pulumi-vault 7.2.0a1755297899__py3-none-any.whl → 7.3.0a1755586140__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +18 -0
- pulumi_vault/_inputs.py +201 -0
- pulumi_vault/aws/secret_backend.py +627 -49
- pulumi_vault/azure/backend.py +788 -15
- pulumi_vault/consul/secret_backend.py +660 -28
- pulumi_vault/database/secrets_mount.py +47 -0
- pulumi_vault/gcp/secret_backend.py +599 -56
- pulumi_vault/jwt/auth_backend.py +47 -0
- pulumi_vault/kmip/secret_backend.py +787 -7
- pulumi_vault/kubernetes/secret_backend.py +47 -0
- pulumi_vault/ldap/secret_backend.py +75 -35
- pulumi_vault/mount.py +47 -0
- pulumi_vault/nomad_secret_backend.py +660 -21
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/outputs.py +153 -0
- pulumi_vault/pkisecret/backend_config_scep.py +68 -21
- pulumi_vault/pkisecret/get_backend_config_scep.py +21 -1
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/rabbitmq/secret_backend.py +707 -35
- pulumi_vault/ssh/secret_backend_ca.py +101 -7
- pulumi_vault/terraformcloud/secret_backend.py +707 -28
- pulumi_vault/transit/secret_backend_key.py +49 -21
- {pulumi_vault-7.2.0a1755297899.dist-info → pulumi_vault-7.3.0a1755586140.dist-info}/METADATA +1 -1
- {pulumi_vault-7.2.0a1755297899.dist-info → pulumi_vault-7.3.0a1755586140.dist-info}/RECORD +27 -25
- {pulumi_vault-7.2.0a1755297899.dist-info → pulumi_vault-7.3.0a1755586140.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1755297899.dist-info → pulumi_vault-7.3.0a1755586140.dist-info}/top_level.txt +0 -0
@@ -20,13 +20,29 @@ __all__ = ['SecretBackendArgs', 'SecretBackend']
|
|
20
20
|
class SecretBackendArgs:
|
21
21
|
def __init__(__self__, *,
|
22
22
|
path: pulumi.Input[_builtins.str],
|
23
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
24
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
25
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
26
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
27
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
23
28
|
default_tls_client_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
|
24
29
|
default_tls_client_key_type: Optional[pulumi.Input[_builtins.str]] = None,
|
25
30
|
default_tls_client_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
31
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
26
32
|
description: Optional[pulumi.Input[_builtins.str]] = None,
|
27
33
|
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
34
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
35
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
36
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
28
37
|
listen_addrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
38
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
39
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
40
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
29
41
|
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
42
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
43
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
44
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
45
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
30
46
|
server_hostnames: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
31
47
|
server_ips: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
32
48
|
tls_ca_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
|
@@ -36,17 +52,33 @@ class SecretBackendArgs:
|
|
36
52
|
The set of arguments for constructing a SecretBackend resource.
|
37
53
|
:param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
|
38
54
|
not begin or end with a `/`. Defaults to `kmip`.
|
55
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
56
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
57
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
58
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
59
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
39
60
|
:param pulumi.Input[_builtins.int] default_tls_client_key_bits: Client certificate key bits, valid values depend on key type.
|
40
61
|
:param pulumi.Input[_builtins.str] default_tls_client_key_type: Client certificate key type, `rsa` or `ec`.
|
41
62
|
:param pulumi.Input[_builtins.int] default_tls_client_ttl: Client certificate TTL in seconds
|
42
|
-
:param pulumi.Input[_builtins.str]
|
63
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
64
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend
|
43
65
|
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
44
66
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
67
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
68
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
69
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
45
70
|
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] listen_addrs: Addresses the KMIP server should listen on (`host:port`).
|
71
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
72
|
+
:param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
73
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
46
74
|
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
47
75
|
The value should not contain leading or trailing forward slashes.
|
48
76
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
49
77
|
*Available only for Vault Enterprise*.
|
78
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
79
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
80
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
81
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
50
82
|
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] server_hostnames: Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN).
|
51
83
|
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] server_ips: IPs to include in the server's TLS certificate as SAN IP addresses.
|
52
84
|
:param pulumi.Input[_builtins.int] tls_ca_key_bits: CA key bits, valid values depend on key type.
|
@@ -54,20 +86,52 @@ class SecretBackendArgs:
|
|
54
86
|
:param pulumi.Input[_builtins.str] tls_min_version: Minimum TLS version to accept.
|
55
87
|
"""
|
56
88
|
pulumi.set(__self__, "path", path)
|
89
|
+
if allowed_managed_keys is not None:
|
90
|
+
pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
|
91
|
+
if allowed_response_headers is not None:
|
92
|
+
pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
|
93
|
+
if audit_non_hmac_request_keys is not None:
|
94
|
+
pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
|
95
|
+
if audit_non_hmac_response_keys is not None:
|
96
|
+
pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
|
97
|
+
if default_lease_ttl_seconds is not None:
|
98
|
+
pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
|
57
99
|
if default_tls_client_key_bits is not None:
|
58
100
|
pulumi.set(__self__, "default_tls_client_key_bits", default_tls_client_key_bits)
|
59
101
|
if default_tls_client_key_type is not None:
|
60
102
|
pulumi.set(__self__, "default_tls_client_key_type", default_tls_client_key_type)
|
61
103
|
if default_tls_client_ttl is not None:
|
62
104
|
pulumi.set(__self__, "default_tls_client_ttl", default_tls_client_ttl)
|
105
|
+
if delegated_auth_accessors is not None:
|
106
|
+
pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
|
63
107
|
if description is not None:
|
64
108
|
pulumi.set(__self__, "description", description)
|
65
109
|
if disable_remount is not None:
|
66
110
|
pulumi.set(__self__, "disable_remount", disable_remount)
|
111
|
+
if external_entropy_access is not None:
|
112
|
+
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
113
|
+
if force_no_cache is not None:
|
114
|
+
pulumi.set(__self__, "force_no_cache", force_no_cache)
|
115
|
+
if identity_token_key is not None:
|
116
|
+
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
67
117
|
if listen_addrs is not None:
|
68
118
|
pulumi.set(__self__, "listen_addrs", listen_addrs)
|
119
|
+
if listing_visibility is not None:
|
120
|
+
pulumi.set(__self__, "listing_visibility", listing_visibility)
|
121
|
+
if local is not None:
|
122
|
+
pulumi.set(__self__, "local", local)
|
123
|
+
if max_lease_ttl_seconds is not None:
|
124
|
+
pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
|
69
125
|
if namespace is not None:
|
70
126
|
pulumi.set(__self__, "namespace", namespace)
|
127
|
+
if options is not None:
|
128
|
+
pulumi.set(__self__, "options", options)
|
129
|
+
if passthrough_request_headers is not None:
|
130
|
+
pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
|
131
|
+
if plugin_version is not None:
|
132
|
+
pulumi.set(__self__, "plugin_version", plugin_version)
|
133
|
+
if seal_wrap is not None:
|
134
|
+
pulumi.set(__self__, "seal_wrap", seal_wrap)
|
71
135
|
if server_hostnames is not None:
|
72
136
|
pulumi.set(__self__, "server_hostnames", server_hostnames)
|
73
137
|
if server_ips is not None:
|
@@ -92,6 +156,66 @@ class SecretBackendArgs:
|
|
92
156
|
def path(self, value: pulumi.Input[_builtins.str]):
|
93
157
|
pulumi.set(self, "path", value)
|
94
158
|
|
159
|
+
@_builtins.property
|
160
|
+
@pulumi.getter(name="allowedManagedKeys")
|
161
|
+
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
162
|
+
"""
|
163
|
+
List of managed key registry entry names that the mount in question is allowed to access
|
164
|
+
"""
|
165
|
+
return pulumi.get(self, "allowed_managed_keys")
|
166
|
+
|
167
|
+
@allowed_managed_keys.setter
|
168
|
+
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
169
|
+
pulumi.set(self, "allowed_managed_keys", value)
|
170
|
+
|
171
|
+
@_builtins.property
|
172
|
+
@pulumi.getter(name="allowedResponseHeaders")
|
173
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
174
|
+
"""
|
175
|
+
List of headers to allow and pass from the request to the plugin
|
176
|
+
"""
|
177
|
+
return pulumi.get(self, "allowed_response_headers")
|
178
|
+
|
179
|
+
@allowed_response_headers.setter
|
180
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
181
|
+
pulumi.set(self, "allowed_response_headers", value)
|
182
|
+
|
183
|
+
@_builtins.property
|
184
|
+
@pulumi.getter(name="auditNonHmacRequestKeys")
|
185
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
186
|
+
"""
|
187
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
188
|
+
"""
|
189
|
+
return pulumi.get(self, "audit_non_hmac_request_keys")
|
190
|
+
|
191
|
+
@audit_non_hmac_request_keys.setter
|
192
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
193
|
+
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
194
|
+
|
195
|
+
@_builtins.property
|
196
|
+
@pulumi.getter(name="auditNonHmacResponseKeys")
|
197
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
198
|
+
"""
|
199
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
200
|
+
"""
|
201
|
+
return pulumi.get(self, "audit_non_hmac_response_keys")
|
202
|
+
|
203
|
+
@audit_non_hmac_response_keys.setter
|
204
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
205
|
+
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
206
|
+
|
207
|
+
@_builtins.property
|
208
|
+
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
209
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
210
|
+
"""
|
211
|
+
Default lease duration for tokens and secrets in seconds
|
212
|
+
"""
|
213
|
+
return pulumi.get(self, "default_lease_ttl_seconds")
|
214
|
+
|
215
|
+
@default_lease_ttl_seconds.setter
|
216
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
217
|
+
pulumi.set(self, "default_lease_ttl_seconds", value)
|
218
|
+
|
95
219
|
@_builtins.property
|
96
220
|
@pulumi.getter(name="defaultTlsClientKeyBits")
|
97
221
|
def default_tls_client_key_bits(self) -> Optional[pulumi.Input[_builtins.int]]:
|
@@ -128,11 +252,23 @@ class SecretBackendArgs:
|
|
128
252
|
def default_tls_client_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
129
253
|
pulumi.set(self, "default_tls_client_ttl", value)
|
130
254
|
|
255
|
+
@_builtins.property
|
256
|
+
@pulumi.getter(name="delegatedAuthAccessors")
|
257
|
+
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
258
|
+
"""
|
259
|
+
List of headers to allow and pass from the request to the plugin
|
260
|
+
"""
|
261
|
+
return pulumi.get(self, "delegated_auth_accessors")
|
262
|
+
|
263
|
+
@delegated_auth_accessors.setter
|
264
|
+
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
265
|
+
pulumi.set(self, "delegated_auth_accessors", value)
|
266
|
+
|
131
267
|
@_builtins.property
|
132
268
|
@pulumi.getter
|
133
269
|
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
134
270
|
"""
|
135
|
-
|
271
|
+
Human-friendly description of the mount for the backend
|
136
272
|
"""
|
137
273
|
return pulumi.get(self, "description")
|
138
274
|
|
@@ -153,6 +289,42 @@ class SecretBackendArgs:
|
|
153
289
|
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
154
290
|
pulumi.set(self, "disable_remount", value)
|
155
291
|
|
292
|
+
@_builtins.property
|
293
|
+
@pulumi.getter(name="externalEntropyAccess")
|
294
|
+
def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
295
|
+
"""
|
296
|
+
Enable the secrets engine to access Vault's external entropy source
|
297
|
+
"""
|
298
|
+
return pulumi.get(self, "external_entropy_access")
|
299
|
+
|
300
|
+
@external_entropy_access.setter
|
301
|
+
def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
302
|
+
pulumi.set(self, "external_entropy_access", value)
|
303
|
+
|
304
|
+
@_builtins.property
|
305
|
+
@pulumi.getter(name="forceNoCache")
|
306
|
+
def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
307
|
+
"""
|
308
|
+
If set to true, disables caching.
|
309
|
+
"""
|
310
|
+
return pulumi.get(self, "force_no_cache")
|
311
|
+
|
312
|
+
@force_no_cache.setter
|
313
|
+
def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
314
|
+
pulumi.set(self, "force_no_cache", value)
|
315
|
+
|
316
|
+
@_builtins.property
|
317
|
+
@pulumi.getter(name="identityTokenKey")
|
318
|
+
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
319
|
+
"""
|
320
|
+
The key to use for signing plugin workload identity tokens
|
321
|
+
"""
|
322
|
+
return pulumi.get(self, "identity_token_key")
|
323
|
+
|
324
|
+
@identity_token_key.setter
|
325
|
+
def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
326
|
+
pulumi.set(self, "identity_token_key", value)
|
327
|
+
|
156
328
|
@_builtins.property
|
157
329
|
@pulumi.getter(name="listenAddrs")
|
158
330
|
def listen_addrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
@@ -165,6 +337,42 @@ class SecretBackendArgs:
|
|
165
337
|
def listen_addrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
166
338
|
pulumi.set(self, "listen_addrs", value)
|
167
339
|
|
340
|
+
@_builtins.property
|
341
|
+
@pulumi.getter(name="listingVisibility")
|
342
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
343
|
+
"""
|
344
|
+
Specifies whether to show this mount in the UI-specific listing endpoint
|
345
|
+
"""
|
346
|
+
return pulumi.get(self, "listing_visibility")
|
347
|
+
|
348
|
+
@listing_visibility.setter
|
349
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
350
|
+
pulumi.set(self, "listing_visibility", value)
|
351
|
+
|
352
|
+
@_builtins.property
|
353
|
+
@pulumi.getter
|
354
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
355
|
+
"""
|
356
|
+
Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
357
|
+
"""
|
358
|
+
return pulumi.get(self, "local")
|
359
|
+
|
360
|
+
@local.setter
|
361
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
362
|
+
pulumi.set(self, "local", value)
|
363
|
+
|
364
|
+
@_builtins.property
|
365
|
+
@pulumi.getter(name="maxLeaseTtlSeconds")
|
366
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
367
|
+
"""
|
368
|
+
Maximum possible lease duration for tokens and secrets in seconds
|
369
|
+
"""
|
370
|
+
return pulumi.get(self, "max_lease_ttl_seconds")
|
371
|
+
|
372
|
+
@max_lease_ttl_seconds.setter
|
373
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
374
|
+
pulumi.set(self, "max_lease_ttl_seconds", value)
|
375
|
+
|
168
376
|
@_builtins.property
|
169
377
|
@pulumi.getter
|
170
378
|
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
@@ -180,6 +388,54 @@ class SecretBackendArgs:
|
|
180
388
|
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
181
389
|
pulumi.set(self, "namespace", value)
|
182
390
|
|
391
|
+
@_builtins.property
|
392
|
+
@pulumi.getter
|
393
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
394
|
+
"""
|
395
|
+
Specifies mount type specific options that are passed to the backend
|
396
|
+
"""
|
397
|
+
return pulumi.get(self, "options")
|
398
|
+
|
399
|
+
@options.setter
|
400
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
401
|
+
pulumi.set(self, "options", value)
|
402
|
+
|
403
|
+
@_builtins.property
|
404
|
+
@pulumi.getter(name="passthroughRequestHeaders")
|
405
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
406
|
+
"""
|
407
|
+
List of headers to allow and pass from the request to the plugin
|
408
|
+
"""
|
409
|
+
return pulumi.get(self, "passthrough_request_headers")
|
410
|
+
|
411
|
+
@passthrough_request_headers.setter
|
412
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
413
|
+
pulumi.set(self, "passthrough_request_headers", value)
|
414
|
+
|
415
|
+
@_builtins.property
|
416
|
+
@pulumi.getter(name="pluginVersion")
|
417
|
+
def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
|
418
|
+
"""
|
419
|
+
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
420
|
+
"""
|
421
|
+
return pulumi.get(self, "plugin_version")
|
422
|
+
|
423
|
+
@plugin_version.setter
|
424
|
+
def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
|
425
|
+
pulumi.set(self, "plugin_version", value)
|
426
|
+
|
427
|
+
@_builtins.property
|
428
|
+
@pulumi.getter(name="sealWrap")
|
429
|
+
def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
430
|
+
"""
|
431
|
+
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
432
|
+
"""
|
433
|
+
return pulumi.get(self, "seal_wrap")
|
434
|
+
|
435
|
+
@seal_wrap.setter
|
436
|
+
def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
437
|
+
pulumi.set(self, "seal_wrap", value)
|
438
|
+
|
183
439
|
@_builtins.property
|
184
440
|
@pulumi.getter(name="serverHostnames")
|
185
441
|
def server_hostnames(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
@@ -244,14 +500,31 @@ class SecretBackendArgs:
|
|
244
500
|
@pulumi.input_type
|
245
501
|
class _SecretBackendState:
|
246
502
|
def __init__(__self__, *,
|
503
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
504
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
505
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
506
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
507
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
508
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
247
509
|
default_tls_client_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
|
248
510
|
default_tls_client_key_type: Optional[pulumi.Input[_builtins.str]] = None,
|
249
511
|
default_tls_client_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
512
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
250
513
|
description: Optional[pulumi.Input[_builtins.str]] = None,
|
251
514
|
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
515
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
516
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
517
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
252
518
|
listen_addrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
519
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
520
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
521
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
253
522
|
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
523
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
524
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
254
525
|
path: Optional[pulumi.Input[_builtins.str]] = None,
|
526
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
527
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
255
528
|
server_hostnames: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
256
529
|
server_ips: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
257
530
|
tls_ca_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
|
@@ -259,41 +532,92 @@ class _SecretBackendState:
|
|
259
532
|
tls_min_version: Optional[pulumi.Input[_builtins.str]] = None):
|
260
533
|
"""
|
261
534
|
Input properties used for looking up and filtering SecretBackend resources.
|
535
|
+
:param pulumi.Input[_builtins.str] accessor: Accessor of the mount
|
536
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
537
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
538
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
539
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
540
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
262
541
|
:param pulumi.Input[_builtins.int] default_tls_client_key_bits: Client certificate key bits, valid values depend on key type.
|
263
542
|
:param pulumi.Input[_builtins.str] default_tls_client_key_type: Client certificate key type, `rsa` or `ec`.
|
264
543
|
:param pulumi.Input[_builtins.int] default_tls_client_ttl: Client certificate TTL in seconds
|
265
|
-
:param pulumi.Input[_builtins.str]
|
544
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
545
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend
|
266
546
|
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
267
547
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
548
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
549
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
550
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
268
551
|
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] listen_addrs: Addresses the KMIP server should listen on (`host:port`).
|
552
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
553
|
+
:param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
554
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
269
555
|
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
270
556
|
The value should not contain leading or trailing forward slashes.
|
271
557
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
272
558
|
*Available only for Vault Enterprise*.
|
559
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
560
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
273
561
|
:param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
|
274
562
|
not begin or end with a `/`. Defaults to `kmip`.
|
563
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
564
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
275
565
|
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] server_hostnames: Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN).
|
276
566
|
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] server_ips: IPs to include in the server's TLS certificate as SAN IP addresses.
|
277
567
|
:param pulumi.Input[_builtins.int] tls_ca_key_bits: CA key bits, valid values depend on key type.
|
278
568
|
:param pulumi.Input[_builtins.str] tls_ca_key_type: CA key type, rsa or ec.
|
279
569
|
:param pulumi.Input[_builtins.str] tls_min_version: Minimum TLS version to accept.
|
280
570
|
"""
|
571
|
+
if accessor is not None:
|
572
|
+
pulumi.set(__self__, "accessor", accessor)
|
573
|
+
if allowed_managed_keys is not None:
|
574
|
+
pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
|
575
|
+
if allowed_response_headers is not None:
|
576
|
+
pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
|
577
|
+
if audit_non_hmac_request_keys is not None:
|
578
|
+
pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
|
579
|
+
if audit_non_hmac_response_keys is not None:
|
580
|
+
pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
|
581
|
+
if default_lease_ttl_seconds is not None:
|
582
|
+
pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
|
281
583
|
if default_tls_client_key_bits is not None:
|
282
584
|
pulumi.set(__self__, "default_tls_client_key_bits", default_tls_client_key_bits)
|
283
585
|
if default_tls_client_key_type is not None:
|
284
586
|
pulumi.set(__self__, "default_tls_client_key_type", default_tls_client_key_type)
|
285
587
|
if default_tls_client_ttl is not None:
|
286
588
|
pulumi.set(__self__, "default_tls_client_ttl", default_tls_client_ttl)
|
589
|
+
if delegated_auth_accessors is not None:
|
590
|
+
pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
|
287
591
|
if description is not None:
|
288
592
|
pulumi.set(__self__, "description", description)
|
289
593
|
if disable_remount is not None:
|
290
594
|
pulumi.set(__self__, "disable_remount", disable_remount)
|
595
|
+
if external_entropy_access is not None:
|
596
|
+
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
597
|
+
if force_no_cache is not None:
|
598
|
+
pulumi.set(__self__, "force_no_cache", force_no_cache)
|
599
|
+
if identity_token_key is not None:
|
600
|
+
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
291
601
|
if listen_addrs is not None:
|
292
602
|
pulumi.set(__self__, "listen_addrs", listen_addrs)
|
603
|
+
if listing_visibility is not None:
|
604
|
+
pulumi.set(__self__, "listing_visibility", listing_visibility)
|
605
|
+
if local is not None:
|
606
|
+
pulumi.set(__self__, "local", local)
|
607
|
+
if max_lease_ttl_seconds is not None:
|
608
|
+
pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
|
293
609
|
if namespace is not None:
|
294
610
|
pulumi.set(__self__, "namespace", namespace)
|
611
|
+
if options is not None:
|
612
|
+
pulumi.set(__self__, "options", options)
|
613
|
+
if passthrough_request_headers is not None:
|
614
|
+
pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
|
295
615
|
if path is not None:
|
296
616
|
pulumi.set(__self__, "path", path)
|
617
|
+
if plugin_version is not None:
|
618
|
+
pulumi.set(__self__, "plugin_version", plugin_version)
|
619
|
+
if seal_wrap is not None:
|
620
|
+
pulumi.set(__self__, "seal_wrap", seal_wrap)
|
297
621
|
if server_hostnames is not None:
|
298
622
|
pulumi.set(__self__, "server_hostnames", server_hostnames)
|
299
623
|
if server_ips is not None:
|
@@ -305,6 +629,78 @@ class _SecretBackendState:
|
|
305
629
|
if tls_min_version is not None:
|
306
630
|
pulumi.set(__self__, "tls_min_version", tls_min_version)
|
307
631
|
|
632
|
+
@_builtins.property
|
633
|
+
@pulumi.getter
|
634
|
+
def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
|
635
|
+
"""
|
636
|
+
Accessor of the mount
|
637
|
+
"""
|
638
|
+
return pulumi.get(self, "accessor")
|
639
|
+
|
640
|
+
@accessor.setter
|
641
|
+
def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
|
642
|
+
pulumi.set(self, "accessor", value)
|
643
|
+
|
644
|
+
@_builtins.property
|
645
|
+
@pulumi.getter(name="allowedManagedKeys")
|
646
|
+
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
647
|
+
"""
|
648
|
+
List of managed key registry entry names that the mount in question is allowed to access
|
649
|
+
"""
|
650
|
+
return pulumi.get(self, "allowed_managed_keys")
|
651
|
+
|
652
|
+
@allowed_managed_keys.setter
|
653
|
+
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
654
|
+
pulumi.set(self, "allowed_managed_keys", value)
|
655
|
+
|
656
|
+
@_builtins.property
|
657
|
+
@pulumi.getter(name="allowedResponseHeaders")
|
658
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
659
|
+
"""
|
660
|
+
List of headers to allow and pass from the request to the plugin
|
661
|
+
"""
|
662
|
+
return pulumi.get(self, "allowed_response_headers")
|
663
|
+
|
664
|
+
@allowed_response_headers.setter
|
665
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
666
|
+
pulumi.set(self, "allowed_response_headers", value)
|
667
|
+
|
668
|
+
@_builtins.property
|
669
|
+
@pulumi.getter(name="auditNonHmacRequestKeys")
|
670
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
671
|
+
"""
|
672
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
673
|
+
"""
|
674
|
+
return pulumi.get(self, "audit_non_hmac_request_keys")
|
675
|
+
|
676
|
+
@audit_non_hmac_request_keys.setter
|
677
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
678
|
+
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
679
|
+
|
680
|
+
@_builtins.property
|
681
|
+
@pulumi.getter(name="auditNonHmacResponseKeys")
|
682
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
683
|
+
"""
|
684
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
685
|
+
"""
|
686
|
+
return pulumi.get(self, "audit_non_hmac_response_keys")
|
687
|
+
|
688
|
+
@audit_non_hmac_response_keys.setter
|
689
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
690
|
+
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
691
|
+
|
692
|
+
@_builtins.property
|
693
|
+
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
694
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
695
|
+
"""
|
696
|
+
Default lease duration for tokens and secrets in seconds
|
697
|
+
"""
|
698
|
+
return pulumi.get(self, "default_lease_ttl_seconds")
|
699
|
+
|
700
|
+
@default_lease_ttl_seconds.setter
|
701
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
702
|
+
pulumi.set(self, "default_lease_ttl_seconds", value)
|
703
|
+
|
308
704
|
@_builtins.property
|
309
705
|
@pulumi.getter(name="defaultTlsClientKeyBits")
|
310
706
|
def default_tls_client_key_bits(self) -> Optional[pulumi.Input[_builtins.int]]:
|
@@ -341,11 +737,23 @@ class _SecretBackendState:
|
|
341
737
|
def default_tls_client_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
342
738
|
pulumi.set(self, "default_tls_client_ttl", value)
|
343
739
|
|
740
|
+
@_builtins.property
|
741
|
+
@pulumi.getter(name="delegatedAuthAccessors")
|
742
|
+
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
743
|
+
"""
|
744
|
+
List of headers to allow and pass from the request to the plugin
|
745
|
+
"""
|
746
|
+
return pulumi.get(self, "delegated_auth_accessors")
|
747
|
+
|
748
|
+
@delegated_auth_accessors.setter
|
749
|
+
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
750
|
+
pulumi.set(self, "delegated_auth_accessors", value)
|
751
|
+
|
344
752
|
@_builtins.property
|
345
753
|
@pulumi.getter
|
346
754
|
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
347
755
|
"""
|
348
|
-
|
756
|
+
Human-friendly description of the mount for the backend
|
349
757
|
"""
|
350
758
|
return pulumi.get(self, "description")
|
351
759
|
|
@@ -366,6 +774,42 @@ class _SecretBackendState:
|
|
366
774
|
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
367
775
|
pulumi.set(self, "disable_remount", value)
|
368
776
|
|
777
|
+
@_builtins.property
|
778
|
+
@pulumi.getter(name="externalEntropyAccess")
|
779
|
+
def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
780
|
+
"""
|
781
|
+
Enable the secrets engine to access Vault's external entropy source
|
782
|
+
"""
|
783
|
+
return pulumi.get(self, "external_entropy_access")
|
784
|
+
|
785
|
+
@external_entropy_access.setter
|
786
|
+
def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
787
|
+
pulumi.set(self, "external_entropy_access", value)
|
788
|
+
|
789
|
+
@_builtins.property
|
790
|
+
@pulumi.getter(name="forceNoCache")
|
791
|
+
def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
792
|
+
"""
|
793
|
+
If set to true, disables caching.
|
794
|
+
"""
|
795
|
+
return pulumi.get(self, "force_no_cache")
|
796
|
+
|
797
|
+
@force_no_cache.setter
|
798
|
+
def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
799
|
+
pulumi.set(self, "force_no_cache", value)
|
800
|
+
|
801
|
+
@_builtins.property
|
802
|
+
@pulumi.getter(name="identityTokenKey")
|
803
|
+
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
804
|
+
"""
|
805
|
+
The key to use for signing plugin workload identity tokens
|
806
|
+
"""
|
807
|
+
return pulumi.get(self, "identity_token_key")
|
808
|
+
|
809
|
+
@identity_token_key.setter
|
810
|
+
def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
811
|
+
pulumi.set(self, "identity_token_key", value)
|
812
|
+
|
369
813
|
@_builtins.property
|
370
814
|
@pulumi.getter(name="listenAddrs")
|
371
815
|
def listen_addrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
@@ -378,6 +822,42 @@ class _SecretBackendState:
|
|
378
822
|
def listen_addrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
379
823
|
pulumi.set(self, "listen_addrs", value)
|
380
824
|
|
825
|
+
@_builtins.property
|
826
|
+
@pulumi.getter(name="listingVisibility")
|
827
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
828
|
+
"""
|
829
|
+
Specifies whether to show this mount in the UI-specific listing endpoint
|
830
|
+
"""
|
831
|
+
return pulumi.get(self, "listing_visibility")
|
832
|
+
|
833
|
+
@listing_visibility.setter
|
834
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
835
|
+
pulumi.set(self, "listing_visibility", value)
|
836
|
+
|
837
|
+
@_builtins.property
|
838
|
+
@pulumi.getter
|
839
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
840
|
+
"""
|
841
|
+
Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
842
|
+
"""
|
843
|
+
return pulumi.get(self, "local")
|
844
|
+
|
845
|
+
@local.setter
|
846
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
847
|
+
pulumi.set(self, "local", value)
|
848
|
+
|
849
|
+
@_builtins.property
|
850
|
+
@pulumi.getter(name="maxLeaseTtlSeconds")
|
851
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
852
|
+
"""
|
853
|
+
Maximum possible lease duration for tokens and secrets in seconds
|
854
|
+
"""
|
855
|
+
return pulumi.get(self, "max_lease_ttl_seconds")
|
856
|
+
|
857
|
+
@max_lease_ttl_seconds.setter
|
858
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
859
|
+
pulumi.set(self, "max_lease_ttl_seconds", value)
|
860
|
+
|
381
861
|
@_builtins.property
|
382
862
|
@pulumi.getter
|
383
863
|
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
@@ -393,6 +873,30 @@ class _SecretBackendState:
|
|
393
873
|
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
394
874
|
pulumi.set(self, "namespace", value)
|
395
875
|
|
876
|
+
@_builtins.property
|
877
|
+
@pulumi.getter
|
878
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
879
|
+
"""
|
880
|
+
Specifies mount type specific options that are passed to the backend
|
881
|
+
"""
|
882
|
+
return pulumi.get(self, "options")
|
883
|
+
|
884
|
+
@options.setter
|
885
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
886
|
+
pulumi.set(self, "options", value)
|
887
|
+
|
888
|
+
@_builtins.property
|
889
|
+
@pulumi.getter(name="passthroughRequestHeaders")
|
890
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
891
|
+
"""
|
892
|
+
List of headers to allow and pass from the request to the plugin
|
893
|
+
"""
|
894
|
+
return pulumi.get(self, "passthrough_request_headers")
|
895
|
+
|
896
|
+
@passthrough_request_headers.setter
|
897
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
898
|
+
pulumi.set(self, "passthrough_request_headers", value)
|
899
|
+
|
396
900
|
@_builtins.property
|
397
901
|
@pulumi.getter
|
398
902
|
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
@@ -406,6 +910,30 @@ class _SecretBackendState:
|
|
406
910
|
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
407
911
|
pulumi.set(self, "path", value)
|
408
912
|
|
913
|
+
@_builtins.property
|
914
|
+
@pulumi.getter(name="pluginVersion")
|
915
|
+
def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
|
916
|
+
"""
|
917
|
+
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
918
|
+
"""
|
919
|
+
return pulumi.get(self, "plugin_version")
|
920
|
+
|
921
|
+
@plugin_version.setter
|
922
|
+
def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
|
923
|
+
pulumi.set(self, "plugin_version", value)
|
924
|
+
|
925
|
+
@_builtins.property
|
926
|
+
@pulumi.getter(name="sealWrap")
|
927
|
+
def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
928
|
+
"""
|
929
|
+
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
930
|
+
"""
|
931
|
+
return pulumi.get(self, "seal_wrap")
|
932
|
+
|
933
|
+
@seal_wrap.setter
|
934
|
+
def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
935
|
+
pulumi.set(self, "seal_wrap", value)
|
936
|
+
|
409
937
|
@_builtins.property
|
410
938
|
@pulumi.getter(name="serverHostnames")
|
411
939
|
def server_hostnames(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
@@ -473,14 +1001,30 @@ class SecretBackend(pulumi.CustomResource):
|
|
473
1001
|
def __init__(__self__,
|
474
1002
|
resource_name: str,
|
475
1003
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1004
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1005
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1006
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1007
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1008
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
476
1009
|
default_tls_client_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
|
477
1010
|
default_tls_client_key_type: Optional[pulumi.Input[_builtins.str]] = None,
|
478
1011
|
default_tls_client_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
1012
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
479
1013
|
description: Optional[pulumi.Input[_builtins.str]] = None,
|
480
1014
|
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
1015
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
1016
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
1017
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
481
1018
|
listen_addrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1019
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
1020
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
1021
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
482
1022
|
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1023
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
1024
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
483
1025
|
path: Optional[pulumi.Input[_builtins.str]] = None,
|
1026
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
1027
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
484
1028
|
server_hostnames: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
485
1029
|
server_ips: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
486
1030
|
tls_ca_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
|
@@ -522,19 +1066,35 @@ class SecretBackend(pulumi.CustomResource):
|
|
522
1066
|
|
523
1067
|
:param str resource_name: The name of the resource.
|
524
1068
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
1069
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
1070
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
1071
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1072
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1073
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
525
1074
|
:param pulumi.Input[_builtins.int] default_tls_client_key_bits: Client certificate key bits, valid values depend on key type.
|
526
1075
|
:param pulumi.Input[_builtins.str] default_tls_client_key_type: Client certificate key type, `rsa` or `ec`.
|
527
1076
|
:param pulumi.Input[_builtins.int] default_tls_client_ttl: Client certificate TTL in seconds
|
528
|
-
:param pulumi.Input[_builtins.str]
|
1077
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
1078
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend
|
529
1079
|
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
530
1080
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
1081
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
1082
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
1083
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
531
1084
|
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] listen_addrs: Addresses the KMIP server should listen on (`host:port`).
|
1085
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
1086
|
+
:param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
1087
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
532
1088
|
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
533
1089
|
The value should not contain leading or trailing forward slashes.
|
534
1090
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
535
1091
|
*Available only for Vault Enterprise*.
|
1092
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
1093
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
536
1094
|
:param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
|
537
1095
|
not begin or end with a `/`. Defaults to `kmip`.
|
1096
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1097
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
538
1098
|
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] server_hostnames: Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN).
|
539
1099
|
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] server_ips: IPs to include in the server's TLS certificate as SAN IP addresses.
|
540
1100
|
:param pulumi.Input[_builtins.int] tls_ca_key_bits: CA key bits, valid values depend on key type.
|
@@ -595,14 +1155,30 @@ class SecretBackend(pulumi.CustomResource):
|
|
595
1155
|
def _internal_init(__self__,
|
596
1156
|
resource_name: str,
|
597
1157
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1158
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1159
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1160
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1161
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1162
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
598
1163
|
default_tls_client_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
|
599
1164
|
default_tls_client_key_type: Optional[pulumi.Input[_builtins.str]] = None,
|
600
1165
|
default_tls_client_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
1166
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
601
1167
|
description: Optional[pulumi.Input[_builtins.str]] = None,
|
602
1168
|
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
1169
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
1170
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
1171
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
603
1172
|
listen_addrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1173
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
1174
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
1175
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
604
1176
|
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1177
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
1178
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
605
1179
|
path: Optional[pulumi.Input[_builtins.str]] = None,
|
1180
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
1181
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
606
1182
|
server_hostnames: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
607
1183
|
server_ips: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
608
1184
|
tls_ca_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
|
@@ -617,21 +1193,38 @@ class SecretBackend(pulumi.CustomResource):
|
|
617
1193
|
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
|
618
1194
|
__props__ = SecretBackendArgs.__new__(SecretBackendArgs)
|
619
1195
|
|
1196
|
+
__props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
|
1197
|
+
__props__.__dict__["allowed_response_headers"] = allowed_response_headers
|
1198
|
+
__props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
|
1199
|
+
__props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
|
1200
|
+
__props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
|
620
1201
|
__props__.__dict__["default_tls_client_key_bits"] = default_tls_client_key_bits
|
621
1202
|
__props__.__dict__["default_tls_client_key_type"] = default_tls_client_key_type
|
622
1203
|
__props__.__dict__["default_tls_client_ttl"] = default_tls_client_ttl
|
1204
|
+
__props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
|
623
1205
|
__props__.__dict__["description"] = description
|
624
1206
|
__props__.__dict__["disable_remount"] = disable_remount
|
1207
|
+
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
1208
|
+
__props__.__dict__["force_no_cache"] = force_no_cache
|
1209
|
+
__props__.__dict__["identity_token_key"] = identity_token_key
|
625
1210
|
__props__.__dict__["listen_addrs"] = listen_addrs
|
1211
|
+
__props__.__dict__["listing_visibility"] = listing_visibility
|
1212
|
+
__props__.__dict__["local"] = local
|
1213
|
+
__props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
|
626
1214
|
__props__.__dict__["namespace"] = namespace
|
1215
|
+
__props__.__dict__["options"] = options
|
1216
|
+
__props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
|
627
1217
|
if path is None and not opts.urn:
|
628
1218
|
raise TypeError("Missing required property 'path'")
|
629
1219
|
__props__.__dict__["path"] = path
|
1220
|
+
__props__.__dict__["plugin_version"] = plugin_version
|
1221
|
+
__props__.__dict__["seal_wrap"] = seal_wrap
|
630
1222
|
__props__.__dict__["server_hostnames"] = server_hostnames
|
631
1223
|
__props__.__dict__["server_ips"] = server_ips
|
632
1224
|
__props__.__dict__["tls_ca_key_bits"] = tls_ca_key_bits
|
633
1225
|
__props__.__dict__["tls_ca_key_type"] = tls_ca_key_type
|
634
1226
|
__props__.__dict__["tls_min_version"] = tls_min_version
|
1227
|
+
__props__.__dict__["accessor"] = None
|
635
1228
|
super(SecretBackend, __self__).__init__(
|
636
1229
|
'vault:kmip/secretBackend:SecretBackend',
|
637
1230
|
resource_name,
|
@@ -642,14 +1235,31 @@ class SecretBackend(pulumi.CustomResource):
|
|
642
1235
|
def get(resource_name: str,
|
643
1236
|
id: pulumi.Input[str],
|
644
1237
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1238
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
1239
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1240
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1241
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1242
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1243
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
645
1244
|
default_tls_client_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
|
646
1245
|
default_tls_client_key_type: Optional[pulumi.Input[_builtins.str]] = None,
|
647
1246
|
default_tls_client_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
1247
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
648
1248
|
description: Optional[pulumi.Input[_builtins.str]] = None,
|
649
1249
|
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
1250
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
1251
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
1252
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
650
1253
|
listen_addrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1254
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
1255
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
1256
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
651
1257
|
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1258
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
1259
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
652
1260
|
path: Optional[pulumi.Input[_builtins.str]] = None,
|
1261
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
1262
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
653
1263
|
server_hostnames: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
654
1264
|
server_ips: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
655
1265
|
tls_ca_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
|
@@ -662,19 +1272,36 @@ class SecretBackend(pulumi.CustomResource):
|
|
662
1272
|
:param str resource_name: The unique name of the resulting resource.
|
663
1273
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
664
1274
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
1275
|
+
:param pulumi.Input[_builtins.str] accessor: Accessor of the mount
|
1276
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
1277
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
1278
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1279
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1280
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
665
1281
|
:param pulumi.Input[_builtins.int] default_tls_client_key_bits: Client certificate key bits, valid values depend on key type.
|
666
1282
|
:param pulumi.Input[_builtins.str] default_tls_client_key_type: Client certificate key type, `rsa` or `ec`.
|
667
1283
|
:param pulumi.Input[_builtins.int] default_tls_client_ttl: Client certificate TTL in seconds
|
668
|
-
:param pulumi.Input[_builtins.str]
|
1284
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
1285
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend
|
669
1286
|
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
670
1287
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
1288
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
1289
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
1290
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
671
1291
|
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] listen_addrs: Addresses the KMIP server should listen on (`host:port`).
|
1292
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
1293
|
+
:param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
1294
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
672
1295
|
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
673
1296
|
The value should not contain leading or trailing forward slashes.
|
674
1297
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
675
1298
|
*Available only for Vault Enterprise*.
|
1299
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
1300
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
676
1301
|
:param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
|
677
1302
|
not begin or end with a `/`. Defaults to `kmip`.
|
1303
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1304
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
678
1305
|
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] server_hostnames: Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN).
|
679
1306
|
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] server_ips: IPs to include in the server's TLS certificate as SAN IP addresses.
|
680
1307
|
:param pulumi.Input[_builtins.int] tls_ca_key_bits: CA key bits, valid values depend on key type.
|
@@ -685,14 +1312,31 @@ class SecretBackend(pulumi.CustomResource):
|
|
685
1312
|
|
686
1313
|
__props__ = _SecretBackendState.__new__(_SecretBackendState)
|
687
1314
|
|
1315
|
+
__props__.__dict__["accessor"] = accessor
|
1316
|
+
__props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
|
1317
|
+
__props__.__dict__["allowed_response_headers"] = allowed_response_headers
|
1318
|
+
__props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
|
1319
|
+
__props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
|
1320
|
+
__props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
|
688
1321
|
__props__.__dict__["default_tls_client_key_bits"] = default_tls_client_key_bits
|
689
1322
|
__props__.__dict__["default_tls_client_key_type"] = default_tls_client_key_type
|
690
1323
|
__props__.__dict__["default_tls_client_ttl"] = default_tls_client_ttl
|
1324
|
+
__props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
|
691
1325
|
__props__.__dict__["description"] = description
|
692
1326
|
__props__.__dict__["disable_remount"] = disable_remount
|
1327
|
+
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
1328
|
+
__props__.__dict__["force_no_cache"] = force_no_cache
|
1329
|
+
__props__.__dict__["identity_token_key"] = identity_token_key
|
693
1330
|
__props__.__dict__["listen_addrs"] = listen_addrs
|
1331
|
+
__props__.__dict__["listing_visibility"] = listing_visibility
|
1332
|
+
__props__.__dict__["local"] = local
|
1333
|
+
__props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
|
694
1334
|
__props__.__dict__["namespace"] = namespace
|
1335
|
+
__props__.__dict__["options"] = options
|
1336
|
+
__props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
|
695
1337
|
__props__.__dict__["path"] = path
|
1338
|
+
__props__.__dict__["plugin_version"] = plugin_version
|
1339
|
+
__props__.__dict__["seal_wrap"] = seal_wrap
|
696
1340
|
__props__.__dict__["server_hostnames"] = server_hostnames
|
697
1341
|
__props__.__dict__["server_ips"] = server_ips
|
698
1342
|
__props__.__dict__["tls_ca_key_bits"] = tls_ca_key_bits
|
@@ -700,6 +1344,54 @@ class SecretBackend(pulumi.CustomResource):
|
|
700
1344
|
__props__.__dict__["tls_min_version"] = tls_min_version
|
701
1345
|
return SecretBackend(resource_name, opts=opts, __props__=__props__)
|
702
1346
|
|
1347
|
+
@_builtins.property
|
1348
|
+
@pulumi.getter
|
1349
|
+
def accessor(self) -> pulumi.Output[_builtins.str]:
|
1350
|
+
"""
|
1351
|
+
Accessor of the mount
|
1352
|
+
"""
|
1353
|
+
return pulumi.get(self, "accessor")
|
1354
|
+
|
1355
|
+
@_builtins.property
|
1356
|
+
@pulumi.getter(name="allowedManagedKeys")
|
1357
|
+
def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1358
|
+
"""
|
1359
|
+
List of managed key registry entry names that the mount in question is allowed to access
|
1360
|
+
"""
|
1361
|
+
return pulumi.get(self, "allowed_managed_keys")
|
1362
|
+
|
1363
|
+
@_builtins.property
|
1364
|
+
@pulumi.getter(name="allowedResponseHeaders")
|
1365
|
+
def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1366
|
+
"""
|
1367
|
+
List of headers to allow and pass from the request to the plugin
|
1368
|
+
"""
|
1369
|
+
return pulumi.get(self, "allowed_response_headers")
|
1370
|
+
|
1371
|
+
@_builtins.property
|
1372
|
+
@pulumi.getter(name="auditNonHmacRequestKeys")
|
1373
|
+
def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
1374
|
+
"""
|
1375
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1376
|
+
"""
|
1377
|
+
return pulumi.get(self, "audit_non_hmac_request_keys")
|
1378
|
+
|
1379
|
+
@_builtins.property
|
1380
|
+
@pulumi.getter(name="auditNonHmacResponseKeys")
|
1381
|
+
def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
1382
|
+
"""
|
1383
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1384
|
+
"""
|
1385
|
+
return pulumi.get(self, "audit_non_hmac_response_keys")
|
1386
|
+
|
1387
|
+
@_builtins.property
|
1388
|
+
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
1389
|
+
def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
|
1390
|
+
"""
|
1391
|
+
Default lease duration for tokens and secrets in seconds
|
1392
|
+
"""
|
1393
|
+
return pulumi.get(self, "default_lease_ttl_seconds")
|
1394
|
+
|
703
1395
|
@_builtins.property
|
704
1396
|
@pulumi.getter(name="defaultTlsClientKeyBits")
|
705
1397
|
def default_tls_client_key_bits(self) -> pulumi.Output[_builtins.int]:
|
@@ -724,11 +1416,19 @@ class SecretBackend(pulumi.CustomResource):
|
|
724
1416
|
"""
|
725
1417
|
return pulumi.get(self, "default_tls_client_ttl")
|
726
1418
|
|
1419
|
+
@_builtins.property
|
1420
|
+
@pulumi.getter(name="delegatedAuthAccessors")
|
1421
|
+
def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1422
|
+
"""
|
1423
|
+
List of headers to allow and pass from the request to the plugin
|
1424
|
+
"""
|
1425
|
+
return pulumi.get(self, "delegated_auth_accessors")
|
1426
|
+
|
727
1427
|
@_builtins.property
|
728
1428
|
@pulumi.getter
|
729
1429
|
def description(self) -> pulumi.Output[Optional[_builtins.str]]:
|
730
1430
|
"""
|
731
|
-
|
1431
|
+
Human-friendly description of the mount for the backend
|
732
1432
|
"""
|
733
1433
|
return pulumi.get(self, "description")
|
734
1434
|
|
@@ -741,6 +1441,30 @@ class SecretBackend(pulumi.CustomResource):
|
|
741
1441
|
"""
|
742
1442
|
return pulumi.get(self, "disable_remount")
|
743
1443
|
|
1444
|
+
@_builtins.property
|
1445
|
+
@pulumi.getter(name="externalEntropyAccess")
|
1446
|
+
def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1447
|
+
"""
|
1448
|
+
Enable the secrets engine to access Vault's external entropy source
|
1449
|
+
"""
|
1450
|
+
return pulumi.get(self, "external_entropy_access")
|
1451
|
+
|
1452
|
+
@_builtins.property
|
1453
|
+
@pulumi.getter(name="forceNoCache")
|
1454
|
+
def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
|
1455
|
+
"""
|
1456
|
+
If set to true, disables caching.
|
1457
|
+
"""
|
1458
|
+
return pulumi.get(self, "force_no_cache")
|
1459
|
+
|
1460
|
+
@_builtins.property
|
1461
|
+
@pulumi.getter(name="identityTokenKey")
|
1462
|
+
def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1463
|
+
"""
|
1464
|
+
The key to use for signing plugin workload identity tokens
|
1465
|
+
"""
|
1466
|
+
return pulumi.get(self, "identity_token_key")
|
1467
|
+
|
744
1468
|
@_builtins.property
|
745
1469
|
@pulumi.getter(name="listenAddrs")
|
746
1470
|
def listen_addrs(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
@@ -749,6 +1473,30 @@ class SecretBackend(pulumi.CustomResource):
|
|
749
1473
|
"""
|
750
1474
|
return pulumi.get(self, "listen_addrs")
|
751
1475
|
|
1476
|
+
@_builtins.property
|
1477
|
+
@pulumi.getter(name="listingVisibility")
|
1478
|
+
def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1479
|
+
"""
|
1480
|
+
Specifies whether to show this mount in the UI-specific listing endpoint
|
1481
|
+
"""
|
1482
|
+
return pulumi.get(self, "listing_visibility")
|
1483
|
+
|
1484
|
+
@_builtins.property
|
1485
|
+
@pulumi.getter
|
1486
|
+
def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1487
|
+
"""
|
1488
|
+
Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
1489
|
+
"""
|
1490
|
+
return pulumi.get(self, "local")
|
1491
|
+
|
1492
|
+
@_builtins.property
|
1493
|
+
@pulumi.getter(name="maxLeaseTtlSeconds")
|
1494
|
+
def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
|
1495
|
+
"""
|
1496
|
+
Maximum possible lease duration for tokens and secrets in seconds
|
1497
|
+
"""
|
1498
|
+
return pulumi.get(self, "max_lease_ttl_seconds")
|
1499
|
+
|
752
1500
|
@_builtins.property
|
753
1501
|
@pulumi.getter
|
754
1502
|
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
@@ -760,6 +1508,22 @@ class SecretBackend(pulumi.CustomResource):
|
|
760
1508
|
"""
|
761
1509
|
return pulumi.get(self, "namespace")
|
762
1510
|
|
1511
|
+
@_builtins.property
|
1512
|
+
@pulumi.getter
|
1513
|
+
def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
|
1514
|
+
"""
|
1515
|
+
Specifies mount type specific options that are passed to the backend
|
1516
|
+
"""
|
1517
|
+
return pulumi.get(self, "options")
|
1518
|
+
|
1519
|
+
@_builtins.property
|
1520
|
+
@pulumi.getter(name="passthroughRequestHeaders")
|
1521
|
+
def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1522
|
+
"""
|
1523
|
+
List of headers to allow and pass from the request to the plugin
|
1524
|
+
"""
|
1525
|
+
return pulumi.get(self, "passthrough_request_headers")
|
1526
|
+
|
763
1527
|
@_builtins.property
|
764
1528
|
@pulumi.getter
|
765
1529
|
def path(self) -> pulumi.Output[_builtins.str]:
|
@@ -769,6 +1533,22 @@ class SecretBackend(pulumi.CustomResource):
|
|
769
1533
|
"""
|
770
1534
|
return pulumi.get(self, "path")
|
771
1535
|
|
1536
|
+
@_builtins.property
|
1537
|
+
@pulumi.getter(name="pluginVersion")
|
1538
|
+
def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1539
|
+
"""
|
1540
|
+
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1541
|
+
"""
|
1542
|
+
return pulumi.get(self, "plugin_version")
|
1543
|
+
|
1544
|
+
@_builtins.property
|
1545
|
+
@pulumi.getter(name="sealWrap")
|
1546
|
+
def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
|
1547
|
+
"""
|
1548
|
+
Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1549
|
+
"""
|
1550
|
+
return pulumi.get(self, "seal_wrap")
|
1551
|
+
|
772
1552
|
@_builtins.property
|
773
1553
|
@pulumi.getter(name="serverHostnames")
|
774
1554
|
def server_hostnames(self) -> pulumi.Output[Sequence[_builtins.str]]:
|