pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,68 +19,68 @@ __all__ = ['SecretBackendArgs', 'SecretBackend']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class SecretBackendArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
access_key: Optional[pulumi.Input[
|
24
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
25
|
-
description: Optional[pulumi.Input[
|
26
|
-
disable_automated_rotation: Optional[pulumi.Input[
|
27
|
-
disable_remount: Optional[pulumi.Input[
|
28
|
-
iam_endpoint: Optional[pulumi.Input[
|
29
|
-
identity_token_audience: Optional[pulumi.Input[
|
30
|
-
identity_token_key: Optional[pulumi.Input[
|
31
|
-
identity_token_ttl: Optional[pulumi.Input[
|
32
|
-
local: Optional[pulumi.Input[
|
33
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
34
|
-
namespace: Optional[pulumi.Input[
|
35
|
-
path: Optional[pulumi.Input[
|
36
|
-
region: Optional[pulumi.Input[
|
37
|
-
role_arn: Optional[pulumi.Input[
|
38
|
-
rotation_period: Optional[pulumi.Input[
|
39
|
-
rotation_schedule: Optional[pulumi.Input[
|
40
|
-
rotation_window: Optional[pulumi.Input[
|
41
|
-
secret_key: Optional[pulumi.Input[
|
42
|
-
sts_endpoint: Optional[pulumi.Input[
|
43
|
-
sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[
|
44
|
-
sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[
|
45
|
-
sts_region: Optional[pulumi.Input[
|
46
|
-
username_template: Optional[pulumi.Input[
|
22
|
+
access_key: Optional[pulumi.Input[_builtins.str]] = None,
|
23
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
24
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
25
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
26
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
27
|
+
iam_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
|
28
|
+
identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
|
29
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
30
|
+
identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
31
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
32
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
33
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
34
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
35
|
+
region: Optional[pulumi.Input[_builtins.str]] = None,
|
36
|
+
role_arn: Optional[pulumi.Input[_builtins.str]] = None,
|
37
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
38
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
39
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
40
|
+
secret_key: Optional[pulumi.Input[_builtins.str]] = None,
|
41
|
+
sts_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
|
42
|
+
sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
43
|
+
sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
44
|
+
sts_region: Optional[pulumi.Input[_builtins.str]] = None,
|
45
|
+
username_template: Optional[pulumi.Input[_builtins.str]] = None):
|
47
46
|
"""
|
48
47
|
The set of arguments for constructing a SecretBackend resource.
|
49
|
-
:param pulumi.Input[
|
48
|
+
:param pulumi.Input[_builtins.str] access_key: The AWS Access Key ID this backend should use to
|
50
49
|
issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
|
51
|
-
:param pulumi.Input[
|
50
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: The default TTL for credentials
|
52
51
|
issued by this backend.
|
53
|
-
:param pulumi.Input[
|
54
|
-
:param pulumi.Input[
|
55
|
-
:param pulumi.Input[
|
52
|
+
:param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
|
53
|
+
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
54
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
56
55
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
57
|
-
:param pulumi.Input[
|
58
|
-
:param pulumi.Input[
|
59
|
-
:param pulumi.Input[
|
60
|
-
:param pulumi.Input[
|
61
|
-
:param pulumi.Input[
|
62
|
-
:param pulumi.Input[
|
56
|
+
:param pulumi.Input[_builtins.str] iam_endpoint: Specifies a custom HTTP IAM endpoint to use.
|
57
|
+
:param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.16+.
|
58
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens. Requires Vault 1.16+.
|
59
|
+
:param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.16+.
|
60
|
+
:param pulumi.Input[_builtins.bool] local: Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
|
61
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
|
63
62
|
for credentials issued by this backend.
|
64
|
-
:param pulumi.Input[
|
63
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
65
64
|
The value should not contain leading or trailing forward slashes.
|
66
65
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
67
66
|
*Available only for Vault Enterprise*.
|
68
|
-
:param pulumi.Input[
|
67
|
+
:param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
|
69
68
|
not begin or end with a `/`. Defaults to `aws`.
|
70
|
-
:param pulumi.Input[
|
71
|
-
:param pulumi.Input[
|
72
|
-
:param pulumi.Input[
|
69
|
+
:param pulumi.Input[_builtins.str] region: The AWS region to make API calls against. Defaults to us-east-1.
|
70
|
+
:param pulumi.Input[_builtins.str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
|
71
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
73
72
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
74
|
-
:param pulumi.Input[
|
73
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
75
74
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
76
|
-
:param pulumi.Input[
|
75
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
77
76
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
78
77
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
79
|
-
:param pulumi.Input[
|
80
|
-
:param pulumi.Input[
|
81
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
82
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
83
|
-
:param pulumi.Input[
|
84
|
-
:param pulumi.Input[
|
78
|
+
:param pulumi.Input[_builtins.str] secret_key: The AWS Secret Access Key to use when generating new credentials.
|
79
|
+
:param pulumi.Input[_builtins.str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
|
80
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] sts_fallback_endpoints: Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
|
81
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] sts_fallback_regions: Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
|
82
|
+
:param pulumi.Input[_builtins.str] sts_region: Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
|
83
|
+
:param pulumi.Input[_builtins.str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
|
85
84
|
|
86
85
|
```
|
87
86
|
{{ if (eq .Type "STS") }}
|
@@ -141,9 +140,9 @@ class SecretBackendArgs:
|
|
141
140
|
if username_template is not None:
|
142
141
|
pulumi.set(__self__, "username_template", username_template)
|
143
142
|
|
144
|
-
@property
|
143
|
+
@_builtins.property
|
145
144
|
@pulumi.getter(name="accessKey")
|
146
|
-
def access_key(self) -> Optional[pulumi.Input[
|
145
|
+
def access_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
147
146
|
"""
|
148
147
|
The AWS Access Key ID this backend should use to
|
149
148
|
issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
|
@@ -151,12 +150,12 @@ class SecretBackendArgs:
|
|
151
150
|
return pulumi.get(self, "access_key")
|
152
151
|
|
153
152
|
@access_key.setter
|
154
|
-
def access_key(self, value: Optional[pulumi.Input[
|
153
|
+
def access_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
155
154
|
pulumi.set(self, "access_key", value)
|
156
155
|
|
157
|
-
@property
|
156
|
+
@_builtins.property
|
158
157
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
159
|
-
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
158
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
160
159
|
"""
|
161
160
|
The default TTL for credentials
|
162
161
|
issued by this backend.
|
@@ -164,36 +163,36 @@ class SecretBackendArgs:
|
|
164
163
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
165
164
|
|
166
165
|
@default_lease_ttl_seconds.setter
|
167
|
-
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
166
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
168
167
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
169
168
|
|
170
|
-
@property
|
169
|
+
@_builtins.property
|
171
170
|
@pulumi.getter
|
172
|
-
def description(self) -> Optional[pulumi.Input[
|
171
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
173
172
|
"""
|
174
173
|
A human-friendly description for this backend.
|
175
174
|
"""
|
176
175
|
return pulumi.get(self, "description")
|
177
176
|
|
178
177
|
@description.setter
|
179
|
-
def description(self, value: Optional[pulumi.Input[
|
178
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
180
179
|
pulumi.set(self, "description", value)
|
181
180
|
|
182
|
-
@property
|
181
|
+
@_builtins.property
|
183
182
|
@pulumi.getter(name="disableAutomatedRotation")
|
184
|
-
def disable_automated_rotation(self) -> Optional[pulumi.Input[
|
183
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
185
184
|
"""
|
186
185
|
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
187
186
|
"""
|
188
187
|
return pulumi.get(self, "disable_automated_rotation")
|
189
188
|
|
190
189
|
@disable_automated_rotation.setter
|
191
|
-
def disable_automated_rotation(self, value: Optional[pulumi.Input[
|
190
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
192
191
|
pulumi.set(self, "disable_automated_rotation", value)
|
193
192
|
|
194
|
-
@property
|
193
|
+
@_builtins.property
|
195
194
|
@pulumi.getter(name="disableRemount")
|
196
|
-
def disable_remount(self) -> Optional[pulumi.Input[
|
195
|
+
def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
197
196
|
"""
|
198
197
|
If set, opts out of mount migration on path updates.
|
199
198
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -201,72 +200,72 @@ class SecretBackendArgs:
|
|
201
200
|
return pulumi.get(self, "disable_remount")
|
202
201
|
|
203
202
|
@disable_remount.setter
|
204
|
-
def disable_remount(self, value: Optional[pulumi.Input[
|
203
|
+
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
205
204
|
pulumi.set(self, "disable_remount", value)
|
206
205
|
|
207
|
-
@property
|
206
|
+
@_builtins.property
|
208
207
|
@pulumi.getter(name="iamEndpoint")
|
209
|
-
def iam_endpoint(self) -> Optional[pulumi.Input[
|
208
|
+
def iam_endpoint(self) -> Optional[pulumi.Input[_builtins.str]]:
|
210
209
|
"""
|
211
210
|
Specifies a custom HTTP IAM endpoint to use.
|
212
211
|
"""
|
213
212
|
return pulumi.get(self, "iam_endpoint")
|
214
213
|
|
215
214
|
@iam_endpoint.setter
|
216
|
-
def iam_endpoint(self, value: Optional[pulumi.Input[
|
215
|
+
def iam_endpoint(self, value: Optional[pulumi.Input[_builtins.str]]):
|
217
216
|
pulumi.set(self, "iam_endpoint", value)
|
218
217
|
|
219
|
-
@property
|
218
|
+
@_builtins.property
|
220
219
|
@pulumi.getter(name="identityTokenAudience")
|
221
|
-
def identity_token_audience(self) -> Optional[pulumi.Input[
|
220
|
+
def identity_token_audience(self) -> Optional[pulumi.Input[_builtins.str]]:
|
222
221
|
"""
|
223
222
|
The audience claim value. Requires Vault 1.16+.
|
224
223
|
"""
|
225
224
|
return pulumi.get(self, "identity_token_audience")
|
226
225
|
|
227
226
|
@identity_token_audience.setter
|
228
|
-
def identity_token_audience(self, value: Optional[pulumi.Input[
|
227
|
+
def identity_token_audience(self, value: Optional[pulumi.Input[_builtins.str]]):
|
229
228
|
pulumi.set(self, "identity_token_audience", value)
|
230
229
|
|
231
|
-
@property
|
230
|
+
@_builtins.property
|
232
231
|
@pulumi.getter(name="identityTokenKey")
|
233
|
-
def identity_token_key(self) -> Optional[pulumi.Input[
|
232
|
+
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
234
233
|
"""
|
235
234
|
The key to use for signing identity tokens. Requires Vault 1.16+.
|
236
235
|
"""
|
237
236
|
return pulumi.get(self, "identity_token_key")
|
238
237
|
|
239
238
|
@identity_token_key.setter
|
240
|
-
def identity_token_key(self, value: Optional[pulumi.Input[
|
239
|
+
def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
241
240
|
pulumi.set(self, "identity_token_key", value)
|
242
241
|
|
243
|
-
@property
|
242
|
+
@_builtins.property
|
244
243
|
@pulumi.getter(name="identityTokenTtl")
|
245
|
-
def identity_token_ttl(self) -> Optional[pulumi.Input[
|
244
|
+
def identity_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
246
245
|
"""
|
247
246
|
The TTL of generated identity tokens in seconds. Requires Vault 1.16+.
|
248
247
|
"""
|
249
248
|
return pulumi.get(self, "identity_token_ttl")
|
250
249
|
|
251
250
|
@identity_token_ttl.setter
|
252
|
-
def identity_token_ttl(self, value: Optional[pulumi.Input[
|
251
|
+
def identity_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
253
252
|
pulumi.set(self, "identity_token_ttl", value)
|
254
253
|
|
255
|
-
@property
|
254
|
+
@_builtins.property
|
256
255
|
@pulumi.getter
|
257
|
-
def local(self) -> Optional[pulumi.Input[
|
256
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
258
257
|
"""
|
259
258
|
Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
|
260
259
|
"""
|
261
260
|
return pulumi.get(self, "local")
|
262
261
|
|
263
262
|
@local.setter
|
264
|
-
def local(self, value: Optional[pulumi.Input[
|
263
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
265
264
|
pulumi.set(self, "local", value)
|
266
265
|
|
267
|
-
@property
|
266
|
+
@_builtins.property
|
268
267
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
269
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
268
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
270
269
|
"""
|
271
270
|
The maximum TTL that can be requested
|
272
271
|
for credentials issued by this backend.
|
@@ -274,12 +273,12 @@ class SecretBackendArgs:
|
|
274
273
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
275
274
|
|
276
275
|
@max_lease_ttl_seconds.setter
|
277
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
276
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
278
277
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
279
278
|
|
280
|
-
@property
|
279
|
+
@_builtins.property
|
281
280
|
@pulumi.getter
|
282
|
-
def namespace(self) -> Optional[pulumi.Input[
|
281
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
283
282
|
"""
|
284
283
|
The namespace to provision the resource in.
|
285
284
|
The value should not contain leading or trailing forward slashes.
|
@@ -289,12 +288,12 @@ class SecretBackendArgs:
|
|
289
288
|
return pulumi.get(self, "namespace")
|
290
289
|
|
291
290
|
@namespace.setter
|
292
|
-
def namespace(self, value: Optional[pulumi.Input[
|
291
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
293
292
|
pulumi.set(self, "namespace", value)
|
294
293
|
|
295
|
-
@property
|
294
|
+
@_builtins.property
|
296
295
|
@pulumi.getter
|
297
|
-
def path(self) -> Optional[pulumi.Input[
|
296
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
298
297
|
"""
|
299
298
|
The unique path this backend should be mounted at. Must
|
300
299
|
not begin or end with a `/`. Defaults to `aws`.
|
@@ -302,36 +301,36 @@ class SecretBackendArgs:
|
|
302
301
|
return pulumi.get(self, "path")
|
303
302
|
|
304
303
|
@path.setter
|
305
|
-
def path(self, value: Optional[pulumi.Input[
|
304
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
306
305
|
pulumi.set(self, "path", value)
|
307
306
|
|
308
|
-
@property
|
307
|
+
@_builtins.property
|
309
308
|
@pulumi.getter
|
310
|
-
def region(self) -> Optional[pulumi.Input[
|
309
|
+
def region(self) -> Optional[pulumi.Input[_builtins.str]]:
|
311
310
|
"""
|
312
311
|
The AWS region to make API calls against. Defaults to us-east-1.
|
313
312
|
"""
|
314
313
|
return pulumi.get(self, "region")
|
315
314
|
|
316
315
|
@region.setter
|
317
|
-
def region(self, value: Optional[pulumi.Input[
|
316
|
+
def region(self, value: Optional[pulumi.Input[_builtins.str]]):
|
318
317
|
pulumi.set(self, "region", value)
|
319
318
|
|
320
|
-
@property
|
319
|
+
@_builtins.property
|
321
320
|
@pulumi.getter(name="roleArn")
|
322
|
-
def role_arn(self) -> Optional[pulumi.Input[
|
321
|
+
def role_arn(self) -> Optional[pulumi.Input[_builtins.str]]:
|
323
322
|
"""
|
324
323
|
Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
|
325
324
|
"""
|
326
325
|
return pulumi.get(self, "role_arn")
|
327
326
|
|
328
327
|
@role_arn.setter
|
329
|
-
def role_arn(self, value: Optional[pulumi.Input[
|
328
|
+
def role_arn(self, value: Optional[pulumi.Input[_builtins.str]]):
|
330
329
|
pulumi.set(self, "role_arn", value)
|
331
330
|
|
332
|
-
@property
|
331
|
+
@_builtins.property
|
333
332
|
@pulumi.getter(name="rotationPeriod")
|
334
|
-
def rotation_period(self) -> Optional[pulumi.Input[
|
333
|
+
def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
335
334
|
"""
|
336
335
|
The amount of time in seconds Vault should wait before rotating the root credential.
|
337
336
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
@@ -339,12 +338,12 @@ class SecretBackendArgs:
|
|
339
338
|
return pulumi.get(self, "rotation_period")
|
340
339
|
|
341
340
|
@rotation_period.setter
|
342
|
-
def rotation_period(self, value: Optional[pulumi.Input[
|
341
|
+
def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
343
342
|
pulumi.set(self, "rotation_period", value)
|
344
343
|
|
345
|
-
@property
|
344
|
+
@_builtins.property
|
346
345
|
@pulumi.getter(name="rotationSchedule")
|
347
|
-
def rotation_schedule(self) -> Optional[pulumi.Input[
|
346
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
|
348
347
|
"""
|
349
348
|
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
350
349
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
@@ -352,12 +351,12 @@ class SecretBackendArgs:
|
|
352
351
|
return pulumi.get(self, "rotation_schedule")
|
353
352
|
|
354
353
|
@rotation_schedule.setter
|
355
|
-
def rotation_schedule(self, value: Optional[pulumi.Input[
|
354
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
|
356
355
|
pulumi.set(self, "rotation_schedule", value)
|
357
356
|
|
358
|
-
@property
|
357
|
+
@_builtins.property
|
359
358
|
@pulumi.getter(name="rotationWindow")
|
360
|
-
def rotation_window(self) -> Optional[pulumi.Input[
|
359
|
+
def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
|
361
360
|
"""
|
362
361
|
The maximum amount of time in seconds allowed to complete
|
363
362
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
@@ -366,72 +365,72 @@ class SecretBackendArgs:
|
|
366
365
|
return pulumi.get(self, "rotation_window")
|
367
366
|
|
368
367
|
@rotation_window.setter
|
369
|
-
def rotation_window(self, value: Optional[pulumi.Input[
|
368
|
+
def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
|
370
369
|
pulumi.set(self, "rotation_window", value)
|
371
370
|
|
372
|
-
@property
|
371
|
+
@_builtins.property
|
373
372
|
@pulumi.getter(name="secretKey")
|
374
|
-
def secret_key(self) -> Optional[pulumi.Input[
|
373
|
+
def secret_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
375
374
|
"""
|
376
375
|
The AWS Secret Access Key to use when generating new credentials.
|
377
376
|
"""
|
378
377
|
return pulumi.get(self, "secret_key")
|
379
378
|
|
380
379
|
@secret_key.setter
|
381
|
-
def secret_key(self, value: Optional[pulumi.Input[
|
380
|
+
def secret_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
382
381
|
pulumi.set(self, "secret_key", value)
|
383
382
|
|
384
|
-
@property
|
383
|
+
@_builtins.property
|
385
384
|
@pulumi.getter(name="stsEndpoint")
|
386
|
-
def sts_endpoint(self) -> Optional[pulumi.Input[
|
385
|
+
def sts_endpoint(self) -> Optional[pulumi.Input[_builtins.str]]:
|
387
386
|
"""
|
388
387
|
Specifies a custom HTTP STS endpoint to use.
|
389
388
|
"""
|
390
389
|
return pulumi.get(self, "sts_endpoint")
|
391
390
|
|
392
391
|
@sts_endpoint.setter
|
393
|
-
def sts_endpoint(self, value: Optional[pulumi.Input[
|
392
|
+
def sts_endpoint(self, value: Optional[pulumi.Input[_builtins.str]]):
|
394
393
|
pulumi.set(self, "sts_endpoint", value)
|
395
394
|
|
396
|
-
@property
|
395
|
+
@_builtins.property
|
397
396
|
@pulumi.getter(name="stsFallbackEndpoints")
|
398
|
-
def sts_fallback_endpoints(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
397
|
+
def sts_fallback_endpoints(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
399
398
|
"""
|
400
399
|
Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
|
401
400
|
"""
|
402
401
|
return pulumi.get(self, "sts_fallback_endpoints")
|
403
402
|
|
404
403
|
@sts_fallback_endpoints.setter
|
405
|
-
def sts_fallback_endpoints(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
404
|
+
def sts_fallback_endpoints(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
406
405
|
pulumi.set(self, "sts_fallback_endpoints", value)
|
407
406
|
|
408
|
-
@property
|
407
|
+
@_builtins.property
|
409
408
|
@pulumi.getter(name="stsFallbackRegions")
|
410
|
-
def sts_fallback_regions(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
409
|
+
def sts_fallback_regions(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
411
410
|
"""
|
412
411
|
Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
|
413
412
|
"""
|
414
413
|
return pulumi.get(self, "sts_fallback_regions")
|
415
414
|
|
416
415
|
@sts_fallback_regions.setter
|
417
|
-
def sts_fallback_regions(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
416
|
+
def sts_fallback_regions(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
418
417
|
pulumi.set(self, "sts_fallback_regions", value)
|
419
418
|
|
420
|
-
@property
|
419
|
+
@_builtins.property
|
421
420
|
@pulumi.getter(name="stsRegion")
|
422
|
-
def sts_region(self) -> Optional[pulumi.Input[
|
421
|
+
def sts_region(self) -> Optional[pulumi.Input[_builtins.str]]:
|
423
422
|
"""
|
424
423
|
Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
|
425
424
|
"""
|
426
425
|
return pulumi.get(self, "sts_region")
|
427
426
|
|
428
427
|
@sts_region.setter
|
429
|
-
def sts_region(self, value: Optional[pulumi.Input[
|
428
|
+
def sts_region(self, value: Optional[pulumi.Input[_builtins.str]]):
|
430
429
|
pulumi.set(self, "sts_region", value)
|
431
430
|
|
432
|
-
@property
|
431
|
+
@_builtins.property
|
433
432
|
@pulumi.getter(name="usernameTemplate")
|
434
|
-
def username_template(self) -> Optional[pulumi.Input[
|
433
|
+
def username_template(self) -> Optional[pulumi.Input[_builtins.str]]:
|
435
434
|
"""
|
436
435
|
Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
|
437
436
|
|
@@ -447,75 +446,75 @@ class SecretBackendArgs:
|
|
447
446
|
return pulumi.get(self, "username_template")
|
448
447
|
|
449
448
|
@username_template.setter
|
450
|
-
def username_template(self, value: Optional[pulumi.Input[
|
449
|
+
def username_template(self, value: Optional[pulumi.Input[_builtins.str]]):
|
451
450
|
pulumi.set(self, "username_template", value)
|
452
451
|
|
453
452
|
|
454
453
|
@pulumi.input_type
|
455
454
|
class _SecretBackendState:
|
456
455
|
def __init__(__self__, *,
|
457
|
-
access_key: Optional[pulumi.Input[
|
458
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
459
|
-
description: Optional[pulumi.Input[
|
460
|
-
disable_automated_rotation: Optional[pulumi.Input[
|
461
|
-
disable_remount: Optional[pulumi.Input[
|
462
|
-
iam_endpoint: Optional[pulumi.Input[
|
463
|
-
identity_token_audience: Optional[pulumi.Input[
|
464
|
-
identity_token_key: Optional[pulumi.Input[
|
465
|
-
identity_token_ttl: Optional[pulumi.Input[
|
466
|
-
local: Optional[pulumi.Input[
|
467
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
468
|
-
namespace: Optional[pulumi.Input[
|
469
|
-
path: Optional[pulumi.Input[
|
470
|
-
region: Optional[pulumi.Input[
|
471
|
-
role_arn: Optional[pulumi.Input[
|
472
|
-
rotation_period: Optional[pulumi.Input[
|
473
|
-
rotation_schedule: Optional[pulumi.Input[
|
474
|
-
rotation_window: Optional[pulumi.Input[
|
475
|
-
secret_key: Optional[pulumi.Input[
|
476
|
-
sts_endpoint: Optional[pulumi.Input[
|
477
|
-
sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[
|
478
|
-
sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[
|
479
|
-
sts_region: Optional[pulumi.Input[
|
480
|
-
username_template: Optional[pulumi.Input[
|
456
|
+
access_key: Optional[pulumi.Input[_builtins.str]] = None,
|
457
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
458
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
459
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
460
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
461
|
+
iam_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
|
462
|
+
identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
|
463
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
464
|
+
identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
465
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
466
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
467
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
468
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
469
|
+
region: Optional[pulumi.Input[_builtins.str]] = None,
|
470
|
+
role_arn: Optional[pulumi.Input[_builtins.str]] = None,
|
471
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
472
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
473
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
474
|
+
secret_key: Optional[pulumi.Input[_builtins.str]] = None,
|
475
|
+
sts_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
|
476
|
+
sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
477
|
+
sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
478
|
+
sts_region: Optional[pulumi.Input[_builtins.str]] = None,
|
479
|
+
username_template: Optional[pulumi.Input[_builtins.str]] = None):
|
481
480
|
"""
|
482
481
|
Input properties used for looking up and filtering SecretBackend resources.
|
483
|
-
:param pulumi.Input[
|
482
|
+
:param pulumi.Input[_builtins.str] access_key: The AWS Access Key ID this backend should use to
|
484
483
|
issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
|
485
|
-
:param pulumi.Input[
|
484
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: The default TTL for credentials
|
486
485
|
issued by this backend.
|
487
|
-
:param pulumi.Input[
|
488
|
-
:param pulumi.Input[
|
489
|
-
:param pulumi.Input[
|
486
|
+
:param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
|
487
|
+
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
488
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
490
489
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
491
|
-
:param pulumi.Input[
|
492
|
-
:param pulumi.Input[
|
493
|
-
:param pulumi.Input[
|
494
|
-
:param pulumi.Input[
|
495
|
-
:param pulumi.Input[
|
496
|
-
:param pulumi.Input[
|
490
|
+
:param pulumi.Input[_builtins.str] iam_endpoint: Specifies a custom HTTP IAM endpoint to use.
|
491
|
+
:param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.16+.
|
492
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens. Requires Vault 1.16+.
|
493
|
+
:param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.16+.
|
494
|
+
:param pulumi.Input[_builtins.bool] local: Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
|
495
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
|
497
496
|
for credentials issued by this backend.
|
498
|
-
:param pulumi.Input[
|
497
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
499
498
|
The value should not contain leading or trailing forward slashes.
|
500
499
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
501
500
|
*Available only for Vault Enterprise*.
|
502
|
-
:param pulumi.Input[
|
501
|
+
:param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
|
503
502
|
not begin or end with a `/`. Defaults to `aws`.
|
504
|
-
:param pulumi.Input[
|
505
|
-
:param pulumi.Input[
|
506
|
-
:param pulumi.Input[
|
503
|
+
:param pulumi.Input[_builtins.str] region: The AWS region to make API calls against. Defaults to us-east-1.
|
504
|
+
:param pulumi.Input[_builtins.str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
|
505
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
507
506
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
508
|
-
:param pulumi.Input[
|
507
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
509
508
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
510
|
-
:param pulumi.Input[
|
509
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
511
510
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
512
511
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
513
|
-
:param pulumi.Input[
|
514
|
-
:param pulumi.Input[
|
515
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
516
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
517
|
-
:param pulumi.Input[
|
518
|
-
:param pulumi.Input[
|
512
|
+
:param pulumi.Input[_builtins.str] secret_key: The AWS Secret Access Key to use when generating new credentials.
|
513
|
+
:param pulumi.Input[_builtins.str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
|
514
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] sts_fallback_endpoints: Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
|
515
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] sts_fallback_regions: Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
|
516
|
+
:param pulumi.Input[_builtins.str] sts_region: Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
|
517
|
+
:param pulumi.Input[_builtins.str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
|
519
518
|
|
520
519
|
```
|
521
520
|
{{ if (eq .Type "STS") }}
|
@@ -575,9 +574,9 @@ class _SecretBackendState:
|
|
575
574
|
if username_template is not None:
|
576
575
|
pulumi.set(__self__, "username_template", username_template)
|
577
576
|
|
578
|
-
@property
|
577
|
+
@_builtins.property
|
579
578
|
@pulumi.getter(name="accessKey")
|
580
|
-
def access_key(self) -> Optional[pulumi.Input[
|
579
|
+
def access_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
581
580
|
"""
|
582
581
|
The AWS Access Key ID this backend should use to
|
583
582
|
issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
|
@@ -585,12 +584,12 @@ class _SecretBackendState:
|
|
585
584
|
return pulumi.get(self, "access_key")
|
586
585
|
|
587
586
|
@access_key.setter
|
588
|
-
def access_key(self, value: Optional[pulumi.Input[
|
587
|
+
def access_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
589
588
|
pulumi.set(self, "access_key", value)
|
590
589
|
|
591
|
-
@property
|
590
|
+
@_builtins.property
|
592
591
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
593
|
-
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
592
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
594
593
|
"""
|
595
594
|
The default TTL for credentials
|
596
595
|
issued by this backend.
|
@@ -598,36 +597,36 @@ class _SecretBackendState:
|
|
598
597
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
599
598
|
|
600
599
|
@default_lease_ttl_seconds.setter
|
601
|
-
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
600
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
602
601
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
603
602
|
|
604
|
-
@property
|
603
|
+
@_builtins.property
|
605
604
|
@pulumi.getter
|
606
|
-
def description(self) -> Optional[pulumi.Input[
|
605
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
607
606
|
"""
|
608
607
|
A human-friendly description for this backend.
|
609
608
|
"""
|
610
609
|
return pulumi.get(self, "description")
|
611
610
|
|
612
611
|
@description.setter
|
613
|
-
def description(self, value: Optional[pulumi.Input[
|
612
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
614
613
|
pulumi.set(self, "description", value)
|
615
614
|
|
616
|
-
@property
|
615
|
+
@_builtins.property
|
617
616
|
@pulumi.getter(name="disableAutomatedRotation")
|
618
|
-
def disable_automated_rotation(self) -> Optional[pulumi.Input[
|
617
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
619
618
|
"""
|
620
619
|
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
621
620
|
"""
|
622
621
|
return pulumi.get(self, "disable_automated_rotation")
|
623
622
|
|
624
623
|
@disable_automated_rotation.setter
|
625
|
-
def disable_automated_rotation(self, value: Optional[pulumi.Input[
|
624
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
626
625
|
pulumi.set(self, "disable_automated_rotation", value)
|
627
626
|
|
628
|
-
@property
|
627
|
+
@_builtins.property
|
629
628
|
@pulumi.getter(name="disableRemount")
|
630
|
-
def disable_remount(self) -> Optional[pulumi.Input[
|
629
|
+
def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
631
630
|
"""
|
632
631
|
If set, opts out of mount migration on path updates.
|
633
632
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -635,72 +634,72 @@ class _SecretBackendState:
|
|
635
634
|
return pulumi.get(self, "disable_remount")
|
636
635
|
|
637
636
|
@disable_remount.setter
|
638
|
-
def disable_remount(self, value: Optional[pulumi.Input[
|
637
|
+
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
639
638
|
pulumi.set(self, "disable_remount", value)
|
640
639
|
|
641
|
-
@property
|
640
|
+
@_builtins.property
|
642
641
|
@pulumi.getter(name="iamEndpoint")
|
643
|
-
def iam_endpoint(self) -> Optional[pulumi.Input[
|
642
|
+
def iam_endpoint(self) -> Optional[pulumi.Input[_builtins.str]]:
|
644
643
|
"""
|
645
644
|
Specifies a custom HTTP IAM endpoint to use.
|
646
645
|
"""
|
647
646
|
return pulumi.get(self, "iam_endpoint")
|
648
647
|
|
649
648
|
@iam_endpoint.setter
|
650
|
-
def iam_endpoint(self, value: Optional[pulumi.Input[
|
649
|
+
def iam_endpoint(self, value: Optional[pulumi.Input[_builtins.str]]):
|
651
650
|
pulumi.set(self, "iam_endpoint", value)
|
652
651
|
|
653
|
-
@property
|
652
|
+
@_builtins.property
|
654
653
|
@pulumi.getter(name="identityTokenAudience")
|
655
|
-
def identity_token_audience(self) -> Optional[pulumi.Input[
|
654
|
+
def identity_token_audience(self) -> Optional[pulumi.Input[_builtins.str]]:
|
656
655
|
"""
|
657
656
|
The audience claim value. Requires Vault 1.16+.
|
658
657
|
"""
|
659
658
|
return pulumi.get(self, "identity_token_audience")
|
660
659
|
|
661
660
|
@identity_token_audience.setter
|
662
|
-
def identity_token_audience(self, value: Optional[pulumi.Input[
|
661
|
+
def identity_token_audience(self, value: Optional[pulumi.Input[_builtins.str]]):
|
663
662
|
pulumi.set(self, "identity_token_audience", value)
|
664
663
|
|
665
|
-
@property
|
664
|
+
@_builtins.property
|
666
665
|
@pulumi.getter(name="identityTokenKey")
|
667
|
-
def identity_token_key(self) -> Optional[pulumi.Input[
|
666
|
+
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
668
667
|
"""
|
669
668
|
The key to use for signing identity tokens. Requires Vault 1.16+.
|
670
669
|
"""
|
671
670
|
return pulumi.get(self, "identity_token_key")
|
672
671
|
|
673
672
|
@identity_token_key.setter
|
674
|
-
def identity_token_key(self, value: Optional[pulumi.Input[
|
673
|
+
def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
675
674
|
pulumi.set(self, "identity_token_key", value)
|
676
675
|
|
677
|
-
@property
|
676
|
+
@_builtins.property
|
678
677
|
@pulumi.getter(name="identityTokenTtl")
|
679
|
-
def identity_token_ttl(self) -> Optional[pulumi.Input[
|
678
|
+
def identity_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
680
679
|
"""
|
681
680
|
The TTL of generated identity tokens in seconds. Requires Vault 1.16+.
|
682
681
|
"""
|
683
682
|
return pulumi.get(self, "identity_token_ttl")
|
684
683
|
|
685
684
|
@identity_token_ttl.setter
|
686
|
-
def identity_token_ttl(self, value: Optional[pulumi.Input[
|
685
|
+
def identity_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
687
686
|
pulumi.set(self, "identity_token_ttl", value)
|
688
687
|
|
689
|
-
@property
|
688
|
+
@_builtins.property
|
690
689
|
@pulumi.getter
|
691
|
-
def local(self) -> Optional[pulumi.Input[
|
690
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
692
691
|
"""
|
693
692
|
Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
|
694
693
|
"""
|
695
694
|
return pulumi.get(self, "local")
|
696
695
|
|
697
696
|
@local.setter
|
698
|
-
def local(self, value: Optional[pulumi.Input[
|
697
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
699
698
|
pulumi.set(self, "local", value)
|
700
699
|
|
701
|
-
@property
|
700
|
+
@_builtins.property
|
702
701
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
703
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
702
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
704
703
|
"""
|
705
704
|
The maximum TTL that can be requested
|
706
705
|
for credentials issued by this backend.
|
@@ -708,12 +707,12 @@ class _SecretBackendState:
|
|
708
707
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
709
708
|
|
710
709
|
@max_lease_ttl_seconds.setter
|
711
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
710
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
712
711
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
713
712
|
|
714
|
-
@property
|
713
|
+
@_builtins.property
|
715
714
|
@pulumi.getter
|
716
|
-
def namespace(self) -> Optional[pulumi.Input[
|
715
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
717
716
|
"""
|
718
717
|
The namespace to provision the resource in.
|
719
718
|
The value should not contain leading or trailing forward slashes.
|
@@ -723,12 +722,12 @@ class _SecretBackendState:
|
|
723
722
|
return pulumi.get(self, "namespace")
|
724
723
|
|
725
724
|
@namespace.setter
|
726
|
-
def namespace(self, value: Optional[pulumi.Input[
|
725
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
727
726
|
pulumi.set(self, "namespace", value)
|
728
727
|
|
729
|
-
@property
|
728
|
+
@_builtins.property
|
730
729
|
@pulumi.getter
|
731
|
-
def path(self) -> Optional[pulumi.Input[
|
730
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
732
731
|
"""
|
733
732
|
The unique path this backend should be mounted at. Must
|
734
733
|
not begin or end with a `/`. Defaults to `aws`.
|
@@ -736,36 +735,36 @@ class _SecretBackendState:
|
|
736
735
|
return pulumi.get(self, "path")
|
737
736
|
|
738
737
|
@path.setter
|
739
|
-
def path(self, value: Optional[pulumi.Input[
|
738
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
740
739
|
pulumi.set(self, "path", value)
|
741
740
|
|
742
|
-
@property
|
741
|
+
@_builtins.property
|
743
742
|
@pulumi.getter
|
744
|
-
def region(self) -> Optional[pulumi.Input[
|
743
|
+
def region(self) -> Optional[pulumi.Input[_builtins.str]]:
|
745
744
|
"""
|
746
745
|
The AWS region to make API calls against. Defaults to us-east-1.
|
747
746
|
"""
|
748
747
|
return pulumi.get(self, "region")
|
749
748
|
|
750
749
|
@region.setter
|
751
|
-
def region(self, value: Optional[pulumi.Input[
|
750
|
+
def region(self, value: Optional[pulumi.Input[_builtins.str]]):
|
752
751
|
pulumi.set(self, "region", value)
|
753
752
|
|
754
|
-
@property
|
753
|
+
@_builtins.property
|
755
754
|
@pulumi.getter(name="roleArn")
|
756
|
-
def role_arn(self) -> Optional[pulumi.Input[
|
755
|
+
def role_arn(self) -> Optional[pulumi.Input[_builtins.str]]:
|
757
756
|
"""
|
758
757
|
Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
|
759
758
|
"""
|
760
759
|
return pulumi.get(self, "role_arn")
|
761
760
|
|
762
761
|
@role_arn.setter
|
763
|
-
def role_arn(self, value: Optional[pulumi.Input[
|
762
|
+
def role_arn(self, value: Optional[pulumi.Input[_builtins.str]]):
|
764
763
|
pulumi.set(self, "role_arn", value)
|
765
764
|
|
766
|
-
@property
|
765
|
+
@_builtins.property
|
767
766
|
@pulumi.getter(name="rotationPeriod")
|
768
|
-
def rotation_period(self) -> Optional[pulumi.Input[
|
767
|
+
def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
769
768
|
"""
|
770
769
|
The amount of time in seconds Vault should wait before rotating the root credential.
|
771
770
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
@@ -773,12 +772,12 @@ class _SecretBackendState:
|
|
773
772
|
return pulumi.get(self, "rotation_period")
|
774
773
|
|
775
774
|
@rotation_period.setter
|
776
|
-
def rotation_period(self, value: Optional[pulumi.Input[
|
775
|
+
def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
777
776
|
pulumi.set(self, "rotation_period", value)
|
778
777
|
|
779
|
-
@property
|
778
|
+
@_builtins.property
|
780
779
|
@pulumi.getter(name="rotationSchedule")
|
781
|
-
def rotation_schedule(self) -> Optional[pulumi.Input[
|
780
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
|
782
781
|
"""
|
783
782
|
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
784
783
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
@@ -786,12 +785,12 @@ class _SecretBackendState:
|
|
786
785
|
return pulumi.get(self, "rotation_schedule")
|
787
786
|
|
788
787
|
@rotation_schedule.setter
|
789
|
-
def rotation_schedule(self, value: Optional[pulumi.Input[
|
788
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
|
790
789
|
pulumi.set(self, "rotation_schedule", value)
|
791
790
|
|
792
|
-
@property
|
791
|
+
@_builtins.property
|
793
792
|
@pulumi.getter(name="rotationWindow")
|
794
|
-
def rotation_window(self) -> Optional[pulumi.Input[
|
793
|
+
def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
|
795
794
|
"""
|
796
795
|
The maximum amount of time in seconds allowed to complete
|
797
796
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
@@ -800,72 +799,72 @@ class _SecretBackendState:
|
|
800
799
|
return pulumi.get(self, "rotation_window")
|
801
800
|
|
802
801
|
@rotation_window.setter
|
803
|
-
def rotation_window(self, value: Optional[pulumi.Input[
|
802
|
+
def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
|
804
803
|
pulumi.set(self, "rotation_window", value)
|
805
804
|
|
806
|
-
@property
|
805
|
+
@_builtins.property
|
807
806
|
@pulumi.getter(name="secretKey")
|
808
|
-
def secret_key(self) -> Optional[pulumi.Input[
|
807
|
+
def secret_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
809
808
|
"""
|
810
809
|
The AWS Secret Access Key to use when generating new credentials.
|
811
810
|
"""
|
812
811
|
return pulumi.get(self, "secret_key")
|
813
812
|
|
814
813
|
@secret_key.setter
|
815
|
-
def secret_key(self, value: Optional[pulumi.Input[
|
814
|
+
def secret_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
816
815
|
pulumi.set(self, "secret_key", value)
|
817
816
|
|
818
|
-
@property
|
817
|
+
@_builtins.property
|
819
818
|
@pulumi.getter(name="stsEndpoint")
|
820
|
-
def sts_endpoint(self) -> Optional[pulumi.Input[
|
819
|
+
def sts_endpoint(self) -> Optional[pulumi.Input[_builtins.str]]:
|
821
820
|
"""
|
822
821
|
Specifies a custom HTTP STS endpoint to use.
|
823
822
|
"""
|
824
823
|
return pulumi.get(self, "sts_endpoint")
|
825
824
|
|
826
825
|
@sts_endpoint.setter
|
827
|
-
def sts_endpoint(self, value: Optional[pulumi.Input[
|
826
|
+
def sts_endpoint(self, value: Optional[pulumi.Input[_builtins.str]]):
|
828
827
|
pulumi.set(self, "sts_endpoint", value)
|
829
828
|
|
830
|
-
@property
|
829
|
+
@_builtins.property
|
831
830
|
@pulumi.getter(name="stsFallbackEndpoints")
|
832
|
-
def sts_fallback_endpoints(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
831
|
+
def sts_fallback_endpoints(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
833
832
|
"""
|
834
833
|
Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
|
835
834
|
"""
|
836
835
|
return pulumi.get(self, "sts_fallback_endpoints")
|
837
836
|
|
838
837
|
@sts_fallback_endpoints.setter
|
839
|
-
def sts_fallback_endpoints(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
838
|
+
def sts_fallback_endpoints(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
840
839
|
pulumi.set(self, "sts_fallback_endpoints", value)
|
841
840
|
|
842
|
-
@property
|
841
|
+
@_builtins.property
|
843
842
|
@pulumi.getter(name="stsFallbackRegions")
|
844
|
-
def sts_fallback_regions(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
843
|
+
def sts_fallback_regions(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
845
844
|
"""
|
846
845
|
Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
|
847
846
|
"""
|
848
847
|
return pulumi.get(self, "sts_fallback_regions")
|
849
848
|
|
850
849
|
@sts_fallback_regions.setter
|
851
|
-
def sts_fallback_regions(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
850
|
+
def sts_fallback_regions(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
852
851
|
pulumi.set(self, "sts_fallback_regions", value)
|
853
852
|
|
854
|
-
@property
|
853
|
+
@_builtins.property
|
855
854
|
@pulumi.getter(name="stsRegion")
|
856
|
-
def sts_region(self) -> Optional[pulumi.Input[
|
855
|
+
def sts_region(self) -> Optional[pulumi.Input[_builtins.str]]:
|
857
856
|
"""
|
858
857
|
Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
|
859
858
|
"""
|
860
859
|
return pulumi.get(self, "sts_region")
|
861
860
|
|
862
861
|
@sts_region.setter
|
863
|
-
def sts_region(self, value: Optional[pulumi.Input[
|
862
|
+
def sts_region(self, value: Optional[pulumi.Input[_builtins.str]]):
|
864
863
|
pulumi.set(self, "sts_region", value)
|
865
864
|
|
866
|
-
@property
|
865
|
+
@_builtins.property
|
867
866
|
@pulumi.getter(name="usernameTemplate")
|
868
|
-
def username_template(self) -> Optional[pulumi.Input[
|
867
|
+
def username_template(self) -> Optional[pulumi.Input[_builtins.str]]:
|
869
868
|
"""
|
870
869
|
Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
|
871
870
|
|
@@ -881,7 +880,7 @@ class _SecretBackendState:
|
|
881
880
|
return pulumi.get(self, "username_template")
|
882
881
|
|
883
882
|
@username_template.setter
|
884
|
-
def username_template(self, value: Optional[pulumi.Input[
|
883
|
+
def username_template(self, value: Optional[pulumi.Input[_builtins.str]]):
|
885
884
|
pulumi.set(self, "username_template", value)
|
886
885
|
|
887
886
|
|
@@ -891,30 +890,30 @@ class SecretBackend(pulumi.CustomResource):
|
|
891
890
|
def __init__(__self__,
|
892
891
|
resource_name: str,
|
893
892
|
opts: Optional[pulumi.ResourceOptions] = None,
|
894
|
-
access_key: Optional[pulumi.Input[
|
895
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
896
|
-
description: Optional[pulumi.Input[
|
897
|
-
disable_automated_rotation: Optional[pulumi.Input[
|
898
|
-
disable_remount: Optional[pulumi.Input[
|
899
|
-
iam_endpoint: Optional[pulumi.Input[
|
900
|
-
identity_token_audience: Optional[pulumi.Input[
|
901
|
-
identity_token_key: Optional[pulumi.Input[
|
902
|
-
identity_token_ttl: Optional[pulumi.Input[
|
903
|
-
local: Optional[pulumi.Input[
|
904
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
905
|
-
namespace: Optional[pulumi.Input[
|
906
|
-
path: Optional[pulumi.Input[
|
907
|
-
region: Optional[pulumi.Input[
|
908
|
-
role_arn: Optional[pulumi.Input[
|
909
|
-
rotation_period: Optional[pulumi.Input[
|
910
|
-
rotation_schedule: Optional[pulumi.Input[
|
911
|
-
rotation_window: Optional[pulumi.Input[
|
912
|
-
secret_key: Optional[pulumi.Input[
|
913
|
-
sts_endpoint: Optional[pulumi.Input[
|
914
|
-
sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[
|
915
|
-
sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[
|
916
|
-
sts_region: Optional[pulumi.Input[
|
917
|
-
username_template: Optional[pulumi.Input[
|
893
|
+
access_key: Optional[pulumi.Input[_builtins.str]] = None,
|
894
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
895
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
896
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
897
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
898
|
+
iam_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
|
899
|
+
identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
|
900
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
901
|
+
identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
902
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
903
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
904
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
905
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
906
|
+
region: Optional[pulumi.Input[_builtins.str]] = None,
|
907
|
+
role_arn: Optional[pulumi.Input[_builtins.str]] = None,
|
908
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
909
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
910
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
911
|
+
secret_key: Optional[pulumi.Input[_builtins.str]] = None,
|
912
|
+
sts_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
|
913
|
+
sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
914
|
+
sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
915
|
+
sts_region: Optional[pulumi.Input[_builtins.str]] = None,
|
916
|
+
username_template: Optional[pulumi.Input[_builtins.str]] = None,
|
918
917
|
__props__=None):
|
919
918
|
"""
|
920
919
|
## Import
|
@@ -927,42 +926,42 @@ class SecretBackend(pulumi.CustomResource):
|
|
927
926
|
|
928
927
|
:param str resource_name: The name of the resource.
|
929
928
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
930
|
-
:param pulumi.Input[
|
929
|
+
:param pulumi.Input[_builtins.str] access_key: The AWS Access Key ID this backend should use to
|
931
930
|
issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
|
932
|
-
:param pulumi.Input[
|
931
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: The default TTL for credentials
|
933
932
|
issued by this backend.
|
934
|
-
:param pulumi.Input[
|
935
|
-
:param pulumi.Input[
|
936
|
-
:param pulumi.Input[
|
933
|
+
:param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
|
934
|
+
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
935
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
937
936
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
938
|
-
:param pulumi.Input[
|
939
|
-
:param pulumi.Input[
|
940
|
-
:param pulumi.Input[
|
941
|
-
:param pulumi.Input[
|
942
|
-
:param pulumi.Input[
|
943
|
-
:param pulumi.Input[
|
937
|
+
:param pulumi.Input[_builtins.str] iam_endpoint: Specifies a custom HTTP IAM endpoint to use.
|
938
|
+
:param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.16+.
|
939
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens. Requires Vault 1.16+.
|
940
|
+
:param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.16+.
|
941
|
+
:param pulumi.Input[_builtins.bool] local: Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
|
942
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
|
944
943
|
for credentials issued by this backend.
|
945
|
-
:param pulumi.Input[
|
944
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
946
945
|
The value should not contain leading or trailing forward slashes.
|
947
946
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
948
947
|
*Available only for Vault Enterprise*.
|
949
|
-
:param pulumi.Input[
|
948
|
+
:param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
|
950
949
|
not begin or end with a `/`. Defaults to `aws`.
|
951
|
-
:param pulumi.Input[
|
952
|
-
:param pulumi.Input[
|
953
|
-
:param pulumi.Input[
|
950
|
+
:param pulumi.Input[_builtins.str] region: The AWS region to make API calls against. Defaults to us-east-1.
|
951
|
+
:param pulumi.Input[_builtins.str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
|
952
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
954
953
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
955
|
-
:param pulumi.Input[
|
954
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
956
955
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
957
|
-
:param pulumi.Input[
|
956
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
958
957
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
959
958
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
960
|
-
:param pulumi.Input[
|
961
|
-
:param pulumi.Input[
|
962
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
963
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
964
|
-
:param pulumi.Input[
|
965
|
-
:param pulumi.Input[
|
959
|
+
:param pulumi.Input[_builtins.str] secret_key: The AWS Secret Access Key to use when generating new credentials.
|
960
|
+
:param pulumi.Input[_builtins.str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
|
961
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] sts_fallback_endpoints: Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
|
962
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] sts_fallback_regions: Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
|
963
|
+
:param pulumi.Input[_builtins.str] sts_region: Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
|
964
|
+
:param pulumi.Input[_builtins.str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
|
966
965
|
|
967
966
|
```
|
968
967
|
{{ if (eq .Type "STS") }}
|
@@ -1003,30 +1002,30 @@ class SecretBackend(pulumi.CustomResource):
|
|
1003
1002
|
def _internal_init(__self__,
|
1004
1003
|
resource_name: str,
|
1005
1004
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1006
|
-
access_key: Optional[pulumi.Input[
|
1007
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
1008
|
-
description: Optional[pulumi.Input[
|
1009
|
-
disable_automated_rotation: Optional[pulumi.Input[
|
1010
|
-
disable_remount: Optional[pulumi.Input[
|
1011
|
-
iam_endpoint: Optional[pulumi.Input[
|
1012
|
-
identity_token_audience: Optional[pulumi.Input[
|
1013
|
-
identity_token_key: Optional[pulumi.Input[
|
1014
|
-
identity_token_ttl: Optional[pulumi.Input[
|
1015
|
-
local: Optional[pulumi.Input[
|
1016
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
1017
|
-
namespace: Optional[pulumi.Input[
|
1018
|
-
path: Optional[pulumi.Input[
|
1019
|
-
region: Optional[pulumi.Input[
|
1020
|
-
role_arn: Optional[pulumi.Input[
|
1021
|
-
rotation_period: Optional[pulumi.Input[
|
1022
|
-
rotation_schedule: Optional[pulumi.Input[
|
1023
|
-
rotation_window: Optional[pulumi.Input[
|
1024
|
-
secret_key: Optional[pulumi.Input[
|
1025
|
-
sts_endpoint: Optional[pulumi.Input[
|
1026
|
-
sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1027
|
-
sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1028
|
-
sts_region: Optional[pulumi.Input[
|
1029
|
-
username_template: Optional[pulumi.Input[
|
1005
|
+
access_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1006
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1007
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
1008
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
1009
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
1010
|
+
iam_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
|
1011
|
+
identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
|
1012
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1013
|
+
identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
1014
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
1015
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1016
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1017
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
1018
|
+
region: Optional[pulumi.Input[_builtins.str]] = None,
|
1019
|
+
role_arn: Optional[pulumi.Input[_builtins.str]] = None,
|
1020
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
1021
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
1022
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
1023
|
+
secret_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1024
|
+
sts_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
|
1025
|
+
sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1026
|
+
sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1027
|
+
sts_region: Optional[pulumi.Input[_builtins.str]] = None,
|
1028
|
+
username_template: Optional[pulumi.Input[_builtins.str]] = None,
|
1030
1029
|
__props__=None):
|
1031
1030
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
1032
1031
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -1072,30 +1071,30 @@ class SecretBackend(pulumi.CustomResource):
|
|
1072
1071
|
def get(resource_name: str,
|
1073
1072
|
id: pulumi.Input[str],
|
1074
1073
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1075
|
-
access_key: Optional[pulumi.Input[
|
1076
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
1077
|
-
description: Optional[pulumi.Input[
|
1078
|
-
disable_automated_rotation: Optional[pulumi.Input[
|
1079
|
-
disable_remount: Optional[pulumi.Input[
|
1080
|
-
iam_endpoint: Optional[pulumi.Input[
|
1081
|
-
identity_token_audience: Optional[pulumi.Input[
|
1082
|
-
identity_token_key: Optional[pulumi.Input[
|
1083
|
-
identity_token_ttl: Optional[pulumi.Input[
|
1084
|
-
local: Optional[pulumi.Input[
|
1085
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
1086
|
-
namespace: Optional[pulumi.Input[
|
1087
|
-
path: Optional[pulumi.Input[
|
1088
|
-
region: Optional[pulumi.Input[
|
1089
|
-
role_arn: Optional[pulumi.Input[
|
1090
|
-
rotation_period: Optional[pulumi.Input[
|
1091
|
-
rotation_schedule: Optional[pulumi.Input[
|
1092
|
-
rotation_window: Optional[pulumi.Input[
|
1093
|
-
secret_key: Optional[pulumi.Input[
|
1094
|
-
sts_endpoint: Optional[pulumi.Input[
|
1095
|
-
sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1096
|
-
sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1097
|
-
sts_region: Optional[pulumi.Input[
|
1098
|
-
username_template: Optional[pulumi.Input[
|
1074
|
+
access_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1075
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1076
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
1077
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
1078
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
1079
|
+
iam_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
|
1080
|
+
identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
|
1081
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1082
|
+
identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
1083
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
1084
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1085
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1086
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
1087
|
+
region: Optional[pulumi.Input[_builtins.str]] = None,
|
1088
|
+
role_arn: Optional[pulumi.Input[_builtins.str]] = None,
|
1089
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
1090
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
1091
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
1092
|
+
secret_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1093
|
+
sts_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
|
1094
|
+
sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1095
|
+
sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1096
|
+
sts_region: Optional[pulumi.Input[_builtins.str]] = None,
|
1097
|
+
username_template: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackend':
|
1099
1098
|
"""
|
1100
1099
|
Get an existing SecretBackend resource's state with the given name, id, and optional extra
|
1101
1100
|
properties used to qualify the lookup.
|
@@ -1103,42 +1102,42 @@ class SecretBackend(pulumi.CustomResource):
|
|
1103
1102
|
:param str resource_name: The unique name of the resulting resource.
|
1104
1103
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
1105
1104
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
1106
|
-
:param pulumi.Input[
|
1105
|
+
:param pulumi.Input[_builtins.str] access_key: The AWS Access Key ID this backend should use to
|
1107
1106
|
issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
|
1108
|
-
:param pulumi.Input[
|
1107
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: The default TTL for credentials
|
1109
1108
|
issued by this backend.
|
1110
|
-
:param pulumi.Input[
|
1111
|
-
:param pulumi.Input[
|
1112
|
-
:param pulumi.Input[
|
1109
|
+
:param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
|
1110
|
+
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
1111
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
1113
1112
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
1114
|
-
:param pulumi.Input[
|
1115
|
-
:param pulumi.Input[
|
1116
|
-
:param pulumi.Input[
|
1117
|
-
:param pulumi.Input[
|
1118
|
-
:param pulumi.Input[
|
1119
|
-
:param pulumi.Input[
|
1113
|
+
:param pulumi.Input[_builtins.str] iam_endpoint: Specifies a custom HTTP IAM endpoint to use.
|
1114
|
+
:param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.16+.
|
1115
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens. Requires Vault 1.16+.
|
1116
|
+
:param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.16+.
|
1117
|
+
:param pulumi.Input[_builtins.bool] local: Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
|
1118
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
|
1120
1119
|
for credentials issued by this backend.
|
1121
|
-
:param pulumi.Input[
|
1120
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
1122
1121
|
The value should not contain leading or trailing forward slashes.
|
1123
1122
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1124
1123
|
*Available only for Vault Enterprise*.
|
1125
|
-
:param pulumi.Input[
|
1124
|
+
:param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
|
1126
1125
|
not begin or end with a `/`. Defaults to `aws`.
|
1127
|
-
:param pulumi.Input[
|
1128
|
-
:param pulumi.Input[
|
1129
|
-
:param pulumi.Input[
|
1126
|
+
:param pulumi.Input[_builtins.str] region: The AWS region to make API calls against. Defaults to us-east-1.
|
1127
|
+
:param pulumi.Input[_builtins.str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
|
1128
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
1130
1129
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
1131
|
-
:param pulumi.Input[
|
1130
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
1132
1131
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
1133
|
-
:param pulumi.Input[
|
1132
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
1134
1133
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
1135
1134
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
1136
|
-
:param pulumi.Input[
|
1137
|
-
:param pulumi.Input[
|
1138
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1139
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1140
|
-
:param pulumi.Input[
|
1141
|
-
:param pulumi.Input[
|
1135
|
+
:param pulumi.Input[_builtins.str] secret_key: The AWS Secret Access Key to use when generating new credentials.
|
1136
|
+
:param pulumi.Input[_builtins.str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
|
1137
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] sts_fallback_endpoints: Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
|
1138
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] sts_fallback_regions: Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
|
1139
|
+
:param pulumi.Input[_builtins.str] sts_region: Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
|
1140
|
+
:param pulumi.Input[_builtins.str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
|
1142
1141
|
|
1143
1142
|
```
|
1144
1143
|
{{ if (eq .Type "STS") }}
|
@@ -1179,101 +1178,101 @@ class SecretBackend(pulumi.CustomResource):
|
|
1179
1178
|
__props__.__dict__["username_template"] = username_template
|
1180
1179
|
return SecretBackend(resource_name, opts=opts, __props__=__props__)
|
1181
1180
|
|
1182
|
-
@property
|
1181
|
+
@_builtins.property
|
1183
1182
|
@pulumi.getter(name="accessKey")
|
1184
|
-
def access_key(self) -> pulumi.Output[Optional[
|
1183
|
+
def access_key(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1185
1184
|
"""
|
1186
1185
|
The AWS Access Key ID this backend should use to
|
1187
1186
|
issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
|
1188
1187
|
"""
|
1189
1188
|
return pulumi.get(self, "access_key")
|
1190
1189
|
|
1191
|
-
@property
|
1190
|
+
@_builtins.property
|
1192
1191
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
1193
|
-
def default_lease_ttl_seconds(self) -> pulumi.Output[
|
1192
|
+
def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
|
1194
1193
|
"""
|
1195
1194
|
The default TTL for credentials
|
1196
1195
|
issued by this backend.
|
1197
1196
|
"""
|
1198
1197
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
1199
1198
|
|
1200
|
-
@property
|
1199
|
+
@_builtins.property
|
1201
1200
|
@pulumi.getter
|
1202
|
-
def description(self) -> pulumi.Output[Optional[
|
1201
|
+
def description(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1203
1202
|
"""
|
1204
1203
|
A human-friendly description for this backend.
|
1205
1204
|
"""
|
1206
1205
|
return pulumi.get(self, "description")
|
1207
1206
|
|
1208
|
-
@property
|
1207
|
+
@_builtins.property
|
1209
1208
|
@pulumi.getter(name="disableAutomatedRotation")
|
1210
|
-
def disable_automated_rotation(self) -> pulumi.Output[Optional[
|
1209
|
+
def disable_automated_rotation(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1211
1210
|
"""
|
1212
1211
|
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
1213
1212
|
"""
|
1214
1213
|
return pulumi.get(self, "disable_automated_rotation")
|
1215
1214
|
|
1216
|
-
@property
|
1215
|
+
@_builtins.property
|
1217
1216
|
@pulumi.getter(name="disableRemount")
|
1218
|
-
def disable_remount(self) -> pulumi.Output[Optional[
|
1217
|
+
def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1219
1218
|
"""
|
1220
1219
|
If set, opts out of mount migration on path updates.
|
1221
1220
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
1222
1221
|
"""
|
1223
1222
|
return pulumi.get(self, "disable_remount")
|
1224
1223
|
|
1225
|
-
@property
|
1224
|
+
@_builtins.property
|
1226
1225
|
@pulumi.getter(name="iamEndpoint")
|
1227
|
-
def iam_endpoint(self) -> pulumi.Output[Optional[
|
1226
|
+
def iam_endpoint(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1228
1227
|
"""
|
1229
1228
|
Specifies a custom HTTP IAM endpoint to use.
|
1230
1229
|
"""
|
1231
1230
|
return pulumi.get(self, "iam_endpoint")
|
1232
1231
|
|
1233
|
-
@property
|
1232
|
+
@_builtins.property
|
1234
1233
|
@pulumi.getter(name="identityTokenAudience")
|
1235
|
-
def identity_token_audience(self) -> pulumi.Output[Optional[
|
1234
|
+
def identity_token_audience(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1236
1235
|
"""
|
1237
1236
|
The audience claim value. Requires Vault 1.16+.
|
1238
1237
|
"""
|
1239
1238
|
return pulumi.get(self, "identity_token_audience")
|
1240
1239
|
|
1241
|
-
@property
|
1240
|
+
@_builtins.property
|
1242
1241
|
@pulumi.getter(name="identityTokenKey")
|
1243
|
-
def identity_token_key(self) -> pulumi.Output[Optional[
|
1242
|
+
def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1244
1243
|
"""
|
1245
1244
|
The key to use for signing identity tokens. Requires Vault 1.16+.
|
1246
1245
|
"""
|
1247
1246
|
return pulumi.get(self, "identity_token_key")
|
1248
1247
|
|
1249
|
-
@property
|
1248
|
+
@_builtins.property
|
1250
1249
|
@pulumi.getter(name="identityTokenTtl")
|
1251
|
-
def identity_token_ttl(self) -> pulumi.Output[
|
1250
|
+
def identity_token_ttl(self) -> pulumi.Output[_builtins.int]:
|
1252
1251
|
"""
|
1253
1252
|
The TTL of generated identity tokens in seconds. Requires Vault 1.16+.
|
1254
1253
|
"""
|
1255
1254
|
return pulumi.get(self, "identity_token_ttl")
|
1256
1255
|
|
1257
|
-
@property
|
1256
|
+
@_builtins.property
|
1258
1257
|
@pulumi.getter
|
1259
|
-
def local(self) -> pulumi.Output[Optional[
|
1258
|
+
def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1260
1259
|
"""
|
1261
1260
|
Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
|
1262
1261
|
"""
|
1263
1262
|
return pulumi.get(self, "local")
|
1264
1263
|
|
1265
|
-
@property
|
1264
|
+
@_builtins.property
|
1266
1265
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
1267
|
-
def max_lease_ttl_seconds(self) -> pulumi.Output[
|
1266
|
+
def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
|
1268
1267
|
"""
|
1269
1268
|
The maximum TTL that can be requested
|
1270
1269
|
for credentials issued by this backend.
|
1271
1270
|
"""
|
1272
1271
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
1273
1272
|
|
1274
|
-
@property
|
1273
|
+
@_builtins.property
|
1275
1274
|
@pulumi.getter
|
1276
|
-
def namespace(self) -> pulumi.Output[Optional[
|
1275
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1277
1276
|
"""
|
1278
1277
|
The namespace to provision the resource in.
|
1279
1278
|
The value should not contain leading or trailing forward slashes.
|
@@ -1282,52 +1281,52 @@ class SecretBackend(pulumi.CustomResource):
|
|
1282
1281
|
"""
|
1283
1282
|
return pulumi.get(self, "namespace")
|
1284
1283
|
|
1285
|
-
@property
|
1284
|
+
@_builtins.property
|
1286
1285
|
@pulumi.getter
|
1287
|
-
def path(self) -> pulumi.Output[Optional[
|
1286
|
+
def path(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1288
1287
|
"""
|
1289
1288
|
The unique path this backend should be mounted at. Must
|
1290
1289
|
not begin or end with a `/`. Defaults to `aws`.
|
1291
1290
|
"""
|
1292
1291
|
return pulumi.get(self, "path")
|
1293
1292
|
|
1294
|
-
@property
|
1293
|
+
@_builtins.property
|
1295
1294
|
@pulumi.getter
|
1296
|
-
def region(self) -> pulumi.Output[
|
1295
|
+
def region(self) -> pulumi.Output[_builtins.str]:
|
1297
1296
|
"""
|
1298
1297
|
The AWS region to make API calls against. Defaults to us-east-1.
|
1299
1298
|
"""
|
1300
1299
|
return pulumi.get(self, "region")
|
1301
1300
|
|
1302
|
-
@property
|
1301
|
+
@_builtins.property
|
1303
1302
|
@pulumi.getter(name="roleArn")
|
1304
|
-
def role_arn(self) -> pulumi.Output[Optional[
|
1303
|
+
def role_arn(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1305
1304
|
"""
|
1306
1305
|
Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
|
1307
1306
|
"""
|
1308
1307
|
return pulumi.get(self, "role_arn")
|
1309
1308
|
|
1310
|
-
@property
|
1309
|
+
@_builtins.property
|
1311
1310
|
@pulumi.getter(name="rotationPeriod")
|
1312
|
-
def rotation_period(self) -> pulumi.Output[Optional[
|
1311
|
+
def rotation_period(self) -> pulumi.Output[Optional[_builtins.int]]:
|
1313
1312
|
"""
|
1314
1313
|
The amount of time in seconds Vault should wait before rotating the root credential.
|
1315
1314
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
1316
1315
|
"""
|
1317
1316
|
return pulumi.get(self, "rotation_period")
|
1318
1317
|
|
1319
|
-
@property
|
1318
|
+
@_builtins.property
|
1320
1319
|
@pulumi.getter(name="rotationSchedule")
|
1321
|
-
def rotation_schedule(self) -> pulumi.Output[Optional[
|
1320
|
+
def rotation_schedule(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1322
1321
|
"""
|
1323
1322
|
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
1324
1323
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
1325
1324
|
"""
|
1326
1325
|
return pulumi.get(self, "rotation_schedule")
|
1327
1326
|
|
1328
|
-
@property
|
1327
|
+
@_builtins.property
|
1329
1328
|
@pulumi.getter(name="rotationWindow")
|
1330
|
-
def rotation_window(self) -> pulumi.Output[Optional[
|
1329
|
+
def rotation_window(self) -> pulumi.Output[Optional[_builtins.int]]:
|
1331
1330
|
"""
|
1332
1331
|
The maximum amount of time in seconds allowed to complete
|
1333
1332
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
@@ -1335,49 +1334,49 @@ class SecretBackend(pulumi.CustomResource):
|
|
1335
1334
|
"""
|
1336
1335
|
return pulumi.get(self, "rotation_window")
|
1337
1336
|
|
1338
|
-
@property
|
1337
|
+
@_builtins.property
|
1339
1338
|
@pulumi.getter(name="secretKey")
|
1340
|
-
def secret_key(self) -> pulumi.Output[Optional[
|
1339
|
+
def secret_key(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1341
1340
|
"""
|
1342
1341
|
The AWS Secret Access Key to use when generating new credentials.
|
1343
1342
|
"""
|
1344
1343
|
return pulumi.get(self, "secret_key")
|
1345
1344
|
|
1346
|
-
@property
|
1345
|
+
@_builtins.property
|
1347
1346
|
@pulumi.getter(name="stsEndpoint")
|
1348
|
-
def sts_endpoint(self) -> pulumi.Output[Optional[
|
1347
|
+
def sts_endpoint(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1349
1348
|
"""
|
1350
1349
|
Specifies a custom HTTP STS endpoint to use.
|
1351
1350
|
"""
|
1352
1351
|
return pulumi.get(self, "sts_endpoint")
|
1353
1352
|
|
1354
|
-
@property
|
1353
|
+
@_builtins.property
|
1355
1354
|
@pulumi.getter(name="stsFallbackEndpoints")
|
1356
|
-
def sts_fallback_endpoints(self) -> pulumi.Output[Optional[Sequence[
|
1355
|
+
def sts_fallback_endpoints(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1357
1356
|
"""
|
1358
1357
|
Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
|
1359
1358
|
"""
|
1360
1359
|
return pulumi.get(self, "sts_fallback_endpoints")
|
1361
1360
|
|
1362
|
-
@property
|
1361
|
+
@_builtins.property
|
1363
1362
|
@pulumi.getter(name="stsFallbackRegions")
|
1364
|
-
def sts_fallback_regions(self) -> pulumi.Output[Optional[Sequence[
|
1363
|
+
def sts_fallback_regions(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1365
1364
|
"""
|
1366
1365
|
Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
|
1367
1366
|
"""
|
1368
1367
|
return pulumi.get(self, "sts_fallback_regions")
|
1369
1368
|
|
1370
|
-
@property
|
1369
|
+
@_builtins.property
|
1371
1370
|
@pulumi.getter(name="stsRegion")
|
1372
|
-
def sts_region(self) -> pulumi.Output[Optional[
|
1371
|
+
def sts_region(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1373
1372
|
"""
|
1374
1373
|
Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
|
1375
1374
|
"""
|
1376
1375
|
return pulumi.get(self, "sts_region")
|
1377
1376
|
|
1378
|
-
@property
|
1377
|
+
@_builtins.property
|
1379
1378
|
@pulumi.getter(name="usernameTemplate")
|
1380
|
-
def username_template(self) -> pulumi.Output[
|
1379
|
+
def username_template(self) -> pulumi.Output[_builtins.str]:
|
1381
1380
|
"""
|
1382
1381
|
Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
|
1383
1382
|
|