pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +19 -1
- pulumi_vault/_inputs.py +873 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +1016 -439
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +1057 -285
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +887 -256
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +426 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +878 -336
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +400 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +1006 -227
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +431 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +732 -693
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +380 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +909 -271
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +234 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +205 -159
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +902 -231
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +217 -124
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +833 -155
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +377 -350
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0.dist-info/RECORD +270 -0
- pulumi_vault-7.1.0.dist-info/RECORD +0 -268
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
pulumi_vault/azure/backend.py
CHANGED
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,61 +19,104 @@ __all__ = ['BackendArgs', 'Backend']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class BackendArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
subscription_id: pulumi.Input[
|
24
|
-
tenant_id: pulumi.Input[
|
25
|
-
|
26
|
-
|
27
|
-
|
28
|
-
|
29
|
-
|
30
|
-
|
31
|
-
|
32
|
-
|
33
|
-
|
34
|
-
|
35
|
-
|
36
|
-
|
37
|
-
|
38
|
-
|
22
|
+
subscription_id: pulumi.Input[_builtins.str],
|
23
|
+
tenant_id: pulumi.Input[_builtins.str],
|
24
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
25
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
26
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
27
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
28
|
+
client_id: Optional[pulumi.Input[_builtins.str]] = None,
|
29
|
+
client_secret: Optional[pulumi.Input[_builtins.str]] = None,
|
30
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
31
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
32
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
33
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
34
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
35
|
+
environment: Optional[pulumi.Input[_builtins.str]] = None,
|
36
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
37
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
38
|
+
identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
|
39
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
40
|
+
identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
41
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
42
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
43
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
44
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
45
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
46
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
47
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
48
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
49
|
+
root_password_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
50
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
51
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
52
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
53
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None):
|
39
54
|
"""
|
40
55
|
The set of arguments for constructing a Backend resource.
|
41
|
-
:param pulumi.Input[
|
42
|
-
:param pulumi.Input[
|
43
|
-
:param pulumi.Input[
|
44
|
-
:param pulumi.Input[
|
45
|
-
:param pulumi.Input[
|
46
|
-
:param pulumi.Input[
|
56
|
+
:param pulumi.Input[_builtins.str] subscription_id: The subscription id for the Azure Active Directory.
|
57
|
+
:param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory.
|
58
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
59
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
60
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
61
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
62
|
+
:param pulumi.Input[_builtins.str] client_id: The OAuth2 client id to connect to Azure.
|
63
|
+
:param pulumi.Input[_builtins.str] client_secret: The OAuth2 client secret to connect to Azure.
|
64
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
65
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
66
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
|
67
|
+
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
47
68
|
*Available only for Vault Enterprise*
|
48
|
-
:param pulumi.Input[
|
69
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
49
70
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
50
|
-
:param pulumi.Input[
|
51
|
-
:param pulumi.Input[
|
71
|
+
:param pulumi.Input[_builtins.str] environment: The Azure environment.
|
72
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
73
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
74
|
+
:param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.17+.
|
52
75
|
*Available only for Vault Enterprise*
|
53
|
-
:param pulumi.Input[
|
76
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens.
|
77
|
+
:param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
|
54
78
|
*Available only for Vault Enterprise*
|
55
|
-
:param pulumi.Input[
|
56
|
-
|
57
|
-
:param pulumi.Input[
|
79
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
80
|
+
:param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
81
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
82
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
58
83
|
The value should not contain leading or trailing forward slashes.
|
59
84
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
60
85
|
*Available only for Vault Enterprise*.
|
61
|
-
:param pulumi.Input[
|
62
|
-
:param pulumi.Input[
|
86
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
87
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
88
|
+
:param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Defaults to `azure`.
|
89
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
90
|
+
:param pulumi.Input[_builtins.int] root_password_ttl: The TTL in seconds of the root password in Azure when rotate-root generates a new client secret
|
91
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
63
92
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
64
93
|
*Available only for Vault Enterprise*
|
65
|
-
:param pulumi.Input[
|
94
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
66
95
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
67
96
|
*Available only for Vault Enterprise*
|
68
|
-
:param pulumi.Input[
|
97
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
69
98
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
70
99
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*
|
100
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
71
101
|
"""
|
72
102
|
pulumi.set(__self__, "subscription_id", subscription_id)
|
73
103
|
pulumi.set(__self__, "tenant_id", tenant_id)
|
104
|
+
if allowed_managed_keys is not None:
|
105
|
+
pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
|
106
|
+
if allowed_response_headers is not None:
|
107
|
+
pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
|
108
|
+
if audit_non_hmac_request_keys is not None:
|
109
|
+
pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
|
110
|
+
if audit_non_hmac_response_keys is not None:
|
111
|
+
pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
|
74
112
|
if client_id is not None:
|
75
113
|
pulumi.set(__self__, "client_id", client_id)
|
76
114
|
if client_secret is not None:
|
77
115
|
pulumi.set(__self__, "client_secret", client_secret)
|
116
|
+
if default_lease_ttl_seconds is not None:
|
117
|
+
pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
|
118
|
+
if delegated_auth_accessors is not None:
|
119
|
+
pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
|
78
120
|
if description is not None:
|
79
121
|
pulumi.set(__self__, "description", description)
|
80
122
|
if disable_automated_rotation is not None:
|
@@ -83,86 +125,178 @@ class BackendArgs:
|
|
83
125
|
pulumi.set(__self__, "disable_remount", disable_remount)
|
84
126
|
if environment is not None:
|
85
127
|
pulumi.set(__self__, "environment", environment)
|
128
|
+
if external_entropy_access is not None:
|
129
|
+
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
130
|
+
if force_no_cache is not None:
|
131
|
+
pulumi.set(__self__, "force_no_cache", force_no_cache)
|
86
132
|
if identity_token_audience is not None:
|
87
133
|
pulumi.set(__self__, "identity_token_audience", identity_token_audience)
|
88
134
|
if identity_token_key is not None:
|
89
135
|
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
90
136
|
if identity_token_ttl is not None:
|
91
137
|
pulumi.set(__self__, "identity_token_ttl", identity_token_ttl)
|
138
|
+
if listing_visibility is not None:
|
139
|
+
pulumi.set(__self__, "listing_visibility", listing_visibility)
|
140
|
+
if local is not None:
|
141
|
+
pulumi.set(__self__, "local", local)
|
142
|
+
if max_lease_ttl_seconds is not None:
|
143
|
+
pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
|
92
144
|
if namespace is not None:
|
93
145
|
pulumi.set(__self__, "namespace", namespace)
|
146
|
+
if options is not None:
|
147
|
+
pulumi.set(__self__, "options", options)
|
148
|
+
if passthrough_request_headers is not None:
|
149
|
+
pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
|
94
150
|
if path is not None:
|
95
151
|
pulumi.set(__self__, "path", path)
|
152
|
+
if plugin_version is not None:
|
153
|
+
pulumi.set(__self__, "plugin_version", plugin_version)
|
154
|
+
if root_password_ttl is not None:
|
155
|
+
pulumi.set(__self__, "root_password_ttl", root_password_ttl)
|
96
156
|
if rotation_period is not None:
|
97
157
|
pulumi.set(__self__, "rotation_period", rotation_period)
|
98
158
|
if rotation_schedule is not None:
|
99
159
|
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
100
160
|
if rotation_window is not None:
|
101
161
|
pulumi.set(__self__, "rotation_window", rotation_window)
|
162
|
+
if seal_wrap is not None:
|
163
|
+
pulumi.set(__self__, "seal_wrap", seal_wrap)
|
102
164
|
|
103
|
-
@property
|
165
|
+
@_builtins.property
|
104
166
|
@pulumi.getter(name="subscriptionId")
|
105
|
-
def subscription_id(self) -> pulumi.Input[
|
167
|
+
def subscription_id(self) -> pulumi.Input[_builtins.str]:
|
106
168
|
"""
|
107
169
|
The subscription id for the Azure Active Directory.
|
108
170
|
"""
|
109
171
|
return pulumi.get(self, "subscription_id")
|
110
172
|
|
111
173
|
@subscription_id.setter
|
112
|
-
def subscription_id(self, value: pulumi.Input[
|
174
|
+
def subscription_id(self, value: pulumi.Input[_builtins.str]):
|
113
175
|
pulumi.set(self, "subscription_id", value)
|
114
176
|
|
115
|
-
@property
|
177
|
+
@_builtins.property
|
116
178
|
@pulumi.getter(name="tenantId")
|
117
|
-
def tenant_id(self) -> pulumi.Input[
|
179
|
+
def tenant_id(self) -> pulumi.Input[_builtins.str]:
|
118
180
|
"""
|
119
181
|
The tenant id for the Azure Active Directory.
|
120
182
|
"""
|
121
183
|
return pulumi.get(self, "tenant_id")
|
122
184
|
|
123
185
|
@tenant_id.setter
|
124
|
-
def tenant_id(self, value: pulumi.Input[
|
186
|
+
def tenant_id(self, value: pulumi.Input[_builtins.str]):
|
125
187
|
pulumi.set(self, "tenant_id", value)
|
126
188
|
|
127
|
-
@property
|
189
|
+
@_builtins.property
|
190
|
+
@pulumi.getter(name="allowedManagedKeys")
|
191
|
+
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
192
|
+
"""
|
193
|
+
List of managed key registry entry names that the mount in question is allowed to access
|
194
|
+
"""
|
195
|
+
return pulumi.get(self, "allowed_managed_keys")
|
196
|
+
|
197
|
+
@allowed_managed_keys.setter
|
198
|
+
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
199
|
+
pulumi.set(self, "allowed_managed_keys", value)
|
200
|
+
|
201
|
+
@_builtins.property
|
202
|
+
@pulumi.getter(name="allowedResponseHeaders")
|
203
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
204
|
+
"""
|
205
|
+
List of headers to allow and pass from the request to the plugin
|
206
|
+
"""
|
207
|
+
return pulumi.get(self, "allowed_response_headers")
|
208
|
+
|
209
|
+
@allowed_response_headers.setter
|
210
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
211
|
+
pulumi.set(self, "allowed_response_headers", value)
|
212
|
+
|
213
|
+
@_builtins.property
|
214
|
+
@pulumi.getter(name="auditNonHmacRequestKeys")
|
215
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
216
|
+
"""
|
217
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
218
|
+
"""
|
219
|
+
return pulumi.get(self, "audit_non_hmac_request_keys")
|
220
|
+
|
221
|
+
@audit_non_hmac_request_keys.setter
|
222
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
223
|
+
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
224
|
+
|
225
|
+
@_builtins.property
|
226
|
+
@pulumi.getter(name="auditNonHmacResponseKeys")
|
227
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
228
|
+
"""
|
229
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
230
|
+
"""
|
231
|
+
return pulumi.get(self, "audit_non_hmac_response_keys")
|
232
|
+
|
233
|
+
@audit_non_hmac_response_keys.setter
|
234
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
235
|
+
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
236
|
+
|
237
|
+
@_builtins.property
|
128
238
|
@pulumi.getter(name="clientId")
|
129
|
-
def client_id(self) -> Optional[pulumi.Input[
|
239
|
+
def client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
130
240
|
"""
|
131
241
|
The OAuth2 client id to connect to Azure.
|
132
242
|
"""
|
133
243
|
return pulumi.get(self, "client_id")
|
134
244
|
|
135
245
|
@client_id.setter
|
136
|
-
def client_id(self, value: Optional[pulumi.Input[
|
246
|
+
def client_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
137
247
|
pulumi.set(self, "client_id", value)
|
138
248
|
|
139
|
-
@property
|
249
|
+
@_builtins.property
|
140
250
|
@pulumi.getter(name="clientSecret")
|
141
|
-
def client_secret(self) -> Optional[pulumi.Input[
|
251
|
+
def client_secret(self) -> Optional[pulumi.Input[_builtins.str]]:
|
142
252
|
"""
|
143
253
|
The OAuth2 client secret to connect to Azure.
|
144
254
|
"""
|
145
255
|
return pulumi.get(self, "client_secret")
|
146
256
|
|
147
257
|
@client_secret.setter
|
148
|
-
def client_secret(self, value: Optional[pulumi.Input[
|
258
|
+
def client_secret(self, value: Optional[pulumi.Input[_builtins.str]]):
|
149
259
|
pulumi.set(self, "client_secret", value)
|
150
260
|
|
151
|
-
@property
|
261
|
+
@_builtins.property
|
262
|
+
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
263
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
264
|
+
"""
|
265
|
+
Default lease duration for tokens and secrets in seconds
|
266
|
+
"""
|
267
|
+
return pulumi.get(self, "default_lease_ttl_seconds")
|
268
|
+
|
269
|
+
@default_lease_ttl_seconds.setter
|
270
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
271
|
+
pulumi.set(self, "default_lease_ttl_seconds", value)
|
272
|
+
|
273
|
+
@_builtins.property
|
274
|
+
@pulumi.getter(name="delegatedAuthAccessors")
|
275
|
+
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
276
|
+
"""
|
277
|
+
List of headers to allow and pass from the request to the plugin
|
278
|
+
"""
|
279
|
+
return pulumi.get(self, "delegated_auth_accessors")
|
280
|
+
|
281
|
+
@delegated_auth_accessors.setter
|
282
|
+
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
283
|
+
pulumi.set(self, "delegated_auth_accessors", value)
|
284
|
+
|
285
|
+
@_builtins.property
|
152
286
|
@pulumi.getter
|
153
|
-
def description(self) -> Optional[pulumi.Input[
|
287
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
154
288
|
"""
|
155
289
|
Human-friendly description of the mount for the backend.
|
156
290
|
"""
|
157
291
|
return pulumi.get(self, "description")
|
158
292
|
|
159
293
|
@description.setter
|
160
|
-
def description(self, value: Optional[pulumi.Input[
|
294
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
161
295
|
pulumi.set(self, "description", value)
|
162
296
|
|
163
|
-
@property
|
297
|
+
@_builtins.property
|
164
298
|
@pulumi.getter(name="disableAutomatedRotation")
|
165
|
-
def disable_automated_rotation(self) -> Optional[pulumi.Input[
|
299
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
166
300
|
"""
|
167
301
|
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
168
302
|
*Available only for Vault Enterprise*
|
@@ -170,12 +304,12 @@ class BackendArgs:
|
|
170
304
|
return pulumi.get(self, "disable_automated_rotation")
|
171
305
|
|
172
306
|
@disable_automated_rotation.setter
|
173
|
-
def disable_automated_rotation(self, value: Optional[pulumi.Input[
|
307
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
174
308
|
pulumi.set(self, "disable_automated_rotation", value)
|
175
309
|
|
176
|
-
@property
|
310
|
+
@_builtins.property
|
177
311
|
@pulumi.getter(name="disableRemount")
|
178
|
-
def disable_remount(self) -> Optional[pulumi.Input[
|
312
|
+
def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
179
313
|
"""
|
180
314
|
If set, opts out of mount migration on path updates.
|
181
315
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -183,24 +317,48 @@ class BackendArgs:
|
|
183
317
|
return pulumi.get(self, "disable_remount")
|
184
318
|
|
185
319
|
@disable_remount.setter
|
186
|
-
def disable_remount(self, value: Optional[pulumi.Input[
|
320
|
+
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
187
321
|
pulumi.set(self, "disable_remount", value)
|
188
322
|
|
189
|
-
@property
|
323
|
+
@_builtins.property
|
190
324
|
@pulumi.getter
|
191
|
-
def environment(self) -> Optional[pulumi.Input[
|
325
|
+
def environment(self) -> Optional[pulumi.Input[_builtins.str]]:
|
192
326
|
"""
|
193
327
|
The Azure environment.
|
194
328
|
"""
|
195
329
|
return pulumi.get(self, "environment")
|
196
330
|
|
197
331
|
@environment.setter
|
198
|
-
def environment(self, value: Optional[pulumi.Input[
|
332
|
+
def environment(self, value: Optional[pulumi.Input[_builtins.str]]):
|
199
333
|
pulumi.set(self, "environment", value)
|
200
334
|
|
201
|
-
@property
|
335
|
+
@_builtins.property
|
336
|
+
@pulumi.getter(name="externalEntropyAccess")
|
337
|
+
def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
338
|
+
"""
|
339
|
+
Enable the secrets engine to access Vault's external entropy source
|
340
|
+
"""
|
341
|
+
return pulumi.get(self, "external_entropy_access")
|
342
|
+
|
343
|
+
@external_entropy_access.setter
|
344
|
+
def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
345
|
+
pulumi.set(self, "external_entropy_access", value)
|
346
|
+
|
347
|
+
@_builtins.property
|
348
|
+
@pulumi.getter(name="forceNoCache")
|
349
|
+
def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
350
|
+
"""
|
351
|
+
If set to true, disables caching.
|
352
|
+
"""
|
353
|
+
return pulumi.get(self, "force_no_cache")
|
354
|
+
|
355
|
+
@force_no_cache.setter
|
356
|
+
def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
357
|
+
pulumi.set(self, "force_no_cache", value)
|
358
|
+
|
359
|
+
@_builtins.property
|
202
360
|
@pulumi.getter(name="identityTokenAudience")
|
203
|
-
def identity_token_audience(self) -> Optional[pulumi.Input[
|
361
|
+
def identity_token_audience(self) -> Optional[pulumi.Input[_builtins.str]]:
|
204
362
|
"""
|
205
363
|
The audience claim value. Requires Vault 1.17+.
|
206
364
|
*Available only for Vault Enterprise*
|
@@ -208,25 +366,24 @@ class BackendArgs:
|
|
208
366
|
return pulumi.get(self, "identity_token_audience")
|
209
367
|
|
210
368
|
@identity_token_audience.setter
|
211
|
-
def identity_token_audience(self, value: Optional[pulumi.Input[
|
369
|
+
def identity_token_audience(self, value: Optional[pulumi.Input[_builtins.str]]):
|
212
370
|
pulumi.set(self, "identity_token_audience", value)
|
213
371
|
|
214
|
-
@property
|
372
|
+
@_builtins.property
|
215
373
|
@pulumi.getter(name="identityTokenKey")
|
216
|
-
def identity_token_key(self) -> Optional[pulumi.Input[
|
374
|
+
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
217
375
|
"""
|
218
|
-
The key to use for signing identity tokens.
|
219
|
-
*Available only for Vault Enterprise*
|
376
|
+
The key to use for signing identity tokens.
|
220
377
|
"""
|
221
378
|
return pulumi.get(self, "identity_token_key")
|
222
379
|
|
223
380
|
@identity_token_key.setter
|
224
|
-
def identity_token_key(self, value: Optional[pulumi.Input[
|
381
|
+
def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
225
382
|
pulumi.set(self, "identity_token_key", value)
|
226
383
|
|
227
|
-
@property
|
384
|
+
@_builtins.property
|
228
385
|
@pulumi.getter(name="identityTokenTtl")
|
229
|
-
def identity_token_ttl(self) -> Optional[pulumi.Input[
|
386
|
+
def identity_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
230
387
|
"""
|
231
388
|
The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
|
232
389
|
*Available only for Vault Enterprise*
|
@@ -234,12 +391,48 @@ class BackendArgs:
|
|
234
391
|
return pulumi.get(self, "identity_token_ttl")
|
235
392
|
|
236
393
|
@identity_token_ttl.setter
|
237
|
-
def identity_token_ttl(self, value: Optional[pulumi.Input[
|
394
|
+
def identity_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
238
395
|
pulumi.set(self, "identity_token_ttl", value)
|
239
396
|
|
240
|
-
@property
|
397
|
+
@_builtins.property
|
398
|
+
@pulumi.getter(name="listingVisibility")
|
399
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
400
|
+
"""
|
401
|
+
Specifies whether to show this mount in the UI-specific listing endpoint
|
402
|
+
"""
|
403
|
+
return pulumi.get(self, "listing_visibility")
|
404
|
+
|
405
|
+
@listing_visibility.setter
|
406
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
407
|
+
pulumi.set(self, "listing_visibility", value)
|
408
|
+
|
409
|
+
@_builtins.property
|
241
410
|
@pulumi.getter
|
242
|
-
def
|
411
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
412
|
+
"""
|
413
|
+
Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
414
|
+
"""
|
415
|
+
return pulumi.get(self, "local")
|
416
|
+
|
417
|
+
@local.setter
|
418
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
419
|
+
pulumi.set(self, "local", value)
|
420
|
+
|
421
|
+
@_builtins.property
|
422
|
+
@pulumi.getter(name="maxLeaseTtlSeconds")
|
423
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
424
|
+
"""
|
425
|
+
Maximum possible lease duration for tokens and secrets in seconds
|
426
|
+
"""
|
427
|
+
return pulumi.get(self, "max_lease_ttl_seconds")
|
428
|
+
|
429
|
+
@max_lease_ttl_seconds.setter
|
430
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
431
|
+
pulumi.set(self, "max_lease_ttl_seconds", value)
|
432
|
+
|
433
|
+
@_builtins.property
|
434
|
+
@pulumi.getter
|
435
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
243
436
|
"""
|
244
437
|
The namespace to provision the resource in.
|
245
438
|
The value should not contain leading or trailing forward slashes.
|
@@ -249,24 +442,72 @@ class BackendArgs:
|
|
249
442
|
return pulumi.get(self, "namespace")
|
250
443
|
|
251
444
|
@namespace.setter
|
252
|
-
def namespace(self, value: Optional[pulumi.Input[
|
445
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
253
446
|
pulumi.set(self, "namespace", value)
|
254
447
|
|
255
|
-
@property
|
448
|
+
@_builtins.property
|
449
|
+
@pulumi.getter
|
450
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
451
|
+
"""
|
452
|
+
Specifies mount type specific options that are passed to the backend
|
453
|
+
"""
|
454
|
+
return pulumi.get(self, "options")
|
455
|
+
|
456
|
+
@options.setter
|
457
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
458
|
+
pulumi.set(self, "options", value)
|
459
|
+
|
460
|
+
@_builtins.property
|
461
|
+
@pulumi.getter(name="passthroughRequestHeaders")
|
462
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
463
|
+
"""
|
464
|
+
List of headers to allow and pass from the request to the plugin
|
465
|
+
"""
|
466
|
+
return pulumi.get(self, "passthrough_request_headers")
|
467
|
+
|
468
|
+
@passthrough_request_headers.setter
|
469
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
470
|
+
pulumi.set(self, "passthrough_request_headers", value)
|
471
|
+
|
472
|
+
@_builtins.property
|
256
473
|
@pulumi.getter
|
257
|
-
def path(self) -> Optional[pulumi.Input[
|
474
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
258
475
|
"""
|
259
476
|
The unique path this backend should be mounted at. Defaults to `azure`.
|
260
477
|
"""
|
261
478
|
return pulumi.get(self, "path")
|
262
479
|
|
263
480
|
@path.setter
|
264
|
-
def path(self, value: Optional[pulumi.Input[
|
481
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
265
482
|
pulumi.set(self, "path", value)
|
266
483
|
|
267
|
-
@property
|
484
|
+
@_builtins.property
|
485
|
+
@pulumi.getter(name="pluginVersion")
|
486
|
+
def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
|
487
|
+
"""
|
488
|
+
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
489
|
+
"""
|
490
|
+
return pulumi.get(self, "plugin_version")
|
491
|
+
|
492
|
+
@plugin_version.setter
|
493
|
+
def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
|
494
|
+
pulumi.set(self, "plugin_version", value)
|
495
|
+
|
496
|
+
@_builtins.property
|
497
|
+
@pulumi.getter(name="rootPasswordTtl")
|
498
|
+
def root_password_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
499
|
+
"""
|
500
|
+
The TTL in seconds of the root password in Azure when rotate-root generates a new client secret
|
501
|
+
"""
|
502
|
+
return pulumi.get(self, "root_password_ttl")
|
503
|
+
|
504
|
+
@root_password_ttl.setter
|
505
|
+
def root_password_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
506
|
+
pulumi.set(self, "root_password_ttl", value)
|
507
|
+
|
508
|
+
@_builtins.property
|
268
509
|
@pulumi.getter(name="rotationPeriod")
|
269
|
-
def rotation_period(self) -> Optional[pulumi.Input[
|
510
|
+
def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
270
511
|
"""
|
271
512
|
The amount of time in seconds Vault should wait before rotating the root credential.
|
272
513
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
@@ -275,12 +516,12 @@ class BackendArgs:
|
|
275
516
|
return pulumi.get(self, "rotation_period")
|
276
517
|
|
277
518
|
@rotation_period.setter
|
278
|
-
def rotation_period(self, value: Optional[pulumi.Input[
|
519
|
+
def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
279
520
|
pulumi.set(self, "rotation_period", value)
|
280
521
|
|
281
|
-
@property
|
522
|
+
@_builtins.property
|
282
523
|
@pulumi.getter(name="rotationSchedule")
|
283
|
-
def rotation_schedule(self) -> Optional[pulumi.Input[
|
524
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
|
284
525
|
"""
|
285
526
|
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
286
527
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
@@ -289,12 +530,12 @@ class BackendArgs:
|
|
289
530
|
return pulumi.get(self, "rotation_schedule")
|
290
531
|
|
291
532
|
@rotation_schedule.setter
|
292
|
-
def rotation_schedule(self, value: Optional[pulumi.Input[
|
533
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
|
293
534
|
pulumi.set(self, "rotation_schedule", value)
|
294
535
|
|
295
|
-
@property
|
536
|
+
@_builtins.property
|
296
537
|
@pulumi.getter(name="rotationWindow")
|
297
|
-
def rotation_window(self) -> Optional[pulumi.Input[
|
538
|
+
def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
|
298
539
|
"""
|
299
540
|
The maximum amount of time in seconds allowed to complete
|
300
541
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
@@ -303,66 +544,125 @@ class BackendArgs:
|
|
303
544
|
return pulumi.get(self, "rotation_window")
|
304
545
|
|
305
546
|
@rotation_window.setter
|
306
|
-
def rotation_window(self, value: Optional[pulumi.Input[
|
547
|
+
def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
|
307
548
|
pulumi.set(self, "rotation_window", value)
|
308
549
|
|
550
|
+
@_builtins.property
|
551
|
+
@pulumi.getter(name="sealWrap")
|
552
|
+
def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
553
|
+
"""
|
554
|
+
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
555
|
+
"""
|
556
|
+
return pulumi.get(self, "seal_wrap")
|
557
|
+
|
558
|
+
@seal_wrap.setter
|
559
|
+
def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
560
|
+
pulumi.set(self, "seal_wrap", value)
|
561
|
+
|
309
562
|
|
310
563
|
@pulumi.input_type
|
311
564
|
class _BackendState:
|
312
565
|
def __init__(__self__, *,
|
313
|
-
|
314
|
-
|
315
|
-
|
316
|
-
|
317
|
-
|
318
|
-
|
319
|
-
|
320
|
-
|
321
|
-
|
322
|
-
|
323
|
-
|
324
|
-
|
325
|
-
|
326
|
-
|
327
|
-
|
328
|
-
|
566
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
567
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
568
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
569
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
570
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
571
|
+
client_id: Optional[pulumi.Input[_builtins.str]] = None,
|
572
|
+
client_secret: Optional[pulumi.Input[_builtins.str]] = None,
|
573
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
574
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
575
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
576
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
577
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
578
|
+
environment: Optional[pulumi.Input[_builtins.str]] = None,
|
579
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
580
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
581
|
+
identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
|
582
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
583
|
+
identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
584
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
585
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
586
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
587
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
588
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
589
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
590
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
591
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
592
|
+
root_password_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
593
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
594
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
595
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
596
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
597
|
+
subscription_id: Optional[pulumi.Input[_builtins.str]] = None,
|
598
|
+
tenant_id: Optional[pulumi.Input[_builtins.str]] = None):
|
329
599
|
"""
|
330
600
|
Input properties used for looking up and filtering Backend resources.
|
331
|
-
:param pulumi.Input[
|
332
|
-
:param pulumi.Input[
|
333
|
-
:param pulumi.Input[
|
334
|
-
:param pulumi.Input[
|
601
|
+
:param pulumi.Input[_builtins.str] accessor: Accessor of the mount
|
602
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
603
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
604
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
605
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
606
|
+
:param pulumi.Input[_builtins.str] client_id: The OAuth2 client id to connect to Azure.
|
607
|
+
:param pulumi.Input[_builtins.str] client_secret: The OAuth2 client secret to connect to Azure.
|
608
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
609
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
610
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
|
611
|
+
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
335
612
|
*Available only for Vault Enterprise*
|
336
|
-
:param pulumi.Input[
|
613
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
337
614
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
338
|
-
:param pulumi.Input[
|
339
|
-
:param pulumi.Input[
|
340
|
-
|
341
|
-
:param pulumi.Input[
|
615
|
+
:param pulumi.Input[_builtins.str] environment: The Azure environment.
|
616
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
617
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
618
|
+
:param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.17+.
|
342
619
|
*Available only for Vault Enterprise*
|
343
|
-
:param pulumi.Input[
|
620
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens.
|
621
|
+
:param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
|
344
622
|
*Available only for Vault Enterprise*
|
345
|
-
:param pulumi.Input[
|
623
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
624
|
+
:param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
625
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
626
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
346
627
|
The value should not contain leading or trailing forward slashes.
|
347
628
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
348
629
|
*Available only for Vault Enterprise*.
|
349
|
-
:param pulumi.Input[
|
350
|
-
:param pulumi.Input[
|
630
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
631
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
632
|
+
:param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Defaults to `azure`.
|
633
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
634
|
+
:param pulumi.Input[_builtins.int] root_password_ttl: The TTL in seconds of the root password in Azure when rotate-root generates a new client secret
|
635
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
351
636
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
352
637
|
*Available only for Vault Enterprise*
|
353
|
-
:param pulumi.Input[
|
638
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
354
639
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
355
640
|
*Available only for Vault Enterprise*
|
356
|
-
:param pulumi.Input[
|
641
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
357
642
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
358
643
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*
|
359
|
-
:param pulumi.Input[
|
360
|
-
:param pulumi.Input[
|
361
|
-
|
644
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
645
|
+
:param pulumi.Input[_builtins.str] subscription_id: The subscription id for the Azure Active Directory.
|
646
|
+
:param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory.
|
647
|
+
"""
|
648
|
+
if accessor is not None:
|
649
|
+
pulumi.set(__self__, "accessor", accessor)
|
650
|
+
if allowed_managed_keys is not None:
|
651
|
+
pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
|
652
|
+
if allowed_response_headers is not None:
|
653
|
+
pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
|
654
|
+
if audit_non_hmac_request_keys is not None:
|
655
|
+
pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
|
656
|
+
if audit_non_hmac_response_keys is not None:
|
657
|
+
pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
|
362
658
|
if client_id is not None:
|
363
659
|
pulumi.set(__self__, "client_id", client_id)
|
364
660
|
if client_secret is not None:
|
365
661
|
pulumi.set(__self__, "client_secret", client_secret)
|
662
|
+
if default_lease_ttl_seconds is not None:
|
663
|
+
pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
|
664
|
+
if delegated_auth_accessors is not None:
|
665
|
+
pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
|
366
666
|
if description is not None:
|
367
667
|
pulumi.set(__self__, "description", description)
|
368
668
|
if disable_automated_rotation is not None:
|
@@ -371,66 +671,170 @@ class _BackendState:
|
|
371
671
|
pulumi.set(__self__, "disable_remount", disable_remount)
|
372
672
|
if environment is not None:
|
373
673
|
pulumi.set(__self__, "environment", environment)
|
674
|
+
if external_entropy_access is not None:
|
675
|
+
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
676
|
+
if force_no_cache is not None:
|
677
|
+
pulumi.set(__self__, "force_no_cache", force_no_cache)
|
374
678
|
if identity_token_audience is not None:
|
375
679
|
pulumi.set(__self__, "identity_token_audience", identity_token_audience)
|
376
680
|
if identity_token_key is not None:
|
377
681
|
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
378
682
|
if identity_token_ttl is not None:
|
379
683
|
pulumi.set(__self__, "identity_token_ttl", identity_token_ttl)
|
684
|
+
if listing_visibility is not None:
|
685
|
+
pulumi.set(__self__, "listing_visibility", listing_visibility)
|
686
|
+
if local is not None:
|
687
|
+
pulumi.set(__self__, "local", local)
|
688
|
+
if max_lease_ttl_seconds is not None:
|
689
|
+
pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
|
380
690
|
if namespace is not None:
|
381
691
|
pulumi.set(__self__, "namespace", namespace)
|
692
|
+
if options is not None:
|
693
|
+
pulumi.set(__self__, "options", options)
|
694
|
+
if passthrough_request_headers is not None:
|
695
|
+
pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
|
382
696
|
if path is not None:
|
383
697
|
pulumi.set(__self__, "path", path)
|
698
|
+
if plugin_version is not None:
|
699
|
+
pulumi.set(__self__, "plugin_version", plugin_version)
|
700
|
+
if root_password_ttl is not None:
|
701
|
+
pulumi.set(__self__, "root_password_ttl", root_password_ttl)
|
384
702
|
if rotation_period is not None:
|
385
703
|
pulumi.set(__self__, "rotation_period", rotation_period)
|
386
704
|
if rotation_schedule is not None:
|
387
705
|
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
388
706
|
if rotation_window is not None:
|
389
707
|
pulumi.set(__self__, "rotation_window", rotation_window)
|
708
|
+
if seal_wrap is not None:
|
709
|
+
pulumi.set(__self__, "seal_wrap", seal_wrap)
|
390
710
|
if subscription_id is not None:
|
391
711
|
pulumi.set(__self__, "subscription_id", subscription_id)
|
392
712
|
if tenant_id is not None:
|
393
713
|
pulumi.set(__self__, "tenant_id", tenant_id)
|
394
714
|
|
395
|
-
@property
|
715
|
+
@_builtins.property
|
716
|
+
@pulumi.getter
|
717
|
+
def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
|
718
|
+
"""
|
719
|
+
Accessor of the mount
|
720
|
+
"""
|
721
|
+
return pulumi.get(self, "accessor")
|
722
|
+
|
723
|
+
@accessor.setter
|
724
|
+
def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
|
725
|
+
pulumi.set(self, "accessor", value)
|
726
|
+
|
727
|
+
@_builtins.property
|
728
|
+
@pulumi.getter(name="allowedManagedKeys")
|
729
|
+
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
730
|
+
"""
|
731
|
+
List of managed key registry entry names that the mount in question is allowed to access
|
732
|
+
"""
|
733
|
+
return pulumi.get(self, "allowed_managed_keys")
|
734
|
+
|
735
|
+
@allowed_managed_keys.setter
|
736
|
+
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
737
|
+
pulumi.set(self, "allowed_managed_keys", value)
|
738
|
+
|
739
|
+
@_builtins.property
|
740
|
+
@pulumi.getter(name="allowedResponseHeaders")
|
741
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
742
|
+
"""
|
743
|
+
List of headers to allow and pass from the request to the plugin
|
744
|
+
"""
|
745
|
+
return pulumi.get(self, "allowed_response_headers")
|
746
|
+
|
747
|
+
@allowed_response_headers.setter
|
748
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
749
|
+
pulumi.set(self, "allowed_response_headers", value)
|
750
|
+
|
751
|
+
@_builtins.property
|
752
|
+
@pulumi.getter(name="auditNonHmacRequestKeys")
|
753
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
754
|
+
"""
|
755
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
756
|
+
"""
|
757
|
+
return pulumi.get(self, "audit_non_hmac_request_keys")
|
758
|
+
|
759
|
+
@audit_non_hmac_request_keys.setter
|
760
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
761
|
+
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
762
|
+
|
763
|
+
@_builtins.property
|
764
|
+
@pulumi.getter(name="auditNonHmacResponseKeys")
|
765
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
766
|
+
"""
|
767
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
768
|
+
"""
|
769
|
+
return pulumi.get(self, "audit_non_hmac_response_keys")
|
770
|
+
|
771
|
+
@audit_non_hmac_response_keys.setter
|
772
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
773
|
+
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
774
|
+
|
775
|
+
@_builtins.property
|
396
776
|
@pulumi.getter(name="clientId")
|
397
|
-
def client_id(self) -> Optional[pulumi.Input[
|
777
|
+
def client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
398
778
|
"""
|
399
779
|
The OAuth2 client id to connect to Azure.
|
400
780
|
"""
|
401
781
|
return pulumi.get(self, "client_id")
|
402
782
|
|
403
783
|
@client_id.setter
|
404
|
-
def client_id(self, value: Optional[pulumi.Input[
|
784
|
+
def client_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
405
785
|
pulumi.set(self, "client_id", value)
|
406
786
|
|
407
|
-
@property
|
787
|
+
@_builtins.property
|
408
788
|
@pulumi.getter(name="clientSecret")
|
409
|
-
def client_secret(self) -> Optional[pulumi.Input[
|
789
|
+
def client_secret(self) -> Optional[pulumi.Input[_builtins.str]]:
|
410
790
|
"""
|
411
791
|
The OAuth2 client secret to connect to Azure.
|
412
792
|
"""
|
413
793
|
return pulumi.get(self, "client_secret")
|
414
794
|
|
415
795
|
@client_secret.setter
|
416
|
-
def client_secret(self, value: Optional[pulumi.Input[
|
796
|
+
def client_secret(self, value: Optional[pulumi.Input[_builtins.str]]):
|
417
797
|
pulumi.set(self, "client_secret", value)
|
418
798
|
|
419
|
-
@property
|
799
|
+
@_builtins.property
|
800
|
+
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
801
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
802
|
+
"""
|
803
|
+
Default lease duration for tokens and secrets in seconds
|
804
|
+
"""
|
805
|
+
return pulumi.get(self, "default_lease_ttl_seconds")
|
806
|
+
|
807
|
+
@default_lease_ttl_seconds.setter
|
808
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
809
|
+
pulumi.set(self, "default_lease_ttl_seconds", value)
|
810
|
+
|
811
|
+
@_builtins.property
|
812
|
+
@pulumi.getter(name="delegatedAuthAccessors")
|
813
|
+
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
814
|
+
"""
|
815
|
+
List of headers to allow and pass from the request to the plugin
|
816
|
+
"""
|
817
|
+
return pulumi.get(self, "delegated_auth_accessors")
|
818
|
+
|
819
|
+
@delegated_auth_accessors.setter
|
820
|
+
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
821
|
+
pulumi.set(self, "delegated_auth_accessors", value)
|
822
|
+
|
823
|
+
@_builtins.property
|
420
824
|
@pulumi.getter
|
421
|
-
def description(self) -> Optional[pulumi.Input[
|
825
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
422
826
|
"""
|
423
827
|
Human-friendly description of the mount for the backend.
|
424
828
|
"""
|
425
829
|
return pulumi.get(self, "description")
|
426
830
|
|
427
831
|
@description.setter
|
428
|
-
def description(self, value: Optional[pulumi.Input[
|
832
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
429
833
|
pulumi.set(self, "description", value)
|
430
834
|
|
431
|
-
@property
|
835
|
+
@_builtins.property
|
432
836
|
@pulumi.getter(name="disableAutomatedRotation")
|
433
|
-
def disable_automated_rotation(self) -> Optional[pulumi.Input[
|
837
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
434
838
|
"""
|
435
839
|
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
436
840
|
*Available only for Vault Enterprise*
|
@@ -438,12 +842,12 @@ class _BackendState:
|
|
438
842
|
return pulumi.get(self, "disable_automated_rotation")
|
439
843
|
|
440
844
|
@disable_automated_rotation.setter
|
441
|
-
def disable_automated_rotation(self, value: Optional[pulumi.Input[
|
845
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
442
846
|
pulumi.set(self, "disable_automated_rotation", value)
|
443
847
|
|
444
|
-
@property
|
848
|
+
@_builtins.property
|
445
849
|
@pulumi.getter(name="disableRemount")
|
446
|
-
def disable_remount(self) -> Optional[pulumi.Input[
|
850
|
+
def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
447
851
|
"""
|
448
852
|
If set, opts out of mount migration on path updates.
|
449
853
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -451,24 +855,48 @@ class _BackendState:
|
|
451
855
|
return pulumi.get(self, "disable_remount")
|
452
856
|
|
453
857
|
@disable_remount.setter
|
454
|
-
def disable_remount(self, value: Optional[pulumi.Input[
|
858
|
+
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
455
859
|
pulumi.set(self, "disable_remount", value)
|
456
860
|
|
457
|
-
@property
|
861
|
+
@_builtins.property
|
458
862
|
@pulumi.getter
|
459
|
-
def environment(self) -> Optional[pulumi.Input[
|
863
|
+
def environment(self) -> Optional[pulumi.Input[_builtins.str]]:
|
460
864
|
"""
|
461
865
|
The Azure environment.
|
462
866
|
"""
|
463
867
|
return pulumi.get(self, "environment")
|
464
868
|
|
465
869
|
@environment.setter
|
466
|
-
def environment(self, value: Optional[pulumi.Input[
|
870
|
+
def environment(self, value: Optional[pulumi.Input[_builtins.str]]):
|
467
871
|
pulumi.set(self, "environment", value)
|
468
872
|
|
469
|
-
@property
|
873
|
+
@_builtins.property
|
874
|
+
@pulumi.getter(name="externalEntropyAccess")
|
875
|
+
def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
876
|
+
"""
|
877
|
+
Enable the secrets engine to access Vault's external entropy source
|
878
|
+
"""
|
879
|
+
return pulumi.get(self, "external_entropy_access")
|
880
|
+
|
881
|
+
@external_entropy_access.setter
|
882
|
+
def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
883
|
+
pulumi.set(self, "external_entropy_access", value)
|
884
|
+
|
885
|
+
@_builtins.property
|
886
|
+
@pulumi.getter(name="forceNoCache")
|
887
|
+
def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
888
|
+
"""
|
889
|
+
If set to true, disables caching.
|
890
|
+
"""
|
891
|
+
return pulumi.get(self, "force_no_cache")
|
892
|
+
|
893
|
+
@force_no_cache.setter
|
894
|
+
def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
895
|
+
pulumi.set(self, "force_no_cache", value)
|
896
|
+
|
897
|
+
@_builtins.property
|
470
898
|
@pulumi.getter(name="identityTokenAudience")
|
471
|
-
def identity_token_audience(self) -> Optional[pulumi.Input[
|
899
|
+
def identity_token_audience(self) -> Optional[pulumi.Input[_builtins.str]]:
|
472
900
|
"""
|
473
901
|
The audience claim value. Requires Vault 1.17+.
|
474
902
|
*Available only for Vault Enterprise*
|
@@ -476,25 +904,24 @@ class _BackendState:
|
|
476
904
|
return pulumi.get(self, "identity_token_audience")
|
477
905
|
|
478
906
|
@identity_token_audience.setter
|
479
|
-
def identity_token_audience(self, value: Optional[pulumi.Input[
|
907
|
+
def identity_token_audience(self, value: Optional[pulumi.Input[_builtins.str]]):
|
480
908
|
pulumi.set(self, "identity_token_audience", value)
|
481
909
|
|
482
|
-
@property
|
910
|
+
@_builtins.property
|
483
911
|
@pulumi.getter(name="identityTokenKey")
|
484
|
-
def identity_token_key(self) -> Optional[pulumi.Input[
|
912
|
+
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
485
913
|
"""
|
486
|
-
The key to use for signing identity tokens.
|
487
|
-
*Available only for Vault Enterprise*
|
914
|
+
The key to use for signing identity tokens.
|
488
915
|
"""
|
489
916
|
return pulumi.get(self, "identity_token_key")
|
490
917
|
|
491
918
|
@identity_token_key.setter
|
492
|
-
def identity_token_key(self, value: Optional[pulumi.Input[
|
919
|
+
def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
493
920
|
pulumi.set(self, "identity_token_key", value)
|
494
921
|
|
495
|
-
@property
|
922
|
+
@_builtins.property
|
496
923
|
@pulumi.getter(name="identityTokenTtl")
|
497
|
-
def identity_token_ttl(self) -> Optional[pulumi.Input[
|
924
|
+
def identity_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
498
925
|
"""
|
499
926
|
The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
|
500
927
|
*Available only for Vault Enterprise*
|
@@ -502,12 +929,48 @@ class _BackendState:
|
|
502
929
|
return pulumi.get(self, "identity_token_ttl")
|
503
930
|
|
504
931
|
@identity_token_ttl.setter
|
505
|
-
def identity_token_ttl(self, value: Optional[pulumi.Input[
|
932
|
+
def identity_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
506
933
|
pulumi.set(self, "identity_token_ttl", value)
|
507
934
|
|
508
|
-
@property
|
935
|
+
@_builtins.property
|
936
|
+
@pulumi.getter(name="listingVisibility")
|
937
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
938
|
+
"""
|
939
|
+
Specifies whether to show this mount in the UI-specific listing endpoint
|
940
|
+
"""
|
941
|
+
return pulumi.get(self, "listing_visibility")
|
942
|
+
|
943
|
+
@listing_visibility.setter
|
944
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
945
|
+
pulumi.set(self, "listing_visibility", value)
|
946
|
+
|
947
|
+
@_builtins.property
|
509
948
|
@pulumi.getter
|
510
|
-
def
|
949
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
950
|
+
"""
|
951
|
+
Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
952
|
+
"""
|
953
|
+
return pulumi.get(self, "local")
|
954
|
+
|
955
|
+
@local.setter
|
956
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
957
|
+
pulumi.set(self, "local", value)
|
958
|
+
|
959
|
+
@_builtins.property
|
960
|
+
@pulumi.getter(name="maxLeaseTtlSeconds")
|
961
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
962
|
+
"""
|
963
|
+
Maximum possible lease duration for tokens and secrets in seconds
|
964
|
+
"""
|
965
|
+
return pulumi.get(self, "max_lease_ttl_seconds")
|
966
|
+
|
967
|
+
@max_lease_ttl_seconds.setter
|
968
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
969
|
+
pulumi.set(self, "max_lease_ttl_seconds", value)
|
970
|
+
|
971
|
+
@_builtins.property
|
972
|
+
@pulumi.getter
|
973
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
511
974
|
"""
|
512
975
|
The namespace to provision the resource in.
|
513
976
|
The value should not contain leading or trailing forward slashes.
|
@@ -517,24 +980,72 @@ class _BackendState:
|
|
517
980
|
return pulumi.get(self, "namespace")
|
518
981
|
|
519
982
|
@namespace.setter
|
520
|
-
def namespace(self, value: Optional[pulumi.Input[
|
983
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
521
984
|
pulumi.set(self, "namespace", value)
|
522
985
|
|
523
|
-
@property
|
986
|
+
@_builtins.property
|
987
|
+
@pulumi.getter
|
988
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
989
|
+
"""
|
990
|
+
Specifies mount type specific options that are passed to the backend
|
991
|
+
"""
|
992
|
+
return pulumi.get(self, "options")
|
993
|
+
|
994
|
+
@options.setter
|
995
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
996
|
+
pulumi.set(self, "options", value)
|
997
|
+
|
998
|
+
@_builtins.property
|
999
|
+
@pulumi.getter(name="passthroughRequestHeaders")
|
1000
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
1001
|
+
"""
|
1002
|
+
List of headers to allow and pass from the request to the plugin
|
1003
|
+
"""
|
1004
|
+
return pulumi.get(self, "passthrough_request_headers")
|
1005
|
+
|
1006
|
+
@passthrough_request_headers.setter
|
1007
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
1008
|
+
pulumi.set(self, "passthrough_request_headers", value)
|
1009
|
+
|
1010
|
+
@_builtins.property
|
524
1011
|
@pulumi.getter
|
525
|
-
def path(self) -> Optional[pulumi.Input[
|
1012
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
526
1013
|
"""
|
527
1014
|
The unique path this backend should be mounted at. Defaults to `azure`.
|
528
1015
|
"""
|
529
1016
|
return pulumi.get(self, "path")
|
530
1017
|
|
531
1018
|
@path.setter
|
532
|
-
def path(self, value: Optional[pulumi.Input[
|
1019
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
533
1020
|
pulumi.set(self, "path", value)
|
534
1021
|
|
535
|
-
@property
|
1022
|
+
@_builtins.property
|
1023
|
+
@pulumi.getter(name="pluginVersion")
|
1024
|
+
def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1025
|
+
"""
|
1026
|
+
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1027
|
+
"""
|
1028
|
+
return pulumi.get(self, "plugin_version")
|
1029
|
+
|
1030
|
+
@plugin_version.setter
|
1031
|
+
def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1032
|
+
pulumi.set(self, "plugin_version", value)
|
1033
|
+
|
1034
|
+
@_builtins.property
|
1035
|
+
@pulumi.getter(name="rootPasswordTtl")
|
1036
|
+
def root_password_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
1037
|
+
"""
|
1038
|
+
The TTL in seconds of the root password in Azure when rotate-root generates a new client secret
|
1039
|
+
"""
|
1040
|
+
return pulumi.get(self, "root_password_ttl")
|
1041
|
+
|
1042
|
+
@root_password_ttl.setter
|
1043
|
+
def root_password_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
1044
|
+
pulumi.set(self, "root_password_ttl", value)
|
1045
|
+
|
1046
|
+
@_builtins.property
|
536
1047
|
@pulumi.getter(name="rotationPeriod")
|
537
|
-
def rotation_period(self) -> Optional[pulumi.Input[
|
1048
|
+
def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
538
1049
|
"""
|
539
1050
|
The amount of time in seconds Vault should wait before rotating the root credential.
|
540
1051
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
@@ -543,12 +1054,12 @@ class _BackendState:
|
|
543
1054
|
return pulumi.get(self, "rotation_period")
|
544
1055
|
|
545
1056
|
@rotation_period.setter
|
546
|
-
def rotation_period(self, value: Optional[pulumi.Input[
|
1057
|
+
def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
547
1058
|
pulumi.set(self, "rotation_period", value)
|
548
1059
|
|
549
|
-
@property
|
1060
|
+
@_builtins.property
|
550
1061
|
@pulumi.getter(name="rotationSchedule")
|
551
|
-
def rotation_schedule(self) -> Optional[pulumi.Input[
|
1062
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
|
552
1063
|
"""
|
553
1064
|
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
554
1065
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
@@ -557,12 +1068,12 @@ class _BackendState:
|
|
557
1068
|
return pulumi.get(self, "rotation_schedule")
|
558
1069
|
|
559
1070
|
@rotation_schedule.setter
|
560
|
-
def rotation_schedule(self, value: Optional[pulumi.Input[
|
1071
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
|
561
1072
|
pulumi.set(self, "rotation_schedule", value)
|
562
1073
|
|
563
|
-
@property
|
1074
|
+
@_builtins.property
|
564
1075
|
@pulumi.getter(name="rotationWindow")
|
565
|
-
def rotation_window(self) -> Optional[pulumi.Input[
|
1076
|
+
def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
|
566
1077
|
"""
|
567
1078
|
The maximum amount of time in seconds allowed to complete
|
568
1079
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
@@ -571,31 +1082,43 @@ class _BackendState:
|
|
571
1082
|
return pulumi.get(self, "rotation_window")
|
572
1083
|
|
573
1084
|
@rotation_window.setter
|
574
|
-
def rotation_window(self, value: Optional[pulumi.Input[
|
1085
|
+
def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
|
575
1086
|
pulumi.set(self, "rotation_window", value)
|
576
1087
|
|
577
|
-
@property
|
1088
|
+
@_builtins.property
|
1089
|
+
@pulumi.getter(name="sealWrap")
|
1090
|
+
def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1091
|
+
"""
|
1092
|
+
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1093
|
+
"""
|
1094
|
+
return pulumi.get(self, "seal_wrap")
|
1095
|
+
|
1096
|
+
@seal_wrap.setter
|
1097
|
+
def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1098
|
+
pulumi.set(self, "seal_wrap", value)
|
1099
|
+
|
1100
|
+
@_builtins.property
|
578
1101
|
@pulumi.getter(name="subscriptionId")
|
579
|
-
def subscription_id(self) -> Optional[pulumi.Input[
|
1102
|
+
def subscription_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
580
1103
|
"""
|
581
1104
|
The subscription id for the Azure Active Directory.
|
582
1105
|
"""
|
583
1106
|
return pulumi.get(self, "subscription_id")
|
584
1107
|
|
585
1108
|
@subscription_id.setter
|
586
|
-
def subscription_id(self, value: Optional[pulumi.Input[
|
1109
|
+
def subscription_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
587
1110
|
pulumi.set(self, "subscription_id", value)
|
588
1111
|
|
589
|
-
@property
|
1112
|
+
@_builtins.property
|
590
1113
|
@pulumi.getter(name="tenantId")
|
591
|
-
def tenant_id(self) -> Optional[pulumi.Input[
|
1114
|
+
def tenant_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
592
1115
|
"""
|
593
1116
|
The tenant id for the Azure Active Directory.
|
594
1117
|
"""
|
595
1118
|
return pulumi.get(self, "tenant_id")
|
596
1119
|
|
597
1120
|
@tenant_id.setter
|
598
|
-
def tenant_id(self, value: Optional[pulumi.Input[
|
1121
|
+
def tenant_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
599
1122
|
pulumi.set(self, "tenant_id", value)
|
600
1123
|
|
601
1124
|
|
@@ -605,22 +1128,38 @@ class Backend(pulumi.CustomResource):
|
|
605
1128
|
def __init__(__self__,
|
606
1129
|
resource_name: str,
|
607
1130
|
opts: Optional[pulumi.ResourceOptions] = None,
|
608
|
-
|
609
|
-
|
610
|
-
|
611
|
-
|
612
|
-
|
613
|
-
|
614
|
-
|
615
|
-
|
616
|
-
|
617
|
-
|
618
|
-
|
619
|
-
|
620
|
-
|
621
|
-
|
622
|
-
|
623
|
-
|
1131
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1132
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1133
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1134
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1135
|
+
client_id: Optional[pulumi.Input[_builtins.str]] = None,
|
1136
|
+
client_secret: Optional[pulumi.Input[_builtins.str]] = None,
|
1137
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1138
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1139
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
1140
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
1141
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
1142
|
+
environment: Optional[pulumi.Input[_builtins.str]] = None,
|
1143
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
1144
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
1145
|
+
identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
|
1146
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1147
|
+
identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
1148
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
1149
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
1150
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1151
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1152
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
1153
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1154
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
1155
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
1156
|
+
root_password_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
1157
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
1158
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
1159
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
1160
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
1161
|
+
subscription_id: Optional[pulumi.Input[_builtins.str]] = None,
|
1162
|
+
tenant_id: Optional[pulumi.Input[_builtins.str]] = None,
|
624
1163
|
__props__=None):
|
625
1164
|
"""
|
626
1165
|
## Example Usage
|
@@ -658,36 +1197,51 @@ class Backend(pulumi.CustomResource):
|
|
658
1197
|
|
659
1198
|
:param str resource_name: The name of the resource.
|
660
1199
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
661
|
-
:param pulumi.Input[
|
662
|
-
:param pulumi.Input[
|
663
|
-
:param pulumi.Input[
|
664
|
-
:param pulumi.Input[
|
1200
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
1201
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
1202
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1203
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1204
|
+
:param pulumi.Input[_builtins.str] client_id: The OAuth2 client id to connect to Azure.
|
1205
|
+
:param pulumi.Input[_builtins.str] client_secret: The OAuth2 client secret to connect to Azure.
|
1206
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
1207
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
1208
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
|
1209
|
+
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
665
1210
|
*Available only for Vault Enterprise*
|
666
|
-
:param pulumi.Input[
|
1211
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
667
1212
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
668
|
-
:param pulumi.Input[
|
669
|
-
:param pulumi.Input[
|
670
|
-
|
671
|
-
:param pulumi.Input[
|
1213
|
+
:param pulumi.Input[_builtins.str] environment: The Azure environment.
|
1214
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
1215
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
1216
|
+
:param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.17+.
|
672
1217
|
*Available only for Vault Enterprise*
|
673
|
-
:param pulumi.Input[
|
1218
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens.
|
1219
|
+
:param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
|
674
1220
|
*Available only for Vault Enterprise*
|
675
|
-
:param pulumi.Input[
|
1221
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
1222
|
+
:param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
1223
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
1224
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
676
1225
|
The value should not contain leading or trailing forward slashes.
|
677
1226
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
678
1227
|
*Available only for Vault Enterprise*.
|
679
|
-
:param pulumi.Input[
|
680
|
-
:param pulumi.Input[
|
1228
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
1229
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
1230
|
+
:param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Defaults to `azure`.
|
1231
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1232
|
+
:param pulumi.Input[_builtins.int] root_password_ttl: The TTL in seconds of the root password in Azure when rotate-root generates a new client secret
|
1233
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
681
1234
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
682
1235
|
*Available only for Vault Enterprise*
|
683
|
-
:param pulumi.Input[
|
1236
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
684
1237
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
685
1238
|
*Available only for Vault Enterprise*
|
686
|
-
:param pulumi.Input[
|
1239
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
687
1240
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
688
1241
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*
|
689
|
-
:param pulumi.Input[
|
690
|
-
:param pulumi.Input[
|
1242
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1243
|
+
:param pulumi.Input[_builtins.str] subscription_id: The subscription id for the Azure Active Directory.
|
1244
|
+
:param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory.
|
691
1245
|
"""
|
692
1246
|
...
|
693
1247
|
@overload
|
@@ -744,22 +1298,38 @@ class Backend(pulumi.CustomResource):
|
|
744
1298
|
def _internal_init(__self__,
|
745
1299
|
resource_name: str,
|
746
1300
|
opts: Optional[pulumi.ResourceOptions] = None,
|
747
|
-
|
748
|
-
|
749
|
-
|
750
|
-
|
751
|
-
|
752
|
-
|
753
|
-
|
754
|
-
|
755
|
-
|
756
|
-
|
757
|
-
|
758
|
-
|
759
|
-
|
760
|
-
|
761
|
-
|
762
|
-
|
1301
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1302
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1303
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1304
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1305
|
+
client_id: Optional[pulumi.Input[_builtins.str]] = None,
|
1306
|
+
client_secret: Optional[pulumi.Input[_builtins.str]] = None,
|
1307
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1308
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1309
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
1310
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
1311
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
1312
|
+
environment: Optional[pulumi.Input[_builtins.str]] = None,
|
1313
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
1314
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
1315
|
+
identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
|
1316
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1317
|
+
identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
1318
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
1319
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
1320
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1321
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1322
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
1323
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1324
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
1325
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
1326
|
+
root_password_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
1327
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
1328
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
1329
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
1330
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
1331
|
+
subscription_id: Optional[pulumi.Input[_builtins.str]] = None,
|
1332
|
+
tenant_id: Optional[pulumi.Input[_builtins.str]] = None,
|
763
1333
|
__props__=None):
|
764
1334
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
765
1335
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -769,26 +1339,43 @@ class Backend(pulumi.CustomResource):
|
|
769
1339
|
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
|
770
1340
|
__props__ = BackendArgs.__new__(BackendArgs)
|
771
1341
|
|
1342
|
+
__props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
|
1343
|
+
__props__.__dict__["allowed_response_headers"] = allowed_response_headers
|
1344
|
+
__props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
|
1345
|
+
__props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
|
772
1346
|
__props__.__dict__["client_id"] = None if client_id is None else pulumi.Output.secret(client_id)
|
773
1347
|
__props__.__dict__["client_secret"] = None if client_secret is None else pulumi.Output.secret(client_secret)
|
1348
|
+
__props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
|
1349
|
+
__props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
|
774
1350
|
__props__.__dict__["description"] = description
|
775
1351
|
__props__.__dict__["disable_automated_rotation"] = disable_automated_rotation
|
776
1352
|
__props__.__dict__["disable_remount"] = disable_remount
|
777
1353
|
__props__.__dict__["environment"] = environment
|
1354
|
+
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
1355
|
+
__props__.__dict__["force_no_cache"] = force_no_cache
|
778
1356
|
__props__.__dict__["identity_token_audience"] = identity_token_audience
|
779
1357
|
__props__.__dict__["identity_token_key"] = identity_token_key
|
780
1358
|
__props__.__dict__["identity_token_ttl"] = identity_token_ttl
|
1359
|
+
__props__.__dict__["listing_visibility"] = listing_visibility
|
1360
|
+
__props__.__dict__["local"] = local
|
1361
|
+
__props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
|
781
1362
|
__props__.__dict__["namespace"] = namespace
|
1363
|
+
__props__.__dict__["options"] = options
|
1364
|
+
__props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
|
782
1365
|
__props__.__dict__["path"] = path
|
1366
|
+
__props__.__dict__["plugin_version"] = plugin_version
|
1367
|
+
__props__.__dict__["root_password_ttl"] = root_password_ttl
|
783
1368
|
__props__.__dict__["rotation_period"] = rotation_period
|
784
1369
|
__props__.__dict__["rotation_schedule"] = rotation_schedule
|
785
1370
|
__props__.__dict__["rotation_window"] = rotation_window
|
1371
|
+
__props__.__dict__["seal_wrap"] = seal_wrap
|
786
1372
|
if subscription_id is None and not opts.urn:
|
787
1373
|
raise TypeError("Missing required property 'subscription_id'")
|
788
1374
|
__props__.__dict__["subscription_id"] = None if subscription_id is None else pulumi.Output.secret(subscription_id)
|
789
1375
|
if tenant_id is None and not opts.urn:
|
790
1376
|
raise TypeError("Missing required property 'tenant_id'")
|
791
1377
|
__props__.__dict__["tenant_id"] = None if tenant_id is None else pulumi.Output.secret(tenant_id)
|
1378
|
+
__props__.__dict__["accessor"] = None
|
792
1379
|
secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["clientId", "clientSecret", "subscriptionId", "tenantId"])
|
793
1380
|
opts = pulumi.ResourceOptions.merge(opts, secret_opts)
|
794
1381
|
super(Backend, __self__).__init__(
|
@@ -801,22 +1388,39 @@ class Backend(pulumi.CustomResource):
|
|
801
1388
|
def get(resource_name: str,
|
802
1389
|
id: pulumi.Input[str],
|
803
1390
|
opts: Optional[pulumi.ResourceOptions] = None,
|
804
|
-
|
805
|
-
|
806
|
-
|
807
|
-
|
808
|
-
|
809
|
-
|
810
|
-
|
811
|
-
|
812
|
-
|
813
|
-
|
814
|
-
|
815
|
-
|
816
|
-
|
817
|
-
|
818
|
-
|
819
|
-
|
1391
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
1392
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1393
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1394
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1395
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1396
|
+
client_id: Optional[pulumi.Input[_builtins.str]] = None,
|
1397
|
+
client_secret: Optional[pulumi.Input[_builtins.str]] = None,
|
1398
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1399
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1400
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
1401
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
1402
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
1403
|
+
environment: Optional[pulumi.Input[_builtins.str]] = None,
|
1404
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
1405
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
1406
|
+
identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
|
1407
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1408
|
+
identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
1409
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
1410
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
1411
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1412
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1413
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
1414
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1415
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
1416
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
1417
|
+
root_password_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
1418
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
1419
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
1420
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
1421
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
1422
|
+
subscription_id: Optional[pulumi.Input[_builtins.str]] = None,
|
1423
|
+
tenant_id: Optional[pulumi.Input[_builtins.str]] = None) -> 'Backend':
|
820
1424
|
"""
|
821
1425
|
Get an existing Backend resource's state with the given name, id, and optional extra
|
822
1426
|
properties used to qualify the lookup.
|
@@ -824,139 +1428,267 @@ class Backend(pulumi.CustomResource):
|
|
824
1428
|
:param str resource_name: The unique name of the resulting resource.
|
825
1429
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
826
1430
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
827
|
-
:param pulumi.Input[
|
828
|
-
:param pulumi.Input[
|
829
|
-
:param pulumi.Input[
|
830
|
-
:param pulumi.Input[
|
1431
|
+
:param pulumi.Input[_builtins.str] accessor: Accessor of the mount
|
1432
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
1433
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
1434
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1435
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1436
|
+
:param pulumi.Input[_builtins.str] client_id: The OAuth2 client id to connect to Azure.
|
1437
|
+
:param pulumi.Input[_builtins.str] client_secret: The OAuth2 client secret to connect to Azure.
|
1438
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
1439
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
1440
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
|
1441
|
+
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
831
1442
|
*Available only for Vault Enterprise*
|
832
|
-
:param pulumi.Input[
|
1443
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
833
1444
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
834
|
-
:param pulumi.Input[
|
835
|
-
:param pulumi.Input[
|
836
|
-
|
837
|
-
:param pulumi.Input[
|
1445
|
+
:param pulumi.Input[_builtins.str] environment: The Azure environment.
|
1446
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
1447
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
1448
|
+
:param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.17+.
|
838
1449
|
*Available only for Vault Enterprise*
|
839
|
-
:param pulumi.Input[
|
1450
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens.
|
1451
|
+
:param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
|
840
1452
|
*Available only for Vault Enterprise*
|
841
|
-
:param pulumi.Input[
|
1453
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
1454
|
+
:param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
1455
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
1456
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
842
1457
|
The value should not contain leading or trailing forward slashes.
|
843
1458
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
844
1459
|
*Available only for Vault Enterprise*.
|
845
|
-
:param pulumi.Input[
|
846
|
-
:param pulumi.Input[
|
1460
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
1461
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
1462
|
+
:param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Defaults to `azure`.
|
1463
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1464
|
+
:param pulumi.Input[_builtins.int] root_password_ttl: The TTL in seconds of the root password in Azure when rotate-root generates a new client secret
|
1465
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
847
1466
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
848
1467
|
*Available only for Vault Enterprise*
|
849
|
-
:param pulumi.Input[
|
1468
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
850
1469
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
851
1470
|
*Available only for Vault Enterprise*
|
852
|
-
:param pulumi.Input[
|
1471
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
853
1472
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
854
1473
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*
|
855
|
-
:param pulumi.Input[
|
856
|
-
:param pulumi.Input[
|
1474
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1475
|
+
:param pulumi.Input[_builtins.str] subscription_id: The subscription id for the Azure Active Directory.
|
1476
|
+
:param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory.
|
857
1477
|
"""
|
858
1478
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
859
1479
|
|
860
1480
|
__props__ = _BackendState.__new__(_BackendState)
|
861
1481
|
|
1482
|
+
__props__.__dict__["accessor"] = accessor
|
1483
|
+
__props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
|
1484
|
+
__props__.__dict__["allowed_response_headers"] = allowed_response_headers
|
1485
|
+
__props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
|
1486
|
+
__props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
|
862
1487
|
__props__.__dict__["client_id"] = client_id
|
863
1488
|
__props__.__dict__["client_secret"] = client_secret
|
1489
|
+
__props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
|
1490
|
+
__props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
|
864
1491
|
__props__.__dict__["description"] = description
|
865
1492
|
__props__.__dict__["disable_automated_rotation"] = disable_automated_rotation
|
866
1493
|
__props__.__dict__["disable_remount"] = disable_remount
|
867
1494
|
__props__.__dict__["environment"] = environment
|
1495
|
+
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
1496
|
+
__props__.__dict__["force_no_cache"] = force_no_cache
|
868
1497
|
__props__.__dict__["identity_token_audience"] = identity_token_audience
|
869
1498
|
__props__.__dict__["identity_token_key"] = identity_token_key
|
870
1499
|
__props__.__dict__["identity_token_ttl"] = identity_token_ttl
|
1500
|
+
__props__.__dict__["listing_visibility"] = listing_visibility
|
1501
|
+
__props__.__dict__["local"] = local
|
1502
|
+
__props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
|
871
1503
|
__props__.__dict__["namespace"] = namespace
|
1504
|
+
__props__.__dict__["options"] = options
|
1505
|
+
__props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
|
872
1506
|
__props__.__dict__["path"] = path
|
1507
|
+
__props__.__dict__["plugin_version"] = plugin_version
|
1508
|
+
__props__.__dict__["root_password_ttl"] = root_password_ttl
|
873
1509
|
__props__.__dict__["rotation_period"] = rotation_period
|
874
1510
|
__props__.__dict__["rotation_schedule"] = rotation_schedule
|
875
1511
|
__props__.__dict__["rotation_window"] = rotation_window
|
1512
|
+
__props__.__dict__["seal_wrap"] = seal_wrap
|
876
1513
|
__props__.__dict__["subscription_id"] = subscription_id
|
877
1514
|
__props__.__dict__["tenant_id"] = tenant_id
|
878
1515
|
return Backend(resource_name, opts=opts, __props__=__props__)
|
879
1516
|
|
880
|
-
@property
|
1517
|
+
@_builtins.property
|
1518
|
+
@pulumi.getter
|
1519
|
+
def accessor(self) -> pulumi.Output[_builtins.str]:
|
1520
|
+
"""
|
1521
|
+
Accessor of the mount
|
1522
|
+
"""
|
1523
|
+
return pulumi.get(self, "accessor")
|
1524
|
+
|
1525
|
+
@_builtins.property
|
1526
|
+
@pulumi.getter(name="allowedManagedKeys")
|
1527
|
+
def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1528
|
+
"""
|
1529
|
+
List of managed key registry entry names that the mount in question is allowed to access
|
1530
|
+
"""
|
1531
|
+
return pulumi.get(self, "allowed_managed_keys")
|
1532
|
+
|
1533
|
+
@_builtins.property
|
1534
|
+
@pulumi.getter(name="allowedResponseHeaders")
|
1535
|
+
def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1536
|
+
"""
|
1537
|
+
List of headers to allow and pass from the request to the plugin
|
1538
|
+
"""
|
1539
|
+
return pulumi.get(self, "allowed_response_headers")
|
1540
|
+
|
1541
|
+
@_builtins.property
|
1542
|
+
@pulumi.getter(name="auditNonHmacRequestKeys")
|
1543
|
+
def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
1544
|
+
"""
|
1545
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1546
|
+
"""
|
1547
|
+
return pulumi.get(self, "audit_non_hmac_request_keys")
|
1548
|
+
|
1549
|
+
@_builtins.property
|
1550
|
+
@pulumi.getter(name="auditNonHmacResponseKeys")
|
1551
|
+
def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
1552
|
+
"""
|
1553
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1554
|
+
"""
|
1555
|
+
return pulumi.get(self, "audit_non_hmac_response_keys")
|
1556
|
+
|
1557
|
+
@_builtins.property
|
881
1558
|
@pulumi.getter(name="clientId")
|
882
|
-
def client_id(self) -> pulumi.Output[Optional[
|
1559
|
+
def client_id(self) -> pulumi.Output[Optional[_builtins.str]]:
|
883
1560
|
"""
|
884
1561
|
The OAuth2 client id to connect to Azure.
|
885
1562
|
"""
|
886
1563
|
return pulumi.get(self, "client_id")
|
887
1564
|
|
888
|
-
@property
|
1565
|
+
@_builtins.property
|
889
1566
|
@pulumi.getter(name="clientSecret")
|
890
|
-
def client_secret(self) -> pulumi.Output[Optional[
|
1567
|
+
def client_secret(self) -> pulumi.Output[Optional[_builtins.str]]:
|
891
1568
|
"""
|
892
1569
|
The OAuth2 client secret to connect to Azure.
|
893
1570
|
"""
|
894
1571
|
return pulumi.get(self, "client_secret")
|
895
1572
|
|
896
|
-
@property
|
1573
|
+
@_builtins.property
|
1574
|
+
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
1575
|
+
def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
|
1576
|
+
"""
|
1577
|
+
Default lease duration for tokens and secrets in seconds
|
1578
|
+
"""
|
1579
|
+
return pulumi.get(self, "default_lease_ttl_seconds")
|
1580
|
+
|
1581
|
+
@_builtins.property
|
1582
|
+
@pulumi.getter(name="delegatedAuthAccessors")
|
1583
|
+
def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1584
|
+
"""
|
1585
|
+
List of headers to allow and pass from the request to the plugin
|
1586
|
+
"""
|
1587
|
+
return pulumi.get(self, "delegated_auth_accessors")
|
1588
|
+
|
1589
|
+
@_builtins.property
|
897
1590
|
@pulumi.getter
|
898
|
-
def description(self) -> pulumi.Output[Optional[
|
1591
|
+
def description(self) -> pulumi.Output[Optional[_builtins.str]]:
|
899
1592
|
"""
|
900
1593
|
Human-friendly description of the mount for the backend.
|
901
1594
|
"""
|
902
1595
|
return pulumi.get(self, "description")
|
903
1596
|
|
904
|
-
@property
|
1597
|
+
@_builtins.property
|
905
1598
|
@pulumi.getter(name="disableAutomatedRotation")
|
906
|
-
def disable_automated_rotation(self) -> pulumi.Output[Optional[
|
1599
|
+
def disable_automated_rotation(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
907
1600
|
"""
|
908
1601
|
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
909
1602
|
*Available only for Vault Enterprise*
|
910
1603
|
"""
|
911
1604
|
return pulumi.get(self, "disable_automated_rotation")
|
912
1605
|
|
913
|
-
@property
|
1606
|
+
@_builtins.property
|
914
1607
|
@pulumi.getter(name="disableRemount")
|
915
|
-
def disable_remount(self) -> pulumi.Output[Optional[
|
1608
|
+
def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
916
1609
|
"""
|
917
1610
|
If set, opts out of mount migration on path updates.
|
918
1611
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
919
1612
|
"""
|
920
1613
|
return pulumi.get(self, "disable_remount")
|
921
1614
|
|
922
|
-
@property
|
1615
|
+
@_builtins.property
|
923
1616
|
@pulumi.getter
|
924
|
-
def environment(self) -> pulumi.Output[Optional[
|
1617
|
+
def environment(self) -> pulumi.Output[Optional[_builtins.str]]:
|
925
1618
|
"""
|
926
1619
|
The Azure environment.
|
927
1620
|
"""
|
928
1621
|
return pulumi.get(self, "environment")
|
929
1622
|
|
930
|
-
@property
|
1623
|
+
@_builtins.property
|
1624
|
+
@pulumi.getter(name="externalEntropyAccess")
|
1625
|
+
def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1626
|
+
"""
|
1627
|
+
Enable the secrets engine to access Vault's external entropy source
|
1628
|
+
"""
|
1629
|
+
return pulumi.get(self, "external_entropy_access")
|
1630
|
+
|
1631
|
+
@_builtins.property
|
1632
|
+
@pulumi.getter(name="forceNoCache")
|
1633
|
+
def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
|
1634
|
+
"""
|
1635
|
+
If set to true, disables caching.
|
1636
|
+
"""
|
1637
|
+
return pulumi.get(self, "force_no_cache")
|
1638
|
+
|
1639
|
+
@_builtins.property
|
931
1640
|
@pulumi.getter(name="identityTokenAudience")
|
932
|
-
def identity_token_audience(self) -> pulumi.Output[Optional[
|
1641
|
+
def identity_token_audience(self) -> pulumi.Output[Optional[_builtins.str]]:
|
933
1642
|
"""
|
934
1643
|
The audience claim value. Requires Vault 1.17+.
|
935
1644
|
*Available only for Vault Enterprise*
|
936
1645
|
"""
|
937
1646
|
return pulumi.get(self, "identity_token_audience")
|
938
1647
|
|
939
|
-
@property
|
1648
|
+
@_builtins.property
|
940
1649
|
@pulumi.getter(name="identityTokenKey")
|
941
|
-
def identity_token_key(self) -> pulumi.Output[Optional[
|
1650
|
+
def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
|
942
1651
|
"""
|
943
|
-
The key to use for signing identity tokens.
|
944
|
-
*Available only for Vault Enterprise*
|
1652
|
+
The key to use for signing identity tokens.
|
945
1653
|
"""
|
946
1654
|
return pulumi.get(self, "identity_token_key")
|
947
1655
|
|
948
|
-
@property
|
1656
|
+
@_builtins.property
|
949
1657
|
@pulumi.getter(name="identityTokenTtl")
|
950
|
-
def identity_token_ttl(self) -> pulumi.Output[
|
1658
|
+
def identity_token_ttl(self) -> pulumi.Output[_builtins.int]:
|
951
1659
|
"""
|
952
1660
|
The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
|
953
1661
|
*Available only for Vault Enterprise*
|
954
1662
|
"""
|
955
1663
|
return pulumi.get(self, "identity_token_ttl")
|
956
1664
|
|
957
|
-
@property
|
1665
|
+
@_builtins.property
|
1666
|
+
@pulumi.getter(name="listingVisibility")
|
1667
|
+
def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1668
|
+
"""
|
1669
|
+
Specifies whether to show this mount in the UI-specific listing endpoint
|
1670
|
+
"""
|
1671
|
+
return pulumi.get(self, "listing_visibility")
|
1672
|
+
|
1673
|
+
@_builtins.property
|
1674
|
+
@pulumi.getter
|
1675
|
+
def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1676
|
+
"""
|
1677
|
+
Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
1678
|
+
"""
|
1679
|
+
return pulumi.get(self, "local")
|
1680
|
+
|
1681
|
+
@_builtins.property
|
1682
|
+
@pulumi.getter(name="maxLeaseTtlSeconds")
|
1683
|
+
def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
|
1684
|
+
"""
|
1685
|
+
Maximum possible lease duration for tokens and secrets in seconds
|
1686
|
+
"""
|
1687
|
+
return pulumi.get(self, "max_lease_ttl_seconds")
|
1688
|
+
|
1689
|
+
@_builtins.property
|
958
1690
|
@pulumi.getter
|
959
|
-
def namespace(self) -> pulumi.Output[Optional[
|
1691
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
960
1692
|
"""
|
961
1693
|
The namespace to provision the resource in.
|
962
1694
|
The value should not contain leading or trailing forward slashes.
|
@@ -965,17 +1697,49 @@ class Backend(pulumi.CustomResource):
|
|
965
1697
|
"""
|
966
1698
|
return pulumi.get(self, "namespace")
|
967
1699
|
|
968
|
-
@property
|
1700
|
+
@_builtins.property
|
1701
|
+
@pulumi.getter
|
1702
|
+
def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
|
1703
|
+
"""
|
1704
|
+
Specifies mount type specific options that are passed to the backend
|
1705
|
+
"""
|
1706
|
+
return pulumi.get(self, "options")
|
1707
|
+
|
1708
|
+
@_builtins.property
|
1709
|
+
@pulumi.getter(name="passthroughRequestHeaders")
|
1710
|
+
def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1711
|
+
"""
|
1712
|
+
List of headers to allow and pass from the request to the plugin
|
1713
|
+
"""
|
1714
|
+
return pulumi.get(self, "passthrough_request_headers")
|
1715
|
+
|
1716
|
+
@_builtins.property
|
969
1717
|
@pulumi.getter
|
970
|
-
def path(self) -> pulumi.Output[Optional[
|
1718
|
+
def path(self) -> pulumi.Output[Optional[_builtins.str]]:
|
971
1719
|
"""
|
972
1720
|
The unique path this backend should be mounted at. Defaults to `azure`.
|
973
1721
|
"""
|
974
1722
|
return pulumi.get(self, "path")
|
975
1723
|
|
976
|
-
@property
|
1724
|
+
@_builtins.property
|
1725
|
+
@pulumi.getter(name="pluginVersion")
|
1726
|
+
def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1727
|
+
"""
|
1728
|
+
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1729
|
+
"""
|
1730
|
+
return pulumi.get(self, "plugin_version")
|
1731
|
+
|
1732
|
+
@_builtins.property
|
1733
|
+
@pulumi.getter(name="rootPasswordTtl")
|
1734
|
+
def root_password_ttl(self) -> pulumi.Output[_builtins.int]:
|
1735
|
+
"""
|
1736
|
+
The TTL in seconds of the root password in Azure when rotate-root generates a new client secret
|
1737
|
+
"""
|
1738
|
+
return pulumi.get(self, "root_password_ttl")
|
1739
|
+
|
1740
|
+
@_builtins.property
|
977
1741
|
@pulumi.getter(name="rotationPeriod")
|
978
|
-
def rotation_period(self) -> pulumi.Output[Optional[
|
1742
|
+
def rotation_period(self) -> pulumi.Output[Optional[_builtins.int]]:
|
979
1743
|
"""
|
980
1744
|
The amount of time in seconds Vault should wait before rotating the root credential.
|
981
1745
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
@@ -983,9 +1747,9 @@ class Backend(pulumi.CustomResource):
|
|
983
1747
|
"""
|
984
1748
|
return pulumi.get(self, "rotation_period")
|
985
1749
|
|
986
|
-
@property
|
1750
|
+
@_builtins.property
|
987
1751
|
@pulumi.getter(name="rotationSchedule")
|
988
|
-
def rotation_schedule(self) -> pulumi.Output[Optional[
|
1752
|
+
def rotation_schedule(self) -> pulumi.Output[Optional[_builtins.str]]:
|
989
1753
|
"""
|
990
1754
|
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
991
1755
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
@@ -993,9 +1757,9 @@ class Backend(pulumi.CustomResource):
|
|
993
1757
|
"""
|
994
1758
|
return pulumi.get(self, "rotation_schedule")
|
995
1759
|
|
996
|
-
@property
|
1760
|
+
@_builtins.property
|
997
1761
|
@pulumi.getter(name="rotationWindow")
|
998
|
-
def rotation_window(self) -> pulumi.Output[Optional[
|
1762
|
+
def rotation_window(self) -> pulumi.Output[Optional[_builtins.int]]:
|
999
1763
|
"""
|
1000
1764
|
The maximum amount of time in seconds allowed to complete
|
1001
1765
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
@@ -1003,17 +1767,25 @@ class Backend(pulumi.CustomResource):
|
|
1003
1767
|
"""
|
1004
1768
|
return pulumi.get(self, "rotation_window")
|
1005
1769
|
|
1006
|
-
@property
|
1770
|
+
@_builtins.property
|
1771
|
+
@pulumi.getter(name="sealWrap")
|
1772
|
+
def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
|
1773
|
+
"""
|
1774
|
+
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1775
|
+
"""
|
1776
|
+
return pulumi.get(self, "seal_wrap")
|
1777
|
+
|
1778
|
+
@_builtins.property
|
1007
1779
|
@pulumi.getter(name="subscriptionId")
|
1008
|
-
def subscription_id(self) -> pulumi.Output[
|
1780
|
+
def subscription_id(self) -> pulumi.Output[_builtins.str]:
|
1009
1781
|
"""
|
1010
1782
|
The subscription id for the Azure Active Directory.
|
1011
1783
|
"""
|
1012
1784
|
return pulumi.get(self, "subscription_id")
|
1013
1785
|
|
1014
|
-
@property
|
1786
|
+
@_builtins.property
|
1015
1787
|
@pulumi.getter(name="tenantId")
|
1016
|
-
def tenant_id(self) -> pulumi.Output[
|
1788
|
+
def tenant_id(self) -> pulumi.Output[_builtins.str]:
|
1017
1789
|
"""
|
1018
1790
|
The tenant id for the Azure Active Directory.
|
1019
1791
|
"""
|