pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +19 -1
- pulumi_vault/_inputs.py +873 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +1016 -439
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +1057 -285
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +887 -256
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +426 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +878 -336
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +400 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +1006 -227
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +431 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +732 -693
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +380 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +909 -271
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +234 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +205 -159
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +902 -231
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +217 -124
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +833 -155
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +377 -350
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0.dist-info/RECORD +270 -0
- pulumi_vault-7.1.0.dist-info/RECORD +0 -268
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,101 +19,216 @@ __all__ = ['SecretBackendArgs', 'SecretBackend']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class SecretBackendArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
address: Optional[pulumi.Input[
|
24
|
-
|
25
|
-
|
26
|
-
|
27
|
-
|
28
|
-
|
29
|
-
|
30
|
-
|
31
|
-
|
22
|
+
address: Optional[pulumi.Input[_builtins.str]] = None,
|
23
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
24
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
25
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
26
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
27
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
28
|
+
base_path: Optional[pulumi.Input[_builtins.str]] = None,
|
29
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
30
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
31
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
32
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
33
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
34
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
35
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
36
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
37
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
38
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
39
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
40
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
41
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
42
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
43
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
44
|
+
token: Optional[pulumi.Input[_builtins.str]] = None):
|
32
45
|
"""
|
33
46
|
The set of arguments for constructing a SecretBackend resource.
|
34
|
-
:param pulumi.Input[
|
35
|
-
:param pulumi.Input[
|
36
|
-
:param pulumi.Input[
|
47
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
48
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
49
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
50
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
51
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
|
52
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
53
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
|
54
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
37
55
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
38
|
-
:param pulumi.Input[
|
39
|
-
|
40
|
-
:param pulumi.Input[
|
56
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
57
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
58
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
59
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
60
|
+
:param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
61
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
|
62
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
41
63
|
The value should not contain leading or trailing forward slashes.
|
42
64
|
The `namespace` is always relative to the provider's configured namespace.
|
43
65
|
*Available only for Vault Enterprise*.
|
66
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
67
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
68
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
69
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
44
70
|
"""
|
45
71
|
if address is not None:
|
46
72
|
pulumi.set(__self__, "address", address)
|
73
|
+
if allowed_managed_keys is not None:
|
74
|
+
pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
|
75
|
+
if allowed_response_headers is not None:
|
76
|
+
pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
|
77
|
+
if audit_non_hmac_request_keys is not None:
|
78
|
+
pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
|
79
|
+
if audit_non_hmac_response_keys is not None:
|
80
|
+
pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
|
47
81
|
if backend is not None:
|
48
82
|
pulumi.set(__self__, "backend", backend)
|
49
83
|
if base_path is not None:
|
50
84
|
pulumi.set(__self__, "base_path", base_path)
|
51
85
|
if default_lease_ttl_seconds is not None:
|
52
86
|
pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
|
87
|
+
if delegated_auth_accessors is not None:
|
88
|
+
pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
|
53
89
|
if description is not None:
|
54
90
|
pulumi.set(__self__, "description", description)
|
55
91
|
if disable_remount is not None:
|
56
92
|
pulumi.set(__self__, "disable_remount", disable_remount)
|
93
|
+
if external_entropy_access is not None:
|
94
|
+
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
95
|
+
if force_no_cache is not None:
|
96
|
+
pulumi.set(__self__, "force_no_cache", force_no_cache)
|
97
|
+
if identity_token_key is not None:
|
98
|
+
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
99
|
+
if listing_visibility is not None:
|
100
|
+
pulumi.set(__self__, "listing_visibility", listing_visibility)
|
101
|
+
if local is not None:
|
102
|
+
pulumi.set(__self__, "local", local)
|
57
103
|
if max_lease_ttl_seconds is not None:
|
58
104
|
pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
|
59
105
|
if namespace is not None:
|
60
106
|
pulumi.set(__self__, "namespace", namespace)
|
107
|
+
if options is not None:
|
108
|
+
pulumi.set(__self__, "options", options)
|
109
|
+
if passthrough_request_headers is not None:
|
110
|
+
pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
|
111
|
+
if plugin_version is not None:
|
112
|
+
pulumi.set(__self__, "plugin_version", plugin_version)
|
113
|
+
if seal_wrap is not None:
|
114
|
+
pulumi.set(__self__, "seal_wrap", seal_wrap)
|
61
115
|
if token is not None:
|
62
116
|
pulumi.set(__self__, "token", token)
|
63
117
|
|
64
|
-
@property
|
118
|
+
@_builtins.property
|
65
119
|
@pulumi.getter
|
66
|
-
def address(self) -> Optional[pulumi.Input[
|
120
|
+
def address(self) -> Optional[pulumi.Input[_builtins.str]]:
|
67
121
|
return pulumi.get(self, "address")
|
68
122
|
|
69
123
|
@address.setter
|
70
|
-
def address(self, value: Optional[pulumi.Input[
|
124
|
+
def address(self, value: Optional[pulumi.Input[_builtins.str]]):
|
71
125
|
pulumi.set(self, "address", value)
|
72
126
|
|
73
|
-
@property
|
127
|
+
@_builtins.property
|
128
|
+
@pulumi.getter(name="allowedManagedKeys")
|
129
|
+
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
130
|
+
"""
|
131
|
+
List of managed key registry entry names that the mount in question is allowed to access
|
132
|
+
"""
|
133
|
+
return pulumi.get(self, "allowed_managed_keys")
|
134
|
+
|
135
|
+
@allowed_managed_keys.setter
|
136
|
+
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
137
|
+
pulumi.set(self, "allowed_managed_keys", value)
|
138
|
+
|
139
|
+
@_builtins.property
|
140
|
+
@pulumi.getter(name="allowedResponseHeaders")
|
141
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
142
|
+
"""
|
143
|
+
List of headers to allow and pass from the request to the plugin
|
144
|
+
"""
|
145
|
+
return pulumi.get(self, "allowed_response_headers")
|
146
|
+
|
147
|
+
@allowed_response_headers.setter
|
148
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
149
|
+
pulumi.set(self, "allowed_response_headers", value)
|
150
|
+
|
151
|
+
@_builtins.property
|
152
|
+
@pulumi.getter(name="auditNonHmacRequestKeys")
|
153
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
154
|
+
"""
|
155
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
156
|
+
"""
|
157
|
+
return pulumi.get(self, "audit_non_hmac_request_keys")
|
158
|
+
|
159
|
+
@audit_non_hmac_request_keys.setter
|
160
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
161
|
+
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
162
|
+
|
163
|
+
@_builtins.property
|
164
|
+
@pulumi.getter(name="auditNonHmacResponseKeys")
|
165
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
166
|
+
"""
|
167
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
168
|
+
"""
|
169
|
+
return pulumi.get(self, "audit_non_hmac_response_keys")
|
170
|
+
|
171
|
+
@audit_non_hmac_response_keys.setter
|
172
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
173
|
+
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
174
|
+
|
175
|
+
@_builtins.property
|
74
176
|
@pulumi.getter
|
75
|
-
def backend(self) -> Optional[pulumi.Input[
|
177
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
76
178
|
return pulumi.get(self, "backend")
|
77
179
|
|
78
180
|
@backend.setter
|
79
|
-
def backend(self, value: Optional[pulumi.Input[
|
181
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
80
182
|
pulumi.set(self, "backend", value)
|
81
183
|
|
82
|
-
@property
|
184
|
+
@_builtins.property
|
83
185
|
@pulumi.getter(name="basePath")
|
84
|
-
def base_path(self) -> Optional[pulumi.Input[
|
186
|
+
def base_path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
85
187
|
return pulumi.get(self, "base_path")
|
86
188
|
|
87
189
|
@base_path.setter
|
88
|
-
def base_path(self, value: Optional[pulumi.Input[
|
190
|
+
def base_path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
89
191
|
pulumi.set(self, "base_path", value)
|
90
192
|
|
91
|
-
@property
|
193
|
+
@_builtins.property
|
92
194
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
93
|
-
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
195
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
94
196
|
"""
|
95
|
-
|
197
|
+
Default lease duration for secrets in seconds
|
96
198
|
"""
|
97
199
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
98
200
|
|
99
201
|
@default_lease_ttl_seconds.setter
|
100
|
-
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
202
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
101
203
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
102
204
|
|
103
|
-
@property
|
205
|
+
@_builtins.property
|
206
|
+
@pulumi.getter(name="delegatedAuthAccessors")
|
207
|
+
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
208
|
+
"""
|
209
|
+
List of headers to allow and pass from the request to the plugin
|
210
|
+
"""
|
211
|
+
return pulumi.get(self, "delegated_auth_accessors")
|
212
|
+
|
213
|
+
@delegated_auth_accessors.setter
|
214
|
+
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
215
|
+
pulumi.set(self, "delegated_auth_accessors", value)
|
216
|
+
|
217
|
+
@_builtins.property
|
104
218
|
@pulumi.getter
|
105
|
-
def description(self) -> Optional[pulumi.Input[
|
219
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
106
220
|
"""
|
107
|
-
|
221
|
+
Human-friendly description of the mount for the backend.
|
108
222
|
"""
|
109
223
|
return pulumi.get(self, "description")
|
110
224
|
|
111
225
|
@description.setter
|
112
|
-
def description(self, value: Optional[pulumi.Input[
|
226
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
113
227
|
pulumi.set(self, "description", value)
|
114
228
|
|
115
|
-
@property
|
229
|
+
@_builtins.property
|
116
230
|
@pulumi.getter(name="disableRemount")
|
117
|
-
def disable_remount(self) -> Optional[pulumi.Input[
|
231
|
+
def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
118
232
|
"""
|
119
233
|
If set, opts out of mount migration on path updates.
|
120
234
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -122,25 +236,84 @@ class SecretBackendArgs:
|
|
122
236
|
return pulumi.get(self, "disable_remount")
|
123
237
|
|
124
238
|
@disable_remount.setter
|
125
|
-
def disable_remount(self, value: Optional[pulumi.Input[
|
239
|
+
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
126
240
|
pulumi.set(self, "disable_remount", value)
|
127
241
|
|
128
|
-
@property
|
242
|
+
@_builtins.property
|
243
|
+
@pulumi.getter(name="externalEntropyAccess")
|
244
|
+
def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
245
|
+
"""
|
246
|
+
Enable the secrets engine to access Vault's external entropy source
|
247
|
+
"""
|
248
|
+
return pulumi.get(self, "external_entropy_access")
|
249
|
+
|
250
|
+
@external_entropy_access.setter
|
251
|
+
def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
252
|
+
pulumi.set(self, "external_entropy_access", value)
|
253
|
+
|
254
|
+
@_builtins.property
|
255
|
+
@pulumi.getter(name="forceNoCache")
|
256
|
+
def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
257
|
+
"""
|
258
|
+
If set to true, disables caching.
|
259
|
+
"""
|
260
|
+
return pulumi.get(self, "force_no_cache")
|
261
|
+
|
262
|
+
@force_no_cache.setter
|
263
|
+
def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
264
|
+
pulumi.set(self, "force_no_cache", value)
|
265
|
+
|
266
|
+
@_builtins.property
|
267
|
+
@pulumi.getter(name="identityTokenKey")
|
268
|
+
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
269
|
+
"""
|
270
|
+
The key to use for signing plugin workload identity tokens
|
271
|
+
"""
|
272
|
+
return pulumi.get(self, "identity_token_key")
|
273
|
+
|
274
|
+
@identity_token_key.setter
|
275
|
+
def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
276
|
+
pulumi.set(self, "identity_token_key", value)
|
277
|
+
|
278
|
+
@_builtins.property
|
279
|
+
@pulumi.getter(name="listingVisibility")
|
280
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
281
|
+
"""
|
282
|
+
Specifies whether to show this mount in the UI-specific listing endpoint
|
283
|
+
"""
|
284
|
+
return pulumi.get(self, "listing_visibility")
|
285
|
+
|
286
|
+
@listing_visibility.setter
|
287
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
288
|
+
pulumi.set(self, "listing_visibility", value)
|
289
|
+
|
290
|
+
@_builtins.property
|
291
|
+
@pulumi.getter
|
292
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
293
|
+
"""
|
294
|
+
Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
295
|
+
"""
|
296
|
+
return pulumi.get(self, "local")
|
297
|
+
|
298
|
+
@local.setter
|
299
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
300
|
+
pulumi.set(self, "local", value)
|
301
|
+
|
302
|
+
@_builtins.property
|
129
303
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
130
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
304
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
131
305
|
"""
|
132
|
-
|
133
|
-
for credentials issued by this backend.
|
306
|
+
Maximum possible lease duration for secrets in seconds
|
134
307
|
"""
|
135
308
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
136
309
|
|
137
310
|
@max_lease_ttl_seconds.setter
|
138
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
311
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
139
312
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
140
313
|
|
141
|
-
@property
|
314
|
+
@_builtins.property
|
142
315
|
@pulumi.getter
|
143
|
-
def namespace(self) -> Optional[pulumi.Input[
|
316
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
144
317
|
"""
|
145
318
|
The namespace to provision the resource in.
|
146
319
|
The value should not contain leading or trailing forward slashes.
|
@@ -150,117 +323,296 @@ class SecretBackendArgs:
|
|
150
323
|
return pulumi.get(self, "namespace")
|
151
324
|
|
152
325
|
@namespace.setter
|
153
|
-
def namespace(self, value: Optional[pulumi.Input[
|
326
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
154
327
|
pulumi.set(self, "namespace", value)
|
155
328
|
|
156
|
-
@property
|
329
|
+
@_builtins.property
|
157
330
|
@pulumi.getter
|
158
|
-
def
|
331
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
332
|
+
"""
|
333
|
+
Specifies mount type specific options that are passed to the backend
|
334
|
+
"""
|
335
|
+
return pulumi.get(self, "options")
|
336
|
+
|
337
|
+
@options.setter
|
338
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
339
|
+
pulumi.set(self, "options", value)
|
340
|
+
|
341
|
+
@_builtins.property
|
342
|
+
@pulumi.getter(name="passthroughRequestHeaders")
|
343
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
344
|
+
"""
|
345
|
+
List of headers to allow and pass from the request to the plugin
|
346
|
+
"""
|
347
|
+
return pulumi.get(self, "passthrough_request_headers")
|
348
|
+
|
349
|
+
@passthrough_request_headers.setter
|
350
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
351
|
+
pulumi.set(self, "passthrough_request_headers", value)
|
352
|
+
|
353
|
+
@_builtins.property
|
354
|
+
@pulumi.getter(name="pluginVersion")
|
355
|
+
def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
|
356
|
+
"""
|
357
|
+
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
358
|
+
"""
|
359
|
+
return pulumi.get(self, "plugin_version")
|
360
|
+
|
361
|
+
@plugin_version.setter
|
362
|
+
def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
|
363
|
+
pulumi.set(self, "plugin_version", value)
|
364
|
+
|
365
|
+
@_builtins.property
|
366
|
+
@pulumi.getter(name="sealWrap")
|
367
|
+
def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
368
|
+
"""
|
369
|
+
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
370
|
+
"""
|
371
|
+
return pulumi.get(self, "seal_wrap")
|
372
|
+
|
373
|
+
@seal_wrap.setter
|
374
|
+
def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
375
|
+
pulumi.set(self, "seal_wrap", value)
|
376
|
+
|
377
|
+
@_builtins.property
|
378
|
+
@pulumi.getter
|
379
|
+
def token(self) -> Optional[pulumi.Input[_builtins.str]]:
|
159
380
|
return pulumi.get(self, "token")
|
160
381
|
|
161
382
|
@token.setter
|
162
|
-
def token(self, value: Optional[pulumi.Input[
|
383
|
+
def token(self, value: Optional[pulumi.Input[_builtins.str]]):
|
163
384
|
pulumi.set(self, "token", value)
|
164
385
|
|
165
386
|
|
166
387
|
@pulumi.input_type
|
167
388
|
class _SecretBackendState:
|
168
389
|
def __init__(__self__, *,
|
169
|
-
|
170
|
-
|
171
|
-
|
172
|
-
|
173
|
-
|
174
|
-
|
175
|
-
|
176
|
-
|
177
|
-
|
390
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
391
|
+
address: Optional[pulumi.Input[_builtins.str]] = None,
|
392
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
393
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
394
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
395
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
396
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
397
|
+
base_path: Optional[pulumi.Input[_builtins.str]] = None,
|
398
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
399
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
400
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
401
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
402
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
403
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
404
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
405
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
406
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
407
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
408
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
409
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
410
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
411
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
412
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
413
|
+
token: Optional[pulumi.Input[_builtins.str]] = None):
|
178
414
|
"""
|
179
415
|
Input properties used for looking up and filtering SecretBackend resources.
|
180
|
-
:param pulumi.Input[
|
181
|
-
:param pulumi.Input[
|
182
|
-
:param pulumi.Input[
|
416
|
+
:param pulumi.Input[_builtins.str] accessor: Accessor of the mount
|
417
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
418
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
419
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
420
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
421
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
|
422
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
423
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
|
424
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
183
425
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
184
|
-
:param pulumi.Input[
|
185
|
-
|
186
|
-
:param pulumi.Input[
|
426
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
427
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
428
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
429
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
430
|
+
:param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
431
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
|
432
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
187
433
|
The value should not contain leading or trailing forward slashes.
|
188
434
|
The `namespace` is always relative to the provider's configured namespace.
|
189
435
|
*Available only for Vault Enterprise*.
|
436
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
437
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
438
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
439
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
190
440
|
"""
|
441
|
+
if accessor is not None:
|
442
|
+
pulumi.set(__self__, "accessor", accessor)
|
191
443
|
if address is not None:
|
192
444
|
pulumi.set(__self__, "address", address)
|
445
|
+
if allowed_managed_keys is not None:
|
446
|
+
pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
|
447
|
+
if allowed_response_headers is not None:
|
448
|
+
pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
|
449
|
+
if audit_non_hmac_request_keys is not None:
|
450
|
+
pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
|
451
|
+
if audit_non_hmac_response_keys is not None:
|
452
|
+
pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
|
193
453
|
if backend is not None:
|
194
454
|
pulumi.set(__self__, "backend", backend)
|
195
455
|
if base_path is not None:
|
196
456
|
pulumi.set(__self__, "base_path", base_path)
|
197
457
|
if default_lease_ttl_seconds is not None:
|
198
458
|
pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
|
459
|
+
if delegated_auth_accessors is not None:
|
460
|
+
pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
|
199
461
|
if description is not None:
|
200
462
|
pulumi.set(__self__, "description", description)
|
201
463
|
if disable_remount is not None:
|
202
464
|
pulumi.set(__self__, "disable_remount", disable_remount)
|
465
|
+
if external_entropy_access is not None:
|
466
|
+
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
467
|
+
if force_no_cache is not None:
|
468
|
+
pulumi.set(__self__, "force_no_cache", force_no_cache)
|
469
|
+
if identity_token_key is not None:
|
470
|
+
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
471
|
+
if listing_visibility is not None:
|
472
|
+
pulumi.set(__self__, "listing_visibility", listing_visibility)
|
473
|
+
if local is not None:
|
474
|
+
pulumi.set(__self__, "local", local)
|
203
475
|
if max_lease_ttl_seconds is not None:
|
204
476
|
pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
|
205
477
|
if namespace is not None:
|
206
478
|
pulumi.set(__self__, "namespace", namespace)
|
479
|
+
if options is not None:
|
480
|
+
pulumi.set(__self__, "options", options)
|
481
|
+
if passthrough_request_headers is not None:
|
482
|
+
pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
|
483
|
+
if plugin_version is not None:
|
484
|
+
pulumi.set(__self__, "plugin_version", plugin_version)
|
485
|
+
if seal_wrap is not None:
|
486
|
+
pulumi.set(__self__, "seal_wrap", seal_wrap)
|
207
487
|
if token is not None:
|
208
488
|
pulumi.set(__self__, "token", token)
|
209
489
|
|
210
|
-
@property
|
490
|
+
@_builtins.property
|
491
|
+
@pulumi.getter
|
492
|
+
def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
|
493
|
+
"""
|
494
|
+
Accessor of the mount
|
495
|
+
"""
|
496
|
+
return pulumi.get(self, "accessor")
|
497
|
+
|
498
|
+
@accessor.setter
|
499
|
+
def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
|
500
|
+
pulumi.set(self, "accessor", value)
|
501
|
+
|
502
|
+
@_builtins.property
|
211
503
|
@pulumi.getter
|
212
|
-
def address(self) -> Optional[pulumi.Input[
|
504
|
+
def address(self) -> Optional[pulumi.Input[_builtins.str]]:
|
213
505
|
return pulumi.get(self, "address")
|
214
506
|
|
215
507
|
@address.setter
|
216
|
-
def address(self, value: Optional[pulumi.Input[
|
508
|
+
def address(self, value: Optional[pulumi.Input[_builtins.str]]):
|
217
509
|
pulumi.set(self, "address", value)
|
218
510
|
|
219
|
-
@property
|
511
|
+
@_builtins.property
|
512
|
+
@pulumi.getter(name="allowedManagedKeys")
|
513
|
+
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
514
|
+
"""
|
515
|
+
List of managed key registry entry names that the mount in question is allowed to access
|
516
|
+
"""
|
517
|
+
return pulumi.get(self, "allowed_managed_keys")
|
518
|
+
|
519
|
+
@allowed_managed_keys.setter
|
520
|
+
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
521
|
+
pulumi.set(self, "allowed_managed_keys", value)
|
522
|
+
|
523
|
+
@_builtins.property
|
524
|
+
@pulumi.getter(name="allowedResponseHeaders")
|
525
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
526
|
+
"""
|
527
|
+
List of headers to allow and pass from the request to the plugin
|
528
|
+
"""
|
529
|
+
return pulumi.get(self, "allowed_response_headers")
|
530
|
+
|
531
|
+
@allowed_response_headers.setter
|
532
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
533
|
+
pulumi.set(self, "allowed_response_headers", value)
|
534
|
+
|
535
|
+
@_builtins.property
|
536
|
+
@pulumi.getter(name="auditNonHmacRequestKeys")
|
537
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
538
|
+
"""
|
539
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
540
|
+
"""
|
541
|
+
return pulumi.get(self, "audit_non_hmac_request_keys")
|
542
|
+
|
543
|
+
@audit_non_hmac_request_keys.setter
|
544
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
545
|
+
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
546
|
+
|
547
|
+
@_builtins.property
|
548
|
+
@pulumi.getter(name="auditNonHmacResponseKeys")
|
549
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
550
|
+
"""
|
551
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
552
|
+
"""
|
553
|
+
return pulumi.get(self, "audit_non_hmac_response_keys")
|
554
|
+
|
555
|
+
@audit_non_hmac_response_keys.setter
|
556
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
557
|
+
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
558
|
+
|
559
|
+
@_builtins.property
|
220
560
|
@pulumi.getter
|
221
|
-
def backend(self) -> Optional[pulumi.Input[
|
561
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
222
562
|
return pulumi.get(self, "backend")
|
223
563
|
|
224
564
|
@backend.setter
|
225
|
-
def backend(self, value: Optional[pulumi.Input[
|
565
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
226
566
|
pulumi.set(self, "backend", value)
|
227
567
|
|
228
|
-
@property
|
568
|
+
@_builtins.property
|
229
569
|
@pulumi.getter(name="basePath")
|
230
|
-
def base_path(self) -> Optional[pulumi.Input[
|
570
|
+
def base_path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
231
571
|
return pulumi.get(self, "base_path")
|
232
572
|
|
233
573
|
@base_path.setter
|
234
|
-
def base_path(self, value: Optional[pulumi.Input[
|
574
|
+
def base_path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
235
575
|
pulumi.set(self, "base_path", value)
|
236
576
|
|
237
|
-
@property
|
577
|
+
@_builtins.property
|
238
578
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
239
|
-
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
579
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
240
580
|
"""
|
241
|
-
|
581
|
+
Default lease duration for secrets in seconds
|
242
582
|
"""
|
243
583
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
244
584
|
|
245
585
|
@default_lease_ttl_seconds.setter
|
246
|
-
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
586
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
247
587
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
248
588
|
|
249
|
-
@property
|
589
|
+
@_builtins.property
|
590
|
+
@pulumi.getter(name="delegatedAuthAccessors")
|
591
|
+
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
592
|
+
"""
|
593
|
+
List of headers to allow and pass from the request to the plugin
|
594
|
+
"""
|
595
|
+
return pulumi.get(self, "delegated_auth_accessors")
|
596
|
+
|
597
|
+
@delegated_auth_accessors.setter
|
598
|
+
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
599
|
+
pulumi.set(self, "delegated_auth_accessors", value)
|
600
|
+
|
601
|
+
@_builtins.property
|
250
602
|
@pulumi.getter
|
251
|
-
def description(self) -> Optional[pulumi.Input[
|
603
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
252
604
|
"""
|
253
|
-
|
605
|
+
Human-friendly description of the mount for the backend.
|
254
606
|
"""
|
255
607
|
return pulumi.get(self, "description")
|
256
608
|
|
257
609
|
@description.setter
|
258
|
-
def description(self, value: Optional[pulumi.Input[
|
610
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
259
611
|
pulumi.set(self, "description", value)
|
260
612
|
|
261
|
-
@property
|
613
|
+
@_builtins.property
|
262
614
|
@pulumi.getter(name="disableRemount")
|
263
|
-
def disable_remount(self) -> Optional[pulumi.Input[
|
615
|
+
def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
264
616
|
"""
|
265
617
|
If set, opts out of mount migration on path updates.
|
266
618
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -268,25 +620,84 @@ class _SecretBackendState:
|
|
268
620
|
return pulumi.get(self, "disable_remount")
|
269
621
|
|
270
622
|
@disable_remount.setter
|
271
|
-
def disable_remount(self, value: Optional[pulumi.Input[
|
623
|
+
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
272
624
|
pulumi.set(self, "disable_remount", value)
|
273
625
|
|
274
|
-
@property
|
626
|
+
@_builtins.property
|
627
|
+
@pulumi.getter(name="externalEntropyAccess")
|
628
|
+
def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
629
|
+
"""
|
630
|
+
Enable the secrets engine to access Vault's external entropy source
|
631
|
+
"""
|
632
|
+
return pulumi.get(self, "external_entropy_access")
|
633
|
+
|
634
|
+
@external_entropy_access.setter
|
635
|
+
def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
636
|
+
pulumi.set(self, "external_entropy_access", value)
|
637
|
+
|
638
|
+
@_builtins.property
|
639
|
+
@pulumi.getter(name="forceNoCache")
|
640
|
+
def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
641
|
+
"""
|
642
|
+
If set to true, disables caching.
|
643
|
+
"""
|
644
|
+
return pulumi.get(self, "force_no_cache")
|
645
|
+
|
646
|
+
@force_no_cache.setter
|
647
|
+
def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
648
|
+
pulumi.set(self, "force_no_cache", value)
|
649
|
+
|
650
|
+
@_builtins.property
|
651
|
+
@pulumi.getter(name="identityTokenKey")
|
652
|
+
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
653
|
+
"""
|
654
|
+
The key to use for signing plugin workload identity tokens
|
655
|
+
"""
|
656
|
+
return pulumi.get(self, "identity_token_key")
|
657
|
+
|
658
|
+
@identity_token_key.setter
|
659
|
+
def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
660
|
+
pulumi.set(self, "identity_token_key", value)
|
661
|
+
|
662
|
+
@_builtins.property
|
663
|
+
@pulumi.getter(name="listingVisibility")
|
664
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
665
|
+
"""
|
666
|
+
Specifies whether to show this mount in the UI-specific listing endpoint
|
667
|
+
"""
|
668
|
+
return pulumi.get(self, "listing_visibility")
|
669
|
+
|
670
|
+
@listing_visibility.setter
|
671
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
672
|
+
pulumi.set(self, "listing_visibility", value)
|
673
|
+
|
674
|
+
@_builtins.property
|
675
|
+
@pulumi.getter
|
676
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
677
|
+
"""
|
678
|
+
Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
679
|
+
"""
|
680
|
+
return pulumi.get(self, "local")
|
681
|
+
|
682
|
+
@local.setter
|
683
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
684
|
+
pulumi.set(self, "local", value)
|
685
|
+
|
686
|
+
@_builtins.property
|
275
687
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
276
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
688
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
277
689
|
"""
|
278
|
-
|
279
|
-
for credentials issued by this backend.
|
690
|
+
Maximum possible lease duration for secrets in seconds
|
280
691
|
"""
|
281
692
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
282
693
|
|
283
694
|
@max_lease_ttl_seconds.setter
|
284
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
695
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
285
696
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
286
697
|
|
287
|
-
@property
|
698
|
+
@_builtins.property
|
288
699
|
@pulumi.getter
|
289
|
-
def namespace(self) -> Optional[pulumi.Input[
|
700
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
290
701
|
"""
|
291
702
|
The namespace to provision the resource in.
|
292
703
|
The value should not contain leading or trailing forward slashes.
|
@@ -296,16 +707,64 @@ class _SecretBackendState:
|
|
296
707
|
return pulumi.get(self, "namespace")
|
297
708
|
|
298
709
|
@namespace.setter
|
299
|
-
def namespace(self, value: Optional[pulumi.Input[
|
710
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
300
711
|
pulumi.set(self, "namespace", value)
|
301
712
|
|
302
|
-
@property
|
713
|
+
@_builtins.property
|
714
|
+
@pulumi.getter
|
715
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
716
|
+
"""
|
717
|
+
Specifies mount type specific options that are passed to the backend
|
718
|
+
"""
|
719
|
+
return pulumi.get(self, "options")
|
720
|
+
|
721
|
+
@options.setter
|
722
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
723
|
+
pulumi.set(self, "options", value)
|
724
|
+
|
725
|
+
@_builtins.property
|
726
|
+
@pulumi.getter(name="passthroughRequestHeaders")
|
727
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
728
|
+
"""
|
729
|
+
List of headers to allow and pass from the request to the plugin
|
730
|
+
"""
|
731
|
+
return pulumi.get(self, "passthrough_request_headers")
|
732
|
+
|
733
|
+
@passthrough_request_headers.setter
|
734
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
735
|
+
pulumi.set(self, "passthrough_request_headers", value)
|
736
|
+
|
737
|
+
@_builtins.property
|
738
|
+
@pulumi.getter(name="pluginVersion")
|
739
|
+
def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
|
740
|
+
"""
|
741
|
+
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
742
|
+
"""
|
743
|
+
return pulumi.get(self, "plugin_version")
|
744
|
+
|
745
|
+
@plugin_version.setter
|
746
|
+
def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
|
747
|
+
pulumi.set(self, "plugin_version", value)
|
748
|
+
|
749
|
+
@_builtins.property
|
750
|
+
@pulumi.getter(name="sealWrap")
|
751
|
+
def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
752
|
+
"""
|
753
|
+
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
754
|
+
"""
|
755
|
+
return pulumi.get(self, "seal_wrap")
|
756
|
+
|
757
|
+
@seal_wrap.setter
|
758
|
+
def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
759
|
+
pulumi.set(self, "seal_wrap", value)
|
760
|
+
|
761
|
+
@_builtins.property
|
303
762
|
@pulumi.getter
|
304
|
-
def token(self) -> Optional[pulumi.Input[
|
763
|
+
def token(self) -> Optional[pulumi.Input[_builtins.str]]:
|
305
764
|
return pulumi.get(self, "token")
|
306
765
|
|
307
766
|
@token.setter
|
308
|
-
def token(self, value: Optional[pulumi.Input[
|
767
|
+
def token(self, value: Optional[pulumi.Input[_builtins.str]]):
|
309
768
|
pulumi.set(self, "token", value)
|
310
769
|
|
311
770
|
|
@@ -315,15 +774,29 @@ class SecretBackend(pulumi.CustomResource):
|
|
315
774
|
def __init__(__self__,
|
316
775
|
resource_name: str,
|
317
776
|
opts: Optional[pulumi.ResourceOptions] = None,
|
318
|
-
address: Optional[pulumi.Input[
|
319
|
-
|
320
|
-
|
321
|
-
|
322
|
-
|
323
|
-
|
324
|
-
|
325
|
-
|
326
|
-
|
777
|
+
address: Optional[pulumi.Input[_builtins.str]] = None,
|
778
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
779
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
780
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
781
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
782
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
783
|
+
base_path: Optional[pulumi.Input[_builtins.str]] = None,
|
784
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
785
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
786
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
787
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
788
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
789
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
790
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
791
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
792
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
793
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
794
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
795
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
796
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
797
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
798
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
799
|
+
token: Optional[pulumi.Input[_builtins.str]] = None,
|
327
800
|
__props__=None):
|
328
801
|
"""
|
329
802
|
## Example Usage
|
@@ -348,16 +821,29 @@ class SecretBackend(pulumi.CustomResource):
|
|
348
821
|
|
349
822
|
:param str resource_name: The name of the resource.
|
350
823
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
351
|
-
:param pulumi.Input[
|
352
|
-
:param pulumi.Input[
|
353
|
-
:param pulumi.Input[
|
824
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
825
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
826
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
827
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
828
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
|
829
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
830
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
|
831
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
354
832
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
355
|
-
:param pulumi.Input[
|
356
|
-
|
357
|
-
:param pulumi.Input[
|
833
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
834
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
835
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
836
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
837
|
+
:param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
838
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
|
839
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
358
840
|
The value should not contain leading or trailing forward slashes.
|
359
841
|
The `namespace` is always relative to the provider's configured namespace.
|
360
842
|
*Available only for Vault Enterprise*.
|
843
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
844
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
845
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
846
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
361
847
|
"""
|
362
848
|
...
|
363
849
|
@overload
|
@@ -401,15 +887,29 @@ class SecretBackend(pulumi.CustomResource):
|
|
401
887
|
def _internal_init(__self__,
|
402
888
|
resource_name: str,
|
403
889
|
opts: Optional[pulumi.ResourceOptions] = None,
|
404
|
-
address: Optional[pulumi.Input[
|
405
|
-
|
406
|
-
|
407
|
-
|
408
|
-
|
409
|
-
|
410
|
-
|
411
|
-
|
412
|
-
|
890
|
+
address: Optional[pulumi.Input[_builtins.str]] = None,
|
891
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
892
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
893
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
894
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
895
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
896
|
+
base_path: Optional[pulumi.Input[_builtins.str]] = None,
|
897
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
898
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
899
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
900
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
901
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
902
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
903
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
904
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
905
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
906
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
907
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
908
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
909
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
910
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
911
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
912
|
+
token: Optional[pulumi.Input[_builtins.str]] = None,
|
413
913
|
__props__=None):
|
414
914
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
415
915
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -420,14 +920,29 @@ class SecretBackend(pulumi.CustomResource):
|
|
420
920
|
__props__ = SecretBackendArgs.__new__(SecretBackendArgs)
|
421
921
|
|
422
922
|
__props__.__dict__["address"] = address
|
923
|
+
__props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
|
924
|
+
__props__.__dict__["allowed_response_headers"] = allowed_response_headers
|
925
|
+
__props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
|
926
|
+
__props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
|
423
927
|
__props__.__dict__["backend"] = backend
|
424
928
|
__props__.__dict__["base_path"] = base_path
|
425
929
|
__props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
|
930
|
+
__props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
|
426
931
|
__props__.__dict__["description"] = description
|
427
932
|
__props__.__dict__["disable_remount"] = disable_remount
|
933
|
+
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
934
|
+
__props__.__dict__["force_no_cache"] = force_no_cache
|
935
|
+
__props__.__dict__["identity_token_key"] = identity_token_key
|
936
|
+
__props__.__dict__["listing_visibility"] = listing_visibility
|
937
|
+
__props__.__dict__["local"] = local
|
428
938
|
__props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
|
429
939
|
__props__.__dict__["namespace"] = namespace
|
940
|
+
__props__.__dict__["options"] = options
|
941
|
+
__props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
|
942
|
+
__props__.__dict__["plugin_version"] = plugin_version
|
943
|
+
__props__.__dict__["seal_wrap"] = seal_wrap
|
430
944
|
__props__.__dict__["token"] = None if token is None else pulumi.Output.secret(token)
|
945
|
+
__props__.__dict__["accessor"] = None
|
431
946
|
secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["token"])
|
432
947
|
opts = pulumi.ResourceOptions.merge(opts, secret_opts)
|
433
948
|
super(SecretBackend, __self__).__init__(
|
@@ -440,15 +955,30 @@ class SecretBackend(pulumi.CustomResource):
|
|
440
955
|
def get(resource_name: str,
|
441
956
|
id: pulumi.Input[str],
|
442
957
|
opts: Optional[pulumi.ResourceOptions] = None,
|
443
|
-
|
444
|
-
|
445
|
-
|
446
|
-
|
447
|
-
|
448
|
-
|
449
|
-
|
450
|
-
|
451
|
-
|
958
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
959
|
+
address: Optional[pulumi.Input[_builtins.str]] = None,
|
960
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
961
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
962
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
963
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
964
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
965
|
+
base_path: Optional[pulumi.Input[_builtins.str]] = None,
|
966
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
967
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
968
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
969
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
970
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
971
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
972
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
973
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
974
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
975
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
976
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
977
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
978
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
979
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
980
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
981
|
+
token: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackend':
|
452
982
|
"""
|
453
983
|
Get an existing SecretBackend resource's state with the given name, id, and optional extra
|
454
984
|
properties used to qualify the lookup.
|
@@ -456,84 +986,200 @@ class SecretBackend(pulumi.CustomResource):
|
|
456
986
|
:param str resource_name: The unique name of the resulting resource.
|
457
987
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
458
988
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
459
|
-
:param pulumi.Input[
|
460
|
-
:param pulumi.Input[
|
461
|
-
:param pulumi.Input[
|
989
|
+
:param pulumi.Input[_builtins.str] accessor: Accessor of the mount
|
990
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
991
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
992
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
993
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
994
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
|
995
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
996
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
|
997
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
462
998
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
463
|
-
:param pulumi.Input[
|
464
|
-
|
465
|
-
:param pulumi.Input[
|
999
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
1000
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
1001
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
1002
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
1003
|
+
:param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
1004
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
|
1005
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
466
1006
|
The value should not contain leading or trailing forward slashes.
|
467
1007
|
The `namespace` is always relative to the provider's configured namespace.
|
468
1008
|
*Available only for Vault Enterprise*.
|
1009
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
1010
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
1011
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1012
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
469
1013
|
"""
|
470
1014
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
471
1015
|
|
472
1016
|
__props__ = _SecretBackendState.__new__(_SecretBackendState)
|
473
1017
|
|
1018
|
+
__props__.__dict__["accessor"] = accessor
|
474
1019
|
__props__.__dict__["address"] = address
|
1020
|
+
__props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
|
1021
|
+
__props__.__dict__["allowed_response_headers"] = allowed_response_headers
|
1022
|
+
__props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
|
1023
|
+
__props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
|
475
1024
|
__props__.__dict__["backend"] = backend
|
476
1025
|
__props__.__dict__["base_path"] = base_path
|
477
1026
|
__props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
|
1027
|
+
__props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
|
478
1028
|
__props__.__dict__["description"] = description
|
479
1029
|
__props__.__dict__["disable_remount"] = disable_remount
|
1030
|
+
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
1031
|
+
__props__.__dict__["force_no_cache"] = force_no_cache
|
1032
|
+
__props__.__dict__["identity_token_key"] = identity_token_key
|
1033
|
+
__props__.__dict__["listing_visibility"] = listing_visibility
|
1034
|
+
__props__.__dict__["local"] = local
|
480
1035
|
__props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
|
481
1036
|
__props__.__dict__["namespace"] = namespace
|
1037
|
+
__props__.__dict__["options"] = options
|
1038
|
+
__props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
|
1039
|
+
__props__.__dict__["plugin_version"] = plugin_version
|
1040
|
+
__props__.__dict__["seal_wrap"] = seal_wrap
|
482
1041
|
__props__.__dict__["token"] = token
|
483
1042
|
return SecretBackend(resource_name, opts=opts, __props__=__props__)
|
484
1043
|
|
485
|
-
@property
|
1044
|
+
@_builtins.property
|
1045
|
+
@pulumi.getter
|
1046
|
+
def accessor(self) -> pulumi.Output[_builtins.str]:
|
1047
|
+
"""
|
1048
|
+
Accessor of the mount
|
1049
|
+
"""
|
1050
|
+
return pulumi.get(self, "accessor")
|
1051
|
+
|
1052
|
+
@_builtins.property
|
486
1053
|
@pulumi.getter
|
487
|
-
def address(self) -> pulumi.Output[Optional[
|
1054
|
+
def address(self) -> pulumi.Output[Optional[_builtins.str]]:
|
488
1055
|
return pulumi.get(self, "address")
|
489
1056
|
|
490
|
-
@property
|
1057
|
+
@_builtins.property
|
1058
|
+
@pulumi.getter(name="allowedManagedKeys")
|
1059
|
+
def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1060
|
+
"""
|
1061
|
+
List of managed key registry entry names that the mount in question is allowed to access
|
1062
|
+
"""
|
1063
|
+
return pulumi.get(self, "allowed_managed_keys")
|
1064
|
+
|
1065
|
+
@_builtins.property
|
1066
|
+
@pulumi.getter(name="allowedResponseHeaders")
|
1067
|
+
def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1068
|
+
"""
|
1069
|
+
List of headers to allow and pass from the request to the plugin
|
1070
|
+
"""
|
1071
|
+
return pulumi.get(self, "allowed_response_headers")
|
1072
|
+
|
1073
|
+
@_builtins.property
|
1074
|
+
@pulumi.getter(name="auditNonHmacRequestKeys")
|
1075
|
+
def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
1076
|
+
"""
|
1077
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1078
|
+
"""
|
1079
|
+
return pulumi.get(self, "audit_non_hmac_request_keys")
|
1080
|
+
|
1081
|
+
@_builtins.property
|
1082
|
+
@pulumi.getter(name="auditNonHmacResponseKeys")
|
1083
|
+
def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
1084
|
+
"""
|
1085
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1086
|
+
"""
|
1087
|
+
return pulumi.get(self, "audit_non_hmac_response_keys")
|
1088
|
+
|
1089
|
+
@_builtins.property
|
491
1090
|
@pulumi.getter
|
492
|
-
def backend(self) -> pulumi.Output[Optional[
|
1091
|
+
def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
|
493
1092
|
return pulumi.get(self, "backend")
|
494
1093
|
|
495
|
-
@property
|
1094
|
+
@_builtins.property
|
496
1095
|
@pulumi.getter(name="basePath")
|
497
|
-
def base_path(self) -> pulumi.Output[Optional[
|
1096
|
+
def base_path(self) -> pulumi.Output[Optional[_builtins.str]]:
|
498
1097
|
return pulumi.get(self, "base_path")
|
499
1098
|
|
500
|
-
@property
|
1099
|
+
@_builtins.property
|
501
1100
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
502
|
-
def default_lease_ttl_seconds(self) -> pulumi.Output[Optional[
|
1101
|
+
def default_lease_ttl_seconds(self) -> pulumi.Output[Optional[_builtins.int]]:
|
503
1102
|
"""
|
504
|
-
|
1103
|
+
Default lease duration for secrets in seconds
|
505
1104
|
"""
|
506
1105
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
507
1106
|
|
508
|
-
@property
|
1107
|
+
@_builtins.property
|
1108
|
+
@pulumi.getter(name="delegatedAuthAccessors")
|
1109
|
+
def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1110
|
+
"""
|
1111
|
+
List of headers to allow and pass from the request to the plugin
|
1112
|
+
"""
|
1113
|
+
return pulumi.get(self, "delegated_auth_accessors")
|
1114
|
+
|
1115
|
+
@_builtins.property
|
509
1116
|
@pulumi.getter
|
510
|
-
def description(self) -> pulumi.Output[Optional[
|
1117
|
+
def description(self) -> pulumi.Output[Optional[_builtins.str]]:
|
511
1118
|
"""
|
512
|
-
|
1119
|
+
Human-friendly description of the mount for the backend.
|
513
1120
|
"""
|
514
1121
|
return pulumi.get(self, "description")
|
515
1122
|
|
516
|
-
@property
|
1123
|
+
@_builtins.property
|
517
1124
|
@pulumi.getter(name="disableRemount")
|
518
|
-
def disable_remount(self) -> pulumi.Output[Optional[
|
1125
|
+
def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
519
1126
|
"""
|
520
1127
|
If set, opts out of mount migration on path updates.
|
521
1128
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
522
1129
|
"""
|
523
1130
|
return pulumi.get(self, "disable_remount")
|
524
1131
|
|
525
|
-
@property
|
1132
|
+
@_builtins.property
|
1133
|
+
@pulumi.getter(name="externalEntropyAccess")
|
1134
|
+
def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1135
|
+
"""
|
1136
|
+
Enable the secrets engine to access Vault's external entropy source
|
1137
|
+
"""
|
1138
|
+
return pulumi.get(self, "external_entropy_access")
|
1139
|
+
|
1140
|
+
@_builtins.property
|
1141
|
+
@pulumi.getter(name="forceNoCache")
|
1142
|
+
def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
|
1143
|
+
"""
|
1144
|
+
If set to true, disables caching.
|
1145
|
+
"""
|
1146
|
+
return pulumi.get(self, "force_no_cache")
|
1147
|
+
|
1148
|
+
@_builtins.property
|
1149
|
+
@pulumi.getter(name="identityTokenKey")
|
1150
|
+
def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1151
|
+
"""
|
1152
|
+
The key to use for signing plugin workload identity tokens
|
1153
|
+
"""
|
1154
|
+
return pulumi.get(self, "identity_token_key")
|
1155
|
+
|
1156
|
+
@_builtins.property
|
1157
|
+
@pulumi.getter(name="listingVisibility")
|
1158
|
+
def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1159
|
+
"""
|
1160
|
+
Specifies whether to show this mount in the UI-specific listing endpoint
|
1161
|
+
"""
|
1162
|
+
return pulumi.get(self, "listing_visibility")
|
1163
|
+
|
1164
|
+
@_builtins.property
|
1165
|
+
@pulumi.getter
|
1166
|
+
def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1167
|
+
"""
|
1168
|
+
Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
1169
|
+
"""
|
1170
|
+
return pulumi.get(self, "local")
|
1171
|
+
|
1172
|
+
@_builtins.property
|
526
1173
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
527
|
-
def max_lease_ttl_seconds(self) -> pulumi.Output[Optional[
|
1174
|
+
def max_lease_ttl_seconds(self) -> pulumi.Output[Optional[_builtins.int]]:
|
528
1175
|
"""
|
529
|
-
|
530
|
-
for credentials issued by this backend.
|
1176
|
+
Maximum possible lease duration for secrets in seconds
|
531
1177
|
"""
|
532
1178
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
533
1179
|
|
534
|
-
@property
|
1180
|
+
@_builtins.property
|
535
1181
|
@pulumi.getter
|
536
|
-
def namespace(self) -> pulumi.Output[Optional[
|
1182
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
537
1183
|
"""
|
538
1184
|
The namespace to provision the resource in.
|
539
1185
|
The value should not contain leading or trailing forward slashes.
|
@@ -542,8 +1188,40 @@ class SecretBackend(pulumi.CustomResource):
|
|
542
1188
|
"""
|
543
1189
|
return pulumi.get(self, "namespace")
|
544
1190
|
|
545
|
-
@property
|
1191
|
+
@_builtins.property
|
1192
|
+
@pulumi.getter
|
1193
|
+
def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
|
1194
|
+
"""
|
1195
|
+
Specifies mount type specific options that are passed to the backend
|
1196
|
+
"""
|
1197
|
+
return pulumi.get(self, "options")
|
1198
|
+
|
1199
|
+
@_builtins.property
|
1200
|
+
@pulumi.getter(name="passthroughRequestHeaders")
|
1201
|
+
def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1202
|
+
"""
|
1203
|
+
List of headers to allow and pass from the request to the plugin
|
1204
|
+
"""
|
1205
|
+
return pulumi.get(self, "passthrough_request_headers")
|
1206
|
+
|
1207
|
+
@_builtins.property
|
1208
|
+
@pulumi.getter(name="pluginVersion")
|
1209
|
+
def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1210
|
+
"""
|
1211
|
+
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1212
|
+
"""
|
1213
|
+
return pulumi.get(self, "plugin_version")
|
1214
|
+
|
1215
|
+
@_builtins.property
|
1216
|
+
@pulumi.getter(name="sealWrap")
|
1217
|
+
def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
|
1218
|
+
"""
|
1219
|
+
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1220
|
+
"""
|
1221
|
+
return pulumi.get(self, "seal_wrap")
|
1222
|
+
|
1223
|
+
@_builtins.property
|
546
1224
|
@pulumi.getter
|
547
|
-
def token(self) -> pulumi.Output[Optional[
|
1225
|
+
def token(self) -> pulumi.Output[Optional[_builtins.str]]:
|
548
1226
|
return pulumi.get(self, "token")
|
549
1227
|
|