pulumi-vault 7.2.0a1755297899__py3-none-any.whl → 7.3.0a1755586140__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +18 -0
- pulumi_vault/_inputs.py +201 -0
- pulumi_vault/aws/secret_backend.py +627 -49
- pulumi_vault/azure/backend.py +788 -15
- pulumi_vault/consul/secret_backend.py +660 -28
- pulumi_vault/database/secrets_mount.py +47 -0
- pulumi_vault/gcp/secret_backend.py +599 -56
- pulumi_vault/jwt/auth_backend.py +47 -0
- pulumi_vault/kmip/secret_backend.py +787 -7
- pulumi_vault/kubernetes/secret_backend.py +47 -0
- pulumi_vault/ldap/secret_backend.py +75 -35
- pulumi_vault/mount.py +47 -0
- pulumi_vault/nomad_secret_backend.py +660 -21
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/outputs.py +153 -0
- pulumi_vault/pkisecret/backend_config_scep.py +68 -21
- pulumi_vault/pkisecret/get_backend_config_scep.py +21 -1
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/rabbitmq/secret_backend.py +707 -35
- pulumi_vault/ssh/secret_backend_ca.py +101 -7
- pulumi_vault/terraformcloud/secret_backend.py +707 -28
- pulumi_vault/transit/secret_backend_key.py +49 -21
- {pulumi_vault-7.2.0a1755297899.dist-info → pulumi_vault-7.3.0a1755586140.dist-info}/METADATA +1 -1
- {pulumi_vault-7.2.0a1755297899.dist-info → pulumi_vault-7.3.0a1755586140.dist-info}/RECORD +27 -25
- {pulumi_vault-7.2.0a1755297899.dist-info → pulumi_vault-7.3.0a1755586140.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1755297899.dist-info → pulumi_vault-7.3.0a1755586140.dist-info}/top_level.txt +0 -0
@@ -20,45 +20,78 @@ __all__ = ['SecretBackendArgs', 'SecretBackend']
|
|
20
20
|
class SecretBackendArgs:
|
21
21
|
def __init__(__self__, *,
|
22
22
|
address: pulumi.Input[_builtins.str],
|
23
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
24
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
25
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
26
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
23
27
|
bootstrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
24
28
|
ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
25
29
|
client_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
26
30
|
client_key: Optional[pulumi.Input[_builtins.str]] = None,
|
27
31
|
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
32
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
28
33
|
description: Optional[pulumi.Input[_builtins.str]] = None,
|
29
34
|
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
35
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
36
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
37
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
38
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
30
39
|
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
31
40
|
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
32
41
|
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
42
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
43
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
33
44
|
path: Optional[pulumi.Input[_builtins.str]] = None,
|
45
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
34
46
|
scheme: Optional[pulumi.Input[_builtins.str]] = None,
|
47
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
35
48
|
token: Optional[pulumi.Input[_builtins.str]] = None):
|
36
49
|
"""
|
37
50
|
The set of arguments for constructing a SecretBackend resource.
|
38
51
|
:param pulumi.Input[_builtins.str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
|
52
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
53
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
54
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
55
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
39
56
|
:param pulumi.Input[_builtins.bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
|
40
57
|
:param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
|
41
58
|
:param pulumi.Input[_builtins.str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
|
42
59
|
this is set you need to also set client_key.
|
43
60
|
:param pulumi.Input[_builtins.str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
|
44
61
|
you need to also set client_cert.
|
45
|
-
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds:
|
62
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
|
63
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
46
64
|
:param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
|
47
65
|
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
48
66
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
49
|
-
:param pulumi.Input[_builtins.bool]
|
50
|
-
:param pulumi.Input[_builtins.
|
51
|
-
|
67
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
68
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
69
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
70
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
71
|
+
:param pulumi.Input[_builtins.bool] local: Specifies if the secret backend is local only
|
72
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
|
52
73
|
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
53
74
|
The value should not contain leading or trailing forward slashes.
|
54
75
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
55
76
|
*Available only for Vault Enterprise*.
|
77
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
78
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
56
79
|
:param pulumi.Input[_builtins.str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
|
57
80
|
to `consul`.
|
81
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
58
82
|
:param pulumi.Input[_builtins.str] scheme: Specifies the URL scheme to use. Defaults to `http`.
|
83
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
59
84
|
:param pulumi.Input[_builtins.str] token: Specifies the Consul token to use when managing or issuing new tokens.
|
60
85
|
"""
|
61
86
|
pulumi.set(__self__, "address", address)
|
87
|
+
if allowed_managed_keys is not None:
|
88
|
+
pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
|
89
|
+
if allowed_response_headers is not None:
|
90
|
+
pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
|
91
|
+
if audit_non_hmac_request_keys is not None:
|
92
|
+
pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
|
93
|
+
if audit_non_hmac_response_keys is not None:
|
94
|
+
pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
|
62
95
|
if bootstrap is not None:
|
63
96
|
pulumi.set(__self__, "bootstrap", bootstrap)
|
64
97
|
if ca_cert is not None:
|
@@ -69,20 +102,38 @@ class SecretBackendArgs:
|
|
69
102
|
pulumi.set(__self__, "client_key", client_key)
|
70
103
|
if default_lease_ttl_seconds is not None:
|
71
104
|
pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
|
105
|
+
if delegated_auth_accessors is not None:
|
106
|
+
pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
|
72
107
|
if description is not None:
|
73
108
|
pulumi.set(__self__, "description", description)
|
74
109
|
if disable_remount is not None:
|
75
110
|
pulumi.set(__self__, "disable_remount", disable_remount)
|
111
|
+
if external_entropy_access is not None:
|
112
|
+
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
113
|
+
if force_no_cache is not None:
|
114
|
+
pulumi.set(__self__, "force_no_cache", force_no_cache)
|
115
|
+
if identity_token_key is not None:
|
116
|
+
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
117
|
+
if listing_visibility is not None:
|
118
|
+
pulumi.set(__self__, "listing_visibility", listing_visibility)
|
76
119
|
if local is not None:
|
77
120
|
pulumi.set(__self__, "local", local)
|
78
121
|
if max_lease_ttl_seconds is not None:
|
79
122
|
pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
|
80
123
|
if namespace is not None:
|
81
124
|
pulumi.set(__self__, "namespace", namespace)
|
125
|
+
if options is not None:
|
126
|
+
pulumi.set(__self__, "options", options)
|
127
|
+
if passthrough_request_headers is not None:
|
128
|
+
pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
|
82
129
|
if path is not None:
|
83
130
|
pulumi.set(__self__, "path", path)
|
131
|
+
if plugin_version is not None:
|
132
|
+
pulumi.set(__self__, "plugin_version", plugin_version)
|
84
133
|
if scheme is not None:
|
85
134
|
pulumi.set(__self__, "scheme", scheme)
|
135
|
+
if seal_wrap is not None:
|
136
|
+
pulumi.set(__self__, "seal_wrap", seal_wrap)
|
86
137
|
if token is not None:
|
87
138
|
pulumi.set(__self__, "token", token)
|
88
139
|
|
@@ -98,6 +149,54 @@ class SecretBackendArgs:
|
|
98
149
|
def address(self, value: pulumi.Input[_builtins.str]):
|
99
150
|
pulumi.set(self, "address", value)
|
100
151
|
|
152
|
+
@_builtins.property
|
153
|
+
@pulumi.getter(name="allowedManagedKeys")
|
154
|
+
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
155
|
+
"""
|
156
|
+
List of managed key registry entry names that the mount in question is allowed to access
|
157
|
+
"""
|
158
|
+
return pulumi.get(self, "allowed_managed_keys")
|
159
|
+
|
160
|
+
@allowed_managed_keys.setter
|
161
|
+
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
162
|
+
pulumi.set(self, "allowed_managed_keys", value)
|
163
|
+
|
164
|
+
@_builtins.property
|
165
|
+
@pulumi.getter(name="allowedResponseHeaders")
|
166
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
167
|
+
"""
|
168
|
+
List of headers to allow and pass from the request to the plugin
|
169
|
+
"""
|
170
|
+
return pulumi.get(self, "allowed_response_headers")
|
171
|
+
|
172
|
+
@allowed_response_headers.setter
|
173
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
174
|
+
pulumi.set(self, "allowed_response_headers", value)
|
175
|
+
|
176
|
+
@_builtins.property
|
177
|
+
@pulumi.getter(name="auditNonHmacRequestKeys")
|
178
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
179
|
+
"""
|
180
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
181
|
+
"""
|
182
|
+
return pulumi.get(self, "audit_non_hmac_request_keys")
|
183
|
+
|
184
|
+
@audit_non_hmac_request_keys.setter
|
185
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
186
|
+
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
187
|
+
|
188
|
+
@_builtins.property
|
189
|
+
@pulumi.getter(name="auditNonHmacResponseKeys")
|
190
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
191
|
+
"""
|
192
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
193
|
+
"""
|
194
|
+
return pulumi.get(self, "audit_non_hmac_response_keys")
|
195
|
+
|
196
|
+
@audit_non_hmac_response_keys.setter
|
197
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
198
|
+
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
199
|
+
|
101
200
|
@_builtins.property
|
102
201
|
@pulumi.getter
|
103
202
|
def bootstrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
@@ -152,7 +251,7 @@ class SecretBackendArgs:
|
|
152
251
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
153
252
|
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
154
253
|
"""
|
155
|
-
|
254
|
+
Default lease duration for secrets in seconds
|
156
255
|
"""
|
157
256
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
158
257
|
|
@@ -160,6 +259,18 @@ class SecretBackendArgs:
|
|
160
259
|
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
161
260
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
162
261
|
|
262
|
+
@_builtins.property
|
263
|
+
@pulumi.getter(name="delegatedAuthAccessors")
|
264
|
+
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
265
|
+
"""
|
266
|
+
List of headers to allow and pass from the request to the plugin
|
267
|
+
"""
|
268
|
+
return pulumi.get(self, "delegated_auth_accessors")
|
269
|
+
|
270
|
+
@delegated_auth_accessors.setter
|
271
|
+
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
272
|
+
pulumi.set(self, "delegated_auth_accessors", value)
|
273
|
+
|
163
274
|
@_builtins.property
|
164
275
|
@pulumi.getter
|
165
276
|
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
@@ -185,11 +296,59 @@ class SecretBackendArgs:
|
|
185
296
|
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
186
297
|
pulumi.set(self, "disable_remount", value)
|
187
298
|
|
299
|
+
@_builtins.property
|
300
|
+
@pulumi.getter(name="externalEntropyAccess")
|
301
|
+
def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
302
|
+
"""
|
303
|
+
Enable the secrets engine to access Vault's external entropy source
|
304
|
+
"""
|
305
|
+
return pulumi.get(self, "external_entropy_access")
|
306
|
+
|
307
|
+
@external_entropy_access.setter
|
308
|
+
def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
309
|
+
pulumi.set(self, "external_entropy_access", value)
|
310
|
+
|
311
|
+
@_builtins.property
|
312
|
+
@pulumi.getter(name="forceNoCache")
|
313
|
+
def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
314
|
+
"""
|
315
|
+
If set to true, disables caching.
|
316
|
+
"""
|
317
|
+
return pulumi.get(self, "force_no_cache")
|
318
|
+
|
319
|
+
@force_no_cache.setter
|
320
|
+
def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
321
|
+
pulumi.set(self, "force_no_cache", value)
|
322
|
+
|
323
|
+
@_builtins.property
|
324
|
+
@pulumi.getter(name="identityTokenKey")
|
325
|
+
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
326
|
+
"""
|
327
|
+
The key to use for signing plugin workload identity tokens
|
328
|
+
"""
|
329
|
+
return pulumi.get(self, "identity_token_key")
|
330
|
+
|
331
|
+
@identity_token_key.setter
|
332
|
+
def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
333
|
+
pulumi.set(self, "identity_token_key", value)
|
334
|
+
|
335
|
+
@_builtins.property
|
336
|
+
@pulumi.getter(name="listingVisibility")
|
337
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
338
|
+
"""
|
339
|
+
Specifies whether to show this mount in the UI-specific listing endpoint
|
340
|
+
"""
|
341
|
+
return pulumi.get(self, "listing_visibility")
|
342
|
+
|
343
|
+
@listing_visibility.setter
|
344
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
345
|
+
pulumi.set(self, "listing_visibility", value)
|
346
|
+
|
188
347
|
@_builtins.property
|
189
348
|
@pulumi.getter
|
190
349
|
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
191
350
|
"""
|
192
|
-
Specifies if the secret backend is local only
|
351
|
+
Specifies if the secret backend is local only
|
193
352
|
"""
|
194
353
|
return pulumi.get(self, "local")
|
195
354
|
|
@@ -201,8 +360,7 @@ class SecretBackendArgs:
|
|
201
360
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
202
361
|
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
203
362
|
"""
|
204
|
-
|
205
|
-
for credentials issued by this backend.
|
363
|
+
Maximum possible lease duration for secrets in seconds
|
206
364
|
"""
|
207
365
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
208
366
|
|
@@ -225,6 +383,30 @@ class SecretBackendArgs:
|
|
225
383
|
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
226
384
|
pulumi.set(self, "namespace", value)
|
227
385
|
|
386
|
+
@_builtins.property
|
387
|
+
@pulumi.getter
|
388
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
389
|
+
"""
|
390
|
+
Specifies mount type specific options that are passed to the backend
|
391
|
+
"""
|
392
|
+
return pulumi.get(self, "options")
|
393
|
+
|
394
|
+
@options.setter
|
395
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
396
|
+
pulumi.set(self, "options", value)
|
397
|
+
|
398
|
+
@_builtins.property
|
399
|
+
@pulumi.getter(name="passthroughRequestHeaders")
|
400
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
401
|
+
"""
|
402
|
+
List of headers to allow and pass from the request to the plugin
|
403
|
+
"""
|
404
|
+
return pulumi.get(self, "passthrough_request_headers")
|
405
|
+
|
406
|
+
@passthrough_request_headers.setter
|
407
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
408
|
+
pulumi.set(self, "passthrough_request_headers", value)
|
409
|
+
|
228
410
|
@_builtins.property
|
229
411
|
@pulumi.getter
|
230
412
|
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
@@ -238,6 +420,18 @@ class SecretBackendArgs:
|
|
238
420
|
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
239
421
|
pulumi.set(self, "path", value)
|
240
422
|
|
423
|
+
@_builtins.property
|
424
|
+
@pulumi.getter(name="pluginVersion")
|
425
|
+
def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
|
426
|
+
"""
|
427
|
+
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
428
|
+
"""
|
429
|
+
return pulumi.get(self, "plugin_version")
|
430
|
+
|
431
|
+
@plugin_version.setter
|
432
|
+
def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
|
433
|
+
pulumi.set(self, "plugin_version", value)
|
434
|
+
|
241
435
|
@_builtins.property
|
242
436
|
@pulumi.getter
|
243
437
|
def scheme(self) -> Optional[pulumi.Input[_builtins.str]]:
|
@@ -250,6 +444,18 @@ class SecretBackendArgs:
|
|
250
444
|
def scheme(self, value: Optional[pulumi.Input[_builtins.str]]):
|
251
445
|
pulumi.set(self, "scheme", value)
|
252
446
|
|
447
|
+
@_builtins.property
|
448
|
+
@pulumi.getter(name="sealWrap")
|
449
|
+
def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
450
|
+
"""
|
451
|
+
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
452
|
+
"""
|
453
|
+
return pulumi.get(self, "seal_wrap")
|
454
|
+
|
455
|
+
@seal_wrap.setter
|
456
|
+
def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
457
|
+
pulumi.set(self, "seal_wrap", value)
|
458
|
+
|
253
459
|
@_builtins.property
|
254
460
|
@pulumi.getter
|
255
461
|
def token(self) -> Optional[pulumi.Input[_builtins.str]]:
|
@@ -266,47 +472,84 @@ class SecretBackendArgs:
|
|
266
472
|
@pulumi.input_type
|
267
473
|
class _SecretBackendState:
|
268
474
|
def __init__(__self__, *,
|
475
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
269
476
|
address: Optional[pulumi.Input[_builtins.str]] = None,
|
477
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
478
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
479
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
480
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
270
481
|
bootstrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
271
482
|
ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
272
483
|
client_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
273
484
|
client_key: Optional[pulumi.Input[_builtins.str]] = None,
|
274
485
|
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
486
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
275
487
|
description: Optional[pulumi.Input[_builtins.str]] = None,
|
276
488
|
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
489
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
490
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
491
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
492
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
277
493
|
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
278
494
|
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
279
495
|
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
496
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
497
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
280
498
|
path: Optional[pulumi.Input[_builtins.str]] = None,
|
499
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
281
500
|
scheme: Optional[pulumi.Input[_builtins.str]] = None,
|
501
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
282
502
|
token: Optional[pulumi.Input[_builtins.str]] = None):
|
283
503
|
"""
|
284
504
|
Input properties used for looking up and filtering SecretBackend resources.
|
505
|
+
:param pulumi.Input[_builtins.str] accessor: Accessor of the mount
|
285
506
|
:param pulumi.Input[_builtins.str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
|
507
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
508
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
509
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
510
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
286
511
|
:param pulumi.Input[_builtins.bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
|
287
512
|
:param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
|
288
513
|
:param pulumi.Input[_builtins.str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
|
289
514
|
this is set you need to also set client_key.
|
290
515
|
:param pulumi.Input[_builtins.str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
|
291
516
|
you need to also set client_cert.
|
292
|
-
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds:
|
517
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
|
518
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
293
519
|
:param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
|
294
520
|
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
295
521
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
296
|
-
:param pulumi.Input[_builtins.bool]
|
297
|
-
:param pulumi.Input[_builtins.
|
298
|
-
|
522
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
523
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
524
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
525
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
526
|
+
:param pulumi.Input[_builtins.bool] local: Specifies if the secret backend is local only
|
527
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
|
299
528
|
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
300
529
|
The value should not contain leading or trailing forward slashes.
|
301
530
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
302
531
|
*Available only for Vault Enterprise*.
|
532
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
533
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
303
534
|
:param pulumi.Input[_builtins.str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
|
304
535
|
to `consul`.
|
536
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
305
537
|
:param pulumi.Input[_builtins.str] scheme: Specifies the URL scheme to use. Defaults to `http`.
|
538
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
306
539
|
:param pulumi.Input[_builtins.str] token: Specifies the Consul token to use when managing or issuing new tokens.
|
307
540
|
"""
|
541
|
+
if accessor is not None:
|
542
|
+
pulumi.set(__self__, "accessor", accessor)
|
308
543
|
if address is not None:
|
309
544
|
pulumi.set(__self__, "address", address)
|
545
|
+
if allowed_managed_keys is not None:
|
546
|
+
pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
|
547
|
+
if allowed_response_headers is not None:
|
548
|
+
pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
|
549
|
+
if audit_non_hmac_request_keys is not None:
|
550
|
+
pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
|
551
|
+
if audit_non_hmac_response_keys is not None:
|
552
|
+
pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
|
310
553
|
if bootstrap is not None:
|
311
554
|
pulumi.set(__self__, "bootstrap", bootstrap)
|
312
555
|
if ca_cert is not None:
|
@@ -317,23 +560,53 @@ class _SecretBackendState:
|
|
317
560
|
pulumi.set(__self__, "client_key", client_key)
|
318
561
|
if default_lease_ttl_seconds is not None:
|
319
562
|
pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
|
563
|
+
if delegated_auth_accessors is not None:
|
564
|
+
pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
|
320
565
|
if description is not None:
|
321
566
|
pulumi.set(__self__, "description", description)
|
322
567
|
if disable_remount is not None:
|
323
568
|
pulumi.set(__self__, "disable_remount", disable_remount)
|
569
|
+
if external_entropy_access is not None:
|
570
|
+
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
571
|
+
if force_no_cache is not None:
|
572
|
+
pulumi.set(__self__, "force_no_cache", force_no_cache)
|
573
|
+
if identity_token_key is not None:
|
574
|
+
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
575
|
+
if listing_visibility is not None:
|
576
|
+
pulumi.set(__self__, "listing_visibility", listing_visibility)
|
324
577
|
if local is not None:
|
325
578
|
pulumi.set(__self__, "local", local)
|
326
579
|
if max_lease_ttl_seconds is not None:
|
327
580
|
pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
|
328
581
|
if namespace is not None:
|
329
582
|
pulumi.set(__self__, "namespace", namespace)
|
583
|
+
if options is not None:
|
584
|
+
pulumi.set(__self__, "options", options)
|
585
|
+
if passthrough_request_headers is not None:
|
586
|
+
pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
|
330
587
|
if path is not None:
|
331
588
|
pulumi.set(__self__, "path", path)
|
589
|
+
if plugin_version is not None:
|
590
|
+
pulumi.set(__self__, "plugin_version", plugin_version)
|
332
591
|
if scheme is not None:
|
333
592
|
pulumi.set(__self__, "scheme", scheme)
|
593
|
+
if seal_wrap is not None:
|
594
|
+
pulumi.set(__self__, "seal_wrap", seal_wrap)
|
334
595
|
if token is not None:
|
335
596
|
pulumi.set(__self__, "token", token)
|
336
597
|
|
598
|
+
@_builtins.property
|
599
|
+
@pulumi.getter
|
600
|
+
def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
|
601
|
+
"""
|
602
|
+
Accessor of the mount
|
603
|
+
"""
|
604
|
+
return pulumi.get(self, "accessor")
|
605
|
+
|
606
|
+
@accessor.setter
|
607
|
+
def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
|
608
|
+
pulumi.set(self, "accessor", value)
|
609
|
+
|
337
610
|
@_builtins.property
|
338
611
|
@pulumi.getter
|
339
612
|
def address(self) -> Optional[pulumi.Input[_builtins.str]]:
|
@@ -346,6 +619,54 @@ class _SecretBackendState:
|
|
346
619
|
def address(self, value: Optional[pulumi.Input[_builtins.str]]):
|
347
620
|
pulumi.set(self, "address", value)
|
348
621
|
|
622
|
+
@_builtins.property
|
623
|
+
@pulumi.getter(name="allowedManagedKeys")
|
624
|
+
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
625
|
+
"""
|
626
|
+
List of managed key registry entry names that the mount in question is allowed to access
|
627
|
+
"""
|
628
|
+
return pulumi.get(self, "allowed_managed_keys")
|
629
|
+
|
630
|
+
@allowed_managed_keys.setter
|
631
|
+
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
632
|
+
pulumi.set(self, "allowed_managed_keys", value)
|
633
|
+
|
634
|
+
@_builtins.property
|
635
|
+
@pulumi.getter(name="allowedResponseHeaders")
|
636
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
637
|
+
"""
|
638
|
+
List of headers to allow and pass from the request to the plugin
|
639
|
+
"""
|
640
|
+
return pulumi.get(self, "allowed_response_headers")
|
641
|
+
|
642
|
+
@allowed_response_headers.setter
|
643
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
644
|
+
pulumi.set(self, "allowed_response_headers", value)
|
645
|
+
|
646
|
+
@_builtins.property
|
647
|
+
@pulumi.getter(name="auditNonHmacRequestKeys")
|
648
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
649
|
+
"""
|
650
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
651
|
+
"""
|
652
|
+
return pulumi.get(self, "audit_non_hmac_request_keys")
|
653
|
+
|
654
|
+
@audit_non_hmac_request_keys.setter
|
655
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
656
|
+
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
657
|
+
|
658
|
+
@_builtins.property
|
659
|
+
@pulumi.getter(name="auditNonHmacResponseKeys")
|
660
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
661
|
+
"""
|
662
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
663
|
+
"""
|
664
|
+
return pulumi.get(self, "audit_non_hmac_response_keys")
|
665
|
+
|
666
|
+
@audit_non_hmac_response_keys.setter
|
667
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
668
|
+
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
669
|
+
|
349
670
|
@_builtins.property
|
350
671
|
@pulumi.getter
|
351
672
|
def bootstrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
@@ -400,7 +721,7 @@ class _SecretBackendState:
|
|
400
721
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
401
722
|
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
402
723
|
"""
|
403
|
-
|
724
|
+
Default lease duration for secrets in seconds
|
404
725
|
"""
|
405
726
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
406
727
|
|
@@ -408,6 +729,18 @@ class _SecretBackendState:
|
|
408
729
|
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
409
730
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
410
731
|
|
732
|
+
@_builtins.property
|
733
|
+
@pulumi.getter(name="delegatedAuthAccessors")
|
734
|
+
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
735
|
+
"""
|
736
|
+
List of headers to allow and pass from the request to the plugin
|
737
|
+
"""
|
738
|
+
return pulumi.get(self, "delegated_auth_accessors")
|
739
|
+
|
740
|
+
@delegated_auth_accessors.setter
|
741
|
+
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
742
|
+
pulumi.set(self, "delegated_auth_accessors", value)
|
743
|
+
|
411
744
|
@_builtins.property
|
412
745
|
@pulumi.getter
|
413
746
|
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
@@ -433,11 +766,59 @@ class _SecretBackendState:
|
|
433
766
|
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
434
767
|
pulumi.set(self, "disable_remount", value)
|
435
768
|
|
769
|
+
@_builtins.property
|
770
|
+
@pulumi.getter(name="externalEntropyAccess")
|
771
|
+
def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
772
|
+
"""
|
773
|
+
Enable the secrets engine to access Vault's external entropy source
|
774
|
+
"""
|
775
|
+
return pulumi.get(self, "external_entropy_access")
|
776
|
+
|
777
|
+
@external_entropy_access.setter
|
778
|
+
def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
779
|
+
pulumi.set(self, "external_entropy_access", value)
|
780
|
+
|
781
|
+
@_builtins.property
|
782
|
+
@pulumi.getter(name="forceNoCache")
|
783
|
+
def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
784
|
+
"""
|
785
|
+
If set to true, disables caching.
|
786
|
+
"""
|
787
|
+
return pulumi.get(self, "force_no_cache")
|
788
|
+
|
789
|
+
@force_no_cache.setter
|
790
|
+
def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
791
|
+
pulumi.set(self, "force_no_cache", value)
|
792
|
+
|
793
|
+
@_builtins.property
|
794
|
+
@pulumi.getter(name="identityTokenKey")
|
795
|
+
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
796
|
+
"""
|
797
|
+
The key to use for signing plugin workload identity tokens
|
798
|
+
"""
|
799
|
+
return pulumi.get(self, "identity_token_key")
|
800
|
+
|
801
|
+
@identity_token_key.setter
|
802
|
+
def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
803
|
+
pulumi.set(self, "identity_token_key", value)
|
804
|
+
|
805
|
+
@_builtins.property
|
806
|
+
@pulumi.getter(name="listingVisibility")
|
807
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
808
|
+
"""
|
809
|
+
Specifies whether to show this mount in the UI-specific listing endpoint
|
810
|
+
"""
|
811
|
+
return pulumi.get(self, "listing_visibility")
|
812
|
+
|
813
|
+
@listing_visibility.setter
|
814
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
815
|
+
pulumi.set(self, "listing_visibility", value)
|
816
|
+
|
436
817
|
@_builtins.property
|
437
818
|
@pulumi.getter
|
438
819
|
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
439
820
|
"""
|
440
|
-
Specifies if the secret backend is local only
|
821
|
+
Specifies if the secret backend is local only
|
441
822
|
"""
|
442
823
|
return pulumi.get(self, "local")
|
443
824
|
|
@@ -449,8 +830,7 @@ class _SecretBackendState:
|
|
449
830
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
450
831
|
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
451
832
|
"""
|
452
|
-
|
453
|
-
for credentials issued by this backend.
|
833
|
+
Maximum possible lease duration for secrets in seconds
|
454
834
|
"""
|
455
835
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
456
836
|
|
@@ -473,6 +853,30 @@ class _SecretBackendState:
|
|
473
853
|
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
474
854
|
pulumi.set(self, "namespace", value)
|
475
855
|
|
856
|
+
@_builtins.property
|
857
|
+
@pulumi.getter
|
858
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
859
|
+
"""
|
860
|
+
Specifies mount type specific options that are passed to the backend
|
861
|
+
"""
|
862
|
+
return pulumi.get(self, "options")
|
863
|
+
|
864
|
+
@options.setter
|
865
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
866
|
+
pulumi.set(self, "options", value)
|
867
|
+
|
868
|
+
@_builtins.property
|
869
|
+
@pulumi.getter(name="passthroughRequestHeaders")
|
870
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
871
|
+
"""
|
872
|
+
List of headers to allow and pass from the request to the plugin
|
873
|
+
"""
|
874
|
+
return pulumi.get(self, "passthrough_request_headers")
|
875
|
+
|
876
|
+
@passthrough_request_headers.setter
|
877
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
878
|
+
pulumi.set(self, "passthrough_request_headers", value)
|
879
|
+
|
476
880
|
@_builtins.property
|
477
881
|
@pulumi.getter
|
478
882
|
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
@@ -486,6 +890,18 @@ class _SecretBackendState:
|
|
486
890
|
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
487
891
|
pulumi.set(self, "path", value)
|
488
892
|
|
893
|
+
@_builtins.property
|
894
|
+
@pulumi.getter(name="pluginVersion")
|
895
|
+
def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
|
896
|
+
"""
|
897
|
+
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
898
|
+
"""
|
899
|
+
return pulumi.get(self, "plugin_version")
|
900
|
+
|
901
|
+
@plugin_version.setter
|
902
|
+
def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
|
903
|
+
pulumi.set(self, "plugin_version", value)
|
904
|
+
|
489
905
|
@_builtins.property
|
490
906
|
@pulumi.getter
|
491
907
|
def scheme(self) -> Optional[pulumi.Input[_builtins.str]]:
|
@@ -498,6 +914,18 @@ class _SecretBackendState:
|
|
498
914
|
def scheme(self, value: Optional[pulumi.Input[_builtins.str]]):
|
499
915
|
pulumi.set(self, "scheme", value)
|
500
916
|
|
917
|
+
@_builtins.property
|
918
|
+
@pulumi.getter(name="sealWrap")
|
919
|
+
def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
920
|
+
"""
|
921
|
+
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
922
|
+
"""
|
923
|
+
return pulumi.get(self, "seal_wrap")
|
924
|
+
|
925
|
+
@seal_wrap.setter
|
926
|
+
def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
927
|
+
pulumi.set(self, "seal_wrap", value)
|
928
|
+
|
501
929
|
@_builtins.property
|
502
930
|
@pulumi.getter
|
503
931
|
def token(self) -> Optional[pulumi.Input[_builtins.str]]:
|
@@ -518,18 +946,31 @@ class SecretBackend(pulumi.CustomResource):
|
|
518
946
|
resource_name: str,
|
519
947
|
opts: Optional[pulumi.ResourceOptions] = None,
|
520
948
|
address: Optional[pulumi.Input[_builtins.str]] = None,
|
949
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
950
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
951
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
952
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
521
953
|
bootstrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
522
954
|
ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
523
955
|
client_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
524
956
|
client_key: Optional[pulumi.Input[_builtins.str]] = None,
|
525
957
|
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
958
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
526
959
|
description: Optional[pulumi.Input[_builtins.str]] = None,
|
527
960
|
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
961
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
962
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
963
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
964
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
528
965
|
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
529
966
|
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
530
967
|
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
968
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
969
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
531
970
|
path: Optional[pulumi.Input[_builtins.str]] = None,
|
971
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
532
972
|
scheme: Optional[pulumi.Input[_builtins.str]] = None,
|
973
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
533
974
|
token: Optional[pulumi.Input[_builtins.str]] = None,
|
534
975
|
__props__=None):
|
535
976
|
"""
|
@@ -570,26 +1011,38 @@ class SecretBackend(pulumi.CustomResource):
|
|
570
1011
|
:param str resource_name: The name of the resource.
|
571
1012
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
572
1013
|
:param pulumi.Input[_builtins.str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
|
1014
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
1015
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
1016
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1017
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
573
1018
|
:param pulumi.Input[_builtins.bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
|
574
1019
|
:param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
|
575
1020
|
:param pulumi.Input[_builtins.str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
|
576
1021
|
this is set you need to also set client_key.
|
577
1022
|
:param pulumi.Input[_builtins.str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
|
578
1023
|
you need to also set client_cert.
|
579
|
-
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds:
|
1024
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
|
1025
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
580
1026
|
:param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
|
581
1027
|
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
582
1028
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
583
|
-
:param pulumi.Input[_builtins.bool]
|
584
|
-
:param pulumi.Input[_builtins.
|
585
|
-
|
1029
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
1030
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
1031
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
1032
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
1033
|
+
:param pulumi.Input[_builtins.bool] local: Specifies if the secret backend is local only
|
1034
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
|
586
1035
|
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
587
1036
|
The value should not contain leading or trailing forward slashes.
|
588
1037
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
589
1038
|
*Available only for Vault Enterprise*.
|
1039
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
1040
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
590
1041
|
:param pulumi.Input[_builtins.str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
|
591
1042
|
to `consul`.
|
1043
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
592
1044
|
:param pulumi.Input[_builtins.str] scheme: Specifies the URL scheme to use. Defaults to `http`.
|
1045
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
593
1046
|
:param pulumi.Input[_builtins.str] token: Specifies the Consul token to use when managing or issuing new tokens.
|
594
1047
|
"""
|
595
1048
|
...
|
@@ -649,18 +1102,31 @@ class SecretBackend(pulumi.CustomResource):
|
|
649
1102
|
resource_name: str,
|
650
1103
|
opts: Optional[pulumi.ResourceOptions] = None,
|
651
1104
|
address: Optional[pulumi.Input[_builtins.str]] = None,
|
1105
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1106
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1107
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1108
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
652
1109
|
bootstrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
653
1110
|
ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
654
1111
|
client_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
655
1112
|
client_key: Optional[pulumi.Input[_builtins.str]] = None,
|
656
1113
|
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1114
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
657
1115
|
description: Optional[pulumi.Input[_builtins.str]] = None,
|
658
1116
|
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
1117
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
1118
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
1119
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1120
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
659
1121
|
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
660
1122
|
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
661
1123
|
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1124
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
1125
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
662
1126
|
path: Optional[pulumi.Input[_builtins.str]] = None,
|
1127
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
663
1128
|
scheme: Optional[pulumi.Input[_builtins.str]] = None,
|
1129
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
664
1130
|
token: Optional[pulumi.Input[_builtins.str]] = None,
|
665
1131
|
__props__=None):
|
666
1132
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
@@ -674,19 +1140,33 @@ class SecretBackend(pulumi.CustomResource):
|
|
674
1140
|
if address is None and not opts.urn:
|
675
1141
|
raise TypeError("Missing required property 'address'")
|
676
1142
|
__props__.__dict__["address"] = address
|
1143
|
+
__props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
|
1144
|
+
__props__.__dict__["allowed_response_headers"] = allowed_response_headers
|
1145
|
+
__props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
|
1146
|
+
__props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
|
677
1147
|
__props__.__dict__["bootstrap"] = bootstrap
|
678
1148
|
__props__.__dict__["ca_cert"] = ca_cert
|
679
1149
|
__props__.__dict__["client_cert"] = None if client_cert is None else pulumi.Output.secret(client_cert)
|
680
1150
|
__props__.__dict__["client_key"] = None if client_key is None else pulumi.Output.secret(client_key)
|
681
1151
|
__props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
|
1152
|
+
__props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
|
682
1153
|
__props__.__dict__["description"] = description
|
683
1154
|
__props__.__dict__["disable_remount"] = disable_remount
|
1155
|
+
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
1156
|
+
__props__.__dict__["force_no_cache"] = force_no_cache
|
1157
|
+
__props__.__dict__["identity_token_key"] = identity_token_key
|
1158
|
+
__props__.__dict__["listing_visibility"] = listing_visibility
|
684
1159
|
__props__.__dict__["local"] = local
|
685
1160
|
__props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
|
686
1161
|
__props__.__dict__["namespace"] = namespace
|
1162
|
+
__props__.__dict__["options"] = options
|
1163
|
+
__props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
|
687
1164
|
__props__.__dict__["path"] = path
|
1165
|
+
__props__.__dict__["plugin_version"] = plugin_version
|
688
1166
|
__props__.__dict__["scheme"] = scheme
|
1167
|
+
__props__.__dict__["seal_wrap"] = seal_wrap
|
689
1168
|
__props__.__dict__["token"] = None if token is None else pulumi.Output.secret(token)
|
1169
|
+
__props__.__dict__["accessor"] = None
|
690
1170
|
secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["clientCert", "clientKey", "token"])
|
691
1171
|
opts = pulumi.ResourceOptions.merge(opts, secret_opts)
|
692
1172
|
super(SecretBackend, __self__).__init__(
|
@@ -699,19 +1179,33 @@ class SecretBackend(pulumi.CustomResource):
|
|
699
1179
|
def get(resource_name: str,
|
700
1180
|
id: pulumi.Input[str],
|
701
1181
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1182
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
702
1183
|
address: Optional[pulumi.Input[_builtins.str]] = None,
|
1184
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1185
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1186
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1187
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
703
1188
|
bootstrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
704
1189
|
ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
705
1190
|
client_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
706
1191
|
client_key: Optional[pulumi.Input[_builtins.str]] = None,
|
707
1192
|
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1193
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
708
1194
|
description: Optional[pulumi.Input[_builtins.str]] = None,
|
709
1195
|
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
1196
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
1197
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
1198
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1199
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
710
1200
|
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
711
1201
|
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
712
1202
|
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1203
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
1204
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
713
1205
|
path: Optional[pulumi.Input[_builtins.str]] = None,
|
1206
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
714
1207
|
scheme: Optional[pulumi.Input[_builtins.str]] = None,
|
1208
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
715
1209
|
token: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackend':
|
716
1210
|
"""
|
717
1211
|
Get an existing SecretBackend resource's state with the given name, id, and optional extra
|
@@ -720,49 +1214,84 @@ class SecretBackend(pulumi.CustomResource):
|
|
720
1214
|
:param str resource_name: The unique name of the resulting resource.
|
721
1215
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
722
1216
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
1217
|
+
:param pulumi.Input[_builtins.str] accessor: Accessor of the mount
|
723
1218
|
:param pulumi.Input[_builtins.str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
|
1219
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
1220
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
1221
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1222
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
724
1223
|
:param pulumi.Input[_builtins.bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
|
725
1224
|
:param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
|
726
1225
|
:param pulumi.Input[_builtins.str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
|
727
1226
|
this is set you need to also set client_key.
|
728
1227
|
:param pulumi.Input[_builtins.str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
|
729
1228
|
you need to also set client_cert.
|
730
|
-
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds:
|
1229
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
|
1230
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
731
1231
|
:param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
|
732
1232
|
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
733
1233
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
734
|
-
:param pulumi.Input[_builtins.bool]
|
735
|
-
:param pulumi.Input[_builtins.
|
736
|
-
|
1234
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
1235
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
1236
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
1237
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
1238
|
+
:param pulumi.Input[_builtins.bool] local: Specifies if the secret backend is local only
|
1239
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
|
737
1240
|
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
738
1241
|
The value should not contain leading or trailing forward slashes.
|
739
1242
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
740
1243
|
*Available only for Vault Enterprise*.
|
1244
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
1245
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
741
1246
|
:param pulumi.Input[_builtins.str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
|
742
1247
|
to `consul`.
|
1248
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
743
1249
|
:param pulumi.Input[_builtins.str] scheme: Specifies the URL scheme to use. Defaults to `http`.
|
1250
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
744
1251
|
:param pulumi.Input[_builtins.str] token: Specifies the Consul token to use when managing or issuing new tokens.
|
745
1252
|
"""
|
746
1253
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
747
1254
|
|
748
1255
|
__props__ = _SecretBackendState.__new__(_SecretBackendState)
|
749
1256
|
|
1257
|
+
__props__.__dict__["accessor"] = accessor
|
750
1258
|
__props__.__dict__["address"] = address
|
1259
|
+
__props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
|
1260
|
+
__props__.__dict__["allowed_response_headers"] = allowed_response_headers
|
1261
|
+
__props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
|
1262
|
+
__props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
|
751
1263
|
__props__.__dict__["bootstrap"] = bootstrap
|
752
1264
|
__props__.__dict__["ca_cert"] = ca_cert
|
753
1265
|
__props__.__dict__["client_cert"] = client_cert
|
754
1266
|
__props__.__dict__["client_key"] = client_key
|
755
1267
|
__props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
|
1268
|
+
__props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
|
756
1269
|
__props__.__dict__["description"] = description
|
757
1270
|
__props__.__dict__["disable_remount"] = disable_remount
|
1271
|
+
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
1272
|
+
__props__.__dict__["force_no_cache"] = force_no_cache
|
1273
|
+
__props__.__dict__["identity_token_key"] = identity_token_key
|
1274
|
+
__props__.__dict__["listing_visibility"] = listing_visibility
|
758
1275
|
__props__.__dict__["local"] = local
|
759
1276
|
__props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
|
760
1277
|
__props__.__dict__["namespace"] = namespace
|
1278
|
+
__props__.__dict__["options"] = options
|
1279
|
+
__props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
|
761
1280
|
__props__.__dict__["path"] = path
|
1281
|
+
__props__.__dict__["plugin_version"] = plugin_version
|
762
1282
|
__props__.__dict__["scheme"] = scheme
|
1283
|
+
__props__.__dict__["seal_wrap"] = seal_wrap
|
763
1284
|
__props__.__dict__["token"] = token
|
764
1285
|
return SecretBackend(resource_name, opts=opts, __props__=__props__)
|
765
1286
|
|
1287
|
+
@_builtins.property
|
1288
|
+
@pulumi.getter
|
1289
|
+
def accessor(self) -> pulumi.Output[_builtins.str]:
|
1290
|
+
"""
|
1291
|
+
Accessor of the mount
|
1292
|
+
"""
|
1293
|
+
return pulumi.get(self, "accessor")
|
1294
|
+
|
766
1295
|
@_builtins.property
|
767
1296
|
@pulumi.getter
|
768
1297
|
def address(self) -> pulumi.Output[_builtins.str]:
|
@@ -771,6 +1300,38 @@ class SecretBackend(pulumi.CustomResource):
|
|
771
1300
|
"""
|
772
1301
|
return pulumi.get(self, "address")
|
773
1302
|
|
1303
|
+
@_builtins.property
|
1304
|
+
@pulumi.getter(name="allowedManagedKeys")
|
1305
|
+
def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1306
|
+
"""
|
1307
|
+
List of managed key registry entry names that the mount in question is allowed to access
|
1308
|
+
"""
|
1309
|
+
return pulumi.get(self, "allowed_managed_keys")
|
1310
|
+
|
1311
|
+
@_builtins.property
|
1312
|
+
@pulumi.getter(name="allowedResponseHeaders")
|
1313
|
+
def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1314
|
+
"""
|
1315
|
+
List of headers to allow and pass from the request to the plugin
|
1316
|
+
"""
|
1317
|
+
return pulumi.get(self, "allowed_response_headers")
|
1318
|
+
|
1319
|
+
@_builtins.property
|
1320
|
+
@pulumi.getter(name="auditNonHmacRequestKeys")
|
1321
|
+
def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
1322
|
+
"""
|
1323
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1324
|
+
"""
|
1325
|
+
return pulumi.get(self, "audit_non_hmac_request_keys")
|
1326
|
+
|
1327
|
+
@_builtins.property
|
1328
|
+
@pulumi.getter(name="auditNonHmacResponseKeys")
|
1329
|
+
def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
1330
|
+
"""
|
1331
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1332
|
+
"""
|
1333
|
+
return pulumi.get(self, "audit_non_hmac_response_keys")
|
1334
|
+
|
774
1335
|
@_builtins.property
|
775
1336
|
@pulumi.getter
|
776
1337
|
def bootstrap(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
@@ -809,10 +1370,18 @@ class SecretBackend(pulumi.CustomResource):
|
|
809
1370
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
810
1371
|
def default_lease_ttl_seconds(self) -> pulumi.Output[Optional[_builtins.int]]:
|
811
1372
|
"""
|
812
|
-
|
1373
|
+
Default lease duration for secrets in seconds
|
813
1374
|
"""
|
814
1375
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
815
1376
|
|
1377
|
+
@_builtins.property
|
1378
|
+
@pulumi.getter(name="delegatedAuthAccessors")
|
1379
|
+
def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1380
|
+
"""
|
1381
|
+
List of headers to allow and pass from the request to the plugin
|
1382
|
+
"""
|
1383
|
+
return pulumi.get(self, "delegated_auth_accessors")
|
1384
|
+
|
816
1385
|
@_builtins.property
|
817
1386
|
@pulumi.getter
|
818
1387
|
def description(self) -> pulumi.Output[Optional[_builtins.str]]:
|
@@ -830,11 +1399,43 @@ class SecretBackend(pulumi.CustomResource):
|
|
830
1399
|
"""
|
831
1400
|
return pulumi.get(self, "disable_remount")
|
832
1401
|
|
1402
|
+
@_builtins.property
|
1403
|
+
@pulumi.getter(name="externalEntropyAccess")
|
1404
|
+
def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1405
|
+
"""
|
1406
|
+
Enable the secrets engine to access Vault's external entropy source
|
1407
|
+
"""
|
1408
|
+
return pulumi.get(self, "external_entropy_access")
|
1409
|
+
|
1410
|
+
@_builtins.property
|
1411
|
+
@pulumi.getter(name="forceNoCache")
|
1412
|
+
def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
|
1413
|
+
"""
|
1414
|
+
If set to true, disables caching.
|
1415
|
+
"""
|
1416
|
+
return pulumi.get(self, "force_no_cache")
|
1417
|
+
|
1418
|
+
@_builtins.property
|
1419
|
+
@pulumi.getter(name="identityTokenKey")
|
1420
|
+
def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1421
|
+
"""
|
1422
|
+
The key to use for signing plugin workload identity tokens
|
1423
|
+
"""
|
1424
|
+
return pulumi.get(self, "identity_token_key")
|
1425
|
+
|
1426
|
+
@_builtins.property
|
1427
|
+
@pulumi.getter(name="listingVisibility")
|
1428
|
+
def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1429
|
+
"""
|
1430
|
+
Specifies whether to show this mount in the UI-specific listing endpoint
|
1431
|
+
"""
|
1432
|
+
return pulumi.get(self, "listing_visibility")
|
1433
|
+
|
833
1434
|
@_builtins.property
|
834
1435
|
@pulumi.getter
|
835
1436
|
def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
836
1437
|
"""
|
837
|
-
Specifies if the secret backend is local only
|
1438
|
+
Specifies if the secret backend is local only
|
838
1439
|
"""
|
839
1440
|
return pulumi.get(self, "local")
|
840
1441
|
|
@@ -842,8 +1443,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
842
1443
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
843
1444
|
def max_lease_ttl_seconds(self) -> pulumi.Output[Optional[_builtins.int]]:
|
844
1445
|
"""
|
845
|
-
|
846
|
-
for credentials issued by this backend.
|
1446
|
+
Maximum possible lease duration for secrets in seconds
|
847
1447
|
"""
|
848
1448
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
849
1449
|
|
@@ -858,6 +1458,22 @@ class SecretBackend(pulumi.CustomResource):
|
|
858
1458
|
"""
|
859
1459
|
return pulumi.get(self, "namespace")
|
860
1460
|
|
1461
|
+
@_builtins.property
|
1462
|
+
@pulumi.getter
|
1463
|
+
def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
|
1464
|
+
"""
|
1465
|
+
Specifies mount type specific options that are passed to the backend
|
1466
|
+
"""
|
1467
|
+
return pulumi.get(self, "options")
|
1468
|
+
|
1469
|
+
@_builtins.property
|
1470
|
+
@pulumi.getter(name="passthroughRequestHeaders")
|
1471
|
+
def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1472
|
+
"""
|
1473
|
+
List of headers to allow and pass from the request to the plugin
|
1474
|
+
"""
|
1475
|
+
return pulumi.get(self, "passthrough_request_headers")
|
1476
|
+
|
861
1477
|
@_builtins.property
|
862
1478
|
@pulumi.getter
|
863
1479
|
def path(self) -> pulumi.Output[Optional[_builtins.str]]:
|
@@ -867,6 +1483,14 @@ class SecretBackend(pulumi.CustomResource):
|
|
867
1483
|
"""
|
868
1484
|
return pulumi.get(self, "path")
|
869
1485
|
|
1486
|
+
@_builtins.property
|
1487
|
+
@pulumi.getter(name="pluginVersion")
|
1488
|
+
def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1489
|
+
"""
|
1490
|
+
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1491
|
+
"""
|
1492
|
+
return pulumi.get(self, "plugin_version")
|
1493
|
+
|
870
1494
|
@_builtins.property
|
871
1495
|
@pulumi.getter
|
872
1496
|
def scheme(self) -> pulumi.Output[Optional[_builtins.str]]:
|
@@ -875,6 +1499,14 @@ class SecretBackend(pulumi.CustomResource):
|
|
875
1499
|
"""
|
876
1500
|
return pulumi.get(self, "scheme")
|
877
1501
|
|
1502
|
+
@_builtins.property
|
1503
|
+
@pulumi.getter(name="sealWrap")
|
1504
|
+
def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
|
1505
|
+
"""
|
1506
|
+
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1507
|
+
"""
|
1508
|
+
return pulumi.get(self, "seal_wrap")
|
1509
|
+
|
878
1510
|
@_builtins.property
|
879
1511
|
@pulumi.getter
|
880
1512
|
def token(self) -> pulumi.Output[Optional[_builtins.str]]:
|