pulumi-vault 7.6.0a1764657486__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1399 -0
- pulumi_vault/_inputs.py +2701 -0
- pulumi_vault/_utilities.py +331 -0
- pulumi_vault/ad/__init__.py +12 -0
- pulumi_vault/ad/get_access_credentials.py +177 -0
- pulumi_vault/ad/secret_backend.py +1916 -0
- pulumi_vault/ad/secret_library.py +546 -0
- pulumi_vault/ad/secret_role.py +499 -0
- pulumi_vault/alicloud/__init__.py +9 -0
- pulumi_vault/alicloud/auth_backend_role.py +866 -0
- pulumi_vault/approle/__init__.py +12 -0
- pulumi_vault/approle/auth_backend_login.py +571 -0
- pulumi_vault/approle/auth_backend_role.py +1082 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
- pulumi_vault/audit.py +499 -0
- pulumi_vault/audit_request_header.py +277 -0
- pulumi_vault/auth_backend.py +565 -0
- pulumi_vault/aws/__init__.py +22 -0
- pulumi_vault/aws/auth_backend_cert.py +420 -0
- pulumi_vault/aws/auth_backend_client.py +1259 -0
- pulumi_vault/aws/auth_backend_config_identity.py +494 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
- pulumi_vault/aws/auth_backend_login.py +1046 -0
- pulumi_vault/aws/auth_backend_role.py +1961 -0
- pulumi_vault/aws/auth_backend_role_tag.py +638 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
- pulumi_vault/aws/auth_backend_sts_role.py +414 -0
- pulumi_vault/aws/get_access_credentials.py +369 -0
- pulumi_vault/aws/get_static_access_credentials.py +137 -0
- pulumi_vault/aws/secret_backend.py +2018 -0
- pulumi_vault/aws/secret_backend_role.py +1188 -0
- pulumi_vault/aws/secret_backend_static_role.py +639 -0
- pulumi_vault/azure/__init__.py +15 -0
- pulumi_vault/azure/_inputs.py +108 -0
- pulumi_vault/azure/auth_backend_config.py +1096 -0
- pulumi_vault/azure/auth_backend_role.py +1176 -0
- pulumi_vault/azure/backend.py +1793 -0
- pulumi_vault/azure/backend_role.py +883 -0
- pulumi_vault/azure/get_access_credentials.py +400 -0
- pulumi_vault/azure/outputs.py +107 -0
- pulumi_vault/cert_auth_backend_role.py +1539 -0
- pulumi_vault/config/__init__.py +9 -0
- pulumi_vault/config/__init__.pyi +164 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +1225 -0
- pulumi_vault/config/ui_custom_message.py +530 -0
- pulumi_vault/config/vars.py +230 -0
- pulumi_vault/consul/__init__.py +10 -0
- pulumi_vault/consul/secret_backend.py +1517 -0
- pulumi_vault/consul/secret_backend_role.py +847 -0
- pulumi_vault/database/__init__.py +14 -0
- pulumi_vault/database/_inputs.py +11907 -0
- pulumi_vault/database/outputs.py +8496 -0
- pulumi_vault/database/secret_backend_connection.py +1676 -0
- pulumi_vault/database/secret_backend_role.py +840 -0
- pulumi_vault/database/secret_backend_static_role.py +881 -0
- pulumi_vault/database/secrets_mount.py +2160 -0
- pulumi_vault/egp_policy.py +399 -0
- pulumi_vault/gcp/__init__.py +17 -0
- pulumi_vault/gcp/_inputs.py +441 -0
- pulumi_vault/gcp/auth_backend.py +1486 -0
- pulumi_vault/gcp/auth_backend_role.py +1235 -0
- pulumi_vault/gcp/get_auth_backend_role.py +514 -0
- pulumi_vault/gcp/outputs.py +302 -0
- pulumi_vault/gcp/secret_backend.py +1807 -0
- pulumi_vault/gcp/secret_impersonated_account.py +484 -0
- pulumi_vault/gcp/secret_roleset.py +554 -0
- pulumi_vault/gcp/secret_static_account.py +557 -0
- pulumi_vault/generic/__init__.py +11 -0
- pulumi_vault/generic/endpoint.py +786 -0
- pulumi_vault/generic/get_secret.py +306 -0
- pulumi_vault/generic/secret.py +486 -0
- pulumi_vault/get_auth_backend.py +226 -0
- pulumi_vault/get_auth_backends.py +170 -0
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +202 -0
- pulumi_vault/get_nomad_access_token.py +210 -0
- pulumi_vault/get_policy_document.py +160 -0
- pulumi_vault/get_raft_autopilot_state.py +267 -0
- pulumi_vault/github/__init__.py +13 -0
- pulumi_vault/github/_inputs.py +225 -0
- pulumi_vault/github/auth_backend.py +1194 -0
- pulumi_vault/github/outputs.py +174 -0
- pulumi_vault/github/team.py +380 -0
- pulumi_vault/github/user.py +380 -0
- pulumi_vault/identity/__init__.py +35 -0
- pulumi_vault/identity/entity.py +447 -0
- pulumi_vault/identity/entity_alias.py +398 -0
- pulumi_vault/identity/entity_policies.py +455 -0
- pulumi_vault/identity/get_entity.py +384 -0
- pulumi_vault/identity/get_group.py +467 -0
- pulumi_vault/identity/get_oidc_client_creds.py +175 -0
- pulumi_vault/identity/get_oidc_openid_config.py +334 -0
- pulumi_vault/identity/get_oidc_public_keys.py +179 -0
- pulumi_vault/identity/group.py +805 -0
- pulumi_vault/identity/group_alias.py +386 -0
- pulumi_vault/identity/group_member_entity_ids.py +444 -0
- pulumi_vault/identity/group_member_group_ids.py +467 -0
- pulumi_vault/identity/group_policies.py +471 -0
- pulumi_vault/identity/mfa_duo.py +674 -0
- pulumi_vault/identity/mfa_login_enforcement.py +566 -0
- pulumi_vault/identity/mfa_okta.py +626 -0
- pulumi_vault/identity/mfa_pingid.py +616 -0
- pulumi_vault/identity/mfa_totp.py +758 -0
- pulumi_vault/identity/oidc.py +268 -0
- pulumi_vault/identity/oidc_assignment.py +375 -0
- pulumi_vault/identity/oidc_client.py +667 -0
- pulumi_vault/identity/oidc_key.py +474 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
- pulumi_vault/identity/oidc_provider.py +550 -0
- pulumi_vault/identity/oidc_role.py +543 -0
- pulumi_vault/identity/oidc_scope.py +355 -0
- pulumi_vault/identity/outputs.py +137 -0
- pulumi_vault/jwt/__init__.py +12 -0
- pulumi_vault/jwt/_inputs.py +225 -0
- pulumi_vault/jwt/auth_backend.py +1347 -0
- pulumi_vault/jwt/auth_backend_role.py +1847 -0
- pulumi_vault/jwt/outputs.py +174 -0
- pulumi_vault/kmip/__init__.py +11 -0
- pulumi_vault/kmip/secret_backend.py +1591 -0
- pulumi_vault/kmip/secret_role.py +1194 -0
- pulumi_vault/kmip/secret_scope.py +372 -0
- pulumi_vault/kubernetes/__init__.py +15 -0
- pulumi_vault/kubernetes/auth_backend_config.py +654 -0
- pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
- pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
- pulumi_vault/kubernetes/get_service_account_token.py +344 -0
- pulumi_vault/kubernetes/secret_backend.py +1341 -0
- pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
- pulumi_vault/kv/__init__.py +18 -0
- pulumi_vault/kv/_inputs.py +124 -0
- pulumi_vault/kv/get_secret.py +240 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
- pulumi_vault/kv/get_secret_v2.py +315 -0
- pulumi_vault/kv/get_secrets_list.py +186 -0
- pulumi_vault/kv/get_secrets_list_v2.py +243 -0
- pulumi_vault/kv/outputs.py +102 -0
- pulumi_vault/kv/secret.py +397 -0
- pulumi_vault/kv/secret_backend_v2.py +455 -0
- pulumi_vault/kv/secret_v2.py +970 -0
- pulumi_vault/ldap/__init__.py +19 -0
- pulumi_vault/ldap/_inputs.py +225 -0
- pulumi_vault/ldap/auth_backend.py +2520 -0
- pulumi_vault/ldap/auth_backend_group.py +386 -0
- pulumi_vault/ldap/auth_backend_user.py +439 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
- pulumi_vault/ldap/get_static_credentials.py +192 -0
- pulumi_vault/ldap/outputs.py +174 -0
- pulumi_vault/ldap/secret_backend.py +2207 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
- pulumi_vault/ldap/secret_backend_library_set.py +552 -0
- pulumi_vault/ldap/secret_backend_static_role.py +541 -0
- pulumi_vault/managed/__init__.py +11 -0
- pulumi_vault/managed/_inputs.py +944 -0
- pulumi_vault/managed/keys.py +398 -0
- pulumi_vault/managed/outputs.py +667 -0
- pulumi_vault/mfa_duo.py +589 -0
- pulumi_vault/mfa_okta.py +623 -0
- pulumi_vault/mfa_pingid.py +670 -0
- pulumi_vault/mfa_totp.py +620 -0
- pulumi_vault/mongodbatlas/__init__.py +10 -0
- pulumi_vault/mongodbatlas/secret_backend.py +388 -0
- pulumi_vault/mongodbatlas/secret_role.py +726 -0
- pulumi_vault/mount.py +1262 -0
- pulumi_vault/namespace.py +452 -0
- pulumi_vault/nomad_secret_backend.py +1559 -0
- pulumi_vault/nomad_secret_role.py +489 -0
- pulumi_vault/oci_auth_backend.py +676 -0
- pulumi_vault/oci_auth_backend_role.py +852 -0
- pulumi_vault/okta/__init__.py +13 -0
- pulumi_vault/okta/_inputs.py +320 -0
- pulumi_vault/okta/auth_backend.py +1231 -0
- pulumi_vault/okta/auth_backend_group.py +369 -0
- pulumi_vault/okta/auth_backend_user.py +416 -0
- pulumi_vault/okta/outputs.py +244 -0
- pulumi_vault/outputs.py +502 -0
- pulumi_vault/pkisecret/__init__.py +38 -0
- pulumi_vault/pkisecret/_inputs.py +270 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
- pulumi_vault/pkisecret/backend_config_acme.py +690 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
- pulumi_vault/pkisecret/backend_config_est.py +756 -0
- pulumi_vault/pkisecret/backend_config_scep.py +738 -0
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
- pulumi_vault/pkisecret/get_backend_key.py +211 -0
- pulumi_vault/pkisecret/get_backend_keys.py +192 -0
- pulumi_vault/pkisecret/outputs.py +270 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
- pulumi_vault/pkisecret/secret_backend_key.py +613 -0
- pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
- pulumi_vault/plugin.py +596 -0
- pulumi_vault/plugin_pinned_version.py +299 -0
- pulumi_vault/policy.py +279 -0
- pulumi_vault/provider.py +781 -0
- pulumi_vault/pulumi-plugin.json +5 -0
- pulumi_vault/py.typed +0 -0
- pulumi_vault/quota_lease_count.py +504 -0
- pulumi_vault/quota_rate_limit.py +751 -0
- pulumi_vault/rabbitmq/__init__.py +12 -0
- pulumi_vault/rabbitmq/_inputs.py +235 -0
- pulumi_vault/rabbitmq/outputs.py +144 -0
- pulumi_vault/rabbitmq/secret_backend.py +1437 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
- pulumi_vault/raft_autopilot.py +609 -0
- pulumi_vault/raft_snapshot_agent_config.py +1591 -0
- pulumi_vault/rgp_policy.py +349 -0
- pulumi_vault/saml/__init__.py +12 -0
- pulumi_vault/saml/_inputs.py +225 -0
- pulumi_vault/saml/auth_backend.py +811 -0
- pulumi_vault/saml/auth_backend_role.py +1068 -0
- pulumi_vault/saml/outputs.py +174 -0
- pulumi_vault/scep_auth_backend_role.py +908 -0
- pulumi_vault/secrets/__init__.py +18 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +450 -0
- pulumi_vault/secrets/sync_aws_destination.py +780 -0
- pulumi_vault/secrets/sync_azure_destination.py +736 -0
- pulumi_vault/secrets/sync_config.py +303 -0
- pulumi_vault/secrets/sync_gcp_destination.py +572 -0
- pulumi_vault/secrets/sync_gh_destination.py +688 -0
- pulumi_vault/secrets/sync_github_apps.py +376 -0
- pulumi_vault/secrets/sync_vercel_destination.py +603 -0
- pulumi_vault/ssh/__init__.py +13 -0
- pulumi_vault/ssh/_inputs.py +76 -0
- pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- pulumi_vault/ssh/outputs.py +51 -0
- pulumi_vault/ssh/secret_backend_ca.py +588 -0
- pulumi_vault/ssh/secret_backend_role.py +1493 -0
- pulumi_vault/terraformcloud/__init__.py +11 -0
- pulumi_vault/terraformcloud/secret_backend.py +1321 -0
- pulumi_vault/terraformcloud/secret_creds.py +445 -0
- pulumi_vault/terraformcloud/secret_role.py +563 -0
- pulumi_vault/token.py +1026 -0
- pulumi_vault/tokenauth/__init__.py +9 -0
- pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
- pulumi_vault/transform/__init__.py +14 -0
- pulumi_vault/transform/alphabet.py +348 -0
- pulumi_vault/transform/get_decode.py +287 -0
- pulumi_vault/transform/get_encode.py +291 -0
- pulumi_vault/transform/role.py +350 -0
- pulumi_vault/transform/template.py +592 -0
- pulumi_vault/transform/transformation.py +608 -0
- pulumi_vault/transit/__init__.py +15 -0
- pulumi_vault/transit/get_cmac.py +256 -0
- pulumi_vault/transit/get_decrypt.py +181 -0
- pulumi_vault/transit/get_encrypt.py +174 -0
- pulumi_vault/transit/get_sign.py +328 -0
- pulumi_vault/transit/get_verify.py +373 -0
- pulumi_vault/transit/secret_backend_key.py +1202 -0
- pulumi_vault/transit/secret_cache_config.py +302 -0
- pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
- pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
- pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
- pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,2160 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
from . import outputs
|
|
17
|
+
from ._inputs import *
|
|
18
|
+
|
|
19
|
+
__all__ = ['SecretsMountArgs', 'SecretsMount']
|
|
20
|
+
|
|
21
|
+
@pulumi.input_type
|
|
22
|
+
class SecretsMountArgs:
|
|
23
|
+
def __init__(__self__, *,
|
|
24
|
+
path: pulumi.Input[_builtins.str],
|
|
25
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
26
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
27
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
28
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
29
|
+
cassandras: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]]] = None,
|
|
30
|
+
couchbases: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]]] = None,
|
|
31
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
|
32
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
33
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
|
34
|
+
elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]]] = None,
|
|
35
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
36
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
37
|
+
hanas: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]]] = None,
|
|
38
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
|
39
|
+
influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]] = None,
|
|
40
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
|
41
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
42
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
|
43
|
+
mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]]] = None,
|
|
44
|
+
mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]]] = None,
|
|
45
|
+
mssqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMssqlArgs']]]] = None,
|
|
46
|
+
mysql_auroras: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlAuroraArgs']]]] = None,
|
|
47
|
+
mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlLegacyArgs']]]] = None,
|
|
48
|
+
mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]] = None,
|
|
49
|
+
mysqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]] = None,
|
|
50
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
51
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
|
52
|
+
oracles: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]] = None,
|
|
53
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
54
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
|
55
|
+
postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]]] = None,
|
|
56
|
+
redis: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]]] = None,
|
|
57
|
+
redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedisElasticachArgs']]]] = None,
|
|
58
|
+
redshifts: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]]] = None,
|
|
59
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
60
|
+
snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountSnowflakeArgs']]]] = None):
|
|
61
|
+
"""
|
|
62
|
+
The set of arguments for constructing a SecretsMount resource.
|
|
63
|
+
:param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
|
|
64
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
|
|
65
|
+
|
|
66
|
+
The following arguments are common to all database engines:
|
|
67
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
|
68
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
|
69
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
|
70
|
+
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]] cassandras: A nested block containing configuration options for Cassandra connections.
|
|
71
|
+
*See Configuration Options for more info*
|
|
72
|
+
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]] couchbases: A nested block containing configuration options for Couchbase connections.
|
|
73
|
+
*See Configuration Options for more info*
|
|
74
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
|
75
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
|
76
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
|
77
|
+
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]] elasticsearches: A nested block containing configuration options for Elasticsearch connections.
|
|
78
|
+
*See Configuration Options for more info*
|
|
79
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
|
80
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
|
81
|
+
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]] hanas: A nested block containing configuration options for SAP HanaDB connections.
|
|
82
|
+
*See Configuration Options for more info*
|
|
83
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
|
84
|
+
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]] influxdbs: A nested block containing configuration options for InfluxDB connections.
|
|
85
|
+
*See Configuration Options for more info*
|
|
86
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
|
87
|
+
:param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
|
88
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
|
89
|
+
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
|
|
90
|
+
*See Configuration Options for more info*
|
|
91
|
+
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]] mongodbs: A nested block containing configuration options for MongoDB connections.
|
|
92
|
+
*See Configuration Options for more info*
|
|
93
|
+
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountMssqlArgs']]] mssqls: A nested block containing configuration options for MSSQL connections.
|
|
94
|
+
*See Configuration Options for more info*
|
|
95
|
+
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlAuroraArgs']]] mysql_auroras: A nested block containing configuration options for Aurora MySQL connections.
|
|
96
|
+
*See Configuration Options for more info*
|
|
97
|
+
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlLegacyArgs']]] mysql_legacies: A nested block containing configuration options for legacy MySQL connections.
|
|
98
|
+
*See Configuration Options for more info*
|
|
99
|
+
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]] mysql_rds: A nested block containing configuration options for RDS MySQL connections.
|
|
100
|
+
*See Configuration Options for more info*
|
|
101
|
+
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]] mysqls: A nested block containing configuration options for MySQL connections.
|
|
102
|
+
*See Configuration Options for more info*
|
|
103
|
+
:param pulumi.Input[_builtins.str] namespace: Target namespace. (requires Enterprise)
|
|
104
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
|
105
|
+
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]] oracles: A nested block containing configuration options for Oracle connections.
|
|
106
|
+
*See Configuration Options for more info*
|
|
107
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
|
108
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
|
109
|
+
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]] postgresqls: A nested block containing configuration options for PostgreSQL connections.
|
|
110
|
+
*See Configuration Options for more info*
|
|
111
|
+
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]] redis: A nested block containing configuration options for Redis connections.
|
|
112
|
+
*See Configuration Options for more info*
|
|
113
|
+
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountRedisElasticachArgs']]] redis_elasticaches: A nested block containing configuration options for Redis ElastiCache connections.
|
|
114
|
+
*See Configuration Options for more info*
|
|
115
|
+
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]] redshifts: A nested block containing configuration options for AWS Redshift connections.
|
|
116
|
+
*See Configuration Options for more info*
|
|
117
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
|
118
|
+
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountSnowflakeArgs']]] snowflakes: A nested block containing configuration options for Snowflake connections.
|
|
119
|
+
*See Configuration Options for more info*
|
|
120
|
+
"""
|
|
121
|
+
pulumi.set(__self__, "path", path)
|
|
122
|
+
if allowed_managed_keys is not None:
|
|
123
|
+
pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
|
|
124
|
+
if allowed_response_headers is not None:
|
|
125
|
+
pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
|
|
126
|
+
if audit_non_hmac_request_keys is not None:
|
|
127
|
+
pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
|
|
128
|
+
if audit_non_hmac_response_keys is not None:
|
|
129
|
+
pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
|
|
130
|
+
if cassandras is not None:
|
|
131
|
+
pulumi.set(__self__, "cassandras", cassandras)
|
|
132
|
+
if couchbases is not None:
|
|
133
|
+
pulumi.set(__self__, "couchbases", couchbases)
|
|
134
|
+
if default_lease_ttl_seconds is not None:
|
|
135
|
+
pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
|
|
136
|
+
if delegated_auth_accessors is not None:
|
|
137
|
+
pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
|
|
138
|
+
if description is not None:
|
|
139
|
+
pulumi.set(__self__, "description", description)
|
|
140
|
+
if elasticsearches is not None:
|
|
141
|
+
pulumi.set(__self__, "elasticsearches", elasticsearches)
|
|
142
|
+
if external_entropy_access is not None:
|
|
143
|
+
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
|
144
|
+
if force_no_cache is not None:
|
|
145
|
+
pulumi.set(__self__, "force_no_cache", force_no_cache)
|
|
146
|
+
if hanas is not None:
|
|
147
|
+
pulumi.set(__self__, "hanas", hanas)
|
|
148
|
+
if identity_token_key is not None:
|
|
149
|
+
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
|
150
|
+
if influxdbs is not None:
|
|
151
|
+
pulumi.set(__self__, "influxdbs", influxdbs)
|
|
152
|
+
if listing_visibility is not None:
|
|
153
|
+
pulumi.set(__self__, "listing_visibility", listing_visibility)
|
|
154
|
+
if local is not None:
|
|
155
|
+
pulumi.set(__self__, "local", local)
|
|
156
|
+
if max_lease_ttl_seconds is not None:
|
|
157
|
+
pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
|
|
158
|
+
if mongodbatlas is not None:
|
|
159
|
+
pulumi.set(__self__, "mongodbatlas", mongodbatlas)
|
|
160
|
+
if mongodbs is not None:
|
|
161
|
+
pulumi.set(__self__, "mongodbs", mongodbs)
|
|
162
|
+
if mssqls is not None:
|
|
163
|
+
pulumi.set(__self__, "mssqls", mssqls)
|
|
164
|
+
if mysql_auroras is not None:
|
|
165
|
+
pulumi.set(__self__, "mysql_auroras", mysql_auroras)
|
|
166
|
+
if mysql_legacies is not None:
|
|
167
|
+
pulumi.set(__self__, "mysql_legacies", mysql_legacies)
|
|
168
|
+
if mysql_rds is not None:
|
|
169
|
+
pulumi.set(__self__, "mysql_rds", mysql_rds)
|
|
170
|
+
if mysqls is not None:
|
|
171
|
+
pulumi.set(__self__, "mysqls", mysqls)
|
|
172
|
+
if namespace is not None:
|
|
173
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
174
|
+
if options is not None:
|
|
175
|
+
pulumi.set(__self__, "options", options)
|
|
176
|
+
if oracles is not None:
|
|
177
|
+
pulumi.set(__self__, "oracles", oracles)
|
|
178
|
+
if passthrough_request_headers is not None:
|
|
179
|
+
pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
|
|
180
|
+
if plugin_version is not None:
|
|
181
|
+
pulumi.set(__self__, "plugin_version", plugin_version)
|
|
182
|
+
if postgresqls is not None:
|
|
183
|
+
pulumi.set(__self__, "postgresqls", postgresqls)
|
|
184
|
+
if redis is not None:
|
|
185
|
+
pulumi.set(__self__, "redis", redis)
|
|
186
|
+
if redis_elasticaches is not None:
|
|
187
|
+
pulumi.set(__self__, "redis_elasticaches", redis_elasticaches)
|
|
188
|
+
if redshifts is not None:
|
|
189
|
+
pulumi.set(__self__, "redshifts", redshifts)
|
|
190
|
+
if seal_wrap is not None:
|
|
191
|
+
pulumi.set(__self__, "seal_wrap", seal_wrap)
|
|
192
|
+
if snowflakes is not None:
|
|
193
|
+
pulumi.set(__self__, "snowflakes", snowflakes)
|
|
194
|
+
|
|
195
|
+
@_builtins.property
|
|
196
|
+
@pulumi.getter
|
|
197
|
+
def path(self) -> pulumi.Input[_builtins.str]:
|
|
198
|
+
"""
|
|
199
|
+
Where the secret backend will be mounted
|
|
200
|
+
"""
|
|
201
|
+
return pulumi.get(self, "path")
|
|
202
|
+
|
|
203
|
+
@path.setter
|
|
204
|
+
def path(self, value: pulumi.Input[_builtins.str]):
|
|
205
|
+
pulumi.set(self, "path", value)
|
|
206
|
+
|
|
207
|
+
@_builtins.property
|
|
208
|
+
@pulumi.getter(name="allowedManagedKeys")
|
|
209
|
+
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
210
|
+
"""
|
|
211
|
+
Set of managed key registry entry names that the mount in question is allowed to access
|
|
212
|
+
|
|
213
|
+
The following arguments are common to all database engines:
|
|
214
|
+
"""
|
|
215
|
+
return pulumi.get(self, "allowed_managed_keys")
|
|
216
|
+
|
|
217
|
+
@allowed_managed_keys.setter
|
|
218
|
+
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
219
|
+
pulumi.set(self, "allowed_managed_keys", value)
|
|
220
|
+
|
|
221
|
+
@_builtins.property
|
|
222
|
+
@pulumi.getter(name="allowedResponseHeaders")
|
|
223
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
224
|
+
"""
|
|
225
|
+
List of headers to allow and pass from the request to the plugin
|
|
226
|
+
"""
|
|
227
|
+
return pulumi.get(self, "allowed_response_headers")
|
|
228
|
+
|
|
229
|
+
@allowed_response_headers.setter
|
|
230
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
231
|
+
pulumi.set(self, "allowed_response_headers", value)
|
|
232
|
+
|
|
233
|
+
@_builtins.property
|
|
234
|
+
@pulumi.getter(name="auditNonHmacRequestKeys")
|
|
235
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
236
|
+
"""
|
|
237
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
|
238
|
+
"""
|
|
239
|
+
return pulumi.get(self, "audit_non_hmac_request_keys")
|
|
240
|
+
|
|
241
|
+
@audit_non_hmac_request_keys.setter
|
|
242
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
243
|
+
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
|
244
|
+
|
|
245
|
+
@_builtins.property
|
|
246
|
+
@pulumi.getter(name="auditNonHmacResponseKeys")
|
|
247
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
248
|
+
"""
|
|
249
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
|
250
|
+
"""
|
|
251
|
+
return pulumi.get(self, "audit_non_hmac_response_keys")
|
|
252
|
+
|
|
253
|
+
@audit_non_hmac_response_keys.setter
|
|
254
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
255
|
+
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
|
256
|
+
|
|
257
|
+
@_builtins.property
|
|
258
|
+
@pulumi.getter
|
|
259
|
+
def cassandras(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]]]:
|
|
260
|
+
"""
|
|
261
|
+
A nested block containing configuration options for Cassandra connections.
|
|
262
|
+
*See Configuration Options for more info*
|
|
263
|
+
"""
|
|
264
|
+
return pulumi.get(self, "cassandras")
|
|
265
|
+
|
|
266
|
+
@cassandras.setter
|
|
267
|
+
def cassandras(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]]]):
|
|
268
|
+
pulumi.set(self, "cassandras", value)
|
|
269
|
+
|
|
270
|
+
@_builtins.property
|
|
271
|
+
@pulumi.getter
|
|
272
|
+
def couchbases(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]]]:
|
|
273
|
+
"""
|
|
274
|
+
A nested block containing configuration options for Couchbase connections.
|
|
275
|
+
*See Configuration Options for more info*
|
|
276
|
+
"""
|
|
277
|
+
return pulumi.get(self, "couchbases")
|
|
278
|
+
|
|
279
|
+
@couchbases.setter
|
|
280
|
+
def couchbases(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]]]):
|
|
281
|
+
pulumi.set(self, "couchbases", value)
|
|
282
|
+
|
|
283
|
+
@_builtins.property
|
|
284
|
+
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
|
285
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
286
|
+
"""
|
|
287
|
+
Default lease duration for tokens and secrets in seconds
|
|
288
|
+
"""
|
|
289
|
+
return pulumi.get(self, "default_lease_ttl_seconds")
|
|
290
|
+
|
|
291
|
+
@default_lease_ttl_seconds.setter
|
|
292
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
293
|
+
pulumi.set(self, "default_lease_ttl_seconds", value)
|
|
294
|
+
|
|
295
|
+
@_builtins.property
|
|
296
|
+
@pulumi.getter(name="delegatedAuthAccessors")
|
|
297
|
+
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
298
|
+
"""
|
|
299
|
+
List of headers to allow and pass from the request to the plugin
|
|
300
|
+
"""
|
|
301
|
+
return pulumi.get(self, "delegated_auth_accessors")
|
|
302
|
+
|
|
303
|
+
@delegated_auth_accessors.setter
|
|
304
|
+
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
305
|
+
pulumi.set(self, "delegated_auth_accessors", value)
|
|
306
|
+
|
|
307
|
+
@_builtins.property
|
|
308
|
+
@pulumi.getter
|
|
309
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
310
|
+
"""
|
|
311
|
+
Human-friendly description of the mount
|
|
312
|
+
"""
|
|
313
|
+
return pulumi.get(self, "description")
|
|
314
|
+
|
|
315
|
+
@description.setter
|
|
316
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
317
|
+
pulumi.set(self, "description", value)
|
|
318
|
+
|
|
319
|
+
@_builtins.property
|
|
320
|
+
@pulumi.getter
|
|
321
|
+
def elasticsearches(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]]]:
|
|
322
|
+
"""
|
|
323
|
+
A nested block containing configuration options for Elasticsearch connections.
|
|
324
|
+
*See Configuration Options for more info*
|
|
325
|
+
"""
|
|
326
|
+
return pulumi.get(self, "elasticsearches")
|
|
327
|
+
|
|
328
|
+
@elasticsearches.setter
|
|
329
|
+
def elasticsearches(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]]]):
|
|
330
|
+
pulumi.set(self, "elasticsearches", value)
|
|
331
|
+
|
|
332
|
+
@_builtins.property
|
|
333
|
+
@pulumi.getter(name="externalEntropyAccess")
|
|
334
|
+
def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
335
|
+
"""
|
|
336
|
+
Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
|
337
|
+
"""
|
|
338
|
+
return pulumi.get(self, "external_entropy_access")
|
|
339
|
+
|
|
340
|
+
@external_entropy_access.setter
|
|
341
|
+
def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
342
|
+
pulumi.set(self, "external_entropy_access", value)
|
|
343
|
+
|
|
344
|
+
@_builtins.property
|
|
345
|
+
@pulumi.getter(name="forceNoCache")
|
|
346
|
+
def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
347
|
+
"""
|
|
348
|
+
If set to true, disables caching.
|
|
349
|
+
"""
|
|
350
|
+
return pulumi.get(self, "force_no_cache")
|
|
351
|
+
|
|
352
|
+
@force_no_cache.setter
|
|
353
|
+
def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
354
|
+
pulumi.set(self, "force_no_cache", value)
|
|
355
|
+
|
|
356
|
+
@_builtins.property
|
|
357
|
+
@pulumi.getter
|
|
358
|
+
def hanas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]]]:
|
|
359
|
+
"""
|
|
360
|
+
A nested block containing configuration options for SAP HanaDB connections.
|
|
361
|
+
*See Configuration Options for more info*
|
|
362
|
+
"""
|
|
363
|
+
return pulumi.get(self, "hanas")
|
|
364
|
+
|
|
365
|
+
@hanas.setter
|
|
366
|
+
def hanas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]]]):
|
|
367
|
+
pulumi.set(self, "hanas", value)
|
|
368
|
+
|
|
369
|
+
@_builtins.property
|
|
370
|
+
@pulumi.getter(name="identityTokenKey")
|
|
371
|
+
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
372
|
+
"""
|
|
373
|
+
The key to use for signing plugin workload identity tokens
|
|
374
|
+
"""
|
|
375
|
+
return pulumi.get(self, "identity_token_key")
|
|
376
|
+
|
|
377
|
+
@identity_token_key.setter
|
|
378
|
+
def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
379
|
+
pulumi.set(self, "identity_token_key", value)
|
|
380
|
+
|
|
381
|
+
@_builtins.property
|
|
382
|
+
@pulumi.getter
|
|
383
|
+
def influxdbs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]]:
|
|
384
|
+
"""
|
|
385
|
+
A nested block containing configuration options for InfluxDB connections.
|
|
386
|
+
*See Configuration Options for more info*
|
|
387
|
+
"""
|
|
388
|
+
return pulumi.get(self, "influxdbs")
|
|
389
|
+
|
|
390
|
+
@influxdbs.setter
|
|
391
|
+
def influxdbs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]]):
|
|
392
|
+
pulumi.set(self, "influxdbs", value)
|
|
393
|
+
|
|
394
|
+
@_builtins.property
|
|
395
|
+
@pulumi.getter(name="listingVisibility")
|
|
396
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
397
|
+
"""
|
|
398
|
+
Specifies whether to show this mount in the UI-specific listing endpoint
|
|
399
|
+
"""
|
|
400
|
+
return pulumi.get(self, "listing_visibility")
|
|
401
|
+
|
|
402
|
+
@listing_visibility.setter
|
|
403
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
404
|
+
pulumi.set(self, "listing_visibility", value)
|
|
405
|
+
|
|
406
|
+
@_builtins.property
|
|
407
|
+
@pulumi.getter
|
|
408
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
409
|
+
"""
|
|
410
|
+
Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
|
411
|
+
"""
|
|
412
|
+
return pulumi.get(self, "local")
|
|
413
|
+
|
|
414
|
+
@local.setter
|
|
415
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
416
|
+
pulumi.set(self, "local", value)
|
|
417
|
+
|
|
418
|
+
@_builtins.property
|
|
419
|
+
@pulumi.getter(name="maxLeaseTtlSeconds")
|
|
420
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
421
|
+
"""
|
|
422
|
+
Maximum possible lease duration for tokens and secrets in seconds
|
|
423
|
+
"""
|
|
424
|
+
return pulumi.get(self, "max_lease_ttl_seconds")
|
|
425
|
+
|
|
426
|
+
@max_lease_ttl_seconds.setter
|
|
427
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
428
|
+
pulumi.set(self, "max_lease_ttl_seconds", value)
|
|
429
|
+
|
|
430
|
+
@_builtins.property
|
|
431
|
+
@pulumi.getter
|
|
432
|
+
def mongodbatlas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]]]:
|
|
433
|
+
"""
|
|
434
|
+
A nested block containing configuration options for MongoDB Atlas connections.
|
|
435
|
+
*See Configuration Options for more info*
|
|
436
|
+
"""
|
|
437
|
+
return pulumi.get(self, "mongodbatlas")
|
|
438
|
+
|
|
439
|
+
@mongodbatlas.setter
|
|
440
|
+
def mongodbatlas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]]]):
|
|
441
|
+
pulumi.set(self, "mongodbatlas", value)
|
|
442
|
+
|
|
443
|
+
@_builtins.property
|
|
444
|
+
@pulumi.getter
|
|
445
|
+
def mongodbs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]]]:
|
|
446
|
+
"""
|
|
447
|
+
A nested block containing configuration options for MongoDB connections.
|
|
448
|
+
*See Configuration Options for more info*
|
|
449
|
+
"""
|
|
450
|
+
return pulumi.get(self, "mongodbs")
|
|
451
|
+
|
|
452
|
+
@mongodbs.setter
|
|
453
|
+
def mongodbs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]]]):
|
|
454
|
+
pulumi.set(self, "mongodbs", value)
|
|
455
|
+
|
|
456
|
+
@_builtins.property
|
|
457
|
+
@pulumi.getter
|
|
458
|
+
def mssqls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMssqlArgs']]]]:
|
|
459
|
+
"""
|
|
460
|
+
A nested block containing configuration options for MSSQL connections.
|
|
461
|
+
*See Configuration Options for more info*
|
|
462
|
+
"""
|
|
463
|
+
return pulumi.get(self, "mssqls")
|
|
464
|
+
|
|
465
|
+
@mssqls.setter
|
|
466
|
+
def mssqls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMssqlArgs']]]]):
|
|
467
|
+
pulumi.set(self, "mssqls", value)
|
|
468
|
+
|
|
469
|
+
@_builtins.property
|
|
470
|
+
@pulumi.getter(name="mysqlAuroras")
|
|
471
|
+
def mysql_auroras(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlAuroraArgs']]]]:
|
|
472
|
+
"""
|
|
473
|
+
A nested block containing configuration options for Aurora MySQL connections.
|
|
474
|
+
*See Configuration Options for more info*
|
|
475
|
+
"""
|
|
476
|
+
return pulumi.get(self, "mysql_auroras")
|
|
477
|
+
|
|
478
|
+
@mysql_auroras.setter
|
|
479
|
+
def mysql_auroras(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlAuroraArgs']]]]):
|
|
480
|
+
pulumi.set(self, "mysql_auroras", value)
|
|
481
|
+
|
|
482
|
+
@_builtins.property
|
|
483
|
+
@pulumi.getter(name="mysqlLegacies")
|
|
484
|
+
def mysql_legacies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlLegacyArgs']]]]:
|
|
485
|
+
"""
|
|
486
|
+
A nested block containing configuration options for legacy MySQL connections.
|
|
487
|
+
*See Configuration Options for more info*
|
|
488
|
+
"""
|
|
489
|
+
return pulumi.get(self, "mysql_legacies")
|
|
490
|
+
|
|
491
|
+
@mysql_legacies.setter
|
|
492
|
+
def mysql_legacies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlLegacyArgs']]]]):
|
|
493
|
+
pulumi.set(self, "mysql_legacies", value)
|
|
494
|
+
|
|
495
|
+
@_builtins.property
|
|
496
|
+
@pulumi.getter(name="mysqlRds")
|
|
497
|
+
def mysql_rds(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]]:
|
|
498
|
+
"""
|
|
499
|
+
A nested block containing configuration options for RDS MySQL connections.
|
|
500
|
+
*See Configuration Options for more info*
|
|
501
|
+
"""
|
|
502
|
+
return pulumi.get(self, "mysql_rds")
|
|
503
|
+
|
|
504
|
+
@mysql_rds.setter
|
|
505
|
+
def mysql_rds(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]]):
|
|
506
|
+
pulumi.set(self, "mysql_rds", value)
|
|
507
|
+
|
|
508
|
+
@_builtins.property
|
|
509
|
+
@pulumi.getter
|
|
510
|
+
def mysqls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]]:
|
|
511
|
+
"""
|
|
512
|
+
A nested block containing configuration options for MySQL connections.
|
|
513
|
+
*See Configuration Options for more info*
|
|
514
|
+
"""
|
|
515
|
+
return pulumi.get(self, "mysqls")
|
|
516
|
+
|
|
517
|
+
@mysqls.setter
|
|
518
|
+
def mysqls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]]):
|
|
519
|
+
pulumi.set(self, "mysqls", value)
|
|
520
|
+
|
|
521
|
+
@_builtins.property
|
|
522
|
+
@pulumi.getter
|
|
523
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
524
|
+
"""
|
|
525
|
+
Target namespace. (requires Enterprise)
|
|
526
|
+
"""
|
|
527
|
+
return pulumi.get(self, "namespace")
|
|
528
|
+
|
|
529
|
+
@namespace.setter
|
|
530
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
531
|
+
pulumi.set(self, "namespace", value)
|
|
532
|
+
|
|
533
|
+
@_builtins.property
|
|
534
|
+
@pulumi.getter
|
|
535
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
|
536
|
+
"""
|
|
537
|
+
Specifies mount type specific options that are passed to the backend
|
|
538
|
+
"""
|
|
539
|
+
return pulumi.get(self, "options")
|
|
540
|
+
|
|
541
|
+
@options.setter
|
|
542
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
|
543
|
+
pulumi.set(self, "options", value)
|
|
544
|
+
|
|
545
|
+
@_builtins.property
|
|
546
|
+
@pulumi.getter
|
|
547
|
+
def oracles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]]:
|
|
548
|
+
"""
|
|
549
|
+
A nested block containing configuration options for Oracle connections.
|
|
550
|
+
*See Configuration Options for more info*
|
|
551
|
+
"""
|
|
552
|
+
return pulumi.get(self, "oracles")
|
|
553
|
+
|
|
554
|
+
@oracles.setter
|
|
555
|
+
def oracles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]]):
|
|
556
|
+
pulumi.set(self, "oracles", value)
|
|
557
|
+
|
|
558
|
+
@_builtins.property
|
|
559
|
+
@pulumi.getter(name="passthroughRequestHeaders")
|
|
560
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
561
|
+
"""
|
|
562
|
+
List of headers to allow and pass from the request to the plugin
|
|
563
|
+
"""
|
|
564
|
+
return pulumi.get(self, "passthrough_request_headers")
|
|
565
|
+
|
|
566
|
+
@passthrough_request_headers.setter
|
|
567
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
568
|
+
pulumi.set(self, "passthrough_request_headers", value)
|
|
569
|
+
|
|
570
|
+
@_builtins.property
|
|
571
|
+
@pulumi.getter(name="pluginVersion")
|
|
572
|
+
def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
573
|
+
"""
|
|
574
|
+
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
|
575
|
+
"""
|
|
576
|
+
return pulumi.get(self, "plugin_version")
|
|
577
|
+
|
|
578
|
+
@plugin_version.setter
|
|
579
|
+
def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
580
|
+
pulumi.set(self, "plugin_version", value)
|
|
581
|
+
|
|
582
|
+
@_builtins.property
|
|
583
|
+
@pulumi.getter
|
|
584
|
+
def postgresqls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]]]:
|
|
585
|
+
"""
|
|
586
|
+
A nested block containing configuration options for PostgreSQL connections.
|
|
587
|
+
*See Configuration Options for more info*
|
|
588
|
+
"""
|
|
589
|
+
return pulumi.get(self, "postgresqls")
|
|
590
|
+
|
|
591
|
+
@postgresqls.setter
|
|
592
|
+
def postgresqls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]]]):
|
|
593
|
+
pulumi.set(self, "postgresqls", value)
|
|
594
|
+
|
|
595
|
+
@_builtins.property
|
|
596
|
+
@pulumi.getter
|
|
597
|
+
def redis(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]]]:
|
|
598
|
+
"""
|
|
599
|
+
A nested block containing configuration options for Redis connections.
|
|
600
|
+
*See Configuration Options for more info*
|
|
601
|
+
"""
|
|
602
|
+
return pulumi.get(self, "redis")
|
|
603
|
+
|
|
604
|
+
@redis.setter
|
|
605
|
+
def redis(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]]]):
|
|
606
|
+
pulumi.set(self, "redis", value)
|
|
607
|
+
|
|
608
|
+
@_builtins.property
|
|
609
|
+
@pulumi.getter(name="redisElasticaches")
|
|
610
|
+
def redis_elasticaches(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedisElasticachArgs']]]]:
|
|
611
|
+
"""
|
|
612
|
+
A nested block containing configuration options for Redis ElastiCache connections.
|
|
613
|
+
*See Configuration Options for more info*
|
|
614
|
+
"""
|
|
615
|
+
return pulumi.get(self, "redis_elasticaches")
|
|
616
|
+
|
|
617
|
+
@redis_elasticaches.setter
|
|
618
|
+
def redis_elasticaches(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedisElasticachArgs']]]]):
|
|
619
|
+
pulumi.set(self, "redis_elasticaches", value)
|
|
620
|
+
|
|
621
|
+
@_builtins.property
|
|
622
|
+
@pulumi.getter
|
|
623
|
+
def redshifts(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]]]:
|
|
624
|
+
"""
|
|
625
|
+
A nested block containing configuration options for AWS Redshift connections.
|
|
626
|
+
*See Configuration Options for more info*
|
|
627
|
+
"""
|
|
628
|
+
return pulumi.get(self, "redshifts")
|
|
629
|
+
|
|
630
|
+
@redshifts.setter
|
|
631
|
+
def redshifts(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]]]):
|
|
632
|
+
pulumi.set(self, "redshifts", value)
|
|
633
|
+
|
|
634
|
+
@_builtins.property
|
|
635
|
+
@pulumi.getter(name="sealWrap")
|
|
636
|
+
def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
637
|
+
"""
|
|
638
|
+
Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
|
639
|
+
"""
|
|
640
|
+
return pulumi.get(self, "seal_wrap")
|
|
641
|
+
|
|
642
|
+
@seal_wrap.setter
|
|
643
|
+
def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
644
|
+
pulumi.set(self, "seal_wrap", value)
|
|
645
|
+
|
|
646
|
+
@_builtins.property
|
|
647
|
+
@pulumi.getter
|
|
648
|
+
def snowflakes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountSnowflakeArgs']]]]:
|
|
649
|
+
"""
|
|
650
|
+
A nested block containing configuration options for Snowflake connections.
|
|
651
|
+
*See Configuration Options for more info*
|
|
652
|
+
"""
|
|
653
|
+
return pulumi.get(self, "snowflakes")
|
|
654
|
+
|
|
655
|
+
@snowflakes.setter
|
|
656
|
+
def snowflakes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountSnowflakeArgs']]]]):
|
|
657
|
+
pulumi.set(self, "snowflakes", value)
|
|
658
|
+
|
|
659
|
+
|
|
660
|
+
@pulumi.input_type
|
|
661
|
+
class _SecretsMountState:
|
|
662
|
+
def __init__(__self__, *,
|
|
663
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
|
664
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
665
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
666
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
667
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
668
|
+
cassandras: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]]] = None,
|
|
669
|
+
couchbases: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]]] = None,
|
|
670
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
|
671
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
672
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
|
673
|
+
elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]]] = None,
|
|
674
|
+
engine_count: Optional[pulumi.Input[_builtins.int]] = None,
|
|
675
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
676
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
677
|
+
hanas: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]]] = None,
|
|
678
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
|
679
|
+
influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]] = None,
|
|
680
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
|
681
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
682
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
|
683
|
+
mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]]] = None,
|
|
684
|
+
mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]]] = None,
|
|
685
|
+
mssqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMssqlArgs']]]] = None,
|
|
686
|
+
mysql_auroras: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlAuroraArgs']]]] = None,
|
|
687
|
+
mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlLegacyArgs']]]] = None,
|
|
688
|
+
mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]] = None,
|
|
689
|
+
mysqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]] = None,
|
|
690
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
691
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
|
692
|
+
oracles: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]] = None,
|
|
693
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
694
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
695
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
|
696
|
+
postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]]] = None,
|
|
697
|
+
redis: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]]] = None,
|
|
698
|
+
redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedisElasticachArgs']]]] = None,
|
|
699
|
+
redshifts: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]]] = None,
|
|
700
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
701
|
+
snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountSnowflakeArgs']]]] = None):
|
|
702
|
+
"""
|
|
703
|
+
Input properties used for looking up and filtering SecretsMount resources.
|
|
704
|
+
:param pulumi.Input[_builtins.str] accessor: Accessor of the mount
|
|
705
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
|
|
706
|
+
|
|
707
|
+
The following arguments are common to all database engines:
|
|
708
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
|
709
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
|
710
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
|
711
|
+
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]] cassandras: A nested block containing configuration options for Cassandra connections.
|
|
712
|
+
*See Configuration Options for more info*
|
|
713
|
+
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]] couchbases: A nested block containing configuration options for Couchbase connections.
|
|
714
|
+
*See Configuration Options for more info*
|
|
715
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
|
716
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
|
717
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
|
718
|
+
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]] elasticsearches: A nested block containing configuration options for Elasticsearch connections.
|
|
719
|
+
*See Configuration Options for more info*
|
|
720
|
+
:param pulumi.Input[_builtins.int] engine_count: The total number of database secrets engines configured.
|
|
721
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
|
722
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
|
723
|
+
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]] hanas: A nested block containing configuration options for SAP HanaDB connections.
|
|
724
|
+
*See Configuration Options for more info*
|
|
725
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
|
726
|
+
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]] influxdbs: A nested block containing configuration options for InfluxDB connections.
|
|
727
|
+
*See Configuration Options for more info*
|
|
728
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
|
729
|
+
:param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
|
730
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
|
731
|
+
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
|
|
732
|
+
*See Configuration Options for more info*
|
|
733
|
+
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]] mongodbs: A nested block containing configuration options for MongoDB connections.
|
|
734
|
+
*See Configuration Options for more info*
|
|
735
|
+
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountMssqlArgs']]] mssqls: A nested block containing configuration options for MSSQL connections.
|
|
736
|
+
*See Configuration Options for more info*
|
|
737
|
+
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlAuroraArgs']]] mysql_auroras: A nested block containing configuration options for Aurora MySQL connections.
|
|
738
|
+
*See Configuration Options for more info*
|
|
739
|
+
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlLegacyArgs']]] mysql_legacies: A nested block containing configuration options for legacy MySQL connections.
|
|
740
|
+
*See Configuration Options for more info*
|
|
741
|
+
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]] mysql_rds: A nested block containing configuration options for RDS MySQL connections.
|
|
742
|
+
*See Configuration Options for more info*
|
|
743
|
+
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]] mysqls: A nested block containing configuration options for MySQL connections.
|
|
744
|
+
*See Configuration Options for more info*
|
|
745
|
+
:param pulumi.Input[_builtins.str] namespace: Target namespace. (requires Enterprise)
|
|
746
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
|
747
|
+
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]] oracles: A nested block containing configuration options for Oracle connections.
|
|
748
|
+
*See Configuration Options for more info*
|
|
749
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
|
750
|
+
:param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
|
|
751
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
|
752
|
+
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]] postgresqls: A nested block containing configuration options for PostgreSQL connections.
|
|
753
|
+
*See Configuration Options for more info*
|
|
754
|
+
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]] redis: A nested block containing configuration options for Redis connections.
|
|
755
|
+
*See Configuration Options for more info*
|
|
756
|
+
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountRedisElasticachArgs']]] redis_elasticaches: A nested block containing configuration options for Redis ElastiCache connections.
|
|
757
|
+
*See Configuration Options for more info*
|
|
758
|
+
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]] redshifts: A nested block containing configuration options for AWS Redshift connections.
|
|
759
|
+
*See Configuration Options for more info*
|
|
760
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
|
761
|
+
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountSnowflakeArgs']]] snowflakes: A nested block containing configuration options for Snowflake connections.
|
|
762
|
+
*See Configuration Options for more info*
|
|
763
|
+
"""
|
|
764
|
+
if accessor is not None:
|
|
765
|
+
pulumi.set(__self__, "accessor", accessor)
|
|
766
|
+
if allowed_managed_keys is not None:
|
|
767
|
+
pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
|
|
768
|
+
if allowed_response_headers is not None:
|
|
769
|
+
pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
|
|
770
|
+
if audit_non_hmac_request_keys is not None:
|
|
771
|
+
pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
|
|
772
|
+
if audit_non_hmac_response_keys is not None:
|
|
773
|
+
pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
|
|
774
|
+
if cassandras is not None:
|
|
775
|
+
pulumi.set(__self__, "cassandras", cassandras)
|
|
776
|
+
if couchbases is not None:
|
|
777
|
+
pulumi.set(__self__, "couchbases", couchbases)
|
|
778
|
+
if default_lease_ttl_seconds is not None:
|
|
779
|
+
pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
|
|
780
|
+
if delegated_auth_accessors is not None:
|
|
781
|
+
pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
|
|
782
|
+
if description is not None:
|
|
783
|
+
pulumi.set(__self__, "description", description)
|
|
784
|
+
if elasticsearches is not None:
|
|
785
|
+
pulumi.set(__self__, "elasticsearches", elasticsearches)
|
|
786
|
+
if engine_count is not None:
|
|
787
|
+
pulumi.set(__self__, "engine_count", engine_count)
|
|
788
|
+
if external_entropy_access is not None:
|
|
789
|
+
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
|
790
|
+
if force_no_cache is not None:
|
|
791
|
+
pulumi.set(__self__, "force_no_cache", force_no_cache)
|
|
792
|
+
if hanas is not None:
|
|
793
|
+
pulumi.set(__self__, "hanas", hanas)
|
|
794
|
+
if identity_token_key is not None:
|
|
795
|
+
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
|
796
|
+
if influxdbs is not None:
|
|
797
|
+
pulumi.set(__self__, "influxdbs", influxdbs)
|
|
798
|
+
if listing_visibility is not None:
|
|
799
|
+
pulumi.set(__self__, "listing_visibility", listing_visibility)
|
|
800
|
+
if local is not None:
|
|
801
|
+
pulumi.set(__self__, "local", local)
|
|
802
|
+
if max_lease_ttl_seconds is not None:
|
|
803
|
+
pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
|
|
804
|
+
if mongodbatlas is not None:
|
|
805
|
+
pulumi.set(__self__, "mongodbatlas", mongodbatlas)
|
|
806
|
+
if mongodbs is not None:
|
|
807
|
+
pulumi.set(__self__, "mongodbs", mongodbs)
|
|
808
|
+
if mssqls is not None:
|
|
809
|
+
pulumi.set(__self__, "mssqls", mssqls)
|
|
810
|
+
if mysql_auroras is not None:
|
|
811
|
+
pulumi.set(__self__, "mysql_auroras", mysql_auroras)
|
|
812
|
+
if mysql_legacies is not None:
|
|
813
|
+
pulumi.set(__self__, "mysql_legacies", mysql_legacies)
|
|
814
|
+
if mysql_rds is not None:
|
|
815
|
+
pulumi.set(__self__, "mysql_rds", mysql_rds)
|
|
816
|
+
if mysqls is not None:
|
|
817
|
+
pulumi.set(__self__, "mysqls", mysqls)
|
|
818
|
+
if namespace is not None:
|
|
819
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
820
|
+
if options is not None:
|
|
821
|
+
pulumi.set(__self__, "options", options)
|
|
822
|
+
if oracles is not None:
|
|
823
|
+
pulumi.set(__self__, "oracles", oracles)
|
|
824
|
+
if passthrough_request_headers is not None:
|
|
825
|
+
pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
|
|
826
|
+
if path is not None:
|
|
827
|
+
pulumi.set(__self__, "path", path)
|
|
828
|
+
if plugin_version is not None:
|
|
829
|
+
pulumi.set(__self__, "plugin_version", plugin_version)
|
|
830
|
+
if postgresqls is not None:
|
|
831
|
+
pulumi.set(__self__, "postgresqls", postgresqls)
|
|
832
|
+
if redis is not None:
|
|
833
|
+
pulumi.set(__self__, "redis", redis)
|
|
834
|
+
if redis_elasticaches is not None:
|
|
835
|
+
pulumi.set(__self__, "redis_elasticaches", redis_elasticaches)
|
|
836
|
+
if redshifts is not None:
|
|
837
|
+
pulumi.set(__self__, "redshifts", redshifts)
|
|
838
|
+
if seal_wrap is not None:
|
|
839
|
+
pulumi.set(__self__, "seal_wrap", seal_wrap)
|
|
840
|
+
if snowflakes is not None:
|
|
841
|
+
pulumi.set(__self__, "snowflakes", snowflakes)
|
|
842
|
+
|
|
843
|
+
@_builtins.property
|
|
844
|
+
@pulumi.getter
|
|
845
|
+
def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
846
|
+
"""
|
|
847
|
+
Accessor of the mount
|
|
848
|
+
"""
|
|
849
|
+
return pulumi.get(self, "accessor")
|
|
850
|
+
|
|
851
|
+
@accessor.setter
|
|
852
|
+
def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
853
|
+
pulumi.set(self, "accessor", value)
|
|
854
|
+
|
|
855
|
+
@_builtins.property
|
|
856
|
+
@pulumi.getter(name="allowedManagedKeys")
|
|
857
|
+
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
858
|
+
"""
|
|
859
|
+
Set of managed key registry entry names that the mount in question is allowed to access
|
|
860
|
+
|
|
861
|
+
The following arguments are common to all database engines:
|
|
862
|
+
"""
|
|
863
|
+
return pulumi.get(self, "allowed_managed_keys")
|
|
864
|
+
|
|
865
|
+
@allowed_managed_keys.setter
|
|
866
|
+
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
867
|
+
pulumi.set(self, "allowed_managed_keys", value)
|
|
868
|
+
|
|
869
|
+
@_builtins.property
|
|
870
|
+
@pulumi.getter(name="allowedResponseHeaders")
|
|
871
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
872
|
+
"""
|
|
873
|
+
List of headers to allow and pass from the request to the plugin
|
|
874
|
+
"""
|
|
875
|
+
return pulumi.get(self, "allowed_response_headers")
|
|
876
|
+
|
|
877
|
+
@allowed_response_headers.setter
|
|
878
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
879
|
+
pulumi.set(self, "allowed_response_headers", value)
|
|
880
|
+
|
|
881
|
+
@_builtins.property
|
|
882
|
+
@pulumi.getter(name="auditNonHmacRequestKeys")
|
|
883
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
884
|
+
"""
|
|
885
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
|
886
|
+
"""
|
|
887
|
+
return pulumi.get(self, "audit_non_hmac_request_keys")
|
|
888
|
+
|
|
889
|
+
@audit_non_hmac_request_keys.setter
|
|
890
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
891
|
+
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
|
892
|
+
|
|
893
|
+
@_builtins.property
|
|
894
|
+
@pulumi.getter(name="auditNonHmacResponseKeys")
|
|
895
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
896
|
+
"""
|
|
897
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
|
898
|
+
"""
|
|
899
|
+
return pulumi.get(self, "audit_non_hmac_response_keys")
|
|
900
|
+
|
|
901
|
+
@audit_non_hmac_response_keys.setter
|
|
902
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
903
|
+
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
|
904
|
+
|
|
905
|
+
@_builtins.property
|
|
906
|
+
@pulumi.getter
|
|
907
|
+
def cassandras(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]]]:
|
|
908
|
+
"""
|
|
909
|
+
A nested block containing configuration options for Cassandra connections.
|
|
910
|
+
*See Configuration Options for more info*
|
|
911
|
+
"""
|
|
912
|
+
return pulumi.get(self, "cassandras")
|
|
913
|
+
|
|
914
|
+
@cassandras.setter
|
|
915
|
+
def cassandras(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]]]):
|
|
916
|
+
pulumi.set(self, "cassandras", value)
|
|
917
|
+
|
|
918
|
+
@_builtins.property
|
|
919
|
+
@pulumi.getter
|
|
920
|
+
def couchbases(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]]]:
|
|
921
|
+
"""
|
|
922
|
+
A nested block containing configuration options for Couchbase connections.
|
|
923
|
+
*See Configuration Options for more info*
|
|
924
|
+
"""
|
|
925
|
+
return pulumi.get(self, "couchbases")
|
|
926
|
+
|
|
927
|
+
@couchbases.setter
|
|
928
|
+
def couchbases(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]]]):
|
|
929
|
+
pulumi.set(self, "couchbases", value)
|
|
930
|
+
|
|
931
|
+
@_builtins.property
|
|
932
|
+
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
|
933
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
934
|
+
"""
|
|
935
|
+
Default lease duration for tokens and secrets in seconds
|
|
936
|
+
"""
|
|
937
|
+
return pulumi.get(self, "default_lease_ttl_seconds")
|
|
938
|
+
|
|
939
|
+
@default_lease_ttl_seconds.setter
|
|
940
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
941
|
+
pulumi.set(self, "default_lease_ttl_seconds", value)
|
|
942
|
+
|
|
943
|
+
@_builtins.property
|
|
944
|
+
@pulumi.getter(name="delegatedAuthAccessors")
|
|
945
|
+
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
946
|
+
"""
|
|
947
|
+
List of headers to allow and pass from the request to the plugin
|
|
948
|
+
"""
|
|
949
|
+
return pulumi.get(self, "delegated_auth_accessors")
|
|
950
|
+
|
|
951
|
+
@delegated_auth_accessors.setter
|
|
952
|
+
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
953
|
+
pulumi.set(self, "delegated_auth_accessors", value)
|
|
954
|
+
|
|
955
|
+
@_builtins.property
|
|
956
|
+
@pulumi.getter
|
|
957
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
958
|
+
"""
|
|
959
|
+
Human-friendly description of the mount
|
|
960
|
+
"""
|
|
961
|
+
return pulumi.get(self, "description")
|
|
962
|
+
|
|
963
|
+
@description.setter
|
|
964
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
965
|
+
pulumi.set(self, "description", value)
|
|
966
|
+
|
|
967
|
+
@_builtins.property
|
|
968
|
+
@pulumi.getter
|
|
969
|
+
def elasticsearches(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]]]:
|
|
970
|
+
"""
|
|
971
|
+
A nested block containing configuration options for Elasticsearch connections.
|
|
972
|
+
*See Configuration Options for more info*
|
|
973
|
+
"""
|
|
974
|
+
return pulumi.get(self, "elasticsearches")
|
|
975
|
+
|
|
976
|
+
@elasticsearches.setter
|
|
977
|
+
def elasticsearches(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]]]):
|
|
978
|
+
pulumi.set(self, "elasticsearches", value)
|
|
979
|
+
|
|
980
|
+
@_builtins.property
|
|
981
|
+
@pulumi.getter(name="engineCount")
|
|
982
|
+
def engine_count(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
983
|
+
"""
|
|
984
|
+
The total number of database secrets engines configured.
|
|
985
|
+
"""
|
|
986
|
+
return pulumi.get(self, "engine_count")
|
|
987
|
+
|
|
988
|
+
@engine_count.setter
|
|
989
|
+
def engine_count(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
990
|
+
pulumi.set(self, "engine_count", value)
|
|
991
|
+
|
|
992
|
+
@_builtins.property
|
|
993
|
+
@pulumi.getter(name="externalEntropyAccess")
|
|
994
|
+
def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
995
|
+
"""
|
|
996
|
+
Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
|
997
|
+
"""
|
|
998
|
+
return pulumi.get(self, "external_entropy_access")
|
|
999
|
+
|
|
1000
|
+
@external_entropy_access.setter
|
|
1001
|
+
def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
1002
|
+
pulumi.set(self, "external_entropy_access", value)
|
|
1003
|
+
|
|
1004
|
+
@_builtins.property
|
|
1005
|
+
@pulumi.getter(name="forceNoCache")
|
|
1006
|
+
def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
1007
|
+
"""
|
|
1008
|
+
If set to true, disables caching.
|
|
1009
|
+
"""
|
|
1010
|
+
return pulumi.get(self, "force_no_cache")
|
|
1011
|
+
|
|
1012
|
+
@force_no_cache.setter
|
|
1013
|
+
def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
1014
|
+
pulumi.set(self, "force_no_cache", value)
|
|
1015
|
+
|
|
1016
|
+
@_builtins.property
|
|
1017
|
+
@pulumi.getter
|
|
1018
|
+
def hanas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]]]:
|
|
1019
|
+
"""
|
|
1020
|
+
A nested block containing configuration options for SAP HanaDB connections.
|
|
1021
|
+
*See Configuration Options for more info*
|
|
1022
|
+
"""
|
|
1023
|
+
return pulumi.get(self, "hanas")
|
|
1024
|
+
|
|
1025
|
+
@hanas.setter
|
|
1026
|
+
def hanas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]]]):
|
|
1027
|
+
pulumi.set(self, "hanas", value)
|
|
1028
|
+
|
|
1029
|
+
@_builtins.property
|
|
1030
|
+
@pulumi.getter(name="identityTokenKey")
|
|
1031
|
+
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1032
|
+
"""
|
|
1033
|
+
The key to use for signing plugin workload identity tokens
|
|
1034
|
+
"""
|
|
1035
|
+
return pulumi.get(self, "identity_token_key")
|
|
1036
|
+
|
|
1037
|
+
@identity_token_key.setter
|
|
1038
|
+
def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1039
|
+
pulumi.set(self, "identity_token_key", value)
|
|
1040
|
+
|
|
1041
|
+
@_builtins.property
|
|
1042
|
+
@pulumi.getter
|
|
1043
|
+
def influxdbs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]]:
|
|
1044
|
+
"""
|
|
1045
|
+
A nested block containing configuration options for InfluxDB connections.
|
|
1046
|
+
*See Configuration Options for more info*
|
|
1047
|
+
"""
|
|
1048
|
+
return pulumi.get(self, "influxdbs")
|
|
1049
|
+
|
|
1050
|
+
@influxdbs.setter
|
|
1051
|
+
def influxdbs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]]):
|
|
1052
|
+
pulumi.set(self, "influxdbs", value)
|
|
1053
|
+
|
|
1054
|
+
@_builtins.property
|
|
1055
|
+
@pulumi.getter(name="listingVisibility")
|
|
1056
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1057
|
+
"""
|
|
1058
|
+
Specifies whether to show this mount in the UI-specific listing endpoint
|
|
1059
|
+
"""
|
|
1060
|
+
return pulumi.get(self, "listing_visibility")
|
|
1061
|
+
|
|
1062
|
+
@listing_visibility.setter
|
|
1063
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1064
|
+
pulumi.set(self, "listing_visibility", value)
|
|
1065
|
+
|
|
1066
|
+
@_builtins.property
|
|
1067
|
+
@pulumi.getter
|
|
1068
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
1069
|
+
"""
|
|
1070
|
+
Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
|
1071
|
+
"""
|
|
1072
|
+
return pulumi.get(self, "local")
|
|
1073
|
+
|
|
1074
|
+
@local.setter
|
|
1075
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
1076
|
+
pulumi.set(self, "local", value)
|
|
1077
|
+
|
|
1078
|
+
@_builtins.property
|
|
1079
|
+
@pulumi.getter(name="maxLeaseTtlSeconds")
|
|
1080
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
1081
|
+
"""
|
|
1082
|
+
Maximum possible lease duration for tokens and secrets in seconds
|
|
1083
|
+
"""
|
|
1084
|
+
return pulumi.get(self, "max_lease_ttl_seconds")
|
|
1085
|
+
|
|
1086
|
+
@max_lease_ttl_seconds.setter
|
|
1087
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
1088
|
+
pulumi.set(self, "max_lease_ttl_seconds", value)
|
|
1089
|
+
|
|
1090
|
+
@_builtins.property
|
|
1091
|
+
@pulumi.getter
|
|
1092
|
+
def mongodbatlas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]]]:
|
|
1093
|
+
"""
|
|
1094
|
+
A nested block containing configuration options for MongoDB Atlas connections.
|
|
1095
|
+
*See Configuration Options for more info*
|
|
1096
|
+
"""
|
|
1097
|
+
return pulumi.get(self, "mongodbatlas")
|
|
1098
|
+
|
|
1099
|
+
@mongodbatlas.setter
|
|
1100
|
+
def mongodbatlas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]]]):
|
|
1101
|
+
pulumi.set(self, "mongodbatlas", value)
|
|
1102
|
+
|
|
1103
|
+
@_builtins.property
|
|
1104
|
+
@pulumi.getter
|
|
1105
|
+
def mongodbs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]]]:
|
|
1106
|
+
"""
|
|
1107
|
+
A nested block containing configuration options for MongoDB connections.
|
|
1108
|
+
*See Configuration Options for more info*
|
|
1109
|
+
"""
|
|
1110
|
+
return pulumi.get(self, "mongodbs")
|
|
1111
|
+
|
|
1112
|
+
@mongodbs.setter
|
|
1113
|
+
def mongodbs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]]]):
|
|
1114
|
+
pulumi.set(self, "mongodbs", value)
|
|
1115
|
+
|
|
1116
|
+
@_builtins.property
|
|
1117
|
+
@pulumi.getter
|
|
1118
|
+
def mssqls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMssqlArgs']]]]:
|
|
1119
|
+
"""
|
|
1120
|
+
A nested block containing configuration options for MSSQL connections.
|
|
1121
|
+
*See Configuration Options for more info*
|
|
1122
|
+
"""
|
|
1123
|
+
return pulumi.get(self, "mssqls")
|
|
1124
|
+
|
|
1125
|
+
@mssqls.setter
|
|
1126
|
+
def mssqls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMssqlArgs']]]]):
|
|
1127
|
+
pulumi.set(self, "mssqls", value)
|
|
1128
|
+
|
|
1129
|
+
@_builtins.property
|
|
1130
|
+
@pulumi.getter(name="mysqlAuroras")
|
|
1131
|
+
def mysql_auroras(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlAuroraArgs']]]]:
|
|
1132
|
+
"""
|
|
1133
|
+
A nested block containing configuration options for Aurora MySQL connections.
|
|
1134
|
+
*See Configuration Options for more info*
|
|
1135
|
+
"""
|
|
1136
|
+
return pulumi.get(self, "mysql_auroras")
|
|
1137
|
+
|
|
1138
|
+
@mysql_auroras.setter
|
|
1139
|
+
def mysql_auroras(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlAuroraArgs']]]]):
|
|
1140
|
+
pulumi.set(self, "mysql_auroras", value)
|
|
1141
|
+
|
|
1142
|
+
@_builtins.property
|
|
1143
|
+
@pulumi.getter(name="mysqlLegacies")
|
|
1144
|
+
def mysql_legacies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlLegacyArgs']]]]:
|
|
1145
|
+
"""
|
|
1146
|
+
A nested block containing configuration options for legacy MySQL connections.
|
|
1147
|
+
*See Configuration Options for more info*
|
|
1148
|
+
"""
|
|
1149
|
+
return pulumi.get(self, "mysql_legacies")
|
|
1150
|
+
|
|
1151
|
+
@mysql_legacies.setter
|
|
1152
|
+
def mysql_legacies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlLegacyArgs']]]]):
|
|
1153
|
+
pulumi.set(self, "mysql_legacies", value)
|
|
1154
|
+
|
|
1155
|
+
@_builtins.property
|
|
1156
|
+
@pulumi.getter(name="mysqlRds")
|
|
1157
|
+
def mysql_rds(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]]:
|
|
1158
|
+
"""
|
|
1159
|
+
A nested block containing configuration options for RDS MySQL connections.
|
|
1160
|
+
*See Configuration Options for more info*
|
|
1161
|
+
"""
|
|
1162
|
+
return pulumi.get(self, "mysql_rds")
|
|
1163
|
+
|
|
1164
|
+
@mysql_rds.setter
|
|
1165
|
+
def mysql_rds(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]]):
|
|
1166
|
+
pulumi.set(self, "mysql_rds", value)
|
|
1167
|
+
|
|
1168
|
+
@_builtins.property
|
|
1169
|
+
@pulumi.getter
|
|
1170
|
+
def mysqls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]]:
|
|
1171
|
+
"""
|
|
1172
|
+
A nested block containing configuration options for MySQL connections.
|
|
1173
|
+
*See Configuration Options for more info*
|
|
1174
|
+
"""
|
|
1175
|
+
return pulumi.get(self, "mysqls")
|
|
1176
|
+
|
|
1177
|
+
@mysqls.setter
|
|
1178
|
+
def mysqls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]]):
|
|
1179
|
+
pulumi.set(self, "mysqls", value)
|
|
1180
|
+
|
|
1181
|
+
@_builtins.property
|
|
1182
|
+
@pulumi.getter
|
|
1183
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1184
|
+
"""
|
|
1185
|
+
Target namespace. (requires Enterprise)
|
|
1186
|
+
"""
|
|
1187
|
+
return pulumi.get(self, "namespace")
|
|
1188
|
+
|
|
1189
|
+
@namespace.setter
|
|
1190
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1191
|
+
pulumi.set(self, "namespace", value)
|
|
1192
|
+
|
|
1193
|
+
@_builtins.property
|
|
1194
|
+
@pulumi.getter
|
|
1195
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
|
1196
|
+
"""
|
|
1197
|
+
Specifies mount type specific options that are passed to the backend
|
|
1198
|
+
"""
|
|
1199
|
+
return pulumi.get(self, "options")
|
|
1200
|
+
|
|
1201
|
+
@options.setter
|
|
1202
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
|
1203
|
+
pulumi.set(self, "options", value)
|
|
1204
|
+
|
|
1205
|
+
@_builtins.property
|
|
1206
|
+
@pulumi.getter
|
|
1207
|
+
def oracles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]]:
|
|
1208
|
+
"""
|
|
1209
|
+
A nested block containing configuration options for Oracle connections.
|
|
1210
|
+
*See Configuration Options for more info*
|
|
1211
|
+
"""
|
|
1212
|
+
return pulumi.get(self, "oracles")
|
|
1213
|
+
|
|
1214
|
+
@oracles.setter
|
|
1215
|
+
def oracles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]]):
|
|
1216
|
+
pulumi.set(self, "oracles", value)
|
|
1217
|
+
|
|
1218
|
+
@_builtins.property
|
|
1219
|
+
@pulumi.getter(name="passthroughRequestHeaders")
|
|
1220
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
1221
|
+
"""
|
|
1222
|
+
List of headers to allow and pass from the request to the plugin
|
|
1223
|
+
"""
|
|
1224
|
+
return pulumi.get(self, "passthrough_request_headers")
|
|
1225
|
+
|
|
1226
|
+
@passthrough_request_headers.setter
|
|
1227
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
1228
|
+
pulumi.set(self, "passthrough_request_headers", value)
|
|
1229
|
+
|
|
1230
|
+
@_builtins.property
|
|
1231
|
+
@pulumi.getter
|
|
1232
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1233
|
+
"""
|
|
1234
|
+
Where the secret backend will be mounted
|
|
1235
|
+
"""
|
|
1236
|
+
return pulumi.get(self, "path")
|
|
1237
|
+
|
|
1238
|
+
@path.setter
|
|
1239
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1240
|
+
pulumi.set(self, "path", value)
|
|
1241
|
+
|
|
1242
|
+
@_builtins.property
|
|
1243
|
+
@pulumi.getter(name="pluginVersion")
|
|
1244
|
+
def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1245
|
+
"""
|
|
1246
|
+
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
|
1247
|
+
"""
|
|
1248
|
+
return pulumi.get(self, "plugin_version")
|
|
1249
|
+
|
|
1250
|
+
@plugin_version.setter
|
|
1251
|
+
def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1252
|
+
pulumi.set(self, "plugin_version", value)
|
|
1253
|
+
|
|
1254
|
+
@_builtins.property
|
|
1255
|
+
@pulumi.getter
|
|
1256
|
+
def postgresqls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]]]:
|
|
1257
|
+
"""
|
|
1258
|
+
A nested block containing configuration options for PostgreSQL connections.
|
|
1259
|
+
*See Configuration Options for more info*
|
|
1260
|
+
"""
|
|
1261
|
+
return pulumi.get(self, "postgresqls")
|
|
1262
|
+
|
|
1263
|
+
@postgresqls.setter
|
|
1264
|
+
def postgresqls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]]]):
|
|
1265
|
+
pulumi.set(self, "postgresqls", value)
|
|
1266
|
+
|
|
1267
|
+
@_builtins.property
|
|
1268
|
+
@pulumi.getter
|
|
1269
|
+
def redis(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]]]:
|
|
1270
|
+
"""
|
|
1271
|
+
A nested block containing configuration options for Redis connections.
|
|
1272
|
+
*See Configuration Options for more info*
|
|
1273
|
+
"""
|
|
1274
|
+
return pulumi.get(self, "redis")
|
|
1275
|
+
|
|
1276
|
+
@redis.setter
|
|
1277
|
+
def redis(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]]]):
|
|
1278
|
+
pulumi.set(self, "redis", value)
|
|
1279
|
+
|
|
1280
|
+
@_builtins.property
|
|
1281
|
+
@pulumi.getter(name="redisElasticaches")
|
|
1282
|
+
def redis_elasticaches(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedisElasticachArgs']]]]:
|
|
1283
|
+
"""
|
|
1284
|
+
A nested block containing configuration options for Redis ElastiCache connections.
|
|
1285
|
+
*See Configuration Options for more info*
|
|
1286
|
+
"""
|
|
1287
|
+
return pulumi.get(self, "redis_elasticaches")
|
|
1288
|
+
|
|
1289
|
+
@redis_elasticaches.setter
|
|
1290
|
+
def redis_elasticaches(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedisElasticachArgs']]]]):
|
|
1291
|
+
pulumi.set(self, "redis_elasticaches", value)
|
|
1292
|
+
|
|
1293
|
+
@_builtins.property
|
|
1294
|
+
@pulumi.getter
|
|
1295
|
+
def redshifts(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]]]:
|
|
1296
|
+
"""
|
|
1297
|
+
A nested block containing configuration options for AWS Redshift connections.
|
|
1298
|
+
*See Configuration Options for more info*
|
|
1299
|
+
"""
|
|
1300
|
+
return pulumi.get(self, "redshifts")
|
|
1301
|
+
|
|
1302
|
+
@redshifts.setter
|
|
1303
|
+
def redshifts(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]]]):
|
|
1304
|
+
pulumi.set(self, "redshifts", value)
|
|
1305
|
+
|
|
1306
|
+
@_builtins.property
|
|
1307
|
+
@pulumi.getter(name="sealWrap")
|
|
1308
|
+
def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
1309
|
+
"""
|
|
1310
|
+
Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
|
1311
|
+
"""
|
|
1312
|
+
return pulumi.get(self, "seal_wrap")
|
|
1313
|
+
|
|
1314
|
+
@seal_wrap.setter
|
|
1315
|
+
def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
1316
|
+
pulumi.set(self, "seal_wrap", value)
|
|
1317
|
+
|
|
1318
|
+
@_builtins.property
|
|
1319
|
+
@pulumi.getter
|
|
1320
|
+
def snowflakes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountSnowflakeArgs']]]]:
|
|
1321
|
+
"""
|
|
1322
|
+
A nested block containing configuration options for Snowflake connections.
|
|
1323
|
+
*See Configuration Options for more info*
|
|
1324
|
+
"""
|
|
1325
|
+
return pulumi.get(self, "snowflakes")
|
|
1326
|
+
|
|
1327
|
+
@snowflakes.setter
|
|
1328
|
+
def snowflakes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountSnowflakeArgs']]]]):
|
|
1329
|
+
pulumi.set(self, "snowflakes", value)
|
|
1330
|
+
|
|
1331
|
+
|
|
1332
|
+
@pulumi.type_token("vault:database/secretsMount:SecretsMount")
|
|
1333
|
+
class SecretsMount(pulumi.CustomResource):
|
|
1334
|
+
@overload
|
|
1335
|
+
def __init__(__self__,
|
|
1336
|
+
resource_name: str,
|
|
1337
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
1338
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1339
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1340
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1341
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1342
|
+
cassandras: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCassandraArgs', 'SecretsMountCassandraArgsDict']]]]] = None,
|
|
1343
|
+
couchbases: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCouchbaseArgs', 'SecretsMountCouchbaseArgsDict']]]]] = None,
|
|
1344
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
|
1345
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1346
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1347
|
+
elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountElasticsearchArgs', 'SecretsMountElasticsearchArgsDict']]]]] = None,
|
|
1348
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1349
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1350
|
+
hanas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountHanaArgs', 'SecretsMountHanaArgsDict']]]]] = None,
|
|
1351
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1352
|
+
influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountInfluxdbArgs', 'SecretsMountInfluxdbArgsDict']]]]] = None,
|
|
1353
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1354
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1355
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
|
1356
|
+
mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbatlaArgs', 'SecretsMountMongodbatlaArgsDict']]]]] = None,
|
|
1357
|
+
mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbArgs', 'SecretsMountMongodbArgsDict']]]]] = None,
|
|
1358
|
+
mssqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMssqlArgs', 'SecretsMountMssqlArgsDict']]]]] = None,
|
|
1359
|
+
mysql_auroras: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlAuroraArgs', 'SecretsMountMysqlAuroraArgsDict']]]]] = None,
|
|
1360
|
+
mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlLegacyArgs', 'SecretsMountMysqlLegacyArgsDict']]]]] = None,
|
|
1361
|
+
mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]]] = None,
|
|
1362
|
+
mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]]] = None,
|
|
1363
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1364
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
|
1365
|
+
oracles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]]] = None,
|
|
1366
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1367
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1368
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1369
|
+
postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountPostgresqlArgs', 'SecretsMountPostgresqlArgsDict']]]]] = None,
|
|
1370
|
+
redis: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRediArgs', 'SecretsMountRediArgsDict']]]]] = None,
|
|
1371
|
+
redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedisElasticachArgs', 'SecretsMountRedisElasticachArgsDict']]]]] = None,
|
|
1372
|
+
redshifts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedshiftArgs', 'SecretsMountRedshiftArgsDict']]]]] = None,
|
|
1373
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1374
|
+
snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountSnowflakeArgs', 'SecretsMountSnowflakeArgsDict']]]]] = None,
|
|
1375
|
+
__props__=None):
|
|
1376
|
+
"""
|
|
1377
|
+
## Example Usage
|
|
1378
|
+
|
|
1379
|
+
```python
|
|
1380
|
+
import pulumi
|
|
1381
|
+
import pulumi_vault as vault
|
|
1382
|
+
|
|
1383
|
+
db = vault.database.SecretsMount("db",
|
|
1384
|
+
path="db",
|
|
1385
|
+
mssqls=[{
|
|
1386
|
+
"name": "db1",
|
|
1387
|
+
"username": "sa",
|
|
1388
|
+
"password": "super_secret_1",
|
|
1389
|
+
"connection_url": "sqlserver://{{username}}:{{password}}@127.0.0.1:1433",
|
|
1390
|
+
"allowed_roles": ["dev1"],
|
|
1391
|
+
"rotation_schedule": "0 * * * SAT",
|
|
1392
|
+
"rotation_window": 3600,
|
|
1393
|
+
}],
|
|
1394
|
+
postgresqls=[{
|
|
1395
|
+
"name": "db2",
|
|
1396
|
+
"username": "postgres",
|
|
1397
|
+
"password": "super_secret_2",
|
|
1398
|
+
"connection_url": "postgresql://{{username}}:{{password}}@127.0.0.1:5432/postgres",
|
|
1399
|
+
"verify_connection": True,
|
|
1400
|
+
"allowed_roles": ["dev2"],
|
|
1401
|
+
"rotation_schedule": "0 * * * SAT",
|
|
1402
|
+
"rotation_window": 3600,
|
|
1403
|
+
}])
|
|
1404
|
+
dev1 = vault.database.SecretBackendRole("dev1",
|
|
1405
|
+
name="dev1",
|
|
1406
|
+
backend=db.path,
|
|
1407
|
+
db_name=db.mssqls[0].name,
|
|
1408
|
+
creation_statements=[
|
|
1409
|
+
"CREATE LOGIN [{{name}}] WITH PASSWORD = '{{password}}';",
|
|
1410
|
+
"CREATE USER [{{name}}] FOR LOGIN [{{name}}];",
|
|
1411
|
+
"GRANT SELECT ON SCHEMA::dbo TO [{{name}}];",
|
|
1412
|
+
])
|
|
1413
|
+
dev2 = vault.database.SecretBackendRole("dev2",
|
|
1414
|
+
name="dev2",
|
|
1415
|
+
backend=db.path,
|
|
1416
|
+
db_name=db.postgresqls[0].name,
|
|
1417
|
+
creation_statements=[
|
|
1418
|
+
"CREATE ROLE \\"{{name}}\\" WITH LOGIN PASSWORD '{{password}}' VALID UNTIL '{{expiration}}';",
|
|
1419
|
+
"GRANT SELECT ON ALL TABLES IN SCHEMA public TO \\"{{name}}\\";",
|
|
1420
|
+
])
|
|
1421
|
+
```
|
|
1422
|
+
|
|
1423
|
+
## Ephemeral Attributes Reference
|
|
1424
|
+
|
|
1425
|
+
The following write-only attributes are supported for all DBs that support username/password:
|
|
1426
|
+
|
|
1427
|
+
* `password_wo` - (Optional) The password for the user. Can be updated.
|
|
1428
|
+
**Note**: This property is write-only and will not be read from the API.
|
|
1429
|
+
|
|
1430
|
+
## Import
|
|
1431
|
+
|
|
1432
|
+
Database secret backend connections can be imported using the `path` e.g.
|
|
1433
|
+
|
|
1434
|
+
```sh
|
|
1435
|
+
$ pulumi import vault:database/secretsMount:SecretsMount db db
|
|
1436
|
+
```
|
|
1437
|
+
|
|
1438
|
+
:param str resource_name: The name of the resource.
|
|
1439
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
1440
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
|
|
1441
|
+
|
|
1442
|
+
The following arguments are common to all database engines:
|
|
1443
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
|
1444
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
|
1445
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
|
1446
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCassandraArgs', 'SecretsMountCassandraArgsDict']]]] cassandras: A nested block containing configuration options for Cassandra connections.
|
|
1447
|
+
*See Configuration Options for more info*
|
|
1448
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCouchbaseArgs', 'SecretsMountCouchbaseArgsDict']]]] couchbases: A nested block containing configuration options for Couchbase connections.
|
|
1449
|
+
*See Configuration Options for more info*
|
|
1450
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
|
1451
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
|
1452
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
|
1453
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountElasticsearchArgs', 'SecretsMountElasticsearchArgsDict']]]] elasticsearches: A nested block containing configuration options for Elasticsearch connections.
|
|
1454
|
+
*See Configuration Options for more info*
|
|
1455
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
|
1456
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
|
1457
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountHanaArgs', 'SecretsMountHanaArgsDict']]]] hanas: A nested block containing configuration options for SAP HanaDB connections.
|
|
1458
|
+
*See Configuration Options for more info*
|
|
1459
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
|
1460
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountInfluxdbArgs', 'SecretsMountInfluxdbArgsDict']]]] influxdbs: A nested block containing configuration options for InfluxDB connections.
|
|
1461
|
+
*See Configuration Options for more info*
|
|
1462
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
|
1463
|
+
:param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
|
1464
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
|
1465
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbatlaArgs', 'SecretsMountMongodbatlaArgsDict']]]] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
|
|
1466
|
+
*See Configuration Options for more info*
|
|
1467
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbArgs', 'SecretsMountMongodbArgsDict']]]] mongodbs: A nested block containing configuration options for MongoDB connections.
|
|
1468
|
+
*See Configuration Options for more info*
|
|
1469
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMssqlArgs', 'SecretsMountMssqlArgsDict']]]] mssqls: A nested block containing configuration options for MSSQL connections.
|
|
1470
|
+
*See Configuration Options for more info*
|
|
1471
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlAuroraArgs', 'SecretsMountMysqlAuroraArgsDict']]]] mysql_auroras: A nested block containing configuration options for Aurora MySQL connections.
|
|
1472
|
+
*See Configuration Options for more info*
|
|
1473
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlLegacyArgs', 'SecretsMountMysqlLegacyArgsDict']]]] mysql_legacies: A nested block containing configuration options for legacy MySQL connections.
|
|
1474
|
+
*See Configuration Options for more info*
|
|
1475
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]] mysql_rds: A nested block containing configuration options for RDS MySQL connections.
|
|
1476
|
+
*See Configuration Options for more info*
|
|
1477
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]] mysqls: A nested block containing configuration options for MySQL connections.
|
|
1478
|
+
*See Configuration Options for more info*
|
|
1479
|
+
:param pulumi.Input[_builtins.str] namespace: Target namespace. (requires Enterprise)
|
|
1480
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
|
1481
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]] oracles: A nested block containing configuration options for Oracle connections.
|
|
1482
|
+
*See Configuration Options for more info*
|
|
1483
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
|
1484
|
+
:param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
|
|
1485
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
|
1486
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountPostgresqlArgs', 'SecretsMountPostgresqlArgsDict']]]] postgresqls: A nested block containing configuration options for PostgreSQL connections.
|
|
1487
|
+
*See Configuration Options for more info*
|
|
1488
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRediArgs', 'SecretsMountRediArgsDict']]]] redis: A nested block containing configuration options for Redis connections.
|
|
1489
|
+
*See Configuration Options for more info*
|
|
1490
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedisElasticachArgs', 'SecretsMountRedisElasticachArgsDict']]]] redis_elasticaches: A nested block containing configuration options for Redis ElastiCache connections.
|
|
1491
|
+
*See Configuration Options for more info*
|
|
1492
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedshiftArgs', 'SecretsMountRedshiftArgsDict']]]] redshifts: A nested block containing configuration options for AWS Redshift connections.
|
|
1493
|
+
*See Configuration Options for more info*
|
|
1494
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
|
1495
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountSnowflakeArgs', 'SecretsMountSnowflakeArgsDict']]]] snowflakes: A nested block containing configuration options for Snowflake connections.
|
|
1496
|
+
*See Configuration Options for more info*
|
|
1497
|
+
"""
|
|
1498
|
+
...
|
|
1499
|
+
@overload
|
|
1500
|
+
def __init__(__self__,
|
|
1501
|
+
resource_name: str,
|
|
1502
|
+
args: SecretsMountArgs,
|
|
1503
|
+
opts: Optional[pulumi.ResourceOptions] = None):
|
|
1504
|
+
"""
|
|
1505
|
+
## Example Usage
|
|
1506
|
+
|
|
1507
|
+
```python
|
|
1508
|
+
import pulumi
|
|
1509
|
+
import pulumi_vault as vault
|
|
1510
|
+
|
|
1511
|
+
db = vault.database.SecretsMount("db",
|
|
1512
|
+
path="db",
|
|
1513
|
+
mssqls=[{
|
|
1514
|
+
"name": "db1",
|
|
1515
|
+
"username": "sa",
|
|
1516
|
+
"password": "super_secret_1",
|
|
1517
|
+
"connection_url": "sqlserver://{{username}}:{{password}}@127.0.0.1:1433",
|
|
1518
|
+
"allowed_roles": ["dev1"],
|
|
1519
|
+
"rotation_schedule": "0 * * * SAT",
|
|
1520
|
+
"rotation_window": 3600,
|
|
1521
|
+
}],
|
|
1522
|
+
postgresqls=[{
|
|
1523
|
+
"name": "db2",
|
|
1524
|
+
"username": "postgres",
|
|
1525
|
+
"password": "super_secret_2",
|
|
1526
|
+
"connection_url": "postgresql://{{username}}:{{password}}@127.0.0.1:5432/postgres",
|
|
1527
|
+
"verify_connection": True,
|
|
1528
|
+
"allowed_roles": ["dev2"],
|
|
1529
|
+
"rotation_schedule": "0 * * * SAT",
|
|
1530
|
+
"rotation_window": 3600,
|
|
1531
|
+
}])
|
|
1532
|
+
dev1 = vault.database.SecretBackendRole("dev1",
|
|
1533
|
+
name="dev1",
|
|
1534
|
+
backend=db.path,
|
|
1535
|
+
db_name=db.mssqls[0].name,
|
|
1536
|
+
creation_statements=[
|
|
1537
|
+
"CREATE LOGIN [{{name}}] WITH PASSWORD = '{{password}}';",
|
|
1538
|
+
"CREATE USER [{{name}}] FOR LOGIN [{{name}}];",
|
|
1539
|
+
"GRANT SELECT ON SCHEMA::dbo TO [{{name}}];",
|
|
1540
|
+
])
|
|
1541
|
+
dev2 = vault.database.SecretBackendRole("dev2",
|
|
1542
|
+
name="dev2",
|
|
1543
|
+
backend=db.path,
|
|
1544
|
+
db_name=db.postgresqls[0].name,
|
|
1545
|
+
creation_statements=[
|
|
1546
|
+
"CREATE ROLE \\"{{name}}\\" WITH LOGIN PASSWORD '{{password}}' VALID UNTIL '{{expiration}}';",
|
|
1547
|
+
"GRANT SELECT ON ALL TABLES IN SCHEMA public TO \\"{{name}}\\";",
|
|
1548
|
+
])
|
|
1549
|
+
```
|
|
1550
|
+
|
|
1551
|
+
## Ephemeral Attributes Reference
|
|
1552
|
+
|
|
1553
|
+
The following write-only attributes are supported for all DBs that support username/password:
|
|
1554
|
+
|
|
1555
|
+
* `password_wo` - (Optional) The password for the user. Can be updated.
|
|
1556
|
+
**Note**: This property is write-only and will not be read from the API.
|
|
1557
|
+
|
|
1558
|
+
## Import
|
|
1559
|
+
|
|
1560
|
+
Database secret backend connections can be imported using the `path` e.g.
|
|
1561
|
+
|
|
1562
|
+
```sh
|
|
1563
|
+
$ pulumi import vault:database/secretsMount:SecretsMount db db
|
|
1564
|
+
```
|
|
1565
|
+
|
|
1566
|
+
:param str resource_name: The name of the resource.
|
|
1567
|
+
:param SecretsMountArgs args: The arguments to use to populate this resource's properties.
|
|
1568
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
1569
|
+
"""
|
|
1570
|
+
...
|
|
1571
|
+
def __init__(__self__, resource_name: str, *args, **kwargs):
|
|
1572
|
+
resource_args, opts = _utilities.get_resource_args_opts(SecretsMountArgs, pulumi.ResourceOptions, *args, **kwargs)
|
|
1573
|
+
if resource_args is not None:
|
|
1574
|
+
__self__._internal_init(resource_name, opts, **resource_args.__dict__)
|
|
1575
|
+
else:
|
|
1576
|
+
__self__._internal_init(resource_name, *args, **kwargs)
|
|
1577
|
+
|
|
1578
|
+
def _internal_init(__self__,
|
|
1579
|
+
resource_name: str,
|
|
1580
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
1581
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1582
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1583
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1584
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1585
|
+
cassandras: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCassandraArgs', 'SecretsMountCassandraArgsDict']]]]] = None,
|
|
1586
|
+
couchbases: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCouchbaseArgs', 'SecretsMountCouchbaseArgsDict']]]]] = None,
|
|
1587
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
|
1588
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1589
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1590
|
+
elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountElasticsearchArgs', 'SecretsMountElasticsearchArgsDict']]]]] = None,
|
|
1591
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1592
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1593
|
+
hanas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountHanaArgs', 'SecretsMountHanaArgsDict']]]]] = None,
|
|
1594
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1595
|
+
influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountInfluxdbArgs', 'SecretsMountInfluxdbArgsDict']]]]] = None,
|
|
1596
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1597
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1598
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
|
1599
|
+
mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbatlaArgs', 'SecretsMountMongodbatlaArgsDict']]]]] = None,
|
|
1600
|
+
mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbArgs', 'SecretsMountMongodbArgsDict']]]]] = None,
|
|
1601
|
+
mssqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMssqlArgs', 'SecretsMountMssqlArgsDict']]]]] = None,
|
|
1602
|
+
mysql_auroras: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlAuroraArgs', 'SecretsMountMysqlAuroraArgsDict']]]]] = None,
|
|
1603
|
+
mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlLegacyArgs', 'SecretsMountMysqlLegacyArgsDict']]]]] = None,
|
|
1604
|
+
mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]]] = None,
|
|
1605
|
+
mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]]] = None,
|
|
1606
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1607
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
|
1608
|
+
oracles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]]] = None,
|
|
1609
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1610
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1611
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1612
|
+
postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountPostgresqlArgs', 'SecretsMountPostgresqlArgsDict']]]]] = None,
|
|
1613
|
+
redis: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRediArgs', 'SecretsMountRediArgsDict']]]]] = None,
|
|
1614
|
+
redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedisElasticachArgs', 'SecretsMountRedisElasticachArgsDict']]]]] = None,
|
|
1615
|
+
redshifts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedshiftArgs', 'SecretsMountRedshiftArgsDict']]]]] = None,
|
|
1616
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1617
|
+
snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountSnowflakeArgs', 'SecretsMountSnowflakeArgsDict']]]]] = None,
|
|
1618
|
+
__props__=None):
|
|
1619
|
+
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
|
1620
|
+
if not isinstance(opts, pulumi.ResourceOptions):
|
|
1621
|
+
raise TypeError('Expected resource options to be a ResourceOptions instance')
|
|
1622
|
+
if opts.id is None:
|
|
1623
|
+
if __props__ is not None:
|
|
1624
|
+
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
|
|
1625
|
+
__props__ = SecretsMountArgs.__new__(SecretsMountArgs)
|
|
1626
|
+
|
|
1627
|
+
__props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
|
|
1628
|
+
__props__.__dict__["allowed_response_headers"] = allowed_response_headers
|
|
1629
|
+
__props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
|
|
1630
|
+
__props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
|
|
1631
|
+
__props__.__dict__["cassandras"] = cassandras
|
|
1632
|
+
__props__.__dict__["couchbases"] = couchbases
|
|
1633
|
+
__props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
|
|
1634
|
+
__props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
|
|
1635
|
+
__props__.__dict__["description"] = description
|
|
1636
|
+
__props__.__dict__["elasticsearches"] = elasticsearches
|
|
1637
|
+
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
|
1638
|
+
__props__.__dict__["force_no_cache"] = force_no_cache
|
|
1639
|
+
__props__.__dict__["hanas"] = hanas
|
|
1640
|
+
__props__.__dict__["identity_token_key"] = identity_token_key
|
|
1641
|
+
__props__.__dict__["influxdbs"] = influxdbs
|
|
1642
|
+
__props__.__dict__["listing_visibility"] = listing_visibility
|
|
1643
|
+
__props__.__dict__["local"] = local
|
|
1644
|
+
__props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
|
|
1645
|
+
__props__.__dict__["mongodbatlas"] = mongodbatlas
|
|
1646
|
+
__props__.__dict__["mongodbs"] = mongodbs
|
|
1647
|
+
__props__.__dict__["mssqls"] = mssqls
|
|
1648
|
+
__props__.__dict__["mysql_auroras"] = mysql_auroras
|
|
1649
|
+
__props__.__dict__["mysql_legacies"] = mysql_legacies
|
|
1650
|
+
__props__.__dict__["mysql_rds"] = mysql_rds
|
|
1651
|
+
__props__.__dict__["mysqls"] = mysqls
|
|
1652
|
+
__props__.__dict__["namespace"] = namespace
|
|
1653
|
+
__props__.__dict__["options"] = options
|
|
1654
|
+
__props__.__dict__["oracles"] = oracles
|
|
1655
|
+
__props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
|
|
1656
|
+
if path is None and not opts.urn:
|
|
1657
|
+
raise TypeError("Missing required property 'path'")
|
|
1658
|
+
__props__.__dict__["path"] = path
|
|
1659
|
+
__props__.__dict__["plugin_version"] = plugin_version
|
|
1660
|
+
__props__.__dict__["postgresqls"] = postgresqls
|
|
1661
|
+
__props__.__dict__["redis"] = redis
|
|
1662
|
+
__props__.__dict__["redis_elasticaches"] = redis_elasticaches
|
|
1663
|
+
__props__.__dict__["redshifts"] = redshifts
|
|
1664
|
+
__props__.__dict__["seal_wrap"] = seal_wrap
|
|
1665
|
+
__props__.__dict__["snowflakes"] = snowflakes
|
|
1666
|
+
__props__.__dict__["accessor"] = None
|
|
1667
|
+
__props__.__dict__["engine_count"] = None
|
|
1668
|
+
super(SecretsMount, __self__).__init__(
|
|
1669
|
+
'vault:database/secretsMount:SecretsMount',
|
|
1670
|
+
resource_name,
|
|
1671
|
+
__props__,
|
|
1672
|
+
opts)
|
|
1673
|
+
|
|
1674
|
+
@staticmethod
|
|
1675
|
+
def get(resource_name: str,
|
|
1676
|
+
id: pulumi.Input[str],
|
|
1677
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
1678
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1679
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1680
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1681
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1682
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1683
|
+
cassandras: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCassandraArgs', 'SecretsMountCassandraArgsDict']]]]] = None,
|
|
1684
|
+
couchbases: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCouchbaseArgs', 'SecretsMountCouchbaseArgsDict']]]]] = None,
|
|
1685
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
|
1686
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1687
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1688
|
+
elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountElasticsearchArgs', 'SecretsMountElasticsearchArgsDict']]]]] = None,
|
|
1689
|
+
engine_count: Optional[pulumi.Input[_builtins.int]] = None,
|
|
1690
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1691
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1692
|
+
hanas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountHanaArgs', 'SecretsMountHanaArgsDict']]]]] = None,
|
|
1693
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1694
|
+
influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountInfluxdbArgs', 'SecretsMountInfluxdbArgsDict']]]]] = None,
|
|
1695
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1696
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1697
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
|
1698
|
+
mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbatlaArgs', 'SecretsMountMongodbatlaArgsDict']]]]] = None,
|
|
1699
|
+
mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbArgs', 'SecretsMountMongodbArgsDict']]]]] = None,
|
|
1700
|
+
mssqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMssqlArgs', 'SecretsMountMssqlArgsDict']]]]] = None,
|
|
1701
|
+
mysql_auroras: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlAuroraArgs', 'SecretsMountMysqlAuroraArgsDict']]]]] = None,
|
|
1702
|
+
mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlLegacyArgs', 'SecretsMountMysqlLegacyArgsDict']]]]] = None,
|
|
1703
|
+
mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]]] = None,
|
|
1704
|
+
mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]]] = None,
|
|
1705
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1706
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
|
1707
|
+
oracles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]]] = None,
|
|
1708
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1709
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1710
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1711
|
+
postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountPostgresqlArgs', 'SecretsMountPostgresqlArgsDict']]]]] = None,
|
|
1712
|
+
redis: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRediArgs', 'SecretsMountRediArgsDict']]]]] = None,
|
|
1713
|
+
redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedisElasticachArgs', 'SecretsMountRedisElasticachArgsDict']]]]] = None,
|
|
1714
|
+
redshifts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedshiftArgs', 'SecretsMountRedshiftArgsDict']]]]] = None,
|
|
1715
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1716
|
+
snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountSnowflakeArgs', 'SecretsMountSnowflakeArgsDict']]]]] = None) -> 'SecretsMount':
|
|
1717
|
+
"""
|
|
1718
|
+
Get an existing SecretsMount resource's state with the given name, id, and optional extra
|
|
1719
|
+
properties used to qualify the lookup.
|
|
1720
|
+
|
|
1721
|
+
:param str resource_name: The unique name of the resulting resource.
|
|
1722
|
+
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
|
1723
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
1724
|
+
:param pulumi.Input[_builtins.str] accessor: Accessor of the mount
|
|
1725
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
|
|
1726
|
+
|
|
1727
|
+
The following arguments are common to all database engines:
|
|
1728
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
|
1729
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
|
1730
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
|
1731
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCassandraArgs', 'SecretsMountCassandraArgsDict']]]] cassandras: A nested block containing configuration options for Cassandra connections.
|
|
1732
|
+
*See Configuration Options for more info*
|
|
1733
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCouchbaseArgs', 'SecretsMountCouchbaseArgsDict']]]] couchbases: A nested block containing configuration options for Couchbase connections.
|
|
1734
|
+
*See Configuration Options for more info*
|
|
1735
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
|
1736
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
|
1737
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
|
1738
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountElasticsearchArgs', 'SecretsMountElasticsearchArgsDict']]]] elasticsearches: A nested block containing configuration options for Elasticsearch connections.
|
|
1739
|
+
*See Configuration Options for more info*
|
|
1740
|
+
:param pulumi.Input[_builtins.int] engine_count: The total number of database secrets engines configured.
|
|
1741
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
|
1742
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
|
1743
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountHanaArgs', 'SecretsMountHanaArgsDict']]]] hanas: A nested block containing configuration options for SAP HanaDB connections.
|
|
1744
|
+
*See Configuration Options for more info*
|
|
1745
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
|
1746
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountInfluxdbArgs', 'SecretsMountInfluxdbArgsDict']]]] influxdbs: A nested block containing configuration options for InfluxDB connections.
|
|
1747
|
+
*See Configuration Options for more info*
|
|
1748
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
|
1749
|
+
:param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
|
1750
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
|
1751
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbatlaArgs', 'SecretsMountMongodbatlaArgsDict']]]] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
|
|
1752
|
+
*See Configuration Options for more info*
|
|
1753
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbArgs', 'SecretsMountMongodbArgsDict']]]] mongodbs: A nested block containing configuration options for MongoDB connections.
|
|
1754
|
+
*See Configuration Options for more info*
|
|
1755
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMssqlArgs', 'SecretsMountMssqlArgsDict']]]] mssqls: A nested block containing configuration options for MSSQL connections.
|
|
1756
|
+
*See Configuration Options for more info*
|
|
1757
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlAuroraArgs', 'SecretsMountMysqlAuroraArgsDict']]]] mysql_auroras: A nested block containing configuration options for Aurora MySQL connections.
|
|
1758
|
+
*See Configuration Options for more info*
|
|
1759
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlLegacyArgs', 'SecretsMountMysqlLegacyArgsDict']]]] mysql_legacies: A nested block containing configuration options for legacy MySQL connections.
|
|
1760
|
+
*See Configuration Options for more info*
|
|
1761
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]] mysql_rds: A nested block containing configuration options for RDS MySQL connections.
|
|
1762
|
+
*See Configuration Options for more info*
|
|
1763
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]] mysqls: A nested block containing configuration options for MySQL connections.
|
|
1764
|
+
*See Configuration Options for more info*
|
|
1765
|
+
:param pulumi.Input[_builtins.str] namespace: Target namespace. (requires Enterprise)
|
|
1766
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
|
1767
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]] oracles: A nested block containing configuration options for Oracle connections.
|
|
1768
|
+
*See Configuration Options for more info*
|
|
1769
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
|
1770
|
+
:param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
|
|
1771
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
|
1772
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountPostgresqlArgs', 'SecretsMountPostgresqlArgsDict']]]] postgresqls: A nested block containing configuration options for PostgreSQL connections.
|
|
1773
|
+
*See Configuration Options for more info*
|
|
1774
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRediArgs', 'SecretsMountRediArgsDict']]]] redis: A nested block containing configuration options for Redis connections.
|
|
1775
|
+
*See Configuration Options for more info*
|
|
1776
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedisElasticachArgs', 'SecretsMountRedisElasticachArgsDict']]]] redis_elasticaches: A nested block containing configuration options for Redis ElastiCache connections.
|
|
1777
|
+
*See Configuration Options for more info*
|
|
1778
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedshiftArgs', 'SecretsMountRedshiftArgsDict']]]] redshifts: A nested block containing configuration options for AWS Redshift connections.
|
|
1779
|
+
*See Configuration Options for more info*
|
|
1780
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
|
1781
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountSnowflakeArgs', 'SecretsMountSnowflakeArgsDict']]]] snowflakes: A nested block containing configuration options for Snowflake connections.
|
|
1782
|
+
*See Configuration Options for more info*
|
|
1783
|
+
"""
|
|
1784
|
+
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
|
1785
|
+
|
|
1786
|
+
__props__ = _SecretsMountState.__new__(_SecretsMountState)
|
|
1787
|
+
|
|
1788
|
+
__props__.__dict__["accessor"] = accessor
|
|
1789
|
+
__props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
|
|
1790
|
+
__props__.__dict__["allowed_response_headers"] = allowed_response_headers
|
|
1791
|
+
__props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
|
|
1792
|
+
__props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
|
|
1793
|
+
__props__.__dict__["cassandras"] = cassandras
|
|
1794
|
+
__props__.__dict__["couchbases"] = couchbases
|
|
1795
|
+
__props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
|
|
1796
|
+
__props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
|
|
1797
|
+
__props__.__dict__["description"] = description
|
|
1798
|
+
__props__.__dict__["elasticsearches"] = elasticsearches
|
|
1799
|
+
__props__.__dict__["engine_count"] = engine_count
|
|
1800
|
+
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
|
1801
|
+
__props__.__dict__["force_no_cache"] = force_no_cache
|
|
1802
|
+
__props__.__dict__["hanas"] = hanas
|
|
1803
|
+
__props__.__dict__["identity_token_key"] = identity_token_key
|
|
1804
|
+
__props__.__dict__["influxdbs"] = influxdbs
|
|
1805
|
+
__props__.__dict__["listing_visibility"] = listing_visibility
|
|
1806
|
+
__props__.__dict__["local"] = local
|
|
1807
|
+
__props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
|
|
1808
|
+
__props__.__dict__["mongodbatlas"] = mongodbatlas
|
|
1809
|
+
__props__.__dict__["mongodbs"] = mongodbs
|
|
1810
|
+
__props__.__dict__["mssqls"] = mssqls
|
|
1811
|
+
__props__.__dict__["mysql_auroras"] = mysql_auroras
|
|
1812
|
+
__props__.__dict__["mysql_legacies"] = mysql_legacies
|
|
1813
|
+
__props__.__dict__["mysql_rds"] = mysql_rds
|
|
1814
|
+
__props__.__dict__["mysqls"] = mysqls
|
|
1815
|
+
__props__.__dict__["namespace"] = namespace
|
|
1816
|
+
__props__.__dict__["options"] = options
|
|
1817
|
+
__props__.__dict__["oracles"] = oracles
|
|
1818
|
+
__props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
|
|
1819
|
+
__props__.__dict__["path"] = path
|
|
1820
|
+
__props__.__dict__["plugin_version"] = plugin_version
|
|
1821
|
+
__props__.__dict__["postgresqls"] = postgresqls
|
|
1822
|
+
__props__.__dict__["redis"] = redis
|
|
1823
|
+
__props__.__dict__["redis_elasticaches"] = redis_elasticaches
|
|
1824
|
+
__props__.__dict__["redshifts"] = redshifts
|
|
1825
|
+
__props__.__dict__["seal_wrap"] = seal_wrap
|
|
1826
|
+
__props__.__dict__["snowflakes"] = snowflakes
|
|
1827
|
+
return SecretsMount(resource_name, opts=opts, __props__=__props__)
|
|
1828
|
+
|
|
1829
|
+
@_builtins.property
|
|
1830
|
+
@pulumi.getter
|
|
1831
|
+
def accessor(self) -> pulumi.Output[_builtins.str]:
|
|
1832
|
+
"""
|
|
1833
|
+
Accessor of the mount
|
|
1834
|
+
"""
|
|
1835
|
+
return pulumi.get(self, "accessor")
|
|
1836
|
+
|
|
1837
|
+
@_builtins.property
|
|
1838
|
+
@pulumi.getter(name="allowedManagedKeys")
|
|
1839
|
+
def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
1840
|
+
"""
|
|
1841
|
+
Set of managed key registry entry names that the mount in question is allowed to access
|
|
1842
|
+
|
|
1843
|
+
The following arguments are common to all database engines:
|
|
1844
|
+
"""
|
|
1845
|
+
return pulumi.get(self, "allowed_managed_keys")
|
|
1846
|
+
|
|
1847
|
+
@_builtins.property
|
|
1848
|
+
@pulumi.getter(name="allowedResponseHeaders")
|
|
1849
|
+
def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
1850
|
+
"""
|
|
1851
|
+
List of headers to allow and pass from the request to the plugin
|
|
1852
|
+
"""
|
|
1853
|
+
return pulumi.get(self, "allowed_response_headers")
|
|
1854
|
+
|
|
1855
|
+
@_builtins.property
|
|
1856
|
+
@pulumi.getter(name="auditNonHmacRequestKeys")
|
|
1857
|
+
def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
|
1858
|
+
"""
|
|
1859
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
|
1860
|
+
"""
|
|
1861
|
+
return pulumi.get(self, "audit_non_hmac_request_keys")
|
|
1862
|
+
|
|
1863
|
+
@_builtins.property
|
|
1864
|
+
@pulumi.getter(name="auditNonHmacResponseKeys")
|
|
1865
|
+
def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
|
1866
|
+
"""
|
|
1867
|
+
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
|
1868
|
+
"""
|
|
1869
|
+
return pulumi.get(self, "audit_non_hmac_response_keys")
|
|
1870
|
+
|
|
1871
|
+
@_builtins.property
|
|
1872
|
+
@pulumi.getter
|
|
1873
|
+
def cassandras(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountCassandra']]]:
|
|
1874
|
+
"""
|
|
1875
|
+
A nested block containing configuration options for Cassandra connections.
|
|
1876
|
+
*See Configuration Options for more info*
|
|
1877
|
+
"""
|
|
1878
|
+
return pulumi.get(self, "cassandras")
|
|
1879
|
+
|
|
1880
|
+
@_builtins.property
|
|
1881
|
+
@pulumi.getter
|
|
1882
|
+
def couchbases(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountCouchbase']]]:
|
|
1883
|
+
"""
|
|
1884
|
+
A nested block containing configuration options for Couchbase connections.
|
|
1885
|
+
*See Configuration Options for more info*
|
|
1886
|
+
"""
|
|
1887
|
+
return pulumi.get(self, "couchbases")
|
|
1888
|
+
|
|
1889
|
+
@_builtins.property
|
|
1890
|
+
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
|
1891
|
+
def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
|
|
1892
|
+
"""
|
|
1893
|
+
Default lease duration for tokens and secrets in seconds
|
|
1894
|
+
"""
|
|
1895
|
+
return pulumi.get(self, "default_lease_ttl_seconds")
|
|
1896
|
+
|
|
1897
|
+
@_builtins.property
|
|
1898
|
+
@pulumi.getter(name="delegatedAuthAccessors")
|
|
1899
|
+
def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
1900
|
+
"""
|
|
1901
|
+
List of headers to allow and pass from the request to the plugin
|
|
1902
|
+
"""
|
|
1903
|
+
return pulumi.get(self, "delegated_auth_accessors")
|
|
1904
|
+
|
|
1905
|
+
@_builtins.property
|
|
1906
|
+
@pulumi.getter
|
|
1907
|
+
def description(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
1908
|
+
"""
|
|
1909
|
+
Human-friendly description of the mount
|
|
1910
|
+
"""
|
|
1911
|
+
return pulumi.get(self, "description")
|
|
1912
|
+
|
|
1913
|
+
@_builtins.property
|
|
1914
|
+
@pulumi.getter
|
|
1915
|
+
def elasticsearches(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountElasticsearch']]]:
|
|
1916
|
+
"""
|
|
1917
|
+
A nested block containing configuration options for Elasticsearch connections.
|
|
1918
|
+
*See Configuration Options for more info*
|
|
1919
|
+
"""
|
|
1920
|
+
return pulumi.get(self, "elasticsearches")
|
|
1921
|
+
|
|
1922
|
+
@_builtins.property
|
|
1923
|
+
@pulumi.getter(name="engineCount")
|
|
1924
|
+
def engine_count(self) -> pulumi.Output[_builtins.int]:
|
|
1925
|
+
"""
|
|
1926
|
+
The total number of database secrets engines configured.
|
|
1927
|
+
"""
|
|
1928
|
+
return pulumi.get(self, "engine_count")
|
|
1929
|
+
|
|
1930
|
+
@_builtins.property
|
|
1931
|
+
@pulumi.getter(name="externalEntropyAccess")
|
|
1932
|
+
def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
1933
|
+
"""
|
|
1934
|
+
Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
|
1935
|
+
"""
|
|
1936
|
+
return pulumi.get(self, "external_entropy_access")
|
|
1937
|
+
|
|
1938
|
+
@_builtins.property
|
|
1939
|
+
@pulumi.getter(name="forceNoCache")
|
|
1940
|
+
def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
|
|
1941
|
+
"""
|
|
1942
|
+
If set to true, disables caching.
|
|
1943
|
+
"""
|
|
1944
|
+
return pulumi.get(self, "force_no_cache")
|
|
1945
|
+
|
|
1946
|
+
@_builtins.property
|
|
1947
|
+
@pulumi.getter
|
|
1948
|
+
def hanas(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountHana']]]:
|
|
1949
|
+
"""
|
|
1950
|
+
A nested block containing configuration options for SAP HanaDB connections.
|
|
1951
|
+
*See Configuration Options for more info*
|
|
1952
|
+
"""
|
|
1953
|
+
return pulumi.get(self, "hanas")
|
|
1954
|
+
|
|
1955
|
+
@_builtins.property
|
|
1956
|
+
@pulumi.getter(name="identityTokenKey")
|
|
1957
|
+
def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
1958
|
+
"""
|
|
1959
|
+
The key to use for signing plugin workload identity tokens
|
|
1960
|
+
"""
|
|
1961
|
+
return pulumi.get(self, "identity_token_key")
|
|
1962
|
+
|
|
1963
|
+
@_builtins.property
|
|
1964
|
+
@pulumi.getter
|
|
1965
|
+
def influxdbs(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountInfluxdb']]]:
|
|
1966
|
+
"""
|
|
1967
|
+
A nested block containing configuration options for InfluxDB connections.
|
|
1968
|
+
*See Configuration Options for more info*
|
|
1969
|
+
"""
|
|
1970
|
+
return pulumi.get(self, "influxdbs")
|
|
1971
|
+
|
|
1972
|
+
@_builtins.property
|
|
1973
|
+
@pulumi.getter(name="listingVisibility")
|
|
1974
|
+
def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
1975
|
+
"""
|
|
1976
|
+
Specifies whether to show this mount in the UI-specific listing endpoint
|
|
1977
|
+
"""
|
|
1978
|
+
return pulumi.get(self, "listing_visibility")
|
|
1979
|
+
|
|
1980
|
+
@_builtins.property
|
|
1981
|
+
@pulumi.getter
|
|
1982
|
+
def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
1983
|
+
"""
|
|
1984
|
+
Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
|
1985
|
+
"""
|
|
1986
|
+
return pulumi.get(self, "local")
|
|
1987
|
+
|
|
1988
|
+
@_builtins.property
|
|
1989
|
+
@pulumi.getter(name="maxLeaseTtlSeconds")
|
|
1990
|
+
def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
|
|
1991
|
+
"""
|
|
1992
|
+
Maximum possible lease duration for tokens and secrets in seconds
|
|
1993
|
+
"""
|
|
1994
|
+
return pulumi.get(self, "max_lease_ttl_seconds")
|
|
1995
|
+
|
|
1996
|
+
@_builtins.property
|
|
1997
|
+
@pulumi.getter
|
|
1998
|
+
def mongodbatlas(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountMongodbatla']]]:
|
|
1999
|
+
"""
|
|
2000
|
+
A nested block containing configuration options for MongoDB Atlas connections.
|
|
2001
|
+
*See Configuration Options for more info*
|
|
2002
|
+
"""
|
|
2003
|
+
return pulumi.get(self, "mongodbatlas")
|
|
2004
|
+
|
|
2005
|
+
@_builtins.property
|
|
2006
|
+
@pulumi.getter
|
|
2007
|
+
def mongodbs(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountMongodb']]]:
|
|
2008
|
+
"""
|
|
2009
|
+
A nested block containing configuration options for MongoDB connections.
|
|
2010
|
+
*See Configuration Options for more info*
|
|
2011
|
+
"""
|
|
2012
|
+
return pulumi.get(self, "mongodbs")
|
|
2013
|
+
|
|
2014
|
+
@_builtins.property
|
|
2015
|
+
@pulumi.getter
|
|
2016
|
+
def mssqls(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountMssql']]]:
|
|
2017
|
+
"""
|
|
2018
|
+
A nested block containing configuration options for MSSQL connections.
|
|
2019
|
+
*See Configuration Options for more info*
|
|
2020
|
+
"""
|
|
2021
|
+
return pulumi.get(self, "mssqls")
|
|
2022
|
+
|
|
2023
|
+
@_builtins.property
|
|
2024
|
+
@pulumi.getter(name="mysqlAuroras")
|
|
2025
|
+
def mysql_auroras(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountMysqlAurora']]]:
|
|
2026
|
+
"""
|
|
2027
|
+
A nested block containing configuration options for Aurora MySQL connections.
|
|
2028
|
+
*See Configuration Options for more info*
|
|
2029
|
+
"""
|
|
2030
|
+
return pulumi.get(self, "mysql_auroras")
|
|
2031
|
+
|
|
2032
|
+
@_builtins.property
|
|
2033
|
+
@pulumi.getter(name="mysqlLegacies")
|
|
2034
|
+
def mysql_legacies(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountMysqlLegacy']]]:
|
|
2035
|
+
"""
|
|
2036
|
+
A nested block containing configuration options for legacy MySQL connections.
|
|
2037
|
+
*See Configuration Options for more info*
|
|
2038
|
+
"""
|
|
2039
|
+
return pulumi.get(self, "mysql_legacies")
|
|
2040
|
+
|
|
2041
|
+
@_builtins.property
|
|
2042
|
+
@pulumi.getter(name="mysqlRds")
|
|
2043
|
+
def mysql_rds(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountMysqlRd']]]:
|
|
2044
|
+
"""
|
|
2045
|
+
A nested block containing configuration options for RDS MySQL connections.
|
|
2046
|
+
*See Configuration Options for more info*
|
|
2047
|
+
"""
|
|
2048
|
+
return pulumi.get(self, "mysql_rds")
|
|
2049
|
+
|
|
2050
|
+
@_builtins.property
|
|
2051
|
+
@pulumi.getter
|
|
2052
|
+
def mysqls(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountMysql']]]:
|
|
2053
|
+
"""
|
|
2054
|
+
A nested block containing configuration options for MySQL connections.
|
|
2055
|
+
*See Configuration Options for more info*
|
|
2056
|
+
"""
|
|
2057
|
+
return pulumi.get(self, "mysqls")
|
|
2058
|
+
|
|
2059
|
+
@_builtins.property
|
|
2060
|
+
@pulumi.getter
|
|
2061
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
2062
|
+
"""
|
|
2063
|
+
Target namespace. (requires Enterprise)
|
|
2064
|
+
"""
|
|
2065
|
+
return pulumi.get(self, "namespace")
|
|
2066
|
+
|
|
2067
|
+
@_builtins.property
|
|
2068
|
+
@pulumi.getter
|
|
2069
|
+
def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
|
|
2070
|
+
"""
|
|
2071
|
+
Specifies mount type specific options that are passed to the backend
|
|
2072
|
+
"""
|
|
2073
|
+
return pulumi.get(self, "options")
|
|
2074
|
+
|
|
2075
|
+
@_builtins.property
|
|
2076
|
+
@pulumi.getter
|
|
2077
|
+
def oracles(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountOracle']]]:
|
|
2078
|
+
"""
|
|
2079
|
+
A nested block containing configuration options for Oracle connections.
|
|
2080
|
+
*See Configuration Options for more info*
|
|
2081
|
+
"""
|
|
2082
|
+
return pulumi.get(self, "oracles")
|
|
2083
|
+
|
|
2084
|
+
@_builtins.property
|
|
2085
|
+
@pulumi.getter(name="passthroughRequestHeaders")
|
|
2086
|
+
def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
2087
|
+
"""
|
|
2088
|
+
List of headers to allow and pass from the request to the plugin
|
|
2089
|
+
"""
|
|
2090
|
+
return pulumi.get(self, "passthrough_request_headers")
|
|
2091
|
+
|
|
2092
|
+
@_builtins.property
|
|
2093
|
+
@pulumi.getter
|
|
2094
|
+
def path(self) -> pulumi.Output[_builtins.str]:
|
|
2095
|
+
"""
|
|
2096
|
+
Where the secret backend will be mounted
|
|
2097
|
+
"""
|
|
2098
|
+
return pulumi.get(self, "path")
|
|
2099
|
+
|
|
2100
|
+
@_builtins.property
|
|
2101
|
+
@pulumi.getter(name="pluginVersion")
|
|
2102
|
+
def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
2103
|
+
"""
|
|
2104
|
+
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
|
2105
|
+
"""
|
|
2106
|
+
return pulumi.get(self, "plugin_version")
|
|
2107
|
+
|
|
2108
|
+
@_builtins.property
|
|
2109
|
+
@pulumi.getter
|
|
2110
|
+
def postgresqls(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountPostgresql']]]:
|
|
2111
|
+
"""
|
|
2112
|
+
A nested block containing configuration options for PostgreSQL connections.
|
|
2113
|
+
*See Configuration Options for more info*
|
|
2114
|
+
"""
|
|
2115
|
+
return pulumi.get(self, "postgresqls")
|
|
2116
|
+
|
|
2117
|
+
@_builtins.property
|
|
2118
|
+
@pulumi.getter
|
|
2119
|
+
def redis(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountRedi']]]:
|
|
2120
|
+
"""
|
|
2121
|
+
A nested block containing configuration options for Redis connections.
|
|
2122
|
+
*See Configuration Options for more info*
|
|
2123
|
+
"""
|
|
2124
|
+
return pulumi.get(self, "redis")
|
|
2125
|
+
|
|
2126
|
+
@_builtins.property
|
|
2127
|
+
@pulumi.getter(name="redisElasticaches")
|
|
2128
|
+
def redis_elasticaches(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountRedisElasticach']]]:
|
|
2129
|
+
"""
|
|
2130
|
+
A nested block containing configuration options for Redis ElastiCache connections.
|
|
2131
|
+
*See Configuration Options for more info*
|
|
2132
|
+
"""
|
|
2133
|
+
return pulumi.get(self, "redis_elasticaches")
|
|
2134
|
+
|
|
2135
|
+
@_builtins.property
|
|
2136
|
+
@pulumi.getter
|
|
2137
|
+
def redshifts(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountRedshift']]]:
|
|
2138
|
+
"""
|
|
2139
|
+
A nested block containing configuration options for AWS Redshift connections.
|
|
2140
|
+
*See Configuration Options for more info*
|
|
2141
|
+
"""
|
|
2142
|
+
return pulumi.get(self, "redshifts")
|
|
2143
|
+
|
|
2144
|
+
@_builtins.property
|
|
2145
|
+
@pulumi.getter(name="sealWrap")
|
|
2146
|
+
def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
|
|
2147
|
+
"""
|
|
2148
|
+
Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
|
2149
|
+
"""
|
|
2150
|
+
return pulumi.get(self, "seal_wrap")
|
|
2151
|
+
|
|
2152
|
+
@_builtins.property
|
|
2153
|
+
@pulumi.getter
|
|
2154
|
+
def snowflakes(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountSnowflake']]]:
|
|
2155
|
+
"""
|
|
2156
|
+
A nested block containing configuration options for Snowflake connections.
|
|
2157
|
+
*See Configuration Options for more info*
|
|
2158
|
+
"""
|
|
2159
|
+
return pulumi.get(self, "snowflakes")
|
|
2160
|
+
|