Ready to level-up your engineering skills? Join a Pulumi Workshop. Register Now

Mount

Import

Mounts can be imported using the path, e.g.

 $ pulumi import vault:index/mount:Mount example dummy

Example Usage

using Pulumi;
using Vault = Pulumi.Vault;

class MyStack : Stack
{
    public MyStack()
    {
        var example = new Vault.Mount("example", new Vault.MountArgs
        {
            Description = "This is an example mount",
            Path = "dummy",
            Type = "generic",
        });
    }

}
package main

import (
    "github.com/pulumi/pulumi-vault/sdk/v3/go/vault"
    "github.com/pulumi/pulumi/sdk/v2/go/pulumi"
)

func main() {
    pulumi.Run(func(ctx *pulumi.Context) error {
        _, err := vault.NewMount(ctx, "example", &vault.MountArgs{
            Description: pulumi.String("This is an example mount"),
            Path:        pulumi.String("dummy"),
            Type:        pulumi.String("generic"),
        })
        if err != nil {
            return err
        }
        return nil
    })
}
import pulumi
import pulumi_vault as vault

example = vault.Mount("example",
    description="This is an example mount",
    path="dummy",
    type="generic")
import * as pulumi from "@pulumi/pulumi";
import * as vault from "@pulumi/vault";

const example = new vault.Mount("example", {
    description: "This is an example mount",
    path: "dummy",
    type: "generic",
});

Create a Mount Resource

new Mount(name: string, args: MountArgs, opts?: CustomResourceOptions);
def Mount(resource_name: str, opts: Optional[ResourceOptions] = None, default_lease_ttl_seconds: Optional[int] = None, description: Optional[str] = None, external_entropy_access: Optional[bool] = None, local: Optional[bool] = None, max_lease_ttl_seconds: Optional[int] = None, options: Optional[Mapping[str, Any]] = None, path: Optional[str] = None, seal_wrap: Optional[bool] = None, type: Optional[str] = None)
func NewMount(ctx *Context, name string, args MountArgs, opts ...ResourceOption) (*Mount, error)
public Mount(string name, MountArgs args, CustomResourceOptions? opts = null)
name string
The unique name of the resource.
args MountArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.
resource_name str
The unique name of the resource.
opts ResourceOptions
A bag of options that control this resource's behavior.
ctx Context
Context object for the current deployment.
name string
The unique name of the resource.
args MountArgs
The arguments to resource properties.
opts ResourceOption
Bag of options to control resource's behavior.
name string
The unique name of the resource.
args MountArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.

Mount Resource Properties

To learn more about resource properties and how to use them, see Inputs and Outputs in the Programming Model docs.

Inputs

The Mount resource accepts the following input properties:

Path string

Where the secret backend will be mounted

Type string

Type of the backend, such as “aws”

DefaultLeaseTtlSeconds int

Default lease duration for tokens and secrets in seconds

Description string

Human-friendly description of the mount

ExternalEntropyAccess bool

Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault’s external entropy source

Local bool

Boolean flag that can be explicitly set to true to enforce local mount in HA environment

MaxLeaseTtlSeconds int

Maximum possible lease duration for tokens and secrets in seconds

Options Dictionary<string, object>

Specifies mount type specific options that are passed to the backend

SealWrap bool

Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal’s encryption capability

Path string

Where the secret backend will be mounted

Type string

Type of the backend, such as “aws”

DefaultLeaseTtlSeconds int

Default lease duration for tokens and secrets in seconds

Description string

Human-friendly description of the mount

ExternalEntropyAccess bool

Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault’s external entropy source

Local bool

Boolean flag that can be explicitly set to true to enforce local mount in HA environment

MaxLeaseTtlSeconds int

Maximum possible lease duration for tokens and secrets in seconds

Options map[string]interface{}

Specifies mount type specific options that are passed to the backend

SealWrap bool

Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal’s encryption capability

path string

Where the secret backend will be mounted

type string

Type of the backend, such as “aws”

defaultLeaseTtlSeconds number

Default lease duration for tokens and secrets in seconds

description string

Human-friendly description of the mount

externalEntropyAccess boolean

Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault’s external entropy source

local boolean

Boolean flag that can be explicitly set to true to enforce local mount in HA environment

maxLeaseTtlSeconds number

Maximum possible lease duration for tokens and secrets in seconds

options {[key: string]: any}

Specifies mount type specific options that are passed to the backend

sealWrap boolean

Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal’s encryption capability

path str

Where the secret backend will be mounted

type str

Type of the backend, such as “aws”

default_lease_ttl_seconds int

Default lease duration for tokens and secrets in seconds

description str

Human-friendly description of the mount

external_entropy_access bool

Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault’s external entropy source

local bool

Boolean flag that can be explicitly set to true to enforce local mount in HA environment

max_lease_ttl_seconds int

Maximum possible lease duration for tokens and secrets in seconds

options Mapping[str, Any]

Specifies mount type specific options that are passed to the backend

seal_wrap bool

Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal’s encryption capability

Outputs

All input properties are implicitly available as output properties. Additionally, the Mount resource produces the following output properties:

Accessor string

The accessor for this mount.

Id string
The provider-assigned unique ID for this managed resource.
Accessor string

The accessor for this mount.

Id string
The provider-assigned unique ID for this managed resource.
accessor string

The accessor for this mount.

id string
The provider-assigned unique ID for this managed resource.
accessor str

The accessor for this mount.

id str
The provider-assigned unique ID for this managed resource.

Look up an Existing Mount Resource

Get an existing Mount resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

public static get(name: string, id: Input<ID>, state?: MountState, opts?: CustomResourceOptions): Mount
@staticmethod
def get(resource_name: str, id: str, opts: Optional[ResourceOptions] = None, accessor: Optional[str] = None, default_lease_ttl_seconds: Optional[int] = None, description: Optional[str] = None, external_entropy_access: Optional[bool] = None, local: Optional[bool] = None, max_lease_ttl_seconds: Optional[int] = None, options: Optional[Mapping[str, Any]] = None, path: Optional[str] = None, seal_wrap: Optional[bool] = None, type: Optional[str] = None) -> Mount
func GetMount(ctx *Context, name string, id IDInput, state *MountState, opts ...ResourceOption) (*Mount, error)
public static Mount Get(string name, Input<string> id, MountState? state, CustomResourceOptions? opts = null)
name
The unique name of the resulting resource.
id
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
resource_name
The unique name of the resulting resource.
id
The unique provider ID of the resource to lookup.
name
The unique name of the resulting resource.
id
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
name
The unique name of the resulting resource.
id
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.

The following state arguments are supported:

Accessor string

The accessor for this mount.

DefaultLeaseTtlSeconds int

Default lease duration for tokens and secrets in seconds

Description string

Human-friendly description of the mount

ExternalEntropyAccess bool

Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault’s external entropy source

Local bool

Boolean flag that can be explicitly set to true to enforce local mount in HA environment

MaxLeaseTtlSeconds int

Maximum possible lease duration for tokens and secrets in seconds

Options Dictionary<string, object>

Specifies mount type specific options that are passed to the backend

Path string

Where the secret backend will be mounted

SealWrap bool

Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal’s encryption capability

Type string

Type of the backend, such as “aws”

Accessor string

The accessor for this mount.

DefaultLeaseTtlSeconds int

Default lease duration for tokens and secrets in seconds

Description string

Human-friendly description of the mount

ExternalEntropyAccess bool

Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault’s external entropy source

Local bool

Boolean flag that can be explicitly set to true to enforce local mount in HA environment

MaxLeaseTtlSeconds int

Maximum possible lease duration for tokens and secrets in seconds

Options map[string]interface{}

Specifies mount type specific options that are passed to the backend

Path string

Where the secret backend will be mounted

SealWrap bool

Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal’s encryption capability

Type string

Type of the backend, such as “aws”

accessor string

The accessor for this mount.

defaultLeaseTtlSeconds number

Default lease duration for tokens and secrets in seconds

description string

Human-friendly description of the mount

externalEntropyAccess boolean

Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault’s external entropy source

local boolean

Boolean flag that can be explicitly set to true to enforce local mount in HA environment

maxLeaseTtlSeconds number

Maximum possible lease duration for tokens and secrets in seconds

options {[key: string]: any}

Specifies mount type specific options that are passed to the backend

path string

Where the secret backend will be mounted

sealWrap boolean

Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal’s encryption capability

type string

Type of the backend, such as “aws”

accessor str

The accessor for this mount.

default_lease_ttl_seconds int

Default lease duration for tokens and secrets in seconds

description str

Human-friendly description of the mount

external_entropy_access bool

Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault’s external entropy source

local bool

Boolean flag that can be explicitly set to true to enforce local mount in HA environment

max_lease_ttl_seconds int

Maximum possible lease duration for tokens and secrets in seconds

options Mapping[str, Any]

Specifies mount type specific options that are passed to the backend

path str

Where the secret backend will be mounted

seal_wrap bool

Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal’s encryption capability

type str

Type of the backend, such as “aws”

Package Details

Repository
https://github.com/pulumi/pulumi-vault
License
Apache-2.0
Notes
This Pulumi package is based on the vault Terraform Provider.