pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +19 -1
- pulumi_vault/_inputs.py +873 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +1016 -439
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +1057 -285
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +887 -256
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +426 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +878 -336
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +400 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +1006 -227
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +431 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +732 -693
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +380 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +909 -271
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +234 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +205 -159
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +902 -231
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +217 -124
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +833 -155
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +377 -350
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0.dist-info/RECORD +270 -0
- pulumi_vault-7.1.0.dist-info/RECORD +0 -268
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,51 +19,85 @@ __all__ = ['NomadSecretBackendArgs', 'NomadSecretBackend']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class NomadSecretBackendArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
address: Optional[pulumi.Input[
|
24
|
-
|
25
|
-
|
26
|
-
|
27
|
-
|
28
|
-
|
29
|
-
|
30
|
-
|
31
|
-
|
32
|
-
|
33
|
-
|
34
|
-
|
35
|
-
|
36
|
-
|
37
|
-
|
22
|
+
address: Optional[pulumi.Input[_builtins.str]] = None,
|
23
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
24
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
25
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
26
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
27
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
28
|
+
ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
29
|
+
client_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
30
|
+
client_key: Optional[pulumi.Input[_builtins.str]] = None,
|
31
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
32
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
33
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
34
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
35
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
36
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
37
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
38
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
39
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
40
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
41
|
+
max_token_name_length: Optional[pulumi.Input[_builtins.int]] = None,
|
42
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
43
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
44
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
45
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
46
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
47
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
48
|
+
token: Optional[pulumi.Input[_builtins.str]] = None,
|
49
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None):
|
38
50
|
"""
|
39
51
|
The set of arguments for constructing a NomadSecretBackend resource.
|
40
|
-
:param pulumi.Input[
|
52
|
+
:param pulumi.Input[_builtins.str] address: Specifies the address of the Nomad instance, provided
|
41
53
|
as "protocol://host:port" like "http://127.0.0.1:4646".
|
42
|
-
:param pulumi.Input[
|
54
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
55
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
56
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
57
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
58
|
+
:param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at. Must
|
43
59
|
not begin or end with a `/`. Defaults to `nomad`.
|
44
|
-
:param pulumi.Input[
|
60
|
+
:param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
|
45
61
|
x509 PEM encoded.
|
46
|
-
:param pulumi.Input[
|
47
|
-
:param pulumi.Input[
|
48
|
-
:param pulumi.Input[
|
49
|
-
:param pulumi.Input[
|
50
|
-
:param pulumi.Input[
|
62
|
+
:param pulumi.Input[_builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
|
63
|
+
:param pulumi.Input[_builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
|
64
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
|
65
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
66
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
|
67
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
51
68
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
52
|
-
:param pulumi.Input[
|
53
|
-
|
54
|
-
:param pulumi.Input[
|
55
|
-
:param pulumi.Input[
|
69
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
70
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
71
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
72
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
73
|
+
:param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
|
74
|
+
use when checking the last rotation time.
|
75
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
76
|
+
:param pulumi.Input[_builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
|
56
77
|
generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
|
57
78
|
by the Nomad version.
|
58
|
-
:param pulumi.Input[
|
59
|
-
:param pulumi.Input[
|
79
|
+
:param pulumi.Input[_builtins.int] max_ttl: Maximum possible lease duration for secrets in seconds.
|
80
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
60
81
|
The value should not contain leading or trailing forward slashes.
|
61
82
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
62
83
|
*Available only for Vault Enterprise*.
|
63
|
-
:param pulumi.Input[
|
64
|
-
:param pulumi.Input[
|
84
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
85
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
86
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
87
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
88
|
+
:param pulumi.Input[_builtins.str] token: Specifies the Nomad Management token to use.
|
89
|
+
:param pulumi.Input[_builtins.int] ttl: Specifies the ttl of the lease for the generated token.
|
65
90
|
"""
|
66
91
|
if address is not None:
|
67
92
|
pulumi.set(__self__, "address", address)
|
93
|
+
if allowed_managed_keys is not None:
|
94
|
+
pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
|
95
|
+
if allowed_response_headers is not None:
|
96
|
+
pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
|
97
|
+
if audit_non_hmac_request_keys is not None:
|
98
|
+
pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
|
99
|
+
if audit_non_hmac_response_keys is not None:
|
100
|
+
pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
|
68
101
|
if backend is not None:
|
69
102
|
pulumi.set(__self__, "backend", backend)
|
70
103
|
if ca_cert is not None:
|
@@ -75,10 +108,20 @@ class NomadSecretBackendArgs:
|
|
75
108
|
pulumi.set(__self__, "client_key", client_key)
|
76
109
|
if default_lease_ttl_seconds is not None:
|
77
110
|
pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
|
111
|
+
if delegated_auth_accessors is not None:
|
112
|
+
pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
|
78
113
|
if description is not None:
|
79
114
|
pulumi.set(__self__, "description", description)
|
80
115
|
if disable_remount is not None:
|
81
116
|
pulumi.set(__self__, "disable_remount", disable_remount)
|
117
|
+
if external_entropy_access is not None:
|
118
|
+
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
119
|
+
if force_no_cache is not None:
|
120
|
+
pulumi.set(__self__, "force_no_cache", force_no_cache)
|
121
|
+
if identity_token_key is not None:
|
122
|
+
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
123
|
+
if listing_visibility is not None:
|
124
|
+
pulumi.set(__self__, "listing_visibility", listing_visibility)
|
82
125
|
if local is not None:
|
83
126
|
pulumi.set(__self__, "local", local)
|
84
127
|
if max_lease_ttl_seconds is not None:
|
@@ -89,14 +132,22 @@ class NomadSecretBackendArgs:
|
|
89
132
|
pulumi.set(__self__, "max_ttl", max_ttl)
|
90
133
|
if namespace is not None:
|
91
134
|
pulumi.set(__self__, "namespace", namespace)
|
135
|
+
if options is not None:
|
136
|
+
pulumi.set(__self__, "options", options)
|
137
|
+
if passthrough_request_headers is not None:
|
138
|
+
pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
|
139
|
+
if plugin_version is not None:
|
140
|
+
pulumi.set(__self__, "plugin_version", plugin_version)
|
141
|
+
if seal_wrap is not None:
|
142
|
+
pulumi.set(__self__, "seal_wrap", seal_wrap)
|
92
143
|
if token is not None:
|
93
144
|
pulumi.set(__self__, "token", token)
|
94
145
|
if ttl is not None:
|
95
146
|
pulumi.set(__self__, "ttl", ttl)
|
96
147
|
|
97
|
-
@property
|
148
|
+
@_builtins.property
|
98
149
|
@pulumi.getter
|
99
|
-
def address(self) -> Optional[pulumi.Input[
|
150
|
+
def address(self) -> Optional[pulumi.Input[_builtins.str]]:
|
100
151
|
"""
|
101
152
|
Specifies the address of the Nomad instance, provided
|
102
153
|
as "protocol://host:port" like "http://127.0.0.1:4646".
|
@@ -104,12 +155,60 @@ class NomadSecretBackendArgs:
|
|
104
155
|
return pulumi.get(self, "address")
|
105
156
|
|
106
157
|
@address.setter
|
107
|
-
def address(self, value: Optional[pulumi.Input[
|
158
|
+
def address(self, value: Optional[pulumi.Input[_builtins.str]]):
|
108
159
|
pulumi.set(self, "address", value)
|
109
160
|
|
110
|
-
@property
|
161
|
+
@_builtins.property
|
162
|
+
@pulumi.getter(name="allowedManagedKeys")
|
163
|
+
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
164
|
+
"""
|
165
|
+
List of managed key registry entry names that the mount in question is allowed to access
|
166
|
+
"""
|
167
|
+
return pulumi.get(self, "allowed_managed_keys")
|
168
|
+
|
169
|
+
@allowed_managed_keys.setter
|
170
|
+
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
171
|
+
pulumi.set(self, "allowed_managed_keys", value)
|
172
|
+
|
173
|
+
@_builtins.property
|
174
|
+
@pulumi.getter(name="allowedResponseHeaders")
|
175
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
176
|
+
"""
|
177
|
+
List of headers to allow and pass from the request to the plugin
|
178
|
+
"""
|
179
|
+
return pulumi.get(self, "allowed_response_headers")
|
180
|
+
|
181
|
+
@allowed_response_headers.setter
|
182
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
183
|
+
pulumi.set(self, "allowed_response_headers", value)
|
184
|
+
|
185
|
+
@_builtins.property
|
186
|
+
@pulumi.getter(name="auditNonHmacRequestKeys")
|
187
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
188
|
+
"""
|
189
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
190
|
+
"""
|
191
|
+
return pulumi.get(self, "audit_non_hmac_request_keys")
|
192
|
+
|
193
|
+
@audit_non_hmac_request_keys.setter
|
194
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
195
|
+
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
196
|
+
|
197
|
+
@_builtins.property
|
198
|
+
@pulumi.getter(name="auditNonHmacResponseKeys")
|
199
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
200
|
+
"""
|
201
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
202
|
+
"""
|
203
|
+
return pulumi.get(self, "audit_non_hmac_response_keys")
|
204
|
+
|
205
|
+
@audit_non_hmac_response_keys.setter
|
206
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
207
|
+
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
208
|
+
|
209
|
+
@_builtins.property
|
111
210
|
@pulumi.getter
|
112
|
-
def backend(self) -> Optional[pulumi.Input[
|
211
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
113
212
|
"""
|
114
213
|
The unique path this backend should be mounted at. Must
|
115
214
|
not begin or end with a `/`. Defaults to `nomad`.
|
@@ -117,12 +216,12 @@ class NomadSecretBackendArgs:
|
|
117
216
|
return pulumi.get(self, "backend")
|
118
217
|
|
119
218
|
@backend.setter
|
120
|
-
def backend(self, value: Optional[pulumi.Input[
|
219
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
121
220
|
pulumi.set(self, "backend", value)
|
122
221
|
|
123
|
-
@property
|
222
|
+
@_builtins.property
|
124
223
|
@pulumi.getter(name="caCert")
|
125
|
-
def ca_cert(self) -> Optional[pulumi.Input[
|
224
|
+
def ca_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
|
126
225
|
"""
|
127
226
|
CA certificate to use when verifying the Nomad server certificate, must be
|
128
227
|
x509 PEM encoded.
|
@@ -130,60 +229,72 @@ class NomadSecretBackendArgs:
|
|
130
229
|
return pulumi.get(self, "ca_cert")
|
131
230
|
|
132
231
|
@ca_cert.setter
|
133
|
-
def ca_cert(self, value: Optional[pulumi.Input[
|
232
|
+
def ca_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
|
134
233
|
pulumi.set(self, "ca_cert", value)
|
135
234
|
|
136
|
-
@property
|
235
|
+
@_builtins.property
|
137
236
|
@pulumi.getter(name="clientCert")
|
138
|
-
def client_cert(self) -> Optional[pulumi.Input[
|
237
|
+
def client_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
|
139
238
|
"""
|
140
239
|
Client certificate to provide to the Nomad server, must be x509 PEM encoded.
|
141
240
|
"""
|
142
241
|
return pulumi.get(self, "client_cert")
|
143
242
|
|
144
243
|
@client_cert.setter
|
145
|
-
def client_cert(self, value: Optional[pulumi.Input[
|
244
|
+
def client_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
|
146
245
|
pulumi.set(self, "client_cert", value)
|
147
246
|
|
148
|
-
@property
|
247
|
+
@_builtins.property
|
149
248
|
@pulumi.getter(name="clientKey")
|
150
|
-
def client_key(self) -> Optional[pulumi.Input[
|
249
|
+
def client_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
151
250
|
"""
|
152
251
|
Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
|
153
252
|
"""
|
154
253
|
return pulumi.get(self, "client_key")
|
155
254
|
|
156
255
|
@client_key.setter
|
157
|
-
def client_key(self, value: Optional[pulumi.Input[
|
256
|
+
def client_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
158
257
|
pulumi.set(self, "client_key", value)
|
159
258
|
|
160
|
-
@property
|
259
|
+
@_builtins.property
|
161
260
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
162
|
-
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
261
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
163
262
|
"""
|
164
263
|
Default lease duration for secrets in seconds.
|
165
264
|
"""
|
166
265
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
167
266
|
|
168
267
|
@default_lease_ttl_seconds.setter
|
169
|
-
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
268
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
170
269
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
171
270
|
|
172
|
-
@property
|
271
|
+
@_builtins.property
|
272
|
+
@pulumi.getter(name="delegatedAuthAccessors")
|
273
|
+
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
274
|
+
"""
|
275
|
+
List of headers to allow and pass from the request to the plugin
|
276
|
+
"""
|
277
|
+
return pulumi.get(self, "delegated_auth_accessors")
|
278
|
+
|
279
|
+
@delegated_auth_accessors.setter
|
280
|
+
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
281
|
+
pulumi.set(self, "delegated_auth_accessors", value)
|
282
|
+
|
283
|
+
@_builtins.property
|
173
284
|
@pulumi.getter
|
174
|
-
def description(self) -> Optional[pulumi.Input[
|
285
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
175
286
|
"""
|
176
|
-
Human-friendly description of the mount for the
|
287
|
+
Human-friendly description of the mount for the backend.
|
177
288
|
"""
|
178
289
|
return pulumi.get(self, "description")
|
179
290
|
|
180
291
|
@description.setter
|
181
|
-
def description(self, value: Optional[pulumi.Input[
|
292
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
182
293
|
pulumi.set(self, "description", value)
|
183
294
|
|
184
|
-
@property
|
295
|
+
@_builtins.property
|
185
296
|
@pulumi.getter(name="disableRemount")
|
186
|
-
def disable_remount(self) -> Optional[pulumi.Input[
|
297
|
+
def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
187
298
|
"""
|
188
299
|
If set, opts out of mount migration on path updates.
|
189
300
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -191,37 +302,85 @@ class NomadSecretBackendArgs:
|
|
191
302
|
return pulumi.get(self, "disable_remount")
|
192
303
|
|
193
304
|
@disable_remount.setter
|
194
|
-
def disable_remount(self, value: Optional[pulumi.Input[
|
305
|
+
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
195
306
|
pulumi.set(self, "disable_remount", value)
|
196
307
|
|
197
|
-
@property
|
308
|
+
@_builtins.property
|
309
|
+
@pulumi.getter(name="externalEntropyAccess")
|
310
|
+
def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
311
|
+
"""
|
312
|
+
Enable the secrets engine to access Vault's external entropy source
|
313
|
+
"""
|
314
|
+
return pulumi.get(self, "external_entropy_access")
|
315
|
+
|
316
|
+
@external_entropy_access.setter
|
317
|
+
def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
318
|
+
pulumi.set(self, "external_entropy_access", value)
|
319
|
+
|
320
|
+
@_builtins.property
|
321
|
+
@pulumi.getter(name="forceNoCache")
|
322
|
+
def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
323
|
+
"""
|
324
|
+
If set to true, disables caching.
|
325
|
+
"""
|
326
|
+
return pulumi.get(self, "force_no_cache")
|
327
|
+
|
328
|
+
@force_no_cache.setter
|
329
|
+
def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
330
|
+
pulumi.set(self, "force_no_cache", value)
|
331
|
+
|
332
|
+
@_builtins.property
|
333
|
+
@pulumi.getter(name="identityTokenKey")
|
334
|
+
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
335
|
+
"""
|
336
|
+
The key to use for signing plugin workload identity tokens
|
337
|
+
"""
|
338
|
+
return pulumi.get(self, "identity_token_key")
|
339
|
+
|
340
|
+
@identity_token_key.setter
|
341
|
+
def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
342
|
+
pulumi.set(self, "identity_token_key", value)
|
343
|
+
|
344
|
+
@_builtins.property
|
345
|
+
@pulumi.getter(name="listingVisibility")
|
346
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
347
|
+
"""
|
348
|
+
Specifies whether to show this mount in the UI-specific listing endpoint
|
349
|
+
"""
|
350
|
+
return pulumi.get(self, "listing_visibility")
|
351
|
+
|
352
|
+
@listing_visibility.setter
|
353
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
354
|
+
pulumi.set(self, "listing_visibility", value)
|
355
|
+
|
356
|
+
@_builtins.property
|
198
357
|
@pulumi.getter
|
199
|
-
def local(self) -> Optional[pulumi.Input[
|
358
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
200
359
|
"""
|
201
|
-
Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
202
|
-
|
360
|
+
Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
|
361
|
+
use when checking the last rotation time.
|
203
362
|
"""
|
204
363
|
return pulumi.get(self, "local")
|
205
364
|
|
206
365
|
@local.setter
|
207
|
-
def local(self, value: Optional[pulumi.Input[
|
366
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
208
367
|
pulumi.set(self, "local", value)
|
209
368
|
|
210
|
-
@property
|
369
|
+
@_builtins.property
|
211
370
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
212
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
371
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
213
372
|
"""
|
214
373
|
Maximum possible lease duration for secrets in seconds.
|
215
374
|
"""
|
216
375
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
217
376
|
|
218
377
|
@max_lease_ttl_seconds.setter
|
219
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
378
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
220
379
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
221
380
|
|
222
|
-
@property
|
381
|
+
@_builtins.property
|
223
382
|
@pulumi.getter(name="maxTokenNameLength")
|
224
|
-
def max_token_name_length(self) -> Optional[pulumi.Input[
|
383
|
+
def max_token_name_length(self) -> Optional[pulumi.Input[_builtins.int]]:
|
225
384
|
"""
|
226
385
|
Specifies the maximum length to use for the name of the Nomad token
|
227
386
|
generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
|
@@ -230,24 +389,24 @@ class NomadSecretBackendArgs:
|
|
230
389
|
return pulumi.get(self, "max_token_name_length")
|
231
390
|
|
232
391
|
@max_token_name_length.setter
|
233
|
-
def max_token_name_length(self, value: Optional[pulumi.Input[
|
392
|
+
def max_token_name_length(self, value: Optional[pulumi.Input[_builtins.int]]):
|
234
393
|
pulumi.set(self, "max_token_name_length", value)
|
235
394
|
|
236
|
-
@property
|
395
|
+
@_builtins.property
|
237
396
|
@pulumi.getter(name="maxTtl")
|
238
|
-
def max_ttl(self) -> Optional[pulumi.Input[
|
397
|
+
def max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
239
398
|
"""
|
240
399
|
Maximum possible lease duration for secrets in seconds.
|
241
400
|
"""
|
242
401
|
return pulumi.get(self, "max_ttl")
|
243
402
|
|
244
403
|
@max_ttl.setter
|
245
|
-
def max_ttl(self, value: Optional[pulumi.Input[
|
404
|
+
def max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
246
405
|
pulumi.set(self, "max_ttl", value)
|
247
406
|
|
248
|
-
@property
|
407
|
+
@_builtins.property
|
249
408
|
@pulumi.getter
|
250
|
-
def namespace(self) -> Optional[pulumi.Input[
|
409
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
251
410
|
"""
|
252
411
|
The namespace to provision the resource in.
|
253
412
|
The value should not contain leading or trailing forward slashes.
|
@@ -257,82 +416,168 @@ class NomadSecretBackendArgs:
|
|
257
416
|
return pulumi.get(self, "namespace")
|
258
417
|
|
259
418
|
@namespace.setter
|
260
|
-
def namespace(self, value: Optional[pulumi.Input[
|
419
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
261
420
|
pulumi.set(self, "namespace", value)
|
262
421
|
|
263
|
-
@property
|
422
|
+
@_builtins.property
|
423
|
+
@pulumi.getter
|
424
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
425
|
+
"""
|
426
|
+
Specifies mount type specific options that are passed to the backend
|
427
|
+
"""
|
428
|
+
return pulumi.get(self, "options")
|
429
|
+
|
430
|
+
@options.setter
|
431
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
432
|
+
pulumi.set(self, "options", value)
|
433
|
+
|
434
|
+
@_builtins.property
|
435
|
+
@pulumi.getter(name="passthroughRequestHeaders")
|
436
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
437
|
+
"""
|
438
|
+
List of headers to allow and pass from the request to the plugin
|
439
|
+
"""
|
440
|
+
return pulumi.get(self, "passthrough_request_headers")
|
441
|
+
|
442
|
+
@passthrough_request_headers.setter
|
443
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
444
|
+
pulumi.set(self, "passthrough_request_headers", value)
|
445
|
+
|
446
|
+
@_builtins.property
|
447
|
+
@pulumi.getter(name="pluginVersion")
|
448
|
+
def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
|
449
|
+
"""
|
450
|
+
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
451
|
+
"""
|
452
|
+
return pulumi.get(self, "plugin_version")
|
453
|
+
|
454
|
+
@plugin_version.setter
|
455
|
+
def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
|
456
|
+
pulumi.set(self, "plugin_version", value)
|
457
|
+
|
458
|
+
@_builtins.property
|
459
|
+
@pulumi.getter(name="sealWrap")
|
460
|
+
def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
461
|
+
"""
|
462
|
+
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
463
|
+
"""
|
464
|
+
return pulumi.get(self, "seal_wrap")
|
465
|
+
|
466
|
+
@seal_wrap.setter
|
467
|
+
def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
468
|
+
pulumi.set(self, "seal_wrap", value)
|
469
|
+
|
470
|
+
@_builtins.property
|
264
471
|
@pulumi.getter
|
265
|
-
def token(self) -> Optional[pulumi.Input[
|
472
|
+
def token(self) -> Optional[pulumi.Input[_builtins.str]]:
|
266
473
|
"""
|
267
474
|
Specifies the Nomad Management token to use.
|
268
475
|
"""
|
269
476
|
return pulumi.get(self, "token")
|
270
477
|
|
271
478
|
@token.setter
|
272
|
-
def token(self, value: Optional[pulumi.Input[
|
479
|
+
def token(self, value: Optional[pulumi.Input[_builtins.str]]):
|
273
480
|
pulumi.set(self, "token", value)
|
274
481
|
|
275
|
-
@property
|
482
|
+
@_builtins.property
|
276
483
|
@pulumi.getter
|
277
|
-
def ttl(self) -> Optional[pulumi.Input[
|
484
|
+
def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
278
485
|
"""
|
279
486
|
Specifies the ttl of the lease for the generated token.
|
280
487
|
"""
|
281
488
|
return pulumi.get(self, "ttl")
|
282
489
|
|
283
490
|
@ttl.setter
|
284
|
-
def ttl(self, value: Optional[pulumi.Input[
|
491
|
+
def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
285
492
|
pulumi.set(self, "ttl", value)
|
286
493
|
|
287
494
|
|
288
495
|
@pulumi.input_type
|
289
496
|
class _NomadSecretBackendState:
|
290
497
|
def __init__(__self__, *,
|
291
|
-
|
292
|
-
|
293
|
-
|
294
|
-
|
295
|
-
|
296
|
-
|
297
|
-
|
298
|
-
|
299
|
-
|
300
|
-
|
301
|
-
|
302
|
-
|
303
|
-
|
304
|
-
|
305
|
-
|
498
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
499
|
+
address: Optional[pulumi.Input[_builtins.str]] = None,
|
500
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
501
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
502
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
503
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
504
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
505
|
+
ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
506
|
+
client_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
507
|
+
client_key: Optional[pulumi.Input[_builtins.str]] = None,
|
508
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
509
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
510
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
511
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
512
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
513
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
514
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
515
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
516
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
517
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
518
|
+
max_token_name_length: Optional[pulumi.Input[_builtins.int]] = None,
|
519
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
520
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
521
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
522
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
523
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
524
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
525
|
+
token: Optional[pulumi.Input[_builtins.str]] = None,
|
526
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None):
|
306
527
|
"""
|
307
528
|
Input properties used for looking up and filtering NomadSecretBackend resources.
|
308
|
-
:param pulumi.Input[
|
529
|
+
:param pulumi.Input[_builtins.str] accessor: Accessor of the mount
|
530
|
+
:param pulumi.Input[_builtins.str] address: Specifies the address of the Nomad instance, provided
|
309
531
|
as "protocol://host:port" like "http://127.0.0.1:4646".
|
310
|
-
:param pulumi.Input[
|
532
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
533
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
534
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
535
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
536
|
+
:param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at. Must
|
311
537
|
not begin or end with a `/`. Defaults to `nomad`.
|
312
|
-
:param pulumi.Input[
|
538
|
+
:param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
|
313
539
|
x509 PEM encoded.
|
314
|
-
:param pulumi.Input[
|
315
|
-
:param pulumi.Input[
|
316
|
-
:param pulumi.Input[
|
317
|
-
:param pulumi.Input[
|
318
|
-
:param pulumi.Input[
|
540
|
+
:param pulumi.Input[_builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
|
541
|
+
:param pulumi.Input[_builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
|
542
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
|
543
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
544
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
|
545
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
319
546
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
320
|
-
:param pulumi.Input[
|
321
|
-
|
322
|
-
:param pulumi.Input[
|
323
|
-
:param pulumi.Input[
|
547
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
548
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
549
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
550
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
551
|
+
:param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
|
552
|
+
use when checking the last rotation time.
|
553
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
554
|
+
:param pulumi.Input[_builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
|
324
555
|
generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
|
325
556
|
by the Nomad version.
|
326
|
-
:param pulumi.Input[
|
327
|
-
:param pulumi.Input[
|
557
|
+
:param pulumi.Input[_builtins.int] max_ttl: Maximum possible lease duration for secrets in seconds.
|
558
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
328
559
|
The value should not contain leading or trailing forward slashes.
|
329
560
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
330
561
|
*Available only for Vault Enterprise*.
|
331
|
-
:param pulumi.Input[
|
332
|
-
:param pulumi.Input[
|
333
|
-
|
562
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
563
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
564
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
565
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
566
|
+
:param pulumi.Input[_builtins.str] token: Specifies the Nomad Management token to use.
|
567
|
+
:param pulumi.Input[_builtins.int] ttl: Specifies the ttl of the lease for the generated token.
|
568
|
+
"""
|
569
|
+
if accessor is not None:
|
570
|
+
pulumi.set(__self__, "accessor", accessor)
|
334
571
|
if address is not None:
|
335
572
|
pulumi.set(__self__, "address", address)
|
573
|
+
if allowed_managed_keys is not None:
|
574
|
+
pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
|
575
|
+
if allowed_response_headers is not None:
|
576
|
+
pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
|
577
|
+
if audit_non_hmac_request_keys is not None:
|
578
|
+
pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
|
579
|
+
if audit_non_hmac_response_keys is not None:
|
580
|
+
pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
|
336
581
|
if backend is not None:
|
337
582
|
pulumi.set(__self__, "backend", backend)
|
338
583
|
if ca_cert is not None:
|
@@ -343,10 +588,20 @@ class _NomadSecretBackendState:
|
|
343
588
|
pulumi.set(__self__, "client_key", client_key)
|
344
589
|
if default_lease_ttl_seconds is not None:
|
345
590
|
pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
|
591
|
+
if delegated_auth_accessors is not None:
|
592
|
+
pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
|
346
593
|
if description is not None:
|
347
594
|
pulumi.set(__self__, "description", description)
|
348
595
|
if disable_remount is not None:
|
349
596
|
pulumi.set(__self__, "disable_remount", disable_remount)
|
597
|
+
if external_entropy_access is not None:
|
598
|
+
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
599
|
+
if force_no_cache is not None:
|
600
|
+
pulumi.set(__self__, "force_no_cache", force_no_cache)
|
601
|
+
if identity_token_key is not None:
|
602
|
+
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
603
|
+
if listing_visibility is not None:
|
604
|
+
pulumi.set(__self__, "listing_visibility", listing_visibility)
|
350
605
|
if local is not None:
|
351
606
|
pulumi.set(__self__, "local", local)
|
352
607
|
if max_lease_ttl_seconds is not None:
|
@@ -357,14 +612,34 @@ class _NomadSecretBackendState:
|
|
357
612
|
pulumi.set(__self__, "max_ttl", max_ttl)
|
358
613
|
if namespace is not None:
|
359
614
|
pulumi.set(__self__, "namespace", namespace)
|
615
|
+
if options is not None:
|
616
|
+
pulumi.set(__self__, "options", options)
|
617
|
+
if passthrough_request_headers is not None:
|
618
|
+
pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
|
619
|
+
if plugin_version is not None:
|
620
|
+
pulumi.set(__self__, "plugin_version", plugin_version)
|
621
|
+
if seal_wrap is not None:
|
622
|
+
pulumi.set(__self__, "seal_wrap", seal_wrap)
|
360
623
|
if token is not None:
|
361
624
|
pulumi.set(__self__, "token", token)
|
362
625
|
if ttl is not None:
|
363
626
|
pulumi.set(__self__, "ttl", ttl)
|
364
627
|
|
365
|
-
@property
|
628
|
+
@_builtins.property
|
629
|
+
@pulumi.getter
|
630
|
+
def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
|
631
|
+
"""
|
632
|
+
Accessor of the mount
|
633
|
+
"""
|
634
|
+
return pulumi.get(self, "accessor")
|
635
|
+
|
636
|
+
@accessor.setter
|
637
|
+
def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
|
638
|
+
pulumi.set(self, "accessor", value)
|
639
|
+
|
640
|
+
@_builtins.property
|
366
641
|
@pulumi.getter
|
367
|
-
def address(self) -> Optional[pulumi.Input[
|
642
|
+
def address(self) -> Optional[pulumi.Input[_builtins.str]]:
|
368
643
|
"""
|
369
644
|
Specifies the address of the Nomad instance, provided
|
370
645
|
as "protocol://host:port" like "http://127.0.0.1:4646".
|
@@ -372,12 +647,60 @@ class _NomadSecretBackendState:
|
|
372
647
|
return pulumi.get(self, "address")
|
373
648
|
|
374
649
|
@address.setter
|
375
|
-
def address(self, value: Optional[pulumi.Input[
|
650
|
+
def address(self, value: Optional[pulumi.Input[_builtins.str]]):
|
376
651
|
pulumi.set(self, "address", value)
|
377
652
|
|
378
|
-
@property
|
653
|
+
@_builtins.property
|
654
|
+
@pulumi.getter(name="allowedManagedKeys")
|
655
|
+
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
656
|
+
"""
|
657
|
+
List of managed key registry entry names that the mount in question is allowed to access
|
658
|
+
"""
|
659
|
+
return pulumi.get(self, "allowed_managed_keys")
|
660
|
+
|
661
|
+
@allowed_managed_keys.setter
|
662
|
+
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
663
|
+
pulumi.set(self, "allowed_managed_keys", value)
|
664
|
+
|
665
|
+
@_builtins.property
|
666
|
+
@pulumi.getter(name="allowedResponseHeaders")
|
667
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
668
|
+
"""
|
669
|
+
List of headers to allow and pass from the request to the plugin
|
670
|
+
"""
|
671
|
+
return pulumi.get(self, "allowed_response_headers")
|
672
|
+
|
673
|
+
@allowed_response_headers.setter
|
674
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
675
|
+
pulumi.set(self, "allowed_response_headers", value)
|
676
|
+
|
677
|
+
@_builtins.property
|
678
|
+
@pulumi.getter(name="auditNonHmacRequestKeys")
|
679
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
680
|
+
"""
|
681
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
682
|
+
"""
|
683
|
+
return pulumi.get(self, "audit_non_hmac_request_keys")
|
684
|
+
|
685
|
+
@audit_non_hmac_request_keys.setter
|
686
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
687
|
+
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
688
|
+
|
689
|
+
@_builtins.property
|
690
|
+
@pulumi.getter(name="auditNonHmacResponseKeys")
|
691
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
692
|
+
"""
|
693
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
694
|
+
"""
|
695
|
+
return pulumi.get(self, "audit_non_hmac_response_keys")
|
696
|
+
|
697
|
+
@audit_non_hmac_response_keys.setter
|
698
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
699
|
+
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
700
|
+
|
701
|
+
@_builtins.property
|
379
702
|
@pulumi.getter
|
380
|
-
def backend(self) -> Optional[pulumi.Input[
|
703
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
381
704
|
"""
|
382
705
|
The unique path this backend should be mounted at. Must
|
383
706
|
not begin or end with a `/`. Defaults to `nomad`.
|
@@ -385,12 +708,12 @@ class _NomadSecretBackendState:
|
|
385
708
|
return pulumi.get(self, "backend")
|
386
709
|
|
387
710
|
@backend.setter
|
388
|
-
def backend(self, value: Optional[pulumi.Input[
|
711
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
389
712
|
pulumi.set(self, "backend", value)
|
390
713
|
|
391
|
-
@property
|
714
|
+
@_builtins.property
|
392
715
|
@pulumi.getter(name="caCert")
|
393
|
-
def ca_cert(self) -> Optional[pulumi.Input[
|
716
|
+
def ca_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
|
394
717
|
"""
|
395
718
|
CA certificate to use when verifying the Nomad server certificate, must be
|
396
719
|
x509 PEM encoded.
|
@@ -398,60 +721,72 @@ class _NomadSecretBackendState:
|
|
398
721
|
return pulumi.get(self, "ca_cert")
|
399
722
|
|
400
723
|
@ca_cert.setter
|
401
|
-
def ca_cert(self, value: Optional[pulumi.Input[
|
724
|
+
def ca_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
|
402
725
|
pulumi.set(self, "ca_cert", value)
|
403
726
|
|
404
|
-
@property
|
727
|
+
@_builtins.property
|
405
728
|
@pulumi.getter(name="clientCert")
|
406
|
-
def client_cert(self) -> Optional[pulumi.Input[
|
729
|
+
def client_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
|
407
730
|
"""
|
408
731
|
Client certificate to provide to the Nomad server, must be x509 PEM encoded.
|
409
732
|
"""
|
410
733
|
return pulumi.get(self, "client_cert")
|
411
734
|
|
412
735
|
@client_cert.setter
|
413
|
-
def client_cert(self, value: Optional[pulumi.Input[
|
736
|
+
def client_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
|
414
737
|
pulumi.set(self, "client_cert", value)
|
415
738
|
|
416
|
-
@property
|
739
|
+
@_builtins.property
|
417
740
|
@pulumi.getter(name="clientKey")
|
418
|
-
def client_key(self) -> Optional[pulumi.Input[
|
741
|
+
def client_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
419
742
|
"""
|
420
743
|
Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
|
421
744
|
"""
|
422
745
|
return pulumi.get(self, "client_key")
|
423
746
|
|
424
747
|
@client_key.setter
|
425
|
-
def client_key(self, value: Optional[pulumi.Input[
|
748
|
+
def client_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
426
749
|
pulumi.set(self, "client_key", value)
|
427
750
|
|
428
|
-
@property
|
751
|
+
@_builtins.property
|
429
752
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
430
|
-
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
753
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
431
754
|
"""
|
432
755
|
Default lease duration for secrets in seconds.
|
433
756
|
"""
|
434
757
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
435
758
|
|
436
759
|
@default_lease_ttl_seconds.setter
|
437
|
-
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
760
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
438
761
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
439
762
|
|
440
|
-
@property
|
763
|
+
@_builtins.property
|
764
|
+
@pulumi.getter(name="delegatedAuthAccessors")
|
765
|
+
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
766
|
+
"""
|
767
|
+
List of headers to allow and pass from the request to the plugin
|
768
|
+
"""
|
769
|
+
return pulumi.get(self, "delegated_auth_accessors")
|
770
|
+
|
771
|
+
@delegated_auth_accessors.setter
|
772
|
+
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
773
|
+
pulumi.set(self, "delegated_auth_accessors", value)
|
774
|
+
|
775
|
+
@_builtins.property
|
441
776
|
@pulumi.getter
|
442
|
-
def description(self) -> Optional[pulumi.Input[
|
777
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
443
778
|
"""
|
444
|
-
Human-friendly description of the mount for the
|
779
|
+
Human-friendly description of the mount for the backend.
|
445
780
|
"""
|
446
781
|
return pulumi.get(self, "description")
|
447
782
|
|
448
783
|
@description.setter
|
449
|
-
def description(self, value: Optional[pulumi.Input[
|
784
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
450
785
|
pulumi.set(self, "description", value)
|
451
786
|
|
452
|
-
@property
|
787
|
+
@_builtins.property
|
453
788
|
@pulumi.getter(name="disableRemount")
|
454
|
-
def disable_remount(self) -> Optional[pulumi.Input[
|
789
|
+
def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
455
790
|
"""
|
456
791
|
If set, opts out of mount migration on path updates.
|
457
792
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -459,37 +794,85 @@ class _NomadSecretBackendState:
|
|
459
794
|
return pulumi.get(self, "disable_remount")
|
460
795
|
|
461
796
|
@disable_remount.setter
|
462
|
-
def disable_remount(self, value: Optional[pulumi.Input[
|
797
|
+
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
463
798
|
pulumi.set(self, "disable_remount", value)
|
464
799
|
|
465
|
-
@property
|
800
|
+
@_builtins.property
|
801
|
+
@pulumi.getter(name="externalEntropyAccess")
|
802
|
+
def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
803
|
+
"""
|
804
|
+
Enable the secrets engine to access Vault's external entropy source
|
805
|
+
"""
|
806
|
+
return pulumi.get(self, "external_entropy_access")
|
807
|
+
|
808
|
+
@external_entropy_access.setter
|
809
|
+
def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
810
|
+
pulumi.set(self, "external_entropy_access", value)
|
811
|
+
|
812
|
+
@_builtins.property
|
813
|
+
@pulumi.getter(name="forceNoCache")
|
814
|
+
def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
815
|
+
"""
|
816
|
+
If set to true, disables caching.
|
817
|
+
"""
|
818
|
+
return pulumi.get(self, "force_no_cache")
|
819
|
+
|
820
|
+
@force_no_cache.setter
|
821
|
+
def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
822
|
+
pulumi.set(self, "force_no_cache", value)
|
823
|
+
|
824
|
+
@_builtins.property
|
825
|
+
@pulumi.getter(name="identityTokenKey")
|
826
|
+
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
827
|
+
"""
|
828
|
+
The key to use for signing plugin workload identity tokens
|
829
|
+
"""
|
830
|
+
return pulumi.get(self, "identity_token_key")
|
831
|
+
|
832
|
+
@identity_token_key.setter
|
833
|
+
def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
834
|
+
pulumi.set(self, "identity_token_key", value)
|
835
|
+
|
836
|
+
@_builtins.property
|
837
|
+
@pulumi.getter(name="listingVisibility")
|
838
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
839
|
+
"""
|
840
|
+
Specifies whether to show this mount in the UI-specific listing endpoint
|
841
|
+
"""
|
842
|
+
return pulumi.get(self, "listing_visibility")
|
843
|
+
|
844
|
+
@listing_visibility.setter
|
845
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
846
|
+
pulumi.set(self, "listing_visibility", value)
|
847
|
+
|
848
|
+
@_builtins.property
|
466
849
|
@pulumi.getter
|
467
|
-
def local(self) -> Optional[pulumi.Input[
|
850
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
468
851
|
"""
|
469
|
-
Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
470
|
-
|
852
|
+
Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
|
853
|
+
use when checking the last rotation time.
|
471
854
|
"""
|
472
855
|
return pulumi.get(self, "local")
|
473
856
|
|
474
857
|
@local.setter
|
475
|
-
def local(self, value: Optional[pulumi.Input[
|
858
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
476
859
|
pulumi.set(self, "local", value)
|
477
860
|
|
478
|
-
@property
|
861
|
+
@_builtins.property
|
479
862
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
480
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
863
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
481
864
|
"""
|
482
865
|
Maximum possible lease duration for secrets in seconds.
|
483
866
|
"""
|
484
867
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
485
868
|
|
486
869
|
@max_lease_ttl_seconds.setter
|
487
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
870
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
488
871
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
489
872
|
|
490
|
-
@property
|
873
|
+
@_builtins.property
|
491
874
|
@pulumi.getter(name="maxTokenNameLength")
|
492
|
-
def max_token_name_length(self) -> Optional[pulumi.Input[
|
875
|
+
def max_token_name_length(self) -> Optional[pulumi.Input[_builtins.int]]:
|
493
876
|
"""
|
494
877
|
Specifies the maximum length to use for the name of the Nomad token
|
495
878
|
generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
|
@@ -498,24 +881,24 @@ class _NomadSecretBackendState:
|
|
498
881
|
return pulumi.get(self, "max_token_name_length")
|
499
882
|
|
500
883
|
@max_token_name_length.setter
|
501
|
-
def max_token_name_length(self, value: Optional[pulumi.Input[
|
884
|
+
def max_token_name_length(self, value: Optional[pulumi.Input[_builtins.int]]):
|
502
885
|
pulumi.set(self, "max_token_name_length", value)
|
503
886
|
|
504
|
-
@property
|
887
|
+
@_builtins.property
|
505
888
|
@pulumi.getter(name="maxTtl")
|
506
|
-
def max_ttl(self) -> Optional[pulumi.Input[
|
889
|
+
def max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
507
890
|
"""
|
508
891
|
Maximum possible lease duration for secrets in seconds.
|
509
892
|
"""
|
510
893
|
return pulumi.get(self, "max_ttl")
|
511
894
|
|
512
895
|
@max_ttl.setter
|
513
|
-
def max_ttl(self, value: Optional[pulumi.Input[
|
896
|
+
def max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
514
897
|
pulumi.set(self, "max_ttl", value)
|
515
898
|
|
516
|
-
@property
|
899
|
+
@_builtins.property
|
517
900
|
@pulumi.getter
|
518
|
-
def namespace(self) -> Optional[pulumi.Input[
|
901
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
519
902
|
"""
|
520
903
|
The namespace to provision the resource in.
|
521
904
|
The value should not contain leading or trailing forward slashes.
|
@@ -525,31 +908,79 @@ class _NomadSecretBackendState:
|
|
525
908
|
return pulumi.get(self, "namespace")
|
526
909
|
|
527
910
|
@namespace.setter
|
528
|
-
def namespace(self, value: Optional[pulumi.Input[
|
911
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
529
912
|
pulumi.set(self, "namespace", value)
|
530
913
|
|
531
|
-
@property
|
914
|
+
@_builtins.property
|
532
915
|
@pulumi.getter
|
533
|
-
def
|
916
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
917
|
+
"""
|
918
|
+
Specifies mount type specific options that are passed to the backend
|
919
|
+
"""
|
920
|
+
return pulumi.get(self, "options")
|
921
|
+
|
922
|
+
@options.setter
|
923
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
924
|
+
pulumi.set(self, "options", value)
|
925
|
+
|
926
|
+
@_builtins.property
|
927
|
+
@pulumi.getter(name="passthroughRequestHeaders")
|
928
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
929
|
+
"""
|
930
|
+
List of headers to allow and pass from the request to the plugin
|
931
|
+
"""
|
932
|
+
return pulumi.get(self, "passthrough_request_headers")
|
933
|
+
|
934
|
+
@passthrough_request_headers.setter
|
935
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
936
|
+
pulumi.set(self, "passthrough_request_headers", value)
|
937
|
+
|
938
|
+
@_builtins.property
|
939
|
+
@pulumi.getter(name="pluginVersion")
|
940
|
+
def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
|
941
|
+
"""
|
942
|
+
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
943
|
+
"""
|
944
|
+
return pulumi.get(self, "plugin_version")
|
945
|
+
|
946
|
+
@plugin_version.setter
|
947
|
+
def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
|
948
|
+
pulumi.set(self, "plugin_version", value)
|
949
|
+
|
950
|
+
@_builtins.property
|
951
|
+
@pulumi.getter(name="sealWrap")
|
952
|
+
def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
953
|
+
"""
|
954
|
+
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
955
|
+
"""
|
956
|
+
return pulumi.get(self, "seal_wrap")
|
957
|
+
|
958
|
+
@seal_wrap.setter
|
959
|
+
def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
960
|
+
pulumi.set(self, "seal_wrap", value)
|
961
|
+
|
962
|
+
@_builtins.property
|
963
|
+
@pulumi.getter
|
964
|
+
def token(self) -> Optional[pulumi.Input[_builtins.str]]:
|
534
965
|
"""
|
535
966
|
Specifies the Nomad Management token to use.
|
536
967
|
"""
|
537
968
|
return pulumi.get(self, "token")
|
538
969
|
|
539
970
|
@token.setter
|
540
|
-
def token(self, value: Optional[pulumi.Input[
|
971
|
+
def token(self, value: Optional[pulumi.Input[_builtins.str]]):
|
541
972
|
pulumi.set(self, "token", value)
|
542
973
|
|
543
|
-
@property
|
974
|
+
@_builtins.property
|
544
975
|
@pulumi.getter
|
545
|
-
def ttl(self) -> Optional[pulumi.Input[
|
976
|
+
def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
546
977
|
"""
|
547
978
|
Specifies the ttl of the lease for the generated token.
|
548
979
|
"""
|
549
980
|
return pulumi.get(self, "ttl")
|
550
981
|
|
551
982
|
@ttl.setter
|
552
|
-
def ttl(self, value: Optional[pulumi.Input[
|
983
|
+
def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
553
984
|
pulumi.set(self, "ttl", value)
|
554
985
|
|
555
986
|
|
@@ -559,21 +990,34 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
559
990
|
def __init__(__self__,
|
560
991
|
resource_name: str,
|
561
992
|
opts: Optional[pulumi.ResourceOptions] = None,
|
562
|
-
address: Optional[pulumi.Input[
|
563
|
-
|
564
|
-
|
565
|
-
|
566
|
-
|
567
|
-
|
568
|
-
|
569
|
-
|
570
|
-
|
571
|
-
|
572
|
-
|
573
|
-
|
574
|
-
|
575
|
-
|
576
|
-
|
993
|
+
address: Optional[pulumi.Input[_builtins.str]] = None,
|
994
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
995
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
996
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
997
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
998
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
999
|
+
ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
1000
|
+
client_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
1001
|
+
client_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1002
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1003
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1004
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
1005
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
1006
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
1007
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
1008
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1009
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
1010
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
1011
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1012
|
+
max_token_name_length: Optional[pulumi.Input[_builtins.int]] = None,
|
1013
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
1014
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1015
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
1016
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1017
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
1018
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
1019
|
+
token: Optional[pulumi.Input[_builtins.str]] = None,
|
1020
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
577
1021
|
__props__=None):
|
578
1022
|
"""
|
579
1023
|
## Example Usage
|
@@ -603,31 +1047,44 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
603
1047
|
|
604
1048
|
:param str resource_name: The name of the resource.
|
605
1049
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
606
|
-
:param pulumi.Input[
|
1050
|
+
:param pulumi.Input[_builtins.str] address: Specifies the address of the Nomad instance, provided
|
607
1051
|
as "protocol://host:port" like "http://127.0.0.1:4646".
|
608
|
-
:param pulumi.Input[
|
1052
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
1053
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
1054
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1055
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1056
|
+
:param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at. Must
|
609
1057
|
not begin or end with a `/`. Defaults to `nomad`.
|
610
|
-
:param pulumi.Input[
|
1058
|
+
:param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
|
611
1059
|
x509 PEM encoded.
|
612
|
-
:param pulumi.Input[
|
613
|
-
:param pulumi.Input[
|
614
|
-
:param pulumi.Input[
|
615
|
-
:param pulumi.Input[
|
616
|
-
:param pulumi.Input[
|
1060
|
+
:param pulumi.Input[_builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
|
1061
|
+
:param pulumi.Input[_builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
|
1062
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
|
1063
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
1064
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
|
1065
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
617
1066
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
618
|
-
:param pulumi.Input[
|
619
|
-
|
620
|
-
:param pulumi.Input[
|
621
|
-
:param pulumi.Input[
|
1067
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
1068
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
1069
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
1070
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
1071
|
+
:param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
|
1072
|
+
use when checking the last rotation time.
|
1073
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
1074
|
+
:param pulumi.Input[_builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
|
622
1075
|
generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
|
623
1076
|
by the Nomad version.
|
624
|
-
:param pulumi.Input[
|
625
|
-
:param pulumi.Input[
|
1077
|
+
:param pulumi.Input[_builtins.int] max_ttl: Maximum possible lease duration for secrets in seconds.
|
1078
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
626
1079
|
The value should not contain leading or trailing forward slashes.
|
627
1080
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
628
1081
|
*Available only for Vault Enterprise*.
|
629
|
-
:param pulumi.Input[
|
630
|
-
:param pulumi.Input[
|
1082
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
1083
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
1084
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1085
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1086
|
+
:param pulumi.Input[_builtins.str] token: Specifies the Nomad Management token to use.
|
1087
|
+
:param pulumi.Input[_builtins.int] ttl: Specifies the ttl of the lease for the generated token.
|
631
1088
|
"""
|
632
1089
|
...
|
633
1090
|
@overload
|
@@ -676,21 +1133,34 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
676
1133
|
def _internal_init(__self__,
|
677
1134
|
resource_name: str,
|
678
1135
|
opts: Optional[pulumi.ResourceOptions] = None,
|
679
|
-
address: Optional[pulumi.Input[
|
680
|
-
|
681
|
-
|
682
|
-
|
683
|
-
|
684
|
-
|
685
|
-
|
686
|
-
|
687
|
-
|
688
|
-
|
689
|
-
|
690
|
-
|
691
|
-
|
692
|
-
|
693
|
-
|
1136
|
+
address: Optional[pulumi.Input[_builtins.str]] = None,
|
1137
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1138
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1139
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1140
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1141
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
1142
|
+
ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
1143
|
+
client_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
1144
|
+
client_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1145
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1146
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1147
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
1148
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
1149
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
1150
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
1151
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1152
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
1153
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
1154
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1155
|
+
max_token_name_length: Optional[pulumi.Input[_builtins.int]] = None,
|
1156
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
1157
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1158
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
1159
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1160
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
1161
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
1162
|
+
token: Optional[pulumi.Input[_builtins.str]] = None,
|
1163
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
694
1164
|
__props__=None):
|
695
1165
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
696
1166
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -701,20 +1171,34 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
701
1171
|
__props__ = NomadSecretBackendArgs.__new__(NomadSecretBackendArgs)
|
702
1172
|
|
703
1173
|
__props__.__dict__["address"] = address
|
1174
|
+
__props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
|
1175
|
+
__props__.__dict__["allowed_response_headers"] = allowed_response_headers
|
1176
|
+
__props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
|
1177
|
+
__props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
|
704
1178
|
__props__.__dict__["backend"] = backend
|
705
1179
|
__props__.__dict__["ca_cert"] = ca_cert
|
706
1180
|
__props__.__dict__["client_cert"] = None if client_cert is None else pulumi.Output.secret(client_cert)
|
707
1181
|
__props__.__dict__["client_key"] = None if client_key is None else pulumi.Output.secret(client_key)
|
708
1182
|
__props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
|
1183
|
+
__props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
|
709
1184
|
__props__.__dict__["description"] = description
|
710
1185
|
__props__.__dict__["disable_remount"] = disable_remount
|
1186
|
+
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
1187
|
+
__props__.__dict__["force_no_cache"] = force_no_cache
|
1188
|
+
__props__.__dict__["identity_token_key"] = identity_token_key
|
1189
|
+
__props__.__dict__["listing_visibility"] = listing_visibility
|
711
1190
|
__props__.__dict__["local"] = local
|
712
1191
|
__props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
|
713
1192
|
__props__.__dict__["max_token_name_length"] = max_token_name_length
|
714
1193
|
__props__.__dict__["max_ttl"] = max_ttl
|
715
1194
|
__props__.__dict__["namespace"] = namespace
|
1195
|
+
__props__.__dict__["options"] = options
|
1196
|
+
__props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
|
1197
|
+
__props__.__dict__["plugin_version"] = plugin_version
|
1198
|
+
__props__.__dict__["seal_wrap"] = seal_wrap
|
716
1199
|
__props__.__dict__["token"] = None if token is None else pulumi.Output.secret(token)
|
717
1200
|
__props__.__dict__["ttl"] = ttl
|
1201
|
+
__props__.__dict__["accessor"] = None
|
718
1202
|
secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["clientCert", "clientKey", "token"])
|
719
1203
|
opts = pulumi.ResourceOptions.merge(opts, secret_opts)
|
720
1204
|
super(NomadSecretBackend, __self__).__init__(
|
@@ -727,21 +1211,35 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
727
1211
|
def get(resource_name: str,
|
728
1212
|
id: pulumi.Input[str],
|
729
1213
|
opts: Optional[pulumi.ResourceOptions] = None,
|
730
|
-
|
731
|
-
|
732
|
-
|
733
|
-
|
734
|
-
|
735
|
-
|
736
|
-
|
737
|
-
|
738
|
-
|
739
|
-
|
740
|
-
|
741
|
-
|
742
|
-
|
743
|
-
|
744
|
-
|
1214
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
1215
|
+
address: Optional[pulumi.Input[_builtins.str]] = None,
|
1216
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1217
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1218
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1219
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1220
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
1221
|
+
ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
1222
|
+
client_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
1223
|
+
client_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1224
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1225
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1226
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
1227
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
1228
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
1229
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
1230
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1231
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
1232
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
1233
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1234
|
+
max_token_name_length: Optional[pulumi.Input[_builtins.int]] = None,
|
1235
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
1236
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1237
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
1238
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1239
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
1240
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
1241
|
+
token: Optional[pulumi.Input[_builtins.str]] = None,
|
1242
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None) -> 'NomadSecretBackend':
|
745
1243
|
"""
|
746
1244
|
Get an existing NomadSecretBackend resource's state with the given name, id, and optional extra
|
747
1245
|
properties used to qualify the lookup.
|
@@ -749,141 +1247,249 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
749
1247
|
:param str resource_name: The unique name of the resulting resource.
|
750
1248
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
751
1249
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
752
|
-
:param pulumi.Input[
|
1250
|
+
:param pulumi.Input[_builtins.str] accessor: Accessor of the mount
|
1251
|
+
:param pulumi.Input[_builtins.str] address: Specifies the address of the Nomad instance, provided
|
753
1252
|
as "protocol://host:port" like "http://127.0.0.1:4646".
|
754
|
-
:param pulumi.Input[
|
1253
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
1254
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
1255
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1256
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1257
|
+
:param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at. Must
|
755
1258
|
not begin or end with a `/`. Defaults to `nomad`.
|
756
|
-
:param pulumi.Input[
|
1259
|
+
:param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
|
757
1260
|
x509 PEM encoded.
|
758
|
-
:param pulumi.Input[
|
759
|
-
:param pulumi.Input[
|
760
|
-
:param pulumi.Input[
|
761
|
-
:param pulumi.Input[
|
762
|
-
:param pulumi.Input[
|
1261
|
+
:param pulumi.Input[_builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
|
1262
|
+
:param pulumi.Input[_builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
|
1263
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
|
1264
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
1265
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
|
1266
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
763
1267
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
764
|
-
:param pulumi.Input[
|
765
|
-
|
766
|
-
:param pulumi.Input[
|
767
|
-
:param pulumi.Input[
|
1268
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
1269
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
1270
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
1271
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
1272
|
+
:param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
|
1273
|
+
use when checking the last rotation time.
|
1274
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
1275
|
+
:param pulumi.Input[_builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
|
768
1276
|
generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
|
769
1277
|
by the Nomad version.
|
770
|
-
:param pulumi.Input[
|
771
|
-
:param pulumi.Input[
|
1278
|
+
:param pulumi.Input[_builtins.int] max_ttl: Maximum possible lease duration for secrets in seconds.
|
1279
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
772
1280
|
The value should not contain leading or trailing forward slashes.
|
773
1281
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
774
1282
|
*Available only for Vault Enterprise*.
|
775
|
-
:param pulumi.Input[
|
776
|
-
:param pulumi.Input[
|
1283
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
1284
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
1285
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1286
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1287
|
+
:param pulumi.Input[_builtins.str] token: Specifies the Nomad Management token to use.
|
1288
|
+
:param pulumi.Input[_builtins.int] ttl: Specifies the ttl of the lease for the generated token.
|
777
1289
|
"""
|
778
1290
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
779
1291
|
|
780
1292
|
__props__ = _NomadSecretBackendState.__new__(_NomadSecretBackendState)
|
781
1293
|
|
1294
|
+
__props__.__dict__["accessor"] = accessor
|
782
1295
|
__props__.__dict__["address"] = address
|
1296
|
+
__props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
|
1297
|
+
__props__.__dict__["allowed_response_headers"] = allowed_response_headers
|
1298
|
+
__props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
|
1299
|
+
__props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
|
783
1300
|
__props__.__dict__["backend"] = backend
|
784
1301
|
__props__.__dict__["ca_cert"] = ca_cert
|
785
1302
|
__props__.__dict__["client_cert"] = client_cert
|
786
1303
|
__props__.__dict__["client_key"] = client_key
|
787
1304
|
__props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
|
1305
|
+
__props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
|
788
1306
|
__props__.__dict__["description"] = description
|
789
1307
|
__props__.__dict__["disable_remount"] = disable_remount
|
1308
|
+
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
1309
|
+
__props__.__dict__["force_no_cache"] = force_no_cache
|
1310
|
+
__props__.__dict__["identity_token_key"] = identity_token_key
|
1311
|
+
__props__.__dict__["listing_visibility"] = listing_visibility
|
790
1312
|
__props__.__dict__["local"] = local
|
791
1313
|
__props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
|
792
1314
|
__props__.__dict__["max_token_name_length"] = max_token_name_length
|
793
1315
|
__props__.__dict__["max_ttl"] = max_ttl
|
794
1316
|
__props__.__dict__["namespace"] = namespace
|
1317
|
+
__props__.__dict__["options"] = options
|
1318
|
+
__props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
|
1319
|
+
__props__.__dict__["plugin_version"] = plugin_version
|
1320
|
+
__props__.__dict__["seal_wrap"] = seal_wrap
|
795
1321
|
__props__.__dict__["token"] = token
|
796
1322
|
__props__.__dict__["ttl"] = ttl
|
797
1323
|
return NomadSecretBackend(resource_name, opts=opts, __props__=__props__)
|
798
1324
|
|
799
|
-
@property
|
1325
|
+
@_builtins.property
|
800
1326
|
@pulumi.getter
|
801
|
-
def
|
1327
|
+
def accessor(self) -> pulumi.Output[_builtins.str]:
|
1328
|
+
"""
|
1329
|
+
Accessor of the mount
|
1330
|
+
"""
|
1331
|
+
return pulumi.get(self, "accessor")
|
1332
|
+
|
1333
|
+
@_builtins.property
|
1334
|
+
@pulumi.getter
|
1335
|
+
def address(self) -> pulumi.Output[Optional[_builtins.str]]:
|
802
1336
|
"""
|
803
1337
|
Specifies the address of the Nomad instance, provided
|
804
1338
|
as "protocol://host:port" like "http://127.0.0.1:4646".
|
805
1339
|
"""
|
806
1340
|
return pulumi.get(self, "address")
|
807
1341
|
|
808
|
-
@property
|
1342
|
+
@_builtins.property
|
1343
|
+
@pulumi.getter(name="allowedManagedKeys")
|
1344
|
+
def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1345
|
+
"""
|
1346
|
+
List of managed key registry entry names that the mount in question is allowed to access
|
1347
|
+
"""
|
1348
|
+
return pulumi.get(self, "allowed_managed_keys")
|
1349
|
+
|
1350
|
+
@_builtins.property
|
1351
|
+
@pulumi.getter(name="allowedResponseHeaders")
|
1352
|
+
def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1353
|
+
"""
|
1354
|
+
List of headers to allow and pass from the request to the plugin
|
1355
|
+
"""
|
1356
|
+
return pulumi.get(self, "allowed_response_headers")
|
1357
|
+
|
1358
|
+
@_builtins.property
|
1359
|
+
@pulumi.getter(name="auditNonHmacRequestKeys")
|
1360
|
+
def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
1361
|
+
"""
|
1362
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1363
|
+
"""
|
1364
|
+
return pulumi.get(self, "audit_non_hmac_request_keys")
|
1365
|
+
|
1366
|
+
@_builtins.property
|
1367
|
+
@pulumi.getter(name="auditNonHmacResponseKeys")
|
1368
|
+
def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
1369
|
+
"""
|
1370
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1371
|
+
"""
|
1372
|
+
return pulumi.get(self, "audit_non_hmac_response_keys")
|
1373
|
+
|
1374
|
+
@_builtins.property
|
809
1375
|
@pulumi.getter
|
810
|
-
def backend(self) -> pulumi.Output[Optional[
|
1376
|
+
def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
|
811
1377
|
"""
|
812
1378
|
The unique path this backend should be mounted at. Must
|
813
1379
|
not begin or end with a `/`. Defaults to `nomad`.
|
814
1380
|
"""
|
815
1381
|
return pulumi.get(self, "backend")
|
816
1382
|
|
817
|
-
@property
|
1383
|
+
@_builtins.property
|
818
1384
|
@pulumi.getter(name="caCert")
|
819
|
-
def ca_cert(self) -> pulumi.Output[Optional[
|
1385
|
+
def ca_cert(self) -> pulumi.Output[Optional[_builtins.str]]:
|
820
1386
|
"""
|
821
1387
|
CA certificate to use when verifying the Nomad server certificate, must be
|
822
1388
|
x509 PEM encoded.
|
823
1389
|
"""
|
824
1390
|
return pulumi.get(self, "ca_cert")
|
825
1391
|
|
826
|
-
@property
|
1392
|
+
@_builtins.property
|
827
1393
|
@pulumi.getter(name="clientCert")
|
828
|
-
def client_cert(self) -> pulumi.Output[Optional[
|
1394
|
+
def client_cert(self) -> pulumi.Output[Optional[_builtins.str]]:
|
829
1395
|
"""
|
830
1396
|
Client certificate to provide to the Nomad server, must be x509 PEM encoded.
|
831
1397
|
"""
|
832
1398
|
return pulumi.get(self, "client_cert")
|
833
1399
|
|
834
|
-
@property
|
1400
|
+
@_builtins.property
|
835
1401
|
@pulumi.getter(name="clientKey")
|
836
|
-
def client_key(self) -> pulumi.Output[Optional[
|
1402
|
+
def client_key(self) -> pulumi.Output[Optional[_builtins.str]]:
|
837
1403
|
"""
|
838
1404
|
Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
|
839
1405
|
"""
|
840
1406
|
return pulumi.get(self, "client_key")
|
841
1407
|
|
842
|
-
@property
|
1408
|
+
@_builtins.property
|
843
1409
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
844
|
-
def default_lease_ttl_seconds(self) -> pulumi.Output[
|
1410
|
+
def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
|
845
1411
|
"""
|
846
1412
|
Default lease duration for secrets in seconds.
|
847
1413
|
"""
|
848
1414
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
849
1415
|
|
850
|
-
@property
|
1416
|
+
@_builtins.property
|
1417
|
+
@pulumi.getter(name="delegatedAuthAccessors")
|
1418
|
+
def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1419
|
+
"""
|
1420
|
+
List of headers to allow and pass from the request to the plugin
|
1421
|
+
"""
|
1422
|
+
return pulumi.get(self, "delegated_auth_accessors")
|
1423
|
+
|
1424
|
+
@_builtins.property
|
851
1425
|
@pulumi.getter
|
852
|
-
def description(self) -> pulumi.Output[Optional[
|
1426
|
+
def description(self) -> pulumi.Output[Optional[_builtins.str]]:
|
853
1427
|
"""
|
854
|
-
Human-friendly description of the mount for the
|
1428
|
+
Human-friendly description of the mount for the backend.
|
855
1429
|
"""
|
856
1430
|
return pulumi.get(self, "description")
|
857
1431
|
|
858
|
-
@property
|
1432
|
+
@_builtins.property
|
859
1433
|
@pulumi.getter(name="disableRemount")
|
860
|
-
def disable_remount(self) -> pulumi.Output[Optional[
|
1434
|
+
def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
861
1435
|
"""
|
862
1436
|
If set, opts out of mount migration on path updates.
|
863
1437
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
864
1438
|
"""
|
865
1439
|
return pulumi.get(self, "disable_remount")
|
866
1440
|
|
867
|
-
@property
|
1441
|
+
@_builtins.property
|
1442
|
+
@pulumi.getter(name="externalEntropyAccess")
|
1443
|
+
def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1444
|
+
"""
|
1445
|
+
Enable the secrets engine to access Vault's external entropy source
|
1446
|
+
"""
|
1447
|
+
return pulumi.get(self, "external_entropy_access")
|
1448
|
+
|
1449
|
+
@_builtins.property
|
1450
|
+
@pulumi.getter(name="forceNoCache")
|
1451
|
+
def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
|
1452
|
+
"""
|
1453
|
+
If set to true, disables caching.
|
1454
|
+
"""
|
1455
|
+
return pulumi.get(self, "force_no_cache")
|
1456
|
+
|
1457
|
+
@_builtins.property
|
1458
|
+
@pulumi.getter(name="identityTokenKey")
|
1459
|
+
def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1460
|
+
"""
|
1461
|
+
The key to use for signing plugin workload identity tokens
|
1462
|
+
"""
|
1463
|
+
return pulumi.get(self, "identity_token_key")
|
1464
|
+
|
1465
|
+
@_builtins.property
|
1466
|
+
@pulumi.getter(name="listingVisibility")
|
1467
|
+
def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1468
|
+
"""
|
1469
|
+
Specifies whether to show this mount in the UI-specific listing endpoint
|
1470
|
+
"""
|
1471
|
+
return pulumi.get(self, "listing_visibility")
|
1472
|
+
|
1473
|
+
@_builtins.property
|
868
1474
|
@pulumi.getter
|
869
|
-
def local(self) -> pulumi.Output[Optional[
|
1475
|
+
def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
870
1476
|
"""
|
871
|
-
Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
872
|
-
|
1477
|
+
Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
|
1478
|
+
use when checking the last rotation time.
|
873
1479
|
"""
|
874
1480
|
return pulumi.get(self, "local")
|
875
1481
|
|
876
|
-
@property
|
1482
|
+
@_builtins.property
|
877
1483
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
878
|
-
def max_lease_ttl_seconds(self) -> pulumi.Output[
|
1484
|
+
def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
|
879
1485
|
"""
|
880
1486
|
Maximum possible lease duration for secrets in seconds.
|
881
1487
|
"""
|
882
1488
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
883
1489
|
|
884
|
-
@property
|
1490
|
+
@_builtins.property
|
885
1491
|
@pulumi.getter(name="maxTokenNameLength")
|
886
|
-
def max_token_name_length(self) -> pulumi.Output[
|
1492
|
+
def max_token_name_length(self) -> pulumi.Output[_builtins.int]:
|
887
1493
|
"""
|
888
1494
|
Specifies the maximum length to use for the name of the Nomad token
|
889
1495
|
generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
|
@@ -891,17 +1497,17 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
891
1497
|
"""
|
892
1498
|
return pulumi.get(self, "max_token_name_length")
|
893
1499
|
|
894
|
-
@property
|
1500
|
+
@_builtins.property
|
895
1501
|
@pulumi.getter(name="maxTtl")
|
896
|
-
def max_ttl(self) -> pulumi.Output[
|
1502
|
+
def max_ttl(self) -> pulumi.Output[_builtins.int]:
|
897
1503
|
"""
|
898
1504
|
Maximum possible lease duration for secrets in seconds.
|
899
1505
|
"""
|
900
1506
|
return pulumi.get(self, "max_ttl")
|
901
1507
|
|
902
|
-
@property
|
1508
|
+
@_builtins.property
|
903
1509
|
@pulumi.getter
|
904
|
-
def namespace(self) -> pulumi.Output[Optional[
|
1510
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
905
1511
|
"""
|
906
1512
|
The namespace to provision the resource in.
|
907
1513
|
The value should not contain leading or trailing forward slashes.
|
@@ -910,17 +1516,49 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
910
1516
|
"""
|
911
1517
|
return pulumi.get(self, "namespace")
|
912
1518
|
|
913
|
-
@property
|
1519
|
+
@_builtins.property
|
1520
|
+
@pulumi.getter
|
1521
|
+
def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
|
1522
|
+
"""
|
1523
|
+
Specifies mount type specific options that are passed to the backend
|
1524
|
+
"""
|
1525
|
+
return pulumi.get(self, "options")
|
1526
|
+
|
1527
|
+
@_builtins.property
|
1528
|
+
@pulumi.getter(name="passthroughRequestHeaders")
|
1529
|
+
def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1530
|
+
"""
|
1531
|
+
List of headers to allow and pass from the request to the plugin
|
1532
|
+
"""
|
1533
|
+
return pulumi.get(self, "passthrough_request_headers")
|
1534
|
+
|
1535
|
+
@_builtins.property
|
1536
|
+
@pulumi.getter(name="pluginVersion")
|
1537
|
+
def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1538
|
+
"""
|
1539
|
+
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1540
|
+
"""
|
1541
|
+
return pulumi.get(self, "plugin_version")
|
1542
|
+
|
1543
|
+
@_builtins.property
|
1544
|
+
@pulumi.getter(name="sealWrap")
|
1545
|
+
def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
|
1546
|
+
"""
|
1547
|
+
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1548
|
+
"""
|
1549
|
+
return pulumi.get(self, "seal_wrap")
|
1550
|
+
|
1551
|
+
@_builtins.property
|
914
1552
|
@pulumi.getter
|
915
|
-
def token(self) -> pulumi.Output[Optional[
|
1553
|
+
def token(self) -> pulumi.Output[Optional[_builtins.str]]:
|
916
1554
|
"""
|
917
1555
|
Specifies the Nomad Management token to use.
|
918
1556
|
"""
|
919
1557
|
return pulumi.get(self, "token")
|
920
1558
|
|
921
|
-
@property
|
1559
|
+
@_builtins.property
|
922
1560
|
@pulumi.getter
|
923
|
-
def ttl(self) -> pulumi.Output[
|
1561
|
+
def ttl(self) -> pulumi.Output[_builtins.int]:
|
924
1562
|
"""
|
925
1563
|
Specifies the ttl of the lease for the generated token.
|
926
1564
|
"""
|