pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,44 +19,44 @@ __all__ = ['SecretBackendArgs', 'SecretBackend']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class SecretBackendArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
address: pulumi.Input[
|
24
|
-
bootstrap: Optional[pulumi.Input[
|
25
|
-
ca_cert: Optional[pulumi.Input[
|
26
|
-
client_cert: Optional[pulumi.Input[
|
27
|
-
client_key: Optional[pulumi.Input[
|
28
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
29
|
-
description: Optional[pulumi.Input[
|
30
|
-
disable_remount: Optional[pulumi.Input[
|
31
|
-
local: Optional[pulumi.Input[
|
32
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
33
|
-
namespace: Optional[pulumi.Input[
|
34
|
-
path: Optional[pulumi.Input[
|
35
|
-
scheme: Optional[pulumi.Input[
|
36
|
-
token: Optional[pulumi.Input[
|
22
|
+
address: pulumi.Input[_builtins.str],
|
23
|
+
bootstrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
24
|
+
ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
25
|
+
client_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
26
|
+
client_key: Optional[pulumi.Input[_builtins.str]] = None,
|
27
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
28
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
29
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
30
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
31
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
32
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
33
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
34
|
+
scheme: Optional[pulumi.Input[_builtins.str]] = None,
|
35
|
+
token: Optional[pulumi.Input[_builtins.str]] = None):
|
37
36
|
"""
|
38
37
|
The set of arguments for constructing a SecretBackend resource.
|
39
|
-
:param pulumi.Input[
|
40
|
-
:param pulumi.Input[
|
41
|
-
:param pulumi.Input[
|
42
|
-
:param pulumi.Input[
|
38
|
+
:param pulumi.Input[_builtins.str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
|
39
|
+
:param pulumi.Input[_builtins.bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
|
40
|
+
:param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
|
41
|
+
:param pulumi.Input[_builtins.str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
|
43
42
|
this is set you need to also set client_key.
|
44
|
-
:param pulumi.Input[
|
43
|
+
:param pulumi.Input[_builtins.str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
|
45
44
|
you need to also set client_cert.
|
46
|
-
:param pulumi.Input[
|
47
|
-
:param pulumi.Input[
|
48
|
-
:param pulumi.Input[
|
45
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
|
46
|
+
:param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
|
47
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
49
48
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
50
|
-
:param pulumi.Input[
|
51
|
-
:param pulumi.Input[
|
49
|
+
:param pulumi.Input[_builtins.bool] local: Specifies if the secret backend is local only.
|
50
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
|
52
51
|
for credentials issued by this backend.
|
53
|
-
:param pulumi.Input[
|
52
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
54
53
|
The value should not contain leading or trailing forward slashes.
|
55
54
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
56
55
|
*Available only for Vault Enterprise*.
|
57
|
-
:param pulumi.Input[
|
56
|
+
:param pulumi.Input[_builtins.str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
|
58
57
|
to `consul`.
|
59
|
-
:param pulumi.Input[
|
60
|
-
:param pulumi.Input[
|
58
|
+
:param pulumi.Input[_builtins.str] scheme: Specifies the URL scheme to use. Defaults to `http`.
|
59
|
+
:param pulumi.Input[_builtins.str] token: Specifies the Consul token to use when managing or issuing new tokens.
|
61
60
|
"""
|
62
61
|
pulumi.set(__self__, "address", address)
|
63
62
|
if bootstrap is not None:
|
@@ -87,45 +86,45 @@ class SecretBackendArgs:
|
|
87
86
|
if token is not None:
|
88
87
|
pulumi.set(__self__, "token", token)
|
89
88
|
|
90
|
-
@property
|
89
|
+
@_builtins.property
|
91
90
|
@pulumi.getter
|
92
|
-
def address(self) -> pulumi.Input[
|
91
|
+
def address(self) -> pulumi.Input[_builtins.str]:
|
93
92
|
"""
|
94
93
|
Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
|
95
94
|
"""
|
96
95
|
return pulumi.get(self, "address")
|
97
96
|
|
98
97
|
@address.setter
|
99
|
-
def address(self, value: pulumi.Input[
|
98
|
+
def address(self, value: pulumi.Input[_builtins.str]):
|
100
99
|
pulumi.set(self, "address", value)
|
101
100
|
|
102
|
-
@property
|
101
|
+
@_builtins.property
|
103
102
|
@pulumi.getter
|
104
|
-
def bootstrap(self) -> Optional[pulumi.Input[
|
103
|
+
def bootstrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
105
104
|
"""
|
106
105
|
Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
|
107
106
|
"""
|
108
107
|
return pulumi.get(self, "bootstrap")
|
109
108
|
|
110
109
|
@bootstrap.setter
|
111
|
-
def bootstrap(self, value: Optional[pulumi.Input[
|
110
|
+
def bootstrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
112
111
|
pulumi.set(self, "bootstrap", value)
|
113
112
|
|
114
|
-
@property
|
113
|
+
@_builtins.property
|
115
114
|
@pulumi.getter(name="caCert")
|
116
|
-
def ca_cert(self) -> Optional[pulumi.Input[
|
115
|
+
def ca_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
|
117
116
|
"""
|
118
117
|
CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
|
119
118
|
"""
|
120
119
|
return pulumi.get(self, "ca_cert")
|
121
120
|
|
122
121
|
@ca_cert.setter
|
123
|
-
def ca_cert(self, value: Optional[pulumi.Input[
|
122
|
+
def ca_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
|
124
123
|
pulumi.set(self, "ca_cert", value)
|
125
124
|
|
126
|
-
@property
|
125
|
+
@_builtins.property
|
127
126
|
@pulumi.getter(name="clientCert")
|
128
|
-
def client_cert(self) -> Optional[pulumi.Input[
|
127
|
+
def client_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
|
129
128
|
"""
|
130
129
|
Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
|
131
130
|
this is set you need to also set client_key.
|
@@ -133,12 +132,12 @@ class SecretBackendArgs:
|
|
133
132
|
return pulumi.get(self, "client_cert")
|
134
133
|
|
135
134
|
@client_cert.setter
|
136
|
-
def client_cert(self, value: Optional[pulumi.Input[
|
135
|
+
def client_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
|
137
136
|
pulumi.set(self, "client_cert", value)
|
138
137
|
|
139
|
-
@property
|
138
|
+
@_builtins.property
|
140
139
|
@pulumi.getter(name="clientKey")
|
141
|
-
def client_key(self) -> Optional[pulumi.Input[
|
140
|
+
def client_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
142
141
|
"""
|
143
142
|
Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
|
144
143
|
you need to also set client_cert.
|
@@ -146,36 +145,36 @@ class SecretBackendArgs:
|
|
146
145
|
return pulumi.get(self, "client_key")
|
147
146
|
|
148
147
|
@client_key.setter
|
149
|
-
def client_key(self, value: Optional[pulumi.Input[
|
148
|
+
def client_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
150
149
|
pulumi.set(self, "client_key", value)
|
151
150
|
|
152
|
-
@property
|
151
|
+
@_builtins.property
|
153
152
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
154
|
-
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
153
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
155
154
|
"""
|
156
155
|
The default TTL for credentials issued by this backend.
|
157
156
|
"""
|
158
157
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
159
158
|
|
160
159
|
@default_lease_ttl_seconds.setter
|
161
|
-
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
160
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
162
161
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
163
162
|
|
164
|
-
@property
|
163
|
+
@_builtins.property
|
165
164
|
@pulumi.getter
|
166
|
-
def description(self) -> Optional[pulumi.Input[
|
165
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
167
166
|
"""
|
168
167
|
A human-friendly description for this backend.
|
169
168
|
"""
|
170
169
|
return pulumi.get(self, "description")
|
171
170
|
|
172
171
|
@description.setter
|
173
|
-
def description(self, value: Optional[pulumi.Input[
|
172
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
174
173
|
pulumi.set(self, "description", value)
|
175
174
|
|
176
|
-
@property
|
175
|
+
@_builtins.property
|
177
176
|
@pulumi.getter(name="disableRemount")
|
178
|
-
def disable_remount(self) -> Optional[pulumi.Input[
|
177
|
+
def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
179
178
|
"""
|
180
179
|
If set, opts out of mount migration on path updates.
|
181
180
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -183,24 +182,24 @@ class SecretBackendArgs:
|
|
183
182
|
return pulumi.get(self, "disable_remount")
|
184
183
|
|
185
184
|
@disable_remount.setter
|
186
|
-
def disable_remount(self, value: Optional[pulumi.Input[
|
185
|
+
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
187
186
|
pulumi.set(self, "disable_remount", value)
|
188
187
|
|
189
|
-
@property
|
188
|
+
@_builtins.property
|
190
189
|
@pulumi.getter
|
191
|
-
def local(self) -> Optional[pulumi.Input[
|
190
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
192
191
|
"""
|
193
192
|
Specifies if the secret backend is local only.
|
194
193
|
"""
|
195
194
|
return pulumi.get(self, "local")
|
196
195
|
|
197
196
|
@local.setter
|
198
|
-
def local(self, value: Optional[pulumi.Input[
|
197
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
199
198
|
pulumi.set(self, "local", value)
|
200
199
|
|
201
|
-
@property
|
200
|
+
@_builtins.property
|
202
201
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
203
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
202
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
204
203
|
"""
|
205
204
|
The maximum TTL that can be requested
|
206
205
|
for credentials issued by this backend.
|
@@ -208,12 +207,12 @@ class SecretBackendArgs:
|
|
208
207
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
209
208
|
|
210
209
|
@max_lease_ttl_seconds.setter
|
211
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
210
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
212
211
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
213
212
|
|
214
|
-
@property
|
213
|
+
@_builtins.property
|
215
214
|
@pulumi.getter
|
216
|
-
def namespace(self) -> Optional[pulumi.Input[
|
215
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
217
216
|
"""
|
218
217
|
The namespace to provision the resource in.
|
219
218
|
The value should not contain leading or trailing forward slashes.
|
@@ -223,12 +222,12 @@ class SecretBackendArgs:
|
|
223
222
|
return pulumi.get(self, "namespace")
|
224
223
|
|
225
224
|
@namespace.setter
|
226
|
-
def namespace(self, value: Optional[pulumi.Input[
|
225
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
227
226
|
pulumi.set(self, "namespace", value)
|
228
227
|
|
229
|
-
@property
|
228
|
+
@_builtins.property
|
230
229
|
@pulumi.getter
|
231
|
-
def path(self) -> Optional[pulumi.Input[
|
230
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
232
231
|
"""
|
233
232
|
The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
|
234
233
|
to `consul`.
|
@@ -236,75 +235,75 @@ class SecretBackendArgs:
|
|
236
235
|
return pulumi.get(self, "path")
|
237
236
|
|
238
237
|
@path.setter
|
239
|
-
def path(self, value: Optional[pulumi.Input[
|
238
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
240
239
|
pulumi.set(self, "path", value)
|
241
240
|
|
242
|
-
@property
|
241
|
+
@_builtins.property
|
243
242
|
@pulumi.getter
|
244
|
-
def scheme(self) -> Optional[pulumi.Input[
|
243
|
+
def scheme(self) -> Optional[pulumi.Input[_builtins.str]]:
|
245
244
|
"""
|
246
245
|
Specifies the URL scheme to use. Defaults to `http`.
|
247
246
|
"""
|
248
247
|
return pulumi.get(self, "scheme")
|
249
248
|
|
250
249
|
@scheme.setter
|
251
|
-
def scheme(self, value: Optional[pulumi.Input[
|
250
|
+
def scheme(self, value: Optional[pulumi.Input[_builtins.str]]):
|
252
251
|
pulumi.set(self, "scheme", value)
|
253
252
|
|
254
|
-
@property
|
253
|
+
@_builtins.property
|
255
254
|
@pulumi.getter
|
256
|
-
def token(self) -> Optional[pulumi.Input[
|
255
|
+
def token(self) -> Optional[pulumi.Input[_builtins.str]]:
|
257
256
|
"""
|
258
257
|
Specifies the Consul token to use when managing or issuing new tokens.
|
259
258
|
"""
|
260
259
|
return pulumi.get(self, "token")
|
261
260
|
|
262
261
|
@token.setter
|
263
|
-
def token(self, value: Optional[pulumi.Input[
|
262
|
+
def token(self, value: Optional[pulumi.Input[_builtins.str]]):
|
264
263
|
pulumi.set(self, "token", value)
|
265
264
|
|
266
265
|
|
267
266
|
@pulumi.input_type
|
268
267
|
class _SecretBackendState:
|
269
268
|
def __init__(__self__, *,
|
270
|
-
address: Optional[pulumi.Input[
|
271
|
-
bootstrap: Optional[pulumi.Input[
|
272
|
-
ca_cert: Optional[pulumi.Input[
|
273
|
-
client_cert: Optional[pulumi.Input[
|
274
|
-
client_key: Optional[pulumi.Input[
|
275
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
276
|
-
description: Optional[pulumi.Input[
|
277
|
-
disable_remount: Optional[pulumi.Input[
|
278
|
-
local: Optional[pulumi.Input[
|
279
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
280
|
-
namespace: Optional[pulumi.Input[
|
281
|
-
path: Optional[pulumi.Input[
|
282
|
-
scheme: Optional[pulumi.Input[
|
283
|
-
token: Optional[pulumi.Input[
|
269
|
+
address: Optional[pulumi.Input[_builtins.str]] = None,
|
270
|
+
bootstrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
271
|
+
ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
272
|
+
client_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
273
|
+
client_key: Optional[pulumi.Input[_builtins.str]] = None,
|
274
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
275
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
276
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
277
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
278
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
279
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
280
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
281
|
+
scheme: Optional[pulumi.Input[_builtins.str]] = None,
|
282
|
+
token: Optional[pulumi.Input[_builtins.str]] = None):
|
284
283
|
"""
|
285
284
|
Input properties used for looking up and filtering SecretBackend resources.
|
286
|
-
:param pulumi.Input[
|
287
|
-
:param pulumi.Input[
|
288
|
-
:param pulumi.Input[
|
289
|
-
:param pulumi.Input[
|
285
|
+
:param pulumi.Input[_builtins.str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
|
286
|
+
:param pulumi.Input[_builtins.bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
|
287
|
+
:param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
|
288
|
+
:param pulumi.Input[_builtins.str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
|
290
289
|
this is set you need to also set client_key.
|
291
|
-
:param pulumi.Input[
|
290
|
+
:param pulumi.Input[_builtins.str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
|
292
291
|
you need to also set client_cert.
|
293
|
-
:param pulumi.Input[
|
294
|
-
:param pulumi.Input[
|
295
|
-
:param pulumi.Input[
|
292
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
|
293
|
+
:param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
|
294
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
296
295
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
297
|
-
:param pulumi.Input[
|
298
|
-
:param pulumi.Input[
|
296
|
+
:param pulumi.Input[_builtins.bool] local: Specifies if the secret backend is local only.
|
297
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
|
299
298
|
for credentials issued by this backend.
|
300
|
-
:param pulumi.Input[
|
299
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
301
300
|
The value should not contain leading or trailing forward slashes.
|
302
301
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
303
302
|
*Available only for Vault Enterprise*.
|
304
|
-
:param pulumi.Input[
|
303
|
+
:param pulumi.Input[_builtins.str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
|
305
304
|
to `consul`.
|
306
|
-
:param pulumi.Input[
|
307
|
-
:param pulumi.Input[
|
305
|
+
:param pulumi.Input[_builtins.str] scheme: Specifies the URL scheme to use. Defaults to `http`.
|
306
|
+
:param pulumi.Input[_builtins.str] token: Specifies the Consul token to use when managing or issuing new tokens.
|
308
307
|
"""
|
309
308
|
if address is not None:
|
310
309
|
pulumi.set(__self__, "address", address)
|
@@ -335,45 +334,45 @@ class _SecretBackendState:
|
|
335
334
|
if token is not None:
|
336
335
|
pulumi.set(__self__, "token", token)
|
337
336
|
|
338
|
-
@property
|
337
|
+
@_builtins.property
|
339
338
|
@pulumi.getter
|
340
|
-
def address(self) -> Optional[pulumi.Input[
|
339
|
+
def address(self) -> Optional[pulumi.Input[_builtins.str]]:
|
341
340
|
"""
|
342
341
|
Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
|
343
342
|
"""
|
344
343
|
return pulumi.get(self, "address")
|
345
344
|
|
346
345
|
@address.setter
|
347
|
-
def address(self, value: Optional[pulumi.Input[
|
346
|
+
def address(self, value: Optional[pulumi.Input[_builtins.str]]):
|
348
347
|
pulumi.set(self, "address", value)
|
349
348
|
|
350
|
-
@property
|
349
|
+
@_builtins.property
|
351
350
|
@pulumi.getter
|
352
|
-
def bootstrap(self) -> Optional[pulumi.Input[
|
351
|
+
def bootstrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
353
352
|
"""
|
354
353
|
Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
|
355
354
|
"""
|
356
355
|
return pulumi.get(self, "bootstrap")
|
357
356
|
|
358
357
|
@bootstrap.setter
|
359
|
-
def bootstrap(self, value: Optional[pulumi.Input[
|
358
|
+
def bootstrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
360
359
|
pulumi.set(self, "bootstrap", value)
|
361
360
|
|
362
|
-
@property
|
361
|
+
@_builtins.property
|
363
362
|
@pulumi.getter(name="caCert")
|
364
|
-
def ca_cert(self) -> Optional[pulumi.Input[
|
363
|
+
def ca_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
|
365
364
|
"""
|
366
365
|
CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
|
367
366
|
"""
|
368
367
|
return pulumi.get(self, "ca_cert")
|
369
368
|
|
370
369
|
@ca_cert.setter
|
371
|
-
def ca_cert(self, value: Optional[pulumi.Input[
|
370
|
+
def ca_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
|
372
371
|
pulumi.set(self, "ca_cert", value)
|
373
372
|
|
374
|
-
@property
|
373
|
+
@_builtins.property
|
375
374
|
@pulumi.getter(name="clientCert")
|
376
|
-
def client_cert(self) -> Optional[pulumi.Input[
|
375
|
+
def client_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
|
377
376
|
"""
|
378
377
|
Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
|
379
378
|
this is set you need to also set client_key.
|
@@ -381,12 +380,12 @@ class _SecretBackendState:
|
|
381
380
|
return pulumi.get(self, "client_cert")
|
382
381
|
|
383
382
|
@client_cert.setter
|
384
|
-
def client_cert(self, value: Optional[pulumi.Input[
|
383
|
+
def client_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
|
385
384
|
pulumi.set(self, "client_cert", value)
|
386
385
|
|
387
|
-
@property
|
386
|
+
@_builtins.property
|
388
387
|
@pulumi.getter(name="clientKey")
|
389
|
-
def client_key(self) -> Optional[pulumi.Input[
|
388
|
+
def client_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
390
389
|
"""
|
391
390
|
Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
|
392
391
|
you need to also set client_cert.
|
@@ -394,36 +393,36 @@ class _SecretBackendState:
|
|
394
393
|
return pulumi.get(self, "client_key")
|
395
394
|
|
396
395
|
@client_key.setter
|
397
|
-
def client_key(self, value: Optional[pulumi.Input[
|
396
|
+
def client_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
398
397
|
pulumi.set(self, "client_key", value)
|
399
398
|
|
400
|
-
@property
|
399
|
+
@_builtins.property
|
401
400
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
402
|
-
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
401
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
403
402
|
"""
|
404
403
|
The default TTL for credentials issued by this backend.
|
405
404
|
"""
|
406
405
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
407
406
|
|
408
407
|
@default_lease_ttl_seconds.setter
|
409
|
-
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
408
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
410
409
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
411
410
|
|
412
|
-
@property
|
411
|
+
@_builtins.property
|
413
412
|
@pulumi.getter
|
414
|
-
def description(self) -> Optional[pulumi.Input[
|
413
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
415
414
|
"""
|
416
415
|
A human-friendly description for this backend.
|
417
416
|
"""
|
418
417
|
return pulumi.get(self, "description")
|
419
418
|
|
420
419
|
@description.setter
|
421
|
-
def description(self, value: Optional[pulumi.Input[
|
420
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
422
421
|
pulumi.set(self, "description", value)
|
423
422
|
|
424
|
-
@property
|
423
|
+
@_builtins.property
|
425
424
|
@pulumi.getter(name="disableRemount")
|
426
|
-
def disable_remount(self) -> Optional[pulumi.Input[
|
425
|
+
def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
427
426
|
"""
|
428
427
|
If set, opts out of mount migration on path updates.
|
429
428
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -431,24 +430,24 @@ class _SecretBackendState:
|
|
431
430
|
return pulumi.get(self, "disable_remount")
|
432
431
|
|
433
432
|
@disable_remount.setter
|
434
|
-
def disable_remount(self, value: Optional[pulumi.Input[
|
433
|
+
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
435
434
|
pulumi.set(self, "disable_remount", value)
|
436
435
|
|
437
|
-
@property
|
436
|
+
@_builtins.property
|
438
437
|
@pulumi.getter
|
439
|
-
def local(self) -> Optional[pulumi.Input[
|
438
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
440
439
|
"""
|
441
440
|
Specifies if the secret backend is local only.
|
442
441
|
"""
|
443
442
|
return pulumi.get(self, "local")
|
444
443
|
|
445
444
|
@local.setter
|
446
|
-
def local(self, value: Optional[pulumi.Input[
|
445
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
447
446
|
pulumi.set(self, "local", value)
|
448
447
|
|
449
|
-
@property
|
448
|
+
@_builtins.property
|
450
449
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
451
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
450
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
452
451
|
"""
|
453
452
|
The maximum TTL that can be requested
|
454
453
|
for credentials issued by this backend.
|
@@ -456,12 +455,12 @@ class _SecretBackendState:
|
|
456
455
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
457
456
|
|
458
457
|
@max_lease_ttl_seconds.setter
|
459
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
458
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
460
459
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
461
460
|
|
462
|
-
@property
|
461
|
+
@_builtins.property
|
463
462
|
@pulumi.getter
|
464
|
-
def namespace(self) -> Optional[pulumi.Input[
|
463
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
465
464
|
"""
|
466
465
|
The namespace to provision the resource in.
|
467
466
|
The value should not contain leading or trailing forward slashes.
|
@@ -471,12 +470,12 @@ class _SecretBackendState:
|
|
471
470
|
return pulumi.get(self, "namespace")
|
472
471
|
|
473
472
|
@namespace.setter
|
474
|
-
def namespace(self, value: Optional[pulumi.Input[
|
473
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
475
474
|
pulumi.set(self, "namespace", value)
|
476
475
|
|
477
|
-
@property
|
476
|
+
@_builtins.property
|
478
477
|
@pulumi.getter
|
479
|
-
def path(self) -> Optional[pulumi.Input[
|
478
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
480
479
|
"""
|
481
480
|
The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
|
482
481
|
to `consul`.
|
@@ -484,31 +483,31 @@ class _SecretBackendState:
|
|
484
483
|
return pulumi.get(self, "path")
|
485
484
|
|
486
485
|
@path.setter
|
487
|
-
def path(self, value: Optional[pulumi.Input[
|
486
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
488
487
|
pulumi.set(self, "path", value)
|
489
488
|
|
490
|
-
@property
|
489
|
+
@_builtins.property
|
491
490
|
@pulumi.getter
|
492
|
-
def scheme(self) -> Optional[pulumi.Input[
|
491
|
+
def scheme(self) -> Optional[pulumi.Input[_builtins.str]]:
|
493
492
|
"""
|
494
493
|
Specifies the URL scheme to use. Defaults to `http`.
|
495
494
|
"""
|
496
495
|
return pulumi.get(self, "scheme")
|
497
496
|
|
498
497
|
@scheme.setter
|
499
|
-
def scheme(self, value: Optional[pulumi.Input[
|
498
|
+
def scheme(self, value: Optional[pulumi.Input[_builtins.str]]):
|
500
499
|
pulumi.set(self, "scheme", value)
|
501
500
|
|
502
|
-
@property
|
501
|
+
@_builtins.property
|
503
502
|
@pulumi.getter
|
504
|
-
def token(self) -> Optional[pulumi.Input[
|
503
|
+
def token(self) -> Optional[pulumi.Input[_builtins.str]]:
|
505
504
|
"""
|
506
505
|
Specifies the Consul token to use when managing or issuing new tokens.
|
507
506
|
"""
|
508
507
|
return pulumi.get(self, "token")
|
509
508
|
|
510
509
|
@token.setter
|
511
|
-
def token(self, value: Optional[pulumi.Input[
|
510
|
+
def token(self, value: Optional[pulumi.Input[_builtins.str]]):
|
512
511
|
pulumi.set(self, "token", value)
|
513
512
|
|
514
513
|
|
@@ -518,20 +517,20 @@ class SecretBackend(pulumi.CustomResource):
|
|
518
517
|
def __init__(__self__,
|
519
518
|
resource_name: str,
|
520
519
|
opts: Optional[pulumi.ResourceOptions] = None,
|
521
|
-
address: Optional[pulumi.Input[
|
522
|
-
bootstrap: Optional[pulumi.Input[
|
523
|
-
ca_cert: Optional[pulumi.Input[
|
524
|
-
client_cert: Optional[pulumi.Input[
|
525
|
-
client_key: Optional[pulumi.Input[
|
526
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
527
|
-
description: Optional[pulumi.Input[
|
528
|
-
disable_remount: Optional[pulumi.Input[
|
529
|
-
local: Optional[pulumi.Input[
|
530
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
531
|
-
namespace: Optional[pulumi.Input[
|
532
|
-
path: Optional[pulumi.Input[
|
533
|
-
scheme: Optional[pulumi.Input[
|
534
|
-
token: Optional[pulumi.Input[
|
520
|
+
address: Optional[pulumi.Input[_builtins.str]] = None,
|
521
|
+
bootstrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
522
|
+
ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
523
|
+
client_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
524
|
+
client_key: Optional[pulumi.Input[_builtins.str]] = None,
|
525
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
526
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
527
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
528
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
529
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
530
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
531
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
532
|
+
scheme: Optional[pulumi.Input[_builtins.str]] = None,
|
533
|
+
token: Optional[pulumi.Input[_builtins.str]] = None,
|
535
534
|
__props__=None):
|
536
535
|
"""
|
537
536
|
## Example Usage
|
@@ -570,28 +569,28 @@ class SecretBackend(pulumi.CustomResource):
|
|
570
569
|
|
571
570
|
:param str resource_name: The name of the resource.
|
572
571
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
573
|
-
:param pulumi.Input[
|
574
|
-
:param pulumi.Input[
|
575
|
-
:param pulumi.Input[
|
576
|
-
:param pulumi.Input[
|
572
|
+
:param pulumi.Input[_builtins.str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
|
573
|
+
:param pulumi.Input[_builtins.bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
|
574
|
+
:param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
|
575
|
+
:param pulumi.Input[_builtins.str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
|
577
576
|
this is set you need to also set client_key.
|
578
|
-
:param pulumi.Input[
|
577
|
+
:param pulumi.Input[_builtins.str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
|
579
578
|
you need to also set client_cert.
|
580
|
-
:param pulumi.Input[
|
581
|
-
:param pulumi.Input[
|
582
|
-
:param pulumi.Input[
|
579
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
|
580
|
+
:param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
|
581
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
583
582
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
584
|
-
:param pulumi.Input[
|
585
|
-
:param pulumi.Input[
|
583
|
+
:param pulumi.Input[_builtins.bool] local: Specifies if the secret backend is local only.
|
584
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
|
586
585
|
for credentials issued by this backend.
|
587
|
-
:param pulumi.Input[
|
586
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
588
587
|
The value should not contain leading or trailing forward slashes.
|
589
588
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
590
589
|
*Available only for Vault Enterprise*.
|
591
|
-
:param pulumi.Input[
|
590
|
+
:param pulumi.Input[_builtins.str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
|
592
591
|
to `consul`.
|
593
|
-
:param pulumi.Input[
|
594
|
-
:param pulumi.Input[
|
592
|
+
:param pulumi.Input[_builtins.str] scheme: Specifies the URL scheme to use. Defaults to `http`.
|
593
|
+
:param pulumi.Input[_builtins.str] token: Specifies the Consul token to use when managing or issuing new tokens.
|
595
594
|
"""
|
596
595
|
...
|
597
596
|
@overload
|
@@ -649,20 +648,20 @@ class SecretBackend(pulumi.CustomResource):
|
|
649
648
|
def _internal_init(__self__,
|
650
649
|
resource_name: str,
|
651
650
|
opts: Optional[pulumi.ResourceOptions] = None,
|
652
|
-
address: Optional[pulumi.Input[
|
653
|
-
bootstrap: Optional[pulumi.Input[
|
654
|
-
ca_cert: Optional[pulumi.Input[
|
655
|
-
client_cert: Optional[pulumi.Input[
|
656
|
-
client_key: Optional[pulumi.Input[
|
657
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
658
|
-
description: Optional[pulumi.Input[
|
659
|
-
disable_remount: Optional[pulumi.Input[
|
660
|
-
local: Optional[pulumi.Input[
|
661
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
662
|
-
namespace: Optional[pulumi.Input[
|
663
|
-
path: Optional[pulumi.Input[
|
664
|
-
scheme: Optional[pulumi.Input[
|
665
|
-
token: Optional[pulumi.Input[
|
651
|
+
address: Optional[pulumi.Input[_builtins.str]] = None,
|
652
|
+
bootstrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
653
|
+
ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
654
|
+
client_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
655
|
+
client_key: Optional[pulumi.Input[_builtins.str]] = None,
|
656
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
657
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
658
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
659
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
660
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
661
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
662
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
663
|
+
scheme: Optional[pulumi.Input[_builtins.str]] = None,
|
664
|
+
token: Optional[pulumi.Input[_builtins.str]] = None,
|
666
665
|
__props__=None):
|
667
666
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
668
667
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -700,20 +699,20 @@ class SecretBackend(pulumi.CustomResource):
|
|
700
699
|
def get(resource_name: str,
|
701
700
|
id: pulumi.Input[str],
|
702
701
|
opts: Optional[pulumi.ResourceOptions] = None,
|
703
|
-
address: Optional[pulumi.Input[
|
704
|
-
bootstrap: Optional[pulumi.Input[
|
705
|
-
ca_cert: Optional[pulumi.Input[
|
706
|
-
client_cert: Optional[pulumi.Input[
|
707
|
-
client_key: Optional[pulumi.Input[
|
708
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
709
|
-
description: Optional[pulumi.Input[
|
710
|
-
disable_remount: Optional[pulumi.Input[
|
711
|
-
local: Optional[pulumi.Input[
|
712
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
713
|
-
namespace: Optional[pulumi.Input[
|
714
|
-
path: Optional[pulumi.Input[
|
715
|
-
scheme: Optional[pulumi.Input[
|
716
|
-
token: Optional[pulumi.Input[
|
702
|
+
address: Optional[pulumi.Input[_builtins.str]] = None,
|
703
|
+
bootstrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
704
|
+
ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
705
|
+
client_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
706
|
+
client_key: Optional[pulumi.Input[_builtins.str]] = None,
|
707
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
708
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
709
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
710
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
711
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
712
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
713
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
714
|
+
scheme: Optional[pulumi.Input[_builtins.str]] = None,
|
715
|
+
token: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackend':
|
717
716
|
"""
|
718
717
|
Get an existing SecretBackend resource's state with the given name, id, and optional extra
|
719
718
|
properties used to qualify the lookup.
|
@@ -721,28 +720,28 @@ class SecretBackend(pulumi.CustomResource):
|
|
721
720
|
:param str resource_name: The unique name of the resulting resource.
|
722
721
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
723
722
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
724
|
-
:param pulumi.Input[
|
725
|
-
:param pulumi.Input[
|
726
|
-
:param pulumi.Input[
|
727
|
-
:param pulumi.Input[
|
723
|
+
:param pulumi.Input[_builtins.str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
|
724
|
+
:param pulumi.Input[_builtins.bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
|
725
|
+
:param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
|
726
|
+
:param pulumi.Input[_builtins.str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
|
728
727
|
this is set you need to also set client_key.
|
729
|
-
:param pulumi.Input[
|
728
|
+
:param pulumi.Input[_builtins.str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
|
730
729
|
you need to also set client_cert.
|
731
|
-
:param pulumi.Input[
|
732
|
-
:param pulumi.Input[
|
733
|
-
:param pulumi.Input[
|
730
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
|
731
|
+
:param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
|
732
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
734
733
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
735
|
-
:param pulumi.Input[
|
736
|
-
:param pulumi.Input[
|
734
|
+
:param pulumi.Input[_builtins.bool] local: Specifies if the secret backend is local only.
|
735
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
|
737
736
|
for credentials issued by this backend.
|
738
|
-
:param pulumi.Input[
|
737
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
739
738
|
The value should not contain leading or trailing forward slashes.
|
740
739
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
741
740
|
*Available only for Vault Enterprise*.
|
742
|
-
:param pulumi.Input[
|
741
|
+
:param pulumi.Input[_builtins.str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
|
743
742
|
to `consul`.
|
744
|
-
:param pulumi.Input[
|
745
|
-
:param pulumi.Input[
|
743
|
+
:param pulumi.Input[_builtins.str] scheme: Specifies the URL scheme to use. Defaults to `http`.
|
744
|
+
:param pulumi.Input[_builtins.str] token: Specifies the Consul token to use when managing or issuing new tokens.
|
746
745
|
"""
|
747
746
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
748
747
|
|
@@ -764,93 +763,93 @@ class SecretBackend(pulumi.CustomResource):
|
|
764
763
|
__props__.__dict__["token"] = token
|
765
764
|
return SecretBackend(resource_name, opts=opts, __props__=__props__)
|
766
765
|
|
767
|
-
@property
|
766
|
+
@_builtins.property
|
768
767
|
@pulumi.getter
|
769
|
-
def address(self) -> pulumi.Output[
|
768
|
+
def address(self) -> pulumi.Output[_builtins.str]:
|
770
769
|
"""
|
771
770
|
Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
|
772
771
|
"""
|
773
772
|
return pulumi.get(self, "address")
|
774
773
|
|
775
|
-
@property
|
774
|
+
@_builtins.property
|
776
775
|
@pulumi.getter
|
777
|
-
def bootstrap(self) -> pulumi.Output[Optional[
|
776
|
+
def bootstrap(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
778
777
|
"""
|
779
778
|
Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
|
780
779
|
"""
|
781
780
|
return pulumi.get(self, "bootstrap")
|
782
781
|
|
783
|
-
@property
|
782
|
+
@_builtins.property
|
784
783
|
@pulumi.getter(name="caCert")
|
785
|
-
def ca_cert(self) -> pulumi.Output[Optional[
|
784
|
+
def ca_cert(self) -> pulumi.Output[Optional[_builtins.str]]:
|
786
785
|
"""
|
787
786
|
CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
|
788
787
|
"""
|
789
788
|
return pulumi.get(self, "ca_cert")
|
790
789
|
|
791
|
-
@property
|
790
|
+
@_builtins.property
|
792
791
|
@pulumi.getter(name="clientCert")
|
793
|
-
def client_cert(self) -> pulumi.Output[Optional[
|
792
|
+
def client_cert(self) -> pulumi.Output[Optional[_builtins.str]]:
|
794
793
|
"""
|
795
794
|
Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
|
796
795
|
this is set you need to also set client_key.
|
797
796
|
"""
|
798
797
|
return pulumi.get(self, "client_cert")
|
799
798
|
|
800
|
-
@property
|
799
|
+
@_builtins.property
|
801
800
|
@pulumi.getter(name="clientKey")
|
802
|
-
def client_key(self) -> pulumi.Output[Optional[
|
801
|
+
def client_key(self) -> pulumi.Output[Optional[_builtins.str]]:
|
803
802
|
"""
|
804
803
|
Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
|
805
804
|
you need to also set client_cert.
|
806
805
|
"""
|
807
806
|
return pulumi.get(self, "client_key")
|
808
807
|
|
809
|
-
@property
|
808
|
+
@_builtins.property
|
810
809
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
811
|
-
def default_lease_ttl_seconds(self) -> pulumi.Output[Optional[
|
810
|
+
def default_lease_ttl_seconds(self) -> pulumi.Output[Optional[_builtins.int]]:
|
812
811
|
"""
|
813
812
|
The default TTL for credentials issued by this backend.
|
814
813
|
"""
|
815
814
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
816
815
|
|
817
|
-
@property
|
816
|
+
@_builtins.property
|
818
817
|
@pulumi.getter
|
819
|
-
def description(self) -> pulumi.Output[Optional[
|
818
|
+
def description(self) -> pulumi.Output[Optional[_builtins.str]]:
|
820
819
|
"""
|
821
820
|
A human-friendly description for this backend.
|
822
821
|
"""
|
823
822
|
return pulumi.get(self, "description")
|
824
823
|
|
825
|
-
@property
|
824
|
+
@_builtins.property
|
826
825
|
@pulumi.getter(name="disableRemount")
|
827
|
-
def disable_remount(self) -> pulumi.Output[Optional[
|
826
|
+
def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
828
827
|
"""
|
829
828
|
If set, opts out of mount migration on path updates.
|
830
829
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
831
830
|
"""
|
832
831
|
return pulumi.get(self, "disable_remount")
|
833
832
|
|
834
|
-
@property
|
833
|
+
@_builtins.property
|
835
834
|
@pulumi.getter
|
836
|
-
def local(self) -> pulumi.Output[Optional[
|
835
|
+
def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
837
836
|
"""
|
838
837
|
Specifies if the secret backend is local only.
|
839
838
|
"""
|
840
839
|
return pulumi.get(self, "local")
|
841
840
|
|
842
|
-
@property
|
841
|
+
@_builtins.property
|
843
842
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
844
|
-
def max_lease_ttl_seconds(self) -> pulumi.Output[Optional[
|
843
|
+
def max_lease_ttl_seconds(self) -> pulumi.Output[Optional[_builtins.int]]:
|
845
844
|
"""
|
846
845
|
The maximum TTL that can be requested
|
847
846
|
for credentials issued by this backend.
|
848
847
|
"""
|
849
848
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
850
849
|
|
851
|
-
@property
|
850
|
+
@_builtins.property
|
852
851
|
@pulumi.getter
|
853
|
-
def namespace(self) -> pulumi.Output[Optional[
|
852
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
854
853
|
"""
|
855
854
|
The namespace to provision the resource in.
|
856
855
|
The value should not contain leading or trailing forward slashes.
|
@@ -859,26 +858,26 @@ class SecretBackend(pulumi.CustomResource):
|
|
859
858
|
"""
|
860
859
|
return pulumi.get(self, "namespace")
|
861
860
|
|
862
|
-
@property
|
861
|
+
@_builtins.property
|
863
862
|
@pulumi.getter
|
864
|
-
def path(self) -> pulumi.Output[Optional[
|
863
|
+
def path(self) -> pulumi.Output[Optional[_builtins.str]]:
|
865
864
|
"""
|
866
865
|
The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
|
867
866
|
to `consul`.
|
868
867
|
"""
|
869
868
|
return pulumi.get(self, "path")
|
870
869
|
|
871
|
-
@property
|
870
|
+
@_builtins.property
|
872
871
|
@pulumi.getter
|
873
|
-
def scheme(self) -> pulumi.Output[Optional[
|
872
|
+
def scheme(self) -> pulumi.Output[Optional[_builtins.str]]:
|
874
873
|
"""
|
875
874
|
Specifies the URL scheme to use. Defaults to `http`.
|
876
875
|
"""
|
877
876
|
return pulumi.get(self, "scheme")
|
878
877
|
|
879
|
-
@property
|
878
|
+
@_builtins.property
|
880
879
|
@pulumi.getter
|
881
|
-
def token(self) -> pulumi.Output[Optional[
|
880
|
+
def token(self) -> pulumi.Output[Optional[_builtins.str]]:
|
882
881
|
"""
|
883
882
|
Specifies the Consul token to use when managing or issuing new tokens.
|
884
883
|
"""
|