@pulumi/vault
Version:
A Pulumi package for creating and managing HashiCorp Vault cloud resources.
119 lines (118 loc) • 3.99 kB
TypeScript
import * as outputs from "../types/output";
export declare const addAddressToEnv: string | undefined;
/**
* URL of the root of the target Vault server.
*/
export declare const address: string | undefined;
/**
* Login to vault with an existing auth method using auth/<mount>/login
*/
export declare const authLogin: outputs.config.AuthLogin | undefined;
/**
* Login to vault using the AWS method
*/
export declare const authLoginAws: outputs.config.AuthLoginAws | undefined;
/**
* Login to vault using the azure method
*/
export declare const authLoginAzure: outputs.config.AuthLoginAzure | undefined;
/**
* Login to vault using the cert method
*/
export declare const authLoginCert: outputs.config.AuthLoginCert | undefined;
/**
* Login to vault using the gcp method
*/
export declare const authLoginGcp: outputs.config.AuthLoginGcp | undefined;
/**
* Login to vault using the jwt method
*/
export declare const authLoginJwt: outputs.config.AuthLoginJwt | undefined;
/**
* Login to vault using the kerberos method
*/
export declare const authLoginKerberos: outputs.config.AuthLoginKerberos | undefined;
/**
* Login to vault using the OCI method
*/
export declare const authLoginOci: outputs.config.AuthLoginOci | undefined;
/**
* Login to vault using the oidc method
*/
export declare const authLoginOidc: outputs.config.AuthLoginOidc | undefined;
/**
* Login to vault using the radius method
*/
export declare const authLoginRadius: outputs.config.AuthLoginRadius | undefined;
/**
* Login to vault using
*/
export declare const authLoginTokenFile: outputs.config.AuthLoginTokenFile | undefined;
/**
* Login to vault using the userpass method
*/
export declare const authLoginUserpass: outputs.config.AuthLoginUserpass | undefined;
/**
* Path to directory containing CA certificate files to validate the server's certificate.
*/
export declare const caCertDir: string | undefined;
/**
* Path to a CA certificate file to validate the server's certificate.
*/
export declare const caCertFile: string | undefined;
/**
* Client authentication credentials.
*/
export declare const clientAuth: outputs.config.ClientAuth | undefined;
/**
* The headers to send with each Vault request.
*/
export declare const headers: outputs.config.Headers[] | undefined;
/**
* Maximum TTL for secret leases requested by this provider.
*/
export declare const maxLeaseTtlSeconds: number;
/**
* Maximum number of retries when a 5xx error code is encountered.
*/
export declare const maxRetries: number;
/**
* Maximum number of retries for Client Controlled Consistency related operations
*/
export declare const maxRetriesCcc: number | undefined;
/**
* The namespace to use. Available only for Vault Enterprise.
*/
export declare const namespace: string | undefined;
/**
* In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the token namespace as the root namespace for all resources.
*/
export declare const setNamespaceFromToken: boolean | undefined;
/**
* Set this to true to prevent the creation of ephemeral child token used by this provider.
*/
export declare const skipChildToken: boolean | undefined;
/**
* Skip the dynamic fetching of the Vault server version.
*/
export declare const skipGetVaultVersion: boolean | undefined;
/**
* Set this to true only if the target Vault server is an insecure development instance.
*/
export declare const skipTlsVerify: boolean | undefined;
/**
* Name to use as the SNI host when connecting via TLS.
*/
export declare const tlsServerName: string | undefined;
/**
* Token to use to authenticate to Vault.
*/
export declare const token: string | undefined;
/**
* Token name to use for creating the Vault child token.
*/
export declare const tokenName: string | undefined;
/**
* Override the Vault server version, which is normally determined dynamically from the target Vault server
*/
export declare const vaultVersionOverride: string | undefined;