pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
pulumi_vault/mount.py ADDED
@@ -0,0 +1,1262 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from . import _utilities
16
+
17
+ __all__ = ['MountArgs', 'Mount']
18
+
19
+ @pulumi.input_type
20
+ class MountArgs:
21
+ def __init__(__self__, *,
22
+ path: pulumi.Input[_builtins.str],
23
+ type: pulumi.Input[_builtins.str],
24
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
25
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
28
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
29
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
30
+ description: Optional[pulumi.Input[_builtins.str]] = None,
31
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
32
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
33
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
34
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
35
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
36
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
37
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
38
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
39
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
40
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
41
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None):
42
+ """
43
+ The set of arguments for constructing a Mount resource.
44
+ :param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
45
+ :param pulumi.Input[_builtins.str] type: Type of the backend, such as "aws"
46
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
47
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow, allowing a plugin to include
48
+ them in the response.
49
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
50
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
51
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
52
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of allowed authentication mount accessors the
53
+ backend can request delegated authentication for.
54
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
55
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
56
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
57
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens. If
58
+ not provided, this will default to Vault's OIDC default key.
59
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific
60
+ listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
61
+ :param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
62
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
63
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
64
+ The value should not contain leading or trailing forward slashes.
65
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
66
+ *Available only for Vault Enterprise*.
67
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
68
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to
69
+ the plugin.
70
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
71
+ If unspecified, the server will select any matching unversioned plugin that may have been
72
+ registered, the latest versioned plugin registered, or a built-in plugin in that order of precedence.
73
+ :param pulumi.Input[_builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
74
+ """
75
+ pulumi.set(__self__, "path", path)
76
+ pulumi.set(__self__, "type", type)
77
+ if allowed_managed_keys is not None:
78
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
79
+ if allowed_response_headers is not None:
80
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
81
+ if audit_non_hmac_request_keys is not None:
82
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
83
+ if audit_non_hmac_response_keys is not None:
84
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
85
+ if default_lease_ttl_seconds is not None:
86
+ pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
87
+ if delegated_auth_accessors is not None:
88
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
89
+ if description is not None:
90
+ pulumi.set(__self__, "description", description)
91
+ if external_entropy_access is not None:
92
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
93
+ if force_no_cache is not None:
94
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
95
+ if identity_token_key is not None:
96
+ pulumi.set(__self__, "identity_token_key", identity_token_key)
97
+ if listing_visibility is not None:
98
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
99
+ if local is not None:
100
+ pulumi.set(__self__, "local", local)
101
+ if max_lease_ttl_seconds is not None:
102
+ pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
103
+ if namespace is not None:
104
+ pulumi.set(__self__, "namespace", namespace)
105
+ if options is not None:
106
+ pulumi.set(__self__, "options", options)
107
+ if passthrough_request_headers is not None:
108
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
109
+ if plugin_version is not None:
110
+ pulumi.set(__self__, "plugin_version", plugin_version)
111
+ if seal_wrap is not None:
112
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
113
+
114
+ @_builtins.property
115
+ @pulumi.getter
116
+ def path(self) -> pulumi.Input[_builtins.str]:
117
+ """
118
+ Where the secret backend will be mounted
119
+ """
120
+ return pulumi.get(self, "path")
121
+
122
+ @path.setter
123
+ def path(self, value: pulumi.Input[_builtins.str]):
124
+ pulumi.set(self, "path", value)
125
+
126
+ @_builtins.property
127
+ @pulumi.getter
128
+ def type(self) -> pulumi.Input[_builtins.str]:
129
+ """
130
+ Type of the backend, such as "aws"
131
+ """
132
+ return pulumi.get(self, "type")
133
+
134
+ @type.setter
135
+ def type(self, value: pulumi.Input[_builtins.str]):
136
+ pulumi.set(self, "type", value)
137
+
138
+ @_builtins.property
139
+ @pulumi.getter(name="allowedManagedKeys")
140
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
141
+ """
142
+ Set of managed key registry entry names that the mount in question is allowed to access
143
+ """
144
+ return pulumi.get(self, "allowed_managed_keys")
145
+
146
+ @allowed_managed_keys.setter
147
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
148
+ pulumi.set(self, "allowed_managed_keys", value)
149
+
150
+ @_builtins.property
151
+ @pulumi.getter(name="allowedResponseHeaders")
152
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
153
+ """
154
+ List of headers to allow, allowing a plugin to include
155
+ them in the response.
156
+ """
157
+ return pulumi.get(self, "allowed_response_headers")
158
+
159
+ @allowed_response_headers.setter
160
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
161
+ pulumi.set(self, "allowed_response_headers", value)
162
+
163
+ @_builtins.property
164
+ @pulumi.getter(name="auditNonHmacRequestKeys")
165
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
166
+ """
167
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
168
+ """
169
+ return pulumi.get(self, "audit_non_hmac_request_keys")
170
+
171
+ @audit_non_hmac_request_keys.setter
172
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
173
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
174
+
175
+ @_builtins.property
176
+ @pulumi.getter(name="auditNonHmacResponseKeys")
177
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
178
+ """
179
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
180
+ """
181
+ return pulumi.get(self, "audit_non_hmac_response_keys")
182
+
183
+ @audit_non_hmac_response_keys.setter
184
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
185
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
186
+
187
+ @_builtins.property
188
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
189
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
190
+ """
191
+ Default lease duration for tokens and secrets in seconds
192
+ """
193
+ return pulumi.get(self, "default_lease_ttl_seconds")
194
+
195
+ @default_lease_ttl_seconds.setter
196
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
197
+ pulumi.set(self, "default_lease_ttl_seconds", value)
198
+
199
+ @_builtins.property
200
+ @pulumi.getter(name="delegatedAuthAccessors")
201
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
202
+ """
203
+ List of allowed authentication mount accessors the
204
+ backend can request delegated authentication for.
205
+ """
206
+ return pulumi.get(self, "delegated_auth_accessors")
207
+
208
+ @delegated_auth_accessors.setter
209
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
210
+ pulumi.set(self, "delegated_auth_accessors", value)
211
+
212
+ @_builtins.property
213
+ @pulumi.getter
214
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
215
+ """
216
+ Human-friendly description of the mount
217
+ """
218
+ return pulumi.get(self, "description")
219
+
220
+ @description.setter
221
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
222
+ pulumi.set(self, "description", value)
223
+
224
+ @_builtins.property
225
+ @pulumi.getter(name="externalEntropyAccess")
226
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
227
+ """
228
+ Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
229
+ """
230
+ return pulumi.get(self, "external_entropy_access")
231
+
232
+ @external_entropy_access.setter
233
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
234
+ pulumi.set(self, "external_entropy_access", value)
235
+
236
+ @_builtins.property
237
+ @pulumi.getter(name="forceNoCache")
238
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
239
+ """
240
+ If set to true, disables caching.
241
+ """
242
+ return pulumi.get(self, "force_no_cache")
243
+
244
+ @force_no_cache.setter
245
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
246
+ pulumi.set(self, "force_no_cache", value)
247
+
248
+ @_builtins.property
249
+ @pulumi.getter(name="identityTokenKey")
250
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
251
+ """
252
+ The key to use for signing plugin workload identity tokens. If
253
+ not provided, this will default to Vault's OIDC default key.
254
+ """
255
+ return pulumi.get(self, "identity_token_key")
256
+
257
+ @identity_token_key.setter
258
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
259
+ pulumi.set(self, "identity_token_key", value)
260
+
261
+ @_builtins.property
262
+ @pulumi.getter(name="listingVisibility")
263
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
264
+ """
265
+ Specifies whether to show this mount in the UI-specific
266
+ listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
267
+ """
268
+ return pulumi.get(self, "listing_visibility")
269
+
270
+ @listing_visibility.setter
271
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
272
+ pulumi.set(self, "listing_visibility", value)
273
+
274
+ @_builtins.property
275
+ @pulumi.getter
276
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
277
+ """
278
+ Boolean flag that can be explicitly set to true to enforce local mount in HA environment
279
+ """
280
+ return pulumi.get(self, "local")
281
+
282
+ @local.setter
283
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
284
+ pulumi.set(self, "local", value)
285
+
286
+ @_builtins.property
287
+ @pulumi.getter(name="maxLeaseTtlSeconds")
288
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
289
+ """
290
+ Maximum possible lease duration for tokens and secrets in seconds
291
+ """
292
+ return pulumi.get(self, "max_lease_ttl_seconds")
293
+
294
+ @max_lease_ttl_seconds.setter
295
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
296
+ pulumi.set(self, "max_lease_ttl_seconds", value)
297
+
298
+ @_builtins.property
299
+ @pulumi.getter
300
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
301
+ """
302
+ The namespace to provision the resource in.
303
+ The value should not contain leading or trailing forward slashes.
304
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
305
+ *Available only for Vault Enterprise*.
306
+ """
307
+ return pulumi.get(self, "namespace")
308
+
309
+ @namespace.setter
310
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
311
+ pulumi.set(self, "namespace", value)
312
+
313
+ @_builtins.property
314
+ @pulumi.getter
315
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
316
+ """
317
+ Specifies mount type specific options that are passed to the backend
318
+ """
319
+ return pulumi.get(self, "options")
320
+
321
+ @options.setter
322
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
323
+ pulumi.set(self, "options", value)
324
+
325
+ @_builtins.property
326
+ @pulumi.getter(name="passthroughRequestHeaders")
327
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
328
+ """
329
+ List of headers to allow and pass from the request to
330
+ the plugin.
331
+ """
332
+ return pulumi.get(self, "passthrough_request_headers")
333
+
334
+ @passthrough_request_headers.setter
335
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
336
+ pulumi.set(self, "passthrough_request_headers", value)
337
+
338
+ @_builtins.property
339
+ @pulumi.getter(name="pluginVersion")
340
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
341
+ """
342
+ Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
343
+ If unspecified, the server will select any matching unversioned plugin that may have been
344
+ registered, the latest versioned plugin registered, or a built-in plugin in that order of precedence.
345
+ """
346
+ return pulumi.get(self, "plugin_version")
347
+
348
+ @plugin_version.setter
349
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
350
+ pulumi.set(self, "plugin_version", value)
351
+
352
+ @_builtins.property
353
+ @pulumi.getter(name="sealWrap")
354
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
355
+ """
356
+ Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
357
+ """
358
+ return pulumi.get(self, "seal_wrap")
359
+
360
+ @seal_wrap.setter
361
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
362
+ pulumi.set(self, "seal_wrap", value)
363
+
364
+
365
+ @pulumi.input_type
366
+ class _MountState:
367
+ def __init__(__self__, *,
368
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
369
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
370
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
371
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
372
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
373
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
374
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
375
+ description: Optional[pulumi.Input[_builtins.str]] = None,
376
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
377
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
378
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
379
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
380
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
381
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
382
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
383
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
384
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
385
+ path: Optional[pulumi.Input[_builtins.str]] = None,
386
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
387
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
388
+ type: Optional[pulumi.Input[_builtins.str]] = None):
389
+ """
390
+ Input properties used for looking up and filtering Mount resources.
391
+ :param pulumi.Input[_builtins.str] accessor: The accessor for this mount.
392
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
393
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow, allowing a plugin to include
394
+ them in the response.
395
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
396
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
397
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
398
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of allowed authentication mount accessors the
399
+ backend can request delegated authentication for.
400
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
401
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
402
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
403
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens. If
404
+ not provided, this will default to Vault's OIDC default key.
405
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific
406
+ listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
407
+ :param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
408
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
409
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
410
+ The value should not contain leading or trailing forward slashes.
411
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
412
+ *Available only for Vault Enterprise*.
413
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
414
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to
415
+ the plugin.
416
+ :param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
417
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
418
+ If unspecified, the server will select any matching unversioned plugin that may have been
419
+ registered, the latest versioned plugin registered, or a built-in plugin in that order of precedence.
420
+ :param pulumi.Input[_builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
421
+ :param pulumi.Input[_builtins.str] type: Type of the backend, such as "aws"
422
+ """
423
+ if accessor is not None:
424
+ pulumi.set(__self__, "accessor", accessor)
425
+ if allowed_managed_keys is not None:
426
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
427
+ if allowed_response_headers is not None:
428
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
429
+ if audit_non_hmac_request_keys is not None:
430
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
431
+ if audit_non_hmac_response_keys is not None:
432
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
433
+ if default_lease_ttl_seconds is not None:
434
+ pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
435
+ if delegated_auth_accessors is not None:
436
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
437
+ if description is not None:
438
+ pulumi.set(__self__, "description", description)
439
+ if external_entropy_access is not None:
440
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
441
+ if force_no_cache is not None:
442
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
443
+ if identity_token_key is not None:
444
+ pulumi.set(__self__, "identity_token_key", identity_token_key)
445
+ if listing_visibility is not None:
446
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
447
+ if local is not None:
448
+ pulumi.set(__self__, "local", local)
449
+ if max_lease_ttl_seconds is not None:
450
+ pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
451
+ if namespace is not None:
452
+ pulumi.set(__self__, "namespace", namespace)
453
+ if options is not None:
454
+ pulumi.set(__self__, "options", options)
455
+ if passthrough_request_headers is not None:
456
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
457
+ if path is not None:
458
+ pulumi.set(__self__, "path", path)
459
+ if plugin_version is not None:
460
+ pulumi.set(__self__, "plugin_version", plugin_version)
461
+ if seal_wrap is not None:
462
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
463
+ if type is not None:
464
+ pulumi.set(__self__, "type", type)
465
+
466
+ @_builtins.property
467
+ @pulumi.getter
468
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
469
+ """
470
+ The accessor for this mount.
471
+ """
472
+ return pulumi.get(self, "accessor")
473
+
474
+ @accessor.setter
475
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
476
+ pulumi.set(self, "accessor", value)
477
+
478
+ @_builtins.property
479
+ @pulumi.getter(name="allowedManagedKeys")
480
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
481
+ """
482
+ Set of managed key registry entry names that the mount in question is allowed to access
483
+ """
484
+ return pulumi.get(self, "allowed_managed_keys")
485
+
486
+ @allowed_managed_keys.setter
487
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
488
+ pulumi.set(self, "allowed_managed_keys", value)
489
+
490
+ @_builtins.property
491
+ @pulumi.getter(name="allowedResponseHeaders")
492
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
493
+ """
494
+ List of headers to allow, allowing a plugin to include
495
+ them in the response.
496
+ """
497
+ return pulumi.get(self, "allowed_response_headers")
498
+
499
+ @allowed_response_headers.setter
500
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
501
+ pulumi.set(self, "allowed_response_headers", value)
502
+
503
+ @_builtins.property
504
+ @pulumi.getter(name="auditNonHmacRequestKeys")
505
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
506
+ """
507
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
508
+ """
509
+ return pulumi.get(self, "audit_non_hmac_request_keys")
510
+
511
+ @audit_non_hmac_request_keys.setter
512
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
513
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
514
+
515
+ @_builtins.property
516
+ @pulumi.getter(name="auditNonHmacResponseKeys")
517
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
518
+ """
519
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
520
+ """
521
+ return pulumi.get(self, "audit_non_hmac_response_keys")
522
+
523
+ @audit_non_hmac_response_keys.setter
524
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
525
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
526
+
527
+ @_builtins.property
528
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
529
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
530
+ """
531
+ Default lease duration for tokens and secrets in seconds
532
+ """
533
+ return pulumi.get(self, "default_lease_ttl_seconds")
534
+
535
+ @default_lease_ttl_seconds.setter
536
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
537
+ pulumi.set(self, "default_lease_ttl_seconds", value)
538
+
539
+ @_builtins.property
540
+ @pulumi.getter(name="delegatedAuthAccessors")
541
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
542
+ """
543
+ List of allowed authentication mount accessors the
544
+ backend can request delegated authentication for.
545
+ """
546
+ return pulumi.get(self, "delegated_auth_accessors")
547
+
548
+ @delegated_auth_accessors.setter
549
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
550
+ pulumi.set(self, "delegated_auth_accessors", value)
551
+
552
+ @_builtins.property
553
+ @pulumi.getter
554
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
555
+ """
556
+ Human-friendly description of the mount
557
+ """
558
+ return pulumi.get(self, "description")
559
+
560
+ @description.setter
561
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
562
+ pulumi.set(self, "description", value)
563
+
564
+ @_builtins.property
565
+ @pulumi.getter(name="externalEntropyAccess")
566
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
567
+ """
568
+ Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
569
+ """
570
+ return pulumi.get(self, "external_entropy_access")
571
+
572
+ @external_entropy_access.setter
573
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
574
+ pulumi.set(self, "external_entropy_access", value)
575
+
576
+ @_builtins.property
577
+ @pulumi.getter(name="forceNoCache")
578
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
579
+ """
580
+ If set to true, disables caching.
581
+ """
582
+ return pulumi.get(self, "force_no_cache")
583
+
584
+ @force_no_cache.setter
585
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
586
+ pulumi.set(self, "force_no_cache", value)
587
+
588
+ @_builtins.property
589
+ @pulumi.getter(name="identityTokenKey")
590
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
591
+ """
592
+ The key to use for signing plugin workload identity tokens. If
593
+ not provided, this will default to Vault's OIDC default key.
594
+ """
595
+ return pulumi.get(self, "identity_token_key")
596
+
597
+ @identity_token_key.setter
598
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
599
+ pulumi.set(self, "identity_token_key", value)
600
+
601
+ @_builtins.property
602
+ @pulumi.getter(name="listingVisibility")
603
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
604
+ """
605
+ Specifies whether to show this mount in the UI-specific
606
+ listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
607
+ """
608
+ return pulumi.get(self, "listing_visibility")
609
+
610
+ @listing_visibility.setter
611
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
612
+ pulumi.set(self, "listing_visibility", value)
613
+
614
+ @_builtins.property
615
+ @pulumi.getter
616
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
617
+ """
618
+ Boolean flag that can be explicitly set to true to enforce local mount in HA environment
619
+ """
620
+ return pulumi.get(self, "local")
621
+
622
+ @local.setter
623
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
624
+ pulumi.set(self, "local", value)
625
+
626
+ @_builtins.property
627
+ @pulumi.getter(name="maxLeaseTtlSeconds")
628
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
629
+ """
630
+ Maximum possible lease duration for tokens and secrets in seconds
631
+ """
632
+ return pulumi.get(self, "max_lease_ttl_seconds")
633
+
634
+ @max_lease_ttl_seconds.setter
635
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
636
+ pulumi.set(self, "max_lease_ttl_seconds", value)
637
+
638
+ @_builtins.property
639
+ @pulumi.getter
640
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
641
+ """
642
+ The namespace to provision the resource in.
643
+ The value should not contain leading or trailing forward slashes.
644
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
645
+ *Available only for Vault Enterprise*.
646
+ """
647
+ return pulumi.get(self, "namespace")
648
+
649
+ @namespace.setter
650
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
651
+ pulumi.set(self, "namespace", value)
652
+
653
+ @_builtins.property
654
+ @pulumi.getter
655
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
656
+ """
657
+ Specifies mount type specific options that are passed to the backend
658
+ """
659
+ return pulumi.get(self, "options")
660
+
661
+ @options.setter
662
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
663
+ pulumi.set(self, "options", value)
664
+
665
+ @_builtins.property
666
+ @pulumi.getter(name="passthroughRequestHeaders")
667
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
668
+ """
669
+ List of headers to allow and pass from the request to
670
+ the plugin.
671
+ """
672
+ return pulumi.get(self, "passthrough_request_headers")
673
+
674
+ @passthrough_request_headers.setter
675
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
676
+ pulumi.set(self, "passthrough_request_headers", value)
677
+
678
+ @_builtins.property
679
+ @pulumi.getter
680
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
681
+ """
682
+ Where the secret backend will be mounted
683
+ """
684
+ return pulumi.get(self, "path")
685
+
686
+ @path.setter
687
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
688
+ pulumi.set(self, "path", value)
689
+
690
+ @_builtins.property
691
+ @pulumi.getter(name="pluginVersion")
692
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
693
+ """
694
+ Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
695
+ If unspecified, the server will select any matching unversioned plugin that may have been
696
+ registered, the latest versioned plugin registered, or a built-in plugin in that order of precedence.
697
+ """
698
+ return pulumi.get(self, "plugin_version")
699
+
700
+ @plugin_version.setter
701
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
702
+ pulumi.set(self, "plugin_version", value)
703
+
704
+ @_builtins.property
705
+ @pulumi.getter(name="sealWrap")
706
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
707
+ """
708
+ Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
709
+ """
710
+ return pulumi.get(self, "seal_wrap")
711
+
712
+ @seal_wrap.setter
713
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
714
+ pulumi.set(self, "seal_wrap", value)
715
+
716
+ @_builtins.property
717
+ @pulumi.getter
718
+ def type(self) -> Optional[pulumi.Input[_builtins.str]]:
719
+ """
720
+ Type of the backend, such as "aws"
721
+ """
722
+ return pulumi.get(self, "type")
723
+
724
+ @type.setter
725
+ def type(self, value: Optional[pulumi.Input[_builtins.str]]):
726
+ pulumi.set(self, "type", value)
727
+
728
+
729
+ @pulumi.type_token("vault:index/mount:Mount")
730
+ class Mount(pulumi.CustomResource):
731
+ @overload
732
+ def __init__(__self__,
733
+ resource_name: str,
734
+ opts: Optional[pulumi.ResourceOptions] = None,
735
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
736
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
737
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
738
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
739
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
740
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
741
+ description: Optional[pulumi.Input[_builtins.str]] = None,
742
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
743
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
744
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
745
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
746
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
747
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
748
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
749
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
750
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
751
+ path: Optional[pulumi.Input[_builtins.str]] = None,
752
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
753
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
754
+ type: Optional[pulumi.Input[_builtins.str]] = None,
755
+ __props__=None):
756
+ """
757
+ This resource enables a new secrets engine at the given path.
758
+
759
+ ## Example Usage
760
+
761
+ ```python
762
+ import pulumi
763
+ import pulumi_vault as vault
764
+
765
+ example = vault.Mount("example",
766
+ path="dummy",
767
+ type="generic",
768
+ description="This is an example mount")
769
+ ```
770
+
771
+ ```python
772
+ import pulumi
773
+ import pulumi_vault as vault
774
+
775
+ kvv2_example = vault.Mount("kvv2-example",
776
+ path="version2-example",
777
+ type="kv-v2",
778
+ options={
779
+ "version": "2",
780
+ "type": "kv-v2",
781
+ },
782
+ description="This is an example KV Version 2 secret engine mount")
783
+ ```
784
+
785
+ ```python
786
+ import pulumi
787
+ import pulumi_vault as vault
788
+
789
+ transit_example = vault.Mount("transit-example",
790
+ path="transit-example",
791
+ type="transit",
792
+ description="This is an example transit secret engine mount",
793
+ options={
794
+ "convergent_encryption": "false",
795
+ })
796
+ ```
797
+
798
+ ```python
799
+ import pulumi
800
+ import pulumi_vault as vault
801
+
802
+ pki_example = vault.Mount("pki-example",
803
+ path="pki-example",
804
+ type="pki",
805
+ description="This is an example PKI mount",
806
+ default_lease_ttl_seconds=3600,
807
+ max_lease_ttl_seconds=86400)
808
+ ```
809
+
810
+ ## Import
811
+
812
+ Mounts can be imported using the `path`, e.g.
813
+
814
+ ```sh
815
+ $ pulumi import vault:index/mount:Mount example dummy
816
+ ```
817
+
818
+ :param str resource_name: The name of the resource.
819
+ :param pulumi.ResourceOptions opts: Options for the resource.
820
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
821
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow, allowing a plugin to include
822
+ them in the response.
823
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
824
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
825
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
826
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of allowed authentication mount accessors the
827
+ backend can request delegated authentication for.
828
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
829
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
830
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
831
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens. If
832
+ not provided, this will default to Vault's OIDC default key.
833
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific
834
+ listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
835
+ :param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
836
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
837
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
838
+ The value should not contain leading or trailing forward slashes.
839
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
840
+ *Available only for Vault Enterprise*.
841
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
842
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to
843
+ the plugin.
844
+ :param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
845
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
846
+ If unspecified, the server will select any matching unversioned plugin that may have been
847
+ registered, the latest versioned plugin registered, or a built-in plugin in that order of precedence.
848
+ :param pulumi.Input[_builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
849
+ :param pulumi.Input[_builtins.str] type: Type of the backend, such as "aws"
850
+ """
851
+ ...
852
+ @overload
853
+ def __init__(__self__,
854
+ resource_name: str,
855
+ args: MountArgs,
856
+ opts: Optional[pulumi.ResourceOptions] = None):
857
+ """
858
+ This resource enables a new secrets engine at the given path.
859
+
860
+ ## Example Usage
861
+
862
+ ```python
863
+ import pulumi
864
+ import pulumi_vault as vault
865
+
866
+ example = vault.Mount("example",
867
+ path="dummy",
868
+ type="generic",
869
+ description="This is an example mount")
870
+ ```
871
+
872
+ ```python
873
+ import pulumi
874
+ import pulumi_vault as vault
875
+
876
+ kvv2_example = vault.Mount("kvv2-example",
877
+ path="version2-example",
878
+ type="kv-v2",
879
+ options={
880
+ "version": "2",
881
+ "type": "kv-v2",
882
+ },
883
+ description="This is an example KV Version 2 secret engine mount")
884
+ ```
885
+
886
+ ```python
887
+ import pulumi
888
+ import pulumi_vault as vault
889
+
890
+ transit_example = vault.Mount("transit-example",
891
+ path="transit-example",
892
+ type="transit",
893
+ description="This is an example transit secret engine mount",
894
+ options={
895
+ "convergent_encryption": "false",
896
+ })
897
+ ```
898
+
899
+ ```python
900
+ import pulumi
901
+ import pulumi_vault as vault
902
+
903
+ pki_example = vault.Mount("pki-example",
904
+ path="pki-example",
905
+ type="pki",
906
+ description="This is an example PKI mount",
907
+ default_lease_ttl_seconds=3600,
908
+ max_lease_ttl_seconds=86400)
909
+ ```
910
+
911
+ ## Import
912
+
913
+ Mounts can be imported using the `path`, e.g.
914
+
915
+ ```sh
916
+ $ pulumi import vault:index/mount:Mount example dummy
917
+ ```
918
+
919
+ :param str resource_name: The name of the resource.
920
+ :param MountArgs args: The arguments to use to populate this resource's properties.
921
+ :param pulumi.ResourceOptions opts: Options for the resource.
922
+ """
923
+ ...
924
+ def __init__(__self__, resource_name: str, *args, **kwargs):
925
+ resource_args, opts = _utilities.get_resource_args_opts(MountArgs, pulumi.ResourceOptions, *args, **kwargs)
926
+ if resource_args is not None:
927
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
928
+ else:
929
+ __self__._internal_init(resource_name, *args, **kwargs)
930
+
931
+ def _internal_init(__self__,
932
+ resource_name: str,
933
+ opts: Optional[pulumi.ResourceOptions] = None,
934
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
935
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
936
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
937
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
938
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
939
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
940
+ description: Optional[pulumi.Input[_builtins.str]] = None,
941
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
942
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
943
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
944
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
945
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
946
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
947
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
948
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
949
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
950
+ path: Optional[pulumi.Input[_builtins.str]] = None,
951
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
952
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
953
+ type: Optional[pulumi.Input[_builtins.str]] = None,
954
+ __props__=None):
955
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
956
+ if not isinstance(opts, pulumi.ResourceOptions):
957
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
958
+ if opts.id is None:
959
+ if __props__ is not None:
960
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
961
+ __props__ = MountArgs.__new__(MountArgs)
962
+
963
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
964
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
965
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
966
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
967
+ __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
968
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
969
+ __props__.__dict__["description"] = description
970
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
971
+ __props__.__dict__["force_no_cache"] = force_no_cache
972
+ __props__.__dict__["identity_token_key"] = identity_token_key
973
+ __props__.__dict__["listing_visibility"] = listing_visibility
974
+ __props__.__dict__["local"] = local
975
+ __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
976
+ __props__.__dict__["namespace"] = namespace
977
+ __props__.__dict__["options"] = options
978
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
979
+ if path is None and not opts.urn:
980
+ raise TypeError("Missing required property 'path'")
981
+ __props__.__dict__["path"] = path
982
+ __props__.__dict__["plugin_version"] = plugin_version
983
+ __props__.__dict__["seal_wrap"] = seal_wrap
984
+ if type is None and not opts.urn:
985
+ raise TypeError("Missing required property 'type'")
986
+ __props__.__dict__["type"] = type
987
+ __props__.__dict__["accessor"] = None
988
+ super(Mount, __self__).__init__(
989
+ 'vault:index/mount:Mount',
990
+ resource_name,
991
+ __props__,
992
+ opts)
993
+
994
+ @staticmethod
995
+ def get(resource_name: str,
996
+ id: pulumi.Input[str],
997
+ opts: Optional[pulumi.ResourceOptions] = None,
998
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
999
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1000
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1001
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1002
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1003
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1004
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1005
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1006
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1007
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1008
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1009
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1010
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1011
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1012
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1013
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1014
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1015
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1016
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1017
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1018
+ type: Optional[pulumi.Input[_builtins.str]] = None) -> 'Mount':
1019
+ """
1020
+ Get an existing Mount resource's state with the given name, id, and optional extra
1021
+ properties used to qualify the lookup.
1022
+
1023
+ :param str resource_name: The unique name of the resulting resource.
1024
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
1025
+ :param pulumi.ResourceOptions opts: Options for the resource.
1026
+ :param pulumi.Input[_builtins.str] accessor: The accessor for this mount.
1027
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
1028
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow, allowing a plugin to include
1029
+ them in the response.
1030
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1031
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1032
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
1033
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of allowed authentication mount accessors the
1034
+ backend can request delegated authentication for.
1035
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
1036
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
1037
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1038
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens. If
1039
+ not provided, this will default to Vault's OIDC default key.
1040
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific
1041
+ listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
1042
+ :param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
1043
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
1044
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
1045
+ The value should not contain leading or trailing forward slashes.
1046
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1047
+ *Available only for Vault Enterprise*.
1048
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1049
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to
1050
+ the plugin.
1051
+ :param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
1052
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
1053
+ If unspecified, the server will select any matching unversioned plugin that may have been
1054
+ registered, the latest versioned plugin registered, or a built-in plugin in that order of precedence.
1055
+ :param pulumi.Input[_builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1056
+ :param pulumi.Input[_builtins.str] type: Type of the backend, such as "aws"
1057
+ """
1058
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
1059
+
1060
+ __props__ = _MountState.__new__(_MountState)
1061
+
1062
+ __props__.__dict__["accessor"] = accessor
1063
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1064
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1065
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1066
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
1067
+ __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1068
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
1069
+ __props__.__dict__["description"] = description
1070
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1071
+ __props__.__dict__["force_no_cache"] = force_no_cache
1072
+ __props__.__dict__["identity_token_key"] = identity_token_key
1073
+ __props__.__dict__["listing_visibility"] = listing_visibility
1074
+ __props__.__dict__["local"] = local
1075
+ __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
1076
+ __props__.__dict__["namespace"] = namespace
1077
+ __props__.__dict__["options"] = options
1078
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
1079
+ __props__.__dict__["path"] = path
1080
+ __props__.__dict__["plugin_version"] = plugin_version
1081
+ __props__.__dict__["seal_wrap"] = seal_wrap
1082
+ __props__.__dict__["type"] = type
1083
+ return Mount(resource_name, opts=opts, __props__=__props__)
1084
+
1085
+ @_builtins.property
1086
+ @pulumi.getter
1087
+ def accessor(self) -> pulumi.Output[_builtins.str]:
1088
+ """
1089
+ The accessor for this mount.
1090
+ """
1091
+ return pulumi.get(self, "accessor")
1092
+
1093
+ @_builtins.property
1094
+ @pulumi.getter(name="allowedManagedKeys")
1095
+ def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1096
+ """
1097
+ Set of managed key registry entry names that the mount in question is allowed to access
1098
+ """
1099
+ return pulumi.get(self, "allowed_managed_keys")
1100
+
1101
+ @_builtins.property
1102
+ @pulumi.getter(name="allowedResponseHeaders")
1103
+ def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1104
+ """
1105
+ List of headers to allow, allowing a plugin to include
1106
+ them in the response.
1107
+ """
1108
+ return pulumi.get(self, "allowed_response_headers")
1109
+
1110
+ @_builtins.property
1111
+ @pulumi.getter(name="auditNonHmacRequestKeys")
1112
+ def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1113
+ """
1114
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1115
+ """
1116
+ return pulumi.get(self, "audit_non_hmac_request_keys")
1117
+
1118
+ @_builtins.property
1119
+ @pulumi.getter(name="auditNonHmacResponseKeys")
1120
+ def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1121
+ """
1122
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1123
+ """
1124
+ return pulumi.get(self, "audit_non_hmac_response_keys")
1125
+
1126
+ @_builtins.property
1127
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
1128
+ def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1129
+ """
1130
+ Default lease duration for tokens and secrets in seconds
1131
+ """
1132
+ return pulumi.get(self, "default_lease_ttl_seconds")
1133
+
1134
+ @_builtins.property
1135
+ @pulumi.getter(name="delegatedAuthAccessors")
1136
+ def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1137
+ """
1138
+ List of allowed authentication mount accessors the
1139
+ backend can request delegated authentication for.
1140
+ """
1141
+ return pulumi.get(self, "delegated_auth_accessors")
1142
+
1143
+ @_builtins.property
1144
+ @pulumi.getter
1145
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
1146
+ """
1147
+ Human-friendly description of the mount
1148
+ """
1149
+ return pulumi.get(self, "description")
1150
+
1151
+ @_builtins.property
1152
+ @pulumi.getter(name="externalEntropyAccess")
1153
+ def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
1154
+ """
1155
+ Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
1156
+ """
1157
+ return pulumi.get(self, "external_entropy_access")
1158
+
1159
+ @_builtins.property
1160
+ @pulumi.getter(name="forceNoCache")
1161
+ def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
1162
+ """
1163
+ If set to true, disables caching.
1164
+ """
1165
+ return pulumi.get(self, "force_no_cache")
1166
+
1167
+ @_builtins.property
1168
+ @pulumi.getter(name="identityTokenKey")
1169
+ def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
1170
+ """
1171
+ The key to use for signing plugin workload identity tokens. If
1172
+ not provided, this will default to Vault's OIDC default key.
1173
+ """
1174
+ return pulumi.get(self, "identity_token_key")
1175
+
1176
+ @_builtins.property
1177
+ @pulumi.getter(name="listingVisibility")
1178
+ def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
1179
+ """
1180
+ Specifies whether to show this mount in the UI-specific
1181
+ listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
1182
+ """
1183
+ return pulumi.get(self, "listing_visibility")
1184
+
1185
+ @_builtins.property
1186
+ @pulumi.getter
1187
+ def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
1188
+ """
1189
+ Boolean flag that can be explicitly set to true to enforce local mount in HA environment
1190
+ """
1191
+ return pulumi.get(self, "local")
1192
+
1193
+ @_builtins.property
1194
+ @pulumi.getter(name="maxLeaseTtlSeconds")
1195
+ def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1196
+ """
1197
+ Maximum possible lease duration for tokens and secrets in seconds
1198
+ """
1199
+ return pulumi.get(self, "max_lease_ttl_seconds")
1200
+
1201
+ @_builtins.property
1202
+ @pulumi.getter
1203
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
1204
+ """
1205
+ The namespace to provision the resource in.
1206
+ The value should not contain leading or trailing forward slashes.
1207
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1208
+ *Available only for Vault Enterprise*.
1209
+ """
1210
+ return pulumi.get(self, "namespace")
1211
+
1212
+ @_builtins.property
1213
+ @pulumi.getter
1214
+ def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
1215
+ """
1216
+ Specifies mount type specific options that are passed to the backend
1217
+ """
1218
+ return pulumi.get(self, "options")
1219
+
1220
+ @_builtins.property
1221
+ @pulumi.getter(name="passthroughRequestHeaders")
1222
+ def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1223
+ """
1224
+ List of headers to allow and pass from the request to
1225
+ the plugin.
1226
+ """
1227
+ return pulumi.get(self, "passthrough_request_headers")
1228
+
1229
+ @_builtins.property
1230
+ @pulumi.getter
1231
+ def path(self) -> pulumi.Output[_builtins.str]:
1232
+ """
1233
+ Where the secret backend will be mounted
1234
+ """
1235
+ return pulumi.get(self, "path")
1236
+
1237
+ @_builtins.property
1238
+ @pulumi.getter(name="pluginVersion")
1239
+ def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
1240
+ """
1241
+ Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
1242
+ If unspecified, the server will select any matching unversioned plugin that may have been
1243
+ registered, the latest versioned plugin registered, or a built-in plugin in that order of precedence.
1244
+ """
1245
+ return pulumi.get(self, "plugin_version")
1246
+
1247
+ @_builtins.property
1248
+ @pulumi.getter(name="sealWrap")
1249
+ def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
1250
+ """
1251
+ Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1252
+ """
1253
+ return pulumi.get(self, "seal_wrap")
1254
+
1255
+ @_builtins.property
1256
+ @pulumi.getter
1257
+ def type(self) -> pulumi.Output[_builtins.str]:
1258
+ """
1259
+ Type of the backend, such as "aws"
1260
+ """
1261
+ return pulumi.get(self, "type")
1262
+