pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (269) hide show
  1. pulumi_vault/__init__.py +19 -1
  2. pulumi_vault/_inputs.py +873 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +1016 -439
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +1057 -285
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +887 -256
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +426 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +878 -336
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +400 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +1006 -227
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +431 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +732 -693
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +380 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +909 -271
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/oci_auth_backend.py +683 -0
  168. pulumi_vault/oci_auth_backend_role.py +798 -0
  169. pulumi_vault/okta/__init__.py +1 -1
  170. pulumi_vault/okta/_inputs.py +31 -32
  171. pulumi_vault/okta/auth_backend.py +305 -306
  172. pulumi_vault/okta/auth_backend_group.py +69 -70
  173. pulumi_vault/okta/auth_backend_user.py +86 -87
  174. pulumi_vault/okta/outputs.py +21 -22
  175. pulumi_vault/outputs.py +234 -82
  176. pulumi_vault/pkisecret/__init__.py +1 -1
  177. pulumi_vault/pkisecret/_inputs.py +55 -56
  178. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  179. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  180. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  181. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  182. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  183. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  184. pulumi_vault/pkisecret/backend_config_scep.py +205 -159
  185. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  186. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  187. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  188. pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
  189. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  190. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  191. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  192. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  193. pulumi_vault/pkisecret/outputs.py +61 -62
  194. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  195. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  196. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  197. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  198. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  199. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  200. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  201. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  202. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  203. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  204. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  205. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  206. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  207. pulumi_vault/plugin.py +154 -155
  208. pulumi_vault/plugin_pinned_version.py +52 -53
  209. pulumi_vault/policy.py +52 -53
  210. pulumi_vault/provider.py +160 -161
  211. pulumi_vault/pulumi-plugin.json +1 -1
  212. pulumi_vault/quota_lease_count.py +103 -104
  213. pulumi_vault/quota_rate_limit.py +171 -172
  214. pulumi_vault/rabbitmq/__init__.py +1 -1
  215. pulumi_vault/rabbitmq/_inputs.py +50 -51
  216. pulumi_vault/rabbitmq/outputs.py +34 -35
  217. pulumi_vault/rabbitmq/secret_backend.py +902 -231
  218. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  219. pulumi_vault/raft_autopilot.py +137 -138
  220. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  221. pulumi_vault/rgp_policy.py +69 -70
  222. pulumi_vault/saml/__init__.py +1 -1
  223. pulumi_vault/saml/auth_backend.py +188 -189
  224. pulumi_vault/saml/auth_backend_role.py +290 -291
  225. pulumi_vault/scep_auth_backend_role.py +252 -253
  226. pulumi_vault/secrets/__init__.py +1 -1
  227. pulumi_vault/secrets/_inputs.py +19 -20
  228. pulumi_vault/secrets/outputs.py +13 -14
  229. pulumi_vault/secrets/sync_association.py +88 -89
  230. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  231. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  232. pulumi_vault/secrets/sync_config.py +52 -53
  233. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  234. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  235. pulumi_vault/secrets/sync_github_apps.py +78 -79
  236. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  237. pulumi_vault/ssh/__init__.py +1 -1
  238. pulumi_vault/ssh/_inputs.py +13 -14
  239. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  240. pulumi_vault/ssh/outputs.py +9 -10
  241. pulumi_vault/ssh/secret_backend_ca.py +217 -124
  242. pulumi_vault/ssh/secret_backend_role.py +446 -447
  243. pulumi_vault/terraformcloud/__init__.py +1 -1
  244. pulumi_vault/terraformcloud/secret_backend.py +833 -155
  245. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  246. pulumi_vault/terraformcloud/secret_role.py +117 -118
  247. pulumi_vault/token.py +301 -302
  248. pulumi_vault/tokenauth/__init__.py +1 -1
  249. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  250. pulumi_vault/transform/__init__.py +1 -1
  251. pulumi_vault/transform/alphabet.py +69 -70
  252. pulumi_vault/transform/get_decode.py +57 -58
  253. pulumi_vault/transform/get_encode.py +57 -58
  254. pulumi_vault/transform/role.py +69 -70
  255. pulumi_vault/transform/template.py +137 -138
  256. pulumi_vault/transform/transformation.py +171 -172
  257. pulumi_vault/transit/__init__.py +1 -1
  258. pulumi_vault/transit/get_cmac.py +47 -48
  259. pulumi_vault/transit/get_decrypt.py +25 -26
  260. pulumi_vault/transit/get_encrypt.py +29 -30
  261. pulumi_vault/transit/get_sign.py +71 -72
  262. pulumi_vault/transit/get_verify.py +83 -84
  263. pulumi_vault/transit/secret_backend_key.py +377 -350
  264. pulumi_vault/transit/secret_cache_config.py +52 -53
  265. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
  266. pulumi_vault-7.2.0.dist-info/RECORD +270 -0
  267. pulumi_vault-7.1.0.dist-info/RECORD +0 -268
  268. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
  269. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
pulumi_vault/mount.py CHANGED
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,56 +19,58 @@ __all__ = ['MountArgs', 'Mount']
20
19
  @pulumi.input_type
21
20
  class MountArgs:
22
21
  def __init__(__self__, *,
23
- path: pulumi.Input[builtins.str],
24
- type: pulumi.Input[builtins.str],
25
- allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
26
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
27
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
28
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
29
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
30
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
31
- description: Optional[pulumi.Input[builtins.str]] = None,
32
- external_entropy_access: Optional[pulumi.Input[builtins.bool]] = None,
33
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
34
- listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
35
- local: Optional[pulumi.Input[builtins.bool]] = None,
36
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
37
- namespace: Optional[pulumi.Input[builtins.str]] = None,
38
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
39
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
40
- plugin_version: Optional[pulumi.Input[builtins.str]] = None,
41
- seal_wrap: Optional[pulumi.Input[builtins.bool]] = None):
22
+ path: pulumi.Input[_builtins.str],
23
+ type: pulumi.Input[_builtins.str],
24
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
25
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
28
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
29
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
30
+ description: Optional[pulumi.Input[_builtins.str]] = None,
31
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
32
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
33
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
34
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
35
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
36
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
37
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
38
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
39
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
40
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
41
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None):
42
42
  """
43
43
  The set of arguments for constructing a Mount resource.
44
- :param pulumi.Input[builtins.str] path: Where the secret backend will be mounted
45
- :param pulumi.Input[builtins.str] type: Type of the backend, such as "aws"
46
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
47
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_response_headers: List of headers to allow, allowing a plugin to include
44
+ :param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
45
+ :param pulumi.Input[_builtins.str] type: Type of the backend, such as "aws"
46
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
47
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow, allowing a plugin to include
48
48
  them in the response.
49
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
50
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
51
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
52
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] delegated_auth_accessors: List of allowed authentication mount accessors the
49
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
50
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
51
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
52
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of allowed authentication mount accessors the
53
53
  backend can request delegated authentication for.
54
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount
55
- :param pulumi.Input[builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
56
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens. If
54
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
55
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
56
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
57
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens. If
57
58
  not provided, this will default to Vault's OIDC default key.
58
- :param pulumi.Input[builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific
59
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific
59
60
  listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
60
- :param pulumi.Input[builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
61
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
62
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
61
+ :param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
62
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
63
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
63
64
  The value should not contain leading or trailing forward slashes.
64
65
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
65
66
  *Available only for Vault Enterprise*.
66
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] options: Specifies mount type specific options that are passed to the backend
67
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to
67
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
68
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to
68
69
  the plugin.
69
- :param pulumi.Input[builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
70
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
70
71
  If unspecified, the server will select any matching unversioned plugin that may have been
71
72
  registered, the latest versioned plugin registered, or a built-in plugin in that order of precedence.
72
- :param pulumi.Input[builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
73
+ :param pulumi.Input[_builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
73
74
  """
74
75
  pulumi.set(__self__, "path", path)
75
76
  pulumi.set(__self__, "type", type)
@@ -89,6 +90,8 @@ class MountArgs:
89
90
  pulumi.set(__self__, "description", description)
90
91
  if external_entropy_access is not None:
91
92
  pulumi.set(__self__, "external_entropy_access", external_entropy_access)
93
+ if force_no_cache is not None:
94
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
92
95
  if identity_token_key is not None:
93
96
  pulumi.set(__self__, "identity_token_key", identity_token_key)
94
97
  if listing_visibility is not None:
@@ -108,45 +111,45 @@ class MountArgs:
108
111
  if seal_wrap is not None:
109
112
  pulumi.set(__self__, "seal_wrap", seal_wrap)
110
113
 
111
- @property
114
+ @_builtins.property
112
115
  @pulumi.getter
113
- def path(self) -> pulumi.Input[builtins.str]:
116
+ def path(self) -> pulumi.Input[_builtins.str]:
114
117
  """
115
118
  Where the secret backend will be mounted
116
119
  """
117
120
  return pulumi.get(self, "path")
118
121
 
119
122
  @path.setter
120
- def path(self, value: pulumi.Input[builtins.str]):
123
+ def path(self, value: pulumi.Input[_builtins.str]):
121
124
  pulumi.set(self, "path", value)
122
125
 
123
- @property
126
+ @_builtins.property
124
127
  @pulumi.getter
125
- def type(self) -> pulumi.Input[builtins.str]:
128
+ def type(self) -> pulumi.Input[_builtins.str]:
126
129
  """
127
130
  Type of the backend, such as "aws"
128
131
  """
129
132
  return pulumi.get(self, "type")
130
133
 
131
134
  @type.setter
132
- def type(self, value: pulumi.Input[builtins.str]):
135
+ def type(self, value: pulumi.Input[_builtins.str]):
133
136
  pulumi.set(self, "type", value)
134
137
 
135
- @property
138
+ @_builtins.property
136
139
  @pulumi.getter(name="allowedManagedKeys")
137
- def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
140
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
138
141
  """
139
142
  Set of managed key registry entry names that the mount in question is allowed to access
140
143
  """
141
144
  return pulumi.get(self, "allowed_managed_keys")
142
145
 
143
146
  @allowed_managed_keys.setter
144
- def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
147
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
145
148
  pulumi.set(self, "allowed_managed_keys", value)
146
149
 
147
- @property
150
+ @_builtins.property
148
151
  @pulumi.getter(name="allowedResponseHeaders")
149
- def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
152
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
150
153
  """
151
154
  List of headers to allow, allowing a plugin to include
152
155
  them in the response.
@@ -154,48 +157,48 @@ class MountArgs:
154
157
  return pulumi.get(self, "allowed_response_headers")
155
158
 
156
159
  @allowed_response_headers.setter
157
- def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
160
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
158
161
  pulumi.set(self, "allowed_response_headers", value)
159
162
 
160
- @property
163
+ @_builtins.property
161
164
  @pulumi.getter(name="auditNonHmacRequestKeys")
162
- def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
165
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
163
166
  """
164
167
  Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
165
168
  """
166
169
  return pulumi.get(self, "audit_non_hmac_request_keys")
167
170
 
168
171
  @audit_non_hmac_request_keys.setter
169
- def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
172
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
170
173
  pulumi.set(self, "audit_non_hmac_request_keys", value)
171
174
 
172
- @property
175
+ @_builtins.property
173
176
  @pulumi.getter(name="auditNonHmacResponseKeys")
174
- def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
177
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
175
178
  """
176
179
  Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
177
180
  """
178
181
  return pulumi.get(self, "audit_non_hmac_response_keys")
179
182
 
180
183
  @audit_non_hmac_response_keys.setter
181
- def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
184
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
182
185
  pulumi.set(self, "audit_non_hmac_response_keys", value)
183
186
 
184
- @property
187
+ @_builtins.property
185
188
  @pulumi.getter(name="defaultLeaseTtlSeconds")
186
- def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
189
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
187
190
  """
188
191
  Default lease duration for tokens and secrets in seconds
189
192
  """
190
193
  return pulumi.get(self, "default_lease_ttl_seconds")
191
194
 
192
195
  @default_lease_ttl_seconds.setter
193
- def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
196
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
194
197
  pulumi.set(self, "default_lease_ttl_seconds", value)
195
198
 
196
- @property
199
+ @_builtins.property
197
200
  @pulumi.getter(name="delegatedAuthAccessors")
198
- def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
201
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
199
202
  """
200
203
  List of allowed authentication mount accessors the
201
204
  backend can request delegated authentication for.
@@ -203,36 +206,48 @@ class MountArgs:
203
206
  return pulumi.get(self, "delegated_auth_accessors")
204
207
 
205
208
  @delegated_auth_accessors.setter
206
- def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
209
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
207
210
  pulumi.set(self, "delegated_auth_accessors", value)
208
211
 
209
- @property
212
+ @_builtins.property
210
213
  @pulumi.getter
211
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
214
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
212
215
  """
213
216
  Human-friendly description of the mount
214
217
  """
215
218
  return pulumi.get(self, "description")
216
219
 
217
220
  @description.setter
218
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
221
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
219
222
  pulumi.set(self, "description", value)
220
223
 
221
- @property
224
+ @_builtins.property
222
225
  @pulumi.getter(name="externalEntropyAccess")
223
- def external_entropy_access(self) -> Optional[pulumi.Input[builtins.bool]]:
226
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
224
227
  """
225
228
  Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
226
229
  """
227
230
  return pulumi.get(self, "external_entropy_access")
228
231
 
229
232
  @external_entropy_access.setter
230
- def external_entropy_access(self, value: Optional[pulumi.Input[builtins.bool]]):
233
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
231
234
  pulumi.set(self, "external_entropy_access", value)
232
235
 
233
- @property
236
+ @_builtins.property
237
+ @pulumi.getter(name="forceNoCache")
238
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
239
+ """
240
+ If set to true, disables caching.
241
+ """
242
+ return pulumi.get(self, "force_no_cache")
243
+
244
+ @force_no_cache.setter
245
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
246
+ pulumi.set(self, "force_no_cache", value)
247
+
248
+ @_builtins.property
234
249
  @pulumi.getter(name="identityTokenKey")
235
- def identity_token_key(self) -> Optional[pulumi.Input[builtins.str]]:
250
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
236
251
  """
237
252
  The key to use for signing plugin workload identity tokens. If
238
253
  not provided, this will default to Vault's OIDC default key.
@@ -240,12 +255,12 @@ class MountArgs:
240
255
  return pulumi.get(self, "identity_token_key")
241
256
 
242
257
  @identity_token_key.setter
243
- def identity_token_key(self, value: Optional[pulumi.Input[builtins.str]]):
258
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
244
259
  pulumi.set(self, "identity_token_key", value)
245
260
 
246
- @property
261
+ @_builtins.property
247
262
  @pulumi.getter(name="listingVisibility")
248
- def listing_visibility(self) -> Optional[pulumi.Input[builtins.str]]:
263
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
249
264
  """
250
265
  Specifies whether to show this mount in the UI-specific
251
266
  listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
@@ -253,36 +268,36 @@ class MountArgs:
253
268
  return pulumi.get(self, "listing_visibility")
254
269
 
255
270
  @listing_visibility.setter
256
- def listing_visibility(self, value: Optional[pulumi.Input[builtins.str]]):
271
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
257
272
  pulumi.set(self, "listing_visibility", value)
258
273
 
259
- @property
274
+ @_builtins.property
260
275
  @pulumi.getter
261
- def local(self) -> Optional[pulumi.Input[builtins.bool]]:
276
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
262
277
  """
263
278
  Boolean flag that can be explicitly set to true to enforce local mount in HA environment
264
279
  """
265
280
  return pulumi.get(self, "local")
266
281
 
267
282
  @local.setter
268
- def local(self, value: Optional[pulumi.Input[builtins.bool]]):
283
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
269
284
  pulumi.set(self, "local", value)
270
285
 
271
- @property
286
+ @_builtins.property
272
287
  @pulumi.getter(name="maxLeaseTtlSeconds")
273
- def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
288
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
274
289
  """
275
290
  Maximum possible lease duration for tokens and secrets in seconds
276
291
  """
277
292
  return pulumi.get(self, "max_lease_ttl_seconds")
278
293
 
279
294
  @max_lease_ttl_seconds.setter
280
- def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
295
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
281
296
  pulumi.set(self, "max_lease_ttl_seconds", value)
282
297
 
283
- @property
298
+ @_builtins.property
284
299
  @pulumi.getter
285
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
300
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
286
301
  """
287
302
  The namespace to provision the resource in.
288
303
  The value should not contain leading or trailing forward slashes.
@@ -292,24 +307,24 @@ class MountArgs:
292
307
  return pulumi.get(self, "namespace")
293
308
 
294
309
  @namespace.setter
295
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
310
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
296
311
  pulumi.set(self, "namespace", value)
297
312
 
298
- @property
313
+ @_builtins.property
299
314
  @pulumi.getter
300
- def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
315
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
301
316
  """
302
317
  Specifies mount type specific options that are passed to the backend
303
318
  """
304
319
  return pulumi.get(self, "options")
305
320
 
306
321
  @options.setter
307
- def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
322
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
308
323
  pulumi.set(self, "options", value)
309
324
 
310
- @property
325
+ @_builtins.property
311
326
  @pulumi.getter(name="passthroughRequestHeaders")
312
- def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
327
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
313
328
  """
314
329
  List of headers to allow and pass from the request to
315
330
  the plugin.
@@ -317,12 +332,12 @@ class MountArgs:
317
332
  return pulumi.get(self, "passthrough_request_headers")
318
333
 
319
334
  @passthrough_request_headers.setter
320
- def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
335
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
321
336
  pulumi.set(self, "passthrough_request_headers", value)
322
337
 
323
- @property
338
+ @_builtins.property
324
339
  @pulumi.getter(name="pluginVersion")
325
- def plugin_version(self) -> Optional[pulumi.Input[builtins.str]]:
340
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
326
341
  """
327
342
  Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
328
343
  If unspecified, the server will select any matching unversioned plugin that may have been
@@ -331,77 +346,79 @@ class MountArgs:
331
346
  return pulumi.get(self, "plugin_version")
332
347
 
333
348
  @plugin_version.setter
334
- def plugin_version(self, value: Optional[pulumi.Input[builtins.str]]):
349
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
335
350
  pulumi.set(self, "plugin_version", value)
336
351
 
337
- @property
352
+ @_builtins.property
338
353
  @pulumi.getter(name="sealWrap")
339
- def seal_wrap(self) -> Optional[pulumi.Input[builtins.bool]]:
354
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
340
355
  """
341
356
  Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
342
357
  """
343
358
  return pulumi.get(self, "seal_wrap")
344
359
 
345
360
  @seal_wrap.setter
346
- def seal_wrap(self, value: Optional[pulumi.Input[builtins.bool]]):
361
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
347
362
  pulumi.set(self, "seal_wrap", value)
348
363
 
349
364
 
350
365
  @pulumi.input_type
351
366
  class _MountState:
352
367
  def __init__(__self__, *,
353
- accessor: Optional[pulumi.Input[builtins.str]] = None,
354
- allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
355
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
356
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
357
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
358
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
359
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
360
- description: Optional[pulumi.Input[builtins.str]] = None,
361
- external_entropy_access: Optional[pulumi.Input[builtins.bool]] = None,
362
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
363
- listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
364
- local: Optional[pulumi.Input[builtins.bool]] = None,
365
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
366
- namespace: Optional[pulumi.Input[builtins.str]] = None,
367
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
368
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
369
- path: Optional[pulumi.Input[builtins.str]] = None,
370
- plugin_version: Optional[pulumi.Input[builtins.str]] = None,
371
- seal_wrap: Optional[pulumi.Input[builtins.bool]] = None,
372
- type: Optional[pulumi.Input[builtins.str]] = None):
368
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
369
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
370
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
371
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
372
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
373
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
374
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
375
+ description: Optional[pulumi.Input[_builtins.str]] = None,
376
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
377
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
378
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
379
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
380
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
381
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
382
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
383
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
384
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
385
+ path: Optional[pulumi.Input[_builtins.str]] = None,
386
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
387
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
388
+ type: Optional[pulumi.Input[_builtins.str]] = None):
373
389
  """
374
390
  Input properties used for looking up and filtering Mount resources.
375
- :param pulumi.Input[builtins.str] accessor: The accessor for this mount.
376
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
377
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_response_headers: List of headers to allow, allowing a plugin to include
391
+ :param pulumi.Input[_builtins.str] accessor: The accessor for this mount.
392
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
393
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow, allowing a plugin to include
378
394
  them in the response.
379
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
380
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
381
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
382
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] delegated_auth_accessors: List of allowed authentication mount accessors the
395
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
396
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
397
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
398
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of allowed authentication mount accessors the
383
399
  backend can request delegated authentication for.
384
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount
385
- :param pulumi.Input[builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
386
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens. If
400
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
401
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
402
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
403
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens. If
387
404
  not provided, this will default to Vault's OIDC default key.
388
- :param pulumi.Input[builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific
405
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific
389
406
  listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
390
- :param pulumi.Input[builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
391
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
392
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
407
+ :param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
408
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
409
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
393
410
  The value should not contain leading or trailing forward slashes.
394
411
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
395
412
  *Available only for Vault Enterprise*.
396
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] options: Specifies mount type specific options that are passed to the backend
397
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to
413
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
414
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to
398
415
  the plugin.
399
- :param pulumi.Input[builtins.str] path: Where the secret backend will be mounted
400
- :param pulumi.Input[builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
416
+ :param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
417
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
401
418
  If unspecified, the server will select any matching unversioned plugin that may have been
402
419
  registered, the latest versioned plugin registered, or a built-in plugin in that order of precedence.
403
- :param pulumi.Input[builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
404
- :param pulumi.Input[builtins.str] type: Type of the backend, such as "aws"
420
+ :param pulumi.Input[_builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
421
+ :param pulumi.Input[_builtins.str] type: Type of the backend, such as "aws"
405
422
  """
406
423
  if accessor is not None:
407
424
  pulumi.set(__self__, "accessor", accessor)
@@ -421,6 +438,8 @@ class _MountState:
421
438
  pulumi.set(__self__, "description", description)
422
439
  if external_entropy_access is not None:
423
440
  pulumi.set(__self__, "external_entropy_access", external_entropy_access)
441
+ if force_no_cache is not None:
442
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
424
443
  if identity_token_key is not None:
425
444
  pulumi.set(__self__, "identity_token_key", identity_token_key)
426
445
  if listing_visibility is not None:
@@ -444,33 +463,33 @@ class _MountState:
444
463
  if type is not None:
445
464
  pulumi.set(__self__, "type", type)
446
465
 
447
- @property
466
+ @_builtins.property
448
467
  @pulumi.getter
449
- def accessor(self) -> Optional[pulumi.Input[builtins.str]]:
468
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
450
469
  """
451
470
  The accessor for this mount.
452
471
  """
453
472
  return pulumi.get(self, "accessor")
454
473
 
455
474
  @accessor.setter
456
- def accessor(self, value: Optional[pulumi.Input[builtins.str]]):
475
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
457
476
  pulumi.set(self, "accessor", value)
458
477
 
459
- @property
478
+ @_builtins.property
460
479
  @pulumi.getter(name="allowedManagedKeys")
461
- def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
480
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
462
481
  """
463
482
  Set of managed key registry entry names that the mount in question is allowed to access
464
483
  """
465
484
  return pulumi.get(self, "allowed_managed_keys")
466
485
 
467
486
  @allowed_managed_keys.setter
468
- def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
487
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
469
488
  pulumi.set(self, "allowed_managed_keys", value)
470
489
 
471
- @property
490
+ @_builtins.property
472
491
  @pulumi.getter(name="allowedResponseHeaders")
473
- def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
492
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
474
493
  """
475
494
  List of headers to allow, allowing a plugin to include
476
495
  them in the response.
@@ -478,48 +497,48 @@ class _MountState:
478
497
  return pulumi.get(self, "allowed_response_headers")
479
498
 
480
499
  @allowed_response_headers.setter
481
- def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
500
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
482
501
  pulumi.set(self, "allowed_response_headers", value)
483
502
 
484
- @property
503
+ @_builtins.property
485
504
  @pulumi.getter(name="auditNonHmacRequestKeys")
486
- def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
505
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
487
506
  """
488
507
  Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
489
508
  """
490
509
  return pulumi.get(self, "audit_non_hmac_request_keys")
491
510
 
492
511
  @audit_non_hmac_request_keys.setter
493
- def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
512
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
494
513
  pulumi.set(self, "audit_non_hmac_request_keys", value)
495
514
 
496
- @property
515
+ @_builtins.property
497
516
  @pulumi.getter(name="auditNonHmacResponseKeys")
498
- def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
517
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
499
518
  """
500
519
  Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
501
520
  """
502
521
  return pulumi.get(self, "audit_non_hmac_response_keys")
503
522
 
504
523
  @audit_non_hmac_response_keys.setter
505
- def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
524
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
506
525
  pulumi.set(self, "audit_non_hmac_response_keys", value)
507
526
 
508
- @property
527
+ @_builtins.property
509
528
  @pulumi.getter(name="defaultLeaseTtlSeconds")
510
- def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
529
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
511
530
  """
512
531
  Default lease duration for tokens and secrets in seconds
513
532
  """
514
533
  return pulumi.get(self, "default_lease_ttl_seconds")
515
534
 
516
535
  @default_lease_ttl_seconds.setter
517
- def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
536
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
518
537
  pulumi.set(self, "default_lease_ttl_seconds", value)
519
538
 
520
- @property
539
+ @_builtins.property
521
540
  @pulumi.getter(name="delegatedAuthAccessors")
522
- def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
541
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
523
542
  """
524
543
  List of allowed authentication mount accessors the
525
544
  backend can request delegated authentication for.
@@ -527,36 +546,48 @@ class _MountState:
527
546
  return pulumi.get(self, "delegated_auth_accessors")
528
547
 
529
548
  @delegated_auth_accessors.setter
530
- def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
549
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
531
550
  pulumi.set(self, "delegated_auth_accessors", value)
532
551
 
533
- @property
552
+ @_builtins.property
534
553
  @pulumi.getter
535
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
554
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
536
555
  """
537
556
  Human-friendly description of the mount
538
557
  """
539
558
  return pulumi.get(self, "description")
540
559
 
541
560
  @description.setter
542
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
561
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
543
562
  pulumi.set(self, "description", value)
544
563
 
545
- @property
564
+ @_builtins.property
546
565
  @pulumi.getter(name="externalEntropyAccess")
547
- def external_entropy_access(self) -> Optional[pulumi.Input[builtins.bool]]:
566
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
548
567
  """
549
568
  Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
550
569
  """
551
570
  return pulumi.get(self, "external_entropy_access")
552
571
 
553
572
  @external_entropy_access.setter
554
- def external_entropy_access(self, value: Optional[pulumi.Input[builtins.bool]]):
573
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
555
574
  pulumi.set(self, "external_entropy_access", value)
556
575
 
557
- @property
576
+ @_builtins.property
577
+ @pulumi.getter(name="forceNoCache")
578
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
579
+ """
580
+ If set to true, disables caching.
581
+ """
582
+ return pulumi.get(self, "force_no_cache")
583
+
584
+ @force_no_cache.setter
585
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
586
+ pulumi.set(self, "force_no_cache", value)
587
+
588
+ @_builtins.property
558
589
  @pulumi.getter(name="identityTokenKey")
559
- def identity_token_key(self) -> Optional[pulumi.Input[builtins.str]]:
590
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
560
591
  """
561
592
  The key to use for signing plugin workload identity tokens. If
562
593
  not provided, this will default to Vault's OIDC default key.
@@ -564,12 +595,12 @@ class _MountState:
564
595
  return pulumi.get(self, "identity_token_key")
565
596
 
566
597
  @identity_token_key.setter
567
- def identity_token_key(self, value: Optional[pulumi.Input[builtins.str]]):
598
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
568
599
  pulumi.set(self, "identity_token_key", value)
569
600
 
570
- @property
601
+ @_builtins.property
571
602
  @pulumi.getter(name="listingVisibility")
572
- def listing_visibility(self) -> Optional[pulumi.Input[builtins.str]]:
603
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
573
604
  """
574
605
  Specifies whether to show this mount in the UI-specific
575
606
  listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
@@ -577,36 +608,36 @@ class _MountState:
577
608
  return pulumi.get(self, "listing_visibility")
578
609
 
579
610
  @listing_visibility.setter
580
- def listing_visibility(self, value: Optional[pulumi.Input[builtins.str]]):
611
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
581
612
  pulumi.set(self, "listing_visibility", value)
582
613
 
583
- @property
614
+ @_builtins.property
584
615
  @pulumi.getter
585
- def local(self) -> Optional[pulumi.Input[builtins.bool]]:
616
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
586
617
  """
587
618
  Boolean flag that can be explicitly set to true to enforce local mount in HA environment
588
619
  """
589
620
  return pulumi.get(self, "local")
590
621
 
591
622
  @local.setter
592
- def local(self, value: Optional[pulumi.Input[builtins.bool]]):
623
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
593
624
  pulumi.set(self, "local", value)
594
625
 
595
- @property
626
+ @_builtins.property
596
627
  @pulumi.getter(name="maxLeaseTtlSeconds")
597
- def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
628
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
598
629
  """
599
630
  Maximum possible lease duration for tokens and secrets in seconds
600
631
  """
601
632
  return pulumi.get(self, "max_lease_ttl_seconds")
602
633
 
603
634
  @max_lease_ttl_seconds.setter
604
- def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
635
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
605
636
  pulumi.set(self, "max_lease_ttl_seconds", value)
606
637
 
607
- @property
638
+ @_builtins.property
608
639
  @pulumi.getter
609
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
640
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
610
641
  """
611
642
  The namespace to provision the resource in.
612
643
  The value should not contain leading or trailing forward slashes.
@@ -616,24 +647,24 @@ class _MountState:
616
647
  return pulumi.get(self, "namespace")
617
648
 
618
649
  @namespace.setter
619
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
650
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
620
651
  pulumi.set(self, "namespace", value)
621
652
 
622
- @property
653
+ @_builtins.property
623
654
  @pulumi.getter
624
- def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
655
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
625
656
  """
626
657
  Specifies mount type specific options that are passed to the backend
627
658
  """
628
659
  return pulumi.get(self, "options")
629
660
 
630
661
  @options.setter
631
- def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
662
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
632
663
  pulumi.set(self, "options", value)
633
664
 
634
- @property
665
+ @_builtins.property
635
666
  @pulumi.getter(name="passthroughRequestHeaders")
636
- def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
667
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
637
668
  """
638
669
  List of headers to allow and pass from the request to
639
670
  the plugin.
@@ -641,24 +672,24 @@ class _MountState:
641
672
  return pulumi.get(self, "passthrough_request_headers")
642
673
 
643
674
  @passthrough_request_headers.setter
644
- def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
675
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
645
676
  pulumi.set(self, "passthrough_request_headers", value)
646
677
 
647
- @property
678
+ @_builtins.property
648
679
  @pulumi.getter
649
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
680
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
650
681
  """
651
682
  Where the secret backend will be mounted
652
683
  """
653
684
  return pulumi.get(self, "path")
654
685
 
655
686
  @path.setter
656
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
687
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
657
688
  pulumi.set(self, "path", value)
658
689
 
659
- @property
690
+ @_builtins.property
660
691
  @pulumi.getter(name="pluginVersion")
661
- def plugin_version(self) -> Optional[pulumi.Input[builtins.str]]:
692
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
662
693
  """
663
694
  Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
664
695
  If unspecified, the server will select any matching unversioned plugin that may have been
@@ -667,31 +698,31 @@ class _MountState:
667
698
  return pulumi.get(self, "plugin_version")
668
699
 
669
700
  @plugin_version.setter
670
- def plugin_version(self, value: Optional[pulumi.Input[builtins.str]]):
701
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
671
702
  pulumi.set(self, "plugin_version", value)
672
703
 
673
- @property
704
+ @_builtins.property
674
705
  @pulumi.getter(name="sealWrap")
675
- def seal_wrap(self) -> Optional[pulumi.Input[builtins.bool]]:
706
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
676
707
  """
677
708
  Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
678
709
  """
679
710
  return pulumi.get(self, "seal_wrap")
680
711
 
681
712
  @seal_wrap.setter
682
- def seal_wrap(self, value: Optional[pulumi.Input[builtins.bool]]):
713
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
683
714
  pulumi.set(self, "seal_wrap", value)
684
715
 
685
- @property
716
+ @_builtins.property
686
717
  @pulumi.getter
687
- def type(self) -> Optional[pulumi.Input[builtins.str]]:
718
+ def type(self) -> Optional[pulumi.Input[_builtins.str]]:
688
719
  """
689
720
  Type of the backend, such as "aws"
690
721
  """
691
722
  return pulumi.get(self, "type")
692
723
 
693
724
  @type.setter
694
- def type(self, value: Optional[pulumi.Input[builtins.str]]):
725
+ def type(self, value: Optional[pulumi.Input[_builtins.str]]):
695
726
  pulumi.set(self, "type", value)
696
727
 
697
728
 
@@ -701,25 +732,26 @@ class Mount(pulumi.CustomResource):
701
732
  def __init__(__self__,
702
733
  resource_name: str,
703
734
  opts: Optional[pulumi.ResourceOptions] = None,
704
- allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
705
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
706
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
707
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
708
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
709
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
710
- description: Optional[pulumi.Input[builtins.str]] = None,
711
- external_entropy_access: Optional[pulumi.Input[builtins.bool]] = None,
712
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
713
- listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
714
- local: Optional[pulumi.Input[builtins.bool]] = None,
715
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
716
- namespace: Optional[pulumi.Input[builtins.str]] = None,
717
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
718
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
719
- path: Optional[pulumi.Input[builtins.str]] = None,
720
- plugin_version: Optional[pulumi.Input[builtins.str]] = None,
721
- seal_wrap: Optional[pulumi.Input[builtins.bool]] = None,
722
- type: Optional[pulumi.Input[builtins.str]] = None,
735
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
736
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
737
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
738
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
739
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
740
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
741
+ description: Optional[pulumi.Input[_builtins.str]] = None,
742
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
743
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
744
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
745
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
746
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
747
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
748
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
749
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
750
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
751
+ path: Optional[pulumi.Input[_builtins.str]] = None,
752
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
753
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
754
+ type: Optional[pulumi.Input[_builtins.str]] = None,
723
755
  __props__=None):
724
756
  """
725
757
  This resource enables a new secrets engine at the given path.
@@ -785,35 +817,36 @@ class Mount(pulumi.CustomResource):
785
817
 
786
818
  :param str resource_name: The name of the resource.
787
819
  :param pulumi.ResourceOptions opts: Options for the resource.
788
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
789
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_response_headers: List of headers to allow, allowing a plugin to include
820
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
821
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow, allowing a plugin to include
790
822
  them in the response.
791
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
792
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
793
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
794
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] delegated_auth_accessors: List of allowed authentication mount accessors the
823
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
824
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
825
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
826
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of allowed authentication mount accessors the
795
827
  backend can request delegated authentication for.
796
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount
797
- :param pulumi.Input[builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
798
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens. If
828
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
829
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
830
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
831
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens. If
799
832
  not provided, this will default to Vault's OIDC default key.
800
- :param pulumi.Input[builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific
833
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific
801
834
  listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
802
- :param pulumi.Input[builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
803
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
804
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
835
+ :param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
836
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
837
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
805
838
  The value should not contain leading or trailing forward slashes.
806
839
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
807
840
  *Available only for Vault Enterprise*.
808
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] options: Specifies mount type specific options that are passed to the backend
809
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to
841
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
842
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to
810
843
  the plugin.
811
- :param pulumi.Input[builtins.str] path: Where the secret backend will be mounted
812
- :param pulumi.Input[builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
844
+ :param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
845
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
813
846
  If unspecified, the server will select any matching unversioned plugin that may have been
814
847
  registered, the latest versioned plugin registered, or a built-in plugin in that order of precedence.
815
- :param pulumi.Input[builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
816
- :param pulumi.Input[builtins.str] type: Type of the backend, such as "aws"
848
+ :param pulumi.Input[_builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
849
+ :param pulumi.Input[_builtins.str] type: Type of the backend, such as "aws"
817
850
  """
818
851
  ...
819
852
  @overload
@@ -898,25 +931,26 @@ class Mount(pulumi.CustomResource):
898
931
  def _internal_init(__self__,
899
932
  resource_name: str,
900
933
  opts: Optional[pulumi.ResourceOptions] = None,
901
- allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
902
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
903
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
904
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
905
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
906
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
907
- description: Optional[pulumi.Input[builtins.str]] = None,
908
- external_entropy_access: Optional[pulumi.Input[builtins.bool]] = None,
909
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
910
- listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
911
- local: Optional[pulumi.Input[builtins.bool]] = None,
912
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
913
- namespace: Optional[pulumi.Input[builtins.str]] = None,
914
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
915
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
916
- path: Optional[pulumi.Input[builtins.str]] = None,
917
- plugin_version: Optional[pulumi.Input[builtins.str]] = None,
918
- seal_wrap: Optional[pulumi.Input[builtins.bool]] = None,
919
- type: Optional[pulumi.Input[builtins.str]] = None,
934
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
935
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
936
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
937
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
938
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
939
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
940
+ description: Optional[pulumi.Input[_builtins.str]] = None,
941
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
942
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
943
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
944
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
945
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
946
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
947
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
948
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
949
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
950
+ path: Optional[pulumi.Input[_builtins.str]] = None,
951
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
952
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
953
+ type: Optional[pulumi.Input[_builtins.str]] = None,
920
954
  __props__=None):
921
955
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
922
956
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -934,6 +968,7 @@ class Mount(pulumi.CustomResource):
934
968
  __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
935
969
  __props__.__dict__["description"] = description
936
970
  __props__.__dict__["external_entropy_access"] = external_entropy_access
971
+ __props__.__dict__["force_no_cache"] = force_no_cache
937
972
  __props__.__dict__["identity_token_key"] = identity_token_key
938
973
  __props__.__dict__["listing_visibility"] = listing_visibility
939
974
  __props__.__dict__["local"] = local
@@ -960,26 +995,27 @@ class Mount(pulumi.CustomResource):
960
995
  def get(resource_name: str,
961
996
  id: pulumi.Input[str],
962
997
  opts: Optional[pulumi.ResourceOptions] = None,
963
- accessor: Optional[pulumi.Input[builtins.str]] = None,
964
- allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
965
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
966
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
967
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
968
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
969
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
970
- description: Optional[pulumi.Input[builtins.str]] = None,
971
- external_entropy_access: Optional[pulumi.Input[builtins.bool]] = None,
972
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
973
- listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
974
- local: Optional[pulumi.Input[builtins.bool]] = None,
975
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
976
- namespace: Optional[pulumi.Input[builtins.str]] = None,
977
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
978
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
979
- path: Optional[pulumi.Input[builtins.str]] = None,
980
- plugin_version: Optional[pulumi.Input[builtins.str]] = None,
981
- seal_wrap: Optional[pulumi.Input[builtins.bool]] = None,
982
- type: Optional[pulumi.Input[builtins.str]] = None) -> 'Mount':
998
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
999
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1000
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1001
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1002
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1003
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1004
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1005
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1006
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1007
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1008
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1009
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1010
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1011
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1012
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1013
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1014
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1015
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1016
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1017
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1018
+ type: Optional[pulumi.Input[_builtins.str]] = None) -> 'Mount':
983
1019
  """
984
1020
  Get an existing Mount resource's state with the given name, id, and optional extra
985
1021
  properties used to qualify the lookup.
@@ -987,36 +1023,37 @@ class Mount(pulumi.CustomResource):
987
1023
  :param str resource_name: The unique name of the resulting resource.
988
1024
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
989
1025
  :param pulumi.ResourceOptions opts: Options for the resource.
990
- :param pulumi.Input[builtins.str] accessor: The accessor for this mount.
991
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
992
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_response_headers: List of headers to allow, allowing a plugin to include
1026
+ :param pulumi.Input[_builtins.str] accessor: The accessor for this mount.
1027
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
1028
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow, allowing a plugin to include
993
1029
  them in the response.
994
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
995
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
996
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
997
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] delegated_auth_accessors: List of allowed authentication mount accessors the
1030
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1031
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1032
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
1033
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of allowed authentication mount accessors the
998
1034
  backend can request delegated authentication for.
999
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount
1000
- :param pulumi.Input[builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
1001
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens. If
1035
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
1036
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
1037
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1038
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens. If
1002
1039
  not provided, this will default to Vault's OIDC default key.
1003
- :param pulumi.Input[builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific
1040
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific
1004
1041
  listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
1005
- :param pulumi.Input[builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
1006
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
1007
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
1042
+ :param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
1043
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
1044
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
1008
1045
  The value should not contain leading or trailing forward slashes.
1009
1046
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1010
1047
  *Available only for Vault Enterprise*.
1011
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1012
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to
1048
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1049
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to
1013
1050
  the plugin.
1014
- :param pulumi.Input[builtins.str] path: Where the secret backend will be mounted
1015
- :param pulumi.Input[builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
1051
+ :param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
1052
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
1016
1053
  If unspecified, the server will select any matching unversioned plugin that may have been
1017
1054
  registered, the latest versioned plugin registered, or a built-in plugin in that order of precedence.
1018
- :param pulumi.Input[builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1019
- :param pulumi.Input[builtins.str] type: Type of the backend, such as "aws"
1055
+ :param pulumi.Input[_builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1056
+ :param pulumi.Input[_builtins.str] type: Type of the backend, such as "aws"
1020
1057
  """
1021
1058
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
1022
1059
 
@@ -1031,6 +1068,7 @@ class Mount(pulumi.CustomResource):
1031
1068
  __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
1032
1069
  __props__.__dict__["description"] = description
1033
1070
  __props__.__dict__["external_entropy_access"] = external_entropy_access
1071
+ __props__.__dict__["force_no_cache"] = force_no_cache
1034
1072
  __props__.__dict__["identity_token_key"] = identity_token_key
1035
1073
  __props__.__dict__["listing_visibility"] = listing_visibility
1036
1074
  __props__.__dict__["local"] = local
@@ -1044,117 +1082,125 @@ class Mount(pulumi.CustomResource):
1044
1082
  __props__.__dict__["type"] = type
1045
1083
  return Mount(resource_name, opts=opts, __props__=__props__)
1046
1084
 
1047
- @property
1085
+ @_builtins.property
1048
1086
  @pulumi.getter
1049
- def accessor(self) -> pulumi.Output[builtins.str]:
1087
+ def accessor(self) -> pulumi.Output[_builtins.str]:
1050
1088
  """
1051
1089
  The accessor for this mount.
1052
1090
  """
1053
1091
  return pulumi.get(self, "accessor")
1054
1092
 
1055
- @property
1093
+ @_builtins.property
1056
1094
  @pulumi.getter(name="allowedManagedKeys")
1057
- def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1095
+ def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1058
1096
  """
1059
1097
  Set of managed key registry entry names that the mount in question is allowed to access
1060
1098
  """
1061
1099
  return pulumi.get(self, "allowed_managed_keys")
1062
1100
 
1063
- @property
1101
+ @_builtins.property
1064
1102
  @pulumi.getter(name="allowedResponseHeaders")
1065
- def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1103
+ def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1066
1104
  """
1067
1105
  List of headers to allow, allowing a plugin to include
1068
1106
  them in the response.
1069
1107
  """
1070
1108
  return pulumi.get(self, "allowed_response_headers")
1071
1109
 
1072
- @property
1110
+ @_builtins.property
1073
1111
  @pulumi.getter(name="auditNonHmacRequestKeys")
1074
- def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[builtins.str]]:
1112
+ def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1075
1113
  """
1076
1114
  Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1077
1115
  """
1078
1116
  return pulumi.get(self, "audit_non_hmac_request_keys")
1079
1117
 
1080
- @property
1118
+ @_builtins.property
1081
1119
  @pulumi.getter(name="auditNonHmacResponseKeys")
1082
- def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[builtins.str]]:
1120
+ def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1083
1121
  """
1084
1122
  Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1085
1123
  """
1086
1124
  return pulumi.get(self, "audit_non_hmac_response_keys")
1087
1125
 
1088
- @property
1126
+ @_builtins.property
1089
1127
  @pulumi.getter(name="defaultLeaseTtlSeconds")
1090
- def default_lease_ttl_seconds(self) -> pulumi.Output[builtins.int]:
1128
+ def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1091
1129
  """
1092
1130
  Default lease duration for tokens and secrets in seconds
1093
1131
  """
1094
1132
  return pulumi.get(self, "default_lease_ttl_seconds")
1095
1133
 
1096
- @property
1134
+ @_builtins.property
1097
1135
  @pulumi.getter(name="delegatedAuthAccessors")
1098
- def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1136
+ def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1099
1137
  """
1100
1138
  List of allowed authentication mount accessors the
1101
1139
  backend can request delegated authentication for.
1102
1140
  """
1103
1141
  return pulumi.get(self, "delegated_auth_accessors")
1104
1142
 
1105
- @property
1143
+ @_builtins.property
1106
1144
  @pulumi.getter
1107
- def description(self) -> pulumi.Output[Optional[builtins.str]]:
1145
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
1108
1146
  """
1109
1147
  Human-friendly description of the mount
1110
1148
  """
1111
1149
  return pulumi.get(self, "description")
1112
1150
 
1113
- @property
1151
+ @_builtins.property
1114
1152
  @pulumi.getter(name="externalEntropyAccess")
1115
- def external_entropy_access(self) -> pulumi.Output[Optional[builtins.bool]]:
1153
+ def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
1116
1154
  """
1117
1155
  Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
1118
1156
  """
1119
1157
  return pulumi.get(self, "external_entropy_access")
1120
1158
 
1121
- @property
1159
+ @_builtins.property
1160
+ @pulumi.getter(name="forceNoCache")
1161
+ def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
1162
+ """
1163
+ If set to true, disables caching.
1164
+ """
1165
+ return pulumi.get(self, "force_no_cache")
1166
+
1167
+ @_builtins.property
1122
1168
  @pulumi.getter(name="identityTokenKey")
1123
- def identity_token_key(self) -> pulumi.Output[Optional[builtins.str]]:
1169
+ def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
1124
1170
  """
1125
1171
  The key to use for signing plugin workload identity tokens. If
1126
1172
  not provided, this will default to Vault's OIDC default key.
1127
1173
  """
1128
1174
  return pulumi.get(self, "identity_token_key")
1129
1175
 
1130
- @property
1176
+ @_builtins.property
1131
1177
  @pulumi.getter(name="listingVisibility")
1132
- def listing_visibility(self) -> pulumi.Output[Optional[builtins.str]]:
1178
+ def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
1133
1179
  """
1134
1180
  Specifies whether to show this mount in the UI-specific
1135
1181
  listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
1136
1182
  """
1137
1183
  return pulumi.get(self, "listing_visibility")
1138
1184
 
1139
- @property
1185
+ @_builtins.property
1140
1186
  @pulumi.getter
1141
- def local(self) -> pulumi.Output[Optional[builtins.bool]]:
1187
+ def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
1142
1188
  """
1143
1189
  Boolean flag that can be explicitly set to true to enforce local mount in HA environment
1144
1190
  """
1145
1191
  return pulumi.get(self, "local")
1146
1192
 
1147
- @property
1193
+ @_builtins.property
1148
1194
  @pulumi.getter(name="maxLeaseTtlSeconds")
1149
- def max_lease_ttl_seconds(self) -> pulumi.Output[builtins.int]:
1195
+ def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1150
1196
  """
1151
1197
  Maximum possible lease duration for tokens and secrets in seconds
1152
1198
  """
1153
1199
  return pulumi.get(self, "max_lease_ttl_seconds")
1154
1200
 
1155
- @property
1201
+ @_builtins.property
1156
1202
  @pulumi.getter
1157
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
1203
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
1158
1204
  """
1159
1205
  The namespace to provision the resource in.
1160
1206
  The value should not contain leading or trailing forward slashes.
@@ -1163,34 +1209,34 @@ class Mount(pulumi.CustomResource):
1163
1209
  """
1164
1210
  return pulumi.get(self, "namespace")
1165
1211
 
1166
- @property
1212
+ @_builtins.property
1167
1213
  @pulumi.getter
1168
- def options(self) -> pulumi.Output[Optional[Mapping[str, builtins.str]]]:
1214
+ def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
1169
1215
  """
1170
1216
  Specifies mount type specific options that are passed to the backend
1171
1217
  """
1172
1218
  return pulumi.get(self, "options")
1173
1219
 
1174
- @property
1220
+ @_builtins.property
1175
1221
  @pulumi.getter(name="passthroughRequestHeaders")
1176
- def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1222
+ def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1177
1223
  """
1178
1224
  List of headers to allow and pass from the request to
1179
1225
  the plugin.
1180
1226
  """
1181
1227
  return pulumi.get(self, "passthrough_request_headers")
1182
1228
 
1183
- @property
1229
+ @_builtins.property
1184
1230
  @pulumi.getter
1185
- def path(self) -> pulumi.Output[builtins.str]:
1231
+ def path(self) -> pulumi.Output[_builtins.str]:
1186
1232
  """
1187
1233
  Where the secret backend will be mounted
1188
1234
  """
1189
1235
  return pulumi.get(self, "path")
1190
1236
 
1191
- @property
1237
+ @_builtins.property
1192
1238
  @pulumi.getter(name="pluginVersion")
1193
- def plugin_version(self) -> pulumi.Output[Optional[builtins.str]]:
1239
+ def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
1194
1240
  """
1195
1241
  Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
1196
1242
  If unspecified, the server will select any matching unversioned plugin that may have been
@@ -1198,17 +1244,17 @@ class Mount(pulumi.CustomResource):
1198
1244
  """
1199
1245
  return pulumi.get(self, "plugin_version")
1200
1246
 
1201
- @property
1247
+ @_builtins.property
1202
1248
  @pulumi.getter(name="sealWrap")
1203
- def seal_wrap(self) -> pulumi.Output[builtins.bool]:
1249
+ def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
1204
1250
  """
1205
1251
  Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1206
1252
  """
1207
1253
  return pulumi.get(self, "seal_wrap")
1208
1254
 
1209
- @property
1255
+ @_builtins.property
1210
1256
  @pulumi.getter
1211
- def type(self) -> pulumi.Output[builtins.str]:
1257
+ def type(self) -> pulumi.Output[_builtins.str]:
1212
1258
  """
1213
1259
  Type of the backend, such as "aws"
1214
1260
  """