HashiCorp Vault

v5.1.0 published on Thursday, Dec 30, 2021 by Pulumi

Mount

Import

Mounts can be imported using the path, e.g.

 $ pulumi import vault:index/mount:Mount example dummy

Example Usage

using Pulumi;
using Vault = Pulumi.Vault;

class MyStack : Stack
{
    public MyStack()
    {
        var example = new Vault.Mount("example", new Vault.MountArgs
        {
            Description = "This is an example mount",
            Path = "dummy",
            Type = "generic",
        });
    }

}
package main

import (
	"github.com/pulumi/pulumi-vault/sdk/v5/go/vault"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)

func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		_, err := vault.NewMount(ctx, "example", &vault.MountArgs{
			Description: pulumi.String("This is an example mount"),
			Path:        pulumi.String("dummy"),
			Type:        pulumi.String("generic"),
		})
		if err != nil {
			return err
		}
		return nil
	})
}
import pulumi
import pulumi_vault as vault

example = vault.Mount("example",
    description="This is an example mount",
    path="dummy",
    type="generic")
import * as pulumi from "@pulumi/pulumi";
import * as vault from "@pulumi/vault";

const example = new vault.Mount("example", {
    description: "This is an example mount",
    path: "dummy",
    type: "generic",
});

Create a Mount Resource

new Mount(name: string, args: MountArgs, opts?: CustomResourceOptions);
@overload
def Mount(resource_name: str,
          opts: Optional[ResourceOptions] = None,
          default_lease_ttl_seconds: Optional[int] = None,
          description: Optional[str] = None,
          external_entropy_access: Optional[bool] = None,
          local: Optional[bool] = None,
          max_lease_ttl_seconds: Optional[int] = None,
          options: Optional[Mapping[str, Any]] = None,
          path: Optional[str] = None,
          seal_wrap: Optional[bool] = None,
          type: Optional[str] = None)
@overload
def Mount(resource_name: str,
          args: MountArgs,
          opts: Optional[ResourceOptions] = None)
func NewMount(ctx *Context, name string, args MountArgs, opts ...ResourceOption) (*Mount, error)
public Mount(string name, MountArgs args, CustomResourceOptions? opts = null)
name string
The unique name of the resource.
args MountArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.
resource_name str
The unique name of the resource.
args MountArgs
The arguments to resource properties.
opts ResourceOptions
Bag of options to control resource's behavior.
ctx Context
Context object for the current deployment.
name string
The unique name of the resource.
args MountArgs
The arguments to resource properties.
opts ResourceOption
Bag of options to control resource's behavior.
name string
The unique name of the resource.
args MountArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.

Mount Resource Properties

To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

Inputs

The Mount resource accepts the following input properties:

Path string
Where the secret backend will be mounted
Type string
Type of the backend, such as “aws”
DefaultLeaseTtlSeconds int
Default lease duration for tokens and secrets in seconds
Description string
Human-friendly description of the mount
ExternalEntropyAccess bool
Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault’s external entropy source
Local bool
Boolean flag that can be explicitly set to true to enforce local mount in HA environment
MaxLeaseTtlSeconds int
Maximum possible lease duration for tokens and secrets in seconds
Options Dictionary<string, object>
Specifies mount type specific options that are passed to the backend
SealWrap bool
Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal’s encryption capability
Path string
Where the secret backend will be mounted
Type string
Type of the backend, such as “aws”
DefaultLeaseTtlSeconds int
Default lease duration for tokens and secrets in seconds
Description string
Human-friendly description of the mount
ExternalEntropyAccess bool
Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault’s external entropy source
Local bool
Boolean flag that can be explicitly set to true to enforce local mount in HA environment
MaxLeaseTtlSeconds int
Maximum possible lease duration for tokens and secrets in seconds
Options map[string]interface{}
Specifies mount type specific options that are passed to the backend
SealWrap bool
Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal’s encryption capability
path string
Where the secret backend will be mounted
type string
Type of the backend, such as “aws”
defaultLeaseTtlSeconds number
Default lease duration for tokens and secrets in seconds
description string
Human-friendly description of the mount
externalEntropyAccess boolean
Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault’s external entropy source
local boolean
Boolean flag that can be explicitly set to true to enforce local mount in HA environment
maxLeaseTtlSeconds number
Maximum possible lease duration for tokens and secrets in seconds
options {[key: string]: any}
Specifies mount type specific options that are passed to the backend
sealWrap boolean
Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal’s encryption capability
path str
Where the secret backend will be mounted
type str
Type of the backend, such as “aws”
default_lease_ttl_seconds int
Default lease duration for tokens and secrets in seconds
description str
Human-friendly description of the mount
external_entropy_access bool
Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault’s external entropy source
local bool
Boolean flag that can be explicitly set to true to enforce local mount in HA environment
max_lease_ttl_seconds int
Maximum possible lease duration for tokens and secrets in seconds
options Mapping[str, Any]
Specifies mount type specific options that are passed to the backend
seal_wrap bool
Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal’s encryption capability

Outputs

All input properties are implicitly available as output properties. Additionally, the Mount resource produces the following output properties:

Accessor string
The accessor for this mount.
Id string
The provider-assigned unique ID for this managed resource.
Accessor string
The accessor for this mount.
Id string
The provider-assigned unique ID for this managed resource.
accessor string
The accessor for this mount.
id string
The provider-assigned unique ID for this managed resource.
accessor str
The accessor for this mount.
id str
The provider-assigned unique ID for this managed resource.

Look up an Existing Mount Resource

Get an existing Mount resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

public static get(name: string, id: Input<ID>, state?: MountState, opts?: CustomResourceOptions): Mount
@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        accessor: Optional[str] = None,
        default_lease_ttl_seconds: Optional[int] = None,
        description: Optional[str] = None,
        external_entropy_access: Optional[bool] = None,
        local: Optional[bool] = None,
        max_lease_ttl_seconds: Optional[int] = None,
        options: Optional[Mapping[str, Any]] = None,
        path: Optional[str] = None,
        seal_wrap: Optional[bool] = None,
        type: Optional[str] = None) -> Mount
func GetMount(ctx *Context, name string, id IDInput, state *MountState, opts ...ResourceOption) (*Mount, error)
public static Mount Get(string name, Input<string> id, MountState? state, CustomResourceOptions? opts = null)
name
The unique name of the resulting resource.
id
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
resource_name
The unique name of the resulting resource.
id
The unique provider ID of the resource to lookup.
name
The unique name of the resulting resource.
id
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
name
The unique name of the resulting resource.
id
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.

The following state arguments are supported:

Accessor string
The accessor for this mount.
DefaultLeaseTtlSeconds int
Default lease duration for tokens and secrets in seconds
Description string
Human-friendly description of the mount
ExternalEntropyAccess bool
Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault’s external entropy source
Local bool
Boolean flag that can be explicitly set to true to enforce local mount in HA environment
MaxLeaseTtlSeconds int
Maximum possible lease duration for tokens and secrets in seconds
Options Dictionary<string, object>
Specifies mount type specific options that are passed to the backend
Path string
Where the secret backend will be mounted
SealWrap bool
Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal’s encryption capability
Type string
Type of the backend, such as “aws”
Accessor string
The accessor for this mount.
DefaultLeaseTtlSeconds int
Default lease duration for tokens and secrets in seconds
Description string
Human-friendly description of the mount
ExternalEntropyAccess bool
Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault’s external entropy source
Local bool
Boolean flag that can be explicitly set to true to enforce local mount in HA environment
MaxLeaseTtlSeconds int
Maximum possible lease duration for tokens and secrets in seconds
Options map[string]interface{}
Specifies mount type specific options that are passed to the backend
Path string
Where the secret backend will be mounted
SealWrap bool
Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal’s encryption capability
Type string
Type of the backend, such as “aws”
accessor string
The accessor for this mount.
defaultLeaseTtlSeconds number
Default lease duration for tokens and secrets in seconds
description string
Human-friendly description of the mount
externalEntropyAccess boolean
Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault’s external entropy source
local boolean
Boolean flag that can be explicitly set to true to enforce local mount in HA environment
maxLeaseTtlSeconds number
Maximum possible lease duration for tokens and secrets in seconds
options {[key: string]: any}
Specifies mount type specific options that are passed to the backend
path string
Where the secret backend will be mounted
sealWrap boolean
Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal’s encryption capability
type string
Type of the backend, such as “aws”
accessor str
The accessor for this mount.
default_lease_ttl_seconds int
Default lease duration for tokens and secrets in seconds
description str
Human-friendly description of the mount
external_entropy_access bool
Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault’s external entropy source
local bool
Boolean flag that can be explicitly set to true to enforce local mount in HA environment
max_lease_ttl_seconds int
Maximum possible lease duration for tokens and secrets in seconds
options Mapping[str, Any]
Specifies mount type specific options that are passed to the backend
path str
Where the secret backend will be mounted
seal_wrap bool
Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal’s encryption capability
type str
Type of the backend, such as “aws”

Package Details

Repository
https://github.com/pulumi/pulumi-vault
License
Apache-2.0
Notes
This Pulumi package is based on the vault Terraform Provider.