pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
pulumi_vault/mount.py CHANGED
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,56 +19,56 @@ __all__ = ['MountArgs', 'Mount']
20
19
  @pulumi.input_type
21
20
  class MountArgs:
22
21
  def __init__(__self__, *,
23
- path: pulumi.Input[builtins.str],
24
- type: pulumi.Input[builtins.str],
25
- allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
26
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
27
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
28
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
29
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
30
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
31
- description: Optional[pulumi.Input[builtins.str]] = None,
32
- external_entropy_access: Optional[pulumi.Input[builtins.bool]] = None,
33
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
34
- listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
35
- local: Optional[pulumi.Input[builtins.bool]] = None,
36
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
37
- namespace: Optional[pulumi.Input[builtins.str]] = None,
38
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
39
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
40
- plugin_version: Optional[pulumi.Input[builtins.str]] = None,
41
- seal_wrap: Optional[pulumi.Input[builtins.bool]] = None):
22
+ path: pulumi.Input[_builtins.str],
23
+ type: pulumi.Input[_builtins.str],
24
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
25
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
28
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
29
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
30
+ description: Optional[pulumi.Input[_builtins.str]] = None,
31
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
32
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
33
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
34
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
35
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
36
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
37
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
38
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
39
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
40
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None):
42
41
  """
43
42
  The set of arguments for constructing a Mount resource.
44
- :param pulumi.Input[builtins.str] path: Where the secret backend will be mounted
45
- :param pulumi.Input[builtins.str] type: Type of the backend, such as "aws"
46
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
47
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_response_headers: List of headers to allow, allowing a plugin to include
43
+ :param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
44
+ :param pulumi.Input[_builtins.str] type: Type of the backend, such as "aws"
45
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
46
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow, allowing a plugin to include
48
47
  them in the response.
49
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
50
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
51
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
52
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] delegated_auth_accessors: List of allowed authentication mount accessors the
48
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
49
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
50
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
51
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of allowed authentication mount accessors the
53
52
  backend can request delegated authentication for.
54
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount
55
- :param pulumi.Input[builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
56
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens. If
53
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
54
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
55
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens. If
57
56
  not provided, this will default to Vault's OIDC default key.
58
- :param pulumi.Input[builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific
57
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific
59
58
  listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
60
- :param pulumi.Input[builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
61
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
62
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
59
+ :param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
60
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
61
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
63
62
  The value should not contain leading or trailing forward slashes.
64
63
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
65
64
  *Available only for Vault Enterprise*.
66
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] options: Specifies mount type specific options that are passed to the backend
67
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to
65
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
66
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to
68
67
  the plugin.
69
- :param pulumi.Input[builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
68
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
70
69
  If unspecified, the server will select any matching unversioned plugin that may have been
71
70
  registered, the latest versioned plugin registered, or a built-in plugin in that order of precedence.
72
- :param pulumi.Input[builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
71
+ :param pulumi.Input[_builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
73
72
  """
74
73
  pulumi.set(__self__, "path", path)
75
74
  pulumi.set(__self__, "type", type)
@@ -108,45 +107,45 @@ class MountArgs:
108
107
  if seal_wrap is not None:
109
108
  pulumi.set(__self__, "seal_wrap", seal_wrap)
110
109
 
111
- @property
110
+ @_builtins.property
112
111
  @pulumi.getter
113
- def path(self) -> pulumi.Input[builtins.str]:
112
+ def path(self) -> pulumi.Input[_builtins.str]:
114
113
  """
115
114
  Where the secret backend will be mounted
116
115
  """
117
116
  return pulumi.get(self, "path")
118
117
 
119
118
  @path.setter
120
- def path(self, value: pulumi.Input[builtins.str]):
119
+ def path(self, value: pulumi.Input[_builtins.str]):
121
120
  pulumi.set(self, "path", value)
122
121
 
123
- @property
122
+ @_builtins.property
124
123
  @pulumi.getter
125
- def type(self) -> pulumi.Input[builtins.str]:
124
+ def type(self) -> pulumi.Input[_builtins.str]:
126
125
  """
127
126
  Type of the backend, such as "aws"
128
127
  """
129
128
  return pulumi.get(self, "type")
130
129
 
131
130
  @type.setter
132
- def type(self, value: pulumi.Input[builtins.str]):
131
+ def type(self, value: pulumi.Input[_builtins.str]):
133
132
  pulumi.set(self, "type", value)
134
133
 
135
- @property
134
+ @_builtins.property
136
135
  @pulumi.getter(name="allowedManagedKeys")
137
- def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
136
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
138
137
  """
139
138
  Set of managed key registry entry names that the mount in question is allowed to access
140
139
  """
141
140
  return pulumi.get(self, "allowed_managed_keys")
142
141
 
143
142
  @allowed_managed_keys.setter
144
- def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
143
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
145
144
  pulumi.set(self, "allowed_managed_keys", value)
146
145
 
147
- @property
146
+ @_builtins.property
148
147
  @pulumi.getter(name="allowedResponseHeaders")
149
- def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
148
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
150
149
  """
151
150
  List of headers to allow, allowing a plugin to include
152
151
  them in the response.
@@ -154,48 +153,48 @@ class MountArgs:
154
153
  return pulumi.get(self, "allowed_response_headers")
155
154
 
156
155
  @allowed_response_headers.setter
157
- def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
156
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
158
157
  pulumi.set(self, "allowed_response_headers", value)
159
158
 
160
- @property
159
+ @_builtins.property
161
160
  @pulumi.getter(name="auditNonHmacRequestKeys")
162
- def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
161
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
163
162
  """
164
163
  Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
165
164
  """
166
165
  return pulumi.get(self, "audit_non_hmac_request_keys")
167
166
 
168
167
  @audit_non_hmac_request_keys.setter
169
- def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
168
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
170
169
  pulumi.set(self, "audit_non_hmac_request_keys", value)
171
170
 
172
- @property
171
+ @_builtins.property
173
172
  @pulumi.getter(name="auditNonHmacResponseKeys")
174
- def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
173
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
175
174
  """
176
175
  Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
177
176
  """
178
177
  return pulumi.get(self, "audit_non_hmac_response_keys")
179
178
 
180
179
  @audit_non_hmac_response_keys.setter
181
- def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
180
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
182
181
  pulumi.set(self, "audit_non_hmac_response_keys", value)
183
182
 
184
- @property
183
+ @_builtins.property
185
184
  @pulumi.getter(name="defaultLeaseTtlSeconds")
186
- def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
185
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
187
186
  """
188
187
  Default lease duration for tokens and secrets in seconds
189
188
  """
190
189
  return pulumi.get(self, "default_lease_ttl_seconds")
191
190
 
192
191
  @default_lease_ttl_seconds.setter
193
- def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
192
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
194
193
  pulumi.set(self, "default_lease_ttl_seconds", value)
195
194
 
196
- @property
195
+ @_builtins.property
197
196
  @pulumi.getter(name="delegatedAuthAccessors")
198
- def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
197
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
199
198
  """
200
199
  List of allowed authentication mount accessors the
201
200
  backend can request delegated authentication for.
@@ -203,36 +202,36 @@ class MountArgs:
203
202
  return pulumi.get(self, "delegated_auth_accessors")
204
203
 
205
204
  @delegated_auth_accessors.setter
206
- def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
205
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
207
206
  pulumi.set(self, "delegated_auth_accessors", value)
208
207
 
209
- @property
208
+ @_builtins.property
210
209
  @pulumi.getter
211
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
210
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
212
211
  """
213
212
  Human-friendly description of the mount
214
213
  """
215
214
  return pulumi.get(self, "description")
216
215
 
217
216
  @description.setter
218
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
217
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
219
218
  pulumi.set(self, "description", value)
220
219
 
221
- @property
220
+ @_builtins.property
222
221
  @pulumi.getter(name="externalEntropyAccess")
223
- def external_entropy_access(self) -> Optional[pulumi.Input[builtins.bool]]:
222
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
224
223
  """
225
224
  Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
226
225
  """
227
226
  return pulumi.get(self, "external_entropy_access")
228
227
 
229
228
  @external_entropy_access.setter
230
- def external_entropy_access(self, value: Optional[pulumi.Input[builtins.bool]]):
229
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
231
230
  pulumi.set(self, "external_entropy_access", value)
232
231
 
233
- @property
232
+ @_builtins.property
234
233
  @pulumi.getter(name="identityTokenKey")
235
- def identity_token_key(self) -> Optional[pulumi.Input[builtins.str]]:
234
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
236
235
  """
237
236
  The key to use for signing plugin workload identity tokens. If
238
237
  not provided, this will default to Vault's OIDC default key.
@@ -240,12 +239,12 @@ class MountArgs:
240
239
  return pulumi.get(self, "identity_token_key")
241
240
 
242
241
  @identity_token_key.setter
243
- def identity_token_key(self, value: Optional[pulumi.Input[builtins.str]]):
242
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
244
243
  pulumi.set(self, "identity_token_key", value)
245
244
 
246
- @property
245
+ @_builtins.property
247
246
  @pulumi.getter(name="listingVisibility")
248
- def listing_visibility(self) -> Optional[pulumi.Input[builtins.str]]:
247
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
249
248
  """
250
249
  Specifies whether to show this mount in the UI-specific
251
250
  listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
@@ -253,36 +252,36 @@ class MountArgs:
253
252
  return pulumi.get(self, "listing_visibility")
254
253
 
255
254
  @listing_visibility.setter
256
- def listing_visibility(self, value: Optional[pulumi.Input[builtins.str]]):
255
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
257
256
  pulumi.set(self, "listing_visibility", value)
258
257
 
259
- @property
258
+ @_builtins.property
260
259
  @pulumi.getter
261
- def local(self) -> Optional[pulumi.Input[builtins.bool]]:
260
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
262
261
  """
263
262
  Boolean flag that can be explicitly set to true to enforce local mount in HA environment
264
263
  """
265
264
  return pulumi.get(self, "local")
266
265
 
267
266
  @local.setter
268
- def local(self, value: Optional[pulumi.Input[builtins.bool]]):
267
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
269
268
  pulumi.set(self, "local", value)
270
269
 
271
- @property
270
+ @_builtins.property
272
271
  @pulumi.getter(name="maxLeaseTtlSeconds")
273
- def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
272
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
274
273
  """
275
274
  Maximum possible lease duration for tokens and secrets in seconds
276
275
  """
277
276
  return pulumi.get(self, "max_lease_ttl_seconds")
278
277
 
279
278
  @max_lease_ttl_seconds.setter
280
- def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
279
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
281
280
  pulumi.set(self, "max_lease_ttl_seconds", value)
282
281
 
283
- @property
282
+ @_builtins.property
284
283
  @pulumi.getter
285
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
284
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
286
285
  """
287
286
  The namespace to provision the resource in.
288
287
  The value should not contain leading or trailing forward slashes.
@@ -292,24 +291,24 @@ class MountArgs:
292
291
  return pulumi.get(self, "namespace")
293
292
 
294
293
  @namespace.setter
295
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
294
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
296
295
  pulumi.set(self, "namespace", value)
297
296
 
298
- @property
297
+ @_builtins.property
299
298
  @pulumi.getter
300
- def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
299
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
301
300
  """
302
301
  Specifies mount type specific options that are passed to the backend
303
302
  """
304
303
  return pulumi.get(self, "options")
305
304
 
306
305
  @options.setter
307
- def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
306
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
308
307
  pulumi.set(self, "options", value)
309
308
 
310
- @property
309
+ @_builtins.property
311
310
  @pulumi.getter(name="passthroughRequestHeaders")
312
- def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
311
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
313
312
  """
314
313
  List of headers to allow and pass from the request to
315
314
  the plugin.
@@ -317,12 +316,12 @@ class MountArgs:
317
316
  return pulumi.get(self, "passthrough_request_headers")
318
317
 
319
318
  @passthrough_request_headers.setter
320
- def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
319
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
321
320
  pulumi.set(self, "passthrough_request_headers", value)
322
321
 
323
- @property
322
+ @_builtins.property
324
323
  @pulumi.getter(name="pluginVersion")
325
- def plugin_version(self) -> Optional[pulumi.Input[builtins.str]]:
324
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
326
325
  """
327
326
  Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
328
327
  If unspecified, the server will select any matching unversioned plugin that may have been
@@ -331,77 +330,77 @@ class MountArgs:
331
330
  return pulumi.get(self, "plugin_version")
332
331
 
333
332
  @plugin_version.setter
334
- def plugin_version(self, value: Optional[pulumi.Input[builtins.str]]):
333
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
335
334
  pulumi.set(self, "plugin_version", value)
336
335
 
337
- @property
336
+ @_builtins.property
338
337
  @pulumi.getter(name="sealWrap")
339
- def seal_wrap(self) -> Optional[pulumi.Input[builtins.bool]]:
338
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
340
339
  """
341
340
  Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
342
341
  """
343
342
  return pulumi.get(self, "seal_wrap")
344
343
 
345
344
  @seal_wrap.setter
346
- def seal_wrap(self, value: Optional[pulumi.Input[builtins.bool]]):
345
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
347
346
  pulumi.set(self, "seal_wrap", value)
348
347
 
349
348
 
350
349
  @pulumi.input_type
351
350
  class _MountState:
352
351
  def __init__(__self__, *,
353
- accessor: Optional[pulumi.Input[builtins.str]] = None,
354
- allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
355
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
356
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
357
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
358
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
359
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
360
- description: Optional[pulumi.Input[builtins.str]] = None,
361
- external_entropy_access: Optional[pulumi.Input[builtins.bool]] = None,
362
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
363
- listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
364
- local: Optional[pulumi.Input[builtins.bool]] = None,
365
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
366
- namespace: Optional[pulumi.Input[builtins.str]] = None,
367
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
368
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
369
- path: Optional[pulumi.Input[builtins.str]] = None,
370
- plugin_version: Optional[pulumi.Input[builtins.str]] = None,
371
- seal_wrap: Optional[pulumi.Input[builtins.bool]] = None,
372
- type: Optional[pulumi.Input[builtins.str]] = None):
352
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
353
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
354
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
355
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
356
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
357
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
358
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
359
+ description: Optional[pulumi.Input[_builtins.str]] = None,
360
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
361
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
362
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
363
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
364
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
365
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
366
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
367
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
368
+ path: Optional[pulumi.Input[_builtins.str]] = None,
369
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
370
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
371
+ type: Optional[pulumi.Input[_builtins.str]] = None):
373
372
  """
374
373
  Input properties used for looking up and filtering Mount resources.
375
- :param pulumi.Input[builtins.str] accessor: The accessor for this mount.
376
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
377
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_response_headers: List of headers to allow, allowing a plugin to include
374
+ :param pulumi.Input[_builtins.str] accessor: The accessor for this mount.
375
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
376
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow, allowing a plugin to include
378
377
  them in the response.
379
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
380
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
381
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
382
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] delegated_auth_accessors: List of allowed authentication mount accessors the
378
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
379
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
380
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
381
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of allowed authentication mount accessors the
383
382
  backend can request delegated authentication for.
384
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount
385
- :param pulumi.Input[builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
386
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens. If
383
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
384
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
385
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens. If
387
386
  not provided, this will default to Vault's OIDC default key.
388
- :param pulumi.Input[builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific
387
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific
389
388
  listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
390
- :param pulumi.Input[builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
391
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
392
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
389
+ :param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
390
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
391
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
393
392
  The value should not contain leading or trailing forward slashes.
394
393
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
395
394
  *Available only for Vault Enterprise*.
396
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] options: Specifies mount type specific options that are passed to the backend
397
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to
395
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
396
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to
398
397
  the plugin.
399
- :param pulumi.Input[builtins.str] path: Where the secret backend will be mounted
400
- :param pulumi.Input[builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
398
+ :param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
399
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
401
400
  If unspecified, the server will select any matching unversioned plugin that may have been
402
401
  registered, the latest versioned plugin registered, or a built-in plugin in that order of precedence.
403
- :param pulumi.Input[builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
404
- :param pulumi.Input[builtins.str] type: Type of the backend, such as "aws"
402
+ :param pulumi.Input[_builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
403
+ :param pulumi.Input[_builtins.str] type: Type of the backend, such as "aws"
405
404
  """
406
405
  if accessor is not None:
407
406
  pulumi.set(__self__, "accessor", accessor)
@@ -444,33 +443,33 @@ class _MountState:
444
443
  if type is not None:
445
444
  pulumi.set(__self__, "type", type)
446
445
 
447
- @property
446
+ @_builtins.property
448
447
  @pulumi.getter
449
- def accessor(self) -> Optional[pulumi.Input[builtins.str]]:
448
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
450
449
  """
451
450
  The accessor for this mount.
452
451
  """
453
452
  return pulumi.get(self, "accessor")
454
453
 
455
454
  @accessor.setter
456
- def accessor(self, value: Optional[pulumi.Input[builtins.str]]):
455
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
457
456
  pulumi.set(self, "accessor", value)
458
457
 
459
- @property
458
+ @_builtins.property
460
459
  @pulumi.getter(name="allowedManagedKeys")
461
- def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
460
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
462
461
  """
463
462
  Set of managed key registry entry names that the mount in question is allowed to access
464
463
  """
465
464
  return pulumi.get(self, "allowed_managed_keys")
466
465
 
467
466
  @allowed_managed_keys.setter
468
- def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
467
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
469
468
  pulumi.set(self, "allowed_managed_keys", value)
470
469
 
471
- @property
470
+ @_builtins.property
472
471
  @pulumi.getter(name="allowedResponseHeaders")
473
- def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
472
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
474
473
  """
475
474
  List of headers to allow, allowing a plugin to include
476
475
  them in the response.
@@ -478,48 +477,48 @@ class _MountState:
478
477
  return pulumi.get(self, "allowed_response_headers")
479
478
 
480
479
  @allowed_response_headers.setter
481
- def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
480
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
482
481
  pulumi.set(self, "allowed_response_headers", value)
483
482
 
484
- @property
483
+ @_builtins.property
485
484
  @pulumi.getter(name="auditNonHmacRequestKeys")
486
- def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
485
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
487
486
  """
488
487
  Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
489
488
  """
490
489
  return pulumi.get(self, "audit_non_hmac_request_keys")
491
490
 
492
491
  @audit_non_hmac_request_keys.setter
493
- def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
492
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
494
493
  pulumi.set(self, "audit_non_hmac_request_keys", value)
495
494
 
496
- @property
495
+ @_builtins.property
497
496
  @pulumi.getter(name="auditNonHmacResponseKeys")
498
- def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
497
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
499
498
  """
500
499
  Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
501
500
  """
502
501
  return pulumi.get(self, "audit_non_hmac_response_keys")
503
502
 
504
503
  @audit_non_hmac_response_keys.setter
505
- def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
504
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
506
505
  pulumi.set(self, "audit_non_hmac_response_keys", value)
507
506
 
508
- @property
507
+ @_builtins.property
509
508
  @pulumi.getter(name="defaultLeaseTtlSeconds")
510
- def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
509
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
511
510
  """
512
511
  Default lease duration for tokens and secrets in seconds
513
512
  """
514
513
  return pulumi.get(self, "default_lease_ttl_seconds")
515
514
 
516
515
  @default_lease_ttl_seconds.setter
517
- def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
516
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
518
517
  pulumi.set(self, "default_lease_ttl_seconds", value)
519
518
 
520
- @property
519
+ @_builtins.property
521
520
  @pulumi.getter(name="delegatedAuthAccessors")
522
- def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
521
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
523
522
  """
524
523
  List of allowed authentication mount accessors the
525
524
  backend can request delegated authentication for.
@@ -527,36 +526,36 @@ class _MountState:
527
526
  return pulumi.get(self, "delegated_auth_accessors")
528
527
 
529
528
  @delegated_auth_accessors.setter
530
- def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
529
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
531
530
  pulumi.set(self, "delegated_auth_accessors", value)
532
531
 
533
- @property
532
+ @_builtins.property
534
533
  @pulumi.getter
535
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
534
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
536
535
  """
537
536
  Human-friendly description of the mount
538
537
  """
539
538
  return pulumi.get(self, "description")
540
539
 
541
540
  @description.setter
542
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
541
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
543
542
  pulumi.set(self, "description", value)
544
543
 
545
- @property
544
+ @_builtins.property
546
545
  @pulumi.getter(name="externalEntropyAccess")
547
- def external_entropy_access(self) -> Optional[pulumi.Input[builtins.bool]]:
546
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
548
547
  """
549
548
  Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
550
549
  """
551
550
  return pulumi.get(self, "external_entropy_access")
552
551
 
553
552
  @external_entropy_access.setter
554
- def external_entropy_access(self, value: Optional[pulumi.Input[builtins.bool]]):
553
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
555
554
  pulumi.set(self, "external_entropy_access", value)
556
555
 
557
- @property
556
+ @_builtins.property
558
557
  @pulumi.getter(name="identityTokenKey")
559
- def identity_token_key(self) -> Optional[pulumi.Input[builtins.str]]:
558
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
560
559
  """
561
560
  The key to use for signing plugin workload identity tokens. If
562
561
  not provided, this will default to Vault's OIDC default key.
@@ -564,12 +563,12 @@ class _MountState:
564
563
  return pulumi.get(self, "identity_token_key")
565
564
 
566
565
  @identity_token_key.setter
567
- def identity_token_key(self, value: Optional[pulumi.Input[builtins.str]]):
566
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
568
567
  pulumi.set(self, "identity_token_key", value)
569
568
 
570
- @property
569
+ @_builtins.property
571
570
  @pulumi.getter(name="listingVisibility")
572
- def listing_visibility(self) -> Optional[pulumi.Input[builtins.str]]:
571
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
573
572
  """
574
573
  Specifies whether to show this mount in the UI-specific
575
574
  listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
@@ -577,36 +576,36 @@ class _MountState:
577
576
  return pulumi.get(self, "listing_visibility")
578
577
 
579
578
  @listing_visibility.setter
580
- def listing_visibility(self, value: Optional[pulumi.Input[builtins.str]]):
579
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
581
580
  pulumi.set(self, "listing_visibility", value)
582
581
 
583
- @property
582
+ @_builtins.property
584
583
  @pulumi.getter
585
- def local(self) -> Optional[pulumi.Input[builtins.bool]]:
584
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
586
585
  """
587
586
  Boolean flag that can be explicitly set to true to enforce local mount in HA environment
588
587
  """
589
588
  return pulumi.get(self, "local")
590
589
 
591
590
  @local.setter
592
- def local(self, value: Optional[pulumi.Input[builtins.bool]]):
591
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
593
592
  pulumi.set(self, "local", value)
594
593
 
595
- @property
594
+ @_builtins.property
596
595
  @pulumi.getter(name="maxLeaseTtlSeconds")
597
- def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
596
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
598
597
  """
599
598
  Maximum possible lease duration for tokens and secrets in seconds
600
599
  """
601
600
  return pulumi.get(self, "max_lease_ttl_seconds")
602
601
 
603
602
  @max_lease_ttl_seconds.setter
604
- def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
603
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
605
604
  pulumi.set(self, "max_lease_ttl_seconds", value)
606
605
 
607
- @property
606
+ @_builtins.property
608
607
  @pulumi.getter
609
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
608
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
610
609
  """
611
610
  The namespace to provision the resource in.
612
611
  The value should not contain leading or trailing forward slashes.
@@ -616,24 +615,24 @@ class _MountState:
616
615
  return pulumi.get(self, "namespace")
617
616
 
618
617
  @namespace.setter
619
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
618
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
620
619
  pulumi.set(self, "namespace", value)
621
620
 
622
- @property
621
+ @_builtins.property
623
622
  @pulumi.getter
624
- def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
623
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
625
624
  """
626
625
  Specifies mount type specific options that are passed to the backend
627
626
  """
628
627
  return pulumi.get(self, "options")
629
628
 
630
629
  @options.setter
631
- def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
630
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
632
631
  pulumi.set(self, "options", value)
633
632
 
634
- @property
633
+ @_builtins.property
635
634
  @pulumi.getter(name="passthroughRequestHeaders")
636
- def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
635
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
637
636
  """
638
637
  List of headers to allow and pass from the request to
639
638
  the plugin.
@@ -641,24 +640,24 @@ class _MountState:
641
640
  return pulumi.get(self, "passthrough_request_headers")
642
641
 
643
642
  @passthrough_request_headers.setter
644
- def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
643
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
645
644
  pulumi.set(self, "passthrough_request_headers", value)
646
645
 
647
- @property
646
+ @_builtins.property
648
647
  @pulumi.getter
649
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
648
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
650
649
  """
651
650
  Where the secret backend will be mounted
652
651
  """
653
652
  return pulumi.get(self, "path")
654
653
 
655
654
  @path.setter
656
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
655
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
657
656
  pulumi.set(self, "path", value)
658
657
 
659
- @property
658
+ @_builtins.property
660
659
  @pulumi.getter(name="pluginVersion")
661
- def plugin_version(self) -> Optional[pulumi.Input[builtins.str]]:
660
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
662
661
  """
663
662
  Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
664
663
  If unspecified, the server will select any matching unversioned plugin that may have been
@@ -667,31 +666,31 @@ class _MountState:
667
666
  return pulumi.get(self, "plugin_version")
668
667
 
669
668
  @plugin_version.setter
670
- def plugin_version(self, value: Optional[pulumi.Input[builtins.str]]):
669
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
671
670
  pulumi.set(self, "plugin_version", value)
672
671
 
673
- @property
672
+ @_builtins.property
674
673
  @pulumi.getter(name="sealWrap")
675
- def seal_wrap(self) -> Optional[pulumi.Input[builtins.bool]]:
674
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
676
675
  """
677
676
  Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
678
677
  """
679
678
  return pulumi.get(self, "seal_wrap")
680
679
 
681
680
  @seal_wrap.setter
682
- def seal_wrap(self, value: Optional[pulumi.Input[builtins.bool]]):
681
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
683
682
  pulumi.set(self, "seal_wrap", value)
684
683
 
685
- @property
684
+ @_builtins.property
686
685
  @pulumi.getter
687
- def type(self) -> Optional[pulumi.Input[builtins.str]]:
686
+ def type(self) -> Optional[pulumi.Input[_builtins.str]]:
688
687
  """
689
688
  Type of the backend, such as "aws"
690
689
  """
691
690
  return pulumi.get(self, "type")
692
691
 
693
692
  @type.setter
694
- def type(self, value: Optional[pulumi.Input[builtins.str]]):
693
+ def type(self, value: Optional[pulumi.Input[_builtins.str]]):
695
694
  pulumi.set(self, "type", value)
696
695
 
697
696
 
@@ -701,25 +700,25 @@ class Mount(pulumi.CustomResource):
701
700
  def __init__(__self__,
702
701
  resource_name: str,
703
702
  opts: Optional[pulumi.ResourceOptions] = None,
704
- allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
705
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
706
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
707
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
708
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
709
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
710
- description: Optional[pulumi.Input[builtins.str]] = None,
711
- external_entropy_access: Optional[pulumi.Input[builtins.bool]] = None,
712
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
713
- listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
714
- local: Optional[pulumi.Input[builtins.bool]] = None,
715
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
716
- namespace: Optional[pulumi.Input[builtins.str]] = None,
717
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
718
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
719
- path: Optional[pulumi.Input[builtins.str]] = None,
720
- plugin_version: Optional[pulumi.Input[builtins.str]] = None,
721
- seal_wrap: Optional[pulumi.Input[builtins.bool]] = None,
722
- type: Optional[pulumi.Input[builtins.str]] = None,
703
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
704
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
705
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
706
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
707
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
708
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
709
+ description: Optional[pulumi.Input[_builtins.str]] = None,
710
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
711
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
712
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
713
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
714
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
715
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
716
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
717
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
718
+ path: Optional[pulumi.Input[_builtins.str]] = None,
719
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
720
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
721
+ type: Optional[pulumi.Input[_builtins.str]] = None,
723
722
  __props__=None):
724
723
  """
725
724
  This resource enables a new secrets engine at the given path.
@@ -785,35 +784,35 @@ class Mount(pulumi.CustomResource):
785
784
 
786
785
  :param str resource_name: The name of the resource.
787
786
  :param pulumi.ResourceOptions opts: Options for the resource.
788
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
789
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_response_headers: List of headers to allow, allowing a plugin to include
787
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
788
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow, allowing a plugin to include
790
789
  them in the response.
791
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
792
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
793
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
794
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] delegated_auth_accessors: List of allowed authentication mount accessors the
790
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
791
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
792
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
793
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of allowed authentication mount accessors the
795
794
  backend can request delegated authentication for.
796
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount
797
- :param pulumi.Input[builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
798
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens. If
795
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
796
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
797
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens. If
799
798
  not provided, this will default to Vault's OIDC default key.
800
- :param pulumi.Input[builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific
799
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific
801
800
  listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
802
- :param pulumi.Input[builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
803
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
804
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
801
+ :param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
802
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
803
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
805
804
  The value should not contain leading or trailing forward slashes.
806
805
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
807
806
  *Available only for Vault Enterprise*.
808
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] options: Specifies mount type specific options that are passed to the backend
809
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to
807
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
808
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to
810
809
  the plugin.
811
- :param pulumi.Input[builtins.str] path: Where the secret backend will be mounted
812
- :param pulumi.Input[builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
810
+ :param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
811
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
813
812
  If unspecified, the server will select any matching unversioned plugin that may have been
814
813
  registered, the latest versioned plugin registered, or a built-in plugin in that order of precedence.
815
- :param pulumi.Input[builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
816
- :param pulumi.Input[builtins.str] type: Type of the backend, such as "aws"
814
+ :param pulumi.Input[_builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
815
+ :param pulumi.Input[_builtins.str] type: Type of the backend, such as "aws"
817
816
  """
818
817
  ...
819
818
  @overload
@@ -898,25 +897,25 @@ class Mount(pulumi.CustomResource):
898
897
  def _internal_init(__self__,
899
898
  resource_name: str,
900
899
  opts: Optional[pulumi.ResourceOptions] = None,
901
- allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
902
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
903
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
904
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
905
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
906
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
907
- description: Optional[pulumi.Input[builtins.str]] = None,
908
- external_entropy_access: Optional[pulumi.Input[builtins.bool]] = None,
909
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
910
- listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
911
- local: Optional[pulumi.Input[builtins.bool]] = None,
912
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
913
- namespace: Optional[pulumi.Input[builtins.str]] = None,
914
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
915
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
916
- path: Optional[pulumi.Input[builtins.str]] = None,
917
- plugin_version: Optional[pulumi.Input[builtins.str]] = None,
918
- seal_wrap: Optional[pulumi.Input[builtins.bool]] = None,
919
- type: Optional[pulumi.Input[builtins.str]] = None,
900
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
901
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
902
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
903
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
904
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
905
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
906
+ description: Optional[pulumi.Input[_builtins.str]] = None,
907
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
908
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
909
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
910
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
911
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
912
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
913
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
914
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
915
+ path: Optional[pulumi.Input[_builtins.str]] = None,
916
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
917
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
918
+ type: Optional[pulumi.Input[_builtins.str]] = None,
920
919
  __props__=None):
921
920
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
922
921
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -960,26 +959,26 @@ class Mount(pulumi.CustomResource):
960
959
  def get(resource_name: str,
961
960
  id: pulumi.Input[str],
962
961
  opts: Optional[pulumi.ResourceOptions] = None,
963
- accessor: Optional[pulumi.Input[builtins.str]] = None,
964
- allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
965
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
966
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
967
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
968
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
969
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
970
- description: Optional[pulumi.Input[builtins.str]] = None,
971
- external_entropy_access: Optional[pulumi.Input[builtins.bool]] = None,
972
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
973
- listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
974
- local: Optional[pulumi.Input[builtins.bool]] = None,
975
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
976
- namespace: Optional[pulumi.Input[builtins.str]] = None,
977
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
978
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
979
- path: Optional[pulumi.Input[builtins.str]] = None,
980
- plugin_version: Optional[pulumi.Input[builtins.str]] = None,
981
- seal_wrap: Optional[pulumi.Input[builtins.bool]] = None,
982
- type: Optional[pulumi.Input[builtins.str]] = None) -> 'Mount':
962
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
963
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
964
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
965
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
966
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
967
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
968
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
969
+ description: Optional[pulumi.Input[_builtins.str]] = None,
970
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
971
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
972
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
973
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
974
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
975
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
976
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
977
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
978
+ path: Optional[pulumi.Input[_builtins.str]] = None,
979
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
980
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
981
+ type: Optional[pulumi.Input[_builtins.str]] = None) -> 'Mount':
983
982
  """
984
983
  Get an existing Mount resource's state with the given name, id, and optional extra
985
984
  properties used to qualify the lookup.
@@ -987,36 +986,36 @@ class Mount(pulumi.CustomResource):
987
986
  :param str resource_name: The unique name of the resulting resource.
988
987
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
989
988
  :param pulumi.ResourceOptions opts: Options for the resource.
990
- :param pulumi.Input[builtins.str] accessor: The accessor for this mount.
991
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
992
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_response_headers: List of headers to allow, allowing a plugin to include
989
+ :param pulumi.Input[_builtins.str] accessor: The accessor for this mount.
990
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
991
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow, allowing a plugin to include
993
992
  them in the response.
994
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
995
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
996
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
997
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] delegated_auth_accessors: List of allowed authentication mount accessors the
993
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
994
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
995
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
996
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of allowed authentication mount accessors the
998
997
  backend can request delegated authentication for.
999
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount
1000
- :param pulumi.Input[builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
1001
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens. If
998
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
999
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
1000
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens. If
1002
1001
  not provided, this will default to Vault's OIDC default key.
1003
- :param pulumi.Input[builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific
1002
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific
1004
1003
  listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
1005
- :param pulumi.Input[builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
1006
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
1007
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
1004
+ :param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
1005
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
1006
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
1008
1007
  The value should not contain leading or trailing forward slashes.
1009
1008
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1010
1009
  *Available only for Vault Enterprise*.
1011
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1012
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to
1010
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1011
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to
1013
1012
  the plugin.
1014
- :param pulumi.Input[builtins.str] path: Where the secret backend will be mounted
1015
- :param pulumi.Input[builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
1013
+ :param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
1014
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
1016
1015
  If unspecified, the server will select any matching unversioned plugin that may have been
1017
1016
  registered, the latest versioned plugin registered, or a built-in plugin in that order of precedence.
1018
- :param pulumi.Input[builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1019
- :param pulumi.Input[builtins.str] type: Type of the backend, such as "aws"
1017
+ :param pulumi.Input[_builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1018
+ :param pulumi.Input[_builtins.str] type: Type of the backend, such as "aws"
1020
1019
  """
1021
1020
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
1022
1021
 
@@ -1044,117 +1043,117 @@ class Mount(pulumi.CustomResource):
1044
1043
  __props__.__dict__["type"] = type
1045
1044
  return Mount(resource_name, opts=opts, __props__=__props__)
1046
1045
 
1047
- @property
1046
+ @_builtins.property
1048
1047
  @pulumi.getter
1049
- def accessor(self) -> pulumi.Output[builtins.str]:
1048
+ def accessor(self) -> pulumi.Output[_builtins.str]:
1050
1049
  """
1051
1050
  The accessor for this mount.
1052
1051
  """
1053
1052
  return pulumi.get(self, "accessor")
1054
1053
 
1055
- @property
1054
+ @_builtins.property
1056
1055
  @pulumi.getter(name="allowedManagedKeys")
1057
- def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1056
+ def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1058
1057
  """
1059
1058
  Set of managed key registry entry names that the mount in question is allowed to access
1060
1059
  """
1061
1060
  return pulumi.get(self, "allowed_managed_keys")
1062
1061
 
1063
- @property
1062
+ @_builtins.property
1064
1063
  @pulumi.getter(name="allowedResponseHeaders")
1065
- def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1064
+ def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1066
1065
  """
1067
1066
  List of headers to allow, allowing a plugin to include
1068
1067
  them in the response.
1069
1068
  """
1070
1069
  return pulumi.get(self, "allowed_response_headers")
1071
1070
 
1072
- @property
1071
+ @_builtins.property
1073
1072
  @pulumi.getter(name="auditNonHmacRequestKeys")
1074
- def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[builtins.str]]:
1073
+ def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1075
1074
  """
1076
1075
  Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1077
1076
  """
1078
1077
  return pulumi.get(self, "audit_non_hmac_request_keys")
1079
1078
 
1080
- @property
1079
+ @_builtins.property
1081
1080
  @pulumi.getter(name="auditNonHmacResponseKeys")
1082
- def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[builtins.str]]:
1081
+ def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1083
1082
  """
1084
1083
  Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1085
1084
  """
1086
1085
  return pulumi.get(self, "audit_non_hmac_response_keys")
1087
1086
 
1088
- @property
1087
+ @_builtins.property
1089
1088
  @pulumi.getter(name="defaultLeaseTtlSeconds")
1090
- def default_lease_ttl_seconds(self) -> pulumi.Output[builtins.int]:
1089
+ def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1091
1090
  """
1092
1091
  Default lease duration for tokens and secrets in seconds
1093
1092
  """
1094
1093
  return pulumi.get(self, "default_lease_ttl_seconds")
1095
1094
 
1096
- @property
1095
+ @_builtins.property
1097
1096
  @pulumi.getter(name="delegatedAuthAccessors")
1098
- def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1097
+ def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1099
1098
  """
1100
1099
  List of allowed authentication mount accessors the
1101
1100
  backend can request delegated authentication for.
1102
1101
  """
1103
1102
  return pulumi.get(self, "delegated_auth_accessors")
1104
1103
 
1105
- @property
1104
+ @_builtins.property
1106
1105
  @pulumi.getter
1107
- def description(self) -> pulumi.Output[Optional[builtins.str]]:
1106
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
1108
1107
  """
1109
1108
  Human-friendly description of the mount
1110
1109
  """
1111
1110
  return pulumi.get(self, "description")
1112
1111
 
1113
- @property
1112
+ @_builtins.property
1114
1113
  @pulumi.getter(name="externalEntropyAccess")
1115
- def external_entropy_access(self) -> pulumi.Output[Optional[builtins.bool]]:
1114
+ def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
1116
1115
  """
1117
1116
  Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
1118
1117
  """
1119
1118
  return pulumi.get(self, "external_entropy_access")
1120
1119
 
1121
- @property
1120
+ @_builtins.property
1122
1121
  @pulumi.getter(name="identityTokenKey")
1123
- def identity_token_key(self) -> pulumi.Output[Optional[builtins.str]]:
1122
+ def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
1124
1123
  """
1125
1124
  The key to use for signing plugin workload identity tokens. If
1126
1125
  not provided, this will default to Vault's OIDC default key.
1127
1126
  """
1128
1127
  return pulumi.get(self, "identity_token_key")
1129
1128
 
1130
- @property
1129
+ @_builtins.property
1131
1130
  @pulumi.getter(name="listingVisibility")
1132
- def listing_visibility(self) -> pulumi.Output[Optional[builtins.str]]:
1131
+ def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
1133
1132
  """
1134
1133
  Specifies whether to show this mount in the UI-specific
1135
1134
  listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
1136
1135
  """
1137
1136
  return pulumi.get(self, "listing_visibility")
1138
1137
 
1139
- @property
1138
+ @_builtins.property
1140
1139
  @pulumi.getter
1141
- def local(self) -> pulumi.Output[Optional[builtins.bool]]:
1140
+ def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
1142
1141
  """
1143
1142
  Boolean flag that can be explicitly set to true to enforce local mount in HA environment
1144
1143
  """
1145
1144
  return pulumi.get(self, "local")
1146
1145
 
1147
- @property
1146
+ @_builtins.property
1148
1147
  @pulumi.getter(name="maxLeaseTtlSeconds")
1149
- def max_lease_ttl_seconds(self) -> pulumi.Output[builtins.int]:
1148
+ def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1150
1149
  """
1151
1150
  Maximum possible lease duration for tokens and secrets in seconds
1152
1151
  """
1153
1152
  return pulumi.get(self, "max_lease_ttl_seconds")
1154
1153
 
1155
- @property
1154
+ @_builtins.property
1156
1155
  @pulumi.getter
1157
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
1156
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
1158
1157
  """
1159
1158
  The namespace to provision the resource in.
1160
1159
  The value should not contain leading or trailing forward slashes.
@@ -1163,34 +1162,34 @@ class Mount(pulumi.CustomResource):
1163
1162
  """
1164
1163
  return pulumi.get(self, "namespace")
1165
1164
 
1166
- @property
1165
+ @_builtins.property
1167
1166
  @pulumi.getter
1168
- def options(self) -> pulumi.Output[Optional[Mapping[str, builtins.str]]]:
1167
+ def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
1169
1168
  """
1170
1169
  Specifies mount type specific options that are passed to the backend
1171
1170
  """
1172
1171
  return pulumi.get(self, "options")
1173
1172
 
1174
- @property
1173
+ @_builtins.property
1175
1174
  @pulumi.getter(name="passthroughRequestHeaders")
1176
- def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1175
+ def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1177
1176
  """
1178
1177
  List of headers to allow and pass from the request to
1179
1178
  the plugin.
1180
1179
  """
1181
1180
  return pulumi.get(self, "passthrough_request_headers")
1182
1181
 
1183
- @property
1182
+ @_builtins.property
1184
1183
  @pulumi.getter
1185
- def path(self) -> pulumi.Output[builtins.str]:
1184
+ def path(self) -> pulumi.Output[_builtins.str]:
1186
1185
  """
1187
1186
  Where the secret backend will be mounted
1188
1187
  """
1189
1188
  return pulumi.get(self, "path")
1190
1189
 
1191
- @property
1190
+ @_builtins.property
1192
1191
  @pulumi.getter(name="pluginVersion")
1193
- def plugin_version(self) -> pulumi.Output[Optional[builtins.str]]:
1192
+ def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
1194
1193
  """
1195
1194
  Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
1196
1195
  If unspecified, the server will select any matching unversioned plugin that may have been
@@ -1198,17 +1197,17 @@ class Mount(pulumi.CustomResource):
1198
1197
  """
1199
1198
  return pulumi.get(self, "plugin_version")
1200
1199
 
1201
- @property
1200
+ @_builtins.property
1202
1201
  @pulumi.getter(name="sealWrap")
1203
- def seal_wrap(self) -> pulumi.Output[builtins.bool]:
1202
+ def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
1204
1203
  """
1205
1204
  Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1206
1205
  """
1207
1206
  return pulumi.get(self, "seal_wrap")
1208
1207
 
1209
- @property
1208
+ @_builtins.property
1210
1209
  @pulumi.getter
1211
- def type(self) -> pulumi.Output[builtins.str]:
1210
+ def type(self) -> pulumi.Output[_builtins.str]:
1212
1211
  """
1213
1212
  Type of the backend, such as "aws"
1214
1213
  """