pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (192) hide show
  1. pulumi_vault/__init__.py +0 -26
  2. pulumi_vault/_inputs.py +20 -0
  3. pulumi_vault/ad/secret_backend.py +6 -2
  4. pulumi_vault/ad/secret_library.py +4 -2
  5. pulumi_vault/ad/secret_role.py +4 -0
  6. pulumi_vault/alicloud/auth_backend_role.py +192 -69
  7. pulumi_vault/approle/auth_backend_login.py +4 -0
  8. pulumi_vault/approle/auth_backend_role.py +186 -63
  9. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  10. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  11. pulumi_vault/audit.py +20 -12
  12. pulumi_vault/audit_request_header.py +6 -6
  13. pulumi_vault/auth_backend.py +0 -47
  14. pulumi_vault/aws/auth_backend_client.py +17 -253
  15. pulumi_vault/aws/auth_backend_config_identity.py +4 -0
  16. pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
  17. pulumi_vault/aws/auth_backend_login.py +8 -0
  18. pulumi_vault/aws/auth_backend_role.py +186 -63
  19. pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
  20. pulumi_vault/aws/auth_backend_sts_role.py +4 -0
  21. pulumi_vault/aws/secret_backend_role.py +4 -56
  22. pulumi_vault/aws/secret_backend_static_role.py +4 -2
  23. pulumi_vault/azure/auth_backend_config.py +10 -139
  24. pulumi_vault/azure/auth_backend_role.py +186 -63
  25. pulumi_vault/azure/backend.py +22 -217
  26. pulumi_vault/azure/backend_role.py +18 -14
  27. pulumi_vault/azure/get_access_credentials.py +4 -0
  28. pulumi_vault/cert_auth_backend_role.py +208 -75
  29. pulumi_vault/consul/secret_backend.py +18 -10
  30. pulumi_vault/consul/secret_backend_role.py +4 -2
  31. pulumi_vault/database/_inputs.py +784 -522
  32. pulumi_vault/database/outputs.py +784 -522
  33. pulumi_vault/database/secret_backend_connection.py +4 -2
  34. pulumi_vault/database/secret_backend_role.py +4 -4
  35. pulumi_vault/database/secret_backend_static_role.py +8 -10
  36. pulumi_vault/database/secrets_mount.py +4 -286
  37. pulumi_vault/egp_policy.py +8 -4
  38. pulumi_vault/gcp/auth_backend.py +18 -226
  39. pulumi_vault/gcp/auth_backend_role.py +264 -63
  40. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  41. pulumi_vault/gcp/secret_backend.py +9 -275
  42. pulumi_vault/gcp/secret_impersonated_account.py +14 -12
  43. pulumi_vault/gcp/secret_roleset.py +6 -4
  44. pulumi_vault/gcp/secret_static_account.py +16 -14
  45. pulumi_vault/generic/endpoint.py +8 -4
  46. pulumi_vault/generic/get_secret.py +4 -40
  47. pulumi_vault/get_auth_backend.py +4 -0
  48. pulumi_vault/get_auth_backends.py +8 -0
  49. pulumi_vault/get_namespace.py +12 -0
  50. pulumi_vault/get_namespaces.py +12 -4
  51. pulumi_vault/get_nomad_access_token.py +4 -0
  52. pulumi_vault/get_policy_document.py +8 -8
  53. pulumi_vault/get_raft_autopilot_state.py +4 -0
  54. pulumi_vault/github/auth_backend.py +4 -0
  55. pulumi_vault/github/team.py +6 -2
  56. pulumi_vault/github/user.py +6 -2
  57. pulumi_vault/identity/entity.py +8 -6
  58. pulumi_vault/identity/entity_alias.py +8 -6
  59. pulumi_vault/identity/entity_policies.py +12 -12
  60. pulumi_vault/identity/get_entity.py +4 -0
  61. pulumi_vault/identity/get_group.py +4 -0
  62. pulumi_vault/identity/get_oidc_client_creds.py +4 -2
  63. pulumi_vault/identity/get_oidc_openid_config.py +6 -10
  64. pulumi_vault/identity/get_oidc_public_keys.py +6 -10
  65. pulumi_vault/identity/group.py +42 -38
  66. pulumi_vault/identity/group_alias.py +4 -2
  67. pulumi_vault/identity/group_member_entity_ids.py +16 -12
  68. pulumi_vault/identity/group_member_group_ids.py +20 -24
  69. pulumi_vault/identity/group_policies.py +8 -4
  70. pulumi_vault/identity/mfa_duo.py +8 -4
  71. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  72. pulumi_vault/identity/mfa_okta.py +8 -4
  73. pulumi_vault/identity/mfa_pingid.py +4 -0
  74. pulumi_vault/identity/mfa_totp.py +4 -0
  75. pulumi_vault/identity/oidc.py +4 -0
  76. pulumi_vault/identity/oidc_assignment.py +6 -10
  77. pulumi_vault/identity/oidc_client.py +10 -10
  78. pulumi_vault/identity/oidc_key.py +12 -16
  79. pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
  80. pulumi_vault/identity/oidc_provider.py +16 -22
  81. pulumi_vault/identity/oidc_role.py +20 -28
  82. pulumi_vault/identity/oidc_scope.py +8 -6
  83. pulumi_vault/jwt/auth_backend.py +32 -20
  84. pulumi_vault/jwt/auth_backend_role.py +225 -91
  85. pulumi_vault/kmip/secret_backend.py +14 -10
  86. pulumi_vault/kmip/secret_role.py +4 -0
  87. pulumi_vault/kmip/secret_scope.py +4 -0
  88. pulumi_vault/kubernetes/auth_backend_config.py +4 -0
  89. pulumi_vault/kubernetes/auth_backend_role.py +172 -56
  90. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  91. pulumi_vault/kubernetes/secret_backend.py +8 -288
  92. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  93. pulumi_vault/kv/get_secret.py +4 -0
  94. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
  95. pulumi_vault/kv/get_secret_v2.py +0 -58
  96. pulumi_vault/kv/get_secrets_list.py +8 -4
  97. pulumi_vault/kv/get_secrets_list_v2.py +12 -14
  98. pulumi_vault/kv/secret.py +4 -0
  99. pulumi_vault/kv/secret_backend_v2.py +4 -0
  100. pulumi_vault/kv/secret_v2.py +4 -2
  101. pulumi_vault/ldap/auth_backend.py +161 -66
  102. pulumi_vault/ldap/auth_backend_group.py +4 -0
  103. pulumi_vault/ldap/auth_backend_user.py +4 -0
  104. pulumi_vault/ldap/secret_backend.py +8 -286
  105. pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
  106. pulumi_vault/ldap/secret_backend_library_set.py +4 -2
  107. pulumi_vault/ldap/secret_backend_static_role.py +4 -0
  108. pulumi_vault/managed/_inputs.py +132 -84
  109. pulumi_vault/managed/keys.py +28 -7
  110. pulumi_vault/managed/outputs.py +132 -84
  111. pulumi_vault/mfa_duo.py +6 -4
  112. pulumi_vault/mfa_okta.py +6 -4
  113. pulumi_vault/mfa_pingid.py +6 -4
  114. pulumi_vault/mfa_totp.py +12 -10
  115. pulumi_vault/mongodbatlas/secret_backend.py +4 -0
  116. pulumi_vault/mongodbatlas/secret_role.py +4 -2
  117. pulumi_vault/mount.py +42 -350
  118. pulumi_vault/nomad_secret_backend.py +8 -4
  119. pulumi_vault/nomad_secret_role.py +4 -0
  120. pulumi_vault/okta/_inputs.py +8 -8
  121. pulumi_vault/okta/auth_backend.py +10 -459
  122. pulumi_vault/okta/auth_backend_group.py +4 -0
  123. pulumi_vault/okta/auth_backend_user.py +4 -0
  124. pulumi_vault/okta/outputs.py +8 -8
  125. pulumi_vault/outputs.py +20 -0
  126. pulumi_vault/password_policy.py +8 -6
  127. pulumi_vault/pkisecret/__init__.py +0 -2
  128. pulumi_vault/pkisecret/_inputs.py +0 -30
  129. pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
  130. pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
  131. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  132. pulumi_vault/pkisecret/get_backend_key.py +6 -2
  133. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  134. pulumi_vault/pkisecret/outputs.py +0 -54
  135. pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
  136. pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
  137. pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
  138. pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
  139. pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
  140. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
  141. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
  142. pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
  143. pulumi_vault/pkisecret/secret_backend_role.py +4 -2
  144. pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
  145. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
  146. pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
  147. pulumi_vault/provider.py +8 -0
  148. pulumi_vault/pulumi-plugin.json +1 -2
  149. pulumi_vault/quota_lease_count.py +8 -53
  150. pulumi_vault/quota_rate_limit.py +4 -49
  151. pulumi_vault/rabbitmq/secret_backend.py +8 -4
  152. pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
  153. pulumi_vault/raft_autopilot.py +4 -0
  154. pulumi_vault/raft_snapshot_agent_config.py +304 -109
  155. pulumi_vault/rgp_policy.py +6 -2
  156. pulumi_vault/saml/auth_backend.py +12 -8
  157. pulumi_vault/saml/auth_backend_role.py +178 -64
  158. pulumi_vault/secrets/sync_association.py +10 -12
  159. pulumi_vault/secrets/sync_aws_destination.py +8 -6
  160. pulumi_vault/secrets/sync_azure_destination.py +12 -10
  161. pulumi_vault/secrets/sync_config.py +6 -2
  162. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  163. pulumi_vault/secrets/sync_gh_destination.py +8 -6
  164. pulumi_vault/secrets/sync_github_apps.py +8 -8
  165. pulumi_vault/secrets/sync_vercel_destination.py +8 -6
  166. pulumi_vault/ssh/_inputs.py +32 -6
  167. pulumi_vault/ssh/outputs.py +32 -6
  168. pulumi_vault/ssh/secret_backend_ca.py +4 -94
  169. pulumi_vault/ssh/secret_backend_role.py +4 -4
  170. pulumi_vault/terraformcloud/secret_backend.py +56 -0
  171. pulumi_vault/terraformcloud/secret_creds.py +17 -2
  172. pulumi_vault/terraformcloud/secret_role.py +69 -2
  173. pulumi_vault/token.py +18 -14
  174. pulumi_vault/tokenauth/auth_backend_role.py +180 -64
  175. pulumi_vault/transform/alphabet.py +6 -4
  176. pulumi_vault/transform/get_decode.py +4 -4
  177. pulumi_vault/transform/get_encode.py +4 -4
  178. pulumi_vault/transform/role.py +6 -4
  179. pulumi_vault/transform/template.py +4 -4
  180. pulumi_vault/transit/get_decrypt.py +20 -4
  181. pulumi_vault/transit/get_encrypt.py +14 -0
  182. pulumi_vault/transit/secret_backend_key.py +6 -6
  183. pulumi_vault/transit/secret_cache_config.py +4 -0
  184. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
  185. pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
  186. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
  187. pulumi_vault/pkisecret/backend_config_est.py +0 -614
  188. pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
  189. pulumi_vault/plugin.py +0 -590
  190. pulumi_vault/plugin_pinned_version.py +0 -293
  191. pulumi_vault-6.2.0.dist-info/RECORD +0 -256
  192. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -18,20 +18,16 @@ class SecretsMountArgs:
18
18
  def __init__(__self__, *,
19
19
  path: pulumi.Input[str],
20
20
  allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
21
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
22
21
  audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
23
22
  audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
24
23
  cassandras: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]]] = None,
25
24
  couchbases: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]]] = None,
26
25
  default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
27
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
28
26
  description: Optional[pulumi.Input[str]] = None,
29
27
  elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]]] = None,
30
28
  external_entropy_access: Optional[pulumi.Input[bool]] = None,
31
29
  hanas: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]]] = None,
32
- identity_token_key: Optional[pulumi.Input[str]] = None,
33
30
  influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]] = None,
34
- listing_visibility: Optional[pulumi.Input[str]] = None,
35
31
  local: Optional[pulumi.Input[bool]] = None,
36
32
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
37
33
  mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]]] = None,
@@ -44,8 +40,6 @@ class SecretsMountArgs:
44
40
  namespace: Optional[pulumi.Input[str]] = None,
45
41
  options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
46
42
  oracles: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]] = None,
47
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
48
- plugin_version: Optional[pulumi.Input[str]] = None,
49
43
  postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]]] = None,
50
44
  redis: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]]] = None,
51
45
  redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedisElasticachArgs']]]] = None,
@@ -58,7 +52,6 @@ class SecretsMountArgs:
58
52
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
59
53
 
60
54
  The following arguments are common to all database engines:
61
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
62
55
  :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
63
56
  :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
64
57
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]] cassandras: A nested block containing configuration options for Cassandra connections.
@@ -66,17 +59,14 @@ class SecretsMountArgs:
66
59
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]] couchbases: A nested block containing configuration options for Couchbase connections.
67
60
  *See Configuration Options for more info*
68
61
  :param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
69
- :param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
70
62
  :param pulumi.Input[str] description: Human-friendly description of the mount
71
63
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]] elasticsearches: A nested block containing configuration options for Elasticsearch connections.
72
64
  *See Configuration Options for more info*
73
65
  :param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
74
66
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]] hanas: A nested block containing configuration options for SAP HanaDB connections.
75
67
  *See Configuration Options for more info*
76
- :param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens
77
68
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]] influxdbs: A nested block containing configuration options for InfluxDB connections.
78
69
  *See Configuration Options for more info*
79
- :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
80
70
  :param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
81
71
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
82
72
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
@@ -97,8 +87,6 @@ class SecretsMountArgs:
97
87
  :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
98
88
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]] oracles: A nested block containing configuration options for Oracle connections.
99
89
  *See Configuration Options for more info*
100
- :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
101
- :param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
102
90
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]] postgresqls: A nested block containing configuration options for PostgreSQL connections.
103
91
  *See Configuration Options for more info*
104
92
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]] redis: A nested block containing configuration options for Redis connections.
@@ -114,8 +102,6 @@ class SecretsMountArgs:
114
102
  pulumi.set(__self__, "path", path)
115
103
  if allowed_managed_keys is not None:
116
104
  pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
117
- if allowed_response_headers is not None:
118
- pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
119
105
  if audit_non_hmac_request_keys is not None:
120
106
  pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
121
107
  if audit_non_hmac_response_keys is not None:
@@ -126,8 +112,6 @@ class SecretsMountArgs:
126
112
  pulumi.set(__self__, "couchbases", couchbases)
127
113
  if default_lease_ttl_seconds is not None:
128
114
  pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
129
- if delegated_auth_accessors is not None:
130
- pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
131
115
  if description is not None:
132
116
  pulumi.set(__self__, "description", description)
133
117
  if elasticsearches is not None:
@@ -136,12 +120,8 @@ class SecretsMountArgs:
136
120
  pulumi.set(__self__, "external_entropy_access", external_entropy_access)
137
121
  if hanas is not None:
138
122
  pulumi.set(__self__, "hanas", hanas)
139
- if identity_token_key is not None:
140
- pulumi.set(__self__, "identity_token_key", identity_token_key)
141
123
  if influxdbs is not None:
142
124
  pulumi.set(__self__, "influxdbs", influxdbs)
143
- if listing_visibility is not None:
144
- pulumi.set(__self__, "listing_visibility", listing_visibility)
145
125
  if local is not None:
146
126
  pulumi.set(__self__, "local", local)
147
127
  if max_lease_ttl_seconds is not None:
@@ -166,10 +146,6 @@ class SecretsMountArgs:
166
146
  pulumi.set(__self__, "options", options)
167
147
  if oracles is not None:
168
148
  pulumi.set(__self__, "oracles", oracles)
169
- if passthrough_request_headers is not None:
170
- pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
171
- if plugin_version is not None:
172
- pulumi.set(__self__, "plugin_version", plugin_version)
173
149
  if postgresqls is not None:
174
150
  pulumi.set(__self__, "postgresqls", postgresqls)
175
151
  if redis is not None:
@@ -209,18 +185,6 @@ class SecretsMountArgs:
209
185
  def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
210
186
  pulumi.set(self, "allowed_managed_keys", value)
211
187
 
212
- @property
213
- @pulumi.getter(name="allowedResponseHeaders")
214
- def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
215
- """
216
- List of headers to allow and pass from the request to the plugin
217
- """
218
- return pulumi.get(self, "allowed_response_headers")
219
-
220
- @allowed_response_headers.setter
221
- def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
222
- pulumi.set(self, "allowed_response_headers", value)
223
-
224
188
  @property
225
189
  @pulumi.getter(name="auditNonHmacRequestKeys")
226
190
  def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
@@ -283,18 +247,6 @@ class SecretsMountArgs:
283
247
  def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
284
248
  pulumi.set(self, "default_lease_ttl_seconds", value)
285
249
 
286
- @property
287
- @pulumi.getter(name="delegatedAuthAccessors")
288
- def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
289
- """
290
- List of headers to allow and pass from the request to the plugin
291
- """
292
- return pulumi.get(self, "delegated_auth_accessors")
293
-
294
- @delegated_auth_accessors.setter
295
- def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
296
- pulumi.set(self, "delegated_auth_accessors", value)
297
-
298
250
  @property
299
251
  @pulumi.getter
300
252
  def description(self) -> Optional[pulumi.Input[str]]:
@@ -345,18 +297,6 @@ class SecretsMountArgs:
345
297
  def hanas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]]]):
346
298
  pulumi.set(self, "hanas", value)
347
299
 
348
- @property
349
- @pulumi.getter(name="identityTokenKey")
350
- def identity_token_key(self) -> Optional[pulumi.Input[str]]:
351
- """
352
- The key to use for signing plugin workload identity tokens
353
- """
354
- return pulumi.get(self, "identity_token_key")
355
-
356
- @identity_token_key.setter
357
- def identity_token_key(self, value: Optional[pulumi.Input[str]]):
358
- pulumi.set(self, "identity_token_key", value)
359
-
360
300
  @property
361
301
  @pulumi.getter
362
302
  def influxdbs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]]:
@@ -370,18 +310,6 @@ class SecretsMountArgs:
370
310
  def influxdbs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]]):
371
311
  pulumi.set(self, "influxdbs", value)
372
312
 
373
- @property
374
- @pulumi.getter(name="listingVisibility")
375
- def listing_visibility(self) -> Optional[pulumi.Input[str]]:
376
- """
377
- Specifies whether to show this mount in the UI-specific listing endpoint
378
- """
379
- return pulumi.get(self, "listing_visibility")
380
-
381
- @listing_visibility.setter
382
- def listing_visibility(self, value: Optional[pulumi.Input[str]]):
383
- pulumi.set(self, "listing_visibility", value)
384
-
385
313
  @property
386
314
  @pulumi.getter
387
315
  def local(self) -> Optional[pulumi.Input[bool]]:
@@ -534,30 +462,6 @@ class SecretsMountArgs:
534
462
  def oracles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]]):
535
463
  pulumi.set(self, "oracles", value)
536
464
 
537
- @property
538
- @pulumi.getter(name="passthroughRequestHeaders")
539
- def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
540
- """
541
- List of headers to allow and pass from the request to the plugin
542
- """
543
- return pulumi.get(self, "passthrough_request_headers")
544
-
545
- @passthrough_request_headers.setter
546
- def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
547
- pulumi.set(self, "passthrough_request_headers", value)
548
-
549
- @property
550
- @pulumi.getter(name="pluginVersion")
551
- def plugin_version(self) -> Optional[pulumi.Input[str]]:
552
- """
553
- Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
554
- """
555
- return pulumi.get(self, "plugin_version")
556
-
557
- @plugin_version.setter
558
- def plugin_version(self, value: Optional[pulumi.Input[str]]):
559
- pulumi.set(self, "plugin_version", value)
560
-
561
465
  @property
562
466
  @pulumi.getter
563
467
  def postgresqls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]]]:
@@ -641,21 +545,17 @@ class _SecretsMountState:
641
545
  def __init__(__self__, *,
642
546
  accessor: Optional[pulumi.Input[str]] = None,
643
547
  allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
644
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
645
548
  audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
646
549
  audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
647
550
  cassandras: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]]] = None,
648
551
  couchbases: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]]] = None,
649
552
  default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
650
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
651
553
  description: Optional[pulumi.Input[str]] = None,
652
554
  elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]]] = None,
653
555
  engine_count: Optional[pulumi.Input[int]] = None,
654
556
  external_entropy_access: Optional[pulumi.Input[bool]] = None,
655
557
  hanas: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]]] = None,
656
- identity_token_key: Optional[pulumi.Input[str]] = None,
657
558
  influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]] = None,
658
- listing_visibility: Optional[pulumi.Input[str]] = None,
659
559
  local: Optional[pulumi.Input[bool]] = None,
660
560
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
661
561
  mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]]] = None,
@@ -668,9 +568,7 @@ class _SecretsMountState:
668
568
  namespace: Optional[pulumi.Input[str]] = None,
669
569
  options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
670
570
  oracles: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]] = None,
671
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
672
571
  path: Optional[pulumi.Input[str]] = None,
673
- plugin_version: Optional[pulumi.Input[str]] = None,
674
572
  postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]]] = None,
675
573
  redis: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]]] = None,
676
574
  redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedisElasticachArgs']]]] = None,
@@ -683,7 +581,6 @@ class _SecretsMountState:
683
581
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
684
582
 
685
583
  The following arguments are common to all database engines:
686
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
687
584
  :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
688
585
  :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
689
586
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]] cassandras: A nested block containing configuration options for Cassandra connections.
@@ -691,7 +588,6 @@ class _SecretsMountState:
691
588
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]] couchbases: A nested block containing configuration options for Couchbase connections.
692
589
  *See Configuration Options for more info*
693
590
  :param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
694
- :param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
695
591
  :param pulumi.Input[str] description: Human-friendly description of the mount
696
592
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]] elasticsearches: A nested block containing configuration options for Elasticsearch connections.
697
593
  *See Configuration Options for more info*
@@ -699,10 +595,8 @@ class _SecretsMountState:
699
595
  :param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
700
596
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]] hanas: A nested block containing configuration options for SAP HanaDB connections.
701
597
  *See Configuration Options for more info*
702
- :param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens
703
598
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]] influxdbs: A nested block containing configuration options for InfluxDB connections.
704
599
  *See Configuration Options for more info*
705
- :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
706
600
  :param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
707
601
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
708
602
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
@@ -723,9 +617,7 @@ class _SecretsMountState:
723
617
  :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
724
618
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]] oracles: A nested block containing configuration options for Oracle connections.
725
619
  *See Configuration Options for more info*
726
- :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
727
620
  :param pulumi.Input[str] path: Where the secret backend will be mounted
728
- :param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
729
621
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]] postgresqls: A nested block containing configuration options for PostgreSQL connections.
730
622
  *See Configuration Options for more info*
731
623
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]] redis: A nested block containing configuration options for Redis connections.
@@ -742,8 +634,6 @@ class _SecretsMountState:
742
634
  pulumi.set(__self__, "accessor", accessor)
743
635
  if allowed_managed_keys is not None:
744
636
  pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
745
- if allowed_response_headers is not None:
746
- pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
747
637
  if audit_non_hmac_request_keys is not None:
748
638
  pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
749
639
  if audit_non_hmac_response_keys is not None:
@@ -754,8 +644,6 @@ class _SecretsMountState:
754
644
  pulumi.set(__self__, "couchbases", couchbases)
755
645
  if default_lease_ttl_seconds is not None:
756
646
  pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
757
- if delegated_auth_accessors is not None:
758
- pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
759
647
  if description is not None:
760
648
  pulumi.set(__self__, "description", description)
761
649
  if elasticsearches is not None:
@@ -766,12 +654,8 @@ class _SecretsMountState:
766
654
  pulumi.set(__self__, "external_entropy_access", external_entropy_access)
767
655
  if hanas is not None:
768
656
  pulumi.set(__self__, "hanas", hanas)
769
- if identity_token_key is not None:
770
- pulumi.set(__self__, "identity_token_key", identity_token_key)
771
657
  if influxdbs is not None:
772
658
  pulumi.set(__self__, "influxdbs", influxdbs)
773
- if listing_visibility is not None:
774
- pulumi.set(__self__, "listing_visibility", listing_visibility)
775
659
  if local is not None:
776
660
  pulumi.set(__self__, "local", local)
777
661
  if max_lease_ttl_seconds is not None:
@@ -796,12 +680,8 @@ class _SecretsMountState:
796
680
  pulumi.set(__self__, "options", options)
797
681
  if oracles is not None:
798
682
  pulumi.set(__self__, "oracles", oracles)
799
- if passthrough_request_headers is not None:
800
- pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
801
683
  if path is not None:
802
684
  pulumi.set(__self__, "path", path)
803
- if plugin_version is not None:
804
- pulumi.set(__self__, "plugin_version", plugin_version)
805
685
  if postgresqls is not None:
806
686
  pulumi.set(__self__, "postgresqls", postgresqls)
807
687
  if redis is not None:
@@ -841,18 +721,6 @@ class _SecretsMountState:
841
721
  def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
842
722
  pulumi.set(self, "allowed_managed_keys", value)
843
723
 
844
- @property
845
- @pulumi.getter(name="allowedResponseHeaders")
846
- def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
847
- """
848
- List of headers to allow and pass from the request to the plugin
849
- """
850
- return pulumi.get(self, "allowed_response_headers")
851
-
852
- @allowed_response_headers.setter
853
- def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
854
- pulumi.set(self, "allowed_response_headers", value)
855
-
856
724
  @property
857
725
  @pulumi.getter(name="auditNonHmacRequestKeys")
858
726
  def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
@@ -915,18 +783,6 @@ class _SecretsMountState:
915
783
  def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
916
784
  pulumi.set(self, "default_lease_ttl_seconds", value)
917
785
 
918
- @property
919
- @pulumi.getter(name="delegatedAuthAccessors")
920
- def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
921
- """
922
- List of headers to allow and pass from the request to the plugin
923
- """
924
- return pulumi.get(self, "delegated_auth_accessors")
925
-
926
- @delegated_auth_accessors.setter
927
- def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
928
- pulumi.set(self, "delegated_auth_accessors", value)
929
-
930
786
  @property
931
787
  @pulumi.getter
932
788
  def description(self) -> Optional[pulumi.Input[str]]:
@@ -989,18 +845,6 @@ class _SecretsMountState:
989
845
  def hanas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]]]):
990
846
  pulumi.set(self, "hanas", value)
991
847
 
992
- @property
993
- @pulumi.getter(name="identityTokenKey")
994
- def identity_token_key(self) -> Optional[pulumi.Input[str]]:
995
- """
996
- The key to use for signing plugin workload identity tokens
997
- """
998
- return pulumi.get(self, "identity_token_key")
999
-
1000
- @identity_token_key.setter
1001
- def identity_token_key(self, value: Optional[pulumi.Input[str]]):
1002
- pulumi.set(self, "identity_token_key", value)
1003
-
1004
848
  @property
1005
849
  @pulumi.getter
1006
850
  def influxdbs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]]:
@@ -1014,18 +858,6 @@ class _SecretsMountState:
1014
858
  def influxdbs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]]):
1015
859
  pulumi.set(self, "influxdbs", value)
1016
860
 
1017
- @property
1018
- @pulumi.getter(name="listingVisibility")
1019
- def listing_visibility(self) -> Optional[pulumi.Input[str]]:
1020
- """
1021
- Specifies whether to show this mount in the UI-specific listing endpoint
1022
- """
1023
- return pulumi.get(self, "listing_visibility")
1024
-
1025
- @listing_visibility.setter
1026
- def listing_visibility(self, value: Optional[pulumi.Input[str]]):
1027
- pulumi.set(self, "listing_visibility", value)
1028
-
1029
861
  @property
1030
862
  @pulumi.getter
1031
863
  def local(self) -> Optional[pulumi.Input[bool]]:
@@ -1178,18 +1010,6 @@ class _SecretsMountState:
1178
1010
  def oracles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]]):
1179
1011
  pulumi.set(self, "oracles", value)
1180
1012
 
1181
- @property
1182
- @pulumi.getter(name="passthroughRequestHeaders")
1183
- def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
1184
- """
1185
- List of headers to allow and pass from the request to the plugin
1186
- """
1187
- return pulumi.get(self, "passthrough_request_headers")
1188
-
1189
- @passthrough_request_headers.setter
1190
- def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
1191
- pulumi.set(self, "passthrough_request_headers", value)
1192
-
1193
1013
  @property
1194
1014
  @pulumi.getter
1195
1015
  def path(self) -> Optional[pulumi.Input[str]]:
@@ -1202,18 +1022,6 @@ class _SecretsMountState:
1202
1022
  def path(self, value: Optional[pulumi.Input[str]]):
1203
1023
  pulumi.set(self, "path", value)
1204
1024
 
1205
- @property
1206
- @pulumi.getter(name="pluginVersion")
1207
- def plugin_version(self) -> Optional[pulumi.Input[str]]:
1208
- """
1209
- Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1210
- """
1211
- return pulumi.get(self, "plugin_version")
1212
-
1213
- @plugin_version.setter
1214
- def plugin_version(self, value: Optional[pulumi.Input[str]]):
1215
- pulumi.set(self, "plugin_version", value)
1216
-
1217
1025
  @property
1218
1026
  @pulumi.getter
1219
1027
  def postgresqls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]]]:
@@ -1298,20 +1106,16 @@ class SecretsMount(pulumi.CustomResource):
1298
1106
  resource_name: str,
1299
1107
  opts: Optional[pulumi.ResourceOptions] = None,
1300
1108
  allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1301
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1302
1109
  audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1303
1110
  audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1304
1111
  cassandras: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountCassandraArgs']]]]] = None,
1305
1112
  couchbases: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountCouchbaseArgs']]]]] = None,
1306
1113
  default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1307
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1308
1114
  description: Optional[pulumi.Input[str]] = None,
1309
1115
  elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountElasticsearchArgs']]]]] = None,
1310
1116
  external_entropy_access: Optional[pulumi.Input[bool]] = None,
1311
1117
  hanas: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountHanaArgs']]]]] = None,
1312
- identity_token_key: Optional[pulumi.Input[str]] = None,
1313
1118
  influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountInfluxdbArgs']]]]] = None,
1314
- listing_visibility: Optional[pulumi.Input[str]] = None,
1315
1119
  local: Optional[pulumi.Input[bool]] = None,
1316
1120
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1317
1121
  mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMongodbatlaArgs']]]]] = None,
@@ -1324,9 +1128,7 @@ class SecretsMount(pulumi.CustomResource):
1324
1128
  namespace: Optional[pulumi.Input[str]] = None,
1325
1129
  options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1326
1130
  oracles: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountOracleArgs']]]]] = None,
1327
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1328
1131
  path: Optional[pulumi.Input[str]] = None,
1329
- plugin_version: Optional[pulumi.Input[str]] = None,
1330
1132
  postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountPostgresqlArgs']]]]] = None,
1331
1133
  redis: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountRediArgs']]]]] = None,
1332
1134
  redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountRedisElasticachArgs']]]]] = None,
@@ -1337,6 +1139,7 @@ class SecretsMount(pulumi.CustomResource):
1337
1139
  """
1338
1140
  ## Example Usage
1339
1141
 
1142
+ <!--Start PulumiCodeChooser -->
1340
1143
  ```python
1341
1144
  import pulumi
1342
1145
  import pulumi_vault as vault
@@ -1359,7 +1162,6 @@ class SecretsMount(pulumi.CustomResource):
1359
1162
  allowed_roles=["dev2"],
1360
1163
  )])
1361
1164
  dev1 = vault.database.SecretBackendRole("dev1",
1362
- name="dev1",
1363
1165
  backend=db.path,
1364
1166
  db_name=db.mssqls[0].name,
1365
1167
  creation_statements=[
@@ -1368,7 +1170,6 @@ class SecretsMount(pulumi.CustomResource):
1368
1170
  "GRANT SELECT ON SCHEMA::dbo TO [{{name}}];",
1369
1171
  ])
1370
1172
  dev2 = vault.database.SecretBackendRole("dev2",
1371
- name="dev2",
1372
1173
  backend=db.path,
1373
1174
  db_name=db.postgresqls[0].name,
1374
1175
  creation_statements=[
@@ -1376,6 +1177,7 @@ class SecretsMount(pulumi.CustomResource):
1376
1177
  "GRANT SELECT ON ALL TABLES IN SCHEMA public TO \\"{{name}}\\";",
1377
1178
  ])
1378
1179
  ```
1180
+ <!--End PulumiCodeChooser -->
1379
1181
 
1380
1182
  ## Import
1381
1183
 
@@ -1390,7 +1192,6 @@ class SecretsMount(pulumi.CustomResource):
1390
1192
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
1391
1193
 
1392
1194
  The following arguments are common to all database engines:
1393
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1394
1195
  :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1395
1196
  :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1396
1197
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountCassandraArgs']]]] cassandras: A nested block containing configuration options for Cassandra connections.
@@ -1398,17 +1199,14 @@ class SecretsMount(pulumi.CustomResource):
1398
1199
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountCouchbaseArgs']]]] couchbases: A nested block containing configuration options for Couchbase connections.
1399
1200
  *See Configuration Options for more info*
1400
1201
  :param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
1401
- :param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1402
1202
  :param pulumi.Input[str] description: Human-friendly description of the mount
1403
1203
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountElasticsearchArgs']]]] elasticsearches: A nested block containing configuration options for Elasticsearch connections.
1404
1204
  *See Configuration Options for more info*
1405
1205
  :param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
1406
1206
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountHanaArgs']]]] hanas: A nested block containing configuration options for SAP HanaDB connections.
1407
1207
  *See Configuration Options for more info*
1408
- :param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens
1409
1208
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountInfluxdbArgs']]]] influxdbs: A nested block containing configuration options for InfluxDB connections.
1410
1209
  *See Configuration Options for more info*
1411
- :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1412
1210
  :param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
1413
1211
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
1414
1212
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMongodbatlaArgs']]]] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
@@ -1429,9 +1227,7 @@ class SecretsMount(pulumi.CustomResource):
1429
1227
  :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
1430
1228
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountOracleArgs']]]] oracles: A nested block containing configuration options for Oracle connections.
1431
1229
  *See Configuration Options for more info*
1432
- :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1433
1230
  :param pulumi.Input[str] path: Where the secret backend will be mounted
1434
- :param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1435
1231
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountPostgresqlArgs']]]] postgresqls: A nested block containing configuration options for PostgreSQL connections.
1436
1232
  *See Configuration Options for more info*
1437
1233
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountRediArgs']]]] redis: A nested block containing configuration options for Redis connections.
@@ -1453,6 +1249,7 @@ class SecretsMount(pulumi.CustomResource):
1453
1249
  """
1454
1250
  ## Example Usage
1455
1251
 
1252
+ <!--Start PulumiCodeChooser -->
1456
1253
  ```python
1457
1254
  import pulumi
1458
1255
  import pulumi_vault as vault
@@ -1475,7 +1272,6 @@ class SecretsMount(pulumi.CustomResource):
1475
1272
  allowed_roles=["dev2"],
1476
1273
  )])
1477
1274
  dev1 = vault.database.SecretBackendRole("dev1",
1478
- name="dev1",
1479
1275
  backend=db.path,
1480
1276
  db_name=db.mssqls[0].name,
1481
1277
  creation_statements=[
@@ -1484,7 +1280,6 @@ class SecretsMount(pulumi.CustomResource):
1484
1280
  "GRANT SELECT ON SCHEMA::dbo TO [{{name}}];",
1485
1281
  ])
1486
1282
  dev2 = vault.database.SecretBackendRole("dev2",
1487
- name="dev2",
1488
1283
  backend=db.path,
1489
1284
  db_name=db.postgresqls[0].name,
1490
1285
  creation_statements=[
@@ -1492,6 +1287,7 @@ class SecretsMount(pulumi.CustomResource):
1492
1287
  "GRANT SELECT ON ALL TABLES IN SCHEMA public TO \\"{{name}}\\";",
1493
1288
  ])
1494
1289
  ```
1290
+ <!--End PulumiCodeChooser -->
1495
1291
 
1496
1292
  ## Import
1497
1293
 
@@ -1517,20 +1313,16 @@ class SecretsMount(pulumi.CustomResource):
1517
1313
  resource_name: str,
1518
1314
  opts: Optional[pulumi.ResourceOptions] = None,
1519
1315
  allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1520
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1521
1316
  audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1522
1317
  audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1523
1318
  cassandras: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountCassandraArgs']]]]] = None,
1524
1319
  couchbases: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountCouchbaseArgs']]]]] = None,
1525
1320
  default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1526
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1527
1321
  description: Optional[pulumi.Input[str]] = None,
1528
1322
  elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountElasticsearchArgs']]]]] = None,
1529
1323
  external_entropy_access: Optional[pulumi.Input[bool]] = None,
1530
1324
  hanas: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountHanaArgs']]]]] = None,
1531
- identity_token_key: Optional[pulumi.Input[str]] = None,
1532
1325
  influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountInfluxdbArgs']]]]] = None,
1533
- listing_visibility: Optional[pulumi.Input[str]] = None,
1534
1326
  local: Optional[pulumi.Input[bool]] = None,
1535
1327
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1536
1328
  mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMongodbatlaArgs']]]]] = None,
@@ -1543,9 +1335,7 @@ class SecretsMount(pulumi.CustomResource):
1543
1335
  namespace: Optional[pulumi.Input[str]] = None,
1544
1336
  options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1545
1337
  oracles: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountOracleArgs']]]]] = None,
1546
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1547
1338
  path: Optional[pulumi.Input[str]] = None,
1548
- plugin_version: Optional[pulumi.Input[str]] = None,
1549
1339
  postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountPostgresqlArgs']]]]] = None,
1550
1340
  redis: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountRediArgs']]]]] = None,
1551
1341
  redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountRedisElasticachArgs']]]]] = None,
@@ -1562,20 +1352,16 @@ class SecretsMount(pulumi.CustomResource):
1562
1352
  __props__ = SecretsMountArgs.__new__(SecretsMountArgs)
1563
1353
 
1564
1354
  __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1565
- __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1566
1355
  __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1567
1356
  __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
1568
1357
  __props__.__dict__["cassandras"] = cassandras
1569
1358
  __props__.__dict__["couchbases"] = couchbases
1570
1359
  __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1571
- __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
1572
1360
  __props__.__dict__["description"] = description
1573
1361
  __props__.__dict__["elasticsearches"] = elasticsearches
1574
1362
  __props__.__dict__["external_entropy_access"] = external_entropy_access
1575
1363
  __props__.__dict__["hanas"] = hanas
1576
- __props__.__dict__["identity_token_key"] = identity_token_key
1577
1364
  __props__.__dict__["influxdbs"] = influxdbs
1578
- __props__.__dict__["listing_visibility"] = listing_visibility
1579
1365
  __props__.__dict__["local"] = local
1580
1366
  __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
1581
1367
  __props__.__dict__["mongodbatlas"] = mongodbatlas
@@ -1588,11 +1374,9 @@ class SecretsMount(pulumi.CustomResource):
1588
1374
  __props__.__dict__["namespace"] = namespace
1589
1375
  __props__.__dict__["options"] = options
1590
1376
  __props__.__dict__["oracles"] = oracles
1591
- __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
1592
1377
  if path is None and not opts.urn:
1593
1378
  raise TypeError("Missing required property 'path'")
1594
1379
  __props__.__dict__["path"] = path
1595
- __props__.__dict__["plugin_version"] = plugin_version
1596
1380
  __props__.__dict__["postgresqls"] = postgresqls
1597
1381
  __props__.__dict__["redis"] = redis
1598
1382
  __props__.__dict__["redis_elasticaches"] = redis_elasticaches
@@ -1613,21 +1397,17 @@ class SecretsMount(pulumi.CustomResource):
1613
1397
  opts: Optional[pulumi.ResourceOptions] = None,
1614
1398
  accessor: Optional[pulumi.Input[str]] = None,
1615
1399
  allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1616
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1617
1400
  audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1618
1401
  audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1619
1402
  cassandras: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountCassandraArgs']]]]] = None,
1620
1403
  couchbases: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountCouchbaseArgs']]]]] = None,
1621
1404
  default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1622
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1623
1405
  description: Optional[pulumi.Input[str]] = None,
1624
1406
  elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountElasticsearchArgs']]]]] = None,
1625
1407
  engine_count: Optional[pulumi.Input[int]] = None,
1626
1408
  external_entropy_access: Optional[pulumi.Input[bool]] = None,
1627
1409
  hanas: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountHanaArgs']]]]] = None,
1628
- identity_token_key: Optional[pulumi.Input[str]] = None,
1629
1410
  influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountInfluxdbArgs']]]]] = None,
1630
- listing_visibility: Optional[pulumi.Input[str]] = None,
1631
1411
  local: Optional[pulumi.Input[bool]] = None,
1632
1412
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1633
1413
  mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMongodbatlaArgs']]]]] = None,
@@ -1640,9 +1420,7 @@ class SecretsMount(pulumi.CustomResource):
1640
1420
  namespace: Optional[pulumi.Input[str]] = None,
1641
1421
  options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1642
1422
  oracles: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountOracleArgs']]]]] = None,
1643
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1644
1423
  path: Optional[pulumi.Input[str]] = None,
1645
- plugin_version: Optional[pulumi.Input[str]] = None,
1646
1424
  postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountPostgresqlArgs']]]]] = None,
1647
1425
  redis: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountRediArgs']]]]] = None,
1648
1426
  redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountRedisElasticachArgs']]]]] = None,
@@ -1660,7 +1438,6 @@ class SecretsMount(pulumi.CustomResource):
1660
1438
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
1661
1439
 
1662
1440
  The following arguments are common to all database engines:
1663
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1664
1441
  :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1665
1442
  :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1666
1443
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountCassandraArgs']]]] cassandras: A nested block containing configuration options for Cassandra connections.
@@ -1668,7 +1445,6 @@ class SecretsMount(pulumi.CustomResource):
1668
1445
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountCouchbaseArgs']]]] couchbases: A nested block containing configuration options for Couchbase connections.
1669
1446
  *See Configuration Options for more info*
1670
1447
  :param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
1671
- :param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1672
1448
  :param pulumi.Input[str] description: Human-friendly description of the mount
1673
1449
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountElasticsearchArgs']]]] elasticsearches: A nested block containing configuration options for Elasticsearch connections.
1674
1450
  *See Configuration Options for more info*
@@ -1676,10 +1452,8 @@ class SecretsMount(pulumi.CustomResource):
1676
1452
  :param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
1677
1453
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountHanaArgs']]]] hanas: A nested block containing configuration options for SAP HanaDB connections.
1678
1454
  *See Configuration Options for more info*
1679
- :param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens
1680
1455
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountInfluxdbArgs']]]] influxdbs: A nested block containing configuration options for InfluxDB connections.
1681
1456
  *See Configuration Options for more info*
1682
- :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1683
1457
  :param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
1684
1458
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
1685
1459
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMongodbatlaArgs']]]] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
@@ -1700,9 +1474,7 @@ class SecretsMount(pulumi.CustomResource):
1700
1474
  :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
1701
1475
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountOracleArgs']]]] oracles: A nested block containing configuration options for Oracle connections.
1702
1476
  *See Configuration Options for more info*
1703
- :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1704
1477
  :param pulumi.Input[str] path: Where the secret backend will be mounted
1705
- :param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1706
1478
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountPostgresqlArgs']]]] postgresqls: A nested block containing configuration options for PostgreSQL connections.
1707
1479
  *See Configuration Options for more info*
1708
1480
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountRediArgs']]]] redis: A nested block containing configuration options for Redis connections.
@@ -1721,21 +1493,17 @@ class SecretsMount(pulumi.CustomResource):
1721
1493
 
1722
1494
  __props__.__dict__["accessor"] = accessor
1723
1495
  __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1724
- __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1725
1496
  __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1726
1497
  __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
1727
1498
  __props__.__dict__["cassandras"] = cassandras
1728
1499
  __props__.__dict__["couchbases"] = couchbases
1729
1500
  __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1730
- __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
1731
1501
  __props__.__dict__["description"] = description
1732
1502
  __props__.__dict__["elasticsearches"] = elasticsearches
1733
1503
  __props__.__dict__["engine_count"] = engine_count
1734
1504
  __props__.__dict__["external_entropy_access"] = external_entropy_access
1735
1505
  __props__.__dict__["hanas"] = hanas
1736
- __props__.__dict__["identity_token_key"] = identity_token_key
1737
1506
  __props__.__dict__["influxdbs"] = influxdbs
1738
- __props__.__dict__["listing_visibility"] = listing_visibility
1739
1507
  __props__.__dict__["local"] = local
1740
1508
  __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
1741
1509
  __props__.__dict__["mongodbatlas"] = mongodbatlas
@@ -1748,9 +1516,7 @@ class SecretsMount(pulumi.CustomResource):
1748
1516
  __props__.__dict__["namespace"] = namespace
1749
1517
  __props__.__dict__["options"] = options
1750
1518
  __props__.__dict__["oracles"] = oracles
1751
- __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
1752
1519
  __props__.__dict__["path"] = path
1753
- __props__.__dict__["plugin_version"] = plugin_version
1754
1520
  __props__.__dict__["postgresqls"] = postgresqls
1755
1521
  __props__.__dict__["redis"] = redis
1756
1522
  __props__.__dict__["redis_elasticaches"] = redis_elasticaches
@@ -1777,14 +1543,6 @@ class SecretsMount(pulumi.CustomResource):
1777
1543
  """
1778
1544
  return pulumi.get(self, "allowed_managed_keys")
1779
1545
 
1780
- @property
1781
- @pulumi.getter(name="allowedResponseHeaders")
1782
- def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[str]]]:
1783
- """
1784
- List of headers to allow and pass from the request to the plugin
1785
- """
1786
- return pulumi.get(self, "allowed_response_headers")
1787
-
1788
1546
  @property
1789
1547
  @pulumi.getter(name="auditNonHmacRequestKeys")
1790
1548
  def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[str]]:
@@ -1827,14 +1585,6 @@ class SecretsMount(pulumi.CustomResource):
1827
1585
  """
1828
1586
  return pulumi.get(self, "default_lease_ttl_seconds")
1829
1587
 
1830
- @property
1831
- @pulumi.getter(name="delegatedAuthAccessors")
1832
- def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[str]]]:
1833
- """
1834
- List of headers to allow and pass from the request to the plugin
1835
- """
1836
- return pulumi.get(self, "delegated_auth_accessors")
1837
-
1838
1588
  @property
1839
1589
  @pulumi.getter
1840
1590
  def description(self) -> pulumi.Output[Optional[str]]:
@@ -1877,14 +1627,6 @@ class SecretsMount(pulumi.CustomResource):
1877
1627
  """
1878
1628
  return pulumi.get(self, "hanas")
1879
1629
 
1880
- @property
1881
- @pulumi.getter(name="identityTokenKey")
1882
- def identity_token_key(self) -> pulumi.Output[Optional[str]]:
1883
- """
1884
- The key to use for signing plugin workload identity tokens
1885
- """
1886
- return pulumi.get(self, "identity_token_key")
1887
-
1888
1630
  @property
1889
1631
  @pulumi.getter
1890
1632
  def influxdbs(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountInfluxdb']]]:
@@ -1894,14 +1636,6 @@ class SecretsMount(pulumi.CustomResource):
1894
1636
  """
1895
1637
  return pulumi.get(self, "influxdbs")
1896
1638
 
1897
- @property
1898
- @pulumi.getter(name="listingVisibility")
1899
- def listing_visibility(self) -> pulumi.Output[Optional[str]]:
1900
- """
1901
- Specifies whether to show this mount in the UI-specific listing endpoint
1902
- """
1903
- return pulumi.get(self, "listing_visibility")
1904
-
1905
1639
  @property
1906
1640
  @pulumi.getter
1907
1641
  def local(self) -> pulumi.Output[Optional[bool]]:
@@ -2006,14 +1740,6 @@ class SecretsMount(pulumi.CustomResource):
2006
1740
  """
2007
1741
  return pulumi.get(self, "oracles")
2008
1742
 
2009
- @property
2010
- @pulumi.getter(name="passthroughRequestHeaders")
2011
- def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[str]]]:
2012
- """
2013
- List of headers to allow and pass from the request to the plugin
2014
- """
2015
- return pulumi.get(self, "passthrough_request_headers")
2016
-
2017
1743
  @property
2018
1744
  @pulumi.getter
2019
1745
  def path(self) -> pulumi.Output[str]:
@@ -2022,14 +1748,6 @@ class SecretsMount(pulumi.CustomResource):
2022
1748
  """
2023
1749
  return pulumi.get(self, "path")
2024
1750
 
2025
- @property
2026
- @pulumi.getter(name="pluginVersion")
2027
- def plugin_version(self) -> pulumi.Output[Optional[str]]:
2028
- """
2029
- Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
2030
- """
2031
- return pulumi.get(self, "plugin_version")
2032
-
2033
1751
  @property
2034
1752
  @pulumi.getter
2035
1753
  def postgresqls(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountPostgresql']]]: