pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -21,24 +22,24 @@ __all__ = ['SecretsMountArgs', 'SecretsMount']
21
22
  @pulumi.input_type
22
23
  class SecretsMountArgs:
23
24
  def __init__(__self__, *,
24
- path: pulumi.Input[str],
25
- allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
26
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
27
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
28
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
25
+ path: pulumi.Input[builtins.str],
26
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
27
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
28
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
29
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
29
30
  cassandras: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]]] = None,
30
31
  couchbases: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]]] = None,
31
- default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
32
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
33
- description: Optional[pulumi.Input[str]] = None,
32
+ default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
33
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
34
+ description: Optional[pulumi.Input[builtins.str]] = None,
34
35
  elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]]] = None,
35
- external_entropy_access: Optional[pulumi.Input[bool]] = None,
36
+ external_entropy_access: Optional[pulumi.Input[builtins.bool]] = None,
36
37
  hanas: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]]] = None,
37
- identity_token_key: Optional[pulumi.Input[str]] = None,
38
+ identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
38
39
  influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]] = None,
39
- listing_visibility: Optional[pulumi.Input[str]] = None,
40
- local: Optional[pulumi.Input[bool]] = None,
41
- max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
40
+ listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
41
+ local: Optional[pulumi.Input[builtins.bool]] = None,
42
+ max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
42
43
  mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]]] = None,
43
44
  mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]]] = None,
44
45
  mssqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMssqlArgs']]]] = None,
@@ -46,44 +47,44 @@ class SecretsMountArgs:
46
47
  mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlLegacyArgs']]]] = None,
47
48
  mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]] = None,
48
49
  mysqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]] = None,
49
- namespace: Optional[pulumi.Input[str]] = None,
50
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
50
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
51
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
51
52
  oracles: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]] = None,
52
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
53
- plugin_version: Optional[pulumi.Input[str]] = None,
53
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
54
+ plugin_version: Optional[pulumi.Input[builtins.str]] = None,
54
55
  postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]]] = None,
55
56
  redis: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]]] = None,
56
57
  redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedisElasticachArgs']]]] = None,
57
58
  redshifts: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]]] = None,
58
- seal_wrap: Optional[pulumi.Input[bool]] = None,
59
+ seal_wrap: Optional[pulumi.Input[builtins.bool]] = None,
59
60
  snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountSnowflakeArgs']]]] = None):
60
61
  """
61
62
  The set of arguments for constructing a SecretsMount resource.
62
- :param pulumi.Input[str] path: Where the secret backend will be mounted
63
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
63
+ :param pulumi.Input[builtins.str] path: Where the secret backend will be mounted
64
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
64
65
 
65
66
  The following arguments are common to all database engines:
66
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
67
- :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
68
- :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
67
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
68
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
69
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
69
70
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]] cassandras: A nested block containing configuration options for Cassandra connections.
70
71
  *See Configuration Options for more info*
71
72
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]] couchbases: A nested block containing configuration options for Couchbase connections.
72
73
  *See Configuration Options for more info*
73
- :param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
74
- :param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
75
- :param pulumi.Input[str] description: Human-friendly description of the mount
74
+ :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
75
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
76
+ :param pulumi.Input[builtins.str] description: Human-friendly description of the mount
76
77
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]] elasticsearches: A nested block containing configuration options for Elasticsearch connections.
77
78
  *See Configuration Options for more info*
78
- :param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
79
+ :param pulumi.Input[builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
79
80
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]] hanas: A nested block containing configuration options for SAP HanaDB connections.
80
81
  *See Configuration Options for more info*
81
- :param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens
82
+ :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
82
83
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]] influxdbs: A nested block containing configuration options for InfluxDB connections.
83
84
  *See Configuration Options for more info*
84
- :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
85
- :param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
86
- :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
85
+ :param pulumi.Input[builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
86
+ :param pulumi.Input[builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
87
+ :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
87
88
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
88
89
  *See Configuration Options for more info*
89
90
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]] mongodbs: A nested block containing configuration options for MongoDB connections.
@@ -98,12 +99,12 @@ class SecretsMountArgs:
98
99
  *See Configuration Options for more info*
99
100
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]] mysqls: A nested block containing configuration options for MySQL connections.
100
101
  *See Configuration Options for more info*
101
- :param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
102
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
102
+ :param pulumi.Input[builtins.str] namespace: Target namespace. (requires Enterprise)
103
+ :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] options: Specifies mount type specific options that are passed to the backend
103
104
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]] oracles: A nested block containing configuration options for Oracle connections.
104
105
  *See Configuration Options for more info*
105
- :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
106
- :param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
106
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
107
+ :param pulumi.Input[builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
107
108
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]] postgresqls: A nested block containing configuration options for PostgreSQL connections.
108
109
  *See Configuration Options for more info*
109
110
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]] redis: A nested block containing configuration options for Redis connections.
@@ -112,7 +113,7 @@ class SecretsMountArgs:
112
113
  *See Configuration Options for more info*
113
114
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]] redshifts: A nested block containing configuration options for AWS Redshift connections.
114
115
  *See Configuration Options for more info*
115
- :param pulumi.Input[bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
116
+ :param pulumi.Input[builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
116
117
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountSnowflakeArgs']]] snowflakes: A nested block containing configuration options for Snowflake connections.
117
118
  *See Configuration Options for more info*
118
119
  """
@@ -190,19 +191,19 @@ class SecretsMountArgs:
190
191
 
191
192
  @property
192
193
  @pulumi.getter
193
- def path(self) -> pulumi.Input[str]:
194
+ def path(self) -> pulumi.Input[builtins.str]:
194
195
  """
195
196
  Where the secret backend will be mounted
196
197
  """
197
198
  return pulumi.get(self, "path")
198
199
 
199
200
  @path.setter
200
- def path(self, value: pulumi.Input[str]):
201
+ def path(self, value: pulumi.Input[builtins.str]):
201
202
  pulumi.set(self, "path", value)
202
203
 
203
204
  @property
204
205
  @pulumi.getter(name="allowedManagedKeys")
205
- def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
206
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
206
207
  """
207
208
  Set of managed key registry entry names that the mount in question is allowed to access
208
209
 
@@ -211,43 +212,43 @@ class SecretsMountArgs:
211
212
  return pulumi.get(self, "allowed_managed_keys")
212
213
 
213
214
  @allowed_managed_keys.setter
214
- def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
215
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
215
216
  pulumi.set(self, "allowed_managed_keys", value)
216
217
 
217
218
  @property
218
219
  @pulumi.getter(name="allowedResponseHeaders")
219
- def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
220
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
220
221
  """
221
222
  List of headers to allow and pass from the request to the plugin
222
223
  """
223
224
  return pulumi.get(self, "allowed_response_headers")
224
225
 
225
226
  @allowed_response_headers.setter
226
- def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
227
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
227
228
  pulumi.set(self, "allowed_response_headers", value)
228
229
 
229
230
  @property
230
231
  @pulumi.getter(name="auditNonHmacRequestKeys")
231
- def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
232
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
232
233
  """
233
234
  Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
234
235
  """
235
236
  return pulumi.get(self, "audit_non_hmac_request_keys")
236
237
 
237
238
  @audit_non_hmac_request_keys.setter
238
- def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
239
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
239
240
  pulumi.set(self, "audit_non_hmac_request_keys", value)
240
241
 
241
242
  @property
242
243
  @pulumi.getter(name="auditNonHmacResponseKeys")
243
- def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
244
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
244
245
  """
245
246
  Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
246
247
  """
247
248
  return pulumi.get(self, "audit_non_hmac_response_keys")
248
249
 
249
250
  @audit_non_hmac_response_keys.setter
250
- def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
251
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
251
252
  pulumi.set(self, "audit_non_hmac_response_keys", value)
252
253
 
253
254
  @property
@@ -278,38 +279,38 @@ class SecretsMountArgs:
278
279
 
279
280
  @property
280
281
  @pulumi.getter(name="defaultLeaseTtlSeconds")
281
- def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[int]]:
282
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
282
283
  """
283
284
  Default lease duration for tokens and secrets in seconds
284
285
  """
285
286
  return pulumi.get(self, "default_lease_ttl_seconds")
286
287
 
287
288
  @default_lease_ttl_seconds.setter
288
- def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
289
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
289
290
  pulumi.set(self, "default_lease_ttl_seconds", value)
290
291
 
291
292
  @property
292
293
  @pulumi.getter(name="delegatedAuthAccessors")
293
- def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
294
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
294
295
  """
295
296
  List of headers to allow and pass from the request to the plugin
296
297
  """
297
298
  return pulumi.get(self, "delegated_auth_accessors")
298
299
 
299
300
  @delegated_auth_accessors.setter
300
- def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
301
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
301
302
  pulumi.set(self, "delegated_auth_accessors", value)
302
303
 
303
304
  @property
304
305
  @pulumi.getter
305
- def description(self) -> Optional[pulumi.Input[str]]:
306
+ def description(self) -> Optional[pulumi.Input[builtins.str]]:
306
307
  """
307
308
  Human-friendly description of the mount
308
309
  """
309
310
  return pulumi.get(self, "description")
310
311
 
311
312
  @description.setter
312
- def description(self, value: Optional[pulumi.Input[str]]):
313
+ def description(self, value: Optional[pulumi.Input[builtins.str]]):
313
314
  pulumi.set(self, "description", value)
314
315
 
315
316
  @property
@@ -327,14 +328,14 @@ class SecretsMountArgs:
327
328
 
328
329
  @property
329
330
  @pulumi.getter(name="externalEntropyAccess")
330
- def external_entropy_access(self) -> Optional[pulumi.Input[bool]]:
331
+ def external_entropy_access(self) -> Optional[pulumi.Input[builtins.bool]]:
331
332
  """
332
333
  Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
333
334
  """
334
335
  return pulumi.get(self, "external_entropy_access")
335
336
 
336
337
  @external_entropy_access.setter
337
- def external_entropy_access(self, value: Optional[pulumi.Input[bool]]):
338
+ def external_entropy_access(self, value: Optional[pulumi.Input[builtins.bool]]):
338
339
  pulumi.set(self, "external_entropy_access", value)
339
340
 
340
341
  @property
@@ -352,14 +353,14 @@ class SecretsMountArgs:
352
353
 
353
354
  @property
354
355
  @pulumi.getter(name="identityTokenKey")
355
- def identity_token_key(self) -> Optional[pulumi.Input[str]]:
356
+ def identity_token_key(self) -> Optional[pulumi.Input[builtins.str]]:
356
357
  """
357
358
  The key to use for signing plugin workload identity tokens
358
359
  """
359
360
  return pulumi.get(self, "identity_token_key")
360
361
 
361
362
  @identity_token_key.setter
362
- def identity_token_key(self, value: Optional[pulumi.Input[str]]):
363
+ def identity_token_key(self, value: Optional[pulumi.Input[builtins.str]]):
363
364
  pulumi.set(self, "identity_token_key", value)
364
365
 
365
366
  @property
@@ -377,38 +378,38 @@ class SecretsMountArgs:
377
378
 
378
379
  @property
379
380
  @pulumi.getter(name="listingVisibility")
380
- def listing_visibility(self) -> Optional[pulumi.Input[str]]:
381
+ def listing_visibility(self) -> Optional[pulumi.Input[builtins.str]]:
381
382
  """
382
383
  Specifies whether to show this mount in the UI-specific listing endpoint
383
384
  """
384
385
  return pulumi.get(self, "listing_visibility")
385
386
 
386
387
  @listing_visibility.setter
387
- def listing_visibility(self, value: Optional[pulumi.Input[str]]):
388
+ def listing_visibility(self, value: Optional[pulumi.Input[builtins.str]]):
388
389
  pulumi.set(self, "listing_visibility", value)
389
390
 
390
391
  @property
391
392
  @pulumi.getter
392
- def local(self) -> Optional[pulumi.Input[bool]]:
393
+ def local(self) -> Optional[pulumi.Input[builtins.bool]]:
393
394
  """
394
395
  Boolean flag that can be explicitly set to true to enforce local mount in HA environment
395
396
  """
396
397
  return pulumi.get(self, "local")
397
398
 
398
399
  @local.setter
399
- def local(self, value: Optional[pulumi.Input[bool]]):
400
+ def local(self, value: Optional[pulumi.Input[builtins.bool]]):
400
401
  pulumi.set(self, "local", value)
401
402
 
402
403
  @property
403
404
  @pulumi.getter(name="maxLeaseTtlSeconds")
404
- def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[int]]:
405
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
405
406
  """
406
407
  Maximum possible lease duration for tokens and secrets in seconds
407
408
  """
408
409
  return pulumi.get(self, "max_lease_ttl_seconds")
409
410
 
410
411
  @max_lease_ttl_seconds.setter
411
- def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
412
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
412
413
  pulumi.set(self, "max_lease_ttl_seconds", value)
413
414
 
414
415
  @property
@@ -504,26 +505,26 @@ class SecretsMountArgs:
504
505
 
505
506
  @property
506
507
  @pulumi.getter
507
- def namespace(self) -> Optional[pulumi.Input[str]]:
508
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
508
509
  """
509
510
  Target namespace. (requires Enterprise)
510
511
  """
511
512
  return pulumi.get(self, "namespace")
512
513
 
513
514
  @namespace.setter
514
- def namespace(self, value: Optional[pulumi.Input[str]]):
515
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
515
516
  pulumi.set(self, "namespace", value)
516
517
 
517
518
  @property
518
519
  @pulumi.getter
519
- def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
520
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
520
521
  """
521
522
  Specifies mount type specific options that are passed to the backend
522
523
  """
523
524
  return pulumi.get(self, "options")
524
525
 
525
526
  @options.setter
526
- def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
527
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
527
528
  pulumi.set(self, "options", value)
528
529
 
529
530
  @property
@@ -541,26 +542,26 @@ class SecretsMountArgs:
541
542
 
542
543
  @property
543
544
  @pulumi.getter(name="passthroughRequestHeaders")
544
- def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
545
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
545
546
  """
546
547
  List of headers to allow and pass from the request to the plugin
547
548
  """
548
549
  return pulumi.get(self, "passthrough_request_headers")
549
550
 
550
551
  @passthrough_request_headers.setter
551
- def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
552
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
552
553
  pulumi.set(self, "passthrough_request_headers", value)
553
554
 
554
555
  @property
555
556
  @pulumi.getter(name="pluginVersion")
556
- def plugin_version(self) -> Optional[pulumi.Input[str]]:
557
+ def plugin_version(self) -> Optional[pulumi.Input[builtins.str]]:
557
558
  """
558
559
  Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
559
560
  """
560
561
  return pulumi.get(self, "plugin_version")
561
562
 
562
563
  @plugin_version.setter
563
- def plugin_version(self, value: Optional[pulumi.Input[str]]):
564
+ def plugin_version(self, value: Optional[pulumi.Input[builtins.str]]):
564
565
  pulumi.set(self, "plugin_version", value)
565
566
 
566
567
  @property
@@ -617,14 +618,14 @@ class SecretsMountArgs:
617
618
 
618
619
  @property
619
620
  @pulumi.getter(name="sealWrap")
620
- def seal_wrap(self) -> Optional[pulumi.Input[bool]]:
621
+ def seal_wrap(self) -> Optional[pulumi.Input[builtins.bool]]:
621
622
  """
622
623
  Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
623
624
  """
624
625
  return pulumi.get(self, "seal_wrap")
625
626
 
626
627
  @seal_wrap.setter
627
- def seal_wrap(self, value: Optional[pulumi.Input[bool]]):
628
+ def seal_wrap(self, value: Optional[pulumi.Input[builtins.bool]]):
628
629
  pulumi.set(self, "seal_wrap", value)
629
630
 
630
631
  @property
@@ -644,25 +645,25 @@ class SecretsMountArgs:
644
645
  @pulumi.input_type
645
646
  class _SecretsMountState:
646
647
  def __init__(__self__, *,
647
- accessor: Optional[pulumi.Input[str]] = None,
648
- allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
649
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
650
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
651
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
648
+ accessor: Optional[pulumi.Input[builtins.str]] = None,
649
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
650
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
651
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
652
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
652
653
  cassandras: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]]] = None,
653
654
  couchbases: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]]] = None,
654
- default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
655
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
656
- description: Optional[pulumi.Input[str]] = None,
655
+ default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
656
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
657
+ description: Optional[pulumi.Input[builtins.str]] = None,
657
658
  elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]]] = None,
658
- engine_count: Optional[pulumi.Input[int]] = None,
659
- external_entropy_access: Optional[pulumi.Input[bool]] = None,
659
+ engine_count: Optional[pulumi.Input[builtins.int]] = None,
660
+ external_entropy_access: Optional[pulumi.Input[builtins.bool]] = None,
660
661
  hanas: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]]] = None,
661
- identity_token_key: Optional[pulumi.Input[str]] = None,
662
+ identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
662
663
  influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]] = None,
663
- listing_visibility: Optional[pulumi.Input[str]] = None,
664
- local: Optional[pulumi.Input[bool]] = None,
665
- max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
664
+ listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
665
+ local: Optional[pulumi.Input[builtins.bool]] = None,
666
+ max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
666
667
  mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]]] = None,
667
668
  mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]]] = None,
668
669
  mssqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMssqlArgs']]]] = None,
@@ -670,46 +671,46 @@ class _SecretsMountState:
670
671
  mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlLegacyArgs']]]] = None,
671
672
  mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]] = None,
672
673
  mysqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]] = None,
673
- namespace: Optional[pulumi.Input[str]] = None,
674
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
674
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
675
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
675
676
  oracles: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]] = None,
676
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
677
- path: Optional[pulumi.Input[str]] = None,
678
- plugin_version: Optional[pulumi.Input[str]] = None,
677
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
678
+ path: Optional[pulumi.Input[builtins.str]] = None,
679
+ plugin_version: Optional[pulumi.Input[builtins.str]] = None,
679
680
  postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]]] = None,
680
681
  redis: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]]] = None,
681
682
  redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedisElasticachArgs']]]] = None,
682
683
  redshifts: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]]] = None,
683
- seal_wrap: Optional[pulumi.Input[bool]] = None,
684
+ seal_wrap: Optional[pulumi.Input[builtins.bool]] = None,
684
685
  snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountSnowflakeArgs']]]] = None):
685
686
  """
686
687
  Input properties used for looking up and filtering SecretsMount resources.
687
- :param pulumi.Input[str] accessor: Accessor of the mount
688
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
688
+ :param pulumi.Input[builtins.str] accessor: Accessor of the mount
689
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
689
690
 
690
691
  The following arguments are common to all database engines:
691
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
692
- :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
693
- :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
692
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
693
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
694
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
694
695
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]] cassandras: A nested block containing configuration options for Cassandra connections.
695
696
  *See Configuration Options for more info*
696
697
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]] couchbases: A nested block containing configuration options for Couchbase connections.
697
698
  *See Configuration Options for more info*
698
- :param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
699
- :param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
700
- :param pulumi.Input[str] description: Human-friendly description of the mount
699
+ :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
700
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
701
+ :param pulumi.Input[builtins.str] description: Human-friendly description of the mount
701
702
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]] elasticsearches: A nested block containing configuration options for Elasticsearch connections.
702
703
  *See Configuration Options for more info*
703
- :param pulumi.Input[int] engine_count: The total number of database secrets engines configured.
704
- :param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
704
+ :param pulumi.Input[builtins.int] engine_count: The total number of database secrets engines configured.
705
+ :param pulumi.Input[builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
705
706
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]] hanas: A nested block containing configuration options for SAP HanaDB connections.
706
707
  *See Configuration Options for more info*
707
- :param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens
708
+ :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
708
709
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]] influxdbs: A nested block containing configuration options for InfluxDB connections.
709
710
  *See Configuration Options for more info*
710
- :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
711
- :param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
712
- :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
711
+ :param pulumi.Input[builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
712
+ :param pulumi.Input[builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
713
+ :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
713
714
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
714
715
  *See Configuration Options for more info*
715
716
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]] mongodbs: A nested block containing configuration options for MongoDB connections.
@@ -724,13 +725,13 @@ class _SecretsMountState:
724
725
  *See Configuration Options for more info*
725
726
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]] mysqls: A nested block containing configuration options for MySQL connections.
726
727
  *See Configuration Options for more info*
727
- :param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
728
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
728
+ :param pulumi.Input[builtins.str] namespace: Target namespace. (requires Enterprise)
729
+ :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] options: Specifies mount type specific options that are passed to the backend
729
730
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]] oracles: A nested block containing configuration options for Oracle connections.
730
731
  *See Configuration Options for more info*
731
- :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
732
- :param pulumi.Input[str] path: Where the secret backend will be mounted
733
- :param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
732
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
733
+ :param pulumi.Input[builtins.str] path: Where the secret backend will be mounted
734
+ :param pulumi.Input[builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
734
735
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]] postgresqls: A nested block containing configuration options for PostgreSQL connections.
735
736
  *See Configuration Options for more info*
736
737
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]] redis: A nested block containing configuration options for Redis connections.
@@ -739,7 +740,7 @@ class _SecretsMountState:
739
740
  *See Configuration Options for more info*
740
741
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]] redshifts: A nested block containing configuration options for AWS Redshift connections.
741
742
  *See Configuration Options for more info*
742
- :param pulumi.Input[bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
743
+ :param pulumi.Input[builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
743
744
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountSnowflakeArgs']]] snowflakes: A nested block containing configuration options for Snowflake connections.
744
745
  *See Configuration Options for more info*
745
746
  """
@@ -822,19 +823,19 @@ class _SecretsMountState:
822
823
 
823
824
  @property
824
825
  @pulumi.getter
825
- def accessor(self) -> Optional[pulumi.Input[str]]:
826
+ def accessor(self) -> Optional[pulumi.Input[builtins.str]]:
826
827
  """
827
828
  Accessor of the mount
828
829
  """
829
830
  return pulumi.get(self, "accessor")
830
831
 
831
832
  @accessor.setter
832
- def accessor(self, value: Optional[pulumi.Input[str]]):
833
+ def accessor(self, value: Optional[pulumi.Input[builtins.str]]):
833
834
  pulumi.set(self, "accessor", value)
834
835
 
835
836
  @property
836
837
  @pulumi.getter(name="allowedManagedKeys")
837
- def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
838
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
838
839
  """
839
840
  Set of managed key registry entry names that the mount in question is allowed to access
840
841
 
@@ -843,43 +844,43 @@ class _SecretsMountState:
843
844
  return pulumi.get(self, "allowed_managed_keys")
844
845
 
845
846
  @allowed_managed_keys.setter
846
- def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
847
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
847
848
  pulumi.set(self, "allowed_managed_keys", value)
848
849
 
849
850
  @property
850
851
  @pulumi.getter(name="allowedResponseHeaders")
851
- def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
852
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
852
853
  """
853
854
  List of headers to allow and pass from the request to the plugin
854
855
  """
855
856
  return pulumi.get(self, "allowed_response_headers")
856
857
 
857
858
  @allowed_response_headers.setter
858
- def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
859
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
859
860
  pulumi.set(self, "allowed_response_headers", value)
860
861
 
861
862
  @property
862
863
  @pulumi.getter(name="auditNonHmacRequestKeys")
863
- def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
864
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
864
865
  """
865
866
  Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
866
867
  """
867
868
  return pulumi.get(self, "audit_non_hmac_request_keys")
868
869
 
869
870
  @audit_non_hmac_request_keys.setter
870
- def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
871
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
871
872
  pulumi.set(self, "audit_non_hmac_request_keys", value)
872
873
 
873
874
  @property
874
875
  @pulumi.getter(name="auditNonHmacResponseKeys")
875
- def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
876
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
876
877
  """
877
878
  Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
878
879
  """
879
880
  return pulumi.get(self, "audit_non_hmac_response_keys")
880
881
 
881
882
  @audit_non_hmac_response_keys.setter
882
- def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
883
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
883
884
  pulumi.set(self, "audit_non_hmac_response_keys", value)
884
885
 
885
886
  @property
@@ -910,38 +911,38 @@ class _SecretsMountState:
910
911
 
911
912
  @property
912
913
  @pulumi.getter(name="defaultLeaseTtlSeconds")
913
- def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[int]]:
914
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
914
915
  """
915
916
  Default lease duration for tokens and secrets in seconds
916
917
  """
917
918
  return pulumi.get(self, "default_lease_ttl_seconds")
918
919
 
919
920
  @default_lease_ttl_seconds.setter
920
- def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
921
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
921
922
  pulumi.set(self, "default_lease_ttl_seconds", value)
922
923
 
923
924
  @property
924
925
  @pulumi.getter(name="delegatedAuthAccessors")
925
- def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
926
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
926
927
  """
927
928
  List of headers to allow and pass from the request to the plugin
928
929
  """
929
930
  return pulumi.get(self, "delegated_auth_accessors")
930
931
 
931
932
  @delegated_auth_accessors.setter
932
- def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
933
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
933
934
  pulumi.set(self, "delegated_auth_accessors", value)
934
935
 
935
936
  @property
936
937
  @pulumi.getter
937
- def description(self) -> Optional[pulumi.Input[str]]:
938
+ def description(self) -> Optional[pulumi.Input[builtins.str]]:
938
939
  """
939
940
  Human-friendly description of the mount
940
941
  """
941
942
  return pulumi.get(self, "description")
942
943
 
943
944
  @description.setter
944
- def description(self, value: Optional[pulumi.Input[str]]):
945
+ def description(self, value: Optional[pulumi.Input[builtins.str]]):
945
946
  pulumi.set(self, "description", value)
946
947
 
947
948
  @property
@@ -959,26 +960,26 @@ class _SecretsMountState:
959
960
 
960
961
  @property
961
962
  @pulumi.getter(name="engineCount")
962
- def engine_count(self) -> Optional[pulumi.Input[int]]:
963
+ def engine_count(self) -> Optional[pulumi.Input[builtins.int]]:
963
964
  """
964
965
  The total number of database secrets engines configured.
965
966
  """
966
967
  return pulumi.get(self, "engine_count")
967
968
 
968
969
  @engine_count.setter
969
- def engine_count(self, value: Optional[pulumi.Input[int]]):
970
+ def engine_count(self, value: Optional[pulumi.Input[builtins.int]]):
970
971
  pulumi.set(self, "engine_count", value)
971
972
 
972
973
  @property
973
974
  @pulumi.getter(name="externalEntropyAccess")
974
- def external_entropy_access(self) -> Optional[pulumi.Input[bool]]:
975
+ def external_entropy_access(self) -> Optional[pulumi.Input[builtins.bool]]:
975
976
  """
976
977
  Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
977
978
  """
978
979
  return pulumi.get(self, "external_entropy_access")
979
980
 
980
981
  @external_entropy_access.setter
981
- def external_entropy_access(self, value: Optional[pulumi.Input[bool]]):
982
+ def external_entropy_access(self, value: Optional[pulumi.Input[builtins.bool]]):
982
983
  pulumi.set(self, "external_entropy_access", value)
983
984
 
984
985
  @property
@@ -996,14 +997,14 @@ class _SecretsMountState:
996
997
 
997
998
  @property
998
999
  @pulumi.getter(name="identityTokenKey")
999
- def identity_token_key(self) -> Optional[pulumi.Input[str]]:
1000
+ def identity_token_key(self) -> Optional[pulumi.Input[builtins.str]]:
1000
1001
  """
1001
1002
  The key to use for signing plugin workload identity tokens
1002
1003
  """
1003
1004
  return pulumi.get(self, "identity_token_key")
1004
1005
 
1005
1006
  @identity_token_key.setter
1006
- def identity_token_key(self, value: Optional[pulumi.Input[str]]):
1007
+ def identity_token_key(self, value: Optional[pulumi.Input[builtins.str]]):
1007
1008
  pulumi.set(self, "identity_token_key", value)
1008
1009
 
1009
1010
  @property
@@ -1021,38 +1022,38 @@ class _SecretsMountState:
1021
1022
 
1022
1023
  @property
1023
1024
  @pulumi.getter(name="listingVisibility")
1024
- def listing_visibility(self) -> Optional[pulumi.Input[str]]:
1025
+ def listing_visibility(self) -> Optional[pulumi.Input[builtins.str]]:
1025
1026
  """
1026
1027
  Specifies whether to show this mount in the UI-specific listing endpoint
1027
1028
  """
1028
1029
  return pulumi.get(self, "listing_visibility")
1029
1030
 
1030
1031
  @listing_visibility.setter
1031
- def listing_visibility(self, value: Optional[pulumi.Input[str]]):
1032
+ def listing_visibility(self, value: Optional[pulumi.Input[builtins.str]]):
1032
1033
  pulumi.set(self, "listing_visibility", value)
1033
1034
 
1034
1035
  @property
1035
1036
  @pulumi.getter
1036
- def local(self) -> Optional[pulumi.Input[bool]]:
1037
+ def local(self) -> Optional[pulumi.Input[builtins.bool]]:
1037
1038
  """
1038
1039
  Boolean flag that can be explicitly set to true to enforce local mount in HA environment
1039
1040
  """
1040
1041
  return pulumi.get(self, "local")
1041
1042
 
1042
1043
  @local.setter
1043
- def local(self, value: Optional[pulumi.Input[bool]]):
1044
+ def local(self, value: Optional[pulumi.Input[builtins.bool]]):
1044
1045
  pulumi.set(self, "local", value)
1045
1046
 
1046
1047
  @property
1047
1048
  @pulumi.getter(name="maxLeaseTtlSeconds")
1048
- def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[int]]:
1049
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
1049
1050
  """
1050
1051
  Maximum possible lease duration for tokens and secrets in seconds
1051
1052
  """
1052
1053
  return pulumi.get(self, "max_lease_ttl_seconds")
1053
1054
 
1054
1055
  @max_lease_ttl_seconds.setter
1055
- def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
1056
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
1056
1057
  pulumi.set(self, "max_lease_ttl_seconds", value)
1057
1058
 
1058
1059
  @property
@@ -1148,26 +1149,26 @@ class _SecretsMountState:
1148
1149
 
1149
1150
  @property
1150
1151
  @pulumi.getter
1151
- def namespace(self) -> Optional[pulumi.Input[str]]:
1152
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
1152
1153
  """
1153
1154
  Target namespace. (requires Enterprise)
1154
1155
  """
1155
1156
  return pulumi.get(self, "namespace")
1156
1157
 
1157
1158
  @namespace.setter
1158
- def namespace(self, value: Optional[pulumi.Input[str]]):
1159
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
1159
1160
  pulumi.set(self, "namespace", value)
1160
1161
 
1161
1162
  @property
1162
1163
  @pulumi.getter
1163
- def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
1164
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
1164
1165
  """
1165
1166
  Specifies mount type specific options that are passed to the backend
1166
1167
  """
1167
1168
  return pulumi.get(self, "options")
1168
1169
 
1169
1170
  @options.setter
1170
- def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
1171
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
1171
1172
  pulumi.set(self, "options", value)
1172
1173
 
1173
1174
  @property
@@ -1185,38 +1186,38 @@ class _SecretsMountState:
1185
1186
 
1186
1187
  @property
1187
1188
  @pulumi.getter(name="passthroughRequestHeaders")
1188
- def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
1189
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
1189
1190
  """
1190
1191
  List of headers to allow and pass from the request to the plugin
1191
1192
  """
1192
1193
  return pulumi.get(self, "passthrough_request_headers")
1193
1194
 
1194
1195
  @passthrough_request_headers.setter
1195
- def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
1196
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
1196
1197
  pulumi.set(self, "passthrough_request_headers", value)
1197
1198
 
1198
1199
  @property
1199
1200
  @pulumi.getter
1200
- def path(self) -> Optional[pulumi.Input[str]]:
1201
+ def path(self) -> Optional[pulumi.Input[builtins.str]]:
1201
1202
  """
1202
1203
  Where the secret backend will be mounted
1203
1204
  """
1204
1205
  return pulumi.get(self, "path")
1205
1206
 
1206
1207
  @path.setter
1207
- def path(self, value: Optional[pulumi.Input[str]]):
1208
+ def path(self, value: Optional[pulumi.Input[builtins.str]]):
1208
1209
  pulumi.set(self, "path", value)
1209
1210
 
1210
1211
  @property
1211
1212
  @pulumi.getter(name="pluginVersion")
1212
- def plugin_version(self) -> Optional[pulumi.Input[str]]:
1213
+ def plugin_version(self) -> Optional[pulumi.Input[builtins.str]]:
1213
1214
  """
1214
1215
  Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1215
1216
  """
1216
1217
  return pulumi.get(self, "plugin_version")
1217
1218
 
1218
1219
  @plugin_version.setter
1219
- def plugin_version(self, value: Optional[pulumi.Input[str]]):
1220
+ def plugin_version(self, value: Optional[pulumi.Input[builtins.str]]):
1220
1221
  pulumi.set(self, "plugin_version", value)
1221
1222
 
1222
1223
  @property
@@ -1273,14 +1274,14 @@ class _SecretsMountState:
1273
1274
 
1274
1275
  @property
1275
1276
  @pulumi.getter(name="sealWrap")
1276
- def seal_wrap(self) -> Optional[pulumi.Input[bool]]:
1277
+ def seal_wrap(self) -> Optional[pulumi.Input[builtins.bool]]:
1277
1278
  """
1278
1279
  Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1279
1280
  """
1280
1281
  return pulumi.get(self, "seal_wrap")
1281
1282
 
1282
1283
  @seal_wrap.setter
1283
- def seal_wrap(self, value: Optional[pulumi.Input[bool]]):
1284
+ def seal_wrap(self, value: Optional[pulumi.Input[builtins.bool]]):
1284
1285
  pulumi.set(self, "seal_wrap", value)
1285
1286
 
1286
1287
  @property
@@ -1302,23 +1303,23 @@ class SecretsMount(pulumi.CustomResource):
1302
1303
  def __init__(__self__,
1303
1304
  resource_name: str,
1304
1305
  opts: Optional[pulumi.ResourceOptions] = None,
1305
- allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1306
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1307
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1308
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1306
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1307
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1308
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1309
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1309
1310
  cassandras: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCassandraArgs', 'SecretsMountCassandraArgsDict']]]]] = None,
1310
1311
  couchbases: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCouchbaseArgs', 'SecretsMountCouchbaseArgsDict']]]]] = None,
1311
- default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1312
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1313
- description: Optional[pulumi.Input[str]] = None,
1312
+ default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
1313
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1314
+ description: Optional[pulumi.Input[builtins.str]] = None,
1314
1315
  elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountElasticsearchArgs', 'SecretsMountElasticsearchArgsDict']]]]] = None,
1315
- external_entropy_access: Optional[pulumi.Input[bool]] = None,
1316
+ external_entropy_access: Optional[pulumi.Input[builtins.bool]] = None,
1316
1317
  hanas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountHanaArgs', 'SecretsMountHanaArgsDict']]]]] = None,
1317
- identity_token_key: Optional[pulumi.Input[str]] = None,
1318
+ identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
1318
1319
  influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountInfluxdbArgs', 'SecretsMountInfluxdbArgsDict']]]]] = None,
1319
- listing_visibility: Optional[pulumi.Input[str]] = None,
1320
- local: Optional[pulumi.Input[bool]] = None,
1321
- max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1320
+ listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
1321
+ local: Optional[pulumi.Input[builtins.bool]] = None,
1322
+ max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
1322
1323
  mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbatlaArgs', 'SecretsMountMongodbatlaArgsDict']]]]] = None,
1323
1324
  mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbArgs', 'SecretsMountMongodbArgsDict']]]]] = None,
1324
1325
  mssqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMssqlArgs', 'SecretsMountMssqlArgsDict']]]]] = None,
@@ -1326,17 +1327,17 @@ class SecretsMount(pulumi.CustomResource):
1326
1327
  mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlLegacyArgs', 'SecretsMountMysqlLegacyArgsDict']]]]] = None,
1327
1328
  mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]]] = None,
1328
1329
  mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]]] = None,
1329
- namespace: Optional[pulumi.Input[str]] = None,
1330
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1330
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
1331
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
1331
1332
  oracles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]]] = None,
1332
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1333
- path: Optional[pulumi.Input[str]] = None,
1334
- plugin_version: Optional[pulumi.Input[str]] = None,
1333
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1334
+ path: Optional[pulumi.Input[builtins.str]] = None,
1335
+ plugin_version: Optional[pulumi.Input[builtins.str]] = None,
1335
1336
  postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountPostgresqlArgs', 'SecretsMountPostgresqlArgsDict']]]]] = None,
1336
1337
  redis: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRediArgs', 'SecretsMountRediArgsDict']]]]] = None,
1337
1338
  redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedisElasticachArgs', 'SecretsMountRedisElasticachArgsDict']]]]] = None,
1338
1339
  redshifts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedshiftArgs', 'SecretsMountRedshiftArgsDict']]]]] = None,
1339
- seal_wrap: Optional[pulumi.Input[bool]] = None,
1340
+ seal_wrap: Optional[pulumi.Input[builtins.bool]] = None,
1340
1341
  snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountSnowflakeArgs', 'SecretsMountSnowflakeArgsDict']]]]] = None,
1341
1342
  __props__=None):
1342
1343
  """
@@ -1396,30 +1397,30 @@ class SecretsMount(pulumi.CustomResource):
1396
1397
 
1397
1398
  :param str resource_name: The name of the resource.
1398
1399
  :param pulumi.ResourceOptions opts: Options for the resource.
1399
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
1400
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
1400
1401
 
1401
1402
  The following arguments are common to all database engines:
1402
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1403
- :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1404
- :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1403
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1404
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1405
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1405
1406
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCassandraArgs', 'SecretsMountCassandraArgsDict']]]] cassandras: A nested block containing configuration options for Cassandra connections.
1406
1407
  *See Configuration Options for more info*
1407
1408
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCouchbaseArgs', 'SecretsMountCouchbaseArgsDict']]]] couchbases: A nested block containing configuration options for Couchbase connections.
1408
1409
  *See Configuration Options for more info*
1409
- :param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
1410
- :param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1411
- :param pulumi.Input[str] description: Human-friendly description of the mount
1410
+ :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
1411
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1412
+ :param pulumi.Input[builtins.str] description: Human-friendly description of the mount
1412
1413
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountElasticsearchArgs', 'SecretsMountElasticsearchArgsDict']]]] elasticsearches: A nested block containing configuration options for Elasticsearch connections.
1413
1414
  *See Configuration Options for more info*
1414
- :param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
1415
+ :param pulumi.Input[builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
1415
1416
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountHanaArgs', 'SecretsMountHanaArgsDict']]]] hanas: A nested block containing configuration options for SAP HanaDB connections.
1416
1417
  *See Configuration Options for more info*
1417
- :param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens
1418
+ :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1418
1419
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountInfluxdbArgs', 'SecretsMountInfluxdbArgsDict']]]] influxdbs: A nested block containing configuration options for InfluxDB connections.
1419
1420
  *See Configuration Options for more info*
1420
- :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1421
- :param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
1422
- :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
1421
+ :param pulumi.Input[builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1422
+ :param pulumi.Input[builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
1423
+ :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
1423
1424
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbatlaArgs', 'SecretsMountMongodbatlaArgsDict']]]] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
1424
1425
  *See Configuration Options for more info*
1425
1426
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbArgs', 'SecretsMountMongodbArgsDict']]]] mongodbs: A nested block containing configuration options for MongoDB connections.
@@ -1434,13 +1435,13 @@ class SecretsMount(pulumi.CustomResource):
1434
1435
  *See Configuration Options for more info*
1435
1436
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]] mysqls: A nested block containing configuration options for MySQL connections.
1436
1437
  *See Configuration Options for more info*
1437
- :param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
1438
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
1438
+ :param pulumi.Input[builtins.str] namespace: Target namespace. (requires Enterprise)
1439
+ :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1439
1440
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]] oracles: A nested block containing configuration options for Oracle connections.
1440
1441
  *See Configuration Options for more info*
1441
- :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1442
- :param pulumi.Input[str] path: Where the secret backend will be mounted
1443
- :param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1442
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1443
+ :param pulumi.Input[builtins.str] path: Where the secret backend will be mounted
1444
+ :param pulumi.Input[builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1444
1445
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountPostgresqlArgs', 'SecretsMountPostgresqlArgsDict']]]] postgresqls: A nested block containing configuration options for PostgreSQL connections.
1445
1446
  *See Configuration Options for more info*
1446
1447
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRediArgs', 'SecretsMountRediArgsDict']]]] redis: A nested block containing configuration options for Redis connections.
@@ -1449,7 +1450,7 @@ class SecretsMount(pulumi.CustomResource):
1449
1450
  *See Configuration Options for more info*
1450
1451
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedshiftArgs', 'SecretsMountRedshiftArgsDict']]]] redshifts: A nested block containing configuration options for AWS Redshift connections.
1451
1452
  *See Configuration Options for more info*
1452
- :param pulumi.Input[bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1453
+ :param pulumi.Input[builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1453
1454
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountSnowflakeArgs', 'SecretsMountSnowflakeArgsDict']]]] snowflakes: A nested block containing configuration options for Snowflake connections.
1454
1455
  *See Configuration Options for more info*
1455
1456
  """
@@ -1529,23 +1530,23 @@ class SecretsMount(pulumi.CustomResource):
1529
1530
  def _internal_init(__self__,
1530
1531
  resource_name: str,
1531
1532
  opts: Optional[pulumi.ResourceOptions] = None,
1532
- allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1533
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1534
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1535
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1533
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1534
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1535
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1536
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1536
1537
  cassandras: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCassandraArgs', 'SecretsMountCassandraArgsDict']]]]] = None,
1537
1538
  couchbases: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCouchbaseArgs', 'SecretsMountCouchbaseArgsDict']]]]] = None,
1538
- default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1539
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1540
- description: Optional[pulumi.Input[str]] = None,
1539
+ default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
1540
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1541
+ description: Optional[pulumi.Input[builtins.str]] = None,
1541
1542
  elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountElasticsearchArgs', 'SecretsMountElasticsearchArgsDict']]]]] = None,
1542
- external_entropy_access: Optional[pulumi.Input[bool]] = None,
1543
+ external_entropy_access: Optional[pulumi.Input[builtins.bool]] = None,
1543
1544
  hanas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountHanaArgs', 'SecretsMountHanaArgsDict']]]]] = None,
1544
- identity_token_key: Optional[pulumi.Input[str]] = None,
1545
+ identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
1545
1546
  influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountInfluxdbArgs', 'SecretsMountInfluxdbArgsDict']]]]] = None,
1546
- listing_visibility: Optional[pulumi.Input[str]] = None,
1547
- local: Optional[pulumi.Input[bool]] = None,
1548
- max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1547
+ listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
1548
+ local: Optional[pulumi.Input[builtins.bool]] = None,
1549
+ max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
1549
1550
  mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbatlaArgs', 'SecretsMountMongodbatlaArgsDict']]]]] = None,
1550
1551
  mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbArgs', 'SecretsMountMongodbArgsDict']]]]] = None,
1551
1552
  mssqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMssqlArgs', 'SecretsMountMssqlArgsDict']]]]] = None,
@@ -1553,17 +1554,17 @@ class SecretsMount(pulumi.CustomResource):
1553
1554
  mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlLegacyArgs', 'SecretsMountMysqlLegacyArgsDict']]]]] = None,
1554
1555
  mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]]] = None,
1555
1556
  mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]]] = None,
1556
- namespace: Optional[pulumi.Input[str]] = None,
1557
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1557
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
1558
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
1558
1559
  oracles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]]] = None,
1559
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1560
- path: Optional[pulumi.Input[str]] = None,
1561
- plugin_version: Optional[pulumi.Input[str]] = None,
1560
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1561
+ path: Optional[pulumi.Input[builtins.str]] = None,
1562
+ plugin_version: Optional[pulumi.Input[builtins.str]] = None,
1562
1563
  postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountPostgresqlArgs', 'SecretsMountPostgresqlArgsDict']]]]] = None,
1563
1564
  redis: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRediArgs', 'SecretsMountRediArgsDict']]]]] = None,
1564
1565
  redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedisElasticachArgs', 'SecretsMountRedisElasticachArgsDict']]]]] = None,
1565
1566
  redshifts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedshiftArgs', 'SecretsMountRedshiftArgsDict']]]]] = None,
1566
- seal_wrap: Optional[pulumi.Input[bool]] = None,
1567
+ seal_wrap: Optional[pulumi.Input[builtins.bool]] = None,
1567
1568
  snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountSnowflakeArgs', 'SecretsMountSnowflakeArgsDict']]]]] = None,
1568
1569
  __props__=None):
1569
1570
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
@@ -1624,25 +1625,25 @@ class SecretsMount(pulumi.CustomResource):
1624
1625
  def get(resource_name: str,
1625
1626
  id: pulumi.Input[str],
1626
1627
  opts: Optional[pulumi.ResourceOptions] = None,
1627
- accessor: Optional[pulumi.Input[str]] = None,
1628
- allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1629
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1630
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1631
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1628
+ accessor: Optional[pulumi.Input[builtins.str]] = None,
1629
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1630
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1631
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1632
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1632
1633
  cassandras: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCassandraArgs', 'SecretsMountCassandraArgsDict']]]]] = None,
1633
1634
  couchbases: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCouchbaseArgs', 'SecretsMountCouchbaseArgsDict']]]]] = None,
1634
- default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1635
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1636
- description: Optional[pulumi.Input[str]] = None,
1635
+ default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
1636
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1637
+ description: Optional[pulumi.Input[builtins.str]] = None,
1637
1638
  elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountElasticsearchArgs', 'SecretsMountElasticsearchArgsDict']]]]] = None,
1638
- engine_count: Optional[pulumi.Input[int]] = None,
1639
- external_entropy_access: Optional[pulumi.Input[bool]] = None,
1639
+ engine_count: Optional[pulumi.Input[builtins.int]] = None,
1640
+ external_entropy_access: Optional[pulumi.Input[builtins.bool]] = None,
1640
1641
  hanas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountHanaArgs', 'SecretsMountHanaArgsDict']]]]] = None,
1641
- identity_token_key: Optional[pulumi.Input[str]] = None,
1642
+ identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
1642
1643
  influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountInfluxdbArgs', 'SecretsMountInfluxdbArgsDict']]]]] = None,
1643
- listing_visibility: Optional[pulumi.Input[str]] = None,
1644
- local: Optional[pulumi.Input[bool]] = None,
1645
- max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1644
+ listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
1645
+ local: Optional[pulumi.Input[builtins.bool]] = None,
1646
+ max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
1646
1647
  mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbatlaArgs', 'SecretsMountMongodbatlaArgsDict']]]]] = None,
1647
1648
  mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbArgs', 'SecretsMountMongodbArgsDict']]]]] = None,
1648
1649
  mssqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMssqlArgs', 'SecretsMountMssqlArgsDict']]]]] = None,
@@ -1650,17 +1651,17 @@ class SecretsMount(pulumi.CustomResource):
1650
1651
  mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlLegacyArgs', 'SecretsMountMysqlLegacyArgsDict']]]]] = None,
1651
1652
  mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]]] = None,
1652
1653
  mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]]] = None,
1653
- namespace: Optional[pulumi.Input[str]] = None,
1654
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1654
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
1655
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
1655
1656
  oracles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]]] = None,
1656
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1657
- path: Optional[pulumi.Input[str]] = None,
1658
- plugin_version: Optional[pulumi.Input[str]] = None,
1657
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1658
+ path: Optional[pulumi.Input[builtins.str]] = None,
1659
+ plugin_version: Optional[pulumi.Input[builtins.str]] = None,
1659
1660
  postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountPostgresqlArgs', 'SecretsMountPostgresqlArgsDict']]]]] = None,
1660
1661
  redis: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRediArgs', 'SecretsMountRediArgsDict']]]]] = None,
1661
1662
  redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedisElasticachArgs', 'SecretsMountRedisElasticachArgsDict']]]]] = None,
1662
1663
  redshifts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedshiftArgs', 'SecretsMountRedshiftArgsDict']]]]] = None,
1663
- seal_wrap: Optional[pulumi.Input[bool]] = None,
1664
+ seal_wrap: Optional[pulumi.Input[builtins.bool]] = None,
1664
1665
  snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountSnowflakeArgs', 'SecretsMountSnowflakeArgsDict']]]]] = None) -> 'SecretsMount':
1665
1666
  """
1666
1667
  Get an existing SecretsMount resource's state with the given name, id, and optional extra
@@ -1669,32 +1670,32 @@ class SecretsMount(pulumi.CustomResource):
1669
1670
  :param str resource_name: The unique name of the resulting resource.
1670
1671
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
1671
1672
  :param pulumi.ResourceOptions opts: Options for the resource.
1672
- :param pulumi.Input[str] accessor: Accessor of the mount
1673
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
1673
+ :param pulumi.Input[builtins.str] accessor: Accessor of the mount
1674
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
1674
1675
 
1675
1676
  The following arguments are common to all database engines:
1676
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1677
- :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1678
- :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1677
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1678
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1679
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1679
1680
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCassandraArgs', 'SecretsMountCassandraArgsDict']]]] cassandras: A nested block containing configuration options for Cassandra connections.
1680
1681
  *See Configuration Options for more info*
1681
1682
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCouchbaseArgs', 'SecretsMountCouchbaseArgsDict']]]] couchbases: A nested block containing configuration options for Couchbase connections.
1682
1683
  *See Configuration Options for more info*
1683
- :param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
1684
- :param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1685
- :param pulumi.Input[str] description: Human-friendly description of the mount
1684
+ :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
1685
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1686
+ :param pulumi.Input[builtins.str] description: Human-friendly description of the mount
1686
1687
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountElasticsearchArgs', 'SecretsMountElasticsearchArgsDict']]]] elasticsearches: A nested block containing configuration options for Elasticsearch connections.
1687
1688
  *See Configuration Options for more info*
1688
- :param pulumi.Input[int] engine_count: The total number of database secrets engines configured.
1689
- :param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
1689
+ :param pulumi.Input[builtins.int] engine_count: The total number of database secrets engines configured.
1690
+ :param pulumi.Input[builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
1690
1691
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountHanaArgs', 'SecretsMountHanaArgsDict']]]] hanas: A nested block containing configuration options for SAP HanaDB connections.
1691
1692
  *See Configuration Options for more info*
1692
- :param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens
1693
+ :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1693
1694
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountInfluxdbArgs', 'SecretsMountInfluxdbArgsDict']]]] influxdbs: A nested block containing configuration options for InfluxDB connections.
1694
1695
  *See Configuration Options for more info*
1695
- :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1696
- :param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
1697
- :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
1696
+ :param pulumi.Input[builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1697
+ :param pulumi.Input[builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
1698
+ :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
1698
1699
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbatlaArgs', 'SecretsMountMongodbatlaArgsDict']]]] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
1699
1700
  *See Configuration Options for more info*
1700
1701
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbArgs', 'SecretsMountMongodbArgsDict']]]] mongodbs: A nested block containing configuration options for MongoDB connections.
@@ -1709,13 +1710,13 @@ class SecretsMount(pulumi.CustomResource):
1709
1710
  *See Configuration Options for more info*
1710
1711
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]] mysqls: A nested block containing configuration options for MySQL connections.
1711
1712
  *See Configuration Options for more info*
1712
- :param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
1713
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
1713
+ :param pulumi.Input[builtins.str] namespace: Target namespace. (requires Enterprise)
1714
+ :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1714
1715
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]] oracles: A nested block containing configuration options for Oracle connections.
1715
1716
  *See Configuration Options for more info*
1716
- :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1717
- :param pulumi.Input[str] path: Where the secret backend will be mounted
1718
- :param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1717
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1718
+ :param pulumi.Input[builtins.str] path: Where the secret backend will be mounted
1719
+ :param pulumi.Input[builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1719
1720
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountPostgresqlArgs', 'SecretsMountPostgresqlArgsDict']]]] postgresqls: A nested block containing configuration options for PostgreSQL connections.
1720
1721
  *See Configuration Options for more info*
1721
1722
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRediArgs', 'SecretsMountRediArgsDict']]]] redis: A nested block containing configuration options for Redis connections.
@@ -1724,7 +1725,7 @@ class SecretsMount(pulumi.CustomResource):
1724
1725
  *See Configuration Options for more info*
1725
1726
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedshiftArgs', 'SecretsMountRedshiftArgsDict']]]] redshifts: A nested block containing configuration options for AWS Redshift connections.
1726
1727
  *See Configuration Options for more info*
1727
- :param pulumi.Input[bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1728
+ :param pulumi.Input[builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1728
1729
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountSnowflakeArgs', 'SecretsMountSnowflakeArgsDict']]]] snowflakes: A nested block containing configuration options for Snowflake connections.
1729
1730
  *See Configuration Options for more info*
1730
1731
  """
@@ -1774,7 +1775,7 @@ class SecretsMount(pulumi.CustomResource):
1774
1775
 
1775
1776
  @property
1776
1777
  @pulumi.getter
1777
- def accessor(self) -> pulumi.Output[str]:
1778
+ def accessor(self) -> pulumi.Output[builtins.str]:
1778
1779
  """
1779
1780
  Accessor of the mount
1780
1781
  """
@@ -1782,7 +1783,7 @@ class SecretsMount(pulumi.CustomResource):
1782
1783
 
1783
1784
  @property
1784
1785
  @pulumi.getter(name="allowedManagedKeys")
1785
- def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[str]]]:
1786
+ def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1786
1787
  """
1787
1788
  Set of managed key registry entry names that the mount in question is allowed to access
1788
1789
 
@@ -1792,7 +1793,7 @@ class SecretsMount(pulumi.CustomResource):
1792
1793
 
1793
1794
  @property
1794
1795
  @pulumi.getter(name="allowedResponseHeaders")
1795
- def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[str]]]:
1796
+ def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1796
1797
  """
1797
1798
  List of headers to allow and pass from the request to the plugin
1798
1799
  """
@@ -1800,7 +1801,7 @@ class SecretsMount(pulumi.CustomResource):
1800
1801
 
1801
1802
  @property
1802
1803
  @pulumi.getter(name="auditNonHmacRequestKeys")
1803
- def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[str]]:
1804
+ def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[builtins.str]]:
1804
1805
  """
1805
1806
  Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1806
1807
  """
@@ -1808,7 +1809,7 @@ class SecretsMount(pulumi.CustomResource):
1808
1809
 
1809
1810
  @property
1810
1811
  @pulumi.getter(name="auditNonHmacResponseKeys")
1811
- def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[str]]:
1812
+ def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[builtins.str]]:
1812
1813
  """
1813
1814
  Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1814
1815
  """
@@ -1834,7 +1835,7 @@ class SecretsMount(pulumi.CustomResource):
1834
1835
 
1835
1836
  @property
1836
1837
  @pulumi.getter(name="defaultLeaseTtlSeconds")
1837
- def default_lease_ttl_seconds(self) -> pulumi.Output[int]:
1838
+ def default_lease_ttl_seconds(self) -> pulumi.Output[builtins.int]:
1838
1839
  """
1839
1840
  Default lease duration for tokens and secrets in seconds
1840
1841
  """
@@ -1842,7 +1843,7 @@ class SecretsMount(pulumi.CustomResource):
1842
1843
 
1843
1844
  @property
1844
1845
  @pulumi.getter(name="delegatedAuthAccessors")
1845
- def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[str]]]:
1846
+ def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1846
1847
  """
1847
1848
  List of headers to allow and pass from the request to the plugin
1848
1849
  """
@@ -1850,7 +1851,7 @@ class SecretsMount(pulumi.CustomResource):
1850
1851
 
1851
1852
  @property
1852
1853
  @pulumi.getter
1853
- def description(self) -> pulumi.Output[Optional[str]]:
1854
+ def description(self) -> pulumi.Output[Optional[builtins.str]]:
1854
1855
  """
1855
1856
  Human-friendly description of the mount
1856
1857
  """
@@ -1867,7 +1868,7 @@ class SecretsMount(pulumi.CustomResource):
1867
1868
 
1868
1869
  @property
1869
1870
  @pulumi.getter(name="engineCount")
1870
- def engine_count(self) -> pulumi.Output[int]:
1871
+ def engine_count(self) -> pulumi.Output[builtins.int]:
1871
1872
  """
1872
1873
  The total number of database secrets engines configured.
1873
1874
  """
@@ -1875,7 +1876,7 @@ class SecretsMount(pulumi.CustomResource):
1875
1876
 
1876
1877
  @property
1877
1878
  @pulumi.getter(name="externalEntropyAccess")
1878
- def external_entropy_access(self) -> pulumi.Output[Optional[bool]]:
1879
+ def external_entropy_access(self) -> pulumi.Output[Optional[builtins.bool]]:
1879
1880
  """
1880
1881
  Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
1881
1882
  """
@@ -1892,7 +1893,7 @@ class SecretsMount(pulumi.CustomResource):
1892
1893
 
1893
1894
  @property
1894
1895
  @pulumi.getter(name="identityTokenKey")
1895
- def identity_token_key(self) -> pulumi.Output[Optional[str]]:
1896
+ def identity_token_key(self) -> pulumi.Output[Optional[builtins.str]]:
1896
1897
  """
1897
1898
  The key to use for signing plugin workload identity tokens
1898
1899
  """
@@ -1909,7 +1910,7 @@ class SecretsMount(pulumi.CustomResource):
1909
1910
 
1910
1911
  @property
1911
1912
  @pulumi.getter(name="listingVisibility")
1912
- def listing_visibility(self) -> pulumi.Output[Optional[str]]:
1913
+ def listing_visibility(self) -> pulumi.Output[Optional[builtins.str]]:
1913
1914
  """
1914
1915
  Specifies whether to show this mount in the UI-specific listing endpoint
1915
1916
  """
@@ -1917,7 +1918,7 @@ class SecretsMount(pulumi.CustomResource):
1917
1918
 
1918
1919
  @property
1919
1920
  @pulumi.getter
1920
- def local(self) -> pulumi.Output[Optional[bool]]:
1921
+ def local(self) -> pulumi.Output[Optional[builtins.bool]]:
1921
1922
  """
1922
1923
  Boolean flag that can be explicitly set to true to enforce local mount in HA environment
1923
1924
  """
@@ -1925,7 +1926,7 @@ class SecretsMount(pulumi.CustomResource):
1925
1926
 
1926
1927
  @property
1927
1928
  @pulumi.getter(name="maxLeaseTtlSeconds")
1928
- def max_lease_ttl_seconds(self) -> pulumi.Output[int]:
1929
+ def max_lease_ttl_seconds(self) -> pulumi.Output[builtins.int]:
1929
1930
  """
1930
1931
  Maximum possible lease duration for tokens and secrets in seconds
1931
1932
  """
@@ -1996,7 +1997,7 @@ class SecretsMount(pulumi.CustomResource):
1996
1997
 
1997
1998
  @property
1998
1999
  @pulumi.getter
1999
- def namespace(self) -> pulumi.Output[Optional[str]]:
2000
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
2000
2001
  """
2001
2002
  Target namespace. (requires Enterprise)
2002
2003
  """
@@ -2004,7 +2005,7 @@ class SecretsMount(pulumi.CustomResource):
2004
2005
 
2005
2006
  @property
2006
2007
  @pulumi.getter
2007
- def options(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
2008
+ def options(self) -> pulumi.Output[Optional[Mapping[str, builtins.str]]]:
2008
2009
  """
2009
2010
  Specifies mount type specific options that are passed to the backend
2010
2011
  """
@@ -2021,7 +2022,7 @@ class SecretsMount(pulumi.CustomResource):
2021
2022
 
2022
2023
  @property
2023
2024
  @pulumi.getter(name="passthroughRequestHeaders")
2024
- def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[str]]]:
2025
+ def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
2025
2026
  """
2026
2027
  List of headers to allow and pass from the request to the plugin
2027
2028
  """
@@ -2029,7 +2030,7 @@ class SecretsMount(pulumi.CustomResource):
2029
2030
 
2030
2031
  @property
2031
2032
  @pulumi.getter
2032
- def path(self) -> pulumi.Output[str]:
2033
+ def path(self) -> pulumi.Output[builtins.str]:
2033
2034
  """
2034
2035
  Where the secret backend will be mounted
2035
2036
  """
@@ -2037,7 +2038,7 @@ class SecretsMount(pulumi.CustomResource):
2037
2038
 
2038
2039
  @property
2039
2040
  @pulumi.getter(name="pluginVersion")
2040
- def plugin_version(self) -> pulumi.Output[Optional[str]]:
2041
+ def plugin_version(self) -> pulumi.Output[Optional[builtins.str]]:
2041
2042
  """
2042
2043
  Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
2043
2044
  """
@@ -2081,7 +2082,7 @@ class SecretsMount(pulumi.CustomResource):
2081
2082
 
2082
2083
  @property
2083
2084
  @pulumi.getter(name="sealWrap")
2084
- def seal_wrap(self) -> pulumi.Output[bool]:
2085
+ def seal_wrap(self) -> pulumi.Output[builtins.bool]:
2085
2086
  """
2086
2087
  Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
2087
2088
  """