pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,1341 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['SecretBackendArgs', 'SecretBackend']
18
+
19
+ @pulumi.input_type
20
+ class SecretBackendArgs:
21
+ def __init__(__self__, *,
22
+ path: pulumi.Input[_builtins.str],
23
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
24
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
25
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
28
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
29
+ description: Optional[pulumi.Input[_builtins.str]] = None,
30
+ disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
31
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
32
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
33
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
34
+ kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
35
+ kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
36
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
37
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
38
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
39
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
40
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
41
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
42
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
43
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
44
+ service_account_jwt: Optional[pulumi.Input[_builtins.str]] = None):
45
+ """
46
+ The set of arguments for constructing a SecretBackend resource.
47
+ :param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
48
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
49
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
50
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
51
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
52
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
53
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
54
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
55
+ :param pulumi.Input[_builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
56
+ service account JWT when Vault is running in a Kubernetes pod.
57
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
58
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
59
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
60
+ :param pulumi.Input[_builtins.str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
61
+ secrets engine to verify the Kubernetes API server certificate. Defaults to the local
62
+ pod’s CA if Vault is running in Kubernetes. Otherwise, defaults to the root CA set where
63
+ Vault is running.
64
+ :param pulumi.Input[_builtins.str] kubernetes_host: The Kubernetes API URL to connect to. Required if the
65
+ standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
66
+ are not set on the host that Vault is running on.
67
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
68
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
69
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
70
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
71
+ The value should not contain leading or trailing forward slashes.
72
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
73
+ *Available only for Vault Enterprise*.
74
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
75
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
76
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
77
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
78
+ :param pulumi.Input[_builtins.str] service_account_jwt: The JSON web token of the service account used by the
79
+ secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
80
+ is running in Kubernetes.
81
+ """
82
+ pulumi.set(__self__, "path", path)
83
+ if allowed_managed_keys is not None:
84
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
85
+ if allowed_response_headers is not None:
86
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
87
+ if audit_non_hmac_request_keys is not None:
88
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
89
+ if audit_non_hmac_response_keys is not None:
90
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
91
+ if default_lease_ttl_seconds is not None:
92
+ pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
93
+ if delegated_auth_accessors is not None:
94
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
95
+ if description is not None:
96
+ pulumi.set(__self__, "description", description)
97
+ if disable_local_ca_jwt is not None:
98
+ pulumi.set(__self__, "disable_local_ca_jwt", disable_local_ca_jwt)
99
+ if external_entropy_access is not None:
100
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
101
+ if force_no_cache is not None:
102
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
103
+ if identity_token_key is not None:
104
+ pulumi.set(__self__, "identity_token_key", identity_token_key)
105
+ if kubernetes_ca_cert is not None:
106
+ pulumi.set(__self__, "kubernetes_ca_cert", kubernetes_ca_cert)
107
+ if kubernetes_host is not None:
108
+ pulumi.set(__self__, "kubernetes_host", kubernetes_host)
109
+ if listing_visibility is not None:
110
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
111
+ if local is not None:
112
+ pulumi.set(__self__, "local", local)
113
+ if max_lease_ttl_seconds is not None:
114
+ pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
115
+ if namespace is not None:
116
+ pulumi.set(__self__, "namespace", namespace)
117
+ if options is not None:
118
+ pulumi.set(__self__, "options", options)
119
+ if passthrough_request_headers is not None:
120
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
121
+ if plugin_version is not None:
122
+ pulumi.set(__self__, "plugin_version", plugin_version)
123
+ if seal_wrap is not None:
124
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
125
+ if service_account_jwt is not None:
126
+ pulumi.set(__self__, "service_account_jwt", service_account_jwt)
127
+
128
+ @_builtins.property
129
+ @pulumi.getter
130
+ def path(self) -> pulumi.Input[_builtins.str]:
131
+ """
132
+ Where the secret backend will be mounted
133
+ """
134
+ return pulumi.get(self, "path")
135
+
136
+ @path.setter
137
+ def path(self, value: pulumi.Input[_builtins.str]):
138
+ pulumi.set(self, "path", value)
139
+
140
+ @_builtins.property
141
+ @pulumi.getter(name="allowedManagedKeys")
142
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
143
+ """
144
+ List of managed key registry entry names that the mount in question is allowed to access
145
+ """
146
+ return pulumi.get(self, "allowed_managed_keys")
147
+
148
+ @allowed_managed_keys.setter
149
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
150
+ pulumi.set(self, "allowed_managed_keys", value)
151
+
152
+ @_builtins.property
153
+ @pulumi.getter(name="allowedResponseHeaders")
154
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
155
+ """
156
+ List of headers to allow and pass from the request to the plugin
157
+ """
158
+ return pulumi.get(self, "allowed_response_headers")
159
+
160
+ @allowed_response_headers.setter
161
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
162
+ pulumi.set(self, "allowed_response_headers", value)
163
+
164
+ @_builtins.property
165
+ @pulumi.getter(name="auditNonHmacRequestKeys")
166
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
167
+ """
168
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
169
+ """
170
+ return pulumi.get(self, "audit_non_hmac_request_keys")
171
+
172
+ @audit_non_hmac_request_keys.setter
173
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
174
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
175
+
176
+ @_builtins.property
177
+ @pulumi.getter(name="auditNonHmacResponseKeys")
178
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
179
+ """
180
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
181
+ """
182
+ return pulumi.get(self, "audit_non_hmac_response_keys")
183
+
184
+ @audit_non_hmac_response_keys.setter
185
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
186
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
187
+
188
+ @_builtins.property
189
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
190
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
191
+ """
192
+ Default lease duration for tokens and secrets in seconds
193
+ """
194
+ return pulumi.get(self, "default_lease_ttl_seconds")
195
+
196
+ @default_lease_ttl_seconds.setter
197
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
198
+ pulumi.set(self, "default_lease_ttl_seconds", value)
199
+
200
+ @_builtins.property
201
+ @pulumi.getter(name="delegatedAuthAccessors")
202
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
203
+ """
204
+ List of headers to allow and pass from the request to the plugin
205
+ """
206
+ return pulumi.get(self, "delegated_auth_accessors")
207
+
208
+ @delegated_auth_accessors.setter
209
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
210
+ pulumi.set(self, "delegated_auth_accessors", value)
211
+
212
+ @_builtins.property
213
+ @pulumi.getter
214
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
215
+ """
216
+ Human-friendly description of the mount
217
+ """
218
+ return pulumi.get(self, "description")
219
+
220
+ @description.setter
221
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
222
+ pulumi.set(self, "description", value)
223
+
224
+ @_builtins.property
225
+ @pulumi.getter(name="disableLocalCaJwt")
226
+ def disable_local_ca_jwt(self) -> Optional[pulumi.Input[_builtins.bool]]:
227
+ """
228
+ Disable defaulting to the local CA certificate and
229
+ service account JWT when Vault is running in a Kubernetes pod.
230
+ """
231
+ return pulumi.get(self, "disable_local_ca_jwt")
232
+
233
+ @disable_local_ca_jwt.setter
234
+ def disable_local_ca_jwt(self, value: Optional[pulumi.Input[_builtins.bool]]):
235
+ pulumi.set(self, "disable_local_ca_jwt", value)
236
+
237
+ @_builtins.property
238
+ @pulumi.getter(name="externalEntropyAccess")
239
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
240
+ """
241
+ Enable the secrets engine to access Vault's external entropy source
242
+ """
243
+ return pulumi.get(self, "external_entropy_access")
244
+
245
+ @external_entropy_access.setter
246
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
247
+ pulumi.set(self, "external_entropy_access", value)
248
+
249
+ @_builtins.property
250
+ @pulumi.getter(name="forceNoCache")
251
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
252
+ """
253
+ If set to true, disables caching.
254
+ """
255
+ return pulumi.get(self, "force_no_cache")
256
+
257
+ @force_no_cache.setter
258
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
259
+ pulumi.set(self, "force_no_cache", value)
260
+
261
+ @_builtins.property
262
+ @pulumi.getter(name="identityTokenKey")
263
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
264
+ """
265
+ The key to use for signing plugin workload identity tokens
266
+ """
267
+ return pulumi.get(self, "identity_token_key")
268
+
269
+ @identity_token_key.setter
270
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
271
+ pulumi.set(self, "identity_token_key", value)
272
+
273
+ @_builtins.property
274
+ @pulumi.getter(name="kubernetesCaCert")
275
+ def kubernetes_ca_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
276
+ """
277
+ A PEM-encoded CA certificate used by the
278
+ secrets engine to verify the Kubernetes API server certificate. Defaults to the local
279
+ pod’s CA if Vault is running in Kubernetes. Otherwise, defaults to the root CA set where
280
+ Vault is running.
281
+ """
282
+ return pulumi.get(self, "kubernetes_ca_cert")
283
+
284
+ @kubernetes_ca_cert.setter
285
+ def kubernetes_ca_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
286
+ pulumi.set(self, "kubernetes_ca_cert", value)
287
+
288
+ @_builtins.property
289
+ @pulumi.getter(name="kubernetesHost")
290
+ def kubernetes_host(self) -> Optional[pulumi.Input[_builtins.str]]:
291
+ """
292
+ The Kubernetes API URL to connect to. Required if the
293
+ standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
294
+ are not set on the host that Vault is running on.
295
+ """
296
+ return pulumi.get(self, "kubernetes_host")
297
+
298
+ @kubernetes_host.setter
299
+ def kubernetes_host(self, value: Optional[pulumi.Input[_builtins.str]]):
300
+ pulumi.set(self, "kubernetes_host", value)
301
+
302
+ @_builtins.property
303
+ @pulumi.getter(name="listingVisibility")
304
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
305
+ """
306
+ Specifies whether to show this mount in the UI-specific listing endpoint
307
+ """
308
+ return pulumi.get(self, "listing_visibility")
309
+
310
+ @listing_visibility.setter
311
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
312
+ pulumi.set(self, "listing_visibility", value)
313
+
314
+ @_builtins.property
315
+ @pulumi.getter
316
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
317
+ """
318
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
319
+ """
320
+ return pulumi.get(self, "local")
321
+
322
+ @local.setter
323
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
324
+ pulumi.set(self, "local", value)
325
+
326
+ @_builtins.property
327
+ @pulumi.getter(name="maxLeaseTtlSeconds")
328
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
329
+ """
330
+ Maximum possible lease duration for tokens and secrets in seconds
331
+ """
332
+ return pulumi.get(self, "max_lease_ttl_seconds")
333
+
334
+ @max_lease_ttl_seconds.setter
335
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
336
+ pulumi.set(self, "max_lease_ttl_seconds", value)
337
+
338
+ @_builtins.property
339
+ @pulumi.getter
340
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
341
+ """
342
+ The namespace to provision the resource in.
343
+ The value should not contain leading or trailing forward slashes.
344
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
345
+ *Available only for Vault Enterprise*.
346
+ """
347
+ return pulumi.get(self, "namespace")
348
+
349
+ @namespace.setter
350
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
351
+ pulumi.set(self, "namespace", value)
352
+
353
+ @_builtins.property
354
+ @pulumi.getter
355
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
356
+ """
357
+ Specifies mount type specific options that are passed to the backend
358
+ """
359
+ return pulumi.get(self, "options")
360
+
361
+ @options.setter
362
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
363
+ pulumi.set(self, "options", value)
364
+
365
+ @_builtins.property
366
+ @pulumi.getter(name="passthroughRequestHeaders")
367
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
368
+ """
369
+ List of headers to allow and pass from the request to the plugin
370
+ """
371
+ return pulumi.get(self, "passthrough_request_headers")
372
+
373
+ @passthrough_request_headers.setter
374
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
375
+ pulumi.set(self, "passthrough_request_headers", value)
376
+
377
+ @_builtins.property
378
+ @pulumi.getter(name="pluginVersion")
379
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
380
+ """
381
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
382
+ """
383
+ return pulumi.get(self, "plugin_version")
384
+
385
+ @plugin_version.setter
386
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
387
+ pulumi.set(self, "plugin_version", value)
388
+
389
+ @_builtins.property
390
+ @pulumi.getter(name="sealWrap")
391
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
392
+ """
393
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
394
+ """
395
+ return pulumi.get(self, "seal_wrap")
396
+
397
+ @seal_wrap.setter
398
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
399
+ pulumi.set(self, "seal_wrap", value)
400
+
401
+ @_builtins.property
402
+ @pulumi.getter(name="serviceAccountJwt")
403
+ def service_account_jwt(self) -> Optional[pulumi.Input[_builtins.str]]:
404
+ """
405
+ The JSON web token of the service account used by the
406
+ secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
407
+ is running in Kubernetes.
408
+ """
409
+ return pulumi.get(self, "service_account_jwt")
410
+
411
+ @service_account_jwt.setter
412
+ def service_account_jwt(self, value: Optional[pulumi.Input[_builtins.str]]):
413
+ pulumi.set(self, "service_account_jwt", value)
414
+
415
+
416
+ @pulumi.input_type
417
+ class _SecretBackendState:
418
+ def __init__(__self__, *,
419
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
420
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
421
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
422
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
423
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
424
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
425
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
426
+ description: Optional[pulumi.Input[_builtins.str]] = None,
427
+ disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
428
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
429
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
430
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
431
+ kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
432
+ kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
433
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
434
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
435
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
436
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
437
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
438
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
439
+ path: Optional[pulumi.Input[_builtins.str]] = None,
440
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
441
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
442
+ service_account_jwt: Optional[pulumi.Input[_builtins.str]] = None):
443
+ """
444
+ Input properties used for looking up and filtering SecretBackend resources.
445
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
446
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
447
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
448
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
449
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
450
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
451
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
452
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
453
+ :param pulumi.Input[_builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
454
+ service account JWT when Vault is running in a Kubernetes pod.
455
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
456
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
457
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
458
+ :param pulumi.Input[_builtins.str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
459
+ secrets engine to verify the Kubernetes API server certificate. Defaults to the local
460
+ pod’s CA if Vault is running in Kubernetes. Otherwise, defaults to the root CA set where
461
+ Vault is running.
462
+ :param pulumi.Input[_builtins.str] kubernetes_host: The Kubernetes API URL to connect to. Required if the
463
+ standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
464
+ are not set on the host that Vault is running on.
465
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
466
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
467
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
468
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
469
+ The value should not contain leading or trailing forward slashes.
470
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
471
+ *Available only for Vault Enterprise*.
472
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
473
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
474
+ :param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
475
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
476
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
477
+ :param pulumi.Input[_builtins.str] service_account_jwt: The JSON web token of the service account used by the
478
+ secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
479
+ is running in Kubernetes.
480
+ """
481
+ if accessor is not None:
482
+ pulumi.set(__self__, "accessor", accessor)
483
+ if allowed_managed_keys is not None:
484
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
485
+ if allowed_response_headers is not None:
486
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
487
+ if audit_non_hmac_request_keys is not None:
488
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
489
+ if audit_non_hmac_response_keys is not None:
490
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
491
+ if default_lease_ttl_seconds is not None:
492
+ pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
493
+ if delegated_auth_accessors is not None:
494
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
495
+ if description is not None:
496
+ pulumi.set(__self__, "description", description)
497
+ if disable_local_ca_jwt is not None:
498
+ pulumi.set(__self__, "disable_local_ca_jwt", disable_local_ca_jwt)
499
+ if external_entropy_access is not None:
500
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
501
+ if force_no_cache is not None:
502
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
503
+ if identity_token_key is not None:
504
+ pulumi.set(__self__, "identity_token_key", identity_token_key)
505
+ if kubernetes_ca_cert is not None:
506
+ pulumi.set(__self__, "kubernetes_ca_cert", kubernetes_ca_cert)
507
+ if kubernetes_host is not None:
508
+ pulumi.set(__self__, "kubernetes_host", kubernetes_host)
509
+ if listing_visibility is not None:
510
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
511
+ if local is not None:
512
+ pulumi.set(__self__, "local", local)
513
+ if max_lease_ttl_seconds is not None:
514
+ pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
515
+ if namespace is not None:
516
+ pulumi.set(__self__, "namespace", namespace)
517
+ if options is not None:
518
+ pulumi.set(__self__, "options", options)
519
+ if passthrough_request_headers is not None:
520
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
521
+ if path is not None:
522
+ pulumi.set(__self__, "path", path)
523
+ if plugin_version is not None:
524
+ pulumi.set(__self__, "plugin_version", plugin_version)
525
+ if seal_wrap is not None:
526
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
527
+ if service_account_jwt is not None:
528
+ pulumi.set(__self__, "service_account_jwt", service_account_jwt)
529
+
530
+ @_builtins.property
531
+ @pulumi.getter
532
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
533
+ """
534
+ Accessor of the mount
535
+ """
536
+ return pulumi.get(self, "accessor")
537
+
538
+ @accessor.setter
539
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
540
+ pulumi.set(self, "accessor", value)
541
+
542
+ @_builtins.property
543
+ @pulumi.getter(name="allowedManagedKeys")
544
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
545
+ """
546
+ List of managed key registry entry names that the mount in question is allowed to access
547
+ """
548
+ return pulumi.get(self, "allowed_managed_keys")
549
+
550
+ @allowed_managed_keys.setter
551
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
552
+ pulumi.set(self, "allowed_managed_keys", value)
553
+
554
+ @_builtins.property
555
+ @pulumi.getter(name="allowedResponseHeaders")
556
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
557
+ """
558
+ List of headers to allow and pass from the request to the plugin
559
+ """
560
+ return pulumi.get(self, "allowed_response_headers")
561
+
562
+ @allowed_response_headers.setter
563
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
564
+ pulumi.set(self, "allowed_response_headers", value)
565
+
566
+ @_builtins.property
567
+ @pulumi.getter(name="auditNonHmacRequestKeys")
568
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
569
+ """
570
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
571
+ """
572
+ return pulumi.get(self, "audit_non_hmac_request_keys")
573
+
574
+ @audit_non_hmac_request_keys.setter
575
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
576
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
577
+
578
+ @_builtins.property
579
+ @pulumi.getter(name="auditNonHmacResponseKeys")
580
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
581
+ """
582
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
583
+ """
584
+ return pulumi.get(self, "audit_non_hmac_response_keys")
585
+
586
+ @audit_non_hmac_response_keys.setter
587
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
588
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
589
+
590
+ @_builtins.property
591
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
592
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
593
+ """
594
+ Default lease duration for tokens and secrets in seconds
595
+ """
596
+ return pulumi.get(self, "default_lease_ttl_seconds")
597
+
598
+ @default_lease_ttl_seconds.setter
599
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
600
+ pulumi.set(self, "default_lease_ttl_seconds", value)
601
+
602
+ @_builtins.property
603
+ @pulumi.getter(name="delegatedAuthAccessors")
604
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
605
+ """
606
+ List of headers to allow and pass from the request to the plugin
607
+ """
608
+ return pulumi.get(self, "delegated_auth_accessors")
609
+
610
+ @delegated_auth_accessors.setter
611
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
612
+ pulumi.set(self, "delegated_auth_accessors", value)
613
+
614
+ @_builtins.property
615
+ @pulumi.getter
616
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
617
+ """
618
+ Human-friendly description of the mount
619
+ """
620
+ return pulumi.get(self, "description")
621
+
622
+ @description.setter
623
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
624
+ pulumi.set(self, "description", value)
625
+
626
+ @_builtins.property
627
+ @pulumi.getter(name="disableLocalCaJwt")
628
+ def disable_local_ca_jwt(self) -> Optional[pulumi.Input[_builtins.bool]]:
629
+ """
630
+ Disable defaulting to the local CA certificate and
631
+ service account JWT when Vault is running in a Kubernetes pod.
632
+ """
633
+ return pulumi.get(self, "disable_local_ca_jwt")
634
+
635
+ @disable_local_ca_jwt.setter
636
+ def disable_local_ca_jwt(self, value: Optional[pulumi.Input[_builtins.bool]]):
637
+ pulumi.set(self, "disable_local_ca_jwt", value)
638
+
639
+ @_builtins.property
640
+ @pulumi.getter(name="externalEntropyAccess")
641
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
642
+ """
643
+ Enable the secrets engine to access Vault's external entropy source
644
+ """
645
+ return pulumi.get(self, "external_entropy_access")
646
+
647
+ @external_entropy_access.setter
648
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
649
+ pulumi.set(self, "external_entropy_access", value)
650
+
651
+ @_builtins.property
652
+ @pulumi.getter(name="forceNoCache")
653
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
654
+ """
655
+ If set to true, disables caching.
656
+ """
657
+ return pulumi.get(self, "force_no_cache")
658
+
659
+ @force_no_cache.setter
660
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
661
+ pulumi.set(self, "force_no_cache", value)
662
+
663
+ @_builtins.property
664
+ @pulumi.getter(name="identityTokenKey")
665
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
666
+ """
667
+ The key to use for signing plugin workload identity tokens
668
+ """
669
+ return pulumi.get(self, "identity_token_key")
670
+
671
+ @identity_token_key.setter
672
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
673
+ pulumi.set(self, "identity_token_key", value)
674
+
675
+ @_builtins.property
676
+ @pulumi.getter(name="kubernetesCaCert")
677
+ def kubernetes_ca_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
678
+ """
679
+ A PEM-encoded CA certificate used by the
680
+ secrets engine to verify the Kubernetes API server certificate. Defaults to the local
681
+ pod’s CA if Vault is running in Kubernetes. Otherwise, defaults to the root CA set where
682
+ Vault is running.
683
+ """
684
+ return pulumi.get(self, "kubernetes_ca_cert")
685
+
686
+ @kubernetes_ca_cert.setter
687
+ def kubernetes_ca_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
688
+ pulumi.set(self, "kubernetes_ca_cert", value)
689
+
690
+ @_builtins.property
691
+ @pulumi.getter(name="kubernetesHost")
692
+ def kubernetes_host(self) -> Optional[pulumi.Input[_builtins.str]]:
693
+ """
694
+ The Kubernetes API URL to connect to. Required if the
695
+ standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
696
+ are not set on the host that Vault is running on.
697
+ """
698
+ return pulumi.get(self, "kubernetes_host")
699
+
700
+ @kubernetes_host.setter
701
+ def kubernetes_host(self, value: Optional[pulumi.Input[_builtins.str]]):
702
+ pulumi.set(self, "kubernetes_host", value)
703
+
704
+ @_builtins.property
705
+ @pulumi.getter(name="listingVisibility")
706
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
707
+ """
708
+ Specifies whether to show this mount in the UI-specific listing endpoint
709
+ """
710
+ return pulumi.get(self, "listing_visibility")
711
+
712
+ @listing_visibility.setter
713
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
714
+ pulumi.set(self, "listing_visibility", value)
715
+
716
+ @_builtins.property
717
+ @pulumi.getter
718
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
719
+ """
720
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
721
+ """
722
+ return pulumi.get(self, "local")
723
+
724
+ @local.setter
725
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
726
+ pulumi.set(self, "local", value)
727
+
728
+ @_builtins.property
729
+ @pulumi.getter(name="maxLeaseTtlSeconds")
730
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
731
+ """
732
+ Maximum possible lease duration for tokens and secrets in seconds
733
+ """
734
+ return pulumi.get(self, "max_lease_ttl_seconds")
735
+
736
+ @max_lease_ttl_seconds.setter
737
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
738
+ pulumi.set(self, "max_lease_ttl_seconds", value)
739
+
740
+ @_builtins.property
741
+ @pulumi.getter
742
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
743
+ """
744
+ The namespace to provision the resource in.
745
+ The value should not contain leading or trailing forward slashes.
746
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
747
+ *Available only for Vault Enterprise*.
748
+ """
749
+ return pulumi.get(self, "namespace")
750
+
751
+ @namespace.setter
752
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
753
+ pulumi.set(self, "namespace", value)
754
+
755
+ @_builtins.property
756
+ @pulumi.getter
757
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
758
+ """
759
+ Specifies mount type specific options that are passed to the backend
760
+ """
761
+ return pulumi.get(self, "options")
762
+
763
+ @options.setter
764
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
765
+ pulumi.set(self, "options", value)
766
+
767
+ @_builtins.property
768
+ @pulumi.getter(name="passthroughRequestHeaders")
769
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
770
+ """
771
+ List of headers to allow and pass from the request to the plugin
772
+ """
773
+ return pulumi.get(self, "passthrough_request_headers")
774
+
775
+ @passthrough_request_headers.setter
776
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
777
+ pulumi.set(self, "passthrough_request_headers", value)
778
+
779
+ @_builtins.property
780
+ @pulumi.getter
781
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
782
+ """
783
+ Where the secret backend will be mounted
784
+ """
785
+ return pulumi.get(self, "path")
786
+
787
+ @path.setter
788
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
789
+ pulumi.set(self, "path", value)
790
+
791
+ @_builtins.property
792
+ @pulumi.getter(name="pluginVersion")
793
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
794
+ """
795
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
796
+ """
797
+ return pulumi.get(self, "plugin_version")
798
+
799
+ @plugin_version.setter
800
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
801
+ pulumi.set(self, "plugin_version", value)
802
+
803
+ @_builtins.property
804
+ @pulumi.getter(name="sealWrap")
805
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
806
+ """
807
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
808
+ """
809
+ return pulumi.get(self, "seal_wrap")
810
+
811
+ @seal_wrap.setter
812
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
813
+ pulumi.set(self, "seal_wrap", value)
814
+
815
+ @_builtins.property
816
+ @pulumi.getter(name="serviceAccountJwt")
817
+ def service_account_jwt(self) -> Optional[pulumi.Input[_builtins.str]]:
818
+ """
819
+ The JSON web token of the service account used by the
820
+ secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
821
+ is running in Kubernetes.
822
+ """
823
+ return pulumi.get(self, "service_account_jwt")
824
+
825
+ @service_account_jwt.setter
826
+ def service_account_jwt(self, value: Optional[pulumi.Input[_builtins.str]]):
827
+ pulumi.set(self, "service_account_jwt", value)
828
+
829
+
830
+ @pulumi.type_token("vault:kubernetes/secretBackend:SecretBackend")
831
+ class SecretBackend(pulumi.CustomResource):
832
+ @overload
833
+ def __init__(__self__,
834
+ resource_name: str,
835
+ opts: Optional[pulumi.ResourceOptions] = None,
836
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
837
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
838
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
839
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
840
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
841
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
842
+ description: Optional[pulumi.Input[_builtins.str]] = None,
843
+ disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
844
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
845
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
846
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
847
+ kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
848
+ kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
849
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
850
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
851
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
852
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
853
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
854
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
855
+ path: Optional[pulumi.Input[_builtins.str]] = None,
856
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
857
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
858
+ service_account_jwt: Optional[pulumi.Input[_builtins.str]] = None,
859
+ __props__=None):
860
+ """
861
+ ## Example Usage
862
+
863
+ ```python
864
+ import pulumi
865
+ import pulumi_std as std
866
+ import pulumi_vault as vault
867
+
868
+ config = vault.kubernetes.SecretBackend("config",
869
+ path="kubernetes",
870
+ description="kubernetes secrets engine description",
871
+ default_lease_ttl_seconds=43200,
872
+ max_lease_ttl_seconds=86400,
873
+ kubernetes_host="https://127.0.0.1:61233",
874
+ kubernetes_ca_cert=std.file(input="/path/to/cert").result,
875
+ service_account_jwt=std.file(input="/path/to/token").result,
876
+ disable_local_ca_jwt=False)
877
+ ```
878
+
879
+ ## Import
880
+
881
+ The Kubernetes secret backend can be imported using its `path` e.g.
882
+
883
+ ```sh
884
+ $ pulumi import vault:kubernetes/secretBackend:SecretBackend config kubernetes
885
+ ```
886
+
887
+ :param str resource_name: The name of the resource.
888
+ :param pulumi.ResourceOptions opts: Options for the resource.
889
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
890
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
891
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
892
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
893
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
894
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
895
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
896
+ :param pulumi.Input[_builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
897
+ service account JWT when Vault is running in a Kubernetes pod.
898
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
899
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
900
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
901
+ :param pulumi.Input[_builtins.str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
902
+ secrets engine to verify the Kubernetes API server certificate. Defaults to the local
903
+ pod’s CA if Vault is running in Kubernetes. Otherwise, defaults to the root CA set where
904
+ Vault is running.
905
+ :param pulumi.Input[_builtins.str] kubernetes_host: The Kubernetes API URL to connect to. Required if the
906
+ standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
907
+ are not set on the host that Vault is running on.
908
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
909
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
910
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
911
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
912
+ The value should not contain leading or trailing forward slashes.
913
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
914
+ *Available only for Vault Enterprise*.
915
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
916
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
917
+ :param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
918
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
919
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
920
+ :param pulumi.Input[_builtins.str] service_account_jwt: The JSON web token of the service account used by the
921
+ secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
922
+ is running in Kubernetes.
923
+ """
924
+ ...
925
+ @overload
926
+ def __init__(__self__,
927
+ resource_name: str,
928
+ args: SecretBackendArgs,
929
+ opts: Optional[pulumi.ResourceOptions] = None):
930
+ """
931
+ ## Example Usage
932
+
933
+ ```python
934
+ import pulumi
935
+ import pulumi_std as std
936
+ import pulumi_vault as vault
937
+
938
+ config = vault.kubernetes.SecretBackend("config",
939
+ path="kubernetes",
940
+ description="kubernetes secrets engine description",
941
+ default_lease_ttl_seconds=43200,
942
+ max_lease_ttl_seconds=86400,
943
+ kubernetes_host="https://127.0.0.1:61233",
944
+ kubernetes_ca_cert=std.file(input="/path/to/cert").result,
945
+ service_account_jwt=std.file(input="/path/to/token").result,
946
+ disable_local_ca_jwt=False)
947
+ ```
948
+
949
+ ## Import
950
+
951
+ The Kubernetes secret backend can be imported using its `path` e.g.
952
+
953
+ ```sh
954
+ $ pulumi import vault:kubernetes/secretBackend:SecretBackend config kubernetes
955
+ ```
956
+
957
+ :param str resource_name: The name of the resource.
958
+ :param SecretBackendArgs args: The arguments to use to populate this resource's properties.
959
+ :param pulumi.ResourceOptions opts: Options for the resource.
960
+ """
961
+ ...
962
+ def __init__(__self__, resource_name: str, *args, **kwargs):
963
+ resource_args, opts = _utilities.get_resource_args_opts(SecretBackendArgs, pulumi.ResourceOptions, *args, **kwargs)
964
+ if resource_args is not None:
965
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
966
+ else:
967
+ __self__._internal_init(resource_name, *args, **kwargs)
968
+
969
+ def _internal_init(__self__,
970
+ resource_name: str,
971
+ opts: Optional[pulumi.ResourceOptions] = None,
972
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
973
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
974
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
975
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
976
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
977
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
978
+ description: Optional[pulumi.Input[_builtins.str]] = None,
979
+ disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
980
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
981
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
982
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
983
+ kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
984
+ kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
985
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
986
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
987
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
988
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
989
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
990
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
991
+ path: Optional[pulumi.Input[_builtins.str]] = None,
992
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
993
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
994
+ service_account_jwt: Optional[pulumi.Input[_builtins.str]] = None,
995
+ __props__=None):
996
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
997
+ if not isinstance(opts, pulumi.ResourceOptions):
998
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
999
+ if opts.id is None:
1000
+ if __props__ is not None:
1001
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
1002
+ __props__ = SecretBackendArgs.__new__(SecretBackendArgs)
1003
+
1004
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1005
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1006
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1007
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
1008
+ __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1009
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
1010
+ __props__.__dict__["description"] = description
1011
+ __props__.__dict__["disable_local_ca_jwt"] = disable_local_ca_jwt
1012
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1013
+ __props__.__dict__["force_no_cache"] = force_no_cache
1014
+ __props__.__dict__["identity_token_key"] = identity_token_key
1015
+ __props__.__dict__["kubernetes_ca_cert"] = kubernetes_ca_cert
1016
+ __props__.__dict__["kubernetes_host"] = kubernetes_host
1017
+ __props__.__dict__["listing_visibility"] = listing_visibility
1018
+ __props__.__dict__["local"] = local
1019
+ __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
1020
+ __props__.__dict__["namespace"] = namespace
1021
+ __props__.__dict__["options"] = options
1022
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
1023
+ if path is None and not opts.urn:
1024
+ raise TypeError("Missing required property 'path'")
1025
+ __props__.__dict__["path"] = path
1026
+ __props__.__dict__["plugin_version"] = plugin_version
1027
+ __props__.__dict__["seal_wrap"] = seal_wrap
1028
+ __props__.__dict__["service_account_jwt"] = None if service_account_jwt is None else pulumi.Output.secret(service_account_jwt)
1029
+ __props__.__dict__["accessor"] = None
1030
+ secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["serviceAccountJwt"])
1031
+ opts = pulumi.ResourceOptions.merge(opts, secret_opts)
1032
+ super(SecretBackend, __self__).__init__(
1033
+ 'vault:kubernetes/secretBackend:SecretBackend',
1034
+ resource_name,
1035
+ __props__,
1036
+ opts)
1037
+
1038
+ @staticmethod
1039
+ def get(resource_name: str,
1040
+ id: pulumi.Input[str],
1041
+ opts: Optional[pulumi.ResourceOptions] = None,
1042
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
1043
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1044
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1045
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1046
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1047
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1048
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1049
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1050
+ disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
1051
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1052
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1053
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1054
+ kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
1055
+ kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
1056
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1057
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1058
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1059
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1060
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1061
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1062
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1063
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1064
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1065
+ service_account_jwt: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackend':
1066
+ """
1067
+ Get an existing SecretBackend resource's state with the given name, id, and optional extra
1068
+ properties used to qualify the lookup.
1069
+
1070
+ :param str resource_name: The unique name of the resulting resource.
1071
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
1072
+ :param pulumi.ResourceOptions opts: Options for the resource.
1073
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
1074
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1075
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1076
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1077
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1078
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
1079
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1080
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
1081
+ :param pulumi.Input[_builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
1082
+ service account JWT when Vault is running in a Kubernetes pod.
1083
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1084
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1085
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1086
+ :param pulumi.Input[_builtins.str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
1087
+ secrets engine to verify the Kubernetes API server certificate. Defaults to the local
1088
+ pod’s CA if Vault is running in Kubernetes. Otherwise, defaults to the root CA set where
1089
+ Vault is running.
1090
+ :param pulumi.Input[_builtins.str] kubernetes_host: The Kubernetes API URL to connect to. Required if the
1091
+ standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
1092
+ are not set on the host that Vault is running on.
1093
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1094
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1095
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
1096
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
1097
+ The value should not contain leading or trailing forward slashes.
1098
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1099
+ *Available only for Vault Enterprise*.
1100
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1101
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1102
+ :param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
1103
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1104
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1105
+ :param pulumi.Input[_builtins.str] service_account_jwt: The JSON web token of the service account used by the
1106
+ secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
1107
+ is running in Kubernetes.
1108
+ """
1109
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
1110
+
1111
+ __props__ = _SecretBackendState.__new__(_SecretBackendState)
1112
+
1113
+ __props__.__dict__["accessor"] = accessor
1114
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1115
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1116
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1117
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
1118
+ __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1119
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
1120
+ __props__.__dict__["description"] = description
1121
+ __props__.__dict__["disable_local_ca_jwt"] = disable_local_ca_jwt
1122
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1123
+ __props__.__dict__["force_no_cache"] = force_no_cache
1124
+ __props__.__dict__["identity_token_key"] = identity_token_key
1125
+ __props__.__dict__["kubernetes_ca_cert"] = kubernetes_ca_cert
1126
+ __props__.__dict__["kubernetes_host"] = kubernetes_host
1127
+ __props__.__dict__["listing_visibility"] = listing_visibility
1128
+ __props__.__dict__["local"] = local
1129
+ __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
1130
+ __props__.__dict__["namespace"] = namespace
1131
+ __props__.__dict__["options"] = options
1132
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
1133
+ __props__.__dict__["path"] = path
1134
+ __props__.__dict__["plugin_version"] = plugin_version
1135
+ __props__.__dict__["seal_wrap"] = seal_wrap
1136
+ __props__.__dict__["service_account_jwt"] = service_account_jwt
1137
+ return SecretBackend(resource_name, opts=opts, __props__=__props__)
1138
+
1139
+ @_builtins.property
1140
+ @pulumi.getter
1141
+ def accessor(self) -> pulumi.Output[_builtins.str]:
1142
+ """
1143
+ Accessor of the mount
1144
+ """
1145
+ return pulumi.get(self, "accessor")
1146
+
1147
+ @_builtins.property
1148
+ @pulumi.getter(name="allowedManagedKeys")
1149
+ def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1150
+ """
1151
+ List of managed key registry entry names that the mount in question is allowed to access
1152
+ """
1153
+ return pulumi.get(self, "allowed_managed_keys")
1154
+
1155
+ @_builtins.property
1156
+ @pulumi.getter(name="allowedResponseHeaders")
1157
+ def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1158
+ """
1159
+ List of headers to allow and pass from the request to the plugin
1160
+ """
1161
+ return pulumi.get(self, "allowed_response_headers")
1162
+
1163
+ @_builtins.property
1164
+ @pulumi.getter(name="auditNonHmacRequestKeys")
1165
+ def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1166
+ """
1167
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1168
+ """
1169
+ return pulumi.get(self, "audit_non_hmac_request_keys")
1170
+
1171
+ @_builtins.property
1172
+ @pulumi.getter(name="auditNonHmacResponseKeys")
1173
+ def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1174
+ """
1175
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1176
+ """
1177
+ return pulumi.get(self, "audit_non_hmac_response_keys")
1178
+
1179
+ @_builtins.property
1180
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
1181
+ def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1182
+ """
1183
+ Default lease duration for tokens and secrets in seconds
1184
+ """
1185
+ return pulumi.get(self, "default_lease_ttl_seconds")
1186
+
1187
+ @_builtins.property
1188
+ @pulumi.getter(name="delegatedAuthAccessors")
1189
+ def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1190
+ """
1191
+ List of headers to allow and pass from the request to the plugin
1192
+ """
1193
+ return pulumi.get(self, "delegated_auth_accessors")
1194
+
1195
+ @_builtins.property
1196
+ @pulumi.getter
1197
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
1198
+ """
1199
+ Human-friendly description of the mount
1200
+ """
1201
+ return pulumi.get(self, "description")
1202
+
1203
+ @_builtins.property
1204
+ @pulumi.getter(name="disableLocalCaJwt")
1205
+ def disable_local_ca_jwt(self) -> pulumi.Output[Optional[_builtins.bool]]:
1206
+ """
1207
+ Disable defaulting to the local CA certificate and
1208
+ service account JWT when Vault is running in a Kubernetes pod.
1209
+ """
1210
+ return pulumi.get(self, "disable_local_ca_jwt")
1211
+
1212
+ @_builtins.property
1213
+ @pulumi.getter(name="externalEntropyAccess")
1214
+ def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
1215
+ """
1216
+ Enable the secrets engine to access Vault's external entropy source
1217
+ """
1218
+ return pulumi.get(self, "external_entropy_access")
1219
+
1220
+ @_builtins.property
1221
+ @pulumi.getter(name="forceNoCache")
1222
+ def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
1223
+ """
1224
+ If set to true, disables caching.
1225
+ """
1226
+ return pulumi.get(self, "force_no_cache")
1227
+
1228
+ @_builtins.property
1229
+ @pulumi.getter(name="identityTokenKey")
1230
+ def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
1231
+ """
1232
+ The key to use for signing plugin workload identity tokens
1233
+ """
1234
+ return pulumi.get(self, "identity_token_key")
1235
+
1236
+ @_builtins.property
1237
+ @pulumi.getter(name="kubernetesCaCert")
1238
+ def kubernetes_ca_cert(self) -> pulumi.Output[Optional[_builtins.str]]:
1239
+ """
1240
+ A PEM-encoded CA certificate used by the
1241
+ secrets engine to verify the Kubernetes API server certificate. Defaults to the local
1242
+ pod’s CA if Vault is running in Kubernetes. Otherwise, defaults to the root CA set where
1243
+ Vault is running.
1244
+ """
1245
+ return pulumi.get(self, "kubernetes_ca_cert")
1246
+
1247
+ @_builtins.property
1248
+ @pulumi.getter(name="kubernetesHost")
1249
+ def kubernetes_host(self) -> pulumi.Output[Optional[_builtins.str]]:
1250
+ """
1251
+ The Kubernetes API URL to connect to. Required if the
1252
+ standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
1253
+ are not set on the host that Vault is running on.
1254
+ """
1255
+ return pulumi.get(self, "kubernetes_host")
1256
+
1257
+ @_builtins.property
1258
+ @pulumi.getter(name="listingVisibility")
1259
+ def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
1260
+ """
1261
+ Specifies whether to show this mount in the UI-specific listing endpoint
1262
+ """
1263
+ return pulumi.get(self, "listing_visibility")
1264
+
1265
+ @_builtins.property
1266
+ @pulumi.getter
1267
+ def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
1268
+ """
1269
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1270
+ """
1271
+ return pulumi.get(self, "local")
1272
+
1273
+ @_builtins.property
1274
+ @pulumi.getter(name="maxLeaseTtlSeconds")
1275
+ def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1276
+ """
1277
+ Maximum possible lease duration for tokens and secrets in seconds
1278
+ """
1279
+ return pulumi.get(self, "max_lease_ttl_seconds")
1280
+
1281
+ @_builtins.property
1282
+ @pulumi.getter
1283
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
1284
+ """
1285
+ The namespace to provision the resource in.
1286
+ The value should not contain leading or trailing forward slashes.
1287
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1288
+ *Available only for Vault Enterprise*.
1289
+ """
1290
+ return pulumi.get(self, "namespace")
1291
+
1292
+ @_builtins.property
1293
+ @pulumi.getter
1294
+ def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
1295
+ """
1296
+ Specifies mount type specific options that are passed to the backend
1297
+ """
1298
+ return pulumi.get(self, "options")
1299
+
1300
+ @_builtins.property
1301
+ @pulumi.getter(name="passthroughRequestHeaders")
1302
+ def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1303
+ """
1304
+ List of headers to allow and pass from the request to the plugin
1305
+ """
1306
+ return pulumi.get(self, "passthrough_request_headers")
1307
+
1308
+ @_builtins.property
1309
+ @pulumi.getter
1310
+ def path(self) -> pulumi.Output[_builtins.str]:
1311
+ """
1312
+ Where the secret backend will be mounted
1313
+ """
1314
+ return pulumi.get(self, "path")
1315
+
1316
+ @_builtins.property
1317
+ @pulumi.getter(name="pluginVersion")
1318
+ def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
1319
+ """
1320
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1321
+ """
1322
+ return pulumi.get(self, "plugin_version")
1323
+
1324
+ @_builtins.property
1325
+ @pulumi.getter(name="sealWrap")
1326
+ def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
1327
+ """
1328
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1329
+ """
1330
+ return pulumi.get(self, "seal_wrap")
1331
+
1332
+ @_builtins.property
1333
+ @pulumi.getter(name="serviceAccountJwt")
1334
+ def service_account_jwt(self) -> pulumi.Output[Optional[_builtins.str]]:
1335
+ """
1336
+ The JSON web token of the service account used by the
1337
+ secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
1338
+ is running in Kubernetes.
1339
+ """
1340
+ return pulumi.get(self, "service_account_jwt")
1341
+