pulumi-vault 7.2.0a1755297899__py3-none-any.whl → 7.3.0a1755586140__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +18 -0
- pulumi_vault/_inputs.py +201 -0
- pulumi_vault/aws/secret_backend.py +627 -49
- pulumi_vault/azure/backend.py +788 -15
- pulumi_vault/consul/secret_backend.py +660 -28
- pulumi_vault/database/secrets_mount.py +47 -0
- pulumi_vault/gcp/secret_backend.py +599 -56
- pulumi_vault/jwt/auth_backend.py +47 -0
- pulumi_vault/kmip/secret_backend.py +787 -7
- pulumi_vault/kubernetes/secret_backend.py +47 -0
- pulumi_vault/ldap/secret_backend.py +75 -35
- pulumi_vault/mount.py +47 -0
- pulumi_vault/nomad_secret_backend.py +660 -21
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/outputs.py +153 -0
- pulumi_vault/pkisecret/backend_config_scep.py +68 -21
- pulumi_vault/pkisecret/get_backend_config_scep.py +21 -1
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/rabbitmq/secret_backend.py +707 -35
- pulumi_vault/ssh/secret_backend_ca.py +101 -7
- pulumi_vault/terraformcloud/secret_backend.py +707 -28
- pulumi_vault/transit/secret_backend_key.py +49 -21
- {pulumi_vault-7.2.0a1755297899.dist-info → pulumi_vault-7.3.0a1755586140.dist-info}/METADATA +1 -1
- {pulumi_vault-7.2.0a1755297899.dist-info → pulumi_vault-7.3.0a1755586140.dist-info}/RECORD +27 -25
- {pulumi_vault-7.2.0a1755297899.dist-info → pulumi_vault-7.3.0a1755586140.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1755297899.dist-info → pulumi_vault-7.3.0a1755586140.dist-info}/top_level.txt +0 -0
@@ -29,6 +29,7 @@ class SecretBackendArgs:
|
|
29
29
|
description: Optional[pulumi.Input[_builtins.str]] = None,
|
30
30
|
disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
|
31
31
|
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
32
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
32
33
|
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
33
34
|
kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
34
35
|
kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
|
@@ -54,6 +55,7 @@ class SecretBackendArgs:
|
|
54
55
|
:param pulumi.Input[_builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
|
55
56
|
service account JWT when Vault is running in a Kubernetes pod.
|
56
57
|
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
58
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
57
59
|
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
58
60
|
:param pulumi.Input[_builtins.str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
|
59
61
|
secrets engine to verify the Kubernetes API server certificate. Defaults to the local
|
@@ -96,6 +98,8 @@ class SecretBackendArgs:
|
|
96
98
|
pulumi.set(__self__, "disable_local_ca_jwt", disable_local_ca_jwt)
|
97
99
|
if external_entropy_access is not None:
|
98
100
|
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
101
|
+
if force_no_cache is not None:
|
102
|
+
pulumi.set(__self__, "force_no_cache", force_no_cache)
|
99
103
|
if identity_token_key is not None:
|
100
104
|
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
101
105
|
if kubernetes_ca_cert is not None:
|
@@ -242,6 +246,18 @@ class SecretBackendArgs:
|
|
242
246
|
def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
243
247
|
pulumi.set(self, "external_entropy_access", value)
|
244
248
|
|
249
|
+
@_builtins.property
|
250
|
+
@pulumi.getter(name="forceNoCache")
|
251
|
+
def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
252
|
+
"""
|
253
|
+
If set to true, disables caching.
|
254
|
+
"""
|
255
|
+
return pulumi.get(self, "force_no_cache")
|
256
|
+
|
257
|
+
@force_no_cache.setter
|
258
|
+
def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
259
|
+
pulumi.set(self, "force_no_cache", value)
|
260
|
+
|
245
261
|
@_builtins.property
|
246
262
|
@pulumi.getter(name="identityTokenKey")
|
247
263
|
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
@@ -410,6 +426,7 @@ class _SecretBackendState:
|
|
410
426
|
description: Optional[pulumi.Input[_builtins.str]] = None,
|
411
427
|
disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
|
412
428
|
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
429
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
413
430
|
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
414
431
|
kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
415
432
|
kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
|
@@ -436,6 +453,7 @@ class _SecretBackendState:
|
|
436
453
|
:param pulumi.Input[_builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
|
437
454
|
service account JWT when Vault is running in a Kubernetes pod.
|
438
455
|
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
456
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
439
457
|
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
440
458
|
:param pulumi.Input[_builtins.str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
|
441
459
|
secrets engine to verify the Kubernetes API server certificate. Defaults to the local
|
@@ -480,6 +498,8 @@ class _SecretBackendState:
|
|
480
498
|
pulumi.set(__self__, "disable_local_ca_jwt", disable_local_ca_jwt)
|
481
499
|
if external_entropy_access is not None:
|
482
500
|
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
501
|
+
if force_no_cache is not None:
|
502
|
+
pulumi.set(__self__, "force_no_cache", force_no_cache)
|
483
503
|
if identity_token_key is not None:
|
484
504
|
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
485
505
|
if kubernetes_ca_cert is not None:
|
@@ -628,6 +648,18 @@ class _SecretBackendState:
|
|
628
648
|
def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
629
649
|
pulumi.set(self, "external_entropy_access", value)
|
630
650
|
|
651
|
+
@_builtins.property
|
652
|
+
@pulumi.getter(name="forceNoCache")
|
653
|
+
def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
654
|
+
"""
|
655
|
+
If set to true, disables caching.
|
656
|
+
"""
|
657
|
+
return pulumi.get(self, "force_no_cache")
|
658
|
+
|
659
|
+
@force_no_cache.setter
|
660
|
+
def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
661
|
+
pulumi.set(self, "force_no_cache", value)
|
662
|
+
|
631
663
|
@_builtins.property
|
632
664
|
@pulumi.getter(name="identityTokenKey")
|
633
665
|
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
@@ -810,6 +842,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
810
842
|
description: Optional[pulumi.Input[_builtins.str]] = None,
|
811
843
|
disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
|
812
844
|
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
845
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
813
846
|
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
814
847
|
kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
815
848
|
kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
|
@@ -863,6 +896,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
863
896
|
:param pulumi.Input[_builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
|
864
897
|
service account JWT when Vault is running in a Kubernetes pod.
|
865
898
|
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
899
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
866
900
|
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
867
901
|
:param pulumi.Input[_builtins.str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
|
868
902
|
secrets engine to verify the Kubernetes API server certificate. Defaults to the local
|
@@ -944,6 +978,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
944
978
|
description: Optional[pulumi.Input[_builtins.str]] = None,
|
945
979
|
disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
|
946
980
|
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
981
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
947
982
|
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
948
983
|
kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
949
984
|
kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
|
@@ -975,6 +1010,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
975
1010
|
__props__.__dict__["description"] = description
|
976
1011
|
__props__.__dict__["disable_local_ca_jwt"] = disable_local_ca_jwt
|
977
1012
|
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
1013
|
+
__props__.__dict__["force_no_cache"] = force_no_cache
|
978
1014
|
__props__.__dict__["identity_token_key"] = identity_token_key
|
979
1015
|
__props__.__dict__["kubernetes_ca_cert"] = kubernetes_ca_cert
|
980
1016
|
__props__.__dict__["kubernetes_host"] = kubernetes_host
|
@@ -1013,6 +1049,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1013
1049
|
description: Optional[pulumi.Input[_builtins.str]] = None,
|
1014
1050
|
disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
|
1015
1051
|
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
1052
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
1016
1053
|
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1017
1054
|
kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
1018
1055
|
kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
|
@@ -1044,6 +1081,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1044
1081
|
:param pulumi.Input[_builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
|
1045
1082
|
service account JWT when Vault is running in a Kubernetes pod.
|
1046
1083
|
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
1084
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
1047
1085
|
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
1048
1086
|
:param pulumi.Input[_builtins.str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
|
1049
1087
|
secrets engine to verify the Kubernetes API server certificate. Defaults to the local
|
@@ -1082,6 +1120,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1082
1120
|
__props__.__dict__["description"] = description
|
1083
1121
|
__props__.__dict__["disable_local_ca_jwt"] = disable_local_ca_jwt
|
1084
1122
|
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
1123
|
+
__props__.__dict__["force_no_cache"] = force_no_cache
|
1085
1124
|
__props__.__dict__["identity_token_key"] = identity_token_key
|
1086
1125
|
__props__.__dict__["kubernetes_ca_cert"] = kubernetes_ca_cert
|
1087
1126
|
__props__.__dict__["kubernetes_host"] = kubernetes_host
|
@@ -1178,6 +1217,14 @@ class SecretBackend(pulumi.CustomResource):
|
|
1178
1217
|
"""
|
1179
1218
|
return pulumi.get(self, "external_entropy_access")
|
1180
1219
|
|
1220
|
+
@_builtins.property
|
1221
|
+
@pulumi.getter(name="forceNoCache")
|
1222
|
+
def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
|
1223
|
+
"""
|
1224
|
+
If set to true, disables caching.
|
1225
|
+
"""
|
1226
|
+
return pulumi.get(self, "force_no_cache")
|
1227
|
+
|
1181
1228
|
@_builtins.property
|
1182
1229
|
@pulumi.getter(name="identityTokenKey")
|
1183
1230
|
def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
|
@@ -35,6 +35,7 @@ class SecretBackendArgs:
|
|
35
35
|
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
36
36
|
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
37
37
|
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
38
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
38
39
|
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
39
40
|
insecure_tls: Optional[pulumi.Input[_builtins.bool]] = None,
|
40
41
|
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
@@ -72,19 +73,19 @@ class SecretBackendArgs:
|
|
72
73
|
:param pulumi.Input[_builtins.str] client_tls_key: Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
|
73
74
|
:param pulumi.Input[_builtins.int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
|
74
75
|
the next URL in the configuration.
|
75
|
-
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
|
76
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
76
77
|
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
77
|
-
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
78
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
78
79
|
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
79
80
|
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
80
81
|
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
82
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
81
83
|
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
82
84
|
:param pulumi.Input[_builtins.bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
|
83
85
|
Defaults to `false`.
|
84
86
|
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
85
|
-
:param pulumi.Input[_builtins.bool] local:
|
86
|
-
|
87
|
-
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
87
|
+
:param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
88
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
88
89
|
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
89
90
|
The value should not contain leading or trailing forward slashes.
|
90
91
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
@@ -145,6 +146,8 @@ class SecretBackendArgs:
|
|
145
146
|
pulumi.set(__self__, "disable_remount", disable_remount)
|
146
147
|
if external_entropy_access is not None:
|
147
148
|
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
149
|
+
if force_no_cache is not None:
|
150
|
+
pulumi.set(__self__, "force_no_cache", force_no_cache)
|
148
151
|
if identity_token_key is not None:
|
149
152
|
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
150
153
|
if insecure_tls is not None:
|
@@ -318,7 +321,7 @@ class SecretBackendArgs:
|
|
318
321
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
319
322
|
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
320
323
|
"""
|
321
|
-
Default lease duration for secrets in seconds
|
324
|
+
Default lease duration for tokens and secrets in seconds
|
322
325
|
"""
|
323
326
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
324
327
|
|
@@ -342,7 +345,7 @@ class SecretBackendArgs:
|
|
342
345
|
@pulumi.getter
|
343
346
|
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
344
347
|
"""
|
345
|
-
Human-friendly description of the mount
|
348
|
+
Human-friendly description of the mount
|
346
349
|
"""
|
347
350
|
return pulumi.get(self, "description")
|
348
351
|
|
@@ -386,6 +389,18 @@ class SecretBackendArgs:
|
|
386
389
|
def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
387
390
|
pulumi.set(self, "external_entropy_access", value)
|
388
391
|
|
392
|
+
@_builtins.property
|
393
|
+
@pulumi.getter(name="forceNoCache")
|
394
|
+
def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
395
|
+
"""
|
396
|
+
If set to true, disables caching.
|
397
|
+
"""
|
398
|
+
return pulumi.get(self, "force_no_cache")
|
399
|
+
|
400
|
+
@force_no_cache.setter
|
401
|
+
def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
402
|
+
pulumi.set(self, "force_no_cache", value)
|
403
|
+
|
389
404
|
@_builtins.property
|
390
405
|
@pulumi.getter(name="identityTokenKey")
|
391
406
|
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
@@ -427,8 +442,7 @@ class SecretBackendArgs:
|
|
427
442
|
@pulumi.getter
|
428
443
|
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
429
444
|
"""
|
430
|
-
|
431
|
-
replication.Tolerance duration to use when checking the last rotation time.
|
445
|
+
Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
432
446
|
"""
|
433
447
|
return pulumi.get(self, "local")
|
434
448
|
|
@@ -440,7 +454,7 @@ class SecretBackendArgs:
|
|
440
454
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
441
455
|
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
442
456
|
"""
|
443
|
-
Maximum possible lease duration for secrets in seconds
|
457
|
+
Maximum possible lease duration for tokens and secrets in seconds
|
444
458
|
"""
|
445
459
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
446
460
|
|
@@ -696,6 +710,7 @@ class _SecretBackendState:
|
|
696
710
|
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
697
711
|
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
698
712
|
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
713
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
699
714
|
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
700
715
|
insecure_tls: Optional[pulumi.Input[_builtins.bool]] = None,
|
701
716
|
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
@@ -734,19 +749,19 @@ class _SecretBackendState:
|
|
734
749
|
:param pulumi.Input[_builtins.str] client_tls_key: Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
|
735
750
|
:param pulumi.Input[_builtins.int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
|
736
751
|
the next URL in the configuration.
|
737
|
-
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
|
752
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
738
753
|
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
739
|
-
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
754
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
740
755
|
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
741
756
|
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
742
757
|
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
758
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
743
759
|
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
744
760
|
:param pulumi.Input[_builtins.bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
|
745
761
|
Defaults to `false`.
|
746
762
|
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
747
|
-
:param pulumi.Input[_builtins.bool] local:
|
748
|
-
|
749
|
-
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
763
|
+
:param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
764
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
750
765
|
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
751
766
|
The value should not contain leading or trailing forward slashes.
|
752
767
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
@@ -811,6 +826,8 @@ class _SecretBackendState:
|
|
811
826
|
pulumi.set(__self__, "disable_remount", disable_remount)
|
812
827
|
if external_entropy_access is not None:
|
813
828
|
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
829
|
+
if force_no_cache is not None:
|
830
|
+
pulumi.set(__self__, "force_no_cache", force_no_cache)
|
814
831
|
if identity_token_key is not None:
|
815
832
|
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
816
833
|
if insecure_tls is not None:
|
@@ -996,7 +1013,7 @@ class _SecretBackendState:
|
|
996
1013
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
997
1014
|
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
998
1015
|
"""
|
999
|
-
Default lease duration for secrets in seconds
|
1016
|
+
Default lease duration for tokens and secrets in seconds
|
1000
1017
|
"""
|
1001
1018
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
1002
1019
|
|
@@ -1020,7 +1037,7 @@ class _SecretBackendState:
|
|
1020
1037
|
@pulumi.getter
|
1021
1038
|
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1022
1039
|
"""
|
1023
|
-
Human-friendly description of the mount
|
1040
|
+
Human-friendly description of the mount
|
1024
1041
|
"""
|
1025
1042
|
return pulumi.get(self, "description")
|
1026
1043
|
|
@@ -1064,6 +1081,18 @@ class _SecretBackendState:
|
|
1064
1081
|
def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1065
1082
|
pulumi.set(self, "external_entropy_access", value)
|
1066
1083
|
|
1084
|
+
@_builtins.property
|
1085
|
+
@pulumi.getter(name="forceNoCache")
|
1086
|
+
def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1087
|
+
"""
|
1088
|
+
If set to true, disables caching.
|
1089
|
+
"""
|
1090
|
+
return pulumi.get(self, "force_no_cache")
|
1091
|
+
|
1092
|
+
@force_no_cache.setter
|
1093
|
+
def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1094
|
+
pulumi.set(self, "force_no_cache", value)
|
1095
|
+
|
1067
1096
|
@_builtins.property
|
1068
1097
|
@pulumi.getter(name="identityTokenKey")
|
1069
1098
|
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
@@ -1105,8 +1134,7 @@ class _SecretBackendState:
|
|
1105
1134
|
@pulumi.getter
|
1106
1135
|
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1107
1136
|
"""
|
1108
|
-
|
1109
|
-
replication.Tolerance duration to use when checking the last rotation time.
|
1137
|
+
Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
1110
1138
|
"""
|
1111
1139
|
return pulumi.get(self, "local")
|
1112
1140
|
|
@@ -1118,7 +1146,7 @@ class _SecretBackendState:
|
|
1118
1146
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
1119
1147
|
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
1120
1148
|
"""
|
1121
|
-
Maximum possible lease duration for secrets in seconds
|
1149
|
+
Maximum possible lease duration for tokens and secrets in seconds
|
1122
1150
|
"""
|
1123
1151
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
1124
1152
|
|
@@ -1376,6 +1404,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1376
1404
|
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
1377
1405
|
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
1378
1406
|
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
1407
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
1379
1408
|
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1380
1409
|
insecure_tls: Optional[pulumi.Input[_builtins.bool]] = None,
|
1381
1410
|
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
@@ -1440,19 +1469,19 @@ class SecretBackend(pulumi.CustomResource):
|
|
1440
1469
|
:param pulumi.Input[_builtins.str] client_tls_key: Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
|
1441
1470
|
:param pulumi.Input[_builtins.int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
|
1442
1471
|
the next URL in the configuration.
|
1443
|
-
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
|
1472
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
1444
1473
|
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
1445
|
-
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
1474
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
1446
1475
|
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
1447
1476
|
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
1448
1477
|
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
1478
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
1449
1479
|
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
1450
1480
|
:param pulumi.Input[_builtins.bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
|
1451
1481
|
Defaults to `false`.
|
1452
1482
|
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
1453
|
-
:param pulumi.Input[_builtins.bool] local:
|
1454
|
-
|
1455
|
-
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
1483
|
+
:param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
1484
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
1456
1485
|
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
1457
1486
|
The value should not contain leading or trailing forward slashes.
|
1458
1487
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
@@ -1546,6 +1575,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1546
1575
|
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
1547
1576
|
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
1548
1577
|
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
1578
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
1549
1579
|
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1550
1580
|
insecure_tls: Optional[pulumi.Input[_builtins.bool]] = None,
|
1551
1581
|
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
@@ -1598,6 +1628,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1598
1628
|
__props__.__dict__["disable_automated_rotation"] = disable_automated_rotation
|
1599
1629
|
__props__.__dict__["disable_remount"] = disable_remount
|
1600
1630
|
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
1631
|
+
__props__.__dict__["force_no_cache"] = force_no_cache
|
1601
1632
|
__props__.__dict__["identity_token_key"] = identity_token_key
|
1602
1633
|
__props__.__dict__["insecure_tls"] = insecure_tls
|
1603
1634
|
__props__.__dict__["listing_visibility"] = listing_visibility
|
@@ -1651,6 +1682,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1651
1682
|
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
1652
1683
|
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
1653
1684
|
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
1685
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
1654
1686
|
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1655
1687
|
insecure_tls: Optional[pulumi.Input[_builtins.bool]] = None,
|
1656
1688
|
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
@@ -1694,19 +1726,19 @@ class SecretBackend(pulumi.CustomResource):
|
|
1694
1726
|
:param pulumi.Input[_builtins.str] client_tls_key: Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
|
1695
1727
|
:param pulumi.Input[_builtins.int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
|
1696
1728
|
the next URL in the configuration.
|
1697
|
-
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
|
1729
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
1698
1730
|
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
1699
|
-
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
1731
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
1700
1732
|
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
1701
1733
|
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
1702
1734
|
:param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
1735
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
1703
1736
|
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
1704
1737
|
:param pulumi.Input[_builtins.bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
|
1705
1738
|
Defaults to `false`.
|
1706
1739
|
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
1707
|
-
:param pulumi.Input[_builtins.bool] local:
|
1708
|
-
|
1709
|
-
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
1740
|
+
:param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
1741
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
1710
1742
|
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
1711
1743
|
The value should not contain leading or trailing forward slashes.
|
1712
1744
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
@@ -1758,6 +1790,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1758
1790
|
__props__.__dict__["disable_automated_rotation"] = disable_automated_rotation
|
1759
1791
|
__props__.__dict__["disable_remount"] = disable_remount
|
1760
1792
|
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
1793
|
+
__props__.__dict__["force_no_cache"] = force_no_cache
|
1761
1794
|
__props__.__dict__["identity_token_key"] = identity_token_key
|
1762
1795
|
__props__.__dict__["insecure_tls"] = insecure_tls
|
1763
1796
|
__props__.__dict__["listing_visibility"] = listing_visibility
|
@@ -1877,7 +1910,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1877
1910
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
1878
1911
|
def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
|
1879
1912
|
"""
|
1880
|
-
Default lease duration for secrets in seconds
|
1913
|
+
Default lease duration for tokens and secrets in seconds
|
1881
1914
|
"""
|
1882
1915
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
1883
1916
|
|
@@ -1893,7 +1926,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1893
1926
|
@pulumi.getter
|
1894
1927
|
def description(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1895
1928
|
"""
|
1896
|
-
Human-friendly description of the mount
|
1929
|
+
Human-friendly description of the mount
|
1897
1930
|
"""
|
1898
1931
|
return pulumi.get(self, "description")
|
1899
1932
|
|
@@ -1921,6 +1954,14 @@ class SecretBackend(pulumi.CustomResource):
|
|
1921
1954
|
"""
|
1922
1955
|
return pulumi.get(self, "external_entropy_access")
|
1923
1956
|
|
1957
|
+
@_builtins.property
|
1958
|
+
@pulumi.getter(name="forceNoCache")
|
1959
|
+
def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
|
1960
|
+
"""
|
1961
|
+
If set to true, disables caching.
|
1962
|
+
"""
|
1963
|
+
return pulumi.get(self, "force_no_cache")
|
1964
|
+
|
1924
1965
|
@_builtins.property
|
1925
1966
|
@pulumi.getter(name="identityTokenKey")
|
1926
1967
|
def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
|
@@ -1950,8 +1991,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1950
1991
|
@pulumi.getter
|
1951
1992
|
def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1952
1993
|
"""
|
1953
|
-
|
1954
|
-
replication.Tolerance duration to use when checking the last rotation time.
|
1994
|
+
Local mount flag that can be explicitly set to true to enforce local mount in HA environment
|
1955
1995
|
"""
|
1956
1996
|
return pulumi.get(self, "local")
|
1957
1997
|
|
@@ -1959,7 +1999,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1959
1999
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
1960
2000
|
def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
|
1961
2001
|
"""
|
1962
|
-
Maximum possible lease duration for secrets in seconds
|
2002
|
+
Maximum possible lease duration for tokens and secrets in seconds
|
1963
2003
|
"""
|
1964
2004
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
1965
2005
|
|