pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -22,24 +21,24 @@ __all__ = ['SecretsMountArgs', 'SecretsMount']
22
21
  @pulumi.input_type
23
22
  class SecretsMountArgs:
24
23
  def __init__(__self__, *,
25
- path: pulumi.Input[builtins.str],
26
- allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
27
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
28
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
29
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
24
+ path: pulumi.Input[_builtins.str],
25
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
28
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
30
29
  cassandras: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]]] = None,
31
30
  couchbases: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]]] = None,
32
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
33
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
34
- description: Optional[pulumi.Input[builtins.str]] = None,
31
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
32
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
33
+ description: Optional[pulumi.Input[_builtins.str]] = None,
35
34
  elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]]] = None,
36
- external_entropy_access: Optional[pulumi.Input[builtins.bool]] = None,
35
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
37
36
  hanas: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]]] = None,
38
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
37
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
39
38
  influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]] = None,
40
- listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
41
- local: Optional[pulumi.Input[builtins.bool]] = None,
42
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
39
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
40
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
41
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
43
42
  mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]]] = None,
44
43
  mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]]] = None,
45
44
  mssqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMssqlArgs']]]] = None,
@@ -47,44 +46,44 @@ class SecretsMountArgs:
47
46
  mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlLegacyArgs']]]] = None,
48
47
  mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]] = None,
49
48
  mysqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]] = None,
50
- namespace: Optional[pulumi.Input[builtins.str]] = None,
51
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
49
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
50
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
52
51
  oracles: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]] = None,
53
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
54
- plugin_version: Optional[pulumi.Input[builtins.str]] = None,
52
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
53
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
55
54
  postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]]] = None,
56
55
  redis: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]]] = None,
57
56
  redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedisElasticachArgs']]]] = None,
58
57
  redshifts: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]]] = None,
59
- seal_wrap: Optional[pulumi.Input[builtins.bool]] = None,
58
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
60
59
  snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountSnowflakeArgs']]]] = None):
61
60
  """
62
61
  The set of arguments for constructing a SecretsMount resource.
63
- :param pulumi.Input[builtins.str] path: Where the secret backend will be mounted
64
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
62
+ :param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
63
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
65
64
 
66
65
  The following arguments are common to all database engines:
67
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
68
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
69
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
66
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
67
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
68
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
70
69
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]] cassandras: A nested block containing configuration options for Cassandra connections.
71
70
  *See Configuration Options for more info*
72
71
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]] couchbases: A nested block containing configuration options for Couchbase connections.
73
72
  *See Configuration Options for more info*
74
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
75
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
76
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount
73
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
74
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
75
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
77
76
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]] elasticsearches: A nested block containing configuration options for Elasticsearch connections.
78
77
  *See Configuration Options for more info*
79
- :param pulumi.Input[builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
78
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
80
79
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]] hanas: A nested block containing configuration options for SAP HanaDB connections.
81
80
  *See Configuration Options for more info*
82
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
81
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
83
82
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]] influxdbs: A nested block containing configuration options for InfluxDB connections.
84
83
  *See Configuration Options for more info*
85
- :param pulumi.Input[builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
86
- :param pulumi.Input[builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
87
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
84
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
85
+ :param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
86
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
88
87
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
89
88
  *See Configuration Options for more info*
90
89
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]] mongodbs: A nested block containing configuration options for MongoDB connections.
@@ -99,12 +98,12 @@ class SecretsMountArgs:
99
98
  *See Configuration Options for more info*
100
99
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]] mysqls: A nested block containing configuration options for MySQL connections.
101
100
  *See Configuration Options for more info*
102
- :param pulumi.Input[builtins.str] namespace: Target namespace. (requires Enterprise)
103
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] options: Specifies mount type specific options that are passed to the backend
101
+ :param pulumi.Input[_builtins.str] namespace: Target namespace. (requires Enterprise)
102
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
104
103
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]] oracles: A nested block containing configuration options for Oracle connections.
105
104
  *See Configuration Options for more info*
106
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
107
- :param pulumi.Input[builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
105
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
106
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
108
107
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]] postgresqls: A nested block containing configuration options for PostgreSQL connections.
109
108
  *See Configuration Options for more info*
110
109
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]] redis: A nested block containing configuration options for Redis connections.
@@ -113,7 +112,7 @@ class SecretsMountArgs:
113
112
  *See Configuration Options for more info*
114
113
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]] redshifts: A nested block containing configuration options for AWS Redshift connections.
115
114
  *See Configuration Options for more info*
116
- :param pulumi.Input[builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
115
+ :param pulumi.Input[_builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
117
116
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountSnowflakeArgs']]] snowflakes: A nested block containing configuration options for Snowflake connections.
118
117
  *See Configuration Options for more info*
119
118
  """
@@ -189,21 +188,21 @@ class SecretsMountArgs:
189
188
  if snowflakes is not None:
190
189
  pulumi.set(__self__, "snowflakes", snowflakes)
191
190
 
192
- @property
191
+ @_builtins.property
193
192
  @pulumi.getter
194
- def path(self) -> pulumi.Input[builtins.str]:
193
+ def path(self) -> pulumi.Input[_builtins.str]:
195
194
  """
196
195
  Where the secret backend will be mounted
197
196
  """
198
197
  return pulumi.get(self, "path")
199
198
 
200
199
  @path.setter
201
- def path(self, value: pulumi.Input[builtins.str]):
200
+ def path(self, value: pulumi.Input[_builtins.str]):
202
201
  pulumi.set(self, "path", value)
203
202
 
204
- @property
203
+ @_builtins.property
205
204
  @pulumi.getter(name="allowedManagedKeys")
206
- def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
205
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
207
206
  """
208
207
  Set of managed key registry entry names that the mount in question is allowed to access
209
208
 
@@ -212,46 +211,46 @@ class SecretsMountArgs:
212
211
  return pulumi.get(self, "allowed_managed_keys")
213
212
 
214
213
  @allowed_managed_keys.setter
215
- def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
214
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
216
215
  pulumi.set(self, "allowed_managed_keys", value)
217
216
 
218
- @property
217
+ @_builtins.property
219
218
  @pulumi.getter(name="allowedResponseHeaders")
220
- def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
219
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
221
220
  """
222
221
  List of headers to allow and pass from the request to the plugin
223
222
  """
224
223
  return pulumi.get(self, "allowed_response_headers")
225
224
 
226
225
  @allowed_response_headers.setter
227
- def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
226
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
228
227
  pulumi.set(self, "allowed_response_headers", value)
229
228
 
230
- @property
229
+ @_builtins.property
231
230
  @pulumi.getter(name="auditNonHmacRequestKeys")
232
- def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
231
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
233
232
  """
234
233
  Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
235
234
  """
236
235
  return pulumi.get(self, "audit_non_hmac_request_keys")
237
236
 
238
237
  @audit_non_hmac_request_keys.setter
239
- def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
238
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
240
239
  pulumi.set(self, "audit_non_hmac_request_keys", value)
241
240
 
242
- @property
241
+ @_builtins.property
243
242
  @pulumi.getter(name="auditNonHmacResponseKeys")
244
- def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
243
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
245
244
  """
246
245
  Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
247
246
  """
248
247
  return pulumi.get(self, "audit_non_hmac_response_keys")
249
248
 
250
249
  @audit_non_hmac_response_keys.setter
251
- def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
250
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
252
251
  pulumi.set(self, "audit_non_hmac_response_keys", value)
253
252
 
254
- @property
253
+ @_builtins.property
255
254
  @pulumi.getter
256
255
  def cassandras(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]]]:
257
256
  """
@@ -264,7 +263,7 @@ class SecretsMountArgs:
264
263
  def cassandras(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]]]):
265
264
  pulumi.set(self, "cassandras", value)
266
265
 
267
- @property
266
+ @_builtins.property
268
267
  @pulumi.getter
269
268
  def couchbases(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]]]:
270
269
  """
@@ -277,43 +276,43 @@ class SecretsMountArgs:
277
276
  def couchbases(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]]]):
278
277
  pulumi.set(self, "couchbases", value)
279
278
 
280
- @property
279
+ @_builtins.property
281
280
  @pulumi.getter(name="defaultLeaseTtlSeconds")
282
- def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
281
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
283
282
  """
284
283
  Default lease duration for tokens and secrets in seconds
285
284
  """
286
285
  return pulumi.get(self, "default_lease_ttl_seconds")
287
286
 
288
287
  @default_lease_ttl_seconds.setter
289
- def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
288
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
290
289
  pulumi.set(self, "default_lease_ttl_seconds", value)
291
290
 
292
- @property
291
+ @_builtins.property
293
292
  @pulumi.getter(name="delegatedAuthAccessors")
294
- def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
293
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
295
294
  """
296
295
  List of headers to allow and pass from the request to the plugin
297
296
  """
298
297
  return pulumi.get(self, "delegated_auth_accessors")
299
298
 
300
299
  @delegated_auth_accessors.setter
301
- def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
300
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
302
301
  pulumi.set(self, "delegated_auth_accessors", value)
303
302
 
304
- @property
303
+ @_builtins.property
305
304
  @pulumi.getter
306
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
305
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
307
306
  """
308
307
  Human-friendly description of the mount
309
308
  """
310
309
  return pulumi.get(self, "description")
311
310
 
312
311
  @description.setter
313
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
312
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
314
313
  pulumi.set(self, "description", value)
315
314
 
316
- @property
315
+ @_builtins.property
317
316
  @pulumi.getter
318
317
  def elasticsearches(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]]]:
319
318
  """
@@ -326,19 +325,19 @@ class SecretsMountArgs:
326
325
  def elasticsearches(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]]]):
327
326
  pulumi.set(self, "elasticsearches", value)
328
327
 
329
- @property
328
+ @_builtins.property
330
329
  @pulumi.getter(name="externalEntropyAccess")
331
- def external_entropy_access(self) -> Optional[pulumi.Input[builtins.bool]]:
330
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
332
331
  """
333
332
  Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
334
333
  """
335
334
  return pulumi.get(self, "external_entropy_access")
336
335
 
337
336
  @external_entropy_access.setter
338
- def external_entropy_access(self, value: Optional[pulumi.Input[builtins.bool]]):
337
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
339
338
  pulumi.set(self, "external_entropy_access", value)
340
339
 
341
- @property
340
+ @_builtins.property
342
341
  @pulumi.getter
343
342
  def hanas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]]]:
344
343
  """
@@ -351,19 +350,19 @@ class SecretsMountArgs:
351
350
  def hanas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]]]):
352
351
  pulumi.set(self, "hanas", value)
353
352
 
354
- @property
353
+ @_builtins.property
355
354
  @pulumi.getter(name="identityTokenKey")
356
- def identity_token_key(self) -> Optional[pulumi.Input[builtins.str]]:
355
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
357
356
  """
358
357
  The key to use for signing plugin workload identity tokens
359
358
  """
360
359
  return pulumi.get(self, "identity_token_key")
361
360
 
362
361
  @identity_token_key.setter
363
- def identity_token_key(self, value: Optional[pulumi.Input[builtins.str]]):
362
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
364
363
  pulumi.set(self, "identity_token_key", value)
365
364
 
366
- @property
365
+ @_builtins.property
367
366
  @pulumi.getter
368
367
  def influxdbs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]]:
369
368
  """
@@ -376,43 +375,43 @@ class SecretsMountArgs:
376
375
  def influxdbs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]]):
377
376
  pulumi.set(self, "influxdbs", value)
378
377
 
379
- @property
378
+ @_builtins.property
380
379
  @pulumi.getter(name="listingVisibility")
381
- def listing_visibility(self) -> Optional[pulumi.Input[builtins.str]]:
380
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
382
381
  """
383
382
  Specifies whether to show this mount in the UI-specific listing endpoint
384
383
  """
385
384
  return pulumi.get(self, "listing_visibility")
386
385
 
387
386
  @listing_visibility.setter
388
- def listing_visibility(self, value: Optional[pulumi.Input[builtins.str]]):
387
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
389
388
  pulumi.set(self, "listing_visibility", value)
390
389
 
391
- @property
390
+ @_builtins.property
392
391
  @pulumi.getter
393
- def local(self) -> Optional[pulumi.Input[builtins.bool]]:
392
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
394
393
  """
395
394
  Boolean flag that can be explicitly set to true to enforce local mount in HA environment
396
395
  """
397
396
  return pulumi.get(self, "local")
398
397
 
399
398
  @local.setter
400
- def local(self, value: Optional[pulumi.Input[builtins.bool]]):
399
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
401
400
  pulumi.set(self, "local", value)
402
401
 
403
- @property
402
+ @_builtins.property
404
403
  @pulumi.getter(name="maxLeaseTtlSeconds")
405
- def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
404
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
406
405
  """
407
406
  Maximum possible lease duration for tokens and secrets in seconds
408
407
  """
409
408
  return pulumi.get(self, "max_lease_ttl_seconds")
410
409
 
411
410
  @max_lease_ttl_seconds.setter
412
- def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
411
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
413
412
  pulumi.set(self, "max_lease_ttl_seconds", value)
414
413
 
415
- @property
414
+ @_builtins.property
416
415
  @pulumi.getter
417
416
  def mongodbatlas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]]]:
418
417
  """
@@ -425,7 +424,7 @@ class SecretsMountArgs:
425
424
  def mongodbatlas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]]]):
426
425
  pulumi.set(self, "mongodbatlas", value)
427
426
 
428
- @property
427
+ @_builtins.property
429
428
  @pulumi.getter
430
429
  def mongodbs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]]]:
431
430
  """
@@ -438,7 +437,7 @@ class SecretsMountArgs:
438
437
  def mongodbs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]]]):
439
438
  pulumi.set(self, "mongodbs", value)
440
439
 
441
- @property
440
+ @_builtins.property
442
441
  @pulumi.getter
443
442
  def mssqls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMssqlArgs']]]]:
444
443
  """
@@ -451,7 +450,7 @@ class SecretsMountArgs:
451
450
  def mssqls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMssqlArgs']]]]):
452
451
  pulumi.set(self, "mssqls", value)
453
452
 
454
- @property
453
+ @_builtins.property
455
454
  @pulumi.getter(name="mysqlAuroras")
456
455
  def mysql_auroras(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlAuroraArgs']]]]:
457
456
  """
@@ -464,7 +463,7 @@ class SecretsMountArgs:
464
463
  def mysql_auroras(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlAuroraArgs']]]]):
465
464
  pulumi.set(self, "mysql_auroras", value)
466
465
 
467
- @property
466
+ @_builtins.property
468
467
  @pulumi.getter(name="mysqlLegacies")
469
468
  def mysql_legacies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlLegacyArgs']]]]:
470
469
  """
@@ -477,7 +476,7 @@ class SecretsMountArgs:
477
476
  def mysql_legacies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlLegacyArgs']]]]):
478
477
  pulumi.set(self, "mysql_legacies", value)
479
478
 
480
- @property
479
+ @_builtins.property
481
480
  @pulumi.getter(name="mysqlRds")
482
481
  def mysql_rds(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]]:
483
482
  """
@@ -490,7 +489,7 @@ class SecretsMountArgs:
490
489
  def mysql_rds(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]]):
491
490
  pulumi.set(self, "mysql_rds", value)
492
491
 
493
- @property
492
+ @_builtins.property
494
493
  @pulumi.getter
495
494
  def mysqls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]]:
496
495
  """
@@ -503,31 +502,31 @@ class SecretsMountArgs:
503
502
  def mysqls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]]):
504
503
  pulumi.set(self, "mysqls", value)
505
504
 
506
- @property
505
+ @_builtins.property
507
506
  @pulumi.getter
508
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
507
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
509
508
  """
510
509
  Target namespace. (requires Enterprise)
511
510
  """
512
511
  return pulumi.get(self, "namespace")
513
512
 
514
513
  @namespace.setter
515
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
514
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
516
515
  pulumi.set(self, "namespace", value)
517
516
 
518
- @property
517
+ @_builtins.property
519
518
  @pulumi.getter
520
- def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
519
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
521
520
  """
522
521
  Specifies mount type specific options that are passed to the backend
523
522
  """
524
523
  return pulumi.get(self, "options")
525
524
 
526
525
  @options.setter
527
- def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
526
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
528
527
  pulumi.set(self, "options", value)
529
528
 
530
- @property
529
+ @_builtins.property
531
530
  @pulumi.getter
532
531
  def oracles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]]:
533
532
  """
@@ -540,31 +539,31 @@ class SecretsMountArgs:
540
539
  def oracles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]]):
541
540
  pulumi.set(self, "oracles", value)
542
541
 
543
- @property
542
+ @_builtins.property
544
543
  @pulumi.getter(name="passthroughRequestHeaders")
545
- def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
544
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
546
545
  """
547
546
  List of headers to allow and pass from the request to the plugin
548
547
  """
549
548
  return pulumi.get(self, "passthrough_request_headers")
550
549
 
551
550
  @passthrough_request_headers.setter
552
- def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
551
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
553
552
  pulumi.set(self, "passthrough_request_headers", value)
554
553
 
555
- @property
554
+ @_builtins.property
556
555
  @pulumi.getter(name="pluginVersion")
557
- def plugin_version(self) -> Optional[pulumi.Input[builtins.str]]:
556
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
558
557
  """
559
558
  Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
560
559
  """
561
560
  return pulumi.get(self, "plugin_version")
562
561
 
563
562
  @plugin_version.setter
564
- def plugin_version(self, value: Optional[pulumi.Input[builtins.str]]):
563
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
565
564
  pulumi.set(self, "plugin_version", value)
566
565
 
567
- @property
566
+ @_builtins.property
568
567
  @pulumi.getter
569
568
  def postgresqls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]]]:
570
569
  """
@@ -577,7 +576,7 @@ class SecretsMountArgs:
577
576
  def postgresqls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]]]):
578
577
  pulumi.set(self, "postgresqls", value)
579
578
 
580
- @property
579
+ @_builtins.property
581
580
  @pulumi.getter
582
581
  def redis(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]]]:
583
582
  """
@@ -590,7 +589,7 @@ class SecretsMountArgs:
590
589
  def redis(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]]]):
591
590
  pulumi.set(self, "redis", value)
592
591
 
593
- @property
592
+ @_builtins.property
594
593
  @pulumi.getter(name="redisElasticaches")
595
594
  def redis_elasticaches(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedisElasticachArgs']]]]:
596
595
  """
@@ -603,7 +602,7 @@ class SecretsMountArgs:
603
602
  def redis_elasticaches(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedisElasticachArgs']]]]):
604
603
  pulumi.set(self, "redis_elasticaches", value)
605
604
 
606
- @property
605
+ @_builtins.property
607
606
  @pulumi.getter
608
607
  def redshifts(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]]]:
609
608
  """
@@ -616,19 +615,19 @@ class SecretsMountArgs:
616
615
  def redshifts(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]]]):
617
616
  pulumi.set(self, "redshifts", value)
618
617
 
619
- @property
618
+ @_builtins.property
620
619
  @pulumi.getter(name="sealWrap")
621
- def seal_wrap(self) -> Optional[pulumi.Input[builtins.bool]]:
620
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
622
621
  """
623
622
  Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
624
623
  """
625
624
  return pulumi.get(self, "seal_wrap")
626
625
 
627
626
  @seal_wrap.setter
628
- def seal_wrap(self, value: Optional[pulumi.Input[builtins.bool]]):
627
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
629
628
  pulumi.set(self, "seal_wrap", value)
630
629
 
631
- @property
630
+ @_builtins.property
632
631
  @pulumi.getter
633
632
  def snowflakes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountSnowflakeArgs']]]]:
634
633
  """
@@ -645,25 +644,25 @@ class SecretsMountArgs:
645
644
  @pulumi.input_type
646
645
  class _SecretsMountState:
647
646
  def __init__(__self__, *,
648
- accessor: Optional[pulumi.Input[builtins.str]] = None,
649
- allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
650
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
651
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
652
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
647
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
648
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
649
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
650
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
651
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
653
652
  cassandras: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]]] = None,
654
653
  couchbases: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]]] = None,
655
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
656
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
657
- description: Optional[pulumi.Input[builtins.str]] = None,
654
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
655
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
656
+ description: Optional[pulumi.Input[_builtins.str]] = None,
658
657
  elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]]] = None,
659
- engine_count: Optional[pulumi.Input[builtins.int]] = None,
660
- external_entropy_access: Optional[pulumi.Input[builtins.bool]] = None,
658
+ engine_count: Optional[pulumi.Input[_builtins.int]] = None,
659
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
661
660
  hanas: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]]] = None,
662
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
661
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
663
662
  influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]] = None,
664
- listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
665
- local: Optional[pulumi.Input[builtins.bool]] = None,
666
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
663
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
664
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
665
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
667
666
  mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]]] = None,
668
667
  mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]]] = None,
669
668
  mssqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMssqlArgs']]]] = None,
@@ -671,46 +670,46 @@ class _SecretsMountState:
671
670
  mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlLegacyArgs']]]] = None,
672
671
  mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]] = None,
673
672
  mysqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]] = None,
674
- namespace: Optional[pulumi.Input[builtins.str]] = None,
675
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
673
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
674
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
676
675
  oracles: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]] = None,
677
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
678
- path: Optional[pulumi.Input[builtins.str]] = None,
679
- plugin_version: Optional[pulumi.Input[builtins.str]] = None,
676
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
677
+ path: Optional[pulumi.Input[_builtins.str]] = None,
678
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
680
679
  postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]]] = None,
681
680
  redis: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]]] = None,
682
681
  redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedisElasticachArgs']]]] = None,
683
682
  redshifts: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]]] = None,
684
- seal_wrap: Optional[pulumi.Input[builtins.bool]] = None,
683
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
685
684
  snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountSnowflakeArgs']]]] = None):
686
685
  """
687
686
  Input properties used for looking up and filtering SecretsMount resources.
688
- :param pulumi.Input[builtins.str] accessor: Accessor of the mount
689
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
687
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
688
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
690
689
 
691
690
  The following arguments are common to all database engines:
692
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
693
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
694
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
691
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
692
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
693
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
695
694
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]] cassandras: A nested block containing configuration options for Cassandra connections.
696
695
  *See Configuration Options for more info*
697
696
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]] couchbases: A nested block containing configuration options for Couchbase connections.
698
697
  *See Configuration Options for more info*
699
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
700
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
701
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount
698
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
699
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
700
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
702
701
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]] elasticsearches: A nested block containing configuration options for Elasticsearch connections.
703
702
  *See Configuration Options for more info*
704
- :param pulumi.Input[builtins.int] engine_count: The total number of database secrets engines configured.
705
- :param pulumi.Input[builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
703
+ :param pulumi.Input[_builtins.int] engine_count: The total number of database secrets engines configured.
704
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
706
705
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]] hanas: A nested block containing configuration options for SAP HanaDB connections.
707
706
  *See Configuration Options for more info*
708
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
707
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
709
708
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]] influxdbs: A nested block containing configuration options for InfluxDB connections.
710
709
  *See Configuration Options for more info*
711
- :param pulumi.Input[builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
712
- :param pulumi.Input[builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
713
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
710
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
711
+ :param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
712
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
714
713
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
715
714
  *See Configuration Options for more info*
716
715
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]] mongodbs: A nested block containing configuration options for MongoDB connections.
@@ -725,13 +724,13 @@ class _SecretsMountState:
725
724
  *See Configuration Options for more info*
726
725
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]] mysqls: A nested block containing configuration options for MySQL connections.
727
726
  *See Configuration Options for more info*
728
- :param pulumi.Input[builtins.str] namespace: Target namespace. (requires Enterprise)
729
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] options: Specifies mount type specific options that are passed to the backend
727
+ :param pulumi.Input[_builtins.str] namespace: Target namespace. (requires Enterprise)
728
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
730
729
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]] oracles: A nested block containing configuration options for Oracle connections.
731
730
  *See Configuration Options for more info*
732
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
733
- :param pulumi.Input[builtins.str] path: Where the secret backend will be mounted
734
- :param pulumi.Input[builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
731
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
732
+ :param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
733
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
735
734
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]] postgresqls: A nested block containing configuration options for PostgreSQL connections.
736
735
  *See Configuration Options for more info*
737
736
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]] redis: A nested block containing configuration options for Redis connections.
@@ -740,7 +739,7 @@ class _SecretsMountState:
740
739
  *See Configuration Options for more info*
741
740
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]] redshifts: A nested block containing configuration options for AWS Redshift connections.
742
741
  *See Configuration Options for more info*
743
- :param pulumi.Input[builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
742
+ :param pulumi.Input[_builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
744
743
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountSnowflakeArgs']]] snowflakes: A nested block containing configuration options for Snowflake connections.
745
744
  *See Configuration Options for more info*
746
745
  """
@@ -821,21 +820,21 @@ class _SecretsMountState:
821
820
  if snowflakes is not None:
822
821
  pulumi.set(__self__, "snowflakes", snowflakes)
823
822
 
824
- @property
823
+ @_builtins.property
825
824
  @pulumi.getter
826
- def accessor(self) -> Optional[pulumi.Input[builtins.str]]:
825
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
827
826
  """
828
827
  Accessor of the mount
829
828
  """
830
829
  return pulumi.get(self, "accessor")
831
830
 
832
831
  @accessor.setter
833
- def accessor(self, value: Optional[pulumi.Input[builtins.str]]):
832
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
834
833
  pulumi.set(self, "accessor", value)
835
834
 
836
- @property
835
+ @_builtins.property
837
836
  @pulumi.getter(name="allowedManagedKeys")
838
- def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
837
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
839
838
  """
840
839
  Set of managed key registry entry names that the mount in question is allowed to access
841
840
 
@@ -844,46 +843,46 @@ class _SecretsMountState:
844
843
  return pulumi.get(self, "allowed_managed_keys")
845
844
 
846
845
  @allowed_managed_keys.setter
847
- def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
846
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
848
847
  pulumi.set(self, "allowed_managed_keys", value)
849
848
 
850
- @property
849
+ @_builtins.property
851
850
  @pulumi.getter(name="allowedResponseHeaders")
852
- def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
851
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
853
852
  """
854
853
  List of headers to allow and pass from the request to the plugin
855
854
  """
856
855
  return pulumi.get(self, "allowed_response_headers")
857
856
 
858
857
  @allowed_response_headers.setter
859
- def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
858
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
860
859
  pulumi.set(self, "allowed_response_headers", value)
861
860
 
862
- @property
861
+ @_builtins.property
863
862
  @pulumi.getter(name="auditNonHmacRequestKeys")
864
- def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
863
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
865
864
  """
866
865
  Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
867
866
  """
868
867
  return pulumi.get(self, "audit_non_hmac_request_keys")
869
868
 
870
869
  @audit_non_hmac_request_keys.setter
871
- def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
870
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
872
871
  pulumi.set(self, "audit_non_hmac_request_keys", value)
873
872
 
874
- @property
873
+ @_builtins.property
875
874
  @pulumi.getter(name="auditNonHmacResponseKeys")
876
- def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
875
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
877
876
  """
878
877
  Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
879
878
  """
880
879
  return pulumi.get(self, "audit_non_hmac_response_keys")
881
880
 
882
881
  @audit_non_hmac_response_keys.setter
883
- def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
882
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
884
883
  pulumi.set(self, "audit_non_hmac_response_keys", value)
885
884
 
886
- @property
885
+ @_builtins.property
887
886
  @pulumi.getter
888
887
  def cassandras(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]]]:
889
888
  """
@@ -896,7 +895,7 @@ class _SecretsMountState:
896
895
  def cassandras(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]]]):
897
896
  pulumi.set(self, "cassandras", value)
898
897
 
899
- @property
898
+ @_builtins.property
900
899
  @pulumi.getter
901
900
  def couchbases(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]]]:
902
901
  """
@@ -909,43 +908,43 @@ class _SecretsMountState:
909
908
  def couchbases(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]]]):
910
909
  pulumi.set(self, "couchbases", value)
911
910
 
912
- @property
911
+ @_builtins.property
913
912
  @pulumi.getter(name="defaultLeaseTtlSeconds")
914
- def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
913
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
915
914
  """
916
915
  Default lease duration for tokens and secrets in seconds
917
916
  """
918
917
  return pulumi.get(self, "default_lease_ttl_seconds")
919
918
 
920
919
  @default_lease_ttl_seconds.setter
921
- def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
920
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
922
921
  pulumi.set(self, "default_lease_ttl_seconds", value)
923
922
 
924
- @property
923
+ @_builtins.property
925
924
  @pulumi.getter(name="delegatedAuthAccessors")
926
- def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
925
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
927
926
  """
928
927
  List of headers to allow and pass from the request to the plugin
929
928
  """
930
929
  return pulumi.get(self, "delegated_auth_accessors")
931
930
 
932
931
  @delegated_auth_accessors.setter
933
- def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
932
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
934
933
  pulumi.set(self, "delegated_auth_accessors", value)
935
934
 
936
- @property
935
+ @_builtins.property
937
936
  @pulumi.getter
938
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
937
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
939
938
  """
940
939
  Human-friendly description of the mount
941
940
  """
942
941
  return pulumi.get(self, "description")
943
942
 
944
943
  @description.setter
945
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
944
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
946
945
  pulumi.set(self, "description", value)
947
946
 
948
- @property
947
+ @_builtins.property
949
948
  @pulumi.getter
950
949
  def elasticsearches(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]]]:
951
950
  """
@@ -958,31 +957,31 @@ class _SecretsMountState:
958
957
  def elasticsearches(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]]]):
959
958
  pulumi.set(self, "elasticsearches", value)
960
959
 
961
- @property
960
+ @_builtins.property
962
961
  @pulumi.getter(name="engineCount")
963
- def engine_count(self) -> Optional[pulumi.Input[builtins.int]]:
962
+ def engine_count(self) -> Optional[pulumi.Input[_builtins.int]]:
964
963
  """
965
964
  The total number of database secrets engines configured.
966
965
  """
967
966
  return pulumi.get(self, "engine_count")
968
967
 
969
968
  @engine_count.setter
970
- def engine_count(self, value: Optional[pulumi.Input[builtins.int]]):
969
+ def engine_count(self, value: Optional[pulumi.Input[_builtins.int]]):
971
970
  pulumi.set(self, "engine_count", value)
972
971
 
973
- @property
972
+ @_builtins.property
974
973
  @pulumi.getter(name="externalEntropyAccess")
975
- def external_entropy_access(self) -> Optional[pulumi.Input[builtins.bool]]:
974
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
976
975
  """
977
976
  Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
978
977
  """
979
978
  return pulumi.get(self, "external_entropy_access")
980
979
 
981
980
  @external_entropy_access.setter
982
- def external_entropy_access(self, value: Optional[pulumi.Input[builtins.bool]]):
981
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
983
982
  pulumi.set(self, "external_entropy_access", value)
984
983
 
985
- @property
984
+ @_builtins.property
986
985
  @pulumi.getter
987
986
  def hanas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]]]:
988
987
  """
@@ -995,19 +994,19 @@ class _SecretsMountState:
995
994
  def hanas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]]]):
996
995
  pulumi.set(self, "hanas", value)
997
996
 
998
- @property
997
+ @_builtins.property
999
998
  @pulumi.getter(name="identityTokenKey")
1000
- def identity_token_key(self) -> Optional[pulumi.Input[builtins.str]]:
999
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
1001
1000
  """
1002
1001
  The key to use for signing plugin workload identity tokens
1003
1002
  """
1004
1003
  return pulumi.get(self, "identity_token_key")
1005
1004
 
1006
1005
  @identity_token_key.setter
1007
- def identity_token_key(self, value: Optional[pulumi.Input[builtins.str]]):
1006
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
1008
1007
  pulumi.set(self, "identity_token_key", value)
1009
1008
 
1010
- @property
1009
+ @_builtins.property
1011
1010
  @pulumi.getter
1012
1011
  def influxdbs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]]:
1013
1012
  """
@@ -1020,43 +1019,43 @@ class _SecretsMountState:
1020
1019
  def influxdbs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]]):
1021
1020
  pulumi.set(self, "influxdbs", value)
1022
1021
 
1023
- @property
1022
+ @_builtins.property
1024
1023
  @pulumi.getter(name="listingVisibility")
1025
- def listing_visibility(self) -> Optional[pulumi.Input[builtins.str]]:
1024
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
1026
1025
  """
1027
1026
  Specifies whether to show this mount in the UI-specific listing endpoint
1028
1027
  """
1029
1028
  return pulumi.get(self, "listing_visibility")
1030
1029
 
1031
1030
  @listing_visibility.setter
1032
- def listing_visibility(self, value: Optional[pulumi.Input[builtins.str]]):
1031
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
1033
1032
  pulumi.set(self, "listing_visibility", value)
1034
1033
 
1035
- @property
1034
+ @_builtins.property
1036
1035
  @pulumi.getter
1037
- def local(self) -> Optional[pulumi.Input[builtins.bool]]:
1036
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
1038
1037
  """
1039
1038
  Boolean flag that can be explicitly set to true to enforce local mount in HA environment
1040
1039
  """
1041
1040
  return pulumi.get(self, "local")
1042
1041
 
1043
1042
  @local.setter
1044
- def local(self, value: Optional[pulumi.Input[builtins.bool]]):
1043
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
1045
1044
  pulumi.set(self, "local", value)
1046
1045
 
1047
- @property
1046
+ @_builtins.property
1048
1047
  @pulumi.getter(name="maxLeaseTtlSeconds")
1049
- def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
1048
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
1050
1049
  """
1051
1050
  Maximum possible lease duration for tokens and secrets in seconds
1052
1051
  """
1053
1052
  return pulumi.get(self, "max_lease_ttl_seconds")
1054
1053
 
1055
1054
  @max_lease_ttl_seconds.setter
1056
- def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
1055
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
1057
1056
  pulumi.set(self, "max_lease_ttl_seconds", value)
1058
1057
 
1059
- @property
1058
+ @_builtins.property
1060
1059
  @pulumi.getter
1061
1060
  def mongodbatlas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]]]:
1062
1061
  """
@@ -1069,7 +1068,7 @@ class _SecretsMountState:
1069
1068
  def mongodbatlas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]]]):
1070
1069
  pulumi.set(self, "mongodbatlas", value)
1071
1070
 
1072
- @property
1071
+ @_builtins.property
1073
1072
  @pulumi.getter
1074
1073
  def mongodbs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]]]:
1075
1074
  """
@@ -1082,7 +1081,7 @@ class _SecretsMountState:
1082
1081
  def mongodbs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]]]):
1083
1082
  pulumi.set(self, "mongodbs", value)
1084
1083
 
1085
- @property
1084
+ @_builtins.property
1086
1085
  @pulumi.getter
1087
1086
  def mssqls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMssqlArgs']]]]:
1088
1087
  """
@@ -1095,7 +1094,7 @@ class _SecretsMountState:
1095
1094
  def mssqls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMssqlArgs']]]]):
1096
1095
  pulumi.set(self, "mssqls", value)
1097
1096
 
1098
- @property
1097
+ @_builtins.property
1099
1098
  @pulumi.getter(name="mysqlAuroras")
1100
1099
  def mysql_auroras(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlAuroraArgs']]]]:
1101
1100
  """
@@ -1108,7 +1107,7 @@ class _SecretsMountState:
1108
1107
  def mysql_auroras(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlAuroraArgs']]]]):
1109
1108
  pulumi.set(self, "mysql_auroras", value)
1110
1109
 
1111
- @property
1110
+ @_builtins.property
1112
1111
  @pulumi.getter(name="mysqlLegacies")
1113
1112
  def mysql_legacies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlLegacyArgs']]]]:
1114
1113
  """
@@ -1121,7 +1120,7 @@ class _SecretsMountState:
1121
1120
  def mysql_legacies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlLegacyArgs']]]]):
1122
1121
  pulumi.set(self, "mysql_legacies", value)
1123
1122
 
1124
- @property
1123
+ @_builtins.property
1125
1124
  @pulumi.getter(name="mysqlRds")
1126
1125
  def mysql_rds(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]]:
1127
1126
  """
@@ -1134,7 +1133,7 @@ class _SecretsMountState:
1134
1133
  def mysql_rds(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]]):
1135
1134
  pulumi.set(self, "mysql_rds", value)
1136
1135
 
1137
- @property
1136
+ @_builtins.property
1138
1137
  @pulumi.getter
1139
1138
  def mysqls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]]:
1140
1139
  """
@@ -1147,31 +1146,31 @@ class _SecretsMountState:
1147
1146
  def mysqls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]]):
1148
1147
  pulumi.set(self, "mysqls", value)
1149
1148
 
1150
- @property
1149
+ @_builtins.property
1151
1150
  @pulumi.getter
1152
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
1151
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
1153
1152
  """
1154
1153
  Target namespace. (requires Enterprise)
1155
1154
  """
1156
1155
  return pulumi.get(self, "namespace")
1157
1156
 
1158
1157
  @namespace.setter
1159
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
1158
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
1160
1159
  pulumi.set(self, "namespace", value)
1161
1160
 
1162
- @property
1161
+ @_builtins.property
1163
1162
  @pulumi.getter
1164
- def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
1163
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
1165
1164
  """
1166
1165
  Specifies mount type specific options that are passed to the backend
1167
1166
  """
1168
1167
  return pulumi.get(self, "options")
1169
1168
 
1170
1169
  @options.setter
1171
- def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
1170
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
1172
1171
  pulumi.set(self, "options", value)
1173
1172
 
1174
- @property
1173
+ @_builtins.property
1175
1174
  @pulumi.getter
1176
1175
  def oracles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]]:
1177
1176
  """
@@ -1184,43 +1183,43 @@ class _SecretsMountState:
1184
1183
  def oracles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]]):
1185
1184
  pulumi.set(self, "oracles", value)
1186
1185
 
1187
- @property
1186
+ @_builtins.property
1188
1187
  @pulumi.getter(name="passthroughRequestHeaders")
1189
- def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
1188
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
1190
1189
  """
1191
1190
  List of headers to allow and pass from the request to the plugin
1192
1191
  """
1193
1192
  return pulumi.get(self, "passthrough_request_headers")
1194
1193
 
1195
1194
  @passthrough_request_headers.setter
1196
- def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
1195
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
1197
1196
  pulumi.set(self, "passthrough_request_headers", value)
1198
1197
 
1199
- @property
1198
+ @_builtins.property
1200
1199
  @pulumi.getter
1201
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
1200
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
1202
1201
  """
1203
1202
  Where the secret backend will be mounted
1204
1203
  """
1205
1204
  return pulumi.get(self, "path")
1206
1205
 
1207
1206
  @path.setter
1208
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
1207
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
1209
1208
  pulumi.set(self, "path", value)
1210
1209
 
1211
- @property
1210
+ @_builtins.property
1212
1211
  @pulumi.getter(name="pluginVersion")
1213
- def plugin_version(self) -> Optional[pulumi.Input[builtins.str]]:
1212
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
1214
1213
  """
1215
1214
  Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1216
1215
  """
1217
1216
  return pulumi.get(self, "plugin_version")
1218
1217
 
1219
1218
  @plugin_version.setter
1220
- def plugin_version(self, value: Optional[pulumi.Input[builtins.str]]):
1219
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
1221
1220
  pulumi.set(self, "plugin_version", value)
1222
1221
 
1223
- @property
1222
+ @_builtins.property
1224
1223
  @pulumi.getter
1225
1224
  def postgresqls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]]]:
1226
1225
  """
@@ -1233,7 +1232,7 @@ class _SecretsMountState:
1233
1232
  def postgresqls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]]]):
1234
1233
  pulumi.set(self, "postgresqls", value)
1235
1234
 
1236
- @property
1235
+ @_builtins.property
1237
1236
  @pulumi.getter
1238
1237
  def redis(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]]]:
1239
1238
  """
@@ -1246,7 +1245,7 @@ class _SecretsMountState:
1246
1245
  def redis(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]]]):
1247
1246
  pulumi.set(self, "redis", value)
1248
1247
 
1249
- @property
1248
+ @_builtins.property
1250
1249
  @pulumi.getter(name="redisElasticaches")
1251
1250
  def redis_elasticaches(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedisElasticachArgs']]]]:
1252
1251
  """
@@ -1259,7 +1258,7 @@ class _SecretsMountState:
1259
1258
  def redis_elasticaches(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedisElasticachArgs']]]]):
1260
1259
  pulumi.set(self, "redis_elasticaches", value)
1261
1260
 
1262
- @property
1261
+ @_builtins.property
1263
1262
  @pulumi.getter
1264
1263
  def redshifts(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]]]:
1265
1264
  """
@@ -1272,19 +1271,19 @@ class _SecretsMountState:
1272
1271
  def redshifts(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]]]):
1273
1272
  pulumi.set(self, "redshifts", value)
1274
1273
 
1275
- @property
1274
+ @_builtins.property
1276
1275
  @pulumi.getter(name="sealWrap")
1277
- def seal_wrap(self) -> Optional[pulumi.Input[builtins.bool]]:
1276
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
1278
1277
  """
1279
1278
  Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1280
1279
  """
1281
1280
  return pulumi.get(self, "seal_wrap")
1282
1281
 
1283
1282
  @seal_wrap.setter
1284
- def seal_wrap(self, value: Optional[pulumi.Input[builtins.bool]]):
1283
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
1285
1284
  pulumi.set(self, "seal_wrap", value)
1286
1285
 
1287
- @property
1286
+ @_builtins.property
1288
1287
  @pulumi.getter
1289
1288
  def snowflakes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountSnowflakeArgs']]]]:
1290
1289
  """
@@ -1304,23 +1303,23 @@ class SecretsMount(pulumi.CustomResource):
1304
1303
  def __init__(__self__,
1305
1304
  resource_name: str,
1306
1305
  opts: Optional[pulumi.ResourceOptions] = None,
1307
- allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1308
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1309
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1310
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1306
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1307
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1308
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1309
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1311
1310
  cassandras: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCassandraArgs', 'SecretsMountCassandraArgsDict']]]]] = None,
1312
1311
  couchbases: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCouchbaseArgs', 'SecretsMountCouchbaseArgsDict']]]]] = None,
1313
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
1314
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1315
- description: Optional[pulumi.Input[builtins.str]] = None,
1312
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1313
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1314
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1316
1315
  elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountElasticsearchArgs', 'SecretsMountElasticsearchArgsDict']]]]] = None,
1317
- external_entropy_access: Optional[pulumi.Input[builtins.bool]] = None,
1316
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1318
1317
  hanas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountHanaArgs', 'SecretsMountHanaArgsDict']]]]] = None,
1319
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
1318
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1320
1319
  influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountInfluxdbArgs', 'SecretsMountInfluxdbArgsDict']]]]] = None,
1321
- listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
1322
- local: Optional[pulumi.Input[builtins.bool]] = None,
1323
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
1320
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1321
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1322
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1324
1323
  mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbatlaArgs', 'SecretsMountMongodbatlaArgsDict']]]]] = None,
1325
1324
  mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbArgs', 'SecretsMountMongodbArgsDict']]]]] = None,
1326
1325
  mssqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMssqlArgs', 'SecretsMountMssqlArgsDict']]]]] = None,
@@ -1328,17 +1327,17 @@ class SecretsMount(pulumi.CustomResource):
1328
1327
  mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlLegacyArgs', 'SecretsMountMysqlLegacyArgsDict']]]]] = None,
1329
1328
  mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]]] = None,
1330
1329
  mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]]] = None,
1331
- namespace: Optional[pulumi.Input[builtins.str]] = None,
1332
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
1330
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1331
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1333
1332
  oracles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]]] = None,
1334
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1335
- path: Optional[pulumi.Input[builtins.str]] = None,
1336
- plugin_version: Optional[pulumi.Input[builtins.str]] = None,
1333
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1334
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1335
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1337
1336
  postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountPostgresqlArgs', 'SecretsMountPostgresqlArgsDict']]]]] = None,
1338
1337
  redis: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRediArgs', 'SecretsMountRediArgsDict']]]]] = None,
1339
1338
  redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedisElasticachArgs', 'SecretsMountRedisElasticachArgsDict']]]]] = None,
1340
1339
  redshifts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedshiftArgs', 'SecretsMountRedshiftArgsDict']]]]] = None,
1341
- seal_wrap: Optional[pulumi.Input[builtins.bool]] = None,
1340
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1342
1341
  snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountSnowflakeArgs', 'SecretsMountSnowflakeArgsDict']]]]] = None,
1343
1342
  __props__=None):
1344
1343
  """
@@ -1405,30 +1404,30 @@ class SecretsMount(pulumi.CustomResource):
1405
1404
 
1406
1405
  :param str resource_name: The name of the resource.
1407
1406
  :param pulumi.ResourceOptions opts: Options for the resource.
1408
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
1407
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
1409
1408
 
1410
1409
  The following arguments are common to all database engines:
1411
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1412
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1413
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1410
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1411
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1412
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1414
1413
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCassandraArgs', 'SecretsMountCassandraArgsDict']]]] cassandras: A nested block containing configuration options for Cassandra connections.
1415
1414
  *See Configuration Options for more info*
1416
1415
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCouchbaseArgs', 'SecretsMountCouchbaseArgsDict']]]] couchbases: A nested block containing configuration options for Couchbase connections.
1417
1416
  *See Configuration Options for more info*
1418
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
1419
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1420
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount
1417
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
1418
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1419
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
1421
1420
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountElasticsearchArgs', 'SecretsMountElasticsearchArgsDict']]]] elasticsearches: A nested block containing configuration options for Elasticsearch connections.
1422
1421
  *See Configuration Options for more info*
1423
- :param pulumi.Input[builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
1422
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
1424
1423
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountHanaArgs', 'SecretsMountHanaArgsDict']]]] hanas: A nested block containing configuration options for SAP HanaDB connections.
1425
1424
  *See Configuration Options for more info*
1426
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1425
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1427
1426
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountInfluxdbArgs', 'SecretsMountInfluxdbArgsDict']]]] influxdbs: A nested block containing configuration options for InfluxDB connections.
1428
1427
  *See Configuration Options for more info*
1429
- :param pulumi.Input[builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1430
- :param pulumi.Input[builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
1431
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
1428
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1429
+ :param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
1430
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
1432
1431
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbatlaArgs', 'SecretsMountMongodbatlaArgsDict']]]] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
1433
1432
  *See Configuration Options for more info*
1434
1433
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbArgs', 'SecretsMountMongodbArgsDict']]]] mongodbs: A nested block containing configuration options for MongoDB connections.
@@ -1443,13 +1442,13 @@ class SecretsMount(pulumi.CustomResource):
1443
1442
  *See Configuration Options for more info*
1444
1443
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]] mysqls: A nested block containing configuration options for MySQL connections.
1445
1444
  *See Configuration Options for more info*
1446
- :param pulumi.Input[builtins.str] namespace: Target namespace. (requires Enterprise)
1447
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1445
+ :param pulumi.Input[_builtins.str] namespace: Target namespace. (requires Enterprise)
1446
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1448
1447
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]] oracles: A nested block containing configuration options for Oracle connections.
1449
1448
  *See Configuration Options for more info*
1450
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1451
- :param pulumi.Input[builtins.str] path: Where the secret backend will be mounted
1452
- :param pulumi.Input[builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1449
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1450
+ :param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
1451
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1453
1452
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountPostgresqlArgs', 'SecretsMountPostgresqlArgsDict']]]] postgresqls: A nested block containing configuration options for PostgreSQL connections.
1454
1453
  *See Configuration Options for more info*
1455
1454
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRediArgs', 'SecretsMountRediArgsDict']]]] redis: A nested block containing configuration options for Redis connections.
@@ -1458,7 +1457,7 @@ class SecretsMount(pulumi.CustomResource):
1458
1457
  *See Configuration Options for more info*
1459
1458
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedshiftArgs', 'SecretsMountRedshiftArgsDict']]]] redshifts: A nested block containing configuration options for AWS Redshift connections.
1460
1459
  *See Configuration Options for more info*
1461
- :param pulumi.Input[builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1460
+ :param pulumi.Input[_builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1462
1461
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountSnowflakeArgs', 'SecretsMountSnowflakeArgsDict']]]] snowflakes: A nested block containing configuration options for Snowflake connections.
1463
1462
  *See Configuration Options for more info*
1464
1463
  """
@@ -1545,23 +1544,23 @@ class SecretsMount(pulumi.CustomResource):
1545
1544
  def _internal_init(__self__,
1546
1545
  resource_name: str,
1547
1546
  opts: Optional[pulumi.ResourceOptions] = None,
1548
- allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1549
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1550
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1551
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1547
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1548
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1549
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1550
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1552
1551
  cassandras: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCassandraArgs', 'SecretsMountCassandraArgsDict']]]]] = None,
1553
1552
  couchbases: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCouchbaseArgs', 'SecretsMountCouchbaseArgsDict']]]]] = None,
1554
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
1555
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1556
- description: Optional[pulumi.Input[builtins.str]] = None,
1553
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1554
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1555
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1557
1556
  elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountElasticsearchArgs', 'SecretsMountElasticsearchArgsDict']]]]] = None,
1558
- external_entropy_access: Optional[pulumi.Input[builtins.bool]] = None,
1557
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1559
1558
  hanas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountHanaArgs', 'SecretsMountHanaArgsDict']]]]] = None,
1560
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
1559
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1561
1560
  influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountInfluxdbArgs', 'SecretsMountInfluxdbArgsDict']]]]] = None,
1562
- listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
1563
- local: Optional[pulumi.Input[builtins.bool]] = None,
1564
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
1561
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1562
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1563
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1565
1564
  mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbatlaArgs', 'SecretsMountMongodbatlaArgsDict']]]]] = None,
1566
1565
  mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbArgs', 'SecretsMountMongodbArgsDict']]]]] = None,
1567
1566
  mssqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMssqlArgs', 'SecretsMountMssqlArgsDict']]]]] = None,
@@ -1569,17 +1568,17 @@ class SecretsMount(pulumi.CustomResource):
1569
1568
  mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlLegacyArgs', 'SecretsMountMysqlLegacyArgsDict']]]]] = None,
1570
1569
  mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]]] = None,
1571
1570
  mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]]] = None,
1572
- namespace: Optional[pulumi.Input[builtins.str]] = None,
1573
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
1571
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1572
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1574
1573
  oracles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]]] = None,
1575
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1576
- path: Optional[pulumi.Input[builtins.str]] = None,
1577
- plugin_version: Optional[pulumi.Input[builtins.str]] = None,
1574
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1575
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1576
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1578
1577
  postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountPostgresqlArgs', 'SecretsMountPostgresqlArgsDict']]]]] = None,
1579
1578
  redis: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRediArgs', 'SecretsMountRediArgsDict']]]]] = None,
1580
1579
  redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedisElasticachArgs', 'SecretsMountRedisElasticachArgsDict']]]]] = None,
1581
1580
  redshifts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedshiftArgs', 'SecretsMountRedshiftArgsDict']]]]] = None,
1582
- seal_wrap: Optional[pulumi.Input[builtins.bool]] = None,
1581
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1583
1582
  snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountSnowflakeArgs', 'SecretsMountSnowflakeArgsDict']]]]] = None,
1584
1583
  __props__=None):
1585
1584
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
@@ -1640,25 +1639,25 @@ class SecretsMount(pulumi.CustomResource):
1640
1639
  def get(resource_name: str,
1641
1640
  id: pulumi.Input[str],
1642
1641
  opts: Optional[pulumi.ResourceOptions] = None,
1643
- accessor: Optional[pulumi.Input[builtins.str]] = None,
1644
- allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1645
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1646
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1647
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1642
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
1643
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1644
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1645
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1646
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1648
1647
  cassandras: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCassandraArgs', 'SecretsMountCassandraArgsDict']]]]] = None,
1649
1648
  couchbases: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCouchbaseArgs', 'SecretsMountCouchbaseArgsDict']]]]] = None,
1650
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
1651
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1652
- description: Optional[pulumi.Input[builtins.str]] = None,
1649
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1650
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1651
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1653
1652
  elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountElasticsearchArgs', 'SecretsMountElasticsearchArgsDict']]]]] = None,
1654
- engine_count: Optional[pulumi.Input[builtins.int]] = None,
1655
- external_entropy_access: Optional[pulumi.Input[builtins.bool]] = None,
1653
+ engine_count: Optional[pulumi.Input[_builtins.int]] = None,
1654
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1656
1655
  hanas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountHanaArgs', 'SecretsMountHanaArgsDict']]]]] = None,
1657
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
1656
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1658
1657
  influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountInfluxdbArgs', 'SecretsMountInfluxdbArgsDict']]]]] = None,
1659
- listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
1660
- local: Optional[pulumi.Input[builtins.bool]] = None,
1661
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
1658
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1659
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1660
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1662
1661
  mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbatlaArgs', 'SecretsMountMongodbatlaArgsDict']]]]] = None,
1663
1662
  mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbArgs', 'SecretsMountMongodbArgsDict']]]]] = None,
1664
1663
  mssqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMssqlArgs', 'SecretsMountMssqlArgsDict']]]]] = None,
@@ -1666,17 +1665,17 @@ class SecretsMount(pulumi.CustomResource):
1666
1665
  mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlLegacyArgs', 'SecretsMountMysqlLegacyArgsDict']]]]] = None,
1667
1666
  mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]]] = None,
1668
1667
  mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]]] = None,
1669
- namespace: Optional[pulumi.Input[builtins.str]] = None,
1670
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
1668
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1669
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1671
1670
  oracles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]]] = None,
1672
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1673
- path: Optional[pulumi.Input[builtins.str]] = None,
1674
- plugin_version: Optional[pulumi.Input[builtins.str]] = None,
1671
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1672
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1673
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1675
1674
  postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountPostgresqlArgs', 'SecretsMountPostgresqlArgsDict']]]]] = None,
1676
1675
  redis: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRediArgs', 'SecretsMountRediArgsDict']]]]] = None,
1677
1676
  redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedisElasticachArgs', 'SecretsMountRedisElasticachArgsDict']]]]] = None,
1678
1677
  redshifts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedshiftArgs', 'SecretsMountRedshiftArgsDict']]]]] = None,
1679
- seal_wrap: Optional[pulumi.Input[builtins.bool]] = None,
1678
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1680
1679
  snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountSnowflakeArgs', 'SecretsMountSnowflakeArgsDict']]]]] = None) -> 'SecretsMount':
1681
1680
  """
1682
1681
  Get an existing SecretsMount resource's state with the given name, id, and optional extra
@@ -1685,32 +1684,32 @@ class SecretsMount(pulumi.CustomResource):
1685
1684
  :param str resource_name: The unique name of the resulting resource.
1686
1685
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
1687
1686
  :param pulumi.ResourceOptions opts: Options for the resource.
1688
- :param pulumi.Input[builtins.str] accessor: Accessor of the mount
1689
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
1687
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
1688
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
1690
1689
 
1691
1690
  The following arguments are common to all database engines:
1692
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1693
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1694
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1691
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1692
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1693
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1695
1694
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCassandraArgs', 'SecretsMountCassandraArgsDict']]]] cassandras: A nested block containing configuration options for Cassandra connections.
1696
1695
  *See Configuration Options for more info*
1697
1696
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCouchbaseArgs', 'SecretsMountCouchbaseArgsDict']]]] couchbases: A nested block containing configuration options for Couchbase connections.
1698
1697
  *See Configuration Options for more info*
1699
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
1700
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1701
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount
1698
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
1699
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1700
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
1702
1701
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountElasticsearchArgs', 'SecretsMountElasticsearchArgsDict']]]] elasticsearches: A nested block containing configuration options for Elasticsearch connections.
1703
1702
  *See Configuration Options for more info*
1704
- :param pulumi.Input[builtins.int] engine_count: The total number of database secrets engines configured.
1705
- :param pulumi.Input[builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
1703
+ :param pulumi.Input[_builtins.int] engine_count: The total number of database secrets engines configured.
1704
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
1706
1705
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountHanaArgs', 'SecretsMountHanaArgsDict']]]] hanas: A nested block containing configuration options for SAP HanaDB connections.
1707
1706
  *See Configuration Options for more info*
1708
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1707
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1709
1708
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountInfluxdbArgs', 'SecretsMountInfluxdbArgsDict']]]] influxdbs: A nested block containing configuration options for InfluxDB connections.
1710
1709
  *See Configuration Options for more info*
1711
- :param pulumi.Input[builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1712
- :param pulumi.Input[builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
1713
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
1710
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1711
+ :param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
1712
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
1714
1713
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbatlaArgs', 'SecretsMountMongodbatlaArgsDict']]]] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
1715
1714
  *See Configuration Options for more info*
1716
1715
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbArgs', 'SecretsMountMongodbArgsDict']]]] mongodbs: A nested block containing configuration options for MongoDB connections.
@@ -1725,13 +1724,13 @@ class SecretsMount(pulumi.CustomResource):
1725
1724
  *See Configuration Options for more info*
1726
1725
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]] mysqls: A nested block containing configuration options for MySQL connections.
1727
1726
  *See Configuration Options for more info*
1728
- :param pulumi.Input[builtins.str] namespace: Target namespace. (requires Enterprise)
1729
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1727
+ :param pulumi.Input[_builtins.str] namespace: Target namespace. (requires Enterprise)
1728
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1730
1729
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]] oracles: A nested block containing configuration options for Oracle connections.
1731
1730
  *See Configuration Options for more info*
1732
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1733
- :param pulumi.Input[builtins.str] path: Where the secret backend will be mounted
1734
- :param pulumi.Input[builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1731
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1732
+ :param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
1733
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1735
1734
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountPostgresqlArgs', 'SecretsMountPostgresqlArgsDict']]]] postgresqls: A nested block containing configuration options for PostgreSQL connections.
1736
1735
  *See Configuration Options for more info*
1737
1736
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRediArgs', 'SecretsMountRediArgsDict']]]] redis: A nested block containing configuration options for Redis connections.
@@ -1740,7 +1739,7 @@ class SecretsMount(pulumi.CustomResource):
1740
1739
  *See Configuration Options for more info*
1741
1740
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedshiftArgs', 'SecretsMountRedshiftArgsDict']]]] redshifts: A nested block containing configuration options for AWS Redshift connections.
1742
1741
  *See Configuration Options for more info*
1743
- :param pulumi.Input[builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1742
+ :param pulumi.Input[_builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1744
1743
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountSnowflakeArgs', 'SecretsMountSnowflakeArgsDict']]]] snowflakes: A nested block containing configuration options for Snowflake connections.
1745
1744
  *See Configuration Options for more info*
1746
1745
  """
@@ -1788,17 +1787,17 @@ class SecretsMount(pulumi.CustomResource):
1788
1787
  __props__.__dict__["snowflakes"] = snowflakes
1789
1788
  return SecretsMount(resource_name, opts=opts, __props__=__props__)
1790
1789
 
1791
- @property
1790
+ @_builtins.property
1792
1791
  @pulumi.getter
1793
- def accessor(self) -> pulumi.Output[builtins.str]:
1792
+ def accessor(self) -> pulumi.Output[_builtins.str]:
1794
1793
  """
1795
1794
  Accessor of the mount
1796
1795
  """
1797
1796
  return pulumi.get(self, "accessor")
1798
1797
 
1799
- @property
1798
+ @_builtins.property
1800
1799
  @pulumi.getter(name="allowedManagedKeys")
1801
- def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1800
+ def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1802
1801
  """
1803
1802
  Set of managed key registry entry names that the mount in question is allowed to access
1804
1803
 
@@ -1806,31 +1805,31 @@ class SecretsMount(pulumi.CustomResource):
1806
1805
  """
1807
1806
  return pulumi.get(self, "allowed_managed_keys")
1808
1807
 
1809
- @property
1808
+ @_builtins.property
1810
1809
  @pulumi.getter(name="allowedResponseHeaders")
1811
- def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1810
+ def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1812
1811
  """
1813
1812
  List of headers to allow and pass from the request to the plugin
1814
1813
  """
1815
1814
  return pulumi.get(self, "allowed_response_headers")
1816
1815
 
1817
- @property
1816
+ @_builtins.property
1818
1817
  @pulumi.getter(name="auditNonHmacRequestKeys")
1819
- def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[builtins.str]]:
1818
+ def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1820
1819
  """
1821
1820
  Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1822
1821
  """
1823
1822
  return pulumi.get(self, "audit_non_hmac_request_keys")
1824
1823
 
1825
- @property
1824
+ @_builtins.property
1826
1825
  @pulumi.getter(name="auditNonHmacResponseKeys")
1827
- def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[builtins.str]]:
1826
+ def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1828
1827
  """
1829
1828
  Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1830
1829
  """
1831
1830
  return pulumi.get(self, "audit_non_hmac_response_keys")
1832
1831
 
1833
- @property
1832
+ @_builtins.property
1834
1833
  @pulumi.getter
1835
1834
  def cassandras(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountCassandra']]]:
1836
1835
  """
@@ -1839,7 +1838,7 @@ class SecretsMount(pulumi.CustomResource):
1839
1838
  """
1840
1839
  return pulumi.get(self, "cassandras")
1841
1840
 
1842
- @property
1841
+ @_builtins.property
1843
1842
  @pulumi.getter
1844
1843
  def couchbases(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountCouchbase']]]:
1845
1844
  """
@@ -1848,31 +1847,31 @@ class SecretsMount(pulumi.CustomResource):
1848
1847
  """
1849
1848
  return pulumi.get(self, "couchbases")
1850
1849
 
1851
- @property
1850
+ @_builtins.property
1852
1851
  @pulumi.getter(name="defaultLeaseTtlSeconds")
1853
- def default_lease_ttl_seconds(self) -> pulumi.Output[builtins.int]:
1852
+ def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1854
1853
  """
1855
1854
  Default lease duration for tokens and secrets in seconds
1856
1855
  """
1857
1856
  return pulumi.get(self, "default_lease_ttl_seconds")
1858
1857
 
1859
- @property
1858
+ @_builtins.property
1860
1859
  @pulumi.getter(name="delegatedAuthAccessors")
1861
- def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1860
+ def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1862
1861
  """
1863
1862
  List of headers to allow and pass from the request to the plugin
1864
1863
  """
1865
1864
  return pulumi.get(self, "delegated_auth_accessors")
1866
1865
 
1867
- @property
1866
+ @_builtins.property
1868
1867
  @pulumi.getter
1869
- def description(self) -> pulumi.Output[Optional[builtins.str]]:
1868
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
1870
1869
  """
1871
1870
  Human-friendly description of the mount
1872
1871
  """
1873
1872
  return pulumi.get(self, "description")
1874
1873
 
1875
- @property
1874
+ @_builtins.property
1876
1875
  @pulumi.getter
1877
1876
  def elasticsearches(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountElasticsearch']]]:
1878
1877
  """
@@ -1881,23 +1880,23 @@ class SecretsMount(pulumi.CustomResource):
1881
1880
  """
1882
1881
  return pulumi.get(self, "elasticsearches")
1883
1882
 
1884
- @property
1883
+ @_builtins.property
1885
1884
  @pulumi.getter(name="engineCount")
1886
- def engine_count(self) -> pulumi.Output[builtins.int]:
1885
+ def engine_count(self) -> pulumi.Output[_builtins.int]:
1887
1886
  """
1888
1887
  The total number of database secrets engines configured.
1889
1888
  """
1890
1889
  return pulumi.get(self, "engine_count")
1891
1890
 
1892
- @property
1891
+ @_builtins.property
1893
1892
  @pulumi.getter(name="externalEntropyAccess")
1894
- def external_entropy_access(self) -> pulumi.Output[Optional[builtins.bool]]:
1893
+ def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
1895
1894
  """
1896
1895
  Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
1897
1896
  """
1898
1897
  return pulumi.get(self, "external_entropy_access")
1899
1898
 
1900
- @property
1899
+ @_builtins.property
1901
1900
  @pulumi.getter
1902
1901
  def hanas(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountHana']]]:
1903
1902
  """
@@ -1906,15 +1905,15 @@ class SecretsMount(pulumi.CustomResource):
1906
1905
  """
1907
1906
  return pulumi.get(self, "hanas")
1908
1907
 
1909
- @property
1908
+ @_builtins.property
1910
1909
  @pulumi.getter(name="identityTokenKey")
1911
- def identity_token_key(self) -> pulumi.Output[Optional[builtins.str]]:
1910
+ def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
1912
1911
  """
1913
1912
  The key to use for signing plugin workload identity tokens
1914
1913
  """
1915
1914
  return pulumi.get(self, "identity_token_key")
1916
1915
 
1917
- @property
1916
+ @_builtins.property
1918
1917
  @pulumi.getter
1919
1918
  def influxdbs(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountInfluxdb']]]:
1920
1919
  """
@@ -1923,31 +1922,31 @@ class SecretsMount(pulumi.CustomResource):
1923
1922
  """
1924
1923
  return pulumi.get(self, "influxdbs")
1925
1924
 
1926
- @property
1925
+ @_builtins.property
1927
1926
  @pulumi.getter(name="listingVisibility")
1928
- def listing_visibility(self) -> pulumi.Output[Optional[builtins.str]]:
1927
+ def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
1929
1928
  """
1930
1929
  Specifies whether to show this mount in the UI-specific listing endpoint
1931
1930
  """
1932
1931
  return pulumi.get(self, "listing_visibility")
1933
1932
 
1934
- @property
1933
+ @_builtins.property
1935
1934
  @pulumi.getter
1936
- def local(self) -> pulumi.Output[Optional[builtins.bool]]:
1935
+ def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
1937
1936
  """
1938
1937
  Boolean flag that can be explicitly set to true to enforce local mount in HA environment
1939
1938
  """
1940
1939
  return pulumi.get(self, "local")
1941
1940
 
1942
- @property
1941
+ @_builtins.property
1943
1942
  @pulumi.getter(name="maxLeaseTtlSeconds")
1944
- def max_lease_ttl_seconds(self) -> pulumi.Output[builtins.int]:
1943
+ def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1945
1944
  """
1946
1945
  Maximum possible lease duration for tokens and secrets in seconds
1947
1946
  """
1948
1947
  return pulumi.get(self, "max_lease_ttl_seconds")
1949
1948
 
1950
- @property
1949
+ @_builtins.property
1951
1950
  @pulumi.getter
1952
1951
  def mongodbatlas(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountMongodbatla']]]:
1953
1952
  """
@@ -1956,7 +1955,7 @@ class SecretsMount(pulumi.CustomResource):
1956
1955
  """
1957
1956
  return pulumi.get(self, "mongodbatlas")
1958
1957
 
1959
- @property
1958
+ @_builtins.property
1960
1959
  @pulumi.getter
1961
1960
  def mongodbs(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountMongodb']]]:
1962
1961
  """
@@ -1965,7 +1964,7 @@ class SecretsMount(pulumi.CustomResource):
1965
1964
  """
1966
1965
  return pulumi.get(self, "mongodbs")
1967
1966
 
1968
- @property
1967
+ @_builtins.property
1969
1968
  @pulumi.getter
1970
1969
  def mssqls(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountMssql']]]:
1971
1970
  """
@@ -1974,7 +1973,7 @@ class SecretsMount(pulumi.CustomResource):
1974
1973
  """
1975
1974
  return pulumi.get(self, "mssqls")
1976
1975
 
1977
- @property
1976
+ @_builtins.property
1978
1977
  @pulumi.getter(name="mysqlAuroras")
1979
1978
  def mysql_auroras(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountMysqlAurora']]]:
1980
1979
  """
@@ -1983,7 +1982,7 @@ class SecretsMount(pulumi.CustomResource):
1983
1982
  """
1984
1983
  return pulumi.get(self, "mysql_auroras")
1985
1984
 
1986
- @property
1985
+ @_builtins.property
1987
1986
  @pulumi.getter(name="mysqlLegacies")
1988
1987
  def mysql_legacies(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountMysqlLegacy']]]:
1989
1988
  """
@@ -1992,7 +1991,7 @@ class SecretsMount(pulumi.CustomResource):
1992
1991
  """
1993
1992
  return pulumi.get(self, "mysql_legacies")
1994
1993
 
1995
- @property
1994
+ @_builtins.property
1996
1995
  @pulumi.getter(name="mysqlRds")
1997
1996
  def mysql_rds(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountMysqlRd']]]:
1998
1997
  """
@@ -2001,7 +2000,7 @@ class SecretsMount(pulumi.CustomResource):
2001
2000
  """
2002
2001
  return pulumi.get(self, "mysql_rds")
2003
2002
 
2004
- @property
2003
+ @_builtins.property
2005
2004
  @pulumi.getter
2006
2005
  def mysqls(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountMysql']]]:
2007
2006
  """
@@ -2010,23 +2009,23 @@ class SecretsMount(pulumi.CustomResource):
2010
2009
  """
2011
2010
  return pulumi.get(self, "mysqls")
2012
2011
 
2013
- @property
2012
+ @_builtins.property
2014
2013
  @pulumi.getter
2015
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
2014
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
2016
2015
  """
2017
2016
  Target namespace. (requires Enterprise)
2018
2017
  """
2019
2018
  return pulumi.get(self, "namespace")
2020
2019
 
2021
- @property
2020
+ @_builtins.property
2022
2021
  @pulumi.getter
2023
- def options(self) -> pulumi.Output[Optional[Mapping[str, builtins.str]]]:
2022
+ def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
2024
2023
  """
2025
2024
  Specifies mount type specific options that are passed to the backend
2026
2025
  """
2027
2026
  return pulumi.get(self, "options")
2028
2027
 
2029
- @property
2028
+ @_builtins.property
2030
2029
  @pulumi.getter
2031
2030
  def oracles(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountOracle']]]:
2032
2031
  """
@@ -2035,31 +2034,31 @@ class SecretsMount(pulumi.CustomResource):
2035
2034
  """
2036
2035
  return pulumi.get(self, "oracles")
2037
2036
 
2038
- @property
2037
+ @_builtins.property
2039
2038
  @pulumi.getter(name="passthroughRequestHeaders")
2040
- def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
2039
+ def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
2041
2040
  """
2042
2041
  List of headers to allow and pass from the request to the plugin
2043
2042
  """
2044
2043
  return pulumi.get(self, "passthrough_request_headers")
2045
2044
 
2046
- @property
2045
+ @_builtins.property
2047
2046
  @pulumi.getter
2048
- def path(self) -> pulumi.Output[builtins.str]:
2047
+ def path(self) -> pulumi.Output[_builtins.str]:
2049
2048
  """
2050
2049
  Where the secret backend will be mounted
2051
2050
  """
2052
2051
  return pulumi.get(self, "path")
2053
2052
 
2054
- @property
2053
+ @_builtins.property
2055
2054
  @pulumi.getter(name="pluginVersion")
2056
- def plugin_version(self) -> pulumi.Output[Optional[builtins.str]]:
2055
+ def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
2057
2056
  """
2058
2057
  Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
2059
2058
  """
2060
2059
  return pulumi.get(self, "plugin_version")
2061
2060
 
2062
- @property
2061
+ @_builtins.property
2063
2062
  @pulumi.getter
2064
2063
  def postgresqls(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountPostgresql']]]:
2065
2064
  """
@@ -2068,7 +2067,7 @@ class SecretsMount(pulumi.CustomResource):
2068
2067
  """
2069
2068
  return pulumi.get(self, "postgresqls")
2070
2069
 
2071
- @property
2070
+ @_builtins.property
2072
2071
  @pulumi.getter
2073
2072
  def redis(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountRedi']]]:
2074
2073
  """
@@ -2077,7 +2076,7 @@ class SecretsMount(pulumi.CustomResource):
2077
2076
  """
2078
2077
  return pulumi.get(self, "redis")
2079
2078
 
2080
- @property
2079
+ @_builtins.property
2081
2080
  @pulumi.getter(name="redisElasticaches")
2082
2081
  def redis_elasticaches(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountRedisElasticach']]]:
2083
2082
  """
@@ -2086,7 +2085,7 @@ class SecretsMount(pulumi.CustomResource):
2086
2085
  """
2087
2086
  return pulumi.get(self, "redis_elasticaches")
2088
2087
 
2089
- @property
2088
+ @_builtins.property
2090
2089
  @pulumi.getter
2091
2090
  def redshifts(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountRedshift']]]:
2092
2091
  """
@@ -2095,15 +2094,15 @@ class SecretsMount(pulumi.CustomResource):
2095
2094
  """
2096
2095
  return pulumi.get(self, "redshifts")
2097
2096
 
2098
- @property
2097
+ @_builtins.property
2099
2098
  @pulumi.getter(name="sealWrap")
2100
- def seal_wrap(self) -> pulumi.Output[builtins.bool]:
2099
+ def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
2101
2100
  """
2102
2101
  Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
2103
2102
  """
2104
2103
  return pulumi.get(self, "seal_wrap")
2105
2104
 
2106
- @property
2105
+ @_builtins.property
2107
2106
  @pulumi.getter
2108
2107
  def snowflakes(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountSnowflake']]]:
2109
2108
  """