pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (269) hide show
  1. pulumi_vault/__init__.py +19 -1
  2. pulumi_vault/_inputs.py +873 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +1016 -439
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +1057 -285
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +887 -256
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +426 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +878 -336
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +400 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +1006 -227
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +431 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +732 -693
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +380 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +909 -271
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/oci_auth_backend.py +683 -0
  168. pulumi_vault/oci_auth_backend_role.py +798 -0
  169. pulumi_vault/okta/__init__.py +1 -1
  170. pulumi_vault/okta/_inputs.py +31 -32
  171. pulumi_vault/okta/auth_backend.py +305 -306
  172. pulumi_vault/okta/auth_backend_group.py +69 -70
  173. pulumi_vault/okta/auth_backend_user.py +86 -87
  174. pulumi_vault/okta/outputs.py +21 -22
  175. pulumi_vault/outputs.py +234 -82
  176. pulumi_vault/pkisecret/__init__.py +1 -1
  177. pulumi_vault/pkisecret/_inputs.py +55 -56
  178. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  179. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  180. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  181. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  182. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  183. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  184. pulumi_vault/pkisecret/backend_config_scep.py +205 -159
  185. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  186. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  187. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  188. pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
  189. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  190. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  191. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  192. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  193. pulumi_vault/pkisecret/outputs.py +61 -62
  194. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  195. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  196. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  197. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  198. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  199. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  200. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  201. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  202. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  203. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  204. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  205. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  206. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  207. pulumi_vault/plugin.py +154 -155
  208. pulumi_vault/plugin_pinned_version.py +52 -53
  209. pulumi_vault/policy.py +52 -53
  210. pulumi_vault/provider.py +160 -161
  211. pulumi_vault/pulumi-plugin.json +1 -1
  212. pulumi_vault/quota_lease_count.py +103 -104
  213. pulumi_vault/quota_rate_limit.py +171 -172
  214. pulumi_vault/rabbitmq/__init__.py +1 -1
  215. pulumi_vault/rabbitmq/_inputs.py +50 -51
  216. pulumi_vault/rabbitmq/outputs.py +34 -35
  217. pulumi_vault/rabbitmq/secret_backend.py +902 -231
  218. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  219. pulumi_vault/raft_autopilot.py +137 -138
  220. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  221. pulumi_vault/rgp_policy.py +69 -70
  222. pulumi_vault/saml/__init__.py +1 -1
  223. pulumi_vault/saml/auth_backend.py +188 -189
  224. pulumi_vault/saml/auth_backend_role.py +290 -291
  225. pulumi_vault/scep_auth_backend_role.py +252 -253
  226. pulumi_vault/secrets/__init__.py +1 -1
  227. pulumi_vault/secrets/_inputs.py +19 -20
  228. pulumi_vault/secrets/outputs.py +13 -14
  229. pulumi_vault/secrets/sync_association.py +88 -89
  230. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  231. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  232. pulumi_vault/secrets/sync_config.py +52 -53
  233. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  234. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  235. pulumi_vault/secrets/sync_github_apps.py +78 -79
  236. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  237. pulumi_vault/ssh/__init__.py +1 -1
  238. pulumi_vault/ssh/_inputs.py +13 -14
  239. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  240. pulumi_vault/ssh/outputs.py +9 -10
  241. pulumi_vault/ssh/secret_backend_ca.py +217 -124
  242. pulumi_vault/ssh/secret_backend_role.py +446 -447
  243. pulumi_vault/terraformcloud/__init__.py +1 -1
  244. pulumi_vault/terraformcloud/secret_backend.py +833 -155
  245. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  246. pulumi_vault/terraformcloud/secret_role.py +117 -118
  247. pulumi_vault/token.py +301 -302
  248. pulumi_vault/tokenauth/__init__.py +1 -1
  249. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  250. pulumi_vault/transform/__init__.py +1 -1
  251. pulumi_vault/transform/alphabet.py +69 -70
  252. pulumi_vault/transform/get_decode.py +57 -58
  253. pulumi_vault/transform/get_encode.py +57 -58
  254. pulumi_vault/transform/role.py +69 -70
  255. pulumi_vault/transform/template.py +137 -138
  256. pulumi_vault/transform/transformation.py +171 -172
  257. pulumi_vault/transit/__init__.py +1 -1
  258. pulumi_vault/transit/get_cmac.py +47 -48
  259. pulumi_vault/transit/get_decrypt.py +25 -26
  260. pulumi_vault/transit/get_encrypt.py +29 -30
  261. pulumi_vault/transit/get_sign.py +71 -72
  262. pulumi_vault/transit/get_verify.py +83 -84
  263. pulumi_vault/transit/secret_backend_key.py +377 -350
  264. pulumi_vault/transit/secret_cache_config.py +52 -53
  265. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
  266. pulumi_vault-7.2.0.dist-info/RECORD +270 -0
  267. pulumi_vault-7.1.0.dist-info/RECORD +0 -268
  268. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
  269. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,61 +19,63 @@ __all__ = ['SecretBackendArgs', 'SecretBackend']
20
19
  @pulumi.input_type
21
20
  class SecretBackendArgs:
22
21
  def __init__(__self__, *,
23
- path: pulumi.Input[builtins.str],
24
- allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
25
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
26
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
27
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
28
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
29
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
30
- description: Optional[pulumi.Input[builtins.str]] = None,
31
- disable_local_ca_jwt: Optional[pulumi.Input[builtins.bool]] = None,
32
- external_entropy_access: Optional[pulumi.Input[builtins.bool]] = None,
33
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
34
- kubernetes_ca_cert: Optional[pulumi.Input[builtins.str]] = None,
35
- kubernetes_host: Optional[pulumi.Input[builtins.str]] = None,
36
- listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
37
- local: Optional[pulumi.Input[builtins.bool]] = None,
38
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
39
- namespace: Optional[pulumi.Input[builtins.str]] = None,
40
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
41
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
42
- plugin_version: Optional[pulumi.Input[builtins.str]] = None,
43
- seal_wrap: Optional[pulumi.Input[builtins.bool]] = None,
44
- service_account_jwt: Optional[pulumi.Input[builtins.str]] = None):
22
+ path: pulumi.Input[_builtins.str],
23
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
24
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
25
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
28
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
29
+ description: Optional[pulumi.Input[_builtins.str]] = None,
30
+ disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
31
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
32
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
33
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
34
+ kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
35
+ kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
36
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
37
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
38
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
39
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
40
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
41
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
42
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
43
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
44
+ service_account_jwt: Optional[pulumi.Input[_builtins.str]] = None):
45
45
  """
46
46
  The set of arguments for constructing a SecretBackend resource.
47
- :param pulumi.Input[builtins.str] path: Where the secret backend will be mounted
48
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
49
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
50
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
51
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
52
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
53
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
54
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount
55
- :param pulumi.Input[builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
47
+ :param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
48
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
49
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
50
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
51
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
52
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
53
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
54
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
55
+ :param pulumi.Input[_builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
56
56
  service account JWT when Vault is running in a Kubernetes pod.
57
- :param pulumi.Input[builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
58
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
59
- :param pulumi.Input[builtins.str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
57
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
58
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
59
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
60
+ :param pulumi.Input[_builtins.str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
60
61
  secrets engine to verify the Kubernetes API server certificate. Defaults to the local
61
62
  pod’s CA if Vault is running in Kubernetes. Otherwise, defaults to the root CA set where
62
63
  Vault is running.
63
- :param pulumi.Input[builtins.str] kubernetes_host: The Kubernetes API URL to connect to. Required if the
64
+ :param pulumi.Input[_builtins.str] kubernetes_host: The Kubernetes API URL to connect to. Required if the
64
65
  standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
65
66
  are not set on the host that Vault is running on.
66
- :param pulumi.Input[builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
67
- :param pulumi.Input[builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
68
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
69
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
67
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
68
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
69
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
70
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
70
71
  The value should not contain leading or trailing forward slashes.
71
72
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
72
73
  *Available only for Vault Enterprise*.
73
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] options: Specifies mount type specific options that are passed to the backend
74
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
75
- :param pulumi.Input[builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
76
- :param pulumi.Input[builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
77
- :param pulumi.Input[builtins.str] service_account_jwt: The JSON web token of the service account used by the
74
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
75
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
76
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
77
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
78
+ :param pulumi.Input[_builtins.str] service_account_jwt: The JSON web token of the service account used by the
78
79
  secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
79
80
  is running in Kubernetes.
80
81
  """
@@ -97,6 +98,8 @@ class SecretBackendArgs:
97
98
  pulumi.set(__self__, "disable_local_ca_jwt", disable_local_ca_jwt)
98
99
  if external_entropy_access is not None:
99
100
  pulumi.set(__self__, "external_entropy_access", external_entropy_access)
101
+ if force_no_cache is not None:
102
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
100
103
  if identity_token_key is not None:
101
104
  pulumi.set(__self__, "identity_token_key", identity_token_key)
102
105
  if kubernetes_ca_cert is not None:
@@ -122,105 +125,105 @@ class SecretBackendArgs:
122
125
  if service_account_jwt is not None:
123
126
  pulumi.set(__self__, "service_account_jwt", service_account_jwt)
124
127
 
125
- @property
128
+ @_builtins.property
126
129
  @pulumi.getter
127
- def path(self) -> pulumi.Input[builtins.str]:
130
+ def path(self) -> pulumi.Input[_builtins.str]:
128
131
  """
129
132
  Where the secret backend will be mounted
130
133
  """
131
134
  return pulumi.get(self, "path")
132
135
 
133
136
  @path.setter
134
- def path(self, value: pulumi.Input[builtins.str]):
137
+ def path(self, value: pulumi.Input[_builtins.str]):
135
138
  pulumi.set(self, "path", value)
136
139
 
137
- @property
140
+ @_builtins.property
138
141
  @pulumi.getter(name="allowedManagedKeys")
139
- def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
142
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
140
143
  """
141
144
  List of managed key registry entry names that the mount in question is allowed to access
142
145
  """
143
146
  return pulumi.get(self, "allowed_managed_keys")
144
147
 
145
148
  @allowed_managed_keys.setter
146
- def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
149
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
147
150
  pulumi.set(self, "allowed_managed_keys", value)
148
151
 
149
- @property
152
+ @_builtins.property
150
153
  @pulumi.getter(name="allowedResponseHeaders")
151
- def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
154
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
152
155
  """
153
156
  List of headers to allow and pass from the request to the plugin
154
157
  """
155
158
  return pulumi.get(self, "allowed_response_headers")
156
159
 
157
160
  @allowed_response_headers.setter
158
- def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
161
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
159
162
  pulumi.set(self, "allowed_response_headers", value)
160
163
 
161
- @property
164
+ @_builtins.property
162
165
  @pulumi.getter(name="auditNonHmacRequestKeys")
163
- def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
166
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
164
167
  """
165
168
  Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
166
169
  """
167
170
  return pulumi.get(self, "audit_non_hmac_request_keys")
168
171
 
169
172
  @audit_non_hmac_request_keys.setter
170
- def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
173
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
171
174
  pulumi.set(self, "audit_non_hmac_request_keys", value)
172
175
 
173
- @property
176
+ @_builtins.property
174
177
  @pulumi.getter(name="auditNonHmacResponseKeys")
175
- def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
178
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
176
179
  """
177
180
  Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
178
181
  """
179
182
  return pulumi.get(self, "audit_non_hmac_response_keys")
180
183
 
181
184
  @audit_non_hmac_response_keys.setter
182
- def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
185
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
183
186
  pulumi.set(self, "audit_non_hmac_response_keys", value)
184
187
 
185
- @property
188
+ @_builtins.property
186
189
  @pulumi.getter(name="defaultLeaseTtlSeconds")
187
- def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
190
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
188
191
  """
189
192
  Default lease duration for tokens and secrets in seconds
190
193
  """
191
194
  return pulumi.get(self, "default_lease_ttl_seconds")
192
195
 
193
196
  @default_lease_ttl_seconds.setter
194
- def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
197
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
195
198
  pulumi.set(self, "default_lease_ttl_seconds", value)
196
199
 
197
- @property
200
+ @_builtins.property
198
201
  @pulumi.getter(name="delegatedAuthAccessors")
199
- def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
202
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
200
203
  """
201
204
  List of headers to allow and pass from the request to the plugin
202
205
  """
203
206
  return pulumi.get(self, "delegated_auth_accessors")
204
207
 
205
208
  @delegated_auth_accessors.setter
206
- def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
209
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
207
210
  pulumi.set(self, "delegated_auth_accessors", value)
208
211
 
209
- @property
212
+ @_builtins.property
210
213
  @pulumi.getter
211
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
214
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
212
215
  """
213
216
  Human-friendly description of the mount
214
217
  """
215
218
  return pulumi.get(self, "description")
216
219
 
217
220
  @description.setter
218
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
221
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
219
222
  pulumi.set(self, "description", value)
220
223
 
221
- @property
224
+ @_builtins.property
222
225
  @pulumi.getter(name="disableLocalCaJwt")
223
- def disable_local_ca_jwt(self) -> Optional[pulumi.Input[builtins.bool]]:
226
+ def disable_local_ca_jwt(self) -> Optional[pulumi.Input[_builtins.bool]]:
224
227
  """
225
228
  Disable defaulting to the local CA certificate and
226
229
  service account JWT when Vault is running in a Kubernetes pod.
@@ -228,36 +231,48 @@ class SecretBackendArgs:
228
231
  return pulumi.get(self, "disable_local_ca_jwt")
229
232
 
230
233
  @disable_local_ca_jwt.setter
231
- def disable_local_ca_jwt(self, value: Optional[pulumi.Input[builtins.bool]]):
234
+ def disable_local_ca_jwt(self, value: Optional[pulumi.Input[_builtins.bool]]):
232
235
  pulumi.set(self, "disable_local_ca_jwt", value)
233
236
 
234
- @property
237
+ @_builtins.property
235
238
  @pulumi.getter(name="externalEntropyAccess")
236
- def external_entropy_access(self) -> Optional[pulumi.Input[builtins.bool]]:
239
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
237
240
  """
238
241
  Enable the secrets engine to access Vault's external entropy source
239
242
  """
240
243
  return pulumi.get(self, "external_entropy_access")
241
244
 
242
245
  @external_entropy_access.setter
243
- def external_entropy_access(self, value: Optional[pulumi.Input[builtins.bool]]):
246
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
244
247
  pulumi.set(self, "external_entropy_access", value)
245
248
 
246
- @property
249
+ @_builtins.property
250
+ @pulumi.getter(name="forceNoCache")
251
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
252
+ """
253
+ If set to true, disables caching.
254
+ """
255
+ return pulumi.get(self, "force_no_cache")
256
+
257
+ @force_no_cache.setter
258
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
259
+ pulumi.set(self, "force_no_cache", value)
260
+
261
+ @_builtins.property
247
262
  @pulumi.getter(name="identityTokenKey")
248
- def identity_token_key(self) -> Optional[pulumi.Input[builtins.str]]:
263
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
249
264
  """
250
265
  The key to use for signing plugin workload identity tokens
251
266
  """
252
267
  return pulumi.get(self, "identity_token_key")
253
268
 
254
269
  @identity_token_key.setter
255
- def identity_token_key(self, value: Optional[pulumi.Input[builtins.str]]):
270
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
256
271
  pulumi.set(self, "identity_token_key", value)
257
272
 
258
- @property
273
+ @_builtins.property
259
274
  @pulumi.getter(name="kubernetesCaCert")
260
- def kubernetes_ca_cert(self) -> Optional[pulumi.Input[builtins.str]]:
275
+ def kubernetes_ca_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
261
276
  """
262
277
  A PEM-encoded CA certificate used by the
263
278
  secrets engine to verify the Kubernetes API server certificate. Defaults to the local
@@ -267,12 +282,12 @@ class SecretBackendArgs:
267
282
  return pulumi.get(self, "kubernetes_ca_cert")
268
283
 
269
284
  @kubernetes_ca_cert.setter
270
- def kubernetes_ca_cert(self, value: Optional[pulumi.Input[builtins.str]]):
285
+ def kubernetes_ca_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
271
286
  pulumi.set(self, "kubernetes_ca_cert", value)
272
287
 
273
- @property
288
+ @_builtins.property
274
289
  @pulumi.getter(name="kubernetesHost")
275
- def kubernetes_host(self) -> Optional[pulumi.Input[builtins.str]]:
290
+ def kubernetes_host(self) -> Optional[pulumi.Input[_builtins.str]]:
276
291
  """
277
292
  The Kubernetes API URL to connect to. Required if the
278
293
  standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
@@ -281,48 +296,48 @@ class SecretBackendArgs:
281
296
  return pulumi.get(self, "kubernetes_host")
282
297
 
283
298
  @kubernetes_host.setter
284
- def kubernetes_host(self, value: Optional[pulumi.Input[builtins.str]]):
299
+ def kubernetes_host(self, value: Optional[pulumi.Input[_builtins.str]]):
285
300
  pulumi.set(self, "kubernetes_host", value)
286
301
 
287
- @property
302
+ @_builtins.property
288
303
  @pulumi.getter(name="listingVisibility")
289
- def listing_visibility(self) -> Optional[pulumi.Input[builtins.str]]:
304
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
290
305
  """
291
306
  Specifies whether to show this mount in the UI-specific listing endpoint
292
307
  """
293
308
  return pulumi.get(self, "listing_visibility")
294
309
 
295
310
  @listing_visibility.setter
296
- def listing_visibility(self, value: Optional[pulumi.Input[builtins.str]]):
311
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
297
312
  pulumi.set(self, "listing_visibility", value)
298
313
 
299
- @property
314
+ @_builtins.property
300
315
  @pulumi.getter
301
- def local(self) -> Optional[pulumi.Input[builtins.bool]]:
316
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
302
317
  """
303
318
  Local mount flag that can be explicitly set to true to enforce local mount in HA environment
304
319
  """
305
320
  return pulumi.get(self, "local")
306
321
 
307
322
  @local.setter
308
- def local(self, value: Optional[pulumi.Input[builtins.bool]]):
323
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
309
324
  pulumi.set(self, "local", value)
310
325
 
311
- @property
326
+ @_builtins.property
312
327
  @pulumi.getter(name="maxLeaseTtlSeconds")
313
- def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
328
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
314
329
  """
315
330
  Maximum possible lease duration for tokens and secrets in seconds
316
331
  """
317
332
  return pulumi.get(self, "max_lease_ttl_seconds")
318
333
 
319
334
  @max_lease_ttl_seconds.setter
320
- def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
335
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
321
336
  pulumi.set(self, "max_lease_ttl_seconds", value)
322
337
 
323
- @property
338
+ @_builtins.property
324
339
  @pulumi.getter
325
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
340
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
326
341
  """
327
342
  The namespace to provision the resource in.
328
343
  The value should not contain leading or trailing forward slashes.
@@ -332,60 +347,60 @@ class SecretBackendArgs:
332
347
  return pulumi.get(self, "namespace")
333
348
 
334
349
  @namespace.setter
335
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
350
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
336
351
  pulumi.set(self, "namespace", value)
337
352
 
338
- @property
353
+ @_builtins.property
339
354
  @pulumi.getter
340
- def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
355
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
341
356
  """
342
357
  Specifies mount type specific options that are passed to the backend
343
358
  """
344
359
  return pulumi.get(self, "options")
345
360
 
346
361
  @options.setter
347
- def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
362
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
348
363
  pulumi.set(self, "options", value)
349
364
 
350
- @property
365
+ @_builtins.property
351
366
  @pulumi.getter(name="passthroughRequestHeaders")
352
- def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
367
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
353
368
  """
354
369
  List of headers to allow and pass from the request to the plugin
355
370
  """
356
371
  return pulumi.get(self, "passthrough_request_headers")
357
372
 
358
373
  @passthrough_request_headers.setter
359
- def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
374
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
360
375
  pulumi.set(self, "passthrough_request_headers", value)
361
376
 
362
- @property
377
+ @_builtins.property
363
378
  @pulumi.getter(name="pluginVersion")
364
- def plugin_version(self) -> Optional[pulumi.Input[builtins.str]]:
379
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
365
380
  """
366
381
  Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
367
382
  """
368
383
  return pulumi.get(self, "plugin_version")
369
384
 
370
385
  @plugin_version.setter
371
- def plugin_version(self, value: Optional[pulumi.Input[builtins.str]]):
386
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
372
387
  pulumi.set(self, "plugin_version", value)
373
388
 
374
- @property
389
+ @_builtins.property
375
390
  @pulumi.getter(name="sealWrap")
376
- def seal_wrap(self) -> Optional[pulumi.Input[builtins.bool]]:
391
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
377
392
  """
378
393
  Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
379
394
  """
380
395
  return pulumi.get(self, "seal_wrap")
381
396
 
382
397
  @seal_wrap.setter
383
- def seal_wrap(self, value: Optional[pulumi.Input[builtins.bool]]):
398
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
384
399
  pulumi.set(self, "seal_wrap", value)
385
400
 
386
- @property
401
+ @_builtins.property
387
402
  @pulumi.getter(name="serviceAccountJwt")
388
- def service_account_jwt(self) -> Optional[pulumi.Input[builtins.str]]:
403
+ def service_account_jwt(self) -> Optional[pulumi.Input[_builtins.str]]:
389
404
  """
390
405
  The JSON web token of the service account used by the
391
406
  secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
@@ -394,70 +409,72 @@ class SecretBackendArgs:
394
409
  return pulumi.get(self, "service_account_jwt")
395
410
 
396
411
  @service_account_jwt.setter
397
- def service_account_jwt(self, value: Optional[pulumi.Input[builtins.str]]):
412
+ def service_account_jwt(self, value: Optional[pulumi.Input[_builtins.str]]):
398
413
  pulumi.set(self, "service_account_jwt", value)
399
414
 
400
415
 
401
416
  @pulumi.input_type
402
417
  class _SecretBackendState:
403
418
  def __init__(__self__, *,
404
- accessor: Optional[pulumi.Input[builtins.str]] = None,
405
- allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
406
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
407
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
408
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
409
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
410
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
411
- description: Optional[pulumi.Input[builtins.str]] = None,
412
- disable_local_ca_jwt: Optional[pulumi.Input[builtins.bool]] = None,
413
- external_entropy_access: Optional[pulumi.Input[builtins.bool]] = None,
414
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
415
- kubernetes_ca_cert: Optional[pulumi.Input[builtins.str]] = None,
416
- kubernetes_host: Optional[pulumi.Input[builtins.str]] = None,
417
- listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
418
- local: Optional[pulumi.Input[builtins.bool]] = None,
419
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
420
- namespace: Optional[pulumi.Input[builtins.str]] = None,
421
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
422
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
423
- path: Optional[pulumi.Input[builtins.str]] = None,
424
- plugin_version: Optional[pulumi.Input[builtins.str]] = None,
425
- seal_wrap: Optional[pulumi.Input[builtins.bool]] = None,
426
- service_account_jwt: Optional[pulumi.Input[builtins.str]] = None):
419
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
420
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
421
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
422
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
423
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
424
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
425
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
426
+ description: Optional[pulumi.Input[_builtins.str]] = None,
427
+ disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
428
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
429
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
430
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
431
+ kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
432
+ kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
433
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
434
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
435
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
436
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
437
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
438
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
439
+ path: Optional[pulumi.Input[_builtins.str]] = None,
440
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
441
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
442
+ service_account_jwt: Optional[pulumi.Input[_builtins.str]] = None):
427
443
  """
428
444
  Input properties used for looking up and filtering SecretBackend resources.
429
- :param pulumi.Input[builtins.str] accessor: Accessor of the mount
430
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
431
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
432
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
433
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
434
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
435
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
436
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount
437
- :param pulumi.Input[builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
445
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
446
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
447
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
448
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
449
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
450
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
451
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
452
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
453
+ :param pulumi.Input[_builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
438
454
  service account JWT when Vault is running in a Kubernetes pod.
439
- :param pulumi.Input[builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
440
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
441
- :param pulumi.Input[builtins.str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
455
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
456
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
457
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
458
+ :param pulumi.Input[_builtins.str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
442
459
  secrets engine to verify the Kubernetes API server certificate. Defaults to the local
443
460
  pod’s CA if Vault is running in Kubernetes. Otherwise, defaults to the root CA set where
444
461
  Vault is running.
445
- :param pulumi.Input[builtins.str] kubernetes_host: The Kubernetes API URL to connect to. Required if the
462
+ :param pulumi.Input[_builtins.str] kubernetes_host: The Kubernetes API URL to connect to. Required if the
446
463
  standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
447
464
  are not set on the host that Vault is running on.
448
- :param pulumi.Input[builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
449
- :param pulumi.Input[builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
450
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
451
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
465
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
466
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
467
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
468
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
452
469
  The value should not contain leading or trailing forward slashes.
453
470
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
454
471
  *Available only for Vault Enterprise*.
455
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] options: Specifies mount type specific options that are passed to the backend
456
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
457
- :param pulumi.Input[builtins.str] path: Where the secret backend will be mounted
458
- :param pulumi.Input[builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
459
- :param pulumi.Input[builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
460
- :param pulumi.Input[builtins.str] service_account_jwt: The JSON web token of the service account used by the
472
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
473
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
474
+ :param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
475
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
476
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
477
+ :param pulumi.Input[_builtins.str] service_account_jwt: The JSON web token of the service account used by the
461
478
  secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
462
479
  is running in Kubernetes.
463
480
  """
@@ -481,6 +498,8 @@ class _SecretBackendState:
481
498
  pulumi.set(__self__, "disable_local_ca_jwt", disable_local_ca_jwt)
482
499
  if external_entropy_access is not None:
483
500
  pulumi.set(__self__, "external_entropy_access", external_entropy_access)
501
+ if force_no_cache is not None:
502
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
484
503
  if identity_token_key is not None:
485
504
  pulumi.set(__self__, "identity_token_key", identity_token_key)
486
505
  if kubernetes_ca_cert is not None:
@@ -508,105 +527,105 @@ class _SecretBackendState:
508
527
  if service_account_jwt is not None:
509
528
  pulumi.set(__self__, "service_account_jwt", service_account_jwt)
510
529
 
511
- @property
530
+ @_builtins.property
512
531
  @pulumi.getter
513
- def accessor(self) -> Optional[pulumi.Input[builtins.str]]:
532
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
514
533
  """
515
534
  Accessor of the mount
516
535
  """
517
536
  return pulumi.get(self, "accessor")
518
537
 
519
538
  @accessor.setter
520
- def accessor(self, value: Optional[pulumi.Input[builtins.str]]):
539
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
521
540
  pulumi.set(self, "accessor", value)
522
541
 
523
- @property
542
+ @_builtins.property
524
543
  @pulumi.getter(name="allowedManagedKeys")
525
- def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
544
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
526
545
  """
527
546
  List of managed key registry entry names that the mount in question is allowed to access
528
547
  """
529
548
  return pulumi.get(self, "allowed_managed_keys")
530
549
 
531
550
  @allowed_managed_keys.setter
532
- def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
551
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
533
552
  pulumi.set(self, "allowed_managed_keys", value)
534
553
 
535
- @property
554
+ @_builtins.property
536
555
  @pulumi.getter(name="allowedResponseHeaders")
537
- def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
556
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
538
557
  """
539
558
  List of headers to allow and pass from the request to the plugin
540
559
  """
541
560
  return pulumi.get(self, "allowed_response_headers")
542
561
 
543
562
  @allowed_response_headers.setter
544
- def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
563
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
545
564
  pulumi.set(self, "allowed_response_headers", value)
546
565
 
547
- @property
566
+ @_builtins.property
548
567
  @pulumi.getter(name="auditNonHmacRequestKeys")
549
- def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
568
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
550
569
  """
551
570
  Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
552
571
  """
553
572
  return pulumi.get(self, "audit_non_hmac_request_keys")
554
573
 
555
574
  @audit_non_hmac_request_keys.setter
556
- def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
575
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
557
576
  pulumi.set(self, "audit_non_hmac_request_keys", value)
558
577
 
559
- @property
578
+ @_builtins.property
560
579
  @pulumi.getter(name="auditNonHmacResponseKeys")
561
- def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
580
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
562
581
  """
563
582
  Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
564
583
  """
565
584
  return pulumi.get(self, "audit_non_hmac_response_keys")
566
585
 
567
586
  @audit_non_hmac_response_keys.setter
568
- def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
587
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
569
588
  pulumi.set(self, "audit_non_hmac_response_keys", value)
570
589
 
571
- @property
590
+ @_builtins.property
572
591
  @pulumi.getter(name="defaultLeaseTtlSeconds")
573
- def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
592
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
574
593
  """
575
594
  Default lease duration for tokens and secrets in seconds
576
595
  """
577
596
  return pulumi.get(self, "default_lease_ttl_seconds")
578
597
 
579
598
  @default_lease_ttl_seconds.setter
580
- def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
599
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
581
600
  pulumi.set(self, "default_lease_ttl_seconds", value)
582
601
 
583
- @property
602
+ @_builtins.property
584
603
  @pulumi.getter(name="delegatedAuthAccessors")
585
- def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
604
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
586
605
  """
587
606
  List of headers to allow and pass from the request to the plugin
588
607
  """
589
608
  return pulumi.get(self, "delegated_auth_accessors")
590
609
 
591
610
  @delegated_auth_accessors.setter
592
- def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
611
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
593
612
  pulumi.set(self, "delegated_auth_accessors", value)
594
613
 
595
- @property
614
+ @_builtins.property
596
615
  @pulumi.getter
597
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
616
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
598
617
  """
599
618
  Human-friendly description of the mount
600
619
  """
601
620
  return pulumi.get(self, "description")
602
621
 
603
622
  @description.setter
604
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
623
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
605
624
  pulumi.set(self, "description", value)
606
625
 
607
- @property
626
+ @_builtins.property
608
627
  @pulumi.getter(name="disableLocalCaJwt")
609
- def disable_local_ca_jwt(self) -> Optional[pulumi.Input[builtins.bool]]:
628
+ def disable_local_ca_jwt(self) -> Optional[pulumi.Input[_builtins.bool]]:
610
629
  """
611
630
  Disable defaulting to the local CA certificate and
612
631
  service account JWT when Vault is running in a Kubernetes pod.
@@ -614,36 +633,48 @@ class _SecretBackendState:
614
633
  return pulumi.get(self, "disable_local_ca_jwt")
615
634
 
616
635
  @disable_local_ca_jwt.setter
617
- def disable_local_ca_jwt(self, value: Optional[pulumi.Input[builtins.bool]]):
636
+ def disable_local_ca_jwt(self, value: Optional[pulumi.Input[_builtins.bool]]):
618
637
  pulumi.set(self, "disable_local_ca_jwt", value)
619
638
 
620
- @property
639
+ @_builtins.property
621
640
  @pulumi.getter(name="externalEntropyAccess")
622
- def external_entropy_access(self) -> Optional[pulumi.Input[builtins.bool]]:
641
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
623
642
  """
624
643
  Enable the secrets engine to access Vault's external entropy source
625
644
  """
626
645
  return pulumi.get(self, "external_entropy_access")
627
646
 
628
647
  @external_entropy_access.setter
629
- def external_entropy_access(self, value: Optional[pulumi.Input[builtins.bool]]):
648
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
630
649
  pulumi.set(self, "external_entropy_access", value)
631
650
 
632
- @property
651
+ @_builtins.property
652
+ @pulumi.getter(name="forceNoCache")
653
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
654
+ """
655
+ If set to true, disables caching.
656
+ """
657
+ return pulumi.get(self, "force_no_cache")
658
+
659
+ @force_no_cache.setter
660
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
661
+ pulumi.set(self, "force_no_cache", value)
662
+
663
+ @_builtins.property
633
664
  @pulumi.getter(name="identityTokenKey")
634
- def identity_token_key(self) -> Optional[pulumi.Input[builtins.str]]:
665
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
635
666
  """
636
667
  The key to use for signing plugin workload identity tokens
637
668
  """
638
669
  return pulumi.get(self, "identity_token_key")
639
670
 
640
671
  @identity_token_key.setter
641
- def identity_token_key(self, value: Optional[pulumi.Input[builtins.str]]):
672
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
642
673
  pulumi.set(self, "identity_token_key", value)
643
674
 
644
- @property
675
+ @_builtins.property
645
676
  @pulumi.getter(name="kubernetesCaCert")
646
- def kubernetes_ca_cert(self) -> Optional[pulumi.Input[builtins.str]]:
677
+ def kubernetes_ca_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
647
678
  """
648
679
  A PEM-encoded CA certificate used by the
649
680
  secrets engine to verify the Kubernetes API server certificate. Defaults to the local
@@ -653,12 +684,12 @@ class _SecretBackendState:
653
684
  return pulumi.get(self, "kubernetes_ca_cert")
654
685
 
655
686
  @kubernetes_ca_cert.setter
656
- def kubernetes_ca_cert(self, value: Optional[pulumi.Input[builtins.str]]):
687
+ def kubernetes_ca_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
657
688
  pulumi.set(self, "kubernetes_ca_cert", value)
658
689
 
659
- @property
690
+ @_builtins.property
660
691
  @pulumi.getter(name="kubernetesHost")
661
- def kubernetes_host(self) -> Optional[pulumi.Input[builtins.str]]:
692
+ def kubernetes_host(self) -> Optional[pulumi.Input[_builtins.str]]:
662
693
  """
663
694
  The Kubernetes API URL to connect to. Required if the
664
695
  standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
@@ -667,48 +698,48 @@ class _SecretBackendState:
667
698
  return pulumi.get(self, "kubernetes_host")
668
699
 
669
700
  @kubernetes_host.setter
670
- def kubernetes_host(self, value: Optional[pulumi.Input[builtins.str]]):
701
+ def kubernetes_host(self, value: Optional[pulumi.Input[_builtins.str]]):
671
702
  pulumi.set(self, "kubernetes_host", value)
672
703
 
673
- @property
704
+ @_builtins.property
674
705
  @pulumi.getter(name="listingVisibility")
675
- def listing_visibility(self) -> Optional[pulumi.Input[builtins.str]]:
706
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
676
707
  """
677
708
  Specifies whether to show this mount in the UI-specific listing endpoint
678
709
  """
679
710
  return pulumi.get(self, "listing_visibility")
680
711
 
681
712
  @listing_visibility.setter
682
- def listing_visibility(self, value: Optional[pulumi.Input[builtins.str]]):
713
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
683
714
  pulumi.set(self, "listing_visibility", value)
684
715
 
685
- @property
716
+ @_builtins.property
686
717
  @pulumi.getter
687
- def local(self) -> Optional[pulumi.Input[builtins.bool]]:
718
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
688
719
  """
689
720
  Local mount flag that can be explicitly set to true to enforce local mount in HA environment
690
721
  """
691
722
  return pulumi.get(self, "local")
692
723
 
693
724
  @local.setter
694
- def local(self, value: Optional[pulumi.Input[builtins.bool]]):
725
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
695
726
  pulumi.set(self, "local", value)
696
727
 
697
- @property
728
+ @_builtins.property
698
729
  @pulumi.getter(name="maxLeaseTtlSeconds")
699
- def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
730
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
700
731
  """
701
732
  Maximum possible lease duration for tokens and secrets in seconds
702
733
  """
703
734
  return pulumi.get(self, "max_lease_ttl_seconds")
704
735
 
705
736
  @max_lease_ttl_seconds.setter
706
- def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
737
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
707
738
  pulumi.set(self, "max_lease_ttl_seconds", value)
708
739
 
709
- @property
740
+ @_builtins.property
710
741
  @pulumi.getter
711
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
742
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
712
743
  """
713
744
  The namespace to provision the resource in.
714
745
  The value should not contain leading or trailing forward slashes.
@@ -718,72 +749,72 @@ class _SecretBackendState:
718
749
  return pulumi.get(self, "namespace")
719
750
 
720
751
  @namespace.setter
721
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
752
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
722
753
  pulumi.set(self, "namespace", value)
723
754
 
724
- @property
755
+ @_builtins.property
725
756
  @pulumi.getter
726
- def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
757
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
727
758
  """
728
759
  Specifies mount type specific options that are passed to the backend
729
760
  """
730
761
  return pulumi.get(self, "options")
731
762
 
732
763
  @options.setter
733
- def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
764
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
734
765
  pulumi.set(self, "options", value)
735
766
 
736
- @property
767
+ @_builtins.property
737
768
  @pulumi.getter(name="passthroughRequestHeaders")
738
- def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
769
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
739
770
  """
740
771
  List of headers to allow and pass from the request to the plugin
741
772
  """
742
773
  return pulumi.get(self, "passthrough_request_headers")
743
774
 
744
775
  @passthrough_request_headers.setter
745
- def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
776
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
746
777
  pulumi.set(self, "passthrough_request_headers", value)
747
778
 
748
- @property
779
+ @_builtins.property
749
780
  @pulumi.getter
750
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
781
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
751
782
  """
752
783
  Where the secret backend will be mounted
753
784
  """
754
785
  return pulumi.get(self, "path")
755
786
 
756
787
  @path.setter
757
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
788
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
758
789
  pulumi.set(self, "path", value)
759
790
 
760
- @property
791
+ @_builtins.property
761
792
  @pulumi.getter(name="pluginVersion")
762
- def plugin_version(self) -> Optional[pulumi.Input[builtins.str]]:
793
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
763
794
  """
764
795
  Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
765
796
  """
766
797
  return pulumi.get(self, "plugin_version")
767
798
 
768
799
  @plugin_version.setter
769
- def plugin_version(self, value: Optional[pulumi.Input[builtins.str]]):
800
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
770
801
  pulumi.set(self, "plugin_version", value)
771
802
 
772
- @property
803
+ @_builtins.property
773
804
  @pulumi.getter(name="sealWrap")
774
- def seal_wrap(self) -> Optional[pulumi.Input[builtins.bool]]:
805
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
775
806
  """
776
807
  Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
777
808
  """
778
809
  return pulumi.get(self, "seal_wrap")
779
810
 
780
811
  @seal_wrap.setter
781
- def seal_wrap(self, value: Optional[pulumi.Input[builtins.bool]]):
812
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
782
813
  pulumi.set(self, "seal_wrap", value)
783
814
 
784
- @property
815
+ @_builtins.property
785
816
  @pulumi.getter(name="serviceAccountJwt")
786
- def service_account_jwt(self) -> Optional[pulumi.Input[builtins.str]]:
817
+ def service_account_jwt(self) -> Optional[pulumi.Input[_builtins.str]]:
787
818
  """
788
819
  The JSON web token of the service account used by the
789
820
  secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
@@ -792,7 +823,7 @@ class _SecretBackendState:
792
823
  return pulumi.get(self, "service_account_jwt")
793
824
 
794
825
  @service_account_jwt.setter
795
- def service_account_jwt(self, value: Optional[pulumi.Input[builtins.str]]):
826
+ def service_account_jwt(self, value: Optional[pulumi.Input[_builtins.str]]):
796
827
  pulumi.set(self, "service_account_jwt", value)
797
828
 
798
829
 
@@ -802,28 +833,29 @@ class SecretBackend(pulumi.CustomResource):
802
833
  def __init__(__self__,
803
834
  resource_name: str,
804
835
  opts: Optional[pulumi.ResourceOptions] = None,
805
- allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
806
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
807
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
808
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
809
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
810
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
811
- description: Optional[pulumi.Input[builtins.str]] = None,
812
- disable_local_ca_jwt: Optional[pulumi.Input[builtins.bool]] = None,
813
- external_entropy_access: Optional[pulumi.Input[builtins.bool]] = None,
814
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
815
- kubernetes_ca_cert: Optional[pulumi.Input[builtins.str]] = None,
816
- kubernetes_host: Optional[pulumi.Input[builtins.str]] = None,
817
- listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
818
- local: Optional[pulumi.Input[builtins.bool]] = None,
819
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
820
- namespace: Optional[pulumi.Input[builtins.str]] = None,
821
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
822
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
823
- path: Optional[pulumi.Input[builtins.str]] = None,
824
- plugin_version: Optional[pulumi.Input[builtins.str]] = None,
825
- seal_wrap: Optional[pulumi.Input[builtins.bool]] = None,
826
- service_account_jwt: Optional[pulumi.Input[builtins.str]] = None,
836
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
837
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
838
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
839
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
840
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
841
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
842
+ description: Optional[pulumi.Input[_builtins.str]] = None,
843
+ disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
844
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
845
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
846
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
847
+ kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
848
+ kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
849
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
850
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
851
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
852
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
853
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
854
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
855
+ path: Optional[pulumi.Input[_builtins.str]] = None,
856
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
857
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
858
+ service_account_jwt: Optional[pulumi.Input[_builtins.str]] = None,
827
859
  __props__=None):
828
860
  """
829
861
  ## Example Usage
@@ -854,37 +886,38 @@ class SecretBackend(pulumi.CustomResource):
854
886
 
855
887
  :param str resource_name: The name of the resource.
856
888
  :param pulumi.ResourceOptions opts: Options for the resource.
857
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
858
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
859
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
860
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
861
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
862
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
863
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount
864
- :param pulumi.Input[builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
889
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
890
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
891
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
892
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
893
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
894
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
895
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
896
+ :param pulumi.Input[_builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
865
897
  service account JWT when Vault is running in a Kubernetes pod.
866
- :param pulumi.Input[builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
867
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
868
- :param pulumi.Input[builtins.str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
898
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
899
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
900
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
901
+ :param pulumi.Input[_builtins.str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
869
902
  secrets engine to verify the Kubernetes API server certificate. Defaults to the local
870
903
  pod’s CA if Vault is running in Kubernetes. Otherwise, defaults to the root CA set where
871
904
  Vault is running.
872
- :param pulumi.Input[builtins.str] kubernetes_host: The Kubernetes API URL to connect to. Required if the
905
+ :param pulumi.Input[_builtins.str] kubernetes_host: The Kubernetes API URL to connect to. Required if the
873
906
  standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
874
907
  are not set on the host that Vault is running on.
875
- :param pulumi.Input[builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
876
- :param pulumi.Input[builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
877
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
878
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
908
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
909
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
910
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
911
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
879
912
  The value should not contain leading or trailing forward slashes.
880
913
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
881
914
  *Available only for Vault Enterprise*.
882
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] options: Specifies mount type specific options that are passed to the backend
883
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
884
- :param pulumi.Input[builtins.str] path: Where the secret backend will be mounted
885
- :param pulumi.Input[builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
886
- :param pulumi.Input[builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
887
- :param pulumi.Input[builtins.str] service_account_jwt: The JSON web token of the service account used by the
915
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
916
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
917
+ :param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
918
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
919
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
920
+ :param pulumi.Input[_builtins.str] service_account_jwt: The JSON web token of the service account used by the
888
921
  secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
889
922
  is running in Kubernetes.
890
923
  """
@@ -936,28 +969,29 @@ class SecretBackend(pulumi.CustomResource):
936
969
  def _internal_init(__self__,
937
970
  resource_name: str,
938
971
  opts: Optional[pulumi.ResourceOptions] = None,
939
- allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
940
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
941
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
942
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
943
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
944
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
945
- description: Optional[pulumi.Input[builtins.str]] = None,
946
- disable_local_ca_jwt: Optional[pulumi.Input[builtins.bool]] = None,
947
- external_entropy_access: Optional[pulumi.Input[builtins.bool]] = None,
948
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
949
- kubernetes_ca_cert: Optional[pulumi.Input[builtins.str]] = None,
950
- kubernetes_host: Optional[pulumi.Input[builtins.str]] = None,
951
- listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
952
- local: Optional[pulumi.Input[builtins.bool]] = None,
953
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
954
- namespace: Optional[pulumi.Input[builtins.str]] = None,
955
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
956
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
957
- path: Optional[pulumi.Input[builtins.str]] = None,
958
- plugin_version: Optional[pulumi.Input[builtins.str]] = None,
959
- seal_wrap: Optional[pulumi.Input[builtins.bool]] = None,
960
- service_account_jwt: Optional[pulumi.Input[builtins.str]] = None,
972
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
973
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
974
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
975
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
976
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
977
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
978
+ description: Optional[pulumi.Input[_builtins.str]] = None,
979
+ disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
980
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
981
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
982
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
983
+ kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
984
+ kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
985
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
986
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
987
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
988
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
989
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
990
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
991
+ path: Optional[pulumi.Input[_builtins.str]] = None,
992
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
993
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
994
+ service_account_jwt: Optional[pulumi.Input[_builtins.str]] = None,
961
995
  __props__=None):
962
996
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
963
997
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -976,6 +1010,7 @@ class SecretBackend(pulumi.CustomResource):
976
1010
  __props__.__dict__["description"] = description
977
1011
  __props__.__dict__["disable_local_ca_jwt"] = disable_local_ca_jwt
978
1012
  __props__.__dict__["external_entropy_access"] = external_entropy_access
1013
+ __props__.__dict__["force_no_cache"] = force_no_cache
979
1014
  __props__.__dict__["identity_token_key"] = identity_token_key
980
1015
  __props__.__dict__["kubernetes_ca_cert"] = kubernetes_ca_cert
981
1016
  __props__.__dict__["kubernetes_host"] = kubernetes_host
@@ -1004,29 +1039,30 @@ class SecretBackend(pulumi.CustomResource):
1004
1039
  def get(resource_name: str,
1005
1040
  id: pulumi.Input[str],
1006
1041
  opts: Optional[pulumi.ResourceOptions] = None,
1007
- accessor: Optional[pulumi.Input[builtins.str]] = None,
1008
- allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1009
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1010
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1011
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1012
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
1013
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1014
- description: Optional[pulumi.Input[builtins.str]] = None,
1015
- disable_local_ca_jwt: Optional[pulumi.Input[builtins.bool]] = None,
1016
- external_entropy_access: Optional[pulumi.Input[builtins.bool]] = None,
1017
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
1018
- kubernetes_ca_cert: Optional[pulumi.Input[builtins.str]] = None,
1019
- kubernetes_host: Optional[pulumi.Input[builtins.str]] = None,
1020
- listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
1021
- local: Optional[pulumi.Input[builtins.bool]] = None,
1022
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
1023
- namespace: Optional[pulumi.Input[builtins.str]] = None,
1024
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
1025
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1026
- path: Optional[pulumi.Input[builtins.str]] = None,
1027
- plugin_version: Optional[pulumi.Input[builtins.str]] = None,
1028
- seal_wrap: Optional[pulumi.Input[builtins.bool]] = None,
1029
- service_account_jwt: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretBackend':
1042
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
1043
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1044
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1045
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1046
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1047
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1048
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1049
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1050
+ disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
1051
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1052
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1053
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1054
+ kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
1055
+ kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
1056
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1057
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1058
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1059
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1060
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1061
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1062
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1063
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1064
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1065
+ service_account_jwt: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackend':
1030
1066
  """
1031
1067
  Get an existing SecretBackend resource's state with the given name, id, and optional extra
1032
1068
  properties used to qualify the lookup.
@@ -1034,38 +1070,39 @@ class SecretBackend(pulumi.CustomResource):
1034
1070
  :param str resource_name: The unique name of the resulting resource.
1035
1071
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
1036
1072
  :param pulumi.ResourceOptions opts: Options for the resource.
1037
- :param pulumi.Input[builtins.str] accessor: Accessor of the mount
1038
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1039
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1040
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1041
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1042
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
1043
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1044
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount
1045
- :param pulumi.Input[builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
1073
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
1074
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1075
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1076
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1077
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1078
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
1079
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1080
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
1081
+ :param pulumi.Input[_builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
1046
1082
  service account JWT when Vault is running in a Kubernetes pod.
1047
- :param pulumi.Input[builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1048
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1049
- :param pulumi.Input[builtins.str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
1083
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1084
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1085
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1086
+ :param pulumi.Input[_builtins.str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
1050
1087
  secrets engine to verify the Kubernetes API server certificate. Defaults to the local
1051
1088
  pod’s CA if Vault is running in Kubernetes. Otherwise, defaults to the root CA set where
1052
1089
  Vault is running.
1053
- :param pulumi.Input[builtins.str] kubernetes_host: The Kubernetes API URL to connect to. Required if the
1090
+ :param pulumi.Input[_builtins.str] kubernetes_host: The Kubernetes API URL to connect to. Required if the
1054
1091
  standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
1055
1092
  are not set on the host that Vault is running on.
1056
- :param pulumi.Input[builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1057
- :param pulumi.Input[builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1058
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
1059
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
1093
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1094
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1095
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
1096
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
1060
1097
  The value should not contain leading or trailing forward slashes.
1061
1098
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1062
1099
  *Available only for Vault Enterprise*.
1063
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1064
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1065
- :param pulumi.Input[builtins.str] path: Where the secret backend will be mounted
1066
- :param pulumi.Input[builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1067
- :param pulumi.Input[builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1068
- :param pulumi.Input[builtins.str] service_account_jwt: The JSON web token of the service account used by the
1100
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1101
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1102
+ :param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
1103
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1104
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1105
+ :param pulumi.Input[_builtins.str] service_account_jwt: The JSON web token of the service account used by the
1069
1106
  secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
1070
1107
  is running in Kubernetes.
1071
1108
  """
@@ -1083,6 +1120,7 @@ class SecretBackend(pulumi.CustomResource):
1083
1120
  __props__.__dict__["description"] = description
1084
1121
  __props__.__dict__["disable_local_ca_jwt"] = disable_local_ca_jwt
1085
1122
  __props__.__dict__["external_entropy_access"] = external_entropy_access
1123
+ __props__.__dict__["force_no_cache"] = force_no_cache
1086
1124
  __props__.__dict__["identity_token_key"] = identity_token_key
1087
1125
  __props__.__dict__["kubernetes_ca_cert"] = kubernetes_ca_cert
1088
1126
  __props__.__dict__["kubernetes_host"] = kubernetes_host
@@ -1098,98 +1136,106 @@ class SecretBackend(pulumi.CustomResource):
1098
1136
  __props__.__dict__["service_account_jwt"] = service_account_jwt
1099
1137
  return SecretBackend(resource_name, opts=opts, __props__=__props__)
1100
1138
 
1101
- @property
1139
+ @_builtins.property
1102
1140
  @pulumi.getter
1103
- def accessor(self) -> pulumi.Output[builtins.str]:
1141
+ def accessor(self) -> pulumi.Output[_builtins.str]:
1104
1142
  """
1105
1143
  Accessor of the mount
1106
1144
  """
1107
1145
  return pulumi.get(self, "accessor")
1108
1146
 
1109
- @property
1147
+ @_builtins.property
1110
1148
  @pulumi.getter(name="allowedManagedKeys")
1111
- def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1149
+ def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1112
1150
  """
1113
1151
  List of managed key registry entry names that the mount in question is allowed to access
1114
1152
  """
1115
1153
  return pulumi.get(self, "allowed_managed_keys")
1116
1154
 
1117
- @property
1155
+ @_builtins.property
1118
1156
  @pulumi.getter(name="allowedResponseHeaders")
1119
- def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1157
+ def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1120
1158
  """
1121
1159
  List of headers to allow and pass from the request to the plugin
1122
1160
  """
1123
1161
  return pulumi.get(self, "allowed_response_headers")
1124
1162
 
1125
- @property
1163
+ @_builtins.property
1126
1164
  @pulumi.getter(name="auditNonHmacRequestKeys")
1127
- def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[builtins.str]]:
1165
+ def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1128
1166
  """
1129
1167
  Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1130
1168
  """
1131
1169
  return pulumi.get(self, "audit_non_hmac_request_keys")
1132
1170
 
1133
- @property
1171
+ @_builtins.property
1134
1172
  @pulumi.getter(name="auditNonHmacResponseKeys")
1135
- def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[builtins.str]]:
1173
+ def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1136
1174
  """
1137
1175
  Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1138
1176
  """
1139
1177
  return pulumi.get(self, "audit_non_hmac_response_keys")
1140
1178
 
1141
- @property
1179
+ @_builtins.property
1142
1180
  @pulumi.getter(name="defaultLeaseTtlSeconds")
1143
- def default_lease_ttl_seconds(self) -> pulumi.Output[builtins.int]:
1181
+ def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1144
1182
  """
1145
1183
  Default lease duration for tokens and secrets in seconds
1146
1184
  """
1147
1185
  return pulumi.get(self, "default_lease_ttl_seconds")
1148
1186
 
1149
- @property
1187
+ @_builtins.property
1150
1188
  @pulumi.getter(name="delegatedAuthAccessors")
1151
- def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1189
+ def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1152
1190
  """
1153
1191
  List of headers to allow and pass from the request to the plugin
1154
1192
  """
1155
1193
  return pulumi.get(self, "delegated_auth_accessors")
1156
1194
 
1157
- @property
1195
+ @_builtins.property
1158
1196
  @pulumi.getter
1159
- def description(self) -> pulumi.Output[Optional[builtins.str]]:
1197
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
1160
1198
  """
1161
1199
  Human-friendly description of the mount
1162
1200
  """
1163
1201
  return pulumi.get(self, "description")
1164
1202
 
1165
- @property
1203
+ @_builtins.property
1166
1204
  @pulumi.getter(name="disableLocalCaJwt")
1167
- def disable_local_ca_jwt(self) -> pulumi.Output[Optional[builtins.bool]]:
1205
+ def disable_local_ca_jwt(self) -> pulumi.Output[Optional[_builtins.bool]]:
1168
1206
  """
1169
1207
  Disable defaulting to the local CA certificate and
1170
1208
  service account JWT when Vault is running in a Kubernetes pod.
1171
1209
  """
1172
1210
  return pulumi.get(self, "disable_local_ca_jwt")
1173
1211
 
1174
- @property
1212
+ @_builtins.property
1175
1213
  @pulumi.getter(name="externalEntropyAccess")
1176
- def external_entropy_access(self) -> pulumi.Output[Optional[builtins.bool]]:
1214
+ def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
1177
1215
  """
1178
1216
  Enable the secrets engine to access Vault's external entropy source
1179
1217
  """
1180
1218
  return pulumi.get(self, "external_entropy_access")
1181
1219
 
1182
- @property
1220
+ @_builtins.property
1221
+ @pulumi.getter(name="forceNoCache")
1222
+ def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
1223
+ """
1224
+ If set to true, disables caching.
1225
+ """
1226
+ return pulumi.get(self, "force_no_cache")
1227
+
1228
+ @_builtins.property
1183
1229
  @pulumi.getter(name="identityTokenKey")
1184
- def identity_token_key(self) -> pulumi.Output[Optional[builtins.str]]:
1230
+ def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
1185
1231
  """
1186
1232
  The key to use for signing plugin workload identity tokens
1187
1233
  """
1188
1234
  return pulumi.get(self, "identity_token_key")
1189
1235
 
1190
- @property
1236
+ @_builtins.property
1191
1237
  @pulumi.getter(name="kubernetesCaCert")
1192
- def kubernetes_ca_cert(self) -> pulumi.Output[Optional[builtins.str]]:
1238
+ def kubernetes_ca_cert(self) -> pulumi.Output[Optional[_builtins.str]]:
1193
1239
  """
1194
1240
  A PEM-encoded CA certificate used by the
1195
1241
  secrets engine to verify the Kubernetes API server certificate. Defaults to the local
@@ -1198,9 +1244,9 @@ class SecretBackend(pulumi.CustomResource):
1198
1244
  """
1199
1245
  return pulumi.get(self, "kubernetes_ca_cert")
1200
1246
 
1201
- @property
1247
+ @_builtins.property
1202
1248
  @pulumi.getter(name="kubernetesHost")
1203
- def kubernetes_host(self) -> pulumi.Output[Optional[builtins.str]]:
1249
+ def kubernetes_host(self) -> pulumi.Output[Optional[_builtins.str]]:
1204
1250
  """
1205
1251
  The Kubernetes API URL to connect to. Required if the
1206
1252
  standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
@@ -1208,33 +1254,33 @@ class SecretBackend(pulumi.CustomResource):
1208
1254
  """
1209
1255
  return pulumi.get(self, "kubernetes_host")
1210
1256
 
1211
- @property
1257
+ @_builtins.property
1212
1258
  @pulumi.getter(name="listingVisibility")
1213
- def listing_visibility(self) -> pulumi.Output[Optional[builtins.str]]:
1259
+ def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
1214
1260
  """
1215
1261
  Specifies whether to show this mount in the UI-specific listing endpoint
1216
1262
  """
1217
1263
  return pulumi.get(self, "listing_visibility")
1218
1264
 
1219
- @property
1265
+ @_builtins.property
1220
1266
  @pulumi.getter
1221
- def local(self) -> pulumi.Output[Optional[builtins.bool]]:
1267
+ def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
1222
1268
  """
1223
1269
  Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1224
1270
  """
1225
1271
  return pulumi.get(self, "local")
1226
1272
 
1227
- @property
1273
+ @_builtins.property
1228
1274
  @pulumi.getter(name="maxLeaseTtlSeconds")
1229
- def max_lease_ttl_seconds(self) -> pulumi.Output[builtins.int]:
1275
+ def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1230
1276
  """
1231
1277
  Maximum possible lease duration for tokens and secrets in seconds
1232
1278
  """
1233
1279
  return pulumi.get(self, "max_lease_ttl_seconds")
1234
1280
 
1235
- @property
1281
+ @_builtins.property
1236
1282
  @pulumi.getter
1237
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
1283
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
1238
1284
  """
1239
1285
  The namespace to provision the resource in.
1240
1286
  The value should not contain leading or trailing forward slashes.
@@ -1243,49 +1289,49 @@ class SecretBackend(pulumi.CustomResource):
1243
1289
  """
1244
1290
  return pulumi.get(self, "namespace")
1245
1291
 
1246
- @property
1292
+ @_builtins.property
1247
1293
  @pulumi.getter
1248
- def options(self) -> pulumi.Output[Optional[Mapping[str, builtins.str]]]:
1294
+ def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
1249
1295
  """
1250
1296
  Specifies mount type specific options that are passed to the backend
1251
1297
  """
1252
1298
  return pulumi.get(self, "options")
1253
1299
 
1254
- @property
1300
+ @_builtins.property
1255
1301
  @pulumi.getter(name="passthroughRequestHeaders")
1256
- def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1302
+ def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1257
1303
  """
1258
1304
  List of headers to allow and pass from the request to the plugin
1259
1305
  """
1260
1306
  return pulumi.get(self, "passthrough_request_headers")
1261
1307
 
1262
- @property
1308
+ @_builtins.property
1263
1309
  @pulumi.getter
1264
- def path(self) -> pulumi.Output[builtins.str]:
1310
+ def path(self) -> pulumi.Output[_builtins.str]:
1265
1311
  """
1266
1312
  Where the secret backend will be mounted
1267
1313
  """
1268
1314
  return pulumi.get(self, "path")
1269
1315
 
1270
- @property
1316
+ @_builtins.property
1271
1317
  @pulumi.getter(name="pluginVersion")
1272
- def plugin_version(self) -> pulumi.Output[Optional[builtins.str]]:
1318
+ def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
1273
1319
  """
1274
1320
  Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1275
1321
  """
1276
1322
  return pulumi.get(self, "plugin_version")
1277
1323
 
1278
- @property
1324
+ @_builtins.property
1279
1325
  @pulumi.getter(name="sealWrap")
1280
- def seal_wrap(self) -> pulumi.Output[builtins.bool]:
1326
+ def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
1281
1327
  """
1282
1328
  Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1283
1329
  """
1284
1330
  return pulumi.get(self, "seal_wrap")
1285
1331
 
1286
- @property
1332
+ @_builtins.property
1287
1333
  @pulumi.getter(name="serviceAccountJwt")
1288
- def service_account_jwt(self) -> pulumi.Output[Optional[builtins.str]]:
1334
+ def service_account_jwt(self) -> pulumi.Output[Optional[_builtins.str]]:
1289
1335
  """
1290
1336
  The JSON web token of the service account used by the
1291
1337
  secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault