pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,48 +19,48 @@ __all__ = ['NomadSecretBackendArgs', 'NomadSecretBackend']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class NomadSecretBackendArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
address: Optional[pulumi.Input[
|
24
|
-
backend: Optional[pulumi.Input[
|
25
|
-
ca_cert: Optional[pulumi.Input[
|
26
|
-
client_cert: Optional[pulumi.Input[
|
27
|
-
client_key: Optional[pulumi.Input[
|
28
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
29
|
-
description: Optional[pulumi.Input[
|
30
|
-
disable_remount: Optional[pulumi.Input[
|
31
|
-
local: Optional[pulumi.Input[
|
32
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
33
|
-
max_token_name_length: Optional[pulumi.Input[
|
34
|
-
max_ttl: Optional[pulumi.Input[
|
35
|
-
namespace: Optional[pulumi.Input[
|
36
|
-
token: Optional[pulumi.Input[
|
37
|
-
ttl: Optional[pulumi.Input[
|
22
|
+
address: Optional[pulumi.Input[_builtins.str]] = None,
|
23
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
24
|
+
ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
25
|
+
client_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
26
|
+
client_key: Optional[pulumi.Input[_builtins.str]] = None,
|
27
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
28
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
29
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
30
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
31
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
32
|
+
max_token_name_length: Optional[pulumi.Input[_builtins.int]] = None,
|
33
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
34
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
35
|
+
token: Optional[pulumi.Input[_builtins.str]] = None,
|
36
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None):
|
38
37
|
"""
|
39
38
|
The set of arguments for constructing a NomadSecretBackend resource.
|
40
|
-
:param pulumi.Input[
|
39
|
+
:param pulumi.Input[_builtins.str] address: Specifies the address of the Nomad instance, provided
|
41
40
|
as "protocol://host:port" like "http://127.0.0.1:4646".
|
42
|
-
:param pulumi.Input[
|
41
|
+
:param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at. Must
|
43
42
|
not begin or end with a `/`. Defaults to `nomad`.
|
44
|
-
:param pulumi.Input[
|
43
|
+
:param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
|
45
44
|
x509 PEM encoded.
|
46
|
-
:param pulumi.Input[
|
47
|
-
:param pulumi.Input[
|
48
|
-
:param pulumi.Input[
|
49
|
-
:param pulumi.Input[
|
50
|
-
:param pulumi.Input[
|
45
|
+
:param pulumi.Input[_builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
|
46
|
+
:param pulumi.Input[_builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
|
47
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
|
48
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
|
49
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
51
50
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
52
|
-
:param pulumi.Input[
|
51
|
+
:param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
53
52
|
replication.Tolerance duration to use when checking the last rotation time.
|
54
|
-
:param pulumi.Input[
|
55
|
-
:param pulumi.Input[
|
53
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
54
|
+
:param pulumi.Input[_builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
|
56
55
|
generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
|
57
56
|
by the Nomad version.
|
58
|
-
:param pulumi.Input[
|
59
|
-
:param pulumi.Input[
|
57
|
+
:param pulumi.Input[_builtins.int] max_ttl: Maximum possible lease duration for secrets in seconds.
|
58
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
60
59
|
The value should not contain leading or trailing forward slashes.
|
61
60
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
62
61
|
*Available only for Vault Enterprise*.
|
63
|
-
:param pulumi.Input[
|
64
|
-
:param pulumi.Input[
|
62
|
+
:param pulumi.Input[_builtins.str] token: Specifies the Nomad Management token to use.
|
63
|
+
:param pulumi.Input[_builtins.int] ttl: Specifies the ttl of the lease for the generated token.
|
65
64
|
"""
|
66
65
|
if address is not None:
|
67
66
|
pulumi.set(__self__, "address", address)
|
@@ -94,9 +93,9 @@ class NomadSecretBackendArgs:
|
|
94
93
|
if ttl is not None:
|
95
94
|
pulumi.set(__self__, "ttl", ttl)
|
96
95
|
|
97
|
-
@property
|
96
|
+
@_builtins.property
|
98
97
|
@pulumi.getter
|
99
|
-
def address(self) -> Optional[pulumi.Input[
|
98
|
+
def address(self) -> Optional[pulumi.Input[_builtins.str]]:
|
100
99
|
"""
|
101
100
|
Specifies the address of the Nomad instance, provided
|
102
101
|
as "protocol://host:port" like "http://127.0.0.1:4646".
|
@@ -104,12 +103,12 @@ class NomadSecretBackendArgs:
|
|
104
103
|
return pulumi.get(self, "address")
|
105
104
|
|
106
105
|
@address.setter
|
107
|
-
def address(self, value: Optional[pulumi.Input[
|
106
|
+
def address(self, value: Optional[pulumi.Input[_builtins.str]]):
|
108
107
|
pulumi.set(self, "address", value)
|
109
108
|
|
110
|
-
@property
|
109
|
+
@_builtins.property
|
111
110
|
@pulumi.getter
|
112
|
-
def backend(self) -> Optional[pulumi.Input[
|
111
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
113
112
|
"""
|
114
113
|
The unique path this backend should be mounted at. Must
|
115
114
|
not begin or end with a `/`. Defaults to `nomad`.
|
@@ -117,12 +116,12 @@ class NomadSecretBackendArgs:
|
|
117
116
|
return pulumi.get(self, "backend")
|
118
117
|
|
119
118
|
@backend.setter
|
120
|
-
def backend(self, value: Optional[pulumi.Input[
|
119
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
121
120
|
pulumi.set(self, "backend", value)
|
122
121
|
|
123
|
-
@property
|
122
|
+
@_builtins.property
|
124
123
|
@pulumi.getter(name="caCert")
|
125
|
-
def ca_cert(self) -> Optional[pulumi.Input[
|
124
|
+
def ca_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
|
126
125
|
"""
|
127
126
|
CA certificate to use when verifying the Nomad server certificate, must be
|
128
127
|
x509 PEM encoded.
|
@@ -130,60 +129,60 @@ class NomadSecretBackendArgs:
|
|
130
129
|
return pulumi.get(self, "ca_cert")
|
131
130
|
|
132
131
|
@ca_cert.setter
|
133
|
-
def ca_cert(self, value: Optional[pulumi.Input[
|
132
|
+
def ca_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
|
134
133
|
pulumi.set(self, "ca_cert", value)
|
135
134
|
|
136
|
-
@property
|
135
|
+
@_builtins.property
|
137
136
|
@pulumi.getter(name="clientCert")
|
138
|
-
def client_cert(self) -> Optional[pulumi.Input[
|
137
|
+
def client_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
|
139
138
|
"""
|
140
139
|
Client certificate to provide to the Nomad server, must be x509 PEM encoded.
|
141
140
|
"""
|
142
141
|
return pulumi.get(self, "client_cert")
|
143
142
|
|
144
143
|
@client_cert.setter
|
145
|
-
def client_cert(self, value: Optional[pulumi.Input[
|
144
|
+
def client_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
|
146
145
|
pulumi.set(self, "client_cert", value)
|
147
146
|
|
148
|
-
@property
|
147
|
+
@_builtins.property
|
149
148
|
@pulumi.getter(name="clientKey")
|
150
|
-
def client_key(self) -> Optional[pulumi.Input[
|
149
|
+
def client_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
151
150
|
"""
|
152
151
|
Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
|
153
152
|
"""
|
154
153
|
return pulumi.get(self, "client_key")
|
155
154
|
|
156
155
|
@client_key.setter
|
157
|
-
def client_key(self, value: Optional[pulumi.Input[
|
156
|
+
def client_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
158
157
|
pulumi.set(self, "client_key", value)
|
159
158
|
|
160
|
-
@property
|
159
|
+
@_builtins.property
|
161
160
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
162
|
-
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
161
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
163
162
|
"""
|
164
163
|
Default lease duration for secrets in seconds.
|
165
164
|
"""
|
166
165
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
167
166
|
|
168
167
|
@default_lease_ttl_seconds.setter
|
169
|
-
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
168
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
170
169
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
171
170
|
|
172
|
-
@property
|
171
|
+
@_builtins.property
|
173
172
|
@pulumi.getter
|
174
|
-
def description(self) -> Optional[pulumi.Input[
|
173
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
175
174
|
"""
|
176
175
|
Human-friendly description of the mount for the Active Directory backend.
|
177
176
|
"""
|
178
177
|
return pulumi.get(self, "description")
|
179
178
|
|
180
179
|
@description.setter
|
181
|
-
def description(self, value: Optional[pulumi.Input[
|
180
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
182
181
|
pulumi.set(self, "description", value)
|
183
182
|
|
184
|
-
@property
|
183
|
+
@_builtins.property
|
185
184
|
@pulumi.getter(name="disableRemount")
|
186
|
-
def disable_remount(self) -> Optional[pulumi.Input[
|
185
|
+
def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
187
186
|
"""
|
188
187
|
If set, opts out of mount migration on path updates.
|
189
188
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -191,12 +190,12 @@ class NomadSecretBackendArgs:
|
|
191
190
|
return pulumi.get(self, "disable_remount")
|
192
191
|
|
193
192
|
@disable_remount.setter
|
194
|
-
def disable_remount(self, value: Optional[pulumi.Input[
|
193
|
+
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
195
194
|
pulumi.set(self, "disable_remount", value)
|
196
195
|
|
197
|
-
@property
|
196
|
+
@_builtins.property
|
198
197
|
@pulumi.getter
|
199
|
-
def local(self) -> Optional[pulumi.Input[
|
198
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
200
199
|
"""
|
201
200
|
Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
202
201
|
replication.Tolerance duration to use when checking the last rotation time.
|
@@ -204,24 +203,24 @@ class NomadSecretBackendArgs:
|
|
204
203
|
return pulumi.get(self, "local")
|
205
204
|
|
206
205
|
@local.setter
|
207
|
-
def local(self, value: Optional[pulumi.Input[
|
206
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
208
207
|
pulumi.set(self, "local", value)
|
209
208
|
|
210
|
-
@property
|
209
|
+
@_builtins.property
|
211
210
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
212
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
211
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
213
212
|
"""
|
214
213
|
Maximum possible lease duration for secrets in seconds.
|
215
214
|
"""
|
216
215
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
217
216
|
|
218
217
|
@max_lease_ttl_seconds.setter
|
219
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
218
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
220
219
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
221
220
|
|
222
|
-
@property
|
221
|
+
@_builtins.property
|
223
222
|
@pulumi.getter(name="maxTokenNameLength")
|
224
|
-
def max_token_name_length(self) -> Optional[pulumi.Input[
|
223
|
+
def max_token_name_length(self) -> Optional[pulumi.Input[_builtins.int]]:
|
225
224
|
"""
|
226
225
|
Specifies the maximum length to use for the name of the Nomad token
|
227
226
|
generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
|
@@ -230,24 +229,24 @@ class NomadSecretBackendArgs:
|
|
230
229
|
return pulumi.get(self, "max_token_name_length")
|
231
230
|
|
232
231
|
@max_token_name_length.setter
|
233
|
-
def max_token_name_length(self, value: Optional[pulumi.Input[
|
232
|
+
def max_token_name_length(self, value: Optional[pulumi.Input[_builtins.int]]):
|
234
233
|
pulumi.set(self, "max_token_name_length", value)
|
235
234
|
|
236
|
-
@property
|
235
|
+
@_builtins.property
|
237
236
|
@pulumi.getter(name="maxTtl")
|
238
|
-
def max_ttl(self) -> Optional[pulumi.Input[
|
237
|
+
def max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
239
238
|
"""
|
240
239
|
Maximum possible lease duration for secrets in seconds.
|
241
240
|
"""
|
242
241
|
return pulumi.get(self, "max_ttl")
|
243
242
|
|
244
243
|
@max_ttl.setter
|
245
|
-
def max_ttl(self, value: Optional[pulumi.Input[
|
244
|
+
def max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
246
245
|
pulumi.set(self, "max_ttl", value)
|
247
246
|
|
248
|
-
@property
|
247
|
+
@_builtins.property
|
249
248
|
@pulumi.getter
|
250
|
-
def namespace(self) -> Optional[pulumi.Input[
|
249
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
251
250
|
"""
|
252
251
|
The namespace to provision the resource in.
|
253
252
|
The value should not contain leading or trailing forward slashes.
|
@@ -257,79 +256,79 @@ class NomadSecretBackendArgs:
|
|
257
256
|
return pulumi.get(self, "namespace")
|
258
257
|
|
259
258
|
@namespace.setter
|
260
|
-
def namespace(self, value: Optional[pulumi.Input[
|
259
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
261
260
|
pulumi.set(self, "namespace", value)
|
262
261
|
|
263
|
-
@property
|
262
|
+
@_builtins.property
|
264
263
|
@pulumi.getter
|
265
|
-
def token(self) -> Optional[pulumi.Input[
|
264
|
+
def token(self) -> Optional[pulumi.Input[_builtins.str]]:
|
266
265
|
"""
|
267
266
|
Specifies the Nomad Management token to use.
|
268
267
|
"""
|
269
268
|
return pulumi.get(self, "token")
|
270
269
|
|
271
270
|
@token.setter
|
272
|
-
def token(self, value: Optional[pulumi.Input[
|
271
|
+
def token(self, value: Optional[pulumi.Input[_builtins.str]]):
|
273
272
|
pulumi.set(self, "token", value)
|
274
273
|
|
275
|
-
@property
|
274
|
+
@_builtins.property
|
276
275
|
@pulumi.getter
|
277
|
-
def ttl(self) -> Optional[pulumi.Input[
|
276
|
+
def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
278
277
|
"""
|
279
278
|
Specifies the ttl of the lease for the generated token.
|
280
279
|
"""
|
281
280
|
return pulumi.get(self, "ttl")
|
282
281
|
|
283
282
|
@ttl.setter
|
284
|
-
def ttl(self, value: Optional[pulumi.Input[
|
283
|
+
def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
285
284
|
pulumi.set(self, "ttl", value)
|
286
285
|
|
287
286
|
|
288
287
|
@pulumi.input_type
|
289
288
|
class _NomadSecretBackendState:
|
290
289
|
def __init__(__self__, *,
|
291
|
-
address: Optional[pulumi.Input[
|
292
|
-
backend: Optional[pulumi.Input[
|
293
|
-
ca_cert: Optional[pulumi.Input[
|
294
|
-
client_cert: Optional[pulumi.Input[
|
295
|
-
client_key: Optional[pulumi.Input[
|
296
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
297
|
-
description: Optional[pulumi.Input[
|
298
|
-
disable_remount: Optional[pulumi.Input[
|
299
|
-
local: Optional[pulumi.Input[
|
300
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
301
|
-
max_token_name_length: Optional[pulumi.Input[
|
302
|
-
max_ttl: Optional[pulumi.Input[
|
303
|
-
namespace: Optional[pulumi.Input[
|
304
|
-
token: Optional[pulumi.Input[
|
305
|
-
ttl: Optional[pulumi.Input[
|
290
|
+
address: Optional[pulumi.Input[_builtins.str]] = None,
|
291
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
292
|
+
ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
293
|
+
client_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
294
|
+
client_key: Optional[pulumi.Input[_builtins.str]] = None,
|
295
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
296
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
297
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
298
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
299
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
300
|
+
max_token_name_length: Optional[pulumi.Input[_builtins.int]] = None,
|
301
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
302
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
303
|
+
token: Optional[pulumi.Input[_builtins.str]] = None,
|
304
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None):
|
306
305
|
"""
|
307
306
|
Input properties used for looking up and filtering NomadSecretBackend resources.
|
308
|
-
:param pulumi.Input[
|
307
|
+
:param pulumi.Input[_builtins.str] address: Specifies the address of the Nomad instance, provided
|
309
308
|
as "protocol://host:port" like "http://127.0.0.1:4646".
|
310
|
-
:param pulumi.Input[
|
309
|
+
:param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at. Must
|
311
310
|
not begin or end with a `/`. Defaults to `nomad`.
|
312
|
-
:param pulumi.Input[
|
311
|
+
:param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
|
313
312
|
x509 PEM encoded.
|
314
|
-
:param pulumi.Input[
|
315
|
-
:param pulumi.Input[
|
316
|
-
:param pulumi.Input[
|
317
|
-
:param pulumi.Input[
|
318
|
-
:param pulumi.Input[
|
313
|
+
:param pulumi.Input[_builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
|
314
|
+
:param pulumi.Input[_builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
|
315
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
|
316
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
|
317
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
319
318
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
320
|
-
:param pulumi.Input[
|
319
|
+
:param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
321
320
|
replication.Tolerance duration to use when checking the last rotation time.
|
322
|
-
:param pulumi.Input[
|
323
|
-
:param pulumi.Input[
|
321
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
322
|
+
:param pulumi.Input[_builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
|
324
323
|
generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
|
325
324
|
by the Nomad version.
|
326
|
-
:param pulumi.Input[
|
327
|
-
:param pulumi.Input[
|
325
|
+
:param pulumi.Input[_builtins.int] max_ttl: Maximum possible lease duration for secrets in seconds.
|
326
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
328
327
|
The value should not contain leading or trailing forward slashes.
|
329
328
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
330
329
|
*Available only for Vault Enterprise*.
|
331
|
-
:param pulumi.Input[
|
332
|
-
:param pulumi.Input[
|
330
|
+
:param pulumi.Input[_builtins.str] token: Specifies the Nomad Management token to use.
|
331
|
+
:param pulumi.Input[_builtins.int] ttl: Specifies the ttl of the lease for the generated token.
|
333
332
|
"""
|
334
333
|
if address is not None:
|
335
334
|
pulumi.set(__self__, "address", address)
|
@@ -362,9 +361,9 @@ class _NomadSecretBackendState:
|
|
362
361
|
if ttl is not None:
|
363
362
|
pulumi.set(__self__, "ttl", ttl)
|
364
363
|
|
365
|
-
@property
|
364
|
+
@_builtins.property
|
366
365
|
@pulumi.getter
|
367
|
-
def address(self) -> Optional[pulumi.Input[
|
366
|
+
def address(self) -> Optional[pulumi.Input[_builtins.str]]:
|
368
367
|
"""
|
369
368
|
Specifies the address of the Nomad instance, provided
|
370
369
|
as "protocol://host:port" like "http://127.0.0.1:4646".
|
@@ -372,12 +371,12 @@ class _NomadSecretBackendState:
|
|
372
371
|
return pulumi.get(self, "address")
|
373
372
|
|
374
373
|
@address.setter
|
375
|
-
def address(self, value: Optional[pulumi.Input[
|
374
|
+
def address(self, value: Optional[pulumi.Input[_builtins.str]]):
|
376
375
|
pulumi.set(self, "address", value)
|
377
376
|
|
378
|
-
@property
|
377
|
+
@_builtins.property
|
379
378
|
@pulumi.getter
|
380
|
-
def backend(self) -> Optional[pulumi.Input[
|
379
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
381
380
|
"""
|
382
381
|
The unique path this backend should be mounted at. Must
|
383
382
|
not begin or end with a `/`. Defaults to `nomad`.
|
@@ -385,12 +384,12 @@ class _NomadSecretBackendState:
|
|
385
384
|
return pulumi.get(self, "backend")
|
386
385
|
|
387
386
|
@backend.setter
|
388
|
-
def backend(self, value: Optional[pulumi.Input[
|
387
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
389
388
|
pulumi.set(self, "backend", value)
|
390
389
|
|
391
|
-
@property
|
390
|
+
@_builtins.property
|
392
391
|
@pulumi.getter(name="caCert")
|
393
|
-
def ca_cert(self) -> Optional[pulumi.Input[
|
392
|
+
def ca_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
|
394
393
|
"""
|
395
394
|
CA certificate to use when verifying the Nomad server certificate, must be
|
396
395
|
x509 PEM encoded.
|
@@ -398,60 +397,60 @@ class _NomadSecretBackendState:
|
|
398
397
|
return pulumi.get(self, "ca_cert")
|
399
398
|
|
400
399
|
@ca_cert.setter
|
401
|
-
def ca_cert(self, value: Optional[pulumi.Input[
|
400
|
+
def ca_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
|
402
401
|
pulumi.set(self, "ca_cert", value)
|
403
402
|
|
404
|
-
@property
|
403
|
+
@_builtins.property
|
405
404
|
@pulumi.getter(name="clientCert")
|
406
|
-
def client_cert(self) -> Optional[pulumi.Input[
|
405
|
+
def client_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
|
407
406
|
"""
|
408
407
|
Client certificate to provide to the Nomad server, must be x509 PEM encoded.
|
409
408
|
"""
|
410
409
|
return pulumi.get(self, "client_cert")
|
411
410
|
|
412
411
|
@client_cert.setter
|
413
|
-
def client_cert(self, value: Optional[pulumi.Input[
|
412
|
+
def client_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
|
414
413
|
pulumi.set(self, "client_cert", value)
|
415
414
|
|
416
|
-
@property
|
415
|
+
@_builtins.property
|
417
416
|
@pulumi.getter(name="clientKey")
|
418
|
-
def client_key(self) -> Optional[pulumi.Input[
|
417
|
+
def client_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
419
418
|
"""
|
420
419
|
Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
|
421
420
|
"""
|
422
421
|
return pulumi.get(self, "client_key")
|
423
422
|
|
424
423
|
@client_key.setter
|
425
|
-
def client_key(self, value: Optional[pulumi.Input[
|
424
|
+
def client_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
426
425
|
pulumi.set(self, "client_key", value)
|
427
426
|
|
428
|
-
@property
|
427
|
+
@_builtins.property
|
429
428
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
430
|
-
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
429
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
431
430
|
"""
|
432
431
|
Default lease duration for secrets in seconds.
|
433
432
|
"""
|
434
433
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
435
434
|
|
436
435
|
@default_lease_ttl_seconds.setter
|
437
|
-
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
436
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
438
437
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
439
438
|
|
440
|
-
@property
|
439
|
+
@_builtins.property
|
441
440
|
@pulumi.getter
|
442
|
-
def description(self) -> Optional[pulumi.Input[
|
441
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
443
442
|
"""
|
444
443
|
Human-friendly description of the mount for the Active Directory backend.
|
445
444
|
"""
|
446
445
|
return pulumi.get(self, "description")
|
447
446
|
|
448
447
|
@description.setter
|
449
|
-
def description(self, value: Optional[pulumi.Input[
|
448
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
450
449
|
pulumi.set(self, "description", value)
|
451
450
|
|
452
|
-
@property
|
451
|
+
@_builtins.property
|
453
452
|
@pulumi.getter(name="disableRemount")
|
454
|
-
def disable_remount(self) -> Optional[pulumi.Input[
|
453
|
+
def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
455
454
|
"""
|
456
455
|
If set, opts out of mount migration on path updates.
|
457
456
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -459,12 +458,12 @@ class _NomadSecretBackendState:
|
|
459
458
|
return pulumi.get(self, "disable_remount")
|
460
459
|
|
461
460
|
@disable_remount.setter
|
462
|
-
def disable_remount(self, value: Optional[pulumi.Input[
|
461
|
+
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
463
462
|
pulumi.set(self, "disable_remount", value)
|
464
463
|
|
465
|
-
@property
|
464
|
+
@_builtins.property
|
466
465
|
@pulumi.getter
|
467
|
-
def local(self) -> Optional[pulumi.Input[
|
466
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
468
467
|
"""
|
469
468
|
Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
470
469
|
replication.Tolerance duration to use when checking the last rotation time.
|
@@ -472,24 +471,24 @@ class _NomadSecretBackendState:
|
|
472
471
|
return pulumi.get(self, "local")
|
473
472
|
|
474
473
|
@local.setter
|
475
|
-
def local(self, value: Optional[pulumi.Input[
|
474
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
476
475
|
pulumi.set(self, "local", value)
|
477
476
|
|
478
|
-
@property
|
477
|
+
@_builtins.property
|
479
478
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
480
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
479
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
481
480
|
"""
|
482
481
|
Maximum possible lease duration for secrets in seconds.
|
483
482
|
"""
|
484
483
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
485
484
|
|
486
485
|
@max_lease_ttl_seconds.setter
|
487
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
486
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
488
487
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
489
488
|
|
490
|
-
@property
|
489
|
+
@_builtins.property
|
491
490
|
@pulumi.getter(name="maxTokenNameLength")
|
492
|
-
def max_token_name_length(self) -> Optional[pulumi.Input[
|
491
|
+
def max_token_name_length(self) -> Optional[pulumi.Input[_builtins.int]]:
|
493
492
|
"""
|
494
493
|
Specifies the maximum length to use for the name of the Nomad token
|
495
494
|
generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
|
@@ -498,24 +497,24 @@ class _NomadSecretBackendState:
|
|
498
497
|
return pulumi.get(self, "max_token_name_length")
|
499
498
|
|
500
499
|
@max_token_name_length.setter
|
501
|
-
def max_token_name_length(self, value: Optional[pulumi.Input[
|
500
|
+
def max_token_name_length(self, value: Optional[pulumi.Input[_builtins.int]]):
|
502
501
|
pulumi.set(self, "max_token_name_length", value)
|
503
502
|
|
504
|
-
@property
|
503
|
+
@_builtins.property
|
505
504
|
@pulumi.getter(name="maxTtl")
|
506
|
-
def max_ttl(self) -> Optional[pulumi.Input[
|
505
|
+
def max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
507
506
|
"""
|
508
507
|
Maximum possible lease duration for secrets in seconds.
|
509
508
|
"""
|
510
509
|
return pulumi.get(self, "max_ttl")
|
511
510
|
|
512
511
|
@max_ttl.setter
|
513
|
-
def max_ttl(self, value: Optional[pulumi.Input[
|
512
|
+
def max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
514
513
|
pulumi.set(self, "max_ttl", value)
|
515
514
|
|
516
|
-
@property
|
515
|
+
@_builtins.property
|
517
516
|
@pulumi.getter
|
518
|
-
def namespace(self) -> Optional[pulumi.Input[
|
517
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
519
518
|
"""
|
520
519
|
The namespace to provision the resource in.
|
521
520
|
The value should not contain leading or trailing forward slashes.
|
@@ -525,31 +524,31 @@ class _NomadSecretBackendState:
|
|
525
524
|
return pulumi.get(self, "namespace")
|
526
525
|
|
527
526
|
@namespace.setter
|
528
|
-
def namespace(self, value: Optional[pulumi.Input[
|
527
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
529
528
|
pulumi.set(self, "namespace", value)
|
530
529
|
|
531
|
-
@property
|
530
|
+
@_builtins.property
|
532
531
|
@pulumi.getter
|
533
|
-
def token(self) -> Optional[pulumi.Input[
|
532
|
+
def token(self) -> Optional[pulumi.Input[_builtins.str]]:
|
534
533
|
"""
|
535
534
|
Specifies the Nomad Management token to use.
|
536
535
|
"""
|
537
536
|
return pulumi.get(self, "token")
|
538
537
|
|
539
538
|
@token.setter
|
540
|
-
def token(self, value: Optional[pulumi.Input[
|
539
|
+
def token(self, value: Optional[pulumi.Input[_builtins.str]]):
|
541
540
|
pulumi.set(self, "token", value)
|
542
541
|
|
543
|
-
@property
|
542
|
+
@_builtins.property
|
544
543
|
@pulumi.getter
|
545
|
-
def ttl(self) -> Optional[pulumi.Input[
|
544
|
+
def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
546
545
|
"""
|
547
546
|
Specifies the ttl of the lease for the generated token.
|
548
547
|
"""
|
549
548
|
return pulumi.get(self, "ttl")
|
550
549
|
|
551
550
|
@ttl.setter
|
552
|
-
def ttl(self, value: Optional[pulumi.Input[
|
551
|
+
def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
553
552
|
pulumi.set(self, "ttl", value)
|
554
553
|
|
555
554
|
|
@@ -559,21 +558,21 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
559
558
|
def __init__(__self__,
|
560
559
|
resource_name: str,
|
561
560
|
opts: Optional[pulumi.ResourceOptions] = None,
|
562
|
-
address: Optional[pulumi.Input[
|
563
|
-
backend: Optional[pulumi.Input[
|
564
|
-
ca_cert: Optional[pulumi.Input[
|
565
|
-
client_cert: Optional[pulumi.Input[
|
566
|
-
client_key: Optional[pulumi.Input[
|
567
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
568
|
-
description: Optional[pulumi.Input[
|
569
|
-
disable_remount: Optional[pulumi.Input[
|
570
|
-
local: Optional[pulumi.Input[
|
571
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
572
|
-
max_token_name_length: Optional[pulumi.Input[
|
573
|
-
max_ttl: Optional[pulumi.Input[
|
574
|
-
namespace: Optional[pulumi.Input[
|
575
|
-
token: Optional[pulumi.Input[
|
576
|
-
ttl: Optional[pulumi.Input[
|
561
|
+
address: Optional[pulumi.Input[_builtins.str]] = None,
|
562
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
563
|
+
ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
564
|
+
client_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
565
|
+
client_key: Optional[pulumi.Input[_builtins.str]] = None,
|
566
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
567
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
568
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
569
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
570
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
571
|
+
max_token_name_length: Optional[pulumi.Input[_builtins.int]] = None,
|
572
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
573
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
574
|
+
token: Optional[pulumi.Input[_builtins.str]] = None,
|
575
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
577
576
|
__props__=None):
|
578
577
|
"""
|
579
578
|
## Example Usage
|
@@ -603,31 +602,31 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
603
602
|
|
604
603
|
:param str resource_name: The name of the resource.
|
605
604
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
606
|
-
:param pulumi.Input[
|
605
|
+
:param pulumi.Input[_builtins.str] address: Specifies the address of the Nomad instance, provided
|
607
606
|
as "protocol://host:port" like "http://127.0.0.1:4646".
|
608
|
-
:param pulumi.Input[
|
607
|
+
:param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at. Must
|
609
608
|
not begin or end with a `/`. Defaults to `nomad`.
|
610
|
-
:param pulumi.Input[
|
609
|
+
:param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
|
611
610
|
x509 PEM encoded.
|
612
|
-
:param pulumi.Input[
|
613
|
-
:param pulumi.Input[
|
614
|
-
:param pulumi.Input[
|
615
|
-
:param pulumi.Input[
|
616
|
-
:param pulumi.Input[
|
611
|
+
:param pulumi.Input[_builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
|
612
|
+
:param pulumi.Input[_builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
|
613
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
|
614
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
|
615
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
617
616
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
618
|
-
:param pulumi.Input[
|
617
|
+
:param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
619
618
|
replication.Tolerance duration to use when checking the last rotation time.
|
620
|
-
:param pulumi.Input[
|
621
|
-
:param pulumi.Input[
|
619
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
620
|
+
:param pulumi.Input[_builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
|
622
621
|
generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
|
623
622
|
by the Nomad version.
|
624
|
-
:param pulumi.Input[
|
625
|
-
:param pulumi.Input[
|
623
|
+
:param pulumi.Input[_builtins.int] max_ttl: Maximum possible lease duration for secrets in seconds.
|
624
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
626
625
|
The value should not contain leading or trailing forward slashes.
|
627
626
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
628
627
|
*Available only for Vault Enterprise*.
|
629
|
-
:param pulumi.Input[
|
630
|
-
:param pulumi.Input[
|
628
|
+
:param pulumi.Input[_builtins.str] token: Specifies the Nomad Management token to use.
|
629
|
+
:param pulumi.Input[_builtins.int] ttl: Specifies the ttl of the lease for the generated token.
|
631
630
|
"""
|
632
631
|
...
|
633
632
|
@overload
|
@@ -676,21 +675,21 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
676
675
|
def _internal_init(__self__,
|
677
676
|
resource_name: str,
|
678
677
|
opts: Optional[pulumi.ResourceOptions] = None,
|
679
|
-
address: Optional[pulumi.Input[
|
680
|
-
backend: Optional[pulumi.Input[
|
681
|
-
ca_cert: Optional[pulumi.Input[
|
682
|
-
client_cert: Optional[pulumi.Input[
|
683
|
-
client_key: Optional[pulumi.Input[
|
684
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
685
|
-
description: Optional[pulumi.Input[
|
686
|
-
disable_remount: Optional[pulumi.Input[
|
687
|
-
local: Optional[pulumi.Input[
|
688
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
689
|
-
max_token_name_length: Optional[pulumi.Input[
|
690
|
-
max_ttl: Optional[pulumi.Input[
|
691
|
-
namespace: Optional[pulumi.Input[
|
692
|
-
token: Optional[pulumi.Input[
|
693
|
-
ttl: Optional[pulumi.Input[
|
678
|
+
address: Optional[pulumi.Input[_builtins.str]] = None,
|
679
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
680
|
+
ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
681
|
+
client_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
682
|
+
client_key: Optional[pulumi.Input[_builtins.str]] = None,
|
683
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
684
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
685
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
686
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
687
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
688
|
+
max_token_name_length: Optional[pulumi.Input[_builtins.int]] = None,
|
689
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
690
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
691
|
+
token: Optional[pulumi.Input[_builtins.str]] = None,
|
692
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
694
693
|
__props__=None):
|
695
694
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
696
695
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -727,21 +726,21 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
727
726
|
def get(resource_name: str,
|
728
727
|
id: pulumi.Input[str],
|
729
728
|
opts: Optional[pulumi.ResourceOptions] = None,
|
730
|
-
address: Optional[pulumi.Input[
|
731
|
-
backend: Optional[pulumi.Input[
|
732
|
-
ca_cert: Optional[pulumi.Input[
|
733
|
-
client_cert: Optional[pulumi.Input[
|
734
|
-
client_key: Optional[pulumi.Input[
|
735
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
736
|
-
description: Optional[pulumi.Input[
|
737
|
-
disable_remount: Optional[pulumi.Input[
|
738
|
-
local: Optional[pulumi.Input[
|
739
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
740
|
-
max_token_name_length: Optional[pulumi.Input[
|
741
|
-
max_ttl: Optional[pulumi.Input[
|
742
|
-
namespace: Optional[pulumi.Input[
|
743
|
-
token: Optional[pulumi.Input[
|
744
|
-
ttl: Optional[pulumi.Input[
|
729
|
+
address: Optional[pulumi.Input[_builtins.str]] = None,
|
730
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
731
|
+
ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
732
|
+
client_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
733
|
+
client_key: Optional[pulumi.Input[_builtins.str]] = None,
|
734
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
735
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
736
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
737
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
738
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
739
|
+
max_token_name_length: Optional[pulumi.Input[_builtins.int]] = None,
|
740
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
741
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
742
|
+
token: Optional[pulumi.Input[_builtins.str]] = None,
|
743
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None) -> 'NomadSecretBackend':
|
745
744
|
"""
|
746
745
|
Get an existing NomadSecretBackend resource's state with the given name, id, and optional extra
|
747
746
|
properties used to qualify the lookup.
|
@@ -749,31 +748,31 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
749
748
|
:param str resource_name: The unique name of the resulting resource.
|
750
749
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
751
750
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
752
|
-
:param pulumi.Input[
|
751
|
+
:param pulumi.Input[_builtins.str] address: Specifies the address of the Nomad instance, provided
|
753
752
|
as "protocol://host:port" like "http://127.0.0.1:4646".
|
754
|
-
:param pulumi.Input[
|
753
|
+
:param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at. Must
|
755
754
|
not begin or end with a `/`. Defaults to `nomad`.
|
756
|
-
:param pulumi.Input[
|
755
|
+
:param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
|
757
756
|
x509 PEM encoded.
|
758
|
-
:param pulumi.Input[
|
759
|
-
:param pulumi.Input[
|
760
|
-
:param pulumi.Input[
|
761
|
-
:param pulumi.Input[
|
762
|
-
:param pulumi.Input[
|
757
|
+
:param pulumi.Input[_builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
|
758
|
+
:param pulumi.Input[_builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
|
759
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
|
760
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
|
761
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
763
762
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
764
|
-
:param pulumi.Input[
|
763
|
+
:param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
765
764
|
replication.Tolerance duration to use when checking the last rotation time.
|
766
|
-
:param pulumi.Input[
|
767
|
-
:param pulumi.Input[
|
765
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
766
|
+
:param pulumi.Input[_builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
|
768
767
|
generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
|
769
768
|
by the Nomad version.
|
770
|
-
:param pulumi.Input[
|
771
|
-
:param pulumi.Input[
|
769
|
+
:param pulumi.Input[_builtins.int] max_ttl: Maximum possible lease duration for secrets in seconds.
|
770
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
772
771
|
The value should not contain leading or trailing forward slashes.
|
773
772
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
774
773
|
*Available only for Vault Enterprise*.
|
775
|
-
:param pulumi.Input[
|
776
|
-
:param pulumi.Input[
|
774
|
+
:param pulumi.Input[_builtins.str] token: Specifies the Nomad Management token to use.
|
775
|
+
:param pulumi.Input[_builtins.int] ttl: Specifies the ttl of the lease for the generated token.
|
777
776
|
"""
|
778
777
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
779
778
|
|
@@ -796,94 +795,94 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
796
795
|
__props__.__dict__["ttl"] = ttl
|
797
796
|
return NomadSecretBackend(resource_name, opts=opts, __props__=__props__)
|
798
797
|
|
799
|
-
@property
|
798
|
+
@_builtins.property
|
800
799
|
@pulumi.getter
|
801
|
-
def address(self) -> pulumi.Output[Optional[
|
800
|
+
def address(self) -> pulumi.Output[Optional[_builtins.str]]:
|
802
801
|
"""
|
803
802
|
Specifies the address of the Nomad instance, provided
|
804
803
|
as "protocol://host:port" like "http://127.0.0.1:4646".
|
805
804
|
"""
|
806
805
|
return pulumi.get(self, "address")
|
807
806
|
|
808
|
-
@property
|
807
|
+
@_builtins.property
|
809
808
|
@pulumi.getter
|
810
|
-
def backend(self) -> pulumi.Output[Optional[
|
809
|
+
def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
|
811
810
|
"""
|
812
811
|
The unique path this backend should be mounted at. Must
|
813
812
|
not begin or end with a `/`. Defaults to `nomad`.
|
814
813
|
"""
|
815
814
|
return pulumi.get(self, "backend")
|
816
815
|
|
817
|
-
@property
|
816
|
+
@_builtins.property
|
818
817
|
@pulumi.getter(name="caCert")
|
819
|
-
def ca_cert(self) -> pulumi.Output[Optional[
|
818
|
+
def ca_cert(self) -> pulumi.Output[Optional[_builtins.str]]:
|
820
819
|
"""
|
821
820
|
CA certificate to use when verifying the Nomad server certificate, must be
|
822
821
|
x509 PEM encoded.
|
823
822
|
"""
|
824
823
|
return pulumi.get(self, "ca_cert")
|
825
824
|
|
826
|
-
@property
|
825
|
+
@_builtins.property
|
827
826
|
@pulumi.getter(name="clientCert")
|
828
|
-
def client_cert(self) -> pulumi.Output[Optional[
|
827
|
+
def client_cert(self) -> pulumi.Output[Optional[_builtins.str]]:
|
829
828
|
"""
|
830
829
|
Client certificate to provide to the Nomad server, must be x509 PEM encoded.
|
831
830
|
"""
|
832
831
|
return pulumi.get(self, "client_cert")
|
833
832
|
|
834
|
-
@property
|
833
|
+
@_builtins.property
|
835
834
|
@pulumi.getter(name="clientKey")
|
836
|
-
def client_key(self) -> pulumi.Output[Optional[
|
835
|
+
def client_key(self) -> pulumi.Output[Optional[_builtins.str]]:
|
837
836
|
"""
|
838
837
|
Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
|
839
838
|
"""
|
840
839
|
return pulumi.get(self, "client_key")
|
841
840
|
|
842
|
-
@property
|
841
|
+
@_builtins.property
|
843
842
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
844
|
-
def default_lease_ttl_seconds(self) -> pulumi.Output[
|
843
|
+
def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
|
845
844
|
"""
|
846
845
|
Default lease duration for secrets in seconds.
|
847
846
|
"""
|
848
847
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
849
848
|
|
850
|
-
@property
|
849
|
+
@_builtins.property
|
851
850
|
@pulumi.getter
|
852
|
-
def description(self) -> pulumi.Output[Optional[
|
851
|
+
def description(self) -> pulumi.Output[Optional[_builtins.str]]:
|
853
852
|
"""
|
854
853
|
Human-friendly description of the mount for the Active Directory backend.
|
855
854
|
"""
|
856
855
|
return pulumi.get(self, "description")
|
857
856
|
|
858
|
-
@property
|
857
|
+
@_builtins.property
|
859
858
|
@pulumi.getter(name="disableRemount")
|
860
|
-
def disable_remount(self) -> pulumi.Output[Optional[
|
859
|
+
def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
861
860
|
"""
|
862
861
|
If set, opts out of mount migration on path updates.
|
863
862
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
864
863
|
"""
|
865
864
|
return pulumi.get(self, "disable_remount")
|
866
865
|
|
867
|
-
@property
|
866
|
+
@_builtins.property
|
868
867
|
@pulumi.getter
|
869
|
-
def local(self) -> pulumi.Output[Optional[
|
868
|
+
def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
870
869
|
"""
|
871
870
|
Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
872
871
|
replication.Tolerance duration to use when checking the last rotation time.
|
873
872
|
"""
|
874
873
|
return pulumi.get(self, "local")
|
875
874
|
|
876
|
-
@property
|
875
|
+
@_builtins.property
|
877
876
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
878
|
-
def max_lease_ttl_seconds(self) -> pulumi.Output[
|
877
|
+
def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
|
879
878
|
"""
|
880
879
|
Maximum possible lease duration for secrets in seconds.
|
881
880
|
"""
|
882
881
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
883
882
|
|
884
|
-
@property
|
883
|
+
@_builtins.property
|
885
884
|
@pulumi.getter(name="maxTokenNameLength")
|
886
|
-
def max_token_name_length(self) -> pulumi.Output[
|
885
|
+
def max_token_name_length(self) -> pulumi.Output[_builtins.int]:
|
887
886
|
"""
|
888
887
|
Specifies the maximum length to use for the name of the Nomad token
|
889
888
|
generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
|
@@ -891,17 +890,17 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
891
890
|
"""
|
892
891
|
return pulumi.get(self, "max_token_name_length")
|
893
892
|
|
894
|
-
@property
|
893
|
+
@_builtins.property
|
895
894
|
@pulumi.getter(name="maxTtl")
|
896
|
-
def max_ttl(self) -> pulumi.Output[
|
895
|
+
def max_ttl(self) -> pulumi.Output[_builtins.int]:
|
897
896
|
"""
|
898
897
|
Maximum possible lease duration for secrets in seconds.
|
899
898
|
"""
|
900
899
|
return pulumi.get(self, "max_ttl")
|
901
900
|
|
902
|
-
@property
|
901
|
+
@_builtins.property
|
903
902
|
@pulumi.getter
|
904
|
-
def namespace(self) -> pulumi.Output[Optional[
|
903
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
905
904
|
"""
|
906
905
|
The namespace to provision the resource in.
|
907
906
|
The value should not contain leading or trailing forward slashes.
|
@@ -910,17 +909,17 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
910
909
|
"""
|
911
910
|
return pulumi.get(self, "namespace")
|
912
911
|
|
913
|
-
@property
|
912
|
+
@_builtins.property
|
914
913
|
@pulumi.getter
|
915
|
-
def token(self) -> pulumi.Output[Optional[
|
914
|
+
def token(self) -> pulumi.Output[Optional[_builtins.str]]:
|
916
915
|
"""
|
917
916
|
Specifies the Nomad Management token to use.
|
918
917
|
"""
|
919
918
|
return pulumi.get(self, "token")
|
920
919
|
|
921
|
-
@property
|
920
|
+
@_builtins.property
|
922
921
|
@pulumi.getter
|
923
|
-
def ttl(self) -> pulumi.Output[
|
922
|
+
def ttl(self) -> pulumi.Output[_builtins.int]:
|
924
923
|
"""
|
925
924
|
Specifies the ttl of the lease for the generated token.
|
926
925
|
"""
|