pulumi-vault 7.6.0a1764657486__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1399 -0
- pulumi_vault/_inputs.py +2701 -0
- pulumi_vault/_utilities.py +331 -0
- pulumi_vault/ad/__init__.py +12 -0
- pulumi_vault/ad/get_access_credentials.py +177 -0
- pulumi_vault/ad/secret_backend.py +1916 -0
- pulumi_vault/ad/secret_library.py +546 -0
- pulumi_vault/ad/secret_role.py +499 -0
- pulumi_vault/alicloud/__init__.py +9 -0
- pulumi_vault/alicloud/auth_backend_role.py +866 -0
- pulumi_vault/approle/__init__.py +12 -0
- pulumi_vault/approle/auth_backend_login.py +571 -0
- pulumi_vault/approle/auth_backend_role.py +1082 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
- pulumi_vault/audit.py +499 -0
- pulumi_vault/audit_request_header.py +277 -0
- pulumi_vault/auth_backend.py +565 -0
- pulumi_vault/aws/__init__.py +22 -0
- pulumi_vault/aws/auth_backend_cert.py +420 -0
- pulumi_vault/aws/auth_backend_client.py +1259 -0
- pulumi_vault/aws/auth_backend_config_identity.py +494 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
- pulumi_vault/aws/auth_backend_login.py +1046 -0
- pulumi_vault/aws/auth_backend_role.py +1961 -0
- pulumi_vault/aws/auth_backend_role_tag.py +638 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
- pulumi_vault/aws/auth_backend_sts_role.py +414 -0
- pulumi_vault/aws/get_access_credentials.py +369 -0
- pulumi_vault/aws/get_static_access_credentials.py +137 -0
- pulumi_vault/aws/secret_backend.py +2018 -0
- pulumi_vault/aws/secret_backend_role.py +1188 -0
- pulumi_vault/aws/secret_backend_static_role.py +639 -0
- pulumi_vault/azure/__init__.py +15 -0
- pulumi_vault/azure/_inputs.py +108 -0
- pulumi_vault/azure/auth_backend_config.py +1096 -0
- pulumi_vault/azure/auth_backend_role.py +1176 -0
- pulumi_vault/azure/backend.py +1793 -0
- pulumi_vault/azure/backend_role.py +883 -0
- pulumi_vault/azure/get_access_credentials.py +400 -0
- pulumi_vault/azure/outputs.py +107 -0
- pulumi_vault/cert_auth_backend_role.py +1539 -0
- pulumi_vault/config/__init__.py +9 -0
- pulumi_vault/config/__init__.pyi +164 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +1225 -0
- pulumi_vault/config/ui_custom_message.py +530 -0
- pulumi_vault/config/vars.py +230 -0
- pulumi_vault/consul/__init__.py +10 -0
- pulumi_vault/consul/secret_backend.py +1517 -0
- pulumi_vault/consul/secret_backend_role.py +847 -0
- pulumi_vault/database/__init__.py +14 -0
- pulumi_vault/database/_inputs.py +11907 -0
- pulumi_vault/database/outputs.py +8496 -0
- pulumi_vault/database/secret_backend_connection.py +1676 -0
- pulumi_vault/database/secret_backend_role.py +840 -0
- pulumi_vault/database/secret_backend_static_role.py +881 -0
- pulumi_vault/database/secrets_mount.py +2160 -0
- pulumi_vault/egp_policy.py +399 -0
- pulumi_vault/gcp/__init__.py +17 -0
- pulumi_vault/gcp/_inputs.py +441 -0
- pulumi_vault/gcp/auth_backend.py +1486 -0
- pulumi_vault/gcp/auth_backend_role.py +1235 -0
- pulumi_vault/gcp/get_auth_backend_role.py +514 -0
- pulumi_vault/gcp/outputs.py +302 -0
- pulumi_vault/gcp/secret_backend.py +1807 -0
- pulumi_vault/gcp/secret_impersonated_account.py +484 -0
- pulumi_vault/gcp/secret_roleset.py +554 -0
- pulumi_vault/gcp/secret_static_account.py +557 -0
- pulumi_vault/generic/__init__.py +11 -0
- pulumi_vault/generic/endpoint.py +786 -0
- pulumi_vault/generic/get_secret.py +306 -0
- pulumi_vault/generic/secret.py +486 -0
- pulumi_vault/get_auth_backend.py +226 -0
- pulumi_vault/get_auth_backends.py +170 -0
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +202 -0
- pulumi_vault/get_nomad_access_token.py +210 -0
- pulumi_vault/get_policy_document.py +160 -0
- pulumi_vault/get_raft_autopilot_state.py +267 -0
- pulumi_vault/github/__init__.py +13 -0
- pulumi_vault/github/_inputs.py +225 -0
- pulumi_vault/github/auth_backend.py +1194 -0
- pulumi_vault/github/outputs.py +174 -0
- pulumi_vault/github/team.py +380 -0
- pulumi_vault/github/user.py +380 -0
- pulumi_vault/identity/__init__.py +35 -0
- pulumi_vault/identity/entity.py +447 -0
- pulumi_vault/identity/entity_alias.py +398 -0
- pulumi_vault/identity/entity_policies.py +455 -0
- pulumi_vault/identity/get_entity.py +384 -0
- pulumi_vault/identity/get_group.py +467 -0
- pulumi_vault/identity/get_oidc_client_creds.py +175 -0
- pulumi_vault/identity/get_oidc_openid_config.py +334 -0
- pulumi_vault/identity/get_oidc_public_keys.py +179 -0
- pulumi_vault/identity/group.py +805 -0
- pulumi_vault/identity/group_alias.py +386 -0
- pulumi_vault/identity/group_member_entity_ids.py +444 -0
- pulumi_vault/identity/group_member_group_ids.py +467 -0
- pulumi_vault/identity/group_policies.py +471 -0
- pulumi_vault/identity/mfa_duo.py +674 -0
- pulumi_vault/identity/mfa_login_enforcement.py +566 -0
- pulumi_vault/identity/mfa_okta.py +626 -0
- pulumi_vault/identity/mfa_pingid.py +616 -0
- pulumi_vault/identity/mfa_totp.py +758 -0
- pulumi_vault/identity/oidc.py +268 -0
- pulumi_vault/identity/oidc_assignment.py +375 -0
- pulumi_vault/identity/oidc_client.py +667 -0
- pulumi_vault/identity/oidc_key.py +474 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
- pulumi_vault/identity/oidc_provider.py +550 -0
- pulumi_vault/identity/oidc_role.py +543 -0
- pulumi_vault/identity/oidc_scope.py +355 -0
- pulumi_vault/identity/outputs.py +137 -0
- pulumi_vault/jwt/__init__.py +12 -0
- pulumi_vault/jwt/_inputs.py +225 -0
- pulumi_vault/jwt/auth_backend.py +1347 -0
- pulumi_vault/jwt/auth_backend_role.py +1847 -0
- pulumi_vault/jwt/outputs.py +174 -0
- pulumi_vault/kmip/__init__.py +11 -0
- pulumi_vault/kmip/secret_backend.py +1591 -0
- pulumi_vault/kmip/secret_role.py +1194 -0
- pulumi_vault/kmip/secret_scope.py +372 -0
- pulumi_vault/kubernetes/__init__.py +15 -0
- pulumi_vault/kubernetes/auth_backend_config.py +654 -0
- pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
- pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
- pulumi_vault/kubernetes/get_service_account_token.py +344 -0
- pulumi_vault/kubernetes/secret_backend.py +1341 -0
- pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
- pulumi_vault/kv/__init__.py +18 -0
- pulumi_vault/kv/_inputs.py +124 -0
- pulumi_vault/kv/get_secret.py +240 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
- pulumi_vault/kv/get_secret_v2.py +315 -0
- pulumi_vault/kv/get_secrets_list.py +186 -0
- pulumi_vault/kv/get_secrets_list_v2.py +243 -0
- pulumi_vault/kv/outputs.py +102 -0
- pulumi_vault/kv/secret.py +397 -0
- pulumi_vault/kv/secret_backend_v2.py +455 -0
- pulumi_vault/kv/secret_v2.py +970 -0
- pulumi_vault/ldap/__init__.py +19 -0
- pulumi_vault/ldap/_inputs.py +225 -0
- pulumi_vault/ldap/auth_backend.py +2520 -0
- pulumi_vault/ldap/auth_backend_group.py +386 -0
- pulumi_vault/ldap/auth_backend_user.py +439 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
- pulumi_vault/ldap/get_static_credentials.py +192 -0
- pulumi_vault/ldap/outputs.py +174 -0
- pulumi_vault/ldap/secret_backend.py +2207 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
- pulumi_vault/ldap/secret_backend_library_set.py +552 -0
- pulumi_vault/ldap/secret_backend_static_role.py +541 -0
- pulumi_vault/managed/__init__.py +11 -0
- pulumi_vault/managed/_inputs.py +944 -0
- pulumi_vault/managed/keys.py +398 -0
- pulumi_vault/managed/outputs.py +667 -0
- pulumi_vault/mfa_duo.py +589 -0
- pulumi_vault/mfa_okta.py +623 -0
- pulumi_vault/mfa_pingid.py +670 -0
- pulumi_vault/mfa_totp.py +620 -0
- pulumi_vault/mongodbatlas/__init__.py +10 -0
- pulumi_vault/mongodbatlas/secret_backend.py +388 -0
- pulumi_vault/mongodbatlas/secret_role.py +726 -0
- pulumi_vault/mount.py +1262 -0
- pulumi_vault/namespace.py +452 -0
- pulumi_vault/nomad_secret_backend.py +1559 -0
- pulumi_vault/nomad_secret_role.py +489 -0
- pulumi_vault/oci_auth_backend.py +676 -0
- pulumi_vault/oci_auth_backend_role.py +852 -0
- pulumi_vault/okta/__init__.py +13 -0
- pulumi_vault/okta/_inputs.py +320 -0
- pulumi_vault/okta/auth_backend.py +1231 -0
- pulumi_vault/okta/auth_backend_group.py +369 -0
- pulumi_vault/okta/auth_backend_user.py +416 -0
- pulumi_vault/okta/outputs.py +244 -0
- pulumi_vault/outputs.py +502 -0
- pulumi_vault/pkisecret/__init__.py +38 -0
- pulumi_vault/pkisecret/_inputs.py +270 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
- pulumi_vault/pkisecret/backend_config_acme.py +690 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
- pulumi_vault/pkisecret/backend_config_est.py +756 -0
- pulumi_vault/pkisecret/backend_config_scep.py +738 -0
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
- pulumi_vault/pkisecret/get_backend_key.py +211 -0
- pulumi_vault/pkisecret/get_backend_keys.py +192 -0
- pulumi_vault/pkisecret/outputs.py +270 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
- pulumi_vault/pkisecret/secret_backend_key.py +613 -0
- pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
- pulumi_vault/plugin.py +596 -0
- pulumi_vault/plugin_pinned_version.py +299 -0
- pulumi_vault/policy.py +279 -0
- pulumi_vault/provider.py +781 -0
- pulumi_vault/pulumi-plugin.json +5 -0
- pulumi_vault/py.typed +0 -0
- pulumi_vault/quota_lease_count.py +504 -0
- pulumi_vault/quota_rate_limit.py +751 -0
- pulumi_vault/rabbitmq/__init__.py +12 -0
- pulumi_vault/rabbitmq/_inputs.py +235 -0
- pulumi_vault/rabbitmq/outputs.py +144 -0
- pulumi_vault/rabbitmq/secret_backend.py +1437 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
- pulumi_vault/raft_autopilot.py +609 -0
- pulumi_vault/raft_snapshot_agent_config.py +1591 -0
- pulumi_vault/rgp_policy.py +349 -0
- pulumi_vault/saml/__init__.py +12 -0
- pulumi_vault/saml/_inputs.py +225 -0
- pulumi_vault/saml/auth_backend.py +811 -0
- pulumi_vault/saml/auth_backend_role.py +1068 -0
- pulumi_vault/saml/outputs.py +174 -0
- pulumi_vault/scep_auth_backend_role.py +908 -0
- pulumi_vault/secrets/__init__.py +18 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +450 -0
- pulumi_vault/secrets/sync_aws_destination.py +780 -0
- pulumi_vault/secrets/sync_azure_destination.py +736 -0
- pulumi_vault/secrets/sync_config.py +303 -0
- pulumi_vault/secrets/sync_gcp_destination.py +572 -0
- pulumi_vault/secrets/sync_gh_destination.py +688 -0
- pulumi_vault/secrets/sync_github_apps.py +376 -0
- pulumi_vault/secrets/sync_vercel_destination.py +603 -0
- pulumi_vault/ssh/__init__.py +13 -0
- pulumi_vault/ssh/_inputs.py +76 -0
- pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- pulumi_vault/ssh/outputs.py +51 -0
- pulumi_vault/ssh/secret_backend_ca.py +588 -0
- pulumi_vault/ssh/secret_backend_role.py +1493 -0
- pulumi_vault/terraformcloud/__init__.py +11 -0
- pulumi_vault/terraformcloud/secret_backend.py +1321 -0
- pulumi_vault/terraformcloud/secret_creds.py +445 -0
- pulumi_vault/terraformcloud/secret_role.py +563 -0
- pulumi_vault/token.py +1026 -0
- pulumi_vault/tokenauth/__init__.py +9 -0
- pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
- pulumi_vault/transform/__init__.py +14 -0
- pulumi_vault/transform/alphabet.py +348 -0
- pulumi_vault/transform/get_decode.py +287 -0
- pulumi_vault/transform/get_encode.py +291 -0
- pulumi_vault/transform/role.py +350 -0
- pulumi_vault/transform/template.py +592 -0
- pulumi_vault/transform/transformation.py +608 -0
- pulumi_vault/transit/__init__.py +15 -0
- pulumi_vault/transit/get_cmac.py +256 -0
- pulumi_vault/transit/get_decrypt.py +181 -0
- pulumi_vault/transit/get_encrypt.py +174 -0
- pulumi_vault/transit/get_sign.py +328 -0
- pulumi_vault/transit/get_verify.py +373 -0
- pulumi_vault/transit/secret_backend_key.py +1202 -0
- pulumi_vault/transit/secret_cache_config.py +302 -0
- pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
- pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
- pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
- pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,302 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
|
|
17
|
+
__all__ = ['SecretCacheConfigArgs', 'SecretCacheConfig']
|
|
18
|
+
|
|
19
|
+
@pulumi.input_type
|
|
20
|
+
class SecretCacheConfigArgs:
|
|
21
|
+
def __init__(__self__, *,
|
|
22
|
+
backend: pulumi.Input[_builtins.str],
|
|
23
|
+
size: pulumi.Input[_builtins.int],
|
|
24
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None):
|
|
25
|
+
"""
|
|
26
|
+
The set of arguments for constructing a SecretCacheConfig resource.
|
|
27
|
+
:param pulumi.Input[_builtins.str] backend: The path the transit secret backend is mounted at, with no leading or trailing `/`s.
|
|
28
|
+
:param pulumi.Input[_builtins.int] size: The number of cache entries. 0 means unlimited.
|
|
29
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
30
|
+
The value should not contain leading or trailing forward slashes.
|
|
31
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
32
|
+
*Available only for Vault Enterprise*.
|
|
33
|
+
"""
|
|
34
|
+
pulumi.set(__self__, "backend", backend)
|
|
35
|
+
pulumi.set(__self__, "size", size)
|
|
36
|
+
if namespace is not None:
|
|
37
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
38
|
+
|
|
39
|
+
@_builtins.property
|
|
40
|
+
@pulumi.getter
|
|
41
|
+
def backend(self) -> pulumi.Input[_builtins.str]:
|
|
42
|
+
"""
|
|
43
|
+
The path the transit secret backend is mounted at, with no leading or trailing `/`s.
|
|
44
|
+
"""
|
|
45
|
+
return pulumi.get(self, "backend")
|
|
46
|
+
|
|
47
|
+
@backend.setter
|
|
48
|
+
def backend(self, value: pulumi.Input[_builtins.str]):
|
|
49
|
+
pulumi.set(self, "backend", value)
|
|
50
|
+
|
|
51
|
+
@_builtins.property
|
|
52
|
+
@pulumi.getter
|
|
53
|
+
def size(self) -> pulumi.Input[_builtins.int]:
|
|
54
|
+
"""
|
|
55
|
+
The number of cache entries. 0 means unlimited.
|
|
56
|
+
"""
|
|
57
|
+
return pulumi.get(self, "size")
|
|
58
|
+
|
|
59
|
+
@size.setter
|
|
60
|
+
def size(self, value: pulumi.Input[_builtins.int]):
|
|
61
|
+
pulumi.set(self, "size", value)
|
|
62
|
+
|
|
63
|
+
@_builtins.property
|
|
64
|
+
@pulumi.getter
|
|
65
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
66
|
+
"""
|
|
67
|
+
The namespace to provision the resource in.
|
|
68
|
+
The value should not contain leading or trailing forward slashes.
|
|
69
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
70
|
+
*Available only for Vault Enterprise*.
|
|
71
|
+
"""
|
|
72
|
+
return pulumi.get(self, "namespace")
|
|
73
|
+
|
|
74
|
+
@namespace.setter
|
|
75
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
76
|
+
pulumi.set(self, "namespace", value)
|
|
77
|
+
|
|
78
|
+
|
|
79
|
+
@pulumi.input_type
|
|
80
|
+
class _SecretCacheConfigState:
|
|
81
|
+
def __init__(__self__, *,
|
|
82
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
83
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
84
|
+
size: Optional[pulumi.Input[_builtins.int]] = None):
|
|
85
|
+
"""
|
|
86
|
+
Input properties used for looking up and filtering SecretCacheConfig resources.
|
|
87
|
+
:param pulumi.Input[_builtins.str] backend: The path the transit secret backend is mounted at, with no leading or trailing `/`s.
|
|
88
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
89
|
+
The value should not contain leading or trailing forward slashes.
|
|
90
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
91
|
+
*Available only for Vault Enterprise*.
|
|
92
|
+
:param pulumi.Input[_builtins.int] size: The number of cache entries. 0 means unlimited.
|
|
93
|
+
"""
|
|
94
|
+
if backend is not None:
|
|
95
|
+
pulumi.set(__self__, "backend", backend)
|
|
96
|
+
if namespace is not None:
|
|
97
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
98
|
+
if size is not None:
|
|
99
|
+
pulumi.set(__self__, "size", size)
|
|
100
|
+
|
|
101
|
+
@_builtins.property
|
|
102
|
+
@pulumi.getter
|
|
103
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
104
|
+
"""
|
|
105
|
+
The path the transit secret backend is mounted at, with no leading or trailing `/`s.
|
|
106
|
+
"""
|
|
107
|
+
return pulumi.get(self, "backend")
|
|
108
|
+
|
|
109
|
+
@backend.setter
|
|
110
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
111
|
+
pulumi.set(self, "backend", value)
|
|
112
|
+
|
|
113
|
+
@_builtins.property
|
|
114
|
+
@pulumi.getter
|
|
115
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
116
|
+
"""
|
|
117
|
+
The namespace to provision the resource in.
|
|
118
|
+
The value should not contain leading or trailing forward slashes.
|
|
119
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
120
|
+
*Available only for Vault Enterprise*.
|
|
121
|
+
"""
|
|
122
|
+
return pulumi.get(self, "namespace")
|
|
123
|
+
|
|
124
|
+
@namespace.setter
|
|
125
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
126
|
+
pulumi.set(self, "namespace", value)
|
|
127
|
+
|
|
128
|
+
@_builtins.property
|
|
129
|
+
@pulumi.getter
|
|
130
|
+
def size(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
131
|
+
"""
|
|
132
|
+
The number of cache entries. 0 means unlimited.
|
|
133
|
+
"""
|
|
134
|
+
return pulumi.get(self, "size")
|
|
135
|
+
|
|
136
|
+
@size.setter
|
|
137
|
+
def size(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
138
|
+
pulumi.set(self, "size", value)
|
|
139
|
+
|
|
140
|
+
|
|
141
|
+
@pulumi.type_token("vault:transit/secretCacheConfig:SecretCacheConfig")
|
|
142
|
+
class SecretCacheConfig(pulumi.CustomResource):
|
|
143
|
+
@overload
|
|
144
|
+
def __init__(__self__,
|
|
145
|
+
resource_name: str,
|
|
146
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
147
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
148
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
149
|
+
size: Optional[pulumi.Input[_builtins.int]] = None,
|
|
150
|
+
__props__=None):
|
|
151
|
+
"""
|
|
152
|
+
Configure the cache for the Transit Secret Backend in Vault.
|
|
153
|
+
|
|
154
|
+
## Example Usage
|
|
155
|
+
|
|
156
|
+
```python
|
|
157
|
+
import pulumi
|
|
158
|
+
import pulumi_vault as vault
|
|
159
|
+
|
|
160
|
+
transit = vault.Mount("transit",
|
|
161
|
+
path="transit",
|
|
162
|
+
type="transit",
|
|
163
|
+
description="Example description",
|
|
164
|
+
default_lease_ttl_seconds=3600,
|
|
165
|
+
max_lease_ttl_seconds=86400)
|
|
166
|
+
cfg = vault.transit.SecretCacheConfig("cfg",
|
|
167
|
+
backend=transit.path,
|
|
168
|
+
size=500)
|
|
169
|
+
```
|
|
170
|
+
|
|
171
|
+
:param str resource_name: The name of the resource.
|
|
172
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
173
|
+
:param pulumi.Input[_builtins.str] backend: The path the transit secret backend is mounted at, with no leading or trailing `/`s.
|
|
174
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
175
|
+
The value should not contain leading or trailing forward slashes.
|
|
176
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
177
|
+
*Available only for Vault Enterprise*.
|
|
178
|
+
:param pulumi.Input[_builtins.int] size: The number of cache entries. 0 means unlimited.
|
|
179
|
+
"""
|
|
180
|
+
...
|
|
181
|
+
@overload
|
|
182
|
+
def __init__(__self__,
|
|
183
|
+
resource_name: str,
|
|
184
|
+
args: SecretCacheConfigArgs,
|
|
185
|
+
opts: Optional[pulumi.ResourceOptions] = None):
|
|
186
|
+
"""
|
|
187
|
+
Configure the cache for the Transit Secret Backend in Vault.
|
|
188
|
+
|
|
189
|
+
## Example Usage
|
|
190
|
+
|
|
191
|
+
```python
|
|
192
|
+
import pulumi
|
|
193
|
+
import pulumi_vault as vault
|
|
194
|
+
|
|
195
|
+
transit = vault.Mount("transit",
|
|
196
|
+
path="transit",
|
|
197
|
+
type="transit",
|
|
198
|
+
description="Example description",
|
|
199
|
+
default_lease_ttl_seconds=3600,
|
|
200
|
+
max_lease_ttl_seconds=86400)
|
|
201
|
+
cfg = vault.transit.SecretCacheConfig("cfg",
|
|
202
|
+
backend=transit.path,
|
|
203
|
+
size=500)
|
|
204
|
+
```
|
|
205
|
+
|
|
206
|
+
:param str resource_name: The name of the resource.
|
|
207
|
+
:param SecretCacheConfigArgs args: The arguments to use to populate this resource's properties.
|
|
208
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
209
|
+
"""
|
|
210
|
+
...
|
|
211
|
+
def __init__(__self__, resource_name: str, *args, **kwargs):
|
|
212
|
+
resource_args, opts = _utilities.get_resource_args_opts(SecretCacheConfigArgs, pulumi.ResourceOptions, *args, **kwargs)
|
|
213
|
+
if resource_args is not None:
|
|
214
|
+
__self__._internal_init(resource_name, opts, **resource_args.__dict__)
|
|
215
|
+
else:
|
|
216
|
+
__self__._internal_init(resource_name, *args, **kwargs)
|
|
217
|
+
|
|
218
|
+
def _internal_init(__self__,
|
|
219
|
+
resource_name: str,
|
|
220
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
221
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
222
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
223
|
+
size: Optional[pulumi.Input[_builtins.int]] = None,
|
|
224
|
+
__props__=None):
|
|
225
|
+
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
|
226
|
+
if not isinstance(opts, pulumi.ResourceOptions):
|
|
227
|
+
raise TypeError('Expected resource options to be a ResourceOptions instance')
|
|
228
|
+
if opts.id is None:
|
|
229
|
+
if __props__ is not None:
|
|
230
|
+
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
|
|
231
|
+
__props__ = SecretCacheConfigArgs.__new__(SecretCacheConfigArgs)
|
|
232
|
+
|
|
233
|
+
if backend is None and not opts.urn:
|
|
234
|
+
raise TypeError("Missing required property 'backend'")
|
|
235
|
+
__props__.__dict__["backend"] = backend
|
|
236
|
+
__props__.__dict__["namespace"] = namespace
|
|
237
|
+
if size is None and not opts.urn:
|
|
238
|
+
raise TypeError("Missing required property 'size'")
|
|
239
|
+
__props__.__dict__["size"] = size
|
|
240
|
+
super(SecretCacheConfig, __self__).__init__(
|
|
241
|
+
'vault:transit/secretCacheConfig:SecretCacheConfig',
|
|
242
|
+
resource_name,
|
|
243
|
+
__props__,
|
|
244
|
+
opts)
|
|
245
|
+
|
|
246
|
+
@staticmethod
|
|
247
|
+
def get(resource_name: str,
|
|
248
|
+
id: pulumi.Input[str],
|
|
249
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
250
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
251
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
252
|
+
size: Optional[pulumi.Input[_builtins.int]] = None) -> 'SecretCacheConfig':
|
|
253
|
+
"""
|
|
254
|
+
Get an existing SecretCacheConfig resource's state with the given name, id, and optional extra
|
|
255
|
+
properties used to qualify the lookup.
|
|
256
|
+
|
|
257
|
+
:param str resource_name: The unique name of the resulting resource.
|
|
258
|
+
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
|
259
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
260
|
+
:param pulumi.Input[_builtins.str] backend: The path the transit secret backend is mounted at, with no leading or trailing `/`s.
|
|
261
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
262
|
+
The value should not contain leading or trailing forward slashes.
|
|
263
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
264
|
+
*Available only for Vault Enterprise*.
|
|
265
|
+
:param pulumi.Input[_builtins.int] size: The number of cache entries. 0 means unlimited.
|
|
266
|
+
"""
|
|
267
|
+
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
|
268
|
+
|
|
269
|
+
__props__ = _SecretCacheConfigState.__new__(_SecretCacheConfigState)
|
|
270
|
+
|
|
271
|
+
__props__.__dict__["backend"] = backend
|
|
272
|
+
__props__.__dict__["namespace"] = namespace
|
|
273
|
+
__props__.__dict__["size"] = size
|
|
274
|
+
return SecretCacheConfig(resource_name, opts=opts, __props__=__props__)
|
|
275
|
+
|
|
276
|
+
@_builtins.property
|
|
277
|
+
@pulumi.getter
|
|
278
|
+
def backend(self) -> pulumi.Output[_builtins.str]:
|
|
279
|
+
"""
|
|
280
|
+
The path the transit secret backend is mounted at, with no leading or trailing `/`s.
|
|
281
|
+
"""
|
|
282
|
+
return pulumi.get(self, "backend")
|
|
283
|
+
|
|
284
|
+
@_builtins.property
|
|
285
|
+
@pulumi.getter
|
|
286
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
287
|
+
"""
|
|
288
|
+
The namespace to provision the resource in.
|
|
289
|
+
The value should not contain leading or trailing forward slashes.
|
|
290
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
291
|
+
*Available only for Vault Enterprise*.
|
|
292
|
+
"""
|
|
293
|
+
return pulumi.get(self, "namespace")
|
|
294
|
+
|
|
295
|
+
@_builtins.property
|
|
296
|
+
@pulumi.getter
|
|
297
|
+
def size(self) -> pulumi.Output[_builtins.int]:
|
|
298
|
+
"""
|
|
299
|
+
The number of cache entries. 0 means unlimited.
|
|
300
|
+
"""
|
|
301
|
+
return pulumi.get(self, "size")
|
|
302
|
+
|
|
@@ -0,0 +1,92 @@
|
|
|
1
|
+
Metadata-Version: 2.4
|
|
2
|
+
Name: pulumi_vault
|
|
3
|
+
Version: 7.6.0a1764657486
|
|
4
|
+
Summary: A Pulumi package for creating and managing HashiCorp Vault cloud resources.
|
|
5
|
+
License: Apache-2.0
|
|
6
|
+
Project-URL: Homepage, https://pulumi.io
|
|
7
|
+
Project-URL: Repository, https://github.com/pulumi/pulumi-vault
|
|
8
|
+
Keywords: pulumi,vault
|
|
9
|
+
Requires-Python: >=3.9
|
|
10
|
+
Description-Content-Type: text/markdown
|
|
11
|
+
Requires-Dist: parver>=0.2.1
|
|
12
|
+
Requires-Dist: pulumi<4.0.0,>=3.165.0
|
|
13
|
+
Requires-Dist: semver>=2.8.1
|
|
14
|
+
Requires-Dist: typing-extensions<5,>=4.11; python_version < "3.11"
|
|
15
|
+
|
|
16
|
+
[](https://travis-ci.com/pulumi/pulumi-vault)
|
|
17
|
+
|
|
18
|
+
# Hashicorp Vault Resource Provider
|
|
19
|
+
|
|
20
|
+
The Vault resource provider for Pulumi lets you manage Vault resources in your cloud programs. To use
|
|
21
|
+
this package, please [install the Pulumi CLI first](https://pulumi.io/).
|
|
22
|
+
|
|
23
|
+
## Installing
|
|
24
|
+
|
|
25
|
+
This package is available in many languages in the standard packaging formats.
|
|
26
|
+
|
|
27
|
+
### Node.js (Java/TypeScript)
|
|
28
|
+
|
|
29
|
+
To use from JavaScript or TypeScript in Node.js, install using either `npm`:
|
|
30
|
+
|
|
31
|
+
$ npm install @pulumi/vault
|
|
32
|
+
|
|
33
|
+
or `yarn`:
|
|
34
|
+
|
|
35
|
+
$ yarn add @pulumi/vault
|
|
36
|
+
|
|
37
|
+
### Python
|
|
38
|
+
|
|
39
|
+
To use from Python, install using `pip`:
|
|
40
|
+
|
|
41
|
+
$ pip install pulumi_vault
|
|
42
|
+
|
|
43
|
+
### Go
|
|
44
|
+
|
|
45
|
+
To use from Go, use `go get` to grab the latest version of the library
|
|
46
|
+
|
|
47
|
+
$ go get github.com/pulumi/pulumi-vault/sdk/v6
|
|
48
|
+
|
|
49
|
+
### .NET
|
|
50
|
+
|
|
51
|
+
To use from .NET, install using `dotnet add package`:
|
|
52
|
+
|
|
53
|
+
$ dotnet add package Pulumi.Vault
|
|
54
|
+
|
|
55
|
+
## Configuration
|
|
56
|
+
|
|
57
|
+
The following configuration points are available:
|
|
58
|
+
|
|
59
|
+
- `vault:address` - (Required) Origin URL of the Vault server. This is a URL with a scheme, a hostname and a port but with no path.
|
|
60
|
+
May be set via the `VAULT_ADDR` environment variable.
|
|
61
|
+
- `vault:token` - (Required) Vault token that will be used by the provider to authenticate. May be set via the `VAULT_TOKEN`
|
|
62
|
+
environment variable. If none is otherwise supplied, the provider will attempt to read it from ~/.vault-token (where the vault
|
|
63
|
+
command stores its current token). The provider will issue itself a new token that is a child of the one given, with a short TTL
|
|
64
|
+
to limit the exposure of any requested secrets. Note that the given token must have the update capability on the `auth/token/create`
|
|
65
|
+
path in Vault in order to create child tokens.
|
|
66
|
+
- `vault:tokenName` - (Optional) Token name to use for creating the Vault child token. May be set via the `VAULT_TOKEN_NAME`
|
|
67
|
+
environment variable.
|
|
68
|
+
- `vault:ca_cert_file` - (Optional) Path to a file on local disk that will be used to validate the certificate presented by
|
|
69
|
+
the Vault server. May be set via the `VAULT_CACERT` environment variable.
|
|
70
|
+
- `vault:ca_cert_dir` - (Optional) Path to a directory on local disk that contains one or more certificate files that will
|
|
71
|
+
be used to validate the certificate presented by the Vault server. May be set via the `VAULT_CAPATH` environment variable.
|
|
72
|
+
- `vault:client_auth` - (Optional) A configuration block, described below, that provides credentials used by the provider
|
|
73
|
+
to authenticate with the Vault server. At present there is little reason to set this, because the provider does not
|
|
74
|
+
support the TLS certificate authentication mechanism.
|
|
75
|
+
- `vault:cert_file` - (Required) Path to a file on local disk that contains the PEM-encoded certificate to present to the server.
|
|
76
|
+
- `vault:key_file` - (Required) Path to a file on local disk that contains the PEM-encoded private key for which the
|
|
77
|
+
authentication certificate was issued.
|
|
78
|
+
- `vault:skip_tls_verify` - (Optional) Set this to true to disable verification of the Vault server's TLS certificate. This
|
|
79
|
+
is strongly discouraged except in prototype or development environments, since it exposes the possibility that the provider
|
|
80
|
+
can be tricked into writing secrets to a server controlled by an intruder. May be set via the `VAULT_SKIP_VERIFY` environment variable.
|
|
81
|
+
- `vault:max_lease_ttl_seconds` - (Optional) Used as the duration for the intermediate Vault token the provider issues itself,
|
|
82
|
+
which in turn limits the duration of secret leases issued by Vault. Defaults to `20` minutes and may be set via the
|
|
83
|
+
`TERRAFORM_VAULT_MAX_TTL` environment variable. See the section above on Using Vault credentials in the provider configuration
|
|
84
|
+
for the implications of this setting.
|
|
85
|
+
- `vault:max_retries` - (Optional) Used as the maximum number of retries when a 5xx error code is encountered. Defaults to `2`
|
|
86
|
+
retries and may be set via the VAULT_MAX_RETRIES environment variable.
|
|
87
|
+
- `vault:namespace` - (Optional) Set the namespace to use. May be set via the `VAULT_NAMESPACE` environment variable. Available
|
|
88
|
+
only for Vault Enterprise.
|
|
89
|
+
|
|
90
|
+
## Reference
|
|
91
|
+
|
|
92
|
+
For further information, please visit [the Vault provider docs](https://www.pulumi.com/docs/intro/cloud-providers/vault) or for detailed reference documentation, please visit [the API docs](https://www.pulumi.com/docs/reference/pkg/vault).
|