pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,455 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['SecretBackendV2Args', 'SecretBackendV2']
18
+
19
+ @pulumi.input_type
20
+ class SecretBackendV2Args:
21
+ def __init__(__self__, *,
22
+ mount: pulumi.Input[_builtins.str],
23
+ cas_required: Optional[pulumi.Input[_builtins.bool]] = None,
24
+ delete_version_after: Optional[pulumi.Input[_builtins.int]] = None,
25
+ max_versions: Optional[pulumi.Input[_builtins.int]] = None,
26
+ namespace: Optional[pulumi.Input[_builtins.str]] = None):
27
+ """
28
+ The set of arguments for constructing a SecretBackendV2 resource.
29
+ :param pulumi.Input[_builtins.str] mount: Path where KV-V2 engine is mounted.
30
+ :param pulumi.Input[_builtins.bool] cas_required: If true, all keys will require the cas
31
+ parameter to be set on all write requests.
32
+ :param pulumi.Input[_builtins.int] delete_version_after: If set, specifies the length of time before
33
+ a version is deleted. Accepts duration in integer seconds.
34
+ :param pulumi.Input[_builtins.int] max_versions: The number of versions to keep per key.
35
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
36
+ The value should not contain leading or trailing forward slashes.
37
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
38
+ *Available only for Vault Enterprise*.
39
+ """
40
+ pulumi.set(__self__, "mount", mount)
41
+ if cas_required is not None:
42
+ pulumi.set(__self__, "cas_required", cas_required)
43
+ if delete_version_after is not None:
44
+ pulumi.set(__self__, "delete_version_after", delete_version_after)
45
+ if max_versions is not None:
46
+ pulumi.set(__self__, "max_versions", max_versions)
47
+ if namespace is not None:
48
+ pulumi.set(__self__, "namespace", namespace)
49
+
50
+ @_builtins.property
51
+ @pulumi.getter
52
+ def mount(self) -> pulumi.Input[_builtins.str]:
53
+ """
54
+ Path where KV-V2 engine is mounted.
55
+ """
56
+ return pulumi.get(self, "mount")
57
+
58
+ @mount.setter
59
+ def mount(self, value: pulumi.Input[_builtins.str]):
60
+ pulumi.set(self, "mount", value)
61
+
62
+ @_builtins.property
63
+ @pulumi.getter(name="casRequired")
64
+ def cas_required(self) -> Optional[pulumi.Input[_builtins.bool]]:
65
+ """
66
+ If true, all keys will require the cas
67
+ parameter to be set on all write requests.
68
+ """
69
+ return pulumi.get(self, "cas_required")
70
+
71
+ @cas_required.setter
72
+ def cas_required(self, value: Optional[pulumi.Input[_builtins.bool]]):
73
+ pulumi.set(self, "cas_required", value)
74
+
75
+ @_builtins.property
76
+ @pulumi.getter(name="deleteVersionAfter")
77
+ def delete_version_after(self) -> Optional[pulumi.Input[_builtins.int]]:
78
+ """
79
+ If set, specifies the length of time before
80
+ a version is deleted. Accepts duration in integer seconds.
81
+ """
82
+ return pulumi.get(self, "delete_version_after")
83
+
84
+ @delete_version_after.setter
85
+ def delete_version_after(self, value: Optional[pulumi.Input[_builtins.int]]):
86
+ pulumi.set(self, "delete_version_after", value)
87
+
88
+ @_builtins.property
89
+ @pulumi.getter(name="maxVersions")
90
+ def max_versions(self) -> Optional[pulumi.Input[_builtins.int]]:
91
+ """
92
+ The number of versions to keep per key.
93
+ """
94
+ return pulumi.get(self, "max_versions")
95
+
96
+ @max_versions.setter
97
+ def max_versions(self, value: Optional[pulumi.Input[_builtins.int]]):
98
+ pulumi.set(self, "max_versions", value)
99
+
100
+ @_builtins.property
101
+ @pulumi.getter
102
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
103
+ """
104
+ The namespace to provision the resource in.
105
+ The value should not contain leading or trailing forward slashes.
106
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
107
+ *Available only for Vault Enterprise*.
108
+ """
109
+ return pulumi.get(self, "namespace")
110
+
111
+ @namespace.setter
112
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
113
+ pulumi.set(self, "namespace", value)
114
+
115
+
116
+ @pulumi.input_type
117
+ class _SecretBackendV2State:
118
+ def __init__(__self__, *,
119
+ cas_required: Optional[pulumi.Input[_builtins.bool]] = None,
120
+ delete_version_after: Optional[pulumi.Input[_builtins.int]] = None,
121
+ max_versions: Optional[pulumi.Input[_builtins.int]] = None,
122
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
123
+ namespace: Optional[pulumi.Input[_builtins.str]] = None):
124
+ """
125
+ Input properties used for looking up and filtering SecretBackendV2 resources.
126
+ :param pulumi.Input[_builtins.bool] cas_required: If true, all keys will require the cas
127
+ parameter to be set on all write requests.
128
+ :param pulumi.Input[_builtins.int] delete_version_after: If set, specifies the length of time before
129
+ a version is deleted. Accepts duration in integer seconds.
130
+ :param pulumi.Input[_builtins.int] max_versions: The number of versions to keep per key.
131
+ :param pulumi.Input[_builtins.str] mount: Path where KV-V2 engine is mounted.
132
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
133
+ The value should not contain leading or trailing forward slashes.
134
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
135
+ *Available only for Vault Enterprise*.
136
+ """
137
+ if cas_required is not None:
138
+ pulumi.set(__self__, "cas_required", cas_required)
139
+ if delete_version_after is not None:
140
+ pulumi.set(__self__, "delete_version_after", delete_version_after)
141
+ if max_versions is not None:
142
+ pulumi.set(__self__, "max_versions", max_versions)
143
+ if mount is not None:
144
+ pulumi.set(__self__, "mount", mount)
145
+ if namespace is not None:
146
+ pulumi.set(__self__, "namespace", namespace)
147
+
148
+ @_builtins.property
149
+ @pulumi.getter(name="casRequired")
150
+ def cas_required(self) -> Optional[pulumi.Input[_builtins.bool]]:
151
+ """
152
+ If true, all keys will require the cas
153
+ parameter to be set on all write requests.
154
+ """
155
+ return pulumi.get(self, "cas_required")
156
+
157
+ @cas_required.setter
158
+ def cas_required(self, value: Optional[pulumi.Input[_builtins.bool]]):
159
+ pulumi.set(self, "cas_required", value)
160
+
161
+ @_builtins.property
162
+ @pulumi.getter(name="deleteVersionAfter")
163
+ def delete_version_after(self) -> Optional[pulumi.Input[_builtins.int]]:
164
+ """
165
+ If set, specifies the length of time before
166
+ a version is deleted. Accepts duration in integer seconds.
167
+ """
168
+ return pulumi.get(self, "delete_version_after")
169
+
170
+ @delete_version_after.setter
171
+ def delete_version_after(self, value: Optional[pulumi.Input[_builtins.int]]):
172
+ pulumi.set(self, "delete_version_after", value)
173
+
174
+ @_builtins.property
175
+ @pulumi.getter(name="maxVersions")
176
+ def max_versions(self) -> Optional[pulumi.Input[_builtins.int]]:
177
+ """
178
+ The number of versions to keep per key.
179
+ """
180
+ return pulumi.get(self, "max_versions")
181
+
182
+ @max_versions.setter
183
+ def max_versions(self, value: Optional[pulumi.Input[_builtins.int]]):
184
+ pulumi.set(self, "max_versions", value)
185
+
186
+ @_builtins.property
187
+ @pulumi.getter
188
+ def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
189
+ """
190
+ Path where KV-V2 engine is mounted.
191
+ """
192
+ return pulumi.get(self, "mount")
193
+
194
+ @mount.setter
195
+ def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
196
+ pulumi.set(self, "mount", value)
197
+
198
+ @_builtins.property
199
+ @pulumi.getter
200
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
201
+ """
202
+ The namespace to provision the resource in.
203
+ The value should not contain leading or trailing forward slashes.
204
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
205
+ *Available only for Vault Enterprise*.
206
+ """
207
+ return pulumi.get(self, "namespace")
208
+
209
+ @namespace.setter
210
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
211
+ pulumi.set(self, "namespace", value)
212
+
213
+
214
+ @pulumi.type_token("vault:kv/secretBackendV2:SecretBackendV2")
215
+ class SecretBackendV2(pulumi.CustomResource):
216
+ @overload
217
+ def __init__(__self__,
218
+ resource_name: str,
219
+ opts: Optional[pulumi.ResourceOptions] = None,
220
+ cas_required: Optional[pulumi.Input[_builtins.bool]] = None,
221
+ delete_version_after: Optional[pulumi.Input[_builtins.int]] = None,
222
+ max_versions: Optional[pulumi.Input[_builtins.int]] = None,
223
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
224
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
225
+ __props__=None):
226
+ """
227
+ Configures KV-V2 backend level settings that are applied to
228
+ every key in the key-value store.
229
+
230
+ For more information on Vault's KV-V2 secret backend
231
+ [see here](https://www.vaultproject.io/docs/secrets/kv/kv-v2).
232
+
233
+ ## Example Usage
234
+
235
+ ```python
236
+ import pulumi
237
+ import pulumi_vault as vault
238
+
239
+ kvv2 = vault.Mount("kvv2",
240
+ path="kvv2",
241
+ type="kv",
242
+ options={
243
+ "version": "2",
244
+ },
245
+ description="KV Version 2 secret engine mount")
246
+ example = vault.kv.SecretBackendV2("example",
247
+ mount=kvv2.path,
248
+ max_versions=5,
249
+ delete_version_after=12600,
250
+ cas_required=True)
251
+ ```
252
+
253
+ ## Required Vault Capabilities
254
+
255
+ Use of this resource requires the `create` or `update` capability
256
+ (depending on whether the resource already exists) on the given path,
257
+ the `delete` capability if the resource is removed from configuration,
258
+ and the `read` capability for drift detection (by default).
259
+
260
+ ## Import
261
+
262
+ The KV-V2 secret backend can be imported using its unique ID,
263
+ the `${mount}/config`, e.g.
264
+
265
+ ```sh
266
+ $ pulumi import vault:kv/secretBackendV2:SecretBackendV2 example kvv2/config
267
+ ```
268
+
269
+ :param str resource_name: The name of the resource.
270
+ :param pulumi.ResourceOptions opts: Options for the resource.
271
+ :param pulumi.Input[_builtins.bool] cas_required: If true, all keys will require the cas
272
+ parameter to be set on all write requests.
273
+ :param pulumi.Input[_builtins.int] delete_version_after: If set, specifies the length of time before
274
+ a version is deleted. Accepts duration in integer seconds.
275
+ :param pulumi.Input[_builtins.int] max_versions: The number of versions to keep per key.
276
+ :param pulumi.Input[_builtins.str] mount: Path where KV-V2 engine is mounted.
277
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
278
+ The value should not contain leading or trailing forward slashes.
279
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
280
+ *Available only for Vault Enterprise*.
281
+ """
282
+ ...
283
+ @overload
284
+ def __init__(__self__,
285
+ resource_name: str,
286
+ args: SecretBackendV2Args,
287
+ opts: Optional[pulumi.ResourceOptions] = None):
288
+ """
289
+ Configures KV-V2 backend level settings that are applied to
290
+ every key in the key-value store.
291
+
292
+ For more information on Vault's KV-V2 secret backend
293
+ [see here](https://www.vaultproject.io/docs/secrets/kv/kv-v2).
294
+
295
+ ## Example Usage
296
+
297
+ ```python
298
+ import pulumi
299
+ import pulumi_vault as vault
300
+
301
+ kvv2 = vault.Mount("kvv2",
302
+ path="kvv2",
303
+ type="kv",
304
+ options={
305
+ "version": "2",
306
+ },
307
+ description="KV Version 2 secret engine mount")
308
+ example = vault.kv.SecretBackendV2("example",
309
+ mount=kvv2.path,
310
+ max_versions=5,
311
+ delete_version_after=12600,
312
+ cas_required=True)
313
+ ```
314
+
315
+ ## Required Vault Capabilities
316
+
317
+ Use of this resource requires the `create` or `update` capability
318
+ (depending on whether the resource already exists) on the given path,
319
+ the `delete` capability if the resource is removed from configuration,
320
+ and the `read` capability for drift detection (by default).
321
+
322
+ ## Import
323
+
324
+ The KV-V2 secret backend can be imported using its unique ID,
325
+ the `${mount}/config`, e.g.
326
+
327
+ ```sh
328
+ $ pulumi import vault:kv/secretBackendV2:SecretBackendV2 example kvv2/config
329
+ ```
330
+
331
+ :param str resource_name: The name of the resource.
332
+ :param SecretBackendV2Args args: The arguments to use to populate this resource's properties.
333
+ :param pulumi.ResourceOptions opts: Options for the resource.
334
+ """
335
+ ...
336
+ def __init__(__self__, resource_name: str, *args, **kwargs):
337
+ resource_args, opts = _utilities.get_resource_args_opts(SecretBackendV2Args, pulumi.ResourceOptions, *args, **kwargs)
338
+ if resource_args is not None:
339
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
340
+ else:
341
+ __self__._internal_init(resource_name, *args, **kwargs)
342
+
343
+ def _internal_init(__self__,
344
+ resource_name: str,
345
+ opts: Optional[pulumi.ResourceOptions] = None,
346
+ cas_required: Optional[pulumi.Input[_builtins.bool]] = None,
347
+ delete_version_after: Optional[pulumi.Input[_builtins.int]] = None,
348
+ max_versions: Optional[pulumi.Input[_builtins.int]] = None,
349
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
350
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
351
+ __props__=None):
352
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
353
+ if not isinstance(opts, pulumi.ResourceOptions):
354
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
355
+ if opts.id is None:
356
+ if __props__ is not None:
357
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
358
+ __props__ = SecretBackendV2Args.__new__(SecretBackendV2Args)
359
+
360
+ __props__.__dict__["cas_required"] = cas_required
361
+ __props__.__dict__["delete_version_after"] = delete_version_after
362
+ __props__.__dict__["max_versions"] = max_versions
363
+ if mount is None and not opts.urn:
364
+ raise TypeError("Missing required property 'mount'")
365
+ __props__.__dict__["mount"] = mount
366
+ __props__.__dict__["namespace"] = namespace
367
+ super(SecretBackendV2, __self__).__init__(
368
+ 'vault:kv/secretBackendV2:SecretBackendV2',
369
+ resource_name,
370
+ __props__,
371
+ opts)
372
+
373
+ @staticmethod
374
+ def get(resource_name: str,
375
+ id: pulumi.Input[str],
376
+ opts: Optional[pulumi.ResourceOptions] = None,
377
+ cas_required: Optional[pulumi.Input[_builtins.bool]] = None,
378
+ delete_version_after: Optional[pulumi.Input[_builtins.int]] = None,
379
+ max_versions: Optional[pulumi.Input[_builtins.int]] = None,
380
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
381
+ namespace: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackendV2':
382
+ """
383
+ Get an existing SecretBackendV2 resource's state with the given name, id, and optional extra
384
+ properties used to qualify the lookup.
385
+
386
+ :param str resource_name: The unique name of the resulting resource.
387
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
388
+ :param pulumi.ResourceOptions opts: Options for the resource.
389
+ :param pulumi.Input[_builtins.bool] cas_required: If true, all keys will require the cas
390
+ parameter to be set on all write requests.
391
+ :param pulumi.Input[_builtins.int] delete_version_after: If set, specifies the length of time before
392
+ a version is deleted. Accepts duration in integer seconds.
393
+ :param pulumi.Input[_builtins.int] max_versions: The number of versions to keep per key.
394
+ :param pulumi.Input[_builtins.str] mount: Path where KV-V2 engine is mounted.
395
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
396
+ The value should not contain leading or trailing forward slashes.
397
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
398
+ *Available only for Vault Enterprise*.
399
+ """
400
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
401
+
402
+ __props__ = _SecretBackendV2State.__new__(_SecretBackendV2State)
403
+
404
+ __props__.__dict__["cas_required"] = cas_required
405
+ __props__.__dict__["delete_version_after"] = delete_version_after
406
+ __props__.__dict__["max_versions"] = max_versions
407
+ __props__.__dict__["mount"] = mount
408
+ __props__.__dict__["namespace"] = namespace
409
+ return SecretBackendV2(resource_name, opts=opts, __props__=__props__)
410
+
411
+ @_builtins.property
412
+ @pulumi.getter(name="casRequired")
413
+ def cas_required(self) -> pulumi.Output[_builtins.bool]:
414
+ """
415
+ If true, all keys will require the cas
416
+ parameter to be set on all write requests.
417
+ """
418
+ return pulumi.get(self, "cas_required")
419
+
420
+ @_builtins.property
421
+ @pulumi.getter(name="deleteVersionAfter")
422
+ def delete_version_after(self) -> pulumi.Output[Optional[_builtins.int]]:
423
+ """
424
+ If set, specifies the length of time before
425
+ a version is deleted. Accepts duration in integer seconds.
426
+ """
427
+ return pulumi.get(self, "delete_version_after")
428
+
429
+ @_builtins.property
430
+ @pulumi.getter(name="maxVersions")
431
+ def max_versions(self) -> pulumi.Output[_builtins.int]:
432
+ """
433
+ The number of versions to keep per key.
434
+ """
435
+ return pulumi.get(self, "max_versions")
436
+
437
+ @_builtins.property
438
+ @pulumi.getter
439
+ def mount(self) -> pulumi.Output[_builtins.str]:
440
+ """
441
+ Path where KV-V2 engine is mounted.
442
+ """
443
+ return pulumi.get(self, "mount")
444
+
445
+ @_builtins.property
446
+ @pulumi.getter
447
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
448
+ """
449
+ The namespace to provision the resource in.
450
+ The value should not contain leading or trailing forward slashes.
451
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
452
+ *Available only for Vault Enterprise*.
453
+ """
454
+ return pulumi.get(self, "namespace")
455
+