pulumi-vault 7.2.0a1755240850__py3-none-any.whl → 7.2.0a1755574606__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +18 -0
- pulumi_vault/_inputs.py +201 -0
- pulumi_vault/aws/secret_backend.py +627 -49
- pulumi_vault/azure/backend.py +788 -15
- pulumi_vault/consul/secret_backend.py +660 -28
- pulumi_vault/database/secrets_mount.py +47 -0
- pulumi_vault/gcp/secret_backend.py +599 -56
- pulumi_vault/jwt/auth_backend.py +47 -0
- pulumi_vault/kmip/secret_backend.py +787 -7
- pulumi_vault/kubernetes/secret_backend.py +47 -0
- pulumi_vault/ldap/secret_backend.py +75 -35
- pulumi_vault/mount.py +47 -0
- pulumi_vault/nomad_secret_backend.py +660 -21
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/outputs.py +153 -0
- pulumi_vault/pkisecret/backend_config_scep.py +68 -21
- pulumi_vault/pkisecret/get_backend_config_scep.py +21 -1
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/rabbitmq/secret_backend.py +707 -35
- pulumi_vault/ssh/secret_backend_ca.py +101 -7
- pulumi_vault/terraformcloud/secret_backend.py +707 -28
- pulumi_vault/transit/secret_backend_key.py +49 -21
- {pulumi_vault-7.2.0a1755240850.dist-info → pulumi_vault-7.2.0a1755574606.dist-info}/METADATA +1 -1
- {pulumi_vault-7.2.0a1755240850.dist-info → pulumi_vault-7.2.0a1755574606.dist-info}/RECORD +27 -25
- {pulumi_vault-7.2.0a1755240850.dist-info → pulumi_vault-7.2.0a1755574606.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1755240850.dist-info → pulumi_vault-7.2.0a1755574606.dist-info}/top_level.txt +0 -0
pulumi_vault/azure/backend.py
CHANGED
@@ -21,43 +21,73 @@ class BackendArgs:
|
|
21
21
|
def __init__(__self__, *,
|
22
22
|
subscription_id: pulumi.Input[_builtins.str],
|
23
23
|
tenant_id: pulumi.Input[_builtins.str],
|
24
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
25
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
26
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
27
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
24
28
|
client_id: Optional[pulumi.Input[_builtins.str]] = None,
|
25
29
|
client_secret: Optional[pulumi.Input[_builtins.str]] = None,
|
30
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
31
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
26
32
|
description: Optional[pulumi.Input[_builtins.str]] = None,
|
27
33
|
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
28
34
|
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
29
35
|
environment: Optional[pulumi.Input[_builtins.str]] = None,
|
36
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
37
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
30
38
|
identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
|
31
39
|
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
32
40
|
identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
41
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
42
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
43
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
33
44
|
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
45
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
46
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
34
47
|
path: Optional[pulumi.Input[_builtins.str]] = None,
|
48
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
49
|
+
root_password_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
35
50
|
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
36
51
|
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
37
|
-
rotation_window: Optional[pulumi.Input[_builtins.int]] = None
|
52
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
53
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None):
|
38
54
|
"""
|
39
55
|
The set of arguments for constructing a Backend resource.
|
40
56
|
:param pulumi.Input[_builtins.str] subscription_id: The subscription id for the Azure Active Directory.
|
41
57
|
:param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory.
|
58
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
59
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
60
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
61
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
42
62
|
:param pulumi.Input[_builtins.str] client_id: The OAuth2 client id to connect to Azure.
|
43
63
|
:param pulumi.Input[_builtins.str] client_secret: The OAuth2 client secret to connect to Azure.
|
64
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
65
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
44
66
|
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
|
45
67
|
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
46
68
|
*Available only for Vault Enterprise*
|
47
69
|
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
48
70
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
49
71
|
:param pulumi.Input[_builtins.str] environment: The Azure environment.
|
72
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
73
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
50
74
|
:param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.17+.
|
51
75
|
*Available only for Vault Enterprise*
|
52
|
-
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens.
|
53
|
-
*Available only for Vault Enterprise*
|
76
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens.
|
54
77
|
:param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
|
55
78
|
*Available only for Vault Enterprise*
|
79
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
80
|
+
:param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
81
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
56
82
|
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
57
83
|
The value should not contain leading or trailing forward slashes.
|
58
84
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
59
85
|
*Available only for Vault Enterprise*.
|
86
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
87
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
60
88
|
:param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Defaults to `azure`.
|
89
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
90
|
+
:param pulumi.Input[_builtins.int] root_password_ttl: The TTL in seconds of the root password in Azure when rotate-root generates a new client secret
|
61
91
|
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
62
92
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
63
93
|
*Available only for Vault Enterprise*
|
@@ -67,13 +97,26 @@ class BackendArgs:
|
|
67
97
|
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
68
98
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
69
99
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*
|
100
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
70
101
|
"""
|
71
102
|
pulumi.set(__self__, "subscription_id", subscription_id)
|
72
103
|
pulumi.set(__self__, "tenant_id", tenant_id)
|
104
|
+
if allowed_managed_keys is not None:
|
105
|
+
pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
|
106
|
+
if allowed_response_headers is not None:
|
107
|
+
pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
|
108
|
+
if audit_non_hmac_request_keys is not None:
|
109
|
+
pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
|
110
|
+
if audit_non_hmac_response_keys is not None:
|
111
|
+
pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
|
73
112
|
if client_id is not None:
|
74
113
|
pulumi.set(__self__, "client_id", client_id)
|
75
114
|
if client_secret is not None:
|
76
115
|
pulumi.set(__self__, "client_secret", client_secret)
|
116
|
+
if default_lease_ttl_seconds is not None:
|
117
|
+
pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
|
118
|
+
if delegated_auth_accessors is not None:
|
119
|
+
pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
|
77
120
|
if description is not None:
|
78
121
|
pulumi.set(__self__, "description", description)
|
79
122
|
if disable_automated_rotation is not None:
|
@@ -82,22 +125,42 @@ class BackendArgs:
|
|
82
125
|
pulumi.set(__self__, "disable_remount", disable_remount)
|
83
126
|
if environment is not None:
|
84
127
|
pulumi.set(__self__, "environment", environment)
|
128
|
+
if external_entropy_access is not None:
|
129
|
+
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
130
|
+
if force_no_cache is not None:
|
131
|
+
pulumi.set(__self__, "force_no_cache", force_no_cache)
|
85
132
|
if identity_token_audience is not None:
|
86
133
|
pulumi.set(__self__, "identity_token_audience", identity_token_audience)
|
87
134
|
if identity_token_key is not None:
|
88
135
|
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
89
136
|
if identity_token_ttl is not None:
|
90
137
|
pulumi.set(__self__, "identity_token_ttl", identity_token_ttl)
|
138
|
+
if listing_visibility is not None:
|
139
|
+
pulumi.set(__self__, "listing_visibility", listing_visibility)
|
140
|
+
if local is not None:
|
141
|
+
pulumi.set(__self__, "local", local)
|
142
|
+
if max_lease_ttl_seconds is not None:
|
143
|
+
pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
|
91
144
|
if namespace is not None:
|
92
145
|
pulumi.set(__self__, "namespace", namespace)
|
146
|
+
if options is not None:
|
147
|
+
pulumi.set(__self__, "options", options)
|
148
|
+
if passthrough_request_headers is not None:
|
149
|
+
pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
|
93
150
|
if path is not None:
|
94
151
|
pulumi.set(__self__, "path", path)
|
152
|
+
if plugin_version is not None:
|
153
|
+
pulumi.set(__self__, "plugin_version", plugin_version)
|
154
|
+
if root_password_ttl is not None:
|
155
|
+
pulumi.set(__self__, "root_password_ttl", root_password_ttl)
|
95
156
|
if rotation_period is not None:
|
96
157
|
pulumi.set(__self__, "rotation_period", rotation_period)
|
97
158
|
if rotation_schedule is not None:
|
98
159
|
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
99
160
|
if rotation_window is not None:
|
100
161
|
pulumi.set(__self__, "rotation_window", rotation_window)
|
162
|
+
if seal_wrap is not None:
|
163
|
+
pulumi.set(__self__, "seal_wrap", seal_wrap)
|
101
164
|
|
102
165
|
@_builtins.property
|
103
166
|
@pulumi.getter(name="subscriptionId")
|
@@ -123,6 +186,54 @@ class BackendArgs:
|
|
123
186
|
def tenant_id(self, value: pulumi.Input[_builtins.str]):
|
124
187
|
pulumi.set(self, "tenant_id", value)
|
125
188
|
|
189
|
+
@_builtins.property
|
190
|
+
@pulumi.getter(name="allowedManagedKeys")
|
191
|
+
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
192
|
+
"""
|
193
|
+
List of managed key registry entry names that the mount in question is allowed to access
|
194
|
+
"""
|
195
|
+
return pulumi.get(self, "allowed_managed_keys")
|
196
|
+
|
197
|
+
@allowed_managed_keys.setter
|
198
|
+
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
199
|
+
pulumi.set(self, "allowed_managed_keys", value)
|
200
|
+
|
201
|
+
@_builtins.property
|
202
|
+
@pulumi.getter(name="allowedResponseHeaders")
|
203
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
204
|
+
"""
|
205
|
+
List of headers to allow and pass from the request to the plugin
|
206
|
+
"""
|
207
|
+
return pulumi.get(self, "allowed_response_headers")
|
208
|
+
|
209
|
+
@allowed_response_headers.setter
|
210
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
211
|
+
pulumi.set(self, "allowed_response_headers", value)
|
212
|
+
|
213
|
+
@_builtins.property
|
214
|
+
@pulumi.getter(name="auditNonHmacRequestKeys")
|
215
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
216
|
+
"""
|
217
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
218
|
+
"""
|
219
|
+
return pulumi.get(self, "audit_non_hmac_request_keys")
|
220
|
+
|
221
|
+
@audit_non_hmac_request_keys.setter
|
222
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
223
|
+
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
224
|
+
|
225
|
+
@_builtins.property
|
226
|
+
@pulumi.getter(name="auditNonHmacResponseKeys")
|
227
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
228
|
+
"""
|
229
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
230
|
+
"""
|
231
|
+
return pulumi.get(self, "audit_non_hmac_response_keys")
|
232
|
+
|
233
|
+
@audit_non_hmac_response_keys.setter
|
234
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
235
|
+
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
236
|
+
|
126
237
|
@_builtins.property
|
127
238
|
@pulumi.getter(name="clientId")
|
128
239
|
def client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
@@ -147,6 +258,30 @@ class BackendArgs:
|
|
147
258
|
def client_secret(self, value: Optional[pulumi.Input[_builtins.str]]):
|
148
259
|
pulumi.set(self, "client_secret", value)
|
149
260
|
|
261
|
+
@_builtins.property
|
262
|
+
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
263
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
264
|
+
"""
|
265
|
+
Default lease duration for tokens and secrets in seconds
|
266
|
+
"""
|
267
|
+
return pulumi.get(self, "default_lease_ttl_seconds")
|
268
|
+
|
269
|
+
@default_lease_ttl_seconds.setter
|
270
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
271
|
+
pulumi.set(self, "default_lease_ttl_seconds", value)
|
272
|
+
|
273
|
+
@_builtins.property
|
274
|
+
@pulumi.getter(name="delegatedAuthAccessors")
|
275
|
+
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
276
|
+
"""
|
277
|
+
List of headers to allow and pass from the request to the plugin
|
278
|
+
"""
|
279
|
+
return pulumi.get(self, "delegated_auth_accessors")
|
280
|
+
|
281
|
+
@delegated_auth_accessors.setter
|
282
|
+
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
283
|
+
pulumi.set(self, "delegated_auth_accessors", value)
|
284
|
+
|
150
285
|
@_builtins.property
|
151
286
|
@pulumi.getter
|
152
287
|
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
@@ -197,6 +332,30 @@ class BackendArgs:
|
|
197
332
|
def environment(self, value: Optional[pulumi.Input[_builtins.str]]):
|
198
333
|
pulumi.set(self, "environment", value)
|
199
334
|
|
335
|
+
@_builtins.property
|
336
|
+
@pulumi.getter(name="externalEntropyAccess")
|
337
|
+
def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
338
|
+
"""
|
339
|
+
Enable the secrets engine to access Vault's external entropy source
|
340
|
+
"""
|
341
|
+
return pulumi.get(self, "external_entropy_access")
|
342
|
+
|
343
|
+
@external_entropy_access.setter
|
344
|
+
def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
345
|
+
pulumi.set(self, "external_entropy_access", value)
|
346
|
+
|
347
|
+
@_builtins.property
|
348
|
+
@pulumi.getter(name="forceNoCache")
|
349
|
+
def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
350
|
+
"""
|
351
|
+
If set to true, disables caching.
|
352
|
+
"""
|
353
|
+
return pulumi.get(self, "force_no_cache")
|
354
|
+
|
355
|
+
@force_no_cache.setter
|
356
|
+
def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
357
|
+
pulumi.set(self, "force_no_cache", value)
|
358
|
+
|
200
359
|
@_builtins.property
|
201
360
|
@pulumi.getter(name="identityTokenAudience")
|
202
361
|
def identity_token_audience(self) -> Optional[pulumi.Input[_builtins.str]]:
|
@@ -214,8 +373,7 @@ class BackendArgs:
|
|
214
373
|
@pulumi.getter(name="identityTokenKey")
|
215
374
|
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
216
375
|
"""
|
217
|
-
The key to use for signing identity tokens.
|
218
|
-
*Available only for Vault Enterprise*
|
376
|
+
The key to use for signing identity tokens.
|
219
377
|
"""
|
220
378
|
return pulumi.get(self, "identity_token_key")
|
221
379
|
|
@@ -236,6 +394,42 @@ class BackendArgs:
|
|
236
394
|
def identity_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
237
395
|
pulumi.set(self, "identity_token_ttl", value)
|
238
396
|
|
397
|
+
@_builtins.property
|
398
|
+
@pulumi.getter(name="listingVisibility")
|
399
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
400
|
+
"""
|
401
|
+
Specifies whether to show this mount in the UI-specific listing endpoint
|
402
|
+
"""
|
403
|
+
return pulumi.get(self, "listing_visibility")
|
404
|
+
|
405
|
+
@listing_visibility.setter
|
406
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
407
|
+
pulumi.set(self, "listing_visibility", value)
|
408
|
+
|
409
|
+
@_builtins.property
|
410
|
+
@pulumi.getter
|
411
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
412
|
+
"""
|
413
|
+
Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
414
|
+
"""
|
415
|
+
return pulumi.get(self, "local")
|
416
|
+
|
417
|
+
@local.setter
|
418
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
419
|
+
pulumi.set(self, "local", value)
|
420
|
+
|
421
|
+
@_builtins.property
|
422
|
+
@pulumi.getter(name="maxLeaseTtlSeconds")
|
423
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
424
|
+
"""
|
425
|
+
Maximum possible lease duration for tokens and secrets in seconds
|
426
|
+
"""
|
427
|
+
return pulumi.get(self, "max_lease_ttl_seconds")
|
428
|
+
|
429
|
+
@max_lease_ttl_seconds.setter
|
430
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
431
|
+
pulumi.set(self, "max_lease_ttl_seconds", value)
|
432
|
+
|
239
433
|
@_builtins.property
|
240
434
|
@pulumi.getter
|
241
435
|
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
@@ -251,6 +445,30 @@ class BackendArgs:
|
|
251
445
|
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
252
446
|
pulumi.set(self, "namespace", value)
|
253
447
|
|
448
|
+
@_builtins.property
|
449
|
+
@pulumi.getter
|
450
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
451
|
+
"""
|
452
|
+
Specifies mount type specific options that are passed to the backend
|
453
|
+
"""
|
454
|
+
return pulumi.get(self, "options")
|
455
|
+
|
456
|
+
@options.setter
|
457
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
458
|
+
pulumi.set(self, "options", value)
|
459
|
+
|
460
|
+
@_builtins.property
|
461
|
+
@pulumi.getter(name="passthroughRequestHeaders")
|
462
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
463
|
+
"""
|
464
|
+
List of headers to allow and pass from the request to the plugin
|
465
|
+
"""
|
466
|
+
return pulumi.get(self, "passthrough_request_headers")
|
467
|
+
|
468
|
+
@passthrough_request_headers.setter
|
469
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
470
|
+
pulumi.set(self, "passthrough_request_headers", value)
|
471
|
+
|
254
472
|
@_builtins.property
|
255
473
|
@pulumi.getter
|
256
474
|
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
@@ -263,6 +481,30 @@ class BackendArgs:
|
|
263
481
|
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
264
482
|
pulumi.set(self, "path", value)
|
265
483
|
|
484
|
+
@_builtins.property
|
485
|
+
@pulumi.getter(name="pluginVersion")
|
486
|
+
def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
|
487
|
+
"""
|
488
|
+
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
489
|
+
"""
|
490
|
+
return pulumi.get(self, "plugin_version")
|
491
|
+
|
492
|
+
@plugin_version.setter
|
493
|
+
def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
|
494
|
+
pulumi.set(self, "plugin_version", value)
|
495
|
+
|
496
|
+
@_builtins.property
|
497
|
+
@pulumi.getter(name="rootPasswordTtl")
|
498
|
+
def root_password_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
499
|
+
"""
|
500
|
+
The TTL in seconds of the root password in Azure when rotate-root generates a new client secret
|
501
|
+
"""
|
502
|
+
return pulumi.get(self, "root_password_ttl")
|
503
|
+
|
504
|
+
@root_password_ttl.setter
|
505
|
+
def root_password_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
506
|
+
pulumi.set(self, "root_password_ttl", value)
|
507
|
+
|
266
508
|
@_builtins.property
|
267
509
|
@pulumi.getter(name="rotationPeriod")
|
268
510
|
def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
@@ -305,47 +547,91 @@ class BackendArgs:
|
|
305
547
|
def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
|
306
548
|
pulumi.set(self, "rotation_window", value)
|
307
549
|
|
550
|
+
@_builtins.property
|
551
|
+
@pulumi.getter(name="sealWrap")
|
552
|
+
def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
553
|
+
"""
|
554
|
+
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
555
|
+
"""
|
556
|
+
return pulumi.get(self, "seal_wrap")
|
557
|
+
|
558
|
+
@seal_wrap.setter
|
559
|
+
def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
560
|
+
pulumi.set(self, "seal_wrap", value)
|
561
|
+
|
308
562
|
|
309
563
|
@pulumi.input_type
|
310
564
|
class _BackendState:
|
311
565
|
def __init__(__self__, *,
|
566
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
567
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
568
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
569
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
570
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
312
571
|
client_id: Optional[pulumi.Input[_builtins.str]] = None,
|
313
572
|
client_secret: Optional[pulumi.Input[_builtins.str]] = None,
|
573
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
574
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
314
575
|
description: Optional[pulumi.Input[_builtins.str]] = None,
|
315
576
|
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
316
577
|
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
317
578
|
environment: Optional[pulumi.Input[_builtins.str]] = None,
|
579
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
580
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
318
581
|
identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
|
319
582
|
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
320
583
|
identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
584
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
585
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
586
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
321
587
|
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
588
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
589
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
322
590
|
path: Optional[pulumi.Input[_builtins.str]] = None,
|
591
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
592
|
+
root_password_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
323
593
|
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
324
594
|
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
325
595
|
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
596
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
326
597
|
subscription_id: Optional[pulumi.Input[_builtins.str]] = None,
|
327
598
|
tenant_id: Optional[pulumi.Input[_builtins.str]] = None):
|
328
599
|
"""
|
329
600
|
Input properties used for looking up and filtering Backend resources.
|
601
|
+
:param pulumi.Input[_builtins.str] accessor: Accessor of the mount
|
602
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
603
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
604
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
605
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
330
606
|
:param pulumi.Input[_builtins.str] client_id: The OAuth2 client id to connect to Azure.
|
331
607
|
:param pulumi.Input[_builtins.str] client_secret: The OAuth2 client secret to connect to Azure.
|
608
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
609
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
332
610
|
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
|
333
611
|
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
334
612
|
*Available only for Vault Enterprise*
|
335
613
|
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
336
614
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
337
615
|
:param pulumi.Input[_builtins.str] environment: The Azure environment.
|
616
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
617
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
338
618
|
:param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.17+.
|
339
619
|
*Available only for Vault Enterprise*
|
340
|
-
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens.
|
341
|
-
*Available only for Vault Enterprise*
|
620
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens.
|
342
621
|
:param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
|
343
622
|
*Available only for Vault Enterprise*
|
623
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
624
|
+
:param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
625
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
344
626
|
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
345
627
|
The value should not contain leading or trailing forward slashes.
|
346
628
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
347
629
|
*Available only for Vault Enterprise*.
|
630
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
631
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
348
632
|
:param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Defaults to `azure`.
|
633
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
634
|
+
:param pulumi.Input[_builtins.int] root_password_ttl: The TTL in seconds of the root password in Azure when rotate-root generates a new client secret
|
349
635
|
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
350
636
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
351
637
|
*Available only for Vault Enterprise*
|
@@ -355,13 +641,28 @@ class _BackendState:
|
|
355
641
|
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
356
642
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
357
643
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*
|
644
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
358
645
|
:param pulumi.Input[_builtins.str] subscription_id: The subscription id for the Azure Active Directory.
|
359
646
|
:param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory.
|
360
647
|
"""
|
648
|
+
if accessor is not None:
|
649
|
+
pulumi.set(__self__, "accessor", accessor)
|
650
|
+
if allowed_managed_keys is not None:
|
651
|
+
pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
|
652
|
+
if allowed_response_headers is not None:
|
653
|
+
pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
|
654
|
+
if audit_non_hmac_request_keys is not None:
|
655
|
+
pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
|
656
|
+
if audit_non_hmac_response_keys is not None:
|
657
|
+
pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
|
361
658
|
if client_id is not None:
|
362
659
|
pulumi.set(__self__, "client_id", client_id)
|
363
660
|
if client_secret is not None:
|
364
661
|
pulumi.set(__self__, "client_secret", client_secret)
|
662
|
+
if default_lease_ttl_seconds is not None:
|
663
|
+
pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
|
664
|
+
if delegated_auth_accessors is not None:
|
665
|
+
pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
|
365
666
|
if description is not None:
|
366
667
|
pulumi.set(__self__, "description", description)
|
367
668
|
if disable_automated_rotation is not None:
|
@@ -370,27 +671,107 @@ class _BackendState:
|
|
370
671
|
pulumi.set(__self__, "disable_remount", disable_remount)
|
371
672
|
if environment is not None:
|
372
673
|
pulumi.set(__self__, "environment", environment)
|
674
|
+
if external_entropy_access is not None:
|
675
|
+
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
676
|
+
if force_no_cache is not None:
|
677
|
+
pulumi.set(__self__, "force_no_cache", force_no_cache)
|
373
678
|
if identity_token_audience is not None:
|
374
679
|
pulumi.set(__self__, "identity_token_audience", identity_token_audience)
|
375
680
|
if identity_token_key is not None:
|
376
681
|
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
377
682
|
if identity_token_ttl is not None:
|
378
683
|
pulumi.set(__self__, "identity_token_ttl", identity_token_ttl)
|
684
|
+
if listing_visibility is not None:
|
685
|
+
pulumi.set(__self__, "listing_visibility", listing_visibility)
|
686
|
+
if local is not None:
|
687
|
+
pulumi.set(__self__, "local", local)
|
688
|
+
if max_lease_ttl_seconds is not None:
|
689
|
+
pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
|
379
690
|
if namespace is not None:
|
380
691
|
pulumi.set(__self__, "namespace", namespace)
|
692
|
+
if options is not None:
|
693
|
+
pulumi.set(__self__, "options", options)
|
694
|
+
if passthrough_request_headers is not None:
|
695
|
+
pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
|
381
696
|
if path is not None:
|
382
697
|
pulumi.set(__self__, "path", path)
|
698
|
+
if plugin_version is not None:
|
699
|
+
pulumi.set(__self__, "plugin_version", plugin_version)
|
700
|
+
if root_password_ttl is not None:
|
701
|
+
pulumi.set(__self__, "root_password_ttl", root_password_ttl)
|
383
702
|
if rotation_period is not None:
|
384
703
|
pulumi.set(__self__, "rotation_period", rotation_period)
|
385
704
|
if rotation_schedule is not None:
|
386
705
|
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
387
706
|
if rotation_window is not None:
|
388
707
|
pulumi.set(__self__, "rotation_window", rotation_window)
|
708
|
+
if seal_wrap is not None:
|
709
|
+
pulumi.set(__self__, "seal_wrap", seal_wrap)
|
389
710
|
if subscription_id is not None:
|
390
711
|
pulumi.set(__self__, "subscription_id", subscription_id)
|
391
712
|
if tenant_id is not None:
|
392
713
|
pulumi.set(__self__, "tenant_id", tenant_id)
|
393
714
|
|
715
|
+
@_builtins.property
|
716
|
+
@pulumi.getter
|
717
|
+
def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
|
718
|
+
"""
|
719
|
+
Accessor of the mount
|
720
|
+
"""
|
721
|
+
return pulumi.get(self, "accessor")
|
722
|
+
|
723
|
+
@accessor.setter
|
724
|
+
def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
|
725
|
+
pulumi.set(self, "accessor", value)
|
726
|
+
|
727
|
+
@_builtins.property
|
728
|
+
@pulumi.getter(name="allowedManagedKeys")
|
729
|
+
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
730
|
+
"""
|
731
|
+
List of managed key registry entry names that the mount in question is allowed to access
|
732
|
+
"""
|
733
|
+
return pulumi.get(self, "allowed_managed_keys")
|
734
|
+
|
735
|
+
@allowed_managed_keys.setter
|
736
|
+
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
737
|
+
pulumi.set(self, "allowed_managed_keys", value)
|
738
|
+
|
739
|
+
@_builtins.property
|
740
|
+
@pulumi.getter(name="allowedResponseHeaders")
|
741
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
742
|
+
"""
|
743
|
+
List of headers to allow and pass from the request to the plugin
|
744
|
+
"""
|
745
|
+
return pulumi.get(self, "allowed_response_headers")
|
746
|
+
|
747
|
+
@allowed_response_headers.setter
|
748
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
749
|
+
pulumi.set(self, "allowed_response_headers", value)
|
750
|
+
|
751
|
+
@_builtins.property
|
752
|
+
@pulumi.getter(name="auditNonHmacRequestKeys")
|
753
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
754
|
+
"""
|
755
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
756
|
+
"""
|
757
|
+
return pulumi.get(self, "audit_non_hmac_request_keys")
|
758
|
+
|
759
|
+
@audit_non_hmac_request_keys.setter
|
760
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
761
|
+
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
762
|
+
|
763
|
+
@_builtins.property
|
764
|
+
@pulumi.getter(name="auditNonHmacResponseKeys")
|
765
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
766
|
+
"""
|
767
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
768
|
+
"""
|
769
|
+
return pulumi.get(self, "audit_non_hmac_response_keys")
|
770
|
+
|
771
|
+
@audit_non_hmac_response_keys.setter
|
772
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
773
|
+
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
774
|
+
|
394
775
|
@_builtins.property
|
395
776
|
@pulumi.getter(name="clientId")
|
396
777
|
def client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
@@ -415,6 +796,30 @@ class _BackendState:
|
|
415
796
|
def client_secret(self, value: Optional[pulumi.Input[_builtins.str]]):
|
416
797
|
pulumi.set(self, "client_secret", value)
|
417
798
|
|
799
|
+
@_builtins.property
|
800
|
+
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
801
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
802
|
+
"""
|
803
|
+
Default lease duration for tokens and secrets in seconds
|
804
|
+
"""
|
805
|
+
return pulumi.get(self, "default_lease_ttl_seconds")
|
806
|
+
|
807
|
+
@default_lease_ttl_seconds.setter
|
808
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
809
|
+
pulumi.set(self, "default_lease_ttl_seconds", value)
|
810
|
+
|
811
|
+
@_builtins.property
|
812
|
+
@pulumi.getter(name="delegatedAuthAccessors")
|
813
|
+
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
814
|
+
"""
|
815
|
+
List of headers to allow and pass from the request to the plugin
|
816
|
+
"""
|
817
|
+
return pulumi.get(self, "delegated_auth_accessors")
|
818
|
+
|
819
|
+
@delegated_auth_accessors.setter
|
820
|
+
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
821
|
+
pulumi.set(self, "delegated_auth_accessors", value)
|
822
|
+
|
418
823
|
@_builtins.property
|
419
824
|
@pulumi.getter
|
420
825
|
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
@@ -465,6 +870,30 @@ class _BackendState:
|
|
465
870
|
def environment(self, value: Optional[pulumi.Input[_builtins.str]]):
|
466
871
|
pulumi.set(self, "environment", value)
|
467
872
|
|
873
|
+
@_builtins.property
|
874
|
+
@pulumi.getter(name="externalEntropyAccess")
|
875
|
+
def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
876
|
+
"""
|
877
|
+
Enable the secrets engine to access Vault's external entropy source
|
878
|
+
"""
|
879
|
+
return pulumi.get(self, "external_entropy_access")
|
880
|
+
|
881
|
+
@external_entropy_access.setter
|
882
|
+
def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
883
|
+
pulumi.set(self, "external_entropy_access", value)
|
884
|
+
|
885
|
+
@_builtins.property
|
886
|
+
@pulumi.getter(name="forceNoCache")
|
887
|
+
def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
888
|
+
"""
|
889
|
+
If set to true, disables caching.
|
890
|
+
"""
|
891
|
+
return pulumi.get(self, "force_no_cache")
|
892
|
+
|
893
|
+
@force_no_cache.setter
|
894
|
+
def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
895
|
+
pulumi.set(self, "force_no_cache", value)
|
896
|
+
|
468
897
|
@_builtins.property
|
469
898
|
@pulumi.getter(name="identityTokenAudience")
|
470
899
|
def identity_token_audience(self) -> Optional[pulumi.Input[_builtins.str]]:
|
@@ -482,8 +911,7 @@ class _BackendState:
|
|
482
911
|
@pulumi.getter(name="identityTokenKey")
|
483
912
|
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
484
913
|
"""
|
485
|
-
The key to use for signing identity tokens.
|
486
|
-
*Available only for Vault Enterprise*
|
914
|
+
The key to use for signing identity tokens.
|
487
915
|
"""
|
488
916
|
return pulumi.get(self, "identity_token_key")
|
489
917
|
|
@@ -504,6 +932,42 @@ class _BackendState:
|
|
504
932
|
def identity_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
505
933
|
pulumi.set(self, "identity_token_ttl", value)
|
506
934
|
|
935
|
+
@_builtins.property
|
936
|
+
@pulumi.getter(name="listingVisibility")
|
937
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
938
|
+
"""
|
939
|
+
Specifies whether to show this mount in the UI-specific listing endpoint
|
940
|
+
"""
|
941
|
+
return pulumi.get(self, "listing_visibility")
|
942
|
+
|
943
|
+
@listing_visibility.setter
|
944
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
945
|
+
pulumi.set(self, "listing_visibility", value)
|
946
|
+
|
947
|
+
@_builtins.property
|
948
|
+
@pulumi.getter
|
949
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
950
|
+
"""
|
951
|
+
Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
952
|
+
"""
|
953
|
+
return pulumi.get(self, "local")
|
954
|
+
|
955
|
+
@local.setter
|
956
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
957
|
+
pulumi.set(self, "local", value)
|
958
|
+
|
959
|
+
@_builtins.property
|
960
|
+
@pulumi.getter(name="maxLeaseTtlSeconds")
|
961
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
962
|
+
"""
|
963
|
+
Maximum possible lease duration for tokens and secrets in seconds
|
964
|
+
"""
|
965
|
+
return pulumi.get(self, "max_lease_ttl_seconds")
|
966
|
+
|
967
|
+
@max_lease_ttl_seconds.setter
|
968
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
969
|
+
pulumi.set(self, "max_lease_ttl_seconds", value)
|
970
|
+
|
507
971
|
@_builtins.property
|
508
972
|
@pulumi.getter
|
509
973
|
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
@@ -519,6 +983,30 @@ class _BackendState:
|
|
519
983
|
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
520
984
|
pulumi.set(self, "namespace", value)
|
521
985
|
|
986
|
+
@_builtins.property
|
987
|
+
@pulumi.getter
|
988
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
989
|
+
"""
|
990
|
+
Specifies mount type specific options that are passed to the backend
|
991
|
+
"""
|
992
|
+
return pulumi.get(self, "options")
|
993
|
+
|
994
|
+
@options.setter
|
995
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
996
|
+
pulumi.set(self, "options", value)
|
997
|
+
|
998
|
+
@_builtins.property
|
999
|
+
@pulumi.getter(name="passthroughRequestHeaders")
|
1000
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
1001
|
+
"""
|
1002
|
+
List of headers to allow and pass from the request to the plugin
|
1003
|
+
"""
|
1004
|
+
return pulumi.get(self, "passthrough_request_headers")
|
1005
|
+
|
1006
|
+
@passthrough_request_headers.setter
|
1007
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
1008
|
+
pulumi.set(self, "passthrough_request_headers", value)
|
1009
|
+
|
522
1010
|
@_builtins.property
|
523
1011
|
@pulumi.getter
|
524
1012
|
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
@@ -531,6 +1019,30 @@ class _BackendState:
|
|
531
1019
|
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
532
1020
|
pulumi.set(self, "path", value)
|
533
1021
|
|
1022
|
+
@_builtins.property
|
1023
|
+
@pulumi.getter(name="pluginVersion")
|
1024
|
+
def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1025
|
+
"""
|
1026
|
+
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1027
|
+
"""
|
1028
|
+
return pulumi.get(self, "plugin_version")
|
1029
|
+
|
1030
|
+
@plugin_version.setter
|
1031
|
+
def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1032
|
+
pulumi.set(self, "plugin_version", value)
|
1033
|
+
|
1034
|
+
@_builtins.property
|
1035
|
+
@pulumi.getter(name="rootPasswordTtl")
|
1036
|
+
def root_password_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
1037
|
+
"""
|
1038
|
+
The TTL in seconds of the root password in Azure when rotate-root generates a new client secret
|
1039
|
+
"""
|
1040
|
+
return pulumi.get(self, "root_password_ttl")
|
1041
|
+
|
1042
|
+
@root_password_ttl.setter
|
1043
|
+
def root_password_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
1044
|
+
pulumi.set(self, "root_password_ttl", value)
|
1045
|
+
|
534
1046
|
@_builtins.property
|
535
1047
|
@pulumi.getter(name="rotationPeriod")
|
536
1048
|
def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
@@ -573,6 +1085,18 @@ class _BackendState:
|
|
573
1085
|
def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
|
574
1086
|
pulumi.set(self, "rotation_window", value)
|
575
1087
|
|
1088
|
+
@_builtins.property
|
1089
|
+
@pulumi.getter(name="sealWrap")
|
1090
|
+
def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1091
|
+
"""
|
1092
|
+
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1093
|
+
"""
|
1094
|
+
return pulumi.get(self, "seal_wrap")
|
1095
|
+
|
1096
|
+
@seal_wrap.setter
|
1097
|
+
def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1098
|
+
pulumi.set(self, "seal_wrap", value)
|
1099
|
+
|
576
1100
|
@_builtins.property
|
577
1101
|
@pulumi.getter(name="subscriptionId")
|
578
1102
|
def subscription_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
@@ -604,20 +1128,36 @@ class Backend(pulumi.CustomResource):
|
|
604
1128
|
def __init__(__self__,
|
605
1129
|
resource_name: str,
|
606
1130
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1131
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1132
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1133
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1134
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
607
1135
|
client_id: Optional[pulumi.Input[_builtins.str]] = None,
|
608
1136
|
client_secret: Optional[pulumi.Input[_builtins.str]] = None,
|
1137
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1138
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
609
1139
|
description: Optional[pulumi.Input[_builtins.str]] = None,
|
610
1140
|
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
611
1141
|
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
612
1142
|
environment: Optional[pulumi.Input[_builtins.str]] = None,
|
1143
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
1144
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
613
1145
|
identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
|
614
1146
|
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
615
1147
|
identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
1148
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
1149
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
1150
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
616
1151
|
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1152
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
1153
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
617
1154
|
path: Optional[pulumi.Input[_builtins.str]] = None,
|
1155
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
1156
|
+
root_password_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
618
1157
|
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
619
1158
|
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
620
1159
|
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
1160
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
621
1161
|
subscription_id: Optional[pulumi.Input[_builtins.str]] = None,
|
622
1162
|
tenant_id: Optional[pulumi.Input[_builtins.str]] = None,
|
623
1163
|
__props__=None):
|
@@ -657,25 +1197,39 @@ class Backend(pulumi.CustomResource):
|
|
657
1197
|
|
658
1198
|
:param str resource_name: The name of the resource.
|
659
1199
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
1200
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
1201
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
1202
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1203
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
660
1204
|
:param pulumi.Input[_builtins.str] client_id: The OAuth2 client id to connect to Azure.
|
661
1205
|
:param pulumi.Input[_builtins.str] client_secret: The OAuth2 client secret to connect to Azure.
|
1206
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
1207
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
662
1208
|
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
|
663
1209
|
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
664
1210
|
*Available only for Vault Enterprise*
|
665
1211
|
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
666
1212
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
667
1213
|
:param pulumi.Input[_builtins.str] environment: The Azure environment.
|
1214
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
1215
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
668
1216
|
:param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.17+.
|
669
1217
|
*Available only for Vault Enterprise*
|
670
|
-
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens.
|
671
|
-
*Available only for Vault Enterprise*
|
1218
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens.
|
672
1219
|
:param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
|
673
1220
|
*Available only for Vault Enterprise*
|
1221
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
1222
|
+
:param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
1223
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
674
1224
|
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
675
1225
|
The value should not contain leading or trailing forward slashes.
|
676
1226
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
677
1227
|
*Available only for Vault Enterprise*.
|
1228
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
1229
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
678
1230
|
:param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Defaults to `azure`.
|
1231
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1232
|
+
:param pulumi.Input[_builtins.int] root_password_ttl: The TTL in seconds of the root password in Azure when rotate-root generates a new client secret
|
679
1233
|
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
680
1234
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
681
1235
|
*Available only for Vault Enterprise*
|
@@ -685,6 +1239,7 @@ class Backend(pulumi.CustomResource):
|
|
685
1239
|
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
686
1240
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
687
1241
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*
|
1242
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
688
1243
|
:param pulumi.Input[_builtins.str] subscription_id: The subscription id for the Azure Active Directory.
|
689
1244
|
:param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory.
|
690
1245
|
"""
|
@@ -743,20 +1298,36 @@ class Backend(pulumi.CustomResource):
|
|
743
1298
|
def _internal_init(__self__,
|
744
1299
|
resource_name: str,
|
745
1300
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1301
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1302
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1303
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1304
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
746
1305
|
client_id: Optional[pulumi.Input[_builtins.str]] = None,
|
747
1306
|
client_secret: Optional[pulumi.Input[_builtins.str]] = None,
|
1307
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1308
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
748
1309
|
description: Optional[pulumi.Input[_builtins.str]] = None,
|
749
1310
|
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
750
1311
|
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
751
1312
|
environment: Optional[pulumi.Input[_builtins.str]] = None,
|
1313
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
1314
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
752
1315
|
identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
|
753
1316
|
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
754
1317
|
identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
1318
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
1319
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
1320
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
755
1321
|
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1322
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
1323
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
756
1324
|
path: Optional[pulumi.Input[_builtins.str]] = None,
|
1325
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
1326
|
+
root_password_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
757
1327
|
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
758
1328
|
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
759
1329
|
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
1330
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
760
1331
|
subscription_id: Optional[pulumi.Input[_builtins.str]] = None,
|
761
1332
|
tenant_id: Optional[pulumi.Input[_builtins.str]] = None,
|
762
1333
|
__props__=None):
|
@@ -768,26 +1339,43 @@ class Backend(pulumi.CustomResource):
|
|
768
1339
|
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
|
769
1340
|
__props__ = BackendArgs.__new__(BackendArgs)
|
770
1341
|
|
1342
|
+
__props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
|
1343
|
+
__props__.__dict__["allowed_response_headers"] = allowed_response_headers
|
1344
|
+
__props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
|
1345
|
+
__props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
|
771
1346
|
__props__.__dict__["client_id"] = None if client_id is None else pulumi.Output.secret(client_id)
|
772
1347
|
__props__.__dict__["client_secret"] = None if client_secret is None else pulumi.Output.secret(client_secret)
|
1348
|
+
__props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
|
1349
|
+
__props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
|
773
1350
|
__props__.__dict__["description"] = description
|
774
1351
|
__props__.__dict__["disable_automated_rotation"] = disable_automated_rotation
|
775
1352
|
__props__.__dict__["disable_remount"] = disable_remount
|
776
1353
|
__props__.__dict__["environment"] = environment
|
1354
|
+
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
1355
|
+
__props__.__dict__["force_no_cache"] = force_no_cache
|
777
1356
|
__props__.__dict__["identity_token_audience"] = identity_token_audience
|
778
1357
|
__props__.__dict__["identity_token_key"] = identity_token_key
|
779
1358
|
__props__.__dict__["identity_token_ttl"] = identity_token_ttl
|
1359
|
+
__props__.__dict__["listing_visibility"] = listing_visibility
|
1360
|
+
__props__.__dict__["local"] = local
|
1361
|
+
__props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
|
780
1362
|
__props__.__dict__["namespace"] = namespace
|
1363
|
+
__props__.__dict__["options"] = options
|
1364
|
+
__props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
|
781
1365
|
__props__.__dict__["path"] = path
|
1366
|
+
__props__.__dict__["plugin_version"] = plugin_version
|
1367
|
+
__props__.__dict__["root_password_ttl"] = root_password_ttl
|
782
1368
|
__props__.__dict__["rotation_period"] = rotation_period
|
783
1369
|
__props__.__dict__["rotation_schedule"] = rotation_schedule
|
784
1370
|
__props__.__dict__["rotation_window"] = rotation_window
|
1371
|
+
__props__.__dict__["seal_wrap"] = seal_wrap
|
785
1372
|
if subscription_id is None and not opts.urn:
|
786
1373
|
raise TypeError("Missing required property 'subscription_id'")
|
787
1374
|
__props__.__dict__["subscription_id"] = None if subscription_id is None else pulumi.Output.secret(subscription_id)
|
788
1375
|
if tenant_id is None and not opts.urn:
|
789
1376
|
raise TypeError("Missing required property 'tenant_id'")
|
790
1377
|
__props__.__dict__["tenant_id"] = None if tenant_id is None else pulumi.Output.secret(tenant_id)
|
1378
|
+
__props__.__dict__["accessor"] = None
|
791
1379
|
secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["clientId", "clientSecret", "subscriptionId", "tenantId"])
|
792
1380
|
opts = pulumi.ResourceOptions.merge(opts, secret_opts)
|
793
1381
|
super(Backend, __self__).__init__(
|
@@ -800,20 +1388,37 @@ class Backend(pulumi.CustomResource):
|
|
800
1388
|
def get(resource_name: str,
|
801
1389
|
id: pulumi.Input[str],
|
802
1390
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1391
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
1392
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1393
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1394
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1395
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
803
1396
|
client_id: Optional[pulumi.Input[_builtins.str]] = None,
|
804
1397
|
client_secret: Optional[pulumi.Input[_builtins.str]] = None,
|
1398
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1399
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
805
1400
|
description: Optional[pulumi.Input[_builtins.str]] = None,
|
806
1401
|
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
807
1402
|
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
808
1403
|
environment: Optional[pulumi.Input[_builtins.str]] = None,
|
1404
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
1405
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
809
1406
|
identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
|
810
1407
|
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
811
1408
|
identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
1409
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
1410
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
1411
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
812
1412
|
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1413
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
1414
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
813
1415
|
path: Optional[pulumi.Input[_builtins.str]] = None,
|
1416
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
1417
|
+
root_password_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
814
1418
|
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
815
1419
|
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
816
1420
|
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
1421
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
817
1422
|
subscription_id: Optional[pulumi.Input[_builtins.str]] = None,
|
818
1423
|
tenant_id: Optional[pulumi.Input[_builtins.str]] = None) -> 'Backend':
|
819
1424
|
"""
|
@@ -823,25 +1428,40 @@ class Backend(pulumi.CustomResource):
|
|
823
1428
|
:param str resource_name: The unique name of the resulting resource.
|
824
1429
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
825
1430
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
1431
|
+
:param pulumi.Input[_builtins.str] accessor: Accessor of the mount
|
1432
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
1433
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
1434
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1435
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
826
1436
|
:param pulumi.Input[_builtins.str] client_id: The OAuth2 client id to connect to Azure.
|
827
1437
|
:param pulumi.Input[_builtins.str] client_secret: The OAuth2 client secret to connect to Azure.
|
1438
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
1439
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
828
1440
|
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
|
829
1441
|
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
830
1442
|
*Available only for Vault Enterprise*
|
831
1443
|
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
832
1444
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
833
1445
|
:param pulumi.Input[_builtins.str] environment: The Azure environment.
|
1446
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
1447
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
834
1448
|
:param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.17+.
|
835
1449
|
*Available only for Vault Enterprise*
|
836
|
-
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens.
|
837
|
-
*Available only for Vault Enterprise*
|
1450
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens.
|
838
1451
|
:param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
|
839
1452
|
*Available only for Vault Enterprise*
|
1453
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
1454
|
+
:param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
1455
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
840
1456
|
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
841
1457
|
The value should not contain leading or trailing forward slashes.
|
842
1458
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
843
1459
|
*Available only for Vault Enterprise*.
|
1460
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
1461
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
844
1462
|
:param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Defaults to `azure`.
|
1463
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1464
|
+
:param pulumi.Input[_builtins.int] root_password_ttl: The TTL in seconds of the root password in Azure when rotate-root generates a new client secret
|
845
1465
|
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
846
1466
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
847
1467
|
*Available only for Vault Enterprise*
|
@@ -851,6 +1471,7 @@ class Backend(pulumi.CustomResource):
|
|
851
1471
|
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
852
1472
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
853
1473
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*
|
1474
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
854
1475
|
:param pulumi.Input[_builtins.str] subscription_id: The subscription id for the Azure Active Directory.
|
855
1476
|
:param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory.
|
856
1477
|
"""
|
@@ -858,24 +1479,81 @@ class Backend(pulumi.CustomResource):
|
|
858
1479
|
|
859
1480
|
__props__ = _BackendState.__new__(_BackendState)
|
860
1481
|
|
1482
|
+
__props__.__dict__["accessor"] = accessor
|
1483
|
+
__props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
|
1484
|
+
__props__.__dict__["allowed_response_headers"] = allowed_response_headers
|
1485
|
+
__props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
|
1486
|
+
__props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
|
861
1487
|
__props__.__dict__["client_id"] = client_id
|
862
1488
|
__props__.__dict__["client_secret"] = client_secret
|
1489
|
+
__props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
|
1490
|
+
__props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
|
863
1491
|
__props__.__dict__["description"] = description
|
864
1492
|
__props__.__dict__["disable_automated_rotation"] = disable_automated_rotation
|
865
1493
|
__props__.__dict__["disable_remount"] = disable_remount
|
866
1494
|
__props__.__dict__["environment"] = environment
|
1495
|
+
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
1496
|
+
__props__.__dict__["force_no_cache"] = force_no_cache
|
867
1497
|
__props__.__dict__["identity_token_audience"] = identity_token_audience
|
868
1498
|
__props__.__dict__["identity_token_key"] = identity_token_key
|
869
1499
|
__props__.__dict__["identity_token_ttl"] = identity_token_ttl
|
1500
|
+
__props__.__dict__["listing_visibility"] = listing_visibility
|
1501
|
+
__props__.__dict__["local"] = local
|
1502
|
+
__props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
|
870
1503
|
__props__.__dict__["namespace"] = namespace
|
1504
|
+
__props__.__dict__["options"] = options
|
1505
|
+
__props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
|
871
1506
|
__props__.__dict__["path"] = path
|
1507
|
+
__props__.__dict__["plugin_version"] = plugin_version
|
1508
|
+
__props__.__dict__["root_password_ttl"] = root_password_ttl
|
872
1509
|
__props__.__dict__["rotation_period"] = rotation_period
|
873
1510
|
__props__.__dict__["rotation_schedule"] = rotation_schedule
|
874
1511
|
__props__.__dict__["rotation_window"] = rotation_window
|
1512
|
+
__props__.__dict__["seal_wrap"] = seal_wrap
|
875
1513
|
__props__.__dict__["subscription_id"] = subscription_id
|
876
1514
|
__props__.__dict__["tenant_id"] = tenant_id
|
877
1515
|
return Backend(resource_name, opts=opts, __props__=__props__)
|
878
1516
|
|
1517
|
+
@_builtins.property
|
1518
|
+
@pulumi.getter
|
1519
|
+
def accessor(self) -> pulumi.Output[_builtins.str]:
|
1520
|
+
"""
|
1521
|
+
Accessor of the mount
|
1522
|
+
"""
|
1523
|
+
return pulumi.get(self, "accessor")
|
1524
|
+
|
1525
|
+
@_builtins.property
|
1526
|
+
@pulumi.getter(name="allowedManagedKeys")
|
1527
|
+
def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1528
|
+
"""
|
1529
|
+
List of managed key registry entry names that the mount in question is allowed to access
|
1530
|
+
"""
|
1531
|
+
return pulumi.get(self, "allowed_managed_keys")
|
1532
|
+
|
1533
|
+
@_builtins.property
|
1534
|
+
@pulumi.getter(name="allowedResponseHeaders")
|
1535
|
+
def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1536
|
+
"""
|
1537
|
+
List of headers to allow and pass from the request to the plugin
|
1538
|
+
"""
|
1539
|
+
return pulumi.get(self, "allowed_response_headers")
|
1540
|
+
|
1541
|
+
@_builtins.property
|
1542
|
+
@pulumi.getter(name="auditNonHmacRequestKeys")
|
1543
|
+
def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
1544
|
+
"""
|
1545
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1546
|
+
"""
|
1547
|
+
return pulumi.get(self, "audit_non_hmac_request_keys")
|
1548
|
+
|
1549
|
+
@_builtins.property
|
1550
|
+
@pulumi.getter(name="auditNonHmacResponseKeys")
|
1551
|
+
def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
1552
|
+
"""
|
1553
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1554
|
+
"""
|
1555
|
+
return pulumi.get(self, "audit_non_hmac_response_keys")
|
1556
|
+
|
879
1557
|
@_builtins.property
|
880
1558
|
@pulumi.getter(name="clientId")
|
881
1559
|
def client_id(self) -> pulumi.Output[Optional[_builtins.str]]:
|
@@ -892,6 +1570,22 @@ class Backend(pulumi.CustomResource):
|
|
892
1570
|
"""
|
893
1571
|
return pulumi.get(self, "client_secret")
|
894
1572
|
|
1573
|
+
@_builtins.property
|
1574
|
+
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
1575
|
+
def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
|
1576
|
+
"""
|
1577
|
+
Default lease duration for tokens and secrets in seconds
|
1578
|
+
"""
|
1579
|
+
return pulumi.get(self, "default_lease_ttl_seconds")
|
1580
|
+
|
1581
|
+
@_builtins.property
|
1582
|
+
@pulumi.getter(name="delegatedAuthAccessors")
|
1583
|
+
def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1584
|
+
"""
|
1585
|
+
List of headers to allow and pass from the request to the plugin
|
1586
|
+
"""
|
1587
|
+
return pulumi.get(self, "delegated_auth_accessors")
|
1588
|
+
|
895
1589
|
@_builtins.property
|
896
1590
|
@pulumi.getter
|
897
1591
|
def description(self) -> pulumi.Output[Optional[_builtins.str]]:
|
@@ -926,6 +1620,22 @@ class Backend(pulumi.CustomResource):
|
|
926
1620
|
"""
|
927
1621
|
return pulumi.get(self, "environment")
|
928
1622
|
|
1623
|
+
@_builtins.property
|
1624
|
+
@pulumi.getter(name="externalEntropyAccess")
|
1625
|
+
def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1626
|
+
"""
|
1627
|
+
Enable the secrets engine to access Vault's external entropy source
|
1628
|
+
"""
|
1629
|
+
return pulumi.get(self, "external_entropy_access")
|
1630
|
+
|
1631
|
+
@_builtins.property
|
1632
|
+
@pulumi.getter(name="forceNoCache")
|
1633
|
+
def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
|
1634
|
+
"""
|
1635
|
+
If set to true, disables caching.
|
1636
|
+
"""
|
1637
|
+
return pulumi.get(self, "force_no_cache")
|
1638
|
+
|
929
1639
|
@_builtins.property
|
930
1640
|
@pulumi.getter(name="identityTokenAudience")
|
931
1641
|
def identity_token_audience(self) -> pulumi.Output[Optional[_builtins.str]]:
|
@@ -939,8 +1649,7 @@ class Backend(pulumi.CustomResource):
|
|
939
1649
|
@pulumi.getter(name="identityTokenKey")
|
940
1650
|
def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
|
941
1651
|
"""
|
942
|
-
The key to use for signing identity tokens.
|
943
|
-
*Available only for Vault Enterprise*
|
1652
|
+
The key to use for signing identity tokens.
|
944
1653
|
"""
|
945
1654
|
return pulumi.get(self, "identity_token_key")
|
946
1655
|
|
@@ -953,6 +1662,30 @@ class Backend(pulumi.CustomResource):
|
|
953
1662
|
"""
|
954
1663
|
return pulumi.get(self, "identity_token_ttl")
|
955
1664
|
|
1665
|
+
@_builtins.property
|
1666
|
+
@pulumi.getter(name="listingVisibility")
|
1667
|
+
def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1668
|
+
"""
|
1669
|
+
Specifies whether to show this mount in the UI-specific listing endpoint
|
1670
|
+
"""
|
1671
|
+
return pulumi.get(self, "listing_visibility")
|
1672
|
+
|
1673
|
+
@_builtins.property
|
1674
|
+
@pulumi.getter
|
1675
|
+
def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1676
|
+
"""
|
1677
|
+
Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
1678
|
+
"""
|
1679
|
+
return pulumi.get(self, "local")
|
1680
|
+
|
1681
|
+
@_builtins.property
|
1682
|
+
@pulumi.getter(name="maxLeaseTtlSeconds")
|
1683
|
+
def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
|
1684
|
+
"""
|
1685
|
+
Maximum possible lease duration for tokens and secrets in seconds
|
1686
|
+
"""
|
1687
|
+
return pulumi.get(self, "max_lease_ttl_seconds")
|
1688
|
+
|
956
1689
|
@_builtins.property
|
957
1690
|
@pulumi.getter
|
958
1691
|
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
@@ -964,6 +1697,22 @@ class Backend(pulumi.CustomResource):
|
|
964
1697
|
"""
|
965
1698
|
return pulumi.get(self, "namespace")
|
966
1699
|
|
1700
|
+
@_builtins.property
|
1701
|
+
@pulumi.getter
|
1702
|
+
def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
|
1703
|
+
"""
|
1704
|
+
Specifies mount type specific options that are passed to the backend
|
1705
|
+
"""
|
1706
|
+
return pulumi.get(self, "options")
|
1707
|
+
|
1708
|
+
@_builtins.property
|
1709
|
+
@pulumi.getter(name="passthroughRequestHeaders")
|
1710
|
+
def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1711
|
+
"""
|
1712
|
+
List of headers to allow and pass from the request to the plugin
|
1713
|
+
"""
|
1714
|
+
return pulumi.get(self, "passthrough_request_headers")
|
1715
|
+
|
967
1716
|
@_builtins.property
|
968
1717
|
@pulumi.getter
|
969
1718
|
def path(self) -> pulumi.Output[Optional[_builtins.str]]:
|
@@ -972,6 +1721,22 @@ class Backend(pulumi.CustomResource):
|
|
972
1721
|
"""
|
973
1722
|
return pulumi.get(self, "path")
|
974
1723
|
|
1724
|
+
@_builtins.property
|
1725
|
+
@pulumi.getter(name="pluginVersion")
|
1726
|
+
def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1727
|
+
"""
|
1728
|
+
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1729
|
+
"""
|
1730
|
+
return pulumi.get(self, "plugin_version")
|
1731
|
+
|
1732
|
+
@_builtins.property
|
1733
|
+
@pulumi.getter(name="rootPasswordTtl")
|
1734
|
+
def root_password_ttl(self) -> pulumi.Output[_builtins.int]:
|
1735
|
+
"""
|
1736
|
+
The TTL in seconds of the root password in Azure when rotate-root generates a new client secret
|
1737
|
+
"""
|
1738
|
+
return pulumi.get(self, "root_password_ttl")
|
1739
|
+
|
975
1740
|
@_builtins.property
|
976
1741
|
@pulumi.getter(name="rotationPeriod")
|
977
1742
|
def rotation_period(self) -> pulumi.Output[Optional[_builtins.int]]:
|
@@ -1002,6 +1767,14 @@ class Backend(pulumi.CustomResource):
|
|
1002
1767
|
"""
|
1003
1768
|
return pulumi.get(self, "rotation_window")
|
1004
1769
|
|
1770
|
+
@_builtins.property
|
1771
|
+
@pulumi.getter(name="sealWrap")
|
1772
|
+
def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
|
1773
|
+
"""
|
1774
|
+
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1775
|
+
"""
|
1776
|
+
return pulumi.get(self, "seal_wrap")
|
1777
|
+
|
1005
1778
|
@_builtins.property
|
1006
1779
|
@pulumi.getter(name="subscriptionId")
|
1007
1780
|
def subscription_id(self) -> pulumi.Output[_builtins.str]:
|