pulumi-vault 7.2.0a1755297899__py3-none-any.whl → 7.2.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +18 -0
- pulumi_vault/_inputs.py +201 -0
- pulumi_vault/aws/secret_backend.py +627 -49
- pulumi_vault/azure/backend.py +788 -15
- pulumi_vault/consul/secret_backend.py +660 -28
- pulumi_vault/database/secrets_mount.py +47 -0
- pulumi_vault/gcp/secret_backend.py +599 -56
- pulumi_vault/jwt/auth_backend.py +47 -0
- pulumi_vault/kmip/secret_backend.py +787 -7
- pulumi_vault/kubernetes/secret_backend.py +47 -0
- pulumi_vault/ldap/secret_backend.py +75 -35
- pulumi_vault/mount.py +47 -0
- pulumi_vault/nomad_secret_backend.py +660 -21
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/outputs.py +153 -0
- pulumi_vault/pkisecret/backend_config_scep.py +68 -21
- pulumi_vault/pkisecret/get_backend_config_scep.py +21 -1
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/rabbitmq/secret_backend.py +707 -35
- pulumi_vault/ssh/secret_backend_ca.py +101 -7
- pulumi_vault/terraformcloud/secret_backend.py +707 -28
- pulumi_vault/transit/secret_backend_key.py +49 -21
- {pulumi_vault-7.2.0a1755297899.dist-info → pulumi_vault-7.2.1.dist-info}/METADATA +1 -1
- {pulumi_vault-7.2.0a1755297899.dist-info → pulumi_vault-7.2.1.dist-info}/RECORD +27 -25
- {pulumi_vault-7.2.0a1755297899.dist-info → pulumi_vault-7.2.1.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1755297899.dist-info → pulumi_vault-7.2.1.dist-info}/top_level.txt +0 -0
@@ -20,24 +20,41 @@ __all__ = ['NomadSecretBackendArgs', 'NomadSecretBackend']
|
|
20
20
|
class NomadSecretBackendArgs:
|
21
21
|
def __init__(__self__, *,
|
22
22
|
address: Optional[pulumi.Input[_builtins.str]] = None,
|
23
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
24
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
25
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
26
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
23
27
|
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
24
28
|
ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
25
29
|
client_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
26
30
|
client_key: Optional[pulumi.Input[_builtins.str]] = None,
|
27
31
|
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
32
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
28
33
|
description: Optional[pulumi.Input[_builtins.str]] = None,
|
29
34
|
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
35
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
36
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
37
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
38
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
30
39
|
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
31
40
|
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
32
41
|
max_token_name_length: Optional[pulumi.Input[_builtins.int]] = None,
|
33
42
|
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
34
43
|
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
44
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
45
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
46
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
47
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
35
48
|
token: Optional[pulumi.Input[_builtins.str]] = None,
|
36
49
|
ttl: Optional[pulumi.Input[_builtins.int]] = None):
|
37
50
|
"""
|
38
51
|
The set of arguments for constructing a NomadSecretBackend resource.
|
39
52
|
:param pulumi.Input[_builtins.str] address: Specifies the address of the Nomad instance, provided
|
40
53
|
as "protocol://host:port" like "http://127.0.0.1:4646".
|
54
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
55
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
56
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
57
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
41
58
|
:param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at. Must
|
42
59
|
not begin or end with a `/`. Defaults to `nomad`.
|
43
60
|
:param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
|
@@ -45,11 +62,16 @@ class NomadSecretBackendArgs:
|
|
45
62
|
:param pulumi.Input[_builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
|
46
63
|
:param pulumi.Input[_builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
|
47
64
|
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
|
48
|
-
:param pulumi.Input[_builtins.str]
|
65
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
66
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
|
49
67
|
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
50
68
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
51
|
-
:param pulumi.Input[_builtins.bool]
|
52
|
-
|
69
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
70
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
71
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
72
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
73
|
+
:param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
|
74
|
+
use when checking the last rotation time.
|
53
75
|
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
54
76
|
:param pulumi.Input[_builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
|
55
77
|
generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
|
@@ -59,11 +81,23 @@ class NomadSecretBackendArgs:
|
|
59
81
|
The value should not contain leading or trailing forward slashes.
|
60
82
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
61
83
|
*Available only for Vault Enterprise*.
|
84
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
85
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
86
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
87
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
62
88
|
:param pulumi.Input[_builtins.str] token: Specifies the Nomad Management token to use.
|
63
89
|
:param pulumi.Input[_builtins.int] ttl: Specifies the ttl of the lease for the generated token.
|
64
90
|
"""
|
65
91
|
if address is not None:
|
66
92
|
pulumi.set(__self__, "address", address)
|
93
|
+
if allowed_managed_keys is not None:
|
94
|
+
pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
|
95
|
+
if allowed_response_headers is not None:
|
96
|
+
pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
|
97
|
+
if audit_non_hmac_request_keys is not None:
|
98
|
+
pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
|
99
|
+
if audit_non_hmac_response_keys is not None:
|
100
|
+
pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
|
67
101
|
if backend is not None:
|
68
102
|
pulumi.set(__self__, "backend", backend)
|
69
103
|
if ca_cert is not None:
|
@@ -74,10 +108,20 @@ class NomadSecretBackendArgs:
|
|
74
108
|
pulumi.set(__self__, "client_key", client_key)
|
75
109
|
if default_lease_ttl_seconds is not None:
|
76
110
|
pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
|
111
|
+
if delegated_auth_accessors is not None:
|
112
|
+
pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
|
77
113
|
if description is not None:
|
78
114
|
pulumi.set(__self__, "description", description)
|
79
115
|
if disable_remount is not None:
|
80
116
|
pulumi.set(__self__, "disable_remount", disable_remount)
|
117
|
+
if external_entropy_access is not None:
|
118
|
+
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
119
|
+
if force_no_cache is not None:
|
120
|
+
pulumi.set(__self__, "force_no_cache", force_no_cache)
|
121
|
+
if identity_token_key is not None:
|
122
|
+
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
123
|
+
if listing_visibility is not None:
|
124
|
+
pulumi.set(__self__, "listing_visibility", listing_visibility)
|
81
125
|
if local is not None:
|
82
126
|
pulumi.set(__self__, "local", local)
|
83
127
|
if max_lease_ttl_seconds is not None:
|
@@ -88,6 +132,14 @@ class NomadSecretBackendArgs:
|
|
88
132
|
pulumi.set(__self__, "max_ttl", max_ttl)
|
89
133
|
if namespace is not None:
|
90
134
|
pulumi.set(__self__, "namespace", namespace)
|
135
|
+
if options is not None:
|
136
|
+
pulumi.set(__self__, "options", options)
|
137
|
+
if passthrough_request_headers is not None:
|
138
|
+
pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
|
139
|
+
if plugin_version is not None:
|
140
|
+
pulumi.set(__self__, "plugin_version", plugin_version)
|
141
|
+
if seal_wrap is not None:
|
142
|
+
pulumi.set(__self__, "seal_wrap", seal_wrap)
|
91
143
|
if token is not None:
|
92
144
|
pulumi.set(__self__, "token", token)
|
93
145
|
if ttl is not None:
|
@@ -106,6 +158,54 @@ class NomadSecretBackendArgs:
|
|
106
158
|
def address(self, value: Optional[pulumi.Input[_builtins.str]]):
|
107
159
|
pulumi.set(self, "address", value)
|
108
160
|
|
161
|
+
@_builtins.property
|
162
|
+
@pulumi.getter(name="allowedManagedKeys")
|
163
|
+
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
164
|
+
"""
|
165
|
+
List of managed key registry entry names that the mount in question is allowed to access
|
166
|
+
"""
|
167
|
+
return pulumi.get(self, "allowed_managed_keys")
|
168
|
+
|
169
|
+
@allowed_managed_keys.setter
|
170
|
+
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
171
|
+
pulumi.set(self, "allowed_managed_keys", value)
|
172
|
+
|
173
|
+
@_builtins.property
|
174
|
+
@pulumi.getter(name="allowedResponseHeaders")
|
175
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
176
|
+
"""
|
177
|
+
List of headers to allow and pass from the request to the plugin
|
178
|
+
"""
|
179
|
+
return pulumi.get(self, "allowed_response_headers")
|
180
|
+
|
181
|
+
@allowed_response_headers.setter
|
182
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
183
|
+
pulumi.set(self, "allowed_response_headers", value)
|
184
|
+
|
185
|
+
@_builtins.property
|
186
|
+
@pulumi.getter(name="auditNonHmacRequestKeys")
|
187
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
188
|
+
"""
|
189
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
190
|
+
"""
|
191
|
+
return pulumi.get(self, "audit_non_hmac_request_keys")
|
192
|
+
|
193
|
+
@audit_non_hmac_request_keys.setter
|
194
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
195
|
+
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
196
|
+
|
197
|
+
@_builtins.property
|
198
|
+
@pulumi.getter(name="auditNonHmacResponseKeys")
|
199
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
200
|
+
"""
|
201
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
202
|
+
"""
|
203
|
+
return pulumi.get(self, "audit_non_hmac_response_keys")
|
204
|
+
|
205
|
+
@audit_non_hmac_response_keys.setter
|
206
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
207
|
+
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
208
|
+
|
109
209
|
@_builtins.property
|
110
210
|
@pulumi.getter
|
111
211
|
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
@@ -168,11 +268,23 @@ class NomadSecretBackendArgs:
|
|
168
268
|
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
169
269
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
170
270
|
|
271
|
+
@_builtins.property
|
272
|
+
@pulumi.getter(name="delegatedAuthAccessors")
|
273
|
+
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
274
|
+
"""
|
275
|
+
List of headers to allow and pass from the request to the plugin
|
276
|
+
"""
|
277
|
+
return pulumi.get(self, "delegated_auth_accessors")
|
278
|
+
|
279
|
+
@delegated_auth_accessors.setter
|
280
|
+
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
281
|
+
pulumi.set(self, "delegated_auth_accessors", value)
|
282
|
+
|
171
283
|
@_builtins.property
|
172
284
|
@pulumi.getter
|
173
285
|
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
174
286
|
"""
|
175
|
-
Human-friendly description of the mount for the
|
287
|
+
Human-friendly description of the mount for the backend.
|
176
288
|
"""
|
177
289
|
return pulumi.get(self, "description")
|
178
290
|
|
@@ -193,12 +305,60 @@ class NomadSecretBackendArgs:
|
|
193
305
|
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
194
306
|
pulumi.set(self, "disable_remount", value)
|
195
307
|
|
308
|
+
@_builtins.property
|
309
|
+
@pulumi.getter(name="externalEntropyAccess")
|
310
|
+
def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
311
|
+
"""
|
312
|
+
Enable the secrets engine to access Vault's external entropy source
|
313
|
+
"""
|
314
|
+
return pulumi.get(self, "external_entropy_access")
|
315
|
+
|
316
|
+
@external_entropy_access.setter
|
317
|
+
def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
318
|
+
pulumi.set(self, "external_entropy_access", value)
|
319
|
+
|
320
|
+
@_builtins.property
|
321
|
+
@pulumi.getter(name="forceNoCache")
|
322
|
+
def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
323
|
+
"""
|
324
|
+
If set to true, disables caching.
|
325
|
+
"""
|
326
|
+
return pulumi.get(self, "force_no_cache")
|
327
|
+
|
328
|
+
@force_no_cache.setter
|
329
|
+
def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
330
|
+
pulumi.set(self, "force_no_cache", value)
|
331
|
+
|
332
|
+
@_builtins.property
|
333
|
+
@pulumi.getter(name="identityTokenKey")
|
334
|
+
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
335
|
+
"""
|
336
|
+
The key to use for signing plugin workload identity tokens
|
337
|
+
"""
|
338
|
+
return pulumi.get(self, "identity_token_key")
|
339
|
+
|
340
|
+
@identity_token_key.setter
|
341
|
+
def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
342
|
+
pulumi.set(self, "identity_token_key", value)
|
343
|
+
|
344
|
+
@_builtins.property
|
345
|
+
@pulumi.getter(name="listingVisibility")
|
346
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
347
|
+
"""
|
348
|
+
Specifies whether to show this mount in the UI-specific listing endpoint
|
349
|
+
"""
|
350
|
+
return pulumi.get(self, "listing_visibility")
|
351
|
+
|
352
|
+
@listing_visibility.setter
|
353
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
354
|
+
pulumi.set(self, "listing_visibility", value)
|
355
|
+
|
196
356
|
@_builtins.property
|
197
357
|
@pulumi.getter
|
198
358
|
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
199
359
|
"""
|
200
|
-
Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
201
|
-
|
360
|
+
Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
|
361
|
+
use when checking the last rotation time.
|
202
362
|
"""
|
203
363
|
return pulumi.get(self, "local")
|
204
364
|
|
@@ -259,6 +419,54 @@ class NomadSecretBackendArgs:
|
|
259
419
|
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
260
420
|
pulumi.set(self, "namespace", value)
|
261
421
|
|
422
|
+
@_builtins.property
|
423
|
+
@pulumi.getter
|
424
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
425
|
+
"""
|
426
|
+
Specifies mount type specific options that are passed to the backend
|
427
|
+
"""
|
428
|
+
return pulumi.get(self, "options")
|
429
|
+
|
430
|
+
@options.setter
|
431
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
432
|
+
pulumi.set(self, "options", value)
|
433
|
+
|
434
|
+
@_builtins.property
|
435
|
+
@pulumi.getter(name="passthroughRequestHeaders")
|
436
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
437
|
+
"""
|
438
|
+
List of headers to allow and pass from the request to the plugin
|
439
|
+
"""
|
440
|
+
return pulumi.get(self, "passthrough_request_headers")
|
441
|
+
|
442
|
+
@passthrough_request_headers.setter
|
443
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
444
|
+
pulumi.set(self, "passthrough_request_headers", value)
|
445
|
+
|
446
|
+
@_builtins.property
|
447
|
+
@pulumi.getter(name="pluginVersion")
|
448
|
+
def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
|
449
|
+
"""
|
450
|
+
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
451
|
+
"""
|
452
|
+
return pulumi.get(self, "plugin_version")
|
453
|
+
|
454
|
+
@plugin_version.setter
|
455
|
+
def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
|
456
|
+
pulumi.set(self, "plugin_version", value)
|
457
|
+
|
458
|
+
@_builtins.property
|
459
|
+
@pulumi.getter(name="sealWrap")
|
460
|
+
def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
461
|
+
"""
|
462
|
+
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
463
|
+
"""
|
464
|
+
return pulumi.get(self, "seal_wrap")
|
465
|
+
|
466
|
+
@seal_wrap.setter
|
467
|
+
def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
468
|
+
pulumi.set(self, "seal_wrap", value)
|
469
|
+
|
262
470
|
@_builtins.property
|
263
471
|
@pulumi.getter
|
264
472
|
def token(self) -> Optional[pulumi.Input[_builtins.str]]:
|
@@ -287,25 +495,44 @@ class NomadSecretBackendArgs:
|
|
287
495
|
@pulumi.input_type
|
288
496
|
class _NomadSecretBackendState:
|
289
497
|
def __init__(__self__, *,
|
498
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
290
499
|
address: Optional[pulumi.Input[_builtins.str]] = None,
|
500
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
501
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
502
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
503
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
291
504
|
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
292
505
|
ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
293
506
|
client_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
294
507
|
client_key: Optional[pulumi.Input[_builtins.str]] = None,
|
295
508
|
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
509
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
296
510
|
description: Optional[pulumi.Input[_builtins.str]] = None,
|
297
511
|
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
512
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
513
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
514
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
515
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
298
516
|
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
299
517
|
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
300
518
|
max_token_name_length: Optional[pulumi.Input[_builtins.int]] = None,
|
301
519
|
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
302
520
|
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
521
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
522
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
523
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
524
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
303
525
|
token: Optional[pulumi.Input[_builtins.str]] = None,
|
304
526
|
ttl: Optional[pulumi.Input[_builtins.int]] = None):
|
305
527
|
"""
|
306
528
|
Input properties used for looking up and filtering NomadSecretBackend resources.
|
529
|
+
:param pulumi.Input[_builtins.str] accessor: Accessor of the mount
|
307
530
|
:param pulumi.Input[_builtins.str] address: Specifies the address of the Nomad instance, provided
|
308
531
|
as "protocol://host:port" like "http://127.0.0.1:4646".
|
532
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
533
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
534
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
535
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
309
536
|
:param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at. Must
|
310
537
|
not begin or end with a `/`. Defaults to `nomad`.
|
311
538
|
:param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
|
@@ -313,11 +540,16 @@ class _NomadSecretBackendState:
|
|
313
540
|
:param pulumi.Input[_builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
|
314
541
|
:param pulumi.Input[_builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
|
315
542
|
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
|
316
|
-
:param pulumi.Input[_builtins.str]
|
543
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
544
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
|
317
545
|
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
318
546
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
319
|
-
:param pulumi.Input[_builtins.bool]
|
320
|
-
|
547
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
548
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
549
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
550
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
551
|
+
:param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
|
552
|
+
use when checking the last rotation time.
|
321
553
|
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
322
554
|
:param pulumi.Input[_builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
|
323
555
|
generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
|
@@ -327,11 +559,25 @@ class _NomadSecretBackendState:
|
|
327
559
|
The value should not contain leading or trailing forward slashes.
|
328
560
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
329
561
|
*Available only for Vault Enterprise*.
|
562
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
563
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
564
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
565
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
330
566
|
:param pulumi.Input[_builtins.str] token: Specifies the Nomad Management token to use.
|
331
567
|
:param pulumi.Input[_builtins.int] ttl: Specifies the ttl of the lease for the generated token.
|
332
568
|
"""
|
569
|
+
if accessor is not None:
|
570
|
+
pulumi.set(__self__, "accessor", accessor)
|
333
571
|
if address is not None:
|
334
572
|
pulumi.set(__self__, "address", address)
|
573
|
+
if allowed_managed_keys is not None:
|
574
|
+
pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
|
575
|
+
if allowed_response_headers is not None:
|
576
|
+
pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
|
577
|
+
if audit_non_hmac_request_keys is not None:
|
578
|
+
pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
|
579
|
+
if audit_non_hmac_response_keys is not None:
|
580
|
+
pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
|
335
581
|
if backend is not None:
|
336
582
|
pulumi.set(__self__, "backend", backend)
|
337
583
|
if ca_cert is not None:
|
@@ -342,10 +588,20 @@ class _NomadSecretBackendState:
|
|
342
588
|
pulumi.set(__self__, "client_key", client_key)
|
343
589
|
if default_lease_ttl_seconds is not None:
|
344
590
|
pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
|
591
|
+
if delegated_auth_accessors is not None:
|
592
|
+
pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
|
345
593
|
if description is not None:
|
346
594
|
pulumi.set(__self__, "description", description)
|
347
595
|
if disable_remount is not None:
|
348
596
|
pulumi.set(__self__, "disable_remount", disable_remount)
|
597
|
+
if external_entropy_access is not None:
|
598
|
+
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
599
|
+
if force_no_cache is not None:
|
600
|
+
pulumi.set(__self__, "force_no_cache", force_no_cache)
|
601
|
+
if identity_token_key is not None:
|
602
|
+
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
603
|
+
if listing_visibility is not None:
|
604
|
+
pulumi.set(__self__, "listing_visibility", listing_visibility)
|
349
605
|
if local is not None:
|
350
606
|
pulumi.set(__self__, "local", local)
|
351
607
|
if max_lease_ttl_seconds is not None:
|
@@ -356,11 +612,31 @@ class _NomadSecretBackendState:
|
|
356
612
|
pulumi.set(__self__, "max_ttl", max_ttl)
|
357
613
|
if namespace is not None:
|
358
614
|
pulumi.set(__self__, "namespace", namespace)
|
615
|
+
if options is not None:
|
616
|
+
pulumi.set(__self__, "options", options)
|
617
|
+
if passthrough_request_headers is not None:
|
618
|
+
pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
|
619
|
+
if plugin_version is not None:
|
620
|
+
pulumi.set(__self__, "plugin_version", plugin_version)
|
621
|
+
if seal_wrap is not None:
|
622
|
+
pulumi.set(__self__, "seal_wrap", seal_wrap)
|
359
623
|
if token is not None:
|
360
624
|
pulumi.set(__self__, "token", token)
|
361
625
|
if ttl is not None:
|
362
626
|
pulumi.set(__self__, "ttl", ttl)
|
363
627
|
|
628
|
+
@_builtins.property
|
629
|
+
@pulumi.getter
|
630
|
+
def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
|
631
|
+
"""
|
632
|
+
Accessor of the mount
|
633
|
+
"""
|
634
|
+
return pulumi.get(self, "accessor")
|
635
|
+
|
636
|
+
@accessor.setter
|
637
|
+
def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
|
638
|
+
pulumi.set(self, "accessor", value)
|
639
|
+
|
364
640
|
@_builtins.property
|
365
641
|
@pulumi.getter
|
366
642
|
def address(self) -> Optional[pulumi.Input[_builtins.str]]:
|
@@ -374,6 +650,54 @@ class _NomadSecretBackendState:
|
|
374
650
|
def address(self, value: Optional[pulumi.Input[_builtins.str]]):
|
375
651
|
pulumi.set(self, "address", value)
|
376
652
|
|
653
|
+
@_builtins.property
|
654
|
+
@pulumi.getter(name="allowedManagedKeys")
|
655
|
+
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
656
|
+
"""
|
657
|
+
List of managed key registry entry names that the mount in question is allowed to access
|
658
|
+
"""
|
659
|
+
return pulumi.get(self, "allowed_managed_keys")
|
660
|
+
|
661
|
+
@allowed_managed_keys.setter
|
662
|
+
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
663
|
+
pulumi.set(self, "allowed_managed_keys", value)
|
664
|
+
|
665
|
+
@_builtins.property
|
666
|
+
@pulumi.getter(name="allowedResponseHeaders")
|
667
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
668
|
+
"""
|
669
|
+
List of headers to allow and pass from the request to the plugin
|
670
|
+
"""
|
671
|
+
return pulumi.get(self, "allowed_response_headers")
|
672
|
+
|
673
|
+
@allowed_response_headers.setter
|
674
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
675
|
+
pulumi.set(self, "allowed_response_headers", value)
|
676
|
+
|
677
|
+
@_builtins.property
|
678
|
+
@pulumi.getter(name="auditNonHmacRequestKeys")
|
679
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
680
|
+
"""
|
681
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
682
|
+
"""
|
683
|
+
return pulumi.get(self, "audit_non_hmac_request_keys")
|
684
|
+
|
685
|
+
@audit_non_hmac_request_keys.setter
|
686
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
687
|
+
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
688
|
+
|
689
|
+
@_builtins.property
|
690
|
+
@pulumi.getter(name="auditNonHmacResponseKeys")
|
691
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
692
|
+
"""
|
693
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
694
|
+
"""
|
695
|
+
return pulumi.get(self, "audit_non_hmac_response_keys")
|
696
|
+
|
697
|
+
@audit_non_hmac_response_keys.setter
|
698
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
699
|
+
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
700
|
+
|
377
701
|
@_builtins.property
|
378
702
|
@pulumi.getter
|
379
703
|
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
@@ -436,11 +760,23 @@ class _NomadSecretBackendState:
|
|
436
760
|
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
437
761
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
438
762
|
|
763
|
+
@_builtins.property
|
764
|
+
@pulumi.getter(name="delegatedAuthAccessors")
|
765
|
+
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
766
|
+
"""
|
767
|
+
List of headers to allow and pass from the request to the plugin
|
768
|
+
"""
|
769
|
+
return pulumi.get(self, "delegated_auth_accessors")
|
770
|
+
|
771
|
+
@delegated_auth_accessors.setter
|
772
|
+
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
773
|
+
pulumi.set(self, "delegated_auth_accessors", value)
|
774
|
+
|
439
775
|
@_builtins.property
|
440
776
|
@pulumi.getter
|
441
777
|
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
442
778
|
"""
|
443
|
-
Human-friendly description of the mount for the
|
779
|
+
Human-friendly description of the mount for the backend.
|
444
780
|
"""
|
445
781
|
return pulumi.get(self, "description")
|
446
782
|
|
@@ -461,12 +797,60 @@ class _NomadSecretBackendState:
|
|
461
797
|
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
462
798
|
pulumi.set(self, "disable_remount", value)
|
463
799
|
|
800
|
+
@_builtins.property
|
801
|
+
@pulumi.getter(name="externalEntropyAccess")
|
802
|
+
def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
803
|
+
"""
|
804
|
+
Enable the secrets engine to access Vault's external entropy source
|
805
|
+
"""
|
806
|
+
return pulumi.get(self, "external_entropy_access")
|
807
|
+
|
808
|
+
@external_entropy_access.setter
|
809
|
+
def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
810
|
+
pulumi.set(self, "external_entropy_access", value)
|
811
|
+
|
812
|
+
@_builtins.property
|
813
|
+
@pulumi.getter(name="forceNoCache")
|
814
|
+
def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
815
|
+
"""
|
816
|
+
If set to true, disables caching.
|
817
|
+
"""
|
818
|
+
return pulumi.get(self, "force_no_cache")
|
819
|
+
|
820
|
+
@force_no_cache.setter
|
821
|
+
def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
822
|
+
pulumi.set(self, "force_no_cache", value)
|
823
|
+
|
824
|
+
@_builtins.property
|
825
|
+
@pulumi.getter(name="identityTokenKey")
|
826
|
+
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
827
|
+
"""
|
828
|
+
The key to use for signing plugin workload identity tokens
|
829
|
+
"""
|
830
|
+
return pulumi.get(self, "identity_token_key")
|
831
|
+
|
832
|
+
@identity_token_key.setter
|
833
|
+
def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
834
|
+
pulumi.set(self, "identity_token_key", value)
|
835
|
+
|
836
|
+
@_builtins.property
|
837
|
+
@pulumi.getter(name="listingVisibility")
|
838
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
839
|
+
"""
|
840
|
+
Specifies whether to show this mount in the UI-specific listing endpoint
|
841
|
+
"""
|
842
|
+
return pulumi.get(self, "listing_visibility")
|
843
|
+
|
844
|
+
@listing_visibility.setter
|
845
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
846
|
+
pulumi.set(self, "listing_visibility", value)
|
847
|
+
|
464
848
|
@_builtins.property
|
465
849
|
@pulumi.getter
|
466
850
|
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
467
851
|
"""
|
468
|
-
Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
469
|
-
|
852
|
+
Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
|
853
|
+
use when checking the last rotation time.
|
470
854
|
"""
|
471
855
|
return pulumi.get(self, "local")
|
472
856
|
|
@@ -527,6 +911,54 @@ class _NomadSecretBackendState:
|
|
527
911
|
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
528
912
|
pulumi.set(self, "namespace", value)
|
529
913
|
|
914
|
+
@_builtins.property
|
915
|
+
@pulumi.getter
|
916
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
917
|
+
"""
|
918
|
+
Specifies mount type specific options that are passed to the backend
|
919
|
+
"""
|
920
|
+
return pulumi.get(self, "options")
|
921
|
+
|
922
|
+
@options.setter
|
923
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
924
|
+
pulumi.set(self, "options", value)
|
925
|
+
|
926
|
+
@_builtins.property
|
927
|
+
@pulumi.getter(name="passthroughRequestHeaders")
|
928
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
929
|
+
"""
|
930
|
+
List of headers to allow and pass from the request to the plugin
|
931
|
+
"""
|
932
|
+
return pulumi.get(self, "passthrough_request_headers")
|
933
|
+
|
934
|
+
@passthrough_request_headers.setter
|
935
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
936
|
+
pulumi.set(self, "passthrough_request_headers", value)
|
937
|
+
|
938
|
+
@_builtins.property
|
939
|
+
@pulumi.getter(name="pluginVersion")
|
940
|
+
def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
|
941
|
+
"""
|
942
|
+
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
943
|
+
"""
|
944
|
+
return pulumi.get(self, "plugin_version")
|
945
|
+
|
946
|
+
@plugin_version.setter
|
947
|
+
def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
|
948
|
+
pulumi.set(self, "plugin_version", value)
|
949
|
+
|
950
|
+
@_builtins.property
|
951
|
+
@pulumi.getter(name="sealWrap")
|
952
|
+
def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
953
|
+
"""
|
954
|
+
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
955
|
+
"""
|
956
|
+
return pulumi.get(self, "seal_wrap")
|
957
|
+
|
958
|
+
@seal_wrap.setter
|
959
|
+
def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
960
|
+
pulumi.set(self, "seal_wrap", value)
|
961
|
+
|
530
962
|
@_builtins.property
|
531
963
|
@pulumi.getter
|
532
964
|
def token(self) -> Optional[pulumi.Input[_builtins.str]]:
|
@@ -559,18 +991,31 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
559
991
|
resource_name: str,
|
560
992
|
opts: Optional[pulumi.ResourceOptions] = None,
|
561
993
|
address: Optional[pulumi.Input[_builtins.str]] = None,
|
994
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
995
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
996
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
997
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
562
998
|
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
563
999
|
ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
564
1000
|
client_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
565
1001
|
client_key: Optional[pulumi.Input[_builtins.str]] = None,
|
566
1002
|
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1003
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
567
1004
|
description: Optional[pulumi.Input[_builtins.str]] = None,
|
568
1005
|
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
1006
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
1007
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
1008
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1009
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
569
1010
|
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
570
1011
|
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
571
1012
|
max_token_name_length: Optional[pulumi.Input[_builtins.int]] = None,
|
572
1013
|
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
573
1014
|
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1015
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
1016
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1017
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
1018
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
574
1019
|
token: Optional[pulumi.Input[_builtins.str]] = None,
|
575
1020
|
ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
576
1021
|
__props__=None):
|
@@ -604,6 +1049,10 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
604
1049
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
605
1050
|
:param pulumi.Input[_builtins.str] address: Specifies the address of the Nomad instance, provided
|
606
1051
|
as "protocol://host:port" like "http://127.0.0.1:4646".
|
1052
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
1053
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
1054
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1055
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
607
1056
|
:param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at. Must
|
608
1057
|
not begin or end with a `/`. Defaults to `nomad`.
|
609
1058
|
:param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
|
@@ -611,11 +1060,16 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
611
1060
|
:param pulumi.Input[_builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
|
612
1061
|
:param pulumi.Input[_builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
|
613
1062
|
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
|
614
|
-
:param pulumi.Input[_builtins.str]
|
1063
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
1064
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
|
615
1065
|
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
616
1066
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
617
|
-
:param pulumi.Input[_builtins.bool]
|
618
|
-
|
1067
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
1068
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
1069
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
1070
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
1071
|
+
:param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
|
1072
|
+
use when checking the last rotation time.
|
619
1073
|
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
620
1074
|
:param pulumi.Input[_builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
|
621
1075
|
generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
|
@@ -625,6 +1079,10 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
625
1079
|
The value should not contain leading or trailing forward slashes.
|
626
1080
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
627
1081
|
*Available only for Vault Enterprise*.
|
1082
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
1083
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
1084
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1085
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
628
1086
|
:param pulumi.Input[_builtins.str] token: Specifies the Nomad Management token to use.
|
629
1087
|
:param pulumi.Input[_builtins.int] ttl: Specifies the ttl of the lease for the generated token.
|
630
1088
|
"""
|
@@ -676,18 +1134,31 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
676
1134
|
resource_name: str,
|
677
1135
|
opts: Optional[pulumi.ResourceOptions] = None,
|
678
1136
|
address: Optional[pulumi.Input[_builtins.str]] = None,
|
1137
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1138
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1139
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1140
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
679
1141
|
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
680
1142
|
ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
681
1143
|
client_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
682
1144
|
client_key: Optional[pulumi.Input[_builtins.str]] = None,
|
683
1145
|
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1146
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
684
1147
|
description: Optional[pulumi.Input[_builtins.str]] = None,
|
685
1148
|
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
1149
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
1150
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
1151
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1152
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
686
1153
|
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
687
1154
|
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
688
1155
|
max_token_name_length: Optional[pulumi.Input[_builtins.int]] = None,
|
689
1156
|
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
690
1157
|
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1158
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
1159
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1160
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
1161
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
691
1162
|
token: Optional[pulumi.Input[_builtins.str]] = None,
|
692
1163
|
ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
693
1164
|
__props__=None):
|
@@ -700,20 +1171,34 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
700
1171
|
__props__ = NomadSecretBackendArgs.__new__(NomadSecretBackendArgs)
|
701
1172
|
|
702
1173
|
__props__.__dict__["address"] = address
|
1174
|
+
__props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
|
1175
|
+
__props__.__dict__["allowed_response_headers"] = allowed_response_headers
|
1176
|
+
__props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
|
1177
|
+
__props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
|
703
1178
|
__props__.__dict__["backend"] = backend
|
704
1179
|
__props__.__dict__["ca_cert"] = ca_cert
|
705
1180
|
__props__.__dict__["client_cert"] = None if client_cert is None else pulumi.Output.secret(client_cert)
|
706
1181
|
__props__.__dict__["client_key"] = None if client_key is None else pulumi.Output.secret(client_key)
|
707
1182
|
__props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
|
1183
|
+
__props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
|
708
1184
|
__props__.__dict__["description"] = description
|
709
1185
|
__props__.__dict__["disable_remount"] = disable_remount
|
1186
|
+
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
1187
|
+
__props__.__dict__["force_no_cache"] = force_no_cache
|
1188
|
+
__props__.__dict__["identity_token_key"] = identity_token_key
|
1189
|
+
__props__.__dict__["listing_visibility"] = listing_visibility
|
710
1190
|
__props__.__dict__["local"] = local
|
711
1191
|
__props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
|
712
1192
|
__props__.__dict__["max_token_name_length"] = max_token_name_length
|
713
1193
|
__props__.__dict__["max_ttl"] = max_ttl
|
714
1194
|
__props__.__dict__["namespace"] = namespace
|
1195
|
+
__props__.__dict__["options"] = options
|
1196
|
+
__props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
|
1197
|
+
__props__.__dict__["plugin_version"] = plugin_version
|
1198
|
+
__props__.__dict__["seal_wrap"] = seal_wrap
|
715
1199
|
__props__.__dict__["token"] = None if token is None else pulumi.Output.secret(token)
|
716
1200
|
__props__.__dict__["ttl"] = ttl
|
1201
|
+
__props__.__dict__["accessor"] = None
|
717
1202
|
secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["clientCert", "clientKey", "token"])
|
718
1203
|
opts = pulumi.ResourceOptions.merge(opts, secret_opts)
|
719
1204
|
super(NomadSecretBackend, __self__).__init__(
|
@@ -726,19 +1211,33 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
726
1211
|
def get(resource_name: str,
|
727
1212
|
id: pulumi.Input[str],
|
728
1213
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1214
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
729
1215
|
address: Optional[pulumi.Input[_builtins.str]] = None,
|
1216
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1217
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1218
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1219
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
730
1220
|
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
731
1221
|
ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
732
1222
|
client_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
733
1223
|
client_key: Optional[pulumi.Input[_builtins.str]] = None,
|
734
1224
|
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1225
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
735
1226
|
description: Optional[pulumi.Input[_builtins.str]] = None,
|
736
1227
|
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
1228
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
1229
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
1230
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1231
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
737
1232
|
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
738
1233
|
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
739
1234
|
max_token_name_length: Optional[pulumi.Input[_builtins.int]] = None,
|
740
1235
|
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
741
1236
|
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1237
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
1238
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1239
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
1240
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
742
1241
|
token: Optional[pulumi.Input[_builtins.str]] = None,
|
743
1242
|
ttl: Optional[pulumi.Input[_builtins.int]] = None) -> 'NomadSecretBackend':
|
744
1243
|
"""
|
@@ -748,8 +1247,13 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
748
1247
|
:param str resource_name: The unique name of the resulting resource.
|
749
1248
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
750
1249
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
1250
|
+
:param pulumi.Input[_builtins.str] accessor: Accessor of the mount
|
751
1251
|
:param pulumi.Input[_builtins.str] address: Specifies the address of the Nomad instance, provided
|
752
1252
|
as "protocol://host:port" like "http://127.0.0.1:4646".
|
1253
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
1254
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
1255
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1256
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
753
1257
|
:param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at. Must
|
754
1258
|
not begin or end with a `/`. Defaults to `nomad`.
|
755
1259
|
:param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
|
@@ -757,11 +1261,16 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
757
1261
|
:param pulumi.Input[_builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
|
758
1262
|
:param pulumi.Input[_builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
|
759
1263
|
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
|
760
|
-
:param pulumi.Input[_builtins.str]
|
1264
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
1265
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
|
761
1266
|
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
762
1267
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
763
|
-
:param pulumi.Input[_builtins.bool]
|
764
|
-
|
1268
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
1269
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
1270
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
1271
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
1272
|
+
:param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
|
1273
|
+
use when checking the last rotation time.
|
765
1274
|
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
766
1275
|
:param pulumi.Input[_builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
|
767
1276
|
generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
|
@@ -771,6 +1280,10 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
771
1280
|
The value should not contain leading or trailing forward slashes.
|
772
1281
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
773
1282
|
*Available only for Vault Enterprise*.
|
1283
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
1284
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
1285
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1286
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
774
1287
|
:param pulumi.Input[_builtins.str] token: Specifies the Nomad Management token to use.
|
775
1288
|
:param pulumi.Input[_builtins.int] ttl: Specifies the ttl of the lease for the generated token.
|
776
1289
|
"""
|
@@ -778,23 +1291,45 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
778
1291
|
|
779
1292
|
__props__ = _NomadSecretBackendState.__new__(_NomadSecretBackendState)
|
780
1293
|
|
1294
|
+
__props__.__dict__["accessor"] = accessor
|
781
1295
|
__props__.__dict__["address"] = address
|
1296
|
+
__props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
|
1297
|
+
__props__.__dict__["allowed_response_headers"] = allowed_response_headers
|
1298
|
+
__props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
|
1299
|
+
__props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
|
782
1300
|
__props__.__dict__["backend"] = backend
|
783
1301
|
__props__.__dict__["ca_cert"] = ca_cert
|
784
1302
|
__props__.__dict__["client_cert"] = client_cert
|
785
1303
|
__props__.__dict__["client_key"] = client_key
|
786
1304
|
__props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
|
1305
|
+
__props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
|
787
1306
|
__props__.__dict__["description"] = description
|
788
1307
|
__props__.__dict__["disable_remount"] = disable_remount
|
1308
|
+
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
1309
|
+
__props__.__dict__["force_no_cache"] = force_no_cache
|
1310
|
+
__props__.__dict__["identity_token_key"] = identity_token_key
|
1311
|
+
__props__.__dict__["listing_visibility"] = listing_visibility
|
789
1312
|
__props__.__dict__["local"] = local
|
790
1313
|
__props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
|
791
1314
|
__props__.__dict__["max_token_name_length"] = max_token_name_length
|
792
1315
|
__props__.__dict__["max_ttl"] = max_ttl
|
793
1316
|
__props__.__dict__["namespace"] = namespace
|
1317
|
+
__props__.__dict__["options"] = options
|
1318
|
+
__props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
|
1319
|
+
__props__.__dict__["plugin_version"] = plugin_version
|
1320
|
+
__props__.__dict__["seal_wrap"] = seal_wrap
|
794
1321
|
__props__.__dict__["token"] = token
|
795
1322
|
__props__.__dict__["ttl"] = ttl
|
796
1323
|
return NomadSecretBackend(resource_name, opts=opts, __props__=__props__)
|
797
1324
|
|
1325
|
+
@_builtins.property
|
1326
|
+
@pulumi.getter
|
1327
|
+
def accessor(self) -> pulumi.Output[_builtins.str]:
|
1328
|
+
"""
|
1329
|
+
Accessor of the mount
|
1330
|
+
"""
|
1331
|
+
return pulumi.get(self, "accessor")
|
1332
|
+
|
798
1333
|
@_builtins.property
|
799
1334
|
@pulumi.getter
|
800
1335
|
def address(self) -> pulumi.Output[Optional[_builtins.str]]:
|
@@ -804,6 +1339,38 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
804
1339
|
"""
|
805
1340
|
return pulumi.get(self, "address")
|
806
1341
|
|
1342
|
+
@_builtins.property
|
1343
|
+
@pulumi.getter(name="allowedManagedKeys")
|
1344
|
+
def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1345
|
+
"""
|
1346
|
+
List of managed key registry entry names that the mount in question is allowed to access
|
1347
|
+
"""
|
1348
|
+
return pulumi.get(self, "allowed_managed_keys")
|
1349
|
+
|
1350
|
+
@_builtins.property
|
1351
|
+
@pulumi.getter(name="allowedResponseHeaders")
|
1352
|
+
def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1353
|
+
"""
|
1354
|
+
List of headers to allow and pass from the request to the plugin
|
1355
|
+
"""
|
1356
|
+
return pulumi.get(self, "allowed_response_headers")
|
1357
|
+
|
1358
|
+
@_builtins.property
|
1359
|
+
@pulumi.getter(name="auditNonHmacRequestKeys")
|
1360
|
+
def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
1361
|
+
"""
|
1362
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1363
|
+
"""
|
1364
|
+
return pulumi.get(self, "audit_non_hmac_request_keys")
|
1365
|
+
|
1366
|
+
@_builtins.property
|
1367
|
+
@pulumi.getter(name="auditNonHmacResponseKeys")
|
1368
|
+
def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
1369
|
+
"""
|
1370
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1371
|
+
"""
|
1372
|
+
return pulumi.get(self, "audit_non_hmac_response_keys")
|
1373
|
+
|
807
1374
|
@_builtins.property
|
808
1375
|
@pulumi.getter
|
809
1376
|
def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
|
@@ -846,11 +1413,19 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
846
1413
|
"""
|
847
1414
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
848
1415
|
|
1416
|
+
@_builtins.property
|
1417
|
+
@pulumi.getter(name="delegatedAuthAccessors")
|
1418
|
+
def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1419
|
+
"""
|
1420
|
+
List of headers to allow and pass from the request to the plugin
|
1421
|
+
"""
|
1422
|
+
return pulumi.get(self, "delegated_auth_accessors")
|
1423
|
+
|
849
1424
|
@_builtins.property
|
850
1425
|
@pulumi.getter
|
851
1426
|
def description(self) -> pulumi.Output[Optional[_builtins.str]]:
|
852
1427
|
"""
|
853
|
-
Human-friendly description of the mount for the
|
1428
|
+
Human-friendly description of the mount for the backend.
|
854
1429
|
"""
|
855
1430
|
return pulumi.get(self, "description")
|
856
1431
|
|
@@ -863,12 +1438,44 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
863
1438
|
"""
|
864
1439
|
return pulumi.get(self, "disable_remount")
|
865
1440
|
|
1441
|
+
@_builtins.property
|
1442
|
+
@pulumi.getter(name="externalEntropyAccess")
|
1443
|
+
def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1444
|
+
"""
|
1445
|
+
Enable the secrets engine to access Vault's external entropy source
|
1446
|
+
"""
|
1447
|
+
return pulumi.get(self, "external_entropy_access")
|
1448
|
+
|
1449
|
+
@_builtins.property
|
1450
|
+
@pulumi.getter(name="forceNoCache")
|
1451
|
+
def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
|
1452
|
+
"""
|
1453
|
+
If set to true, disables caching.
|
1454
|
+
"""
|
1455
|
+
return pulumi.get(self, "force_no_cache")
|
1456
|
+
|
1457
|
+
@_builtins.property
|
1458
|
+
@pulumi.getter(name="identityTokenKey")
|
1459
|
+
def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1460
|
+
"""
|
1461
|
+
The key to use for signing plugin workload identity tokens
|
1462
|
+
"""
|
1463
|
+
return pulumi.get(self, "identity_token_key")
|
1464
|
+
|
1465
|
+
@_builtins.property
|
1466
|
+
@pulumi.getter(name="listingVisibility")
|
1467
|
+
def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1468
|
+
"""
|
1469
|
+
Specifies whether to show this mount in the UI-specific listing endpoint
|
1470
|
+
"""
|
1471
|
+
return pulumi.get(self, "listing_visibility")
|
1472
|
+
|
866
1473
|
@_builtins.property
|
867
1474
|
@pulumi.getter
|
868
1475
|
def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
869
1476
|
"""
|
870
|
-
Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
871
|
-
|
1477
|
+
Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
|
1478
|
+
use when checking the last rotation time.
|
872
1479
|
"""
|
873
1480
|
return pulumi.get(self, "local")
|
874
1481
|
|
@@ -909,6 +1516,38 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
909
1516
|
"""
|
910
1517
|
return pulumi.get(self, "namespace")
|
911
1518
|
|
1519
|
+
@_builtins.property
|
1520
|
+
@pulumi.getter
|
1521
|
+
def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
|
1522
|
+
"""
|
1523
|
+
Specifies mount type specific options that are passed to the backend
|
1524
|
+
"""
|
1525
|
+
return pulumi.get(self, "options")
|
1526
|
+
|
1527
|
+
@_builtins.property
|
1528
|
+
@pulumi.getter(name="passthroughRequestHeaders")
|
1529
|
+
def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1530
|
+
"""
|
1531
|
+
List of headers to allow and pass from the request to the plugin
|
1532
|
+
"""
|
1533
|
+
return pulumi.get(self, "passthrough_request_headers")
|
1534
|
+
|
1535
|
+
@_builtins.property
|
1536
|
+
@pulumi.getter(name="pluginVersion")
|
1537
|
+
def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1538
|
+
"""
|
1539
|
+
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1540
|
+
"""
|
1541
|
+
return pulumi.get(self, "plugin_version")
|
1542
|
+
|
1543
|
+
@_builtins.property
|
1544
|
+
@pulumi.getter(name="sealWrap")
|
1545
|
+
def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
|
1546
|
+
"""
|
1547
|
+
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1548
|
+
"""
|
1549
|
+
return pulumi.get(self, "seal_wrap")
|
1550
|
+
|
912
1551
|
@_builtins.property
|
913
1552
|
@pulumi.getter
|
914
1553
|
def token(self) -> pulumi.Output[Optional[_builtins.str]]:
|