pulumi-vault 7.6.0a1764657486__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1399 -0
- pulumi_vault/_inputs.py +2701 -0
- pulumi_vault/_utilities.py +331 -0
- pulumi_vault/ad/__init__.py +12 -0
- pulumi_vault/ad/get_access_credentials.py +177 -0
- pulumi_vault/ad/secret_backend.py +1916 -0
- pulumi_vault/ad/secret_library.py +546 -0
- pulumi_vault/ad/secret_role.py +499 -0
- pulumi_vault/alicloud/__init__.py +9 -0
- pulumi_vault/alicloud/auth_backend_role.py +866 -0
- pulumi_vault/approle/__init__.py +12 -0
- pulumi_vault/approle/auth_backend_login.py +571 -0
- pulumi_vault/approle/auth_backend_role.py +1082 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
- pulumi_vault/audit.py +499 -0
- pulumi_vault/audit_request_header.py +277 -0
- pulumi_vault/auth_backend.py +565 -0
- pulumi_vault/aws/__init__.py +22 -0
- pulumi_vault/aws/auth_backend_cert.py +420 -0
- pulumi_vault/aws/auth_backend_client.py +1259 -0
- pulumi_vault/aws/auth_backend_config_identity.py +494 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
- pulumi_vault/aws/auth_backend_login.py +1046 -0
- pulumi_vault/aws/auth_backend_role.py +1961 -0
- pulumi_vault/aws/auth_backend_role_tag.py +638 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
- pulumi_vault/aws/auth_backend_sts_role.py +414 -0
- pulumi_vault/aws/get_access_credentials.py +369 -0
- pulumi_vault/aws/get_static_access_credentials.py +137 -0
- pulumi_vault/aws/secret_backend.py +2018 -0
- pulumi_vault/aws/secret_backend_role.py +1188 -0
- pulumi_vault/aws/secret_backend_static_role.py +639 -0
- pulumi_vault/azure/__init__.py +15 -0
- pulumi_vault/azure/_inputs.py +108 -0
- pulumi_vault/azure/auth_backend_config.py +1096 -0
- pulumi_vault/azure/auth_backend_role.py +1176 -0
- pulumi_vault/azure/backend.py +1793 -0
- pulumi_vault/azure/backend_role.py +883 -0
- pulumi_vault/azure/get_access_credentials.py +400 -0
- pulumi_vault/azure/outputs.py +107 -0
- pulumi_vault/cert_auth_backend_role.py +1539 -0
- pulumi_vault/config/__init__.py +9 -0
- pulumi_vault/config/__init__.pyi +164 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +1225 -0
- pulumi_vault/config/ui_custom_message.py +530 -0
- pulumi_vault/config/vars.py +230 -0
- pulumi_vault/consul/__init__.py +10 -0
- pulumi_vault/consul/secret_backend.py +1517 -0
- pulumi_vault/consul/secret_backend_role.py +847 -0
- pulumi_vault/database/__init__.py +14 -0
- pulumi_vault/database/_inputs.py +11907 -0
- pulumi_vault/database/outputs.py +8496 -0
- pulumi_vault/database/secret_backend_connection.py +1676 -0
- pulumi_vault/database/secret_backend_role.py +840 -0
- pulumi_vault/database/secret_backend_static_role.py +881 -0
- pulumi_vault/database/secrets_mount.py +2160 -0
- pulumi_vault/egp_policy.py +399 -0
- pulumi_vault/gcp/__init__.py +17 -0
- pulumi_vault/gcp/_inputs.py +441 -0
- pulumi_vault/gcp/auth_backend.py +1486 -0
- pulumi_vault/gcp/auth_backend_role.py +1235 -0
- pulumi_vault/gcp/get_auth_backend_role.py +514 -0
- pulumi_vault/gcp/outputs.py +302 -0
- pulumi_vault/gcp/secret_backend.py +1807 -0
- pulumi_vault/gcp/secret_impersonated_account.py +484 -0
- pulumi_vault/gcp/secret_roleset.py +554 -0
- pulumi_vault/gcp/secret_static_account.py +557 -0
- pulumi_vault/generic/__init__.py +11 -0
- pulumi_vault/generic/endpoint.py +786 -0
- pulumi_vault/generic/get_secret.py +306 -0
- pulumi_vault/generic/secret.py +486 -0
- pulumi_vault/get_auth_backend.py +226 -0
- pulumi_vault/get_auth_backends.py +170 -0
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +202 -0
- pulumi_vault/get_nomad_access_token.py +210 -0
- pulumi_vault/get_policy_document.py +160 -0
- pulumi_vault/get_raft_autopilot_state.py +267 -0
- pulumi_vault/github/__init__.py +13 -0
- pulumi_vault/github/_inputs.py +225 -0
- pulumi_vault/github/auth_backend.py +1194 -0
- pulumi_vault/github/outputs.py +174 -0
- pulumi_vault/github/team.py +380 -0
- pulumi_vault/github/user.py +380 -0
- pulumi_vault/identity/__init__.py +35 -0
- pulumi_vault/identity/entity.py +447 -0
- pulumi_vault/identity/entity_alias.py +398 -0
- pulumi_vault/identity/entity_policies.py +455 -0
- pulumi_vault/identity/get_entity.py +384 -0
- pulumi_vault/identity/get_group.py +467 -0
- pulumi_vault/identity/get_oidc_client_creds.py +175 -0
- pulumi_vault/identity/get_oidc_openid_config.py +334 -0
- pulumi_vault/identity/get_oidc_public_keys.py +179 -0
- pulumi_vault/identity/group.py +805 -0
- pulumi_vault/identity/group_alias.py +386 -0
- pulumi_vault/identity/group_member_entity_ids.py +444 -0
- pulumi_vault/identity/group_member_group_ids.py +467 -0
- pulumi_vault/identity/group_policies.py +471 -0
- pulumi_vault/identity/mfa_duo.py +674 -0
- pulumi_vault/identity/mfa_login_enforcement.py +566 -0
- pulumi_vault/identity/mfa_okta.py +626 -0
- pulumi_vault/identity/mfa_pingid.py +616 -0
- pulumi_vault/identity/mfa_totp.py +758 -0
- pulumi_vault/identity/oidc.py +268 -0
- pulumi_vault/identity/oidc_assignment.py +375 -0
- pulumi_vault/identity/oidc_client.py +667 -0
- pulumi_vault/identity/oidc_key.py +474 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
- pulumi_vault/identity/oidc_provider.py +550 -0
- pulumi_vault/identity/oidc_role.py +543 -0
- pulumi_vault/identity/oidc_scope.py +355 -0
- pulumi_vault/identity/outputs.py +137 -0
- pulumi_vault/jwt/__init__.py +12 -0
- pulumi_vault/jwt/_inputs.py +225 -0
- pulumi_vault/jwt/auth_backend.py +1347 -0
- pulumi_vault/jwt/auth_backend_role.py +1847 -0
- pulumi_vault/jwt/outputs.py +174 -0
- pulumi_vault/kmip/__init__.py +11 -0
- pulumi_vault/kmip/secret_backend.py +1591 -0
- pulumi_vault/kmip/secret_role.py +1194 -0
- pulumi_vault/kmip/secret_scope.py +372 -0
- pulumi_vault/kubernetes/__init__.py +15 -0
- pulumi_vault/kubernetes/auth_backend_config.py +654 -0
- pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
- pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
- pulumi_vault/kubernetes/get_service_account_token.py +344 -0
- pulumi_vault/kubernetes/secret_backend.py +1341 -0
- pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
- pulumi_vault/kv/__init__.py +18 -0
- pulumi_vault/kv/_inputs.py +124 -0
- pulumi_vault/kv/get_secret.py +240 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
- pulumi_vault/kv/get_secret_v2.py +315 -0
- pulumi_vault/kv/get_secrets_list.py +186 -0
- pulumi_vault/kv/get_secrets_list_v2.py +243 -0
- pulumi_vault/kv/outputs.py +102 -0
- pulumi_vault/kv/secret.py +397 -0
- pulumi_vault/kv/secret_backend_v2.py +455 -0
- pulumi_vault/kv/secret_v2.py +970 -0
- pulumi_vault/ldap/__init__.py +19 -0
- pulumi_vault/ldap/_inputs.py +225 -0
- pulumi_vault/ldap/auth_backend.py +2520 -0
- pulumi_vault/ldap/auth_backend_group.py +386 -0
- pulumi_vault/ldap/auth_backend_user.py +439 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
- pulumi_vault/ldap/get_static_credentials.py +192 -0
- pulumi_vault/ldap/outputs.py +174 -0
- pulumi_vault/ldap/secret_backend.py +2207 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
- pulumi_vault/ldap/secret_backend_library_set.py +552 -0
- pulumi_vault/ldap/secret_backend_static_role.py +541 -0
- pulumi_vault/managed/__init__.py +11 -0
- pulumi_vault/managed/_inputs.py +944 -0
- pulumi_vault/managed/keys.py +398 -0
- pulumi_vault/managed/outputs.py +667 -0
- pulumi_vault/mfa_duo.py +589 -0
- pulumi_vault/mfa_okta.py +623 -0
- pulumi_vault/mfa_pingid.py +670 -0
- pulumi_vault/mfa_totp.py +620 -0
- pulumi_vault/mongodbatlas/__init__.py +10 -0
- pulumi_vault/mongodbatlas/secret_backend.py +388 -0
- pulumi_vault/mongodbatlas/secret_role.py +726 -0
- pulumi_vault/mount.py +1262 -0
- pulumi_vault/namespace.py +452 -0
- pulumi_vault/nomad_secret_backend.py +1559 -0
- pulumi_vault/nomad_secret_role.py +489 -0
- pulumi_vault/oci_auth_backend.py +676 -0
- pulumi_vault/oci_auth_backend_role.py +852 -0
- pulumi_vault/okta/__init__.py +13 -0
- pulumi_vault/okta/_inputs.py +320 -0
- pulumi_vault/okta/auth_backend.py +1231 -0
- pulumi_vault/okta/auth_backend_group.py +369 -0
- pulumi_vault/okta/auth_backend_user.py +416 -0
- pulumi_vault/okta/outputs.py +244 -0
- pulumi_vault/outputs.py +502 -0
- pulumi_vault/pkisecret/__init__.py +38 -0
- pulumi_vault/pkisecret/_inputs.py +270 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
- pulumi_vault/pkisecret/backend_config_acme.py +690 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
- pulumi_vault/pkisecret/backend_config_est.py +756 -0
- pulumi_vault/pkisecret/backend_config_scep.py +738 -0
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
- pulumi_vault/pkisecret/get_backend_key.py +211 -0
- pulumi_vault/pkisecret/get_backend_keys.py +192 -0
- pulumi_vault/pkisecret/outputs.py +270 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
- pulumi_vault/pkisecret/secret_backend_key.py +613 -0
- pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
- pulumi_vault/plugin.py +596 -0
- pulumi_vault/plugin_pinned_version.py +299 -0
- pulumi_vault/policy.py +279 -0
- pulumi_vault/provider.py +781 -0
- pulumi_vault/pulumi-plugin.json +5 -0
- pulumi_vault/py.typed +0 -0
- pulumi_vault/quota_lease_count.py +504 -0
- pulumi_vault/quota_rate_limit.py +751 -0
- pulumi_vault/rabbitmq/__init__.py +12 -0
- pulumi_vault/rabbitmq/_inputs.py +235 -0
- pulumi_vault/rabbitmq/outputs.py +144 -0
- pulumi_vault/rabbitmq/secret_backend.py +1437 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
- pulumi_vault/raft_autopilot.py +609 -0
- pulumi_vault/raft_snapshot_agent_config.py +1591 -0
- pulumi_vault/rgp_policy.py +349 -0
- pulumi_vault/saml/__init__.py +12 -0
- pulumi_vault/saml/_inputs.py +225 -0
- pulumi_vault/saml/auth_backend.py +811 -0
- pulumi_vault/saml/auth_backend_role.py +1068 -0
- pulumi_vault/saml/outputs.py +174 -0
- pulumi_vault/scep_auth_backend_role.py +908 -0
- pulumi_vault/secrets/__init__.py +18 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +450 -0
- pulumi_vault/secrets/sync_aws_destination.py +780 -0
- pulumi_vault/secrets/sync_azure_destination.py +736 -0
- pulumi_vault/secrets/sync_config.py +303 -0
- pulumi_vault/secrets/sync_gcp_destination.py +572 -0
- pulumi_vault/secrets/sync_gh_destination.py +688 -0
- pulumi_vault/secrets/sync_github_apps.py +376 -0
- pulumi_vault/secrets/sync_vercel_destination.py +603 -0
- pulumi_vault/ssh/__init__.py +13 -0
- pulumi_vault/ssh/_inputs.py +76 -0
- pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- pulumi_vault/ssh/outputs.py +51 -0
- pulumi_vault/ssh/secret_backend_ca.py +588 -0
- pulumi_vault/ssh/secret_backend_role.py +1493 -0
- pulumi_vault/terraformcloud/__init__.py +11 -0
- pulumi_vault/terraformcloud/secret_backend.py +1321 -0
- pulumi_vault/terraformcloud/secret_creds.py +445 -0
- pulumi_vault/terraformcloud/secret_role.py +563 -0
- pulumi_vault/token.py +1026 -0
- pulumi_vault/tokenauth/__init__.py +9 -0
- pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
- pulumi_vault/transform/__init__.py +14 -0
- pulumi_vault/transform/alphabet.py +348 -0
- pulumi_vault/transform/get_decode.py +287 -0
- pulumi_vault/transform/get_encode.py +291 -0
- pulumi_vault/transform/role.py +350 -0
- pulumi_vault/transform/template.py +592 -0
- pulumi_vault/transform/transformation.py +608 -0
- pulumi_vault/transit/__init__.py +15 -0
- pulumi_vault/transit/get_cmac.py +256 -0
- pulumi_vault/transit/get_decrypt.py +181 -0
- pulumi_vault/transit/get_encrypt.py +174 -0
- pulumi_vault/transit/get_sign.py +328 -0
- pulumi_vault/transit/get_verify.py +373 -0
- pulumi_vault/transit/secret_backend_key.py +1202 -0
- pulumi_vault/transit/secret_cache_config.py +302 -0
- pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
- pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
- pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
- pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,230 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
from . import outputs
|
|
17
|
+
|
|
18
|
+
import types
|
|
19
|
+
|
|
20
|
+
__config__ = pulumi.Config('vault')
|
|
21
|
+
|
|
22
|
+
|
|
23
|
+
class _ExportableConfig(types.ModuleType):
|
|
24
|
+
@_builtins.property
|
|
25
|
+
def add_address_to_env(self) -> Optional[str]:
|
|
26
|
+
return __config__.get('addAddressToEnv')
|
|
27
|
+
|
|
28
|
+
@_builtins.property
|
|
29
|
+
def address(self) -> Optional[str]:
|
|
30
|
+
"""
|
|
31
|
+
URL of the root of the target Vault server.
|
|
32
|
+
"""
|
|
33
|
+
return __config__.get('address')
|
|
34
|
+
|
|
35
|
+
@_builtins.property
|
|
36
|
+
def auth_login(self) -> Optional[str]:
|
|
37
|
+
"""
|
|
38
|
+
Login to vault with an existing auth method using auth/<mount>/login
|
|
39
|
+
"""
|
|
40
|
+
return __config__.get('authLogin')
|
|
41
|
+
|
|
42
|
+
@_builtins.property
|
|
43
|
+
def auth_login_aws(self) -> Optional[str]:
|
|
44
|
+
"""
|
|
45
|
+
Login to vault using the AWS method
|
|
46
|
+
"""
|
|
47
|
+
return __config__.get('authLoginAws')
|
|
48
|
+
|
|
49
|
+
@_builtins.property
|
|
50
|
+
def auth_login_azure(self) -> Optional[str]:
|
|
51
|
+
"""
|
|
52
|
+
Login to vault using the azure method
|
|
53
|
+
"""
|
|
54
|
+
return __config__.get('authLoginAzure')
|
|
55
|
+
|
|
56
|
+
@_builtins.property
|
|
57
|
+
def auth_login_cert(self) -> Optional[str]:
|
|
58
|
+
"""
|
|
59
|
+
Login to vault using the cert method
|
|
60
|
+
"""
|
|
61
|
+
return __config__.get('authLoginCert')
|
|
62
|
+
|
|
63
|
+
@_builtins.property
|
|
64
|
+
def auth_login_gcp(self) -> Optional[str]:
|
|
65
|
+
"""
|
|
66
|
+
Login to vault using the gcp method
|
|
67
|
+
"""
|
|
68
|
+
return __config__.get('authLoginGcp')
|
|
69
|
+
|
|
70
|
+
@_builtins.property
|
|
71
|
+
def auth_login_jwt(self) -> Optional[str]:
|
|
72
|
+
"""
|
|
73
|
+
Login to vault using the jwt method
|
|
74
|
+
"""
|
|
75
|
+
return __config__.get('authLoginJwt')
|
|
76
|
+
|
|
77
|
+
@_builtins.property
|
|
78
|
+
def auth_login_kerberos(self) -> Optional[str]:
|
|
79
|
+
"""
|
|
80
|
+
Login to vault using the kerberos method
|
|
81
|
+
"""
|
|
82
|
+
return __config__.get('authLoginKerberos')
|
|
83
|
+
|
|
84
|
+
@_builtins.property
|
|
85
|
+
def auth_login_oci(self) -> Optional[str]:
|
|
86
|
+
"""
|
|
87
|
+
Login to vault using the OCI method
|
|
88
|
+
"""
|
|
89
|
+
return __config__.get('authLoginOci')
|
|
90
|
+
|
|
91
|
+
@_builtins.property
|
|
92
|
+
def auth_login_oidc(self) -> Optional[str]:
|
|
93
|
+
"""
|
|
94
|
+
Login to vault using the oidc method
|
|
95
|
+
"""
|
|
96
|
+
return __config__.get('authLoginOidc')
|
|
97
|
+
|
|
98
|
+
@_builtins.property
|
|
99
|
+
def auth_login_radius(self) -> Optional[str]:
|
|
100
|
+
"""
|
|
101
|
+
Login to vault using the radius method
|
|
102
|
+
"""
|
|
103
|
+
return __config__.get('authLoginRadius')
|
|
104
|
+
|
|
105
|
+
@_builtins.property
|
|
106
|
+
def auth_login_token_file(self) -> Optional[str]:
|
|
107
|
+
"""
|
|
108
|
+
Login to vault using
|
|
109
|
+
"""
|
|
110
|
+
return __config__.get('authLoginTokenFile')
|
|
111
|
+
|
|
112
|
+
@_builtins.property
|
|
113
|
+
def auth_login_userpass(self) -> Optional[str]:
|
|
114
|
+
"""
|
|
115
|
+
Login to vault using the userpass method
|
|
116
|
+
"""
|
|
117
|
+
return __config__.get('authLoginUserpass')
|
|
118
|
+
|
|
119
|
+
@_builtins.property
|
|
120
|
+
def ca_cert_dir(self) -> Optional[str]:
|
|
121
|
+
"""
|
|
122
|
+
Path to directory containing CA certificate files to validate the server's certificate.
|
|
123
|
+
"""
|
|
124
|
+
return __config__.get('caCertDir')
|
|
125
|
+
|
|
126
|
+
@_builtins.property
|
|
127
|
+
def ca_cert_file(self) -> Optional[str]:
|
|
128
|
+
"""
|
|
129
|
+
Path to a CA certificate file to validate the server's certificate.
|
|
130
|
+
"""
|
|
131
|
+
return __config__.get('caCertFile')
|
|
132
|
+
|
|
133
|
+
@_builtins.property
|
|
134
|
+
def client_auth(self) -> Optional[str]:
|
|
135
|
+
"""
|
|
136
|
+
Client authentication credentials.
|
|
137
|
+
"""
|
|
138
|
+
return __config__.get('clientAuth')
|
|
139
|
+
|
|
140
|
+
@_builtins.property
|
|
141
|
+
def headers(self) -> Optional[str]:
|
|
142
|
+
"""
|
|
143
|
+
The headers to send with each Vault request.
|
|
144
|
+
"""
|
|
145
|
+
return __config__.get('headers')
|
|
146
|
+
|
|
147
|
+
@_builtins.property
|
|
148
|
+
def max_lease_ttl_seconds(self) -> int:
|
|
149
|
+
"""
|
|
150
|
+
Maximum TTL for secret leases requested by this provider.
|
|
151
|
+
"""
|
|
152
|
+
return __config__.get_int('maxLeaseTtlSeconds') or (_utilities.get_env_int('TERRAFORM_VAULT_MAX_TTL') or 1200)
|
|
153
|
+
|
|
154
|
+
@_builtins.property
|
|
155
|
+
def max_retries(self) -> int:
|
|
156
|
+
"""
|
|
157
|
+
Maximum number of retries when a 5xx error code is encountered.
|
|
158
|
+
"""
|
|
159
|
+
return __config__.get_int('maxRetries') or (_utilities.get_env_int('VAULT_MAX_RETRIES') or 2)
|
|
160
|
+
|
|
161
|
+
@_builtins.property
|
|
162
|
+
def max_retries_ccc(self) -> Optional[int]:
|
|
163
|
+
"""
|
|
164
|
+
Maximum number of retries for Client Controlled Consistency related operations
|
|
165
|
+
"""
|
|
166
|
+
return __config__.get_int('maxRetriesCcc')
|
|
167
|
+
|
|
168
|
+
@_builtins.property
|
|
169
|
+
def namespace(self) -> Optional[str]:
|
|
170
|
+
"""
|
|
171
|
+
The namespace to use. Available only for Vault Enterprise.
|
|
172
|
+
"""
|
|
173
|
+
return __config__.get('namespace')
|
|
174
|
+
|
|
175
|
+
@_builtins.property
|
|
176
|
+
def set_namespace_from_token(self) -> Optional[bool]:
|
|
177
|
+
"""
|
|
178
|
+
In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the token namespace as the root namespace for all resources.
|
|
179
|
+
"""
|
|
180
|
+
return __config__.get_bool('setNamespaceFromToken')
|
|
181
|
+
|
|
182
|
+
@_builtins.property
|
|
183
|
+
def skip_child_token(self) -> Optional[bool]:
|
|
184
|
+
"""
|
|
185
|
+
Set this to true to prevent the creation of ephemeral child token used by this provider.
|
|
186
|
+
"""
|
|
187
|
+
return __config__.get_bool('skipChildToken')
|
|
188
|
+
|
|
189
|
+
@_builtins.property
|
|
190
|
+
def skip_get_vault_version(self) -> Optional[bool]:
|
|
191
|
+
"""
|
|
192
|
+
Skip the dynamic fetching of the Vault server version.
|
|
193
|
+
"""
|
|
194
|
+
return __config__.get_bool('skipGetVaultVersion')
|
|
195
|
+
|
|
196
|
+
@_builtins.property
|
|
197
|
+
def skip_tls_verify(self) -> Optional[bool]:
|
|
198
|
+
"""
|
|
199
|
+
Set this to true only if the target Vault server is an insecure development instance.
|
|
200
|
+
"""
|
|
201
|
+
return __config__.get_bool('skipTlsVerify') or _utilities.get_env_bool('VAULT_SKIP_VERIFY')
|
|
202
|
+
|
|
203
|
+
@_builtins.property
|
|
204
|
+
def tls_server_name(self) -> Optional[str]:
|
|
205
|
+
"""
|
|
206
|
+
Name to use as the SNI host when connecting via TLS.
|
|
207
|
+
"""
|
|
208
|
+
return __config__.get('tlsServerName')
|
|
209
|
+
|
|
210
|
+
@_builtins.property
|
|
211
|
+
def token(self) -> Optional[str]:
|
|
212
|
+
"""
|
|
213
|
+
Token to use to authenticate to Vault.
|
|
214
|
+
"""
|
|
215
|
+
return __config__.get('token')
|
|
216
|
+
|
|
217
|
+
@_builtins.property
|
|
218
|
+
def token_name(self) -> Optional[str]:
|
|
219
|
+
"""
|
|
220
|
+
Token name to use for creating the Vault child token.
|
|
221
|
+
"""
|
|
222
|
+
return __config__.get('tokenName')
|
|
223
|
+
|
|
224
|
+
@_builtins.property
|
|
225
|
+
def vault_version_override(self) -> Optional[str]:
|
|
226
|
+
"""
|
|
227
|
+
Override the Vault server version, which is normally determined dynamically from the target Vault server
|
|
228
|
+
"""
|
|
229
|
+
return __config__.get('vaultVersionOverride')
|
|
230
|
+
|
|
@@ -0,0 +1,10 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
from .. import _utilities
|
|
7
|
+
import typing
|
|
8
|
+
# Export this package's modules as members:
|
|
9
|
+
from .secret_backend import *
|
|
10
|
+
from .secret_backend_role import *
|