pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,61 +19,61 @@ __all__ = ['SecretBackendArgs', 'SecretBackend']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class SecretBackendArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
path: pulumi.Input[
|
24
|
-
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
25
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
26
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
27
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
28
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
29
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[
|
30
|
-
description: Optional[pulumi.Input[
|
31
|
-
disable_local_ca_jwt: Optional[pulumi.Input[
|
32
|
-
external_entropy_access: Optional[pulumi.Input[
|
33
|
-
identity_token_key: Optional[pulumi.Input[
|
34
|
-
kubernetes_ca_cert: Optional[pulumi.Input[
|
35
|
-
kubernetes_host: Optional[pulumi.Input[
|
36
|
-
listing_visibility: Optional[pulumi.Input[
|
37
|
-
local: Optional[pulumi.Input[
|
38
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
39
|
-
namespace: Optional[pulumi.Input[
|
40
|
-
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
41
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
42
|
-
plugin_version: Optional[pulumi.Input[
|
43
|
-
seal_wrap: Optional[pulumi.Input[
|
44
|
-
service_account_jwt: Optional[pulumi.Input[
|
22
|
+
path: pulumi.Input[_builtins.str],
|
23
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
24
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
25
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
26
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
27
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
28
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
29
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
30
|
+
disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
|
31
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
32
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
33
|
+
kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
34
|
+
kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
|
35
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
36
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
37
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
38
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
39
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
40
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
41
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
42
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
43
|
+
service_account_jwt: Optional[pulumi.Input[_builtins.str]] = None):
|
45
44
|
"""
|
46
45
|
The set of arguments for constructing a SecretBackend resource.
|
47
|
-
:param pulumi.Input[
|
48
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
49
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
50
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
51
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
52
|
-
:param pulumi.Input[
|
53
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
54
|
-
:param pulumi.Input[
|
55
|
-
:param pulumi.Input[
|
46
|
+
:param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
|
47
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
48
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
49
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
50
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
51
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
52
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
53
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
54
|
+
:param pulumi.Input[_builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
|
56
55
|
service account JWT when Vault is running in a Kubernetes pod.
|
57
|
-
:param pulumi.Input[
|
58
|
-
:param pulumi.Input[
|
59
|
-
:param pulumi.Input[
|
56
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
57
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
58
|
+
:param pulumi.Input[_builtins.str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
|
60
59
|
secrets engine to verify the Kubernetes API server certificate. Defaults to the local
|
61
60
|
pod’s CA if Vault is running in Kubernetes. Otherwise, defaults to the root CA set where
|
62
61
|
Vault is running.
|
63
|
-
:param pulumi.Input[
|
62
|
+
:param pulumi.Input[_builtins.str] kubernetes_host: The Kubernetes API URL to connect to. Required if the
|
64
63
|
standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
|
65
64
|
are not set on the host that Vault is running on.
|
66
|
-
:param pulumi.Input[
|
67
|
-
:param pulumi.Input[
|
68
|
-
:param pulumi.Input[
|
69
|
-
:param pulumi.Input[
|
65
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
66
|
+
:param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
67
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
68
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
70
69
|
The value should not contain leading or trailing forward slashes.
|
71
70
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
72
71
|
*Available only for Vault Enterprise*.
|
73
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
74
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
75
|
-
:param pulumi.Input[
|
76
|
-
:param pulumi.Input[
|
77
|
-
:param pulumi.Input[
|
72
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
73
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
74
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
75
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
76
|
+
:param pulumi.Input[_builtins.str] service_account_jwt: The JSON web token of the service account used by the
|
78
77
|
secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
|
79
78
|
is running in Kubernetes.
|
80
79
|
"""
|
@@ -122,105 +121,105 @@ class SecretBackendArgs:
|
|
122
121
|
if service_account_jwt is not None:
|
123
122
|
pulumi.set(__self__, "service_account_jwt", service_account_jwt)
|
124
123
|
|
125
|
-
@property
|
124
|
+
@_builtins.property
|
126
125
|
@pulumi.getter
|
127
|
-
def path(self) -> pulumi.Input[
|
126
|
+
def path(self) -> pulumi.Input[_builtins.str]:
|
128
127
|
"""
|
129
128
|
Where the secret backend will be mounted
|
130
129
|
"""
|
131
130
|
return pulumi.get(self, "path")
|
132
131
|
|
133
132
|
@path.setter
|
134
|
-
def path(self, value: pulumi.Input[
|
133
|
+
def path(self, value: pulumi.Input[_builtins.str]):
|
135
134
|
pulumi.set(self, "path", value)
|
136
135
|
|
137
|
-
@property
|
136
|
+
@_builtins.property
|
138
137
|
@pulumi.getter(name="allowedManagedKeys")
|
139
|
-
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
138
|
+
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
140
139
|
"""
|
141
140
|
List of managed key registry entry names that the mount in question is allowed to access
|
142
141
|
"""
|
143
142
|
return pulumi.get(self, "allowed_managed_keys")
|
144
143
|
|
145
144
|
@allowed_managed_keys.setter
|
146
|
-
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
145
|
+
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
147
146
|
pulumi.set(self, "allowed_managed_keys", value)
|
148
147
|
|
149
|
-
@property
|
148
|
+
@_builtins.property
|
150
149
|
@pulumi.getter(name="allowedResponseHeaders")
|
151
|
-
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
150
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
152
151
|
"""
|
153
152
|
List of headers to allow and pass from the request to the plugin
|
154
153
|
"""
|
155
154
|
return pulumi.get(self, "allowed_response_headers")
|
156
155
|
|
157
156
|
@allowed_response_headers.setter
|
158
|
-
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
157
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
159
158
|
pulumi.set(self, "allowed_response_headers", value)
|
160
159
|
|
161
|
-
@property
|
160
|
+
@_builtins.property
|
162
161
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
163
|
-
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
162
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
164
163
|
"""
|
165
164
|
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
166
165
|
"""
|
167
166
|
return pulumi.get(self, "audit_non_hmac_request_keys")
|
168
167
|
|
169
168
|
@audit_non_hmac_request_keys.setter
|
170
|
-
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
169
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
171
170
|
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
172
171
|
|
173
|
-
@property
|
172
|
+
@_builtins.property
|
174
173
|
@pulumi.getter(name="auditNonHmacResponseKeys")
|
175
|
-
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
174
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
176
175
|
"""
|
177
176
|
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
178
177
|
"""
|
179
178
|
return pulumi.get(self, "audit_non_hmac_response_keys")
|
180
179
|
|
181
180
|
@audit_non_hmac_response_keys.setter
|
182
|
-
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
181
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
183
182
|
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
184
183
|
|
185
|
-
@property
|
184
|
+
@_builtins.property
|
186
185
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
187
|
-
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
186
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
188
187
|
"""
|
189
188
|
Default lease duration for tokens and secrets in seconds
|
190
189
|
"""
|
191
190
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
192
191
|
|
193
192
|
@default_lease_ttl_seconds.setter
|
194
|
-
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
193
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
195
194
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
196
195
|
|
197
|
-
@property
|
196
|
+
@_builtins.property
|
198
197
|
@pulumi.getter(name="delegatedAuthAccessors")
|
199
|
-
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
198
|
+
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
200
199
|
"""
|
201
200
|
List of headers to allow and pass from the request to the plugin
|
202
201
|
"""
|
203
202
|
return pulumi.get(self, "delegated_auth_accessors")
|
204
203
|
|
205
204
|
@delegated_auth_accessors.setter
|
206
|
-
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
205
|
+
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
207
206
|
pulumi.set(self, "delegated_auth_accessors", value)
|
208
207
|
|
209
|
-
@property
|
208
|
+
@_builtins.property
|
210
209
|
@pulumi.getter
|
211
|
-
def description(self) -> Optional[pulumi.Input[
|
210
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
212
211
|
"""
|
213
212
|
Human-friendly description of the mount
|
214
213
|
"""
|
215
214
|
return pulumi.get(self, "description")
|
216
215
|
|
217
216
|
@description.setter
|
218
|
-
def description(self, value: Optional[pulumi.Input[
|
217
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
219
218
|
pulumi.set(self, "description", value)
|
220
219
|
|
221
|
-
@property
|
220
|
+
@_builtins.property
|
222
221
|
@pulumi.getter(name="disableLocalCaJwt")
|
223
|
-
def disable_local_ca_jwt(self) -> Optional[pulumi.Input[
|
222
|
+
def disable_local_ca_jwt(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
224
223
|
"""
|
225
224
|
Disable defaulting to the local CA certificate and
|
226
225
|
service account JWT when Vault is running in a Kubernetes pod.
|
@@ -228,36 +227,36 @@ class SecretBackendArgs:
|
|
228
227
|
return pulumi.get(self, "disable_local_ca_jwt")
|
229
228
|
|
230
229
|
@disable_local_ca_jwt.setter
|
231
|
-
def disable_local_ca_jwt(self, value: Optional[pulumi.Input[
|
230
|
+
def disable_local_ca_jwt(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
232
231
|
pulumi.set(self, "disable_local_ca_jwt", value)
|
233
232
|
|
234
|
-
@property
|
233
|
+
@_builtins.property
|
235
234
|
@pulumi.getter(name="externalEntropyAccess")
|
236
|
-
def external_entropy_access(self) -> Optional[pulumi.Input[
|
235
|
+
def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
237
236
|
"""
|
238
237
|
Enable the secrets engine to access Vault's external entropy source
|
239
238
|
"""
|
240
239
|
return pulumi.get(self, "external_entropy_access")
|
241
240
|
|
242
241
|
@external_entropy_access.setter
|
243
|
-
def external_entropy_access(self, value: Optional[pulumi.Input[
|
242
|
+
def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
244
243
|
pulumi.set(self, "external_entropy_access", value)
|
245
244
|
|
246
|
-
@property
|
245
|
+
@_builtins.property
|
247
246
|
@pulumi.getter(name="identityTokenKey")
|
248
|
-
def identity_token_key(self) -> Optional[pulumi.Input[
|
247
|
+
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
249
248
|
"""
|
250
249
|
The key to use for signing plugin workload identity tokens
|
251
250
|
"""
|
252
251
|
return pulumi.get(self, "identity_token_key")
|
253
252
|
|
254
253
|
@identity_token_key.setter
|
255
|
-
def identity_token_key(self, value: Optional[pulumi.Input[
|
254
|
+
def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
256
255
|
pulumi.set(self, "identity_token_key", value)
|
257
256
|
|
258
|
-
@property
|
257
|
+
@_builtins.property
|
259
258
|
@pulumi.getter(name="kubernetesCaCert")
|
260
|
-
def kubernetes_ca_cert(self) -> Optional[pulumi.Input[
|
259
|
+
def kubernetes_ca_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
|
261
260
|
"""
|
262
261
|
A PEM-encoded CA certificate used by the
|
263
262
|
secrets engine to verify the Kubernetes API server certificate. Defaults to the local
|
@@ -267,12 +266,12 @@ class SecretBackendArgs:
|
|
267
266
|
return pulumi.get(self, "kubernetes_ca_cert")
|
268
267
|
|
269
268
|
@kubernetes_ca_cert.setter
|
270
|
-
def kubernetes_ca_cert(self, value: Optional[pulumi.Input[
|
269
|
+
def kubernetes_ca_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
|
271
270
|
pulumi.set(self, "kubernetes_ca_cert", value)
|
272
271
|
|
273
|
-
@property
|
272
|
+
@_builtins.property
|
274
273
|
@pulumi.getter(name="kubernetesHost")
|
275
|
-
def kubernetes_host(self) -> Optional[pulumi.Input[
|
274
|
+
def kubernetes_host(self) -> Optional[pulumi.Input[_builtins.str]]:
|
276
275
|
"""
|
277
276
|
The Kubernetes API URL to connect to. Required if the
|
278
277
|
standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
|
@@ -281,48 +280,48 @@ class SecretBackendArgs:
|
|
281
280
|
return pulumi.get(self, "kubernetes_host")
|
282
281
|
|
283
282
|
@kubernetes_host.setter
|
284
|
-
def kubernetes_host(self, value: Optional[pulumi.Input[
|
283
|
+
def kubernetes_host(self, value: Optional[pulumi.Input[_builtins.str]]):
|
285
284
|
pulumi.set(self, "kubernetes_host", value)
|
286
285
|
|
287
|
-
@property
|
286
|
+
@_builtins.property
|
288
287
|
@pulumi.getter(name="listingVisibility")
|
289
|
-
def listing_visibility(self) -> Optional[pulumi.Input[
|
288
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
290
289
|
"""
|
291
290
|
Specifies whether to show this mount in the UI-specific listing endpoint
|
292
291
|
"""
|
293
292
|
return pulumi.get(self, "listing_visibility")
|
294
293
|
|
295
294
|
@listing_visibility.setter
|
296
|
-
def listing_visibility(self, value: Optional[pulumi.Input[
|
295
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
297
296
|
pulumi.set(self, "listing_visibility", value)
|
298
297
|
|
299
|
-
@property
|
298
|
+
@_builtins.property
|
300
299
|
@pulumi.getter
|
301
|
-
def local(self) -> Optional[pulumi.Input[
|
300
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
302
301
|
"""
|
303
302
|
Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
304
303
|
"""
|
305
304
|
return pulumi.get(self, "local")
|
306
305
|
|
307
306
|
@local.setter
|
308
|
-
def local(self, value: Optional[pulumi.Input[
|
307
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
309
308
|
pulumi.set(self, "local", value)
|
310
309
|
|
311
|
-
@property
|
310
|
+
@_builtins.property
|
312
311
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
313
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
312
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
314
313
|
"""
|
315
314
|
Maximum possible lease duration for tokens and secrets in seconds
|
316
315
|
"""
|
317
316
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
318
317
|
|
319
318
|
@max_lease_ttl_seconds.setter
|
320
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
319
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
321
320
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
322
321
|
|
323
|
-
@property
|
322
|
+
@_builtins.property
|
324
323
|
@pulumi.getter
|
325
|
-
def namespace(self) -> Optional[pulumi.Input[
|
324
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
326
325
|
"""
|
327
326
|
The namespace to provision the resource in.
|
328
327
|
The value should not contain leading or trailing forward slashes.
|
@@ -332,60 +331,60 @@ class SecretBackendArgs:
|
|
332
331
|
return pulumi.get(self, "namespace")
|
333
332
|
|
334
333
|
@namespace.setter
|
335
|
-
def namespace(self, value: Optional[pulumi.Input[
|
334
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
336
335
|
pulumi.set(self, "namespace", value)
|
337
336
|
|
338
|
-
@property
|
337
|
+
@_builtins.property
|
339
338
|
@pulumi.getter
|
340
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
339
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
341
340
|
"""
|
342
341
|
Specifies mount type specific options that are passed to the backend
|
343
342
|
"""
|
344
343
|
return pulumi.get(self, "options")
|
345
344
|
|
346
345
|
@options.setter
|
347
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
346
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
348
347
|
pulumi.set(self, "options", value)
|
349
348
|
|
350
|
-
@property
|
349
|
+
@_builtins.property
|
351
350
|
@pulumi.getter(name="passthroughRequestHeaders")
|
352
|
-
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
351
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
353
352
|
"""
|
354
353
|
List of headers to allow and pass from the request to the plugin
|
355
354
|
"""
|
356
355
|
return pulumi.get(self, "passthrough_request_headers")
|
357
356
|
|
358
357
|
@passthrough_request_headers.setter
|
359
|
-
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
358
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
360
359
|
pulumi.set(self, "passthrough_request_headers", value)
|
361
360
|
|
362
|
-
@property
|
361
|
+
@_builtins.property
|
363
362
|
@pulumi.getter(name="pluginVersion")
|
364
|
-
def plugin_version(self) -> Optional[pulumi.Input[
|
363
|
+
def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
|
365
364
|
"""
|
366
365
|
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
367
366
|
"""
|
368
367
|
return pulumi.get(self, "plugin_version")
|
369
368
|
|
370
369
|
@plugin_version.setter
|
371
|
-
def plugin_version(self, value: Optional[pulumi.Input[
|
370
|
+
def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
|
372
371
|
pulumi.set(self, "plugin_version", value)
|
373
372
|
|
374
|
-
@property
|
373
|
+
@_builtins.property
|
375
374
|
@pulumi.getter(name="sealWrap")
|
376
|
-
def seal_wrap(self) -> Optional[pulumi.Input[
|
375
|
+
def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
377
376
|
"""
|
378
377
|
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
379
378
|
"""
|
380
379
|
return pulumi.get(self, "seal_wrap")
|
381
380
|
|
382
381
|
@seal_wrap.setter
|
383
|
-
def seal_wrap(self, value: Optional[pulumi.Input[
|
382
|
+
def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
384
383
|
pulumi.set(self, "seal_wrap", value)
|
385
384
|
|
386
|
-
@property
|
385
|
+
@_builtins.property
|
387
386
|
@pulumi.getter(name="serviceAccountJwt")
|
388
|
-
def service_account_jwt(self) -> Optional[pulumi.Input[
|
387
|
+
def service_account_jwt(self) -> Optional[pulumi.Input[_builtins.str]]:
|
389
388
|
"""
|
390
389
|
The JSON web token of the service account used by the
|
391
390
|
secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
|
@@ -394,70 +393,70 @@ class SecretBackendArgs:
|
|
394
393
|
return pulumi.get(self, "service_account_jwt")
|
395
394
|
|
396
395
|
@service_account_jwt.setter
|
397
|
-
def service_account_jwt(self, value: Optional[pulumi.Input[
|
396
|
+
def service_account_jwt(self, value: Optional[pulumi.Input[_builtins.str]]):
|
398
397
|
pulumi.set(self, "service_account_jwt", value)
|
399
398
|
|
400
399
|
|
401
400
|
@pulumi.input_type
|
402
401
|
class _SecretBackendState:
|
403
402
|
def __init__(__self__, *,
|
404
|
-
accessor: Optional[pulumi.Input[
|
405
|
-
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
406
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
407
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
408
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
409
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
410
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[
|
411
|
-
description: Optional[pulumi.Input[
|
412
|
-
disable_local_ca_jwt: Optional[pulumi.Input[
|
413
|
-
external_entropy_access: Optional[pulumi.Input[
|
414
|
-
identity_token_key: Optional[pulumi.Input[
|
415
|
-
kubernetes_ca_cert: Optional[pulumi.Input[
|
416
|
-
kubernetes_host: Optional[pulumi.Input[
|
417
|
-
listing_visibility: Optional[pulumi.Input[
|
418
|
-
local: Optional[pulumi.Input[
|
419
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
420
|
-
namespace: Optional[pulumi.Input[
|
421
|
-
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
422
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
423
|
-
path: Optional[pulumi.Input[
|
424
|
-
plugin_version: Optional[pulumi.Input[
|
425
|
-
seal_wrap: Optional[pulumi.Input[
|
426
|
-
service_account_jwt: Optional[pulumi.Input[
|
403
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
404
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
405
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
406
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
407
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
408
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
409
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
410
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
411
|
+
disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
|
412
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
413
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
414
|
+
kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
415
|
+
kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
|
416
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
417
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
418
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
419
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
420
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
421
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
422
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
423
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
424
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
425
|
+
service_account_jwt: Optional[pulumi.Input[_builtins.str]] = None):
|
427
426
|
"""
|
428
427
|
Input properties used for looking up and filtering SecretBackend resources.
|
429
|
-
:param pulumi.Input[
|
430
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
431
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
432
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
433
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
434
|
-
:param pulumi.Input[
|
435
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
436
|
-
:param pulumi.Input[
|
437
|
-
:param pulumi.Input[
|
428
|
+
:param pulumi.Input[_builtins.str] accessor: Accessor of the mount
|
429
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
430
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
431
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
432
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
433
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
434
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
435
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
436
|
+
:param pulumi.Input[_builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
|
438
437
|
service account JWT when Vault is running in a Kubernetes pod.
|
439
|
-
:param pulumi.Input[
|
440
|
-
:param pulumi.Input[
|
441
|
-
:param pulumi.Input[
|
438
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
439
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
440
|
+
:param pulumi.Input[_builtins.str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
|
442
441
|
secrets engine to verify the Kubernetes API server certificate. Defaults to the local
|
443
442
|
pod’s CA if Vault is running in Kubernetes. Otherwise, defaults to the root CA set where
|
444
443
|
Vault is running.
|
445
|
-
:param pulumi.Input[
|
444
|
+
:param pulumi.Input[_builtins.str] kubernetes_host: The Kubernetes API URL to connect to. Required if the
|
446
445
|
standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
|
447
446
|
are not set on the host that Vault is running on.
|
448
|
-
:param pulumi.Input[
|
449
|
-
:param pulumi.Input[
|
450
|
-
:param pulumi.Input[
|
451
|
-
:param pulumi.Input[
|
447
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
448
|
+
:param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
449
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
450
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
452
451
|
The value should not contain leading or trailing forward slashes.
|
453
452
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
454
453
|
*Available only for Vault Enterprise*.
|
455
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
456
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
457
|
-
:param pulumi.Input[
|
458
|
-
:param pulumi.Input[
|
459
|
-
:param pulumi.Input[
|
460
|
-
:param pulumi.Input[
|
454
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
455
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
456
|
+
:param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
|
457
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
458
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
459
|
+
:param pulumi.Input[_builtins.str] service_account_jwt: The JSON web token of the service account used by the
|
461
460
|
secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
|
462
461
|
is running in Kubernetes.
|
463
462
|
"""
|
@@ -508,105 +507,105 @@ class _SecretBackendState:
|
|
508
507
|
if service_account_jwt is not None:
|
509
508
|
pulumi.set(__self__, "service_account_jwt", service_account_jwt)
|
510
509
|
|
511
|
-
@property
|
510
|
+
@_builtins.property
|
512
511
|
@pulumi.getter
|
513
|
-
def accessor(self) -> Optional[pulumi.Input[
|
512
|
+
def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
|
514
513
|
"""
|
515
514
|
Accessor of the mount
|
516
515
|
"""
|
517
516
|
return pulumi.get(self, "accessor")
|
518
517
|
|
519
518
|
@accessor.setter
|
520
|
-
def accessor(self, value: Optional[pulumi.Input[
|
519
|
+
def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
|
521
520
|
pulumi.set(self, "accessor", value)
|
522
521
|
|
523
|
-
@property
|
522
|
+
@_builtins.property
|
524
523
|
@pulumi.getter(name="allowedManagedKeys")
|
525
|
-
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
524
|
+
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
526
525
|
"""
|
527
526
|
List of managed key registry entry names that the mount in question is allowed to access
|
528
527
|
"""
|
529
528
|
return pulumi.get(self, "allowed_managed_keys")
|
530
529
|
|
531
530
|
@allowed_managed_keys.setter
|
532
|
-
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
531
|
+
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
533
532
|
pulumi.set(self, "allowed_managed_keys", value)
|
534
533
|
|
535
|
-
@property
|
534
|
+
@_builtins.property
|
536
535
|
@pulumi.getter(name="allowedResponseHeaders")
|
537
|
-
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
536
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
538
537
|
"""
|
539
538
|
List of headers to allow and pass from the request to the plugin
|
540
539
|
"""
|
541
540
|
return pulumi.get(self, "allowed_response_headers")
|
542
541
|
|
543
542
|
@allowed_response_headers.setter
|
544
|
-
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
543
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
545
544
|
pulumi.set(self, "allowed_response_headers", value)
|
546
545
|
|
547
|
-
@property
|
546
|
+
@_builtins.property
|
548
547
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
549
|
-
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
548
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
550
549
|
"""
|
551
550
|
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
552
551
|
"""
|
553
552
|
return pulumi.get(self, "audit_non_hmac_request_keys")
|
554
553
|
|
555
554
|
@audit_non_hmac_request_keys.setter
|
556
|
-
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
555
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
557
556
|
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
558
557
|
|
559
|
-
@property
|
558
|
+
@_builtins.property
|
560
559
|
@pulumi.getter(name="auditNonHmacResponseKeys")
|
561
|
-
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
560
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
562
561
|
"""
|
563
562
|
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
564
563
|
"""
|
565
564
|
return pulumi.get(self, "audit_non_hmac_response_keys")
|
566
565
|
|
567
566
|
@audit_non_hmac_response_keys.setter
|
568
|
-
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
567
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
569
568
|
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
570
569
|
|
571
|
-
@property
|
570
|
+
@_builtins.property
|
572
571
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
573
|
-
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
572
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
574
573
|
"""
|
575
574
|
Default lease duration for tokens and secrets in seconds
|
576
575
|
"""
|
577
576
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
578
577
|
|
579
578
|
@default_lease_ttl_seconds.setter
|
580
|
-
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
579
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
581
580
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
582
581
|
|
583
|
-
@property
|
582
|
+
@_builtins.property
|
584
583
|
@pulumi.getter(name="delegatedAuthAccessors")
|
585
|
-
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
584
|
+
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
586
585
|
"""
|
587
586
|
List of headers to allow and pass from the request to the plugin
|
588
587
|
"""
|
589
588
|
return pulumi.get(self, "delegated_auth_accessors")
|
590
589
|
|
591
590
|
@delegated_auth_accessors.setter
|
592
|
-
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
591
|
+
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
593
592
|
pulumi.set(self, "delegated_auth_accessors", value)
|
594
593
|
|
595
|
-
@property
|
594
|
+
@_builtins.property
|
596
595
|
@pulumi.getter
|
597
|
-
def description(self) -> Optional[pulumi.Input[
|
596
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
598
597
|
"""
|
599
598
|
Human-friendly description of the mount
|
600
599
|
"""
|
601
600
|
return pulumi.get(self, "description")
|
602
601
|
|
603
602
|
@description.setter
|
604
|
-
def description(self, value: Optional[pulumi.Input[
|
603
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
605
604
|
pulumi.set(self, "description", value)
|
606
605
|
|
607
|
-
@property
|
606
|
+
@_builtins.property
|
608
607
|
@pulumi.getter(name="disableLocalCaJwt")
|
609
|
-
def disable_local_ca_jwt(self) -> Optional[pulumi.Input[
|
608
|
+
def disable_local_ca_jwt(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
610
609
|
"""
|
611
610
|
Disable defaulting to the local CA certificate and
|
612
611
|
service account JWT when Vault is running in a Kubernetes pod.
|
@@ -614,36 +613,36 @@ class _SecretBackendState:
|
|
614
613
|
return pulumi.get(self, "disable_local_ca_jwt")
|
615
614
|
|
616
615
|
@disable_local_ca_jwt.setter
|
617
|
-
def disable_local_ca_jwt(self, value: Optional[pulumi.Input[
|
616
|
+
def disable_local_ca_jwt(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
618
617
|
pulumi.set(self, "disable_local_ca_jwt", value)
|
619
618
|
|
620
|
-
@property
|
619
|
+
@_builtins.property
|
621
620
|
@pulumi.getter(name="externalEntropyAccess")
|
622
|
-
def external_entropy_access(self) -> Optional[pulumi.Input[
|
621
|
+
def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
623
622
|
"""
|
624
623
|
Enable the secrets engine to access Vault's external entropy source
|
625
624
|
"""
|
626
625
|
return pulumi.get(self, "external_entropy_access")
|
627
626
|
|
628
627
|
@external_entropy_access.setter
|
629
|
-
def external_entropy_access(self, value: Optional[pulumi.Input[
|
628
|
+
def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
630
629
|
pulumi.set(self, "external_entropy_access", value)
|
631
630
|
|
632
|
-
@property
|
631
|
+
@_builtins.property
|
633
632
|
@pulumi.getter(name="identityTokenKey")
|
634
|
-
def identity_token_key(self) -> Optional[pulumi.Input[
|
633
|
+
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
635
634
|
"""
|
636
635
|
The key to use for signing plugin workload identity tokens
|
637
636
|
"""
|
638
637
|
return pulumi.get(self, "identity_token_key")
|
639
638
|
|
640
639
|
@identity_token_key.setter
|
641
|
-
def identity_token_key(self, value: Optional[pulumi.Input[
|
640
|
+
def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
642
641
|
pulumi.set(self, "identity_token_key", value)
|
643
642
|
|
644
|
-
@property
|
643
|
+
@_builtins.property
|
645
644
|
@pulumi.getter(name="kubernetesCaCert")
|
646
|
-
def kubernetes_ca_cert(self) -> Optional[pulumi.Input[
|
645
|
+
def kubernetes_ca_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
|
647
646
|
"""
|
648
647
|
A PEM-encoded CA certificate used by the
|
649
648
|
secrets engine to verify the Kubernetes API server certificate. Defaults to the local
|
@@ -653,12 +652,12 @@ class _SecretBackendState:
|
|
653
652
|
return pulumi.get(self, "kubernetes_ca_cert")
|
654
653
|
|
655
654
|
@kubernetes_ca_cert.setter
|
656
|
-
def kubernetes_ca_cert(self, value: Optional[pulumi.Input[
|
655
|
+
def kubernetes_ca_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
|
657
656
|
pulumi.set(self, "kubernetes_ca_cert", value)
|
658
657
|
|
659
|
-
@property
|
658
|
+
@_builtins.property
|
660
659
|
@pulumi.getter(name="kubernetesHost")
|
661
|
-
def kubernetes_host(self) -> Optional[pulumi.Input[
|
660
|
+
def kubernetes_host(self) -> Optional[pulumi.Input[_builtins.str]]:
|
662
661
|
"""
|
663
662
|
The Kubernetes API URL to connect to. Required if the
|
664
663
|
standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
|
@@ -667,48 +666,48 @@ class _SecretBackendState:
|
|
667
666
|
return pulumi.get(self, "kubernetes_host")
|
668
667
|
|
669
668
|
@kubernetes_host.setter
|
670
|
-
def kubernetes_host(self, value: Optional[pulumi.Input[
|
669
|
+
def kubernetes_host(self, value: Optional[pulumi.Input[_builtins.str]]):
|
671
670
|
pulumi.set(self, "kubernetes_host", value)
|
672
671
|
|
673
|
-
@property
|
672
|
+
@_builtins.property
|
674
673
|
@pulumi.getter(name="listingVisibility")
|
675
|
-
def listing_visibility(self) -> Optional[pulumi.Input[
|
674
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
676
675
|
"""
|
677
676
|
Specifies whether to show this mount in the UI-specific listing endpoint
|
678
677
|
"""
|
679
678
|
return pulumi.get(self, "listing_visibility")
|
680
679
|
|
681
680
|
@listing_visibility.setter
|
682
|
-
def listing_visibility(self, value: Optional[pulumi.Input[
|
681
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
683
682
|
pulumi.set(self, "listing_visibility", value)
|
684
683
|
|
685
|
-
@property
|
684
|
+
@_builtins.property
|
686
685
|
@pulumi.getter
|
687
|
-
def local(self) -> Optional[pulumi.Input[
|
686
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
688
687
|
"""
|
689
688
|
Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
690
689
|
"""
|
691
690
|
return pulumi.get(self, "local")
|
692
691
|
|
693
692
|
@local.setter
|
694
|
-
def local(self, value: Optional[pulumi.Input[
|
693
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
695
694
|
pulumi.set(self, "local", value)
|
696
695
|
|
697
|
-
@property
|
696
|
+
@_builtins.property
|
698
697
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
699
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
698
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
700
699
|
"""
|
701
700
|
Maximum possible lease duration for tokens and secrets in seconds
|
702
701
|
"""
|
703
702
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
704
703
|
|
705
704
|
@max_lease_ttl_seconds.setter
|
706
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
705
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
707
706
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
708
707
|
|
709
|
-
@property
|
708
|
+
@_builtins.property
|
710
709
|
@pulumi.getter
|
711
|
-
def namespace(self) -> Optional[pulumi.Input[
|
710
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
712
711
|
"""
|
713
712
|
The namespace to provision the resource in.
|
714
713
|
The value should not contain leading or trailing forward slashes.
|
@@ -718,72 +717,72 @@ class _SecretBackendState:
|
|
718
717
|
return pulumi.get(self, "namespace")
|
719
718
|
|
720
719
|
@namespace.setter
|
721
|
-
def namespace(self, value: Optional[pulumi.Input[
|
720
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
722
721
|
pulumi.set(self, "namespace", value)
|
723
722
|
|
724
|
-
@property
|
723
|
+
@_builtins.property
|
725
724
|
@pulumi.getter
|
726
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
725
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
727
726
|
"""
|
728
727
|
Specifies mount type specific options that are passed to the backend
|
729
728
|
"""
|
730
729
|
return pulumi.get(self, "options")
|
731
730
|
|
732
731
|
@options.setter
|
733
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
732
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
734
733
|
pulumi.set(self, "options", value)
|
735
734
|
|
736
|
-
@property
|
735
|
+
@_builtins.property
|
737
736
|
@pulumi.getter(name="passthroughRequestHeaders")
|
738
|
-
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
737
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
739
738
|
"""
|
740
739
|
List of headers to allow and pass from the request to the plugin
|
741
740
|
"""
|
742
741
|
return pulumi.get(self, "passthrough_request_headers")
|
743
742
|
|
744
743
|
@passthrough_request_headers.setter
|
745
|
-
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
744
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
746
745
|
pulumi.set(self, "passthrough_request_headers", value)
|
747
746
|
|
748
|
-
@property
|
747
|
+
@_builtins.property
|
749
748
|
@pulumi.getter
|
750
|
-
def path(self) -> Optional[pulumi.Input[
|
749
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
751
750
|
"""
|
752
751
|
Where the secret backend will be mounted
|
753
752
|
"""
|
754
753
|
return pulumi.get(self, "path")
|
755
754
|
|
756
755
|
@path.setter
|
757
|
-
def path(self, value: Optional[pulumi.Input[
|
756
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
758
757
|
pulumi.set(self, "path", value)
|
759
758
|
|
760
|
-
@property
|
759
|
+
@_builtins.property
|
761
760
|
@pulumi.getter(name="pluginVersion")
|
762
|
-
def plugin_version(self) -> Optional[pulumi.Input[
|
761
|
+
def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
|
763
762
|
"""
|
764
763
|
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
765
764
|
"""
|
766
765
|
return pulumi.get(self, "plugin_version")
|
767
766
|
|
768
767
|
@plugin_version.setter
|
769
|
-
def plugin_version(self, value: Optional[pulumi.Input[
|
768
|
+
def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
|
770
769
|
pulumi.set(self, "plugin_version", value)
|
771
770
|
|
772
|
-
@property
|
771
|
+
@_builtins.property
|
773
772
|
@pulumi.getter(name="sealWrap")
|
774
|
-
def seal_wrap(self) -> Optional[pulumi.Input[
|
773
|
+
def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
775
774
|
"""
|
776
775
|
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
777
776
|
"""
|
778
777
|
return pulumi.get(self, "seal_wrap")
|
779
778
|
|
780
779
|
@seal_wrap.setter
|
781
|
-
def seal_wrap(self, value: Optional[pulumi.Input[
|
780
|
+
def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
782
781
|
pulumi.set(self, "seal_wrap", value)
|
783
782
|
|
784
|
-
@property
|
783
|
+
@_builtins.property
|
785
784
|
@pulumi.getter(name="serviceAccountJwt")
|
786
|
-
def service_account_jwt(self) -> Optional[pulumi.Input[
|
785
|
+
def service_account_jwt(self) -> Optional[pulumi.Input[_builtins.str]]:
|
787
786
|
"""
|
788
787
|
The JSON web token of the service account used by the
|
789
788
|
secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
|
@@ -792,7 +791,7 @@ class _SecretBackendState:
|
|
792
791
|
return pulumi.get(self, "service_account_jwt")
|
793
792
|
|
794
793
|
@service_account_jwt.setter
|
795
|
-
def service_account_jwt(self, value: Optional[pulumi.Input[
|
794
|
+
def service_account_jwt(self, value: Optional[pulumi.Input[_builtins.str]]):
|
796
795
|
pulumi.set(self, "service_account_jwt", value)
|
797
796
|
|
798
797
|
|
@@ -802,28 +801,28 @@ class SecretBackend(pulumi.CustomResource):
|
|
802
801
|
def __init__(__self__,
|
803
802
|
resource_name: str,
|
804
803
|
opts: Optional[pulumi.ResourceOptions] = None,
|
805
|
-
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
806
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
807
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
808
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
809
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
810
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[
|
811
|
-
description: Optional[pulumi.Input[
|
812
|
-
disable_local_ca_jwt: Optional[pulumi.Input[
|
813
|
-
external_entropy_access: Optional[pulumi.Input[
|
814
|
-
identity_token_key: Optional[pulumi.Input[
|
815
|
-
kubernetes_ca_cert: Optional[pulumi.Input[
|
816
|
-
kubernetes_host: Optional[pulumi.Input[
|
817
|
-
listing_visibility: Optional[pulumi.Input[
|
818
|
-
local: Optional[pulumi.Input[
|
819
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
820
|
-
namespace: Optional[pulumi.Input[
|
821
|
-
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
822
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
823
|
-
path: Optional[pulumi.Input[
|
824
|
-
plugin_version: Optional[pulumi.Input[
|
825
|
-
seal_wrap: Optional[pulumi.Input[
|
826
|
-
service_account_jwt: Optional[pulumi.Input[
|
804
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
805
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
806
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
807
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
808
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
809
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
810
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
811
|
+
disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
|
812
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
813
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
814
|
+
kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
815
|
+
kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
|
816
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
817
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
818
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
819
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
820
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
821
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
822
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
823
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
824
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
825
|
+
service_account_jwt: Optional[pulumi.Input[_builtins.str]] = None,
|
827
826
|
__props__=None):
|
828
827
|
"""
|
829
828
|
## Example Usage
|
@@ -854,37 +853,37 @@ class SecretBackend(pulumi.CustomResource):
|
|
854
853
|
|
855
854
|
:param str resource_name: The name of the resource.
|
856
855
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
857
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
858
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
859
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
860
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
861
|
-
:param pulumi.Input[
|
862
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
863
|
-
:param pulumi.Input[
|
864
|
-
:param pulumi.Input[
|
856
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
857
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
858
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
859
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
860
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
861
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
862
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
863
|
+
:param pulumi.Input[_builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
|
865
864
|
service account JWT when Vault is running in a Kubernetes pod.
|
866
|
-
:param pulumi.Input[
|
867
|
-
:param pulumi.Input[
|
868
|
-
:param pulumi.Input[
|
865
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
866
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
867
|
+
:param pulumi.Input[_builtins.str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
|
869
868
|
secrets engine to verify the Kubernetes API server certificate. Defaults to the local
|
870
869
|
pod’s CA if Vault is running in Kubernetes. Otherwise, defaults to the root CA set where
|
871
870
|
Vault is running.
|
872
|
-
:param pulumi.Input[
|
871
|
+
:param pulumi.Input[_builtins.str] kubernetes_host: The Kubernetes API URL to connect to. Required if the
|
873
872
|
standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
|
874
873
|
are not set on the host that Vault is running on.
|
875
|
-
:param pulumi.Input[
|
876
|
-
:param pulumi.Input[
|
877
|
-
:param pulumi.Input[
|
878
|
-
:param pulumi.Input[
|
874
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
875
|
+
:param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
876
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
877
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
879
878
|
The value should not contain leading or trailing forward slashes.
|
880
879
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
881
880
|
*Available only for Vault Enterprise*.
|
882
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
883
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
884
|
-
:param pulumi.Input[
|
885
|
-
:param pulumi.Input[
|
886
|
-
:param pulumi.Input[
|
887
|
-
:param pulumi.Input[
|
881
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
882
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
883
|
+
:param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
|
884
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
885
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
886
|
+
:param pulumi.Input[_builtins.str] service_account_jwt: The JSON web token of the service account used by the
|
888
887
|
secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
|
889
888
|
is running in Kubernetes.
|
890
889
|
"""
|
@@ -936,28 +935,28 @@ class SecretBackend(pulumi.CustomResource):
|
|
936
935
|
def _internal_init(__self__,
|
937
936
|
resource_name: str,
|
938
937
|
opts: Optional[pulumi.ResourceOptions] = None,
|
939
|
-
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
940
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
941
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
942
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
943
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
944
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[
|
945
|
-
description: Optional[pulumi.Input[
|
946
|
-
disable_local_ca_jwt: Optional[pulumi.Input[
|
947
|
-
external_entropy_access: Optional[pulumi.Input[
|
948
|
-
identity_token_key: Optional[pulumi.Input[
|
949
|
-
kubernetes_ca_cert: Optional[pulumi.Input[
|
950
|
-
kubernetes_host: Optional[pulumi.Input[
|
951
|
-
listing_visibility: Optional[pulumi.Input[
|
952
|
-
local: Optional[pulumi.Input[
|
953
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
954
|
-
namespace: Optional[pulumi.Input[
|
955
|
-
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
956
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
957
|
-
path: Optional[pulumi.Input[
|
958
|
-
plugin_version: Optional[pulumi.Input[
|
959
|
-
seal_wrap: Optional[pulumi.Input[
|
960
|
-
service_account_jwt: Optional[pulumi.Input[
|
938
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
939
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
940
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
941
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
942
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
943
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
944
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
945
|
+
disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
|
946
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
947
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
948
|
+
kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
949
|
+
kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
|
950
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
951
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
952
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
953
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
954
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
955
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
956
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
957
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
958
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
959
|
+
service_account_jwt: Optional[pulumi.Input[_builtins.str]] = None,
|
961
960
|
__props__=None):
|
962
961
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
963
962
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -1004,29 +1003,29 @@ class SecretBackend(pulumi.CustomResource):
|
|
1004
1003
|
def get(resource_name: str,
|
1005
1004
|
id: pulumi.Input[str],
|
1006
1005
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1007
|
-
accessor: Optional[pulumi.Input[
|
1008
|
-
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1009
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1010
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1011
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1012
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
1013
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1014
|
-
description: Optional[pulumi.Input[
|
1015
|
-
disable_local_ca_jwt: Optional[pulumi.Input[
|
1016
|
-
external_entropy_access: Optional[pulumi.Input[
|
1017
|
-
identity_token_key: Optional[pulumi.Input[
|
1018
|
-
kubernetes_ca_cert: Optional[pulumi.Input[
|
1019
|
-
kubernetes_host: Optional[pulumi.Input[
|
1020
|
-
listing_visibility: Optional[pulumi.Input[
|
1021
|
-
local: Optional[pulumi.Input[
|
1022
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
1023
|
-
namespace: Optional[pulumi.Input[
|
1024
|
-
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
1025
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1026
|
-
path: Optional[pulumi.Input[
|
1027
|
-
plugin_version: Optional[pulumi.Input[
|
1028
|
-
seal_wrap: Optional[pulumi.Input[
|
1029
|
-
service_account_jwt: Optional[pulumi.Input[
|
1006
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
1007
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1008
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1009
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1010
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1011
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1012
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1013
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
1014
|
+
disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
|
1015
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
1016
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1017
|
+
kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
1018
|
+
kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
|
1019
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
1020
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
1021
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1022
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1023
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
1024
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1025
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
1026
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
1027
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
1028
|
+
service_account_jwt: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackend':
|
1030
1029
|
"""
|
1031
1030
|
Get an existing SecretBackend resource's state with the given name, id, and optional extra
|
1032
1031
|
properties used to qualify the lookup.
|
@@ -1034,38 +1033,38 @@ class SecretBackend(pulumi.CustomResource):
|
|
1034
1033
|
:param str resource_name: The unique name of the resulting resource.
|
1035
1034
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
1036
1035
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
1037
|
-
:param pulumi.Input[
|
1038
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1039
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1040
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1041
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1042
|
-
:param pulumi.Input[
|
1043
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1044
|
-
:param pulumi.Input[
|
1045
|
-
:param pulumi.Input[
|
1036
|
+
:param pulumi.Input[_builtins.str] accessor: Accessor of the mount
|
1037
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
1038
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
1039
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1040
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1041
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
1042
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
1043
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
1044
|
+
:param pulumi.Input[_builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
|
1046
1045
|
service account JWT when Vault is running in a Kubernetes pod.
|
1047
|
-
:param pulumi.Input[
|
1048
|
-
:param pulumi.Input[
|
1049
|
-
:param pulumi.Input[
|
1046
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
1047
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
1048
|
+
:param pulumi.Input[_builtins.str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
|
1050
1049
|
secrets engine to verify the Kubernetes API server certificate. Defaults to the local
|
1051
1050
|
pod’s CA if Vault is running in Kubernetes. Otherwise, defaults to the root CA set where
|
1052
1051
|
Vault is running.
|
1053
|
-
:param pulumi.Input[
|
1052
|
+
:param pulumi.Input[_builtins.str] kubernetes_host: The Kubernetes API URL to connect to. Required if the
|
1054
1053
|
standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
|
1055
1054
|
are not set on the host that Vault is running on.
|
1056
|
-
:param pulumi.Input[
|
1057
|
-
:param pulumi.Input[
|
1058
|
-
:param pulumi.Input[
|
1059
|
-
:param pulumi.Input[
|
1055
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
1056
|
+
:param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
1057
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
1058
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
1060
1059
|
The value should not contain leading or trailing forward slashes.
|
1061
1060
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1062
1061
|
*Available only for Vault Enterprise*.
|
1063
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
1064
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1065
|
-
:param pulumi.Input[
|
1066
|
-
:param pulumi.Input[
|
1067
|
-
:param pulumi.Input[
|
1068
|
-
:param pulumi.Input[
|
1062
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
1063
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
1064
|
+
:param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
|
1065
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1066
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1067
|
+
:param pulumi.Input[_builtins.str] service_account_jwt: The JSON web token of the service account used by the
|
1069
1068
|
secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
|
1070
1069
|
is running in Kubernetes.
|
1071
1070
|
"""
|
@@ -1098,98 +1097,98 @@ class SecretBackend(pulumi.CustomResource):
|
|
1098
1097
|
__props__.__dict__["service_account_jwt"] = service_account_jwt
|
1099
1098
|
return SecretBackend(resource_name, opts=opts, __props__=__props__)
|
1100
1099
|
|
1101
|
-
@property
|
1100
|
+
@_builtins.property
|
1102
1101
|
@pulumi.getter
|
1103
|
-
def accessor(self) -> pulumi.Output[
|
1102
|
+
def accessor(self) -> pulumi.Output[_builtins.str]:
|
1104
1103
|
"""
|
1105
1104
|
Accessor of the mount
|
1106
1105
|
"""
|
1107
1106
|
return pulumi.get(self, "accessor")
|
1108
1107
|
|
1109
|
-
@property
|
1108
|
+
@_builtins.property
|
1110
1109
|
@pulumi.getter(name="allowedManagedKeys")
|
1111
|
-
def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[
|
1110
|
+
def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1112
1111
|
"""
|
1113
1112
|
List of managed key registry entry names that the mount in question is allowed to access
|
1114
1113
|
"""
|
1115
1114
|
return pulumi.get(self, "allowed_managed_keys")
|
1116
1115
|
|
1117
|
-
@property
|
1116
|
+
@_builtins.property
|
1118
1117
|
@pulumi.getter(name="allowedResponseHeaders")
|
1119
|
-
def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[
|
1118
|
+
def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1120
1119
|
"""
|
1121
1120
|
List of headers to allow and pass from the request to the plugin
|
1122
1121
|
"""
|
1123
1122
|
return pulumi.get(self, "allowed_response_headers")
|
1124
1123
|
|
1125
|
-
@property
|
1124
|
+
@_builtins.property
|
1126
1125
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
1127
|
-
def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[
|
1126
|
+
def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
1128
1127
|
"""
|
1129
1128
|
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1130
1129
|
"""
|
1131
1130
|
return pulumi.get(self, "audit_non_hmac_request_keys")
|
1132
1131
|
|
1133
|
-
@property
|
1132
|
+
@_builtins.property
|
1134
1133
|
@pulumi.getter(name="auditNonHmacResponseKeys")
|
1135
|
-
def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[
|
1134
|
+
def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
1136
1135
|
"""
|
1137
1136
|
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1138
1137
|
"""
|
1139
1138
|
return pulumi.get(self, "audit_non_hmac_response_keys")
|
1140
1139
|
|
1141
|
-
@property
|
1140
|
+
@_builtins.property
|
1142
1141
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
1143
|
-
def default_lease_ttl_seconds(self) -> pulumi.Output[
|
1142
|
+
def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
|
1144
1143
|
"""
|
1145
1144
|
Default lease duration for tokens and secrets in seconds
|
1146
1145
|
"""
|
1147
1146
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
1148
1147
|
|
1149
|
-
@property
|
1148
|
+
@_builtins.property
|
1150
1149
|
@pulumi.getter(name="delegatedAuthAccessors")
|
1151
|
-
def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[
|
1150
|
+
def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1152
1151
|
"""
|
1153
1152
|
List of headers to allow and pass from the request to the plugin
|
1154
1153
|
"""
|
1155
1154
|
return pulumi.get(self, "delegated_auth_accessors")
|
1156
1155
|
|
1157
|
-
@property
|
1156
|
+
@_builtins.property
|
1158
1157
|
@pulumi.getter
|
1159
|
-
def description(self) -> pulumi.Output[Optional[
|
1158
|
+
def description(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1160
1159
|
"""
|
1161
1160
|
Human-friendly description of the mount
|
1162
1161
|
"""
|
1163
1162
|
return pulumi.get(self, "description")
|
1164
1163
|
|
1165
|
-
@property
|
1164
|
+
@_builtins.property
|
1166
1165
|
@pulumi.getter(name="disableLocalCaJwt")
|
1167
|
-
def disable_local_ca_jwt(self) -> pulumi.Output[Optional[
|
1166
|
+
def disable_local_ca_jwt(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1168
1167
|
"""
|
1169
1168
|
Disable defaulting to the local CA certificate and
|
1170
1169
|
service account JWT when Vault is running in a Kubernetes pod.
|
1171
1170
|
"""
|
1172
1171
|
return pulumi.get(self, "disable_local_ca_jwt")
|
1173
1172
|
|
1174
|
-
@property
|
1173
|
+
@_builtins.property
|
1175
1174
|
@pulumi.getter(name="externalEntropyAccess")
|
1176
|
-
def external_entropy_access(self) -> pulumi.Output[Optional[
|
1175
|
+
def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1177
1176
|
"""
|
1178
1177
|
Enable the secrets engine to access Vault's external entropy source
|
1179
1178
|
"""
|
1180
1179
|
return pulumi.get(self, "external_entropy_access")
|
1181
1180
|
|
1182
|
-
@property
|
1181
|
+
@_builtins.property
|
1183
1182
|
@pulumi.getter(name="identityTokenKey")
|
1184
|
-
def identity_token_key(self) -> pulumi.Output[Optional[
|
1183
|
+
def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1185
1184
|
"""
|
1186
1185
|
The key to use for signing plugin workload identity tokens
|
1187
1186
|
"""
|
1188
1187
|
return pulumi.get(self, "identity_token_key")
|
1189
1188
|
|
1190
|
-
@property
|
1189
|
+
@_builtins.property
|
1191
1190
|
@pulumi.getter(name="kubernetesCaCert")
|
1192
|
-
def kubernetes_ca_cert(self) -> pulumi.Output[Optional[
|
1191
|
+
def kubernetes_ca_cert(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1193
1192
|
"""
|
1194
1193
|
A PEM-encoded CA certificate used by the
|
1195
1194
|
secrets engine to verify the Kubernetes API server certificate. Defaults to the local
|
@@ -1198,9 +1197,9 @@ class SecretBackend(pulumi.CustomResource):
|
|
1198
1197
|
"""
|
1199
1198
|
return pulumi.get(self, "kubernetes_ca_cert")
|
1200
1199
|
|
1201
|
-
@property
|
1200
|
+
@_builtins.property
|
1202
1201
|
@pulumi.getter(name="kubernetesHost")
|
1203
|
-
def kubernetes_host(self) -> pulumi.Output[Optional[
|
1202
|
+
def kubernetes_host(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1204
1203
|
"""
|
1205
1204
|
The Kubernetes API URL to connect to. Required if the
|
1206
1205
|
standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
|
@@ -1208,33 +1207,33 @@ class SecretBackend(pulumi.CustomResource):
|
|
1208
1207
|
"""
|
1209
1208
|
return pulumi.get(self, "kubernetes_host")
|
1210
1209
|
|
1211
|
-
@property
|
1210
|
+
@_builtins.property
|
1212
1211
|
@pulumi.getter(name="listingVisibility")
|
1213
|
-
def listing_visibility(self) -> pulumi.Output[Optional[
|
1212
|
+
def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1214
1213
|
"""
|
1215
1214
|
Specifies whether to show this mount in the UI-specific listing endpoint
|
1216
1215
|
"""
|
1217
1216
|
return pulumi.get(self, "listing_visibility")
|
1218
1217
|
|
1219
|
-
@property
|
1218
|
+
@_builtins.property
|
1220
1219
|
@pulumi.getter
|
1221
|
-
def local(self) -> pulumi.Output[Optional[
|
1220
|
+
def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1222
1221
|
"""
|
1223
1222
|
Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
1224
1223
|
"""
|
1225
1224
|
return pulumi.get(self, "local")
|
1226
1225
|
|
1227
|
-
@property
|
1226
|
+
@_builtins.property
|
1228
1227
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
1229
|
-
def max_lease_ttl_seconds(self) -> pulumi.Output[
|
1228
|
+
def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
|
1230
1229
|
"""
|
1231
1230
|
Maximum possible lease duration for tokens and secrets in seconds
|
1232
1231
|
"""
|
1233
1232
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
1234
1233
|
|
1235
|
-
@property
|
1234
|
+
@_builtins.property
|
1236
1235
|
@pulumi.getter
|
1237
|
-
def namespace(self) -> pulumi.Output[Optional[
|
1236
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1238
1237
|
"""
|
1239
1238
|
The namespace to provision the resource in.
|
1240
1239
|
The value should not contain leading or trailing forward slashes.
|
@@ -1243,49 +1242,49 @@ class SecretBackend(pulumi.CustomResource):
|
|
1243
1242
|
"""
|
1244
1243
|
return pulumi.get(self, "namespace")
|
1245
1244
|
|
1246
|
-
@property
|
1245
|
+
@_builtins.property
|
1247
1246
|
@pulumi.getter
|
1248
|
-
def options(self) -> pulumi.Output[Optional[Mapping[str,
|
1247
|
+
def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
|
1249
1248
|
"""
|
1250
1249
|
Specifies mount type specific options that are passed to the backend
|
1251
1250
|
"""
|
1252
1251
|
return pulumi.get(self, "options")
|
1253
1252
|
|
1254
|
-
@property
|
1253
|
+
@_builtins.property
|
1255
1254
|
@pulumi.getter(name="passthroughRequestHeaders")
|
1256
|
-
def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[
|
1255
|
+
def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1257
1256
|
"""
|
1258
1257
|
List of headers to allow and pass from the request to the plugin
|
1259
1258
|
"""
|
1260
1259
|
return pulumi.get(self, "passthrough_request_headers")
|
1261
1260
|
|
1262
|
-
@property
|
1261
|
+
@_builtins.property
|
1263
1262
|
@pulumi.getter
|
1264
|
-
def path(self) -> pulumi.Output[
|
1263
|
+
def path(self) -> pulumi.Output[_builtins.str]:
|
1265
1264
|
"""
|
1266
1265
|
Where the secret backend will be mounted
|
1267
1266
|
"""
|
1268
1267
|
return pulumi.get(self, "path")
|
1269
1268
|
|
1270
|
-
@property
|
1269
|
+
@_builtins.property
|
1271
1270
|
@pulumi.getter(name="pluginVersion")
|
1272
|
-
def plugin_version(self) -> pulumi.Output[Optional[
|
1271
|
+
def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1273
1272
|
"""
|
1274
1273
|
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1275
1274
|
"""
|
1276
1275
|
return pulumi.get(self, "plugin_version")
|
1277
1276
|
|
1278
|
-
@property
|
1277
|
+
@_builtins.property
|
1279
1278
|
@pulumi.getter(name="sealWrap")
|
1280
|
-
def seal_wrap(self) -> pulumi.Output[
|
1279
|
+
def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
|
1281
1280
|
"""
|
1282
1281
|
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1283
1282
|
"""
|
1284
1283
|
return pulumi.get(self, "seal_wrap")
|
1285
1284
|
|
1286
|
-
@property
|
1285
|
+
@_builtins.property
|
1287
1286
|
@pulumi.getter(name="serviceAccountJwt")
|
1288
|
-
def service_account_jwt(self) -> pulumi.Output[Optional[
|
1287
|
+
def service_account_jwt(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1289
1288
|
"""
|
1290
1289
|
The JSON web token of the service account used by the
|
1291
1290
|
secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
|