UNPKG

@pulumi/vault

Version:

A Pulumi package for creating and managing HashiCorp Vault cloud resources.

119 lines (118 loc) 3.99 kB
import * as outputs from "../types/output"; export declare const addAddressToEnv: string | undefined; /** * URL of the root of the target Vault server. */ export declare const address: string | undefined; /** * Login to vault with an existing auth method using auth/<mount>/login */ export declare const authLogin: outputs.config.AuthLogin | undefined; /** * Login to vault using the AWS method */ export declare const authLoginAws: outputs.config.AuthLoginAws | undefined; /** * Login to vault using the azure method */ export declare const authLoginAzure: outputs.config.AuthLoginAzure | undefined; /** * Login to vault using the cert method */ export declare const authLoginCert: outputs.config.AuthLoginCert | undefined; /** * Login to vault using the gcp method */ export declare const authLoginGcp: outputs.config.AuthLoginGcp | undefined; /** * Login to vault using the jwt method */ export declare const authLoginJwt: outputs.config.AuthLoginJwt | undefined; /** * Login to vault using the kerberos method */ export declare const authLoginKerberos: outputs.config.AuthLoginKerberos | undefined; /** * Login to vault using the OCI method */ export declare const authLoginOci: outputs.config.AuthLoginOci | undefined; /** * Login to vault using the oidc method */ export declare const authLoginOidc: outputs.config.AuthLoginOidc | undefined; /** * Login to vault using the radius method */ export declare const authLoginRadius: outputs.config.AuthLoginRadius | undefined; /** * Login to vault using */ export declare const authLoginTokenFile: outputs.config.AuthLoginTokenFile | undefined; /** * Login to vault using the userpass method */ export declare const authLoginUserpass: outputs.config.AuthLoginUserpass | undefined; /** * Path to directory containing CA certificate files to validate the server's certificate. */ export declare const caCertDir: string | undefined; /** * Path to a CA certificate file to validate the server's certificate. */ export declare const caCertFile: string | undefined; /** * Client authentication credentials. */ export declare const clientAuth: outputs.config.ClientAuth | undefined; /** * The headers to send with each Vault request. */ export declare const headers: outputs.config.Headers[] | undefined; /** * Maximum TTL for secret leases requested by this provider. */ export declare const maxLeaseTtlSeconds: number; /** * Maximum number of retries when a 5xx error code is encountered. */ export declare const maxRetries: number; /** * Maximum number of retries for Client Controlled Consistency related operations */ export declare const maxRetriesCcc: number | undefined; /** * The namespace to use. Available only for Vault Enterprise. */ export declare const namespace: string | undefined; /** * In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the token namespace as the root namespace for all resources. */ export declare const setNamespaceFromToken: boolean | undefined; /** * Set this to true to prevent the creation of ephemeral child token used by this provider. */ export declare const skipChildToken: boolean | undefined; /** * Skip the dynamic fetching of the Vault server version. */ export declare const skipGetVaultVersion: boolean | undefined; /** * Set this to true only if the target Vault server is an insecure development instance. */ export declare const skipTlsVerify: boolean | undefined; /** * Name to use as the SNI host when connecting via TLS. */ export declare const tlsServerName: string | undefined; /** * Token to use to authenticate to Vault. */ export declare const token: string | undefined; /** * Token name to use for creating the Vault child token. */ export declare const tokenName: string | undefined; /** * Override the Vault server version, which is normally determined dynamically from the target Vault server */ export declare const vaultVersionOverride: string | undefined;