pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +19 -1
- pulumi_vault/_inputs.py +873 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +1016 -439
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +1057 -285
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +887 -256
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +426 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +878 -336
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +400 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +1006 -227
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +431 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +732 -693
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +380 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +909 -271
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +234 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +205 -159
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +902 -231
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +217 -124
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +833 -155
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +377 -350
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0.dist-info/RECORD +270 -0
- pulumi_vault-7.1.0.dist-info/RECORD +0 -268
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,46 +19,79 @@ __all__ = ['SecretBackendArgs', 'SecretBackend']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class SecretBackendArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
address: pulumi.Input[
|
24
|
-
|
25
|
-
|
26
|
-
|
27
|
-
|
28
|
-
|
29
|
-
|
30
|
-
|
31
|
-
|
32
|
-
|
33
|
-
|
34
|
-
|
35
|
-
|
36
|
-
|
22
|
+
address: pulumi.Input[_builtins.str],
|
23
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
24
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
25
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
26
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
27
|
+
bootstrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
28
|
+
ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
29
|
+
client_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
30
|
+
client_key: Optional[pulumi.Input[_builtins.str]] = None,
|
31
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
32
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
33
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
34
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
35
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
36
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
37
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
38
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
39
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
40
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
41
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
42
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
43
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
44
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
45
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
46
|
+
scheme: Optional[pulumi.Input[_builtins.str]] = None,
|
47
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
48
|
+
token: Optional[pulumi.Input[_builtins.str]] = None):
|
37
49
|
"""
|
38
50
|
The set of arguments for constructing a SecretBackend resource.
|
39
|
-
:param pulumi.Input[
|
40
|
-
:param pulumi.Input[
|
41
|
-
:param pulumi.Input[
|
42
|
-
:param pulumi.Input[
|
51
|
+
:param pulumi.Input[_builtins.str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
|
52
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
53
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
54
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
55
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
56
|
+
:param pulumi.Input[_builtins.bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
|
57
|
+
:param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
|
58
|
+
:param pulumi.Input[_builtins.str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
|
43
59
|
this is set you need to also set client_key.
|
44
|
-
:param pulumi.Input[
|
60
|
+
:param pulumi.Input[_builtins.str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
|
45
61
|
you need to also set client_cert.
|
46
|
-
:param pulumi.Input[
|
47
|
-
:param pulumi.Input[
|
48
|
-
:param pulumi.Input[
|
62
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
|
63
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
64
|
+
:param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
|
65
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
49
66
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
50
|
-
:param pulumi.Input[
|
51
|
-
:param pulumi.Input[
|
52
|
-
|
53
|
-
:param pulumi.Input[
|
67
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
68
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
69
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
70
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
71
|
+
:param pulumi.Input[_builtins.bool] local: Specifies if the secret backend is local only
|
72
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
|
73
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
54
74
|
The value should not contain leading or trailing forward slashes.
|
55
75
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
56
76
|
*Available only for Vault Enterprise*.
|
57
|
-
:param pulumi.Input[
|
77
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
78
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
79
|
+
:param pulumi.Input[_builtins.str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
|
58
80
|
to `consul`.
|
59
|
-
:param pulumi.Input[
|
60
|
-
:param pulumi.Input[
|
81
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
82
|
+
:param pulumi.Input[_builtins.str] scheme: Specifies the URL scheme to use. Defaults to `http`.
|
83
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
84
|
+
:param pulumi.Input[_builtins.str] token: Specifies the Consul token to use when managing or issuing new tokens.
|
61
85
|
"""
|
62
86
|
pulumi.set(__self__, "address", address)
|
87
|
+
if allowed_managed_keys is not None:
|
88
|
+
pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
|
89
|
+
if allowed_response_headers is not None:
|
90
|
+
pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
|
91
|
+
if audit_non_hmac_request_keys is not None:
|
92
|
+
pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
|
93
|
+
if audit_non_hmac_response_keys is not None:
|
94
|
+
pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
|
63
95
|
if bootstrap is not None:
|
64
96
|
pulumi.set(__self__, "bootstrap", bootstrap)
|
65
97
|
if ca_cert is not None:
|
@@ -70,62 +102,128 @@ class SecretBackendArgs:
|
|
70
102
|
pulumi.set(__self__, "client_key", client_key)
|
71
103
|
if default_lease_ttl_seconds is not None:
|
72
104
|
pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
|
105
|
+
if delegated_auth_accessors is not None:
|
106
|
+
pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
|
73
107
|
if description is not None:
|
74
108
|
pulumi.set(__self__, "description", description)
|
75
109
|
if disable_remount is not None:
|
76
110
|
pulumi.set(__self__, "disable_remount", disable_remount)
|
111
|
+
if external_entropy_access is not None:
|
112
|
+
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
113
|
+
if force_no_cache is not None:
|
114
|
+
pulumi.set(__self__, "force_no_cache", force_no_cache)
|
115
|
+
if identity_token_key is not None:
|
116
|
+
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
117
|
+
if listing_visibility is not None:
|
118
|
+
pulumi.set(__self__, "listing_visibility", listing_visibility)
|
77
119
|
if local is not None:
|
78
120
|
pulumi.set(__self__, "local", local)
|
79
121
|
if max_lease_ttl_seconds is not None:
|
80
122
|
pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
|
81
123
|
if namespace is not None:
|
82
124
|
pulumi.set(__self__, "namespace", namespace)
|
125
|
+
if options is not None:
|
126
|
+
pulumi.set(__self__, "options", options)
|
127
|
+
if passthrough_request_headers is not None:
|
128
|
+
pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
|
83
129
|
if path is not None:
|
84
130
|
pulumi.set(__self__, "path", path)
|
131
|
+
if plugin_version is not None:
|
132
|
+
pulumi.set(__self__, "plugin_version", plugin_version)
|
85
133
|
if scheme is not None:
|
86
134
|
pulumi.set(__self__, "scheme", scheme)
|
135
|
+
if seal_wrap is not None:
|
136
|
+
pulumi.set(__self__, "seal_wrap", seal_wrap)
|
87
137
|
if token is not None:
|
88
138
|
pulumi.set(__self__, "token", token)
|
89
139
|
|
90
|
-
@property
|
140
|
+
@_builtins.property
|
91
141
|
@pulumi.getter
|
92
|
-
def address(self) -> pulumi.Input[
|
142
|
+
def address(self) -> pulumi.Input[_builtins.str]:
|
93
143
|
"""
|
94
144
|
Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
|
95
145
|
"""
|
96
146
|
return pulumi.get(self, "address")
|
97
147
|
|
98
148
|
@address.setter
|
99
|
-
def address(self, value: pulumi.Input[
|
149
|
+
def address(self, value: pulumi.Input[_builtins.str]):
|
100
150
|
pulumi.set(self, "address", value)
|
101
151
|
|
102
|
-
@property
|
152
|
+
@_builtins.property
|
153
|
+
@pulumi.getter(name="allowedManagedKeys")
|
154
|
+
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
155
|
+
"""
|
156
|
+
List of managed key registry entry names that the mount in question is allowed to access
|
157
|
+
"""
|
158
|
+
return pulumi.get(self, "allowed_managed_keys")
|
159
|
+
|
160
|
+
@allowed_managed_keys.setter
|
161
|
+
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
162
|
+
pulumi.set(self, "allowed_managed_keys", value)
|
163
|
+
|
164
|
+
@_builtins.property
|
165
|
+
@pulumi.getter(name="allowedResponseHeaders")
|
166
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
167
|
+
"""
|
168
|
+
List of headers to allow and pass from the request to the plugin
|
169
|
+
"""
|
170
|
+
return pulumi.get(self, "allowed_response_headers")
|
171
|
+
|
172
|
+
@allowed_response_headers.setter
|
173
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
174
|
+
pulumi.set(self, "allowed_response_headers", value)
|
175
|
+
|
176
|
+
@_builtins.property
|
177
|
+
@pulumi.getter(name="auditNonHmacRequestKeys")
|
178
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
179
|
+
"""
|
180
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
181
|
+
"""
|
182
|
+
return pulumi.get(self, "audit_non_hmac_request_keys")
|
183
|
+
|
184
|
+
@audit_non_hmac_request_keys.setter
|
185
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
186
|
+
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
187
|
+
|
188
|
+
@_builtins.property
|
189
|
+
@pulumi.getter(name="auditNonHmacResponseKeys")
|
190
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
191
|
+
"""
|
192
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
193
|
+
"""
|
194
|
+
return pulumi.get(self, "audit_non_hmac_response_keys")
|
195
|
+
|
196
|
+
@audit_non_hmac_response_keys.setter
|
197
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
198
|
+
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
199
|
+
|
200
|
+
@_builtins.property
|
103
201
|
@pulumi.getter
|
104
|
-
def bootstrap(self) -> Optional[pulumi.Input[
|
202
|
+
def bootstrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
105
203
|
"""
|
106
204
|
Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
|
107
205
|
"""
|
108
206
|
return pulumi.get(self, "bootstrap")
|
109
207
|
|
110
208
|
@bootstrap.setter
|
111
|
-
def bootstrap(self, value: Optional[pulumi.Input[
|
209
|
+
def bootstrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
112
210
|
pulumi.set(self, "bootstrap", value)
|
113
211
|
|
114
|
-
@property
|
212
|
+
@_builtins.property
|
115
213
|
@pulumi.getter(name="caCert")
|
116
|
-
def ca_cert(self) -> Optional[pulumi.Input[
|
214
|
+
def ca_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
|
117
215
|
"""
|
118
216
|
CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
|
119
217
|
"""
|
120
218
|
return pulumi.get(self, "ca_cert")
|
121
219
|
|
122
220
|
@ca_cert.setter
|
123
|
-
def ca_cert(self, value: Optional[pulumi.Input[
|
221
|
+
def ca_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
|
124
222
|
pulumi.set(self, "ca_cert", value)
|
125
223
|
|
126
|
-
@property
|
224
|
+
@_builtins.property
|
127
225
|
@pulumi.getter(name="clientCert")
|
128
|
-
def client_cert(self) -> Optional[pulumi.Input[
|
226
|
+
def client_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
|
129
227
|
"""
|
130
228
|
Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
|
131
229
|
this is set you need to also set client_key.
|
@@ -133,12 +231,12 @@ class SecretBackendArgs:
|
|
133
231
|
return pulumi.get(self, "client_cert")
|
134
232
|
|
135
233
|
@client_cert.setter
|
136
|
-
def client_cert(self, value: Optional[pulumi.Input[
|
234
|
+
def client_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
|
137
235
|
pulumi.set(self, "client_cert", value)
|
138
236
|
|
139
|
-
@property
|
237
|
+
@_builtins.property
|
140
238
|
@pulumi.getter(name="clientKey")
|
141
|
-
def client_key(self) -> Optional[pulumi.Input[
|
239
|
+
def client_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
142
240
|
"""
|
143
241
|
Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
|
144
242
|
you need to also set client_cert.
|
@@ -146,36 +244,48 @@ class SecretBackendArgs:
|
|
146
244
|
return pulumi.get(self, "client_key")
|
147
245
|
|
148
246
|
@client_key.setter
|
149
|
-
def client_key(self, value: Optional[pulumi.Input[
|
247
|
+
def client_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
150
248
|
pulumi.set(self, "client_key", value)
|
151
249
|
|
152
|
-
@property
|
250
|
+
@_builtins.property
|
153
251
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
154
|
-
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
252
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
155
253
|
"""
|
156
|
-
|
254
|
+
Default lease duration for secrets in seconds
|
157
255
|
"""
|
158
256
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
159
257
|
|
160
258
|
@default_lease_ttl_seconds.setter
|
161
|
-
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
259
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
162
260
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
163
261
|
|
164
|
-
@property
|
262
|
+
@_builtins.property
|
263
|
+
@pulumi.getter(name="delegatedAuthAccessors")
|
264
|
+
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
265
|
+
"""
|
266
|
+
List of headers to allow and pass from the request to the plugin
|
267
|
+
"""
|
268
|
+
return pulumi.get(self, "delegated_auth_accessors")
|
269
|
+
|
270
|
+
@delegated_auth_accessors.setter
|
271
|
+
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
272
|
+
pulumi.set(self, "delegated_auth_accessors", value)
|
273
|
+
|
274
|
+
@_builtins.property
|
165
275
|
@pulumi.getter
|
166
|
-
def description(self) -> Optional[pulumi.Input[
|
276
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
167
277
|
"""
|
168
278
|
A human-friendly description for this backend.
|
169
279
|
"""
|
170
280
|
return pulumi.get(self, "description")
|
171
281
|
|
172
282
|
@description.setter
|
173
|
-
def description(self, value: Optional[pulumi.Input[
|
283
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
174
284
|
pulumi.set(self, "description", value)
|
175
285
|
|
176
|
-
@property
|
286
|
+
@_builtins.property
|
177
287
|
@pulumi.getter(name="disableRemount")
|
178
|
-
def disable_remount(self) -> Optional[pulumi.Input[
|
288
|
+
def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
179
289
|
"""
|
180
290
|
If set, opts out of mount migration on path updates.
|
181
291
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -183,37 +293,84 @@ class SecretBackendArgs:
|
|
183
293
|
return pulumi.get(self, "disable_remount")
|
184
294
|
|
185
295
|
@disable_remount.setter
|
186
|
-
def disable_remount(self, value: Optional[pulumi.Input[
|
296
|
+
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
187
297
|
pulumi.set(self, "disable_remount", value)
|
188
298
|
|
189
|
-
@property
|
299
|
+
@_builtins.property
|
300
|
+
@pulumi.getter(name="externalEntropyAccess")
|
301
|
+
def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
302
|
+
"""
|
303
|
+
Enable the secrets engine to access Vault's external entropy source
|
304
|
+
"""
|
305
|
+
return pulumi.get(self, "external_entropy_access")
|
306
|
+
|
307
|
+
@external_entropy_access.setter
|
308
|
+
def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
309
|
+
pulumi.set(self, "external_entropy_access", value)
|
310
|
+
|
311
|
+
@_builtins.property
|
312
|
+
@pulumi.getter(name="forceNoCache")
|
313
|
+
def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
314
|
+
"""
|
315
|
+
If set to true, disables caching.
|
316
|
+
"""
|
317
|
+
return pulumi.get(self, "force_no_cache")
|
318
|
+
|
319
|
+
@force_no_cache.setter
|
320
|
+
def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
321
|
+
pulumi.set(self, "force_no_cache", value)
|
322
|
+
|
323
|
+
@_builtins.property
|
324
|
+
@pulumi.getter(name="identityTokenKey")
|
325
|
+
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
326
|
+
"""
|
327
|
+
The key to use for signing plugin workload identity tokens
|
328
|
+
"""
|
329
|
+
return pulumi.get(self, "identity_token_key")
|
330
|
+
|
331
|
+
@identity_token_key.setter
|
332
|
+
def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
333
|
+
pulumi.set(self, "identity_token_key", value)
|
334
|
+
|
335
|
+
@_builtins.property
|
336
|
+
@pulumi.getter(name="listingVisibility")
|
337
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
338
|
+
"""
|
339
|
+
Specifies whether to show this mount in the UI-specific listing endpoint
|
340
|
+
"""
|
341
|
+
return pulumi.get(self, "listing_visibility")
|
342
|
+
|
343
|
+
@listing_visibility.setter
|
344
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
345
|
+
pulumi.set(self, "listing_visibility", value)
|
346
|
+
|
347
|
+
@_builtins.property
|
190
348
|
@pulumi.getter
|
191
|
-
def local(self) -> Optional[pulumi.Input[
|
349
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
192
350
|
"""
|
193
|
-
Specifies if the secret backend is local only
|
351
|
+
Specifies if the secret backend is local only
|
194
352
|
"""
|
195
353
|
return pulumi.get(self, "local")
|
196
354
|
|
197
355
|
@local.setter
|
198
|
-
def local(self, value: Optional[pulumi.Input[
|
356
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
199
357
|
pulumi.set(self, "local", value)
|
200
358
|
|
201
|
-
@property
|
359
|
+
@_builtins.property
|
202
360
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
203
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
361
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
204
362
|
"""
|
205
|
-
|
206
|
-
for credentials issued by this backend.
|
363
|
+
Maximum possible lease duration for secrets in seconds
|
207
364
|
"""
|
208
365
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
209
366
|
|
210
367
|
@max_lease_ttl_seconds.setter
|
211
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
368
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
212
369
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
213
370
|
|
214
|
-
@property
|
371
|
+
@_builtins.property
|
215
372
|
@pulumi.getter
|
216
|
-
def namespace(self) -> Optional[pulumi.Input[
|
373
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
217
374
|
"""
|
218
375
|
The namespace to provision the resource in.
|
219
376
|
The value should not contain leading or trailing forward slashes.
|
@@ -223,12 +380,36 @@ class SecretBackendArgs:
|
|
223
380
|
return pulumi.get(self, "namespace")
|
224
381
|
|
225
382
|
@namespace.setter
|
226
|
-
def namespace(self, value: Optional[pulumi.Input[
|
383
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
227
384
|
pulumi.set(self, "namespace", value)
|
228
385
|
|
229
|
-
@property
|
386
|
+
@_builtins.property
|
387
|
+
@pulumi.getter
|
388
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
389
|
+
"""
|
390
|
+
Specifies mount type specific options that are passed to the backend
|
391
|
+
"""
|
392
|
+
return pulumi.get(self, "options")
|
393
|
+
|
394
|
+
@options.setter
|
395
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
396
|
+
pulumi.set(self, "options", value)
|
397
|
+
|
398
|
+
@_builtins.property
|
399
|
+
@pulumi.getter(name="passthroughRequestHeaders")
|
400
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
401
|
+
"""
|
402
|
+
List of headers to allow and pass from the request to the plugin
|
403
|
+
"""
|
404
|
+
return pulumi.get(self, "passthrough_request_headers")
|
405
|
+
|
406
|
+
@passthrough_request_headers.setter
|
407
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
408
|
+
pulumi.set(self, "passthrough_request_headers", value)
|
409
|
+
|
410
|
+
@_builtins.property
|
230
411
|
@pulumi.getter
|
231
|
-
def path(self) -> Optional[pulumi.Input[
|
412
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
232
413
|
"""
|
233
414
|
The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
|
234
415
|
to `consul`.
|
@@ -236,78 +417,139 @@ class SecretBackendArgs:
|
|
236
417
|
return pulumi.get(self, "path")
|
237
418
|
|
238
419
|
@path.setter
|
239
|
-
def path(self, value: Optional[pulumi.Input[
|
420
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
240
421
|
pulumi.set(self, "path", value)
|
241
422
|
|
242
|
-
@property
|
423
|
+
@_builtins.property
|
424
|
+
@pulumi.getter(name="pluginVersion")
|
425
|
+
def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
|
426
|
+
"""
|
427
|
+
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
428
|
+
"""
|
429
|
+
return pulumi.get(self, "plugin_version")
|
430
|
+
|
431
|
+
@plugin_version.setter
|
432
|
+
def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
|
433
|
+
pulumi.set(self, "plugin_version", value)
|
434
|
+
|
435
|
+
@_builtins.property
|
243
436
|
@pulumi.getter
|
244
|
-
def scheme(self) -> Optional[pulumi.Input[
|
437
|
+
def scheme(self) -> Optional[pulumi.Input[_builtins.str]]:
|
245
438
|
"""
|
246
439
|
Specifies the URL scheme to use. Defaults to `http`.
|
247
440
|
"""
|
248
441
|
return pulumi.get(self, "scheme")
|
249
442
|
|
250
443
|
@scheme.setter
|
251
|
-
def scheme(self, value: Optional[pulumi.Input[
|
444
|
+
def scheme(self, value: Optional[pulumi.Input[_builtins.str]]):
|
252
445
|
pulumi.set(self, "scheme", value)
|
253
446
|
|
254
|
-
@property
|
447
|
+
@_builtins.property
|
448
|
+
@pulumi.getter(name="sealWrap")
|
449
|
+
def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
450
|
+
"""
|
451
|
+
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
452
|
+
"""
|
453
|
+
return pulumi.get(self, "seal_wrap")
|
454
|
+
|
455
|
+
@seal_wrap.setter
|
456
|
+
def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
457
|
+
pulumi.set(self, "seal_wrap", value)
|
458
|
+
|
459
|
+
@_builtins.property
|
255
460
|
@pulumi.getter
|
256
|
-
def token(self) -> Optional[pulumi.Input[
|
461
|
+
def token(self) -> Optional[pulumi.Input[_builtins.str]]:
|
257
462
|
"""
|
258
463
|
Specifies the Consul token to use when managing or issuing new tokens.
|
259
464
|
"""
|
260
465
|
return pulumi.get(self, "token")
|
261
466
|
|
262
467
|
@token.setter
|
263
|
-
def token(self, value: Optional[pulumi.Input[
|
468
|
+
def token(self, value: Optional[pulumi.Input[_builtins.str]]):
|
264
469
|
pulumi.set(self, "token", value)
|
265
470
|
|
266
471
|
|
267
472
|
@pulumi.input_type
|
268
473
|
class _SecretBackendState:
|
269
474
|
def __init__(__self__, *,
|
270
|
-
|
271
|
-
|
272
|
-
|
273
|
-
|
274
|
-
|
275
|
-
|
276
|
-
|
277
|
-
|
278
|
-
|
279
|
-
|
280
|
-
|
281
|
-
|
282
|
-
|
283
|
-
|
475
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
476
|
+
address: Optional[pulumi.Input[_builtins.str]] = None,
|
477
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
478
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
479
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
480
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
481
|
+
bootstrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
482
|
+
ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
483
|
+
client_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
484
|
+
client_key: Optional[pulumi.Input[_builtins.str]] = None,
|
485
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
486
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
487
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
488
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
489
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
490
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
491
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
492
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
493
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
494
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
495
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
496
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
497
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
498
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
499
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
500
|
+
scheme: Optional[pulumi.Input[_builtins.str]] = None,
|
501
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
502
|
+
token: Optional[pulumi.Input[_builtins.str]] = None):
|
284
503
|
"""
|
285
504
|
Input properties used for looking up and filtering SecretBackend resources.
|
286
|
-
:param pulumi.Input[
|
287
|
-
:param pulumi.Input[
|
288
|
-
:param pulumi.Input[
|
289
|
-
:param pulumi.Input[
|
505
|
+
:param pulumi.Input[_builtins.str] accessor: Accessor of the mount
|
506
|
+
:param pulumi.Input[_builtins.str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
|
507
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
508
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
509
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
510
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
511
|
+
:param pulumi.Input[_builtins.bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
|
512
|
+
:param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
|
513
|
+
:param pulumi.Input[_builtins.str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
|
290
514
|
this is set you need to also set client_key.
|
291
|
-
:param pulumi.Input[
|
515
|
+
:param pulumi.Input[_builtins.str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
|
292
516
|
you need to also set client_cert.
|
293
|
-
:param pulumi.Input[
|
294
|
-
:param pulumi.Input[
|
295
|
-
:param pulumi.Input[
|
517
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
|
518
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
519
|
+
:param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
|
520
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
296
521
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
297
|
-
:param pulumi.Input[
|
298
|
-
:param pulumi.Input[
|
299
|
-
|
300
|
-
:param pulumi.Input[
|
522
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
523
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
524
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
525
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
526
|
+
:param pulumi.Input[_builtins.bool] local: Specifies if the secret backend is local only
|
527
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
|
528
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
301
529
|
The value should not contain leading or trailing forward slashes.
|
302
530
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
303
531
|
*Available only for Vault Enterprise*.
|
304
|
-
:param pulumi.Input[
|
532
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
533
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
534
|
+
:param pulumi.Input[_builtins.str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
|
305
535
|
to `consul`.
|
306
|
-
:param pulumi.Input[
|
307
|
-
:param pulumi.Input[
|
536
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
537
|
+
:param pulumi.Input[_builtins.str] scheme: Specifies the URL scheme to use. Defaults to `http`.
|
538
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
539
|
+
:param pulumi.Input[_builtins.str] token: Specifies the Consul token to use when managing or issuing new tokens.
|
308
540
|
"""
|
541
|
+
if accessor is not None:
|
542
|
+
pulumi.set(__self__, "accessor", accessor)
|
309
543
|
if address is not None:
|
310
544
|
pulumi.set(__self__, "address", address)
|
545
|
+
if allowed_managed_keys is not None:
|
546
|
+
pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
|
547
|
+
if allowed_response_headers is not None:
|
548
|
+
pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
|
549
|
+
if audit_non_hmac_request_keys is not None:
|
550
|
+
pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
|
551
|
+
if audit_non_hmac_response_keys is not None:
|
552
|
+
pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
|
311
553
|
if bootstrap is not None:
|
312
554
|
pulumi.set(__self__, "bootstrap", bootstrap)
|
313
555
|
if ca_cert is not None:
|
@@ -318,62 +560,140 @@ class _SecretBackendState:
|
|
318
560
|
pulumi.set(__self__, "client_key", client_key)
|
319
561
|
if default_lease_ttl_seconds is not None:
|
320
562
|
pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
|
563
|
+
if delegated_auth_accessors is not None:
|
564
|
+
pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
|
321
565
|
if description is not None:
|
322
566
|
pulumi.set(__self__, "description", description)
|
323
567
|
if disable_remount is not None:
|
324
568
|
pulumi.set(__self__, "disable_remount", disable_remount)
|
569
|
+
if external_entropy_access is not None:
|
570
|
+
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
571
|
+
if force_no_cache is not None:
|
572
|
+
pulumi.set(__self__, "force_no_cache", force_no_cache)
|
573
|
+
if identity_token_key is not None:
|
574
|
+
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
575
|
+
if listing_visibility is not None:
|
576
|
+
pulumi.set(__self__, "listing_visibility", listing_visibility)
|
325
577
|
if local is not None:
|
326
578
|
pulumi.set(__self__, "local", local)
|
327
579
|
if max_lease_ttl_seconds is not None:
|
328
580
|
pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
|
329
581
|
if namespace is not None:
|
330
582
|
pulumi.set(__self__, "namespace", namespace)
|
583
|
+
if options is not None:
|
584
|
+
pulumi.set(__self__, "options", options)
|
585
|
+
if passthrough_request_headers is not None:
|
586
|
+
pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
|
331
587
|
if path is not None:
|
332
588
|
pulumi.set(__self__, "path", path)
|
589
|
+
if plugin_version is not None:
|
590
|
+
pulumi.set(__self__, "plugin_version", plugin_version)
|
333
591
|
if scheme is not None:
|
334
592
|
pulumi.set(__self__, "scheme", scheme)
|
593
|
+
if seal_wrap is not None:
|
594
|
+
pulumi.set(__self__, "seal_wrap", seal_wrap)
|
335
595
|
if token is not None:
|
336
596
|
pulumi.set(__self__, "token", token)
|
337
597
|
|
338
|
-
@property
|
598
|
+
@_builtins.property
|
599
|
+
@pulumi.getter
|
600
|
+
def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
|
601
|
+
"""
|
602
|
+
Accessor of the mount
|
603
|
+
"""
|
604
|
+
return pulumi.get(self, "accessor")
|
605
|
+
|
606
|
+
@accessor.setter
|
607
|
+
def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
|
608
|
+
pulumi.set(self, "accessor", value)
|
609
|
+
|
610
|
+
@_builtins.property
|
339
611
|
@pulumi.getter
|
340
|
-
def address(self) -> Optional[pulumi.Input[
|
612
|
+
def address(self) -> Optional[pulumi.Input[_builtins.str]]:
|
341
613
|
"""
|
342
614
|
Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
|
343
615
|
"""
|
344
616
|
return pulumi.get(self, "address")
|
345
617
|
|
346
618
|
@address.setter
|
347
|
-
def address(self, value: Optional[pulumi.Input[
|
619
|
+
def address(self, value: Optional[pulumi.Input[_builtins.str]]):
|
348
620
|
pulumi.set(self, "address", value)
|
349
621
|
|
350
|
-
@property
|
622
|
+
@_builtins.property
|
623
|
+
@pulumi.getter(name="allowedManagedKeys")
|
624
|
+
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
625
|
+
"""
|
626
|
+
List of managed key registry entry names that the mount in question is allowed to access
|
627
|
+
"""
|
628
|
+
return pulumi.get(self, "allowed_managed_keys")
|
629
|
+
|
630
|
+
@allowed_managed_keys.setter
|
631
|
+
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
632
|
+
pulumi.set(self, "allowed_managed_keys", value)
|
633
|
+
|
634
|
+
@_builtins.property
|
635
|
+
@pulumi.getter(name="allowedResponseHeaders")
|
636
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
637
|
+
"""
|
638
|
+
List of headers to allow and pass from the request to the plugin
|
639
|
+
"""
|
640
|
+
return pulumi.get(self, "allowed_response_headers")
|
641
|
+
|
642
|
+
@allowed_response_headers.setter
|
643
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
644
|
+
pulumi.set(self, "allowed_response_headers", value)
|
645
|
+
|
646
|
+
@_builtins.property
|
647
|
+
@pulumi.getter(name="auditNonHmacRequestKeys")
|
648
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
649
|
+
"""
|
650
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
651
|
+
"""
|
652
|
+
return pulumi.get(self, "audit_non_hmac_request_keys")
|
653
|
+
|
654
|
+
@audit_non_hmac_request_keys.setter
|
655
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
656
|
+
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
657
|
+
|
658
|
+
@_builtins.property
|
659
|
+
@pulumi.getter(name="auditNonHmacResponseKeys")
|
660
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
661
|
+
"""
|
662
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
663
|
+
"""
|
664
|
+
return pulumi.get(self, "audit_non_hmac_response_keys")
|
665
|
+
|
666
|
+
@audit_non_hmac_response_keys.setter
|
667
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
668
|
+
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
669
|
+
|
670
|
+
@_builtins.property
|
351
671
|
@pulumi.getter
|
352
|
-
def bootstrap(self) -> Optional[pulumi.Input[
|
672
|
+
def bootstrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
353
673
|
"""
|
354
674
|
Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
|
355
675
|
"""
|
356
676
|
return pulumi.get(self, "bootstrap")
|
357
677
|
|
358
678
|
@bootstrap.setter
|
359
|
-
def bootstrap(self, value: Optional[pulumi.Input[
|
679
|
+
def bootstrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
360
680
|
pulumi.set(self, "bootstrap", value)
|
361
681
|
|
362
|
-
@property
|
682
|
+
@_builtins.property
|
363
683
|
@pulumi.getter(name="caCert")
|
364
|
-
def ca_cert(self) -> Optional[pulumi.Input[
|
684
|
+
def ca_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
|
365
685
|
"""
|
366
686
|
CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
|
367
687
|
"""
|
368
688
|
return pulumi.get(self, "ca_cert")
|
369
689
|
|
370
690
|
@ca_cert.setter
|
371
|
-
def ca_cert(self, value: Optional[pulumi.Input[
|
691
|
+
def ca_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
|
372
692
|
pulumi.set(self, "ca_cert", value)
|
373
693
|
|
374
|
-
@property
|
694
|
+
@_builtins.property
|
375
695
|
@pulumi.getter(name="clientCert")
|
376
|
-
def client_cert(self) -> Optional[pulumi.Input[
|
696
|
+
def client_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
|
377
697
|
"""
|
378
698
|
Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
|
379
699
|
this is set you need to also set client_key.
|
@@ -381,12 +701,12 @@ class _SecretBackendState:
|
|
381
701
|
return pulumi.get(self, "client_cert")
|
382
702
|
|
383
703
|
@client_cert.setter
|
384
|
-
def client_cert(self, value: Optional[pulumi.Input[
|
704
|
+
def client_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
|
385
705
|
pulumi.set(self, "client_cert", value)
|
386
706
|
|
387
|
-
@property
|
707
|
+
@_builtins.property
|
388
708
|
@pulumi.getter(name="clientKey")
|
389
|
-
def client_key(self) -> Optional[pulumi.Input[
|
709
|
+
def client_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
390
710
|
"""
|
391
711
|
Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
|
392
712
|
you need to also set client_cert.
|
@@ -394,36 +714,48 @@ class _SecretBackendState:
|
|
394
714
|
return pulumi.get(self, "client_key")
|
395
715
|
|
396
716
|
@client_key.setter
|
397
|
-
def client_key(self, value: Optional[pulumi.Input[
|
717
|
+
def client_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
398
718
|
pulumi.set(self, "client_key", value)
|
399
719
|
|
400
|
-
@property
|
720
|
+
@_builtins.property
|
401
721
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
402
|
-
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
722
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
403
723
|
"""
|
404
|
-
|
724
|
+
Default lease duration for secrets in seconds
|
405
725
|
"""
|
406
726
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
407
727
|
|
408
728
|
@default_lease_ttl_seconds.setter
|
409
|
-
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
729
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
410
730
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
411
731
|
|
412
|
-
@property
|
732
|
+
@_builtins.property
|
733
|
+
@pulumi.getter(name="delegatedAuthAccessors")
|
734
|
+
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
735
|
+
"""
|
736
|
+
List of headers to allow and pass from the request to the plugin
|
737
|
+
"""
|
738
|
+
return pulumi.get(self, "delegated_auth_accessors")
|
739
|
+
|
740
|
+
@delegated_auth_accessors.setter
|
741
|
+
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
742
|
+
pulumi.set(self, "delegated_auth_accessors", value)
|
743
|
+
|
744
|
+
@_builtins.property
|
413
745
|
@pulumi.getter
|
414
|
-
def description(self) -> Optional[pulumi.Input[
|
746
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
415
747
|
"""
|
416
748
|
A human-friendly description for this backend.
|
417
749
|
"""
|
418
750
|
return pulumi.get(self, "description")
|
419
751
|
|
420
752
|
@description.setter
|
421
|
-
def description(self, value: Optional[pulumi.Input[
|
753
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
422
754
|
pulumi.set(self, "description", value)
|
423
755
|
|
424
|
-
@property
|
756
|
+
@_builtins.property
|
425
757
|
@pulumi.getter(name="disableRemount")
|
426
|
-
def disable_remount(self) -> Optional[pulumi.Input[
|
758
|
+
def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
427
759
|
"""
|
428
760
|
If set, opts out of mount migration on path updates.
|
429
761
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -431,37 +763,84 @@ class _SecretBackendState:
|
|
431
763
|
return pulumi.get(self, "disable_remount")
|
432
764
|
|
433
765
|
@disable_remount.setter
|
434
|
-
def disable_remount(self, value: Optional[pulumi.Input[
|
766
|
+
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
435
767
|
pulumi.set(self, "disable_remount", value)
|
436
768
|
|
437
|
-
@property
|
769
|
+
@_builtins.property
|
770
|
+
@pulumi.getter(name="externalEntropyAccess")
|
771
|
+
def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
772
|
+
"""
|
773
|
+
Enable the secrets engine to access Vault's external entropy source
|
774
|
+
"""
|
775
|
+
return pulumi.get(self, "external_entropy_access")
|
776
|
+
|
777
|
+
@external_entropy_access.setter
|
778
|
+
def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
779
|
+
pulumi.set(self, "external_entropy_access", value)
|
780
|
+
|
781
|
+
@_builtins.property
|
782
|
+
@pulumi.getter(name="forceNoCache")
|
783
|
+
def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
784
|
+
"""
|
785
|
+
If set to true, disables caching.
|
786
|
+
"""
|
787
|
+
return pulumi.get(self, "force_no_cache")
|
788
|
+
|
789
|
+
@force_no_cache.setter
|
790
|
+
def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
791
|
+
pulumi.set(self, "force_no_cache", value)
|
792
|
+
|
793
|
+
@_builtins.property
|
794
|
+
@pulumi.getter(name="identityTokenKey")
|
795
|
+
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
796
|
+
"""
|
797
|
+
The key to use for signing plugin workload identity tokens
|
798
|
+
"""
|
799
|
+
return pulumi.get(self, "identity_token_key")
|
800
|
+
|
801
|
+
@identity_token_key.setter
|
802
|
+
def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
803
|
+
pulumi.set(self, "identity_token_key", value)
|
804
|
+
|
805
|
+
@_builtins.property
|
806
|
+
@pulumi.getter(name="listingVisibility")
|
807
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
808
|
+
"""
|
809
|
+
Specifies whether to show this mount in the UI-specific listing endpoint
|
810
|
+
"""
|
811
|
+
return pulumi.get(self, "listing_visibility")
|
812
|
+
|
813
|
+
@listing_visibility.setter
|
814
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
815
|
+
pulumi.set(self, "listing_visibility", value)
|
816
|
+
|
817
|
+
@_builtins.property
|
438
818
|
@pulumi.getter
|
439
|
-
def local(self) -> Optional[pulumi.Input[
|
819
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
440
820
|
"""
|
441
|
-
Specifies if the secret backend is local only
|
821
|
+
Specifies if the secret backend is local only
|
442
822
|
"""
|
443
823
|
return pulumi.get(self, "local")
|
444
824
|
|
445
825
|
@local.setter
|
446
|
-
def local(self, value: Optional[pulumi.Input[
|
826
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
447
827
|
pulumi.set(self, "local", value)
|
448
828
|
|
449
|
-
@property
|
829
|
+
@_builtins.property
|
450
830
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
451
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
831
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
452
832
|
"""
|
453
|
-
|
454
|
-
for credentials issued by this backend.
|
833
|
+
Maximum possible lease duration for secrets in seconds
|
455
834
|
"""
|
456
835
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
457
836
|
|
458
837
|
@max_lease_ttl_seconds.setter
|
459
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
838
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
460
839
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
461
840
|
|
462
|
-
@property
|
841
|
+
@_builtins.property
|
463
842
|
@pulumi.getter
|
464
|
-
def namespace(self) -> Optional[pulumi.Input[
|
843
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
465
844
|
"""
|
466
845
|
The namespace to provision the resource in.
|
467
846
|
The value should not contain leading or trailing forward slashes.
|
@@ -471,12 +850,36 @@ class _SecretBackendState:
|
|
471
850
|
return pulumi.get(self, "namespace")
|
472
851
|
|
473
852
|
@namespace.setter
|
474
|
-
def namespace(self, value: Optional[pulumi.Input[
|
853
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
475
854
|
pulumi.set(self, "namespace", value)
|
476
855
|
|
477
|
-
@property
|
856
|
+
@_builtins.property
|
478
857
|
@pulumi.getter
|
479
|
-
def
|
858
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
859
|
+
"""
|
860
|
+
Specifies mount type specific options that are passed to the backend
|
861
|
+
"""
|
862
|
+
return pulumi.get(self, "options")
|
863
|
+
|
864
|
+
@options.setter
|
865
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
866
|
+
pulumi.set(self, "options", value)
|
867
|
+
|
868
|
+
@_builtins.property
|
869
|
+
@pulumi.getter(name="passthroughRequestHeaders")
|
870
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
871
|
+
"""
|
872
|
+
List of headers to allow and pass from the request to the plugin
|
873
|
+
"""
|
874
|
+
return pulumi.get(self, "passthrough_request_headers")
|
875
|
+
|
876
|
+
@passthrough_request_headers.setter
|
877
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
878
|
+
pulumi.set(self, "passthrough_request_headers", value)
|
879
|
+
|
880
|
+
@_builtins.property
|
881
|
+
@pulumi.getter
|
882
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
480
883
|
"""
|
481
884
|
The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
|
482
885
|
to `consul`.
|
@@ -484,31 +887,55 @@ class _SecretBackendState:
|
|
484
887
|
return pulumi.get(self, "path")
|
485
888
|
|
486
889
|
@path.setter
|
487
|
-
def path(self, value: Optional[pulumi.Input[
|
890
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
488
891
|
pulumi.set(self, "path", value)
|
489
892
|
|
490
|
-
@property
|
893
|
+
@_builtins.property
|
894
|
+
@pulumi.getter(name="pluginVersion")
|
895
|
+
def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
|
896
|
+
"""
|
897
|
+
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
898
|
+
"""
|
899
|
+
return pulumi.get(self, "plugin_version")
|
900
|
+
|
901
|
+
@plugin_version.setter
|
902
|
+
def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
|
903
|
+
pulumi.set(self, "plugin_version", value)
|
904
|
+
|
905
|
+
@_builtins.property
|
491
906
|
@pulumi.getter
|
492
|
-
def scheme(self) -> Optional[pulumi.Input[
|
907
|
+
def scheme(self) -> Optional[pulumi.Input[_builtins.str]]:
|
493
908
|
"""
|
494
909
|
Specifies the URL scheme to use. Defaults to `http`.
|
495
910
|
"""
|
496
911
|
return pulumi.get(self, "scheme")
|
497
912
|
|
498
913
|
@scheme.setter
|
499
|
-
def scheme(self, value: Optional[pulumi.Input[
|
914
|
+
def scheme(self, value: Optional[pulumi.Input[_builtins.str]]):
|
500
915
|
pulumi.set(self, "scheme", value)
|
501
916
|
|
502
|
-
@property
|
917
|
+
@_builtins.property
|
918
|
+
@pulumi.getter(name="sealWrap")
|
919
|
+
def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
920
|
+
"""
|
921
|
+
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
922
|
+
"""
|
923
|
+
return pulumi.get(self, "seal_wrap")
|
924
|
+
|
925
|
+
@seal_wrap.setter
|
926
|
+
def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
927
|
+
pulumi.set(self, "seal_wrap", value)
|
928
|
+
|
929
|
+
@_builtins.property
|
503
930
|
@pulumi.getter
|
504
|
-
def token(self) -> Optional[pulumi.Input[
|
931
|
+
def token(self) -> Optional[pulumi.Input[_builtins.str]]:
|
505
932
|
"""
|
506
933
|
Specifies the Consul token to use when managing or issuing new tokens.
|
507
934
|
"""
|
508
935
|
return pulumi.get(self, "token")
|
509
936
|
|
510
937
|
@token.setter
|
511
|
-
def token(self, value: Optional[pulumi.Input[
|
938
|
+
def token(self, value: Optional[pulumi.Input[_builtins.str]]):
|
512
939
|
pulumi.set(self, "token", value)
|
513
940
|
|
514
941
|
|
@@ -518,20 +945,33 @@ class SecretBackend(pulumi.CustomResource):
|
|
518
945
|
def __init__(__self__,
|
519
946
|
resource_name: str,
|
520
947
|
opts: Optional[pulumi.ResourceOptions] = None,
|
521
|
-
address: Optional[pulumi.Input[
|
522
|
-
|
523
|
-
|
524
|
-
|
525
|
-
|
526
|
-
|
527
|
-
|
528
|
-
|
529
|
-
|
530
|
-
|
531
|
-
|
532
|
-
|
533
|
-
|
534
|
-
|
948
|
+
address: Optional[pulumi.Input[_builtins.str]] = None,
|
949
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
950
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
951
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
952
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
953
|
+
bootstrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
954
|
+
ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
955
|
+
client_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
956
|
+
client_key: Optional[pulumi.Input[_builtins.str]] = None,
|
957
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
958
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
959
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
960
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
961
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
962
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
963
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
964
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
965
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
966
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
967
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
968
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
969
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
970
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
971
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
972
|
+
scheme: Optional[pulumi.Input[_builtins.str]] = None,
|
973
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
974
|
+
token: Optional[pulumi.Input[_builtins.str]] = None,
|
535
975
|
__props__=None):
|
536
976
|
"""
|
537
977
|
## Example Usage
|
@@ -570,28 +1010,40 @@ class SecretBackend(pulumi.CustomResource):
|
|
570
1010
|
|
571
1011
|
:param str resource_name: The name of the resource.
|
572
1012
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
573
|
-
:param pulumi.Input[
|
574
|
-
:param pulumi.Input[
|
575
|
-
:param pulumi.Input[
|
576
|
-
:param pulumi.Input[
|
1013
|
+
:param pulumi.Input[_builtins.str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
|
1014
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
1015
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
1016
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1017
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1018
|
+
:param pulumi.Input[_builtins.bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
|
1019
|
+
:param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
|
1020
|
+
:param pulumi.Input[_builtins.str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
|
577
1021
|
this is set you need to also set client_key.
|
578
|
-
:param pulumi.Input[
|
1022
|
+
:param pulumi.Input[_builtins.str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
|
579
1023
|
you need to also set client_cert.
|
580
|
-
:param pulumi.Input[
|
581
|
-
:param pulumi.Input[
|
582
|
-
:param pulumi.Input[
|
1024
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
|
1025
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
1026
|
+
:param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
|
1027
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
583
1028
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
584
|
-
:param pulumi.Input[
|
585
|
-
:param pulumi.Input[
|
586
|
-
|
587
|
-
:param pulumi.Input[
|
1029
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
1030
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
1031
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
1032
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
1033
|
+
:param pulumi.Input[_builtins.bool] local: Specifies if the secret backend is local only
|
1034
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
|
1035
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
588
1036
|
The value should not contain leading or trailing forward slashes.
|
589
1037
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
590
1038
|
*Available only for Vault Enterprise*.
|
591
|
-
:param pulumi.Input[
|
1039
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
1040
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
1041
|
+
:param pulumi.Input[_builtins.str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
|
592
1042
|
to `consul`.
|
593
|
-
:param pulumi.Input[
|
594
|
-
:param pulumi.Input[
|
1043
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1044
|
+
:param pulumi.Input[_builtins.str] scheme: Specifies the URL scheme to use. Defaults to `http`.
|
1045
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1046
|
+
:param pulumi.Input[_builtins.str] token: Specifies the Consul token to use when managing or issuing new tokens.
|
595
1047
|
"""
|
596
1048
|
...
|
597
1049
|
@overload
|
@@ -649,20 +1101,33 @@ class SecretBackend(pulumi.CustomResource):
|
|
649
1101
|
def _internal_init(__self__,
|
650
1102
|
resource_name: str,
|
651
1103
|
opts: Optional[pulumi.ResourceOptions] = None,
|
652
|
-
address: Optional[pulumi.Input[
|
653
|
-
|
654
|
-
|
655
|
-
|
656
|
-
|
657
|
-
|
658
|
-
|
659
|
-
|
660
|
-
|
661
|
-
|
662
|
-
|
663
|
-
|
664
|
-
|
665
|
-
|
1104
|
+
address: Optional[pulumi.Input[_builtins.str]] = None,
|
1105
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1106
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1107
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1108
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1109
|
+
bootstrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
1110
|
+
ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
1111
|
+
client_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
1112
|
+
client_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1113
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1114
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1115
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
1116
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
1117
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
1118
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
1119
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1120
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
1121
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
1122
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1123
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1124
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
1125
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1126
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
1127
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
1128
|
+
scheme: Optional[pulumi.Input[_builtins.str]] = None,
|
1129
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
1130
|
+
token: Optional[pulumi.Input[_builtins.str]] = None,
|
666
1131
|
__props__=None):
|
667
1132
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
668
1133
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -675,19 +1140,33 @@ class SecretBackend(pulumi.CustomResource):
|
|
675
1140
|
if address is None and not opts.urn:
|
676
1141
|
raise TypeError("Missing required property 'address'")
|
677
1142
|
__props__.__dict__["address"] = address
|
1143
|
+
__props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
|
1144
|
+
__props__.__dict__["allowed_response_headers"] = allowed_response_headers
|
1145
|
+
__props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
|
1146
|
+
__props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
|
678
1147
|
__props__.__dict__["bootstrap"] = bootstrap
|
679
1148
|
__props__.__dict__["ca_cert"] = ca_cert
|
680
1149
|
__props__.__dict__["client_cert"] = None if client_cert is None else pulumi.Output.secret(client_cert)
|
681
1150
|
__props__.__dict__["client_key"] = None if client_key is None else pulumi.Output.secret(client_key)
|
682
1151
|
__props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
|
1152
|
+
__props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
|
683
1153
|
__props__.__dict__["description"] = description
|
684
1154
|
__props__.__dict__["disable_remount"] = disable_remount
|
1155
|
+
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
1156
|
+
__props__.__dict__["force_no_cache"] = force_no_cache
|
1157
|
+
__props__.__dict__["identity_token_key"] = identity_token_key
|
1158
|
+
__props__.__dict__["listing_visibility"] = listing_visibility
|
685
1159
|
__props__.__dict__["local"] = local
|
686
1160
|
__props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
|
687
1161
|
__props__.__dict__["namespace"] = namespace
|
1162
|
+
__props__.__dict__["options"] = options
|
1163
|
+
__props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
|
688
1164
|
__props__.__dict__["path"] = path
|
1165
|
+
__props__.__dict__["plugin_version"] = plugin_version
|
689
1166
|
__props__.__dict__["scheme"] = scheme
|
1167
|
+
__props__.__dict__["seal_wrap"] = seal_wrap
|
690
1168
|
__props__.__dict__["token"] = None if token is None else pulumi.Output.secret(token)
|
1169
|
+
__props__.__dict__["accessor"] = None
|
691
1170
|
secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["clientCert", "clientKey", "token"])
|
692
1171
|
opts = pulumi.ResourceOptions.merge(opts, secret_opts)
|
693
1172
|
super(SecretBackend, __self__).__init__(
|
@@ -700,20 +1179,34 @@ class SecretBackend(pulumi.CustomResource):
|
|
700
1179
|
def get(resource_name: str,
|
701
1180
|
id: pulumi.Input[str],
|
702
1181
|
opts: Optional[pulumi.ResourceOptions] = None,
|
703
|
-
|
704
|
-
|
705
|
-
|
706
|
-
|
707
|
-
|
708
|
-
|
709
|
-
|
710
|
-
|
711
|
-
|
712
|
-
|
713
|
-
|
714
|
-
|
715
|
-
|
716
|
-
|
1182
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
1183
|
+
address: Optional[pulumi.Input[_builtins.str]] = None,
|
1184
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1185
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1186
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1187
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1188
|
+
bootstrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
1189
|
+
ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
1190
|
+
client_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
1191
|
+
client_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1192
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1193
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1194
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
1195
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
1196
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
1197
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
1198
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1199
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
1200
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
1201
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1202
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1203
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
1204
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1205
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
1206
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
1207
|
+
scheme: Optional[pulumi.Input[_builtins.str]] = None,
|
1208
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
1209
|
+
token: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackend':
|
717
1210
|
"""
|
718
1211
|
Get an existing SecretBackend resource's state with the given name, id, and optional extra
|
719
1212
|
properties used to qualify the lookup.
|
@@ -721,136 +1214,242 @@ class SecretBackend(pulumi.CustomResource):
|
|
721
1214
|
:param str resource_name: The unique name of the resulting resource.
|
722
1215
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
723
1216
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
724
|
-
:param pulumi.Input[
|
725
|
-
:param pulumi.Input[
|
726
|
-
:param pulumi.Input[
|
727
|
-
:param pulumi.Input[
|
1217
|
+
:param pulumi.Input[_builtins.str] accessor: Accessor of the mount
|
1218
|
+
:param pulumi.Input[_builtins.str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
|
1219
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
1220
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
1221
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1222
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1223
|
+
:param pulumi.Input[_builtins.bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
|
1224
|
+
:param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
|
1225
|
+
:param pulumi.Input[_builtins.str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
|
728
1226
|
this is set you need to also set client_key.
|
729
|
-
:param pulumi.Input[
|
1227
|
+
:param pulumi.Input[_builtins.str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
|
730
1228
|
you need to also set client_cert.
|
731
|
-
:param pulumi.Input[
|
732
|
-
:param pulumi.Input[
|
733
|
-
:param pulumi.Input[
|
1229
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
|
1230
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
1231
|
+
:param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
|
1232
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
734
1233
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
735
|
-
:param pulumi.Input[
|
736
|
-
:param pulumi.Input[
|
737
|
-
|
738
|
-
:param pulumi.Input[
|
1234
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
1235
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
1236
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
1237
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
1238
|
+
:param pulumi.Input[_builtins.bool] local: Specifies if the secret backend is local only
|
1239
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
|
1240
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
739
1241
|
The value should not contain leading or trailing forward slashes.
|
740
1242
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
741
1243
|
*Available only for Vault Enterprise*.
|
742
|
-
:param pulumi.Input[
|
1244
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
1245
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
1246
|
+
:param pulumi.Input[_builtins.str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
|
743
1247
|
to `consul`.
|
744
|
-
:param pulumi.Input[
|
745
|
-
:param pulumi.Input[
|
1248
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1249
|
+
:param pulumi.Input[_builtins.str] scheme: Specifies the URL scheme to use. Defaults to `http`.
|
1250
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1251
|
+
:param pulumi.Input[_builtins.str] token: Specifies the Consul token to use when managing or issuing new tokens.
|
746
1252
|
"""
|
747
1253
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
748
1254
|
|
749
1255
|
__props__ = _SecretBackendState.__new__(_SecretBackendState)
|
750
1256
|
|
1257
|
+
__props__.__dict__["accessor"] = accessor
|
751
1258
|
__props__.__dict__["address"] = address
|
1259
|
+
__props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
|
1260
|
+
__props__.__dict__["allowed_response_headers"] = allowed_response_headers
|
1261
|
+
__props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
|
1262
|
+
__props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
|
752
1263
|
__props__.__dict__["bootstrap"] = bootstrap
|
753
1264
|
__props__.__dict__["ca_cert"] = ca_cert
|
754
1265
|
__props__.__dict__["client_cert"] = client_cert
|
755
1266
|
__props__.__dict__["client_key"] = client_key
|
756
1267
|
__props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
|
1268
|
+
__props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
|
757
1269
|
__props__.__dict__["description"] = description
|
758
1270
|
__props__.__dict__["disable_remount"] = disable_remount
|
1271
|
+
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
1272
|
+
__props__.__dict__["force_no_cache"] = force_no_cache
|
1273
|
+
__props__.__dict__["identity_token_key"] = identity_token_key
|
1274
|
+
__props__.__dict__["listing_visibility"] = listing_visibility
|
759
1275
|
__props__.__dict__["local"] = local
|
760
1276
|
__props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
|
761
1277
|
__props__.__dict__["namespace"] = namespace
|
1278
|
+
__props__.__dict__["options"] = options
|
1279
|
+
__props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
|
762
1280
|
__props__.__dict__["path"] = path
|
1281
|
+
__props__.__dict__["plugin_version"] = plugin_version
|
763
1282
|
__props__.__dict__["scheme"] = scheme
|
1283
|
+
__props__.__dict__["seal_wrap"] = seal_wrap
|
764
1284
|
__props__.__dict__["token"] = token
|
765
1285
|
return SecretBackend(resource_name, opts=opts, __props__=__props__)
|
766
1286
|
|
767
|
-
@property
|
1287
|
+
@_builtins.property
|
768
1288
|
@pulumi.getter
|
769
|
-
def
|
1289
|
+
def accessor(self) -> pulumi.Output[_builtins.str]:
|
1290
|
+
"""
|
1291
|
+
Accessor of the mount
|
1292
|
+
"""
|
1293
|
+
return pulumi.get(self, "accessor")
|
1294
|
+
|
1295
|
+
@_builtins.property
|
1296
|
+
@pulumi.getter
|
1297
|
+
def address(self) -> pulumi.Output[_builtins.str]:
|
770
1298
|
"""
|
771
1299
|
Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
|
772
1300
|
"""
|
773
1301
|
return pulumi.get(self, "address")
|
774
1302
|
|
775
|
-
@property
|
1303
|
+
@_builtins.property
|
1304
|
+
@pulumi.getter(name="allowedManagedKeys")
|
1305
|
+
def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1306
|
+
"""
|
1307
|
+
List of managed key registry entry names that the mount in question is allowed to access
|
1308
|
+
"""
|
1309
|
+
return pulumi.get(self, "allowed_managed_keys")
|
1310
|
+
|
1311
|
+
@_builtins.property
|
1312
|
+
@pulumi.getter(name="allowedResponseHeaders")
|
1313
|
+
def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1314
|
+
"""
|
1315
|
+
List of headers to allow and pass from the request to the plugin
|
1316
|
+
"""
|
1317
|
+
return pulumi.get(self, "allowed_response_headers")
|
1318
|
+
|
1319
|
+
@_builtins.property
|
1320
|
+
@pulumi.getter(name="auditNonHmacRequestKeys")
|
1321
|
+
def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
1322
|
+
"""
|
1323
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1324
|
+
"""
|
1325
|
+
return pulumi.get(self, "audit_non_hmac_request_keys")
|
1326
|
+
|
1327
|
+
@_builtins.property
|
1328
|
+
@pulumi.getter(name="auditNonHmacResponseKeys")
|
1329
|
+
def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
1330
|
+
"""
|
1331
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1332
|
+
"""
|
1333
|
+
return pulumi.get(self, "audit_non_hmac_response_keys")
|
1334
|
+
|
1335
|
+
@_builtins.property
|
776
1336
|
@pulumi.getter
|
777
|
-
def bootstrap(self) -> pulumi.Output[Optional[
|
1337
|
+
def bootstrap(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
778
1338
|
"""
|
779
1339
|
Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
|
780
1340
|
"""
|
781
1341
|
return pulumi.get(self, "bootstrap")
|
782
1342
|
|
783
|
-
@property
|
1343
|
+
@_builtins.property
|
784
1344
|
@pulumi.getter(name="caCert")
|
785
|
-
def ca_cert(self) -> pulumi.Output[Optional[
|
1345
|
+
def ca_cert(self) -> pulumi.Output[Optional[_builtins.str]]:
|
786
1346
|
"""
|
787
1347
|
CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
|
788
1348
|
"""
|
789
1349
|
return pulumi.get(self, "ca_cert")
|
790
1350
|
|
791
|
-
@property
|
1351
|
+
@_builtins.property
|
792
1352
|
@pulumi.getter(name="clientCert")
|
793
|
-
def client_cert(self) -> pulumi.Output[Optional[
|
1353
|
+
def client_cert(self) -> pulumi.Output[Optional[_builtins.str]]:
|
794
1354
|
"""
|
795
1355
|
Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
|
796
1356
|
this is set you need to also set client_key.
|
797
1357
|
"""
|
798
1358
|
return pulumi.get(self, "client_cert")
|
799
1359
|
|
800
|
-
@property
|
1360
|
+
@_builtins.property
|
801
1361
|
@pulumi.getter(name="clientKey")
|
802
|
-
def client_key(self) -> pulumi.Output[Optional[
|
1362
|
+
def client_key(self) -> pulumi.Output[Optional[_builtins.str]]:
|
803
1363
|
"""
|
804
1364
|
Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
|
805
1365
|
you need to also set client_cert.
|
806
1366
|
"""
|
807
1367
|
return pulumi.get(self, "client_key")
|
808
1368
|
|
809
|
-
@property
|
1369
|
+
@_builtins.property
|
810
1370
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
811
|
-
def default_lease_ttl_seconds(self) -> pulumi.Output[Optional[
|
1371
|
+
def default_lease_ttl_seconds(self) -> pulumi.Output[Optional[_builtins.int]]:
|
812
1372
|
"""
|
813
|
-
|
1373
|
+
Default lease duration for secrets in seconds
|
814
1374
|
"""
|
815
1375
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
816
1376
|
|
817
|
-
@property
|
1377
|
+
@_builtins.property
|
1378
|
+
@pulumi.getter(name="delegatedAuthAccessors")
|
1379
|
+
def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1380
|
+
"""
|
1381
|
+
List of headers to allow and pass from the request to the plugin
|
1382
|
+
"""
|
1383
|
+
return pulumi.get(self, "delegated_auth_accessors")
|
1384
|
+
|
1385
|
+
@_builtins.property
|
818
1386
|
@pulumi.getter
|
819
|
-
def description(self) -> pulumi.Output[Optional[
|
1387
|
+
def description(self) -> pulumi.Output[Optional[_builtins.str]]:
|
820
1388
|
"""
|
821
1389
|
A human-friendly description for this backend.
|
822
1390
|
"""
|
823
1391
|
return pulumi.get(self, "description")
|
824
1392
|
|
825
|
-
@property
|
1393
|
+
@_builtins.property
|
826
1394
|
@pulumi.getter(name="disableRemount")
|
827
|
-
def disable_remount(self) -> pulumi.Output[Optional[
|
1395
|
+
def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
828
1396
|
"""
|
829
1397
|
If set, opts out of mount migration on path updates.
|
830
1398
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
831
1399
|
"""
|
832
1400
|
return pulumi.get(self, "disable_remount")
|
833
1401
|
|
834
|
-
@property
|
1402
|
+
@_builtins.property
|
1403
|
+
@pulumi.getter(name="externalEntropyAccess")
|
1404
|
+
def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1405
|
+
"""
|
1406
|
+
Enable the secrets engine to access Vault's external entropy source
|
1407
|
+
"""
|
1408
|
+
return pulumi.get(self, "external_entropy_access")
|
1409
|
+
|
1410
|
+
@_builtins.property
|
1411
|
+
@pulumi.getter(name="forceNoCache")
|
1412
|
+
def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
|
1413
|
+
"""
|
1414
|
+
If set to true, disables caching.
|
1415
|
+
"""
|
1416
|
+
return pulumi.get(self, "force_no_cache")
|
1417
|
+
|
1418
|
+
@_builtins.property
|
1419
|
+
@pulumi.getter(name="identityTokenKey")
|
1420
|
+
def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1421
|
+
"""
|
1422
|
+
The key to use for signing plugin workload identity tokens
|
1423
|
+
"""
|
1424
|
+
return pulumi.get(self, "identity_token_key")
|
1425
|
+
|
1426
|
+
@_builtins.property
|
1427
|
+
@pulumi.getter(name="listingVisibility")
|
1428
|
+
def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1429
|
+
"""
|
1430
|
+
Specifies whether to show this mount in the UI-specific listing endpoint
|
1431
|
+
"""
|
1432
|
+
return pulumi.get(self, "listing_visibility")
|
1433
|
+
|
1434
|
+
@_builtins.property
|
835
1435
|
@pulumi.getter
|
836
|
-
def local(self) -> pulumi.Output[Optional[
|
1436
|
+
def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
837
1437
|
"""
|
838
|
-
Specifies if the secret backend is local only
|
1438
|
+
Specifies if the secret backend is local only
|
839
1439
|
"""
|
840
1440
|
return pulumi.get(self, "local")
|
841
1441
|
|
842
|
-
@property
|
1442
|
+
@_builtins.property
|
843
1443
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
844
|
-
def max_lease_ttl_seconds(self) -> pulumi.Output[Optional[
|
1444
|
+
def max_lease_ttl_seconds(self) -> pulumi.Output[Optional[_builtins.int]]:
|
845
1445
|
"""
|
846
|
-
|
847
|
-
for credentials issued by this backend.
|
1446
|
+
Maximum possible lease duration for secrets in seconds
|
848
1447
|
"""
|
849
1448
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
850
1449
|
|
851
|
-
@property
|
1450
|
+
@_builtins.property
|
852
1451
|
@pulumi.getter
|
853
|
-
def namespace(self) -> pulumi.Output[Optional[
|
1452
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
854
1453
|
"""
|
855
1454
|
The namespace to provision the resource in.
|
856
1455
|
The value should not contain leading or trailing forward slashes.
|
@@ -859,26 +1458,58 @@ class SecretBackend(pulumi.CustomResource):
|
|
859
1458
|
"""
|
860
1459
|
return pulumi.get(self, "namespace")
|
861
1460
|
|
862
|
-
@property
|
1461
|
+
@_builtins.property
|
863
1462
|
@pulumi.getter
|
864
|
-
def
|
1463
|
+
def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
|
1464
|
+
"""
|
1465
|
+
Specifies mount type specific options that are passed to the backend
|
1466
|
+
"""
|
1467
|
+
return pulumi.get(self, "options")
|
1468
|
+
|
1469
|
+
@_builtins.property
|
1470
|
+
@pulumi.getter(name="passthroughRequestHeaders")
|
1471
|
+
def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1472
|
+
"""
|
1473
|
+
List of headers to allow and pass from the request to the plugin
|
1474
|
+
"""
|
1475
|
+
return pulumi.get(self, "passthrough_request_headers")
|
1476
|
+
|
1477
|
+
@_builtins.property
|
1478
|
+
@pulumi.getter
|
1479
|
+
def path(self) -> pulumi.Output[Optional[_builtins.str]]:
|
865
1480
|
"""
|
866
1481
|
The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
|
867
1482
|
to `consul`.
|
868
1483
|
"""
|
869
1484
|
return pulumi.get(self, "path")
|
870
1485
|
|
871
|
-
@property
|
1486
|
+
@_builtins.property
|
1487
|
+
@pulumi.getter(name="pluginVersion")
|
1488
|
+
def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1489
|
+
"""
|
1490
|
+
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1491
|
+
"""
|
1492
|
+
return pulumi.get(self, "plugin_version")
|
1493
|
+
|
1494
|
+
@_builtins.property
|
872
1495
|
@pulumi.getter
|
873
|
-
def scheme(self) -> pulumi.Output[Optional[
|
1496
|
+
def scheme(self) -> pulumi.Output[Optional[_builtins.str]]:
|
874
1497
|
"""
|
875
1498
|
Specifies the URL scheme to use. Defaults to `http`.
|
876
1499
|
"""
|
877
1500
|
return pulumi.get(self, "scheme")
|
878
1501
|
|
879
|
-
@property
|
1502
|
+
@_builtins.property
|
1503
|
+
@pulumi.getter(name="sealWrap")
|
1504
|
+
def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
|
1505
|
+
"""
|
1506
|
+
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1507
|
+
"""
|
1508
|
+
return pulumi.get(self, "seal_wrap")
|
1509
|
+
|
1510
|
+
@_builtins.property
|
880
1511
|
@pulumi.getter
|
881
|
-
def token(self) -> pulumi.Output[Optional[
|
1512
|
+
def token(self) -> pulumi.Output[Optional[_builtins.str]]:
|
882
1513
|
"""
|
883
1514
|
Specifies the Consul token to use when managing or issuing new tokens.
|
884
1515
|
"""
|