pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +19 -1
- pulumi_vault/_inputs.py +873 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +1016 -439
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +1057 -285
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +887 -256
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +426 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +878 -336
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +400 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +1006 -227
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +431 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +732 -693
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +380 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +909 -271
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +234 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +205 -159
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +902 -231
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +217 -124
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +833 -155
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +377 -350
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0.dist-info/RECORD +270 -0
- pulumi_vault-7.1.0.dist-info/RECORD +0 -268
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,61 +19,63 @@ __all__ = ['SecretBackendArgs', 'SecretBackend']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class SecretBackendArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
path: pulumi.Input[
|
24
|
-
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
25
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
26
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
27
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
28
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
29
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[
|
30
|
-
description: Optional[pulumi.Input[
|
31
|
-
disable_local_ca_jwt: Optional[pulumi.Input[
|
32
|
-
external_entropy_access: Optional[pulumi.Input[
|
33
|
-
|
34
|
-
|
35
|
-
|
36
|
-
|
37
|
-
|
38
|
-
|
39
|
-
|
40
|
-
|
41
|
-
|
42
|
-
|
43
|
-
|
44
|
-
|
22
|
+
path: pulumi.Input[_builtins.str],
|
23
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
24
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
25
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
26
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
27
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
28
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
29
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
30
|
+
disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
|
31
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
32
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
33
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
34
|
+
kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
35
|
+
kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
|
36
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
37
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
38
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
39
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
40
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
41
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
42
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
43
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
44
|
+
service_account_jwt: Optional[pulumi.Input[_builtins.str]] = None):
|
45
45
|
"""
|
46
46
|
The set of arguments for constructing a SecretBackend resource.
|
47
|
-
:param pulumi.Input[
|
48
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
49
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
50
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
51
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
52
|
-
:param pulumi.Input[
|
53
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
54
|
-
:param pulumi.Input[
|
55
|
-
:param pulumi.Input[
|
47
|
+
:param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
|
48
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
49
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
50
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
51
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
52
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
53
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
54
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
55
|
+
:param pulumi.Input[_builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
|
56
56
|
service account JWT when Vault is running in a Kubernetes pod.
|
57
|
-
:param pulumi.Input[
|
58
|
-
:param pulumi.Input[
|
59
|
-
:param pulumi.Input[
|
57
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
58
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
59
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
60
|
+
:param pulumi.Input[_builtins.str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
|
60
61
|
secrets engine to verify the Kubernetes API server certificate. Defaults to the local
|
61
62
|
pod’s CA if Vault is running in Kubernetes. Otherwise, defaults to the root CA set where
|
62
63
|
Vault is running.
|
63
|
-
:param pulumi.Input[
|
64
|
+
:param pulumi.Input[_builtins.str] kubernetes_host: The Kubernetes API URL to connect to. Required if the
|
64
65
|
standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
|
65
66
|
are not set on the host that Vault is running on.
|
66
|
-
:param pulumi.Input[
|
67
|
-
:param pulumi.Input[
|
68
|
-
:param pulumi.Input[
|
69
|
-
:param pulumi.Input[
|
67
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
68
|
+
:param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
69
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
70
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
70
71
|
The value should not contain leading or trailing forward slashes.
|
71
72
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
72
73
|
*Available only for Vault Enterprise*.
|
73
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
74
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
75
|
-
:param pulumi.Input[
|
76
|
-
:param pulumi.Input[
|
77
|
-
:param pulumi.Input[
|
74
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
75
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
76
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
77
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
78
|
+
:param pulumi.Input[_builtins.str] service_account_jwt: The JSON web token of the service account used by the
|
78
79
|
secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
|
79
80
|
is running in Kubernetes.
|
80
81
|
"""
|
@@ -97,6 +98,8 @@ class SecretBackendArgs:
|
|
97
98
|
pulumi.set(__self__, "disable_local_ca_jwt", disable_local_ca_jwt)
|
98
99
|
if external_entropy_access is not None:
|
99
100
|
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
101
|
+
if force_no_cache is not None:
|
102
|
+
pulumi.set(__self__, "force_no_cache", force_no_cache)
|
100
103
|
if identity_token_key is not None:
|
101
104
|
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
102
105
|
if kubernetes_ca_cert is not None:
|
@@ -122,105 +125,105 @@ class SecretBackendArgs:
|
|
122
125
|
if service_account_jwt is not None:
|
123
126
|
pulumi.set(__self__, "service_account_jwt", service_account_jwt)
|
124
127
|
|
125
|
-
@property
|
128
|
+
@_builtins.property
|
126
129
|
@pulumi.getter
|
127
|
-
def path(self) -> pulumi.Input[
|
130
|
+
def path(self) -> pulumi.Input[_builtins.str]:
|
128
131
|
"""
|
129
132
|
Where the secret backend will be mounted
|
130
133
|
"""
|
131
134
|
return pulumi.get(self, "path")
|
132
135
|
|
133
136
|
@path.setter
|
134
|
-
def path(self, value: pulumi.Input[
|
137
|
+
def path(self, value: pulumi.Input[_builtins.str]):
|
135
138
|
pulumi.set(self, "path", value)
|
136
139
|
|
137
|
-
@property
|
140
|
+
@_builtins.property
|
138
141
|
@pulumi.getter(name="allowedManagedKeys")
|
139
|
-
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
142
|
+
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
140
143
|
"""
|
141
144
|
List of managed key registry entry names that the mount in question is allowed to access
|
142
145
|
"""
|
143
146
|
return pulumi.get(self, "allowed_managed_keys")
|
144
147
|
|
145
148
|
@allowed_managed_keys.setter
|
146
|
-
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
149
|
+
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
147
150
|
pulumi.set(self, "allowed_managed_keys", value)
|
148
151
|
|
149
|
-
@property
|
152
|
+
@_builtins.property
|
150
153
|
@pulumi.getter(name="allowedResponseHeaders")
|
151
|
-
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
154
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
152
155
|
"""
|
153
156
|
List of headers to allow and pass from the request to the plugin
|
154
157
|
"""
|
155
158
|
return pulumi.get(self, "allowed_response_headers")
|
156
159
|
|
157
160
|
@allowed_response_headers.setter
|
158
|
-
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
161
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
159
162
|
pulumi.set(self, "allowed_response_headers", value)
|
160
163
|
|
161
|
-
@property
|
164
|
+
@_builtins.property
|
162
165
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
163
|
-
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
166
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
164
167
|
"""
|
165
168
|
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
166
169
|
"""
|
167
170
|
return pulumi.get(self, "audit_non_hmac_request_keys")
|
168
171
|
|
169
172
|
@audit_non_hmac_request_keys.setter
|
170
|
-
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
173
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
171
174
|
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
172
175
|
|
173
|
-
@property
|
176
|
+
@_builtins.property
|
174
177
|
@pulumi.getter(name="auditNonHmacResponseKeys")
|
175
|
-
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
178
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
176
179
|
"""
|
177
180
|
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
178
181
|
"""
|
179
182
|
return pulumi.get(self, "audit_non_hmac_response_keys")
|
180
183
|
|
181
184
|
@audit_non_hmac_response_keys.setter
|
182
|
-
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
185
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
183
186
|
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
184
187
|
|
185
|
-
@property
|
188
|
+
@_builtins.property
|
186
189
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
187
|
-
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
190
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
188
191
|
"""
|
189
192
|
Default lease duration for tokens and secrets in seconds
|
190
193
|
"""
|
191
194
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
192
195
|
|
193
196
|
@default_lease_ttl_seconds.setter
|
194
|
-
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
197
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
195
198
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
196
199
|
|
197
|
-
@property
|
200
|
+
@_builtins.property
|
198
201
|
@pulumi.getter(name="delegatedAuthAccessors")
|
199
|
-
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
202
|
+
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
200
203
|
"""
|
201
204
|
List of headers to allow and pass from the request to the plugin
|
202
205
|
"""
|
203
206
|
return pulumi.get(self, "delegated_auth_accessors")
|
204
207
|
|
205
208
|
@delegated_auth_accessors.setter
|
206
|
-
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
209
|
+
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
207
210
|
pulumi.set(self, "delegated_auth_accessors", value)
|
208
211
|
|
209
|
-
@property
|
212
|
+
@_builtins.property
|
210
213
|
@pulumi.getter
|
211
|
-
def description(self) -> Optional[pulumi.Input[
|
214
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
212
215
|
"""
|
213
216
|
Human-friendly description of the mount
|
214
217
|
"""
|
215
218
|
return pulumi.get(self, "description")
|
216
219
|
|
217
220
|
@description.setter
|
218
|
-
def description(self, value: Optional[pulumi.Input[
|
221
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
219
222
|
pulumi.set(self, "description", value)
|
220
223
|
|
221
|
-
@property
|
224
|
+
@_builtins.property
|
222
225
|
@pulumi.getter(name="disableLocalCaJwt")
|
223
|
-
def disable_local_ca_jwt(self) -> Optional[pulumi.Input[
|
226
|
+
def disable_local_ca_jwt(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
224
227
|
"""
|
225
228
|
Disable defaulting to the local CA certificate and
|
226
229
|
service account JWT when Vault is running in a Kubernetes pod.
|
@@ -228,36 +231,48 @@ class SecretBackendArgs:
|
|
228
231
|
return pulumi.get(self, "disable_local_ca_jwt")
|
229
232
|
|
230
233
|
@disable_local_ca_jwt.setter
|
231
|
-
def disable_local_ca_jwt(self, value: Optional[pulumi.Input[
|
234
|
+
def disable_local_ca_jwt(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
232
235
|
pulumi.set(self, "disable_local_ca_jwt", value)
|
233
236
|
|
234
|
-
@property
|
237
|
+
@_builtins.property
|
235
238
|
@pulumi.getter(name="externalEntropyAccess")
|
236
|
-
def external_entropy_access(self) -> Optional[pulumi.Input[
|
239
|
+
def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
237
240
|
"""
|
238
241
|
Enable the secrets engine to access Vault's external entropy source
|
239
242
|
"""
|
240
243
|
return pulumi.get(self, "external_entropy_access")
|
241
244
|
|
242
245
|
@external_entropy_access.setter
|
243
|
-
def external_entropy_access(self, value: Optional[pulumi.Input[
|
246
|
+
def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
244
247
|
pulumi.set(self, "external_entropy_access", value)
|
245
248
|
|
246
|
-
@property
|
249
|
+
@_builtins.property
|
250
|
+
@pulumi.getter(name="forceNoCache")
|
251
|
+
def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
252
|
+
"""
|
253
|
+
If set to true, disables caching.
|
254
|
+
"""
|
255
|
+
return pulumi.get(self, "force_no_cache")
|
256
|
+
|
257
|
+
@force_no_cache.setter
|
258
|
+
def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
259
|
+
pulumi.set(self, "force_no_cache", value)
|
260
|
+
|
261
|
+
@_builtins.property
|
247
262
|
@pulumi.getter(name="identityTokenKey")
|
248
|
-
def identity_token_key(self) -> Optional[pulumi.Input[
|
263
|
+
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
249
264
|
"""
|
250
265
|
The key to use for signing plugin workload identity tokens
|
251
266
|
"""
|
252
267
|
return pulumi.get(self, "identity_token_key")
|
253
268
|
|
254
269
|
@identity_token_key.setter
|
255
|
-
def identity_token_key(self, value: Optional[pulumi.Input[
|
270
|
+
def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
256
271
|
pulumi.set(self, "identity_token_key", value)
|
257
272
|
|
258
|
-
@property
|
273
|
+
@_builtins.property
|
259
274
|
@pulumi.getter(name="kubernetesCaCert")
|
260
|
-
def kubernetes_ca_cert(self) -> Optional[pulumi.Input[
|
275
|
+
def kubernetes_ca_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
|
261
276
|
"""
|
262
277
|
A PEM-encoded CA certificate used by the
|
263
278
|
secrets engine to verify the Kubernetes API server certificate. Defaults to the local
|
@@ -267,12 +282,12 @@ class SecretBackendArgs:
|
|
267
282
|
return pulumi.get(self, "kubernetes_ca_cert")
|
268
283
|
|
269
284
|
@kubernetes_ca_cert.setter
|
270
|
-
def kubernetes_ca_cert(self, value: Optional[pulumi.Input[
|
285
|
+
def kubernetes_ca_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
|
271
286
|
pulumi.set(self, "kubernetes_ca_cert", value)
|
272
287
|
|
273
|
-
@property
|
288
|
+
@_builtins.property
|
274
289
|
@pulumi.getter(name="kubernetesHost")
|
275
|
-
def kubernetes_host(self) -> Optional[pulumi.Input[
|
290
|
+
def kubernetes_host(self) -> Optional[pulumi.Input[_builtins.str]]:
|
276
291
|
"""
|
277
292
|
The Kubernetes API URL to connect to. Required if the
|
278
293
|
standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
|
@@ -281,48 +296,48 @@ class SecretBackendArgs:
|
|
281
296
|
return pulumi.get(self, "kubernetes_host")
|
282
297
|
|
283
298
|
@kubernetes_host.setter
|
284
|
-
def kubernetes_host(self, value: Optional[pulumi.Input[
|
299
|
+
def kubernetes_host(self, value: Optional[pulumi.Input[_builtins.str]]):
|
285
300
|
pulumi.set(self, "kubernetes_host", value)
|
286
301
|
|
287
|
-
@property
|
302
|
+
@_builtins.property
|
288
303
|
@pulumi.getter(name="listingVisibility")
|
289
|
-
def listing_visibility(self) -> Optional[pulumi.Input[
|
304
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
290
305
|
"""
|
291
306
|
Specifies whether to show this mount in the UI-specific listing endpoint
|
292
307
|
"""
|
293
308
|
return pulumi.get(self, "listing_visibility")
|
294
309
|
|
295
310
|
@listing_visibility.setter
|
296
|
-
def listing_visibility(self, value: Optional[pulumi.Input[
|
311
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
297
312
|
pulumi.set(self, "listing_visibility", value)
|
298
313
|
|
299
|
-
@property
|
314
|
+
@_builtins.property
|
300
315
|
@pulumi.getter
|
301
|
-
def local(self) -> Optional[pulumi.Input[
|
316
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
302
317
|
"""
|
303
318
|
Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
304
319
|
"""
|
305
320
|
return pulumi.get(self, "local")
|
306
321
|
|
307
322
|
@local.setter
|
308
|
-
def local(self, value: Optional[pulumi.Input[
|
323
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
309
324
|
pulumi.set(self, "local", value)
|
310
325
|
|
311
|
-
@property
|
326
|
+
@_builtins.property
|
312
327
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
313
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
328
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
314
329
|
"""
|
315
330
|
Maximum possible lease duration for tokens and secrets in seconds
|
316
331
|
"""
|
317
332
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
318
333
|
|
319
334
|
@max_lease_ttl_seconds.setter
|
320
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
335
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
321
336
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
322
337
|
|
323
|
-
@property
|
338
|
+
@_builtins.property
|
324
339
|
@pulumi.getter
|
325
|
-
def namespace(self) -> Optional[pulumi.Input[
|
340
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
326
341
|
"""
|
327
342
|
The namespace to provision the resource in.
|
328
343
|
The value should not contain leading or trailing forward slashes.
|
@@ -332,60 +347,60 @@ class SecretBackendArgs:
|
|
332
347
|
return pulumi.get(self, "namespace")
|
333
348
|
|
334
349
|
@namespace.setter
|
335
|
-
def namespace(self, value: Optional[pulumi.Input[
|
350
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
336
351
|
pulumi.set(self, "namespace", value)
|
337
352
|
|
338
|
-
@property
|
353
|
+
@_builtins.property
|
339
354
|
@pulumi.getter
|
340
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
355
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
341
356
|
"""
|
342
357
|
Specifies mount type specific options that are passed to the backend
|
343
358
|
"""
|
344
359
|
return pulumi.get(self, "options")
|
345
360
|
|
346
361
|
@options.setter
|
347
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
362
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
348
363
|
pulumi.set(self, "options", value)
|
349
364
|
|
350
|
-
@property
|
365
|
+
@_builtins.property
|
351
366
|
@pulumi.getter(name="passthroughRequestHeaders")
|
352
|
-
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
367
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
353
368
|
"""
|
354
369
|
List of headers to allow and pass from the request to the plugin
|
355
370
|
"""
|
356
371
|
return pulumi.get(self, "passthrough_request_headers")
|
357
372
|
|
358
373
|
@passthrough_request_headers.setter
|
359
|
-
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
374
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
360
375
|
pulumi.set(self, "passthrough_request_headers", value)
|
361
376
|
|
362
|
-
@property
|
377
|
+
@_builtins.property
|
363
378
|
@pulumi.getter(name="pluginVersion")
|
364
|
-
def plugin_version(self) -> Optional[pulumi.Input[
|
379
|
+
def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
|
365
380
|
"""
|
366
381
|
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
367
382
|
"""
|
368
383
|
return pulumi.get(self, "plugin_version")
|
369
384
|
|
370
385
|
@plugin_version.setter
|
371
|
-
def plugin_version(self, value: Optional[pulumi.Input[
|
386
|
+
def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
|
372
387
|
pulumi.set(self, "plugin_version", value)
|
373
388
|
|
374
|
-
@property
|
389
|
+
@_builtins.property
|
375
390
|
@pulumi.getter(name="sealWrap")
|
376
|
-
def seal_wrap(self) -> Optional[pulumi.Input[
|
391
|
+
def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
377
392
|
"""
|
378
393
|
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
379
394
|
"""
|
380
395
|
return pulumi.get(self, "seal_wrap")
|
381
396
|
|
382
397
|
@seal_wrap.setter
|
383
|
-
def seal_wrap(self, value: Optional[pulumi.Input[
|
398
|
+
def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
384
399
|
pulumi.set(self, "seal_wrap", value)
|
385
400
|
|
386
|
-
@property
|
401
|
+
@_builtins.property
|
387
402
|
@pulumi.getter(name="serviceAccountJwt")
|
388
|
-
def service_account_jwt(self) -> Optional[pulumi.Input[
|
403
|
+
def service_account_jwt(self) -> Optional[pulumi.Input[_builtins.str]]:
|
389
404
|
"""
|
390
405
|
The JSON web token of the service account used by the
|
391
406
|
secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
|
@@ -394,70 +409,72 @@ class SecretBackendArgs:
|
|
394
409
|
return pulumi.get(self, "service_account_jwt")
|
395
410
|
|
396
411
|
@service_account_jwt.setter
|
397
|
-
def service_account_jwt(self, value: Optional[pulumi.Input[
|
412
|
+
def service_account_jwt(self, value: Optional[pulumi.Input[_builtins.str]]):
|
398
413
|
pulumi.set(self, "service_account_jwt", value)
|
399
414
|
|
400
415
|
|
401
416
|
@pulumi.input_type
|
402
417
|
class _SecretBackendState:
|
403
418
|
def __init__(__self__, *,
|
404
|
-
accessor: Optional[pulumi.Input[
|
405
|
-
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
406
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
407
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
408
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
409
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
410
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[
|
411
|
-
description: Optional[pulumi.Input[
|
412
|
-
disable_local_ca_jwt: Optional[pulumi.Input[
|
413
|
-
external_entropy_access: Optional[pulumi.Input[
|
414
|
-
|
415
|
-
|
416
|
-
|
417
|
-
|
418
|
-
|
419
|
-
|
420
|
-
|
421
|
-
|
422
|
-
|
423
|
-
|
424
|
-
|
425
|
-
|
426
|
-
|
419
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
420
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
421
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
422
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
423
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
424
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
425
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
426
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
427
|
+
disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
|
428
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
429
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
430
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
431
|
+
kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
432
|
+
kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
|
433
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
434
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
435
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
436
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
437
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
438
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
439
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
440
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
441
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
442
|
+
service_account_jwt: Optional[pulumi.Input[_builtins.str]] = None):
|
427
443
|
"""
|
428
444
|
Input properties used for looking up and filtering SecretBackend resources.
|
429
|
-
:param pulumi.Input[
|
430
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
431
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
432
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
433
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
434
|
-
:param pulumi.Input[
|
435
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
436
|
-
:param pulumi.Input[
|
437
|
-
:param pulumi.Input[
|
445
|
+
:param pulumi.Input[_builtins.str] accessor: Accessor of the mount
|
446
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
447
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
448
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
449
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
450
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
451
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
452
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
453
|
+
:param pulumi.Input[_builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
|
438
454
|
service account JWT when Vault is running in a Kubernetes pod.
|
439
|
-
:param pulumi.Input[
|
440
|
-
:param pulumi.Input[
|
441
|
-
:param pulumi.Input[
|
455
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
456
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
457
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
458
|
+
:param pulumi.Input[_builtins.str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
|
442
459
|
secrets engine to verify the Kubernetes API server certificate. Defaults to the local
|
443
460
|
pod’s CA if Vault is running in Kubernetes. Otherwise, defaults to the root CA set where
|
444
461
|
Vault is running.
|
445
|
-
:param pulumi.Input[
|
462
|
+
:param pulumi.Input[_builtins.str] kubernetes_host: The Kubernetes API URL to connect to. Required if the
|
446
463
|
standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
|
447
464
|
are not set on the host that Vault is running on.
|
448
|
-
:param pulumi.Input[
|
449
|
-
:param pulumi.Input[
|
450
|
-
:param pulumi.Input[
|
451
|
-
:param pulumi.Input[
|
465
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
466
|
+
:param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
467
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
468
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
452
469
|
The value should not contain leading or trailing forward slashes.
|
453
470
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
454
471
|
*Available only for Vault Enterprise*.
|
455
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
456
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
457
|
-
:param pulumi.Input[
|
458
|
-
:param pulumi.Input[
|
459
|
-
:param pulumi.Input[
|
460
|
-
:param pulumi.Input[
|
472
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
473
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
474
|
+
:param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
|
475
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
476
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
477
|
+
:param pulumi.Input[_builtins.str] service_account_jwt: The JSON web token of the service account used by the
|
461
478
|
secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
|
462
479
|
is running in Kubernetes.
|
463
480
|
"""
|
@@ -481,6 +498,8 @@ class _SecretBackendState:
|
|
481
498
|
pulumi.set(__self__, "disable_local_ca_jwt", disable_local_ca_jwt)
|
482
499
|
if external_entropy_access is not None:
|
483
500
|
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
501
|
+
if force_no_cache is not None:
|
502
|
+
pulumi.set(__self__, "force_no_cache", force_no_cache)
|
484
503
|
if identity_token_key is not None:
|
485
504
|
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
486
505
|
if kubernetes_ca_cert is not None:
|
@@ -508,105 +527,105 @@ class _SecretBackendState:
|
|
508
527
|
if service_account_jwt is not None:
|
509
528
|
pulumi.set(__self__, "service_account_jwt", service_account_jwt)
|
510
529
|
|
511
|
-
@property
|
530
|
+
@_builtins.property
|
512
531
|
@pulumi.getter
|
513
|
-
def accessor(self) -> Optional[pulumi.Input[
|
532
|
+
def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
|
514
533
|
"""
|
515
534
|
Accessor of the mount
|
516
535
|
"""
|
517
536
|
return pulumi.get(self, "accessor")
|
518
537
|
|
519
538
|
@accessor.setter
|
520
|
-
def accessor(self, value: Optional[pulumi.Input[
|
539
|
+
def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
|
521
540
|
pulumi.set(self, "accessor", value)
|
522
541
|
|
523
|
-
@property
|
542
|
+
@_builtins.property
|
524
543
|
@pulumi.getter(name="allowedManagedKeys")
|
525
|
-
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
544
|
+
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
526
545
|
"""
|
527
546
|
List of managed key registry entry names that the mount in question is allowed to access
|
528
547
|
"""
|
529
548
|
return pulumi.get(self, "allowed_managed_keys")
|
530
549
|
|
531
550
|
@allowed_managed_keys.setter
|
532
|
-
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
551
|
+
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
533
552
|
pulumi.set(self, "allowed_managed_keys", value)
|
534
553
|
|
535
|
-
@property
|
554
|
+
@_builtins.property
|
536
555
|
@pulumi.getter(name="allowedResponseHeaders")
|
537
|
-
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
556
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
538
557
|
"""
|
539
558
|
List of headers to allow and pass from the request to the plugin
|
540
559
|
"""
|
541
560
|
return pulumi.get(self, "allowed_response_headers")
|
542
561
|
|
543
562
|
@allowed_response_headers.setter
|
544
|
-
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
563
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
545
564
|
pulumi.set(self, "allowed_response_headers", value)
|
546
565
|
|
547
|
-
@property
|
566
|
+
@_builtins.property
|
548
567
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
549
|
-
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
568
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
550
569
|
"""
|
551
570
|
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
552
571
|
"""
|
553
572
|
return pulumi.get(self, "audit_non_hmac_request_keys")
|
554
573
|
|
555
574
|
@audit_non_hmac_request_keys.setter
|
556
|
-
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
575
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
557
576
|
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
558
577
|
|
559
|
-
@property
|
578
|
+
@_builtins.property
|
560
579
|
@pulumi.getter(name="auditNonHmacResponseKeys")
|
561
|
-
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
580
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
562
581
|
"""
|
563
582
|
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
564
583
|
"""
|
565
584
|
return pulumi.get(self, "audit_non_hmac_response_keys")
|
566
585
|
|
567
586
|
@audit_non_hmac_response_keys.setter
|
568
|
-
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
587
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
569
588
|
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
570
589
|
|
571
|
-
@property
|
590
|
+
@_builtins.property
|
572
591
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
573
|
-
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
592
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
574
593
|
"""
|
575
594
|
Default lease duration for tokens and secrets in seconds
|
576
595
|
"""
|
577
596
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
578
597
|
|
579
598
|
@default_lease_ttl_seconds.setter
|
580
|
-
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
599
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
581
600
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
582
601
|
|
583
|
-
@property
|
602
|
+
@_builtins.property
|
584
603
|
@pulumi.getter(name="delegatedAuthAccessors")
|
585
|
-
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
604
|
+
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
586
605
|
"""
|
587
606
|
List of headers to allow and pass from the request to the plugin
|
588
607
|
"""
|
589
608
|
return pulumi.get(self, "delegated_auth_accessors")
|
590
609
|
|
591
610
|
@delegated_auth_accessors.setter
|
592
|
-
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
611
|
+
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
593
612
|
pulumi.set(self, "delegated_auth_accessors", value)
|
594
613
|
|
595
|
-
@property
|
614
|
+
@_builtins.property
|
596
615
|
@pulumi.getter
|
597
|
-
def description(self) -> Optional[pulumi.Input[
|
616
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
598
617
|
"""
|
599
618
|
Human-friendly description of the mount
|
600
619
|
"""
|
601
620
|
return pulumi.get(self, "description")
|
602
621
|
|
603
622
|
@description.setter
|
604
|
-
def description(self, value: Optional[pulumi.Input[
|
623
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
605
624
|
pulumi.set(self, "description", value)
|
606
625
|
|
607
|
-
@property
|
626
|
+
@_builtins.property
|
608
627
|
@pulumi.getter(name="disableLocalCaJwt")
|
609
|
-
def disable_local_ca_jwt(self) -> Optional[pulumi.Input[
|
628
|
+
def disable_local_ca_jwt(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
610
629
|
"""
|
611
630
|
Disable defaulting to the local CA certificate and
|
612
631
|
service account JWT when Vault is running in a Kubernetes pod.
|
@@ -614,36 +633,48 @@ class _SecretBackendState:
|
|
614
633
|
return pulumi.get(self, "disable_local_ca_jwt")
|
615
634
|
|
616
635
|
@disable_local_ca_jwt.setter
|
617
|
-
def disable_local_ca_jwt(self, value: Optional[pulumi.Input[
|
636
|
+
def disable_local_ca_jwt(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
618
637
|
pulumi.set(self, "disable_local_ca_jwt", value)
|
619
638
|
|
620
|
-
@property
|
639
|
+
@_builtins.property
|
621
640
|
@pulumi.getter(name="externalEntropyAccess")
|
622
|
-
def external_entropy_access(self) -> Optional[pulumi.Input[
|
641
|
+
def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
623
642
|
"""
|
624
643
|
Enable the secrets engine to access Vault's external entropy source
|
625
644
|
"""
|
626
645
|
return pulumi.get(self, "external_entropy_access")
|
627
646
|
|
628
647
|
@external_entropy_access.setter
|
629
|
-
def external_entropy_access(self, value: Optional[pulumi.Input[
|
648
|
+
def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
630
649
|
pulumi.set(self, "external_entropy_access", value)
|
631
650
|
|
632
|
-
@property
|
651
|
+
@_builtins.property
|
652
|
+
@pulumi.getter(name="forceNoCache")
|
653
|
+
def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
654
|
+
"""
|
655
|
+
If set to true, disables caching.
|
656
|
+
"""
|
657
|
+
return pulumi.get(self, "force_no_cache")
|
658
|
+
|
659
|
+
@force_no_cache.setter
|
660
|
+
def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
661
|
+
pulumi.set(self, "force_no_cache", value)
|
662
|
+
|
663
|
+
@_builtins.property
|
633
664
|
@pulumi.getter(name="identityTokenKey")
|
634
|
-
def identity_token_key(self) -> Optional[pulumi.Input[
|
665
|
+
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
635
666
|
"""
|
636
667
|
The key to use for signing plugin workload identity tokens
|
637
668
|
"""
|
638
669
|
return pulumi.get(self, "identity_token_key")
|
639
670
|
|
640
671
|
@identity_token_key.setter
|
641
|
-
def identity_token_key(self, value: Optional[pulumi.Input[
|
672
|
+
def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
642
673
|
pulumi.set(self, "identity_token_key", value)
|
643
674
|
|
644
|
-
@property
|
675
|
+
@_builtins.property
|
645
676
|
@pulumi.getter(name="kubernetesCaCert")
|
646
|
-
def kubernetes_ca_cert(self) -> Optional[pulumi.Input[
|
677
|
+
def kubernetes_ca_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
|
647
678
|
"""
|
648
679
|
A PEM-encoded CA certificate used by the
|
649
680
|
secrets engine to verify the Kubernetes API server certificate. Defaults to the local
|
@@ -653,12 +684,12 @@ class _SecretBackendState:
|
|
653
684
|
return pulumi.get(self, "kubernetes_ca_cert")
|
654
685
|
|
655
686
|
@kubernetes_ca_cert.setter
|
656
|
-
def kubernetes_ca_cert(self, value: Optional[pulumi.Input[
|
687
|
+
def kubernetes_ca_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
|
657
688
|
pulumi.set(self, "kubernetes_ca_cert", value)
|
658
689
|
|
659
|
-
@property
|
690
|
+
@_builtins.property
|
660
691
|
@pulumi.getter(name="kubernetesHost")
|
661
|
-
def kubernetes_host(self) -> Optional[pulumi.Input[
|
692
|
+
def kubernetes_host(self) -> Optional[pulumi.Input[_builtins.str]]:
|
662
693
|
"""
|
663
694
|
The Kubernetes API URL to connect to. Required if the
|
664
695
|
standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
|
@@ -667,48 +698,48 @@ class _SecretBackendState:
|
|
667
698
|
return pulumi.get(self, "kubernetes_host")
|
668
699
|
|
669
700
|
@kubernetes_host.setter
|
670
|
-
def kubernetes_host(self, value: Optional[pulumi.Input[
|
701
|
+
def kubernetes_host(self, value: Optional[pulumi.Input[_builtins.str]]):
|
671
702
|
pulumi.set(self, "kubernetes_host", value)
|
672
703
|
|
673
|
-
@property
|
704
|
+
@_builtins.property
|
674
705
|
@pulumi.getter(name="listingVisibility")
|
675
|
-
def listing_visibility(self) -> Optional[pulumi.Input[
|
706
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
676
707
|
"""
|
677
708
|
Specifies whether to show this mount in the UI-specific listing endpoint
|
678
709
|
"""
|
679
710
|
return pulumi.get(self, "listing_visibility")
|
680
711
|
|
681
712
|
@listing_visibility.setter
|
682
|
-
def listing_visibility(self, value: Optional[pulumi.Input[
|
713
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
683
714
|
pulumi.set(self, "listing_visibility", value)
|
684
715
|
|
685
|
-
@property
|
716
|
+
@_builtins.property
|
686
717
|
@pulumi.getter
|
687
|
-
def local(self) -> Optional[pulumi.Input[
|
718
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
688
719
|
"""
|
689
720
|
Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
690
721
|
"""
|
691
722
|
return pulumi.get(self, "local")
|
692
723
|
|
693
724
|
@local.setter
|
694
|
-
def local(self, value: Optional[pulumi.Input[
|
725
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
695
726
|
pulumi.set(self, "local", value)
|
696
727
|
|
697
|
-
@property
|
728
|
+
@_builtins.property
|
698
729
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
699
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
730
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
700
731
|
"""
|
701
732
|
Maximum possible lease duration for tokens and secrets in seconds
|
702
733
|
"""
|
703
734
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
704
735
|
|
705
736
|
@max_lease_ttl_seconds.setter
|
706
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
737
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
707
738
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
708
739
|
|
709
|
-
@property
|
740
|
+
@_builtins.property
|
710
741
|
@pulumi.getter
|
711
|
-
def namespace(self) -> Optional[pulumi.Input[
|
742
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
712
743
|
"""
|
713
744
|
The namespace to provision the resource in.
|
714
745
|
The value should not contain leading or trailing forward slashes.
|
@@ -718,72 +749,72 @@ class _SecretBackendState:
|
|
718
749
|
return pulumi.get(self, "namespace")
|
719
750
|
|
720
751
|
@namespace.setter
|
721
|
-
def namespace(self, value: Optional[pulumi.Input[
|
752
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
722
753
|
pulumi.set(self, "namespace", value)
|
723
754
|
|
724
|
-
@property
|
755
|
+
@_builtins.property
|
725
756
|
@pulumi.getter
|
726
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
757
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
727
758
|
"""
|
728
759
|
Specifies mount type specific options that are passed to the backend
|
729
760
|
"""
|
730
761
|
return pulumi.get(self, "options")
|
731
762
|
|
732
763
|
@options.setter
|
733
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
764
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
734
765
|
pulumi.set(self, "options", value)
|
735
766
|
|
736
|
-
@property
|
767
|
+
@_builtins.property
|
737
768
|
@pulumi.getter(name="passthroughRequestHeaders")
|
738
|
-
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
769
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
739
770
|
"""
|
740
771
|
List of headers to allow and pass from the request to the plugin
|
741
772
|
"""
|
742
773
|
return pulumi.get(self, "passthrough_request_headers")
|
743
774
|
|
744
775
|
@passthrough_request_headers.setter
|
745
|
-
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
776
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
746
777
|
pulumi.set(self, "passthrough_request_headers", value)
|
747
778
|
|
748
|
-
@property
|
779
|
+
@_builtins.property
|
749
780
|
@pulumi.getter
|
750
|
-
def path(self) -> Optional[pulumi.Input[
|
781
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
751
782
|
"""
|
752
783
|
Where the secret backend will be mounted
|
753
784
|
"""
|
754
785
|
return pulumi.get(self, "path")
|
755
786
|
|
756
787
|
@path.setter
|
757
|
-
def path(self, value: Optional[pulumi.Input[
|
788
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
758
789
|
pulumi.set(self, "path", value)
|
759
790
|
|
760
|
-
@property
|
791
|
+
@_builtins.property
|
761
792
|
@pulumi.getter(name="pluginVersion")
|
762
|
-
def plugin_version(self) -> Optional[pulumi.Input[
|
793
|
+
def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
|
763
794
|
"""
|
764
795
|
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
765
796
|
"""
|
766
797
|
return pulumi.get(self, "plugin_version")
|
767
798
|
|
768
799
|
@plugin_version.setter
|
769
|
-
def plugin_version(self, value: Optional[pulumi.Input[
|
800
|
+
def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
|
770
801
|
pulumi.set(self, "plugin_version", value)
|
771
802
|
|
772
|
-
@property
|
803
|
+
@_builtins.property
|
773
804
|
@pulumi.getter(name="sealWrap")
|
774
|
-
def seal_wrap(self) -> Optional[pulumi.Input[
|
805
|
+
def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
775
806
|
"""
|
776
807
|
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
777
808
|
"""
|
778
809
|
return pulumi.get(self, "seal_wrap")
|
779
810
|
|
780
811
|
@seal_wrap.setter
|
781
|
-
def seal_wrap(self, value: Optional[pulumi.Input[
|
812
|
+
def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
782
813
|
pulumi.set(self, "seal_wrap", value)
|
783
814
|
|
784
|
-
@property
|
815
|
+
@_builtins.property
|
785
816
|
@pulumi.getter(name="serviceAccountJwt")
|
786
|
-
def service_account_jwt(self) -> Optional[pulumi.Input[
|
817
|
+
def service_account_jwt(self) -> Optional[pulumi.Input[_builtins.str]]:
|
787
818
|
"""
|
788
819
|
The JSON web token of the service account used by the
|
789
820
|
secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
|
@@ -792,7 +823,7 @@ class _SecretBackendState:
|
|
792
823
|
return pulumi.get(self, "service_account_jwt")
|
793
824
|
|
794
825
|
@service_account_jwt.setter
|
795
|
-
def service_account_jwt(self, value: Optional[pulumi.Input[
|
826
|
+
def service_account_jwt(self, value: Optional[pulumi.Input[_builtins.str]]):
|
796
827
|
pulumi.set(self, "service_account_jwt", value)
|
797
828
|
|
798
829
|
|
@@ -802,28 +833,29 @@ class SecretBackend(pulumi.CustomResource):
|
|
802
833
|
def __init__(__self__,
|
803
834
|
resource_name: str,
|
804
835
|
opts: Optional[pulumi.ResourceOptions] = None,
|
805
|
-
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
806
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
807
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
808
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
809
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
810
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[
|
811
|
-
description: Optional[pulumi.Input[
|
812
|
-
disable_local_ca_jwt: Optional[pulumi.Input[
|
813
|
-
external_entropy_access: Optional[pulumi.Input[
|
814
|
-
|
815
|
-
|
816
|
-
|
817
|
-
|
818
|
-
|
819
|
-
|
820
|
-
|
821
|
-
|
822
|
-
|
823
|
-
|
824
|
-
|
825
|
-
|
826
|
-
|
836
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
837
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
838
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
839
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
840
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
841
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
842
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
843
|
+
disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
|
844
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
845
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
846
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
847
|
+
kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
848
|
+
kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
|
849
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
850
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
851
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
852
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
853
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
854
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
855
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
856
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
857
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
858
|
+
service_account_jwt: Optional[pulumi.Input[_builtins.str]] = None,
|
827
859
|
__props__=None):
|
828
860
|
"""
|
829
861
|
## Example Usage
|
@@ -854,37 +886,38 @@ class SecretBackend(pulumi.CustomResource):
|
|
854
886
|
|
855
887
|
:param str resource_name: The name of the resource.
|
856
888
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
857
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
858
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
859
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
860
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
861
|
-
:param pulumi.Input[
|
862
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
863
|
-
:param pulumi.Input[
|
864
|
-
:param pulumi.Input[
|
889
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
890
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
891
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
892
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
893
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
894
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
895
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
896
|
+
:param pulumi.Input[_builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
|
865
897
|
service account JWT when Vault is running in a Kubernetes pod.
|
866
|
-
:param pulumi.Input[
|
867
|
-
:param pulumi.Input[
|
868
|
-
:param pulumi.Input[
|
898
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
899
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
900
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
901
|
+
:param pulumi.Input[_builtins.str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
|
869
902
|
secrets engine to verify the Kubernetes API server certificate. Defaults to the local
|
870
903
|
pod’s CA if Vault is running in Kubernetes. Otherwise, defaults to the root CA set where
|
871
904
|
Vault is running.
|
872
|
-
:param pulumi.Input[
|
905
|
+
:param pulumi.Input[_builtins.str] kubernetes_host: The Kubernetes API URL to connect to. Required if the
|
873
906
|
standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
|
874
907
|
are not set on the host that Vault is running on.
|
875
|
-
:param pulumi.Input[
|
876
|
-
:param pulumi.Input[
|
877
|
-
:param pulumi.Input[
|
878
|
-
:param pulumi.Input[
|
908
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
909
|
+
:param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
910
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
911
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
879
912
|
The value should not contain leading or trailing forward slashes.
|
880
913
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
881
914
|
*Available only for Vault Enterprise*.
|
882
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
883
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
884
|
-
:param pulumi.Input[
|
885
|
-
:param pulumi.Input[
|
886
|
-
:param pulumi.Input[
|
887
|
-
:param pulumi.Input[
|
915
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
916
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
917
|
+
:param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
|
918
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
919
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
920
|
+
:param pulumi.Input[_builtins.str] service_account_jwt: The JSON web token of the service account used by the
|
888
921
|
secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
|
889
922
|
is running in Kubernetes.
|
890
923
|
"""
|
@@ -936,28 +969,29 @@ class SecretBackend(pulumi.CustomResource):
|
|
936
969
|
def _internal_init(__self__,
|
937
970
|
resource_name: str,
|
938
971
|
opts: Optional[pulumi.ResourceOptions] = None,
|
939
|
-
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
940
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
941
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
942
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
943
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
944
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[
|
945
|
-
description: Optional[pulumi.Input[
|
946
|
-
disable_local_ca_jwt: Optional[pulumi.Input[
|
947
|
-
external_entropy_access: Optional[pulumi.Input[
|
948
|
-
|
949
|
-
|
950
|
-
|
951
|
-
|
952
|
-
|
953
|
-
|
954
|
-
|
955
|
-
|
956
|
-
|
957
|
-
|
958
|
-
|
959
|
-
|
960
|
-
|
972
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
973
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
974
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
975
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
976
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
977
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
978
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
979
|
+
disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
|
980
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
981
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
982
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
983
|
+
kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
984
|
+
kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
|
985
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
986
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
987
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
988
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
989
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
990
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
991
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
992
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
993
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
994
|
+
service_account_jwt: Optional[pulumi.Input[_builtins.str]] = None,
|
961
995
|
__props__=None):
|
962
996
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
963
997
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -976,6 +1010,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
976
1010
|
__props__.__dict__["description"] = description
|
977
1011
|
__props__.__dict__["disable_local_ca_jwt"] = disable_local_ca_jwt
|
978
1012
|
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
1013
|
+
__props__.__dict__["force_no_cache"] = force_no_cache
|
979
1014
|
__props__.__dict__["identity_token_key"] = identity_token_key
|
980
1015
|
__props__.__dict__["kubernetes_ca_cert"] = kubernetes_ca_cert
|
981
1016
|
__props__.__dict__["kubernetes_host"] = kubernetes_host
|
@@ -1004,29 +1039,30 @@ class SecretBackend(pulumi.CustomResource):
|
|
1004
1039
|
def get(resource_name: str,
|
1005
1040
|
id: pulumi.Input[str],
|
1006
1041
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1007
|
-
accessor: Optional[pulumi.Input[
|
1008
|
-
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1009
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1010
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1011
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1012
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
1013
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1014
|
-
description: Optional[pulumi.Input[
|
1015
|
-
disable_local_ca_jwt: Optional[pulumi.Input[
|
1016
|
-
external_entropy_access: Optional[pulumi.Input[
|
1017
|
-
|
1018
|
-
|
1019
|
-
|
1020
|
-
|
1021
|
-
|
1022
|
-
|
1023
|
-
|
1024
|
-
|
1025
|
-
|
1026
|
-
|
1027
|
-
|
1028
|
-
|
1029
|
-
|
1042
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
1043
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1044
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1045
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1046
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1047
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1048
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1049
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
1050
|
+
disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
|
1051
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
1052
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
1053
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1054
|
+
kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
1055
|
+
kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
|
1056
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
1057
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
1058
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1059
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1060
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
1061
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1062
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
1063
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
1064
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
1065
|
+
service_account_jwt: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackend':
|
1030
1066
|
"""
|
1031
1067
|
Get an existing SecretBackend resource's state with the given name, id, and optional extra
|
1032
1068
|
properties used to qualify the lookup.
|
@@ -1034,38 +1070,39 @@ class SecretBackend(pulumi.CustomResource):
|
|
1034
1070
|
:param str resource_name: The unique name of the resulting resource.
|
1035
1071
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
1036
1072
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
1037
|
-
:param pulumi.Input[
|
1038
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1039
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1040
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1041
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1042
|
-
:param pulumi.Input[
|
1043
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1044
|
-
:param pulumi.Input[
|
1045
|
-
:param pulumi.Input[
|
1073
|
+
:param pulumi.Input[_builtins.str] accessor: Accessor of the mount
|
1074
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
1075
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
1076
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1077
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1078
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
1079
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
1080
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
1081
|
+
:param pulumi.Input[_builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
|
1046
1082
|
service account JWT when Vault is running in a Kubernetes pod.
|
1047
|
-
:param pulumi.Input[
|
1048
|
-
:param pulumi.Input[
|
1049
|
-
:param pulumi.Input[
|
1083
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
1084
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
1085
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
1086
|
+
:param pulumi.Input[_builtins.str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
|
1050
1087
|
secrets engine to verify the Kubernetes API server certificate. Defaults to the local
|
1051
1088
|
pod’s CA if Vault is running in Kubernetes. Otherwise, defaults to the root CA set where
|
1052
1089
|
Vault is running.
|
1053
|
-
:param pulumi.Input[
|
1090
|
+
:param pulumi.Input[_builtins.str] kubernetes_host: The Kubernetes API URL to connect to. Required if the
|
1054
1091
|
standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
|
1055
1092
|
are not set on the host that Vault is running on.
|
1056
|
-
:param pulumi.Input[
|
1057
|
-
:param pulumi.Input[
|
1058
|
-
:param pulumi.Input[
|
1059
|
-
:param pulumi.Input[
|
1093
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
1094
|
+
:param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
1095
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
1096
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
1060
1097
|
The value should not contain leading or trailing forward slashes.
|
1061
1098
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1062
1099
|
*Available only for Vault Enterprise*.
|
1063
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
1064
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1065
|
-
:param pulumi.Input[
|
1066
|
-
:param pulumi.Input[
|
1067
|
-
:param pulumi.Input[
|
1068
|
-
:param pulumi.Input[
|
1100
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
1101
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
1102
|
+
:param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
|
1103
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1104
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1105
|
+
:param pulumi.Input[_builtins.str] service_account_jwt: The JSON web token of the service account used by the
|
1069
1106
|
secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
|
1070
1107
|
is running in Kubernetes.
|
1071
1108
|
"""
|
@@ -1083,6 +1120,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1083
1120
|
__props__.__dict__["description"] = description
|
1084
1121
|
__props__.__dict__["disable_local_ca_jwt"] = disable_local_ca_jwt
|
1085
1122
|
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
1123
|
+
__props__.__dict__["force_no_cache"] = force_no_cache
|
1086
1124
|
__props__.__dict__["identity_token_key"] = identity_token_key
|
1087
1125
|
__props__.__dict__["kubernetes_ca_cert"] = kubernetes_ca_cert
|
1088
1126
|
__props__.__dict__["kubernetes_host"] = kubernetes_host
|
@@ -1098,98 +1136,106 @@ class SecretBackend(pulumi.CustomResource):
|
|
1098
1136
|
__props__.__dict__["service_account_jwt"] = service_account_jwt
|
1099
1137
|
return SecretBackend(resource_name, opts=opts, __props__=__props__)
|
1100
1138
|
|
1101
|
-
@property
|
1139
|
+
@_builtins.property
|
1102
1140
|
@pulumi.getter
|
1103
|
-
def accessor(self) -> pulumi.Output[
|
1141
|
+
def accessor(self) -> pulumi.Output[_builtins.str]:
|
1104
1142
|
"""
|
1105
1143
|
Accessor of the mount
|
1106
1144
|
"""
|
1107
1145
|
return pulumi.get(self, "accessor")
|
1108
1146
|
|
1109
|
-
@property
|
1147
|
+
@_builtins.property
|
1110
1148
|
@pulumi.getter(name="allowedManagedKeys")
|
1111
|
-
def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[
|
1149
|
+
def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1112
1150
|
"""
|
1113
1151
|
List of managed key registry entry names that the mount in question is allowed to access
|
1114
1152
|
"""
|
1115
1153
|
return pulumi.get(self, "allowed_managed_keys")
|
1116
1154
|
|
1117
|
-
@property
|
1155
|
+
@_builtins.property
|
1118
1156
|
@pulumi.getter(name="allowedResponseHeaders")
|
1119
|
-
def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[
|
1157
|
+
def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1120
1158
|
"""
|
1121
1159
|
List of headers to allow and pass from the request to the plugin
|
1122
1160
|
"""
|
1123
1161
|
return pulumi.get(self, "allowed_response_headers")
|
1124
1162
|
|
1125
|
-
@property
|
1163
|
+
@_builtins.property
|
1126
1164
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
1127
|
-
def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[
|
1165
|
+
def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
1128
1166
|
"""
|
1129
1167
|
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1130
1168
|
"""
|
1131
1169
|
return pulumi.get(self, "audit_non_hmac_request_keys")
|
1132
1170
|
|
1133
|
-
@property
|
1171
|
+
@_builtins.property
|
1134
1172
|
@pulumi.getter(name="auditNonHmacResponseKeys")
|
1135
|
-
def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[
|
1173
|
+
def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
1136
1174
|
"""
|
1137
1175
|
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1138
1176
|
"""
|
1139
1177
|
return pulumi.get(self, "audit_non_hmac_response_keys")
|
1140
1178
|
|
1141
|
-
@property
|
1179
|
+
@_builtins.property
|
1142
1180
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
1143
|
-
def default_lease_ttl_seconds(self) -> pulumi.Output[
|
1181
|
+
def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
|
1144
1182
|
"""
|
1145
1183
|
Default lease duration for tokens and secrets in seconds
|
1146
1184
|
"""
|
1147
1185
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
1148
1186
|
|
1149
|
-
@property
|
1187
|
+
@_builtins.property
|
1150
1188
|
@pulumi.getter(name="delegatedAuthAccessors")
|
1151
|
-
def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[
|
1189
|
+
def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1152
1190
|
"""
|
1153
1191
|
List of headers to allow and pass from the request to the plugin
|
1154
1192
|
"""
|
1155
1193
|
return pulumi.get(self, "delegated_auth_accessors")
|
1156
1194
|
|
1157
|
-
@property
|
1195
|
+
@_builtins.property
|
1158
1196
|
@pulumi.getter
|
1159
|
-
def description(self) -> pulumi.Output[Optional[
|
1197
|
+
def description(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1160
1198
|
"""
|
1161
1199
|
Human-friendly description of the mount
|
1162
1200
|
"""
|
1163
1201
|
return pulumi.get(self, "description")
|
1164
1202
|
|
1165
|
-
@property
|
1203
|
+
@_builtins.property
|
1166
1204
|
@pulumi.getter(name="disableLocalCaJwt")
|
1167
|
-
def disable_local_ca_jwt(self) -> pulumi.Output[Optional[
|
1205
|
+
def disable_local_ca_jwt(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1168
1206
|
"""
|
1169
1207
|
Disable defaulting to the local CA certificate and
|
1170
1208
|
service account JWT when Vault is running in a Kubernetes pod.
|
1171
1209
|
"""
|
1172
1210
|
return pulumi.get(self, "disable_local_ca_jwt")
|
1173
1211
|
|
1174
|
-
@property
|
1212
|
+
@_builtins.property
|
1175
1213
|
@pulumi.getter(name="externalEntropyAccess")
|
1176
|
-
def external_entropy_access(self) -> pulumi.Output[Optional[
|
1214
|
+
def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1177
1215
|
"""
|
1178
1216
|
Enable the secrets engine to access Vault's external entropy source
|
1179
1217
|
"""
|
1180
1218
|
return pulumi.get(self, "external_entropy_access")
|
1181
1219
|
|
1182
|
-
@property
|
1220
|
+
@_builtins.property
|
1221
|
+
@pulumi.getter(name="forceNoCache")
|
1222
|
+
def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
|
1223
|
+
"""
|
1224
|
+
If set to true, disables caching.
|
1225
|
+
"""
|
1226
|
+
return pulumi.get(self, "force_no_cache")
|
1227
|
+
|
1228
|
+
@_builtins.property
|
1183
1229
|
@pulumi.getter(name="identityTokenKey")
|
1184
|
-
def identity_token_key(self) -> pulumi.Output[Optional[
|
1230
|
+
def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1185
1231
|
"""
|
1186
1232
|
The key to use for signing plugin workload identity tokens
|
1187
1233
|
"""
|
1188
1234
|
return pulumi.get(self, "identity_token_key")
|
1189
1235
|
|
1190
|
-
@property
|
1236
|
+
@_builtins.property
|
1191
1237
|
@pulumi.getter(name="kubernetesCaCert")
|
1192
|
-
def kubernetes_ca_cert(self) -> pulumi.Output[Optional[
|
1238
|
+
def kubernetes_ca_cert(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1193
1239
|
"""
|
1194
1240
|
A PEM-encoded CA certificate used by the
|
1195
1241
|
secrets engine to verify the Kubernetes API server certificate. Defaults to the local
|
@@ -1198,9 +1244,9 @@ class SecretBackend(pulumi.CustomResource):
|
|
1198
1244
|
"""
|
1199
1245
|
return pulumi.get(self, "kubernetes_ca_cert")
|
1200
1246
|
|
1201
|
-
@property
|
1247
|
+
@_builtins.property
|
1202
1248
|
@pulumi.getter(name="kubernetesHost")
|
1203
|
-
def kubernetes_host(self) -> pulumi.Output[Optional[
|
1249
|
+
def kubernetes_host(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1204
1250
|
"""
|
1205
1251
|
The Kubernetes API URL to connect to. Required if the
|
1206
1252
|
standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
|
@@ -1208,33 +1254,33 @@ class SecretBackend(pulumi.CustomResource):
|
|
1208
1254
|
"""
|
1209
1255
|
return pulumi.get(self, "kubernetes_host")
|
1210
1256
|
|
1211
|
-
@property
|
1257
|
+
@_builtins.property
|
1212
1258
|
@pulumi.getter(name="listingVisibility")
|
1213
|
-
def listing_visibility(self) -> pulumi.Output[Optional[
|
1259
|
+
def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1214
1260
|
"""
|
1215
1261
|
Specifies whether to show this mount in the UI-specific listing endpoint
|
1216
1262
|
"""
|
1217
1263
|
return pulumi.get(self, "listing_visibility")
|
1218
1264
|
|
1219
|
-
@property
|
1265
|
+
@_builtins.property
|
1220
1266
|
@pulumi.getter
|
1221
|
-
def local(self) -> pulumi.Output[Optional[
|
1267
|
+
def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1222
1268
|
"""
|
1223
1269
|
Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
1224
1270
|
"""
|
1225
1271
|
return pulumi.get(self, "local")
|
1226
1272
|
|
1227
|
-
@property
|
1273
|
+
@_builtins.property
|
1228
1274
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
1229
|
-
def max_lease_ttl_seconds(self) -> pulumi.Output[
|
1275
|
+
def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
|
1230
1276
|
"""
|
1231
1277
|
Maximum possible lease duration for tokens and secrets in seconds
|
1232
1278
|
"""
|
1233
1279
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
1234
1280
|
|
1235
|
-
@property
|
1281
|
+
@_builtins.property
|
1236
1282
|
@pulumi.getter
|
1237
|
-
def namespace(self) -> pulumi.Output[Optional[
|
1283
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1238
1284
|
"""
|
1239
1285
|
The namespace to provision the resource in.
|
1240
1286
|
The value should not contain leading or trailing forward slashes.
|
@@ -1243,49 +1289,49 @@ class SecretBackend(pulumi.CustomResource):
|
|
1243
1289
|
"""
|
1244
1290
|
return pulumi.get(self, "namespace")
|
1245
1291
|
|
1246
|
-
@property
|
1292
|
+
@_builtins.property
|
1247
1293
|
@pulumi.getter
|
1248
|
-
def options(self) -> pulumi.Output[Optional[Mapping[str,
|
1294
|
+
def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
|
1249
1295
|
"""
|
1250
1296
|
Specifies mount type specific options that are passed to the backend
|
1251
1297
|
"""
|
1252
1298
|
return pulumi.get(self, "options")
|
1253
1299
|
|
1254
|
-
@property
|
1300
|
+
@_builtins.property
|
1255
1301
|
@pulumi.getter(name="passthroughRequestHeaders")
|
1256
|
-
def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[
|
1302
|
+
def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1257
1303
|
"""
|
1258
1304
|
List of headers to allow and pass from the request to the plugin
|
1259
1305
|
"""
|
1260
1306
|
return pulumi.get(self, "passthrough_request_headers")
|
1261
1307
|
|
1262
|
-
@property
|
1308
|
+
@_builtins.property
|
1263
1309
|
@pulumi.getter
|
1264
|
-
def path(self) -> pulumi.Output[
|
1310
|
+
def path(self) -> pulumi.Output[_builtins.str]:
|
1265
1311
|
"""
|
1266
1312
|
Where the secret backend will be mounted
|
1267
1313
|
"""
|
1268
1314
|
return pulumi.get(self, "path")
|
1269
1315
|
|
1270
|
-
@property
|
1316
|
+
@_builtins.property
|
1271
1317
|
@pulumi.getter(name="pluginVersion")
|
1272
|
-
def plugin_version(self) -> pulumi.Output[Optional[
|
1318
|
+
def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1273
1319
|
"""
|
1274
1320
|
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1275
1321
|
"""
|
1276
1322
|
return pulumi.get(self, "plugin_version")
|
1277
1323
|
|
1278
|
-
@property
|
1324
|
+
@_builtins.property
|
1279
1325
|
@pulumi.getter(name="sealWrap")
|
1280
|
-
def seal_wrap(self) -> pulumi.Output[
|
1326
|
+
def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
|
1281
1327
|
"""
|
1282
1328
|
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1283
1329
|
"""
|
1284
1330
|
return pulumi.get(self, "seal_wrap")
|
1285
1331
|
|
1286
|
-
@property
|
1332
|
+
@_builtins.property
|
1287
1333
|
@pulumi.getter(name="serviceAccountJwt")
|
1288
|
-
def service_account_jwt(self) -> pulumi.Output[Optional[
|
1334
|
+
def service_account_jwt(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1289
1335
|
"""
|
1290
1336
|
The JSON web token of the service account used by the
|
1291
1337
|
secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
|