Skip to main content
Version: 11 - TBD

VaultConfig

class flow_api.vault_config.VaultConfig(select=None, cls=None, init=None, by='name', allow_normal=True, allow_deleted=False, commit=False, bundle_id=<class 'flow_api.system.NotSet'>, bundle_name=<class 'flow_api.system.NotSet'>, check_hostname=<class 'flow_api.system.NotSet'>, client_cert=<class 'flow_api.system.NotSet'>, client_key=<class 'flow_api.system.NotSet'>, commit_message=<class 'flow_api.system.NotSet'>, description=<class 'flow_api.system.NotSet'>, engine_path=<class 'flow_api.system.NotSet'>, is_auto_renew_enabled=<class 'flow_api.system.NotSet'>, is_enabled=<class 'flow_api.system.NotSet'>, is_readonly=<class 'flow_api.system.NotSet'>, location_inheritance=<class 'flow_api.system.NotSet'>, name=<class 'flow_api.system.NotSet'>, password=<class 'flow_api.system.NotSet'>, project_id=<class 'flow_api.system.NotSet'>, project_name=<class 'flow_api.system.NotSet'>, server_ca=<class 'flow_api.system.NotSet'>, token=<class 'flow_api.system.NotSet'>, username=<class 'flow_api.system.NotSet'>, vault_url=<class 'flow_api.system.NotSet'>, verify_ssl=<class 'flow_api.system.NotSet'>, debug=False)

Base class: Resource

A configuration about a HashiCorp Vault which Cloudomation can access to fetch secrets.

Either a vault token or userpass authentication method can be used.

See the corresponding Resources class at VaultConfig

Parameters

NameTypeDescription
allow_deletedbool
allow_normalbool
bundle_idtyping.Union[ flow_api.system.NotSet, str, NoneType ]
bundle_nametyping.Union[ flow_api.system.NotSet, str, NoneType ]
bystr
check_hostnametyping.Union[ flow_api.system.NotSet, bool ]
client_certtyping.Union[ flow_api.system.NotSet, str, NoneType ]
client_keytyping.Union[ flow_api.system.NotSet, str, NoneType ]
clstyping.Union[ type, NoneType ]
commitbool
commit_messagetyping.Union[ flow_api.system.NotSet, str, NoneType ]
debugbool
descriptiontyping.Union[ flow_api.system.NotSet, str, NoneType ]
engine_pathtyping.Union[ flow_api.system.NotSet, str ]
inittyping.Union[ dict, NoneType ]
is_auto_renew_enabledtyping.Union[ flow_api.system.NotSet, bool ]
is_enabledtyping.Union[ flow_api.system.NotSet, bool ]
is_readonlytyping.Union[ flow_api.system.NotSet, bool ]
location_inheritancetyping.Union[ flow_api.system.NotSet, str, NoneType ]
nametyping.Union[ flow_api.system.NotSet, str ]
passwordtyping.Union[ flow_api.system.NotSet, str, NoneType ]
project_idtyping.Union[ flow_api.system.NotSet, str, NoneType ]
project_nametyping.Union[ flow_api.system.NotSet, str, NoneType ]
selecttyping.Union[ str, NoneType ]
server_catyping.Union[ flow_api.system.NotSet, str, NoneType ]
tokentyping.Union[ flow_api.system.NotSet, str, NoneType ]
usernametyping.Union[ flow_api.system.NotSet, str, NoneType ]
vault_urltyping.Union[ flow_api.system.NotSet, str, NoneType ]
verify_ssltyping.Union[ flow_api.system.NotSet, bool ]

Constants

RESOURCE = vault_config

Methods

add_record_metadata

add_record_tag

add_record_user

add_resource_wrapper

bundle

clone

commit

created_by_identity

delete

deleted_by_identity

exists

export

get

get_dict

git_log_list

git_restore

metadata

modified_by_identity

organization

project

record_log_list

record_metadata_list

record_tag_list

record_user_list

resource_wrapper_list

restore

save

workspace

write_secret