Mount
Import
Mounts can be imported using the path
, e.g.
$ pulumi import vault:index/mount:Mount example dummy
Example Usage
using Pulumi;
using Vault = Pulumi.Vault;
class MyStack : Stack
{
public MyStack()
{
var example = new Vault.Mount("example", new Vault.MountArgs
{
Description = "This is an example mount",
Path = "dummy",
Type = "generic",
});
}
}
package main
import (
"github.com/pulumi/pulumi-vault/sdk/v3/go/vault"
"github.com/pulumi/pulumi/sdk/v2/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := vault.NewMount(ctx, "example", &vault.MountArgs{
Description: pulumi.String("This is an example mount"),
Path: pulumi.String("dummy"),
Type: pulumi.String("generic"),
})
if err != nil {
return err
}
return nil
})
}
import pulumi
import pulumi_vault as vault
example = vault.Mount("example",
description="This is an example mount",
path="dummy",
type="generic")
import * as pulumi from "@pulumi/pulumi";
import * as vault from "@pulumi/vault";
const example = new vault.Mount("example", {
description: "This is an example mount",
path: "dummy",
type: "generic",
});
Create a Mount Resource
new Mount(name: string, args: MountArgs, opts?: CustomResourceOptions);
def Mount(resource_name: str, opts: Optional[ResourceOptions] = None, default_lease_ttl_seconds: Optional[int] = None, description: Optional[str] = None, external_entropy_access: Optional[bool] = None, local: Optional[bool] = None, max_lease_ttl_seconds: Optional[int] = None, options: Optional[Mapping[str, Any]] = None, path: Optional[str] = None, seal_wrap: Optional[bool] = None, type: Optional[str] = None)
func NewMount(ctx *Context, name string, args MountArgs, opts ...ResourceOption) (*Mount, error)
public Mount(string name, MountArgs args, CustomResourceOptions? opts = null)
- name string
- The unique name of the resource.
- args MountArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- opts ResourceOptions
- A bag of options that control this resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args MountArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args MountArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
Mount Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Programming Model docs.
Inputs
The Mount resource accepts the following input properties:
- Path string
Where the secret backend will be mounted
- Type string
Type of the backend, such as “aws”
- Default
Lease intTtl Seconds Default lease duration for tokens and secrets in seconds
- Description string
Human-friendly description of the mount
- External
Entropy boolAccess Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault’s external entropy source
- Local bool
Boolean flag that can be explicitly set to true to enforce local mount in HA environment
- Max
Lease intTtl Seconds Maximum possible lease duration for tokens and secrets in seconds
- Options Dictionary<string, object>
Specifies mount type specific options that are passed to the backend
- Seal
Wrap bool Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal’s encryption capability
- Path string
Where the secret backend will be mounted
- Type string
Type of the backend, such as “aws”
- Default
Lease intTtl Seconds Default lease duration for tokens and secrets in seconds
- Description string
Human-friendly description of the mount
- External
Entropy boolAccess Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault’s external entropy source
- Local bool
Boolean flag that can be explicitly set to true to enforce local mount in HA environment
- Max
Lease intTtl Seconds Maximum possible lease duration for tokens and secrets in seconds
- Options map[string]interface{}
Specifies mount type specific options that are passed to the backend
- Seal
Wrap bool Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal’s encryption capability
- path string
Where the secret backend will be mounted
- type string
Type of the backend, such as “aws”
- default
Lease numberTtl Seconds Default lease duration for tokens and secrets in seconds
- description string
Human-friendly description of the mount
- external
Entropy booleanAccess Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault’s external entropy source
- local boolean
Boolean flag that can be explicitly set to true to enforce local mount in HA environment
- max
Lease numberTtl Seconds Maximum possible lease duration for tokens and secrets in seconds
- options {[key: string]: any}
Specifies mount type specific options that are passed to the backend
- seal
Wrap boolean Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal’s encryption capability
- path str
Where the secret backend will be mounted
- type str
Type of the backend, such as “aws”
- default_
lease_ intttl_ seconds Default lease duration for tokens and secrets in seconds
- description str
Human-friendly description of the mount
- external_
entropy_ boolaccess Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault’s external entropy source
- local bool
Boolean flag that can be explicitly set to true to enforce local mount in HA environment
- max_
lease_ intttl_ seconds Maximum possible lease duration for tokens and secrets in seconds
- options Mapping[str, Any]
Specifies mount type specific options that are passed to the backend
- seal_
wrap bool Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal’s encryption capability
Outputs
All input properties are implicitly available as output properties. Additionally, the Mount resource produces the following output properties:
Look up an Existing Mount Resource
Get an existing Mount resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: MountState, opts?: CustomResourceOptions): Mount
@staticmethod
def get(resource_name: str, id: str, opts: Optional[ResourceOptions] = None, accessor: Optional[str] = None, default_lease_ttl_seconds: Optional[int] = None, description: Optional[str] = None, external_entropy_access: Optional[bool] = None, local: Optional[bool] = None, max_lease_ttl_seconds: Optional[int] = None, options: Optional[Mapping[str, Any]] = None, path: Optional[str] = None, seal_wrap: Optional[bool] = None, type: Optional[str] = None) -> Mount
func GetMount(ctx *Context, name string, id IDInput, state *MountState, opts ...ResourceOption) (*Mount, error)
public static Mount Get(string name, Input<string> id, MountState? state, CustomResourceOptions? opts = null)
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
The following state arguments are supported:
- Accessor string
The accessor for this mount.
- Default
Lease intTtl Seconds Default lease duration for tokens and secrets in seconds
- Description string
Human-friendly description of the mount
- External
Entropy boolAccess Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault’s external entropy source
- Local bool
Boolean flag that can be explicitly set to true to enforce local mount in HA environment
- Max
Lease intTtl Seconds Maximum possible lease duration for tokens and secrets in seconds
- Options Dictionary<string, object>
Specifies mount type specific options that are passed to the backend
- Path string
Where the secret backend will be mounted
- Seal
Wrap bool Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal’s encryption capability
- Type string
Type of the backend, such as “aws”
- Accessor string
The accessor for this mount.
- Default
Lease intTtl Seconds Default lease duration for tokens and secrets in seconds
- Description string
Human-friendly description of the mount
- External
Entropy boolAccess Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault’s external entropy source
- Local bool
Boolean flag that can be explicitly set to true to enforce local mount in HA environment
- Max
Lease intTtl Seconds Maximum possible lease duration for tokens and secrets in seconds
- Options map[string]interface{}
Specifies mount type specific options that are passed to the backend
- Path string
Where the secret backend will be mounted
- Seal
Wrap bool Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal’s encryption capability
- Type string
Type of the backend, such as “aws”
- accessor string
The accessor for this mount.
- default
Lease numberTtl Seconds Default lease duration for tokens and secrets in seconds
- description string
Human-friendly description of the mount
- external
Entropy booleanAccess Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault’s external entropy source
- local boolean
Boolean flag that can be explicitly set to true to enforce local mount in HA environment
- max
Lease numberTtl Seconds Maximum possible lease duration for tokens and secrets in seconds
- options {[key: string]: any}
Specifies mount type specific options that are passed to the backend
- path string
Where the secret backend will be mounted
- seal
Wrap boolean Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal’s encryption capability
- type string
Type of the backend, such as “aws”
- accessor str
The accessor for this mount.
- default_
lease_ intttl_ seconds Default lease duration for tokens and secrets in seconds
- description str
Human-friendly description of the mount
- external_
entropy_ boolaccess Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault’s external entropy source
- local bool
Boolean flag that can be explicitly set to true to enforce local mount in HA environment
- max_
lease_ intttl_ seconds Maximum possible lease duration for tokens and secrets in seconds
- options Mapping[str, Any]
Specifies mount type specific options that are passed to the backend
- path str
Where the secret backend will be mounted
- seal_
wrap bool Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal’s encryption capability
- type str
Type of the backend, such as “aws”
Package Details
- Repository
- https://github.com/pulumi/pulumi-vault
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
vault
Terraform Provider.