pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
pulumi_vault/mount.py
CHANGED
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,56 +19,56 @@ __all__ = ['MountArgs', 'Mount']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class MountArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
path: pulumi.Input[
|
24
|
-
type: pulumi.Input[
|
25
|
-
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
26
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
27
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
28
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
29
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
30
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[
|
31
|
-
description: Optional[pulumi.Input[
|
32
|
-
external_entropy_access: Optional[pulumi.Input[
|
33
|
-
identity_token_key: Optional[pulumi.Input[
|
34
|
-
listing_visibility: Optional[pulumi.Input[
|
35
|
-
local: Optional[pulumi.Input[
|
36
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
37
|
-
namespace: Optional[pulumi.Input[
|
38
|
-
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
39
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
40
|
-
plugin_version: Optional[pulumi.Input[
|
41
|
-
seal_wrap: Optional[pulumi.Input[
|
22
|
+
path: pulumi.Input[_builtins.str],
|
23
|
+
type: pulumi.Input[_builtins.str],
|
24
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
25
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
26
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
27
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
28
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
29
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
30
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
31
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
32
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
33
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
34
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
35
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
36
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
37
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
38
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
39
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
40
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None):
|
42
41
|
"""
|
43
42
|
The set of arguments for constructing a Mount resource.
|
44
|
-
:param pulumi.Input[
|
45
|
-
:param pulumi.Input[
|
46
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
47
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
43
|
+
:param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
|
44
|
+
:param pulumi.Input[_builtins.str] type: Type of the backend, such as "aws"
|
45
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
|
46
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow, allowing a plugin to include
|
48
47
|
them in the response.
|
49
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
50
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
51
|
-
:param pulumi.Input[
|
52
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
48
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
49
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
50
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
51
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of allowed authentication mount accessors the
|
53
52
|
backend can request delegated authentication for.
|
54
|
-
:param pulumi.Input[
|
55
|
-
:param pulumi.Input[
|
56
|
-
:param pulumi.Input[
|
53
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
54
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
55
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens. If
|
57
56
|
not provided, this will default to Vault's OIDC default key.
|
58
|
-
:param pulumi.Input[
|
57
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
59
58
|
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
60
|
-
:param pulumi.Input[
|
61
|
-
:param pulumi.Input[
|
62
|
-
:param pulumi.Input[
|
59
|
+
:param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
60
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
61
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
63
62
|
The value should not contain leading or trailing forward slashes.
|
64
63
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
65
64
|
*Available only for Vault Enterprise*.
|
66
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
67
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
65
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
66
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to
|
68
67
|
the plugin.
|
69
|
-
:param pulumi.Input[
|
68
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
|
70
69
|
If unspecified, the server will select any matching unversioned plugin that may have been
|
71
70
|
registered, the latest versioned plugin registered, or a built-in plugin in that order of precedence.
|
72
|
-
:param pulumi.Input[
|
71
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
73
72
|
"""
|
74
73
|
pulumi.set(__self__, "path", path)
|
75
74
|
pulumi.set(__self__, "type", type)
|
@@ -108,45 +107,45 @@ class MountArgs:
|
|
108
107
|
if seal_wrap is not None:
|
109
108
|
pulumi.set(__self__, "seal_wrap", seal_wrap)
|
110
109
|
|
111
|
-
@property
|
110
|
+
@_builtins.property
|
112
111
|
@pulumi.getter
|
113
|
-
def path(self) -> pulumi.Input[
|
112
|
+
def path(self) -> pulumi.Input[_builtins.str]:
|
114
113
|
"""
|
115
114
|
Where the secret backend will be mounted
|
116
115
|
"""
|
117
116
|
return pulumi.get(self, "path")
|
118
117
|
|
119
118
|
@path.setter
|
120
|
-
def path(self, value: pulumi.Input[
|
119
|
+
def path(self, value: pulumi.Input[_builtins.str]):
|
121
120
|
pulumi.set(self, "path", value)
|
122
121
|
|
123
|
-
@property
|
122
|
+
@_builtins.property
|
124
123
|
@pulumi.getter
|
125
|
-
def type(self) -> pulumi.Input[
|
124
|
+
def type(self) -> pulumi.Input[_builtins.str]:
|
126
125
|
"""
|
127
126
|
Type of the backend, such as "aws"
|
128
127
|
"""
|
129
128
|
return pulumi.get(self, "type")
|
130
129
|
|
131
130
|
@type.setter
|
132
|
-
def type(self, value: pulumi.Input[
|
131
|
+
def type(self, value: pulumi.Input[_builtins.str]):
|
133
132
|
pulumi.set(self, "type", value)
|
134
133
|
|
135
|
-
@property
|
134
|
+
@_builtins.property
|
136
135
|
@pulumi.getter(name="allowedManagedKeys")
|
137
|
-
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
136
|
+
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
138
137
|
"""
|
139
138
|
Set of managed key registry entry names that the mount in question is allowed to access
|
140
139
|
"""
|
141
140
|
return pulumi.get(self, "allowed_managed_keys")
|
142
141
|
|
143
142
|
@allowed_managed_keys.setter
|
144
|
-
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
143
|
+
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
145
144
|
pulumi.set(self, "allowed_managed_keys", value)
|
146
145
|
|
147
|
-
@property
|
146
|
+
@_builtins.property
|
148
147
|
@pulumi.getter(name="allowedResponseHeaders")
|
149
|
-
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
148
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
150
149
|
"""
|
151
150
|
List of headers to allow, allowing a plugin to include
|
152
151
|
them in the response.
|
@@ -154,48 +153,48 @@ class MountArgs:
|
|
154
153
|
return pulumi.get(self, "allowed_response_headers")
|
155
154
|
|
156
155
|
@allowed_response_headers.setter
|
157
|
-
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
156
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
158
157
|
pulumi.set(self, "allowed_response_headers", value)
|
159
158
|
|
160
|
-
@property
|
159
|
+
@_builtins.property
|
161
160
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
162
|
-
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
161
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
163
162
|
"""
|
164
163
|
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
165
164
|
"""
|
166
165
|
return pulumi.get(self, "audit_non_hmac_request_keys")
|
167
166
|
|
168
167
|
@audit_non_hmac_request_keys.setter
|
169
|
-
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
168
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
170
169
|
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
171
170
|
|
172
|
-
@property
|
171
|
+
@_builtins.property
|
173
172
|
@pulumi.getter(name="auditNonHmacResponseKeys")
|
174
|
-
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
173
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
175
174
|
"""
|
176
175
|
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
177
176
|
"""
|
178
177
|
return pulumi.get(self, "audit_non_hmac_response_keys")
|
179
178
|
|
180
179
|
@audit_non_hmac_response_keys.setter
|
181
|
-
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
180
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
182
181
|
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
183
182
|
|
184
|
-
@property
|
183
|
+
@_builtins.property
|
185
184
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
186
|
-
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
185
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
187
186
|
"""
|
188
187
|
Default lease duration for tokens and secrets in seconds
|
189
188
|
"""
|
190
189
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
191
190
|
|
192
191
|
@default_lease_ttl_seconds.setter
|
193
|
-
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
192
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
194
193
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
195
194
|
|
196
|
-
@property
|
195
|
+
@_builtins.property
|
197
196
|
@pulumi.getter(name="delegatedAuthAccessors")
|
198
|
-
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
197
|
+
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
199
198
|
"""
|
200
199
|
List of allowed authentication mount accessors the
|
201
200
|
backend can request delegated authentication for.
|
@@ -203,36 +202,36 @@ class MountArgs:
|
|
203
202
|
return pulumi.get(self, "delegated_auth_accessors")
|
204
203
|
|
205
204
|
@delegated_auth_accessors.setter
|
206
|
-
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
205
|
+
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
207
206
|
pulumi.set(self, "delegated_auth_accessors", value)
|
208
207
|
|
209
|
-
@property
|
208
|
+
@_builtins.property
|
210
209
|
@pulumi.getter
|
211
|
-
def description(self) -> Optional[pulumi.Input[
|
210
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
212
211
|
"""
|
213
212
|
Human-friendly description of the mount
|
214
213
|
"""
|
215
214
|
return pulumi.get(self, "description")
|
216
215
|
|
217
216
|
@description.setter
|
218
|
-
def description(self, value: Optional[pulumi.Input[
|
217
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
219
218
|
pulumi.set(self, "description", value)
|
220
219
|
|
221
|
-
@property
|
220
|
+
@_builtins.property
|
222
221
|
@pulumi.getter(name="externalEntropyAccess")
|
223
|
-
def external_entropy_access(self) -> Optional[pulumi.Input[
|
222
|
+
def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
224
223
|
"""
|
225
224
|
Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
226
225
|
"""
|
227
226
|
return pulumi.get(self, "external_entropy_access")
|
228
227
|
|
229
228
|
@external_entropy_access.setter
|
230
|
-
def external_entropy_access(self, value: Optional[pulumi.Input[
|
229
|
+
def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
231
230
|
pulumi.set(self, "external_entropy_access", value)
|
232
231
|
|
233
|
-
@property
|
232
|
+
@_builtins.property
|
234
233
|
@pulumi.getter(name="identityTokenKey")
|
235
|
-
def identity_token_key(self) -> Optional[pulumi.Input[
|
234
|
+
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
236
235
|
"""
|
237
236
|
The key to use for signing plugin workload identity tokens. If
|
238
237
|
not provided, this will default to Vault's OIDC default key.
|
@@ -240,12 +239,12 @@ class MountArgs:
|
|
240
239
|
return pulumi.get(self, "identity_token_key")
|
241
240
|
|
242
241
|
@identity_token_key.setter
|
243
|
-
def identity_token_key(self, value: Optional[pulumi.Input[
|
242
|
+
def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
244
243
|
pulumi.set(self, "identity_token_key", value)
|
245
244
|
|
246
|
-
@property
|
245
|
+
@_builtins.property
|
247
246
|
@pulumi.getter(name="listingVisibility")
|
248
|
-
def listing_visibility(self) -> Optional[pulumi.Input[
|
247
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
249
248
|
"""
|
250
249
|
Specifies whether to show this mount in the UI-specific
|
251
250
|
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
@@ -253,36 +252,36 @@ class MountArgs:
|
|
253
252
|
return pulumi.get(self, "listing_visibility")
|
254
253
|
|
255
254
|
@listing_visibility.setter
|
256
|
-
def listing_visibility(self, value: Optional[pulumi.Input[
|
255
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
257
256
|
pulumi.set(self, "listing_visibility", value)
|
258
257
|
|
259
|
-
@property
|
258
|
+
@_builtins.property
|
260
259
|
@pulumi.getter
|
261
|
-
def local(self) -> Optional[pulumi.Input[
|
260
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
262
261
|
"""
|
263
262
|
Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
264
263
|
"""
|
265
264
|
return pulumi.get(self, "local")
|
266
265
|
|
267
266
|
@local.setter
|
268
|
-
def local(self, value: Optional[pulumi.Input[
|
267
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
269
268
|
pulumi.set(self, "local", value)
|
270
269
|
|
271
|
-
@property
|
270
|
+
@_builtins.property
|
272
271
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
273
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
272
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
274
273
|
"""
|
275
274
|
Maximum possible lease duration for tokens and secrets in seconds
|
276
275
|
"""
|
277
276
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
278
277
|
|
279
278
|
@max_lease_ttl_seconds.setter
|
280
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
279
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
281
280
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
282
281
|
|
283
|
-
@property
|
282
|
+
@_builtins.property
|
284
283
|
@pulumi.getter
|
285
|
-
def namespace(self) -> Optional[pulumi.Input[
|
284
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
286
285
|
"""
|
287
286
|
The namespace to provision the resource in.
|
288
287
|
The value should not contain leading or trailing forward slashes.
|
@@ -292,24 +291,24 @@ class MountArgs:
|
|
292
291
|
return pulumi.get(self, "namespace")
|
293
292
|
|
294
293
|
@namespace.setter
|
295
|
-
def namespace(self, value: Optional[pulumi.Input[
|
294
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
296
295
|
pulumi.set(self, "namespace", value)
|
297
296
|
|
298
|
-
@property
|
297
|
+
@_builtins.property
|
299
298
|
@pulumi.getter
|
300
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
299
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
301
300
|
"""
|
302
301
|
Specifies mount type specific options that are passed to the backend
|
303
302
|
"""
|
304
303
|
return pulumi.get(self, "options")
|
305
304
|
|
306
305
|
@options.setter
|
307
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
306
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
308
307
|
pulumi.set(self, "options", value)
|
309
308
|
|
310
|
-
@property
|
309
|
+
@_builtins.property
|
311
310
|
@pulumi.getter(name="passthroughRequestHeaders")
|
312
|
-
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
311
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
313
312
|
"""
|
314
313
|
List of headers to allow and pass from the request to
|
315
314
|
the plugin.
|
@@ -317,12 +316,12 @@ class MountArgs:
|
|
317
316
|
return pulumi.get(self, "passthrough_request_headers")
|
318
317
|
|
319
318
|
@passthrough_request_headers.setter
|
320
|
-
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
319
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
321
320
|
pulumi.set(self, "passthrough_request_headers", value)
|
322
321
|
|
323
|
-
@property
|
322
|
+
@_builtins.property
|
324
323
|
@pulumi.getter(name="pluginVersion")
|
325
|
-
def plugin_version(self) -> Optional[pulumi.Input[
|
324
|
+
def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
|
326
325
|
"""
|
327
326
|
Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
|
328
327
|
If unspecified, the server will select any matching unversioned plugin that may have been
|
@@ -331,77 +330,77 @@ class MountArgs:
|
|
331
330
|
return pulumi.get(self, "plugin_version")
|
332
331
|
|
333
332
|
@plugin_version.setter
|
334
|
-
def plugin_version(self, value: Optional[pulumi.Input[
|
333
|
+
def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
|
335
334
|
pulumi.set(self, "plugin_version", value)
|
336
335
|
|
337
|
-
@property
|
336
|
+
@_builtins.property
|
338
337
|
@pulumi.getter(name="sealWrap")
|
339
|
-
def seal_wrap(self) -> Optional[pulumi.Input[
|
338
|
+
def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
340
339
|
"""
|
341
340
|
Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
342
341
|
"""
|
343
342
|
return pulumi.get(self, "seal_wrap")
|
344
343
|
|
345
344
|
@seal_wrap.setter
|
346
|
-
def seal_wrap(self, value: Optional[pulumi.Input[
|
345
|
+
def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
347
346
|
pulumi.set(self, "seal_wrap", value)
|
348
347
|
|
349
348
|
|
350
349
|
@pulumi.input_type
|
351
350
|
class _MountState:
|
352
351
|
def __init__(__self__, *,
|
353
|
-
accessor: Optional[pulumi.Input[
|
354
|
-
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
355
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
356
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
357
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
358
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
359
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[
|
360
|
-
description: Optional[pulumi.Input[
|
361
|
-
external_entropy_access: Optional[pulumi.Input[
|
362
|
-
identity_token_key: Optional[pulumi.Input[
|
363
|
-
listing_visibility: Optional[pulumi.Input[
|
364
|
-
local: Optional[pulumi.Input[
|
365
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
366
|
-
namespace: Optional[pulumi.Input[
|
367
|
-
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
368
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
369
|
-
path: Optional[pulumi.Input[
|
370
|
-
plugin_version: Optional[pulumi.Input[
|
371
|
-
seal_wrap: Optional[pulumi.Input[
|
372
|
-
type: Optional[pulumi.Input[
|
352
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
353
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
354
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
355
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
356
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
357
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
358
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
359
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
360
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
361
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
362
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
363
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
364
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
365
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
366
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
367
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
368
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
369
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
370
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
371
|
+
type: Optional[pulumi.Input[_builtins.str]] = None):
|
373
372
|
"""
|
374
373
|
Input properties used for looking up and filtering Mount resources.
|
375
|
-
:param pulumi.Input[
|
376
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
377
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
374
|
+
:param pulumi.Input[_builtins.str] accessor: The accessor for this mount.
|
375
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
|
376
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow, allowing a plugin to include
|
378
377
|
them in the response.
|
379
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
380
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
381
|
-
:param pulumi.Input[
|
382
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
378
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
379
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
380
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
381
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of allowed authentication mount accessors the
|
383
382
|
backend can request delegated authentication for.
|
384
|
-
:param pulumi.Input[
|
385
|
-
:param pulumi.Input[
|
386
|
-
:param pulumi.Input[
|
383
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
384
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
385
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens. If
|
387
386
|
not provided, this will default to Vault's OIDC default key.
|
388
|
-
:param pulumi.Input[
|
387
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
389
388
|
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
390
|
-
:param pulumi.Input[
|
391
|
-
:param pulumi.Input[
|
392
|
-
:param pulumi.Input[
|
389
|
+
:param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
390
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
391
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
393
392
|
The value should not contain leading or trailing forward slashes.
|
394
393
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
395
394
|
*Available only for Vault Enterprise*.
|
396
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
397
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
395
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
396
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to
|
398
397
|
the plugin.
|
399
|
-
:param pulumi.Input[
|
400
|
-
:param pulumi.Input[
|
398
|
+
:param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
|
399
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
|
401
400
|
If unspecified, the server will select any matching unversioned plugin that may have been
|
402
401
|
registered, the latest versioned plugin registered, or a built-in plugin in that order of precedence.
|
403
|
-
:param pulumi.Input[
|
404
|
-
:param pulumi.Input[
|
402
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
403
|
+
:param pulumi.Input[_builtins.str] type: Type of the backend, such as "aws"
|
405
404
|
"""
|
406
405
|
if accessor is not None:
|
407
406
|
pulumi.set(__self__, "accessor", accessor)
|
@@ -444,33 +443,33 @@ class _MountState:
|
|
444
443
|
if type is not None:
|
445
444
|
pulumi.set(__self__, "type", type)
|
446
445
|
|
447
|
-
@property
|
446
|
+
@_builtins.property
|
448
447
|
@pulumi.getter
|
449
|
-
def accessor(self) -> Optional[pulumi.Input[
|
448
|
+
def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
|
450
449
|
"""
|
451
450
|
The accessor for this mount.
|
452
451
|
"""
|
453
452
|
return pulumi.get(self, "accessor")
|
454
453
|
|
455
454
|
@accessor.setter
|
456
|
-
def accessor(self, value: Optional[pulumi.Input[
|
455
|
+
def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
|
457
456
|
pulumi.set(self, "accessor", value)
|
458
457
|
|
459
|
-
@property
|
458
|
+
@_builtins.property
|
460
459
|
@pulumi.getter(name="allowedManagedKeys")
|
461
|
-
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
460
|
+
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
462
461
|
"""
|
463
462
|
Set of managed key registry entry names that the mount in question is allowed to access
|
464
463
|
"""
|
465
464
|
return pulumi.get(self, "allowed_managed_keys")
|
466
465
|
|
467
466
|
@allowed_managed_keys.setter
|
468
|
-
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
467
|
+
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
469
468
|
pulumi.set(self, "allowed_managed_keys", value)
|
470
469
|
|
471
|
-
@property
|
470
|
+
@_builtins.property
|
472
471
|
@pulumi.getter(name="allowedResponseHeaders")
|
473
|
-
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
472
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
474
473
|
"""
|
475
474
|
List of headers to allow, allowing a plugin to include
|
476
475
|
them in the response.
|
@@ -478,48 +477,48 @@ class _MountState:
|
|
478
477
|
return pulumi.get(self, "allowed_response_headers")
|
479
478
|
|
480
479
|
@allowed_response_headers.setter
|
481
|
-
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
480
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
482
481
|
pulumi.set(self, "allowed_response_headers", value)
|
483
482
|
|
484
|
-
@property
|
483
|
+
@_builtins.property
|
485
484
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
486
|
-
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
485
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
487
486
|
"""
|
488
487
|
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
489
488
|
"""
|
490
489
|
return pulumi.get(self, "audit_non_hmac_request_keys")
|
491
490
|
|
492
491
|
@audit_non_hmac_request_keys.setter
|
493
|
-
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
492
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
494
493
|
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
495
494
|
|
496
|
-
@property
|
495
|
+
@_builtins.property
|
497
496
|
@pulumi.getter(name="auditNonHmacResponseKeys")
|
498
|
-
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
497
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
499
498
|
"""
|
500
499
|
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
501
500
|
"""
|
502
501
|
return pulumi.get(self, "audit_non_hmac_response_keys")
|
503
502
|
|
504
503
|
@audit_non_hmac_response_keys.setter
|
505
|
-
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
504
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
506
505
|
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
507
506
|
|
508
|
-
@property
|
507
|
+
@_builtins.property
|
509
508
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
510
|
-
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
509
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
511
510
|
"""
|
512
511
|
Default lease duration for tokens and secrets in seconds
|
513
512
|
"""
|
514
513
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
515
514
|
|
516
515
|
@default_lease_ttl_seconds.setter
|
517
|
-
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
516
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
518
517
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
519
518
|
|
520
|
-
@property
|
519
|
+
@_builtins.property
|
521
520
|
@pulumi.getter(name="delegatedAuthAccessors")
|
522
|
-
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
521
|
+
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
523
522
|
"""
|
524
523
|
List of allowed authentication mount accessors the
|
525
524
|
backend can request delegated authentication for.
|
@@ -527,36 +526,36 @@ class _MountState:
|
|
527
526
|
return pulumi.get(self, "delegated_auth_accessors")
|
528
527
|
|
529
528
|
@delegated_auth_accessors.setter
|
530
|
-
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
529
|
+
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
531
530
|
pulumi.set(self, "delegated_auth_accessors", value)
|
532
531
|
|
533
|
-
@property
|
532
|
+
@_builtins.property
|
534
533
|
@pulumi.getter
|
535
|
-
def description(self) -> Optional[pulumi.Input[
|
534
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
536
535
|
"""
|
537
536
|
Human-friendly description of the mount
|
538
537
|
"""
|
539
538
|
return pulumi.get(self, "description")
|
540
539
|
|
541
540
|
@description.setter
|
542
|
-
def description(self, value: Optional[pulumi.Input[
|
541
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
543
542
|
pulumi.set(self, "description", value)
|
544
543
|
|
545
|
-
@property
|
544
|
+
@_builtins.property
|
546
545
|
@pulumi.getter(name="externalEntropyAccess")
|
547
|
-
def external_entropy_access(self) -> Optional[pulumi.Input[
|
546
|
+
def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
548
547
|
"""
|
549
548
|
Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
550
549
|
"""
|
551
550
|
return pulumi.get(self, "external_entropy_access")
|
552
551
|
|
553
552
|
@external_entropy_access.setter
|
554
|
-
def external_entropy_access(self, value: Optional[pulumi.Input[
|
553
|
+
def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
555
554
|
pulumi.set(self, "external_entropy_access", value)
|
556
555
|
|
557
|
-
@property
|
556
|
+
@_builtins.property
|
558
557
|
@pulumi.getter(name="identityTokenKey")
|
559
|
-
def identity_token_key(self) -> Optional[pulumi.Input[
|
558
|
+
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
560
559
|
"""
|
561
560
|
The key to use for signing plugin workload identity tokens. If
|
562
561
|
not provided, this will default to Vault's OIDC default key.
|
@@ -564,12 +563,12 @@ class _MountState:
|
|
564
563
|
return pulumi.get(self, "identity_token_key")
|
565
564
|
|
566
565
|
@identity_token_key.setter
|
567
|
-
def identity_token_key(self, value: Optional[pulumi.Input[
|
566
|
+
def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
568
567
|
pulumi.set(self, "identity_token_key", value)
|
569
568
|
|
570
|
-
@property
|
569
|
+
@_builtins.property
|
571
570
|
@pulumi.getter(name="listingVisibility")
|
572
|
-
def listing_visibility(self) -> Optional[pulumi.Input[
|
571
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
573
572
|
"""
|
574
573
|
Specifies whether to show this mount in the UI-specific
|
575
574
|
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
@@ -577,36 +576,36 @@ class _MountState:
|
|
577
576
|
return pulumi.get(self, "listing_visibility")
|
578
577
|
|
579
578
|
@listing_visibility.setter
|
580
|
-
def listing_visibility(self, value: Optional[pulumi.Input[
|
579
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
581
580
|
pulumi.set(self, "listing_visibility", value)
|
582
581
|
|
583
|
-
@property
|
582
|
+
@_builtins.property
|
584
583
|
@pulumi.getter
|
585
|
-
def local(self) -> Optional[pulumi.Input[
|
584
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
586
585
|
"""
|
587
586
|
Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
588
587
|
"""
|
589
588
|
return pulumi.get(self, "local")
|
590
589
|
|
591
590
|
@local.setter
|
592
|
-
def local(self, value: Optional[pulumi.Input[
|
591
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
593
592
|
pulumi.set(self, "local", value)
|
594
593
|
|
595
|
-
@property
|
594
|
+
@_builtins.property
|
596
595
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
597
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
596
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
598
597
|
"""
|
599
598
|
Maximum possible lease duration for tokens and secrets in seconds
|
600
599
|
"""
|
601
600
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
602
601
|
|
603
602
|
@max_lease_ttl_seconds.setter
|
604
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
603
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
605
604
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
606
605
|
|
607
|
-
@property
|
606
|
+
@_builtins.property
|
608
607
|
@pulumi.getter
|
609
|
-
def namespace(self) -> Optional[pulumi.Input[
|
608
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
610
609
|
"""
|
611
610
|
The namespace to provision the resource in.
|
612
611
|
The value should not contain leading or trailing forward slashes.
|
@@ -616,24 +615,24 @@ class _MountState:
|
|
616
615
|
return pulumi.get(self, "namespace")
|
617
616
|
|
618
617
|
@namespace.setter
|
619
|
-
def namespace(self, value: Optional[pulumi.Input[
|
618
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
620
619
|
pulumi.set(self, "namespace", value)
|
621
620
|
|
622
|
-
@property
|
621
|
+
@_builtins.property
|
623
622
|
@pulumi.getter
|
624
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
623
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
625
624
|
"""
|
626
625
|
Specifies mount type specific options that are passed to the backend
|
627
626
|
"""
|
628
627
|
return pulumi.get(self, "options")
|
629
628
|
|
630
629
|
@options.setter
|
631
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
630
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
632
631
|
pulumi.set(self, "options", value)
|
633
632
|
|
634
|
-
@property
|
633
|
+
@_builtins.property
|
635
634
|
@pulumi.getter(name="passthroughRequestHeaders")
|
636
|
-
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
635
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
637
636
|
"""
|
638
637
|
List of headers to allow and pass from the request to
|
639
638
|
the plugin.
|
@@ -641,24 +640,24 @@ class _MountState:
|
|
641
640
|
return pulumi.get(self, "passthrough_request_headers")
|
642
641
|
|
643
642
|
@passthrough_request_headers.setter
|
644
|
-
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
643
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
645
644
|
pulumi.set(self, "passthrough_request_headers", value)
|
646
645
|
|
647
|
-
@property
|
646
|
+
@_builtins.property
|
648
647
|
@pulumi.getter
|
649
|
-
def path(self) -> Optional[pulumi.Input[
|
648
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
650
649
|
"""
|
651
650
|
Where the secret backend will be mounted
|
652
651
|
"""
|
653
652
|
return pulumi.get(self, "path")
|
654
653
|
|
655
654
|
@path.setter
|
656
|
-
def path(self, value: Optional[pulumi.Input[
|
655
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
657
656
|
pulumi.set(self, "path", value)
|
658
657
|
|
659
|
-
@property
|
658
|
+
@_builtins.property
|
660
659
|
@pulumi.getter(name="pluginVersion")
|
661
|
-
def plugin_version(self) -> Optional[pulumi.Input[
|
660
|
+
def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
|
662
661
|
"""
|
663
662
|
Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
|
664
663
|
If unspecified, the server will select any matching unversioned plugin that may have been
|
@@ -667,31 +666,31 @@ class _MountState:
|
|
667
666
|
return pulumi.get(self, "plugin_version")
|
668
667
|
|
669
668
|
@plugin_version.setter
|
670
|
-
def plugin_version(self, value: Optional[pulumi.Input[
|
669
|
+
def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
|
671
670
|
pulumi.set(self, "plugin_version", value)
|
672
671
|
|
673
|
-
@property
|
672
|
+
@_builtins.property
|
674
673
|
@pulumi.getter(name="sealWrap")
|
675
|
-
def seal_wrap(self) -> Optional[pulumi.Input[
|
674
|
+
def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
676
675
|
"""
|
677
676
|
Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
678
677
|
"""
|
679
678
|
return pulumi.get(self, "seal_wrap")
|
680
679
|
|
681
680
|
@seal_wrap.setter
|
682
|
-
def seal_wrap(self, value: Optional[pulumi.Input[
|
681
|
+
def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
683
682
|
pulumi.set(self, "seal_wrap", value)
|
684
683
|
|
685
|
-
@property
|
684
|
+
@_builtins.property
|
686
685
|
@pulumi.getter
|
687
|
-
def type(self) -> Optional[pulumi.Input[
|
686
|
+
def type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
688
687
|
"""
|
689
688
|
Type of the backend, such as "aws"
|
690
689
|
"""
|
691
690
|
return pulumi.get(self, "type")
|
692
691
|
|
693
692
|
@type.setter
|
694
|
-
def type(self, value: Optional[pulumi.Input[
|
693
|
+
def type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
695
694
|
pulumi.set(self, "type", value)
|
696
695
|
|
697
696
|
|
@@ -701,25 +700,25 @@ class Mount(pulumi.CustomResource):
|
|
701
700
|
def __init__(__self__,
|
702
701
|
resource_name: str,
|
703
702
|
opts: Optional[pulumi.ResourceOptions] = None,
|
704
|
-
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
705
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
706
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
707
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
708
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
709
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[
|
710
|
-
description: Optional[pulumi.Input[
|
711
|
-
external_entropy_access: Optional[pulumi.Input[
|
712
|
-
identity_token_key: Optional[pulumi.Input[
|
713
|
-
listing_visibility: Optional[pulumi.Input[
|
714
|
-
local: Optional[pulumi.Input[
|
715
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
716
|
-
namespace: Optional[pulumi.Input[
|
717
|
-
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
718
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
719
|
-
path: Optional[pulumi.Input[
|
720
|
-
plugin_version: Optional[pulumi.Input[
|
721
|
-
seal_wrap: Optional[pulumi.Input[
|
722
|
-
type: Optional[pulumi.Input[
|
703
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
704
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
705
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
706
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
707
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
708
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
709
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
710
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
711
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
712
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
713
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
714
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
715
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
716
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
717
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
718
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
719
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
720
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
721
|
+
type: Optional[pulumi.Input[_builtins.str]] = None,
|
723
722
|
__props__=None):
|
724
723
|
"""
|
725
724
|
This resource enables a new secrets engine at the given path.
|
@@ -785,35 +784,35 @@ class Mount(pulumi.CustomResource):
|
|
785
784
|
|
786
785
|
:param str resource_name: The name of the resource.
|
787
786
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
788
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
789
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
787
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
|
788
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow, allowing a plugin to include
|
790
789
|
them in the response.
|
791
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
792
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
793
|
-
:param pulumi.Input[
|
794
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
790
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
791
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
792
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
793
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of allowed authentication mount accessors the
|
795
794
|
backend can request delegated authentication for.
|
796
|
-
:param pulumi.Input[
|
797
|
-
:param pulumi.Input[
|
798
|
-
:param pulumi.Input[
|
795
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
796
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
797
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens. If
|
799
798
|
not provided, this will default to Vault's OIDC default key.
|
800
|
-
:param pulumi.Input[
|
799
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
801
800
|
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
802
|
-
:param pulumi.Input[
|
803
|
-
:param pulumi.Input[
|
804
|
-
:param pulumi.Input[
|
801
|
+
:param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
802
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
803
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
805
804
|
The value should not contain leading or trailing forward slashes.
|
806
805
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
807
806
|
*Available only for Vault Enterprise*.
|
808
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
809
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
807
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
808
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to
|
810
809
|
the plugin.
|
811
|
-
:param pulumi.Input[
|
812
|
-
:param pulumi.Input[
|
810
|
+
:param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
|
811
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
|
813
812
|
If unspecified, the server will select any matching unversioned plugin that may have been
|
814
813
|
registered, the latest versioned plugin registered, or a built-in plugin in that order of precedence.
|
815
|
-
:param pulumi.Input[
|
816
|
-
:param pulumi.Input[
|
814
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
815
|
+
:param pulumi.Input[_builtins.str] type: Type of the backend, such as "aws"
|
817
816
|
"""
|
818
817
|
...
|
819
818
|
@overload
|
@@ -898,25 +897,25 @@ class Mount(pulumi.CustomResource):
|
|
898
897
|
def _internal_init(__self__,
|
899
898
|
resource_name: str,
|
900
899
|
opts: Optional[pulumi.ResourceOptions] = None,
|
901
|
-
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
902
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
903
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
904
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
905
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
906
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[
|
907
|
-
description: Optional[pulumi.Input[
|
908
|
-
external_entropy_access: Optional[pulumi.Input[
|
909
|
-
identity_token_key: Optional[pulumi.Input[
|
910
|
-
listing_visibility: Optional[pulumi.Input[
|
911
|
-
local: Optional[pulumi.Input[
|
912
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
913
|
-
namespace: Optional[pulumi.Input[
|
914
|
-
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
915
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
916
|
-
path: Optional[pulumi.Input[
|
917
|
-
plugin_version: Optional[pulumi.Input[
|
918
|
-
seal_wrap: Optional[pulumi.Input[
|
919
|
-
type: Optional[pulumi.Input[
|
900
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
901
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
902
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
903
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
904
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
905
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
906
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
907
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
908
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
909
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
910
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
911
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
912
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
913
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
914
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
915
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
916
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
917
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
918
|
+
type: Optional[pulumi.Input[_builtins.str]] = None,
|
920
919
|
__props__=None):
|
921
920
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
922
921
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -960,26 +959,26 @@ class Mount(pulumi.CustomResource):
|
|
960
959
|
def get(resource_name: str,
|
961
960
|
id: pulumi.Input[str],
|
962
961
|
opts: Optional[pulumi.ResourceOptions] = None,
|
963
|
-
accessor: Optional[pulumi.Input[
|
964
|
-
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
965
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
966
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
967
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
968
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
969
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[
|
970
|
-
description: Optional[pulumi.Input[
|
971
|
-
external_entropy_access: Optional[pulumi.Input[
|
972
|
-
identity_token_key: Optional[pulumi.Input[
|
973
|
-
listing_visibility: Optional[pulumi.Input[
|
974
|
-
local: Optional[pulumi.Input[
|
975
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
976
|
-
namespace: Optional[pulumi.Input[
|
977
|
-
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
978
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
979
|
-
path: Optional[pulumi.Input[
|
980
|
-
plugin_version: Optional[pulumi.Input[
|
981
|
-
seal_wrap: Optional[pulumi.Input[
|
982
|
-
type: Optional[pulumi.Input[
|
962
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
963
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
964
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
965
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
966
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
967
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
968
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
969
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
970
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
971
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
972
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
973
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
974
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
975
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
976
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
977
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
978
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
979
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
980
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
981
|
+
type: Optional[pulumi.Input[_builtins.str]] = None) -> 'Mount':
|
983
982
|
"""
|
984
983
|
Get an existing Mount resource's state with the given name, id, and optional extra
|
985
984
|
properties used to qualify the lookup.
|
@@ -987,36 +986,36 @@ class Mount(pulumi.CustomResource):
|
|
987
986
|
:param str resource_name: The unique name of the resulting resource.
|
988
987
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
989
988
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
990
|
-
:param pulumi.Input[
|
991
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
992
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
989
|
+
:param pulumi.Input[_builtins.str] accessor: The accessor for this mount.
|
990
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
|
991
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow, allowing a plugin to include
|
993
992
|
them in the response.
|
994
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
995
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
996
|
-
:param pulumi.Input[
|
997
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
993
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
994
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
995
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
996
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of allowed authentication mount accessors the
|
998
997
|
backend can request delegated authentication for.
|
999
|
-
:param pulumi.Input[
|
1000
|
-
:param pulumi.Input[
|
1001
|
-
:param pulumi.Input[
|
998
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
999
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
1000
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens. If
|
1002
1001
|
not provided, this will default to Vault's OIDC default key.
|
1003
|
-
:param pulumi.Input[
|
1002
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
1004
1003
|
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
1005
|
-
:param pulumi.Input[
|
1006
|
-
:param pulumi.Input[
|
1007
|
-
:param pulumi.Input[
|
1004
|
+
:param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
1005
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
1006
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
1008
1007
|
The value should not contain leading or trailing forward slashes.
|
1009
1008
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1010
1009
|
*Available only for Vault Enterprise*.
|
1011
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
1012
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1010
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
1011
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to
|
1013
1012
|
the plugin.
|
1014
|
-
:param pulumi.Input[
|
1015
|
-
:param pulumi.Input[
|
1013
|
+
:param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
|
1014
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
|
1016
1015
|
If unspecified, the server will select any matching unversioned plugin that may have been
|
1017
1016
|
registered, the latest versioned plugin registered, or a built-in plugin in that order of precedence.
|
1018
|
-
:param pulumi.Input[
|
1019
|
-
:param pulumi.Input[
|
1017
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1018
|
+
:param pulumi.Input[_builtins.str] type: Type of the backend, such as "aws"
|
1020
1019
|
"""
|
1021
1020
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
1022
1021
|
|
@@ -1044,117 +1043,117 @@ class Mount(pulumi.CustomResource):
|
|
1044
1043
|
__props__.__dict__["type"] = type
|
1045
1044
|
return Mount(resource_name, opts=opts, __props__=__props__)
|
1046
1045
|
|
1047
|
-
@property
|
1046
|
+
@_builtins.property
|
1048
1047
|
@pulumi.getter
|
1049
|
-
def accessor(self) -> pulumi.Output[
|
1048
|
+
def accessor(self) -> pulumi.Output[_builtins.str]:
|
1050
1049
|
"""
|
1051
1050
|
The accessor for this mount.
|
1052
1051
|
"""
|
1053
1052
|
return pulumi.get(self, "accessor")
|
1054
1053
|
|
1055
|
-
@property
|
1054
|
+
@_builtins.property
|
1056
1055
|
@pulumi.getter(name="allowedManagedKeys")
|
1057
|
-
def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[
|
1056
|
+
def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1058
1057
|
"""
|
1059
1058
|
Set of managed key registry entry names that the mount in question is allowed to access
|
1060
1059
|
"""
|
1061
1060
|
return pulumi.get(self, "allowed_managed_keys")
|
1062
1061
|
|
1063
|
-
@property
|
1062
|
+
@_builtins.property
|
1064
1063
|
@pulumi.getter(name="allowedResponseHeaders")
|
1065
|
-
def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[
|
1064
|
+
def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1066
1065
|
"""
|
1067
1066
|
List of headers to allow, allowing a plugin to include
|
1068
1067
|
them in the response.
|
1069
1068
|
"""
|
1070
1069
|
return pulumi.get(self, "allowed_response_headers")
|
1071
1070
|
|
1072
|
-
@property
|
1071
|
+
@_builtins.property
|
1073
1072
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
1074
|
-
def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[
|
1073
|
+
def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
1075
1074
|
"""
|
1076
1075
|
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1077
1076
|
"""
|
1078
1077
|
return pulumi.get(self, "audit_non_hmac_request_keys")
|
1079
1078
|
|
1080
|
-
@property
|
1079
|
+
@_builtins.property
|
1081
1080
|
@pulumi.getter(name="auditNonHmacResponseKeys")
|
1082
|
-
def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[
|
1081
|
+
def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
1083
1082
|
"""
|
1084
1083
|
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1085
1084
|
"""
|
1086
1085
|
return pulumi.get(self, "audit_non_hmac_response_keys")
|
1087
1086
|
|
1088
|
-
@property
|
1087
|
+
@_builtins.property
|
1089
1088
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
1090
|
-
def default_lease_ttl_seconds(self) -> pulumi.Output[
|
1089
|
+
def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
|
1091
1090
|
"""
|
1092
1091
|
Default lease duration for tokens and secrets in seconds
|
1093
1092
|
"""
|
1094
1093
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
1095
1094
|
|
1096
|
-
@property
|
1095
|
+
@_builtins.property
|
1097
1096
|
@pulumi.getter(name="delegatedAuthAccessors")
|
1098
|
-
def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[
|
1097
|
+
def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1099
1098
|
"""
|
1100
1099
|
List of allowed authentication mount accessors the
|
1101
1100
|
backend can request delegated authentication for.
|
1102
1101
|
"""
|
1103
1102
|
return pulumi.get(self, "delegated_auth_accessors")
|
1104
1103
|
|
1105
|
-
@property
|
1104
|
+
@_builtins.property
|
1106
1105
|
@pulumi.getter
|
1107
|
-
def description(self) -> pulumi.Output[Optional[
|
1106
|
+
def description(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1108
1107
|
"""
|
1109
1108
|
Human-friendly description of the mount
|
1110
1109
|
"""
|
1111
1110
|
return pulumi.get(self, "description")
|
1112
1111
|
|
1113
|
-
@property
|
1112
|
+
@_builtins.property
|
1114
1113
|
@pulumi.getter(name="externalEntropyAccess")
|
1115
|
-
def external_entropy_access(self) -> pulumi.Output[Optional[
|
1114
|
+
def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1116
1115
|
"""
|
1117
1116
|
Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
1118
1117
|
"""
|
1119
1118
|
return pulumi.get(self, "external_entropy_access")
|
1120
1119
|
|
1121
|
-
@property
|
1120
|
+
@_builtins.property
|
1122
1121
|
@pulumi.getter(name="identityTokenKey")
|
1123
|
-
def identity_token_key(self) -> pulumi.Output[Optional[
|
1122
|
+
def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1124
1123
|
"""
|
1125
1124
|
The key to use for signing plugin workload identity tokens. If
|
1126
1125
|
not provided, this will default to Vault's OIDC default key.
|
1127
1126
|
"""
|
1128
1127
|
return pulumi.get(self, "identity_token_key")
|
1129
1128
|
|
1130
|
-
@property
|
1129
|
+
@_builtins.property
|
1131
1130
|
@pulumi.getter(name="listingVisibility")
|
1132
|
-
def listing_visibility(self) -> pulumi.Output[Optional[
|
1131
|
+
def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1133
1132
|
"""
|
1134
1133
|
Specifies whether to show this mount in the UI-specific
|
1135
1134
|
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
1136
1135
|
"""
|
1137
1136
|
return pulumi.get(self, "listing_visibility")
|
1138
1137
|
|
1139
|
-
@property
|
1138
|
+
@_builtins.property
|
1140
1139
|
@pulumi.getter
|
1141
|
-
def local(self) -> pulumi.Output[Optional[
|
1140
|
+
def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1142
1141
|
"""
|
1143
1142
|
Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
1144
1143
|
"""
|
1145
1144
|
return pulumi.get(self, "local")
|
1146
1145
|
|
1147
|
-
@property
|
1146
|
+
@_builtins.property
|
1148
1147
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
1149
|
-
def max_lease_ttl_seconds(self) -> pulumi.Output[
|
1148
|
+
def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
|
1150
1149
|
"""
|
1151
1150
|
Maximum possible lease duration for tokens and secrets in seconds
|
1152
1151
|
"""
|
1153
1152
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
1154
1153
|
|
1155
|
-
@property
|
1154
|
+
@_builtins.property
|
1156
1155
|
@pulumi.getter
|
1157
|
-
def namespace(self) -> pulumi.Output[Optional[
|
1156
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1158
1157
|
"""
|
1159
1158
|
The namespace to provision the resource in.
|
1160
1159
|
The value should not contain leading or trailing forward slashes.
|
@@ -1163,34 +1162,34 @@ class Mount(pulumi.CustomResource):
|
|
1163
1162
|
"""
|
1164
1163
|
return pulumi.get(self, "namespace")
|
1165
1164
|
|
1166
|
-
@property
|
1165
|
+
@_builtins.property
|
1167
1166
|
@pulumi.getter
|
1168
|
-
def options(self) -> pulumi.Output[Optional[Mapping[str,
|
1167
|
+
def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
|
1169
1168
|
"""
|
1170
1169
|
Specifies mount type specific options that are passed to the backend
|
1171
1170
|
"""
|
1172
1171
|
return pulumi.get(self, "options")
|
1173
1172
|
|
1174
|
-
@property
|
1173
|
+
@_builtins.property
|
1175
1174
|
@pulumi.getter(name="passthroughRequestHeaders")
|
1176
|
-
def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[
|
1175
|
+
def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1177
1176
|
"""
|
1178
1177
|
List of headers to allow and pass from the request to
|
1179
1178
|
the plugin.
|
1180
1179
|
"""
|
1181
1180
|
return pulumi.get(self, "passthrough_request_headers")
|
1182
1181
|
|
1183
|
-
@property
|
1182
|
+
@_builtins.property
|
1184
1183
|
@pulumi.getter
|
1185
|
-
def path(self) -> pulumi.Output[
|
1184
|
+
def path(self) -> pulumi.Output[_builtins.str]:
|
1186
1185
|
"""
|
1187
1186
|
Where the secret backend will be mounted
|
1188
1187
|
"""
|
1189
1188
|
return pulumi.get(self, "path")
|
1190
1189
|
|
1191
|
-
@property
|
1190
|
+
@_builtins.property
|
1192
1191
|
@pulumi.getter(name="pluginVersion")
|
1193
|
-
def plugin_version(self) -> pulumi.Output[Optional[
|
1192
|
+
def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1194
1193
|
"""
|
1195
1194
|
Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
|
1196
1195
|
If unspecified, the server will select any matching unversioned plugin that may have been
|
@@ -1198,17 +1197,17 @@ class Mount(pulumi.CustomResource):
|
|
1198
1197
|
"""
|
1199
1198
|
return pulumi.get(self, "plugin_version")
|
1200
1199
|
|
1201
|
-
@property
|
1200
|
+
@_builtins.property
|
1202
1201
|
@pulumi.getter(name="sealWrap")
|
1203
|
-
def seal_wrap(self) -> pulumi.Output[
|
1202
|
+
def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
|
1204
1203
|
"""
|
1205
1204
|
Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1206
1205
|
"""
|
1207
1206
|
return pulumi.get(self, "seal_wrap")
|
1208
1207
|
|
1209
|
-
@property
|
1208
|
+
@_builtins.property
|
1210
1209
|
@pulumi.getter
|
1211
|
-
def type(self) -> pulumi.Output[
|
1210
|
+
def type(self) -> pulumi.Output[_builtins.str]:
|
1212
1211
|
"""
|
1213
1212
|
Type of the backend, such as "aws"
|
1214
1213
|
"""
|