vault.aws.SecretBackend
Explore with Pulumi AI
Import
AWS secret backends can be imported using the path
, e.g.
$ pulumi import vault:aws/secretBackend:SecretBackend aws aws
Create SecretBackend Resource
new SecretBackend(name: string, args?: SecretBackendArgs, opts?: CustomResourceOptions);
@overload
def SecretBackend(resource_name: str,
opts: Optional[ResourceOptions] = None,
access_key: Optional[str] = None,
default_lease_ttl_seconds: Optional[int] = None,
description: Optional[str] = None,
disable_remount: Optional[bool] = None,
iam_endpoint: Optional[str] = None,
local: Optional[bool] = None,
max_lease_ttl_seconds: Optional[int] = None,
namespace: Optional[str] = None,
path: Optional[str] = None,
region: Optional[str] = None,
secret_key: Optional[str] = None,
sts_endpoint: Optional[str] = None,
username_template: Optional[str] = None)
@overload
def SecretBackend(resource_name: str,
args: Optional[SecretBackendArgs] = None,
opts: Optional[ResourceOptions] = None)
func NewSecretBackend(ctx *Context, name string, args *SecretBackendArgs, opts ...ResourceOption) (*SecretBackend, error)
public SecretBackend(string name, SecretBackendArgs? args = null, CustomResourceOptions? opts = null)
public SecretBackend(String name, SecretBackendArgs args)
public SecretBackend(String name, SecretBackendArgs args, CustomResourceOptions options)
type: vault:aws:SecretBackend
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args SecretBackendArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args SecretBackendArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args SecretBackendArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args SecretBackendArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args SecretBackendArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
SecretBackend Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
The SecretBackend resource accepts the following input properties:
- Access
Key string The AWS Access Key ID this backend should use to issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
- Default
Lease intTtl Seconds The default TTL for credentials issued by this backend.
- Description string
A human-friendly description for this backend.
- Disable
Remount bool If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- Iam
Endpoint string Specifies a custom HTTP IAM endpoint to use.
- Local bool
Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
- Max
Lease intTtl Seconds The maximum TTL that can be requested for credentials issued by this backend.
- Namespace string
The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise.- Path string
The unique path this backend should be mounted at. Must not begin or end with a
/
. Defaults toaws
.- Region string
The AWS region to make API calls against. Defaults to us-east-1.
- Secret
Key string The AWS Secret Access Key to use when generating new credentials.
- Sts
Endpoint string Specifies a custom HTTP STS endpoint to use.
- Username
Template string Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
- Access
Key string The AWS Access Key ID this backend should use to issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
- Default
Lease intTtl Seconds The default TTL for credentials issued by this backend.
- Description string
A human-friendly description for this backend.
- Disable
Remount bool If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- Iam
Endpoint string Specifies a custom HTTP IAM endpoint to use.
- Local bool
Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
- Max
Lease intTtl Seconds The maximum TTL that can be requested for credentials issued by this backend.
- Namespace string
The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise.- Path string
The unique path this backend should be mounted at. Must not begin or end with a
/
. Defaults toaws
.- Region string
The AWS region to make API calls against. Defaults to us-east-1.
- Secret
Key string The AWS Secret Access Key to use when generating new credentials.
- Sts
Endpoint string Specifies a custom HTTP STS endpoint to use.
- Username
Template string Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
- access
Key String The AWS Access Key ID this backend should use to issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
- default
Lease IntegerTtl Seconds The default TTL for credentials issued by this backend.
- description String
A human-friendly description for this backend.
- disable
Remount Boolean If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- iam
Endpoint String Specifies a custom HTTP IAM endpoint to use.
- local Boolean
Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
- max
Lease IntegerTtl Seconds The maximum TTL that can be requested for credentials issued by this backend.
- namespace String
The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise.- path String
The unique path this backend should be mounted at. Must not begin or end with a
/
. Defaults toaws
.- region String
The AWS region to make API calls against. Defaults to us-east-1.
- secret
Key String The AWS Secret Access Key to use when generating new credentials.
- sts
Endpoint String Specifies a custom HTTP STS endpoint to use.
- username
Template String Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
- access
Key string The AWS Access Key ID this backend should use to issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
- default
Lease numberTtl Seconds The default TTL for credentials issued by this backend.
- description string
A human-friendly description for this backend.
- disable
Remount boolean If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- iam
Endpoint string Specifies a custom HTTP IAM endpoint to use.
- local boolean
Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
- max
Lease numberTtl Seconds The maximum TTL that can be requested for credentials issued by this backend.
- namespace string
The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise.- path string
The unique path this backend should be mounted at. Must not begin or end with a
/
. Defaults toaws
.- region string
The AWS region to make API calls against. Defaults to us-east-1.
- secret
Key string The AWS Secret Access Key to use when generating new credentials.
- sts
Endpoint string Specifies a custom HTTP STS endpoint to use.
- username
Template string Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
- access_
key str The AWS Access Key ID this backend should use to issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
- default_
lease_ intttl_ seconds The default TTL for credentials issued by this backend.
- description str
A human-friendly description for this backend.
- disable_
remount bool If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- iam_
endpoint str Specifies a custom HTTP IAM endpoint to use.
- local bool
Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
- max_
lease_ intttl_ seconds The maximum TTL that can be requested for credentials issued by this backend.
- namespace str
The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise.- path str
The unique path this backend should be mounted at. Must not begin or end with a
/
. Defaults toaws
.- region str
The AWS region to make API calls against. Defaults to us-east-1.
- secret_
key str The AWS Secret Access Key to use when generating new credentials.
- sts_
endpoint str Specifies a custom HTTP STS endpoint to use.
- username_
template str Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
- access
Key String The AWS Access Key ID this backend should use to issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
- default
Lease NumberTtl Seconds The default TTL for credentials issued by this backend.
- description String
A human-friendly description for this backend.
- disable
Remount Boolean If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- iam
Endpoint String Specifies a custom HTTP IAM endpoint to use.
- local Boolean
Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
- max
Lease NumberTtl Seconds The maximum TTL that can be requested for credentials issued by this backend.
- namespace String
The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise.- path String
The unique path this backend should be mounted at. Must not begin or end with a
/
. Defaults toaws
.- region String
The AWS region to make API calls against. Defaults to us-east-1.
- secret
Key String The AWS Secret Access Key to use when generating new credentials.
- sts
Endpoint String Specifies a custom HTTP STS endpoint to use.
- username
Template String Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
Outputs
All input properties are implicitly available as output properties. Additionally, the SecretBackend resource produces the following output properties:
- Id string
The provider-assigned unique ID for this managed resource.
- Id string
The provider-assigned unique ID for this managed resource.
- id String
The provider-assigned unique ID for this managed resource.
- id string
The provider-assigned unique ID for this managed resource.
- id str
The provider-assigned unique ID for this managed resource.
- id String
The provider-assigned unique ID for this managed resource.
Look up Existing SecretBackend Resource
Get an existing SecretBackend resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: SecretBackendState, opts?: CustomResourceOptions): SecretBackend
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
access_key: Optional[str] = None,
default_lease_ttl_seconds: Optional[int] = None,
description: Optional[str] = None,
disable_remount: Optional[bool] = None,
iam_endpoint: Optional[str] = None,
local: Optional[bool] = None,
max_lease_ttl_seconds: Optional[int] = None,
namespace: Optional[str] = None,
path: Optional[str] = None,
region: Optional[str] = None,
secret_key: Optional[str] = None,
sts_endpoint: Optional[str] = None,
username_template: Optional[str] = None) -> SecretBackend
func GetSecretBackend(ctx *Context, name string, id IDInput, state *SecretBackendState, opts ...ResourceOption) (*SecretBackend, error)
public static SecretBackend Get(string name, Input<string> id, SecretBackendState? state, CustomResourceOptions? opts = null)
public static SecretBackend get(String name, Output<String> id, SecretBackendState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Access
Key string The AWS Access Key ID this backend should use to issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
- Default
Lease intTtl Seconds The default TTL for credentials issued by this backend.
- Description string
A human-friendly description for this backend.
- Disable
Remount bool If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- Iam
Endpoint string Specifies a custom HTTP IAM endpoint to use.
- Local bool
Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
- Max
Lease intTtl Seconds The maximum TTL that can be requested for credentials issued by this backend.
- Namespace string
The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise.- Path string
The unique path this backend should be mounted at. Must not begin or end with a
/
. Defaults toaws
.- Region string
The AWS region to make API calls against. Defaults to us-east-1.
- Secret
Key string The AWS Secret Access Key to use when generating new credentials.
- Sts
Endpoint string Specifies a custom HTTP STS endpoint to use.
- Username
Template string Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
- Access
Key string The AWS Access Key ID this backend should use to issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
- Default
Lease intTtl Seconds The default TTL for credentials issued by this backend.
- Description string
A human-friendly description for this backend.
- Disable
Remount bool If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- Iam
Endpoint string Specifies a custom HTTP IAM endpoint to use.
- Local bool
Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
- Max
Lease intTtl Seconds The maximum TTL that can be requested for credentials issued by this backend.
- Namespace string
The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise.- Path string
The unique path this backend should be mounted at. Must not begin or end with a
/
. Defaults toaws
.- Region string
The AWS region to make API calls against. Defaults to us-east-1.
- Secret
Key string The AWS Secret Access Key to use when generating new credentials.
- Sts
Endpoint string Specifies a custom HTTP STS endpoint to use.
- Username
Template string Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
- access
Key String The AWS Access Key ID this backend should use to issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
- default
Lease IntegerTtl Seconds The default TTL for credentials issued by this backend.
- description String
A human-friendly description for this backend.
- disable
Remount Boolean If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- iam
Endpoint String Specifies a custom HTTP IAM endpoint to use.
- local Boolean
Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
- max
Lease IntegerTtl Seconds The maximum TTL that can be requested for credentials issued by this backend.
- namespace String
The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise.- path String
The unique path this backend should be mounted at. Must not begin or end with a
/
. Defaults toaws
.- region String
The AWS region to make API calls against. Defaults to us-east-1.
- secret
Key String The AWS Secret Access Key to use when generating new credentials.
- sts
Endpoint String Specifies a custom HTTP STS endpoint to use.
- username
Template String Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
- access
Key string The AWS Access Key ID this backend should use to issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
- default
Lease numberTtl Seconds The default TTL for credentials issued by this backend.
- description string
A human-friendly description for this backend.
- disable
Remount boolean If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- iam
Endpoint string Specifies a custom HTTP IAM endpoint to use.
- local boolean
Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
- max
Lease numberTtl Seconds The maximum TTL that can be requested for credentials issued by this backend.
- namespace string
The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise.- path string
The unique path this backend should be mounted at. Must not begin or end with a
/
. Defaults toaws
.- region string
The AWS region to make API calls against. Defaults to us-east-1.
- secret
Key string The AWS Secret Access Key to use when generating new credentials.
- sts
Endpoint string Specifies a custom HTTP STS endpoint to use.
- username
Template string Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
- access_
key str The AWS Access Key ID this backend should use to issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
- default_
lease_ intttl_ seconds The default TTL for credentials issued by this backend.
- description str
A human-friendly description for this backend.
- disable_
remount bool If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- iam_
endpoint str Specifies a custom HTTP IAM endpoint to use.
- local bool
Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
- max_
lease_ intttl_ seconds The maximum TTL that can be requested for credentials issued by this backend.
- namespace str
The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise.- path str
The unique path this backend should be mounted at. Must not begin or end with a
/
. Defaults toaws
.- region str
The AWS region to make API calls against. Defaults to us-east-1.
- secret_
key str The AWS Secret Access Key to use when generating new credentials.
- sts_
endpoint str Specifies a custom HTTP STS endpoint to use.
- username_
template str Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
- access
Key String The AWS Access Key ID this backend should use to issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
- default
Lease NumberTtl Seconds The default TTL for credentials issued by this backend.
- description String
A human-friendly description for this backend.
- disable
Remount Boolean If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- iam
Endpoint String Specifies a custom HTTP IAM endpoint to use.
- local Boolean
Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
- max
Lease NumberTtl Seconds The maximum TTL that can be requested for credentials issued by this backend.
- namespace String
The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise.- path String
The unique path this backend should be mounted at. Must not begin or end with a
/
. Defaults toaws
.- region String
The AWS region to make API calls against. Defaults to us-east-1.
- secret
Key String The AWS Secret Access Key to use when generating new credentials.
- sts
Endpoint String Specifies a custom HTTP STS endpoint to use.
- username
Template String Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
Package Details
- Repository
- Vault pulumi/pulumi-vault
- License
- Apache-2.0
- Notes
This Pulumi package is based on the
vault
Terraform Provider.