Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.2.0/docs/resources/consul_secret_backend vault_consul_secret_backend}.
from cdktf_cdktf_provider_vault import consul_secret_backend
consulSecretBackend.ConsulSecretBackend(
scope: Construct,
id: str,
connection: typing.Union[SSHProvisionerConnection, WinrmProvisionerConnection] = None,
count: typing.Union[typing.Union[int, float], TerraformCount] = None,
depends_on: typing.List[ITerraformDependable] = None,
for_each: ITerraformIterator = None,
lifecycle: TerraformResourceLifecycle = None,
provider: TerraformProvider = None,
provisioners: typing.List[typing.Union[FileProvisioner, LocalExecProvisioner, RemoteExecProvisioner]] = None,
address: str,
bootstrap: typing.Union[bool, IResolvable] = None,
ca_cert: str = None,
client_cert: str = None,
client_key: str = None,
default_lease_ttl_seconds: typing.Union[int, float] = None,
description: str = None,
disable_remount: typing.Union[bool, IResolvable] = None,
id: str = None,
local: typing.Union[bool, IResolvable] = None,
max_lease_ttl_seconds: typing.Union[int, float] = None,
namespace: str = None,
path: str = None,
scheme: str = None,
token: str = None
)
Name | Type | Description |
---|---|---|
scope |
constructs.Construct |
The scope in which to define this construct. |
id |
str |
The scoped construct ID. |
connection |
typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection] |
No description. |
count |
typing.Union[typing.Union[int, float], cdktf.TerraformCount] |
No description. |
depends_on |
typing.List[cdktf.ITerraformDependable] |
No description. |
for_each |
cdktf.ITerraformIterator |
No description. |
lifecycle |
cdktf.TerraformResourceLifecycle |
No description. |
provider |
cdktf.TerraformProvider |
No description. |
provisioners |
typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] |
No description. |
address |
str |
Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500". |
bootstrap |
typing.Union[bool, cdktf.IResolvable] |
Denotes a backend resource that is used to bootstrap the Consul ACL system. |
ca_cert |
str |
CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded. |
client_cert |
str |
Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key. |
client_key |
str |
Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert. |
default_lease_ttl_seconds |
typing.Union[int, float] |
Default lease duration for secrets in seconds. |
description |
str |
Human-friendly description of the mount for the backend. |
disable_remount |
typing.Union[bool, cdktf.IResolvable] |
If set, opts out of mount migration on path updates. |
id |
str |
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.2.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. |
local |
typing.Union[bool, cdktf.IResolvable] |
Specifies if the secret backend is local only. |
max_lease_ttl_seconds |
typing.Union[int, float] |
Maximum possible lease duration for secrets in seconds. |
namespace |
str |
Target namespace. (requires Enterprise). |
path |
str |
Unique name of the Vault Consul mount to configure. |
scheme |
str |
Specifies the URL scheme to use. Defaults to "http". |
token |
str |
Specifies the Consul token to use when managing or issuing new tokens. |
- Type: constructs.Construct
The scope in which to define this construct.
- Type: str
The scoped construct ID.
Must be unique amongst siblings in the same scope
- Type: typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection]
- Type: typing.Union[typing.Union[int, float], cdktf.TerraformCount]
- Type: typing.List[cdktf.ITerraformDependable]
- Type: cdktf.ITerraformIterator
- Type: cdktf.TerraformResourceLifecycle
- Type: cdktf.TerraformProvider
- Type: typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
- Type: str
Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.2.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address}
- Type: typing.Union[bool, cdktf.IResolvable]
Denotes a backend resource that is used to bootstrap the Consul ACL system.
Only one resource may be used to bootstrap.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.2.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap}
- Type: str
CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.2.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert}
- Type: str
Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.2.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert}
- Type: str
Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.2.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key}
- Type: typing.Union[int, float]
Default lease duration for secrets in seconds.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.2.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds}
- Type: str
Human-friendly description of the mount for the backend.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.2.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description}
- Type: typing.Union[bool, cdktf.IResolvable]
If set, opts out of mount migration on path updates.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.2.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount}
- Type: str
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.2.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
- Type: typing.Union[bool, cdktf.IResolvable]
Specifies if the secret backend is local only.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.2.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local}
- Type: typing.Union[int, float]
Maximum possible lease duration for secrets in seconds.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.2.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds}
- Type: str
Target namespace. (requires Enterprise).
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.2.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace}
- Type: str
Unique name of the Vault Consul mount to configure.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.2.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path}
- Type: str
Specifies the URL scheme to use. Defaults to "http".
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.2.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme}
- Type: str
Specifies the Consul token to use when managing or issuing new tokens.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.2.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token}
Name | Description |
---|---|
to_string |
Returns a string representation of this construct. |
add_override |
No description. |
override_logical_id |
Overrides the auto-generated logical ID with a specific ID. |
reset_override_logical_id |
Resets a previously passed logical Id to use the auto-generated logical id again. |
to_hcl_terraform |
No description. |
to_metadata |
No description. |
to_terraform |
Adds this resource to the terraform JSON output. |
add_move_target |
Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. |
get_any_map_attribute |
No description. |
get_boolean_attribute |
No description. |
get_boolean_map_attribute |
No description. |
get_list_attribute |
No description. |
get_number_attribute |
No description. |
get_number_list_attribute |
No description. |
get_number_map_attribute |
No description. |
get_string_attribute |
No description. |
get_string_map_attribute |
No description. |
has_resource_move |
No description. |
import_from |
No description. |
interpolation_for_attribute |
No description. |
move_from_id |
Move the resource corresponding to "id" to this resource. |
move_to |
Moves this resource to the target resource given by moveTarget. |
move_to_id |
Moves this resource to the resource corresponding to "id". |
reset_bootstrap |
No description. |
reset_ca_cert |
No description. |
reset_client_cert |
No description. |
reset_client_key |
No description. |
reset_default_lease_ttl_seconds |
No description. |
reset_description |
No description. |
reset_disable_remount |
No description. |
reset_id |
No description. |
reset_local |
No description. |
reset_max_lease_ttl_seconds |
No description. |
reset_namespace |
No description. |
reset_path |
No description. |
reset_scheme |
No description. |
reset_token |
No description. |
def to_string() -> str
Returns a string representation of this construct.
def add_override(
path: str,
value: typing.Any
) -> None
- Type: str
- Type: typing.Any
def override_logical_id(
new_logical_id: str
) -> None
Overrides the auto-generated logical ID with a specific ID.
- Type: str
The new logical ID to use for this stack element.
def reset_override_logical_id() -> None
Resets a previously passed logical Id to use the auto-generated logical id again.
def to_hcl_terraform() -> typing.Any
def to_metadata() -> typing.Any
def to_terraform() -> typing.Any
Adds this resource to the terraform JSON output.
def add_move_target(
move_target: str
) -> None
Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move.
- Type: str
The string move target that will correspond to this resource.
def get_any_map_attribute(
terraform_attribute: str
) -> typing.Mapping[typing.Any]
- Type: str
def get_boolean_attribute(
terraform_attribute: str
) -> IResolvable
- Type: str
def get_boolean_map_attribute(
terraform_attribute: str
) -> typing.Mapping[bool]
- Type: str
def get_list_attribute(
terraform_attribute: str
) -> typing.List[str]
- Type: str
def get_number_attribute(
terraform_attribute: str
) -> typing.Union[int, float]
- Type: str
def get_number_list_attribute(
terraform_attribute: str
) -> typing.List[typing.Union[int, float]]
- Type: str
def get_number_map_attribute(
terraform_attribute: str
) -> typing.Mapping[typing.Union[int, float]]
- Type: str
def get_string_attribute(
terraform_attribute: str
) -> str
- Type: str
def get_string_map_attribute(
terraform_attribute: str
) -> typing.Mapping[str]
- Type: str
def has_resource_move() -> typing.Union[TerraformResourceMoveByTarget, TerraformResourceMoveById]
def import_from(
id: str,
provider: TerraformProvider = None
) -> None
- Type: str
- Type: cdktf.TerraformProvider
def interpolation_for_attribute(
terraform_attribute: str
) -> IResolvable
- Type: str
def move_from_id(
id: str
) -> None
Move the resource corresponding to "id" to this resource.
Note that the resource being moved from must be marked as moved using it's instance function.
- Type: str
Full id of resource being moved from, e.g. "aws_s3_bucket.example".
def move_to(
move_target: str,
index: typing.Union[str, typing.Union[int, float]] = None
) -> None
Moves this resource to the target resource given by moveTarget.
- Type: str
The previously set user defined string set by .addMoveTarget() corresponding to the resource to move to.
- Type: typing.Union[str, typing.Union[int, float]]
Optional The index corresponding to the key the resource is to appear in the foreach of a resource to move to.
def move_to_id(
id: str
) -> None
Moves this resource to the resource corresponding to "id".
- Type: str
Full id of resource to move to, e.g. "aws_s3_bucket.example".
def reset_bootstrap() -> None
def reset_ca_cert() -> None
def reset_client_cert() -> None
def reset_client_key() -> None
def reset_default_lease_ttl_seconds() -> None
def reset_description() -> None
def reset_disable_remount() -> None
def reset_id() -> None
def reset_local() -> None
def reset_max_lease_ttl_seconds() -> None
def reset_namespace() -> None
def reset_path() -> None
def reset_scheme() -> None
def reset_token() -> None
Name | Description |
---|---|
is_construct |
Checks if x is a construct. |
is_terraform_element |
No description. |
is_terraform_resource |
No description. |
generate_config_for_import |
Generates CDKTF code for importing a ConsulSecretBackend resource upon running "cdktf plan ". |
from cdktf_cdktf_provider_vault import consul_secret_backend
consulSecretBackend.ConsulSecretBackend.is_construct(
x: typing.Any
)
Checks if x
is a construct.
Use this method instead of instanceof
to properly detect Construct
instances, even when the construct library is symlinked.
Explanation: in JavaScript, multiple copies of the constructs
library on
disk are seen as independent, completely different libraries. As a
consequence, the class Construct
in each copy of the constructs
library
is seen as a different class, and an instance of one class will not test as
instanceof
the other class. npm install
will not create installations
like this, but users may manually symlink construct libraries together or
use a monorepo tool: in those cases, multiple copies of the constructs
library can be accidentally installed, and instanceof
will behave
unpredictably. It is safest to avoid using instanceof
, and using
this type-testing method instead.
- Type: typing.Any
Any object.
from cdktf_cdktf_provider_vault import consul_secret_backend
consulSecretBackend.ConsulSecretBackend.is_terraform_element(
x: typing.Any
)
- Type: typing.Any
from cdktf_cdktf_provider_vault import consul_secret_backend
consulSecretBackend.ConsulSecretBackend.is_terraform_resource(
x: typing.Any
)
- Type: typing.Any
from cdktf_cdktf_provider_vault import consul_secret_backend
consulSecretBackend.ConsulSecretBackend.generate_config_for_import(
scope: Construct,
import_to_id: str,
import_from_id: str,
provider: TerraformProvider = None
)
Generates CDKTF code for importing a ConsulSecretBackend resource upon running "cdktf plan ".
- Type: constructs.Construct
The scope in which to define this construct.
- Type: str
The construct id used in the generated config for the ConsulSecretBackend to import.
- Type: str
The id of the existing ConsulSecretBackend that should be imported.
Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.2.0/docs/resources/consul_secret_backend#import import section} in the documentation of this resource for the id to use
- Type: cdktf.TerraformProvider
? Optional instance of the provider where the ConsulSecretBackend to import is found.
Name | Type | Description |
---|---|---|
node |
constructs.Node |
The tree node. |
cdktf_stack |
cdktf.TerraformStack |
No description. |
fqn |
str |
No description. |
friendly_unique_id |
str |
No description. |
terraform_meta_arguments |
typing.Mapping[typing.Any] |
No description. |
terraform_resource_type |
str |
No description. |
terraform_generator_metadata |
cdktf.TerraformProviderGeneratorMetadata |
No description. |
connection |
typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection] |
No description. |
count |
typing.Union[typing.Union[int, float], cdktf.TerraformCount] |
No description. |
depends_on |
typing.List[str] |
No description. |
for_each |
cdktf.ITerraformIterator |
No description. |
lifecycle |
cdktf.TerraformResourceLifecycle |
No description. |
provider |
cdktf.TerraformProvider |
No description. |
provisioners |
typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] |
No description. |
address_input |
str |
No description. |
bootstrap_input |
typing.Union[bool, cdktf.IResolvable] |
No description. |
ca_cert_input |
str |
No description. |
client_cert_input |
str |
No description. |
client_key_input |
str |
No description. |
default_lease_ttl_seconds_input |
typing.Union[int, float] |
No description. |
description_input |
str |
No description. |
disable_remount_input |
typing.Union[bool, cdktf.IResolvable] |
No description. |
id_input |
str |
No description. |
local_input |
typing.Union[bool, cdktf.IResolvable] |
No description. |
max_lease_ttl_seconds_input |
typing.Union[int, float] |
No description. |
namespace_input |
str |
No description. |
path_input |
str |
No description. |
scheme_input |
str |
No description. |
token_input |
str |
No description. |
address |
str |
No description. |
bootstrap |
typing.Union[bool, cdktf.IResolvable] |
No description. |
ca_cert |
str |
No description. |
client_cert |
str |
No description. |
client_key |
str |
No description. |
default_lease_ttl_seconds |
typing.Union[int, float] |
No description. |
description |
str |
No description. |
disable_remount |
typing.Union[bool, cdktf.IResolvable] |
No description. |
id |
str |
No description. |
local |
typing.Union[bool, cdktf.IResolvable] |
No description. |
max_lease_ttl_seconds |
typing.Union[int, float] |
No description. |
namespace |
str |
No description. |
path |
str |
No description. |
scheme |
str |
No description. |
token |
str |
No description. |
node: Node
- Type: constructs.Node
The tree node.
cdktf_stack: TerraformStack
- Type: cdktf.TerraformStack
fqn: str
- Type: str
friendly_unique_id: str
- Type: str
terraform_meta_arguments: typing.Mapping[typing.Any]
- Type: typing.Mapping[typing.Any]
terraform_resource_type: str
- Type: str
terraform_generator_metadata: TerraformProviderGeneratorMetadata
- Type: cdktf.TerraformProviderGeneratorMetadata
connection: typing.Union[SSHProvisionerConnection, WinrmProvisionerConnection]
- Type: typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection]
count: typing.Union[typing.Union[int, float], TerraformCount]
- Type: typing.Union[typing.Union[int, float], cdktf.TerraformCount]
depends_on: typing.List[str]
- Type: typing.List[str]
for_each: ITerraformIterator
- Type: cdktf.ITerraformIterator
lifecycle: TerraformResourceLifecycle
- Type: cdktf.TerraformResourceLifecycle
provider: TerraformProvider
- Type: cdktf.TerraformProvider
provisioners: typing.List[typing.Union[FileProvisioner, LocalExecProvisioner, RemoteExecProvisioner]]
- Type: typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
address_input: str
- Type: str
bootstrap_input: typing.Union[bool, IResolvable]
- Type: typing.Union[bool, cdktf.IResolvable]
ca_cert_input: str
- Type: str
client_cert_input: str
- Type: str
client_key_input: str
- Type: str
default_lease_ttl_seconds_input: typing.Union[int, float]
- Type: typing.Union[int, float]
description_input: str
- Type: str
disable_remount_input: typing.Union[bool, IResolvable]
- Type: typing.Union[bool, cdktf.IResolvable]
id_input: str
- Type: str
local_input: typing.Union[bool, IResolvable]
- Type: typing.Union[bool, cdktf.IResolvable]
max_lease_ttl_seconds_input: typing.Union[int, float]
- Type: typing.Union[int, float]
namespace_input: str
- Type: str
path_input: str
- Type: str
scheme_input: str
- Type: str
token_input: str
- Type: str
address: str
- Type: str
bootstrap: typing.Union[bool, IResolvable]
- Type: typing.Union[bool, cdktf.IResolvable]
ca_cert: str
- Type: str
client_cert: str
- Type: str
client_key: str
- Type: str
default_lease_ttl_seconds: typing.Union[int, float]
- Type: typing.Union[int, float]
description: str
- Type: str
disable_remount: typing.Union[bool, IResolvable]
- Type: typing.Union[bool, cdktf.IResolvable]
id: str
- Type: str
local: typing.Union[bool, IResolvable]
- Type: typing.Union[bool, cdktf.IResolvable]
max_lease_ttl_seconds: typing.Union[int, float]
- Type: typing.Union[int, float]
namespace: str
- Type: str
path: str
- Type: str
scheme: str
- Type: str
token: str
- Type: str
Name | Type | Description |
---|---|---|
tfResourceType |
str |
No description. |
tfResourceType: str
- Type: str
from cdktf_cdktf_provider_vault import consul_secret_backend
consulSecretBackend.ConsulSecretBackendConfig(
connection: typing.Union[SSHProvisionerConnection, WinrmProvisionerConnection] = None,
count: typing.Union[typing.Union[int, float], TerraformCount] = None,
depends_on: typing.List[ITerraformDependable] = None,
for_each: ITerraformIterator = None,
lifecycle: TerraformResourceLifecycle = None,
provider: TerraformProvider = None,
provisioners: typing.List[typing.Union[FileProvisioner, LocalExecProvisioner, RemoteExecProvisioner]] = None,
address: str,
bootstrap: typing.Union[bool, IResolvable] = None,
ca_cert: str = None,
client_cert: str = None,
client_key: str = None,
default_lease_ttl_seconds: typing.Union[int, float] = None,
description: str = None,
disable_remount: typing.Union[bool, IResolvable] = None,
id: str = None,
local: typing.Union[bool, IResolvable] = None,
max_lease_ttl_seconds: typing.Union[int, float] = None,
namespace: str = None,
path: str = None,
scheme: str = None,
token: str = None
)
Name | Type | Description |
---|---|---|
connection |
typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection] |
No description. |
count |
typing.Union[typing.Union[int, float], cdktf.TerraformCount] |
No description. |
depends_on |
typing.List[cdktf.ITerraformDependable] |
No description. |
for_each |
cdktf.ITerraformIterator |
No description. |
lifecycle |
cdktf.TerraformResourceLifecycle |
No description. |
provider |
cdktf.TerraformProvider |
No description. |
provisioners |
typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] |
No description. |
address |
str |
Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500". |
bootstrap |
typing.Union[bool, cdktf.IResolvable] |
Denotes a backend resource that is used to bootstrap the Consul ACL system. |
ca_cert |
str |
CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded. |
client_cert |
str |
Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key. |
client_key |
str |
Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert. |
default_lease_ttl_seconds |
typing.Union[int, float] |
Default lease duration for secrets in seconds. |
description |
str |
Human-friendly description of the mount for the backend. |
disable_remount |
typing.Union[bool, cdktf.IResolvable] |
If set, opts out of mount migration on path updates. |
id |
str |
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.2.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. |
local |
typing.Union[bool, cdktf.IResolvable] |
Specifies if the secret backend is local only. |
max_lease_ttl_seconds |
typing.Union[int, float] |
Maximum possible lease duration for secrets in seconds. |
namespace |
str |
Target namespace. (requires Enterprise). |
path |
str |
Unique name of the Vault Consul mount to configure. |
scheme |
str |
Specifies the URL scheme to use. Defaults to "http". |
token |
str |
Specifies the Consul token to use when managing or issuing new tokens. |
connection: typing.Union[SSHProvisionerConnection, WinrmProvisionerConnection]
- Type: typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection]
count: typing.Union[typing.Union[int, float], TerraformCount]
- Type: typing.Union[typing.Union[int, float], cdktf.TerraformCount]
depends_on: typing.List[ITerraformDependable]
- Type: typing.List[cdktf.ITerraformDependable]
for_each: ITerraformIterator
- Type: cdktf.ITerraformIterator
lifecycle: TerraformResourceLifecycle
- Type: cdktf.TerraformResourceLifecycle
provider: TerraformProvider
- Type: cdktf.TerraformProvider
provisioners: typing.List[typing.Union[FileProvisioner, LocalExecProvisioner, RemoteExecProvisioner]]
- Type: typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
address: str
- Type: str
Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.2.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address}
bootstrap: typing.Union[bool, IResolvable]
- Type: typing.Union[bool, cdktf.IResolvable]
Denotes a backend resource that is used to bootstrap the Consul ACL system.
Only one resource may be used to bootstrap.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.2.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap}
ca_cert: str
- Type: str
CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.2.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert}
client_cert: str
- Type: str
Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.2.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert}
client_key: str
- Type: str
Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.2.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key}
default_lease_ttl_seconds: typing.Union[int, float]
- Type: typing.Union[int, float]
Default lease duration for secrets in seconds.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.2.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds}
description: str
- Type: str
Human-friendly description of the mount for the backend.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.2.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description}
disable_remount: typing.Union[bool, IResolvable]
- Type: typing.Union[bool, cdktf.IResolvable]
If set, opts out of mount migration on path updates.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.2.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount}
id: str
- Type: str
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.2.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
local: typing.Union[bool, IResolvable]
- Type: typing.Union[bool, cdktf.IResolvable]
Specifies if the secret backend is local only.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.2.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local}
max_lease_ttl_seconds: typing.Union[int, float]
- Type: typing.Union[int, float]
Maximum possible lease duration for secrets in seconds.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.2.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds}
namespace: str
- Type: str
Target namespace. (requires Enterprise).
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.2.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace}
path: str
- Type: str
Unique name of the Vault Consul mount to configure.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.2.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path}
scheme: str
- Type: str
Specifies the URL scheme to use. Defaults to "http".
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.2.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme}
token: str
- Type: str
Specifies the Consul token to use when managing or issuing new tokens.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.2.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token}