pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,101 +19,101 @@ __all__ = ['SecretBackendArgs', 'SecretBackend']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class SecretBackendArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
binddn: pulumi.Input[
|
24
|
-
bindpass: pulumi.Input[
|
25
|
-
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
26
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
27
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
28
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
29
|
-
certificate: Optional[pulumi.Input[
|
30
|
-
client_tls_cert: Optional[pulumi.Input[
|
31
|
-
client_tls_key: Optional[pulumi.Input[
|
32
|
-
connection_timeout: Optional[pulumi.Input[
|
33
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
34
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[
|
35
|
-
description: Optional[pulumi.Input[
|
36
|
-
disable_automated_rotation: Optional[pulumi.Input[
|
37
|
-
disable_remount: Optional[pulumi.Input[
|
38
|
-
external_entropy_access: Optional[pulumi.Input[
|
39
|
-
identity_token_key: Optional[pulumi.Input[
|
40
|
-
insecure_tls: Optional[pulumi.Input[
|
41
|
-
listing_visibility: Optional[pulumi.Input[
|
42
|
-
local: Optional[pulumi.Input[
|
43
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
44
|
-
namespace: Optional[pulumi.Input[
|
45
|
-
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
46
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
47
|
-
password_policy: Optional[pulumi.Input[
|
48
|
-
path: Optional[pulumi.Input[
|
49
|
-
plugin_version: Optional[pulumi.Input[
|
50
|
-
request_timeout: Optional[pulumi.Input[
|
51
|
-
rotation_period: Optional[pulumi.Input[
|
52
|
-
rotation_schedule: Optional[pulumi.Input[
|
53
|
-
rotation_window: Optional[pulumi.Input[
|
54
|
-
schema: Optional[pulumi.Input[
|
55
|
-
seal_wrap: Optional[pulumi.Input[
|
56
|
-
skip_static_role_import_rotation: Optional[pulumi.Input[
|
57
|
-
starttls: Optional[pulumi.Input[
|
58
|
-
upndomain: Optional[pulumi.Input[
|
59
|
-
url: Optional[pulumi.Input[
|
60
|
-
userattr: Optional[pulumi.Input[
|
61
|
-
userdn: Optional[pulumi.Input[
|
22
|
+
binddn: pulumi.Input[_builtins.str],
|
23
|
+
bindpass: pulumi.Input[_builtins.str],
|
24
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
25
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
26
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
27
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
28
|
+
certificate: Optional[pulumi.Input[_builtins.str]] = None,
|
29
|
+
client_tls_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
30
|
+
client_tls_key: Optional[pulumi.Input[_builtins.str]] = None,
|
31
|
+
connection_timeout: Optional[pulumi.Input[_builtins.int]] = None,
|
32
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
33
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
34
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
35
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
36
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
37
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
38
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
39
|
+
insecure_tls: Optional[pulumi.Input[_builtins.bool]] = None,
|
40
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
41
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
42
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
43
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
44
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
45
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
46
|
+
password_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
47
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
48
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
49
|
+
request_timeout: Optional[pulumi.Input[_builtins.int]] = None,
|
50
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
51
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
52
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
53
|
+
schema: Optional[pulumi.Input[_builtins.str]] = None,
|
54
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
55
|
+
skip_static_role_import_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
56
|
+
starttls: Optional[pulumi.Input[_builtins.bool]] = None,
|
57
|
+
upndomain: Optional[pulumi.Input[_builtins.str]] = None,
|
58
|
+
url: Optional[pulumi.Input[_builtins.str]] = None,
|
59
|
+
userattr: Optional[pulumi.Input[_builtins.str]] = None,
|
60
|
+
userdn: Optional[pulumi.Input[_builtins.str]] = None):
|
62
61
|
"""
|
63
62
|
The set of arguments for constructing a SecretBackend resource.
|
64
|
-
:param pulumi.Input[
|
65
|
-
:param pulumi.Input[
|
66
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
67
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
68
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
69
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
70
|
-
:param pulumi.Input[
|
63
|
+
:param pulumi.Input[_builtins.str] binddn: Distinguished name of object to bind when performing user and group search.
|
64
|
+
:param pulumi.Input[_builtins.str] bindpass: Password to use along with binddn when performing user search.
|
65
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
66
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
67
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
68
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
69
|
+
:param pulumi.Input[_builtins.str] certificate: CA certificate to use when verifying LDAP server certificate, must be
|
71
70
|
x509 PEM encoded.
|
72
|
-
:param pulumi.Input[
|
73
|
-
:param pulumi.Input[
|
74
|
-
:param pulumi.Input[
|
71
|
+
:param pulumi.Input[_builtins.str] client_tls_cert: Client certificate to provide to the LDAP server, must be x509 PEM encoded.
|
72
|
+
:param pulumi.Input[_builtins.str] client_tls_key: Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
|
73
|
+
:param pulumi.Input[_builtins.int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
|
75
74
|
the next URL in the configuration.
|
76
|
-
:param pulumi.Input[
|
77
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
78
|
-
:param pulumi.Input[
|
79
|
-
:param pulumi.Input[
|
80
|
-
:param pulumi.Input[
|
81
|
-
:param pulumi.Input[
|
82
|
-
:param pulumi.Input[
|
83
|
-
:param pulumi.Input[
|
75
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
|
76
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
77
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
|
78
|
+
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
79
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
80
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
81
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
82
|
+
:param pulumi.Input[_builtins.bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
|
84
83
|
Defaults to `false`.
|
85
|
-
:param pulumi.Input[
|
86
|
-
:param pulumi.Input[
|
84
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
85
|
+
:param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
87
86
|
replication.Tolerance duration to use when checking the last rotation time.
|
88
|
-
:param pulumi.Input[
|
89
|
-
:param pulumi.Input[
|
87
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
88
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
90
89
|
The value should not contain leading or trailing forward slashes.
|
91
90
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
92
91
|
*Available only for Vault Enterprise*.
|
93
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
94
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
95
|
-
:param pulumi.Input[
|
96
|
-
:param pulumi.Input[
|
92
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
93
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
94
|
+
:param pulumi.Input[_builtins.str] password_policy: Name of the password policy to use to generate passwords.
|
95
|
+
:param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
|
97
96
|
not begin or end with a `/`. Defaults to `ldap`.
|
98
|
-
:param pulumi.Input[
|
99
|
-
:param pulumi.Input[
|
97
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
98
|
+
:param pulumi.Input[_builtins.int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
|
100
99
|
before returning back an error.
|
101
|
-
:param pulumi.Input[
|
100
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
102
101
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
103
|
-
:param pulumi.Input[
|
102
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
104
103
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
105
|
-
:param pulumi.Input[
|
104
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
106
105
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
107
106
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
108
|
-
:param pulumi.Input[
|
109
|
-
:param pulumi.Input[
|
110
|
-
:param pulumi.Input[
|
107
|
+
:param pulumi.Input[_builtins.str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
|
108
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
109
|
+
:param pulumi.Input[_builtins.bool] skip_static_role_import_rotation: If set to true, static roles will not be rotated during import.
|
111
110
|
Defaults to false. Requires Vault 1.16 or above.
|
112
|
-
:param pulumi.Input[
|
113
|
-
:param pulumi.Input[
|
114
|
-
:param pulumi.Input[
|
111
|
+
:param pulumi.Input[_builtins.bool] starttls: Issue a StartTLS command after establishing unencrypted connection.
|
112
|
+
:param pulumi.Input[_builtins.str] upndomain: Enables userPrincipalDomain login with [username]@UPNDomain.
|
113
|
+
:param pulumi.Input[_builtins.str] url: LDAP URL to connect to. Multiple URLs can be specified by concatenating
|
115
114
|
them with commas; they will be tried in-order. Defaults to `ldap://127.0.0.1`.
|
116
|
-
:param pulumi.Input[
|
117
|
-
:param pulumi.Input[
|
115
|
+
:param pulumi.Input[_builtins.str] userattr: Attribute used when searching users. Defaults to `cn`.
|
116
|
+
:param pulumi.Input[_builtins.str] userdn: LDAP domain to use for users (eg: ou=People,dc=example,dc=org)`.
|
118
117
|
"""
|
119
118
|
pulumi.set(__self__, "binddn", binddn)
|
120
119
|
pulumi.set(__self__, "bindpass", bindpass)
|
@@ -193,81 +192,81 @@ class SecretBackendArgs:
|
|
193
192
|
if userdn is not None:
|
194
193
|
pulumi.set(__self__, "userdn", userdn)
|
195
194
|
|
196
|
-
@property
|
195
|
+
@_builtins.property
|
197
196
|
@pulumi.getter
|
198
|
-
def binddn(self) -> pulumi.Input[
|
197
|
+
def binddn(self) -> pulumi.Input[_builtins.str]:
|
199
198
|
"""
|
200
199
|
Distinguished name of object to bind when performing user and group search.
|
201
200
|
"""
|
202
201
|
return pulumi.get(self, "binddn")
|
203
202
|
|
204
203
|
@binddn.setter
|
205
|
-
def binddn(self, value: pulumi.Input[
|
204
|
+
def binddn(self, value: pulumi.Input[_builtins.str]):
|
206
205
|
pulumi.set(self, "binddn", value)
|
207
206
|
|
208
|
-
@property
|
207
|
+
@_builtins.property
|
209
208
|
@pulumi.getter
|
210
|
-
def bindpass(self) -> pulumi.Input[
|
209
|
+
def bindpass(self) -> pulumi.Input[_builtins.str]:
|
211
210
|
"""
|
212
211
|
Password to use along with binddn when performing user search.
|
213
212
|
"""
|
214
213
|
return pulumi.get(self, "bindpass")
|
215
214
|
|
216
215
|
@bindpass.setter
|
217
|
-
def bindpass(self, value: pulumi.Input[
|
216
|
+
def bindpass(self, value: pulumi.Input[_builtins.str]):
|
218
217
|
pulumi.set(self, "bindpass", value)
|
219
218
|
|
220
|
-
@property
|
219
|
+
@_builtins.property
|
221
220
|
@pulumi.getter(name="allowedManagedKeys")
|
222
|
-
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
221
|
+
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
223
222
|
"""
|
224
223
|
List of managed key registry entry names that the mount in question is allowed to access
|
225
224
|
"""
|
226
225
|
return pulumi.get(self, "allowed_managed_keys")
|
227
226
|
|
228
227
|
@allowed_managed_keys.setter
|
229
|
-
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
228
|
+
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
230
229
|
pulumi.set(self, "allowed_managed_keys", value)
|
231
230
|
|
232
|
-
@property
|
231
|
+
@_builtins.property
|
233
232
|
@pulumi.getter(name="allowedResponseHeaders")
|
234
|
-
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
233
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
235
234
|
"""
|
236
235
|
List of headers to allow and pass from the request to the plugin
|
237
236
|
"""
|
238
237
|
return pulumi.get(self, "allowed_response_headers")
|
239
238
|
|
240
239
|
@allowed_response_headers.setter
|
241
|
-
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
240
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
242
241
|
pulumi.set(self, "allowed_response_headers", value)
|
243
242
|
|
244
|
-
@property
|
243
|
+
@_builtins.property
|
245
244
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
246
|
-
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
245
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
247
246
|
"""
|
248
247
|
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
249
248
|
"""
|
250
249
|
return pulumi.get(self, "audit_non_hmac_request_keys")
|
251
250
|
|
252
251
|
@audit_non_hmac_request_keys.setter
|
253
|
-
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
252
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
254
253
|
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
255
254
|
|
256
|
-
@property
|
255
|
+
@_builtins.property
|
257
256
|
@pulumi.getter(name="auditNonHmacResponseKeys")
|
258
|
-
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
257
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
259
258
|
"""
|
260
259
|
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
261
260
|
"""
|
262
261
|
return pulumi.get(self, "audit_non_hmac_response_keys")
|
263
262
|
|
264
263
|
@audit_non_hmac_response_keys.setter
|
265
|
-
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
264
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
266
265
|
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
267
266
|
|
268
|
-
@property
|
267
|
+
@_builtins.property
|
269
268
|
@pulumi.getter
|
270
|
-
def certificate(self) -> Optional[pulumi.Input[
|
269
|
+
def certificate(self) -> Optional[pulumi.Input[_builtins.str]]:
|
271
270
|
"""
|
272
271
|
CA certificate to use when verifying LDAP server certificate, must be
|
273
272
|
x509 PEM encoded.
|
@@ -275,36 +274,36 @@ class SecretBackendArgs:
|
|
275
274
|
return pulumi.get(self, "certificate")
|
276
275
|
|
277
276
|
@certificate.setter
|
278
|
-
def certificate(self, value: Optional[pulumi.Input[
|
277
|
+
def certificate(self, value: Optional[pulumi.Input[_builtins.str]]):
|
279
278
|
pulumi.set(self, "certificate", value)
|
280
279
|
|
281
|
-
@property
|
280
|
+
@_builtins.property
|
282
281
|
@pulumi.getter(name="clientTlsCert")
|
283
|
-
def client_tls_cert(self) -> Optional[pulumi.Input[
|
282
|
+
def client_tls_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
|
284
283
|
"""
|
285
284
|
Client certificate to provide to the LDAP server, must be x509 PEM encoded.
|
286
285
|
"""
|
287
286
|
return pulumi.get(self, "client_tls_cert")
|
288
287
|
|
289
288
|
@client_tls_cert.setter
|
290
|
-
def client_tls_cert(self, value: Optional[pulumi.Input[
|
289
|
+
def client_tls_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
|
291
290
|
pulumi.set(self, "client_tls_cert", value)
|
292
291
|
|
293
|
-
@property
|
292
|
+
@_builtins.property
|
294
293
|
@pulumi.getter(name="clientTlsKey")
|
295
|
-
def client_tls_key(self) -> Optional[pulumi.Input[
|
294
|
+
def client_tls_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
296
295
|
"""
|
297
296
|
Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
|
298
297
|
"""
|
299
298
|
return pulumi.get(self, "client_tls_key")
|
300
299
|
|
301
300
|
@client_tls_key.setter
|
302
|
-
def client_tls_key(self, value: Optional[pulumi.Input[
|
301
|
+
def client_tls_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
303
302
|
pulumi.set(self, "client_tls_key", value)
|
304
303
|
|
305
|
-
@property
|
304
|
+
@_builtins.property
|
306
305
|
@pulumi.getter(name="connectionTimeout")
|
307
|
-
def connection_timeout(self) -> Optional[pulumi.Input[
|
306
|
+
def connection_timeout(self) -> Optional[pulumi.Input[_builtins.int]]:
|
308
307
|
"""
|
309
308
|
Timeout, in seconds, when attempting to connect to the LDAP server before trying
|
310
309
|
the next URL in the configuration.
|
@@ -312,96 +311,96 @@ class SecretBackendArgs:
|
|
312
311
|
return pulumi.get(self, "connection_timeout")
|
313
312
|
|
314
313
|
@connection_timeout.setter
|
315
|
-
def connection_timeout(self, value: Optional[pulumi.Input[
|
314
|
+
def connection_timeout(self, value: Optional[pulumi.Input[_builtins.int]]):
|
316
315
|
pulumi.set(self, "connection_timeout", value)
|
317
316
|
|
318
|
-
@property
|
317
|
+
@_builtins.property
|
319
318
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
320
|
-
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
319
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
321
320
|
"""
|
322
321
|
Default lease duration for secrets in seconds.
|
323
322
|
"""
|
324
323
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
325
324
|
|
326
325
|
@default_lease_ttl_seconds.setter
|
327
|
-
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
326
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
328
327
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
329
328
|
|
330
|
-
@property
|
329
|
+
@_builtins.property
|
331
330
|
@pulumi.getter(name="delegatedAuthAccessors")
|
332
|
-
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
331
|
+
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
333
332
|
"""
|
334
333
|
List of headers to allow and pass from the request to the plugin
|
335
334
|
"""
|
336
335
|
return pulumi.get(self, "delegated_auth_accessors")
|
337
336
|
|
338
337
|
@delegated_auth_accessors.setter
|
339
|
-
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
338
|
+
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
340
339
|
pulumi.set(self, "delegated_auth_accessors", value)
|
341
340
|
|
342
|
-
@property
|
341
|
+
@_builtins.property
|
343
342
|
@pulumi.getter
|
344
|
-
def description(self) -> Optional[pulumi.Input[
|
343
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
345
344
|
"""
|
346
345
|
Human-friendly description of the mount for the Active Directory backend.
|
347
346
|
"""
|
348
347
|
return pulumi.get(self, "description")
|
349
348
|
|
350
349
|
@description.setter
|
351
|
-
def description(self, value: Optional[pulumi.Input[
|
350
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
352
351
|
pulumi.set(self, "description", value)
|
353
352
|
|
354
|
-
@property
|
353
|
+
@_builtins.property
|
355
354
|
@pulumi.getter(name="disableAutomatedRotation")
|
356
|
-
def disable_automated_rotation(self) -> Optional[pulumi.Input[
|
355
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
357
356
|
"""
|
358
357
|
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
359
358
|
"""
|
360
359
|
return pulumi.get(self, "disable_automated_rotation")
|
361
360
|
|
362
361
|
@disable_automated_rotation.setter
|
363
|
-
def disable_automated_rotation(self, value: Optional[pulumi.Input[
|
362
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
364
363
|
pulumi.set(self, "disable_automated_rotation", value)
|
365
364
|
|
366
|
-
@property
|
365
|
+
@_builtins.property
|
367
366
|
@pulumi.getter(name="disableRemount")
|
368
|
-
def disable_remount(self) -> Optional[pulumi.Input[
|
367
|
+
def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
369
368
|
"""
|
370
369
|
If set, opts out of mount migration on path updates.
|
371
370
|
"""
|
372
371
|
return pulumi.get(self, "disable_remount")
|
373
372
|
|
374
373
|
@disable_remount.setter
|
375
|
-
def disable_remount(self, value: Optional[pulumi.Input[
|
374
|
+
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
376
375
|
pulumi.set(self, "disable_remount", value)
|
377
376
|
|
378
|
-
@property
|
377
|
+
@_builtins.property
|
379
378
|
@pulumi.getter(name="externalEntropyAccess")
|
380
|
-
def external_entropy_access(self) -> Optional[pulumi.Input[
|
379
|
+
def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
381
380
|
"""
|
382
381
|
Enable the secrets engine to access Vault's external entropy source
|
383
382
|
"""
|
384
383
|
return pulumi.get(self, "external_entropy_access")
|
385
384
|
|
386
385
|
@external_entropy_access.setter
|
387
|
-
def external_entropy_access(self, value: Optional[pulumi.Input[
|
386
|
+
def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
388
387
|
pulumi.set(self, "external_entropy_access", value)
|
389
388
|
|
390
|
-
@property
|
389
|
+
@_builtins.property
|
391
390
|
@pulumi.getter(name="identityTokenKey")
|
392
|
-
def identity_token_key(self) -> Optional[pulumi.Input[
|
391
|
+
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
393
392
|
"""
|
394
393
|
The key to use for signing plugin workload identity tokens
|
395
394
|
"""
|
396
395
|
return pulumi.get(self, "identity_token_key")
|
397
396
|
|
398
397
|
@identity_token_key.setter
|
399
|
-
def identity_token_key(self, value: Optional[pulumi.Input[
|
398
|
+
def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
400
399
|
pulumi.set(self, "identity_token_key", value)
|
401
400
|
|
402
|
-
@property
|
401
|
+
@_builtins.property
|
403
402
|
@pulumi.getter(name="insecureTls")
|
404
|
-
def insecure_tls(self) -> Optional[pulumi.Input[
|
403
|
+
def insecure_tls(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
405
404
|
"""
|
406
405
|
Skip LDAP server SSL Certificate verification. This is not recommended for production.
|
407
406
|
Defaults to `false`.
|
@@ -409,24 +408,24 @@ class SecretBackendArgs:
|
|
409
408
|
return pulumi.get(self, "insecure_tls")
|
410
409
|
|
411
410
|
@insecure_tls.setter
|
412
|
-
def insecure_tls(self, value: Optional[pulumi.Input[
|
411
|
+
def insecure_tls(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
413
412
|
pulumi.set(self, "insecure_tls", value)
|
414
413
|
|
415
|
-
@property
|
414
|
+
@_builtins.property
|
416
415
|
@pulumi.getter(name="listingVisibility")
|
417
|
-
def listing_visibility(self) -> Optional[pulumi.Input[
|
416
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
418
417
|
"""
|
419
418
|
Specifies whether to show this mount in the UI-specific listing endpoint
|
420
419
|
"""
|
421
420
|
return pulumi.get(self, "listing_visibility")
|
422
421
|
|
423
422
|
@listing_visibility.setter
|
424
|
-
def listing_visibility(self, value: Optional[pulumi.Input[
|
423
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
425
424
|
pulumi.set(self, "listing_visibility", value)
|
426
425
|
|
427
|
-
@property
|
426
|
+
@_builtins.property
|
428
427
|
@pulumi.getter
|
429
|
-
def local(self) -> Optional[pulumi.Input[
|
428
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
430
429
|
"""
|
431
430
|
Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
432
431
|
replication.Tolerance duration to use when checking the last rotation time.
|
@@ -434,24 +433,24 @@ class SecretBackendArgs:
|
|
434
433
|
return pulumi.get(self, "local")
|
435
434
|
|
436
435
|
@local.setter
|
437
|
-
def local(self, value: Optional[pulumi.Input[
|
436
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
438
437
|
pulumi.set(self, "local", value)
|
439
438
|
|
440
|
-
@property
|
439
|
+
@_builtins.property
|
441
440
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
442
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
441
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
443
442
|
"""
|
444
443
|
Maximum possible lease duration for secrets in seconds.
|
445
444
|
"""
|
446
445
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
447
446
|
|
448
447
|
@max_lease_ttl_seconds.setter
|
449
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
448
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
450
449
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
451
450
|
|
452
|
-
@property
|
451
|
+
@_builtins.property
|
453
452
|
@pulumi.getter
|
454
|
-
def namespace(self) -> Optional[pulumi.Input[
|
453
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
455
454
|
"""
|
456
455
|
The namespace to provision the resource in.
|
457
456
|
The value should not contain leading or trailing forward slashes.
|
@@ -461,48 +460,48 @@ class SecretBackendArgs:
|
|
461
460
|
return pulumi.get(self, "namespace")
|
462
461
|
|
463
462
|
@namespace.setter
|
464
|
-
def namespace(self, value: Optional[pulumi.Input[
|
463
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
465
464
|
pulumi.set(self, "namespace", value)
|
466
465
|
|
467
|
-
@property
|
466
|
+
@_builtins.property
|
468
467
|
@pulumi.getter
|
469
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
468
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
470
469
|
"""
|
471
470
|
Specifies mount type specific options that are passed to the backend
|
472
471
|
"""
|
473
472
|
return pulumi.get(self, "options")
|
474
473
|
|
475
474
|
@options.setter
|
476
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
475
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
477
476
|
pulumi.set(self, "options", value)
|
478
477
|
|
479
|
-
@property
|
478
|
+
@_builtins.property
|
480
479
|
@pulumi.getter(name="passthroughRequestHeaders")
|
481
|
-
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
480
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
482
481
|
"""
|
483
482
|
List of headers to allow and pass from the request to the plugin
|
484
483
|
"""
|
485
484
|
return pulumi.get(self, "passthrough_request_headers")
|
486
485
|
|
487
486
|
@passthrough_request_headers.setter
|
488
|
-
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
487
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
489
488
|
pulumi.set(self, "passthrough_request_headers", value)
|
490
489
|
|
491
|
-
@property
|
490
|
+
@_builtins.property
|
492
491
|
@pulumi.getter(name="passwordPolicy")
|
493
|
-
def password_policy(self) -> Optional[pulumi.Input[
|
492
|
+
def password_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
|
494
493
|
"""
|
495
494
|
Name of the password policy to use to generate passwords.
|
496
495
|
"""
|
497
496
|
return pulumi.get(self, "password_policy")
|
498
497
|
|
499
498
|
@password_policy.setter
|
500
|
-
def password_policy(self, value: Optional[pulumi.Input[
|
499
|
+
def password_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
|
501
500
|
pulumi.set(self, "password_policy", value)
|
502
501
|
|
503
|
-
@property
|
502
|
+
@_builtins.property
|
504
503
|
@pulumi.getter
|
505
|
-
def path(self) -> Optional[pulumi.Input[
|
504
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
506
505
|
"""
|
507
506
|
The unique path this backend should be mounted at. Must
|
508
507
|
not begin or end with a `/`. Defaults to `ldap`.
|
@@ -510,24 +509,24 @@ class SecretBackendArgs:
|
|
510
509
|
return pulumi.get(self, "path")
|
511
510
|
|
512
511
|
@path.setter
|
513
|
-
def path(self, value: Optional[pulumi.Input[
|
512
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
514
513
|
pulumi.set(self, "path", value)
|
515
514
|
|
516
|
-
@property
|
515
|
+
@_builtins.property
|
517
516
|
@pulumi.getter(name="pluginVersion")
|
518
|
-
def plugin_version(self) -> Optional[pulumi.Input[
|
517
|
+
def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
|
519
518
|
"""
|
520
519
|
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
521
520
|
"""
|
522
521
|
return pulumi.get(self, "plugin_version")
|
523
522
|
|
524
523
|
@plugin_version.setter
|
525
|
-
def plugin_version(self, value: Optional[pulumi.Input[
|
524
|
+
def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
|
526
525
|
pulumi.set(self, "plugin_version", value)
|
527
526
|
|
528
|
-
@property
|
527
|
+
@_builtins.property
|
529
528
|
@pulumi.getter(name="requestTimeout")
|
530
|
-
def request_timeout(self) -> Optional[pulumi.Input[
|
529
|
+
def request_timeout(self) -> Optional[pulumi.Input[_builtins.int]]:
|
531
530
|
"""
|
532
531
|
Timeout, in seconds, for the connection when making requests against the server
|
533
532
|
before returning back an error.
|
@@ -535,12 +534,12 @@ class SecretBackendArgs:
|
|
535
534
|
return pulumi.get(self, "request_timeout")
|
536
535
|
|
537
536
|
@request_timeout.setter
|
538
|
-
def request_timeout(self, value: Optional[pulumi.Input[
|
537
|
+
def request_timeout(self, value: Optional[pulumi.Input[_builtins.int]]):
|
539
538
|
pulumi.set(self, "request_timeout", value)
|
540
539
|
|
541
|
-
@property
|
540
|
+
@_builtins.property
|
542
541
|
@pulumi.getter(name="rotationPeriod")
|
543
|
-
def rotation_period(self) -> Optional[pulumi.Input[
|
542
|
+
def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
544
543
|
"""
|
545
544
|
The amount of time in seconds Vault should wait before rotating the root credential.
|
546
545
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
@@ -548,12 +547,12 @@ class SecretBackendArgs:
|
|
548
547
|
return pulumi.get(self, "rotation_period")
|
549
548
|
|
550
549
|
@rotation_period.setter
|
551
|
-
def rotation_period(self, value: Optional[pulumi.Input[
|
550
|
+
def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
552
551
|
pulumi.set(self, "rotation_period", value)
|
553
552
|
|
554
|
-
@property
|
553
|
+
@_builtins.property
|
555
554
|
@pulumi.getter(name="rotationSchedule")
|
556
|
-
def rotation_schedule(self) -> Optional[pulumi.Input[
|
555
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
|
557
556
|
"""
|
558
557
|
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
559
558
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
@@ -561,12 +560,12 @@ class SecretBackendArgs:
|
|
561
560
|
return pulumi.get(self, "rotation_schedule")
|
562
561
|
|
563
562
|
@rotation_schedule.setter
|
564
|
-
def rotation_schedule(self, value: Optional[pulumi.Input[
|
563
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
|
565
564
|
pulumi.set(self, "rotation_schedule", value)
|
566
565
|
|
567
|
-
@property
|
566
|
+
@_builtins.property
|
568
567
|
@pulumi.getter(name="rotationWindow")
|
569
|
-
def rotation_window(self) -> Optional[pulumi.Input[
|
568
|
+
def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
|
570
569
|
"""
|
571
570
|
The maximum amount of time in seconds allowed to complete
|
572
571
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
@@ -575,36 +574,36 @@ class SecretBackendArgs:
|
|
575
574
|
return pulumi.get(self, "rotation_window")
|
576
575
|
|
577
576
|
@rotation_window.setter
|
578
|
-
def rotation_window(self, value: Optional[pulumi.Input[
|
577
|
+
def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
|
579
578
|
pulumi.set(self, "rotation_window", value)
|
580
579
|
|
581
|
-
@property
|
580
|
+
@_builtins.property
|
582
581
|
@pulumi.getter
|
583
|
-
def schema(self) -> Optional[pulumi.Input[
|
582
|
+
def schema(self) -> Optional[pulumi.Input[_builtins.str]]:
|
584
583
|
"""
|
585
584
|
The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
|
586
585
|
"""
|
587
586
|
return pulumi.get(self, "schema")
|
588
587
|
|
589
588
|
@schema.setter
|
590
|
-
def schema(self, value: Optional[pulumi.Input[
|
589
|
+
def schema(self, value: Optional[pulumi.Input[_builtins.str]]):
|
591
590
|
pulumi.set(self, "schema", value)
|
592
591
|
|
593
|
-
@property
|
592
|
+
@_builtins.property
|
594
593
|
@pulumi.getter(name="sealWrap")
|
595
|
-
def seal_wrap(self) -> Optional[pulumi.Input[
|
594
|
+
def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
596
595
|
"""
|
597
596
|
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
598
597
|
"""
|
599
598
|
return pulumi.get(self, "seal_wrap")
|
600
599
|
|
601
600
|
@seal_wrap.setter
|
602
|
-
def seal_wrap(self, value: Optional[pulumi.Input[
|
601
|
+
def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
603
602
|
pulumi.set(self, "seal_wrap", value)
|
604
603
|
|
605
|
-
@property
|
604
|
+
@_builtins.property
|
606
605
|
@pulumi.getter(name="skipStaticRoleImportRotation")
|
607
|
-
def skip_static_role_import_rotation(self) -> Optional[pulumi.Input[
|
606
|
+
def skip_static_role_import_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
608
607
|
"""
|
609
608
|
If set to true, static roles will not be rotated during import.
|
610
609
|
Defaults to false. Requires Vault 1.16 or above.
|
@@ -612,36 +611,36 @@ class SecretBackendArgs:
|
|
612
611
|
return pulumi.get(self, "skip_static_role_import_rotation")
|
613
612
|
|
614
613
|
@skip_static_role_import_rotation.setter
|
615
|
-
def skip_static_role_import_rotation(self, value: Optional[pulumi.Input[
|
614
|
+
def skip_static_role_import_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
616
615
|
pulumi.set(self, "skip_static_role_import_rotation", value)
|
617
616
|
|
618
|
-
@property
|
617
|
+
@_builtins.property
|
619
618
|
@pulumi.getter
|
620
|
-
def starttls(self) -> Optional[pulumi.Input[
|
619
|
+
def starttls(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
621
620
|
"""
|
622
621
|
Issue a StartTLS command after establishing unencrypted connection.
|
623
622
|
"""
|
624
623
|
return pulumi.get(self, "starttls")
|
625
624
|
|
626
625
|
@starttls.setter
|
627
|
-
def starttls(self, value: Optional[pulumi.Input[
|
626
|
+
def starttls(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
628
627
|
pulumi.set(self, "starttls", value)
|
629
628
|
|
630
|
-
@property
|
629
|
+
@_builtins.property
|
631
630
|
@pulumi.getter
|
632
|
-
def upndomain(self) -> Optional[pulumi.Input[
|
631
|
+
def upndomain(self) -> Optional[pulumi.Input[_builtins.str]]:
|
633
632
|
"""
|
634
633
|
Enables userPrincipalDomain login with [username]@UPNDomain.
|
635
634
|
"""
|
636
635
|
return pulumi.get(self, "upndomain")
|
637
636
|
|
638
637
|
@upndomain.setter
|
639
|
-
def upndomain(self, value: Optional[pulumi.Input[
|
638
|
+
def upndomain(self, value: Optional[pulumi.Input[_builtins.str]]):
|
640
639
|
pulumi.set(self, "upndomain", value)
|
641
640
|
|
642
|
-
@property
|
641
|
+
@_builtins.property
|
643
642
|
@pulumi.getter
|
644
|
-
def url(self) -> Optional[pulumi.Input[
|
643
|
+
def url(self) -> Optional[pulumi.Input[_builtins.str]]:
|
645
644
|
"""
|
646
645
|
LDAP URL to connect to. Multiple URLs can be specified by concatenating
|
647
646
|
them with commas; they will be tried in-order. Defaults to `ldap://127.0.0.1`.
|
@@ -649,134 +648,134 @@ class SecretBackendArgs:
|
|
649
648
|
return pulumi.get(self, "url")
|
650
649
|
|
651
650
|
@url.setter
|
652
|
-
def url(self, value: Optional[pulumi.Input[
|
651
|
+
def url(self, value: Optional[pulumi.Input[_builtins.str]]):
|
653
652
|
pulumi.set(self, "url", value)
|
654
653
|
|
655
|
-
@property
|
654
|
+
@_builtins.property
|
656
655
|
@pulumi.getter
|
657
|
-
def userattr(self) -> Optional[pulumi.Input[
|
656
|
+
def userattr(self) -> Optional[pulumi.Input[_builtins.str]]:
|
658
657
|
"""
|
659
658
|
Attribute used when searching users. Defaults to `cn`.
|
660
659
|
"""
|
661
660
|
return pulumi.get(self, "userattr")
|
662
661
|
|
663
662
|
@userattr.setter
|
664
|
-
def userattr(self, value: Optional[pulumi.Input[
|
663
|
+
def userattr(self, value: Optional[pulumi.Input[_builtins.str]]):
|
665
664
|
pulumi.set(self, "userattr", value)
|
666
665
|
|
667
|
-
@property
|
666
|
+
@_builtins.property
|
668
667
|
@pulumi.getter
|
669
|
-
def userdn(self) -> Optional[pulumi.Input[
|
668
|
+
def userdn(self) -> Optional[pulumi.Input[_builtins.str]]:
|
670
669
|
"""
|
671
670
|
LDAP domain to use for users (eg: ou=People,dc=example,dc=org)`.
|
672
671
|
"""
|
673
672
|
return pulumi.get(self, "userdn")
|
674
673
|
|
675
674
|
@userdn.setter
|
676
|
-
def userdn(self, value: Optional[pulumi.Input[
|
675
|
+
def userdn(self, value: Optional[pulumi.Input[_builtins.str]]):
|
677
676
|
pulumi.set(self, "userdn", value)
|
678
677
|
|
679
678
|
|
680
679
|
@pulumi.input_type
|
681
680
|
class _SecretBackendState:
|
682
681
|
def __init__(__self__, *,
|
683
|
-
accessor: Optional[pulumi.Input[
|
684
|
-
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
685
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
686
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
687
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
688
|
-
binddn: Optional[pulumi.Input[
|
689
|
-
bindpass: Optional[pulumi.Input[
|
690
|
-
certificate: Optional[pulumi.Input[
|
691
|
-
client_tls_cert: Optional[pulumi.Input[
|
692
|
-
client_tls_key: Optional[pulumi.Input[
|
693
|
-
connection_timeout: Optional[pulumi.Input[
|
694
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
695
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[
|
696
|
-
description: Optional[pulumi.Input[
|
697
|
-
disable_automated_rotation: Optional[pulumi.Input[
|
698
|
-
disable_remount: Optional[pulumi.Input[
|
699
|
-
external_entropy_access: Optional[pulumi.Input[
|
700
|
-
identity_token_key: Optional[pulumi.Input[
|
701
|
-
insecure_tls: Optional[pulumi.Input[
|
702
|
-
listing_visibility: Optional[pulumi.Input[
|
703
|
-
local: Optional[pulumi.Input[
|
704
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
705
|
-
namespace: Optional[pulumi.Input[
|
706
|
-
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
707
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
708
|
-
password_policy: Optional[pulumi.Input[
|
709
|
-
path: Optional[pulumi.Input[
|
710
|
-
plugin_version: Optional[pulumi.Input[
|
711
|
-
request_timeout: Optional[pulumi.Input[
|
712
|
-
rotation_period: Optional[pulumi.Input[
|
713
|
-
rotation_schedule: Optional[pulumi.Input[
|
714
|
-
rotation_window: Optional[pulumi.Input[
|
715
|
-
schema: Optional[pulumi.Input[
|
716
|
-
seal_wrap: Optional[pulumi.Input[
|
717
|
-
skip_static_role_import_rotation: Optional[pulumi.Input[
|
718
|
-
starttls: Optional[pulumi.Input[
|
719
|
-
upndomain: Optional[pulumi.Input[
|
720
|
-
url: Optional[pulumi.Input[
|
721
|
-
userattr: Optional[pulumi.Input[
|
722
|
-
userdn: Optional[pulumi.Input[
|
682
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
683
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
684
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
685
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
686
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
687
|
+
binddn: Optional[pulumi.Input[_builtins.str]] = None,
|
688
|
+
bindpass: Optional[pulumi.Input[_builtins.str]] = None,
|
689
|
+
certificate: Optional[pulumi.Input[_builtins.str]] = None,
|
690
|
+
client_tls_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
691
|
+
client_tls_key: Optional[pulumi.Input[_builtins.str]] = None,
|
692
|
+
connection_timeout: Optional[pulumi.Input[_builtins.int]] = None,
|
693
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
694
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
695
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
696
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
697
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
698
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
699
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
700
|
+
insecure_tls: Optional[pulumi.Input[_builtins.bool]] = None,
|
701
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
702
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
703
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
704
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
705
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
706
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
707
|
+
password_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
708
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
709
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
710
|
+
request_timeout: Optional[pulumi.Input[_builtins.int]] = None,
|
711
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
712
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
713
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
714
|
+
schema: Optional[pulumi.Input[_builtins.str]] = None,
|
715
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
716
|
+
skip_static_role_import_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
717
|
+
starttls: Optional[pulumi.Input[_builtins.bool]] = None,
|
718
|
+
upndomain: Optional[pulumi.Input[_builtins.str]] = None,
|
719
|
+
url: Optional[pulumi.Input[_builtins.str]] = None,
|
720
|
+
userattr: Optional[pulumi.Input[_builtins.str]] = None,
|
721
|
+
userdn: Optional[pulumi.Input[_builtins.str]] = None):
|
723
722
|
"""
|
724
723
|
Input properties used for looking up and filtering SecretBackend resources.
|
725
|
-
:param pulumi.Input[
|
726
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
727
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
728
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
729
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
730
|
-
:param pulumi.Input[
|
731
|
-
:param pulumi.Input[
|
732
|
-
:param pulumi.Input[
|
724
|
+
:param pulumi.Input[_builtins.str] accessor: Accessor of the mount
|
725
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
726
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
727
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
728
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
729
|
+
:param pulumi.Input[_builtins.str] binddn: Distinguished name of object to bind when performing user and group search.
|
730
|
+
:param pulumi.Input[_builtins.str] bindpass: Password to use along with binddn when performing user search.
|
731
|
+
:param pulumi.Input[_builtins.str] certificate: CA certificate to use when verifying LDAP server certificate, must be
|
733
732
|
x509 PEM encoded.
|
734
|
-
:param pulumi.Input[
|
735
|
-
:param pulumi.Input[
|
736
|
-
:param pulumi.Input[
|
733
|
+
:param pulumi.Input[_builtins.str] client_tls_cert: Client certificate to provide to the LDAP server, must be x509 PEM encoded.
|
734
|
+
:param pulumi.Input[_builtins.str] client_tls_key: Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
|
735
|
+
:param pulumi.Input[_builtins.int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
|
737
736
|
the next URL in the configuration.
|
738
|
-
:param pulumi.Input[
|
739
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
740
|
-
:param pulumi.Input[
|
741
|
-
:param pulumi.Input[
|
742
|
-
:param pulumi.Input[
|
743
|
-
:param pulumi.Input[
|
744
|
-
:param pulumi.Input[
|
745
|
-
:param pulumi.Input[
|
737
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
|
738
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
739
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
|
740
|
+
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
741
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
742
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
743
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
744
|
+
:param pulumi.Input[_builtins.bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
|
746
745
|
Defaults to `false`.
|
747
|
-
:param pulumi.Input[
|
748
|
-
:param pulumi.Input[
|
746
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
747
|
+
:param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
749
748
|
replication.Tolerance duration to use when checking the last rotation time.
|
750
|
-
:param pulumi.Input[
|
751
|
-
:param pulumi.Input[
|
749
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
750
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
752
751
|
The value should not contain leading or trailing forward slashes.
|
753
752
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
754
753
|
*Available only for Vault Enterprise*.
|
755
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
756
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
757
|
-
:param pulumi.Input[
|
758
|
-
:param pulumi.Input[
|
754
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
755
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
756
|
+
:param pulumi.Input[_builtins.str] password_policy: Name of the password policy to use to generate passwords.
|
757
|
+
:param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
|
759
758
|
not begin or end with a `/`. Defaults to `ldap`.
|
760
|
-
:param pulumi.Input[
|
761
|
-
:param pulumi.Input[
|
759
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
760
|
+
:param pulumi.Input[_builtins.int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
|
762
761
|
before returning back an error.
|
763
|
-
:param pulumi.Input[
|
762
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
764
763
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
765
|
-
:param pulumi.Input[
|
764
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
766
765
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
767
|
-
:param pulumi.Input[
|
766
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
768
767
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
769
768
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
770
|
-
:param pulumi.Input[
|
771
|
-
:param pulumi.Input[
|
772
|
-
:param pulumi.Input[
|
769
|
+
:param pulumi.Input[_builtins.str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
|
770
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
771
|
+
:param pulumi.Input[_builtins.bool] skip_static_role_import_rotation: If set to true, static roles will not be rotated during import.
|
773
772
|
Defaults to false. Requires Vault 1.16 or above.
|
774
|
-
:param pulumi.Input[
|
775
|
-
:param pulumi.Input[
|
776
|
-
:param pulumi.Input[
|
773
|
+
:param pulumi.Input[_builtins.bool] starttls: Issue a StartTLS command after establishing unencrypted connection.
|
774
|
+
:param pulumi.Input[_builtins.str] upndomain: Enables userPrincipalDomain login with [username]@UPNDomain.
|
775
|
+
:param pulumi.Input[_builtins.str] url: LDAP URL to connect to. Multiple URLs can be specified by concatenating
|
777
776
|
them with commas; they will be tried in-order. Defaults to `ldap://127.0.0.1`.
|
778
|
-
:param pulumi.Input[
|
779
|
-
:param pulumi.Input[
|
777
|
+
:param pulumi.Input[_builtins.str] userattr: Attribute used when searching users. Defaults to `cn`.
|
778
|
+
:param pulumi.Input[_builtins.str] userdn: LDAP domain to use for users (eg: ou=People,dc=example,dc=org)`.
|
780
779
|
"""
|
781
780
|
if accessor is not None:
|
782
781
|
pulumi.set(__self__, "accessor", accessor)
|
@@ -859,93 +858,93 @@ class _SecretBackendState:
|
|
859
858
|
if userdn is not None:
|
860
859
|
pulumi.set(__self__, "userdn", userdn)
|
861
860
|
|
862
|
-
@property
|
861
|
+
@_builtins.property
|
863
862
|
@pulumi.getter
|
864
|
-
def accessor(self) -> Optional[pulumi.Input[
|
863
|
+
def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
|
865
864
|
"""
|
866
865
|
Accessor of the mount
|
867
866
|
"""
|
868
867
|
return pulumi.get(self, "accessor")
|
869
868
|
|
870
869
|
@accessor.setter
|
871
|
-
def accessor(self, value: Optional[pulumi.Input[
|
870
|
+
def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
|
872
871
|
pulumi.set(self, "accessor", value)
|
873
872
|
|
874
|
-
@property
|
873
|
+
@_builtins.property
|
875
874
|
@pulumi.getter(name="allowedManagedKeys")
|
876
|
-
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
875
|
+
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
877
876
|
"""
|
878
877
|
List of managed key registry entry names that the mount in question is allowed to access
|
879
878
|
"""
|
880
879
|
return pulumi.get(self, "allowed_managed_keys")
|
881
880
|
|
882
881
|
@allowed_managed_keys.setter
|
883
|
-
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
882
|
+
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
884
883
|
pulumi.set(self, "allowed_managed_keys", value)
|
885
884
|
|
886
|
-
@property
|
885
|
+
@_builtins.property
|
887
886
|
@pulumi.getter(name="allowedResponseHeaders")
|
888
|
-
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
887
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
889
888
|
"""
|
890
889
|
List of headers to allow and pass from the request to the plugin
|
891
890
|
"""
|
892
891
|
return pulumi.get(self, "allowed_response_headers")
|
893
892
|
|
894
893
|
@allowed_response_headers.setter
|
895
|
-
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
894
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
896
895
|
pulumi.set(self, "allowed_response_headers", value)
|
897
896
|
|
898
|
-
@property
|
897
|
+
@_builtins.property
|
899
898
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
900
|
-
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
899
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
901
900
|
"""
|
902
901
|
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
903
902
|
"""
|
904
903
|
return pulumi.get(self, "audit_non_hmac_request_keys")
|
905
904
|
|
906
905
|
@audit_non_hmac_request_keys.setter
|
907
|
-
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
906
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
908
907
|
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
909
908
|
|
910
|
-
@property
|
909
|
+
@_builtins.property
|
911
910
|
@pulumi.getter(name="auditNonHmacResponseKeys")
|
912
|
-
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
911
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
913
912
|
"""
|
914
913
|
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
915
914
|
"""
|
916
915
|
return pulumi.get(self, "audit_non_hmac_response_keys")
|
917
916
|
|
918
917
|
@audit_non_hmac_response_keys.setter
|
919
|
-
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
918
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
920
919
|
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
921
920
|
|
922
|
-
@property
|
921
|
+
@_builtins.property
|
923
922
|
@pulumi.getter
|
924
|
-
def binddn(self) -> Optional[pulumi.Input[
|
923
|
+
def binddn(self) -> Optional[pulumi.Input[_builtins.str]]:
|
925
924
|
"""
|
926
925
|
Distinguished name of object to bind when performing user and group search.
|
927
926
|
"""
|
928
927
|
return pulumi.get(self, "binddn")
|
929
928
|
|
930
929
|
@binddn.setter
|
931
|
-
def binddn(self, value: Optional[pulumi.Input[
|
930
|
+
def binddn(self, value: Optional[pulumi.Input[_builtins.str]]):
|
932
931
|
pulumi.set(self, "binddn", value)
|
933
932
|
|
934
|
-
@property
|
933
|
+
@_builtins.property
|
935
934
|
@pulumi.getter
|
936
|
-
def bindpass(self) -> Optional[pulumi.Input[
|
935
|
+
def bindpass(self) -> Optional[pulumi.Input[_builtins.str]]:
|
937
936
|
"""
|
938
937
|
Password to use along with binddn when performing user search.
|
939
938
|
"""
|
940
939
|
return pulumi.get(self, "bindpass")
|
941
940
|
|
942
941
|
@bindpass.setter
|
943
|
-
def bindpass(self, value: Optional[pulumi.Input[
|
942
|
+
def bindpass(self, value: Optional[pulumi.Input[_builtins.str]]):
|
944
943
|
pulumi.set(self, "bindpass", value)
|
945
944
|
|
946
|
-
@property
|
945
|
+
@_builtins.property
|
947
946
|
@pulumi.getter
|
948
|
-
def certificate(self) -> Optional[pulumi.Input[
|
947
|
+
def certificate(self) -> Optional[pulumi.Input[_builtins.str]]:
|
949
948
|
"""
|
950
949
|
CA certificate to use when verifying LDAP server certificate, must be
|
951
950
|
x509 PEM encoded.
|
@@ -953,36 +952,36 @@ class _SecretBackendState:
|
|
953
952
|
return pulumi.get(self, "certificate")
|
954
953
|
|
955
954
|
@certificate.setter
|
956
|
-
def certificate(self, value: Optional[pulumi.Input[
|
955
|
+
def certificate(self, value: Optional[pulumi.Input[_builtins.str]]):
|
957
956
|
pulumi.set(self, "certificate", value)
|
958
957
|
|
959
|
-
@property
|
958
|
+
@_builtins.property
|
960
959
|
@pulumi.getter(name="clientTlsCert")
|
961
|
-
def client_tls_cert(self) -> Optional[pulumi.Input[
|
960
|
+
def client_tls_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
|
962
961
|
"""
|
963
962
|
Client certificate to provide to the LDAP server, must be x509 PEM encoded.
|
964
963
|
"""
|
965
964
|
return pulumi.get(self, "client_tls_cert")
|
966
965
|
|
967
966
|
@client_tls_cert.setter
|
968
|
-
def client_tls_cert(self, value: Optional[pulumi.Input[
|
967
|
+
def client_tls_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
|
969
968
|
pulumi.set(self, "client_tls_cert", value)
|
970
969
|
|
971
|
-
@property
|
970
|
+
@_builtins.property
|
972
971
|
@pulumi.getter(name="clientTlsKey")
|
973
|
-
def client_tls_key(self) -> Optional[pulumi.Input[
|
972
|
+
def client_tls_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
974
973
|
"""
|
975
974
|
Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
|
976
975
|
"""
|
977
976
|
return pulumi.get(self, "client_tls_key")
|
978
977
|
|
979
978
|
@client_tls_key.setter
|
980
|
-
def client_tls_key(self, value: Optional[pulumi.Input[
|
979
|
+
def client_tls_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
981
980
|
pulumi.set(self, "client_tls_key", value)
|
982
981
|
|
983
|
-
@property
|
982
|
+
@_builtins.property
|
984
983
|
@pulumi.getter(name="connectionTimeout")
|
985
|
-
def connection_timeout(self) -> Optional[pulumi.Input[
|
984
|
+
def connection_timeout(self) -> Optional[pulumi.Input[_builtins.int]]:
|
986
985
|
"""
|
987
986
|
Timeout, in seconds, when attempting to connect to the LDAP server before trying
|
988
987
|
the next URL in the configuration.
|
@@ -990,96 +989,96 @@ class _SecretBackendState:
|
|
990
989
|
return pulumi.get(self, "connection_timeout")
|
991
990
|
|
992
991
|
@connection_timeout.setter
|
993
|
-
def connection_timeout(self, value: Optional[pulumi.Input[
|
992
|
+
def connection_timeout(self, value: Optional[pulumi.Input[_builtins.int]]):
|
994
993
|
pulumi.set(self, "connection_timeout", value)
|
995
994
|
|
996
|
-
@property
|
995
|
+
@_builtins.property
|
997
996
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
998
|
-
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
997
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
999
998
|
"""
|
1000
999
|
Default lease duration for secrets in seconds.
|
1001
1000
|
"""
|
1002
1001
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
1003
1002
|
|
1004
1003
|
@default_lease_ttl_seconds.setter
|
1005
|
-
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
1004
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
1006
1005
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
1007
1006
|
|
1008
|
-
@property
|
1007
|
+
@_builtins.property
|
1009
1008
|
@pulumi.getter(name="delegatedAuthAccessors")
|
1010
|
-
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
1009
|
+
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
1011
1010
|
"""
|
1012
1011
|
List of headers to allow and pass from the request to the plugin
|
1013
1012
|
"""
|
1014
1013
|
return pulumi.get(self, "delegated_auth_accessors")
|
1015
1014
|
|
1016
1015
|
@delegated_auth_accessors.setter
|
1017
|
-
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1016
|
+
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
1018
1017
|
pulumi.set(self, "delegated_auth_accessors", value)
|
1019
1018
|
|
1020
|
-
@property
|
1019
|
+
@_builtins.property
|
1021
1020
|
@pulumi.getter
|
1022
|
-
def description(self) -> Optional[pulumi.Input[
|
1021
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1023
1022
|
"""
|
1024
1023
|
Human-friendly description of the mount for the Active Directory backend.
|
1025
1024
|
"""
|
1026
1025
|
return pulumi.get(self, "description")
|
1027
1026
|
|
1028
1027
|
@description.setter
|
1029
|
-
def description(self, value: Optional[pulumi.Input[
|
1028
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1030
1029
|
pulumi.set(self, "description", value)
|
1031
1030
|
|
1032
|
-
@property
|
1031
|
+
@_builtins.property
|
1033
1032
|
@pulumi.getter(name="disableAutomatedRotation")
|
1034
|
-
def disable_automated_rotation(self) -> Optional[pulumi.Input[
|
1033
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1035
1034
|
"""
|
1036
1035
|
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
1037
1036
|
"""
|
1038
1037
|
return pulumi.get(self, "disable_automated_rotation")
|
1039
1038
|
|
1040
1039
|
@disable_automated_rotation.setter
|
1041
|
-
def disable_automated_rotation(self, value: Optional[pulumi.Input[
|
1040
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1042
1041
|
pulumi.set(self, "disable_automated_rotation", value)
|
1043
1042
|
|
1044
|
-
@property
|
1043
|
+
@_builtins.property
|
1045
1044
|
@pulumi.getter(name="disableRemount")
|
1046
|
-
def disable_remount(self) -> Optional[pulumi.Input[
|
1045
|
+
def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1047
1046
|
"""
|
1048
1047
|
If set, opts out of mount migration on path updates.
|
1049
1048
|
"""
|
1050
1049
|
return pulumi.get(self, "disable_remount")
|
1051
1050
|
|
1052
1051
|
@disable_remount.setter
|
1053
|
-
def disable_remount(self, value: Optional[pulumi.Input[
|
1052
|
+
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1054
1053
|
pulumi.set(self, "disable_remount", value)
|
1055
1054
|
|
1056
|
-
@property
|
1055
|
+
@_builtins.property
|
1057
1056
|
@pulumi.getter(name="externalEntropyAccess")
|
1058
|
-
def external_entropy_access(self) -> Optional[pulumi.Input[
|
1057
|
+
def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1059
1058
|
"""
|
1060
1059
|
Enable the secrets engine to access Vault's external entropy source
|
1061
1060
|
"""
|
1062
1061
|
return pulumi.get(self, "external_entropy_access")
|
1063
1062
|
|
1064
1063
|
@external_entropy_access.setter
|
1065
|
-
def external_entropy_access(self, value: Optional[pulumi.Input[
|
1064
|
+
def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1066
1065
|
pulumi.set(self, "external_entropy_access", value)
|
1067
1066
|
|
1068
|
-
@property
|
1067
|
+
@_builtins.property
|
1069
1068
|
@pulumi.getter(name="identityTokenKey")
|
1070
|
-
def identity_token_key(self) -> Optional[pulumi.Input[
|
1069
|
+
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1071
1070
|
"""
|
1072
1071
|
The key to use for signing plugin workload identity tokens
|
1073
1072
|
"""
|
1074
1073
|
return pulumi.get(self, "identity_token_key")
|
1075
1074
|
|
1076
1075
|
@identity_token_key.setter
|
1077
|
-
def identity_token_key(self, value: Optional[pulumi.Input[
|
1076
|
+
def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1078
1077
|
pulumi.set(self, "identity_token_key", value)
|
1079
1078
|
|
1080
|
-
@property
|
1079
|
+
@_builtins.property
|
1081
1080
|
@pulumi.getter(name="insecureTls")
|
1082
|
-
def insecure_tls(self) -> Optional[pulumi.Input[
|
1081
|
+
def insecure_tls(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1083
1082
|
"""
|
1084
1083
|
Skip LDAP server SSL Certificate verification. This is not recommended for production.
|
1085
1084
|
Defaults to `false`.
|
@@ -1087,24 +1086,24 @@ class _SecretBackendState:
|
|
1087
1086
|
return pulumi.get(self, "insecure_tls")
|
1088
1087
|
|
1089
1088
|
@insecure_tls.setter
|
1090
|
-
def insecure_tls(self, value: Optional[pulumi.Input[
|
1089
|
+
def insecure_tls(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1091
1090
|
pulumi.set(self, "insecure_tls", value)
|
1092
1091
|
|
1093
|
-
@property
|
1092
|
+
@_builtins.property
|
1094
1093
|
@pulumi.getter(name="listingVisibility")
|
1095
|
-
def listing_visibility(self) -> Optional[pulumi.Input[
|
1094
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1096
1095
|
"""
|
1097
1096
|
Specifies whether to show this mount in the UI-specific listing endpoint
|
1098
1097
|
"""
|
1099
1098
|
return pulumi.get(self, "listing_visibility")
|
1100
1099
|
|
1101
1100
|
@listing_visibility.setter
|
1102
|
-
def listing_visibility(self, value: Optional[pulumi.Input[
|
1101
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1103
1102
|
pulumi.set(self, "listing_visibility", value)
|
1104
1103
|
|
1105
|
-
@property
|
1104
|
+
@_builtins.property
|
1106
1105
|
@pulumi.getter
|
1107
|
-
def local(self) -> Optional[pulumi.Input[
|
1106
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1108
1107
|
"""
|
1109
1108
|
Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
1110
1109
|
replication.Tolerance duration to use when checking the last rotation time.
|
@@ -1112,24 +1111,24 @@ class _SecretBackendState:
|
|
1112
1111
|
return pulumi.get(self, "local")
|
1113
1112
|
|
1114
1113
|
@local.setter
|
1115
|
-
def local(self, value: Optional[pulumi.Input[
|
1114
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1116
1115
|
pulumi.set(self, "local", value)
|
1117
1116
|
|
1118
|
-
@property
|
1117
|
+
@_builtins.property
|
1119
1118
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
1120
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
1119
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
1121
1120
|
"""
|
1122
1121
|
Maximum possible lease duration for secrets in seconds.
|
1123
1122
|
"""
|
1124
1123
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
1125
1124
|
|
1126
1125
|
@max_lease_ttl_seconds.setter
|
1127
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
1126
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
1128
1127
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
1129
1128
|
|
1130
|
-
@property
|
1129
|
+
@_builtins.property
|
1131
1130
|
@pulumi.getter
|
1132
|
-
def namespace(self) -> Optional[pulumi.Input[
|
1131
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1133
1132
|
"""
|
1134
1133
|
The namespace to provision the resource in.
|
1135
1134
|
The value should not contain leading or trailing forward slashes.
|
@@ -1139,48 +1138,48 @@ class _SecretBackendState:
|
|
1139
1138
|
return pulumi.get(self, "namespace")
|
1140
1139
|
|
1141
1140
|
@namespace.setter
|
1142
|
-
def namespace(self, value: Optional[pulumi.Input[
|
1141
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1143
1142
|
pulumi.set(self, "namespace", value)
|
1144
1143
|
|
1145
|
-
@property
|
1144
|
+
@_builtins.property
|
1146
1145
|
@pulumi.getter
|
1147
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
1146
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
1148
1147
|
"""
|
1149
1148
|
Specifies mount type specific options that are passed to the backend
|
1150
1149
|
"""
|
1151
1150
|
return pulumi.get(self, "options")
|
1152
1151
|
|
1153
1152
|
@options.setter
|
1154
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
1153
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
1155
1154
|
pulumi.set(self, "options", value)
|
1156
1155
|
|
1157
|
-
@property
|
1156
|
+
@_builtins.property
|
1158
1157
|
@pulumi.getter(name="passthroughRequestHeaders")
|
1159
|
-
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
1158
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
1160
1159
|
"""
|
1161
1160
|
List of headers to allow and pass from the request to the plugin
|
1162
1161
|
"""
|
1163
1162
|
return pulumi.get(self, "passthrough_request_headers")
|
1164
1163
|
|
1165
1164
|
@passthrough_request_headers.setter
|
1166
|
-
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1165
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
1167
1166
|
pulumi.set(self, "passthrough_request_headers", value)
|
1168
1167
|
|
1169
|
-
@property
|
1168
|
+
@_builtins.property
|
1170
1169
|
@pulumi.getter(name="passwordPolicy")
|
1171
|
-
def password_policy(self) -> Optional[pulumi.Input[
|
1170
|
+
def password_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1172
1171
|
"""
|
1173
1172
|
Name of the password policy to use to generate passwords.
|
1174
1173
|
"""
|
1175
1174
|
return pulumi.get(self, "password_policy")
|
1176
1175
|
|
1177
1176
|
@password_policy.setter
|
1178
|
-
def password_policy(self, value: Optional[pulumi.Input[
|
1177
|
+
def password_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1179
1178
|
pulumi.set(self, "password_policy", value)
|
1180
1179
|
|
1181
|
-
@property
|
1180
|
+
@_builtins.property
|
1182
1181
|
@pulumi.getter
|
1183
|
-
def path(self) -> Optional[pulumi.Input[
|
1182
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1184
1183
|
"""
|
1185
1184
|
The unique path this backend should be mounted at. Must
|
1186
1185
|
not begin or end with a `/`. Defaults to `ldap`.
|
@@ -1188,24 +1187,24 @@ class _SecretBackendState:
|
|
1188
1187
|
return pulumi.get(self, "path")
|
1189
1188
|
|
1190
1189
|
@path.setter
|
1191
|
-
def path(self, value: Optional[pulumi.Input[
|
1190
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1192
1191
|
pulumi.set(self, "path", value)
|
1193
1192
|
|
1194
|
-
@property
|
1193
|
+
@_builtins.property
|
1195
1194
|
@pulumi.getter(name="pluginVersion")
|
1196
|
-
def plugin_version(self) -> Optional[pulumi.Input[
|
1195
|
+
def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1197
1196
|
"""
|
1198
1197
|
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1199
1198
|
"""
|
1200
1199
|
return pulumi.get(self, "plugin_version")
|
1201
1200
|
|
1202
1201
|
@plugin_version.setter
|
1203
|
-
def plugin_version(self, value: Optional[pulumi.Input[
|
1202
|
+
def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1204
1203
|
pulumi.set(self, "plugin_version", value)
|
1205
1204
|
|
1206
|
-
@property
|
1205
|
+
@_builtins.property
|
1207
1206
|
@pulumi.getter(name="requestTimeout")
|
1208
|
-
def request_timeout(self) -> Optional[pulumi.Input[
|
1207
|
+
def request_timeout(self) -> Optional[pulumi.Input[_builtins.int]]:
|
1209
1208
|
"""
|
1210
1209
|
Timeout, in seconds, for the connection when making requests against the server
|
1211
1210
|
before returning back an error.
|
@@ -1213,12 +1212,12 @@ class _SecretBackendState:
|
|
1213
1212
|
return pulumi.get(self, "request_timeout")
|
1214
1213
|
|
1215
1214
|
@request_timeout.setter
|
1216
|
-
def request_timeout(self, value: Optional[pulumi.Input[
|
1215
|
+
def request_timeout(self, value: Optional[pulumi.Input[_builtins.int]]):
|
1217
1216
|
pulumi.set(self, "request_timeout", value)
|
1218
1217
|
|
1219
|
-
@property
|
1218
|
+
@_builtins.property
|
1220
1219
|
@pulumi.getter(name="rotationPeriod")
|
1221
|
-
def rotation_period(self) -> Optional[pulumi.Input[
|
1220
|
+
def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
1222
1221
|
"""
|
1223
1222
|
The amount of time in seconds Vault should wait before rotating the root credential.
|
1224
1223
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
@@ -1226,12 +1225,12 @@ class _SecretBackendState:
|
|
1226
1225
|
return pulumi.get(self, "rotation_period")
|
1227
1226
|
|
1228
1227
|
@rotation_period.setter
|
1229
|
-
def rotation_period(self, value: Optional[pulumi.Input[
|
1228
|
+
def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
1230
1229
|
pulumi.set(self, "rotation_period", value)
|
1231
1230
|
|
1232
|
-
@property
|
1231
|
+
@_builtins.property
|
1233
1232
|
@pulumi.getter(name="rotationSchedule")
|
1234
|
-
def rotation_schedule(self) -> Optional[pulumi.Input[
|
1233
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1235
1234
|
"""
|
1236
1235
|
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
1237
1236
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
@@ -1239,12 +1238,12 @@ class _SecretBackendState:
|
|
1239
1238
|
return pulumi.get(self, "rotation_schedule")
|
1240
1239
|
|
1241
1240
|
@rotation_schedule.setter
|
1242
|
-
def rotation_schedule(self, value: Optional[pulumi.Input[
|
1241
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1243
1242
|
pulumi.set(self, "rotation_schedule", value)
|
1244
1243
|
|
1245
|
-
@property
|
1244
|
+
@_builtins.property
|
1246
1245
|
@pulumi.getter(name="rotationWindow")
|
1247
|
-
def rotation_window(self) -> Optional[pulumi.Input[
|
1246
|
+
def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
|
1248
1247
|
"""
|
1249
1248
|
The maximum amount of time in seconds allowed to complete
|
1250
1249
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
@@ -1253,36 +1252,36 @@ class _SecretBackendState:
|
|
1253
1252
|
return pulumi.get(self, "rotation_window")
|
1254
1253
|
|
1255
1254
|
@rotation_window.setter
|
1256
|
-
def rotation_window(self, value: Optional[pulumi.Input[
|
1255
|
+
def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
|
1257
1256
|
pulumi.set(self, "rotation_window", value)
|
1258
1257
|
|
1259
|
-
@property
|
1258
|
+
@_builtins.property
|
1260
1259
|
@pulumi.getter
|
1261
|
-
def schema(self) -> Optional[pulumi.Input[
|
1260
|
+
def schema(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1262
1261
|
"""
|
1263
1262
|
The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
|
1264
1263
|
"""
|
1265
1264
|
return pulumi.get(self, "schema")
|
1266
1265
|
|
1267
1266
|
@schema.setter
|
1268
|
-
def schema(self, value: Optional[pulumi.Input[
|
1267
|
+
def schema(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1269
1268
|
pulumi.set(self, "schema", value)
|
1270
1269
|
|
1271
|
-
@property
|
1270
|
+
@_builtins.property
|
1272
1271
|
@pulumi.getter(name="sealWrap")
|
1273
|
-
def seal_wrap(self) -> Optional[pulumi.Input[
|
1272
|
+
def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1274
1273
|
"""
|
1275
1274
|
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1276
1275
|
"""
|
1277
1276
|
return pulumi.get(self, "seal_wrap")
|
1278
1277
|
|
1279
1278
|
@seal_wrap.setter
|
1280
|
-
def seal_wrap(self, value: Optional[pulumi.Input[
|
1279
|
+
def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1281
1280
|
pulumi.set(self, "seal_wrap", value)
|
1282
1281
|
|
1283
|
-
@property
|
1282
|
+
@_builtins.property
|
1284
1283
|
@pulumi.getter(name="skipStaticRoleImportRotation")
|
1285
|
-
def skip_static_role_import_rotation(self) -> Optional[pulumi.Input[
|
1284
|
+
def skip_static_role_import_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1286
1285
|
"""
|
1287
1286
|
If set to true, static roles will not be rotated during import.
|
1288
1287
|
Defaults to false. Requires Vault 1.16 or above.
|
@@ -1290,36 +1289,36 @@ class _SecretBackendState:
|
|
1290
1289
|
return pulumi.get(self, "skip_static_role_import_rotation")
|
1291
1290
|
|
1292
1291
|
@skip_static_role_import_rotation.setter
|
1293
|
-
def skip_static_role_import_rotation(self, value: Optional[pulumi.Input[
|
1292
|
+
def skip_static_role_import_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1294
1293
|
pulumi.set(self, "skip_static_role_import_rotation", value)
|
1295
1294
|
|
1296
|
-
@property
|
1295
|
+
@_builtins.property
|
1297
1296
|
@pulumi.getter
|
1298
|
-
def starttls(self) -> Optional[pulumi.Input[
|
1297
|
+
def starttls(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1299
1298
|
"""
|
1300
1299
|
Issue a StartTLS command after establishing unencrypted connection.
|
1301
1300
|
"""
|
1302
1301
|
return pulumi.get(self, "starttls")
|
1303
1302
|
|
1304
1303
|
@starttls.setter
|
1305
|
-
def starttls(self, value: Optional[pulumi.Input[
|
1304
|
+
def starttls(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1306
1305
|
pulumi.set(self, "starttls", value)
|
1307
1306
|
|
1308
|
-
@property
|
1307
|
+
@_builtins.property
|
1309
1308
|
@pulumi.getter
|
1310
|
-
def upndomain(self) -> Optional[pulumi.Input[
|
1309
|
+
def upndomain(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1311
1310
|
"""
|
1312
1311
|
Enables userPrincipalDomain login with [username]@UPNDomain.
|
1313
1312
|
"""
|
1314
1313
|
return pulumi.get(self, "upndomain")
|
1315
1314
|
|
1316
1315
|
@upndomain.setter
|
1317
|
-
def upndomain(self, value: Optional[pulumi.Input[
|
1316
|
+
def upndomain(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1318
1317
|
pulumi.set(self, "upndomain", value)
|
1319
1318
|
|
1320
|
-
@property
|
1319
|
+
@_builtins.property
|
1321
1320
|
@pulumi.getter
|
1322
|
-
def url(self) -> Optional[pulumi.Input[
|
1321
|
+
def url(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1323
1322
|
"""
|
1324
1323
|
LDAP URL to connect to. Multiple URLs can be specified by concatenating
|
1325
1324
|
them with commas; they will be tried in-order. Defaults to `ldap://127.0.0.1`.
|
@@ -1327,31 +1326,31 @@ class _SecretBackendState:
|
|
1327
1326
|
return pulumi.get(self, "url")
|
1328
1327
|
|
1329
1328
|
@url.setter
|
1330
|
-
def url(self, value: Optional[pulumi.Input[
|
1329
|
+
def url(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1331
1330
|
pulumi.set(self, "url", value)
|
1332
1331
|
|
1333
|
-
@property
|
1332
|
+
@_builtins.property
|
1334
1333
|
@pulumi.getter
|
1335
|
-
def userattr(self) -> Optional[pulumi.Input[
|
1334
|
+
def userattr(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1336
1335
|
"""
|
1337
1336
|
Attribute used when searching users. Defaults to `cn`.
|
1338
1337
|
"""
|
1339
1338
|
return pulumi.get(self, "userattr")
|
1340
1339
|
|
1341
1340
|
@userattr.setter
|
1342
|
-
def userattr(self, value: Optional[pulumi.Input[
|
1341
|
+
def userattr(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1343
1342
|
pulumi.set(self, "userattr", value)
|
1344
1343
|
|
1345
|
-
@property
|
1344
|
+
@_builtins.property
|
1346
1345
|
@pulumi.getter
|
1347
|
-
def userdn(self) -> Optional[pulumi.Input[
|
1346
|
+
def userdn(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1348
1347
|
"""
|
1349
1348
|
LDAP domain to use for users (eg: ou=People,dc=example,dc=org)`.
|
1350
1349
|
"""
|
1351
1350
|
return pulumi.get(self, "userdn")
|
1352
1351
|
|
1353
1352
|
@userdn.setter
|
1354
|
-
def userdn(self, value: Optional[pulumi.Input[
|
1353
|
+
def userdn(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1355
1354
|
pulumi.set(self, "userdn", value)
|
1356
1355
|
|
1357
1356
|
|
@@ -1361,45 +1360,45 @@ class SecretBackend(pulumi.CustomResource):
|
|
1361
1360
|
def __init__(__self__,
|
1362
1361
|
resource_name: str,
|
1363
1362
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1364
|
-
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1365
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1366
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1367
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1368
|
-
binddn: Optional[pulumi.Input[
|
1369
|
-
bindpass: Optional[pulumi.Input[
|
1370
|
-
certificate: Optional[pulumi.Input[
|
1371
|
-
client_tls_cert: Optional[pulumi.Input[
|
1372
|
-
client_tls_key: Optional[pulumi.Input[
|
1373
|
-
connection_timeout: Optional[pulumi.Input[
|
1374
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
1375
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1376
|
-
description: Optional[pulumi.Input[
|
1377
|
-
disable_automated_rotation: Optional[pulumi.Input[
|
1378
|
-
disable_remount: Optional[pulumi.Input[
|
1379
|
-
external_entropy_access: Optional[pulumi.Input[
|
1380
|
-
identity_token_key: Optional[pulumi.Input[
|
1381
|
-
insecure_tls: Optional[pulumi.Input[
|
1382
|
-
listing_visibility: Optional[pulumi.Input[
|
1383
|
-
local: Optional[pulumi.Input[
|
1384
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
1385
|
-
namespace: Optional[pulumi.Input[
|
1386
|
-
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
1387
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1388
|
-
password_policy: Optional[pulumi.Input[
|
1389
|
-
path: Optional[pulumi.Input[
|
1390
|
-
plugin_version: Optional[pulumi.Input[
|
1391
|
-
request_timeout: Optional[pulumi.Input[
|
1392
|
-
rotation_period: Optional[pulumi.Input[
|
1393
|
-
rotation_schedule: Optional[pulumi.Input[
|
1394
|
-
rotation_window: Optional[pulumi.Input[
|
1395
|
-
schema: Optional[pulumi.Input[
|
1396
|
-
seal_wrap: Optional[pulumi.Input[
|
1397
|
-
skip_static_role_import_rotation: Optional[pulumi.Input[
|
1398
|
-
starttls: Optional[pulumi.Input[
|
1399
|
-
upndomain: Optional[pulumi.Input[
|
1400
|
-
url: Optional[pulumi.Input[
|
1401
|
-
userattr: Optional[pulumi.Input[
|
1402
|
-
userdn: Optional[pulumi.Input[
|
1363
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1364
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1365
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1366
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1367
|
+
binddn: Optional[pulumi.Input[_builtins.str]] = None,
|
1368
|
+
bindpass: Optional[pulumi.Input[_builtins.str]] = None,
|
1369
|
+
certificate: Optional[pulumi.Input[_builtins.str]] = None,
|
1370
|
+
client_tls_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
1371
|
+
client_tls_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1372
|
+
connection_timeout: Optional[pulumi.Input[_builtins.int]] = None,
|
1373
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1374
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1375
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
1376
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
1377
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
1378
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
1379
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1380
|
+
insecure_tls: Optional[pulumi.Input[_builtins.bool]] = None,
|
1381
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
1382
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
1383
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1384
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1385
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
1386
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1387
|
+
password_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
1388
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
1389
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
1390
|
+
request_timeout: Optional[pulumi.Input[_builtins.int]] = None,
|
1391
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
1392
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
1393
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
1394
|
+
schema: Optional[pulumi.Input[_builtins.str]] = None,
|
1395
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
1396
|
+
skip_static_role_import_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
1397
|
+
starttls: Optional[pulumi.Input[_builtins.bool]] = None,
|
1398
|
+
upndomain: Optional[pulumi.Input[_builtins.str]] = None,
|
1399
|
+
url: Optional[pulumi.Input[_builtins.str]] = None,
|
1400
|
+
userattr: Optional[pulumi.Input[_builtins.str]] = None,
|
1401
|
+
userdn: Optional[pulumi.Input[_builtins.str]] = None,
|
1403
1402
|
__props__=None):
|
1404
1403
|
"""
|
1405
1404
|
## Example Usage
|
@@ -1429,60 +1428,60 @@ class SecretBackend(pulumi.CustomResource):
|
|
1429
1428
|
|
1430
1429
|
:param str resource_name: The name of the resource.
|
1431
1430
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
1432
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1433
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1434
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1435
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1436
|
-
:param pulumi.Input[
|
1437
|
-
:param pulumi.Input[
|
1438
|
-
:param pulumi.Input[
|
1431
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
1432
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
1433
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1434
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1435
|
+
:param pulumi.Input[_builtins.str] binddn: Distinguished name of object to bind when performing user and group search.
|
1436
|
+
:param pulumi.Input[_builtins.str] bindpass: Password to use along with binddn when performing user search.
|
1437
|
+
:param pulumi.Input[_builtins.str] certificate: CA certificate to use when verifying LDAP server certificate, must be
|
1439
1438
|
x509 PEM encoded.
|
1440
|
-
:param pulumi.Input[
|
1441
|
-
:param pulumi.Input[
|
1442
|
-
:param pulumi.Input[
|
1439
|
+
:param pulumi.Input[_builtins.str] client_tls_cert: Client certificate to provide to the LDAP server, must be x509 PEM encoded.
|
1440
|
+
:param pulumi.Input[_builtins.str] client_tls_key: Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
|
1441
|
+
:param pulumi.Input[_builtins.int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
|
1443
1442
|
the next URL in the configuration.
|
1444
|
-
:param pulumi.Input[
|
1445
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1446
|
-
:param pulumi.Input[
|
1447
|
-
:param pulumi.Input[
|
1448
|
-
:param pulumi.Input[
|
1449
|
-
:param pulumi.Input[
|
1450
|
-
:param pulumi.Input[
|
1451
|
-
:param pulumi.Input[
|
1443
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
|
1444
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
1445
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
|
1446
|
+
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
1447
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
1448
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
1449
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
1450
|
+
:param pulumi.Input[_builtins.bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
|
1452
1451
|
Defaults to `false`.
|
1453
|
-
:param pulumi.Input[
|
1454
|
-
:param pulumi.Input[
|
1452
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
1453
|
+
:param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
1455
1454
|
replication.Tolerance duration to use when checking the last rotation time.
|
1456
|
-
:param pulumi.Input[
|
1457
|
-
:param pulumi.Input[
|
1455
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
1456
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
1458
1457
|
The value should not contain leading or trailing forward slashes.
|
1459
1458
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1460
1459
|
*Available only for Vault Enterprise*.
|
1461
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
1462
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1463
|
-
:param pulumi.Input[
|
1464
|
-
:param pulumi.Input[
|
1460
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
1461
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
1462
|
+
:param pulumi.Input[_builtins.str] password_policy: Name of the password policy to use to generate passwords.
|
1463
|
+
:param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
|
1465
1464
|
not begin or end with a `/`. Defaults to `ldap`.
|
1466
|
-
:param pulumi.Input[
|
1467
|
-
:param pulumi.Input[
|
1465
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1466
|
+
:param pulumi.Input[_builtins.int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
|
1468
1467
|
before returning back an error.
|
1469
|
-
:param pulumi.Input[
|
1468
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
1470
1469
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
1471
|
-
:param pulumi.Input[
|
1470
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
1472
1471
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
1473
|
-
:param pulumi.Input[
|
1472
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
1474
1473
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
1475
1474
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
1476
|
-
:param pulumi.Input[
|
1477
|
-
:param pulumi.Input[
|
1478
|
-
:param pulumi.Input[
|
1475
|
+
:param pulumi.Input[_builtins.str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
|
1476
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1477
|
+
:param pulumi.Input[_builtins.bool] skip_static_role_import_rotation: If set to true, static roles will not be rotated during import.
|
1479
1478
|
Defaults to false. Requires Vault 1.16 or above.
|
1480
|
-
:param pulumi.Input[
|
1481
|
-
:param pulumi.Input[
|
1482
|
-
:param pulumi.Input[
|
1479
|
+
:param pulumi.Input[_builtins.bool] starttls: Issue a StartTLS command after establishing unencrypted connection.
|
1480
|
+
:param pulumi.Input[_builtins.str] upndomain: Enables userPrincipalDomain login with [username]@UPNDomain.
|
1481
|
+
:param pulumi.Input[_builtins.str] url: LDAP URL to connect to. Multiple URLs can be specified by concatenating
|
1483
1482
|
them with commas; they will be tried in-order. Defaults to `ldap://127.0.0.1`.
|
1484
|
-
:param pulumi.Input[
|
1485
|
-
:param pulumi.Input[
|
1483
|
+
:param pulumi.Input[_builtins.str] userattr: Attribute used when searching users. Defaults to `cn`.
|
1484
|
+
:param pulumi.Input[_builtins.str] userdn: LDAP domain to use for users (eg: ou=People,dc=example,dc=org)`.
|
1486
1485
|
"""
|
1487
1486
|
...
|
1488
1487
|
@overload
|
@@ -1531,45 +1530,45 @@ class SecretBackend(pulumi.CustomResource):
|
|
1531
1530
|
def _internal_init(__self__,
|
1532
1531
|
resource_name: str,
|
1533
1532
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1534
|
-
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1535
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1536
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1537
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1538
|
-
binddn: Optional[pulumi.Input[
|
1539
|
-
bindpass: Optional[pulumi.Input[
|
1540
|
-
certificate: Optional[pulumi.Input[
|
1541
|
-
client_tls_cert: Optional[pulumi.Input[
|
1542
|
-
client_tls_key: Optional[pulumi.Input[
|
1543
|
-
connection_timeout: Optional[pulumi.Input[
|
1544
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
1545
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1546
|
-
description: Optional[pulumi.Input[
|
1547
|
-
disable_automated_rotation: Optional[pulumi.Input[
|
1548
|
-
disable_remount: Optional[pulumi.Input[
|
1549
|
-
external_entropy_access: Optional[pulumi.Input[
|
1550
|
-
identity_token_key: Optional[pulumi.Input[
|
1551
|
-
insecure_tls: Optional[pulumi.Input[
|
1552
|
-
listing_visibility: Optional[pulumi.Input[
|
1553
|
-
local: Optional[pulumi.Input[
|
1554
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
1555
|
-
namespace: Optional[pulumi.Input[
|
1556
|
-
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
1557
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1558
|
-
password_policy: Optional[pulumi.Input[
|
1559
|
-
path: Optional[pulumi.Input[
|
1560
|
-
plugin_version: Optional[pulumi.Input[
|
1561
|
-
request_timeout: Optional[pulumi.Input[
|
1562
|
-
rotation_period: Optional[pulumi.Input[
|
1563
|
-
rotation_schedule: Optional[pulumi.Input[
|
1564
|
-
rotation_window: Optional[pulumi.Input[
|
1565
|
-
schema: Optional[pulumi.Input[
|
1566
|
-
seal_wrap: Optional[pulumi.Input[
|
1567
|
-
skip_static_role_import_rotation: Optional[pulumi.Input[
|
1568
|
-
starttls: Optional[pulumi.Input[
|
1569
|
-
upndomain: Optional[pulumi.Input[
|
1570
|
-
url: Optional[pulumi.Input[
|
1571
|
-
userattr: Optional[pulumi.Input[
|
1572
|
-
userdn: Optional[pulumi.Input[
|
1533
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1534
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1535
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1536
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1537
|
+
binddn: Optional[pulumi.Input[_builtins.str]] = None,
|
1538
|
+
bindpass: Optional[pulumi.Input[_builtins.str]] = None,
|
1539
|
+
certificate: Optional[pulumi.Input[_builtins.str]] = None,
|
1540
|
+
client_tls_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
1541
|
+
client_tls_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1542
|
+
connection_timeout: Optional[pulumi.Input[_builtins.int]] = None,
|
1543
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1544
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1545
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
1546
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
1547
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
1548
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
1549
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1550
|
+
insecure_tls: Optional[pulumi.Input[_builtins.bool]] = None,
|
1551
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
1552
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
1553
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1554
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1555
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
1556
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1557
|
+
password_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
1558
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
1559
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
1560
|
+
request_timeout: Optional[pulumi.Input[_builtins.int]] = None,
|
1561
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
1562
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
1563
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
1564
|
+
schema: Optional[pulumi.Input[_builtins.str]] = None,
|
1565
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
1566
|
+
skip_static_role_import_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
1567
|
+
starttls: Optional[pulumi.Input[_builtins.bool]] = None,
|
1568
|
+
upndomain: Optional[pulumi.Input[_builtins.str]] = None,
|
1569
|
+
url: Optional[pulumi.Input[_builtins.str]] = None,
|
1570
|
+
userattr: Optional[pulumi.Input[_builtins.str]] = None,
|
1571
|
+
userdn: Optional[pulumi.Input[_builtins.str]] = None,
|
1573
1572
|
__props__=None):
|
1574
1573
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
1575
1574
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -1635,46 +1634,46 @@ class SecretBackend(pulumi.CustomResource):
|
|
1635
1634
|
def get(resource_name: str,
|
1636
1635
|
id: pulumi.Input[str],
|
1637
1636
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1638
|
-
accessor: Optional[pulumi.Input[
|
1639
|
-
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1640
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1641
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1642
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1643
|
-
binddn: Optional[pulumi.Input[
|
1644
|
-
bindpass: Optional[pulumi.Input[
|
1645
|
-
certificate: Optional[pulumi.Input[
|
1646
|
-
client_tls_cert: Optional[pulumi.Input[
|
1647
|
-
client_tls_key: Optional[pulumi.Input[
|
1648
|
-
connection_timeout: Optional[pulumi.Input[
|
1649
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
1650
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1651
|
-
description: Optional[pulumi.Input[
|
1652
|
-
disable_automated_rotation: Optional[pulumi.Input[
|
1653
|
-
disable_remount: Optional[pulumi.Input[
|
1654
|
-
external_entropy_access: Optional[pulumi.Input[
|
1655
|
-
identity_token_key: Optional[pulumi.Input[
|
1656
|
-
insecure_tls: Optional[pulumi.Input[
|
1657
|
-
listing_visibility: Optional[pulumi.Input[
|
1658
|
-
local: Optional[pulumi.Input[
|
1659
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
1660
|
-
namespace: Optional[pulumi.Input[
|
1661
|
-
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
1662
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1663
|
-
password_policy: Optional[pulumi.Input[
|
1664
|
-
path: Optional[pulumi.Input[
|
1665
|
-
plugin_version: Optional[pulumi.Input[
|
1666
|
-
request_timeout: Optional[pulumi.Input[
|
1667
|
-
rotation_period: Optional[pulumi.Input[
|
1668
|
-
rotation_schedule: Optional[pulumi.Input[
|
1669
|
-
rotation_window: Optional[pulumi.Input[
|
1670
|
-
schema: Optional[pulumi.Input[
|
1671
|
-
seal_wrap: Optional[pulumi.Input[
|
1672
|
-
skip_static_role_import_rotation: Optional[pulumi.Input[
|
1673
|
-
starttls: Optional[pulumi.Input[
|
1674
|
-
upndomain: Optional[pulumi.Input[
|
1675
|
-
url: Optional[pulumi.Input[
|
1676
|
-
userattr: Optional[pulumi.Input[
|
1677
|
-
userdn: Optional[pulumi.Input[
|
1637
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
1638
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1639
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1640
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1641
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1642
|
+
binddn: Optional[pulumi.Input[_builtins.str]] = None,
|
1643
|
+
bindpass: Optional[pulumi.Input[_builtins.str]] = None,
|
1644
|
+
certificate: Optional[pulumi.Input[_builtins.str]] = None,
|
1645
|
+
client_tls_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
1646
|
+
client_tls_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1647
|
+
connection_timeout: Optional[pulumi.Input[_builtins.int]] = None,
|
1648
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1649
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1650
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
1651
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
1652
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
1653
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
1654
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1655
|
+
insecure_tls: Optional[pulumi.Input[_builtins.bool]] = None,
|
1656
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
1657
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
1658
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1659
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1660
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
1661
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1662
|
+
password_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
1663
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
1664
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
1665
|
+
request_timeout: Optional[pulumi.Input[_builtins.int]] = None,
|
1666
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
1667
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
1668
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
1669
|
+
schema: Optional[pulumi.Input[_builtins.str]] = None,
|
1670
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
1671
|
+
skip_static_role_import_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
1672
|
+
starttls: Optional[pulumi.Input[_builtins.bool]] = None,
|
1673
|
+
upndomain: Optional[pulumi.Input[_builtins.str]] = None,
|
1674
|
+
url: Optional[pulumi.Input[_builtins.str]] = None,
|
1675
|
+
userattr: Optional[pulumi.Input[_builtins.str]] = None,
|
1676
|
+
userdn: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackend':
|
1678
1677
|
"""
|
1679
1678
|
Get an existing SecretBackend resource's state with the given name, id, and optional extra
|
1680
1679
|
properties used to qualify the lookup.
|
@@ -1682,61 +1681,61 @@ class SecretBackend(pulumi.CustomResource):
|
|
1682
1681
|
:param str resource_name: The unique name of the resulting resource.
|
1683
1682
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
1684
1683
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
1685
|
-
:param pulumi.Input[
|
1686
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1687
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1688
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1689
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1690
|
-
:param pulumi.Input[
|
1691
|
-
:param pulumi.Input[
|
1692
|
-
:param pulumi.Input[
|
1684
|
+
:param pulumi.Input[_builtins.str] accessor: Accessor of the mount
|
1685
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
1686
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
1687
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1688
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1689
|
+
:param pulumi.Input[_builtins.str] binddn: Distinguished name of object to bind when performing user and group search.
|
1690
|
+
:param pulumi.Input[_builtins.str] bindpass: Password to use along with binddn when performing user search.
|
1691
|
+
:param pulumi.Input[_builtins.str] certificate: CA certificate to use when verifying LDAP server certificate, must be
|
1693
1692
|
x509 PEM encoded.
|
1694
|
-
:param pulumi.Input[
|
1695
|
-
:param pulumi.Input[
|
1696
|
-
:param pulumi.Input[
|
1693
|
+
:param pulumi.Input[_builtins.str] client_tls_cert: Client certificate to provide to the LDAP server, must be x509 PEM encoded.
|
1694
|
+
:param pulumi.Input[_builtins.str] client_tls_key: Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
|
1695
|
+
:param pulumi.Input[_builtins.int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
|
1697
1696
|
the next URL in the configuration.
|
1698
|
-
:param pulumi.Input[
|
1699
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1700
|
-
:param pulumi.Input[
|
1701
|
-
:param pulumi.Input[
|
1702
|
-
:param pulumi.Input[
|
1703
|
-
:param pulumi.Input[
|
1704
|
-
:param pulumi.Input[
|
1705
|
-
:param pulumi.Input[
|
1697
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
|
1698
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
1699
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
|
1700
|
+
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
1701
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
1702
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
1703
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
1704
|
+
:param pulumi.Input[_builtins.bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
|
1706
1705
|
Defaults to `false`.
|
1707
|
-
:param pulumi.Input[
|
1708
|
-
:param pulumi.Input[
|
1706
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
1707
|
+
:param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
1709
1708
|
replication.Tolerance duration to use when checking the last rotation time.
|
1710
|
-
:param pulumi.Input[
|
1711
|
-
:param pulumi.Input[
|
1709
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
1710
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
1712
1711
|
The value should not contain leading or trailing forward slashes.
|
1713
1712
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1714
1713
|
*Available only for Vault Enterprise*.
|
1715
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
1716
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1717
|
-
:param pulumi.Input[
|
1718
|
-
:param pulumi.Input[
|
1714
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
1715
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
1716
|
+
:param pulumi.Input[_builtins.str] password_policy: Name of the password policy to use to generate passwords.
|
1717
|
+
:param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
|
1719
1718
|
not begin or end with a `/`. Defaults to `ldap`.
|
1720
|
-
:param pulumi.Input[
|
1721
|
-
:param pulumi.Input[
|
1719
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1720
|
+
:param pulumi.Input[_builtins.int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
|
1722
1721
|
before returning back an error.
|
1723
|
-
:param pulumi.Input[
|
1722
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
1724
1723
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
1725
|
-
:param pulumi.Input[
|
1724
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
1726
1725
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
1727
|
-
:param pulumi.Input[
|
1726
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
1728
1727
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
1729
1728
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
1730
|
-
:param pulumi.Input[
|
1731
|
-
:param pulumi.Input[
|
1732
|
-
:param pulumi.Input[
|
1729
|
+
:param pulumi.Input[_builtins.str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
|
1730
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1731
|
+
:param pulumi.Input[_builtins.bool] skip_static_role_import_rotation: If set to true, static roles will not be rotated during import.
|
1733
1732
|
Defaults to false. Requires Vault 1.16 or above.
|
1734
|
-
:param pulumi.Input[
|
1735
|
-
:param pulumi.Input[
|
1736
|
-
:param pulumi.Input[
|
1733
|
+
:param pulumi.Input[_builtins.bool] starttls: Issue a StartTLS command after establishing unencrypted connection.
|
1734
|
+
:param pulumi.Input[_builtins.str] upndomain: Enables userPrincipalDomain login with [username]@UPNDomain.
|
1735
|
+
:param pulumi.Input[_builtins.str] url: LDAP URL to connect to. Multiple URLs can be specified by concatenating
|
1737
1736
|
them with commas; they will be tried in-order. Defaults to `ldap://127.0.0.1`.
|
1738
|
-
:param pulumi.Input[
|
1739
|
-
:param pulumi.Input[
|
1737
|
+
:param pulumi.Input[_builtins.str] userattr: Attribute used when searching users. Defaults to `cn`.
|
1738
|
+
:param pulumi.Input[_builtins.str] userdn: LDAP domain to use for users (eg: ou=People,dc=example,dc=org)`.
|
1740
1739
|
"""
|
1741
1740
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
1742
1741
|
|
@@ -1784,189 +1783,189 @@ class SecretBackend(pulumi.CustomResource):
|
|
1784
1783
|
__props__.__dict__["userdn"] = userdn
|
1785
1784
|
return SecretBackend(resource_name, opts=opts, __props__=__props__)
|
1786
1785
|
|
1787
|
-
@property
|
1786
|
+
@_builtins.property
|
1788
1787
|
@pulumi.getter
|
1789
|
-
def accessor(self) -> pulumi.Output[
|
1788
|
+
def accessor(self) -> pulumi.Output[_builtins.str]:
|
1790
1789
|
"""
|
1791
1790
|
Accessor of the mount
|
1792
1791
|
"""
|
1793
1792
|
return pulumi.get(self, "accessor")
|
1794
1793
|
|
1795
|
-
@property
|
1794
|
+
@_builtins.property
|
1796
1795
|
@pulumi.getter(name="allowedManagedKeys")
|
1797
|
-
def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[
|
1796
|
+
def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1798
1797
|
"""
|
1799
1798
|
List of managed key registry entry names that the mount in question is allowed to access
|
1800
1799
|
"""
|
1801
1800
|
return pulumi.get(self, "allowed_managed_keys")
|
1802
1801
|
|
1803
|
-
@property
|
1802
|
+
@_builtins.property
|
1804
1803
|
@pulumi.getter(name="allowedResponseHeaders")
|
1805
|
-
def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[
|
1804
|
+
def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1806
1805
|
"""
|
1807
1806
|
List of headers to allow and pass from the request to the plugin
|
1808
1807
|
"""
|
1809
1808
|
return pulumi.get(self, "allowed_response_headers")
|
1810
1809
|
|
1811
|
-
@property
|
1810
|
+
@_builtins.property
|
1812
1811
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
1813
|
-
def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[
|
1812
|
+
def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
1814
1813
|
"""
|
1815
1814
|
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1816
1815
|
"""
|
1817
1816
|
return pulumi.get(self, "audit_non_hmac_request_keys")
|
1818
1817
|
|
1819
|
-
@property
|
1818
|
+
@_builtins.property
|
1820
1819
|
@pulumi.getter(name="auditNonHmacResponseKeys")
|
1821
|
-
def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[
|
1820
|
+
def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
1822
1821
|
"""
|
1823
1822
|
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1824
1823
|
"""
|
1825
1824
|
return pulumi.get(self, "audit_non_hmac_response_keys")
|
1826
1825
|
|
1827
|
-
@property
|
1826
|
+
@_builtins.property
|
1828
1827
|
@pulumi.getter
|
1829
|
-
def binddn(self) -> pulumi.Output[
|
1828
|
+
def binddn(self) -> pulumi.Output[_builtins.str]:
|
1830
1829
|
"""
|
1831
1830
|
Distinguished name of object to bind when performing user and group search.
|
1832
1831
|
"""
|
1833
1832
|
return pulumi.get(self, "binddn")
|
1834
1833
|
|
1835
|
-
@property
|
1834
|
+
@_builtins.property
|
1836
1835
|
@pulumi.getter
|
1837
|
-
def bindpass(self) -> pulumi.Output[
|
1836
|
+
def bindpass(self) -> pulumi.Output[_builtins.str]:
|
1838
1837
|
"""
|
1839
1838
|
Password to use along with binddn when performing user search.
|
1840
1839
|
"""
|
1841
1840
|
return pulumi.get(self, "bindpass")
|
1842
1841
|
|
1843
|
-
@property
|
1842
|
+
@_builtins.property
|
1844
1843
|
@pulumi.getter
|
1845
|
-
def certificate(self) -> pulumi.Output[Optional[
|
1844
|
+
def certificate(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1846
1845
|
"""
|
1847
1846
|
CA certificate to use when verifying LDAP server certificate, must be
|
1848
1847
|
x509 PEM encoded.
|
1849
1848
|
"""
|
1850
1849
|
return pulumi.get(self, "certificate")
|
1851
1850
|
|
1852
|
-
@property
|
1851
|
+
@_builtins.property
|
1853
1852
|
@pulumi.getter(name="clientTlsCert")
|
1854
|
-
def client_tls_cert(self) -> pulumi.Output[Optional[
|
1853
|
+
def client_tls_cert(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1855
1854
|
"""
|
1856
1855
|
Client certificate to provide to the LDAP server, must be x509 PEM encoded.
|
1857
1856
|
"""
|
1858
1857
|
return pulumi.get(self, "client_tls_cert")
|
1859
1858
|
|
1860
|
-
@property
|
1859
|
+
@_builtins.property
|
1861
1860
|
@pulumi.getter(name="clientTlsKey")
|
1862
|
-
def client_tls_key(self) -> pulumi.Output[Optional[
|
1861
|
+
def client_tls_key(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1863
1862
|
"""
|
1864
1863
|
Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
|
1865
1864
|
"""
|
1866
1865
|
return pulumi.get(self, "client_tls_key")
|
1867
1866
|
|
1868
|
-
@property
|
1867
|
+
@_builtins.property
|
1869
1868
|
@pulumi.getter(name="connectionTimeout")
|
1870
|
-
def connection_timeout(self) -> pulumi.Output[Optional[
|
1869
|
+
def connection_timeout(self) -> pulumi.Output[Optional[_builtins.int]]:
|
1871
1870
|
"""
|
1872
1871
|
Timeout, in seconds, when attempting to connect to the LDAP server before trying
|
1873
1872
|
the next URL in the configuration.
|
1874
1873
|
"""
|
1875
1874
|
return pulumi.get(self, "connection_timeout")
|
1876
1875
|
|
1877
|
-
@property
|
1876
|
+
@_builtins.property
|
1878
1877
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
1879
|
-
def default_lease_ttl_seconds(self) -> pulumi.Output[
|
1878
|
+
def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
|
1880
1879
|
"""
|
1881
1880
|
Default lease duration for secrets in seconds.
|
1882
1881
|
"""
|
1883
1882
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
1884
1883
|
|
1885
|
-
@property
|
1884
|
+
@_builtins.property
|
1886
1885
|
@pulumi.getter(name="delegatedAuthAccessors")
|
1887
|
-
def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[
|
1886
|
+
def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1888
1887
|
"""
|
1889
1888
|
List of headers to allow and pass from the request to the plugin
|
1890
1889
|
"""
|
1891
1890
|
return pulumi.get(self, "delegated_auth_accessors")
|
1892
1891
|
|
1893
|
-
@property
|
1892
|
+
@_builtins.property
|
1894
1893
|
@pulumi.getter
|
1895
|
-
def description(self) -> pulumi.Output[Optional[
|
1894
|
+
def description(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1896
1895
|
"""
|
1897
1896
|
Human-friendly description of the mount for the Active Directory backend.
|
1898
1897
|
"""
|
1899
1898
|
return pulumi.get(self, "description")
|
1900
1899
|
|
1901
|
-
@property
|
1900
|
+
@_builtins.property
|
1902
1901
|
@pulumi.getter(name="disableAutomatedRotation")
|
1903
|
-
def disable_automated_rotation(self) -> pulumi.Output[Optional[
|
1902
|
+
def disable_automated_rotation(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1904
1903
|
"""
|
1905
1904
|
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
1906
1905
|
"""
|
1907
1906
|
return pulumi.get(self, "disable_automated_rotation")
|
1908
1907
|
|
1909
|
-
@property
|
1908
|
+
@_builtins.property
|
1910
1909
|
@pulumi.getter(name="disableRemount")
|
1911
|
-
def disable_remount(self) -> pulumi.Output[Optional[
|
1910
|
+
def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1912
1911
|
"""
|
1913
1912
|
If set, opts out of mount migration on path updates.
|
1914
1913
|
"""
|
1915
1914
|
return pulumi.get(self, "disable_remount")
|
1916
1915
|
|
1917
|
-
@property
|
1916
|
+
@_builtins.property
|
1918
1917
|
@pulumi.getter(name="externalEntropyAccess")
|
1919
|
-
def external_entropy_access(self) -> pulumi.Output[Optional[
|
1918
|
+
def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1920
1919
|
"""
|
1921
1920
|
Enable the secrets engine to access Vault's external entropy source
|
1922
1921
|
"""
|
1923
1922
|
return pulumi.get(self, "external_entropy_access")
|
1924
1923
|
|
1925
|
-
@property
|
1924
|
+
@_builtins.property
|
1926
1925
|
@pulumi.getter(name="identityTokenKey")
|
1927
|
-
def identity_token_key(self) -> pulumi.Output[Optional[
|
1926
|
+
def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1928
1927
|
"""
|
1929
1928
|
The key to use for signing plugin workload identity tokens
|
1930
1929
|
"""
|
1931
1930
|
return pulumi.get(self, "identity_token_key")
|
1932
1931
|
|
1933
|
-
@property
|
1932
|
+
@_builtins.property
|
1934
1933
|
@pulumi.getter(name="insecureTls")
|
1935
|
-
def insecure_tls(self) -> pulumi.Output[Optional[
|
1934
|
+
def insecure_tls(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1936
1935
|
"""
|
1937
1936
|
Skip LDAP server SSL Certificate verification. This is not recommended for production.
|
1938
1937
|
Defaults to `false`.
|
1939
1938
|
"""
|
1940
1939
|
return pulumi.get(self, "insecure_tls")
|
1941
1940
|
|
1942
|
-
@property
|
1941
|
+
@_builtins.property
|
1943
1942
|
@pulumi.getter(name="listingVisibility")
|
1944
|
-
def listing_visibility(self) -> pulumi.Output[Optional[
|
1943
|
+
def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1945
1944
|
"""
|
1946
1945
|
Specifies whether to show this mount in the UI-specific listing endpoint
|
1947
1946
|
"""
|
1948
1947
|
return pulumi.get(self, "listing_visibility")
|
1949
1948
|
|
1950
|
-
@property
|
1949
|
+
@_builtins.property
|
1951
1950
|
@pulumi.getter
|
1952
|
-
def local(self) -> pulumi.Output[Optional[
|
1951
|
+
def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1953
1952
|
"""
|
1954
1953
|
Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
1955
1954
|
replication.Tolerance duration to use when checking the last rotation time.
|
1956
1955
|
"""
|
1957
1956
|
return pulumi.get(self, "local")
|
1958
1957
|
|
1959
|
-
@property
|
1958
|
+
@_builtins.property
|
1960
1959
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
1961
|
-
def max_lease_ttl_seconds(self) -> pulumi.Output[
|
1960
|
+
def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
|
1962
1961
|
"""
|
1963
1962
|
Maximum possible lease duration for secrets in seconds.
|
1964
1963
|
"""
|
1965
1964
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
1966
1965
|
|
1967
|
-
@property
|
1966
|
+
@_builtins.property
|
1968
1967
|
@pulumi.getter
|
1969
|
-
def namespace(self) -> pulumi.Output[Optional[
|
1968
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1970
1969
|
"""
|
1971
1970
|
The namespace to provision the resource in.
|
1972
1971
|
The value should not contain leading or trailing forward slashes.
|
@@ -1975,77 +1974,77 @@ class SecretBackend(pulumi.CustomResource):
|
|
1975
1974
|
"""
|
1976
1975
|
return pulumi.get(self, "namespace")
|
1977
1976
|
|
1978
|
-
@property
|
1977
|
+
@_builtins.property
|
1979
1978
|
@pulumi.getter
|
1980
|
-
def options(self) -> pulumi.Output[Optional[Mapping[str,
|
1979
|
+
def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
|
1981
1980
|
"""
|
1982
1981
|
Specifies mount type specific options that are passed to the backend
|
1983
1982
|
"""
|
1984
1983
|
return pulumi.get(self, "options")
|
1985
1984
|
|
1986
|
-
@property
|
1985
|
+
@_builtins.property
|
1987
1986
|
@pulumi.getter(name="passthroughRequestHeaders")
|
1988
|
-
def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[
|
1987
|
+
def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1989
1988
|
"""
|
1990
1989
|
List of headers to allow and pass from the request to the plugin
|
1991
1990
|
"""
|
1992
1991
|
return pulumi.get(self, "passthrough_request_headers")
|
1993
1992
|
|
1994
|
-
@property
|
1993
|
+
@_builtins.property
|
1995
1994
|
@pulumi.getter(name="passwordPolicy")
|
1996
|
-
def password_policy(self) -> pulumi.Output[Optional[
|
1995
|
+
def password_policy(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1997
1996
|
"""
|
1998
1997
|
Name of the password policy to use to generate passwords.
|
1999
1998
|
"""
|
2000
1999
|
return pulumi.get(self, "password_policy")
|
2001
2000
|
|
2002
|
-
@property
|
2001
|
+
@_builtins.property
|
2003
2002
|
@pulumi.getter
|
2004
|
-
def path(self) -> pulumi.Output[Optional[
|
2003
|
+
def path(self) -> pulumi.Output[Optional[_builtins.str]]:
|
2005
2004
|
"""
|
2006
2005
|
The unique path this backend should be mounted at. Must
|
2007
2006
|
not begin or end with a `/`. Defaults to `ldap`.
|
2008
2007
|
"""
|
2009
2008
|
return pulumi.get(self, "path")
|
2010
2009
|
|
2011
|
-
@property
|
2010
|
+
@_builtins.property
|
2012
2011
|
@pulumi.getter(name="pluginVersion")
|
2013
|
-
def plugin_version(self) -> pulumi.Output[Optional[
|
2012
|
+
def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
|
2014
2013
|
"""
|
2015
2014
|
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
2016
2015
|
"""
|
2017
2016
|
return pulumi.get(self, "plugin_version")
|
2018
2017
|
|
2019
|
-
@property
|
2018
|
+
@_builtins.property
|
2020
2019
|
@pulumi.getter(name="requestTimeout")
|
2021
|
-
def request_timeout(self) -> pulumi.Output[
|
2020
|
+
def request_timeout(self) -> pulumi.Output[_builtins.int]:
|
2022
2021
|
"""
|
2023
2022
|
Timeout, in seconds, for the connection when making requests against the server
|
2024
2023
|
before returning back an error.
|
2025
2024
|
"""
|
2026
2025
|
return pulumi.get(self, "request_timeout")
|
2027
2026
|
|
2028
|
-
@property
|
2027
|
+
@_builtins.property
|
2029
2028
|
@pulumi.getter(name="rotationPeriod")
|
2030
|
-
def rotation_period(self) -> pulumi.Output[Optional[
|
2029
|
+
def rotation_period(self) -> pulumi.Output[Optional[_builtins.int]]:
|
2031
2030
|
"""
|
2032
2031
|
The amount of time in seconds Vault should wait before rotating the root credential.
|
2033
2032
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
2034
2033
|
"""
|
2035
2034
|
return pulumi.get(self, "rotation_period")
|
2036
2035
|
|
2037
|
-
@property
|
2036
|
+
@_builtins.property
|
2038
2037
|
@pulumi.getter(name="rotationSchedule")
|
2039
|
-
def rotation_schedule(self) -> pulumi.Output[Optional[
|
2038
|
+
def rotation_schedule(self) -> pulumi.Output[Optional[_builtins.str]]:
|
2040
2039
|
"""
|
2041
2040
|
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
2042
2041
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
2043
2042
|
"""
|
2044
2043
|
return pulumi.get(self, "rotation_schedule")
|
2045
2044
|
|
2046
|
-
@property
|
2045
|
+
@_builtins.property
|
2047
2046
|
@pulumi.getter(name="rotationWindow")
|
2048
|
-
def rotation_window(self) -> pulumi.Output[Optional[
|
2047
|
+
def rotation_window(self) -> pulumi.Output[Optional[_builtins.int]]:
|
2049
2048
|
"""
|
2050
2049
|
The maximum amount of time in seconds allowed to complete
|
2051
2050
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
@@ -2053,67 +2052,67 @@ class SecretBackend(pulumi.CustomResource):
|
|
2053
2052
|
"""
|
2054
2053
|
return pulumi.get(self, "rotation_window")
|
2055
2054
|
|
2056
|
-
@property
|
2055
|
+
@_builtins.property
|
2057
2056
|
@pulumi.getter
|
2058
|
-
def schema(self) -> pulumi.Output[
|
2057
|
+
def schema(self) -> pulumi.Output[_builtins.str]:
|
2059
2058
|
"""
|
2060
2059
|
The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
|
2061
2060
|
"""
|
2062
2061
|
return pulumi.get(self, "schema")
|
2063
2062
|
|
2064
|
-
@property
|
2063
|
+
@_builtins.property
|
2065
2064
|
@pulumi.getter(name="sealWrap")
|
2066
|
-
def seal_wrap(self) -> pulumi.Output[
|
2065
|
+
def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
|
2067
2066
|
"""
|
2068
2067
|
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
2069
2068
|
"""
|
2070
2069
|
return pulumi.get(self, "seal_wrap")
|
2071
2070
|
|
2072
|
-
@property
|
2071
|
+
@_builtins.property
|
2073
2072
|
@pulumi.getter(name="skipStaticRoleImportRotation")
|
2074
|
-
def skip_static_role_import_rotation(self) -> pulumi.Output[Optional[
|
2073
|
+
def skip_static_role_import_rotation(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
2075
2074
|
"""
|
2076
2075
|
If set to true, static roles will not be rotated during import.
|
2077
2076
|
Defaults to false. Requires Vault 1.16 or above.
|
2078
2077
|
"""
|
2079
2078
|
return pulumi.get(self, "skip_static_role_import_rotation")
|
2080
2079
|
|
2081
|
-
@property
|
2080
|
+
@_builtins.property
|
2082
2081
|
@pulumi.getter
|
2083
|
-
def starttls(self) -> pulumi.Output[
|
2082
|
+
def starttls(self) -> pulumi.Output[_builtins.bool]:
|
2084
2083
|
"""
|
2085
2084
|
Issue a StartTLS command after establishing unencrypted connection.
|
2086
2085
|
"""
|
2087
2086
|
return pulumi.get(self, "starttls")
|
2088
2087
|
|
2089
|
-
@property
|
2088
|
+
@_builtins.property
|
2090
2089
|
@pulumi.getter
|
2091
|
-
def upndomain(self) -> pulumi.Output[
|
2090
|
+
def upndomain(self) -> pulumi.Output[_builtins.str]:
|
2092
2091
|
"""
|
2093
2092
|
Enables userPrincipalDomain login with [username]@UPNDomain.
|
2094
2093
|
"""
|
2095
2094
|
return pulumi.get(self, "upndomain")
|
2096
2095
|
|
2097
|
-
@property
|
2096
|
+
@_builtins.property
|
2098
2097
|
@pulumi.getter
|
2099
|
-
def url(self) -> pulumi.Output[
|
2098
|
+
def url(self) -> pulumi.Output[_builtins.str]:
|
2100
2099
|
"""
|
2101
2100
|
LDAP URL to connect to. Multiple URLs can be specified by concatenating
|
2102
2101
|
them with commas; they will be tried in-order. Defaults to `ldap://127.0.0.1`.
|
2103
2102
|
"""
|
2104
2103
|
return pulumi.get(self, "url")
|
2105
2104
|
|
2106
|
-
@property
|
2105
|
+
@_builtins.property
|
2107
2106
|
@pulumi.getter
|
2108
|
-
def userattr(self) -> pulumi.Output[
|
2107
|
+
def userattr(self) -> pulumi.Output[_builtins.str]:
|
2109
2108
|
"""
|
2110
2109
|
Attribute used when searching users. Defaults to `cn`.
|
2111
2110
|
"""
|
2112
2111
|
return pulumi.get(self, "userattr")
|
2113
2112
|
|
2114
|
-
@property
|
2113
|
+
@_builtins.property
|
2115
2114
|
@pulumi.getter
|
2116
|
-
def userdn(self) -> pulumi.Output[Optional[
|
2115
|
+
def userdn(self) -> pulumi.Output[Optional[_builtins.str]]:
|
2117
2116
|
"""
|
2118
2117
|
LDAP domain to use for users (eg: ou=People,dc=example,dc=org)`.
|
2119
2118
|
"""
|