Many resources are needed to download a project. Please understand that we have to compensate our server costs. Thank you in advance. Project price only 1 $
You can buy this project and download/modify it how often you want.
Build cloud applications and infrastructure by combining the safety and reliability of infrastructure as code with the power of the Kotlin programming language.
@file:Suppress("NAME_SHADOWING", "DEPRECATION")
package com.pulumi.vault.kubernetes.kotlin
import com.pulumi.core.Output
import com.pulumi.core.Output.of
import com.pulumi.kotlin.ConvertibleToJava
import com.pulumi.kotlin.PulumiTagMarker
import com.pulumi.vault.kubernetes.SecretBackendArgs.builder
import kotlin.Any
import kotlin.Boolean
import kotlin.Int
import kotlin.Pair
import kotlin.String
import kotlin.Suppress
import kotlin.collections.List
import kotlin.collections.Map
import kotlin.jvm.JvmName
/**
* ## Example Usage
*
* ```typescript
* import * as pulumi from "@pulumi/pulumi";
* import * as std from "@pulumi/std";
* import * as vault from "@pulumi/vault";
* const config = new vault.kubernetes.SecretBackend("config", {
* path: "kubernetes",
* description: "kubernetes secrets engine description",
* defaultLeaseTtlSeconds: 43200,
* maxLeaseTtlSeconds: 86400,
* kubernetesHost: "https://127.0.0.1:61233",
* kubernetesCaCert: std.file({
* input: "/path/to/cert",
* }).then(invoke => invoke.result),
* serviceAccountJwt: std.file({
* input: "/path/to/token",
* }).then(invoke => invoke.result),
* disableLocalCaJwt: false,
* });
* ```
* ```python
* import pulumi
* import pulumi_std as std
* import pulumi_vault as vault
* config = vault.kubernetes.SecretBackend("config",
* path="kubernetes",
* description="kubernetes secrets engine description",
* default_lease_ttl_seconds=43200,
* max_lease_ttl_seconds=86400,
* kubernetes_host="https://127.0.0.1:61233",
* kubernetes_ca_cert=std.file(input="/path/to/cert").result,
* service_account_jwt=std.file(input="/path/to/token").result,
* disable_local_ca_jwt=False)
* ```
* ```csharp
* using System.Collections.Generic;
* using System.Linq;
* using Pulumi;
* using Std = Pulumi.Std;
* using Vault = Pulumi.Vault;
* return await Deployment.RunAsync(() =>
* {
* var config = new Vault.Kubernetes.SecretBackend("config", new()
* {
* Path = "kubernetes",
* Description = "kubernetes secrets engine description",
* DefaultLeaseTtlSeconds = 43200,
* MaxLeaseTtlSeconds = 86400,
* KubernetesHost = "https://127.0.0.1:61233",
* KubernetesCaCert = Std.File.Invoke(new()
* {
* Input = "/path/to/cert",
* }).Apply(invoke => invoke.Result),
* ServiceAccountJwt = Std.File.Invoke(new()
* {
* Input = "/path/to/token",
* }).Apply(invoke => invoke.Result),
* DisableLocalCaJwt = false,
* });
* });
* ```
* ```go
* package main
* import (
* "github.com/pulumi/pulumi-std/sdk/go/std"
* "github.com/pulumi/pulumi-vault/sdk/v6/go/vault/kubernetes"
* "github.com/pulumi/pulumi/sdk/v3/go/pulumi"
* )
* func main() {
* pulumi.Run(func(ctx *pulumi.Context) error {
* invokeFile, err := std.File(ctx, &std.FileArgs{
* Input: "/path/to/cert",
* }, nil)
* if err != nil {
* return err
* }
* invokeFile1, err := std.File(ctx, &std.FileArgs{
* Input: "/path/to/token",
* }, nil)
* if err != nil {
* return err
* }
* _, err = kubernetes.NewSecretBackend(ctx, "config", &kubernetes.SecretBackendArgs{
* Path: pulumi.String("kubernetes"),
* Description: pulumi.String("kubernetes secrets engine description"),
* DefaultLeaseTtlSeconds: pulumi.Int(43200),
* MaxLeaseTtlSeconds: pulumi.Int(86400),
* KubernetesHost: pulumi.String("https://127.0.0.1:61233"),
* KubernetesCaCert: pulumi.String(invokeFile.Result),
* ServiceAccountJwt: pulumi.String(invokeFile1.Result),
* DisableLocalCaJwt: pulumi.Bool(false),
* })
* if err != nil {
* return err
* }
* return nil
* })
* }
* ```
* ```java
* package generated_program;
* import com.pulumi.Context;
* import com.pulumi.Pulumi;
* import com.pulumi.core.Output;
* import com.pulumi.vault.kubernetes.SecretBackend;
* import com.pulumi.vault.kubernetes.SecretBackendArgs;
* import java.util.List;
* import java.util.ArrayList;
* import java.util.Map;
* import java.io.File;
* import java.nio.file.Files;
* import java.nio.file.Paths;
* public class App {
* public static void main(String[] args) {
* Pulumi.run(App::stack);
* }
* public static void stack(Context ctx) {
* var config = new SecretBackend("config", SecretBackendArgs.builder()
* .path("kubernetes")
* .description("kubernetes secrets engine description")
* .defaultLeaseTtlSeconds(43200)
* .maxLeaseTtlSeconds(86400)
* .kubernetesHost("https://127.0.0.1:61233")
* .kubernetesCaCert(StdFunctions.file(FileArgs.builder()
* .input("/path/to/cert")
* .build()).result())
* .serviceAccountJwt(StdFunctions.file(FileArgs.builder()
* .input("/path/to/token")
* .build()).result())
* .disableLocalCaJwt(false)
* .build());
* }
* }
* ```
* ```yaml
* resources:
* config:
* type: vault:kubernetes:SecretBackend
* properties:
* path: kubernetes
* description: kubernetes secrets engine description
* defaultLeaseTtlSeconds: 43200
* maxLeaseTtlSeconds: 86400
* kubernetesHost: https://127.0.0.1:61233
* kubernetesCaCert:
* fn::invoke:
* Function: std:file
* Arguments:
* input: /path/to/cert
* Return: result
* serviceAccountJwt:
* fn::invoke:
* Function: std:file
* Arguments:
* input: /path/to/token
* Return: result
* disableLocalCaJwt: false
* ```
*
* ## Import
* The Kubernetes secret backend can be imported using its `path` e.g.
* ```sh
* $ pulumi import vault:kubernetes/secretBackend:SecretBackend config kubernetes
* ```
* @property allowedManagedKeys List of managed key registry entry names that the mount in question is allowed to access
* @property allowedResponseHeaders List of headers to allow and pass from the request to the plugin
* @property auditNonHmacRequestKeys Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
* @property auditNonHmacResponseKeys Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
* @property defaultLeaseTtlSeconds Default lease duration for tokens and secrets in seconds
* @property delegatedAuthAccessors List of headers to allow and pass from the request to the plugin
* @property description Human-friendly description of the mount
* @property disableLocalCaJwt Disable defaulting to the local CA certificate and
* service account JWT when Vault is running in a Kubernetes pod.
* @property externalEntropyAccess Enable the secrets engine to access Vault's external entropy source
* @property identityTokenKey The key to use for signing plugin workload identity tokens
* @property kubernetesCaCert A PEM-encoded CA certificate used by the
* secrets engine to verify the Kubernetes API server certificate. Defaults to the local
* pod’s CA if Vault is running in Kubernetes. Otherwise, defaults to the root CA set where
* Vault is running.
* @property kubernetesHost The Kubernetes API URL to connect to. Required if the
* standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
* are not set on the host that Vault is running on.
* @property listingVisibility Specifies whether to show this mount in the UI-specific listing endpoint
* @property local Local mount flag that can be explicitly set to true to enforce local mount in HA environment
* @property maxLeaseTtlSeconds Maximum possible lease duration for tokens and secrets in seconds
* @property namespace The namespace to provision the resource in.
* The value should not contain leading or trailing forward slashes.
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
* *Available only for Vault Enterprise*.
* @property options Specifies mount type specific options that are passed to the backend
* @property passthroughRequestHeaders List of headers to allow and pass from the request to the plugin
* @property path Where the secret backend will be mounted
* @property pluginVersion Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
* @property sealWrap Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
* @property serviceAccountJwt The JSON web token of the service account used by the
* secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
* is running in Kubernetes.
*/
public data class SecretBackendArgs(
public val allowedManagedKeys: Output>? = null,
public val allowedResponseHeaders: Output>? = null,
public val auditNonHmacRequestKeys: Output>? = null,
public val auditNonHmacResponseKeys: Output>? = null,
public val defaultLeaseTtlSeconds: Output? = null,
public val delegatedAuthAccessors: Output>? = null,
public val description: Output? = null,
public val disableLocalCaJwt: Output? = null,
public val externalEntropyAccess: Output? = null,
public val identityTokenKey: Output? = null,
public val kubernetesCaCert: Output? = null,
public val kubernetesHost: Output? = null,
public val listingVisibility: Output? = null,
public val local: Output? = null,
public val maxLeaseTtlSeconds: Output? = null,
public val namespace: Output? = null,
public val options: Output