
"""
|
1349
1376
|
LDAP domain to use for users (eg: ou=People,dc=example,dc=org)`.
|
1350
1377
|
"""
|
1351
1378
|
return pulumi.get(self, "userdn")
|
1352
1379
|
|
1353
1380
|
@userdn.setter
|
1354
|
-
def userdn(self, value: Optional[pulumi.Input[
|
1381
|
+
def userdn(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1355
1382
|
pulumi.set(self, "userdn", value)
|
1356
1383
|
|
1357
1384
|
|
@@ -1361,45 +1388,46 @@ class SecretBackend(pulumi.CustomResource):
|
|
1361
1388
|
def __init__(__self__,
|
1362
1389
|
resource_name: str,
|
1363
1390
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1364
|
-
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1365
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1366
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1367
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1368
|
-
binddn: Optional[pulumi.Input[
|
1369
|
-
bindpass: Optional[pulumi.Input[
|
1370
|
-
certificate: Optional[pulumi.Input[
|
1371
|
-
client_tls_cert: Optional[pulumi.Input[
|
1372
|
-
client_tls_key: Optional[pulumi.Input[
|
1373
|
-
connection_timeout: Optional[pulumi.Input[
|
1374
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
1375
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1376
|
-
description: Optional[pulumi.Input[
|
1377
|
-
disable_automated_rotation: Optional[pulumi.Input[
|
1378
|
-
disable_remount: Optional[pulumi.Input[
|
1379
|
-
external_entropy_access: Optional[pulumi.Input[
|
1380
|
-
|
1381
|
-
|
1382
|
-
|
1383
|
-
|
1384
|
-
|
1385
|
-
|
1386
|
-
|
1387
|
-
|
1388
|
-
|
1389
|
-
|
1390
|
-
|
1391
|
-
|
1392
|
-
|
1393
|
-
|
1394
|
-
|
1395
|
-
|
1396
|
-
|
1397
|
-
|
1398
|
-
|
1399
|
-
|
1400
|
-
|
1401
|
-
|
1402
|
-
|
1391
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1392
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1393
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1394
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1395
|
+
binddn: Optional[pulumi.Input[_builtins.str]] = None,
|
1396
|
+
bindpass: Optional[pulumi.Input[_builtins.str]] = None,
|
1397
|
+
certificate: Optional[pulumi.Input[_builtins.str]] = None,
|
1398
|
+
client_tls_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
1399
|
+
client_tls_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1400
|
+
connection_timeout: Optional[pulumi.Input[_builtins.int]] = None,
|
1401
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1402
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1403
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
1404
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
1405
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
1406
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
1407
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
1408
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1409
|
+
insecure_tls: Optional[pulumi.Input[_builtins.bool]] = None,
|
1410
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
1411
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
1412
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1413
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1414
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
1415
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1416
|
+
password_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
1417
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
1418
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
1419
|
+
request_timeout: Optional[pulumi.Input[_builtins.int]] = None,
|
1420
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
1421
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
1422
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
1423
|
+
schema: Optional[pulumi.Input[_builtins.str]] = None,
|
1424
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
1425
|
+
skip_static_role_import_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
1426
|
+
starttls: Optional[pulumi.Input[_builtins.bool]] = None,
|
1427
|
+
upndomain: Optional[pulumi.Input[_builtins.str]] = None,
|
1428
|
+
url: Optional[pulumi.Input[_builtins.str]] = None,
|
1429
|
+
userattr: Optional[pulumi.Input[_builtins.str]] = None,
|
1430
|
+
userdn: Optional[pulumi.Input[_builtins.str]] = None,
|
1403
1431
|
__props__=None):
|
1404
1432
|
"""
|
1405
1433
|
## Example Usage
|
@@ -1429,60 +1457,60 @@ class SecretBackend(pulumi.CustomResource):
|
|
1429
1457
|
|
1430
1458
|
:param str resource_name: The name of the resource.
|
1431
1459
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
1432
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1433
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1434
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1435
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1436
|
-
:param pulumi.Input[
|
1437
|
-
:param pulumi.Input[
|
1438
|
-
:param pulumi.Input[
|
1460
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
1461
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
1462
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1463
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1464
|
+
:param pulumi.Input[_builtins.str] binddn: Distinguished name of object to bind when performing user and group search.
|
1465
|
+
:param pulumi.Input[_builtins.str] bindpass: Password to use along with binddn when performing user search.
|
1466
|
+
:param pulumi.Input[_builtins.str] certificate: CA certificate to use when verifying LDAP server certificate, must be
|
1439
1467
|
x509 PEM encoded.
|
1440
|
-
:param pulumi.Input[
|
1441
|
-
:param pulumi.Input[
|
1442
|
-
:param pulumi.Input[
|
1468
|
+
:param pulumi.Input[_builtins.str] client_tls_cert: Client certificate to provide to the LDAP server, must be x509 PEM encoded.
|
1469
|
+
:param pulumi.Input[_builtins.str] client_tls_key: Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
|
1470
|
+
:param pulumi.Input[_builtins.int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
|
1443
1471
|
the next URL in the configuration.
|
1444
|
-
:param pulumi.Input[
|
1445
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1446
|
-
:param pulumi.Input[
|
1447
|
-
:param pulumi.Input[
|
1448
|
-
:param pulumi.Input[
|
1449
|
-
:param pulumi.Input[
|
1450
|
-
:param pulumi.Input[
|
1451
|
-
:param pulumi.Input[
|
1472
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
1473
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
1474
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
1475
|
+
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
1476
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
1477
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
1478
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
1479
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
1480
|
+
:param pulumi.Input[_builtins.bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
|
1452
1481
|
Defaults to `false`.
|
1453
|
-
:param pulumi.Input[
|
1454
|
-
:param pulumi.Input[
|
1455
|
-
|
1456
|
-
:param pulumi.Input[
|
1457
|
-
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
1482
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
1483
|
+
:param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
1484
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
1485
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
1458
1486
|
The value should not contain leading or trailing forward slashes.
|
1459
1487
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1460
1488
|
*Available only for Vault Enterprise*.
|
1461
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
1462
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1463
|
-
:param pulumi.Input[
|
1464
|
-
:param pulumi.Input[
|
1489
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
1490
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
1491
|
+
:param pulumi.Input[_builtins.str] password_policy: Name of the password policy to use to generate passwords.
|
1492
|
+
:param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
|
1465
1493
|
not begin or end with a `/`. Defaults to `ldap`.
|
1466
|
-
:param pulumi.Input[
|
1467
|
-
:param pulumi.Input[
|
1494
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1495
|
+
:param pulumi.Input[_builtins.int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
|
1468
1496
|
before returning back an error.
|
1469
|
-
:param pulumi.Input[
|
1497
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
1470
1498
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
1471
|
-
:param pulumi.Input[
|
1499
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
1472
1500
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
1473
|
-
:param pulumi.Input[
|
1501
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
1474
1502
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
1475
1503
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
1476
|
-
:param pulumi.Input[
|
1477
|
-
:param pulumi.Input[
|
1478
|
-
:param pulumi.Input[
|
1504
|
+
:param pulumi.Input[_builtins.str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
|
1505
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1506
|
+
:param pulumi.Input[_builtins.bool] skip_static_role_import_rotation: If set to true, static roles will not be rotated during import.
|
1479
1507
|
Defaults to false. Requires Vault 1.16 or above.
|
1480
|
-
:param pulumi.Input[
|
1481
|
-
:param pulumi.Input[
|
1482
|
-
:param pulumi.Input[
|
1508
|
+
:param pulumi.Input[_builtins.bool] starttls: Issue a StartTLS command after establishing unencrypted connection.
|
1509
|
+
:param pulumi.Input[_builtins.str] upndomain: Enables userPrincipalDomain login with [username]@UPNDomain.
|
1510
|
+
:param pulumi.Input[_builtins.str] url: LDAP URL to connect to. Multiple URLs can be specified by concatenating
|
1483
1511
|
them with commas; they will be tried in-order. Defaults to `ldap://127.0.0.1`.
|
1484
|
-
:param pulumi.Input[
|
1485
|
-
:param pulumi.Input[
|
1512
|
+
:param pulumi.Input[_builtins.str] userattr: Attribute used when searching users. Defaults to `cn`.
|
1513
|
+
:param pulumi.Input[_builtins.str] userdn: LDAP domain to use for users (eg: ou=People,dc=example,dc=org)`.
|
1486
1514
|
"""
|
1487
1515
|
...
|
1488
1516
|
@overload
|
@@ -1531,45 +1559,46 @@ class SecretBackend(pulumi.CustomResource):
|
|
1531
1559
|
def _internal_init(__self__,
|
1532
1560
|
resource_name: str,
|
1533
1561
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1534
|
-
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1535
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1536
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1537
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1538
|
-
binddn: Optional[pulumi.Input[
|
1539
|
-
bindpass: Optional[pulumi.Input[
|
1540
|
-
certificate: Optional[pulumi.Input[
|
1541
|
-
client_tls_cert: Optional[pulumi.Input[
|
1542
|
-
client_tls_key: Optional[pulumi.Input[
|
1543
|
-
connection_timeout: Optional[pulumi.Input[
|
1544
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
1545
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1546
|
-
description: Optional[pulumi.Input[
|
1547
|
-
disable_automated_rotation: Optional[pulumi.Input[
|
1548
|
-
disable_remount: Optional[pulumi.Input[
|
1549
|
-
external_entropy_access: Optional[pulumi.Input[
|
1550
|
-
|
1551
|
-
|
1552
|
-
|
1553
|
-
|
1554
|
-
|
1555
|
-
|
1556
|
-
|
1557
|
-
|
1558
|
-
|
1559
|
-
|
1560
|
-
|
1561
|
-
|
1562
|
-
|
1563
|
-
|
1564
|
-
|
1565
|
-
|
1566
|
-
|
1567
|
-
|
1568
|
-
|
1569
|
-
|
1570
|
-
|
1571
|
-
|
1572
|
-
|
1562
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1563
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1564
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1565
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1566
|
+
binddn: Optional[pulumi.Input[_builtins.str]] = None,
|
1567
|
+
bindpass: Optional[pulumi.Input[_builtins.str]] = None,
|
1568
|
+
certificate: Optional[pulumi.Input[_builtins.str]] = None,
|
1569
|
+
client_tls_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
1570
|
+
client_tls_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1571
|
+
connection_timeout: Optional[pulumi.Input[_builtins.int]] = None,
|
1572
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1573
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1574
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
1575
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
1576
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
1577
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
1578
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
1579
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1580
|
+
insecure_tls: Optional[pulumi.Input[_builtins.bool]] = None,
|
1581
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
1582
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
1583
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1584
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1585
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
1586
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1587
|
+
password_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
1588
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
1589
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
1590
|
+
request_timeout: Optional[pulumi.Input[_builtins.int]] = None,
|
1591
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
1592
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
1593
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
1594
|
+
schema: Optional[pulumi.Input[_builtins.str]] = None,
|
1595
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
1596
|
+
skip_static_role_import_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
1597
|
+
starttls: Optional[pulumi.Input[_builtins.bool]] = None,
|
1598
|
+
upndomain: Optional[pulumi.Input[_builtins.str]] = None,
|
1599
|
+
url: Optional[pulumi.Input[_builtins.str]] = None,
|
1600
|
+
userattr: Optional[pulumi.Input[_builtins.str]] = None,
|
1601
|
+
userdn: Optional[pulumi.Input[_builtins.str]] = None,
|
1573
1602
|
__props__=None):
|
1574
1603
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
1575
1604
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -1599,6 +1628,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1599
1628
|
__props__.__dict__["disable_automated_rotation"] = disable_automated_rotation
|
1600
1629
|
__props__.__dict__["disable_remount"] = disable_remount
|
1601
1630
|
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
1631
|
+
__props__.__dict__["force_no_cache"] = force_no_cache
|
1602
1632
|
__props__.__dict__["identity_token_key"] = identity_token_key
|
1603
1633
|
__props__.__dict__["insecure_tls"] = insecure_tls
|
1604
1634
|
__props__.__dict__["listing_visibility"] = listing_visibility
|
@@ -1635,46 +1665,47 @@ class SecretBackend(pulumi.CustomResource):
|
|
1635
1665
|
def get(resource_name: str,
|
1636
1666
|
id: pulumi.Input[str],
|
1637
1667
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1638
|
-
accessor: Optional[pulumi.Input[
|
1639
|
-
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1640
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1641
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1642
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1643
|
-
binddn: Optional[pulumi.Input[
|
1644
|
-
bindpass: Optional[pulumi.Input[
|
1645
|
-
certificate: Optional[pulumi.Input[
|
1646
|
-
client_tls_cert: Optional[pulumi.Input[
|
1647
|
-
client_tls_key: Optional[pulumi.Input[
|
1648
|
-
connection_timeout: Optional[pulumi.Input[
|
1649
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
1650
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1651
|
-
description: Optional[pulumi.Input[
|
1652
|
-
disable_automated_rotation: Optional[pulumi.Input[
|
1653
|
-
disable_remount: Optional[pulumi.Input[
|
1654
|
-
external_entropy_access: Optional[pulumi.Input[
|
1655
|
-
|
1656
|
-
|
1657
|
-
|
1658
|
-
|
1659
|
-
|
1660
|
-
|
1661
|
-
|
1662
|
-
|
1663
|
-
|
1664
|
-
|
1665
|
-
|
1666
|
-
|
1667
|
-
|
1668
|
-
|
1669
|
-
|
1670
|
-
|
1671
|
-
|
1672
|
-
|
1673
|
-
|
1674
|
-
|
1675
|
-
|
1676
|
-
|
1677
|
-
|
1668
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
1669
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1670
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1671
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1672
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1673
|
+
binddn: Optional[pulumi.Input[_builtins.str]] = None,
|
1674
|
+
bindpass: Optional[pulumi.Input[_builtins.str]] = None,
|
1675
|
+
certificate: Optional[pulumi.Input[_builtins.str]] = None,
|
1676
|
+
client_tls_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
1677
|
+
client_tls_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1678
|
+
connection_timeout: Optional[pulumi.Input[_builtins.int]] = None,
|
1679
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1680
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1681
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
1682
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
1683
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
1684
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
1685
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
1686
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1687
|
+
insecure_tls: Optional[pulumi.Input[_builtins.bool]] = None,
|
1688
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
1689
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
1690
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1691
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1692
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
1693
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1694
|
+
password_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
1695
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
1696
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
1697
|
+
request_timeout: Optional[pulumi.Input[_builtins.int]] = None,
|
1698
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
1699
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
1700
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
1701
|
+
schema: Optional[pulumi.Input[_builtins.str]] = None,
|
1702
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
1703
|
+
skip_static_role_import_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
1704
|
+
starttls: Optional[pulumi.Input[_builtins.bool]] = None,
|
1705
|
+
upndomain: Optional[pulumi.Input[_builtins.str]] = None,
|
1706
|
+
url: Optional[pulumi.Input[_builtins.str]] = None,
|
1707
|
+
userattr: Optional[pulumi.Input[_builtins.str]] = None,
|
1708
|
+
userdn: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackend':
|
1678
1709
|
"""
|
1679
1710
|
Get an existing SecretBackend resource's state with the given name, id, and optional extra
|
1680
1711
|
properties used to qualify the lookup.
|
@@ -1682,61 +1713,61 @@ class SecretBackend(pulumi.CustomResource):
|
|
1682
1713
|
:param str resource_name: The unique name of the resulting resource.
|
1683
1714
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
1684
1715
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
1685
|
-
:param pulumi.Input[
|
1686
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1687
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1688
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1689
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1690
|
-
:param pulumi.Input[
|
1691
|
-
:param pulumi.Input[
|
1692
|
-
:param pulumi.Input[
|
1716
|
+
:param pulumi.Input[_builtins.str] accessor: Accessor of the mount
|
1717
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
1718
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
1719
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1720
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1721
|
+
:param pulumi.Input[_builtins.str] binddn: Distinguished name of object to bind when performing user and group search.
|
1722
|
+
:param pulumi.Input[_builtins.str] bindpass: Password to use along with binddn when performing user search.
|
1723
|
+
:param pulumi.Input[_builtins.str] certificate: CA certificate to use when verifying LDAP server certificate, must be
|
1693
1724
|
x509 PEM encoded.
|
1694
|
-
:param pulumi.Input[
|
1695
|
-
:param pulumi.Input[
|
1696
|
-
:param pulumi.Input[
|
1725
|
+
:param pulumi.Input[_builtins.str] client_tls_cert: Client certificate to provide to the LDAP server, must be x509 PEM encoded.
|
1726
|
+
:param pulumi.Input[_builtins.str] client_tls_key: Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
|
1727
|
+
:param pulumi.Input[_builtins.int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
|
1697
1728
|
the next URL in the configuration.
|
1698
|
-
:param pulumi.Input[
|
1699
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1700
|
-
:param pulumi.Input[
|
1701
|
-
:param pulumi.Input[
|
1702
|
-
:param pulumi.Input[
|
1703
|
-
:param pulumi.Input[
|
1704
|
-
:param pulumi.Input[
|
1705
|
-
:param pulumi.Input[
|
1729
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
1730
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
1731
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
1732
|
+
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
1733
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
1734
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
1735
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
1736
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
1737
|
+
:param pulumi.Input[_builtins.bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
|
1706
1738
|
Defaults to `false`.
|
1707
|
-
:param pulumi.Input[
|
1708
|
-
:param pulumi.Input[
|
1709
|
-
|
1710
|
-
:param pulumi.Input[
|
1711
|
-
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
1739
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
1740
|
+
:param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
1741
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
1742
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
1712
1743
|
The value should not contain leading or trailing forward slashes.
|
1713
1744
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1714
1745
|
*Available only for Vault Enterprise*.
|
1715
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
1716
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1717
|
-
:param pulumi.Input[
|
1718
|
-
:param pulumi.Input[
|
1746
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
1747
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
1748
|
+
:param pulumi.Input[_builtins.str] password_policy: Name of the password policy to use to generate passwords.
|
1749
|
+
:param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
|
1719
1750
|
not begin or end with a `/`. Defaults to `ldap`.
|
1720
|
-
:param pulumi.Input[
|
1721
|
-
:param pulumi.Input[
|
1751
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1752
|
+
:param pulumi.Input[_builtins.int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
|
1722
1753
|
before returning back an error.
|
1723
|
-
:param pulumi.Input[
|
1754
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
1724
1755
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
1725
|
-
:param pulumi.Input[
|
1756
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
1726
1757
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
1727
|
-
:param pulumi.Input[
|
1758
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
1728
1759
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
1729
1760
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
1730
|
-
:param pulumi.Input[
|
1731
|
-
:param pulumi.Input[
|
1732
|
-
:param pulumi.Input[
|
1761
|
+
:param pulumi.Input[_builtins.str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
|
1762
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1763
|
+
:param pulumi.Input[_builtins.bool] skip_static_role_import_rotation: If set to true, static roles will not be rotated during import.
|
1733
1764
|
Defaults to false. Requires Vault 1.16 or above.
|
1734
|
-
:param pulumi.Input[
|
1735
|
-
:param pulumi.Input[
|
1736
|
-
:param pulumi.Input[
|
1765
|
+
:param pulumi.Input[_builtins.bool] starttls: Issue a StartTLS command after establishing unencrypted connection.
|
1766
|
+
:param pulumi.Input[_builtins.str] upndomain: Enables userPrincipalDomain login with [username]@UPNDomain.
|
1767
|
+
:param pulumi.Input[_builtins.str] url: LDAP URL to connect to. Multiple URLs can be specified by concatenating
|
1737
1768
|
them with commas; they will be tried in-order. Defaults to `ldap://127.0.0.1`.
|
1738
|
-
:param pulumi.Input[
|
1739
|
-
:param pulumi.Input[
|
1769
|
+
:param pulumi.Input[_builtins.str] userattr: Attribute used when searching users. Defaults to `cn`.
|
1770
|
+
:param pulumi.Input[_builtins.str] userdn: LDAP domain to use for users (eg: ou=People,dc=example,dc=org)`.
|
1740
1771
|
"""
|
1741
1772
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
1742
1773
|
|
@@ -1759,6 +1790,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1759
1790
|
__props__.__dict__["disable_automated_rotation"] = disable_automated_rotation
|
1760
1791
|
__props__.__dict__["disable_remount"] = disable_remount
|
1761
1792
|
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
1793
|
+
__props__.__dict__["force_no_cache"] = force_no_cache
|
1762
1794
|
__props__.__dict__["identity_token_key"] = identity_token_key
|
1763
1795
|
__props__.__dict__["insecure_tls"] = insecure_tls
|
1764
1796
|
__props__.__dict__["listing_visibility"] = listing_visibility
|
@@ -1784,189 +1816,196 @@ class SecretBackend(pulumi.CustomResource):
|
|
1784
1816
|
__props__.__dict__["userdn"] = userdn
|
1785
1817
|
return SecretBackend(resource_name, opts=opts, __props__=__props__)
|
1786
1818
|
|
1787
|
-
@property
|
1819
|
+
@_builtins.property
|
1788
1820
|
@pulumi.getter
|
1789
|
-
def accessor(self) -> pulumi.Output[
|
1821
|
+
def accessor(self) -> pulumi.Output[_builtins.str]:
|
1790
1822
|
"""
|
1791
1823
|
Accessor of the mount
|
1792
1824
|
"""
|
1793
1825
|
return pulumi.get(self, "accessor")
|
1794
1826
|
|
1795
|
-
@property
|
1827
|
+
@_builtins.property
|
1796
1828
|
@pulumi.getter(name="allowedManagedKeys")
|
1797
|
-
def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[
|
1829
|
+
def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1798
1830
|
"""
|
1799
1831
|
List of managed key registry entry names that the mount in question is allowed to access
|
1800
1832
|
"""
|
1801
1833
|
return pulumi.get(self, "allowed_managed_keys")
|
1802
1834
|
|
1803
|
-
@property
|
1835
|
+
@_builtins.property
|
1804
1836
|
@pulumi.getter(name="allowedResponseHeaders")
|
1805
|
-
def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[
|
1837
|
+
def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1806
1838
|
"""
|
1807
1839
|
List of headers to allow and pass from the request to the plugin
|
1808
1840
|
"""
|
1809
1841
|
return pulumi.get(self, "allowed_response_headers")
|
1810
1842
|
|
1811
|
-
@property
|
1843
|
+
@_builtins.property
|
1812
1844
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
1813
|
-
def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[
|
1845
|
+
def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
1814
1846
|
"""
|
1815
1847
|
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1816
1848
|
"""
|
1817
1849
|
return pulumi.get(self, "audit_non_hmac_request_keys")
|
1818
1850
|
|
1819
|
-
@property
|
1851
|
+
@_builtins.property
|
1820
1852
|
@pulumi.getter(name="auditNonHmacResponseKeys")
|
1821
|
-
def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[
|
1853
|
+
def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
1822
1854
|
"""
|
1823
1855
|
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1824
1856
|
"""
|
1825
1857
|
return pulumi.get(self, "audit_non_hmac_response_keys")
|
1826
1858
|
|
1827
|
-
@property
|
1859
|
+
@_builtins.property
|
1828
1860
|
@pulumi.getter
|
1829
|
-
def binddn(self) -> pulumi.Output[
|
1861
|
+
def binddn(self) -> pulumi.Output[_builtins.str]:
|
1830
1862
|
"""
|
1831
1863
|
Distinguished name of object to bind when performing user and group search.
|
1832
1864
|
"""
|
1833
1865
|
return pulumi.get(self, "binddn")
|
1834
1866
|
|
1835
|
-
@property
|
1867
|
+
@_builtins.property
|
1836
1868
|
@pulumi.getter
|
1837
|
-
def bindpass(self) -> pulumi.Output[
|
1869
|
+
def bindpass(self) -> pulumi.Output[_builtins.str]:
|
1838
1870
|
"""
|
1839
1871
|
Password to use along with binddn when performing user search.
|
1840
1872
|
"""
|
1841
1873
|
return pulumi.get(self, "bindpass")
|
1842
1874
|
|
1843
|
-
@property
|
1875
|
+
@_builtins.property
|
1844
1876
|
@pulumi.getter
|
1845
|
-
def certificate(self) -> pulumi.Output[Optional[
|
1877
|
+
def certificate(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1846
1878
|
"""
|
1847
1879
|
CA certificate to use when verifying LDAP server certificate, must be
|
1848
1880
|
x509 PEM encoded.
|
1849
1881
|
"""
|
1850
1882
|
return pulumi.get(self, "certificate")
|
1851
1883
|
|
1852
|
-
@property
|
1884
|
+
@_builtins.property
|
1853
1885
|
@pulumi.getter(name="clientTlsCert")
|
1854
|
-
def client_tls_cert(self) -> pulumi.Output[Optional[
|
1886
|
+
def client_tls_cert(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1855
1887
|
"""
|
1856
1888
|
Client certificate to provide to the LDAP server, must be x509 PEM encoded.
|
1857
1889
|
"""
|
1858
1890
|
return pulumi.get(self, "client_tls_cert")
|
1859
1891
|
|
1860
|
-
@property
|
1892
|
+
@_builtins.property
|
1861
1893
|
@pulumi.getter(name="clientTlsKey")
|
1862
|
-
def client_tls_key(self) -> pulumi.Output[Optional[
|
1894
|
+
def client_tls_key(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1863
1895
|
"""
|
1864
1896
|
Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
|
1865
1897
|
"""
|
1866
1898
|
return pulumi.get(self, "client_tls_key")
|
1867
1899
|
|
1868
|
-
@property
|
1900
|
+
@_builtins.property
|
1869
1901
|
@pulumi.getter(name="connectionTimeout")
|
1870
|
-
def connection_timeout(self) -> pulumi.Output[Optional[
|
1902
|
+
def connection_timeout(self) -> pulumi.Output[Optional[_builtins.int]]:
|
1871
1903
|
"""
|
1872
1904
|
Timeout, in seconds, when attempting to connect to the LDAP server before trying
|
1873
1905
|
the next URL in the configuration.
|
1874
1906
|
"""
|
1875
1907
|
return pulumi.get(self, "connection_timeout")
|
1876
1908
|
|
1877
|
-
@property
|
1909
|
+
@_builtins.property
|
1878
1910
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
1879
|
-
def default_lease_ttl_seconds(self) -> pulumi.Output[
|
1911
|
+
def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
|
1880
1912
|
"""
|
1881
|
-
Default lease duration for secrets in seconds
|
1913
|
+
Default lease duration for tokens and secrets in seconds
|
1882
1914
|
"""
|
1883
1915
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
1884
1916
|
|
1885
|
-
@property
|
1917
|
+
@_builtins.property
|
1886
1918
|
@pulumi.getter(name="delegatedAuthAccessors")
|
1887
|
-
def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[
|
1919
|
+
def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1888
1920
|
"""
|
1889
1921
|
List of headers to allow and pass from the request to the plugin
|
1890
1922
|
"""
|
1891
1923
|
return pulumi.get(self, "delegated_auth_accessors")
|
1892
1924
|
|
1893
|
-
@property
|
1925
|
+
@_builtins.property
|
1894
1926
|
@pulumi.getter
|
1895
|
-
def description(self) -> pulumi.Output[Optional[
|
1927
|
+
def description(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1896
1928
|
"""
|
1897
|
-
Human-friendly description of the mount
|
1929
|
+
Human-friendly description of the mount
|
1898
1930
|
"""
|
1899
1931
|
return pulumi.get(self, "description")
|
1900
1932
|
|
1901
|
-
@property
|
1933
|
+
@_builtins.property
|
1902
1934
|
@pulumi.getter(name="disableAutomatedRotation")
|
1903
|
-
def disable_automated_rotation(self) -> pulumi.Output[Optional[
|
1935
|
+
def disable_automated_rotation(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1904
1936
|
"""
|
1905
1937
|
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
1906
1938
|
"""
|
1907
1939
|
return pulumi.get(self, "disable_automated_rotation")
|
1908
1940
|
|
1909
|
-
@property
|
1941
|
+
@_builtins.property
|
1910
1942
|
@pulumi.getter(name="disableRemount")
|
1911
|
-
def disable_remount(self) -> pulumi.Output[Optional[
|
1943
|
+
def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1912
1944
|
"""
|
1913
1945
|
If set, opts out of mount migration on path updates.
|
1914
1946
|
"""
|
1915
1947
|
return pulumi.get(self, "disable_remount")
|
1916
1948
|
|
1917
|
-
@property
|
1949
|
+
@_builtins.property
|
1918
1950
|
@pulumi.getter(name="externalEntropyAccess")
|
1919
|
-
def external_entropy_access(self) -> pulumi.Output[Optional[
|
1951
|
+
def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1920
1952
|
"""
|
1921
1953
|
Enable the secrets engine to access Vault's external entropy source
|
1922
1954
|
"""
|
1923
1955
|
return pulumi.get(self, "external_entropy_access")
|
1924
1956
|
|
1925
|
-
@property
|
1957
|
+
@_builtins.property
|
1958
|
+
@pulumi.getter(name="forceNoCache")
|
1959
|
+
def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
|
1960
|
+
"""
|
1961
|
+
If set to true, disables caching.
|
1962
|
+
"""
|
1963
|
+
return pulumi.get(self, "force_no_cache")
|
1964
|
+
|
1965
|
+
@_builtins.property
|
1926
1966
|
@pulumi.getter(name="identityTokenKey")
|
1927
|
-
def identity_token_key(self) -> pulumi.Output[Optional[
|
1967
|
+
def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1928
1968
|
"""
|
1929
1969
|
The key to use for signing plugin workload identity tokens
|
1930
1970
|
"""
|
1931
1971
|
return pulumi.get(self, "identity_token_key")
|
1932
1972
|
|
1933
|
-
@property
|
1973
|
+
@_builtins.property
|
1934
1974
|
@pulumi.getter(name="insecureTls")
|
1935
|
-
def insecure_tls(self) -> pulumi.Output[Optional[
|
1975
|
+
def insecure_tls(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1936
1976
|
"""
|
1937
1977
|
Skip LDAP server SSL Certificate verification. This is not recommended for production.
|
1938
1978
|
Defaults to `false`.
|
1939
1979
|
"""
|
1940
1980
|
return pulumi.get(self, "insecure_tls")
|
1941
1981
|
|
1942
|
-
@property
|
1982
|
+
@_builtins.property
|
1943
1983
|
@pulumi.getter(name="listingVisibility")
|
1944
|
-
def listing_visibility(self) -> pulumi.Output[Optional[
|
1984
|
+
def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1945
1985
|
"""
|
1946
1986
|
Specifies whether to show this mount in the UI-specific listing endpoint
|
1947
1987
|
"""
|
1948
1988
|
return pulumi.get(self, "listing_visibility")
|
1949
1989
|
|
1950
|
-
@property
|
1990
|
+
@_builtins.property
|
1951
1991
|
@pulumi.getter
|
1952
|
-
def local(self) -> pulumi.Output[Optional[
|
1992
|
+
def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1953
1993
|
"""
|
1954
|
-
|
1955
|
-
replication.Tolerance duration to use when checking the last rotation time.
|
1994
|
+
Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
1956
1995
|
"""
|
1957
1996
|
return pulumi.get(self, "local")
|
1958
1997
|
|
1959
|
-
@property
|
1998
|
+
@_builtins.property
|
1960
1999
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
1961
|
-
def max_lease_ttl_seconds(self) -> pulumi.Output[
|
2000
|
+
def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
|
1962
2001
|
"""
|
1963
|
-
Maximum possible lease duration for secrets in seconds
|
2002
|
+
Maximum possible lease duration for tokens and secrets in seconds
|
1964
2003
|
"""
|
1965
2004
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
1966
2005
|
|
1967
|
-
@property
|
2006
|
+
@_builtins.property
|
1968
2007
|
@pulumi.getter
|
1969
|
-
def namespace(self) -> pulumi.Output[Optional[
|
2008
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1970
2009
|
"""
|
1971
2010
|
The namespace to provision the resource in.
|
1972
2011
|
The value should not contain leading or trailing forward slashes.
|
@@ -1975,77 +2014,77 @@ class SecretBackend(pulumi.CustomResource):
|
|
1975
2014
|
"""
|
1976
2015
|
return pulumi.get(self, "namespace")
|
1977
2016
|
|
1978
|
-
@property
|
2017
|
+
@_builtins.property
|
1979
2018
|
@pulumi.getter
|
1980
|
-
def options(self) -> pulumi.Output[Optional[Mapping[str,
|
2019
|
+
def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
|
1981
2020
|
"""
|
1982
2021
|
Specifies mount type specific options that are passed to the backend
|
1983
2022
|
"""
|
1984
2023
|
return pulumi.get(self, "options")
|
1985
2024
|
|
1986
|
-
@property
|
2025
|
+
@_builtins.property
|
1987
2026
|
@pulumi.getter(name="passthroughRequestHeaders")
|
1988
|
-
def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[
|
2027
|
+
def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1989
2028
|
"""
|
1990
2029
|
List of headers to allow and pass from the request to the plugin
|
1991
2030
|
"""
|
1992
2031
|
return pulumi.get(self, "passthrough_request_headers")
|
1993
2032
|
|
1994
|
-
@property
|
2033
|
+
@_builtins.property
|
1995
2034
|
@pulumi.getter(name="passwordPolicy")
|
1996
|
-
def password_policy(self) -> pulumi.Output[Optional[
|
2035
|
+
def password_policy(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1997
2036
|
"""
|
1998
2037
|
Name of the password policy to use to generate passwords.
|
1999
2038
|
"""
|
2000
2039
|
return pulumi.get(self, "password_policy")
|
2001
2040
|
|
2002
|
-
@property
|
2041
|
+
@_builtins.property
|
2003
2042
|
@pulumi.getter
|
2004
|
-
def path(self) -> pulumi.Output[Optional[
|
2043
|
+
def path(self) -> pulumi.Output[Optional[_builtins.str]]:
|
2005
2044
|
"""
|
2006
2045
|
The unique path this backend should be mounted at. Must
|
2007
2046
|
not begin or end with a `/`. Defaults to `ldap`.
|
2008
2047
|
"""
|
2009
2048
|
return pulumi.get(self, "path")
|
2010
2049
|
|
2011
|
-
@property
|
2050
|
+
@_builtins.property
|
2012
2051
|
@pulumi.getter(name="pluginVersion")
|
2013
|
-
def plugin_version(self) -> pulumi.Output[Optional[
|
2052
|
+
def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
|
2014
2053
|
"""
|
2015
2054
|
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
2016
2055
|
"""
|
2017
2056
|
return pulumi.get(self, "plugin_version")
|
2018
2057
|
|
2019
|
-
@property
|
2058
|
+
@_builtins.property
|
2020
2059
|
@pulumi.getter(name="requestTimeout")
|
2021
|
-
def request_timeout(self) -> pulumi.Output[
|
2060
|
+
def request_timeout(self) -> pulumi.Output[_builtins.int]:
|
2022
2061
|
"""
|
2023
2062
|
Timeout, in seconds, for the connection when making requests against the server
|
2024
2063
|
before returning back an error.
|
2025
2064
|
"""
|
2026
2065
|
return pulumi.get(self, "request_timeout")
|
2027
2066
|
|
2028
|
-
@property
|
2067
|
+
@_builtins.property
|
2029
2068
|
@pulumi.getter(name="rotationPeriod")
|
2030
|
-
def rotation_period(self) -> pulumi.Output[Optional[
|
2069
|
+
def rotation_period(self) -> pulumi.Output[Optional[_builtins.int]]:
|
2031
2070
|
"""
|
2032
2071
|
The amount of time in seconds Vault should wait before rotating the root credential.
|
2033
2072
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
2034
2073
|
"""
|
2035
2074
|
return pulumi.get(self, "rotation_period")
|
2036
2075
|
|
2037
|
-
@property
|
2076
|
+
@_builtins.property
|
2038
2077
|
@pulumi.getter(name="rotationSchedule")
|
2039
|
-
def rotation_schedule(self) -> pulumi.Output[Optional[
|
2078
|
+
def rotation_schedule(self) -> pulumi.Output[Optional[_builtins.str]]:
|
2040
2079
|
"""
|
2041
2080
|
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
2042
2081
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
2043
2082
|
"""
|
2044
2083
|
return pulumi.get(self, "rotation_schedule")
|
2045
2084
|
|
2046
|
-
@property
|
2085
|
+
@_builtins.property
|
2047
2086
|
@pulumi.getter(name="rotationWindow")
|
2048
|
-
def rotation_window(self) -> pulumi.Output[Optional[
|
2087
|
+
def rotation_window(self) -> pulumi.Output[Optional[_builtins.int]]:
|
2049
2088
|
"""
|
2050
2089
|
The maximum amount of time in seconds allowed to complete
|
2051
2090
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
@@ -2053,67 +2092,67 @@ class SecretBackend(pulumi.CustomResource):
|
|
2053
2092
|
"""
|
2054
2093
|
return pulumi.get(self, "rotation_window")
|
2055
2094
|
|
2056
|
-
@property
|
2095
|
+
@_builtins.property
|
2057
2096
|
@pulumi.getter
|
2058
|
-
def schema(self) -> pulumi.Output[
|
2097
|
+
def schema(self) -> pulumi.Output[_builtins.str]:
|
2059
2098
|
"""
|
2060
2099
|
The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
|
2061
2100
|
"""
|
2062
2101
|
return pulumi.get(self, "schema")
|
2063
2102
|
|
2064
|
-
@property
|
2103
|
+
@_builtins.property
|
2065
2104
|
@pulumi.getter(name="sealWrap")
|
2066
|
-
def seal_wrap(self) -> pulumi.Output[
|
2105
|
+
def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
|
2067
2106
|
"""
|
2068
2107
|
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
2069
2108
|
"""
|
2070
2109
|
return pulumi.get(self, "seal_wrap")
|
2071
2110
|
|
2072
|
-
@property
|
2111
|
+
@_builtins.property
|
2073
2112
|
@pulumi.getter(name="skipStaticRoleImportRotation")
|
2074
|
-
def skip_static_role_import_rotation(self) -> pulumi.Output[Optional[
|
2113
|
+
def skip_static_role_import_rotation(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
2075
2114
|
"""
|
2076
2115
|
If set to true, static roles will not be rotated during import.
|
2077
2116
|
Defaults to false. Requires Vault 1.16 or above.
|
2078
2117
|
"""
|
2079
2118
|
return pulumi.get(self, "skip_static_role_import_rotation")
|
2080
2119
|
|
2081
|
-
@property
|
2120
|
+
@_builtins.property
|
2082
2121
|
@pulumi.getter
|
2083
|
-
def starttls(self) -> pulumi.Output[
|
2122
|
+
def starttls(self) -> pulumi.Output[_builtins.bool]:
|
2084
2123
|
"""
|
2085
2124
|
Issue a StartTLS command after establishing unencrypted connection.
|
2086
2125
|
"""
|
2087
2126
|
return pulumi.get(self, "starttls")
|
2088
2127
|
|
2089
|
-
@property
|
2128
|
+
@_builtins.property
|
2090
2129
|
@pulumi.getter
|
2091
|
-
def upndomain(self) -> pulumi.Output[
|
2130
|
+
def upndomain(self) -> pulumi.Output[_builtins.str]:
|
2092
2131
|
"""
|
2093
2132
|
Enables userPrincipalDomain login with [username]@UPNDomain.
|
2094
2133
|
"""
|
2095
2134
|
return pulumi.get(self, "upndomain")
|
2096
2135
|
|
2097
|
-
@property
|
2136
|
+
@_builtins.property
|
2098
2137
|
@pulumi.getter
|
2099
|
-
def url(self) -> pulumi.Output[
|
2138
|
+
def url(self) -> pulumi.Output[_builtins.str]:
|
2100
2139
|
"""
|
2101
2140
|
LDAP URL to connect to. Multiple URLs can be specified by concatenating
|
2102
2141
|
them with commas; they will be tried in-order. Defaults to `ldap://127.0.0.1`.
|
2103
2142
|
"""
|
2104
2143
|
return pulumi.get(self, "url")
|
2105
2144
|
|
2106
|
-
@property
|
2145
|
+
@_builtins.property
|
2107
2146
|
@pulumi.getter
|
2108
|
-
def userattr(self) -> pulumi.Output[
|
2147
|
+
def userattr(self) -> pulumi.Output[_builtins.str]:
|
2109
2148
|
"""
|
2110
2149
|
Attribute used when searching users. Defaults to `cn`.
|
2111
2150
|
"""
|
2112
2151
|
return pulumi.get(self, "userattr")
|
2113
2152
|
|
2114
|
-
@property
|
2153
|
+
@_builtins.property
|
2115
2154
|
@pulumi.getter
|
2116
|
-
def userdn(self) -> pulumi.Output[Optional[
|
2155
|
+
def userdn(self) -> pulumi.Output[Optional[_builtins.str]]:
|
2117
2156
|
"""
|
2118
2157
|
LDAP domain to use for users (eg: ou=People,dc=example,dc=org)`.
|
2119
2158
|
"""
|