pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +19 -1
- pulumi_vault/_inputs.py +873 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +1016 -439
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +1057 -285
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +887 -256
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +426 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +878 -336
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +400 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +1006 -227
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +431 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +732 -693
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +380 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +909 -271
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +234 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +205 -159
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +902 -231
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +217 -124
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +833 -155
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +377 -350
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0.dist-info/RECORD +270 -0
- pulumi_vault-7.1.0.dist-info/RECORD +0 -268
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
pulumi_vault/mount.py
CHANGED
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,56 +19,58 @@ __all__ = ['MountArgs', 'Mount']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class MountArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
path: pulumi.Input[
|
24
|
-
type: pulumi.Input[
|
25
|
-
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
26
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
27
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
28
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
29
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
30
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[
|
31
|
-
description: Optional[pulumi.Input[
|
32
|
-
external_entropy_access: Optional[pulumi.Input[
|
33
|
-
|
34
|
-
|
35
|
-
|
36
|
-
|
37
|
-
|
38
|
-
|
39
|
-
|
40
|
-
|
41
|
-
|
22
|
+
path: pulumi.Input[_builtins.str],
|
23
|
+
type: pulumi.Input[_builtins.str],
|
24
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
25
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
26
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
27
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
28
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
29
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
30
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
31
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
32
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
33
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
34
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
35
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
36
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
37
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
38
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
39
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
40
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
41
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None):
|
42
42
|
"""
|
43
43
|
The set of arguments for constructing a Mount resource.
|
44
|
-
:param pulumi.Input[
|
45
|
-
:param pulumi.Input[
|
46
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
47
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
44
|
+
:param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
|
45
|
+
:param pulumi.Input[_builtins.str] type: Type of the backend, such as "aws"
|
46
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
|
47
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow, allowing a plugin to include
|
48
48
|
them in the response.
|
49
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
50
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
51
|
-
:param pulumi.Input[
|
52
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
49
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
50
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
51
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
52
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of allowed authentication mount accessors the
|
53
53
|
backend can request delegated authentication for.
|
54
|
-
:param pulumi.Input[
|
55
|
-
:param pulumi.Input[
|
56
|
-
:param pulumi.Input[
|
54
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
55
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
56
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
57
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens. If
|
57
58
|
not provided, this will default to Vault's OIDC default key.
|
58
|
-
:param pulumi.Input[
|
59
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
59
60
|
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
60
|
-
:param pulumi.Input[
|
61
|
-
:param pulumi.Input[
|
62
|
-
:param pulumi.Input[
|
61
|
+
:param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
62
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
63
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
63
64
|
The value should not contain leading or trailing forward slashes.
|
64
65
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
65
66
|
*Available only for Vault Enterprise*.
|
66
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
67
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
67
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
68
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to
|
68
69
|
the plugin.
|
69
|
-
:param pulumi.Input[
|
70
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
|
70
71
|
If unspecified, the server will select any matching unversioned plugin that may have been
|
71
72
|
registered, the latest versioned plugin registered, or a built-in plugin in that order of precedence.
|
72
|
-
:param pulumi.Input[
|
73
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
73
74
|
"""
|
74
75
|
pulumi.set(__self__, "path", path)
|
75
76
|
pulumi.set(__self__, "type", type)
|
@@ -89,6 +90,8 @@ class MountArgs:
|
|
89
90
|
pulumi.set(__self__, "description", description)
|
90
91
|
if external_entropy_access is not None:
|
91
92
|
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
93
|
+
if force_no_cache is not None:
|
94
|
+
pulumi.set(__self__, "force_no_cache", force_no_cache)
|
92
95
|
if identity_token_key is not None:
|
93
96
|
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
94
97
|
if listing_visibility is not None:
|
@@ -108,45 +111,45 @@ class MountArgs:
|
|
108
111
|
if seal_wrap is not None:
|
109
112
|
pulumi.set(__self__, "seal_wrap", seal_wrap)
|
110
113
|
|
111
|
-
@property
|
114
|
+
@_builtins.property
|
112
115
|
@pulumi.getter
|
113
|
-
def path(self) -> pulumi.Input[
|
116
|
+
def path(self) -> pulumi.Input[_builtins.str]:
|
114
117
|
"""
|
115
118
|
Where the secret backend will be mounted
|
116
119
|
"""
|
117
120
|
return pulumi.get(self, "path")
|
118
121
|
|
119
122
|
@path.setter
|
120
|
-
def path(self, value: pulumi.Input[
|
123
|
+
def path(self, value: pulumi.Input[_builtins.str]):
|
121
124
|
pulumi.set(self, "path", value)
|
122
125
|
|
123
|
-
@property
|
126
|
+
@_builtins.property
|
124
127
|
@pulumi.getter
|
125
|
-
def type(self) -> pulumi.Input[
|
128
|
+
def type(self) -> pulumi.Input[_builtins.str]:
|
126
129
|
"""
|
127
130
|
Type of the backend, such as "aws"
|
128
131
|
"""
|
129
132
|
return pulumi.get(self, "type")
|
130
133
|
|
131
134
|
@type.setter
|
132
|
-
def type(self, value: pulumi.Input[
|
135
|
+
def type(self, value: pulumi.Input[_builtins.str]):
|
133
136
|
pulumi.set(self, "type", value)
|
134
137
|
|
135
|
-
@property
|
138
|
+
@_builtins.property
|
136
139
|
@pulumi.getter(name="allowedManagedKeys")
|
137
|
-
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
140
|
+
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
138
141
|
"""
|
139
142
|
Set of managed key registry entry names that the mount in question is allowed to access
|
140
143
|
"""
|
141
144
|
return pulumi.get(self, "allowed_managed_keys")
|
142
145
|
|
143
146
|
@allowed_managed_keys.setter
|
144
|
-
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
147
|
+
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
145
148
|
pulumi.set(self, "allowed_managed_keys", value)
|
146
149
|
|
147
|
-
@property
|
150
|
+
@_builtins.property
|
148
151
|
@pulumi.getter(name="allowedResponseHeaders")
|
149
|
-
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
152
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
150
153
|
"""
|
151
154
|
List of headers to allow, allowing a plugin to include
|
152
155
|
them in the response.
|
@@ -154,48 +157,48 @@ class MountArgs:
|
|
154
157
|
return pulumi.get(self, "allowed_response_headers")
|
155
158
|
|
156
159
|
@allowed_response_headers.setter
|
157
|
-
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
160
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
158
161
|
pulumi.set(self, "allowed_response_headers", value)
|
159
162
|
|
160
|
-
@property
|
163
|
+
@_builtins.property
|
161
164
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
162
|
-
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
165
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
163
166
|
"""
|
164
167
|
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
165
168
|
"""
|
166
169
|
return pulumi.get(self, "audit_non_hmac_request_keys")
|
167
170
|
|
168
171
|
@audit_non_hmac_request_keys.setter
|
169
|
-
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
172
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
170
173
|
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
171
174
|
|
172
|
-
@property
|
175
|
+
@_builtins.property
|
173
176
|
@pulumi.getter(name="auditNonHmacResponseKeys")
|
174
|
-
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
177
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
175
178
|
"""
|
176
179
|
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
177
180
|
"""
|
178
181
|
return pulumi.get(self, "audit_non_hmac_response_keys")
|
179
182
|
|
180
183
|
@audit_non_hmac_response_keys.setter
|
181
|
-
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
184
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
182
185
|
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
183
186
|
|
184
|
-
@property
|
187
|
+
@_builtins.property
|
185
188
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
186
|
-
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
189
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
187
190
|
"""
|
188
191
|
Default lease duration for tokens and secrets in seconds
|
189
192
|
"""
|
190
193
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
191
194
|
|
192
195
|
@default_lease_ttl_seconds.setter
|
193
|
-
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
196
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
194
197
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
195
198
|
|
196
|
-
@property
|
199
|
+
@_builtins.property
|
197
200
|
@pulumi.getter(name="delegatedAuthAccessors")
|
198
|
-
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
201
|
+
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
199
202
|
"""
|
200
203
|
List of allowed authentication mount accessors the
|
201
204
|
backend can request delegated authentication for.
|
@@ -203,36 +206,48 @@ class MountArgs:
|
|
203
206
|
return pulumi.get(self, "delegated_auth_accessors")
|
204
207
|
|
205
208
|
@delegated_auth_accessors.setter
|
206
|
-
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
209
|
+
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
207
210
|
pulumi.set(self, "delegated_auth_accessors", value)
|
208
211
|
|
209
|
-
@property
|
212
|
+
@_builtins.property
|
210
213
|
@pulumi.getter
|
211
|
-
def description(self) -> Optional[pulumi.Input[
|
214
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
212
215
|
"""
|
213
216
|
Human-friendly description of the mount
|
214
217
|
"""
|
215
218
|
return pulumi.get(self, "description")
|
216
219
|
|
217
220
|
@description.setter
|
218
|
-
def description(self, value: Optional[pulumi.Input[
|
221
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
219
222
|
pulumi.set(self, "description", value)
|
220
223
|
|
221
|
-
@property
|
224
|
+
@_builtins.property
|
222
225
|
@pulumi.getter(name="externalEntropyAccess")
|
223
|
-
def external_entropy_access(self) -> Optional[pulumi.Input[
|
226
|
+
def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
224
227
|
"""
|
225
228
|
Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
226
229
|
"""
|
227
230
|
return pulumi.get(self, "external_entropy_access")
|
228
231
|
|
229
232
|
@external_entropy_access.setter
|
230
|
-
def external_entropy_access(self, value: Optional[pulumi.Input[
|
233
|
+
def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
231
234
|
pulumi.set(self, "external_entropy_access", value)
|
232
235
|
|
233
|
-
@property
|
236
|
+
@_builtins.property
|
237
|
+
@pulumi.getter(name="forceNoCache")
|
238
|
+
def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
239
|
+
"""
|
240
|
+
If set to true, disables caching.
|
241
|
+
"""
|
242
|
+
return pulumi.get(self, "force_no_cache")
|
243
|
+
|
244
|
+
@force_no_cache.setter
|
245
|
+
def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
246
|
+
pulumi.set(self, "force_no_cache", value)
|
247
|
+
|
248
|
+
@_builtins.property
|
234
249
|
@pulumi.getter(name="identityTokenKey")
|
235
|
-
def identity_token_key(self) -> Optional[pulumi.Input[
|
250
|
+
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
236
251
|
"""
|
237
252
|
The key to use for signing plugin workload identity tokens. If
|
238
253
|
not provided, this will default to Vault's OIDC default key.
|
@@ -240,12 +255,12 @@ class MountArgs:
|
|
240
255
|
return pulumi.get(self, "identity_token_key")
|
241
256
|
|
242
257
|
@identity_token_key.setter
|
243
|
-
def identity_token_key(self, value: Optional[pulumi.Input[
|
258
|
+
def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
244
259
|
pulumi.set(self, "identity_token_key", value)
|
245
260
|
|
246
|
-
@property
|
261
|
+
@_builtins.property
|
247
262
|
@pulumi.getter(name="listingVisibility")
|
248
|
-
def listing_visibility(self) -> Optional[pulumi.Input[
|
263
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
249
264
|
"""
|
250
265
|
Specifies whether to show this mount in the UI-specific
|
251
266
|
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
@@ -253,36 +268,36 @@ class MountArgs:
|
|
253
268
|
return pulumi.get(self, "listing_visibility")
|
254
269
|
|
255
270
|
@listing_visibility.setter
|
256
|
-
def listing_visibility(self, value: Optional[pulumi.Input[
|
271
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
257
272
|
pulumi.set(self, "listing_visibility", value)
|
258
273
|
|
259
|
-
@property
|
274
|
+
@_builtins.property
|
260
275
|
@pulumi.getter
|
261
|
-
def local(self) -> Optional[pulumi.Input[
|
276
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
262
277
|
"""
|
263
278
|
Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
264
279
|
"""
|
265
280
|
return pulumi.get(self, "local")
|
266
281
|
|
267
282
|
@local.setter
|
268
|
-
def local(self, value: Optional[pulumi.Input[
|
283
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
269
284
|
pulumi.set(self, "local", value)
|
270
285
|
|
271
|
-
@property
|
286
|
+
@_builtins.property
|
272
287
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
273
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
288
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
274
289
|
"""
|
275
290
|
Maximum possible lease duration for tokens and secrets in seconds
|
276
291
|
"""
|
277
292
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
278
293
|
|
279
294
|
@max_lease_ttl_seconds.setter
|
280
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
295
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
281
296
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
282
297
|
|
283
|
-
@property
|
298
|
+
@_builtins.property
|
284
299
|
@pulumi.getter
|
285
|
-
def namespace(self) -> Optional[pulumi.Input[
|
300
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
286
301
|
"""
|
287
302
|
The namespace to provision the resource in.
|
288
303
|
The value should not contain leading or trailing forward slashes.
|
@@ -292,24 +307,24 @@ class MountArgs:
|
|
292
307
|
return pulumi.get(self, "namespace")
|
293
308
|
|
294
309
|
@namespace.setter
|
295
|
-
def namespace(self, value: Optional[pulumi.Input[
|
310
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
296
311
|
pulumi.set(self, "namespace", value)
|
297
312
|
|
298
|
-
@property
|
313
|
+
@_builtins.property
|
299
314
|
@pulumi.getter
|
300
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
315
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
301
316
|
"""
|
302
317
|
Specifies mount type specific options that are passed to the backend
|
303
318
|
"""
|
304
319
|
return pulumi.get(self, "options")
|
305
320
|
|
306
321
|
@options.setter
|
307
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
322
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
308
323
|
pulumi.set(self, "options", value)
|
309
324
|
|
310
|
-
@property
|
325
|
+
@_builtins.property
|
311
326
|
@pulumi.getter(name="passthroughRequestHeaders")
|
312
|
-
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
327
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
313
328
|
"""
|
314
329
|
List of headers to allow and pass from the request to
|
315
330
|
the plugin.
|
@@ -317,12 +332,12 @@ class MountArgs:
|
|
317
332
|
return pulumi.get(self, "passthrough_request_headers")
|
318
333
|
|
319
334
|
@passthrough_request_headers.setter
|
320
|
-
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
335
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
321
336
|
pulumi.set(self, "passthrough_request_headers", value)
|
322
337
|
|
323
|
-
@property
|
338
|
+
@_builtins.property
|
324
339
|
@pulumi.getter(name="pluginVersion")
|
325
|
-
def plugin_version(self) -> Optional[pulumi.Input[
|
340
|
+
def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
|
326
341
|
"""
|
327
342
|
Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
|
328
343
|
If unspecified, the server will select any matching unversioned plugin that may have been
|
@@ -331,77 +346,79 @@ class MountArgs:
|
|
331
346
|
return pulumi.get(self, "plugin_version")
|
332
347
|
|
333
348
|
@plugin_version.setter
|
334
|
-
def plugin_version(self, value: Optional[pulumi.Input[
|
349
|
+
def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
|
335
350
|
pulumi.set(self, "plugin_version", value)
|
336
351
|
|
337
|
-
@property
|
352
|
+
@_builtins.property
|
338
353
|
@pulumi.getter(name="sealWrap")
|
339
|
-
def seal_wrap(self) -> Optional[pulumi.Input[
|
354
|
+
def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
340
355
|
"""
|
341
356
|
Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
342
357
|
"""
|
343
358
|
return pulumi.get(self, "seal_wrap")
|
344
359
|
|
345
360
|
@seal_wrap.setter
|
346
|
-
def seal_wrap(self, value: Optional[pulumi.Input[
|
361
|
+
def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
347
362
|
pulumi.set(self, "seal_wrap", value)
|
348
363
|
|
349
364
|
|
350
365
|
@pulumi.input_type
|
351
366
|
class _MountState:
|
352
367
|
def __init__(__self__, *,
|
353
|
-
accessor: Optional[pulumi.Input[
|
354
|
-
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
355
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
356
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
357
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
358
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
359
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[
|
360
|
-
description: Optional[pulumi.Input[
|
361
|
-
external_entropy_access: Optional[pulumi.Input[
|
362
|
-
|
363
|
-
|
364
|
-
|
365
|
-
|
366
|
-
|
367
|
-
|
368
|
-
|
369
|
-
|
370
|
-
|
371
|
-
|
372
|
-
|
368
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
369
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
370
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
371
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
372
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
373
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
374
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
375
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
376
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
377
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
378
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
379
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
380
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
381
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
382
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
383
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
384
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
385
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
386
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
387
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
388
|
+
type: Optional[pulumi.Input[_builtins.str]] = None):
|
373
389
|
"""
|
374
390
|
Input properties used for looking up and filtering Mount resources.
|
375
|
-
:param pulumi.Input[
|
376
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
377
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
391
|
+
:param pulumi.Input[_builtins.str] accessor: The accessor for this mount.
|
392
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
|
393
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow, allowing a plugin to include
|
378
394
|
them in the response.
|
379
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
380
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
381
|
-
:param pulumi.Input[
|
382
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
395
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
396
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
397
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
398
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of allowed authentication mount accessors the
|
383
399
|
backend can request delegated authentication for.
|
384
|
-
:param pulumi.Input[
|
385
|
-
:param pulumi.Input[
|
386
|
-
:param pulumi.Input[
|
400
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
401
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
402
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
403
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens. If
|
387
404
|
not provided, this will default to Vault's OIDC default key.
|
388
|
-
:param pulumi.Input[
|
405
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
389
406
|
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
390
|
-
:param pulumi.Input[
|
391
|
-
:param pulumi.Input[
|
392
|
-
:param pulumi.Input[
|
407
|
+
:param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
408
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
409
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
393
410
|
The value should not contain leading or trailing forward slashes.
|
394
411
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
395
412
|
*Available only for Vault Enterprise*.
|
396
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
397
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
413
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
414
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to
|
398
415
|
the plugin.
|
399
|
-
:param pulumi.Input[
|
400
|
-
:param pulumi.Input[
|
416
|
+
:param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
|
417
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
|
401
418
|
If unspecified, the server will select any matching unversioned plugin that may have been
|
402
419
|
registered, the latest versioned plugin registered, or a built-in plugin in that order of precedence.
|
403
|
-
:param pulumi.Input[
|
404
|
-
:param pulumi.Input[
|
420
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
421
|
+
:param pulumi.Input[_builtins.str] type: Type of the backend, such as "aws"
|
405
422
|
"""
|
406
423
|
if accessor is not None:
|
407
424
|
pulumi.set(__self__, "accessor", accessor)
|
@@ -421,6 +438,8 @@ class _MountState:
|
|
421
438
|
pulumi.set(__self__, "description", description)
|
422
439
|
if external_entropy_access is not None:
|
423
440
|
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
441
|
+
if force_no_cache is not None:
|
442
|
+
pulumi.set(__self__, "force_no_cache", force_no_cache)
|
424
443
|
if identity_token_key is not None:
|
425
444
|
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
426
445
|
if listing_visibility is not None:
|
@@ -444,33 +463,33 @@ class _MountState:
|
|
444
463
|
if type is not None:
|
445
464
|
pulumi.set(__self__, "type", type)
|
446
465
|
|
447
|
-
@property
|
466
|
+
@_builtins.property
|
448
467
|
@pulumi.getter
|
449
|
-
def accessor(self) -> Optional[pulumi.Input[
|
468
|
+
def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
|
450
469
|
"""
|
451
470
|
The accessor for this mount.
|
452
471
|
"""
|
453
472
|
return pulumi.get(self, "accessor")
|
454
473
|
|
455
474
|
@accessor.setter
|
456
|
-
def accessor(self, value: Optional[pulumi.Input[
|
475
|
+
def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
|
457
476
|
pulumi.set(self, "accessor", value)
|
458
477
|
|
459
|
-
@property
|
478
|
+
@_builtins.property
|
460
479
|
@pulumi.getter(name="allowedManagedKeys")
|
461
|
-
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
480
|
+
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
462
481
|
"""
|
463
482
|
Set of managed key registry entry names that the mount in question is allowed to access
|
464
483
|
"""
|
465
484
|
return pulumi.get(self, "allowed_managed_keys")
|
466
485
|
|
467
486
|
@allowed_managed_keys.setter
|
468
|
-
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
487
|
+
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
469
488
|
pulumi.set(self, "allowed_managed_keys", value)
|
470
489
|
|
471
|
-
@property
|
490
|
+
@_builtins.property
|
472
491
|
@pulumi.getter(name="allowedResponseHeaders")
|
473
|
-
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
492
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
474
493
|
"""
|
475
494
|
List of headers to allow, allowing a plugin to include
|
476
495
|
them in the response.
|
@@ -478,48 +497,48 @@ class _MountState:
|
|
478
497
|
return pulumi.get(self, "allowed_response_headers")
|
479
498
|
|
480
499
|
@allowed_response_headers.setter
|
481
|
-
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
500
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
482
501
|
pulumi.set(self, "allowed_response_headers", value)
|
483
502
|
|
484
|
-
@property
|
503
|
+
@_builtins.property
|
485
504
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
486
|
-
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
505
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
487
506
|
"""
|
488
507
|
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
489
508
|
"""
|
490
509
|
return pulumi.get(self, "audit_non_hmac_request_keys")
|
491
510
|
|
492
511
|
@audit_non_hmac_request_keys.setter
|
493
|
-
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
512
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
494
513
|
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
495
514
|
|
496
|
-
@property
|
515
|
+
@_builtins.property
|
497
516
|
@pulumi.getter(name="auditNonHmacResponseKeys")
|
498
|
-
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
517
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
499
518
|
"""
|
500
519
|
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
501
520
|
"""
|
502
521
|
return pulumi.get(self, "audit_non_hmac_response_keys")
|
503
522
|
|
504
523
|
@audit_non_hmac_response_keys.setter
|
505
|
-
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
524
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
506
525
|
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
507
526
|
|
508
|
-
@property
|
527
|
+
@_builtins.property
|
509
528
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
510
|
-
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
529
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
511
530
|
"""
|
512
531
|
Default lease duration for tokens and secrets in seconds
|
513
532
|
"""
|
514
533
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
515
534
|
|
516
535
|
@default_lease_ttl_seconds.setter
|
517
|
-
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
536
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
518
537
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
519
538
|
|
520
|
-
@property
|
539
|
+
@_builtins.property
|
521
540
|
@pulumi.getter(name="delegatedAuthAccessors")
|
522
|
-
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
541
|
+
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
523
542
|
"""
|
524
543
|
List of allowed authentication mount accessors the
|
525
544
|
backend can request delegated authentication for.
|
@@ -527,36 +546,48 @@ class _MountState:
|
|
527
546
|
return pulumi.get(self, "delegated_auth_accessors")
|
528
547
|
|
529
548
|
@delegated_auth_accessors.setter
|
530
|
-
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
549
|
+
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
531
550
|
pulumi.set(self, "delegated_auth_accessors", value)
|
532
551
|
|
533
|
-
@property
|
552
|
+
@_builtins.property
|
534
553
|
@pulumi.getter
|
535
|
-
def description(self) -> Optional[pulumi.Input[
|
554
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
536
555
|
"""
|
537
556
|
Human-friendly description of the mount
|
538
557
|
"""
|
539
558
|
return pulumi.get(self, "description")
|
540
559
|
|
541
560
|
@description.setter
|
542
|
-
def description(self, value: Optional[pulumi.Input[
|
561
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
543
562
|
pulumi.set(self, "description", value)
|
544
563
|
|
545
|
-
@property
|
564
|
+
@_builtins.property
|
546
565
|
@pulumi.getter(name="externalEntropyAccess")
|
547
|
-
def external_entropy_access(self) -> Optional[pulumi.Input[
|
566
|
+
def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
548
567
|
"""
|
549
568
|
Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
550
569
|
"""
|
551
570
|
return pulumi.get(self, "external_entropy_access")
|
552
571
|
|
553
572
|
@external_entropy_access.setter
|
554
|
-
def external_entropy_access(self, value: Optional[pulumi.Input[
|
573
|
+
def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
555
574
|
pulumi.set(self, "external_entropy_access", value)
|
556
575
|
|
557
|
-
@property
|
576
|
+
@_builtins.property
|
577
|
+
@pulumi.getter(name="forceNoCache")
|
578
|
+
def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
579
|
+
"""
|
580
|
+
If set to true, disables caching.
|
581
|
+
"""
|
582
|
+
return pulumi.get(self, "force_no_cache")
|
583
|
+
|
584
|
+
@force_no_cache.setter
|
585
|
+
def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
586
|
+
pulumi.set(self, "force_no_cache", value)
|
587
|
+
|
588
|
+
@_builtins.property
|
558
589
|
@pulumi.getter(name="identityTokenKey")
|
559
|
-
def identity_token_key(self) -> Optional[pulumi.Input[
|
590
|
+
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
560
591
|
"""
|
561
592
|
The key to use for signing plugin workload identity tokens. If
|
562
593
|
not provided, this will default to Vault's OIDC default key.
|
@@ -564,12 +595,12 @@ class _MountState:
|
|
564
595
|
return pulumi.get(self, "identity_token_key")
|
565
596
|
|
566
597
|
@identity_token_key.setter
|
567
|
-
def identity_token_key(self, value: Optional[pulumi.Input[
|
598
|
+
def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
568
599
|
pulumi.set(self, "identity_token_key", value)
|
569
600
|
|
570
|
-
@property
|
601
|
+
@_builtins.property
|
571
602
|
@pulumi.getter(name="listingVisibility")
|
572
|
-
def listing_visibility(self) -> Optional[pulumi.Input[
|
603
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
573
604
|
"""
|
574
605
|
Specifies whether to show this mount in the UI-specific
|
575
606
|
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
@@ -577,36 +608,36 @@ class _MountState:
|
|
577
608
|
return pulumi.get(self, "listing_visibility")
|
578
609
|
|
579
610
|
@listing_visibility.setter
|
580
|
-
def listing_visibility(self, value: Optional[pulumi.Input[
|
611
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
581
612
|
pulumi.set(self, "listing_visibility", value)
|
582
613
|
|
583
|
-
@property
|
614
|
+
@_builtins.property
|
584
615
|
@pulumi.getter
|
585
|
-
def local(self) -> Optional[pulumi.Input[
|
616
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
586
617
|
"""
|
587
618
|
Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
588
619
|
"""
|
589
620
|
return pulumi.get(self, "local")
|
590
621
|
|
591
622
|
@local.setter
|
592
|
-
def local(self, value: Optional[pulumi.Input[
|
623
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
593
624
|
pulumi.set(self, "local", value)
|
594
625
|
|
595
|
-
@property
|
626
|
+
@_builtins.property
|
596
627
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
597
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
628
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
598
629
|
"""
|
599
630
|
Maximum possible lease duration for tokens and secrets in seconds
|
600
631
|
"""
|
601
632
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
602
633
|
|
603
634
|
@max_lease_ttl_seconds.setter
|
604
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
635
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
605
636
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
606
637
|
|
607
|
-
@property
|
638
|
+
@_builtins.property
|
608
639
|
@pulumi.getter
|
609
|
-
def namespace(self) -> Optional[pulumi.Input[
|
640
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
610
641
|
"""
|
611
642
|
The namespace to provision the resource in.
|
612
643
|
The value should not contain leading or trailing forward slashes.
|
@@ -616,24 +647,24 @@ class _MountState:
|
|
616
647
|
return pulumi.get(self, "namespace")
|
617
648
|
|
618
649
|
@namespace.setter
|
619
|
-
def namespace(self, value: Optional[pulumi.Input[
|
650
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
620
651
|
pulumi.set(self, "namespace", value)
|
621
652
|
|
622
|
-
@property
|
653
|
+
@_builtins.property
|
623
654
|
@pulumi.getter
|
624
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
655
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
625
656
|
"""
|
626
657
|
Specifies mount type specific options that are passed to the backend
|
627
658
|
"""
|
628
659
|
return pulumi.get(self, "options")
|
629
660
|
|
630
661
|
@options.setter
|
631
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
662
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
632
663
|
pulumi.set(self, "options", value)
|
633
664
|
|
634
|
-
@property
|
665
|
+
@_builtins.property
|
635
666
|
@pulumi.getter(name="passthroughRequestHeaders")
|
636
|
-
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
667
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
637
668
|
"""
|
638
669
|
List of headers to allow and pass from the request to
|
639
670
|
the plugin.
|
@@ -641,24 +672,24 @@ class _MountState:
|
|
641
672
|
return pulumi.get(self, "passthrough_request_headers")
|
642
673
|
|
643
674
|
@passthrough_request_headers.setter
|
644
|
-
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
675
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
645
676
|
pulumi.set(self, "passthrough_request_headers", value)
|
646
677
|
|
647
|
-
@property
|
678
|
+
@_builtins.property
|
648
679
|
@pulumi.getter
|
649
|
-
def path(self) -> Optional[pulumi.Input[
|
680
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
650
681
|
"""
|
651
682
|
Where the secret backend will be mounted
|
652
683
|
"""
|
653
684
|
return pulumi.get(self, "path")
|
654
685
|
|
655
686
|
@path.setter
|
656
|
-
def path(self, value: Optional[pulumi.Input[
|
687
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
657
688
|
pulumi.set(self, "path", value)
|
658
689
|
|
659
|
-
@property
|
690
|
+
@_builtins.property
|
660
691
|
@pulumi.getter(name="pluginVersion")
|
661
|
-
def plugin_version(self) -> Optional[pulumi.Input[
|
692
|
+
def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
|
662
693
|
"""
|
663
694
|
Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
|
664
695
|
If unspecified, the server will select any matching unversioned plugin that may have been
|
@@ -667,31 +698,31 @@ class _MountState:
|
|
667
698
|
return pulumi.get(self, "plugin_version")
|
668
699
|
|
669
700
|
@plugin_version.setter
|
670
|
-
def plugin_version(self, value: Optional[pulumi.Input[
|
701
|
+
def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
|
671
702
|
pulumi.set(self, "plugin_version", value)
|
672
703
|
|
673
|
-
@property
|
704
|
+
@_builtins.property
|
674
705
|
@pulumi.getter(name="sealWrap")
|
675
|
-
def seal_wrap(self) -> Optional[pulumi.Input[
|
706
|
+
def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
676
707
|
"""
|
677
708
|
Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
678
709
|
"""
|
679
710
|
return pulumi.get(self, "seal_wrap")
|
680
711
|
|
681
712
|
@seal_wrap.setter
|
682
|
-
def seal_wrap(self, value: Optional[pulumi.Input[
|
713
|
+
def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
683
714
|
pulumi.set(self, "seal_wrap", value)
|
684
715
|
|
685
|
-
@property
|
716
|
+
@_builtins.property
|
686
717
|
@pulumi.getter
|
687
|
-
def type(self) -> Optional[pulumi.Input[
|
718
|
+
def type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
688
719
|
"""
|
689
720
|
Type of the backend, such as "aws"
|
690
721
|
"""
|
691
722
|
return pulumi.get(self, "type")
|
692
723
|
|
693
724
|
@type.setter
|
694
|
-
def type(self, value: Optional[pulumi.Input[
|
725
|
+
def type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
695
726
|
pulumi.set(self, "type", value)
|
696
727
|
|
697
728
|
|
@@ -701,25 +732,26 @@ class Mount(pulumi.CustomResource):
|
|
701
732
|
def __init__(__self__,
|
702
733
|
resource_name: str,
|
703
734
|
opts: Optional[pulumi.ResourceOptions] = None,
|
704
|
-
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
705
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
706
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
707
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
708
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
709
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[
|
710
|
-
description: Optional[pulumi.Input[
|
711
|
-
external_entropy_access: Optional[pulumi.Input[
|
712
|
-
|
713
|
-
|
714
|
-
|
715
|
-
|
716
|
-
|
717
|
-
|
718
|
-
|
719
|
-
|
720
|
-
|
721
|
-
|
722
|
-
|
735
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
736
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
737
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
738
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
739
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
740
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
741
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
742
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
743
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
744
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
745
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
746
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
747
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
748
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
749
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
750
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
751
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
752
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
753
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
754
|
+
type: Optional[pulumi.Input[_builtins.str]] = None,
|
723
755
|
__props__=None):
|
724
756
|
"""
|
725
757
|
This resource enables a new secrets engine at the given path.
|
@@ -785,35 +817,36 @@ class Mount(pulumi.CustomResource):
|
|
785
817
|
|
786
818
|
:param str resource_name: The name of the resource.
|
787
819
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
788
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
789
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
820
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
|
821
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow, allowing a plugin to include
|
790
822
|
them in the response.
|
791
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
792
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
793
|
-
:param pulumi.Input[
|
794
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
823
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
824
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
825
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
826
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of allowed authentication mount accessors the
|
795
827
|
backend can request delegated authentication for.
|
796
|
-
:param pulumi.Input[
|
797
|
-
:param pulumi.Input[
|
798
|
-
:param pulumi.Input[
|
828
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
829
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
830
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
831
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens. If
|
799
832
|
not provided, this will default to Vault's OIDC default key.
|
800
|
-
:param pulumi.Input[
|
833
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
801
834
|
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
802
|
-
:param pulumi.Input[
|
803
|
-
:param pulumi.Input[
|
804
|
-
:param pulumi.Input[
|
835
|
+
:param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
836
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
837
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
805
838
|
The value should not contain leading or trailing forward slashes.
|
806
839
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
807
840
|
*Available only for Vault Enterprise*.
|
808
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
809
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
841
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
842
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to
|
810
843
|
the plugin.
|
811
|
-
:param pulumi.Input[
|
812
|
-
:param pulumi.Input[
|
844
|
+
:param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
|
845
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
|
813
846
|
If unspecified, the server will select any matching unversioned plugin that may have been
|
814
847
|
registered, the latest versioned plugin registered, or a built-in plugin in that order of precedence.
|
815
|
-
:param pulumi.Input[
|
816
|
-
:param pulumi.Input[
|
848
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
849
|
+
:param pulumi.Input[_builtins.str] type: Type of the backend, such as "aws"
|
817
850
|
"""
|
818
851
|
...
|
819
852
|
@overload
|
@@ -898,25 +931,26 @@ class Mount(pulumi.CustomResource):
|
|
898
931
|
def _internal_init(__self__,
|
899
932
|
resource_name: str,
|
900
933
|
opts: Optional[pulumi.ResourceOptions] = None,
|
901
|
-
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
902
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
903
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
904
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
905
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
906
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[
|
907
|
-
description: Optional[pulumi.Input[
|
908
|
-
external_entropy_access: Optional[pulumi.Input[
|
909
|
-
|
910
|
-
|
911
|
-
|
912
|
-
|
913
|
-
|
914
|
-
|
915
|
-
|
916
|
-
|
917
|
-
|
918
|
-
|
919
|
-
|
934
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
935
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
936
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
937
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
938
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
939
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
940
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
941
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
942
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
943
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
944
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
945
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
946
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
947
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
948
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
949
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
950
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
951
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
952
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
953
|
+
type: Optional[pulumi.Input[_builtins.str]] = None,
|
920
954
|
__props__=None):
|
921
955
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
922
956
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -934,6 +968,7 @@ class Mount(pulumi.CustomResource):
|
|
934
968
|
__props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
|
935
969
|
__props__.__dict__["description"] = description
|
936
970
|
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
971
|
+
__props__.__dict__["force_no_cache"] = force_no_cache
|
937
972
|
__props__.__dict__["identity_token_key"] = identity_token_key
|
938
973
|
__props__.__dict__["listing_visibility"] = listing_visibility
|
939
974
|
__props__.__dict__["local"] = local
|
@@ -960,26 +995,27 @@ class Mount(pulumi.CustomResource):
|
|
960
995
|
def get(resource_name: str,
|
961
996
|
id: pulumi.Input[str],
|
962
997
|
opts: Optional[pulumi.ResourceOptions] = None,
|
963
|
-
accessor: Optional[pulumi.Input[
|
964
|
-
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
965
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
966
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
967
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
968
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
969
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[
|
970
|
-
description: Optional[pulumi.Input[
|
971
|
-
external_entropy_access: Optional[pulumi.Input[
|
972
|
-
|
973
|
-
|
974
|
-
|
975
|
-
|
976
|
-
|
977
|
-
|
978
|
-
|
979
|
-
|
980
|
-
|
981
|
-
|
982
|
-
|
998
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
999
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1000
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1001
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1002
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1003
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1004
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1005
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
1006
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
1007
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
1008
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1009
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
1010
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
1011
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1012
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1013
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
1014
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1015
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
1016
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
1017
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
1018
|
+
type: Optional[pulumi.Input[_builtins.str]] = None) -> 'Mount':
|
983
1019
|
"""
|
984
1020
|
Get an existing Mount resource's state with the given name, id, and optional extra
|
985
1021
|
properties used to qualify the lookup.
|
@@ -987,36 +1023,37 @@ class Mount(pulumi.CustomResource):
|
|
987
1023
|
:param str resource_name: The unique name of the resulting resource.
|
988
1024
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
989
1025
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
990
|
-
:param pulumi.Input[
|
991
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
992
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1026
|
+
:param pulumi.Input[_builtins.str] accessor: The accessor for this mount.
|
1027
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
|
1028
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow, allowing a plugin to include
|
993
1029
|
them in the response.
|
994
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
995
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
996
|
-
:param pulumi.Input[
|
997
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1030
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1031
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1032
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
1033
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of allowed authentication mount accessors the
|
998
1034
|
backend can request delegated authentication for.
|
999
|
-
:param pulumi.Input[
|
1000
|
-
:param pulumi.Input[
|
1001
|
-
:param pulumi.Input[
|
1035
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
1036
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
1037
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
1038
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens. If
|
1002
1039
|
not provided, this will default to Vault's OIDC default key.
|
1003
|
-
:param pulumi.Input[
|
1040
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
1004
1041
|
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
1005
|
-
:param pulumi.Input[
|
1006
|
-
:param pulumi.Input[
|
1007
|
-
:param pulumi.Input[
|
1042
|
+
:param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
1043
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
1044
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
1008
1045
|
The value should not contain leading or trailing forward slashes.
|
1009
1046
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1010
1047
|
*Available only for Vault Enterprise*.
|
1011
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
1012
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1048
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
1049
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to
|
1013
1050
|
the plugin.
|
1014
|
-
:param pulumi.Input[
|
1015
|
-
:param pulumi.Input[
|
1051
|
+
:param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
|
1052
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
|
1016
1053
|
If unspecified, the server will select any matching unversioned plugin that may have been
|
1017
1054
|
registered, the latest versioned plugin registered, or a built-in plugin in that order of precedence.
|
1018
|
-
:param pulumi.Input[
|
1019
|
-
:param pulumi.Input[
|
1055
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1056
|
+
:param pulumi.Input[_builtins.str] type: Type of the backend, such as "aws"
|
1020
1057
|
"""
|
1021
1058
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
1022
1059
|
|
@@ -1031,6 +1068,7 @@ class Mount(pulumi.CustomResource):
|
|
1031
1068
|
__props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
|
1032
1069
|
__props__.__dict__["description"] = description
|
1033
1070
|
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
1071
|
+
__props__.__dict__["force_no_cache"] = force_no_cache
|
1034
1072
|
__props__.__dict__["identity_token_key"] = identity_token_key
|
1035
1073
|
__props__.__dict__["listing_visibility"] = listing_visibility
|
1036
1074
|
__props__.__dict__["local"] = local
|
@@ -1044,117 +1082,125 @@ class Mount(pulumi.CustomResource):
|
|
1044
1082
|
__props__.__dict__["type"] = type
|
1045
1083
|
return Mount(resource_name, opts=opts, __props__=__props__)
|
1046
1084
|
|
1047
|
-
@property
|
1085
|
+
@_builtins.property
|
1048
1086
|
@pulumi.getter
|
1049
|
-
def accessor(self) -> pulumi.Output[
|
1087
|
+
def accessor(self) -> pulumi.Output[_builtins.str]:
|
1050
1088
|
"""
|
1051
1089
|
The accessor for this mount.
|
1052
1090
|
"""
|
1053
1091
|
return pulumi.get(self, "accessor")
|
1054
1092
|
|
1055
|
-
@property
|
1093
|
+
@_builtins.property
|
1056
1094
|
@pulumi.getter(name="allowedManagedKeys")
|
1057
|
-
def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[
|
1095
|
+
def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1058
1096
|
"""
|
1059
1097
|
Set of managed key registry entry names that the mount in question is allowed to access
|
1060
1098
|
"""
|
1061
1099
|
return pulumi.get(self, "allowed_managed_keys")
|
1062
1100
|
|
1063
|
-
@property
|
1101
|
+
@_builtins.property
|
1064
1102
|
@pulumi.getter(name="allowedResponseHeaders")
|
1065
|
-
def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[
|
1103
|
+
def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1066
1104
|
"""
|
1067
1105
|
List of headers to allow, allowing a plugin to include
|
1068
1106
|
them in the response.
|
1069
1107
|
"""
|
1070
1108
|
return pulumi.get(self, "allowed_response_headers")
|
1071
1109
|
|
1072
|
-
@property
|
1110
|
+
@_builtins.property
|
1073
1111
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
1074
|
-
def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[
|
1112
|
+
def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
1075
1113
|
"""
|
1076
1114
|
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1077
1115
|
"""
|
1078
1116
|
return pulumi.get(self, "audit_non_hmac_request_keys")
|
1079
1117
|
|
1080
|
-
@property
|
1118
|
+
@_builtins.property
|
1081
1119
|
@pulumi.getter(name="auditNonHmacResponseKeys")
|
1082
|
-
def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[
|
1120
|
+
def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
1083
1121
|
"""
|
1084
1122
|
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1085
1123
|
"""
|
1086
1124
|
return pulumi.get(self, "audit_non_hmac_response_keys")
|
1087
1125
|
|
1088
|
-
@property
|
1126
|
+
@_builtins.property
|
1089
1127
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
1090
|
-
def default_lease_ttl_seconds(self) -> pulumi.Output[
|
1128
|
+
def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
|
1091
1129
|
"""
|
1092
1130
|
Default lease duration for tokens and secrets in seconds
|
1093
1131
|
"""
|
1094
1132
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
1095
1133
|
|
1096
|
-
@property
|
1134
|
+
@_builtins.property
|
1097
1135
|
@pulumi.getter(name="delegatedAuthAccessors")
|
1098
|
-
def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[
|
1136
|
+
def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1099
1137
|
"""
|
1100
1138
|
List of allowed authentication mount accessors the
|
1101
1139
|
backend can request delegated authentication for.
|
1102
1140
|
"""
|
1103
1141
|
return pulumi.get(self, "delegated_auth_accessors")
|
1104
1142
|
|
1105
|
-
@property
|
1143
|
+
@_builtins.property
|
1106
1144
|
@pulumi.getter
|
1107
|
-
def description(self) -> pulumi.Output[Optional[
|
1145
|
+
def description(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1108
1146
|
"""
|
1109
1147
|
Human-friendly description of the mount
|
1110
1148
|
"""
|
1111
1149
|
return pulumi.get(self, "description")
|
1112
1150
|
|
1113
|
-
@property
|
1151
|
+
@_builtins.property
|
1114
1152
|
@pulumi.getter(name="externalEntropyAccess")
|
1115
|
-
def external_entropy_access(self) -> pulumi.Output[Optional[
|
1153
|
+
def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1116
1154
|
"""
|
1117
1155
|
Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
1118
1156
|
"""
|
1119
1157
|
return pulumi.get(self, "external_entropy_access")
|
1120
1158
|
|
1121
|
-
@property
|
1159
|
+
@_builtins.property
|
1160
|
+
@pulumi.getter(name="forceNoCache")
|
1161
|
+
def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
|
1162
|
+
"""
|
1163
|
+
If set to true, disables caching.
|
1164
|
+
"""
|
1165
|
+
return pulumi.get(self, "force_no_cache")
|
1166
|
+
|
1167
|
+
@_builtins.property
|
1122
1168
|
@pulumi.getter(name="identityTokenKey")
|
1123
|
-
def identity_token_key(self) -> pulumi.Output[Optional[
|
1169
|
+
def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1124
1170
|
"""
|
1125
1171
|
The key to use for signing plugin workload identity tokens. If
|
1126
1172
|
not provided, this will default to Vault's OIDC default key.
|
1127
1173
|
"""
|
1128
1174
|
return pulumi.get(self, "identity_token_key")
|
1129
1175
|
|
1130
|
-
@property
|
1176
|
+
@_builtins.property
|
1131
1177
|
@pulumi.getter(name="listingVisibility")
|
1132
|
-
def listing_visibility(self) -> pulumi.Output[Optional[
|
1178
|
+
def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1133
1179
|
"""
|
1134
1180
|
Specifies whether to show this mount in the UI-specific
|
1135
1181
|
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
1136
1182
|
"""
|
1137
1183
|
return pulumi.get(self, "listing_visibility")
|
1138
1184
|
|
1139
|
-
@property
|
1185
|
+
@_builtins.property
|
1140
1186
|
@pulumi.getter
|
1141
|
-
def local(self) -> pulumi.Output[Optional[
|
1187
|
+
def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1142
1188
|
"""
|
1143
1189
|
Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
1144
1190
|
"""
|
1145
1191
|
return pulumi.get(self, "local")
|
1146
1192
|
|
1147
|
-
@property
|
1193
|
+
@_builtins.property
|
1148
1194
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
1149
|
-
def max_lease_ttl_seconds(self) -> pulumi.Output[
|
1195
|
+
def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
|
1150
1196
|
"""
|
1151
1197
|
Maximum possible lease duration for tokens and secrets in seconds
|
1152
1198
|
"""
|
1153
1199
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
1154
1200
|
|
1155
|
-
@property
|
1201
|
+
@_builtins.property
|
1156
1202
|
@pulumi.getter
|
1157
|
-
def namespace(self) -> pulumi.Output[Optional[
|
1203
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1158
1204
|
"""
|
1159
1205
|
The namespace to provision the resource in.
|
1160
1206
|
The value should not contain leading or trailing forward slashes.
|
@@ -1163,34 +1209,34 @@ class Mount(pulumi.CustomResource):
|
|
1163
1209
|
"""
|
1164
1210
|
return pulumi.get(self, "namespace")
|
1165
1211
|
|
1166
|
-
@property
|
1212
|
+
@_builtins.property
|
1167
1213
|
@pulumi.getter
|
1168
|
-
def options(self) -> pulumi.Output[Optional[Mapping[str,
|
1214
|
+
def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
|
1169
1215
|
"""
|
1170
1216
|
Specifies mount type specific options that are passed to the backend
|
1171
1217
|
"""
|
1172
1218
|
return pulumi.get(self, "options")
|
1173
1219
|
|
1174
|
-
@property
|
1220
|
+
@_builtins.property
|
1175
1221
|
@pulumi.getter(name="passthroughRequestHeaders")
|
1176
|
-
def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[
|
1222
|
+
def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1177
1223
|
"""
|
1178
1224
|
List of headers to allow and pass from the request to
|
1179
1225
|
the plugin.
|
1180
1226
|
"""
|
1181
1227
|
return pulumi.get(self, "passthrough_request_headers")
|
1182
1228
|
|
1183
|
-
@property
|
1229
|
+
@_builtins.property
|
1184
1230
|
@pulumi.getter
|
1185
|
-
def path(self) -> pulumi.Output[
|
1231
|
+
def path(self) -> pulumi.Output[_builtins.str]:
|
1186
1232
|
"""
|
1187
1233
|
Where the secret backend will be mounted
|
1188
1234
|
"""
|
1189
1235
|
return pulumi.get(self, "path")
|
1190
1236
|
|
1191
|
-
@property
|
1237
|
+
@_builtins.property
|
1192
1238
|
@pulumi.getter(name="pluginVersion")
|
1193
|
-
def plugin_version(self) -> pulumi.Output[Optional[
|
1239
|
+
def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1194
1240
|
"""
|
1195
1241
|
Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
|
1196
1242
|
If unspecified, the server will select any matching unversioned plugin that may have been
|
@@ -1198,17 +1244,17 @@ class Mount(pulumi.CustomResource):
|
|
1198
1244
|
"""
|
1199
1245
|
return pulumi.get(self, "plugin_version")
|
1200
1246
|
|
1201
|
-
@property
|
1247
|
+
@_builtins.property
|
1202
1248
|
@pulumi.getter(name="sealWrap")
|
1203
|
-
def seal_wrap(self) -> pulumi.Output[
|
1249
|
+
def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
|
1204
1250
|
"""
|
1205
1251
|
Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1206
1252
|
"""
|
1207
1253
|
return pulumi.get(self, "seal_wrap")
|
1208
1254
|
|
1209
|
-
@property
|
1255
|
+
@_builtins.property
|
1210
1256
|
@pulumi.getter
|
1211
|
-
def type(self) -> pulumi.Output[
|
1257
|
+
def type(self) -> pulumi.Output[_builtins.str]:
|
1212
1258
|
"""
|
1213
1259
|
Type of the backend, such as "aws"
|
1214
1260
|
"""
|