pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -22,24 +21,24 @@ __all__ = ['SecretsMountArgs', 'SecretsMount']
|
|
22
21
|
@pulumi.input_type
|
23
22
|
class SecretsMountArgs:
|
24
23
|
def __init__(__self__, *,
|
25
|
-
path: pulumi.Input[
|
26
|
-
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
27
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
28
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
29
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
24
|
+
path: pulumi.Input[_builtins.str],
|
25
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
26
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
27
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
28
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
30
29
|
cassandras: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]]] = None,
|
31
30
|
couchbases: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]]] = None,
|
32
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
33
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[
|
34
|
-
description: Optional[pulumi.Input[
|
31
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
32
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
33
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
35
34
|
elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]]] = None,
|
36
|
-
external_entropy_access: Optional[pulumi.Input[
|
35
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
37
36
|
hanas: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]]] = None,
|
38
|
-
identity_token_key: Optional[pulumi.Input[
|
37
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
39
38
|
influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]] = None,
|
40
|
-
listing_visibility: Optional[pulumi.Input[
|
41
|
-
local: Optional[pulumi.Input[
|
42
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
39
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
40
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
41
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
43
42
|
mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]]] = None,
|
44
43
|
mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]]] = None,
|
45
44
|
mssqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMssqlArgs']]]] = None,
|
@@ -47,44 +46,44 @@ class SecretsMountArgs:
|
|
47
46
|
mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlLegacyArgs']]]] = None,
|
48
47
|
mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]] = None,
|
49
48
|
mysqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]] = None,
|
50
|
-
namespace: Optional[pulumi.Input[
|
51
|
-
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
49
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
50
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
52
51
|
oracles: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]] = None,
|
53
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
54
|
-
plugin_version: Optional[pulumi.Input[
|
52
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
53
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
55
54
|
postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]]] = None,
|
56
55
|
redis: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]]] = None,
|
57
56
|
redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedisElasticachArgs']]]] = None,
|
58
57
|
redshifts: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]]] = None,
|
59
|
-
seal_wrap: Optional[pulumi.Input[
|
58
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
60
59
|
snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountSnowflakeArgs']]]] = None):
|
61
60
|
"""
|
62
61
|
The set of arguments for constructing a SecretsMount resource.
|
63
|
-
:param pulumi.Input[
|
64
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
62
|
+
:param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
|
63
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
|
65
64
|
|
66
65
|
The following arguments are common to all database engines:
|
67
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
68
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
69
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
66
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
67
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
68
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
70
69
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]] cassandras: A nested block containing configuration options for Cassandra connections.
|
71
70
|
*See Configuration Options for more info*
|
72
71
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]] couchbases: A nested block containing configuration options for Couchbase connections.
|
73
72
|
*See Configuration Options for more info*
|
74
|
-
:param pulumi.Input[
|
75
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
76
|
-
:param pulumi.Input[
|
73
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
74
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
75
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
77
76
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]] elasticsearches: A nested block containing configuration options for Elasticsearch connections.
|
78
77
|
*See Configuration Options for more info*
|
79
|
-
:param pulumi.Input[
|
78
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
80
79
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]] hanas: A nested block containing configuration options for SAP HanaDB connections.
|
81
80
|
*See Configuration Options for more info*
|
82
|
-
:param pulumi.Input[
|
81
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
83
82
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]] influxdbs: A nested block containing configuration options for InfluxDB connections.
|
84
83
|
*See Configuration Options for more info*
|
85
|
-
:param pulumi.Input[
|
86
|
-
:param pulumi.Input[
|
87
|
-
:param pulumi.Input[
|
84
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
85
|
+
:param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
86
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
88
87
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
|
89
88
|
*See Configuration Options for more info*
|
90
89
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]] mongodbs: A nested block containing configuration options for MongoDB connections.
|
@@ -99,12 +98,12 @@ class SecretsMountArgs:
|
|
99
98
|
*See Configuration Options for more info*
|
100
99
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]] mysqls: A nested block containing configuration options for MySQL connections.
|
101
100
|
*See Configuration Options for more info*
|
102
|
-
:param pulumi.Input[
|
103
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
101
|
+
:param pulumi.Input[_builtins.str] namespace: Target namespace. (requires Enterprise)
|
102
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
104
103
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]] oracles: A nested block containing configuration options for Oracle connections.
|
105
104
|
*See Configuration Options for more info*
|
106
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
107
|
-
:param pulumi.Input[
|
105
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
106
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
108
107
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]] postgresqls: A nested block containing configuration options for PostgreSQL connections.
|
109
108
|
*See Configuration Options for more info*
|
110
109
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]] redis: A nested block containing configuration options for Redis connections.
|
@@ -113,7 +112,7 @@ class SecretsMountArgs:
|
|
113
112
|
*See Configuration Options for more info*
|
114
113
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]] redshifts: A nested block containing configuration options for AWS Redshift connections.
|
115
114
|
*See Configuration Options for more info*
|
116
|
-
:param pulumi.Input[
|
115
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
117
116
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountSnowflakeArgs']]] snowflakes: A nested block containing configuration options for Snowflake connections.
|
118
117
|
*See Configuration Options for more info*
|
119
118
|
"""
|
@@ -189,21 +188,21 @@ class SecretsMountArgs:
|
|
189
188
|
if snowflakes is not None:
|
190
189
|
pulumi.set(__self__, "snowflakes", snowflakes)
|
191
190
|
|
192
|
-
@property
|
191
|
+
@_builtins.property
|
193
192
|
@pulumi.getter
|
194
|
-
def path(self) -> pulumi.Input[
|
193
|
+
def path(self) -> pulumi.Input[_builtins.str]:
|
195
194
|
"""
|
196
195
|
Where the secret backend will be mounted
|
197
196
|
"""
|
198
197
|
return pulumi.get(self, "path")
|
199
198
|
|
200
199
|
@path.setter
|
201
|
-
def path(self, value: pulumi.Input[
|
200
|
+
def path(self, value: pulumi.Input[_builtins.str]):
|
202
201
|
pulumi.set(self, "path", value)
|
203
202
|
|
204
|
-
@property
|
203
|
+
@_builtins.property
|
205
204
|
@pulumi.getter(name="allowedManagedKeys")
|
206
|
-
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
205
|
+
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
207
206
|
"""
|
208
207
|
Set of managed key registry entry names that the mount in question is allowed to access
|
209
208
|
|
@@ -212,46 +211,46 @@ class SecretsMountArgs:
|
|
212
211
|
return pulumi.get(self, "allowed_managed_keys")
|
213
212
|
|
214
213
|
@allowed_managed_keys.setter
|
215
|
-
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
214
|
+
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
216
215
|
pulumi.set(self, "allowed_managed_keys", value)
|
217
216
|
|
218
|
-
@property
|
217
|
+
@_builtins.property
|
219
218
|
@pulumi.getter(name="allowedResponseHeaders")
|
220
|
-
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
219
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
221
220
|
"""
|
222
221
|
List of headers to allow and pass from the request to the plugin
|
223
222
|
"""
|
224
223
|
return pulumi.get(self, "allowed_response_headers")
|
225
224
|
|
226
225
|
@allowed_response_headers.setter
|
227
|
-
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
226
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
228
227
|
pulumi.set(self, "allowed_response_headers", value)
|
229
228
|
|
230
|
-
@property
|
229
|
+
@_builtins.property
|
231
230
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
232
|
-
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
231
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
233
232
|
"""
|
234
233
|
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
235
234
|
"""
|
236
235
|
return pulumi.get(self, "audit_non_hmac_request_keys")
|
237
236
|
|
238
237
|
@audit_non_hmac_request_keys.setter
|
239
|
-
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
238
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
240
239
|
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
241
240
|
|
242
|
-
@property
|
241
|
+
@_builtins.property
|
243
242
|
@pulumi.getter(name="auditNonHmacResponseKeys")
|
244
|
-
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
243
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
245
244
|
"""
|
246
245
|
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
247
246
|
"""
|
248
247
|
return pulumi.get(self, "audit_non_hmac_response_keys")
|
249
248
|
|
250
249
|
@audit_non_hmac_response_keys.setter
|
251
|
-
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
250
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
252
251
|
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
253
252
|
|
254
|
-
@property
|
253
|
+
@_builtins.property
|
255
254
|
@pulumi.getter
|
256
255
|
def cassandras(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]]]:
|
257
256
|
"""
|
@@ -264,7 +263,7 @@ class SecretsMountArgs:
|
|
264
263
|
def cassandras(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]]]):
|
265
264
|
pulumi.set(self, "cassandras", value)
|
266
265
|
|
267
|
-
@property
|
266
|
+
@_builtins.property
|
268
267
|
@pulumi.getter
|
269
268
|
def couchbases(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]]]:
|
270
269
|
"""
|
@@ -277,43 +276,43 @@ class SecretsMountArgs:
|
|
277
276
|
def couchbases(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]]]):
|
278
277
|
pulumi.set(self, "couchbases", value)
|
279
278
|
|
280
|
-
@property
|
279
|
+
@_builtins.property
|
281
280
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
282
|
-
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
281
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
283
282
|
"""
|
284
283
|
Default lease duration for tokens and secrets in seconds
|
285
284
|
"""
|
286
285
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
287
286
|
|
288
287
|
@default_lease_ttl_seconds.setter
|
289
|
-
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
288
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
290
289
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
291
290
|
|
292
|
-
@property
|
291
|
+
@_builtins.property
|
293
292
|
@pulumi.getter(name="delegatedAuthAccessors")
|
294
|
-
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
293
|
+
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
295
294
|
"""
|
296
295
|
List of headers to allow and pass from the request to the plugin
|
297
296
|
"""
|
298
297
|
return pulumi.get(self, "delegated_auth_accessors")
|
299
298
|
|
300
299
|
@delegated_auth_accessors.setter
|
301
|
-
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
300
|
+
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
302
301
|
pulumi.set(self, "delegated_auth_accessors", value)
|
303
302
|
|
304
|
-
@property
|
303
|
+
@_builtins.property
|
305
304
|
@pulumi.getter
|
306
|
-
def description(self) -> Optional[pulumi.Input[
|
305
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
307
306
|
"""
|
308
307
|
Human-friendly description of the mount
|
309
308
|
"""
|
310
309
|
return pulumi.get(self, "description")
|
311
310
|
|
312
311
|
@description.setter
|
313
|
-
def description(self, value: Optional[pulumi.Input[
|
312
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
314
313
|
pulumi.set(self, "description", value)
|
315
314
|
|
316
|
-
@property
|
315
|
+
@_builtins.property
|
317
316
|
@pulumi.getter
|
318
317
|
def elasticsearches(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]]]:
|
319
318
|
"""
|
@@ -326,19 +325,19 @@ class SecretsMountArgs:
|
|
326
325
|
def elasticsearches(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]]]):
|
327
326
|
pulumi.set(self, "elasticsearches", value)
|
328
327
|
|
329
|
-
@property
|
328
|
+
@_builtins.property
|
330
329
|
@pulumi.getter(name="externalEntropyAccess")
|
331
|
-
def external_entropy_access(self) -> Optional[pulumi.Input[
|
330
|
+
def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
332
331
|
"""
|
333
332
|
Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
334
333
|
"""
|
335
334
|
return pulumi.get(self, "external_entropy_access")
|
336
335
|
|
337
336
|
@external_entropy_access.setter
|
338
|
-
def external_entropy_access(self, value: Optional[pulumi.Input[
|
337
|
+
def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
339
338
|
pulumi.set(self, "external_entropy_access", value)
|
340
339
|
|
341
|
-
@property
|
340
|
+
@_builtins.property
|
342
341
|
@pulumi.getter
|
343
342
|
def hanas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]]]:
|
344
343
|
"""
|
@@ -351,19 +350,19 @@ class SecretsMountArgs:
|
|
351
350
|
def hanas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]]]):
|
352
351
|
pulumi.set(self, "hanas", value)
|
353
352
|
|
354
|
-
@property
|
353
|
+
@_builtins.property
|
355
354
|
@pulumi.getter(name="identityTokenKey")
|
356
|
-
def identity_token_key(self) -> Optional[pulumi.Input[
|
355
|
+
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
357
356
|
"""
|
358
357
|
The key to use for signing plugin workload identity tokens
|
359
358
|
"""
|
360
359
|
return pulumi.get(self, "identity_token_key")
|
361
360
|
|
362
361
|
@identity_token_key.setter
|
363
|
-
def identity_token_key(self, value: Optional[pulumi.Input[
|
362
|
+
def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
364
363
|
pulumi.set(self, "identity_token_key", value)
|
365
364
|
|
366
|
-
@property
|
365
|
+
@_builtins.property
|
367
366
|
@pulumi.getter
|
368
367
|
def influxdbs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]]:
|
369
368
|
"""
|
@@ -376,43 +375,43 @@ class SecretsMountArgs:
|
|
376
375
|
def influxdbs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]]):
|
377
376
|
pulumi.set(self, "influxdbs", value)
|
378
377
|
|
379
|
-
@property
|
378
|
+
@_builtins.property
|
380
379
|
@pulumi.getter(name="listingVisibility")
|
381
|
-
def listing_visibility(self) -> Optional[pulumi.Input[
|
380
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
382
381
|
"""
|
383
382
|
Specifies whether to show this mount in the UI-specific listing endpoint
|
384
383
|
"""
|
385
384
|
return pulumi.get(self, "listing_visibility")
|
386
385
|
|
387
386
|
@listing_visibility.setter
|
388
|
-
def listing_visibility(self, value: Optional[pulumi.Input[
|
387
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
389
388
|
pulumi.set(self, "listing_visibility", value)
|
390
389
|
|
391
|
-
@property
|
390
|
+
@_builtins.property
|
392
391
|
@pulumi.getter
|
393
|
-
def local(self) -> Optional[pulumi.Input[
|
392
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
394
393
|
"""
|
395
394
|
Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
396
395
|
"""
|
397
396
|
return pulumi.get(self, "local")
|
398
397
|
|
399
398
|
@local.setter
|
400
|
-
def local(self, value: Optional[pulumi.Input[
|
399
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
401
400
|
pulumi.set(self, "local", value)
|
402
401
|
|
403
|
-
@property
|
402
|
+
@_builtins.property
|
404
403
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
405
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
404
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
406
405
|
"""
|
407
406
|
Maximum possible lease duration for tokens and secrets in seconds
|
408
407
|
"""
|
409
408
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
410
409
|
|
411
410
|
@max_lease_ttl_seconds.setter
|
412
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
411
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
413
412
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
414
413
|
|
415
|
-
@property
|
414
|
+
@_builtins.property
|
416
415
|
@pulumi.getter
|
417
416
|
def mongodbatlas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]]]:
|
418
417
|
"""
|
@@ -425,7 +424,7 @@ class SecretsMountArgs:
|
|
425
424
|
def mongodbatlas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]]]):
|
426
425
|
pulumi.set(self, "mongodbatlas", value)
|
427
426
|
|
428
|
-
@property
|
427
|
+
@_builtins.property
|
429
428
|
@pulumi.getter
|
430
429
|
def mongodbs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]]]:
|
431
430
|
"""
|
@@ -438,7 +437,7 @@ class SecretsMountArgs:
|
|
438
437
|
def mongodbs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]]]):
|
439
438
|
pulumi.set(self, "mongodbs", value)
|
440
439
|
|
441
|
-
@property
|
440
|
+
@_builtins.property
|
442
441
|
@pulumi.getter
|
443
442
|
def mssqls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMssqlArgs']]]]:
|
444
443
|
"""
|
@@ -451,7 +450,7 @@ class SecretsMountArgs:
|
|
451
450
|
def mssqls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMssqlArgs']]]]):
|
452
451
|
pulumi.set(self, "mssqls", value)
|
453
452
|
|
454
|
-
@property
|
453
|
+
@_builtins.property
|
455
454
|
@pulumi.getter(name="mysqlAuroras")
|
456
455
|
def mysql_auroras(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlAuroraArgs']]]]:
|
457
456
|
"""
|
@@ -464,7 +463,7 @@ class SecretsMountArgs:
|
|
464
463
|
def mysql_auroras(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlAuroraArgs']]]]):
|
465
464
|
pulumi.set(self, "mysql_auroras", value)
|
466
465
|
|
467
|
-
@property
|
466
|
+
@_builtins.property
|
468
467
|
@pulumi.getter(name="mysqlLegacies")
|
469
468
|
def mysql_legacies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlLegacyArgs']]]]:
|
470
469
|
"""
|
@@ -477,7 +476,7 @@ class SecretsMountArgs:
|
|
477
476
|
def mysql_legacies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlLegacyArgs']]]]):
|
478
477
|
pulumi.set(self, "mysql_legacies", value)
|
479
478
|
|
480
|
-
@property
|
479
|
+
@_builtins.property
|
481
480
|
@pulumi.getter(name="mysqlRds")
|
482
481
|
def mysql_rds(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]]:
|
483
482
|
"""
|
@@ -490,7 +489,7 @@ class SecretsMountArgs:
|
|
490
489
|
def mysql_rds(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]]):
|
491
490
|
pulumi.set(self, "mysql_rds", value)
|
492
491
|
|
493
|
-
@property
|
492
|
+
@_builtins.property
|
494
493
|
@pulumi.getter
|
495
494
|
def mysqls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]]:
|
496
495
|
"""
|
@@ -503,31 +502,31 @@ class SecretsMountArgs:
|
|
503
502
|
def mysqls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]]):
|
504
503
|
pulumi.set(self, "mysqls", value)
|
505
504
|
|
506
|
-
@property
|
505
|
+
@_builtins.property
|
507
506
|
@pulumi.getter
|
508
|
-
def namespace(self) -> Optional[pulumi.Input[
|
507
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
509
508
|
"""
|
510
509
|
Target namespace. (requires Enterprise)
|
511
510
|
"""
|
512
511
|
return pulumi.get(self, "namespace")
|
513
512
|
|
514
513
|
@namespace.setter
|
515
|
-
def namespace(self, value: Optional[pulumi.Input[
|
514
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
516
515
|
pulumi.set(self, "namespace", value)
|
517
516
|
|
518
|
-
@property
|
517
|
+
@_builtins.property
|
519
518
|
@pulumi.getter
|
520
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
519
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
521
520
|
"""
|
522
521
|
Specifies mount type specific options that are passed to the backend
|
523
522
|
"""
|
524
523
|
return pulumi.get(self, "options")
|
525
524
|
|
526
525
|
@options.setter
|
527
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
526
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
528
527
|
pulumi.set(self, "options", value)
|
529
528
|
|
530
|
-
@property
|
529
|
+
@_builtins.property
|
531
530
|
@pulumi.getter
|
532
531
|
def oracles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]]:
|
533
532
|
"""
|
@@ -540,31 +539,31 @@ class SecretsMountArgs:
|
|
540
539
|
def oracles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]]):
|
541
540
|
pulumi.set(self, "oracles", value)
|
542
541
|
|
543
|
-
@property
|
542
|
+
@_builtins.property
|
544
543
|
@pulumi.getter(name="passthroughRequestHeaders")
|
545
|
-
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
544
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
546
545
|
"""
|
547
546
|
List of headers to allow and pass from the request to the plugin
|
548
547
|
"""
|
549
548
|
return pulumi.get(self, "passthrough_request_headers")
|
550
549
|
|
551
550
|
@passthrough_request_headers.setter
|
552
|
-
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
551
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
553
552
|
pulumi.set(self, "passthrough_request_headers", value)
|
554
553
|
|
555
|
-
@property
|
554
|
+
@_builtins.property
|
556
555
|
@pulumi.getter(name="pluginVersion")
|
557
|
-
def plugin_version(self) -> Optional[pulumi.Input[
|
556
|
+
def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
|
558
557
|
"""
|
559
558
|
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
560
559
|
"""
|
561
560
|
return pulumi.get(self, "plugin_version")
|
562
561
|
|
563
562
|
@plugin_version.setter
|
564
|
-
def plugin_version(self, value: Optional[pulumi.Input[
|
563
|
+
def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
|
565
564
|
pulumi.set(self, "plugin_version", value)
|
566
565
|
|
567
|
-
@property
|
566
|
+
@_builtins.property
|
568
567
|
@pulumi.getter
|
569
568
|
def postgresqls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]]]:
|
570
569
|
"""
|
@@ -577,7 +576,7 @@ class SecretsMountArgs:
|
|
577
576
|
def postgresqls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]]]):
|
578
577
|
pulumi.set(self, "postgresqls", value)
|
579
578
|
|
580
|
-
@property
|
579
|
+
@_builtins.property
|
581
580
|
@pulumi.getter
|
582
581
|
def redis(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]]]:
|
583
582
|
"""
|
@@ -590,7 +589,7 @@ class SecretsMountArgs:
|
|
590
589
|
def redis(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]]]):
|
591
590
|
pulumi.set(self, "redis", value)
|
592
591
|
|
593
|
-
@property
|
592
|
+
@_builtins.property
|
594
593
|
@pulumi.getter(name="redisElasticaches")
|
595
594
|
def redis_elasticaches(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedisElasticachArgs']]]]:
|
596
595
|
"""
|
@@ -603,7 +602,7 @@ class SecretsMountArgs:
|
|
603
602
|
def redis_elasticaches(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedisElasticachArgs']]]]):
|
604
603
|
pulumi.set(self, "redis_elasticaches", value)
|
605
604
|
|
606
|
-
@property
|
605
|
+
@_builtins.property
|
607
606
|
@pulumi.getter
|
608
607
|
def redshifts(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]]]:
|
609
608
|
"""
|
@@ -616,19 +615,19 @@ class SecretsMountArgs:
|
|
616
615
|
def redshifts(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]]]):
|
617
616
|
pulumi.set(self, "redshifts", value)
|
618
617
|
|
619
|
-
@property
|
618
|
+
@_builtins.property
|
620
619
|
@pulumi.getter(name="sealWrap")
|
621
|
-
def seal_wrap(self) -> Optional[pulumi.Input[
|
620
|
+
def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
622
621
|
"""
|
623
622
|
Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
624
623
|
"""
|
625
624
|
return pulumi.get(self, "seal_wrap")
|
626
625
|
|
627
626
|
@seal_wrap.setter
|
628
|
-
def seal_wrap(self, value: Optional[pulumi.Input[
|
627
|
+
def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
629
628
|
pulumi.set(self, "seal_wrap", value)
|
630
629
|
|
631
|
-
@property
|
630
|
+
@_builtins.property
|
632
631
|
@pulumi.getter
|
633
632
|
def snowflakes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountSnowflakeArgs']]]]:
|
634
633
|
"""
|
@@ -645,25 +644,25 @@ class SecretsMountArgs:
|
|
645
644
|
@pulumi.input_type
|
646
645
|
class _SecretsMountState:
|
647
646
|
def __init__(__self__, *,
|
648
|
-
accessor: Optional[pulumi.Input[
|
649
|
-
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
650
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
651
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
652
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
647
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
648
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
649
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
650
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
651
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
653
652
|
cassandras: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]]] = None,
|
654
653
|
couchbases: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]]] = None,
|
655
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
656
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[
|
657
|
-
description: Optional[pulumi.Input[
|
654
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
655
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
656
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
658
657
|
elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]]] = None,
|
659
|
-
engine_count: Optional[pulumi.Input[
|
660
|
-
external_entropy_access: Optional[pulumi.Input[
|
658
|
+
engine_count: Optional[pulumi.Input[_builtins.int]] = None,
|
659
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
661
660
|
hanas: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]]] = None,
|
662
|
-
identity_token_key: Optional[pulumi.Input[
|
661
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
663
662
|
influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]] = None,
|
664
|
-
listing_visibility: Optional[pulumi.Input[
|
665
|
-
local: Optional[pulumi.Input[
|
666
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
663
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
664
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
665
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
667
666
|
mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]]] = None,
|
668
667
|
mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]]] = None,
|
669
668
|
mssqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMssqlArgs']]]] = None,
|
@@ -671,46 +670,46 @@ class _SecretsMountState:
|
|
671
670
|
mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlLegacyArgs']]]] = None,
|
672
671
|
mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]] = None,
|
673
672
|
mysqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]] = None,
|
674
|
-
namespace: Optional[pulumi.Input[
|
675
|
-
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
673
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
674
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
676
675
|
oracles: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]] = None,
|
677
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
678
|
-
path: Optional[pulumi.Input[
|
679
|
-
plugin_version: Optional[pulumi.Input[
|
676
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
677
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
678
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
680
679
|
postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]]] = None,
|
681
680
|
redis: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]]] = None,
|
682
681
|
redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedisElasticachArgs']]]] = None,
|
683
682
|
redshifts: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]]] = None,
|
684
|
-
seal_wrap: Optional[pulumi.Input[
|
683
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
685
684
|
snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountSnowflakeArgs']]]] = None):
|
686
685
|
"""
|
687
686
|
Input properties used for looking up and filtering SecretsMount resources.
|
688
|
-
:param pulumi.Input[
|
689
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
687
|
+
:param pulumi.Input[_builtins.str] accessor: Accessor of the mount
|
688
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
|
690
689
|
|
691
690
|
The following arguments are common to all database engines:
|
692
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
693
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
694
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
691
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
692
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
693
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
695
694
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]] cassandras: A nested block containing configuration options for Cassandra connections.
|
696
695
|
*See Configuration Options for more info*
|
697
696
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]] couchbases: A nested block containing configuration options for Couchbase connections.
|
698
697
|
*See Configuration Options for more info*
|
699
|
-
:param pulumi.Input[
|
700
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
701
|
-
:param pulumi.Input[
|
698
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
699
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
700
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
702
701
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]] elasticsearches: A nested block containing configuration options for Elasticsearch connections.
|
703
702
|
*See Configuration Options for more info*
|
704
|
-
:param pulumi.Input[
|
705
|
-
:param pulumi.Input[
|
703
|
+
:param pulumi.Input[_builtins.int] engine_count: The total number of database secrets engines configured.
|
704
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
706
705
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]] hanas: A nested block containing configuration options for SAP HanaDB connections.
|
707
706
|
*See Configuration Options for more info*
|
708
|
-
:param pulumi.Input[
|
707
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
709
708
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]] influxdbs: A nested block containing configuration options for InfluxDB connections.
|
710
709
|
*See Configuration Options for more info*
|
711
|
-
:param pulumi.Input[
|
712
|
-
:param pulumi.Input[
|
713
|
-
:param pulumi.Input[
|
710
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
711
|
+
:param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
712
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
714
713
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
|
715
714
|
*See Configuration Options for more info*
|
716
715
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]] mongodbs: A nested block containing configuration options for MongoDB connections.
|
@@ -725,13 +724,13 @@ class _SecretsMountState:
|
|
725
724
|
*See Configuration Options for more info*
|
726
725
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]] mysqls: A nested block containing configuration options for MySQL connections.
|
727
726
|
*See Configuration Options for more info*
|
728
|
-
:param pulumi.Input[
|
729
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
727
|
+
:param pulumi.Input[_builtins.str] namespace: Target namespace. (requires Enterprise)
|
728
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
730
729
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]] oracles: A nested block containing configuration options for Oracle connections.
|
731
730
|
*See Configuration Options for more info*
|
732
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
733
|
-
:param pulumi.Input[
|
734
|
-
:param pulumi.Input[
|
731
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
732
|
+
:param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
|
733
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
735
734
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]] postgresqls: A nested block containing configuration options for PostgreSQL connections.
|
736
735
|
*See Configuration Options for more info*
|
737
736
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]] redis: A nested block containing configuration options for Redis connections.
|
@@ -740,7 +739,7 @@ class _SecretsMountState:
|
|
740
739
|
*See Configuration Options for more info*
|
741
740
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]] redshifts: A nested block containing configuration options for AWS Redshift connections.
|
742
741
|
*See Configuration Options for more info*
|
743
|
-
:param pulumi.Input[
|
742
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
744
743
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountSnowflakeArgs']]] snowflakes: A nested block containing configuration options for Snowflake connections.
|
745
744
|
*See Configuration Options for more info*
|
746
745
|
"""
|
@@ -821,21 +820,21 @@ class _SecretsMountState:
|
|
821
820
|
if snowflakes is not None:
|
822
821
|
pulumi.set(__self__, "snowflakes", snowflakes)
|
823
822
|
|
824
|
-
@property
|
823
|
+
@_builtins.property
|
825
824
|
@pulumi.getter
|
826
|
-
def accessor(self) -> Optional[pulumi.Input[
|
825
|
+
def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
|
827
826
|
"""
|
828
827
|
Accessor of the mount
|
829
828
|
"""
|
830
829
|
return pulumi.get(self, "accessor")
|
831
830
|
|
832
831
|
@accessor.setter
|
833
|
-
def accessor(self, value: Optional[pulumi.Input[
|
832
|
+
def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
|
834
833
|
pulumi.set(self, "accessor", value)
|
835
834
|
|
836
|
-
@property
|
835
|
+
@_builtins.property
|
837
836
|
@pulumi.getter(name="allowedManagedKeys")
|
838
|
-
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
837
|
+
def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
839
838
|
"""
|
840
839
|
Set of managed key registry entry names that the mount in question is allowed to access
|
841
840
|
|
@@ -844,46 +843,46 @@ class _SecretsMountState:
|
|
844
843
|
return pulumi.get(self, "allowed_managed_keys")
|
845
844
|
|
846
845
|
@allowed_managed_keys.setter
|
847
|
-
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
846
|
+
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
848
847
|
pulumi.set(self, "allowed_managed_keys", value)
|
849
848
|
|
850
|
-
@property
|
849
|
+
@_builtins.property
|
851
850
|
@pulumi.getter(name="allowedResponseHeaders")
|
852
|
-
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
851
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
853
852
|
"""
|
854
853
|
List of headers to allow and pass from the request to the plugin
|
855
854
|
"""
|
856
855
|
return pulumi.get(self, "allowed_response_headers")
|
857
856
|
|
858
857
|
@allowed_response_headers.setter
|
859
|
-
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
858
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
860
859
|
pulumi.set(self, "allowed_response_headers", value)
|
861
860
|
|
862
|
-
@property
|
861
|
+
@_builtins.property
|
863
862
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
864
|
-
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
863
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
865
864
|
"""
|
866
865
|
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
867
866
|
"""
|
868
867
|
return pulumi.get(self, "audit_non_hmac_request_keys")
|
869
868
|
|
870
869
|
@audit_non_hmac_request_keys.setter
|
871
|
-
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
870
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
872
871
|
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
873
872
|
|
874
|
-
@property
|
873
|
+
@_builtins.property
|
875
874
|
@pulumi.getter(name="auditNonHmacResponseKeys")
|
876
|
-
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
875
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
877
876
|
"""
|
878
877
|
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
879
878
|
"""
|
880
879
|
return pulumi.get(self, "audit_non_hmac_response_keys")
|
881
880
|
|
882
881
|
@audit_non_hmac_response_keys.setter
|
883
|
-
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
882
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
884
883
|
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
885
884
|
|
886
|
-
@property
|
885
|
+
@_builtins.property
|
887
886
|
@pulumi.getter
|
888
887
|
def cassandras(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]]]:
|
889
888
|
"""
|
@@ -896,7 +895,7 @@ class _SecretsMountState:
|
|
896
895
|
def cassandras(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]]]):
|
897
896
|
pulumi.set(self, "cassandras", value)
|
898
897
|
|
899
|
-
@property
|
898
|
+
@_builtins.property
|
900
899
|
@pulumi.getter
|
901
900
|
def couchbases(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]]]:
|
902
901
|
"""
|
@@ -909,43 +908,43 @@ class _SecretsMountState:
|
|
909
908
|
def couchbases(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]]]):
|
910
909
|
pulumi.set(self, "couchbases", value)
|
911
910
|
|
912
|
-
@property
|
911
|
+
@_builtins.property
|
913
912
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
914
|
-
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
913
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
915
914
|
"""
|
916
915
|
Default lease duration for tokens and secrets in seconds
|
917
916
|
"""
|
918
917
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
919
918
|
|
920
919
|
@default_lease_ttl_seconds.setter
|
921
|
-
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
920
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
922
921
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
923
922
|
|
924
|
-
@property
|
923
|
+
@_builtins.property
|
925
924
|
@pulumi.getter(name="delegatedAuthAccessors")
|
926
|
-
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
925
|
+
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
927
926
|
"""
|
928
927
|
List of headers to allow and pass from the request to the plugin
|
929
928
|
"""
|
930
929
|
return pulumi.get(self, "delegated_auth_accessors")
|
931
930
|
|
932
931
|
@delegated_auth_accessors.setter
|
933
|
-
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
932
|
+
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
934
933
|
pulumi.set(self, "delegated_auth_accessors", value)
|
935
934
|
|
936
|
-
@property
|
935
|
+
@_builtins.property
|
937
936
|
@pulumi.getter
|
938
|
-
def description(self) -> Optional[pulumi.Input[
|
937
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
939
938
|
"""
|
940
939
|
Human-friendly description of the mount
|
941
940
|
"""
|
942
941
|
return pulumi.get(self, "description")
|
943
942
|
|
944
943
|
@description.setter
|
945
|
-
def description(self, value: Optional[pulumi.Input[
|
944
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
946
945
|
pulumi.set(self, "description", value)
|
947
946
|
|
948
|
-
@property
|
947
|
+
@_builtins.property
|
949
948
|
@pulumi.getter
|
950
949
|
def elasticsearches(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]]]:
|
951
950
|
"""
|
@@ -958,31 +957,31 @@ class _SecretsMountState:
|
|
958
957
|
def elasticsearches(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]]]):
|
959
958
|
pulumi.set(self, "elasticsearches", value)
|
960
959
|
|
961
|
-
@property
|
960
|
+
@_builtins.property
|
962
961
|
@pulumi.getter(name="engineCount")
|
963
|
-
def engine_count(self) -> Optional[pulumi.Input[
|
962
|
+
def engine_count(self) -> Optional[pulumi.Input[_builtins.int]]:
|
964
963
|
"""
|
965
964
|
The total number of database secrets engines configured.
|
966
965
|
"""
|
967
966
|
return pulumi.get(self, "engine_count")
|
968
967
|
|
969
968
|
@engine_count.setter
|
970
|
-
def engine_count(self, value: Optional[pulumi.Input[
|
969
|
+
def engine_count(self, value: Optional[pulumi.Input[_builtins.int]]):
|
971
970
|
pulumi.set(self, "engine_count", value)
|
972
971
|
|
973
|
-
@property
|
972
|
+
@_builtins.property
|
974
973
|
@pulumi.getter(name="externalEntropyAccess")
|
975
|
-
def external_entropy_access(self) -> Optional[pulumi.Input[
|
974
|
+
def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
976
975
|
"""
|
977
976
|
Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
978
977
|
"""
|
979
978
|
return pulumi.get(self, "external_entropy_access")
|
980
979
|
|
981
980
|
@external_entropy_access.setter
|
982
|
-
def external_entropy_access(self, value: Optional[pulumi.Input[
|
981
|
+
def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
983
982
|
pulumi.set(self, "external_entropy_access", value)
|
984
983
|
|
985
|
-
@property
|
984
|
+
@_builtins.property
|
986
985
|
@pulumi.getter
|
987
986
|
def hanas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]]]:
|
988
987
|
"""
|
@@ -995,19 +994,19 @@ class _SecretsMountState:
|
|
995
994
|
def hanas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]]]):
|
996
995
|
pulumi.set(self, "hanas", value)
|
997
996
|
|
998
|
-
@property
|
997
|
+
@_builtins.property
|
999
998
|
@pulumi.getter(name="identityTokenKey")
|
1000
|
-
def identity_token_key(self) -> Optional[pulumi.Input[
|
999
|
+
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1001
1000
|
"""
|
1002
1001
|
The key to use for signing plugin workload identity tokens
|
1003
1002
|
"""
|
1004
1003
|
return pulumi.get(self, "identity_token_key")
|
1005
1004
|
|
1006
1005
|
@identity_token_key.setter
|
1007
|
-
def identity_token_key(self, value: Optional[pulumi.Input[
|
1006
|
+
def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1008
1007
|
pulumi.set(self, "identity_token_key", value)
|
1009
1008
|
|
1010
|
-
@property
|
1009
|
+
@_builtins.property
|
1011
1010
|
@pulumi.getter
|
1012
1011
|
def influxdbs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]]:
|
1013
1012
|
"""
|
@@ -1020,43 +1019,43 @@ class _SecretsMountState:
|
|
1020
1019
|
def influxdbs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]]):
|
1021
1020
|
pulumi.set(self, "influxdbs", value)
|
1022
1021
|
|
1023
|
-
@property
|
1022
|
+
@_builtins.property
|
1024
1023
|
@pulumi.getter(name="listingVisibility")
|
1025
|
-
def listing_visibility(self) -> Optional[pulumi.Input[
|
1024
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1026
1025
|
"""
|
1027
1026
|
Specifies whether to show this mount in the UI-specific listing endpoint
|
1028
1027
|
"""
|
1029
1028
|
return pulumi.get(self, "listing_visibility")
|
1030
1029
|
|
1031
1030
|
@listing_visibility.setter
|
1032
|
-
def listing_visibility(self, value: Optional[pulumi.Input[
|
1031
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1033
1032
|
pulumi.set(self, "listing_visibility", value)
|
1034
1033
|
|
1035
|
-
@property
|
1034
|
+
@_builtins.property
|
1036
1035
|
@pulumi.getter
|
1037
|
-
def local(self) -> Optional[pulumi.Input[
|
1036
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1038
1037
|
"""
|
1039
1038
|
Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
1040
1039
|
"""
|
1041
1040
|
return pulumi.get(self, "local")
|
1042
1041
|
|
1043
1042
|
@local.setter
|
1044
|
-
def local(self, value: Optional[pulumi.Input[
|
1043
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1045
1044
|
pulumi.set(self, "local", value)
|
1046
1045
|
|
1047
|
-
@property
|
1046
|
+
@_builtins.property
|
1048
1047
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
1049
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
1048
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
1050
1049
|
"""
|
1051
1050
|
Maximum possible lease duration for tokens and secrets in seconds
|
1052
1051
|
"""
|
1053
1052
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
1054
1053
|
|
1055
1054
|
@max_lease_ttl_seconds.setter
|
1056
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
1055
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
1057
1056
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
1058
1057
|
|
1059
|
-
@property
|
1058
|
+
@_builtins.property
|
1060
1059
|
@pulumi.getter
|
1061
1060
|
def mongodbatlas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]]]:
|
1062
1061
|
"""
|
@@ -1069,7 +1068,7 @@ class _SecretsMountState:
|
|
1069
1068
|
def mongodbatlas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]]]):
|
1070
1069
|
pulumi.set(self, "mongodbatlas", value)
|
1071
1070
|
|
1072
|
-
@property
|
1071
|
+
@_builtins.property
|
1073
1072
|
@pulumi.getter
|
1074
1073
|
def mongodbs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]]]:
|
1075
1074
|
"""
|
@@ -1082,7 +1081,7 @@ class _SecretsMountState:
|
|
1082
1081
|
def mongodbs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]]]):
|
1083
1082
|
pulumi.set(self, "mongodbs", value)
|
1084
1083
|
|
1085
|
-
@property
|
1084
|
+
@_builtins.property
|
1086
1085
|
@pulumi.getter
|
1087
1086
|
def mssqls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMssqlArgs']]]]:
|
1088
1087
|
"""
|
@@ -1095,7 +1094,7 @@ class _SecretsMountState:
|
|
1095
1094
|
def mssqls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMssqlArgs']]]]):
|
1096
1095
|
pulumi.set(self, "mssqls", value)
|
1097
1096
|
|
1098
|
-
@property
|
1097
|
+
@_builtins.property
|
1099
1098
|
@pulumi.getter(name="mysqlAuroras")
|
1100
1099
|
def mysql_auroras(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlAuroraArgs']]]]:
|
1101
1100
|
"""
|
@@ -1108,7 +1107,7 @@ class _SecretsMountState:
|
|
1108
1107
|
def mysql_auroras(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlAuroraArgs']]]]):
|
1109
1108
|
pulumi.set(self, "mysql_auroras", value)
|
1110
1109
|
|
1111
|
-
@property
|
1110
|
+
@_builtins.property
|
1112
1111
|
@pulumi.getter(name="mysqlLegacies")
|
1113
1112
|
def mysql_legacies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlLegacyArgs']]]]:
|
1114
1113
|
"""
|
@@ -1121,7 +1120,7 @@ class _SecretsMountState:
|
|
1121
1120
|
def mysql_legacies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlLegacyArgs']]]]):
|
1122
1121
|
pulumi.set(self, "mysql_legacies", value)
|
1123
1122
|
|
1124
|
-
@property
|
1123
|
+
@_builtins.property
|
1125
1124
|
@pulumi.getter(name="mysqlRds")
|
1126
1125
|
def mysql_rds(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]]:
|
1127
1126
|
"""
|
@@ -1134,7 +1133,7 @@ class _SecretsMountState:
|
|
1134
1133
|
def mysql_rds(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]]):
|
1135
1134
|
pulumi.set(self, "mysql_rds", value)
|
1136
1135
|
|
1137
|
-
@property
|
1136
|
+
@_builtins.property
|
1138
1137
|
@pulumi.getter
|
1139
1138
|
def mysqls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]]:
|
1140
1139
|
"""
|
@@ -1147,31 +1146,31 @@ class _SecretsMountState:
|
|
1147
1146
|
def mysqls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]]):
|
1148
1147
|
pulumi.set(self, "mysqls", value)
|
1149
1148
|
|
1150
|
-
@property
|
1149
|
+
@_builtins.property
|
1151
1150
|
@pulumi.getter
|
1152
|
-
def namespace(self) -> Optional[pulumi.Input[
|
1151
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1153
1152
|
"""
|
1154
1153
|
Target namespace. (requires Enterprise)
|
1155
1154
|
"""
|
1156
1155
|
return pulumi.get(self, "namespace")
|
1157
1156
|
|
1158
1157
|
@namespace.setter
|
1159
|
-
def namespace(self, value: Optional[pulumi.Input[
|
1158
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1160
1159
|
pulumi.set(self, "namespace", value)
|
1161
1160
|
|
1162
|
-
@property
|
1161
|
+
@_builtins.property
|
1163
1162
|
@pulumi.getter
|
1164
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
1163
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
1165
1164
|
"""
|
1166
1165
|
Specifies mount type specific options that are passed to the backend
|
1167
1166
|
"""
|
1168
1167
|
return pulumi.get(self, "options")
|
1169
1168
|
|
1170
1169
|
@options.setter
|
1171
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
1170
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
1172
1171
|
pulumi.set(self, "options", value)
|
1173
1172
|
|
1174
|
-
@property
|
1173
|
+
@_builtins.property
|
1175
1174
|
@pulumi.getter
|
1176
1175
|
def oracles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]]:
|
1177
1176
|
"""
|
@@ -1184,43 +1183,43 @@ class _SecretsMountState:
|
|
1184
1183
|
def oracles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]]):
|
1185
1184
|
pulumi.set(self, "oracles", value)
|
1186
1185
|
|
1187
|
-
@property
|
1186
|
+
@_builtins.property
|
1188
1187
|
@pulumi.getter(name="passthroughRequestHeaders")
|
1189
|
-
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
1188
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
1190
1189
|
"""
|
1191
1190
|
List of headers to allow and pass from the request to the plugin
|
1192
1191
|
"""
|
1193
1192
|
return pulumi.get(self, "passthrough_request_headers")
|
1194
1193
|
|
1195
1194
|
@passthrough_request_headers.setter
|
1196
|
-
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1195
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
1197
1196
|
pulumi.set(self, "passthrough_request_headers", value)
|
1198
1197
|
|
1199
|
-
@property
|
1198
|
+
@_builtins.property
|
1200
1199
|
@pulumi.getter
|
1201
|
-
def path(self) -> Optional[pulumi.Input[
|
1200
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1202
1201
|
"""
|
1203
1202
|
Where the secret backend will be mounted
|
1204
1203
|
"""
|
1205
1204
|
return pulumi.get(self, "path")
|
1206
1205
|
|
1207
1206
|
@path.setter
|
1208
|
-
def path(self, value: Optional[pulumi.Input[
|
1207
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1209
1208
|
pulumi.set(self, "path", value)
|
1210
1209
|
|
1211
|
-
@property
|
1210
|
+
@_builtins.property
|
1212
1211
|
@pulumi.getter(name="pluginVersion")
|
1213
|
-
def plugin_version(self) -> Optional[pulumi.Input[
|
1212
|
+
def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1214
1213
|
"""
|
1215
1214
|
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1216
1215
|
"""
|
1217
1216
|
return pulumi.get(self, "plugin_version")
|
1218
1217
|
|
1219
1218
|
@plugin_version.setter
|
1220
|
-
def plugin_version(self, value: Optional[pulumi.Input[
|
1219
|
+
def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1221
1220
|
pulumi.set(self, "plugin_version", value)
|
1222
1221
|
|
1223
|
-
@property
|
1222
|
+
@_builtins.property
|
1224
1223
|
@pulumi.getter
|
1225
1224
|
def postgresqls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]]]:
|
1226
1225
|
"""
|
@@ -1233,7 +1232,7 @@ class _SecretsMountState:
|
|
1233
1232
|
def postgresqls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]]]):
|
1234
1233
|
pulumi.set(self, "postgresqls", value)
|
1235
1234
|
|
1236
|
-
@property
|
1235
|
+
@_builtins.property
|
1237
1236
|
@pulumi.getter
|
1238
1237
|
def redis(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]]]:
|
1239
1238
|
"""
|
@@ -1246,7 +1245,7 @@ class _SecretsMountState:
|
|
1246
1245
|
def redis(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]]]):
|
1247
1246
|
pulumi.set(self, "redis", value)
|
1248
1247
|
|
1249
|
-
@property
|
1248
|
+
@_builtins.property
|
1250
1249
|
@pulumi.getter(name="redisElasticaches")
|
1251
1250
|
def redis_elasticaches(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedisElasticachArgs']]]]:
|
1252
1251
|
"""
|
@@ -1259,7 +1258,7 @@ class _SecretsMountState:
|
|
1259
1258
|
def redis_elasticaches(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedisElasticachArgs']]]]):
|
1260
1259
|
pulumi.set(self, "redis_elasticaches", value)
|
1261
1260
|
|
1262
|
-
@property
|
1261
|
+
@_builtins.property
|
1263
1262
|
@pulumi.getter
|
1264
1263
|
def redshifts(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]]]:
|
1265
1264
|
"""
|
@@ -1272,19 +1271,19 @@ class _SecretsMountState:
|
|
1272
1271
|
def redshifts(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]]]):
|
1273
1272
|
pulumi.set(self, "redshifts", value)
|
1274
1273
|
|
1275
|
-
@property
|
1274
|
+
@_builtins.property
|
1276
1275
|
@pulumi.getter(name="sealWrap")
|
1277
|
-
def seal_wrap(self) -> Optional[pulumi.Input[
|
1276
|
+
def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1278
1277
|
"""
|
1279
1278
|
Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1280
1279
|
"""
|
1281
1280
|
return pulumi.get(self, "seal_wrap")
|
1282
1281
|
|
1283
1282
|
@seal_wrap.setter
|
1284
|
-
def seal_wrap(self, value: Optional[pulumi.Input[
|
1283
|
+
def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1285
1284
|
pulumi.set(self, "seal_wrap", value)
|
1286
1285
|
|
1287
|
-
@property
|
1286
|
+
@_builtins.property
|
1288
1287
|
@pulumi.getter
|
1289
1288
|
def snowflakes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountSnowflakeArgs']]]]:
|
1290
1289
|
"""
|
@@ -1304,23 +1303,23 @@ class SecretsMount(pulumi.CustomResource):
|
|
1304
1303
|
def __init__(__self__,
|
1305
1304
|
resource_name: str,
|
1306
1305
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1307
|
-
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1308
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1309
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1310
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1306
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1307
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1308
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1309
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1311
1310
|
cassandras: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCassandraArgs', 'SecretsMountCassandraArgsDict']]]]] = None,
|
1312
1311
|
couchbases: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCouchbaseArgs', 'SecretsMountCouchbaseArgsDict']]]]] = None,
|
1313
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
1314
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1315
|
-
description: Optional[pulumi.Input[
|
1312
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1313
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1314
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
1316
1315
|
elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountElasticsearchArgs', 'SecretsMountElasticsearchArgsDict']]]]] = None,
|
1317
|
-
external_entropy_access: Optional[pulumi.Input[
|
1316
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
1318
1317
|
hanas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountHanaArgs', 'SecretsMountHanaArgsDict']]]]] = None,
|
1319
|
-
identity_token_key: Optional[pulumi.Input[
|
1318
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1320
1319
|
influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountInfluxdbArgs', 'SecretsMountInfluxdbArgsDict']]]]] = None,
|
1321
|
-
listing_visibility: Optional[pulumi.Input[
|
1322
|
-
local: Optional[pulumi.Input[
|
1323
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
1320
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
1321
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
1322
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1324
1323
|
mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbatlaArgs', 'SecretsMountMongodbatlaArgsDict']]]]] = None,
|
1325
1324
|
mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbArgs', 'SecretsMountMongodbArgsDict']]]]] = None,
|
1326
1325
|
mssqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMssqlArgs', 'SecretsMountMssqlArgsDict']]]]] = None,
|
@@ -1328,17 +1327,17 @@ class SecretsMount(pulumi.CustomResource):
|
|
1328
1327
|
mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlLegacyArgs', 'SecretsMountMysqlLegacyArgsDict']]]]] = None,
|
1329
1328
|
mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]]] = None,
|
1330
1329
|
mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]]] = None,
|
1331
|
-
namespace: Optional[pulumi.Input[
|
1332
|
-
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
1330
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1331
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
1333
1332
|
oracles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]]] = None,
|
1334
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1335
|
-
path: Optional[pulumi.Input[
|
1336
|
-
plugin_version: Optional[pulumi.Input[
|
1333
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1334
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
1335
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
1337
1336
|
postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountPostgresqlArgs', 'SecretsMountPostgresqlArgsDict']]]]] = None,
|
1338
1337
|
redis: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRediArgs', 'SecretsMountRediArgsDict']]]]] = None,
|
1339
1338
|
redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedisElasticachArgs', 'SecretsMountRedisElasticachArgsDict']]]]] = None,
|
1340
1339
|
redshifts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedshiftArgs', 'SecretsMountRedshiftArgsDict']]]]] = None,
|
1341
|
-
seal_wrap: Optional[pulumi.Input[
|
1340
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
1342
1341
|
snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountSnowflakeArgs', 'SecretsMountSnowflakeArgsDict']]]]] = None,
|
1343
1342
|
__props__=None):
|
1344
1343
|
"""
|
@@ -1405,30 +1404,30 @@ class SecretsMount(pulumi.CustomResource):
|
|
1405
1404
|
|
1406
1405
|
:param str resource_name: The name of the resource.
|
1407
1406
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
1408
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1407
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
|
1409
1408
|
|
1410
1409
|
The following arguments are common to all database engines:
|
1411
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1412
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1413
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1410
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
1411
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1412
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1414
1413
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCassandraArgs', 'SecretsMountCassandraArgsDict']]]] cassandras: A nested block containing configuration options for Cassandra connections.
|
1415
1414
|
*See Configuration Options for more info*
|
1416
1415
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCouchbaseArgs', 'SecretsMountCouchbaseArgsDict']]]] couchbases: A nested block containing configuration options for Couchbase connections.
|
1417
1416
|
*See Configuration Options for more info*
|
1418
|
-
:param pulumi.Input[
|
1419
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1420
|
-
:param pulumi.Input[
|
1417
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
1418
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
1419
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
1421
1420
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountElasticsearchArgs', 'SecretsMountElasticsearchArgsDict']]]] elasticsearches: A nested block containing configuration options for Elasticsearch connections.
|
1422
1421
|
*See Configuration Options for more info*
|
1423
|
-
:param pulumi.Input[
|
1422
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
1424
1423
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountHanaArgs', 'SecretsMountHanaArgsDict']]]] hanas: A nested block containing configuration options for SAP HanaDB connections.
|
1425
1424
|
*See Configuration Options for more info*
|
1426
|
-
:param pulumi.Input[
|
1425
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
1427
1426
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountInfluxdbArgs', 'SecretsMountInfluxdbArgsDict']]]] influxdbs: A nested block containing configuration options for InfluxDB connections.
|
1428
1427
|
*See Configuration Options for more info*
|
1429
|
-
:param pulumi.Input[
|
1430
|
-
:param pulumi.Input[
|
1431
|
-
:param pulumi.Input[
|
1428
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
1429
|
+
:param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
1430
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
1432
1431
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbatlaArgs', 'SecretsMountMongodbatlaArgsDict']]]] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
|
1433
1432
|
*See Configuration Options for more info*
|
1434
1433
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbArgs', 'SecretsMountMongodbArgsDict']]]] mongodbs: A nested block containing configuration options for MongoDB connections.
|
@@ -1443,13 +1442,13 @@ class SecretsMount(pulumi.CustomResource):
|
|
1443
1442
|
*See Configuration Options for more info*
|
1444
1443
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]] mysqls: A nested block containing configuration options for MySQL connections.
|
1445
1444
|
*See Configuration Options for more info*
|
1446
|
-
:param pulumi.Input[
|
1447
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
1445
|
+
:param pulumi.Input[_builtins.str] namespace: Target namespace. (requires Enterprise)
|
1446
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
1448
1447
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]] oracles: A nested block containing configuration options for Oracle connections.
|
1449
1448
|
*See Configuration Options for more info*
|
1450
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1451
|
-
:param pulumi.Input[
|
1452
|
-
:param pulumi.Input[
|
1449
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
1450
|
+
:param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
|
1451
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1453
1452
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountPostgresqlArgs', 'SecretsMountPostgresqlArgsDict']]]] postgresqls: A nested block containing configuration options for PostgreSQL connections.
|
1454
1453
|
*See Configuration Options for more info*
|
1455
1454
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRediArgs', 'SecretsMountRediArgsDict']]]] redis: A nested block containing configuration options for Redis connections.
|
@@ -1458,7 +1457,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1458
1457
|
*See Configuration Options for more info*
|
1459
1458
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedshiftArgs', 'SecretsMountRedshiftArgsDict']]]] redshifts: A nested block containing configuration options for AWS Redshift connections.
|
1460
1459
|
*See Configuration Options for more info*
|
1461
|
-
:param pulumi.Input[
|
1460
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1462
1461
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountSnowflakeArgs', 'SecretsMountSnowflakeArgsDict']]]] snowflakes: A nested block containing configuration options for Snowflake connections.
|
1463
1462
|
*See Configuration Options for more info*
|
1464
1463
|
"""
|
@@ -1545,23 +1544,23 @@ class SecretsMount(pulumi.CustomResource):
|
|
1545
1544
|
def _internal_init(__self__,
|
1546
1545
|
resource_name: str,
|
1547
1546
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1548
|
-
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1549
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1550
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1551
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1547
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1548
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1549
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1550
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1552
1551
|
cassandras: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCassandraArgs', 'SecretsMountCassandraArgsDict']]]]] = None,
|
1553
1552
|
couchbases: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCouchbaseArgs', 'SecretsMountCouchbaseArgsDict']]]]] = None,
|
1554
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
1555
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1556
|
-
description: Optional[pulumi.Input[
|
1553
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1554
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1555
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
1557
1556
|
elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountElasticsearchArgs', 'SecretsMountElasticsearchArgsDict']]]]] = None,
|
1558
|
-
external_entropy_access: Optional[pulumi.Input[
|
1557
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
1559
1558
|
hanas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountHanaArgs', 'SecretsMountHanaArgsDict']]]]] = None,
|
1560
|
-
identity_token_key: Optional[pulumi.Input[
|
1559
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1561
1560
|
influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountInfluxdbArgs', 'SecretsMountInfluxdbArgsDict']]]]] = None,
|
1562
|
-
listing_visibility: Optional[pulumi.Input[
|
1563
|
-
local: Optional[pulumi.Input[
|
1564
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
1561
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
1562
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
1563
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1565
1564
|
mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbatlaArgs', 'SecretsMountMongodbatlaArgsDict']]]]] = None,
|
1566
1565
|
mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbArgs', 'SecretsMountMongodbArgsDict']]]]] = None,
|
1567
1566
|
mssqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMssqlArgs', 'SecretsMountMssqlArgsDict']]]]] = None,
|
@@ -1569,17 +1568,17 @@ class SecretsMount(pulumi.CustomResource):
|
|
1569
1568
|
mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlLegacyArgs', 'SecretsMountMysqlLegacyArgsDict']]]]] = None,
|
1570
1569
|
mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]]] = None,
|
1571
1570
|
mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]]] = None,
|
1572
|
-
namespace: Optional[pulumi.Input[
|
1573
|
-
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
1571
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1572
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
1574
1573
|
oracles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]]] = None,
|
1575
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1576
|
-
path: Optional[pulumi.Input[
|
1577
|
-
plugin_version: Optional[pulumi.Input[
|
1574
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1575
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
1576
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
1578
1577
|
postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountPostgresqlArgs', 'SecretsMountPostgresqlArgsDict']]]]] = None,
|
1579
1578
|
redis: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRediArgs', 'SecretsMountRediArgsDict']]]]] = None,
|
1580
1579
|
redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedisElasticachArgs', 'SecretsMountRedisElasticachArgsDict']]]]] = None,
|
1581
1580
|
redshifts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedshiftArgs', 'SecretsMountRedshiftArgsDict']]]]] = None,
|
1582
|
-
seal_wrap: Optional[pulumi.Input[
|
1581
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
1583
1582
|
snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountSnowflakeArgs', 'SecretsMountSnowflakeArgsDict']]]]] = None,
|
1584
1583
|
__props__=None):
|
1585
1584
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
@@ -1640,25 +1639,25 @@ class SecretsMount(pulumi.CustomResource):
|
|
1640
1639
|
def get(resource_name: str,
|
1641
1640
|
id: pulumi.Input[str],
|
1642
1641
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1643
|
-
accessor: Optional[pulumi.Input[
|
1644
|
-
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1645
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1646
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1647
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1642
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
1643
|
+
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1644
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1645
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1646
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1648
1647
|
cassandras: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCassandraArgs', 'SecretsMountCassandraArgsDict']]]]] = None,
|
1649
1648
|
couchbases: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCouchbaseArgs', 'SecretsMountCouchbaseArgsDict']]]]] = None,
|
1650
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
1651
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1652
|
-
description: Optional[pulumi.Input[
|
1649
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1650
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1651
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
1653
1652
|
elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountElasticsearchArgs', 'SecretsMountElasticsearchArgsDict']]]]] = None,
|
1654
|
-
engine_count: Optional[pulumi.Input[
|
1655
|
-
external_entropy_access: Optional[pulumi.Input[
|
1653
|
+
engine_count: Optional[pulumi.Input[_builtins.int]] = None,
|
1654
|
+
external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
|
1656
1655
|
hanas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountHanaArgs', 'SecretsMountHanaArgsDict']]]]] = None,
|
1657
|
-
identity_token_key: Optional[pulumi.Input[
|
1656
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1658
1657
|
influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountInfluxdbArgs', 'SecretsMountInfluxdbArgsDict']]]]] = None,
|
1659
|
-
listing_visibility: Optional[pulumi.Input[
|
1660
|
-
local: Optional[pulumi.Input[
|
1661
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
1658
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
1659
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
1660
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1662
1661
|
mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbatlaArgs', 'SecretsMountMongodbatlaArgsDict']]]]] = None,
|
1663
1662
|
mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbArgs', 'SecretsMountMongodbArgsDict']]]]] = None,
|
1664
1663
|
mssqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMssqlArgs', 'SecretsMountMssqlArgsDict']]]]] = None,
|
@@ -1666,17 +1665,17 @@ class SecretsMount(pulumi.CustomResource):
|
|
1666
1665
|
mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlLegacyArgs', 'SecretsMountMysqlLegacyArgsDict']]]]] = None,
|
1667
1666
|
mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]]] = None,
|
1668
1667
|
mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]]] = None,
|
1669
|
-
namespace: Optional[pulumi.Input[
|
1670
|
-
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
1668
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1669
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
1671
1670
|
oracles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]]] = None,
|
1672
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1673
|
-
path: Optional[pulumi.Input[
|
1674
|
-
plugin_version: Optional[pulumi.Input[
|
1671
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1672
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
1673
|
+
plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
|
1675
1674
|
postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountPostgresqlArgs', 'SecretsMountPostgresqlArgsDict']]]]] = None,
|
1676
1675
|
redis: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRediArgs', 'SecretsMountRediArgsDict']]]]] = None,
|
1677
1676
|
redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedisElasticachArgs', 'SecretsMountRedisElasticachArgsDict']]]]] = None,
|
1678
1677
|
redshifts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedshiftArgs', 'SecretsMountRedshiftArgsDict']]]]] = None,
|
1679
|
-
seal_wrap: Optional[pulumi.Input[
|
1678
|
+
seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
|
1680
1679
|
snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountSnowflakeArgs', 'SecretsMountSnowflakeArgsDict']]]]] = None) -> 'SecretsMount':
|
1681
1680
|
"""
|
1682
1681
|
Get an existing SecretsMount resource's state with the given name, id, and optional extra
|
@@ -1685,32 +1684,32 @@ class SecretsMount(pulumi.CustomResource):
|
|
1685
1684
|
:param str resource_name: The unique name of the resulting resource.
|
1686
1685
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
1687
1686
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
1688
|
-
:param pulumi.Input[
|
1689
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1687
|
+
:param pulumi.Input[_builtins.str] accessor: Accessor of the mount
|
1688
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
|
1690
1689
|
|
1691
1690
|
The following arguments are common to all database engines:
|
1692
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1693
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1694
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1691
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
1692
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1693
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1695
1694
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCassandraArgs', 'SecretsMountCassandraArgsDict']]]] cassandras: A nested block containing configuration options for Cassandra connections.
|
1696
1695
|
*See Configuration Options for more info*
|
1697
1696
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCouchbaseArgs', 'SecretsMountCouchbaseArgsDict']]]] couchbases: A nested block containing configuration options for Couchbase connections.
|
1698
1697
|
*See Configuration Options for more info*
|
1699
|
-
:param pulumi.Input[
|
1700
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1701
|
-
:param pulumi.Input[
|
1698
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
1699
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
1700
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
1702
1701
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountElasticsearchArgs', 'SecretsMountElasticsearchArgsDict']]]] elasticsearches: A nested block containing configuration options for Elasticsearch connections.
|
1703
1702
|
*See Configuration Options for more info*
|
1704
|
-
:param pulumi.Input[
|
1705
|
-
:param pulumi.Input[
|
1703
|
+
:param pulumi.Input[_builtins.int] engine_count: The total number of database secrets engines configured.
|
1704
|
+
:param pulumi.Input[_builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
1706
1705
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountHanaArgs', 'SecretsMountHanaArgsDict']]]] hanas: A nested block containing configuration options for SAP HanaDB connections.
|
1707
1706
|
*See Configuration Options for more info*
|
1708
|
-
:param pulumi.Input[
|
1707
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
1709
1708
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountInfluxdbArgs', 'SecretsMountInfluxdbArgsDict']]]] influxdbs: A nested block containing configuration options for InfluxDB connections.
|
1710
1709
|
*See Configuration Options for more info*
|
1711
|
-
:param pulumi.Input[
|
1712
|
-
:param pulumi.Input[
|
1713
|
-
:param pulumi.Input[
|
1710
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
1711
|
+
:param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
1712
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
1714
1713
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbatlaArgs', 'SecretsMountMongodbatlaArgsDict']]]] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
|
1715
1714
|
*See Configuration Options for more info*
|
1716
1715
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbArgs', 'SecretsMountMongodbArgsDict']]]] mongodbs: A nested block containing configuration options for MongoDB connections.
|
@@ -1725,13 +1724,13 @@ class SecretsMount(pulumi.CustomResource):
|
|
1725
1724
|
*See Configuration Options for more info*
|
1726
1725
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]] mysqls: A nested block containing configuration options for MySQL connections.
|
1727
1726
|
*See Configuration Options for more info*
|
1728
|
-
:param pulumi.Input[
|
1729
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
1727
|
+
:param pulumi.Input[_builtins.str] namespace: Target namespace. (requires Enterprise)
|
1728
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
|
1730
1729
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]] oracles: A nested block containing configuration options for Oracle connections.
|
1731
1730
|
*See Configuration Options for more info*
|
1732
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1733
|
-
:param pulumi.Input[
|
1734
|
-
:param pulumi.Input[
|
1731
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
1732
|
+
:param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
|
1733
|
+
:param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1735
1734
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountPostgresqlArgs', 'SecretsMountPostgresqlArgsDict']]]] postgresqls: A nested block containing configuration options for PostgreSQL connections.
|
1736
1735
|
*See Configuration Options for more info*
|
1737
1736
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRediArgs', 'SecretsMountRediArgsDict']]]] redis: A nested block containing configuration options for Redis connections.
|
@@ -1740,7 +1739,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1740
1739
|
*See Configuration Options for more info*
|
1741
1740
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedshiftArgs', 'SecretsMountRedshiftArgsDict']]]] redshifts: A nested block containing configuration options for AWS Redshift connections.
|
1742
1741
|
*See Configuration Options for more info*
|
1743
|
-
:param pulumi.Input[
|
1742
|
+
:param pulumi.Input[_builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1744
1743
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountSnowflakeArgs', 'SecretsMountSnowflakeArgsDict']]]] snowflakes: A nested block containing configuration options for Snowflake connections.
|
1745
1744
|
*See Configuration Options for more info*
|
1746
1745
|
"""
|
@@ -1788,17 +1787,17 @@ class SecretsMount(pulumi.CustomResource):
|
|
1788
1787
|
__props__.__dict__["snowflakes"] = snowflakes
|
1789
1788
|
return SecretsMount(resource_name, opts=opts, __props__=__props__)
|
1790
1789
|
|
1791
|
-
@property
|
1790
|
+
@_builtins.property
|
1792
1791
|
@pulumi.getter
|
1793
|
-
def accessor(self) -> pulumi.Output[
|
1792
|
+
def accessor(self) -> pulumi.Output[_builtins.str]:
|
1794
1793
|
"""
|
1795
1794
|
Accessor of the mount
|
1796
1795
|
"""
|
1797
1796
|
return pulumi.get(self, "accessor")
|
1798
1797
|
|
1799
|
-
@property
|
1798
|
+
@_builtins.property
|
1800
1799
|
@pulumi.getter(name="allowedManagedKeys")
|
1801
|
-
def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[
|
1800
|
+
def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1802
1801
|
"""
|
1803
1802
|
Set of managed key registry entry names that the mount in question is allowed to access
|
1804
1803
|
|
@@ -1806,31 +1805,31 @@ class SecretsMount(pulumi.CustomResource):
|
|
1806
1805
|
"""
|
1807
1806
|
return pulumi.get(self, "allowed_managed_keys")
|
1808
1807
|
|
1809
|
-
@property
|
1808
|
+
@_builtins.property
|
1810
1809
|
@pulumi.getter(name="allowedResponseHeaders")
|
1811
|
-
def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[
|
1810
|
+
def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1812
1811
|
"""
|
1813
1812
|
List of headers to allow and pass from the request to the plugin
|
1814
1813
|
"""
|
1815
1814
|
return pulumi.get(self, "allowed_response_headers")
|
1816
1815
|
|
1817
|
-
@property
|
1816
|
+
@_builtins.property
|
1818
1817
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
1819
|
-
def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[
|
1818
|
+
def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
1820
1819
|
"""
|
1821
1820
|
Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1822
1821
|
"""
|
1823
1822
|
return pulumi.get(self, "audit_non_hmac_request_keys")
|
1824
1823
|
|
1825
|
-
@property
|
1824
|
+
@_builtins.property
|
1826
1825
|
@pulumi.getter(name="auditNonHmacResponseKeys")
|
1827
|
-
def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[
|
1826
|
+
def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
1828
1827
|
"""
|
1829
1828
|
Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1830
1829
|
"""
|
1831
1830
|
return pulumi.get(self, "audit_non_hmac_response_keys")
|
1832
1831
|
|
1833
|
-
@property
|
1832
|
+
@_builtins.property
|
1834
1833
|
@pulumi.getter
|
1835
1834
|
def cassandras(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountCassandra']]]:
|
1836
1835
|
"""
|
@@ -1839,7 +1838,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1839
1838
|
"""
|
1840
1839
|
return pulumi.get(self, "cassandras")
|
1841
1840
|
|
1842
|
-
@property
|
1841
|
+
@_builtins.property
|
1843
1842
|
@pulumi.getter
|
1844
1843
|
def couchbases(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountCouchbase']]]:
|
1845
1844
|
"""
|
@@ -1848,31 +1847,31 @@ class SecretsMount(pulumi.CustomResource):
|
|
1848
1847
|
"""
|
1849
1848
|
return pulumi.get(self, "couchbases")
|
1850
1849
|
|
1851
|
-
@property
|
1850
|
+
@_builtins.property
|
1852
1851
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
1853
|
-
def default_lease_ttl_seconds(self) -> pulumi.Output[
|
1852
|
+
def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
|
1854
1853
|
"""
|
1855
1854
|
Default lease duration for tokens and secrets in seconds
|
1856
1855
|
"""
|
1857
1856
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
1858
1857
|
|
1859
|
-
@property
|
1858
|
+
@_builtins.property
|
1860
1859
|
@pulumi.getter(name="delegatedAuthAccessors")
|
1861
|
-
def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[
|
1860
|
+
def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1862
1861
|
"""
|
1863
1862
|
List of headers to allow and pass from the request to the plugin
|
1864
1863
|
"""
|
1865
1864
|
return pulumi.get(self, "delegated_auth_accessors")
|
1866
1865
|
|
1867
|
-
@property
|
1866
|
+
@_builtins.property
|
1868
1867
|
@pulumi.getter
|
1869
|
-
def description(self) -> pulumi.Output[Optional[
|
1868
|
+
def description(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1870
1869
|
"""
|
1871
1870
|
Human-friendly description of the mount
|
1872
1871
|
"""
|
1873
1872
|
return pulumi.get(self, "description")
|
1874
1873
|
|
1875
|
-
@property
|
1874
|
+
@_builtins.property
|
1876
1875
|
@pulumi.getter
|
1877
1876
|
def elasticsearches(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountElasticsearch']]]:
|
1878
1877
|
"""
|
@@ -1881,23 +1880,23 @@ class SecretsMount(pulumi.CustomResource):
|
|
1881
1880
|
"""
|
1882
1881
|
return pulumi.get(self, "elasticsearches")
|
1883
1882
|
|
1884
|
-
@property
|
1883
|
+
@_builtins.property
|
1885
1884
|
@pulumi.getter(name="engineCount")
|
1886
|
-
def engine_count(self) -> pulumi.Output[
|
1885
|
+
def engine_count(self) -> pulumi.Output[_builtins.int]:
|
1887
1886
|
"""
|
1888
1887
|
The total number of database secrets engines configured.
|
1889
1888
|
"""
|
1890
1889
|
return pulumi.get(self, "engine_count")
|
1891
1890
|
|
1892
|
-
@property
|
1891
|
+
@_builtins.property
|
1893
1892
|
@pulumi.getter(name="externalEntropyAccess")
|
1894
|
-
def external_entropy_access(self) -> pulumi.Output[Optional[
|
1893
|
+
def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1895
1894
|
"""
|
1896
1895
|
Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
1897
1896
|
"""
|
1898
1897
|
return pulumi.get(self, "external_entropy_access")
|
1899
1898
|
|
1900
|
-
@property
|
1899
|
+
@_builtins.property
|
1901
1900
|
@pulumi.getter
|
1902
1901
|
def hanas(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountHana']]]:
|
1903
1902
|
"""
|
@@ -1906,15 +1905,15 @@ class SecretsMount(pulumi.CustomResource):
|
|
1906
1905
|
"""
|
1907
1906
|
return pulumi.get(self, "hanas")
|
1908
1907
|
|
1909
|
-
@property
|
1908
|
+
@_builtins.property
|
1910
1909
|
@pulumi.getter(name="identityTokenKey")
|
1911
|
-
def identity_token_key(self) -> pulumi.Output[Optional[
|
1910
|
+
def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1912
1911
|
"""
|
1913
1912
|
The key to use for signing plugin workload identity tokens
|
1914
1913
|
"""
|
1915
1914
|
return pulumi.get(self, "identity_token_key")
|
1916
1915
|
|
1917
|
-
@property
|
1916
|
+
@_builtins.property
|
1918
1917
|
@pulumi.getter
|
1919
1918
|
def influxdbs(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountInfluxdb']]]:
|
1920
1919
|
"""
|
@@ -1923,31 +1922,31 @@ class SecretsMount(pulumi.CustomResource):
|
|
1923
1922
|
"""
|
1924
1923
|
return pulumi.get(self, "influxdbs")
|
1925
1924
|
|
1926
|
-
@property
|
1925
|
+
@_builtins.property
|
1927
1926
|
@pulumi.getter(name="listingVisibility")
|
1928
|
-
def listing_visibility(self) -> pulumi.Output[Optional[
|
1927
|
+
def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1929
1928
|
"""
|
1930
1929
|
Specifies whether to show this mount in the UI-specific listing endpoint
|
1931
1930
|
"""
|
1932
1931
|
return pulumi.get(self, "listing_visibility")
|
1933
1932
|
|
1934
|
-
@property
|
1933
|
+
@_builtins.property
|
1935
1934
|
@pulumi.getter
|
1936
|
-
def local(self) -> pulumi.Output[Optional[
|
1935
|
+
def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1937
1936
|
"""
|
1938
1937
|
Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
1939
1938
|
"""
|
1940
1939
|
return pulumi.get(self, "local")
|
1941
1940
|
|
1942
|
-
@property
|
1941
|
+
@_builtins.property
|
1943
1942
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
1944
|
-
def max_lease_ttl_seconds(self) -> pulumi.Output[
|
1943
|
+
def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
|
1945
1944
|
"""
|
1946
1945
|
Maximum possible lease duration for tokens and secrets in seconds
|
1947
1946
|
"""
|
1948
1947
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
1949
1948
|
|
1950
|
-
@property
|
1949
|
+
@_builtins.property
|
1951
1950
|
@pulumi.getter
|
1952
1951
|
def mongodbatlas(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountMongodbatla']]]:
|
1953
1952
|
"""
|
@@ -1956,7 +1955,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1956
1955
|
"""
|
1957
1956
|
return pulumi.get(self, "mongodbatlas")
|
1958
1957
|
|
1959
|
-
@property
|
1958
|
+
@_builtins.property
|
1960
1959
|
@pulumi.getter
|
1961
1960
|
def mongodbs(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountMongodb']]]:
|
1962
1961
|
"""
|
@@ -1965,7 +1964,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1965
1964
|
"""
|
1966
1965
|
return pulumi.get(self, "mongodbs")
|
1967
1966
|
|
1968
|
-
@property
|
1967
|
+
@_builtins.property
|
1969
1968
|
@pulumi.getter
|
1970
1969
|
def mssqls(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountMssql']]]:
|
1971
1970
|
"""
|
@@ -1974,7 +1973,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1974
1973
|
"""
|
1975
1974
|
return pulumi.get(self, "mssqls")
|
1976
1975
|
|
1977
|
-
@property
|
1976
|
+
@_builtins.property
|
1978
1977
|
@pulumi.getter(name="mysqlAuroras")
|
1979
1978
|
def mysql_auroras(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountMysqlAurora']]]:
|
1980
1979
|
"""
|
@@ -1983,7 +1982,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1983
1982
|
"""
|
1984
1983
|
return pulumi.get(self, "mysql_auroras")
|
1985
1984
|
|
1986
|
-
@property
|
1985
|
+
@_builtins.property
|
1987
1986
|
@pulumi.getter(name="mysqlLegacies")
|
1988
1987
|
def mysql_legacies(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountMysqlLegacy']]]:
|
1989
1988
|
"""
|
@@ -1992,7 +1991,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1992
1991
|
"""
|
1993
1992
|
return pulumi.get(self, "mysql_legacies")
|
1994
1993
|
|
1995
|
-
@property
|
1994
|
+
@_builtins.property
|
1996
1995
|
@pulumi.getter(name="mysqlRds")
|
1997
1996
|
def mysql_rds(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountMysqlRd']]]:
|
1998
1997
|
"""
|
@@ -2001,7 +2000,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
2001
2000
|
"""
|
2002
2001
|
return pulumi.get(self, "mysql_rds")
|
2003
2002
|
|
2004
|
-
@property
|
2003
|
+
@_builtins.property
|
2005
2004
|
@pulumi.getter
|
2006
2005
|
def mysqls(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountMysql']]]:
|
2007
2006
|
"""
|
@@ -2010,23 +2009,23 @@ class SecretsMount(pulumi.CustomResource):
|
|
2010
2009
|
"""
|
2011
2010
|
return pulumi.get(self, "mysqls")
|
2012
2011
|
|
2013
|
-
@property
|
2012
|
+
@_builtins.property
|
2014
2013
|
@pulumi.getter
|
2015
|
-
def namespace(self) -> pulumi.Output[Optional[
|
2014
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
2016
2015
|
"""
|
2017
2016
|
Target namespace. (requires Enterprise)
|
2018
2017
|
"""
|
2019
2018
|
return pulumi.get(self, "namespace")
|
2020
2019
|
|
2021
|
-
@property
|
2020
|
+
@_builtins.property
|
2022
2021
|
@pulumi.getter
|
2023
|
-
def options(self) -> pulumi.Output[Optional[Mapping[str,
|
2022
|
+
def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
|
2024
2023
|
"""
|
2025
2024
|
Specifies mount type specific options that are passed to the backend
|
2026
2025
|
"""
|
2027
2026
|
return pulumi.get(self, "options")
|
2028
2027
|
|
2029
|
-
@property
|
2028
|
+
@_builtins.property
|
2030
2029
|
@pulumi.getter
|
2031
2030
|
def oracles(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountOracle']]]:
|
2032
2031
|
"""
|
@@ -2035,31 +2034,31 @@ class SecretsMount(pulumi.CustomResource):
|
|
2035
2034
|
"""
|
2036
2035
|
return pulumi.get(self, "oracles")
|
2037
2036
|
|
2038
|
-
@property
|
2037
|
+
@_builtins.property
|
2039
2038
|
@pulumi.getter(name="passthroughRequestHeaders")
|
2040
|
-
def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[
|
2039
|
+
def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
2041
2040
|
"""
|
2042
2041
|
List of headers to allow and pass from the request to the plugin
|
2043
2042
|
"""
|
2044
2043
|
return pulumi.get(self, "passthrough_request_headers")
|
2045
2044
|
|
2046
|
-
@property
|
2045
|
+
@_builtins.property
|
2047
2046
|
@pulumi.getter
|
2048
|
-
def path(self) -> pulumi.Output[
|
2047
|
+
def path(self) -> pulumi.Output[_builtins.str]:
|
2049
2048
|
"""
|
2050
2049
|
Where the secret backend will be mounted
|
2051
2050
|
"""
|
2052
2051
|
return pulumi.get(self, "path")
|
2053
2052
|
|
2054
|
-
@property
|
2053
|
+
@_builtins.property
|
2055
2054
|
@pulumi.getter(name="pluginVersion")
|
2056
|
-
def plugin_version(self) -> pulumi.Output[Optional[
|
2055
|
+
def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
|
2057
2056
|
"""
|
2058
2057
|
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
2059
2058
|
"""
|
2060
2059
|
return pulumi.get(self, "plugin_version")
|
2061
2060
|
|
2062
|
-
@property
|
2061
|
+
@_builtins.property
|
2063
2062
|
@pulumi.getter
|
2064
2063
|
def postgresqls(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountPostgresql']]]:
|
2065
2064
|
"""
|
@@ -2068,7 +2067,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
2068
2067
|
"""
|
2069
2068
|
return pulumi.get(self, "postgresqls")
|
2070
2069
|
|
2071
|
-
@property
|
2070
|
+
@_builtins.property
|
2072
2071
|
@pulumi.getter
|
2073
2072
|
def redis(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountRedi']]]:
|
2074
2073
|
"""
|
@@ -2077,7 +2076,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
2077
2076
|
"""
|
2078
2077
|
return pulumi.get(self, "redis")
|
2079
2078
|
|
2080
|
-
@property
|
2079
|
+
@_builtins.property
|
2081
2080
|
@pulumi.getter(name="redisElasticaches")
|
2082
2081
|
def redis_elasticaches(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountRedisElasticach']]]:
|
2083
2082
|
"""
|
@@ -2086,7 +2085,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
2086
2085
|
"""
|
2087
2086
|
return pulumi.get(self, "redis_elasticaches")
|
2088
2087
|
|
2089
|
-
@property
|
2088
|
+
@_builtins.property
|
2090
2089
|
@pulumi.getter
|
2091
2090
|
def redshifts(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountRedshift']]]:
|
2092
2091
|
"""
|
@@ -2095,15 +2094,15 @@ class SecretsMount(pulumi.CustomResource):
|
|
2095
2094
|
"""
|
2096
2095
|
return pulumi.get(self, "redshifts")
|
2097
2096
|
|
2098
|
-
@property
|
2097
|
+
@_builtins.property
|
2099
2098
|
@pulumi.getter(name="sealWrap")
|
2100
|
-
def seal_wrap(self) -> pulumi.Output[
|
2099
|
+
def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
|
2101
2100
|
"""
|
2102
2101
|
Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
2103
2102
|
"""
|
2104
2103
|
return pulumi.get(self, "seal_wrap")
|
2105
2104
|
|
2106
|
-
@property
|
2105
|
+
@_builtins.property
|
2107
2106
|
@pulumi.getter
|
2108
2107
|
def snowflakes(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountSnowflake']]]:
|
2109
2108
|
"""
|