pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +19 -1
- pulumi_vault/_inputs.py +873 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +1016 -439
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +1057 -285
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +887 -256
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +426 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +878 -336
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +400 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +1006 -227
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +431 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +732 -693
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +380 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +909 -271
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +234 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +205 -159
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +902 -231
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +217 -124
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +833 -155
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +377 -350
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0.dist-info/RECORD +270 -0
- pulumi_vault-7.1.0.dist-info/RECORD +0 -268
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -22,24 +21,25 @@ __all__ = ['SecretsMountArgs', 'SecretsMount']
|
|
22
21
|
@pulumi.input_type
|
23
22
|
class SecretsMountArgs:
|
24
23
|
def __init__(__self__, *,
|
25
|
-
path: pulumi.Input[
|
26
|
-
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
27
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
28
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
29
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
24
|
+
path: pulumi.Input[_builtins.str],
|
25
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
26
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
27
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
28
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
30
29
|
cassandras: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]]] = None,
|
31
30
|
couchbases: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]]] = None,
|
32
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
33
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[
|
34
|
-
description: Optional[pulumi.Input[
|
31
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
32
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
33
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
35
34
|
elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]]] = None,
|
36
|
-
external_entropy_access: Optional[pulumi.Input[
|
35
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
36
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
37
37
|
hanas: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]]] = None,
|
38
|
-
identity_token_key: Optional[pulumi.Input[
|
38
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
39
39
|
influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]] = None,
|
40
|
-
listing_visibility: Optional[pulumi.Input[
|
41
|
-
local: Optional[pulumi.Input[
|
42
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
40
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
41
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
42
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
43
43
|
mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]]] = None,
|
44
44
|
mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]]] = None,
|
45
45
|
mssqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMssqlArgs']]]] = None,
|
@@ -47,44 +47,45 @@ class SecretsMountArgs:
|
|
47
47
|
mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlLegacyArgs']]]] = None,
|
48
48
|
mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]] = None,
|
49
49
|
mysqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]] = None,
|
50
|
-
namespace: Optional[pulumi.Input[
|
51
|
-
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
50
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
51
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
52
52
|
oracles: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]] = None,
|
53
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
54
|
-
plugin_version: Optional[pulumi.Input[
|
53
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
54
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
55
55
|
postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]]] = None,
|
56
56
|
redis: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]]] = None,
|
57
57
|
redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedisElasticachArgs']]]] = None,
|
58
58
|
redshifts: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]]] = None,
|
59
|
-
seal_wrap: Optional[pulumi.Input[
|
59
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
60
60
|
snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountSnowflakeArgs']]]] = None):
|
61
61
|
"""
|
62
62
|
The set of arguments for constructing a SecretsMount resource.
|
63
|
-
:param pulumi.Input[
|
64
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
63
|
+
:param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
|
64
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
|
65
65
|
|
66
66
|
The following arguments are common to all database engines:
|
67
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
68
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
69
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
67
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
68
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
69
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
70
70
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]] cassandras: A nested block containing configuration options for Cassandra connections.
|
71
71
|
*See Configuration Options for more info*
|
72
72
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]] couchbases: A nested block containing configuration options for Couchbase connections.
|
73
73
|
*See Configuration Options for more info*
|
74
|
-
:param pulumi.Input[
|
75
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
76
|
-
:param pulumi.Input[
|
74
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
75
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
76
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
77
77
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]] elasticsearches: A nested block containing configuration options for Elasticsearch connections.
|
78
78
|
*See Configuration Options for more info*
|
79
|
-
:param pulumi.Input[
|
79
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
80
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
80
81
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]] hanas: A nested block containing configuration options for SAP HanaDB connections.
|
81
82
|
*See Configuration Options for more info*
|
82
|
-
:param pulumi.Input[
|
83
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
83
84
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]] influxdbs: A nested block containing configuration options for InfluxDB connections.
|
84
85
|
*See Configuration Options for more info*
|
85
|
-
:param pulumi.Input[
|
86
|
-
:param pulumi.Input[
|
87
|
-
:param pulumi.Input[
|
86
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
87
|
+
:param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
88
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
88
89
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
|
89
90
|
*See Configuration Options for more info*
|
90
91
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]] mongodbs: A nested block containing configuration options for MongoDB connections.
|
@@ -99,12 +100,12 @@ class SecretsMountArgs:
|
|
99
100
|
*See Configuration Options for more info*
|
100
101
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]] mysqls: A nested block containing configuration options for MySQL connections.
|
101
102
|
*See Configuration Options for more info*
|
102
|
-
:param pulumi.Input[
|
103
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
103
|
+
:param pulumi.Input[_builtins.str] namespace: Target namespace. (requires Enterprise)
|
104
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
104
105
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]] oracles: A nested block containing configuration options for Oracle connections.
|
105
106
|
*See Configuration Options for more info*
|
106
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
107
|
-
:param pulumi.Input[
|
107
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
108
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
108
109
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]] postgresqls: A nested block containing configuration options for PostgreSQL connections.
|
109
110
|
*See Configuration Options for more info*
|
110
111
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]] redis: A nested block containing configuration options for Redis connections.
|
@@ -113,7 +114,7 @@ class SecretsMountArgs:
|
|
113
114
|
*See Configuration Options for more info*
|
114
115
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]] redshifts: A nested block containing configuration options for AWS Redshift connections.
|
115
116
|
*See Configuration Options for more info*
|
116
|
-
:param pulumi.Input[
|
117
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
117
118
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountSnowflakeArgs']]] snowflakes: A nested block containing configuration options for Snowflake connections.
|
118
119
|
*See Configuration Options for more info*
|
119
120
|
"""
|
@@ -140,6 +141,8 @@ class SecretsMountArgs:
|
|
140
141
|
pulumi.set(__self__, "elasticsearches", elasticsearches)
|
141
142
|
if external_entropy_access is not None:
|
142
143
|
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
144
|
+
if force_no_cache is not None:
|
145
|
+
pulumi.set(__self__, "force_no_cache", force_no_cache)
|
143
146
|
if hanas is not None:
|
144
147
|
pulumi.set(__self__, "hanas", hanas)
|
145
148
|
if identity_token_key is not None:
|
@@ -189,21 +192,21 @@ class SecretsMountArgs:
|
|
189
192
|
if snowflakes is not None:
|
190
193
|
pulumi.set(__self__, "snowflakes", snowflakes)
|
191
194
|
|
192
|
-
@property
|
195
|
+
@_builtins.property
|
193
196
|
@pulumi.getter
|
194
|
-
def path(self) -> pulumi.Input[
|
197
|
+
def path(self) -> pulumi.Input[_builtins.str]:
|
195
198
|
"""
|
196
199
|
Where the secret backend will be mounted
|
197
200
|
"""
|
198
201
|
return pulumi.get(self, "path")
|
199
202
|
|
200
203
|
@path.setter
|
201
|
-
def path(self, value: pulumi.Input[
|
204
|
+
def path(self, value: pulumi.Input[_builtins.str]):
|
202
205
|
pulumi.set(self, "path", value)
|
203
206
|
|
204
|
-
@property
|
207
|
+
@_builtins.property
|
205
208
|
@pulumi.getter(name="allowedManagedKeys")
|
206
|
-
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
209
|
+
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
207
210
|
"""
|
208
211
|
Set of managed key registry entry names that the mount in question is allowed to access
|
209
212
|
|
@@ -212,46 +215,46 @@ class SecretsMountArgs:
|
|
212
215
|
return pulumi.get(self, "allowed_managed_keys")
|
213
216
|
|
214
217
|
@allowed_managed_keys.setter
|
215
|
-
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
218
|
+
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
216
219
|
pulumi.set(self, "allowed_managed_keys", value)
|
217
220
|
|
218
|
-
@property
|
221
|
+
@_builtins.property
|
219
222
|
@pulumi.getter(name="allowedResponseHeaders")
|
220
|
-
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
223
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
221
224
|
"""
|
222
225
|
List of headers to allow and pass from the request to the plugin
|
223
226
|
"""
|
224
227
|
return pulumi.get(self, "allowed_response_headers")
|
225
228
|
|
226
229
|
@allowed_response_headers.setter
|
227
|
-
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
230
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
228
231
|
pulumi.set(self, "allowed_response_headers", value)
|
229
232
|
|
230
|
-
@property
|
233
|
+
@_builtins.property
|
231
234
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
232
|
-
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
235
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
233
236
|
"""
|
234
237
|
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
235
238
|
"""
|
236
239
|
return pulumi.get(self, "audit_non_hmac_request_keys")
|
237
240
|
|
238
241
|
@audit_non_hmac_request_keys.setter
|
239
|
-
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
242
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
240
243
|
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
241
244
|
|
242
|
-
@property
|
245
|
+
@_builtins.property
|
243
246
|
@pulumi.getter(name="auditNonHmacResponseKeys")
|
244
|
-
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
247
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
245
248
|
"""
|
246
249
|
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
247
250
|
"""
|
248
251
|
return pulumi.get(self, "audit_non_hmac_response_keys")
|
249
252
|
|
250
253
|
@audit_non_hmac_response_keys.setter
|
251
|
-
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
254
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
252
255
|
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
253
256
|
|
254
|
-
@property
|
257
|
+
@_builtins.property
|
255
258
|
@pulumi.getter
|
256
259
|
def cassandras(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]]]:
|
257
260
|
"""
|
@@ -264,7 +267,7 @@ class SecretsMountArgs:
|
|
264
267
|
def cassandras(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]]]):
|
265
268
|
pulumi.set(self, "cassandras", value)
|
266
269
|
|
267
|
-
@property
|
270
|
+
@_builtins.property
|
268
271
|
@pulumi.getter
|
269
272
|
def couchbases(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]]]:
|
270
273
|
"""
|
@@ -277,43 +280,43 @@ class SecretsMountArgs:
|
|
277
280
|
def couchbases(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]]]):
|
278
281
|
pulumi.set(self, "couchbases", value)
|
279
282
|
|
280
|
-
@property
|
283
|
+
@_builtins.property
|
281
284
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
282
|
-
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
285
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
283
286
|
"""
|
284
287
|
Default lease duration for tokens and secrets in seconds
|
285
288
|
"""
|
286
289
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
287
290
|
|
288
291
|
@default_lease_ttl_seconds.setter
|
289
|
-
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
292
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
290
293
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
291
294
|
|
292
|
-
@property
|
295
|
+
@_builtins.property
|
293
296
|
@pulumi.getter(name="delegatedAuthAccessors")
|
294
|
-
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
297
|
+
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
295
298
|
"""
|
296
299
|
List of headers to allow and pass from the request to the plugin
|
297
300
|
"""
|
298
301
|
return pulumi.get(self, "delegated_auth_accessors")
|
299
302
|
|
300
303
|
@delegated_auth_accessors.setter
|
301
|
-
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
304
|
+
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
302
305
|
pulumi.set(self, "delegated_auth_accessors", value)
|
303
306
|
|
304
|
-
@property
|
307
|
+
@_builtins.property
|
305
308
|
@pulumi.getter
|
306
|
-
def description(self) -> Optional[pulumi.Input[
|
309
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
307
310
|
"""
|
308
311
|
Human-friendly description of the mount
|
309
312
|
"""
|
310
313
|
return pulumi.get(self, "description")
|
311
314
|
|
312
315
|
@description.setter
|
313
|
-
def description(self, value: Optional[pulumi.Input[
|
316
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
314
317
|
pulumi.set(self, "description", value)
|
315
318
|
|
316
|
-
@property
|
319
|
+
@_builtins.property
|
317
320
|
@pulumi.getter
|
318
321
|
def elasticsearches(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]]]:
|
319
322
|
"""
|
@@ -326,19 +329,31 @@ class SecretsMountArgs:
|
|
326
329
|
def elasticsearches(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]]]):
|
327
330
|
pulumi.set(self, "elasticsearches", value)
|
328
331
|
|
329
|
-
@property
|
332
|
+
@_builtins.property
|
330
333
|
@pulumi.getter(name="externalEntropyAccess")
|
331
|
-
def external_entropy_access(self) -> Optional[pulumi.Input[
|
334
|
+
def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
332
335
|
"""
|
333
336
|
Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
334
337
|
"""
|
335
338
|
return pulumi.get(self, "external_entropy_access")
|
336
339
|
|
337
340
|
@external_entropy_access.setter
|
338
|
-
def external_entropy_access(self, value: Optional[pulumi.Input[
|
341
|
+
def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
339
342
|
pulumi.set(self, "external_entropy_access", value)
|
340
343
|
|
341
|
-
@property
|
344
|
+
@_builtins.property
|
345
|
+
@pulumi.getter(name="forceNoCache")
|
346
|
+
def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
347
|
+
"""
|
348
|
+
If set to true, disables caching.
|
349
|
+
"""
|
350
|
+
return pulumi.get(self, "force_no_cache")
|
351
|
+
|
352
|
+
@force_no_cache.setter
|
353
|
+
def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
354
|
+
pulumi.set(self, "force_no_cache", value)
|
355
|
+
|
356
|
+
@_builtins.property
|
342
357
|
@pulumi.getter
|
343
358
|
def hanas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]]]:
|
344
359
|
"""
|
@@ -351,19 +366,19 @@ class SecretsMountArgs:
|
|
351
366
|
def hanas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]]]):
|
352
367
|
pulumi.set(self, "hanas", value)
|
353
368
|
|
354
|
-
@property
|
369
|
+
@_builtins.property
|
355
370
|
@pulumi.getter(name="identityTokenKey")
|
356
|
-
def identity_token_key(self) -> Optional[pulumi.Input[
|
371
|
+
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
357
372
|
"""
|
358
373
|
The key to use for signing plugin workload identity tokens
|
359
374
|
"""
|
360
375
|
return pulumi.get(self, "identity_token_key")
|
361
376
|
|
362
377
|
@identity_token_key.setter
|
363
|
-
def identity_token_key(self, value: Optional[pulumi.Input[
|
378
|
+
def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
364
379
|
pulumi.set(self, "identity_token_key", value)
|
365
380
|
|
366
|
-
@property
|
381
|
+
@_builtins.property
|
367
382
|
@pulumi.getter
|
368
383
|
def influxdbs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]]:
|
369
384
|
"""
|
@@ -376,43 +391,43 @@ class SecretsMountArgs:
|
|
376
391
|
def influxdbs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]]):
|
377
392
|
pulumi.set(self, "influxdbs", value)
|
378
393
|
|
379
|
-
@property
|
394
|
+
@_builtins.property
|
380
395
|
@pulumi.getter(name="listingVisibility")
|
381
|
-
def listing_visibility(self) -> Optional[pulumi.Input[
|
396
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
382
397
|
"""
|
383
398
|
Specifies whether to show this mount in the UI-specific listing endpoint
|
384
399
|
"""
|
385
400
|
return pulumi.get(self, "listing_visibility")
|
386
401
|
|
387
402
|
@listing_visibility.setter
|
388
|
-
def listing_visibility(self, value: Optional[pulumi.Input[
|
403
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
389
404
|
pulumi.set(self, "listing_visibility", value)
|
390
405
|
|
391
|
-
@property
|
406
|
+
@_builtins.property
|
392
407
|
@pulumi.getter
|
393
|
-
def local(self) -> Optional[pulumi.Input[
|
408
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
394
409
|
"""
|
395
410
|
Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
396
411
|
"""
|
397
412
|
return pulumi.get(self, "local")
|
398
413
|
|
399
414
|
@local.setter
|
400
|
-
def local(self, value: Optional[pulumi.Input[
|
415
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
401
416
|
pulumi.set(self, "local", value)
|
402
417
|
|
403
|
-
@property
|
418
|
+
@_builtins.property
|
404
419
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
405
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
420
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
406
421
|
"""
|
407
422
|
Maximum possible lease duration for tokens and secrets in seconds
|
408
423
|
"""
|
409
424
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
410
425
|
|
411
426
|
@max_lease_ttl_seconds.setter
|
412
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
427
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
413
428
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
414
429
|
|
415
|
-
@property
|
430
|
+
@_builtins.property
|
416
431
|
@pulumi.getter
|
417
432
|
def mongodbatlas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]]]:
|
418
433
|
"""
|
@@ -425,7 +440,7 @@ class SecretsMountArgs:
|
|
425
440
|
def mongodbatlas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]]]):
|
426
441
|
pulumi.set(self, "mongodbatlas", value)
|
427
442
|
|
428
|
-
@property
|
443
|
+
@_builtins.property
|
429
444
|
@pulumi.getter
|
430
445
|
def mongodbs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]]]:
|
431
446
|
"""
|
@@ -438,7 +453,7 @@ class SecretsMountArgs:
|
|
438
453
|
def mongodbs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]]]):
|
439
454
|
pulumi.set(self, "mongodbs", value)
|
440
455
|
|
441
|
-
@property
|
456
|
+
@_builtins.property
|
442
457
|
@pulumi.getter
|
443
458
|
def mssqls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMssqlArgs']]]]:
|
444
459
|
"""
|
@@ -451,7 +466,7 @@ class SecretsMountArgs:
|
|
451
466
|
def mssqls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMssqlArgs']]]]):
|
452
467
|
pulumi.set(self, "mssqls", value)
|
453
468
|
|
454
|
-
@property
|
469
|
+
@_builtins.property
|
455
470
|
@pulumi.getter(name="mysqlAuroras")
|
456
471
|
def mysql_auroras(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlAuroraArgs']]]]:
|
457
472
|
"""
|
@@ -464,7 +479,7 @@ class SecretsMountArgs:
|
|
464
479
|
def mysql_auroras(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlAuroraArgs']]]]):
|
465
480
|
pulumi.set(self, "mysql_auroras", value)
|
466
481
|
|
467
|
-
@property
|
482
|
+
@_builtins.property
|
468
483
|
@pulumi.getter(name="mysqlLegacies")
|
469
484
|
def mysql_legacies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlLegacyArgs']]]]:
|
470
485
|
"""
|
@@ -477,7 +492,7 @@ class SecretsMountArgs:
|
|
477
492
|
def mysql_legacies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlLegacyArgs']]]]):
|
478
493
|
pulumi.set(self, "mysql_legacies", value)
|
479
494
|
|
480
|
-
@property
|
495
|
+
@_builtins.property
|
481
496
|
@pulumi.getter(name="mysqlRds")
|
482
497
|
def mysql_rds(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]]:
|
483
498
|
"""
|
@@ -490,7 +505,7 @@ class SecretsMountArgs:
|
|
490
505
|
def mysql_rds(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]]):
|
491
506
|
pulumi.set(self, "mysql_rds", value)
|
492
507
|
|
493
|
-
@property
|
508
|
+
@_builtins.property
|
494
509
|
@pulumi.getter
|
495
510
|
def mysqls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]]:
|
496
511
|
"""
|
@@ -503,31 +518,31 @@ class SecretsMountArgs:
|
|
503
518
|
def mysqls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]]):
|
504
519
|
pulumi.set(self, "mysqls", value)
|
505
520
|
|
506
|
-
@property
|
521
|
+
@_builtins.property
|
507
522
|
@pulumi.getter
|
508
|
-
def namespace(self) -> Optional[pulumi.Input[
|
523
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
509
524
|
"""
|
510
525
|
Target namespace. (requires Enterprise)
|
511
526
|
"""
|
512
527
|
return pulumi.get(self, "namespace")
|
513
528
|
|
514
529
|
@namespace.setter
|
515
|
-
def namespace(self, value: Optional[pulumi.Input[
|
530
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
516
531
|
pulumi.set(self, "namespace", value)
|
517
532
|
|
518
|
-
@property
|
533
|
+
@_builtins.property
|
519
534
|
@pulumi.getter
|
520
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
535
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
521
536
|
"""
|
522
537
|
Specifies mount type specific options that are passed to the backend
|
523
538
|
"""
|
524
539
|
return pulumi.get(self, "options")
|
525
540
|
|
526
541
|
@options.setter
|
527
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
542
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
528
543
|
pulumi.set(self, "options", value)
|
529
544
|
|
530
|
-
@property
|
545
|
+
@_builtins.property
|
531
546
|
@pulumi.getter
|
532
547
|
def oracles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]]:
|
533
548
|
"""
|
@@ -540,31 +555,31 @@ class SecretsMountArgs:
|
|
540
555
|
def oracles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]]):
|
541
556
|
pulumi.set(self, "oracles", value)
|
542
557
|
|
543
|
-
@property
|
558
|
+
@_builtins.property
|
544
559
|
@pulumi.getter(name="passthroughRequestHeaders")
|
545
|
-
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
560
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
546
561
|
"""
|
547
562
|
List of headers to allow and pass from the request to the plugin
|
548
563
|
"""
|
549
564
|
return pulumi.get(self, "passthrough_request_headers")
|
550
565
|
|
551
566
|
@passthrough_request_headers.setter
|
552
|
-
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
567
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
553
568
|
pulumi.set(self, "passthrough_request_headers", value)
|
554
569
|
|
555
|
-
@property
|
570
|
+
@_builtins.property
|
556
571
|
@pulumi.getter(name="pluginVersion")
|
557
|
-
def plugin_version(self) -> Optional[pulumi.Input[
|
572
|
+
def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
|
558
573
|
"""
|
559
574
|
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
560
575
|
"""
|
561
576
|
return pulumi.get(self, "plugin_version")
|
562
577
|
|
563
578
|
@plugin_version.setter
|
564
|
-
def plugin_version(self, value: Optional[pulumi.Input[
|
579
|
+
def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
|
565
580
|
pulumi.set(self, "plugin_version", value)
|
566
581
|
|
567
|
-
@property
|
582
|
+
@_builtins.property
|
568
583
|
@pulumi.getter
|
569
584
|
def postgresqls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]]]:
|
570
585
|
"""
|
@@ -577,7 +592,7 @@ class SecretsMountArgs:
|
|
577
592
|
def postgresqls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]]]):
|
578
593
|
pulumi.set(self, "postgresqls", value)
|
579
594
|
|
580
|
-
@property
|
595
|
+
@_builtins.property
|
581
596
|
@pulumi.getter
|
582
597
|
def redis(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]]]:
|
583
598
|
"""
|
@@ -590,7 +605,7 @@ class SecretsMountArgs:
|
|
590
605
|
def redis(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]]]):
|
591
606
|
pulumi.set(self, "redis", value)
|
592
607
|
|
593
|
-
@property
|
608
|
+
@_builtins.property
|
594
609
|
@pulumi.getter(name="redisElasticaches")
|
595
610
|
def redis_elasticaches(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedisElasticachArgs']]]]:
|
596
611
|
"""
|
@@ -603,7 +618,7 @@ class SecretsMountArgs:
|
|
603
618
|
def redis_elasticaches(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedisElasticachArgs']]]]):
|
604
619
|
pulumi.set(self, "redis_elasticaches", value)
|
605
620
|
|
606
|
-
@property
|
621
|
+
@_builtins.property
|
607
622
|
@pulumi.getter
|
608
623
|
def redshifts(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]]]:
|
609
624
|
"""
|
@@ -616,19 +631,19 @@ class SecretsMountArgs:
|
|
616
631
|
def redshifts(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]]]):
|
617
632
|
pulumi.set(self, "redshifts", value)
|
618
633
|
|
619
|
-
@property
|
634
|
+
@_builtins.property
|
620
635
|
@pulumi.getter(name="sealWrap")
|
621
|
-
def seal_wrap(self) -> Optional[pulumi.Input[
|
636
|
+
def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
622
637
|
"""
|
623
638
|
Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
624
639
|
"""
|
625
640
|
return pulumi.get(self, "seal_wrap")
|
626
641
|
|
627
642
|
@seal_wrap.setter
|
628
|
-
def seal_wrap(self, value: Optional[pulumi.Input[
|
643
|
+
def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
629
644
|
pulumi.set(self, "seal_wrap", value)
|
630
645
|
|
631
|
-
@property
|
646
|
+
@_builtins.property
|
632
647
|
@pulumi.getter
|
633
648
|
def snowflakes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountSnowflakeArgs']]]]:
|
634
649
|
"""
|
@@ -645,25 +660,26 @@ class SecretsMountArgs:
|
|
645
660
|
@pulumi.input_type
|
646
661
|
class _SecretsMountState:
|
647
662
|
def __init__(__self__, *,
|
648
|
-
accessor: Optional[pulumi.Input[
|
649
|
-
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
650
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
651
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
652
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
663
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
664
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
665
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
666
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
667
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
653
668
|
cassandras: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]]] = None,
|
654
669
|
couchbases: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]]] = None,
|
655
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
656
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[
|
657
|
-
description: Optional[pulumi.Input[
|
670
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
671
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
672
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
658
673
|
elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]]] = None,
|
659
|
-
engine_count: Optional[pulumi.Input[
|
660
|
-
external_entropy_access: Optional[pulumi.Input[
|
674
|
+
engine_count: Optional[pulumi.Input[_builtins.int]] = None,
|
675
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
676
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
661
677
|
hanas: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]]] = None,
|
662
|
-
identity_token_key: Optional[pulumi.Input[
|
678
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
663
679
|
influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]] = None,
|
664
|
-
listing_visibility: Optional[pulumi.Input[
|
665
|
-
local: Optional[pulumi.Input[
|
666
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
680
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
681
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
682
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
667
683
|
mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]]] = None,
|
668
684
|
mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]]] = None,
|
669
685
|
mssqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMssqlArgs']]]] = None,
|
@@ -671,46 +687,47 @@ class _SecretsMountState:
|
|
671
687
|
mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlLegacyArgs']]]] = None,
|
672
688
|
mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]] = None,
|
673
689
|
mysqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]] = None,
|
674
|
-
namespace: Optional[pulumi.Input[
|
675
|
-
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
690
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
691
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
676
692
|
oracles: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]] = None,
|
677
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
678
|
-
path: Optional[pulumi.Input[
|
679
|
-
plugin_version: Optional[pulumi.Input[
|
693
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
694
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
695
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
680
696
|
postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]]] = None,
|
681
697
|
redis: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]]] = None,
|
682
698
|
redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedisElasticachArgs']]]] = None,
|
683
699
|
redshifts: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]]] = None,
|
684
|
-
seal_wrap: Optional[pulumi.Input[
|
700
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
685
701
|
snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountSnowflakeArgs']]]] = None):
|
686
702
|
"""
|
687
703
|
Input properties used for looking up and filtering SecretsMount resources.
|
688
|
-
:param pulumi.Input[
|
689
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
704
|
+
:param pulumi.Input[_builtins.str] accessor: Accessor of the mount
|
705
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
|
690
706
|
|
691
707
|
The following arguments are common to all database engines:
|
692
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
693
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
694
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
708
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
709
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
710
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
695
711
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]] cassandras: A nested block containing configuration options for Cassandra connections.
|
696
712
|
*See Configuration Options for more info*
|
697
713
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]] couchbases: A nested block containing configuration options for Couchbase connections.
|
698
714
|
*See Configuration Options for more info*
|
699
|
-
:param pulumi.Input[
|
700
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
701
|
-
:param pulumi.Input[
|
715
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
716
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
717
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
702
718
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]] elasticsearches: A nested block containing configuration options for Elasticsearch connections.
|
703
719
|
*See Configuration Options for more info*
|
704
|
-
:param pulumi.Input[
|
705
|
-
:param pulumi.Input[
|
720
|
+
:param pulumi.Input[_builtins.int] engine_count: The total number of database secrets engines configured.
|
721
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
722
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
706
723
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]] hanas: A nested block containing configuration options for SAP HanaDB connections.
|
707
724
|
*See Configuration Options for more info*
|
708
|
-
:param pulumi.Input[
|
725
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
709
726
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]] influxdbs: A nested block containing configuration options for InfluxDB connections.
|
710
727
|
*See Configuration Options for more info*
|
711
|
-
:param pulumi.Input[
|
712
|
-
:param pulumi.Input[
|
713
|
-
:param pulumi.Input[
|
728
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
729
|
+
:param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
730
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
714
731
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
|
715
732
|
*See Configuration Options for more info*
|
716
733
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]] mongodbs: A nested block containing configuration options for MongoDB connections.
|
@@ -725,13 +742,13 @@ class _SecretsMountState:
|
|
725
742
|
*See Configuration Options for more info*
|
726
743
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]] mysqls: A nested block containing configuration options for MySQL connections.
|
727
744
|
*See Configuration Options for more info*
|
728
|
-
:param pulumi.Input[
|
729
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
745
|
+
:param pulumi.Input[_builtins.str] namespace: Target namespace. (requires Enterprise)
|
746
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
730
747
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]] oracles: A nested block containing configuration options for Oracle connections.
|
731
748
|
*See Configuration Options for more info*
|
732
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
733
|
-
:param pulumi.Input[
|
734
|
-
:param pulumi.Input[
|
749
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
750
|
+
:param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
|
751
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
735
752
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]] postgresqls: A nested block containing configuration options for PostgreSQL connections.
|
736
753
|
*See Configuration Options for more info*
|
737
754
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]] redis: A nested block containing configuration options for Redis connections.
|
@@ -740,7 +757,7 @@ class _SecretsMountState:
|
|
740
757
|
*See Configuration Options for more info*
|
741
758
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]] redshifts: A nested block containing configuration options for AWS Redshift connections.
|
742
759
|
*See Configuration Options for more info*
|
743
|
-
:param pulumi.Input[
|
760
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
744
761
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountSnowflakeArgs']]] snowflakes: A nested block containing configuration options for Snowflake connections.
|
745
762
|
*See Configuration Options for more info*
|
746
763
|
"""
|
@@ -770,6 +787,8 @@ class _SecretsMountState:
|
|
770
787
|
pulumi.set(__self__, "engine_count", engine_count)
|
771
788
|
if external_entropy_access is not None:
|
772
789
|
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
790
|
+
if force_no_cache is not None:
|
791
|
+
pulumi.set(__self__, "force_no_cache", force_no_cache)
|
773
792
|
if hanas is not None:
|
774
793
|
pulumi.set(__self__, "hanas", hanas)
|
775
794
|
if identity_token_key is not None:
|
@@ -821,21 +840,21 @@ class _SecretsMountState:
|
|
821
840
|
if snowflakes is not None:
|
822
841
|
pulumi.set(__self__, "snowflakes", snowflakes)
|
823
842
|
|
824
|
-
@property
|
843
|
+
@_builtins.property
|
825
844
|
@pulumi.getter
|
826
|
-
def accessor(self) -> Optional[pulumi.Input[
|
845
|
+
def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
|
827
846
|
"""
|
828
847
|
Accessor of the mount
|
829
848
|
"""
|
830
849
|
return pulumi.get(self, "accessor")
|
831
850
|
|
832
851
|
@accessor.setter
|
833
|
-
def accessor(self, value: Optional[pulumi.Input[
|
852
|
+
def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
|
834
853
|
pulumi.set(self, "accessor", value)
|
835
854
|
|
836
|
-
@property
|
855
|
+
@_builtins.property
|
837
856
|
@pulumi.getter(name="allowedManagedKeys")
|
838
|
-
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
857
|
+
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
839
858
|
"""
|
840
859
|
Set of managed key registry entry names that the mount in question is allowed to access
|
841
860
|
|
@@ -844,46 +863,46 @@ class _SecretsMountState:
|
|
844
863
|
return pulumi.get(self, "allowed_managed_keys")
|
845
864
|
|
846
865
|
@allowed_managed_keys.setter
|
847
|
-
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
866
|
+
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
848
867
|
pulumi.set(self, "allowed_managed_keys", value)
|
849
868
|
|
850
|
-
@property
|
869
|
+
@_builtins.property
|
851
870
|
@pulumi.getter(name="allowedResponseHeaders")
|
852
|
-
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
871
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
853
872
|
"""
|
854
873
|
List of headers to allow and pass from the request to the plugin
|
855
874
|
"""
|
856
875
|
return pulumi.get(self, "allowed_response_headers")
|
857
876
|
|
858
877
|
@allowed_response_headers.setter
|
859
|
-
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
878
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
860
879
|
pulumi.set(self, "allowed_response_headers", value)
|
861
880
|
|
862
|
-
@property
|
881
|
+
@_builtins.property
|
863
882
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
864
|
-
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
883
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
865
884
|
"""
|
866
885
|
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
867
886
|
"""
|
868
887
|
return pulumi.get(self, "audit_non_hmac_request_keys")
|
869
888
|
|
870
889
|
@audit_non_hmac_request_keys.setter
|
871
|
-
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
890
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
872
891
|
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
873
892
|
|
874
|
-
@property
|
893
|
+
@_builtins.property
|
875
894
|
@pulumi.getter(name="auditNonHmacResponseKeys")
|
876
|
-
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
895
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
877
896
|
"""
|
878
897
|
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
879
898
|
"""
|
880
899
|
return pulumi.get(self, "audit_non_hmac_response_keys")
|
881
900
|
|
882
901
|
@audit_non_hmac_response_keys.setter
|
883
|
-
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
902
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
884
903
|
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
885
904
|
|
886
|
-
@property
|
905
|
+
@_builtins.property
|
887
906
|
@pulumi.getter
|
888
907
|
def cassandras(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]]]:
|
889
908
|
"""
|
@@ -896,7 +915,7 @@ class _SecretsMountState:
|
|
896
915
|
def cassandras(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]]]):
|
897
916
|
pulumi.set(self, "cassandras", value)
|
898
917
|
|
899
|
-
@property
|
918
|
+
@_builtins.property
|
900
919
|
@pulumi.getter
|
901
920
|
def couchbases(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]]]:
|
902
921
|
"""
|
@@ -909,43 +928,43 @@ class _SecretsMountState:
|
|
909
928
|
def couchbases(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]]]):
|
910
929
|
pulumi.set(self, "couchbases", value)
|
911
930
|
|
912
|
-
@property
|
931
|
+
@_builtins.property
|
913
932
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
914
|
-
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
933
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
915
934
|
"""
|
916
935
|
Default lease duration for tokens and secrets in seconds
|
917
936
|
"""
|
918
937
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
919
938
|
|
920
939
|
@default_lease_ttl_seconds.setter
|
921
|
-
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
940
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
922
941
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
923
942
|
|
924
|
-
@property
|
943
|
+
@_builtins.property
|
925
944
|
@pulumi.getter(name="delegatedAuthAccessors")
|
926
|
-
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
945
|
+
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
927
946
|
"""
|
928
947
|
List of headers to allow and pass from the request to the plugin
|
929
948
|
"""
|
930
949
|
return pulumi.get(self, "delegated_auth_accessors")
|
931
950
|
|
932
951
|
@delegated_auth_accessors.setter
|
933
|
-
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
952
|
+
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
934
953
|
pulumi.set(self, "delegated_auth_accessors", value)
|
935
954
|
|
936
|
-
@property
|
955
|
+
@_builtins.property
|
937
956
|
@pulumi.getter
|
938
|
-
def description(self) -> Optional[pulumi.Input[
|
957
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
939
958
|
"""
|
940
959
|
Human-friendly description of the mount
|
941
960
|
"""
|
942
961
|
return pulumi.get(self, "description")
|
943
962
|
|
944
963
|
@description.setter
|
945
|
-
def description(self, value: Optional[pulumi.Input[
|
964
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
946
965
|
pulumi.set(self, "description", value)
|
947
966
|
|
948
|
-
@property
|
967
|
+
@_builtins.property
|
949
968
|
@pulumi.getter
|
950
969
|
def elasticsearches(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]]]:
|
951
970
|
"""
|
@@ -958,31 +977,43 @@ class _SecretsMountState:
|
|
958
977
|
def elasticsearches(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]]]):
|
959
978
|
pulumi.set(self, "elasticsearches", value)
|
960
979
|
|
961
|
-
@property
|
980
|
+
@_builtins.property
|
962
981
|
@pulumi.getter(name="engineCount")
|
963
|
-
def engine_count(self) -> Optional[pulumi.Input[
|
982
|
+
def engine_count(self) -> Optional[pulumi.Input[_builtins.int]]:
|
964
983
|
"""
|
965
984
|
The total number of database secrets engines configured.
|
966
985
|
"""
|
967
986
|
return pulumi.get(self, "engine_count")
|
968
987
|
|
969
988
|
@engine_count.setter
|
970
|
-
def engine_count(self, value: Optional[pulumi.Input[
|
989
|
+
def engine_count(self, value: Optional[pulumi.Input[_builtins.int]]):
|
971
990
|
pulumi.set(self, "engine_count", value)
|
972
991
|
|
973
|
-
@property
|
992
|
+
@_builtins.property
|
974
993
|
@pulumi.getter(name="externalEntropyAccess")
|
975
|
-
def external_entropy_access(self) -> Optional[pulumi.Input[
|
994
|
+
def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
976
995
|
"""
|
977
996
|
Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
978
997
|
"""
|
979
998
|
return pulumi.get(self, "external_entropy_access")
|
980
999
|
|
981
1000
|
@external_entropy_access.setter
|
982
|
-
def external_entropy_access(self, value: Optional[pulumi.Input[
|
1001
|
+
def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
983
1002
|
pulumi.set(self, "external_entropy_access", value)
|
984
1003
|
|
985
|
-
@property
|
1004
|
+
@_builtins.property
|
1005
|
+
@pulumi.getter(name="forceNoCache")
|
1006
|
+
def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1007
|
+
"""
|
1008
|
+
If set to true, disables caching.
|
1009
|
+
"""
|
1010
|
+
return pulumi.get(self, "force_no_cache")
|
1011
|
+
|
1012
|
+
@force_no_cache.setter
|
1013
|
+
def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1014
|
+
pulumi.set(self, "force_no_cache", value)
|
1015
|
+
|
1016
|
+
@_builtins.property
|
986
1017
|
@pulumi.getter
|
987
1018
|
def hanas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]]]:
|
988
1019
|
"""
|
@@ -995,19 +1026,19 @@ class _SecretsMountState:
|
|
995
1026
|
def hanas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]]]):
|
996
1027
|
pulumi.set(self, "hanas", value)
|
997
1028
|
|
998
|
-
@property
|
1029
|
+
@_builtins.property
|
999
1030
|
@pulumi.getter(name="identityTokenKey")
|
1000
|
-
def identity_token_key(self) -> Optional[pulumi.Input[
|
1031
|
+
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1001
1032
|
"""
|
1002
1033
|
The key to use for signing plugin workload identity tokens
|
1003
1034
|
"""
|
1004
1035
|
return pulumi.get(self, "identity_token_key")
|
1005
1036
|
|
1006
1037
|
@identity_token_key.setter
|
1007
|
-
def identity_token_key(self, value: Optional[pulumi.Input[
|
1038
|
+
def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1008
1039
|
pulumi.set(self, "identity_token_key", value)
|
1009
1040
|
|
1010
|
-
@property
|
1041
|
+
@_builtins.property
|
1011
1042
|
@pulumi.getter
|
1012
1043
|
def influxdbs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]]:
|
1013
1044
|
"""
|
@@ -1020,43 +1051,43 @@ class _SecretsMountState:
|
|
1020
1051
|
def influxdbs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]]):
|
1021
1052
|
pulumi.set(self, "influxdbs", value)
|
1022
1053
|
|
1023
|
-
@property
|
1054
|
+
@_builtins.property
|
1024
1055
|
@pulumi.getter(name="listingVisibility")
|
1025
|
-
def listing_visibility(self) -> Optional[pulumi.Input[
|
1056
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1026
1057
|
"""
|
1027
1058
|
Specifies whether to show this mount in the UI-specific listing endpoint
|
1028
1059
|
"""
|
1029
1060
|
return pulumi.get(self, "listing_visibility")
|
1030
1061
|
|
1031
1062
|
@listing_visibility.setter
|
1032
|
-
def listing_visibility(self, value: Optional[pulumi.Input[
|
1063
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1033
1064
|
pulumi.set(self, "listing_visibility", value)
|
1034
1065
|
|
1035
|
-
@property
|
1066
|
+
@_builtins.property
|
1036
1067
|
@pulumi.getter
|
1037
|
-
def local(self) -> Optional[pulumi.Input[
|
1068
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1038
1069
|
"""
|
1039
1070
|
Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
1040
1071
|
"""
|
1041
1072
|
return pulumi.get(self, "local")
|
1042
1073
|
|
1043
1074
|
@local.setter
|
1044
|
-
def local(self, value: Optional[pulumi.Input[
|
1075
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1045
1076
|
pulumi.set(self, "local", value)
|
1046
1077
|
|
1047
|
-
@property
|
1078
|
+
@_builtins.property
|
1048
1079
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
1049
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
1080
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
1050
1081
|
"""
|
1051
1082
|
Maximum possible lease duration for tokens and secrets in seconds
|
1052
1083
|
"""
|
1053
1084
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
1054
1085
|
|
1055
1086
|
@max_lease_ttl_seconds.setter
|
1056
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
1087
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
1057
1088
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
1058
1089
|
|
1059
|
-
@property
|
1090
|
+
@_builtins.property
|
1060
1091
|
@pulumi.getter
|
1061
1092
|
def mongodbatlas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]]]:
|
1062
1093
|
"""
|
@@ -1069,7 +1100,7 @@ class _SecretsMountState:
|
|
1069
1100
|
def mongodbatlas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]]]):
|
1070
1101
|
pulumi.set(self, "mongodbatlas", value)
|
1071
1102
|
|
1072
|
-
@property
|
1103
|
+
@_builtins.property
|
1073
1104
|
@pulumi.getter
|
1074
1105
|
def mongodbs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]]]:
|
1075
1106
|
"""
|
@@ -1082,7 +1113,7 @@ class _SecretsMountState:
|
|
1082
1113
|
def mongodbs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]]]):
|
1083
1114
|
pulumi.set(self, "mongodbs", value)
|
1084
1115
|
|
1085
|
-
@property
|
1116
|
+
@_builtins.property
|
1086
1117
|
@pulumi.getter
|
1087
1118
|
def mssqls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMssqlArgs']]]]:
|
1088
1119
|
"""
|
@@ -1095,7 +1126,7 @@ class _SecretsMountState:
|
|
1095
1126
|
def mssqls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMssqlArgs']]]]):
|
1096
1127
|
pulumi.set(self, "mssqls", value)
|
1097
1128
|
|
1098
|
-
@property
|
1129
|
+
@_builtins.property
|
1099
1130
|
@pulumi.getter(name="mysqlAuroras")
|
1100
1131
|
def mysql_auroras(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlAuroraArgs']]]]:
|
1101
1132
|
"""
|
@@ -1108,7 +1139,7 @@ class _SecretsMountState:
|
|
1108
1139
|
def mysql_auroras(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlAuroraArgs']]]]):
|
1109
1140
|
pulumi.set(self, "mysql_auroras", value)
|
1110
1141
|
|
1111
|
-
@property
|
1142
|
+
@_builtins.property
|
1112
1143
|
@pulumi.getter(name="mysqlLegacies")
|
1113
1144
|
def mysql_legacies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlLegacyArgs']]]]:
|
1114
1145
|
"""
|
@@ -1121,7 +1152,7 @@ class _SecretsMountState:
|
|
1121
1152
|
def mysql_legacies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlLegacyArgs']]]]):
|
1122
1153
|
pulumi.set(self, "mysql_legacies", value)
|
1123
1154
|
|
1124
|
-
@property
|
1155
|
+
@_builtins.property
|
1125
1156
|
@pulumi.getter(name="mysqlRds")
|
1126
1157
|
def mysql_rds(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]]:
|
1127
1158
|
"""
|
@@ -1134,7 +1165,7 @@ class _SecretsMountState:
|
|
1134
1165
|
def mysql_rds(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]]):
|
1135
1166
|
pulumi.set(self, "mysql_rds", value)
|
1136
1167
|
|
1137
|
-
@property
|
1168
|
+
@_builtins.property
|
1138
1169
|
@pulumi.getter
|
1139
1170
|
def mysqls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]]:
|
1140
1171
|
"""
|
@@ -1147,31 +1178,31 @@ class _SecretsMountState:
|
|
1147
1178
|
def mysqls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]]):
|
1148
1179
|
pulumi.set(self, "mysqls", value)
|
1149
1180
|
|
1150
|
-
@property
|
1181
|
+
@_builtins.property
|
1151
1182
|
@pulumi.getter
|
1152
|
-
def namespace(self) -> Optional[pulumi.Input[
|
1183
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1153
1184
|
"""
|
1154
1185
|
Target namespace. (requires Enterprise)
|
1155
1186
|
"""
|
1156
1187
|
return pulumi.get(self, "namespace")
|
1157
1188
|
|
1158
1189
|
@namespace.setter
|
1159
|
-
def namespace(self, value: Optional[pulumi.Input[
|
1190
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1160
1191
|
pulumi.set(self, "namespace", value)
|
1161
1192
|
|
1162
|
-
@property
|
1193
|
+
@_builtins.property
|
1163
1194
|
@pulumi.getter
|
1164
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
1195
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
1165
1196
|
"""
|
1166
1197
|
Specifies mount type specific options that are passed to the backend
|
1167
1198
|
"""
|
1168
1199
|
return pulumi.get(self, "options")
|
1169
1200
|
|
1170
1201
|
@options.setter
|
1171
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
1202
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
1172
1203
|
pulumi.set(self, "options", value)
|
1173
1204
|
|
1174
|
-
@property
|
1205
|
+
@_builtins.property
|
1175
1206
|
@pulumi.getter
|
1176
1207
|
def oracles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]]:
|
1177
1208
|
"""
|
@@ -1184,43 +1215,43 @@ class _SecretsMountState:
|
|
1184
1215
|
def oracles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]]):
|
1185
1216
|
pulumi.set(self, "oracles", value)
|
1186
1217
|
|
1187
|
-
@property
|
1218
|
+
@_builtins.property
|
1188
1219
|
@pulumi.getter(name="passthroughRequestHeaders")
|
1189
|
-
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
1220
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
1190
1221
|
"""
|
1191
1222
|
List of headers to allow and pass from the request to the plugin
|
1192
1223
|
"""
|
1193
1224
|
return pulumi.get(self, "passthrough_request_headers")
|
1194
1225
|
|
1195
1226
|
@passthrough_request_headers.setter
|
1196
|
-
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1227
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
1197
1228
|
pulumi.set(self, "passthrough_request_headers", value)
|
1198
1229
|
|
1199
|
-
@property
|
1230
|
+
@_builtins.property
|
1200
1231
|
@pulumi.getter
|
1201
|
-
def path(self) -> Optional[pulumi.Input[
|
1232
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1202
1233
|
"""
|
1203
1234
|
Where the secret backend will be mounted
|
1204
1235
|
"""
|
1205
1236
|
return pulumi.get(self, "path")
|
1206
1237
|
|
1207
1238
|
@path.setter
|
1208
|
-
def path(self, value: Optional[pulumi.Input[
|
1239
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1209
1240
|
pulumi.set(self, "path", value)
|
1210
1241
|
|
1211
|
-
@property
|
1242
|
+
@_builtins.property
|
1212
1243
|
@pulumi.getter(name="pluginVersion")
|
1213
|
-
def plugin_version(self) -> Optional[pulumi.Input[
|
1244
|
+
def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1214
1245
|
"""
|
1215
1246
|
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1216
1247
|
"""
|
1217
1248
|
return pulumi.get(self, "plugin_version")
|
1218
1249
|
|
1219
1250
|
@plugin_version.setter
|
1220
|
-
def plugin_version(self, value: Optional[pulumi.Input[
|
1251
|
+
def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1221
1252
|
pulumi.set(self, "plugin_version", value)
|
1222
1253
|
|
1223
|
-
@property
|
1254
|
+
@_builtins.property
|
1224
1255
|
@pulumi.getter
|
1225
1256
|
def postgresqls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]]]:
|
1226
1257
|
"""
|
@@ -1233,7 +1264,7 @@ class _SecretsMountState:
|
|
1233
1264
|
def postgresqls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]]]):
|
1234
1265
|
pulumi.set(self, "postgresqls", value)
|
1235
1266
|
|
1236
|
-
@property
|
1267
|
+
@_builtins.property
|
1237
1268
|
@pulumi.getter
|
1238
1269
|
def redis(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]]]:
|
1239
1270
|
"""
|
@@ -1246,7 +1277,7 @@ class _SecretsMountState:
|
|
1246
1277
|
def redis(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]]]):
|
1247
1278
|
pulumi.set(self, "redis", value)
|
1248
1279
|
|
1249
|
-
@property
|
1280
|
+
@_builtins.property
|
1250
1281
|
@pulumi.getter(name="redisElasticaches")
|
1251
1282
|
def redis_elasticaches(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedisElasticachArgs']]]]:
|
1252
1283
|
"""
|
@@ -1259,7 +1290,7 @@ class _SecretsMountState:
|
|
1259
1290
|
def redis_elasticaches(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedisElasticachArgs']]]]):
|
1260
1291
|
pulumi.set(self, "redis_elasticaches", value)
|
1261
1292
|
|
1262
|
-
@property
|
1293
|
+
@_builtins.property
|
1263
1294
|
@pulumi.getter
|
1264
1295
|
def redshifts(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]]]:
|
1265
1296
|
"""
|
@@ -1272,19 +1303,19 @@ class _SecretsMountState:
|
|
1272
1303
|
def redshifts(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]]]):
|
1273
1304
|
pulumi.set(self, "redshifts", value)
|
1274
1305
|
|
1275
|
-
@property
|
1306
|
+
@_builtins.property
|
1276
1307
|
@pulumi.getter(name="sealWrap")
|
1277
|
-
def seal_wrap(self) -> Optional[pulumi.Input[
|
1308
|
+
def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1278
1309
|
"""
|
1279
1310
|
Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1280
1311
|
"""
|
1281
1312
|
return pulumi.get(self, "seal_wrap")
|
1282
1313
|
|
1283
1314
|
@seal_wrap.setter
|
1284
|
-
def seal_wrap(self, value: Optional[pulumi.Input[
|
1315
|
+
def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1285
1316
|
pulumi.set(self, "seal_wrap", value)
|
1286
1317
|
|
1287
|
-
@property
|
1318
|
+
@_builtins.property
|
1288
1319
|
@pulumi.getter
|
1289
1320
|
def snowflakes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountSnowflakeArgs']]]]:
|
1290
1321
|
"""
|
@@ -1304,23 +1335,24 @@ class SecretsMount(pulumi.CustomResource):
|
|
1304
1335
|
def __init__(__self__,
|
1305
1336
|
resource_name: str,
|
1306
1337
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1307
|
-
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1308
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1309
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1310
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1338
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1339
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1340
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1341
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1311
1342
|
cassandras: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCassandraArgs', 'SecretsMountCassandraArgsDict']]]]] = None,
|
1312
1343
|
couchbases: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCouchbaseArgs', 'SecretsMountCouchbaseArgsDict']]]]] = None,
|
1313
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
1314
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1315
|
-
description: Optional[pulumi.Input[
|
1344
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1345
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1346
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
1316
1347
|
elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountElasticsearchArgs', 'SecretsMountElasticsearchArgsDict']]]]] = None,
|
1317
|
-
external_entropy_access: Optional[pulumi.Input[
|
1348
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
1349
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
1318
1350
|
hanas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountHanaArgs', 'SecretsMountHanaArgsDict']]]]] = None,
|
1319
|
-
identity_token_key: Optional[pulumi.Input[
|
1351
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1320
1352
|
influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountInfluxdbArgs', 'SecretsMountInfluxdbArgsDict']]]]] = None,
|
1321
|
-
listing_visibility: Optional[pulumi.Input[
|
1322
|
-
local: Optional[pulumi.Input[
|
1323
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
1353
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
1354
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
1355
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1324
1356
|
mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbatlaArgs', 'SecretsMountMongodbatlaArgsDict']]]]] = None,
|
1325
1357
|
mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbArgs', 'SecretsMountMongodbArgsDict']]]]] = None,
|
1326
1358
|
mssqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMssqlArgs', 'SecretsMountMssqlArgsDict']]]]] = None,
|
@@ -1328,17 +1360,17 @@ class SecretsMount(pulumi.CustomResource):
|
|
1328
1360
|
mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlLegacyArgs', 'SecretsMountMysqlLegacyArgsDict']]]]] = None,
|
1329
1361
|
mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]]] = None,
|
1330
1362
|
mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]]] = None,
|
1331
|
-
namespace: Optional[pulumi.Input[
|
1332
|
-
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
1363
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1364
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
1333
1365
|
oracles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]]] = None,
|
1334
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1335
|
-
path: Optional[pulumi.Input[
|
1336
|
-
plugin_version: Optional[pulumi.Input[
|
1366
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1367
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
1368
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
1337
1369
|
postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountPostgresqlArgs', 'SecretsMountPostgresqlArgsDict']]]]] = None,
|
1338
1370
|
redis: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRediArgs', 'SecretsMountRediArgsDict']]]]] = None,
|
1339
1371
|
redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedisElasticachArgs', 'SecretsMountRedisElasticachArgsDict']]]]] = None,
|
1340
1372
|
redshifts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedshiftArgs', 'SecretsMountRedshiftArgsDict']]]]] = None,
|
1341
|
-
seal_wrap: Optional[pulumi.Input[
|
1373
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
1342
1374
|
snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountSnowflakeArgs', 'SecretsMountSnowflakeArgsDict']]]]] = None,
|
1343
1375
|
__props__=None):
|
1344
1376
|
"""
|
@@ -1405,30 +1437,31 @@ class SecretsMount(pulumi.CustomResource):
|
|
1405
1437
|
|
1406
1438
|
:param str resource_name: The name of the resource.
|
1407
1439
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
1408
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1440
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
|
1409
1441
|
|
1410
1442
|
The following arguments are common to all database engines:
|
1411
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1412
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1413
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1443
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
1444
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1445
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1414
1446
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCassandraArgs', 'SecretsMountCassandraArgsDict']]]] cassandras: A nested block containing configuration options for Cassandra connections.
|
1415
1447
|
*See Configuration Options for more info*
|
1416
1448
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCouchbaseArgs', 'SecretsMountCouchbaseArgsDict']]]] couchbases: A nested block containing configuration options for Couchbase connections.
|
1417
1449
|
*See Configuration Options for more info*
|
1418
|
-
:param pulumi.Input[
|
1419
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1420
|
-
:param pulumi.Input[
|
1450
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
1451
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
1452
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
1421
1453
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountElasticsearchArgs', 'SecretsMountElasticsearchArgsDict']]]] elasticsearches: A nested block containing configuration options for Elasticsearch connections.
|
1422
1454
|
*See Configuration Options for more info*
|
1423
|
-
:param pulumi.Input[
|
1455
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
1456
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
1424
1457
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountHanaArgs', 'SecretsMountHanaArgsDict']]]] hanas: A nested block containing configuration options for SAP HanaDB connections.
|
1425
1458
|
*See Configuration Options for more info*
|
1426
|
-
:param pulumi.Input[
|
1459
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
1427
1460
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountInfluxdbArgs', 'SecretsMountInfluxdbArgsDict']]]] influxdbs: A nested block containing configuration options for InfluxDB connections.
|
1428
1461
|
*See Configuration Options for more info*
|
1429
|
-
:param pulumi.Input[
|
1430
|
-
:param pulumi.Input[
|
1431
|
-
:param pulumi.Input[
|
1462
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
1463
|
+
:param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
1464
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
1432
1465
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbatlaArgs', 'SecretsMountMongodbatlaArgsDict']]]] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
|
1433
1466
|
*See Configuration Options for more info*
|
1434
1467
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbArgs', 'SecretsMountMongodbArgsDict']]]] mongodbs: A nested block containing configuration options for MongoDB connections.
|
@@ -1443,13 +1476,13 @@ class SecretsMount(pulumi.CustomResource):
|
|
1443
1476
|
*See Configuration Options for more info*
|
1444
1477
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]] mysqls: A nested block containing configuration options for MySQL connections.
|
1445
1478
|
*See Configuration Options for more info*
|
1446
|
-
:param pulumi.Input[
|
1447
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
1479
|
+
:param pulumi.Input[_builtins.str] namespace: Target namespace. (requires Enterprise)
|
1480
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
1448
1481
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]] oracles: A nested block containing configuration options for Oracle connections.
|
1449
1482
|
*See Configuration Options for more info*
|
1450
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1451
|
-
:param pulumi.Input[
|
1452
|
-
:param pulumi.Input[
|
1483
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
1484
|
+
:param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
|
1485
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1453
1486
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountPostgresqlArgs', 'SecretsMountPostgresqlArgsDict']]]] postgresqls: A nested block containing configuration options for PostgreSQL connections.
|
1454
1487
|
*See Configuration Options for more info*
|
1455
1488
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRediArgs', 'SecretsMountRediArgsDict']]]] redis: A nested block containing configuration options for Redis connections.
|
@@ -1458,7 +1491,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1458
1491
|
*See Configuration Options for more info*
|
1459
1492
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedshiftArgs', 'SecretsMountRedshiftArgsDict']]]] redshifts: A nested block containing configuration options for AWS Redshift connections.
|
1460
1493
|
*See Configuration Options for more info*
|
1461
|
-
:param pulumi.Input[
|
1494
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1462
1495
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountSnowflakeArgs', 'SecretsMountSnowflakeArgsDict']]]] snowflakes: A nested block containing configuration options for Snowflake connections.
|
1463
1496
|
*See Configuration Options for more info*
|
1464
1497
|
"""
|
@@ -1545,23 +1578,24 @@ class SecretsMount(pulumi.CustomResource):
|
|
1545
1578
|
def _internal_init(__self__,
|
1546
1579
|
resource_name: str,
|
1547
1580
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1548
|
-
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1549
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1550
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1551
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1581
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1582
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1583
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1584
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1552
1585
|
cassandras: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCassandraArgs', 'SecretsMountCassandraArgsDict']]]]] = None,
|
1553
1586
|
couchbases: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCouchbaseArgs', 'SecretsMountCouchbaseArgsDict']]]]] = None,
|
1554
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
1555
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1556
|
-
description: Optional[pulumi.Input[
|
1587
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1588
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1589
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
1557
1590
|
elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountElasticsearchArgs', 'SecretsMountElasticsearchArgsDict']]]]] = None,
|
1558
|
-
external_entropy_access: Optional[pulumi.Input[
|
1591
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
1592
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
1559
1593
|
hanas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountHanaArgs', 'SecretsMountHanaArgsDict']]]]] = None,
|
1560
|
-
identity_token_key: Optional[pulumi.Input[
|
1594
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1561
1595
|
influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountInfluxdbArgs', 'SecretsMountInfluxdbArgsDict']]]]] = None,
|
1562
|
-
listing_visibility: Optional[pulumi.Input[
|
1563
|
-
local: Optional[pulumi.Input[
|
1564
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
1596
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
1597
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
1598
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1565
1599
|
mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbatlaArgs', 'SecretsMountMongodbatlaArgsDict']]]]] = None,
|
1566
1600
|
mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbArgs', 'SecretsMountMongodbArgsDict']]]]] = None,
|
1567
1601
|
mssqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMssqlArgs', 'SecretsMountMssqlArgsDict']]]]] = None,
|
@@ -1569,17 +1603,17 @@ class SecretsMount(pulumi.CustomResource):
|
|
1569
1603
|
mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlLegacyArgs', 'SecretsMountMysqlLegacyArgsDict']]]]] = None,
|
1570
1604
|
mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]]] = None,
|
1571
1605
|
mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]]] = None,
|
1572
|
-
namespace: Optional[pulumi.Input[
|
1573
|
-
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
1606
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1607
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
1574
1608
|
oracles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]]] = None,
|
1575
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1576
|
-
path: Optional[pulumi.Input[
|
1577
|
-
plugin_version: Optional[pulumi.Input[
|
1609
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1610
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
1611
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
1578
1612
|
postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountPostgresqlArgs', 'SecretsMountPostgresqlArgsDict']]]]] = None,
|
1579
1613
|
redis: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRediArgs', 'SecretsMountRediArgsDict']]]]] = None,
|
1580
1614
|
redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedisElasticachArgs', 'SecretsMountRedisElasticachArgsDict']]]]] = None,
|
1581
1615
|
redshifts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedshiftArgs', 'SecretsMountRedshiftArgsDict']]]]] = None,
|
1582
|
-
seal_wrap: Optional[pulumi.Input[
|
1616
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
1583
1617
|
snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountSnowflakeArgs', 'SecretsMountSnowflakeArgsDict']]]]] = None,
|
1584
1618
|
__props__=None):
|
1585
1619
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
@@ -1601,6 +1635,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1601
1635
|
__props__.__dict__["description"] = description
|
1602
1636
|
__props__.__dict__["elasticsearches"] = elasticsearches
|
1603
1637
|
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
1638
|
+
__props__.__dict__["force_no_cache"] = force_no_cache
|
1604
1639
|
__props__.__dict__["hanas"] = hanas
|
1605
1640
|
__props__.__dict__["identity_token_key"] = identity_token_key
|
1606
1641
|
__props__.__dict__["influxdbs"] = influxdbs
|
@@ -1640,25 +1675,26 @@ class SecretsMount(pulumi.CustomResource):
|
|
1640
1675
|
def get(resource_name: str,
|
1641
1676
|
id: pulumi.Input[str],
|
1642
1677
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1643
|
-
accessor: Optional[pulumi.Input[
|
1644
|
-
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1645
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1646
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1647
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1678
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
1679
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1680
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1681
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1682
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1648
1683
|
cassandras: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCassandraArgs', 'SecretsMountCassandraArgsDict']]]]] = None,
|
1649
1684
|
couchbases: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCouchbaseArgs', 'SecretsMountCouchbaseArgsDict']]]]] = None,
|
1650
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
1651
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1652
|
-
description: Optional[pulumi.Input[
|
1685
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1686
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1687
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
1653
1688
|
elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountElasticsearchArgs', 'SecretsMountElasticsearchArgsDict']]]]] = None,
|
1654
|
-
engine_count: Optional[pulumi.Input[
|
1655
|
-
external_entropy_access: Optional[pulumi.Input[
|
1689
|
+
engine_count: Optional[pulumi.Input[_builtins.int]] = None,
|
1690
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
1691
|
+
force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
|
1656
1692
|
hanas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountHanaArgs', 'SecretsMountHanaArgsDict']]]]] = None,
|
1657
|
-
identity_token_key: Optional[pulumi.Input[
|
1693
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1658
1694
|
influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountInfluxdbArgs', 'SecretsMountInfluxdbArgsDict']]]]] = None,
|
1659
|
-
listing_visibility: Optional[pulumi.Input[
|
1660
|
-
local: Optional[pulumi.Input[
|
1661
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
1695
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
1696
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
1697
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1662
1698
|
mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbatlaArgs', 'SecretsMountMongodbatlaArgsDict']]]]] = None,
|
1663
1699
|
mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbArgs', 'SecretsMountMongodbArgsDict']]]]] = None,
|
1664
1700
|
mssqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMssqlArgs', 'SecretsMountMssqlArgsDict']]]]] = None,
|
@@ -1666,17 +1702,17 @@ class SecretsMount(pulumi.CustomResource):
|
|
1666
1702
|
mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlLegacyArgs', 'SecretsMountMysqlLegacyArgsDict']]]]] = None,
|
1667
1703
|
mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]]] = None,
|
1668
1704
|
mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]]] = None,
|
1669
|
-
namespace: Optional[pulumi.Input[
|
1670
|
-
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
1705
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1706
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
1671
1707
|
oracles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]]] = None,
|
1672
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1673
|
-
path: Optional[pulumi.Input[
|
1674
|
-
plugin_version: Optional[pulumi.Input[
|
1708
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1709
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
1710
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
1675
1711
|
postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountPostgresqlArgs', 'SecretsMountPostgresqlArgsDict']]]]] = None,
|
1676
1712
|
redis: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRediArgs', 'SecretsMountRediArgsDict']]]]] = None,
|
1677
1713
|
redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedisElasticachArgs', 'SecretsMountRedisElasticachArgsDict']]]]] = None,
|
1678
1714
|
redshifts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedshiftArgs', 'SecretsMountRedshiftArgsDict']]]]] = None,
|
1679
|
-
seal_wrap: Optional[pulumi.Input[
|
1715
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
1680
1716
|
snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountSnowflakeArgs', 'SecretsMountSnowflakeArgsDict']]]]] = None) -> 'SecretsMount':
|
1681
1717
|
"""
|
1682
1718
|
Get an existing SecretsMount resource's state with the given name, id, and optional extra
|
@@ -1685,32 +1721,33 @@ class SecretsMount(pulumi.CustomResource):
|
|
1685
1721
|
:param str resource_name: The unique name of the resulting resource.
|
1686
1722
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
1687
1723
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
1688
|
-
:param pulumi.Input[
|
1689
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1724
|
+
:param pulumi.Input[_builtins.str] accessor: Accessor of the mount
|
1725
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
|
1690
1726
|
|
1691
1727
|
The following arguments are common to all database engines:
|
1692
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1693
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1694
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1728
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
1729
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1730
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1695
1731
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCassandraArgs', 'SecretsMountCassandraArgsDict']]]] cassandras: A nested block containing configuration options for Cassandra connections.
|
1696
1732
|
*See Configuration Options for more info*
|
1697
1733
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCouchbaseArgs', 'SecretsMountCouchbaseArgsDict']]]] couchbases: A nested block containing configuration options for Couchbase connections.
|
1698
1734
|
*See Configuration Options for more info*
|
1699
|
-
:param pulumi.Input[
|
1700
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1701
|
-
:param pulumi.Input[
|
1735
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
1736
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
1737
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
1702
1738
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountElasticsearchArgs', 'SecretsMountElasticsearchArgsDict']]]] elasticsearches: A nested block containing configuration options for Elasticsearch connections.
|
1703
1739
|
*See Configuration Options for more info*
|
1704
|
-
:param pulumi.Input[
|
1705
|
-
:param pulumi.Input[
|
1740
|
+
:param pulumi.Input[_builtins.int] engine_count: The total number of database secrets engines configured.
|
1741
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
1742
|
+
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
1706
1743
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountHanaArgs', 'SecretsMountHanaArgsDict']]]] hanas: A nested block containing configuration options for SAP HanaDB connections.
|
1707
1744
|
*See Configuration Options for more info*
|
1708
|
-
:param pulumi.Input[
|
1745
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
1709
1746
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountInfluxdbArgs', 'SecretsMountInfluxdbArgsDict']]]] influxdbs: A nested block containing configuration options for InfluxDB connections.
|
1710
1747
|
*See Configuration Options for more info*
|
1711
|
-
:param pulumi.Input[
|
1712
|
-
:param pulumi.Input[
|
1713
|
-
:param pulumi.Input[
|
1748
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
1749
|
+
:param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
1750
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
1714
1751
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbatlaArgs', 'SecretsMountMongodbatlaArgsDict']]]] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
|
1715
1752
|
*See Configuration Options for more info*
|
1716
1753
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbArgs', 'SecretsMountMongodbArgsDict']]]] mongodbs: A nested block containing configuration options for MongoDB connections.
|
@@ -1725,13 +1762,13 @@ class SecretsMount(pulumi.CustomResource):
|
|
1725
1762
|
*See Configuration Options for more info*
|
1726
1763
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]] mysqls: A nested block containing configuration options for MySQL connections.
|
1727
1764
|
*See Configuration Options for more info*
|
1728
|
-
:param pulumi.Input[
|
1729
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
1765
|
+
:param pulumi.Input[_builtins.str] namespace: Target namespace. (requires Enterprise)
|
1766
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
1730
1767
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]] oracles: A nested block containing configuration options for Oracle connections.
|
1731
1768
|
*See Configuration Options for more info*
|
1732
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1733
|
-
:param pulumi.Input[
|
1734
|
-
:param pulumi.Input[
|
1769
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
1770
|
+
:param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
|
1771
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1735
1772
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountPostgresqlArgs', 'SecretsMountPostgresqlArgsDict']]]] postgresqls: A nested block containing configuration options for PostgreSQL connections.
|
1736
1773
|
*See Configuration Options for more info*
|
1737
1774
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRediArgs', 'SecretsMountRediArgsDict']]]] redis: A nested block containing configuration options for Redis connections.
|
@@ -1740,7 +1777,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1740
1777
|
*See Configuration Options for more info*
|
1741
1778
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedshiftArgs', 'SecretsMountRedshiftArgsDict']]]] redshifts: A nested block containing configuration options for AWS Redshift connections.
|
1742
1779
|
*See Configuration Options for more info*
|
1743
|
-
:param pulumi.Input[
|
1780
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1744
1781
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountSnowflakeArgs', 'SecretsMountSnowflakeArgsDict']]]] snowflakes: A nested block containing configuration options for Snowflake connections.
|
1745
1782
|
*See Configuration Options for more info*
|
1746
1783
|
"""
|
@@ -1761,6 +1798,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1761
1798
|
__props__.__dict__["elasticsearches"] = elasticsearches
|
1762
1799
|
__props__.__dict__["engine_count"] = engine_count
|
1763
1800
|
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
1801
|
+
__props__.__dict__["force_no_cache"] = force_no_cache
|
1764
1802
|
__props__.__dict__["hanas"] = hanas
|
1765
1803
|
__props__.__dict__["identity_token_key"] = identity_token_key
|
1766
1804
|
__props__.__dict__["influxdbs"] = influxdbs
|
@@ -1788,17 +1826,17 @@ class SecretsMount(pulumi.CustomResource):
|
|
1788
1826
|
__props__.__dict__["snowflakes"] = snowflakes
|
1789
1827
|
return SecretsMount(resource_name, opts=opts, __props__=__props__)
|
1790
1828
|
|
1791
|
-
@property
|
1829
|
+
@_builtins.property
|
1792
1830
|
@pulumi.getter
|
1793
|
-
def accessor(self) -> pulumi.Output[
|
1831
|
+
def accessor(self) -> pulumi.Output[_builtins.str]:
|
1794
1832
|
"""
|
1795
1833
|
Accessor of the mount
|
1796
1834
|
"""
|
1797
1835
|
return pulumi.get(self, "accessor")
|
1798
1836
|
|
1799
|
-
@property
|
1837
|
+
@_builtins.property
|
1800
1838
|
@pulumi.getter(name="allowedManagedKeys")
|
1801
|
-
def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[
|
1839
|
+
def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1802
1840
|
"""
|
1803
1841
|
Set of managed key registry entry names that the mount in question is allowed to access
|
1804
1842
|
|
@@ -1806,31 +1844,31 @@ class SecretsMount(pulumi.CustomResource):
|
|
1806
1844
|
"""
|
1807
1845
|
return pulumi.get(self, "allowed_managed_keys")
|
1808
1846
|
|
1809
|
-
@property
|
1847
|
+
@_builtins.property
|
1810
1848
|
@pulumi.getter(name="allowedResponseHeaders")
|
1811
|
-
def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[
|
1849
|
+
def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1812
1850
|
"""
|
1813
1851
|
List of headers to allow and pass from the request to the plugin
|
1814
1852
|
"""
|
1815
1853
|
return pulumi.get(self, "allowed_response_headers")
|
1816
1854
|
|
1817
|
-
@property
|
1855
|
+
@_builtins.property
|
1818
1856
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
1819
|
-
def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[
|
1857
|
+
def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
1820
1858
|
"""
|
1821
1859
|
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1822
1860
|
"""
|
1823
1861
|
return pulumi.get(self, "audit_non_hmac_request_keys")
|
1824
1862
|
|
1825
|
-
@property
|
1863
|
+
@_builtins.property
|
1826
1864
|
@pulumi.getter(name="auditNonHmacResponseKeys")
|
1827
|
-
def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[
|
1865
|
+
def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
1828
1866
|
"""
|
1829
1867
|
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1830
1868
|
"""
|
1831
1869
|
return pulumi.get(self, "audit_non_hmac_response_keys")
|
1832
1870
|
|
1833
|
-
@property
|
1871
|
+
@_builtins.property
|
1834
1872
|
@pulumi.getter
|
1835
1873
|
def cassandras(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountCassandra']]]:
|
1836
1874
|
"""
|
@@ -1839,7 +1877,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1839
1877
|
"""
|
1840
1878
|
return pulumi.get(self, "cassandras")
|
1841
1879
|
|
1842
|
-
@property
|
1880
|
+
@_builtins.property
|
1843
1881
|
@pulumi.getter
|
1844
1882
|
def couchbases(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountCouchbase']]]:
|
1845
1883
|
"""
|
@@ -1848,31 +1886,31 @@ class SecretsMount(pulumi.CustomResource):
|
|
1848
1886
|
"""
|
1849
1887
|
return pulumi.get(self, "couchbases")
|
1850
1888
|
|
1851
|
-
@property
|
1889
|
+
@_builtins.property
|
1852
1890
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
1853
|
-
def default_lease_ttl_seconds(self) -> pulumi.Output[
|
1891
|
+
def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
|
1854
1892
|
"""
|
1855
1893
|
Default lease duration for tokens and secrets in seconds
|
1856
1894
|
"""
|
1857
1895
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
1858
1896
|
|
1859
|
-
@property
|
1897
|
+
@_builtins.property
|
1860
1898
|
@pulumi.getter(name="delegatedAuthAccessors")
|
1861
|
-
def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[
|
1899
|
+
def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1862
1900
|
"""
|
1863
1901
|
List of headers to allow and pass from the request to the plugin
|
1864
1902
|
"""
|
1865
1903
|
return pulumi.get(self, "delegated_auth_accessors")
|
1866
1904
|
|
1867
|
-
@property
|
1905
|
+
@_builtins.property
|
1868
1906
|
@pulumi.getter
|
1869
|
-
def description(self) -> pulumi.Output[Optional[
|
1907
|
+
def description(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1870
1908
|
"""
|
1871
1909
|
Human-friendly description of the mount
|
1872
1910
|
"""
|
1873
1911
|
return pulumi.get(self, "description")
|
1874
1912
|
|
1875
|
-
@property
|
1913
|
+
@_builtins.property
|
1876
1914
|
@pulumi.getter
|
1877
1915
|
def elasticsearches(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountElasticsearch']]]:
|
1878
1916
|
"""
|
@@ -1881,23 +1919,31 @@ class SecretsMount(pulumi.CustomResource):
|
|
1881
1919
|
"""
|
1882
1920
|
return pulumi.get(self, "elasticsearches")
|
1883
1921
|
|
1884
|
-
@property
|
1922
|
+
@_builtins.property
|
1885
1923
|
@pulumi.getter(name="engineCount")
|
1886
|
-
def engine_count(self) -> pulumi.Output[
|
1924
|
+
def engine_count(self) -> pulumi.Output[_builtins.int]:
|
1887
1925
|
"""
|
1888
1926
|
The total number of database secrets engines configured.
|
1889
1927
|
"""
|
1890
1928
|
return pulumi.get(self, "engine_count")
|
1891
1929
|
|
1892
|
-
@property
|
1930
|
+
@_builtins.property
|
1893
1931
|
@pulumi.getter(name="externalEntropyAccess")
|
1894
|
-
def external_entropy_access(self) -> pulumi.Output[Optional[
|
1932
|
+
def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1895
1933
|
"""
|
1896
1934
|
Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
1897
1935
|
"""
|
1898
1936
|
return pulumi.get(self, "external_entropy_access")
|
1899
1937
|
|
1900
|
-
@property
|
1938
|
+
@_builtins.property
|
1939
|
+
@pulumi.getter(name="forceNoCache")
|
1940
|
+
def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
|
1941
|
+
"""
|
1942
|
+
If set to true, disables caching.
|
1943
|
+
"""
|
1944
|
+
return pulumi.get(self, "force_no_cache")
|
1945
|
+
|
1946
|
+
@_builtins.property
|
1901
1947
|
@pulumi.getter
|
1902
1948
|
def hanas(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountHana']]]:
|
1903
1949
|
"""
|
@@ -1906,15 +1952,15 @@ class SecretsMount(pulumi.CustomResource):
|
|
1906
1952
|
"""
|
1907
1953
|
return pulumi.get(self, "hanas")
|
1908
1954
|
|
1909
|
-
@property
|
1955
|
+
@_builtins.property
|
1910
1956
|
@pulumi.getter(name="identityTokenKey")
|
1911
|
-
def identity_token_key(self) -> pulumi.Output[Optional[
|
1957
|
+
def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1912
1958
|
"""
|
1913
1959
|
The key to use for signing plugin workload identity tokens
|
1914
1960
|
"""
|
1915
1961
|
return pulumi.get(self, "identity_token_key")
|
1916
1962
|
|
1917
|
-
@property
|
1963
|
+
@_builtins.property
|
1918
1964
|
@pulumi.getter
|
1919
1965
|
def influxdbs(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountInfluxdb']]]:
|
1920
1966
|
"""
|
@@ -1923,31 +1969,31 @@ class SecretsMount(pulumi.CustomResource):
|
|
1923
1969
|
"""
|
1924
1970
|
return pulumi.get(self, "influxdbs")
|
1925
1971
|
|
1926
|
-
@property
|
1972
|
+
@_builtins.property
|
1927
1973
|
@pulumi.getter(name="listingVisibility")
|
1928
|
-
def listing_visibility(self) -> pulumi.Output[Optional[
|
1974
|
+
def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1929
1975
|
"""
|
1930
1976
|
Specifies whether to show this mount in the UI-specific listing endpoint
|
1931
1977
|
"""
|
1932
1978
|
return pulumi.get(self, "listing_visibility")
|
1933
1979
|
|
1934
|
-
@property
|
1980
|
+
@_builtins.property
|
1935
1981
|
@pulumi.getter
|
1936
|
-
def local(self) -> pulumi.Output[Optional[
|
1982
|
+
def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1937
1983
|
"""
|
1938
1984
|
Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
1939
1985
|
"""
|
1940
1986
|
return pulumi.get(self, "local")
|
1941
1987
|
|
1942
|
-
@property
|
1988
|
+
@_builtins.property
|
1943
1989
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
1944
|
-
def max_lease_ttl_seconds(self) -> pulumi.Output[
|
1990
|
+
def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
|
1945
1991
|
"""
|
1946
1992
|
Maximum possible lease duration for tokens and secrets in seconds
|
1947
1993
|
"""
|
1948
1994
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
1949
1995
|
|
1950
|
-
@property
|
1996
|
+
@_builtins.property
|
1951
1997
|
@pulumi.getter
|
1952
1998
|
def mongodbatlas(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountMongodbatla']]]:
|
1953
1999
|
"""
|
@@ -1956,7 +2002,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1956
2002
|
"""
|
1957
2003
|
return pulumi.get(self, "mongodbatlas")
|
1958
2004
|
|
1959
|
-
@property
|
2005
|
+
@_builtins.property
|
1960
2006
|
@pulumi.getter
|
1961
2007
|
def mongodbs(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountMongodb']]]:
|
1962
2008
|
"""
|
@@ -1965,7 +2011,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1965
2011
|
"""
|
1966
2012
|
return pulumi.get(self, "mongodbs")
|
1967
2013
|
|
1968
|
-
@property
|
2014
|
+
@_builtins.property
|
1969
2015
|
@pulumi.getter
|
1970
2016
|
def mssqls(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountMssql']]]:
|
1971
2017
|
"""
|
@@ -1974,7 +2020,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1974
2020
|
"""
|
1975
2021
|
return pulumi.get(self, "mssqls")
|
1976
2022
|
|
1977
|
-
@property
|
2023
|
+
@_builtins.property
|
1978
2024
|
@pulumi.getter(name="mysqlAuroras")
|
1979
2025
|
def mysql_auroras(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountMysqlAurora']]]:
|
1980
2026
|
"""
|
@@ -1983,7 +2029,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1983
2029
|
"""
|
1984
2030
|
return pulumi.get(self, "mysql_auroras")
|
1985
2031
|
|
1986
|
-
@property
|
2032
|
+
@_builtins.property
|
1987
2033
|
@pulumi.getter(name="mysqlLegacies")
|
1988
2034
|
def mysql_legacies(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountMysqlLegacy']]]:
|
1989
2035
|
"""
|
@@ -1992,7 +2038,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1992
2038
|
"""
|
1993
2039
|
return pulumi.get(self, "mysql_legacies")
|
1994
2040
|
|
1995
|
-
@property
|
2041
|
+
@_builtins.property
|
1996
2042
|
@pulumi.getter(name="mysqlRds")
|
1997
2043
|
def mysql_rds(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountMysqlRd']]]:
|
1998
2044
|
"""
|
@@ -2001,7 +2047,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
2001
2047
|
"""
|
2002
2048
|
return pulumi.get(self, "mysql_rds")
|
2003
2049
|
|
2004
|
-
@property
|
2050
|
+
@_builtins.property
|
2005
2051
|
@pulumi.getter
|
2006
2052
|
def mysqls(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountMysql']]]:
|
2007
2053
|
"""
|
@@ -2010,23 +2056,23 @@ class SecretsMount(pulumi.CustomResource):
|
|
2010
2056
|
"""
|
2011
2057
|
return pulumi.get(self, "mysqls")
|
2012
2058
|
|
2013
|
-
@property
|
2059
|
+
@_builtins.property
|
2014
2060
|
@pulumi.getter
|
2015
|
-
def namespace(self) -> pulumi.Output[Optional[
|
2061
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
2016
2062
|
"""
|
2017
2063
|
Target namespace. (requires Enterprise)
|
2018
2064
|
"""
|
2019
2065
|
return pulumi.get(self, "namespace")
|
2020
2066
|
|
2021
|
-
@property
|
2067
|
+
@_builtins.property
|
2022
2068
|
@pulumi.getter
|
2023
|
-
def options(self) -> pulumi.Output[Optional[Mapping[str,
|
2069
|
+
def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
|
2024
2070
|
"""
|
2025
2071
|
Specifies mount type specific options that are passed to the backend
|
2026
2072
|
"""
|
2027
2073
|
return pulumi.get(self, "options")
|
2028
2074
|
|
2029
|
-
@property
|
2075
|
+
@_builtins.property
|
2030
2076
|
@pulumi.getter
|
2031
2077
|
def oracles(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountOracle']]]:
|
2032
2078
|
"""
|
@@ -2035,31 +2081,31 @@ class SecretsMount(pulumi.CustomResource):
|
|
2035
2081
|
"""
|
2036
2082
|
return pulumi.get(self, "oracles")
|
2037
2083
|
|
2038
|
-
@property
|
2084
|
+
@_builtins.property
|
2039
2085
|
@pulumi.getter(name="passthroughRequestHeaders")
|
2040
|
-
def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[
|
2086
|
+
def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
2041
2087
|
"""
|
2042
2088
|
List of headers to allow and pass from the request to the plugin
|
2043
2089
|
"""
|
2044
2090
|
return pulumi.get(self, "passthrough_request_headers")
|
2045
2091
|
|
2046
|
-
@property
|
2092
|
+
@_builtins.property
|
2047
2093
|
@pulumi.getter
|
2048
|
-
def path(self) -> pulumi.Output[
|
2094
|
+
def path(self) -> pulumi.Output[_builtins.str]:
|
2049
2095
|
"""
|
2050
2096
|
Where the secret backend will be mounted
|
2051
2097
|
"""
|
2052
2098
|
return pulumi.get(self, "path")
|
2053
2099
|
|
2054
|
-
@property
|
2100
|
+
@_builtins.property
|
2055
2101
|
@pulumi.getter(name="pluginVersion")
|
2056
|
-
def plugin_version(self) -> pulumi.Output[Optional[
|
2102
|
+
def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
|
2057
2103
|
"""
|
2058
2104
|
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
2059
2105
|
"""
|
2060
2106
|
return pulumi.get(self, "plugin_version")
|
2061
2107
|
|
2062
|
-
@property
|
2108
|
+
@_builtins.property
|
2063
2109
|
@pulumi.getter
|
2064
2110
|
def postgresqls(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountPostgresql']]]:
|
2065
2111
|
"""
|
@@ -2068,7 +2114,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
2068
2114
|
"""
|
2069
2115
|
return pulumi.get(self, "postgresqls")
|
2070
2116
|
|
2071
|
-
@property
|
2117
|
+
@_builtins.property
|
2072
2118
|
@pulumi.getter
|
2073
2119
|
def redis(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountRedi']]]:
|
2074
2120
|
"""
|
@@ -2077,7 +2123,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
2077
2123
|
"""
|
2078
2124
|
return pulumi.get(self, "redis")
|
2079
2125
|
|
2080
|
-
@property
|
2126
|
+
@_builtins.property
|
2081
2127
|
@pulumi.getter(name="redisElasticaches")
|
2082
2128
|
def redis_elasticaches(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountRedisElasticach']]]:
|
2083
2129
|
"""
|
@@ -2086,7 +2132,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
2086
2132
|
"""
|
2087
2133
|
return pulumi.get(self, "redis_elasticaches")
|
2088
2134
|
|
2089
|
-
@property
|
2135
|
+
@_builtins.property
|
2090
2136
|
@pulumi.getter
|
2091
2137
|
def redshifts(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountRedshift']]]:
|
2092
2138
|
"""
|
@@ -2095,15 +2141,15 @@ class SecretsMount(pulumi.CustomResource):
|
|
2095
2141
|
"""
|
2096
2142
|
return pulumi.get(self, "redshifts")
|
2097
2143
|
|
2098
|
-
@property
|
2144
|
+
@_builtins.property
|
2099
2145
|
@pulumi.getter(name="sealWrap")
|
2100
|
-
def seal_wrap(self) -> pulumi.Output[
|
2146
|
+
def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
|
2101
2147
|
"""
|
2102
2148
|
Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
2103
2149
|
"""
|
2104
2150
|
return pulumi.get(self, "seal_wrap")
|
2105
2151
|
|
2106
|
-
@property
|
2152
|
+
@_builtins.property
|
2107
2153
|
@pulumi.getter
|
2108
2154
|
def snowflakes(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountSnowflake']]]:
|
2109
2155
|
"""
|