pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,61 +19,61 @@ __all__ = ['SecretBackendArgs', 'SecretBackend']
20
19
  @pulumi.input_type
21
20
  class SecretBackendArgs:
22
21
  def __init__(__self__, *,
23
- path: pulumi.Input[builtins.str],
24
- allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
25
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
26
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
27
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
28
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
29
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
30
- description: Optional[pulumi.Input[builtins.str]] = None,
31
- disable_local_ca_jwt: Optional[pulumi.Input[builtins.bool]] = None,
32
- external_entropy_access: Optional[pulumi.Input[builtins.bool]] = None,
33
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
34
- kubernetes_ca_cert: Optional[pulumi.Input[builtins.str]] = None,
35
- kubernetes_host: Optional[pulumi.Input[builtins.str]] = None,
36
- listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
37
- local: Optional[pulumi.Input[builtins.bool]] = None,
38
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
39
- namespace: Optional[pulumi.Input[builtins.str]] = None,
40
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
41
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
42
- plugin_version: Optional[pulumi.Input[builtins.str]] = None,
43
- seal_wrap: Optional[pulumi.Input[builtins.bool]] = None,
44
- service_account_jwt: Optional[pulumi.Input[builtins.str]] = None):
22
+ path: pulumi.Input[_builtins.str],
23
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
24
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
25
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
28
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
29
+ description: Optional[pulumi.Input[_builtins.str]] = None,
30
+ disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
31
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
32
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
33
+ kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
34
+ kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
35
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
36
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
37
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
38
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
39
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
40
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
41
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
42
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
43
+ service_account_jwt: Optional[pulumi.Input[_builtins.str]] = None):
45
44
  """
46
45
  The set of arguments for constructing a SecretBackend resource.
47
- :param pulumi.Input[builtins.str] path: Where the secret backend will be mounted
48
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
49
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
50
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
51
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
52
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
53
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
54
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount
55
- :param pulumi.Input[builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
46
+ :param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
47
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
48
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
49
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
50
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
51
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
52
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
53
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
54
+ :param pulumi.Input[_builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
56
55
  service account JWT when Vault is running in a Kubernetes pod.
57
- :param pulumi.Input[builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
58
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
59
- :param pulumi.Input[builtins.str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
56
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
57
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
58
+ :param pulumi.Input[_builtins.str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
60
59
  secrets engine to verify the Kubernetes API server certificate. Defaults to the local
61
60
  pod’s CA if Vault is running in Kubernetes. Otherwise, defaults to the root CA set where
62
61
  Vault is running.
63
- :param pulumi.Input[builtins.str] kubernetes_host: The Kubernetes API URL to connect to. Required if the
62
+ :param pulumi.Input[_builtins.str] kubernetes_host: The Kubernetes API URL to connect to. Required if the
64
63
  standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
65
64
  are not set on the host that Vault is running on.
66
- :param pulumi.Input[builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
67
- :param pulumi.Input[builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
68
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
69
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
65
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
66
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
67
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
68
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
70
69
  The value should not contain leading or trailing forward slashes.
71
70
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
72
71
  *Available only for Vault Enterprise*.
73
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] options: Specifies mount type specific options that are passed to the backend
74
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
75
- :param pulumi.Input[builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
76
- :param pulumi.Input[builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
77
- :param pulumi.Input[builtins.str] service_account_jwt: The JSON web token of the service account used by the
72
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
73
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
74
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
75
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
76
+ :param pulumi.Input[_builtins.str] service_account_jwt: The JSON web token of the service account used by the
78
77
  secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
79
78
  is running in Kubernetes.
80
79
  """
@@ -122,105 +121,105 @@ class SecretBackendArgs:
122
121
  if service_account_jwt is not None:
123
122
  pulumi.set(__self__, "service_account_jwt", service_account_jwt)
124
123
 
125
- @property
124
+ @_builtins.property
126
125
  @pulumi.getter
127
- def path(self) -> pulumi.Input[builtins.str]:
126
+ def path(self) -> pulumi.Input[_builtins.str]:
128
127
  """
129
128
  Where the secret backend will be mounted
130
129
  """
131
130
  return pulumi.get(self, "path")
132
131
 
133
132
  @path.setter
134
- def path(self, value: pulumi.Input[builtins.str]):
133
+ def path(self, value: pulumi.Input[_builtins.str]):
135
134
  pulumi.set(self, "path", value)
136
135
 
137
- @property
136
+ @_builtins.property
138
137
  @pulumi.getter(name="allowedManagedKeys")
139
- def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
138
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
140
139
  """
141
140
  List of managed key registry entry names that the mount in question is allowed to access
142
141
  """
143
142
  return pulumi.get(self, "allowed_managed_keys")
144
143
 
145
144
  @allowed_managed_keys.setter
146
- def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
145
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
147
146
  pulumi.set(self, "allowed_managed_keys", value)
148
147
 
149
- @property
148
+ @_builtins.property
150
149
  @pulumi.getter(name="allowedResponseHeaders")
151
- def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
150
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
152
151
  """
153
152
  List of headers to allow and pass from the request to the plugin
154
153
  """
155
154
  return pulumi.get(self, "allowed_response_headers")
156
155
 
157
156
  @allowed_response_headers.setter
158
- def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
157
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
159
158
  pulumi.set(self, "allowed_response_headers", value)
160
159
 
161
- @property
160
+ @_builtins.property
162
161
  @pulumi.getter(name="auditNonHmacRequestKeys")
163
- def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
162
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
164
163
  """
165
164
  Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
166
165
  """
167
166
  return pulumi.get(self, "audit_non_hmac_request_keys")
168
167
 
169
168
  @audit_non_hmac_request_keys.setter
170
- def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
169
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
171
170
  pulumi.set(self, "audit_non_hmac_request_keys", value)
172
171
 
173
- @property
172
+ @_builtins.property
174
173
  @pulumi.getter(name="auditNonHmacResponseKeys")
175
- def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
174
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
176
175
  """
177
176
  Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
178
177
  """
179
178
  return pulumi.get(self, "audit_non_hmac_response_keys")
180
179
 
181
180
  @audit_non_hmac_response_keys.setter
182
- def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
181
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
183
182
  pulumi.set(self, "audit_non_hmac_response_keys", value)
184
183
 
185
- @property
184
+ @_builtins.property
186
185
  @pulumi.getter(name="defaultLeaseTtlSeconds")
187
- def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
186
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
188
187
  """
189
188
  Default lease duration for tokens and secrets in seconds
190
189
  """
191
190
  return pulumi.get(self, "default_lease_ttl_seconds")
192
191
 
193
192
  @default_lease_ttl_seconds.setter
194
- def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
193
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
195
194
  pulumi.set(self, "default_lease_ttl_seconds", value)
196
195
 
197
- @property
196
+ @_builtins.property
198
197
  @pulumi.getter(name="delegatedAuthAccessors")
199
- def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
198
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
200
199
  """
201
200
  List of headers to allow and pass from the request to the plugin
202
201
  """
203
202
  return pulumi.get(self, "delegated_auth_accessors")
204
203
 
205
204
  @delegated_auth_accessors.setter
206
- def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
205
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
207
206
  pulumi.set(self, "delegated_auth_accessors", value)
208
207
 
209
- @property
208
+ @_builtins.property
210
209
  @pulumi.getter
211
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
210
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
212
211
  """
213
212
  Human-friendly description of the mount
214
213
  """
215
214
  return pulumi.get(self, "description")
216
215
 
217
216
  @description.setter
218
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
217
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
219
218
  pulumi.set(self, "description", value)
220
219
 
221
- @property
220
+ @_builtins.property
222
221
  @pulumi.getter(name="disableLocalCaJwt")
223
- def disable_local_ca_jwt(self) -> Optional[pulumi.Input[builtins.bool]]:
222
+ def disable_local_ca_jwt(self) -> Optional[pulumi.Input[_builtins.bool]]:
224
223
  """
225
224
  Disable defaulting to the local CA certificate and
226
225
  service account JWT when Vault is running in a Kubernetes pod.
@@ -228,36 +227,36 @@ class SecretBackendArgs:
228
227
  return pulumi.get(self, "disable_local_ca_jwt")
229
228
 
230
229
  @disable_local_ca_jwt.setter
231
- def disable_local_ca_jwt(self, value: Optional[pulumi.Input[builtins.bool]]):
230
+ def disable_local_ca_jwt(self, value: Optional[pulumi.Input[_builtins.bool]]):
232
231
  pulumi.set(self, "disable_local_ca_jwt", value)
233
232
 
234
- @property
233
+ @_builtins.property
235
234
  @pulumi.getter(name="externalEntropyAccess")
236
- def external_entropy_access(self) -> Optional[pulumi.Input[builtins.bool]]:
235
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
237
236
  """
238
237
  Enable the secrets engine to access Vault's external entropy source
239
238
  """
240
239
  return pulumi.get(self, "external_entropy_access")
241
240
 
242
241
  @external_entropy_access.setter
243
- def external_entropy_access(self, value: Optional[pulumi.Input[builtins.bool]]):
242
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
244
243
  pulumi.set(self, "external_entropy_access", value)
245
244
 
246
- @property
245
+ @_builtins.property
247
246
  @pulumi.getter(name="identityTokenKey")
248
- def identity_token_key(self) -> Optional[pulumi.Input[builtins.str]]:
247
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
249
248
  """
250
249
  The key to use for signing plugin workload identity tokens
251
250
  """
252
251
  return pulumi.get(self, "identity_token_key")
253
252
 
254
253
  @identity_token_key.setter
255
- def identity_token_key(self, value: Optional[pulumi.Input[builtins.str]]):
254
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
256
255
  pulumi.set(self, "identity_token_key", value)
257
256
 
258
- @property
257
+ @_builtins.property
259
258
  @pulumi.getter(name="kubernetesCaCert")
260
- def kubernetes_ca_cert(self) -> Optional[pulumi.Input[builtins.str]]:
259
+ def kubernetes_ca_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
261
260
  """
262
261
  A PEM-encoded CA certificate used by the
263
262
  secrets engine to verify the Kubernetes API server certificate. Defaults to the local
@@ -267,12 +266,12 @@ class SecretBackendArgs:
267
266
  return pulumi.get(self, "kubernetes_ca_cert")
268
267
 
269
268
  @kubernetes_ca_cert.setter
270
- def kubernetes_ca_cert(self, value: Optional[pulumi.Input[builtins.str]]):
269
+ def kubernetes_ca_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
271
270
  pulumi.set(self, "kubernetes_ca_cert", value)
272
271
 
273
- @property
272
+ @_builtins.property
274
273
  @pulumi.getter(name="kubernetesHost")
275
- def kubernetes_host(self) -> Optional[pulumi.Input[builtins.str]]:
274
+ def kubernetes_host(self) -> Optional[pulumi.Input[_builtins.str]]:
276
275
  """
277
276
  The Kubernetes API URL to connect to. Required if the
278
277
  standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
@@ -281,48 +280,48 @@ class SecretBackendArgs:
281
280
  return pulumi.get(self, "kubernetes_host")
282
281
 
283
282
  @kubernetes_host.setter
284
- def kubernetes_host(self, value: Optional[pulumi.Input[builtins.str]]):
283
+ def kubernetes_host(self, value: Optional[pulumi.Input[_builtins.str]]):
285
284
  pulumi.set(self, "kubernetes_host", value)
286
285
 
287
- @property
286
+ @_builtins.property
288
287
  @pulumi.getter(name="listingVisibility")
289
- def listing_visibility(self) -> Optional[pulumi.Input[builtins.str]]:
288
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
290
289
  """
291
290
  Specifies whether to show this mount in the UI-specific listing endpoint
292
291
  """
293
292
  return pulumi.get(self, "listing_visibility")
294
293
 
295
294
  @listing_visibility.setter
296
- def listing_visibility(self, value: Optional[pulumi.Input[builtins.str]]):
295
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
297
296
  pulumi.set(self, "listing_visibility", value)
298
297
 
299
- @property
298
+ @_builtins.property
300
299
  @pulumi.getter
301
- def local(self) -> Optional[pulumi.Input[builtins.bool]]:
300
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
302
301
  """
303
302
  Local mount flag that can be explicitly set to true to enforce local mount in HA environment
304
303
  """
305
304
  return pulumi.get(self, "local")
306
305
 
307
306
  @local.setter
308
- def local(self, value: Optional[pulumi.Input[builtins.bool]]):
307
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
309
308
  pulumi.set(self, "local", value)
310
309
 
311
- @property
310
+ @_builtins.property
312
311
  @pulumi.getter(name="maxLeaseTtlSeconds")
313
- def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
312
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
314
313
  """
315
314
  Maximum possible lease duration for tokens and secrets in seconds
316
315
  """
317
316
  return pulumi.get(self, "max_lease_ttl_seconds")
318
317
 
319
318
  @max_lease_ttl_seconds.setter
320
- def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
319
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
321
320
  pulumi.set(self, "max_lease_ttl_seconds", value)
322
321
 
323
- @property
322
+ @_builtins.property
324
323
  @pulumi.getter
325
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
324
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
326
325
  """
327
326
  The namespace to provision the resource in.
328
327
  The value should not contain leading or trailing forward slashes.
@@ -332,60 +331,60 @@ class SecretBackendArgs:
332
331
  return pulumi.get(self, "namespace")
333
332
 
334
333
  @namespace.setter
335
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
334
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
336
335
  pulumi.set(self, "namespace", value)
337
336
 
338
- @property
337
+ @_builtins.property
339
338
  @pulumi.getter
340
- def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
339
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
341
340
  """
342
341
  Specifies mount type specific options that are passed to the backend
343
342
  """
344
343
  return pulumi.get(self, "options")
345
344
 
346
345
  @options.setter
347
- def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
346
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
348
347
  pulumi.set(self, "options", value)
349
348
 
350
- @property
349
+ @_builtins.property
351
350
  @pulumi.getter(name="passthroughRequestHeaders")
352
- def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
351
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
353
352
  """
354
353
  List of headers to allow and pass from the request to the plugin
355
354
  """
356
355
  return pulumi.get(self, "passthrough_request_headers")
357
356
 
358
357
  @passthrough_request_headers.setter
359
- def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
358
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
360
359
  pulumi.set(self, "passthrough_request_headers", value)
361
360
 
362
- @property
361
+ @_builtins.property
363
362
  @pulumi.getter(name="pluginVersion")
364
- def plugin_version(self) -> Optional[pulumi.Input[builtins.str]]:
363
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
365
364
  """
366
365
  Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
367
366
  """
368
367
  return pulumi.get(self, "plugin_version")
369
368
 
370
369
  @plugin_version.setter
371
- def plugin_version(self, value: Optional[pulumi.Input[builtins.str]]):
370
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
372
371
  pulumi.set(self, "plugin_version", value)
373
372
 
374
- @property
373
+ @_builtins.property
375
374
  @pulumi.getter(name="sealWrap")
376
- def seal_wrap(self) -> Optional[pulumi.Input[builtins.bool]]:
375
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
377
376
  """
378
377
  Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
379
378
  """
380
379
  return pulumi.get(self, "seal_wrap")
381
380
 
382
381
  @seal_wrap.setter
383
- def seal_wrap(self, value: Optional[pulumi.Input[builtins.bool]]):
382
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
384
383
  pulumi.set(self, "seal_wrap", value)
385
384
 
386
- @property
385
+ @_builtins.property
387
386
  @pulumi.getter(name="serviceAccountJwt")
388
- def service_account_jwt(self) -> Optional[pulumi.Input[builtins.str]]:
387
+ def service_account_jwt(self) -> Optional[pulumi.Input[_builtins.str]]:
389
388
  """
390
389
  The JSON web token of the service account used by the
391
390
  secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
@@ -394,70 +393,70 @@ class SecretBackendArgs:
394
393
  return pulumi.get(self, "service_account_jwt")
395
394
 
396
395
  @service_account_jwt.setter
397
- def service_account_jwt(self, value: Optional[pulumi.Input[builtins.str]]):
396
+ def service_account_jwt(self, value: Optional[pulumi.Input[_builtins.str]]):
398
397
  pulumi.set(self, "service_account_jwt", value)
399
398
 
400
399
 
401
400
  @pulumi.input_type
402
401
  class _SecretBackendState:
403
402
  def __init__(__self__, *,
404
- accessor: Optional[pulumi.Input[builtins.str]] = None,
405
- allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
406
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
407
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
408
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
409
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
410
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
411
- description: Optional[pulumi.Input[builtins.str]] = None,
412
- disable_local_ca_jwt: Optional[pulumi.Input[builtins.bool]] = None,
413
- external_entropy_access: Optional[pulumi.Input[builtins.bool]] = None,
414
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
415
- kubernetes_ca_cert: Optional[pulumi.Input[builtins.str]] = None,
416
- kubernetes_host: Optional[pulumi.Input[builtins.str]] = None,
417
- listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
418
- local: Optional[pulumi.Input[builtins.bool]] = None,
419
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
420
- namespace: Optional[pulumi.Input[builtins.str]] = None,
421
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
422
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
423
- path: Optional[pulumi.Input[builtins.str]] = None,
424
- plugin_version: Optional[pulumi.Input[builtins.str]] = None,
425
- seal_wrap: Optional[pulumi.Input[builtins.bool]] = None,
426
- service_account_jwt: Optional[pulumi.Input[builtins.str]] = None):
403
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
404
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
405
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
406
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
407
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
408
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
409
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
410
+ description: Optional[pulumi.Input[_builtins.str]] = None,
411
+ disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
412
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
413
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
414
+ kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
415
+ kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
416
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
417
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
418
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
419
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
420
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
421
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
422
+ path: Optional[pulumi.Input[_builtins.str]] = None,
423
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
424
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
425
+ service_account_jwt: Optional[pulumi.Input[_builtins.str]] = None):
427
426
  """
428
427
  Input properties used for looking up and filtering SecretBackend resources.
429
- :param pulumi.Input[builtins.str] accessor: Accessor of the mount
430
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
431
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
432
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
433
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
434
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
435
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
436
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount
437
- :param pulumi.Input[builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
428
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
429
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
430
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
431
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
432
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
433
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
434
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
435
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
436
+ :param pulumi.Input[_builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
438
437
  service account JWT when Vault is running in a Kubernetes pod.
439
- :param pulumi.Input[builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
440
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
441
- :param pulumi.Input[builtins.str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
438
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
439
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
440
+ :param pulumi.Input[_builtins.str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
442
441
  secrets engine to verify the Kubernetes API server certificate. Defaults to the local
443
442
  pod’s CA if Vault is running in Kubernetes. Otherwise, defaults to the root CA set where
444
443
  Vault is running.
445
- :param pulumi.Input[builtins.str] kubernetes_host: The Kubernetes API URL to connect to. Required if the
444
+ :param pulumi.Input[_builtins.str] kubernetes_host: The Kubernetes API URL to connect to. Required if the
446
445
  standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
447
446
  are not set on the host that Vault is running on.
448
- :param pulumi.Input[builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
449
- :param pulumi.Input[builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
450
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
451
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
447
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
448
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
449
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
450
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
452
451
  The value should not contain leading or trailing forward slashes.
453
452
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
454
453
  *Available only for Vault Enterprise*.
455
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] options: Specifies mount type specific options that are passed to the backend
456
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
457
- :param pulumi.Input[builtins.str] path: Where the secret backend will be mounted
458
- :param pulumi.Input[builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
459
- :param pulumi.Input[builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
460
- :param pulumi.Input[builtins.str] service_account_jwt: The JSON web token of the service account used by the
454
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
455
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
456
+ :param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
457
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
458
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
459
+ :param pulumi.Input[_builtins.str] service_account_jwt: The JSON web token of the service account used by the
461
460
  secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
462
461
  is running in Kubernetes.
463
462
  """
@@ -508,105 +507,105 @@ class _SecretBackendState:
508
507
  if service_account_jwt is not None:
509
508
  pulumi.set(__self__, "service_account_jwt", service_account_jwt)
510
509
 
511
- @property
510
+ @_builtins.property
512
511
  @pulumi.getter
513
- def accessor(self) -> Optional[pulumi.Input[builtins.str]]:
512
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
514
513
  """
515
514
  Accessor of the mount
516
515
  """
517
516
  return pulumi.get(self, "accessor")
518
517
 
519
518
  @accessor.setter
520
- def accessor(self, value: Optional[pulumi.Input[builtins.str]]):
519
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
521
520
  pulumi.set(self, "accessor", value)
522
521
 
523
- @property
522
+ @_builtins.property
524
523
  @pulumi.getter(name="allowedManagedKeys")
525
- def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
524
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
526
525
  """
527
526
  List of managed key registry entry names that the mount in question is allowed to access
528
527
  """
529
528
  return pulumi.get(self, "allowed_managed_keys")
530
529
 
531
530
  @allowed_managed_keys.setter
532
- def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
531
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
533
532
  pulumi.set(self, "allowed_managed_keys", value)
534
533
 
535
- @property
534
+ @_builtins.property
536
535
  @pulumi.getter(name="allowedResponseHeaders")
537
- def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
536
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
538
537
  """
539
538
  List of headers to allow and pass from the request to the plugin
540
539
  """
541
540
  return pulumi.get(self, "allowed_response_headers")
542
541
 
543
542
  @allowed_response_headers.setter
544
- def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
543
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
545
544
  pulumi.set(self, "allowed_response_headers", value)
546
545
 
547
- @property
546
+ @_builtins.property
548
547
  @pulumi.getter(name="auditNonHmacRequestKeys")
549
- def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
548
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
550
549
  """
551
550
  Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
552
551
  """
553
552
  return pulumi.get(self, "audit_non_hmac_request_keys")
554
553
 
555
554
  @audit_non_hmac_request_keys.setter
556
- def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
555
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
557
556
  pulumi.set(self, "audit_non_hmac_request_keys", value)
558
557
 
559
- @property
558
+ @_builtins.property
560
559
  @pulumi.getter(name="auditNonHmacResponseKeys")
561
- def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
560
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
562
561
  """
563
562
  Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
564
563
  """
565
564
  return pulumi.get(self, "audit_non_hmac_response_keys")
566
565
 
567
566
  @audit_non_hmac_response_keys.setter
568
- def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
567
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
569
568
  pulumi.set(self, "audit_non_hmac_response_keys", value)
570
569
 
571
- @property
570
+ @_builtins.property
572
571
  @pulumi.getter(name="defaultLeaseTtlSeconds")
573
- def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
572
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
574
573
  """
575
574
  Default lease duration for tokens and secrets in seconds
576
575
  """
577
576
  return pulumi.get(self, "default_lease_ttl_seconds")
578
577
 
579
578
  @default_lease_ttl_seconds.setter
580
- def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
579
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
581
580
  pulumi.set(self, "default_lease_ttl_seconds", value)
582
581
 
583
- @property
582
+ @_builtins.property
584
583
  @pulumi.getter(name="delegatedAuthAccessors")
585
- def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
584
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
586
585
  """
587
586
  List of headers to allow and pass from the request to the plugin
588
587
  """
589
588
  return pulumi.get(self, "delegated_auth_accessors")
590
589
 
591
590
  @delegated_auth_accessors.setter
592
- def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
591
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
593
592
  pulumi.set(self, "delegated_auth_accessors", value)
594
593
 
595
- @property
594
+ @_builtins.property
596
595
  @pulumi.getter
597
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
596
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
598
597
  """
599
598
  Human-friendly description of the mount
600
599
  """
601
600
  return pulumi.get(self, "description")
602
601
 
603
602
  @description.setter
604
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
603
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
605
604
  pulumi.set(self, "description", value)
606
605
 
607
- @property
606
+ @_builtins.property
608
607
  @pulumi.getter(name="disableLocalCaJwt")
609
- def disable_local_ca_jwt(self) -> Optional[pulumi.Input[builtins.bool]]:
608
+ def disable_local_ca_jwt(self) -> Optional[pulumi.Input[_builtins.bool]]:
610
609
  """
611
610
  Disable defaulting to the local CA certificate and
612
611
  service account JWT when Vault is running in a Kubernetes pod.
@@ -614,36 +613,36 @@ class _SecretBackendState:
614
613
  return pulumi.get(self, "disable_local_ca_jwt")
615
614
 
616
615
  @disable_local_ca_jwt.setter
617
- def disable_local_ca_jwt(self, value: Optional[pulumi.Input[builtins.bool]]):
616
+ def disable_local_ca_jwt(self, value: Optional[pulumi.Input[_builtins.bool]]):
618
617
  pulumi.set(self, "disable_local_ca_jwt", value)
619
618
 
620
- @property
619
+ @_builtins.property
621
620
  @pulumi.getter(name="externalEntropyAccess")
622
- def external_entropy_access(self) -> Optional[pulumi.Input[builtins.bool]]:
621
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
623
622
  """
624
623
  Enable the secrets engine to access Vault's external entropy source
625
624
  """
626
625
  return pulumi.get(self, "external_entropy_access")
627
626
 
628
627
  @external_entropy_access.setter
629
- def external_entropy_access(self, value: Optional[pulumi.Input[builtins.bool]]):
628
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
630
629
  pulumi.set(self, "external_entropy_access", value)
631
630
 
632
- @property
631
+ @_builtins.property
633
632
  @pulumi.getter(name="identityTokenKey")
634
- def identity_token_key(self) -> Optional[pulumi.Input[builtins.str]]:
633
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
635
634
  """
636
635
  The key to use for signing plugin workload identity tokens
637
636
  """
638
637
  return pulumi.get(self, "identity_token_key")
639
638
 
640
639
  @identity_token_key.setter
641
- def identity_token_key(self, value: Optional[pulumi.Input[builtins.str]]):
640
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
642
641
  pulumi.set(self, "identity_token_key", value)
643
642
 
644
- @property
643
+ @_builtins.property
645
644
  @pulumi.getter(name="kubernetesCaCert")
646
- def kubernetes_ca_cert(self) -> Optional[pulumi.Input[builtins.str]]:
645
+ def kubernetes_ca_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
647
646
  """
648
647
  A PEM-encoded CA certificate used by the
649
648
  secrets engine to verify the Kubernetes API server certificate. Defaults to the local
@@ -653,12 +652,12 @@ class _SecretBackendState:
653
652
  return pulumi.get(self, "kubernetes_ca_cert")
654
653
 
655
654
  @kubernetes_ca_cert.setter
656
- def kubernetes_ca_cert(self, value: Optional[pulumi.Input[builtins.str]]):
655
+ def kubernetes_ca_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
657
656
  pulumi.set(self, "kubernetes_ca_cert", value)
658
657
 
659
- @property
658
+ @_builtins.property
660
659
  @pulumi.getter(name="kubernetesHost")
661
- def kubernetes_host(self) -> Optional[pulumi.Input[builtins.str]]:
660
+ def kubernetes_host(self) -> Optional[pulumi.Input[_builtins.str]]:
662
661
  """
663
662
  The Kubernetes API URL to connect to. Required if the
664
663
  standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
@@ -667,48 +666,48 @@ class _SecretBackendState:
667
666
  return pulumi.get(self, "kubernetes_host")
668
667
 
669
668
  @kubernetes_host.setter
670
- def kubernetes_host(self, value: Optional[pulumi.Input[builtins.str]]):
669
+ def kubernetes_host(self, value: Optional[pulumi.Input[_builtins.str]]):
671
670
  pulumi.set(self, "kubernetes_host", value)
672
671
 
673
- @property
672
+ @_builtins.property
674
673
  @pulumi.getter(name="listingVisibility")
675
- def listing_visibility(self) -> Optional[pulumi.Input[builtins.str]]:
674
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
676
675
  """
677
676
  Specifies whether to show this mount in the UI-specific listing endpoint
678
677
  """
679
678
  return pulumi.get(self, "listing_visibility")
680
679
 
681
680
  @listing_visibility.setter
682
- def listing_visibility(self, value: Optional[pulumi.Input[builtins.str]]):
681
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
683
682
  pulumi.set(self, "listing_visibility", value)
684
683
 
685
- @property
684
+ @_builtins.property
686
685
  @pulumi.getter
687
- def local(self) -> Optional[pulumi.Input[builtins.bool]]:
686
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
688
687
  """
689
688
  Local mount flag that can be explicitly set to true to enforce local mount in HA environment
690
689
  """
691
690
  return pulumi.get(self, "local")
692
691
 
693
692
  @local.setter
694
- def local(self, value: Optional[pulumi.Input[builtins.bool]]):
693
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
695
694
  pulumi.set(self, "local", value)
696
695
 
697
- @property
696
+ @_builtins.property
698
697
  @pulumi.getter(name="maxLeaseTtlSeconds")
699
- def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
698
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
700
699
  """
701
700
  Maximum possible lease duration for tokens and secrets in seconds
702
701
  """
703
702
  return pulumi.get(self, "max_lease_ttl_seconds")
704
703
 
705
704
  @max_lease_ttl_seconds.setter
706
- def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
705
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
707
706
  pulumi.set(self, "max_lease_ttl_seconds", value)
708
707
 
709
- @property
708
+ @_builtins.property
710
709
  @pulumi.getter
711
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
710
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
712
711
  """
713
712
  The namespace to provision the resource in.
714
713
  The value should not contain leading or trailing forward slashes.
@@ -718,72 +717,72 @@ class _SecretBackendState:
718
717
  return pulumi.get(self, "namespace")
719
718
 
720
719
  @namespace.setter
721
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
720
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
722
721
  pulumi.set(self, "namespace", value)
723
722
 
724
- @property
723
+ @_builtins.property
725
724
  @pulumi.getter
726
- def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
725
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
727
726
  """
728
727
  Specifies mount type specific options that are passed to the backend
729
728
  """
730
729
  return pulumi.get(self, "options")
731
730
 
732
731
  @options.setter
733
- def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
732
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
734
733
  pulumi.set(self, "options", value)
735
734
 
736
- @property
735
+ @_builtins.property
737
736
  @pulumi.getter(name="passthroughRequestHeaders")
738
- def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
737
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
739
738
  """
740
739
  List of headers to allow and pass from the request to the plugin
741
740
  """
742
741
  return pulumi.get(self, "passthrough_request_headers")
743
742
 
744
743
  @passthrough_request_headers.setter
745
- def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
744
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
746
745
  pulumi.set(self, "passthrough_request_headers", value)
747
746
 
748
- @property
747
+ @_builtins.property
749
748
  @pulumi.getter
750
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
749
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
751
750
  """
752
751
  Where the secret backend will be mounted
753
752
  """
754
753
  return pulumi.get(self, "path")
755
754
 
756
755
  @path.setter
757
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
756
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
758
757
  pulumi.set(self, "path", value)
759
758
 
760
- @property
759
+ @_builtins.property
761
760
  @pulumi.getter(name="pluginVersion")
762
- def plugin_version(self) -> Optional[pulumi.Input[builtins.str]]:
761
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
763
762
  """
764
763
  Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
765
764
  """
766
765
  return pulumi.get(self, "plugin_version")
767
766
 
768
767
  @plugin_version.setter
769
- def plugin_version(self, value: Optional[pulumi.Input[builtins.str]]):
768
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
770
769
  pulumi.set(self, "plugin_version", value)
771
770
 
772
- @property
771
+ @_builtins.property
773
772
  @pulumi.getter(name="sealWrap")
774
- def seal_wrap(self) -> Optional[pulumi.Input[builtins.bool]]:
773
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
775
774
  """
776
775
  Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
777
776
  """
778
777
  return pulumi.get(self, "seal_wrap")
779
778
 
780
779
  @seal_wrap.setter
781
- def seal_wrap(self, value: Optional[pulumi.Input[builtins.bool]]):
780
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
782
781
  pulumi.set(self, "seal_wrap", value)
783
782
 
784
- @property
783
+ @_builtins.property
785
784
  @pulumi.getter(name="serviceAccountJwt")
786
- def service_account_jwt(self) -> Optional[pulumi.Input[builtins.str]]:
785
+ def service_account_jwt(self) -> Optional[pulumi.Input[_builtins.str]]:
787
786
  """
788
787
  The JSON web token of the service account used by the
789
788
  secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
@@ -792,7 +791,7 @@ class _SecretBackendState:
792
791
  return pulumi.get(self, "service_account_jwt")
793
792
 
794
793
  @service_account_jwt.setter
795
- def service_account_jwt(self, value: Optional[pulumi.Input[builtins.str]]):
794
+ def service_account_jwt(self, value: Optional[pulumi.Input[_builtins.str]]):
796
795
  pulumi.set(self, "service_account_jwt", value)
797
796
 
798
797
 
@@ -802,28 +801,28 @@ class SecretBackend(pulumi.CustomResource):
802
801
  def __init__(__self__,
803
802
  resource_name: str,
804
803
  opts: Optional[pulumi.ResourceOptions] = None,
805
- allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
806
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
807
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
808
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
809
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
810
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
811
- description: Optional[pulumi.Input[builtins.str]] = None,
812
- disable_local_ca_jwt: Optional[pulumi.Input[builtins.bool]] = None,
813
- external_entropy_access: Optional[pulumi.Input[builtins.bool]] = None,
814
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
815
- kubernetes_ca_cert: Optional[pulumi.Input[builtins.str]] = None,
816
- kubernetes_host: Optional[pulumi.Input[builtins.str]] = None,
817
- listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
818
- local: Optional[pulumi.Input[builtins.bool]] = None,
819
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
820
- namespace: Optional[pulumi.Input[builtins.str]] = None,
821
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
822
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
823
- path: Optional[pulumi.Input[builtins.str]] = None,
824
- plugin_version: Optional[pulumi.Input[builtins.str]] = None,
825
- seal_wrap: Optional[pulumi.Input[builtins.bool]] = None,
826
- service_account_jwt: Optional[pulumi.Input[builtins.str]] = None,
804
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
805
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
806
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
807
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
808
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
809
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
810
+ description: Optional[pulumi.Input[_builtins.str]] = None,
811
+ disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
812
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
813
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
814
+ kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
815
+ kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
816
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
817
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
818
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
819
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
820
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
821
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
822
+ path: Optional[pulumi.Input[_builtins.str]] = None,
823
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
824
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
825
+ service_account_jwt: Optional[pulumi.Input[_builtins.str]] = None,
827
826
  __props__=None):
828
827
  """
829
828
  ## Example Usage
@@ -854,37 +853,37 @@ class SecretBackend(pulumi.CustomResource):
854
853
 
855
854
  :param str resource_name: The name of the resource.
856
855
  :param pulumi.ResourceOptions opts: Options for the resource.
857
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
858
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
859
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
860
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
861
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
862
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
863
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount
864
- :param pulumi.Input[builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
856
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
857
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
858
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
859
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
860
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
861
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
862
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
863
+ :param pulumi.Input[_builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
865
864
  service account JWT when Vault is running in a Kubernetes pod.
866
- :param pulumi.Input[builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
867
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
868
- :param pulumi.Input[builtins.str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
865
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
866
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
867
+ :param pulumi.Input[_builtins.str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
869
868
  secrets engine to verify the Kubernetes API server certificate. Defaults to the local
870
869
  pod’s CA if Vault is running in Kubernetes. Otherwise, defaults to the root CA set where
871
870
  Vault is running.
872
- :param pulumi.Input[builtins.str] kubernetes_host: The Kubernetes API URL to connect to. Required if the
871
+ :param pulumi.Input[_builtins.str] kubernetes_host: The Kubernetes API URL to connect to. Required if the
873
872
  standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
874
873
  are not set on the host that Vault is running on.
875
- :param pulumi.Input[builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
876
- :param pulumi.Input[builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
877
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
878
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
874
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
875
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
876
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
877
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
879
878
  The value should not contain leading or trailing forward slashes.
880
879
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
881
880
  *Available only for Vault Enterprise*.
882
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] options: Specifies mount type specific options that are passed to the backend
883
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
884
- :param pulumi.Input[builtins.str] path: Where the secret backend will be mounted
885
- :param pulumi.Input[builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
886
- :param pulumi.Input[builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
887
- :param pulumi.Input[builtins.str] service_account_jwt: The JSON web token of the service account used by the
881
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
882
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
883
+ :param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
884
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
885
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
886
+ :param pulumi.Input[_builtins.str] service_account_jwt: The JSON web token of the service account used by the
888
887
  secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
889
888
  is running in Kubernetes.
890
889
  """
@@ -936,28 +935,28 @@ class SecretBackend(pulumi.CustomResource):
936
935
  def _internal_init(__self__,
937
936
  resource_name: str,
938
937
  opts: Optional[pulumi.ResourceOptions] = None,
939
- allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
940
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
941
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
942
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
943
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
944
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
945
- description: Optional[pulumi.Input[builtins.str]] = None,
946
- disable_local_ca_jwt: Optional[pulumi.Input[builtins.bool]] = None,
947
- external_entropy_access: Optional[pulumi.Input[builtins.bool]] = None,
948
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
949
- kubernetes_ca_cert: Optional[pulumi.Input[builtins.str]] = None,
950
- kubernetes_host: Optional[pulumi.Input[builtins.str]] = None,
951
- listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
952
- local: Optional[pulumi.Input[builtins.bool]] = None,
953
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
954
- namespace: Optional[pulumi.Input[builtins.str]] = None,
955
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
956
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
957
- path: Optional[pulumi.Input[builtins.str]] = None,
958
- plugin_version: Optional[pulumi.Input[builtins.str]] = None,
959
- seal_wrap: Optional[pulumi.Input[builtins.bool]] = None,
960
- service_account_jwt: Optional[pulumi.Input[builtins.str]] = None,
938
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
939
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
940
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
941
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
942
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
943
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
944
+ description: Optional[pulumi.Input[_builtins.str]] = None,
945
+ disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
946
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
947
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
948
+ kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
949
+ kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
950
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
951
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
952
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
953
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
954
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
955
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
956
+ path: Optional[pulumi.Input[_builtins.str]] = None,
957
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
958
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
959
+ service_account_jwt: Optional[pulumi.Input[_builtins.str]] = None,
961
960
  __props__=None):
962
961
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
963
962
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -1004,29 +1003,29 @@ class SecretBackend(pulumi.CustomResource):
1004
1003
  def get(resource_name: str,
1005
1004
  id: pulumi.Input[str],
1006
1005
  opts: Optional[pulumi.ResourceOptions] = None,
1007
- accessor: Optional[pulumi.Input[builtins.str]] = None,
1008
- allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1009
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1010
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1011
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1012
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
1013
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1014
- description: Optional[pulumi.Input[builtins.str]] = None,
1015
- disable_local_ca_jwt: Optional[pulumi.Input[builtins.bool]] = None,
1016
- external_entropy_access: Optional[pulumi.Input[builtins.bool]] = None,
1017
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
1018
- kubernetes_ca_cert: Optional[pulumi.Input[builtins.str]] = None,
1019
- kubernetes_host: Optional[pulumi.Input[builtins.str]] = None,
1020
- listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
1021
- local: Optional[pulumi.Input[builtins.bool]] = None,
1022
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
1023
- namespace: Optional[pulumi.Input[builtins.str]] = None,
1024
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
1025
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1026
- path: Optional[pulumi.Input[builtins.str]] = None,
1027
- plugin_version: Optional[pulumi.Input[builtins.str]] = None,
1028
- seal_wrap: Optional[pulumi.Input[builtins.bool]] = None,
1029
- service_account_jwt: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretBackend':
1006
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
1007
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1008
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1009
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1010
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1011
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1012
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1013
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1014
+ disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
1015
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1016
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1017
+ kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
1018
+ kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
1019
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1020
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1021
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1022
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1023
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1024
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1025
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1026
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1027
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1028
+ service_account_jwt: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackend':
1030
1029
  """
1031
1030
  Get an existing SecretBackend resource's state with the given name, id, and optional extra
1032
1031
  properties used to qualify the lookup.
@@ -1034,38 +1033,38 @@ class SecretBackend(pulumi.CustomResource):
1034
1033
  :param str resource_name: The unique name of the resulting resource.
1035
1034
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
1036
1035
  :param pulumi.ResourceOptions opts: Options for the resource.
1037
- :param pulumi.Input[builtins.str] accessor: Accessor of the mount
1038
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1039
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1040
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1041
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1042
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
1043
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1044
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount
1045
- :param pulumi.Input[builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
1036
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
1037
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1038
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1039
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1040
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1041
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
1042
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1043
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
1044
+ :param pulumi.Input[_builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
1046
1045
  service account JWT when Vault is running in a Kubernetes pod.
1047
- :param pulumi.Input[builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1048
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1049
- :param pulumi.Input[builtins.str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
1046
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1047
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1048
+ :param pulumi.Input[_builtins.str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
1050
1049
  secrets engine to verify the Kubernetes API server certificate. Defaults to the local
1051
1050
  pod’s CA if Vault is running in Kubernetes. Otherwise, defaults to the root CA set where
1052
1051
  Vault is running.
1053
- :param pulumi.Input[builtins.str] kubernetes_host: The Kubernetes API URL to connect to. Required if the
1052
+ :param pulumi.Input[_builtins.str] kubernetes_host: The Kubernetes API URL to connect to. Required if the
1054
1053
  standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
1055
1054
  are not set on the host that Vault is running on.
1056
- :param pulumi.Input[builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1057
- :param pulumi.Input[builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1058
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
1059
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
1055
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1056
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1057
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
1058
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
1060
1059
  The value should not contain leading or trailing forward slashes.
1061
1060
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1062
1061
  *Available only for Vault Enterprise*.
1063
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1064
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1065
- :param pulumi.Input[builtins.str] path: Where the secret backend will be mounted
1066
- :param pulumi.Input[builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1067
- :param pulumi.Input[builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1068
- :param pulumi.Input[builtins.str] service_account_jwt: The JSON web token of the service account used by the
1062
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1063
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1064
+ :param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
1065
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1066
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1067
+ :param pulumi.Input[_builtins.str] service_account_jwt: The JSON web token of the service account used by the
1069
1068
  secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
1070
1069
  is running in Kubernetes.
1071
1070
  """
@@ -1098,98 +1097,98 @@ class SecretBackend(pulumi.CustomResource):
1098
1097
  __props__.__dict__["service_account_jwt"] = service_account_jwt
1099
1098
  return SecretBackend(resource_name, opts=opts, __props__=__props__)
1100
1099
 
1101
- @property
1100
+ @_builtins.property
1102
1101
  @pulumi.getter
1103
- def accessor(self) -> pulumi.Output[builtins.str]:
1102
+ def accessor(self) -> pulumi.Output[_builtins.str]:
1104
1103
  """
1105
1104
  Accessor of the mount
1106
1105
  """
1107
1106
  return pulumi.get(self, "accessor")
1108
1107
 
1109
- @property
1108
+ @_builtins.property
1110
1109
  @pulumi.getter(name="allowedManagedKeys")
1111
- def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1110
+ def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1112
1111
  """
1113
1112
  List of managed key registry entry names that the mount in question is allowed to access
1114
1113
  """
1115
1114
  return pulumi.get(self, "allowed_managed_keys")
1116
1115
 
1117
- @property
1116
+ @_builtins.property
1118
1117
  @pulumi.getter(name="allowedResponseHeaders")
1119
- def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1118
+ def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1120
1119
  """
1121
1120
  List of headers to allow and pass from the request to the plugin
1122
1121
  """
1123
1122
  return pulumi.get(self, "allowed_response_headers")
1124
1123
 
1125
- @property
1124
+ @_builtins.property
1126
1125
  @pulumi.getter(name="auditNonHmacRequestKeys")
1127
- def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[builtins.str]]:
1126
+ def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1128
1127
  """
1129
1128
  Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1130
1129
  """
1131
1130
  return pulumi.get(self, "audit_non_hmac_request_keys")
1132
1131
 
1133
- @property
1132
+ @_builtins.property
1134
1133
  @pulumi.getter(name="auditNonHmacResponseKeys")
1135
- def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[builtins.str]]:
1134
+ def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1136
1135
  """
1137
1136
  Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1138
1137
  """
1139
1138
  return pulumi.get(self, "audit_non_hmac_response_keys")
1140
1139
 
1141
- @property
1140
+ @_builtins.property
1142
1141
  @pulumi.getter(name="defaultLeaseTtlSeconds")
1143
- def default_lease_ttl_seconds(self) -> pulumi.Output[builtins.int]:
1142
+ def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1144
1143
  """
1145
1144
  Default lease duration for tokens and secrets in seconds
1146
1145
  """
1147
1146
  return pulumi.get(self, "default_lease_ttl_seconds")
1148
1147
 
1149
- @property
1148
+ @_builtins.property
1150
1149
  @pulumi.getter(name="delegatedAuthAccessors")
1151
- def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1150
+ def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1152
1151
  """
1153
1152
  List of headers to allow and pass from the request to the plugin
1154
1153
  """
1155
1154
  return pulumi.get(self, "delegated_auth_accessors")
1156
1155
 
1157
- @property
1156
+ @_builtins.property
1158
1157
  @pulumi.getter
1159
- def description(self) -> pulumi.Output[Optional[builtins.str]]:
1158
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
1160
1159
  """
1161
1160
  Human-friendly description of the mount
1162
1161
  """
1163
1162
  return pulumi.get(self, "description")
1164
1163
 
1165
- @property
1164
+ @_builtins.property
1166
1165
  @pulumi.getter(name="disableLocalCaJwt")
1167
- def disable_local_ca_jwt(self) -> pulumi.Output[Optional[builtins.bool]]:
1166
+ def disable_local_ca_jwt(self) -> pulumi.Output[Optional[_builtins.bool]]:
1168
1167
  """
1169
1168
  Disable defaulting to the local CA certificate and
1170
1169
  service account JWT when Vault is running in a Kubernetes pod.
1171
1170
  """
1172
1171
  return pulumi.get(self, "disable_local_ca_jwt")
1173
1172
 
1174
- @property
1173
+ @_builtins.property
1175
1174
  @pulumi.getter(name="externalEntropyAccess")
1176
- def external_entropy_access(self) -> pulumi.Output[Optional[builtins.bool]]:
1175
+ def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
1177
1176
  """
1178
1177
  Enable the secrets engine to access Vault's external entropy source
1179
1178
  """
1180
1179
  return pulumi.get(self, "external_entropy_access")
1181
1180
 
1182
- @property
1181
+ @_builtins.property
1183
1182
  @pulumi.getter(name="identityTokenKey")
1184
- def identity_token_key(self) -> pulumi.Output[Optional[builtins.str]]:
1183
+ def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
1185
1184
  """
1186
1185
  The key to use for signing plugin workload identity tokens
1187
1186
  """
1188
1187
  return pulumi.get(self, "identity_token_key")
1189
1188
 
1190
- @property
1189
+ @_builtins.property
1191
1190
  @pulumi.getter(name="kubernetesCaCert")
1192
- def kubernetes_ca_cert(self) -> pulumi.Output[Optional[builtins.str]]:
1191
+ def kubernetes_ca_cert(self) -> pulumi.Output[Optional[_builtins.str]]:
1193
1192
  """
1194
1193
  A PEM-encoded CA certificate used by the
1195
1194
  secrets engine to verify the Kubernetes API server certificate. Defaults to the local
@@ -1198,9 +1197,9 @@ class SecretBackend(pulumi.CustomResource):
1198
1197
  """
1199
1198
  return pulumi.get(self, "kubernetes_ca_cert")
1200
1199
 
1201
- @property
1200
+ @_builtins.property
1202
1201
  @pulumi.getter(name="kubernetesHost")
1203
- def kubernetes_host(self) -> pulumi.Output[Optional[builtins.str]]:
1202
+ def kubernetes_host(self) -> pulumi.Output[Optional[_builtins.str]]:
1204
1203
  """
1205
1204
  The Kubernetes API URL to connect to. Required if the
1206
1205
  standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
@@ -1208,33 +1207,33 @@ class SecretBackend(pulumi.CustomResource):
1208
1207
  """
1209
1208
  return pulumi.get(self, "kubernetes_host")
1210
1209
 
1211
- @property
1210
+ @_builtins.property
1212
1211
  @pulumi.getter(name="listingVisibility")
1213
- def listing_visibility(self) -> pulumi.Output[Optional[builtins.str]]:
1212
+ def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
1214
1213
  """
1215
1214
  Specifies whether to show this mount in the UI-specific listing endpoint
1216
1215
  """
1217
1216
  return pulumi.get(self, "listing_visibility")
1218
1217
 
1219
- @property
1218
+ @_builtins.property
1220
1219
  @pulumi.getter
1221
- def local(self) -> pulumi.Output[Optional[builtins.bool]]:
1220
+ def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
1222
1221
  """
1223
1222
  Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1224
1223
  """
1225
1224
  return pulumi.get(self, "local")
1226
1225
 
1227
- @property
1226
+ @_builtins.property
1228
1227
  @pulumi.getter(name="maxLeaseTtlSeconds")
1229
- def max_lease_ttl_seconds(self) -> pulumi.Output[builtins.int]:
1228
+ def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1230
1229
  """
1231
1230
  Maximum possible lease duration for tokens and secrets in seconds
1232
1231
  """
1233
1232
  return pulumi.get(self, "max_lease_ttl_seconds")
1234
1233
 
1235
- @property
1234
+ @_builtins.property
1236
1235
  @pulumi.getter
1237
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
1236
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
1238
1237
  """
1239
1238
  The namespace to provision the resource in.
1240
1239
  The value should not contain leading or trailing forward slashes.
@@ -1243,49 +1242,49 @@ class SecretBackend(pulumi.CustomResource):
1243
1242
  """
1244
1243
  return pulumi.get(self, "namespace")
1245
1244
 
1246
- @property
1245
+ @_builtins.property
1247
1246
  @pulumi.getter
1248
- def options(self) -> pulumi.Output[Optional[Mapping[str, builtins.str]]]:
1247
+ def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
1249
1248
  """
1250
1249
  Specifies mount type specific options that are passed to the backend
1251
1250
  """
1252
1251
  return pulumi.get(self, "options")
1253
1252
 
1254
- @property
1253
+ @_builtins.property
1255
1254
  @pulumi.getter(name="passthroughRequestHeaders")
1256
- def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1255
+ def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1257
1256
  """
1258
1257
  List of headers to allow and pass from the request to the plugin
1259
1258
  """
1260
1259
  return pulumi.get(self, "passthrough_request_headers")
1261
1260
 
1262
- @property
1261
+ @_builtins.property
1263
1262
  @pulumi.getter
1264
- def path(self) -> pulumi.Output[builtins.str]:
1263
+ def path(self) -> pulumi.Output[_builtins.str]:
1265
1264
  """
1266
1265
  Where the secret backend will be mounted
1267
1266
  """
1268
1267
  return pulumi.get(self, "path")
1269
1268
 
1270
- @property
1269
+ @_builtins.property
1271
1270
  @pulumi.getter(name="pluginVersion")
1272
- def plugin_version(self) -> pulumi.Output[Optional[builtins.str]]:
1271
+ def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
1273
1272
  """
1274
1273
  Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1275
1274
  """
1276
1275
  return pulumi.get(self, "plugin_version")
1277
1276
 
1278
- @property
1277
+ @_builtins.property
1279
1278
  @pulumi.getter(name="sealWrap")
1280
- def seal_wrap(self) -> pulumi.Output[builtins.bool]:
1279
+ def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
1281
1280
  """
1282
1281
  Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1283
1282
  """
1284
1283
  return pulumi.get(self, "seal_wrap")
1285
1284
 
1286
- @property
1285
+ @_builtins.property
1287
1286
  @pulumi.getter(name="serviceAccountJwt")
1288
- def service_account_jwt(self) -> pulumi.Output[Optional[builtins.str]]:
1287
+ def service_account_jwt(self) -> pulumi.Output[Optional[_builtins.str]]:
1289
1288
  """
1290
1289
  The JSON web token of the service account used by the
1291
1290
  secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault