pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +19 -1
- pulumi_vault/_inputs.py +873 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +1016 -439
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +1057 -285
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +887 -256
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +426 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +878 -336
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +400 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +1006 -227
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +431 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +732 -693
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +380 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +909 -271
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +234 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +205 -159
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +902 -231
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +217 -124
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +833 -155
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +377 -350
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0.dist-info/RECORD +270 -0
- pulumi_vault-7.1.0.dist-info/RECORD +0 -268
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,127 +19,240 @@ __all__ = ['SecretBackendArgs', 'SecretBackend']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class SecretBackendArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
connection_uri: pulumi.Input[
|
24
|
-
password: pulumi.Input[
|
25
|
-
username: pulumi.Input[
|
26
|
-
|
27
|
-
|
28
|
-
|
29
|
-
|
30
|
-
|
31
|
-
|
32
|
-
|
33
|
-
|
34
|
-
|
22
|
+
connection_uri: pulumi.Input[_builtins.str],
|
23
|
+
password: pulumi.Input[_builtins.str],
|
24
|
+
username: pulumi.Input[_builtins.str],
|
25
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
26
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
27
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
28
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
29
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
30
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
31
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
32
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
33
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
34
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
35
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
36
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
37
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
38
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
39
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
40
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
41
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
42
|
+
password_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
43
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
44
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
45
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
46
|
+
username_template: Optional[pulumi.Input[_builtins.str]] = None,
|
47
|
+
verify_connection: Optional[pulumi.Input[_builtins.bool]] = None):
|
35
48
|
"""
|
36
49
|
The set of arguments for constructing a SecretBackend resource.
|
37
|
-
:param pulumi.Input[
|
38
|
-
:param pulumi.Input[
|
39
|
-
:param pulumi.Input[
|
40
|
-
:param pulumi.Input[
|
41
|
-
|
42
|
-
:param pulumi.Input[
|
43
|
-
:param pulumi.Input[
|
50
|
+
:param pulumi.Input[_builtins.str] connection_uri: Specifies the RabbitMQ connection URI.
|
51
|
+
:param pulumi.Input[_builtins.str] password: Specifies the RabbitMQ management administrator password.
|
52
|
+
:param pulumi.Input[_builtins.str] username: Specifies the RabbitMQ management administrator username.
|
53
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
54
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
55
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
56
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
57
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
|
58
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
59
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
|
60
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
44
61
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
45
|
-
:param pulumi.Input[
|
46
|
-
|
47
|
-
:param pulumi.Input[
|
62
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
63
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
64
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
65
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
66
|
+
:param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
67
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
|
68
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
48
69
|
The value should not contain leading or trailing forward slashes.
|
49
70
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
50
71
|
*Available only for Vault Enterprise*.
|
51
|
-
:param pulumi.Input[
|
52
|
-
:param pulumi.Input[
|
72
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
73
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
74
|
+
:param pulumi.Input[_builtins.str] password_policy: Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set.
|
75
|
+
:param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
|
53
76
|
not begin or end with a `/`. Defaults to `rabbitmq`.
|
54
|
-
:param pulumi.Input[
|
55
|
-
:param pulumi.Input[
|
77
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
78
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
79
|
+
:param pulumi.Input[_builtins.str] username_template: Template describing how dynamic usernames are generated.
|
80
|
+
:param pulumi.Input[_builtins.bool] verify_connection: Specifies whether to verify connection URI, username, and password.
|
56
81
|
Defaults to `true`.
|
57
82
|
"""
|
58
83
|
pulumi.set(__self__, "connection_uri", connection_uri)
|
59
84
|
pulumi.set(__self__, "password", password)
|
60
85
|
pulumi.set(__self__, "username", username)
|
86
|
+
if allowed_managed_keys is not None:
|
87
|
+
pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
|
88
|
+
if allowed_response_headers is not None:
|
89
|
+
pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
|
90
|
+
if audit_non_hmac_request_keys is not None:
|
91
|
+
pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
|
92
|
+
if audit_non_hmac_response_keys is not None:
|
93
|
+
pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
|
61
94
|
if default_lease_ttl_seconds is not None:
|
62
95
|
pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
|
96
|
+
if delegated_auth_accessors is not None:
|
97
|
+
pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
|
63
98
|
if description is not None:
|
64
99
|
pulumi.set(__self__, "description", description)
|
65
100
|
if disable_remount is not None:
|
66
101
|
pulumi.set(__self__, "disable_remount", disable_remount)
|
102
|
+
if external_entropy_access is not None:
|
103
|
+
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
104
|
+
if force_no_cache is not None:
|
105
|
+
pulumi.set(__self__, "force_no_cache", force_no_cache)
|
106
|
+
if identity_token_key is not None:
|
107
|
+
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
108
|
+
if listing_visibility is not None:
|
109
|
+
pulumi.set(__self__, "listing_visibility", listing_visibility)
|
110
|
+
if local is not None:
|
111
|
+
pulumi.set(__self__, "local", local)
|
67
112
|
if max_lease_ttl_seconds is not None:
|
68
113
|
pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
|
69
114
|
if namespace is not None:
|
70
115
|
pulumi.set(__self__, "namespace", namespace)
|
116
|
+
if options is not None:
|
117
|
+
pulumi.set(__self__, "options", options)
|
118
|
+
if passthrough_request_headers is not None:
|
119
|
+
pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
|
71
120
|
if password_policy is not None:
|
72
121
|
pulumi.set(__self__, "password_policy", password_policy)
|
73
122
|
if path is not None:
|
74
123
|
pulumi.set(__self__, "path", path)
|
124
|
+
if plugin_version is not None:
|
125
|
+
pulumi.set(__self__, "plugin_version", plugin_version)
|
126
|
+
if seal_wrap is not None:
|
127
|
+
pulumi.set(__self__, "seal_wrap", seal_wrap)
|
75
128
|
if username_template is not None:
|
76
129
|
pulumi.set(__self__, "username_template", username_template)
|
77
130
|
if verify_connection is not None:
|
78
131
|
pulumi.set(__self__, "verify_connection", verify_connection)
|
79
132
|
|
80
|
-
@property
|
133
|
+
@_builtins.property
|
81
134
|
@pulumi.getter(name="connectionUri")
|
82
|
-
def connection_uri(self) -> pulumi.Input[
|
135
|
+
def connection_uri(self) -> pulumi.Input[_builtins.str]:
|
83
136
|
"""
|
84
137
|
Specifies the RabbitMQ connection URI.
|
85
138
|
"""
|
86
139
|
return pulumi.get(self, "connection_uri")
|
87
140
|
|
88
141
|
@connection_uri.setter
|
89
|
-
def connection_uri(self, value: pulumi.Input[
|
142
|
+
def connection_uri(self, value: pulumi.Input[_builtins.str]):
|
90
143
|
pulumi.set(self, "connection_uri", value)
|
91
144
|
|
92
|
-
@property
|
145
|
+
@_builtins.property
|
93
146
|
@pulumi.getter
|
94
|
-
def password(self) -> pulumi.Input[
|
147
|
+
def password(self) -> pulumi.Input[_builtins.str]:
|
95
148
|
"""
|
96
149
|
Specifies the RabbitMQ management administrator password.
|
97
150
|
"""
|
98
151
|
return pulumi.get(self, "password")
|
99
152
|
|
100
153
|
@password.setter
|
101
|
-
def password(self, value: pulumi.Input[
|
154
|
+
def password(self, value: pulumi.Input[_builtins.str]):
|
102
155
|
pulumi.set(self, "password", value)
|
103
156
|
|
104
|
-
@property
|
157
|
+
@_builtins.property
|
105
158
|
@pulumi.getter
|
106
|
-
def username(self) -> pulumi.Input[
|
159
|
+
def username(self) -> pulumi.Input[_builtins.str]:
|
107
160
|
"""
|
108
161
|
Specifies the RabbitMQ management administrator username.
|
109
162
|
"""
|
110
163
|
return pulumi.get(self, "username")
|
111
164
|
|
112
165
|
@username.setter
|
113
|
-
def username(self, value: pulumi.Input[
|
166
|
+
def username(self, value: pulumi.Input[_builtins.str]):
|
114
167
|
pulumi.set(self, "username", value)
|
115
168
|
|
116
|
-
@property
|
169
|
+
@_builtins.property
|
170
|
+
@pulumi.getter(name="allowedManagedKeys")
|
171
|
+
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
172
|
+
"""
|
173
|
+
List of managed key registry entry names that the mount in question is allowed to access
|
174
|
+
"""
|
175
|
+
return pulumi.get(self, "allowed_managed_keys")
|
176
|
+
|
177
|
+
@allowed_managed_keys.setter
|
178
|
+
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
179
|
+
pulumi.set(self, "allowed_managed_keys", value)
|
180
|
+
|
181
|
+
@_builtins.property
|
182
|
+
@pulumi.getter(name="allowedResponseHeaders")
|
183
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
184
|
+
"""
|
185
|
+
List of headers to allow and pass from the request to the plugin
|
186
|
+
"""
|
187
|
+
return pulumi.get(self, "allowed_response_headers")
|
188
|
+
|
189
|
+
@allowed_response_headers.setter
|
190
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
191
|
+
pulumi.set(self, "allowed_response_headers", value)
|
192
|
+
|
193
|
+
@_builtins.property
|
194
|
+
@pulumi.getter(name="auditNonHmacRequestKeys")
|
195
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
196
|
+
"""
|
197
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
198
|
+
"""
|
199
|
+
return pulumi.get(self, "audit_non_hmac_request_keys")
|
200
|
+
|
201
|
+
@audit_non_hmac_request_keys.setter
|
202
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
203
|
+
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
204
|
+
|
205
|
+
@_builtins.property
|
206
|
+
@pulumi.getter(name="auditNonHmacResponseKeys")
|
207
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
208
|
+
"""
|
209
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
210
|
+
"""
|
211
|
+
return pulumi.get(self, "audit_non_hmac_response_keys")
|
212
|
+
|
213
|
+
@audit_non_hmac_response_keys.setter
|
214
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
215
|
+
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
216
|
+
|
217
|
+
@_builtins.property
|
117
218
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
118
|
-
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
219
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
119
220
|
"""
|
120
|
-
|
121
|
-
issued by this backend.
|
221
|
+
Default lease duration for secrets in seconds
|
122
222
|
"""
|
123
223
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
124
224
|
|
125
225
|
@default_lease_ttl_seconds.setter
|
126
|
-
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
226
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
127
227
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
128
228
|
|
129
|
-
@property
|
229
|
+
@_builtins.property
|
230
|
+
@pulumi.getter(name="delegatedAuthAccessors")
|
231
|
+
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
232
|
+
"""
|
233
|
+
List of headers to allow and pass from the request to the plugin
|
234
|
+
"""
|
235
|
+
return pulumi.get(self, "delegated_auth_accessors")
|
236
|
+
|
237
|
+
@delegated_auth_accessors.setter
|
238
|
+
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
239
|
+
pulumi.set(self, "delegated_auth_accessors", value)
|
240
|
+
|
241
|
+
@_builtins.property
|
130
242
|
@pulumi.getter
|
131
|
-
def description(self) -> Optional[pulumi.Input[
|
243
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
132
244
|
"""
|
133
|
-
|
245
|
+
Human-friendly description of the mount for the backend.
|
134
246
|
"""
|
135
247
|
return pulumi.get(self, "description")
|
136
248
|
|
137
249
|
@description.setter
|
138
|
-
def description(self, value: Optional[pulumi.Input[
|
250
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
139
251
|
pulumi.set(self, "description", value)
|
140
252
|
|
141
|
-
@property
|
253
|
+
@_builtins.property
|
142
254
|
@pulumi.getter(name="disableRemount")
|
143
|
-
def disable_remount(self) -> Optional[pulumi.Input[
|
255
|
+
def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
144
256
|
"""
|
145
257
|
If set, opts out of mount migration on path updates.
|
146
258
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -148,25 +260,84 @@ class SecretBackendArgs:
|
|
148
260
|
return pulumi.get(self, "disable_remount")
|
149
261
|
|
150
262
|
@disable_remount.setter
|
151
|
-
def disable_remount(self, value: Optional[pulumi.Input[
|
263
|
+
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
152
264
|
pulumi.set(self, "disable_remount", value)
|
153
265
|
|
154
|
-
@property
|
266
|
+
@_builtins.property
|
267
|
+
@pulumi.getter(name="externalEntropyAccess")
|
268
|
+
def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
269
|
+
"""
|
270
|
+
Enable the secrets engine to access Vault's external entropy source
|
271
|
+
"""
|
272
|
+
return pulumi.get(self, "external_entropy_access")
|
273
|
+
|
274
|
+
@external_entropy_access.setter
|
275
|
+
def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
276
|
+
pulumi.set(self, "external_entropy_access", value)
|
277
|
+
|
278
|
+
@_builtins.property
|
279
|
+
@pulumi.getter(name="forceNoCache")
|
280
|
+
def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
281
|
+
"""
|
282
|
+
If set to true, disables caching.
|
283
|
+
"""
|
284
|
+
return pulumi.get(self, "force_no_cache")
|
285
|
+
|
286
|
+
@force_no_cache.setter
|
287
|
+
def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
288
|
+
pulumi.set(self, "force_no_cache", value)
|
289
|
+
|
290
|
+
@_builtins.property
|
291
|
+
@pulumi.getter(name="identityTokenKey")
|
292
|
+
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
293
|
+
"""
|
294
|
+
The key to use for signing plugin workload identity tokens
|
295
|
+
"""
|
296
|
+
return pulumi.get(self, "identity_token_key")
|
297
|
+
|
298
|
+
@identity_token_key.setter
|
299
|
+
def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
300
|
+
pulumi.set(self, "identity_token_key", value)
|
301
|
+
|
302
|
+
@_builtins.property
|
303
|
+
@pulumi.getter(name="listingVisibility")
|
304
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
305
|
+
"""
|
306
|
+
Specifies whether to show this mount in the UI-specific listing endpoint
|
307
|
+
"""
|
308
|
+
return pulumi.get(self, "listing_visibility")
|
309
|
+
|
310
|
+
@listing_visibility.setter
|
311
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
312
|
+
pulumi.set(self, "listing_visibility", value)
|
313
|
+
|
314
|
+
@_builtins.property
|
315
|
+
@pulumi.getter
|
316
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
317
|
+
"""
|
318
|
+
Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
319
|
+
"""
|
320
|
+
return pulumi.get(self, "local")
|
321
|
+
|
322
|
+
@local.setter
|
323
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
324
|
+
pulumi.set(self, "local", value)
|
325
|
+
|
326
|
+
@_builtins.property
|
155
327
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
156
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
328
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
157
329
|
"""
|
158
|
-
|
159
|
-
for credentials issued by this backend.
|
330
|
+
Maximum possible lease duration for secrets in seconds
|
160
331
|
"""
|
161
332
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
162
333
|
|
163
334
|
@max_lease_ttl_seconds.setter
|
164
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
335
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
165
336
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
166
337
|
|
167
|
-
@property
|
338
|
+
@_builtins.property
|
168
339
|
@pulumi.getter
|
169
|
-
def namespace(self) -> Optional[pulumi.Input[
|
340
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
170
341
|
"""
|
171
342
|
The namespace to provision the resource in.
|
172
343
|
The value should not contain leading or trailing forward slashes.
|
@@ -176,24 +347,48 @@ class SecretBackendArgs:
|
|
176
347
|
return pulumi.get(self, "namespace")
|
177
348
|
|
178
349
|
@namespace.setter
|
179
|
-
def namespace(self, value: Optional[pulumi.Input[
|
350
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
180
351
|
pulumi.set(self, "namespace", value)
|
181
352
|
|
182
|
-
@property
|
353
|
+
@_builtins.property
|
354
|
+
@pulumi.getter
|
355
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
356
|
+
"""
|
357
|
+
Specifies mount type specific options that are passed to the backend
|
358
|
+
"""
|
359
|
+
return pulumi.get(self, "options")
|
360
|
+
|
361
|
+
@options.setter
|
362
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
363
|
+
pulumi.set(self, "options", value)
|
364
|
+
|
365
|
+
@_builtins.property
|
366
|
+
@pulumi.getter(name="passthroughRequestHeaders")
|
367
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
368
|
+
"""
|
369
|
+
List of headers to allow and pass from the request to the plugin
|
370
|
+
"""
|
371
|
+
return pulumi.get(self, "passthrough_request_headers")
|
372
|
+
|
373
|
+
@passthrough_request_headers.setter
|
374
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
375
|
+
pulumi.set(self, "passthrough_request_headers", value)
|
376
|
+
|
377
|
+
@_builtins.property
|
183
378
|
@pulumi.getter(name="passwordPolicy")
|
184
|
-
def password_policy(self) -> Optional[pulumi.Input[
|
379
|
+
def password_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
|
185
380
|
"""
|
186
381
|
Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set.
|
187
382
|
"""
|
188
383
|
return pulumi.get(self, "password_policy")
|
189
384
|
|
190
385
|
@password_policy.setter
|
191
|
-
def password_policy(self, value: Optional[pulumi.Input[
|
386
|
+
def password_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
|
192
387
|
pulumi.set(self, "password_policy", value)
|
193
388
|
|
194
|
-
@property
|
389
|
+
@_builtins.property
|
195
390
|
@pulumi.getter
|
196
|
-
def path(self) -> Optional[pulumi.Input[
|
391
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
197
392
|
"""
|
198
393
|
The unique path this backend should be mounted at. Must
|
199
394
|
not begin or end with a `/`. Defaults to `rabbitmq`.
|
@@ -201,24 +396,48 @@ class SecretBackendArgs:
|
|
201
396
|
return pulumi.get(self, "path")
|
202
397
|
|
203
398
|
@path.setter
|
204
|
-
def path(self, value: Optional[pulumi.Input[
|
399
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
205
400
|
pulumi.set(self, "path", value)
|
206
401
|
|
207
|
-
@property
|
402
|
+
@_builtins.property
|
403
|
+
@pulumi.getter(name="pluginVersion")
|
404
|
+
def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
|
405
|
+
"""
|
406
|
+
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
407
|
+
"""
|
408
|
+
return pulumi.get(self, "plugin_version")
|
409
|
+
|
410
|
+
@plugin_version.setter
|
411
|
+
def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
|
412
|
+
pulumi.set(self, "plugin_version", value)
|
413
|
+
|
414
|
+
@_builtins.property
|
415
|
+
@pulumi.getter(name="sealWrap")
|
416
|
+
def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
417
|
+
"""
|
418
|
+
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
419
|
+
"""
|
420
|
+
return pulumi.get(self, "seal_wrap")
|
421
|
+
|
422
|
+
@seal_wrap.setter
|
423
|
+
def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
424
|
+
pulumi.set(self, "seal_wrap", value)
|
425
|
+
|
426
|
+
@_builtins.property
|
208
427
|
@pulumi.getter(name="usernameTemplate")
|
209
|
-
def username_template(self) -> Optional[pulumi.Input[
|
428
|
+
def username_template(self) -> Optional[pulumi.Input[_builtins.str]]:
|
210
429
|
"""
|
211
430
|
Template describing how dynamic usernames are generated.
|
212
431
|
"""
|
213
432
|
return pulumi.get(self, "username_template")
|
214
433
|
|
215
434
|
@username_template.setter
|
216
|
-
def username_template(self, value: Optional[pulumi.Input[
|
435
|
+
def username_template(self, value: Optional[pulumi.Input[_builtins.str]]):
|
217
436
|
pulumi.set(self, "username_template", value)
|
218
437
|
|
219
|
-
@property
|
438
|
+
@_builtins.property
|
220
439
|
@pulumi.getter(name="verifyConnection")
|
221
|
-
def verify_connection(self) -> Optional[pulumi.Input[
|
440
|
+
def verify_connection(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
222
441
|
"""
|
223
442
|
Specifies whether to verify connection URI, username, and password.
|
224
443
|
Defaults to `true`.
|
@@ -226,66 +445,124 @@ class SecretBackendArgs:
|
|
226
445
|
return pulumi.get(self, "verify_connection")
|
227
446
|
|
228
447
|
@verify_connection.setter
|
229
|
-
def verify_connection(self, value: Optional[pulumi.Input[
|
448
|
+
def verify_connection(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
230
449
|
pulumi.set(self, "verify_connection", value)
|
231
450
|
|
232
451
|
|
233
452
|
@pulumi.input_type
|
234
453
|
class _SecretBackendState:
|
235
454
|
def __init__(__self__, *,
|
236
|
-
|
237
|
-
|
238
|
-
|
239
|
-
|
240
|
-
|
241
|
-
|
242
|
-
|
243
|
-
|
244
|
-
|
245
|
-
|
246
|
-
|
247
|
-
|
455
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
456
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
457
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
458
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
459
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
460
|
+
connection_uri: Optional[pulumi.Input[_builtins.str]] = None,
|
461
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
462
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
463
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
464
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
465
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
466
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
467
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
468
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
469
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
470
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
471
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
472
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
473
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
474
|
+
password: Optional[pulumi.Input[_builtins.str]] = None,
|
475
|
+
password_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
476
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
477
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
478
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
479
|
+
username: Optional[pulumi.Input[_builtins.str]] = None,
|
480
|
+
username_template: Optional[pulumi.Input[_builtins.str]] = None,
|
481
|
+
verify_connection: Optional[pulumi.Input[_builtins.bool]] = None):
|
248
482
|
"""
|
249
483
|
Input properties used for looking up and filtering SecretBackend resources.
|
250
|
-
:param pulumi.Input[
|
251
|
-
:param pulumi.Input[
|
252
|
-
|
253
|
-
:param pulumi.Input[
|
254
|
-
:param pulumi.Input[
|
484
|
+
:param pulumi.Input[_builtins.str] accessor: Accessor of the mount
|
485
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
486
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
487
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
488
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
489
|
+
:param pulumi.Input[_builtins.str] connection_uri: Specifies the RabbitMQ connection URI.
|
490
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
|
491
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
492
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
|
493
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
255
494
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
256
|
-
:param pulumi.Input[
|
257
|
-
|
258
|
-
:param pulumi.Input[
|
495
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
496
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
497
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
498
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
499
|
+
:param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
500
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
|
501
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
259
502
|
The value should not contain leading or trailing forward slashes.
|
260
503
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
261
504
|
*Available only for Vault Enterprise*.
|
262
|
-
:param pulumi.Input[
|
263
|
-
:param pulumi.Input[
|
264
|
-
:param pulumi.Input[
|
505
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
506
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
507
|
+
:param pulumi.Input[_builtins.str] password: Specifies the RabbitMQ management administrator password.
|
508
|
+
:param pulumi.Input[_builtins.str] password_policy: Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set.
|
509
|
+
:param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
|
265
510
|
not begin or end with a `/`. Defaults to `rabbitmq`.
|
266
|
-
:param pulumi.Input[
|
267
|
-
:param pulumi.Input[
|
268
|
-
:param pulumi.Input[
|
511
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
512
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
513
|
+
:param pulumi.Input[_builtins.str] username: Specifies the RabbitMQ management administrator username.
|
514
|
+
:param pulumi.Input[_builtins.str] username_template: Template describing how dynamic usernames are generated.
|
515
|
+
:param pulumi.Input[_builtins.bool] verify_connection: Specifies whether to verify connection URI, username, and password.
|
269
516
|
Defaults to `true`.
|
270
517
|
"""
|
518
|
+
if accessor is not None:
|
519
|
+
pulumi.set(__self__, "accessor", accessor)
|
520
|
+
if allowed_managed_keys is not None:
|
521
|
+
pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
|
522
|
+
if allowed_response_headers is not None:
|
523
|
+
pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
|
524
|
+
if audit_non_hmac_request_keys is not None:
|
525
|
+
pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
|
526
|
+
if audit_non_hmac_response_keys is not None:
|
527
|
+
pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
|
271
528
|
if connection_uri is not None:
|
272
529
|
pulumi.set(__self__, "connection_uri", connection_uri)
|
273
530
|
if default_lease_ttl_seconds is not None:
|
274
531
|
pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
|
532
|
+
if delegated_auth_accessors is not None:
|
533
|
+
pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
|
275
534
|
if description is not None:
|
276
535
|
pulumi.set(__self__, "description", description)
|
277
536
|
if disable_remount is not None:
|
278
537
|
pulumi.set(__self__, "disable_remount", disable_remount)
|
538
|
+
if external_entropy_access is not None:
|
539
|
+
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
540
|
+
if force_no_cache is not None:
|
541
|
+
pulumi.set(__self__, "force_no_cache", force_no_cache)
|
542
|
+
if identity_token_key is not None:
|
543
|
+
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
544
|
+
if listing_visibility is not None:
|
545
|
+
pulumi.set(__self__, "listing_visibility", listing_visibility)
|
546
|
+
if local is not None:
|
547
|
+
pulumi.set(__self__, "local", local)
|
279
548
|
if max_lease_ttl_seconds is not None:
|
280
549
|
pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
|
281
550
|
if namespace is not None:
|
282
551
|
pulumi.set(__self__, "namespace", namespace)
|
552
|
+
if options is not None:
|
553
|
+
pulumi.set(__self__, "options", options)
|
554
|
+
if passthrough_request_headers is not None:
|
555
|
+
pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
|
283
556
|
if password is not None:
|
284
557
|
pulumi.set(__self__, "password", password)
|
285
558
|
if password_policy is not None:
|
286
559
|
pulumi.set(__self__, "password_policy", password_policy)
|
287
560
|
if path is not None:
|
288
561
|
pulumi.set(__self__, "path", path)
|
562
|
+
if plugin_version is not None:
|
563
|
+
pulumi.set(__self__, "plugin_version", plugin_version)
|
564
|
+
if seal_wrap is not None:
|
565
|
+
pulumi.set(__self__, "seal_wrap", seal_wrap)
|
289
566
|
if username is not None:
|
290
567
|
pulumi.set(__self__, "username", username)
|
291
568
|
if username_template is not None:
|
@@ -293,46 +570,117 @@ class _SecretBackendState:
|
|
293
570
|
if verify_connection is not None:
|
294
571
|
pulumi.set(__self__, "verify_connection", verify_connection)
|
295
572
|
|
296
|
-
@property
|
573
|
+
@_builtins.property
|
574
|
+
@pulumi.getter
|
575
|
+
def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
|
576
|
+
"""
|
577
|
+
Accessor of the mount
|
578
|
+
"""
|
579
|
+
return pulumi.get(self, "accessor")
|
580
|
+
|
581
|
+
@accessor.setter
|
582
|
+
def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
|
583
|
+
pulumi.set(self, "accessor", value)
|
584
|
+
|
585
|
+
@_builtins.property
|
586
|
+
@pulumi.getter(name="allowedManagedKeys")
|
587
|
+
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
588
|
+
"""
|
589
|
+
List of managed key registry entry names that the mount in question is allowed to access
|
590
|
+
"""
|
591
|
+
return pulumi.get(self, "allowed_managed_keys")
|
592
|
+
|
593
|
+
@allowed_managed_keys.setter
|
594
|
+
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
595
|
+
pulumi.set(self, "allowed_managed_keys", value)
|
596
|
+
|
597
|
+
@_builtins.property
|
598
|
+
@pulumi.getter(name="allowedResponseHeaders")
|
599
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
600
|
+
"""
|
601
|
+
List of headers to allow and pass from the request to the plugin
|
602
|
+
"""
|
603
|
+
return pulumi.get(self, "allowed_response_headers")
|
604
|
+
|
605
|
+
@allowed_response_headers.setter
|
606
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
607
|
+
pulumi.set(self, "allowed_response_headers", value)
|
608
|
+
|
609
|
+
@_builtins.property
|
610
|
+
@pulumi.getter(name="auditNonHmacRequestKeys")
|
611
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
612
|
+
"""
|
613
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
614
|
+
"""
|
615
|
+
return pulumi.get(self, "audit_non_hmac_request_keys")
|
616
|
+
|
617
|
+
@audit_non_hmac_request_keys.setter
|
618
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
619
|
+
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
620
|
+
|
621
|
+
@_builtins.property
|
622
|
+
@pulumi.getter(name="auditNonHmacResponseKeys")
|
623
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
624
|
+
"""
|
625
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
626
|
+
"""
|
627
|
+
return pulumi.get(self, "audit_non_hmac_response_keys")
|
628
|
+
|
629
|
+
@audit_non_hmac_response_keys.setter
|
630
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
631
|
+
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
632
|
+
|
633
|
+
@_builtins.property
|
297
634
|
@pulumi.getter(name="connectionUri")
|
298
|
-
def connection_uri(self) -> Optional[pulumi.Input[
|
635
|
+
def connection_uri(self) -> Optional[pulumi.Input[_builtins.str]]:
|
299
636
|
"""
|
300
637
|
Specifies the RabbitMQ connection URI.
|
301
638
|
"""
|
302
639
|
return pulumi.get(self, "connection_uri")
|
303
640
|
|
304
641
|
@connection_uri.setter
|
305
|
-
def connection_uri(self, value: Optional[pulumi.Input[
|
642
|
+
def connection_uri(self, value: Optional[pulumi.Input[_builtins.str]]):
|
306
643
|
pulumi.set(self, "connection_uri", value)
|
307
644
|
|
308
|
-
@property
|
645
|
+
@_builtins.property
|
309
646
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
310
|
-
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
647
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
311
648
|
"""
|
312
|
-
|
313
|
-
issued by this backend.
|
649
|
+
Default lease duration for secrets in seconds
|
314
650
|
"""
|
315
651
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
316
652
|
|
317
653
|
@default_lease_ttl_seconds.setter
|
318
|
-
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
654
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
319
655
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
320
656
|
|
321
|
-
@property
|
657
|
+
@_builtins.property
|
658
|
+
@pulumi.getter(name="delegatedAuthAccessors")
|
659
|
+
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
660
|
+
"""
|
661
|
+
List of headers to allow and pass from the request to the plugin
|
662
|
+
"""
|
663
|
+
return pulumi.get(self, "delegated_auth_accessors")
|
664
|
+
|
665
|
+
@delegated_auth_accessors.setter
|
666
|
+
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
667
|
+
pulumi.set(self, "delegated_auth_accessors", value)
|
668
|
+
|
669
|
+
@_builtins.property
|
322
670
|
@pulumi.getter
|
323
|
-
def description(self) -> Optional[pulumi.Input[
|
671
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
324
672
|
"""
|
325
|
-
|
673
|
+
Human-friendly description of the mount for the backend.
|
326
674
|
"""
|
327
675
|
return pulumi.get(self, "description")
|
328
676
|
|
329
677
|
@description.setter
|
330
|
-
def description(self, value: Optional[pulumi.Input[
|
678
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
331
679
|
pulumi.set(self, "description", value)
|
332
680
|
|
333
|
-
@property
|
681
|
+
@_builtins.property
|
334
682
|
@pulumi.getter(name="disableRemount")
|
335
|
-
def disable_remount(self) -> Optional[pulumi.Input[
|
683
|
+
def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
336
684
|
"""
|
337
685
|
If set, opts out of mount migration on path updates.
|
338
686
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -340,25 +688,84 @@ class _SecretBackendState:
|
|
340
688
|
return pulumi.get(self, "disable_remount")
|
341
689
|
|
342
690
|
@disable_remount.setter
|
343
|
-
def disable_remount(self, value: Optional[pulumi.Input[
|
691
|
+
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
344
692
|
pulumi.set(self, "disable_remount", value)
|
345
693
|
|
346
|
-
@property
|
694
|
+
@_builtins.property
|
695
|
+
@pulumi.getter(name="externalEntropyAccess")
|
696
|
+
def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
697
|
+
"""
|
698
|
+
Enable the secrets engine to access Vault's external entropy source
|
699
|
+
"""
|
700
|
+
return pulumi.get(self, "external_entropy_access")
|
701
|
+
|
702
|
+
@external_entropy_access.setter
|
703
|
+
def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
704
|
+
pulumi.set(self, "external_entropy_access", value)
|
705
|
+
|
706
|
+
@_builtins.property
|
707
|
+
@pulumi.getter(name="forceNoCache")
|
708
|
+
def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
709
|
+
"""
|
710
|
+
If set to true, disables caching.
|
711
|
+
"""
|
712
|
+
return pulumi.get(self, "force_no_cache")
|
713
|
+
|
714
|
+
@force_no_cache.setter
|
715
|
+
def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
716
|
+
pulumi.set(self, "force_no_cache", value)
|
717
|
+
|
718
|
+
@_builtins.property
|
719
|
+
@pulumi.getter(name="identityTokenKey")
|
720
|
+
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
721
|
+
"""
|
722
|
+
The key to use for signing plugin workload identity tokens
|
723
|
+
"""
|
724
|
+
return pulumi.get(self, "identity_token_key")
|
725
|
+
|
726
|
+
@identity_token_key.setter
|
727
|
+
def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
728
|
+
pulumi.set(self, "identity_token_key", value)
|
729
|
+
|
730
|
+
@_builtins.property
|
731
|
+
@pulumi.getter(name="listingVisibility")
|
732
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
733
|
+
"""
|
734
|
+
Specifies whether to show this mount in the UI-specific listing endpoint
|
735
|
+
"""
|
736
|
+
return pulumi.get(self, "listing_visibility")
|
737
|
+
|
738
|
+
@listing_visibility.setter
|
739
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
740
|
+
pulumi.set(self, "listing_visibility", value)
|
741
|
+
|
742
|
+
@_builtins.property
|
743
|
+
@pulumi.getter
|
744
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
745
|
+
"""
|
746
|
+
Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
747
|
+
"""
|
748
|
+
return pulumi.get(self, "local")
|
749
|
+
|
750
|
+
@local.setter
|
751
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
752
|
+
pulumi.set(self, "local", value)
|
753
|
+
|
754
|
+
@_builtins.property
|
347
755
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
348
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
756
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
349
757
|
"""
|
350
|
-
|
351
|
-
for credentials issued by this backend.
|
758
|
+
Maximum possible lease duration for secrets in seconds
|
352
759
|
"""
|
353
760
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
354
761
|
|
355
762
|
@max_lease_ttl_seconds.setter
|
356
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
763
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
357
764
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
358
765
|
|
359
|
-
@property
|
766
|
+
@_builtins.property
|
360
767
|
@pulumi.getter
|
361
|
-
def namespace(self) -> Optional[pulumi.Input[
|
768
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
362
769
|
"""
|
363
770
|
The namespace to provision the resource in.
|
364
771
|
The value should not contain leading or trailing forward slashes.
|
@@ -368,36 +775,60 @@ class _SecretBackendState:
|
|
368
775
|
return pulumi.get(self, "namespace")
|
369
776
|
|
370
777
|
@namespace.setter
|
371
|
-
def namespace(self, value: Optional[pulumi.Input[
|
778
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
372
779
|
pulumi.set(self, "namespace", value)
|
373
780
|
|
374
|
-
@property
|
781
|
+
@_builtins.property
|
782
|
+
@pulumi.getter
|
783
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
784
|
+
"""
|
785
|
+
Specifies mount type specific options that are passed to the backend
|
786
|
+
"""
|
787
|
+
return pulumi.get(self, "options")
|
788
|
+
|
789
|
+
@options.setter
|
790
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
791
|
+
pulumi.set(self, "options", value)
|
792
|
+
|
793
|
+
@_builtins.property
|
794
|
+
@pulumi.getter(name="passthroughRequestHeaders")
|
795
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
796
|
+
"""
|
797
|
+
List of headers to allow and pass from the request to the plugin
|
798
|
+
"""
|
799
|
+
return pulumi.get(self, "passthrough_request_headers")
|
800
|
+
|
801
|
+
@passthrough_request_headers.setter
|
802
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
803
|
+
pulumi.set(self, "passthrough_request_headers", value)
|
804
|
+
|
805
|
+
@_builtins.property
|
375
806
|
@pulumi.getter
|
376
|
-
def password(self) -> Optional[pulumi.Input[
|
807
|
+
def password(self) -> Optional[pulumi.Input[_builtins.str]]:
|
377
808
|
"""
|
378
809
|
Specifies the RabbitMQ management administrator password.
|
379
810
|
"""
|
380
811
|
return pulumi.get(self, "password")
|
381
812
|
|
382
813
|
@password.setter
|
383
|
-
def password(self, value: Optional[pulumi.Input[
|
814
|
+
def password(self, value: Optional[pulumi.Input[_builtins.str]]):
|
384
815
|
pulumi.set(self, "password", value)
|
385
816
|
|
386
|
-
@property
|
817
|
+
@_builtins.property
|
387
818
|
@pulumi.getter(name="passwordPolicy")
|
388
|
-
def password_policy(self) -> Optional[pulumi.Input[
|
819
|
+
def password_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
|
389
820
|
"""
|
390
821
|
Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set.
|
391
822
|
"""
|
392
823
|
return pulumi.get(self, "password_policy")
|
393
824
|
|
394
825
|
@password_policy.setter
|
395
|
-
def password_policy(self, value: Optional[pulumi.Input[
|
826
|
+
def password_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
|
396
827
|
pulumi.set(self, "password_policy", value)
|
397
828
|
|
398
|
-
@property
|
829
|
+
@_builtins.property
|
399
830
|
@pulumi.getter
|
400
|
-
def path(self) -> Optional[pulumi.Input[
|
831
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
401
832
|
"""
|
402
833
|
The unique path this backend should be mounted at. Must
|
403
834
|
not begin or end with a `/`. Defaults to `rabbitmq`.
|
@@ -405,36 +836,60 @@ class _SecretBackendState:
|
|
405
836
|
return pulumi.get(self, "path")
|
406
837
|
|
407
838
|
@path.setter
|
408
|
-
def path(self, value: Optional[pulumi.Input[
|
839
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
409
840
|
pulumi.set(self, "path", value)
|
410
841
|
|
411
|
-
@property
|
842
|
+
@_builtins.property
|
843
|
+
@pulumi.getter(name="pluginVersion")
|
844
|
+
def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
|
845
|
+
"""
|
846
|
+
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
847
|
+
"""
|
848
|
+
return pulumi.get(self, "plugin_version")
|
849
|
+
|
850
|
+
@plugin_version.setter
|
851
|
+
def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
|
852
|
+
pulumi.set(self, "plugin_version", value)
|
853
|
+
|
854
|
+
@_builtins.property
|
855
|
+
@pulumi.getter(name="sealWrap")
|
856
|
+
def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
857
|
+
"""
|
858
|
+
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
859
|
+
"""
|
860
|
+
return pulumi.get(self, "seal_wrap")
|
861
|
+
|
862
|
+
@seal_wrap.setter
|
863
|
+
def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
864
|
+
pulumi.set(self, "seal_wrap", value)
|
865
|
+
|
866
|
+
@_builtins.property
|
412
867
|
@pulumi.getter
|
413
|
-
def username(self) -> Optional[pulumi.Input[
|
868
|
+
def username(self) -> Optional[pulumi.Input[_builtins.str]]:
|
414
869
|
"""
|
415
870
|
Specifies the RabbitMQ management administrator username.
|
416
871
|
"""
|
417
872
|
return pulumi.get(self, "username")
|
418
873
|
|
419
874
|
@username.setter
|
420
|
-
def username(self, value: Optional[pulumi.Input[
|
875
|
+
def username(self, value: Optional[pulumi.Input[_builtins.str]]):
|
421
876
|
pulumi.set(self, "username", value)
|
422
877
|
|
423
|
-
@property
|
878
|
+
@_builtins.property
|
424
879
|
@pulumi.getter(name="usernameTemplate")
|
425
|
-
def username_template(self) -> Optional[pulumi.Input[
|
880
|
+
def username_template(self) -> Optional[pulumi.Input[_builtins.str]]:
|
426
881
|
"""
|
427
882
|
Template describing how dynamic usernames are generated.
|
428
883
|
"""
|
429
884
|
return pulumi.get(self, "username_template")
|
430
885
|
|
431
886
|
@username_template.setter
|
432
|
-
def username_template(self, value: Optional[pulumi.Input[
|
887
|
+
def username_template(self, value: Optional[pulumi.Input[_builtins.str]]):
|
433
888
|
pulumi.set(self, "username_template", value)
|
434
889
|
|
435
|
-
@property
|
890
|
+
@_builtins.property
|
436
891
|
@pulumi.getter(name="verifyConnection")
|
437
|
-
def verify_connection(self) -> Optional[pulumi.Input[
|
892
|
+
def verify_connection(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
438
893
|
"""
|
439
894
|
Specifies whether to verify connection URI, username, and password.
|
440
895
|
Defaults to `true`.
|
@@ -442,7 +897,7 @@ class _SecretBackendState:
|
|
442
897
|
return pulumi.get(self, "verify_connection")
|
443
898
|
|
444
899
|
@verify_connection.setter
|
445
|
-
def verify_connection(self, value: Optional[pulumi.Input[
|
900
|
+
def verify_connection(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
446
901
|
pulumi.set(self, "verify_connection", value)
|
447
902
|
|
448
903
|
|
@@ -452,18 +907,32 @@ class SecretBackend(pulumi.CustomResource):
|
|
452
907
|
def __init__(__self__,
|
453
908
|
resource_name: str,
|
454
909
|
opts: Optional[pulumi.ResourceOptions] = None,
|
455
|
-
|
456
|
-
|
457
|
-
|
458
|
-
|
459
|
-
|
460
|
-
|
461
|
-
|
462
|
-
|
463
|
-
|
464
|
-
|
465
|
-
|
466
|
-
|
910
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
911
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
912
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
913
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
914
|
+
connection_uri: Optional[pulumi.Input[_builtins.str]] = None,
|
915
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
916
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
917
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
918
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
919
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
920
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
921
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
922
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
923
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
924
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
925
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
926
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
927
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
928
|
+
password: Optional[pulumi.Input[_builtins.str]] = None,
|
929
|
+
password_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
930
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
931
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
932
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
933
|
+
username: Optional[pulumi.Input[_builtins.str]] = None,
|
934
|
+
username_template: Optional[pulumi.Input[_builtins.str]] = None,
|
935
|
+
verify_connection: Optional[pulumi.Input[_builtins.bool]] = None,
|
467
936
|
__props__=None):
|
468
937
|
"""
|
469
938
|
## Example Usage
|
@@ -472,7 +941,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
472
941
|
import pulumi
|
473
942
|
import pulumi_vault as vault
|
474
943
|
|
475
|
-
rabbitmq = vault.
|
944
|
+
rabbitmq = vault.rabbitmq.SecretBackend("rabbitmq",
|
476
945
|
connection_uri="https://.....",
|
477
946
|
username="user",
|
478
947
|
password="password")
|
@@ -488,25 +957,37 @@ class SecretBackend(pulumi.CustomResource):
|
|
488
957
|
|
489
958
|
:param str resource_name: The name of the resource.
|
490
959
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
491
|
-
:param pulumi.Input[
|
492
|
-
:param pulumi.Input[
|
493
|
-
|
494
|
-
:param pulumi.Input[
|
495
|
-
:param pulumi.Input[
|
960
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
961
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
962
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
963
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
964
|
+
:param pulumi.Input[_builtins.str] connection_uri: Specifies the RabbitMQ connection URI.
|
965
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
|
966
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
967
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
|
968
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
496
969
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
497
|
-
:param pulumi.Input[
|
498
|
-
|
499
|
-
:param pulumi.Input[
|
970
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
971
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
972
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
973
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
974
|
+
:param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
975
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
|
976
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
500
977
|
The value should not contain leading or trailing forward slashes.
|
501
978
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
502
979
|
*Available only for Vault Enterprise*.
|
503
|
-
:param pulumi.Input[
|
504
|
-
:param pulumi.Input[
|
505
|
-
:param pulumi.Input[
|
980
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
981
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
982
|
+
:param pulumi.Input[_builtins.str] password: Specifies the RabbitMQ management administrator password.
|
983
|
+
:param pulumi.Input[_builtins.str] password_policy: Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set.
|
984
|
+
:param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
|
506
985
|
not begin or end with a `/`. Defaults to `rabbitmq`.
|
507
|
-
:param pulumi.Input[
|
508
|
-
:param pulumi.Input[
|
509
|
-
:param pulumi.Input[
|
986
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
987
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
988
|
+
:param pulumi.Input[_builtins.str] username: Specifies the RabbitMQ management administrator username.
|
989
|
+
:param pulumi.Input[_builtins.str] username_template: Template describing how dynamic usernames are generated.
|
990
|
+
:param pulumi.Input[_builtins.bool] verify_connection: Specifies whether to verify connection URI, username, and password.
|
510
991
|
Defaults to `true`.
|
511
992
|
"""
|
512
993
|
...
|
@@ -522,7 +1003,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
522
1003
|
import pulumi
|
523
1004
|
import pulumi_vault as vault
|
524
1005
|
|
525
|
-
rabbitmq = vault.
|
1006
|
+
rabbitmq = vault.rabbitmq.SecretBackend("rabbitmq",
|
526
1007
|
connection_uri="https://.....",
|
527
1008
|
username="user",
|
528
1009
|
password="password")
|
@@ -551,18 +1032,32 @@ class SecretBackend(pulumi.CustomResource):
|
|
551
1032
|
def _internal_init(__self__,
|
552
1033
|
resource_name: str,
|
553
1034
|
opts: Optional[pulumi.ResourceOptions] = None,
|
554
|
-
|
555
|
-
|
556
|
-
|
557
|
-
|
558
|
-
|
559
|
-
|
560
|
-
|
561
|
-
|
562
|
-
|
563
|
-
|
564
|
-
|
565
|
-
|
1035
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1036
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1037
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1038
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1039
|
+
connection_uri: Optional[pulumi.Input[_builtins.str]] = None,
|
1040
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1041
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1042
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
1043
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
1044
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
1045
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
1046
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1047
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
1048
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
1049
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1050
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1051
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
1052
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1053
|
+
password: Optional[pulumi.Input[_builtins.str]] = None,
|
1054
|
+
password_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
1055
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
1056
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
1057
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
1058
|
+
username: Optional[pulumi.Input[_builtins.str]] = None,
|
1059
|
+
username_template: Optional[pulumi.Input[_builtins.str]] = None,
|
1060
|
+
verify_connection: Optional[pulumi.Input[_builtins.bool]] = None,
|
566
1061
|
__props__=None):
|
567
1062
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
568
1063
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -572,24 +1067,39 @@ class SecretBackend(pulumi.CustomResource):
|
|
572
1067
|
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
|
573
1068
|
__props__ = SecretBackendArgs.__new__(SecretBackendArgs)
|
574
1069
|
|
1070
|
+
__props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
|
1071
|
+
__props__.__dict__["allowed_response_headers"] = allowed_response_headers
|
1072
|
+
__props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
|
1073
|
+
__props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
|
575
1074
|
if connection_uri is None and not opts.urn:
|
576
1075
|
raise TypeError("Missing required property 'connection_uri'")
|
577
1076
|
__props__.__dict__["connection_uri"] = connection_uri
|
578
1077
|
__props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
|
1078
|
+
__props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
|
579
1079
|
__props__.__dict__["description"] = description
|
580
1080
|
__props__.__dict__["disable_remount"] = disable_remount
|
1081
|
+
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
1082
|
+
__props__.__dict__["force_no_cache"] = force_no_cache
|
1083
|
+
__props__.__dict__["identity_token_key"] = identity_token_key
|
1084
|
+
__props__.__dict__["listing_visibility"] = listing_visibility
|
1085
|
+
__props__.__dict__["local"] = local
|
581
1086
|
__props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
|
582
1087
|
__props__.__dict__["namespace"] = namespace
|
1088
|
+
__props__.__dict__["options"] = options
|
1089
|
+
__props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
|
583
1090
|
if password is None and not opts.urn:
|
584
1091
|
raise TypeError("Missing required property 'password'")
|
585
1092
|
__props__.__dict__["password"] = None if password is None else pulumi.Output.secret(password)
|
586
1093
|
__props__.__dict__["password_policy"] = password_policy
|
587
1094
|
__props__.__dict__["path"] = path
|
1095
|
+
__props__.__dict__["plugin_version"] = plugin_version
|
1096
|
+
__props__.__dict__["seal_wrap"] = seal_wrap
|
588
1097
|
if username is None and not opts.urn:
|
589
1098
|
raise TypeError("Missing required property 'username'")
|
590
1099
|
__props__.__dict__["username"] = None if username is None else pulumi.Output.secret(username)
|
591
1100
|
__props__.__dict__["username_template"] = username_template
|
592
1101
|
__props__.__dict__["verify_connection"] = verify_connection
|
1102
|
+
__props__.__dict__["accessor"] = None
|
593
1103
|
secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["password", "username"])
|
594
1104
|
opts = pulumi.ResourceOptions.merge(opts, secret_opts)
|
595
1105
|
super(SecretBackend, __self__).__init__(
|
@@ -602,18 +1112,33 @@ class SecretBackend(pulumi.CustomResource):
|
|
602
1112
|
def get(resource_name: str,
|
603
1113
|
id: pulumi.Input[str],
|
604
1114
|
opts: Optional[pulumi.ResourceOptions] = None,
|
605
|
-
|
606
|
-
|
607
|
-
|
608
|
-
|
609
|
-
|
610
|
-
|
611
|
-
|
612
|
-
|
613
|
-
|
614
|
-
|
615
|
-
|
616
|
-
|
1115
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
1116
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1117
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1118
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1119
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1120
|
+
connection_uri: Optional[pulumi.Input[_builtins.str]] = None,
|
1121
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1122
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1123
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
1124
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
1125
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
1126
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
1127
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1128
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
1129
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
1130
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1131
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1132
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
1133
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1134
|
+
password: Optional[pulumi.Input[_builtins.str]] = None,
|
1135
|
+
password_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
1136
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
1137
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
1138
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
1139
|
+
username: Optional[pulumi.Input[_builtins.str]] = None,
|
1140
|
+
username_template: Optional[pulumi.Input[_builtins.str]] = None,
|
1141
|
+
verify_connection: Optional[pulumi.Input[_builtins.bool]] = None) -> 'SecretBackend':
|
617
1142
|
"""
|
618
1143
|
Get an existing SecretBackend resource's state with the given name, id, and optional extra
|
619
1144
|
properties used to qualify the lookup.
|
@@ -621,91 +1146,205 @@ class SecretBackend(pulumi.CustomResource):
|
|
621
1146
|
:param str resource_name: The unique name of the resulting resource.
|
622
1147
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
623
1148
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
624
|
-
:param pulumi.Input[
|
625
|
-
:param pulumi.Input[
|
626
|
-
|
627
|
-
:param pulumi.Input[
|
628
|
-
:param pulumi.Input[
|
1149
|
+
:param pulumi.Input[_builtins.str] accessor: Accessor of the mount
|
1150
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
1151
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
1152
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1153
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1154
|
+
:param pulumi.Input[_builtins.str] connection_uri: Specifies the RabbitMQ connection URI.
|
1155
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
|
1156
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
1157
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
|
1158
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
629
1159
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
630
|
-
:param pulumi.Input[
|
631
|
-
|
632
|
-
:param pulumi.Input[
|
1160
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
1161
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
1162
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
1163
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
1164
|
+
:param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
1165
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
|
1166
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
633
1167
|
The value should not contain leading or trailing forward slashes.
|
634
1168
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
635
1169
|
*Available only for Vault Enterprise*.
|
636
|
-
:param pulumi.Input[
|
637
|
-
:param pulumi.Input[
|
638
|
-
:param pulumi.Input[
|
1170
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
1171
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
1172
|
+
:param pulumi.Input[_builtins.str] password: Specifies the RabbitMQ management administrator password.
|
1173
|
+
:param pulumi.Input[_builtins.str] password_policy: Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set.
|
1174
|
+
:param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
|
639
1175
|
not begin or end with a `/`. Defaults to `rabbitmq`.
|
640
|
-
:param pulumi.Input[
|
641
|
-
:param pulumi.Input[
|
642
|
-
:param pulumi.Input[
|
1176
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1177
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1178
|
+
:param pulumi.Input[_builtins.str] username: Specifies the RabbitMQ management administrator username.
|
1179
|
+
:param pulumi.Input[_builtins.str] username_template: Template describing how dynamic usernames are generated.
|
1180
|
+
:param pulumi.Input[_builtins.bool] verify_connection: Specifies whether to verify connection URI, username, and password.
|
643
1181
|
Defaults to `true`.
|
644
1182
|
"""
|
645
1183
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
646
1184
|
|
647
1185
|
__props__ = _SecretBackendState.__new__(_SecretBackendState)
|
648
1186
|
|
1187
|
+
__props__.__dict__["accessor"] = accessor
|
1188
|
+
__props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
|
1189
|
+
__props__.__dict__["allowed_response_headers"] = allowed_response_headers
|
1190
|
+
__props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
|
1191
|
+
__props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
|
649
1192
|
__props__.__dict__["connection_uri"] = connection_uri
|
650
1193
|
__props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
|
1194
|
+
__props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
|
651
1195
|
__props__.__dict__["description"] = description
|
652
1196
|
__props__.__dict__["disable_remount"] = disable_remount
|
1197
|
+
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
1198
|
+
__props__.__dict__["force_no_cache"] = force_no_cache
|
1199
|
+
__props__.__dict__["identity_token_key"] = identity_token_key
|
1200
|
+
__props__.__dict__["listing_visibility"] = listing_visibility
|
1201
|
+
__props__.__dict__["local"] = local
|
653
1202
|
__props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
|
654
1203
|
__props__.__dict__["namespace"] = namespace
|
1204
|
+
__props__.__dict__["options"] = options
|
1205
|
+
__props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
|
655
1206
|
__props__.__dict__["password"] = password
|
656
1207
|
__props__.__dict__["password_policy"] = password_policy
|
657
1208
|
__props__.__dict__["path"] = path
|
1209
|
+
__props__.__dict__["plugin_version"] = plugin_version
|
1210
|
+
__props__.__dict__["seal_wrap"] = seal_wrap
|
658
1211
|
__props__.__dict__["username"] = username
|
659
1212
|
__props__.__dict__["username_template"] = username_template
|
660
1213
|
__props__.__dict__["verify_connection"] = verify_connection
|
661
1214
|
return SecretBackend(resource_name, opts=opts, __props__=__props__)
|
662
1215
|
|
663
|
-
@property
|
1216
|
+
@_builtins.property
|
1217
|
+
@pulumi.getter
|
1218
|
+
def accessor(self) -> pulumi.Output[_builtins.str]:
|
1219
|
+
"""
|
1220
|
+
Accessor of the mount
|
1221
|
+
"""
|
1222
|
+
return pulumi.get(self, "accessor")
|
1223
|
+
|
1224
|
+
@_builtins.property
|
1225
|
+
@pulumi.getter(name="allowedManagedKeys")
|
1226
|
+
def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1227
|
+
"""
|
1228
|
+
List of managed key registry entry names that the mount in question is allowed to access
|
1229
|
+
"""
|
1230
|
+
return pulumi.get(self, "allowed_managed_keys")
|
1231
|
+
|
1232
|
+
@_builtins.property
|
1233
|
+
@pulumi.getter(name="allowedResponseHeaders")
|
1234
|
+
def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1235
|
+
"""
|
1236
|
+
List of headers to allow and pass from the request to the plugin
|
1237
|
+
"""
|
1238
|
+
return pulumi.get(self, "allowed_response_headers")
|
1239
|
+
|
1240
|
+
@_builtins.property
|
1241
|
+
@pulumi.getter(name="auditNonHmacRequestKeys")
|
1242
|
+
def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
1243
|
+
"""
|
1244
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1245
|
+
"""
|
1246
|
+
return pulumi.get(self, "audit_non_hmac_request_keys")
|
1247
|
+
|
1248
|
+
@_builtins.property
|
1249
|
+
@pulumi.getter(name="auditNonHmacResponseKeys")
|
1250
|
+
def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
1251
|
+
"""
|
1252
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1253
|
+
"""
|
1254
|
+
return pulumi.get(self, "audit_non_hmac_response_keys")
|
1255
|
+
|
1256
|
+
@_builtins.property
|
664
1257
|
@pulumi.getter(name="connectionUri")
|
665
|
-
def connection_uri(self) -> pulumi.Output[
|
1258
|
+
def connection_uri(self) -> pulumi.Output[_builtins.str]:
|
666
1259
|
"""
|
667
1260
|
Specifies the RabbitMQ connection URI.
|
668
1261
|
"""
|
669
1262
|
return pulumi.get(self, "connection_uri")
|
670
1263
|
|
671
|
-
@property
|
1264
|
+
@_builtins.property
|
672
1265
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
673
|
-
def default_lease_ttl_seconds(self) -> pulumi.Output[
|
1266
|
+
def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
|
674
1267
|
"""
|
675
|
-
|
676
|
-
issued by this backend.
|
1268
|
+
Default lease duration for secrets in seconds
|
677
1269
|
"""
|
678
1270
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
679
1271
|
|
680
|
-
@property
|
1272
|
+
@_builtins.property
|
1273
|
+
@pulumi.getter(name="delegatedAuthAccessors")
|
1274
|
+
def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1275
|
+
"""
|
1276
|
+
List of headers to allow and pass from the request to the plugin
|
1277
|
+
"""
|
1278
|
+
return pulumi.get(self, "delegated_auth_accessors")
|
1279
|
+
|
1280
|
+
@_builtins.property
|
681
1281
|
@pulumi.getter
|
682
|
-
def description(self) -> pulumi.Output[Optional[
|
1282
|
+
def description(self) -> pulumi.Output[Optional[_builtins.str]]:
|
683
1283
|
"""
|
684
|
-
|
1284
|
+
Human-friendly description of the mount for the backend.
|
685
1285
|
"""
|
686
1286
|
return pulumi.get(self, "description")
|
687
1287
|
|
688
|
-
@property
|
1288
|
+
@_builtins.property
|
689
1289
|
@pulumi.getter(name="disableRemount")
|
690
|
-
def disable_remount(self) -> pulumi.Output[Optional[
|
1290
|
+
def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
691
1291
|
"""
|
692
1292
|
If set, opts out of mount migration on path updates.
|
693
1293
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
694
1294
|
"""
|
695
1295
|
return pulumi.get(self, "disable_remount")
|
696
1296
|
|
697
|
-
@property
|
1297
|
+
@_builtins.property
|
1298
|
+
@pulumi.getter(name="externalEntropyAccess")
|
1299
|
+
def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1300
|
+
"""
|
1301
|
+
Enable the secrets engine to access Vault's external entropy source
|
1302
|
+
"""
|
1303
|
+
return pulumi.get(self, "external_entropy_access")
|
1304
|
+
|
1305
|
+
@_builtins.property
|
1306
|
+
@pulumi.getter(name="forceNoCache")
|
1307
|
+
def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
|
1308
|
+
"""
|
1309
|
+
If set to true, disables caching.
|
1310
|
+
"""
|
1311
|
+
return pulumi.get(self, "force_no_cache")
|
1312
|
+
|
1313
|
+
@_builtins.property
|
1314
|
+
@pulumi.getter(name="identityTokenKey")
|
1315
|
+
def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1316
|
+
"""
|
1317
|
+
The key to use for signing plugin workload identity tokens
|
1318
|
+
"""
|
1319
|
+
return pulumi.get(self, "identity_token_key")
|
1320
|
+
|
1321
|
+
@_builtins.property
|
1322
|
+
@pulumi.getter(name="listingVisibility")
|
1323
|
+
def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1324
|
+
"""
|
1325
|
+
Specifies whether to show this mount in the UI-specific listing endpoint
|
1326
|
+
"""
|
1327
|
+
return pulumi.get(self, "listing_visibility")
|
1328
|
+
|
1329
|
+
@_builtins.property
|
1330
|
+
@pulumi.getter
|
1331
|
+
def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1332
|
+
"""
|
1333
|
+
Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
1334
|
+
"""
|
1335
|
+
return pulumi.get(self, "local")
|
1336
|
+
|
1337
|
+
@_builtins.property
|
698
1338
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
699
|
-
def max_lease_ttl_seconds(self) -> pulumi.Output[
|
1339
|
+
def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
|
700
1340
|
"""
|
701
|
-
|
702
|
-
for credentials issued by this backend.
|
1341
|
+
Maximum possible lease duration for secrets in seconds
|
703
1342
|
"""
|
704
1343
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
705
1344
|
|
706
|
-
@property
|
1345
|
+
@_builtins.property
|
707
1346
|
@pulumi.getter
|
708
|
-
def namespace(self) -> pulumi.Output[Optional[
|
1347
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
709
1348
|
"""
|
710
1349
|
The namespace to provision the resource in.
|
711
1350
|
The value should not contain leading or trailing forward slashes.
|
@@ -714,50 +1353,82 @@ class SecretBackend(pulumi.CustomResource):
|
|
714
1353
|
"""
|
715
1354
|
return pulumi.get(self, "namespace")
|
716
1355
|
|
717
|
-
@property
|
1356
|
+
@_builtins.property
|
718
1357
|
@pulumi.getter
|
719
|
-
def
|
1358
|
+
def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
|
1359
|
+
"""
|
1360
|
+
Specifies mount type specific options that are passed to the backend
|
1361
|
+
"""
|
1362
|
+
return pulumi.get(self, "options")
|
1363
|
+
|
1364
|
+
@_builtins.property
|
1365
|
+
@pulumi.getter(name="passthroughRequestHeaders")
|
1366
|
+
def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1367
|
+
"""
|
1368
|
+
List of headers to allow and pass from the request to the plugin
|
1369
|
+
"""
|
1370
|
+
return pulumi.get(self, "passthrough_request_headers")
|
1371
|
+
|
1372
|
+
@_builtins.property
|
1373
|
+
@pulumi.getter
|
1374
|
+
def password(self) -> pulumi.Output[_builtins.str]:
|
720
1375
|
"""
|
721
1376
|
Specifies the RabbitMQ management administrator password.
|
722
1377
|
"""
|
723
1378
|
return pulumi.get(self, "password")
|
724
1379
|
|
725
|
-
@property
|
1380
|
+
@_builtins.property
|
726
1381
|
@pulumi.getter(name="passwordPolicy")
|
727
|
-
def password_policy(self) -> pulumi.Output[Optional[
|
1382
|
+
def password_policy(self) -> pulumi.Output[Optional[_builtins.str]]:
|
728
1383
|
"""
|
729
1384
|
Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set.
|
730
1385
|
"""
|
731
1386
|
return pulumi.get(self, "password_policy")
|
732
1387
|
|
733
|
-
@property
|
1388
|
+
@_builtins.property
|
734
1389
|
@pulumi.getter
|
735
|
-
def path(self) -> pulumi.Output[Optional[
|
1390
|
+
def path(self) -> pulumi.Output[Optional[_builtins.str]]:
|
736
1391
|
"""
|
737
1392
|
The unique path this backend should be mounted at. Must
|
738
1393
|
not begin or end with a `/`. Defaults to `rabbitmq`.
|
739
1394
|
"""
|
740
1395
|
return pulumi.get(self, "path")
|
741
1396
|
|
742
|
-
@property
|
1397
|
+
@_builtins.property
|
1398
|
+
@pulumi.getter(name="pluginVersion")
|
1399
|
+
def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1400
|
+
"""
|
1401
|
+
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1402
|
+
"""
|
1403
|
+
return pulumi.get(self, "plugin_version")
|
1404
|
+
|
1405
|
+
@_builtins.property
|
1406
|
+
@pulumi.getter(name="sealWrap")
|
1407
|
+
def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
|
1408
|
+
"""
|
1409
|
+
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1410
|
+
"""
|
1411
|
+
return pulumi.get(self, "seal_wrap")
|
1412
|
+
|
1413
|
+
@_builtins.property
|
743
1414
|
@pulumi.getter
|
744
|
-
def username(self) -> pulumi.Output[
|
1415
|
+
def username(self) -> pulumi.Output[_builtins.str]:
|
745
1416
|
"""
|
746
1417
|
Specifies the RabbitMQ management administrator username.
|
747
1418
|
"""
|
748
1419
|
return pulumi.get(self, "username")
|
749
1420
|
|
750
|
-
@property
|
1421
|
+
@_builtins.property
|
751
1422
|
@pulumi.getter(name="usernameTemplate")
|
752
|
-
def username_template(self) -> pulumi.Output[Optional[
|
1423
|
+
def username_template(self) -> pulumi.Output[Optional[_builtins.str]]:
|
753
1424
|
"""
|
754
1425
|
Template describing how dynamic usernames are generated.
|
755
1426
|
"""
|
756
1427
|
return pulumi.get(self, "username_template")
|
757
1428
|
|
758
|
-
@property
|
1429
|
+
@_builtins.property
|
759
1430
|
@pulumi.getter(name="verifyConnection")
|
760
|
-
def verify_connection(self) -> pulumi.Output[Optional[
|
1431
|
+
def verify_connection(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
761
1432
|
"""
|
762
1433
|
Specifies whether to verify connection URI, username, and password.
|
763
1434
|
Defaults to `true`.
|