pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,58 +19,58 @@ __all__ = ['SecretBackendArgs', 'SecretBackend']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class SecretBackendArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
credentials: Optional[pulumi.Input[
|
24
|
-
credentials_wo_version: Optional[pulumi.Input[
|
25
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
26
|
-
description: Optional[pulumi.Input[
|
27
|
-
disable_automated_rotation: Optional[pulumi.Input[
|
28
|
-
disable_remount: Optional[pulumi.Input[
|
29
|
-
identity_token_audience: Optional[pulumi.Input[
|
30
|
-
identity_token_key: Optional[pulumi.Input[
|
31
|
-
identity_token_ttl: Optional[pulumi.Input[
|
32
|
-
local: Optional[pulumi.Input[
|
33
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
34
|
-
namespace: Optional[pulumi.Input[
|
35
|
-
path: Optional[pulumi.Input[
|
36
|
-
rotation_period: Optional[pulumi.Input[
|
37
|
-
rotation_schedule: Optional[pulumi.Input[
|
38
|
-
rotation_window: Optional[pulumi.Input[
|
39
|
-
service_account_email: Optional[pulumi.Input[
|
22
|
+
credentials: Optional[pulumi.Input[_builtins.str]] = None,
|
23
|
+
credentials_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
|
24
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
25
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
26
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
27
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
28
|
+
identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
|
29
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
30
|
+
identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
31
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
32
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
33
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
34
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
35
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
36
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
37
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
38
|
+
service_account_email: Optional[pulumi.Input[_builtins.str]] = None):
|
40
39
|
"""
|
41
40
|
The set of arguments for constructing a SecretBackend resource.
|
42
|
-
:param pulumi.Input[
|
43
|
-
:param pulumi.Input[
|
44
|
-
:param pulumi.Input[
|
41
|
+
:param pulumi.Input[_builtins.str] credentials: JSON-encoded credentials to use to connect to GCP
|
42
|
+
:param pulumi.Input[_builtins.int] credentials_wo_version: The version of the `credentials_wo`. For more info see updating write-only attributes.
|
43
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: The default TTL for credentials
|
45
44
|
issued by this backend. Defaults to '0'.
|
46
|
-
:param pulumi.Input[
|
47
|
-
:param pulumi.Input[
|
45
|
+
:param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
|
46
|
+
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
48
47
|
*Available only for Vault Enterprise*.
|
49
|
-
:param pulumi.Input[
|
48
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
50
49
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
51
|
-
:param pulumi.Input[
|
50
|
+
:param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value for plugin identity
|
52
51
|
tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
|
53
52
|
Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
54
|
-
:param pulumi.Input[
|
53
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin identity
|
55
54
|
tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
56
|
-
:param pulumi.Input[
|
57
|
-
:param pulumi.Input[
|
58
|
-
:param pulumi.Input[
|
55
|
+
:param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated tokens.
|
56
|
+
:param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
57
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
|
59
58
|
for credentials issued by this backend. Defaults to '0'.
|
60
|
-
:param pulumi.Input[
|
59
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
61
60
|
The value should not contain leading or trailing forward slashes.
|
62
61
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
63
62
|
*Available only for Vault Enterprise*.
|
64
|
-
:param pulumi.Input[
|
63
|
+
:param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
|
65
64
|
not begin or end with a `/`. Defaults to `gcp`.
|
66
|
-
:param pulumi.Input[
|
65
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
67
66
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
68
67
|
*Available only for Vault Enterprise*.
|
69
|
-
:param pulumi.Input[
|
68
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
70
69
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
|
71
|
-
:param pulumi.Input[
|
70
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
72
71
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
73
72
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
|
74
|
-
:param pulumi.Input[
|
73
|
+
:param pulumi.Input[_builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
|
75
74
|
Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
76
75
|
"""
|
77
76
|
if credentials is not None:
|
@@ -109,33 +108,33 @@ class SecretBackendArgs:
|
|
109
108
|
if service_account_email is not None:
|
110
109
|
pulumi.set(__self__, "service_account_email", service_account_email)
|
111
110
|
|
112
|
-
@property
|
111
|
+
@_builtins.property
|
113
112
|
@pulumi.getter
|
114
|
-
def credentials(self) -> Optional[pulumi.Input[
|
113
|
+
def credentials(self) -> Optional[pulumi.Input[_builtins.str]]:
|
115
114
|
"""
|
116
115
|
JSON-encoded credentials to use to connect to GCP
|
117
116
|
"""
|
118
117
|
return pulumi.get(self, "credentials")
|
119
118
|
|
120
119
|
@credentials.setter
|
121
|
-
def credentials(self, value: Optional[pulumi.Input[
|
120
|
+
def credentials(self, value: Optional[pulumi.Input[_builtins.str]]):
|
122
121
|
pulumi.set(self, "credentials", value)
|
123
122
|
|
124
|
-
@property
|
123
|
+
@_builtins.property
|
125
124
|
@pulumi.getter(name="credentialsWoVersion")
|
126
|
-
def credentials_wo_version(self) -> Optional[pulumi.Input[
|
125
|
+
def credentials_wo_version(self) -> Optional[pulumi.Input[_builtins.int]]:
|
127
126
|
"""
|
128
127
|
The version of the `credentials_wo`. For more info see updating write-only attributes.
|
129
128
|
"""
|
130
129
|
return pulumi.get(self, "credentials_wo_version")
|
131
130
|
|
132
131
|
@credentials_wo_version.setter
|
133
|
-
def credentials_wo_version(self, value: Optional[pulumi.Input[
|
132
|
+
def credentials_wo_version(self, value: Optional[pulumi.Input[_builtins.int]]):
|
134
133
|
pulumi.set(self, "credentials_wo_version", value)
|
135
134
|
|
136
|
-
@property
|
135
|
+
@_builtins.property
|
137
136
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
138
|
-
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
137
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
139
138
|
"""
|
140
139
|
The default TTL for credentials
|
141
140
|
issued by this backend. Defaults to '0'.
|
@@ -143,24 +142,24 @@ class SecretBackendArgs:
|
|
143
142
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
144
143
|
|
145
144
|
@default_lease_ttl_seconds.setter
|
146
|
-
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
145
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
147
146
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
148
147
|
|
149
|
-
@property
|
148
|
+
@_builtins.property
|
150
149
|
@pulumi.getter
|
151
|
-
def description(self) -> Optional[pulumi.Input[
|
150
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
152
151
|
"""
|
153
152
|
A human-friendly description for this backend.
|
154
153
|
"""
|
155
154
|
return pulumi.get(self, "description")
|
156
155
|
|
157
156
|
@description.setter
|
158
|
-
def description(self, value: Optional[pulumi.Input[
|
157
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
159
158
|
pulumi.set(self, "description", value)
|
160
159
|
|
161
|
-
@property
|
160
|
+
@_builtins.property
|
162
161
|
@pulumi.getter(name="disableAutomatedRotation")
|
163
|
-
def disable_automated_rotation(self) -> Optional[pulumi.Input[
|
162
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
164
163
|
"""
|
165
164
|
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
166
165
|
*Available only for Vault Enterprise*.
|
@@ -168,12 +167,12 @@ class SecretBackendArgs:
|
|
168
167
|
return pulumi.get(self, "disable_automated_rotation")
|
169
168
|
|
170
169
|
@disable_automated_rotation.setter
|
171
|
-
def disable_automated_rotation(self, value: Optional[pulumi.Input[
|
170
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
172
171
|
pulumi.set(self, "disable_automated_rotation", value)
|
173
172
|
|
174
|
-
@property
|
173
|
+
@_builtins.property
|
175
174
|
@pulumi.getter(name="disableRemount")
|
176
|
-
def disable_remount(self) -> Optional[pulumi.Input[
|
175
|
+
def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
177
176
|
"""
|
178
177
|
If set, opts out of mount migration on path updates.
|
179
178
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -181,12 +180,12 @@ class SecretBackendArgs:
|
|
181
180
|
return pulumi.get(self, "disable_remount")
|
182
181
|
|
183
182
|
@disable_remount.setter
|
184
|
-
def disable_remount(self, value: Optional[pulumi.Input[
|
183
|
+
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
185
184
|
pulumi.set(self, "disable_remount", value)
|
186
185
|
|
187
|
-
@property
|
186
|
+
@_builtins.property
|
188
187
|
@pulumi.getter(name="identityTokenAudience")
|
189
|
-
def identity_token_audience(self) -> Optional[pulumi.Input[
|
188
|
+
def identity_token_audience(self) -> Optional[pulumi.Input[_builtins.str]]:
|
190
189
|
"""
|
191
190
|
The audience claim value for plugin identity
|
192
191
|
tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
|
@@ -195,12 +194,12 @@ class SecretBackendArgs:
|
|
195
194
|
return pulumi.get(self, "identity_token_audience")
|
196
195
|
|
197
196
|
@identity_token_audience.setter
|
198
|
-
def identity_token_audience(self, value: Optional[pulumi.Input[
|
197
|
+
def identity_token_audience(self, value: Optional[pulumi.Input[_builtins.str]]):
|
199
198
|
pulumi.set(self, "identity_token_audience", value)
|
200
199
|
|
201
|
-
@property
|
200
|
+
@_builtins.property
|
202
201
|
@pulumi.getter(name="identityTokenKey")
|
203
|
-
def identity_token_key(self) -> Optional[pulumi.Input[
|
202
|
+
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
204
203
|
"""
|
205
204
|
The key to use for signing plugin identity
|
206
205
|
tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
@@ -208,36 +207,36 @@ class SecretBackendArgs:
|
|
208
207
|
return pulumi.get(self, "identity_token_key")
|
209
208
|
|
210
209
|
@identity_token_key.setter
|
211
|
-
def identity_token_key(self, value: Optional[pulumi.Input[
|
210
|
+
def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
212
211
|
pulumi.set(self, "identity_token_key", value)
|
213
212
|
|
214
|
-
@property
|
213
|
+
@_builtins.property
|
215
214
|
@pulumi.getter(name="identityTokenTtl")
|
216
|
-
def identity_token_ttl(self) -> Optional[pulumi.Input[
|
215
|
+
def identity_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
217
216
|
"""
|
218
217
|
The TTL of generated tokens.
|
219
218
|
"""
|
220
219
|
return pulumi.get(self, "identity_token_ttl")
|
221
220
|
|
222
221
|
@identity_token_ttl.setter
|
223
|
-
def identity_token_ttl(self, value: Optional[pulumi.Input[
|
222
|
+
def identity_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
224
223
|
pulumi.set(self, "identity_token_ttl", value)
|
225
224
|
|
226
|
-
@property
|
225
|
+
@_builtins.property
|
227
226
|
@pulumi.getter
|
228
|
-
def local(self) -> Optional[pulumi.Input[
|
227
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
229
228
|
"""
|
230
229
|
Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
231
230
|
"""
|
232
231
|
return pulumi.get(self, "local")
|
233
232
|
|
234
233
|
@local.setter
|
235
|
-
def local(self, value: Optional[pulumi.Input[
|
234
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
236
235
|
pulumi.set(self, "local", value)
|
237
236
|
|
238
|
-
@property
|
237
|
+
@_builtins.property
|
239
238
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
240
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
239
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
241
240
|
"""
|
242
241
|
The maximum TTL that can be requested
|
243
242
|
for credentials issued by this backend. Defaults to '0'.
|
@@ -245,12 +244,12 @@ class SecretBackendArgs:
|
|
245
244
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
246
245
|
|
247
246
|
@max_lease_ttl_seconds.setter
|
248
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
247
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
249
248
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
250
249
|
|
251
|
-
@property
|
250
|
+
@_builtins.property
|
252
251
|
@pulumi.getter
|
253
|
-
def namespace(self) -> Optional[pulumi.Input[
|
252
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
254
253
|
"""
|
255
254
|
The namespace to provision the resource in.
|
256
255
|
The value should not contain leading or trailing forward slashes.
|
@@ -260,12 +259,12 @@ class SecretBackendArgs:
|
|
260
259
|
return pulumi.get(self, "namespace")
|
261
260
|
|
262
261
|
@namespace.setter
|
263
|
-
def namespace(self, value: Optional[pulumi.Input[
|
262
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
264
263
|
pulumi.set(self, "namespace", value)
|
265
264
|
|
266
|
-
@property
|
265
|
+
@_builtins.property
|
267
266
|
@pulumi.getter
|
268
|
-
def path(self) -> Optional[pulumi.Input[
|
267
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
269
268
|
"""
|
270
269
|
The unique path this backend should be mounted at. Must
|
271
270
|
not begin or end with a `/`. Defaults to `gcp`.
|
@@ -273,12 +272,12 @@ class SecretBackendArgs:
|
|
273
272
|
return pulumi.get(self, "path")
|
274
273
|
|
275
274
|
@path.setter
|
276
|
-
def path(self, value: Optional[pulumi.Input[
|
275
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
277
276
|
pulumi.set(self, "path", value)
|
278
277
|
|
279
|
-
@property
|
278
|
+
@_builtins.property
|
280
279
|
@pulumi.getter(name="rotationPeriod")
|
281
|
-
def rotation_period(self) -> Optional[pulumi.Input[
|
280
|
+
def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
282
281
|
"""
|
283
282
|
The amount of time in seconds Vault should wait before rotating the root credential.
|
284
283
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
@@ -287,12 +286,12 @@ class SecretBackendArgs:
|
|
287
286
|
return pulumi.get(self, "rotation_period")
|
288
287
|
|
289
288
|
@rotation_period.setter
|
290
|
-
def rotation_period(self, value: Optional[pulumi.Input[
|
289
|
+
def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
291
290
|
pulumi.set(self, "rotation_period", value)
|
292
291
|
|
293
|
-
@property
|
292
|
+
@_builtins.property
|
294
293
|
@pulumi.getter(name="rotationSchedule")
|
295
|
-
def rotation_schedule(self) -> Optional[pulumi.Input[
|
294
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
|
296
295
|
"""
|
297
296
|
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
298
297
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
|
@@ -300,12 +299,12 @@ class SecretBackendArgs:
|
|
300
299
|
return pulumi.get(self, "rotation_schedule")
|
301
300
|
|
302
301
|
@rotation_schedule.setter
|
303
|
-
def rotation_schedule(self, value: Optional[pulumi.Input[
|
302
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
|
304
303
|
pulumi.set(self, "rotation_schedule", value)
|
305
304
|
|
306
|
-
@property
|
305
|
+
@_builtins.property
|
307
306
|
@pulumi.getter(name="rotationWindow")
|
308
|
-
def rotation_window(self) -> Optional[pulumi.Input[
|
307
|
+
def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
|
309
308
|
"""
|
310
309
|
The maximum amount of time in seconds allowed to complete
|
311
310
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
@@ -314,12 +313,12 @@ class SecretBackendArgs:
|
|
314
313
|
return pulumi.get(self, "rotation_window")
|
315
314
|
|
316
315
|
@rotation_window.setter
|
317
|
-
def rotation_window(self, value: Optional[pulumi.Input[
|
316
|
+
def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
|
318
317
|
pulumi.set(self, "rotation_window", value)
|
319
318
|
|
320
|
-
@property
|
319
|
+
@_builtins.property
|
321
320
|
@pulumi.getter(name="serviceAccountEmail")
|
322
|
-
def service_account_email(self) -> Optional[pulumi.Input[
|
321
|
+
def service_account_email(self) -> Optional[pulumi.Input[_builtins.str]]:
|
323
322
|
"""
|
324
323
|
Service Account to impersonate for plugin workload identity federation.
|
325
324
|
Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
@@ -327,67 +326,67 @@ class SecretBackendArgs:
|
|
327
326
|
return pulumi.get(self, "service_account_email")
|
328
327
|
|
329
328
|
@service_account_email.setter
|
330
|
-
def service_account_email(self, value: Optional[pulumi.Input[
|
329
|
+
def service_account_email(self, value: Optional[pulumi.Input[_builtins.str]]):
|
331
330
|
pulumi.set(self, "service_account_email", value)
|
332
331
|
|
333
332
|
|
334
333
|
@pulumi.input_type
|
335
334
|
class _SecretBackendState:
|
336
335
|
def __init__(__self__, *,
|
337
|
-
accessor: Optional[pulumi.Input[
|
338
|
-
credentials: Optional[pulumi.Input[
|
339
|
-
credentials_wo_version: Optional[pulumi.Input[
|
340
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
341
|
-
description: Optional[pulumi.Input[
|
342
|
-
disable_automated_rotation: Optional[pulumi.Input[
|
343
|
-
disable_remount: Optional[pulumi.Input[
|
344
|
-
identity_token_audience: Optional[pulumi.Input[
|
345
|
-
identity_token_key: Optional[pulumi.Input[
|
346
|
-
identity_token_ttl: Optional[pulumi.Input[
|
347
|
-
local: Optional[pulumi.Input[
|
348
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
349
|
-
namespace: Optional[pulumi.Input[
|
350
|
-
path: Optional[pulumi.Input[
|
351
|
-
rotation_period: Optional[pulumi.Input[
|
352
|
-
rotation_schedule: Optional[pulumi.Input[
|
353
|
-
rotation_window: Optional[pulumi.Input[
|
354
|
-
service_account_email: Optional[pulumi.Input[
|
336
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
337
|
+
credentials: Optional[pulumi.Input[_builtins.str]] = None,
|
338
|
+
credentials_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
|
339
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
340
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
341
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
342
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
343
|
+
identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
|
344
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
345
|
+
identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
346
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
347
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
348
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
349
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
350
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
351
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
352
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
353
|
+
service_account_email: Optional[pulumi.Input[_builtins.str]] = None):
|
355
354
|
"""
|
356
355
|
Input properties used for looking up and filtering SecretBackend resources.
|
357
|
-
:param pulumi.Input[
|
358
|
-
:param pulumi.Input[
|
359
|
-
:param pulumi.Input[
|
360
|
-
:param pulumi.Input[
|
356
|
+
:param pulumi.Input[_builtins.str] accessor: The accessor of the created GCP mount.
|
357
|
+
:param pulumi.Input[_builtins.str] credentials: JSON-encoded credentials to use to connect to GCP
|
358
|
+
:param pulumi.Input[_builtins.int] credentials_wo_version: The version of the `credentials_wo`. For more info see updating write-only attributes.
|
359
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: The default TTL for credentials
|
361
360
|
issued by this backend. Defaults to '0'.
|
362
|
-
:param pulumi.Input[
|
363
|
-
:param pulumi.Input[
|
361
|
+
:param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
|
362
|
+
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
364
363
|
*Available only for Vault Enterprise*.
|
365
|
-
:param pulumi.Input[
|
364
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
366
365
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
367
|
-
:param pulumi.Input[
|
366
|
+
:param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value for plugin identity
|
368
367
|
tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
|
369
368
|
Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
370
|
-
:param pulumi.Input[
|
369
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin identity
|
371
370
|
tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
372
|
-
:param pulumi.Input[
|
373
|
-
:param pulumi.Input[
|
374
|
-
:param pulumi.Input[
|
371
|
+
:param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated tokens.
|
372
|
+
:param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
373
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
|
375
374
|
for credentials issued by this backend. Defaults to '0'.
|
376
|
-
:param pulumi.Input[
|
375
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
377
376
|
The value should not contain leading or trailing forward slashes.
|
378
377
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
379
378
|
*Available only for Vault Enterprise*.
|
380
|
-
:param pulumi.Input[
|
379
|
+
:param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
|
381
380
|
not begin or end with a `/`. Defaults to `gcp`.
|
382
|
-
:param pulumi.Input[
|
381
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
383
382
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
384
383
|
*Available only for Vault Enterprise*.
|
385
|
-
:param pulumi.Input[
|
384
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
386
385
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
|
387
|
-
:param pulumi.Input[
|
386
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
388
387
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
389
388
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
|
390
|
-
:param pulumi.Input[
|
389
|
+
:param pulumi.Input[_builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
|
391
390
|
Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
392
391
|
"""
|
393
392
|
if accessor is not None:
|
@@ -427,45 +426,45 @@ class _SecretBackendState:
|
|
427
426
|
if service_account_email is not None:
|
428
427
|
pulumi.set(__self__, "service_account_email", service_account_email)
|
429
428
|
|
430
|
-
@property
|
429
|
+
@_builtins.property
|
431
430
|
@pulumi.getter
|
432
|
-
def accessor(self) -> Optional[pulumi.Input[
|
431
|
+
def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
|
433
432
|
"""
|
434
433
|
The accessor of the created GCP mount.
|
435
434
|
"""
|
436
435
|
return pulumi.get(self, "accessor")
|
437
436
|
|
438
437
|
@accessor.setter
|
439
|
-
def accessor(self, value: Optional[pulumi.Input[
|
438
|
+
def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
|
440
439
|
pulumi.set(self, "accessor", value)
|
441
440
|
|
442
|
-
@property
|
441
|
+
@_builtins.property
|
443
442
|
@pulumi.getter
|
444
|
-
def credentials(self) -> Optional[pulumi.Input[
|
443
|
+
def credentials(self) -> Optional[pulumi.Input[_builtins.str]]:
|
445
444
|
"""
|
446
445
|
JSON-encoded credentials to use to connect to GCP
|
447
446
|
"""
|
448
447
|
return pulumi.get(self, "credentials")
|
449
448
|
|
450
449
|
@credentials.setter
|
451
|
-
def credentials(self, value: Optional[pulumi.Input[
|
450
|
+
def credentials(self, value: Optional[pulumi.Input[_builtins.str]]):
|
452
451
|
pulumi.set(self, "credentials", value)
|
453
452
|
|
454
|
-
@property
|
453
|
+
@_builtins.property
|
455
454
|
@pulumi.getter(name="credentialsWoVersion")
|
456
|
-
def credentials_wo_version(self) -> Optional[pulumi.Input[
|
455
|
+
def credentials_wo_version(self) -> Optional[pulumi.Input[_builtins.int]]:
|
457
456
|
"""
|
458
457
|
The version of the `credentials_wo`. For more info see updating write-only attributes.
|
459
458
|
"""
|
460
459
|
return pulumi.get(self, "credentials_wo_version")
|
461
460
|
|
462
461
|
@credentials_wo_version.setter
|
463
|
-
def credentials_wo_version(self, value: Optional[pulumi.Input[
|
462
|
+
def credentials_wo_version(self, value: Optional[pulumi.Input[_builtins.int]]):
|
464
463
|
pulumi.set(self, "credentials_wo_version", value)
|
465
464
|
|
466
|
-
@property
|
465
|
+
@_builtins.property
|
467
466
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
468
|
-
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
467
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
469
468
|
"""
|
470
469
|
The default TTL for credentials
|
471
470
|
issued by this backend. Defaults to '0'.
|
@@ -473,24 +472,24 @@ class _SecretBackendState:
|
|
473
472
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
474
473
|
|
475
474
|
@default_lease_ttl_seconds.setter
|
476
|
-
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
475
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
477
476
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
478
477
|
|
479
|
-
@property
|
478
|
+
@_builtins.property
|
480
479
|
@pulumi.getter
|
481
|
-
def description(self) -> Optional[pulumi.Input[
|
480
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
482
481
|
"""
|
483
482
|
A human-friendly description for this backend.
|
484
483
|
"""
|
485
484
|
return pulumi.get(self, "description")
|
486
485
|
|
487
486
|
@description.setter
|
488
|
-
def description(self, value: Optional[pulumi.Input[
|
487
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
489
488
|
pulumi.set(self, "description", value)
|
490
489
|
|
491
|
-
@property
|
490
|
+
@_builtins.property
|
492
491
|
@pulumi.getter(name="disableAutomatedRotation")
|
493
|
-
def disable_automated_rotation(self) -> Optional[pulumi.Input[
|
492
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
494
493
|
"""
|
495
494
|
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
496
495
|
*Available only for Vault Enterprise*.
|
@@ -498,12 +497,12 @@ class _SecretBackendState:
|
|
498
497
|
return pulumi.get(self, "disable_automated_rotation")
|
499
498
|
|
500
499
|
@disable_automated_rotation.setter
|
501
|
-
def disable_automated_rotation(self, value: Optional[pulumi.Input[
|
500
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
502
501
|
pulumi.set(self, "disable_automated_rotation", value)
|
503
502
|
|
504
|
-
@property
|
503
|
+
@_builtins.property
|
505
504
|
@pulumi.getter(name="disableRemount")
|
506
|
-
def disable_remount(self) -> Optional[pulumi.Input[
|
505
|
+
def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
507
506
|
"""
|
508
507
|
If set, opts out of mount migration on path updates.
|
509
508
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -511,12 +510,12 @@ class _SecretBackendState:
|
|
511
510
|
return pulumi.get(self, "disable_remount")
|
512
511
|
|
513
512
|
@disable_remount.setter
|
514
|
-
def disable_remount(self, value: Optional[pulumi.Input[
|
513
|
+
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
515
514
|
pulumi.set(self, "disable_remount", value)
|
516
515
|
|
517
|
-
@property
|
516
|
+
@_builtins.property
|
518
517
|
@pulumi.getter(name="identityTokenAudience")
|
519
|
-
def identity_token_audience(self) -> Optional[pulumi.Input[
|
518
|
+
def identity_token_audience(self) -> Optional[pulumi.Input[_builtins.str]]:
|
520
519
|
"""
|
521
520
|
The audience claim value for plugin identity
|
522
521
|
tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
|
@@ -525,12 +524,12 @@ class _SecretBackendState:
|
|
525
524
|
return pulumi.get(self, "identity_token_audience")
|
526
525
|
|
527
526
|
@identity_token_audience.setter
|
528
|
-
def identity_token_audience(self, value: Optional[pulumi.Input[
|
527
|
+
def identity_token_audience(self, value: Optional[pulumi.Input[_builtins.str]]):
|
529
528
|
pulumi.set(self, "identity_token_audience", value)
|
530
529
|
|
531
|
-
@property
|
530
|
+
@_builtins.property
|
532
531
|
@pulumi.getter(name="identityTokenKey")
|
533
|
-
def identity_token_key(self) -> Optional[pulumi.Input[
|
532
|
+
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
534
533
|
"""
|
535
534
|
The key to use for signing plugin identity
|
536
535
|
tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
@@ -538,36 +537,36 @@ class _SecretBackendState:
|
|
538
537
|
return pulumi.get(self, "identity_token_key")
|
539
538
|
|
540
539
|
@identity_token_key.setter
|
541
|
-
def identity_token_key(self, value: Optional[pulumi.Input[
|
540
|
+
def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
542
541
|
pulumi.set(self, "identity_token_key", value)
|
543
542
|
|
544
|
-
@property
|
543
|
+
@_builtins.property
|
545
544
|
@pulumi.getter(name="identityTokenTtl")
|
546
|
-
def identity_token_ttl(self) -> Optional[pulumi.Input[
|
545
|
+
def identity_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
547
546
|
"""
|
548
547
|
The TTL of generated tokens.
|
549
548
|
"""
|
550
549
|
return pulumi.get(self, "identity_token_ttl")
|
551
550
|
|
552
551
|
@identity_token_ttl.setter
|
553
|
-
def identity_token_ttl(self, value: Optional[pulumi.Input[
|
552
|
+
def identity_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
554
553
|
pulumi.set(self, "identity_token_ttl", value)
|
555
554
|
|
556
|
-
@property
|
555
|
+
@_builtins.property
|
557
556
|
@pulumi.getter
|
558
|
-
def local(self) -> Optional[pulumi.Input[
|
557
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
559
558
|
"""
|
560
559
|
Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
561
560
|
"""
|
562
561
|
return pulumi.get(self, "local")
|
563
562
|
|
564
563
|
@local.setter
|
565
|
-
def local(self, value: Optional[pulumi.Input[
|
564
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
566
565
|
pulumi.set(self, "local", value)
|
567
566
|
|
568
|
-
@property
|
567
|
+
@_builtins.property
|
569
568
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
570
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
569
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
571
570
|
"""
|
572
571
|
The maximum TTL that can be requested
|
573
572
|
for credentials issued by this backend. Defaults to '0'.
|
@@ -575,12 +574,12 @@ class _SecretBackendState:
|
|
575
574
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
576
575
|
|
577
576
|
@max_lease_ttl_seconds.setter
|
578
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
577
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
579
578
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
580
579
|
|
581
|
-
@property
|
580
|
+
@_builtins.property
|
582
581
|
@pulumi.getter
|
583
|
-
def namespace(self) -> Optional[pulumi.Input[
|
582
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
584
583
|
"""
|
585
584
|
The namespace to provision the resource in.
|
586
585
|
The value should not contain leading or trailing forward slashes.
|
@@ -590,12 +589,12 @@ class _SecretBackendState:
|
|
590
589
|
return pulumi.get(self, "namespace")
|
591
590
|
|
592
591
|
@namespace.setter
|
593
|
-
def namespace(self, value: Optional[pulumi.Input[
|
592
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
594
593
|
pulumi.set(self, "namespace", value)
|
595
594
|
|
596
|
-
@property
|
595
|
+
@_builtins.property
|
597
596
|
@pulumi.getter
|
598
|
-
def path(self) -> Optional[pulumi.Input[
|
597
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
599
598
|
"""
|
600
599
|
The unique path this backend should be mounted at. Must
|
601
600
|
not begin or end with a `/`. Defaults to `gcp`.
|
@@ -603,12 +602,12 @@ class _SecretBackendState:
|
|
603
602
|
return pulumi.get(self, "path")
|
604
603
|
|
605
604
|
@path.setter
|
606
|
-
def path(self, value: Optional[pulumi.Input[
|
605
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
607
606
|
pulumi.set(self, "path", value)
|
608
607
|
|
609
|
-
@property
|
608
|
+
@_builtins.property
|
610
609
|
@pulumi.getter(name="rotationPeriod")
|
611
|
-
def rotation_period(self) -> Optional[pulumi.Input[
|
610
|
+
def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
612
611
|
"""
|
613
612
|
The amount of time in seconds Vault should wait before rotating the root credential.
|
614
613
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
@@ -617,12 +616,12 @@ class _SecretBackendState:
|
|
617
616
|
return pulumi.get(self, "rotation_period")
|
618
617
|
|
619
618
|
@rotation_period.setter
|
620
|
-
def rotation_period(self, value: Optional[pulumi.Input[
|
619
|
+
def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
621
620
|
pulumi.set(self, "rotation_period", value)
|
622
621
|
|
623
|
-
@property
|
622
|
+
@_builtins.property
|
624
623
|
@pulumi.getter(name="rotationSchedule")
|
625
|
-
def rotation_schedule(self) -> Optional[pulumi.Input[
|
624
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
|
626
625
|
"""
|
627
626
|
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
628
627
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
|
@@ -630,12 +629,12 @@ class _SecretBackendState:
|
|
630
629
|
return pulumi.get(self, "rotation_schedule")
|
631
630
|
|
632
631
|
@rotation_schedule.setter
|
633
|
-
def rotation_schedule(self, value: Optional[pulumi.Input[
|
632
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
|
634
633
|
pulumi.set(self, "rotation_schedule", value)
|
635
634
|
|
636
|
-
@property
|
635
|
+
@_builtins.property
|
637
636
|
@pulumi.getter(name="rotationWindow")
|
638
|
-
def rotation_window(self) -> Optional[pulumi.Input[
|
637
|
+
def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
|
639
638
|
"""
|
640
639
|
The maximum amount of time in seconds allowed to complete
|
641
640
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
@@ -644,12 +643,12 @@ class _SecretBackendState:
|
|
644
643
|
return pulumi.get(self, "rotation_window")
|
645
644
|
|
646
645
|
@rotation_window.setter
|
647
|
-
def rotation_window(self, value: Optional[pulumi.Input[
|
646
|
+
def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
|
648
647
|
pulumi.set(self, "rotation_window", value)
|
649
648
|
|
650
|
-
@property
|
649
|
+
@_builtins.property
|
651
650
|
@pulumi.getter(name="serviceAccountEmail")
|
652
|
-
def service_account_email(self) -> Optional[pulumi.Input[
|
651
|
+
def service_account_email(self) -> Optional[pulumi.Input[_builtins.str]]:
|
653
652
|
"""
|
654
653
|
Service Account to impersonate for plugin workload identity federation.
|
655
654
|
Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
@@ -657,7 +656,7 @@ class _SecretBackendState:
|
|
657
656
|
return pulumi.get(self, "service_account_email")
|
658
657
|
|
659
658
|
@service_account_email.setter
|
660
|
-
def service_account_email(self, value: Optional[pulumi.Input[
|
659
|
+
def service_account_email(self, value: Optional[pulumi.Input[_builtins.str]]):
|
661
660
|
pulumi.set(self, "service_account_email", value)
|
662
661
|
|
663
662
|
|
@@ -667,23 +666,23 @@ class SecretBackend(pulumi.CustomResource):
|
|
667
666
|
def __init__(__self__,
|
668
667
|
resource_name: str,
|
669
668
|
opts: Optional[pulumi.ResourceOptions] = None,
|
670
|
-
credentials: Optional[pulumi.Input[
|
671
|
-
credentials_wo_version: Optional[pulumi.Input[
|
672
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
673
|
-
description: Optional[pulumi.Input[
|
674
|
-
disable_automated_rotation: Optional[pulumi.Input[
|
675
|
-
disable_remount: Optional[pulumi.Input[
|
676
|
-
identity_token_audience: Optional[pulumi.Input[
|
677
|
-
identity_token_key: Optional[pulumi.Input[
|
678
|
-
identity_token_ttl: Optional[pulumi.Input[
|
679
|
-
local: Optional[pulumi.Input[
|
680
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
681
|
-
namespace: Optional[pulumi.Input[
|
682
|
-
path: Optional[pulumi.Input[
|
683
|
-
rotation_period: Optional[pulumi.Input[
|
684
|
-
rotation_schedule: Optional[pulumi.Input[
|
685
|
-
rotation_window: Optional[pulumi.Input[
|
686
|
-
service_account_email: Optional[pulumi.Input[
|
669
|
+
credentials: Optional[pulumi.Input[_builtins.str]] = None,
|
670
|
+
credentials_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
|
671
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
672
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
673
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
674
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
675
|
+
identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
|
676
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
677
|
+
identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
678
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
679
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
680
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
681
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
682
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
683
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
684
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
685
|
+
service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
|
687
686
|
__props__=None):
|
688
687
|
"""
|
689
688
|
## Example Usage
|
@@ -722,39 +721,39 @@ class SecretBackend(pulumi.CustomResource):
|
|
722
721
|
|
723
722
|
:param str resource_name: The name of the resource.
|
724
723
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
725
|
-
:param pulumi.Input[
|
726
|
-
:param pulumi.Input[
|
727
|
-
:param pulumi.Input[
|
724
|
+
:param pulumi.Input[_builtins.str] credentials: JSON-encoded credentials to use to connect to GCP
|
725
|
+
:param pulumi.Input[_builtins.int] credentials_wo_version: The version of the `credentials_wo`. For more info see updating write-only attributes.
|
726
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: The default TTL for credentials
|
728
727
|
issued by this backend. Defaults to '0'.
|
729
|
-
:param pulumi.Input[
|
730
|
-
:param pulumi.Input[
|
728
|
+
:param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
|
729
|
+
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
731
730
|
*Available only for Vault Enterprise*.
|
732
|
-
:param pulumi.Input[
|
731
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
733
732
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
734
|
-
:param pulumi.Input[
|
733
|
+
:param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value for plugin identity
|
735
734
|
tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
|
736
735
|
Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
737
|
-
:param pulumi.Input[
|
736
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin identity
|
738
737
|
tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
739
|
-
:param pulumi.Input[
|
740
|
-
:param pulumi.Input[
|
741
|
-
:param pulumi.Input[
|
738
|
+
:param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated tokens.
|
739
|
+
:param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
740
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
|
742
741
|
for credentials issued by this backend. Defaults to '0'.
|
743
|
-
:param pulumi.Input[
|
742
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
744
743
|
The value should not contain leading or trailing forward slashes.
|
745
744
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
746
745
|
*Available only for Vault Enterprise*.
|
747
|
-
:param pulumi.Input[
|
746
|
+
:param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
|
748
747
|
not begin or end with a `/`. Defaults to `gcp`.
|
749
|
-
:param pulumi.Input[
|
748
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
750
749
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
751
750
|
*Available only for Vault Enterprise*.
|
752
|
-
:param pulumi.Input[
|
751
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
753
752
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
|
754
|
-
:param pulumi.Input[
|
753
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
755
754
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
756
755
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
|
757
|
-
:param pulumi.Input[
|
756
|
+
:param pulumi.Input[_builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
|
758
757
|
Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
759
758
|
"""
|
760
759
|
...
|
@@ -813,23 +812,23 @@ class SecretBackend(pulumi.CustomResource):
|
|
813
812
|
def _internal_init(__self__,
|
814
813
|
resource_name: str,
|
815
814
|
opts: Optional[pulumi.ResourceOptions] = None,
|
816
|
-
credentials: Optional[pulumi.Input[
|
817
|
-
credentials_wo_version: Optional[pulumi.Input[
|
818
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
819
|
-
description: Optional[pulumi.Input[
|
820
|
-
disable_automated_rotation: Optional[pulumi.Input[
|
821
|
-
disable_remount: Optional[pulumi.Input[
|
822
|
-
identity_token_audience: Optional[pulumi.Input[
|
823
|
-
identity_token_key: Optional[pulumi.Input[
|
824
|
-
identity_token_ttl: Optional[pulumi.Input[
|
825
|
-
local: Optional[pulumi.Input[
|
826
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
827
|
-
namespace: Optional[pulumi.Input[
|
828
|
-
path: Optional[pulumi.Input[
|
829
|
-
rotation_period: Optional[pulumi.Input[
|
830
|
-
rotation_schedule: Optional[pulumi.Input[
|
831
|
-
rotation_window: Optional[pulumi.Input[
|
832
|
-
service_account_email: Optional[pulumi.Input[
|
815
|
+
credentials: Optional[pulumi.Input[_builtins.str]] = None,
|
816
|
+
credentials_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
|
817
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
818
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
819
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
820
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
821
|
+
identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
|
822
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
823
|
+
identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
824
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
825
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
826
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
827
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
828
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
829
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
830
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
831
|
+
service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
|
833
832
|
__props__=None):
|
834
833
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
835
834
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -869,24 +868,24 @@ class SecretBackend(pulumi.CustomResource):
|
|
869
868
|
def get(resource_name: str,
|
870
869
|
id: pulumi.Input[str],
|
871
870
|
opts: Optional[pulumi.ResourceOptions] = None,
|
872
|
-
accessor: Optional[pulumi.Input[
|
873
|
-
credentials: Optional[pulumi.Input[
|
874
|
-
credentials_wo_version: Optional[pulumi.Input[
|
875
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
876
|
-
description: Optional[pulumi.Input[
|
877
|
-
disable_automated_rotation: Optional[pulumi.Input[
|
878
|
-
disable_remount: Optional[pulumi.Input[
|
879
|
-
identity_token_audience: Optional[pulumi.Input[
|
880
|
-
identity_token_key: Optional[pulumi.Input[
|
881
|
-
identity_token_ttl: Optional[pulumi.Input[
|
882
|
-
local: Optional[pulumi.Input[
|
883
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
884
|
-
namespace: Optional[pulumi.Input[
|
885
|
-
path: Optional[pulumi.Input[
|
886
|
-
rotation_period: Optional[pulumi.Input[
|
887
|
-
rotation_schedule: Optional[pulumi.Input[
|
888
|
-
rotation_window: Optional[pulumi.Input[
|
889
|
-
service_account_email: Optional[pulumi.Input[
|
871
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
872
|
+
credentials: Optional[pulumi.Input[_builtins.str]] = None,
|
873
|
+
credentials_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
|
874
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
875
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
876
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
877
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
878
|
+
identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
|
879
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
880
|
+
identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
881
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
882
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
883
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
884
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
885
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
886
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
887
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
888
|
+
service_account_email: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackend':
|
890
889
|
"""
|
891
890
|
Get an existing SecretBackend resource's state with the given name, id, and optional extra
|
892
891
|
properties used to qualify the lookup.
|
@@ -894,40 +893,40 @@ class SecretBackend(pulumi.CustomResource):
|
|
894
893
|
:param str resource_name: The unique name of the resulting resource.
|
895
894
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
896
895
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
897
|
-
:param pulumi.Input[
|
898
|
-
:param pulumi.Input[
|
899
|
-
:param pulumi.Input[
|
900
|
-
:param pulumi.Input[
|
896
|
+
:param pulumi.Input[_builtins.str] accessor: The accessor of the created GCP mount.
|
897
|
+
:param pulumi.Input[_builtins.str] credentials: JSON-encoded credentials to use to connect to GCP
|
898
|
+
:param pulumi.Input[_builtins.int] credentials_wo_version: The version of the `credentials_wo`. For more info see updating write-only attributes.
|
899
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: The default TTL for credentials
|
901
900
|
issued by this backend. Defaults to '0'.
|
902
|
-
:param pulumi.Input[
|
903
|
-
:param pulumi.Input[
|
901
|
+
:param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
|
902
|
+
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
904
903
|
*Available only for Vault Enterprise*.
|
905
|
-
:param pulumi.Input[
|
904
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
906
905
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
907
|
-
:param pulumi.Input[
|
906
|
+
:param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value for plugin identity
|
908
907
|
tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
|
909
908
|
Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
910
|
-
:param pulumi.Input[
|
909
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin identity
|
911
910
|
tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
912
|
-
:param pulumi.Input[
|
913
|
-
:param pulumi.Input[
|
914
|
-
:param pulumi.Input[
|
911
|
+
:param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated tokens.
|
912
|
+
:param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
913
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
|
915
914
|
for credentials issued by this backend. Defaults to '0'.
|
916
|
-
:param pulumi.Input[
|
915
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
917
916
|
The value should not contain leading or trailing forward slashes.
|
918
917
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
919
918
|
*Available only for Vault Enterprise*.
|
920
|
-
:param pulumi.Input[
|
919
|
+
:param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
|
921
920
|
not begin or end with a `/`. Defaults to `gcp`.
|
922
|
-
:param pulumi.Input[
|
921
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
923
922
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
924
923
|
*Available only for Vault Enterprise*.
|
925
|
-
:param pulumi.Input[
|
924
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
926
925
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
|
927
|
-
:param pulumi.Input[
|
926
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
928
927
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
929
928
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
|
930
|
-
:param pulumi.Input[
|
929
|
+
:param pulumi.Input[_builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
|
931
930
|
Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
932
931
|
"""
|
933
932
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -954,68 +953,68 @@ class SecretBackend(pulumi.CustomResource):
|
|
954
953
|
__props__.__dict__["service_account_email"] = service_account_email
|
955
954
|
return SecretBackend(resource_name, opts=opts, __props__=__props__)
|
956
955
|
|
957
|
-
@property
|
956
|
+
@_builtins.property
|
958
957
|
@pulumi.getter
|
959
|
-
def accessor(self) -> pulumi.Output[
|
958
|
+
def accessor(self) -> pulumi.Output[_builtins.str]:
|
960
959
|
"""
|
961
960
|
The accessor of the created GCP mount.
|
962
961
|
"""
|
963
962
|
return pulumi.get(self, "accessor")
|
964
963
|
|
965
|
-
@property
|
964
|
+
@_builtins.property
|
966
965
|
@pulumi.getter
|
967
|
-
def credentials(self) -> pulumi.Output[Optional[
|
966
|
+
def credentials(self) -> pulumi.Output[Optional[_builtins.str]]:
|
968
967
|
"""
|
969
968
|
JSON-encoded credentials to use to connect to GCP
|
970
969
|
"""
|
971
970
|
return pulumi.get(self, "credentials")
|
972
971
|
|
973
|
-
@property
|
972
|
+
@_builtins.property
|
974
973
|
@pulumi.getter(name="credentialsWoVersion")
|
975
|
-
def credentials_wo_version(self) -> pulumi.Output[Optional[
|
974
|
+
def credentials_wo_version(self) -> pulumi.Output[Optional[_builtins.int]]:
|
976
975
|
"""
|
977
976
|
The version of the `credentials_wo`. For more info see updating write-only attributes.
|
978
977
|
"""
|
979
978
|
return pulumi.get(self, "credentials_wo_version")
|
980
979
|
|
981
|
-
@property
|
980
|
+
@_builtins.property
|
982
981
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
983
|
-
def default_lease_ttl_seconds(self) -> pulumi.Output[Optional[
|
982
|
+
def default_lease_ttl_seconds(self) -> pulumi.Output[Optional[_builtins.int]]:
|
984
983
|
"""
|
985
984
|
The default TTL for credentials
|
986
985
|
issued by this backend. Defaults to '0'.
|
987
986
|
"""
|
988
987
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
989
988
|
|
990
|
-
@property
|
989
|
+
@_builtins.property
|
991
990
|
@pulumi.getter
|
992
|
-
def description(self) -> pulumi.Output[Optional[
|
991
|
+
def description(self) -> pulumi.Output[Optional[_builtins.str]]:
|
993
992
|
"""
|
994
993
|
A human-friendly description for this backend.
|
995
994
|
"""
|
996
995
|
return pulumi.get(self, "description")
|
997
996
|
|
998
|
-
@property
|
997
|
+
@_builtins.property
|
999
998
|
@pulumi.getter(name="disableAutomatedRotation")
|
1000
|
-
def disable_automated_rotation(self) -> pulumi.Output[Optional[
|
999
|
+
def disable_automated_rotation(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1001
1000
|
"""
|
1002
1001
|
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
1003
1002
|
*Available only for Vault Enterprise*.
|
1004
1003
|
"""
|
1005
1004
|
return pulumi.get(self, "disable_automated_rotation")
|
1006
1005
|
|
1007
|
-
@property
|
1006
|
+
@_builtins.property
|
1008
1007
|
@pulumi.getter(name="disableRemount")
|
1009
|
-
def disable_remount(self) -> pulumi.Output[Optional[
|
1008
|
+
def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1010
1009
|
"""
|
1011
1010
|
If set, opts out of mount migration on path updates.
|
1012
1011
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
1013
1012
|
"""
|
1014
1013
|
return pulumi.get(self, "disable_remount")
|
1015
1014
|
|
1016
|
-
@property
|
1015
|
+
@_builtins.property
|
1017
1016
|
@pulumi.getter(name="identityTokenAudience")
|
1018
|
-
def identity_token_audience(self) -> pulumi.Output[Optional[
|
1017
|
+
def identity_token_audience(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1019
1018
|
"""
|
1020
1019
|
The audience claim value for plugin identity
|
1021
1020
|
tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
|
@@ -1023,43 +1022,43 @@ class SecretBackend(pulumi.CustomResource):
|
|
1023
1022
|
"""
|
1024
1023
|
return pulumi.get(self, "identity_token_audience")
|
1025
1024
|
|
1026
|
-
@property
|
1025
|
+
@_builtins.property
|
1027
1026
|
@pulumi.getter(name="identityTokenKey")
|
1028
|
-
def identity_token_key(self) -> pulumi.Output[Optional[
|
1027
|
+
def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1029
1028
|
"""
|
1030
1029
|
The key to use for signing plugin identity
|
1031
1030
|
tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
1032
1031
|
"""
|
1033
1032
|
return pulumi.get(self, "identity_token_key")
|
1034
1033
|
|
1035
|
-
@property
|
1034
|
+
@_builtins.property
|
1036
1035
|
@pulumi.getter(name="identityTokenTtl")
|
1037
|
-
def identity_token_ttl(self) -> pulumi.Output[Optional[
|
1036
|
+
def identity_token_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
1038
1037
|
"""
|
1039
1038
|
The TTL of generated tokens.
|
1040
1039
|
"""
|
1041
1040
|
return pulumi.get(self, "identity_token_ttl")
|
1042
1041
|
|
1043
|
-
@property
|
1042
|
+
@_builtins.property
|
1044
1043
|
@pulumi.getter
|
1045
|
-
def local(self) -> pulumi.Output[Optional[
|
1044
|
+
def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1046
1045
|
"""
|
1047
1046
|
Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
1048
1047
|
"""
|
1049
1048
|
return pulumi.get(self, "local")
|
1050
1049
|
|
1051
|
-
@property
|
1050
|
+
@_builtins.property
|
1052
1051
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
1053
|
-
def max_lease_ttl_seconds(self) -> pulumi.Output[Optional[
|
1052
|
+
def max_lease_ttl_seconds(self) -> pulumi.Output[Optional[_builtins.int]]:
|
1054
1053
|
"""
|
1055
1054
|
The maximum TTL that can be requested
|
1056
1055
|
for credentials issued by this backend. Defaults to '0'.
|
1057
1056
|
"""
|
1058
1057
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
1059
1058
|
|
1060
|
-
@property
|
1059
|
+
@_builtins.property
|
1061
1060
|
@pulumi.getter
|
1062
|
-
def namespace(self) -> pulumi.Output[Optional[
|
1061
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1063
1062
|
"""
|
1064
1063
|
The namespace to provision the resource in.
|
1065
1064
|
The value should not contain leading or trailing forward slashes.
|
@@ -1068,18 +1067,18 @@ class SecretBackend(pulumi.CustomResource):
|
|
1068
1067
|
"""
|
1069
1068
|
return pulumi.get(self, "namespace")
|
1070
1069
|
|
1071
|
-
@property
|
1070
|
+
@_builtins.property
|
1072
1071
|
@pulumi.getter
|
1073
|
-
def path(self) -> pulumi.Output[Optional[
|
1072
|
+
def path(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1074
1073
|
"""
|
1075
1074
|
The unique path this backend should be mounted at. Must
|
1076
1075
|
not begin or end with a `/`. Defaults to `gcp`.
|
1077
1076
|
"""
|
1078
1077
|
return pulumi.get(self, "path")
|
1079
1078
|
|
1080
|
-
@property
|
1079
|
+
@_builtins.property
|
1081
1080
|
@pulumi.getter(name="rotationPeriod")
|
1082
|
-
def rotation_period(self) -> pulumi.Output[Optional[
|
1081
|
+
def rotation_period(self) -> pulumi.Output[Optional[_builtins.int]]:
|
1083
1082
|
"""
|
1084
1083
|
The amount of time in seconds Vault should wait before rotating the root credential.
|
1085
1084
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
@@ -1087,18 +1086,18 @@ class SecretBackend(pulumi.CustomResource):
|
|
1087
1086
|
"""
|
1088
1087
|
return pulumi.get(self, "rotation_period")
|
1089
1088
|
|
1090
|
-
@property
|
1089
|
+
@_builtins.property
|
1091
1090
|
@pulumi.getter(name="rotationSchedule")
|
1092
|
-
def rotation_schedule(self) -> pulumi.Output[Optional[
|
1091
|
+
def rotation_schedule(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1093
1092
|
"""
|
1094
1093
|
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
1095
1094
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
|
1096
1095
|
"""
|
1097
1096
|
return pulumi.get(self, "rotation_schedule")
|
1098
1097
|
|
1099
|
-
@property
|
1098
|
+
@_builtins.property
|
1100
1099
|
@pulumi.getter(name="rotationWindow")
|
1101
|
-
def rotation_window(self) -> pulumi.Output[Optional[
|
1100
|
+
def rotation_window(self) -> pulumi.Output[Optional[_builtins.int]]:
|
1102
1101
|
"""
|
1103
1102
|
The maximum amount of time in seconds allowed to complete
|
1104
1103
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
@@ -1106,9 +1105,9 @@ class SecretBackend(pulumi.CustomResource):
|
|
1106
1105
|
"""
|
1107
1106
|
return pulumi.get(self, "rotation_window")
|
1108
1107
|
|
1109
|
-
@property
|
1108
|
+
@_builtins.property
|
1110
1109
|
@pulumi.getter(name="serviceAccountEmail")
|
1111
|
-
def service_account_email(self) -> pulumi.Output[Optional[
|
1110
|
+
def service_account_email(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1112
1111
|
"""
|
1113
1112
|
Service Account to impersonate for plugin workload identity federation.
|
1114
1113
|
Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|