pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,1559 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from . import _utilities
16
+
17
+ __all__ = ['NomadSecretBackendArgs', 'NomadSecretBackend']
18
+
19
+ @pulumi.input_type
20
+ class NomadSecretBackendArgs:
21
+ def __init__(__self__, *,
22
+ address: Optional[pulumi.Input[_builtins.str]] = None,
23
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
24
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
25
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
28
+ ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
29
+ client_cert: Optional[pulumi.Input[_builtins.str]] = None,
30
+ client_key: Optional[pulumi.Input[_builtins.str]] = None,
31
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
32
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
33
+ description: Optional[pulumi.Input[_builtins.str]] = None,
34
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
35
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
36
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
37
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
38
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
39
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
40
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
41
+ max_token_name_length: Optional[pulumi.Input[_builtins.int]] = None,
42
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
43
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
44
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
45
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
46
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
47
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
48
+ token: Optional[pulumi.Input[_builtins.str]] = None,
49
+ ttl: Optional[pulumi.Input[_builtins.int]] = None):
50
+ """
51
+ The set of arguments for constructing a NomadSecretBackend resource.
52
+ :param pulumi.Input[_builtins.str] address: Specifies the address of the Nomad instance, provided
53
+ as "protocol://host:port" like "http://127.0.0.1:4646".
54
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
55
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
56
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
57
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
58
+ :param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at. Must
59
+ not begin or end with a `/`. Defaults to `nomad`.
60
+ :param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
61
+ x509 PEM encoded.
62
+ :param pulumi.Input[_builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
63
+ :param pulumi.Input[_builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
64
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
65
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
66
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
67
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
68
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
69
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
70
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
71
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
72
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
73
+ :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time.
74
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
75
+ :param pulumi.Input[_builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
76
+ generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
77
+ by the Nomad version.
78
+ :param pulumi.Input[_builtins.int] max_ttl: Maximum possible lease duration for secrets in seconds.
79
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
80
+ The value should not contain leading or trailing forward slashes.
81
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
82
+ *Available only for Vault Enterprise*.
83
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
84
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
85
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
86
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
87
+ :param pulumi.Input[_builtins.str] token: Specifies the Nomad Management token to use.
88
+ :param pulumi.Input[_builtins.int] ttl: Specifies the ttl of the lease for the generated token.
89
+ """
90
+ if address is not None:
91
+ pulumi.set(__self__, "address", address)
92
+ if allowed_managed_keys is not None:
93
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
94
+ if allowed_response_headers is not None:
95
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
96
+ if audit_non_hmac_request_keys is not None:
97
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
98
+ if audit_non_hmac_response_keys is not None:
99
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
100
+ if backend is not None:
101
+ pulumi.set(__self__, "backend", backend)
102
+ if ca_cert is not None:
103
+ pulumi.set(__self__, "ca_cert", ca_cert)
104
+ if client_cert is not None:
105
+ pulumi.set(__self__, "client_cert", client_cert)
106
+ if client_key is not None:
107
+ pulumi.set(__self__, "client_key", client_key)
108
+ if default_lease_ttl_seconds is not None:
109
+ pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
110
+ if delegated_auth_accessors is not None:
111
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
112
+ if description is not None:
113
+ pulumi.set(__self__, "description", description)
114
+ if disable_remount is not None:
115
+ pulumi.set(__self__, "disable_remount", disable_remount)
116
+ if external_entropy_access is not None:
117
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
118
+ if force_no_cache is not None:
119
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
120
+ if identity_token_key is not None:
121
+ pulumi.set(__self__, "identity_token_key", identity_token_key)
122
+ if listing_visibility is not None:
123
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
124
+ if local is not None:
125
+ pulumi.set(__self__, "local", local)
126
+ if max_lease_ttl_seconds is not None:
127
+ pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
128
+ if max_token_name_length is not None:
129
+ pulumi.set(__self__, "max_token_name_length", max_token_name_length)
130
+ if max_ttl is not None:
131
+ pulumi.set(__self__, "max_ttl", max_ttl)
132
+ if namespace is not None:
133
+ pulumi.set(__self__, "namespace", namespace)
134
+ if options is not None:
135
+ pulumi.set(__self__, "options", options)
136
+ if passthrough_request_headers is not None:
137
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
138
+ if plugin_version is not None:
139
+ pulumi.set(__self__, "plugin_version", plugin_version)
140
+ if seal_wrap is not None:
141
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
142
+ if token is not None:
143
+ pulumi.set(__self__, "token", token)
144
+ if ttl is not None:
145
+ pulumi.set(__self__, "ttl", ttl)
146
+
147
+ @_builtins.property
148
+ @pulumi.getter
149
+ def address(self) -> Optional[pulumi.Input[_builtins.str]]:
150
+ """
151
+ Specifies the address of the Nomad instance, provided
152
+ as "protocol://host:port" like "http://127.0.0.1:4646".
153
+ """
154
+ return pulumi.get(self, "address")
155
+
156
+ @address.setter
157
+ def address(self, value: Optional[pulumi.Input[_builtins.str]]):
158
+ pulumi.set(self, "address", value)
159
+
160
+ @_builtins.property
161
+ @pulumi.getter(name="allowedManagedKeys")
162
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
163
+ """
164
+ List of managed key registry entry names that the mount in question is allowed to access
165
+ """
166
+ return pulumi.get(self, "allowed_managed_keys")
167
+
168
+ @allowed_managed_keys.setter
169
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
170
+ pulumi.set(self, "allowed_managed_keys", value)
171
+
172
+ @_builtins.property
173
+ @pulumi.getter(name="allowedResponseHeaders")
174
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
175
+ """
176
+ List of headers to allow and pass from the request to the plugin
177
+ """
178
+ return pulumi.get(self, "allowed_response_headers")
179
+
180
+ @allowed_response_headers.setter
181
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
182
+ pulumi.set(self, "allowed_response_headers", value)
183
+
184
+ @_builtins.property
185
+ @pulumi.getter(name="auditNonHmacRequestKeys")
186
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
187
+ """
188
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
189
+ """
190
+ return pulumi.get(self, "audit_non_hmac_request_keys")
191
+
192
+ @audit_non_hmac_request_keys.setter
193
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
194
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
195
+
196
+ @_builtins.property
197
+ @pulumi.getter(name="auditNonHmacResponseKeys")
198
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
199
+ """
200
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
201
+ """
202
+ return pulumi.get(self, "audit_non_hmac_response_keys")
203
+
204
+ @audit_non_hmac_response_keys.setter
205
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
206
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
207
+
208
+ @_builtins.property
209
+ @pulumi.getter
210
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
211
+ """
212
+ The unique path this backend should be mounted at. Must
213
+ not begin or end with a `/`. Defaults to `nomad`.
214
+ """
215
+ return pulumi.get(self, "backend")
216
+
217
+ @backend.setter
218
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
219
+ pulumi.set(self, "backend", value)
220
+
221
+ @_builtins.property
222
+ @pulumi.getter(name="caCert")
223
+ def ca_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
224
+ """
225
+ CA certificate to use when verifying the Nomad server certificate, must be
226
+ x509 PEM encoded.
227
+ """
228
+ return pulumi.get(self, "ca_cert")
229
+
230
+ @ca_cert.setter
231
+ def ca_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
232
+ pulumi.set(self, "ca_cert", value)
233
+
234
+ @_builtins.property
235
+ @pulumi.getter(name="clientCert")
236
+ def client_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
237
+ """
238
+ Client certificate to provide to the Nomad server, must be x509 PEM encoded.
239
+ """
240
+ return pulumi.get(self, "client_cert")
241
+
242
+ @client_cert.setter
243
+ def client_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
244
+ pulumi.set(self, "client_cert", value)
245
+
246
+ @_builtins.property
247
+ @pulumi.getter(name="clientKey")
248
+ def client_key(self) -> Optional[pulumi.Input[_builtins.str]]:
249
+ """
250
+ Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
251
+ """
252
+ return pulumi.get(self, "client_key")
253
+
254
+ @client_key.setter
255
+ def client_key(self, value: Optional[pulumi.Input[_builtins.str]]):
256
+ pulumi.set(self, "client_key", value)
257
+
258
+ @_builtins.property
259
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
260
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
261
+ """
262
+ Default lease duration for secrets in seconds.
263
+ """
264
+ return pulumi.get(self, "default_lease_ttl_seconds")
265
+
266
+ @default_lease_ttl_seconds.setter
267
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
268
+ pulumi.set(self, "default_lease_ttl_seconds", value)
269
+
270
+ @_builtins.property
271
+ @pulumi.getter(name="delegatedAuthAccessors")
272
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
273
+ """
274
+ List of headers to allow and pass from the request to the plugin
275
+ """
276
+ return pulumi.get(self, "delegated_auth_accessors")
277
+
278
+ @delegated_auth_accessors.setter
279
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
280
+ pulumi.set(self, "delegated_auth_accessors", value)
281
+
282
+ @_builtins.property
283
+ @pulumi.getter
284
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
285
+ """
286
+ Human-friendly description of the mount for the backend.
287
+ """
288
+ return pulumi.get(self, "description")
289
+
290
+ @description.setter
291
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
292
+ pulumi.set(self, "description", value)
293
+
294
+ @_builtins.property
295
+ @pulumi.getter(name="disableRemount")
296
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
297
+ """
298
+ If set, opts out of mount migration on path updates.
299
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
300
+ """
301
+ return pulumi.get(self, "disable_remount")
302
+
303
+ @disable_remount.setter
304
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
305
+ pulumi.set(self, "disable_remount", value)
306
+
307
+ @_builtins.property
308
+ @pulumi.getter(name="externalEntropyAccess")
309
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
310
+ """
311
+ Enable the secrets engine to access Vault's external entropy source
312
+ """
313
+ return pulumi.get(self, "external_entropy_access")
314
+
315
+ @external_entropy_access.setter
316
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
317
+ pulumi.set(self, "external_entropy_access", value)
318
+
319
+ @_builtins.property
320
+ @pulumi.getter(name="forceNoCache")
321
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
322
+ """
323
+ If set to true, disables caching.
324
+ """
325
+ return pulumi.get(self, "force_no_cache")
326
+
327
+ @force_no_cache.setter
328
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
329
+ pulumi.set(self, "force_no_cache", value)
330
+
331
+ @_builtins.property
332
+ @pulumi.getter(name="identityTokenKey")
333
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
334
+ """
335
+ The key to use for signing plugin workload identity tokens
336
+ """
337
+ return pulumi.get(self, "identity_token_key")
338
+
339
+ @identity_token_key.setter
340
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
341
+ pulumi.set(self, "identity_token_key", value)
342
+
343
+ @_builtins.property
344
+ @pulumi.getter(name="listingVisibility")
345
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
346
+ """
347
+ Specifies whether to show this mount in the UI-specific listing endpoint
348
+ """
349
+ return pulumi.get(self, "listing_visibility")
350
+
351
+ @listing_visibility.setter
352
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
353
+ pulumi.set(self, "listing_visibility", value)
354
+
355
+ @_builtins.property
356
+ @pulumi.getter
357
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
358
+ """
359
+ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time.
360
+ """
361
+ return pulumi.get(self, "local")
362
+
363
+ @local.setter
364
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
365
+ pulumi.set(self, "local", value)
366
+
367
+ @_builtins.property
368
+ @pulumi.getter(name="maxLeaseTtlSeconds")
369
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
370
+ """
371
+ Maximum possible lease duration for secrets in seconds.
372
+ """
373
+ return pulumi.get(self, "max_lease_ttl_seconds")
374
+
375
+ @max_lease_ttl_seconds.setter
376
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
377
+ pulumi.set(self, "max_lease_ttl_seconds", value)
378
+
379
+ @_builtins.property
380
+ @pulumi.getter(name="maxTokenNameLength")
381
+ def max_token_name_length(self) -> Optional[pulumi.Input[_builtins.int]]:
382
+ """
383
+ Specifies the maximum length to use for the name of the Nomad token
384
+ generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
385
+ by the Nomad version.
386
+ """
387
+ return pulumi.get(self, "max_token_name_length")
388
+
389
+ @max_token_name_length.setter
390
+ def max_token_name_length(self, value: Optional[pulumi.Input[_builtins.int]]):
391
+ pulumi.set(self, "max_token_name_length", value)
392
+
393
+ @_builtins.property
394
+ @pulumi.getter(name="maxTtl")
395
+ def max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
396
+ """
397
+ Maximum possible lease duration for secrets in seconds.
398
+ """
399
+ return pulumi.get(self, "max_ttl")
400
+
401
+ @max_ttl.setter
402
+ def max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
403
+ pulumi.set(self, "max_ttl", value)
404
+
405
+ @_builtins.property
406
+ @pulumi.getter
407
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
408
+ """
409
+ The namespace to provision the resource in.
410
+ The value should not contain leading or trailing forward slashes.
411
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
412
+ *Available only for Vault Enterprise*.
413
+ """
414
+ return pulumi.get(self, "namespace")
415
+
416
+ @namespace.setter
417
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
418
+ pulumi.set(self, "namespace", value)
419
+
420
+ @_builtins.property
421
+ @pulumi.getter
422
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
423
+ """
424
+ Specifies mount type specific options that are passed to the backend
425
+ """
426
+ return pulumi.get(self, "options")
427
+
428
+ @options.setter
429
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
430
+ pulumi.set(self, "options", value)
431
+
432
+ @_builtins.property
433
+ @pulumi.getter(name="passthroughRequestHeaders")
434
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
435
+ """
436
+ List of headers to allow and pass from the request to the plugin
437
+ """
438
+ return pulumi.get(self, "passthrough_request_headers")
439
+
440
+ @passthrough_request_headers.setter
441
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
442
+ pulumi.set(self, "passthrough_request_headers", value)
443
+
444
+ @_builtins.property
445
+ @pulumi.getter(name="pluginVersion")
446
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
447
+ """
448
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
449
+ """
450
+ return pulumi.get(self, "plugin_version")
451
+
452
+ @plugin_version.setter
453
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
454
+ pulumi.set(self, "plugin_version", value)
455
+
456
+ @_builtins.property
457
+ @pulumi.getter(name="sealWrap")
458
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
459
+ """
460
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
461
+ """
462
+ return pulumi.get(self, "seal_wrap")
463
+
464
+ @seal_wrap.setter
465
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
466
+ pulumi.set(self, "seal_wrap", value)
467
+
468
+ @_builtins.property
469
+ @pulumi.getter
470
+ def token(self) -> Optional[pulumi.Input[_builtins.str]]:
471
+ """
472
+ Specifies the Nomad Management token to use.
473
+ """
474
+ return pulumi.get(self, "token")
475
+
476
+ @token.setter
477
+ def token(self, value: Optional[pulumi.Input[_builtins.str]]):
478
+ pulumi.set(self, "token", value)
479
+
480
+ @_builtins.property
481
+ @pulumi.getter
482
+ def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
483
+ """
484
+ Specifies the ttl of the lease for the generated token.
485
+ """
486
+ return pulumi.get(self, "ttl")
487
+
488
+ @ttl.setter
489
+ def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
490
+ pulumi.set(self, "ttl", value)
491
+
492
+
493
+ @pulumi.input_type
494
+ class _NomadSecretBackendState:
495
+ def __init__(__self__, *,
496
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
497
+ address: Optional[pulumi.Input[_builtins.str]] = None,
498
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
499
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
500
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
501
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
502
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
503
+ ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
504
+ client_cert: Optional[pulumi.Input[_builtins.str]] = None,
505
+ client_key: Optional[pulumi.Input[_builtins.str]] = None,
506
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
507
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
508
+ description: Optional[pulumi.Input[_builtins.str]] = None,
509
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
510
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
511
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
512
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
513
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
514
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
515
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
516
+ max_token_name_length: Optional[pulumi.Input[_builtins.int]] = None,
517
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
518
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
519
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
520
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
521
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
522
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
523
+ token: Optional[pulumi.Input[_builtins.str]] = None,
524
+ ttl: Optional[pulumi.Input[_builtins.int]] = None):
525
+ """
526
+ Input properties used for looking up and filtering NomadSecretBackend resources.
527
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
528
+ :param pulumi.Input[_builtins.str] address: Specifies the address of the Nomad instance, provided
529
+ as "protocol://host:port" like "http://127.0.0.1:4646".
530
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
531
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
532
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
533
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
534
+ :param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at. Must
535
+ not begin or end with a `/`. Defaults to `nomad`.
536
+ :param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
537
+ x509 PEM encoded.
538
+ :param pulumi.Input[_builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
539
+ :param pulumi.Input[_builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
540
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
541
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
542
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
543
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
544
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
545
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
546
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
547
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
548
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
549
+ :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time.
550
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
551
+ :param pulumi.Input[_builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
552
+ generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
553
+ by the Nomad version.
554
+ :param pulumi.Input[_builtins.int] max_ttl: Maximum possible lease duration for secrets in seconds.
555
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
556
+ The value should not contain leading or trailing forward slashes.
557
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
558
+ *Available only for Vault Enterprise*.
559
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
560
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
561
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
562
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
563
+ :param pulumi.Input[_builtins.str] token: Specifies the Nomad Management token to use.
564
+ :param pulumi.Input[_builtins.int] ttl: Specifies the ttl of the lease for the generated token.
565
+ """
566
+ if accessor is not None:
567
+ pulumi.set(__self__, "accessor", accessor)
568
+ if address is not None:
569
+ pulumi.set(__self__, "address", address)
570
+ if allowed_managed_keys is not None:
571
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
572
+ if allowed_response_headers is not None:
573
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
574
+ if audit_non_hmac_request_keys is not None:
575
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
576
+ if audit_non_hmac_response_keys is not None:
577
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
578
+ if backend is not None:
579
+ pulumi.set(__self__, "backend", backend)
580
+ if ca_cert is not None:
581
+ pulumi.set(__self__, "ca_cert", ca_cert)
582
+ if client_cert is not None:
583
+ pulumi.set(__self__, "client_cert", client_cert)
584
+ if client_key is not None:
585
+ pulumi.set(__self__, "client_key", client_key)
586
+ if default_lease_ttl_seconds is not None:
587
+ pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
588
+ if delegated_auth_accessors is not None:
589
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
590
+ if description is not None:
591
+ pulumi.set(__self__, "description", description)
592
+ if disable_remount is not None:
593
+ pulumi.set(__self__, "disable_remount", disable_remount)
594
+ if external_entropy_access is not None:
595
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
596
+ if force_no_cache is not None:
597
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
598
+ if identity_token_key is not None:
599
+ pulumi.set(__self__, "identity_token_key", identity_token_key)
600
+ if listing_visibility is not None:
601
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
602
+ if local is not None:
603
+ pulumi.set(__self__, "local", local)
604
+ if max_lease_ttl_seconds is not None:
605
+ pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
606
+ if max_token_name_length is not None:
607
+ pulumi.set(__self__, "max_token_name_length", max_token_name_length)
608
+ if max_ttl is not None:
609
+ pulumi.set(__self__, "max_ttl", max_ttl)
610
+ if namespace is not None:
611
+ pulumi.set(__self__, "namespace", namespace)
612
+ if options is not None:
613
+ pulumi.set(__self__, "options", options)
614
+ if passthrough_request_headers is not None:
615
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
616
+ if plugin_version is not None:
617
+ pulumi.set(__self__, "plugin_version", plugin_version)
618
+ if seal_wrap is not None:
619
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
620
+ if token is not None:
621
+ pulumi.set(__self__, "token", token)
622
+ if ttl is not None:
623
+ pulumi.set(__self__, "ttl", ttl)
624
+
625
+ @_builtins.property
626
+ @pulumi.getter
627
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
628
+ """
629
+ Accessor of the mount
630
+ """
631
+ return pulumi.get(self, "accessor")
632
+
633
+ @accessor.setter
634
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
635
+ pulumi.set(self, "accessor", value)
636
+
637
+ @_builtins.property
638
+ @pulumi.getter
639
+ def address(self) -> Optional[pulumi.Input[_builtins.str]]:
640
+ """
641
+ Specifies the address of the Nomad instance, provided
642
+ as "protocol://host:port" like "http://127.0.0.1:4646".
643
+ """
644
+ return pulumi.get(self, "address")
645
+
646
+ @address.setter
647
+ def address(self, value: Optional[pulumi.Input[_builtins.str]]):
648
+ pulumi.set(self, "address", value)
649
+
650
+ @_builtins.property
651
+ @pulumi.getter(name="allowedManagedKeys")
652
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
653
+ """
654
+ List of managed key registry entry names that the mount in question is allowed to access
655
+ """
656
+ return pulumi.get(self, "allowed_managed_keys")
657
+
658
+ @allowed_managed_keys.setter
659
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
660
+ pulumi.set(self, "allowed_managed_keys", value)
661
+
662
+ @_builtins.property
663
+ @pulumi.getter(name="allowedResponseHeaders")
664
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
665
+ """
666
+ List of headers to allow and pass from the request to the plugin
667
+ """
668
+ return pulumi.get(self, "allowed_response_headers")
669
+
670
+ @allowed_response_headers.setter
671
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
672
+ pulumi.set(self, "allowed_response_headers", value)
673
+
674
+ @_builtins.property
675
+ @pulumi.getter(name="auditNonHmacRequestKeys")
676
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
677
+ """
678
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
679
+ """
680
+ return pulumi.get(self, "audit_non_hmac_request_keys")
681
+
682
+ @audit_non_hmac_request_keys.setter
683
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
684
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
685
+
686
+ @_builtins.property
687
+ @pulumi.getter(name="auditNonHmacResponseKeys")
688
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
689
+ """
690
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
691
+ """
692
+ return pulumi.get(self, "audit_non_hmac_response_keys")
693
+
694
+ @audit_non_hmac_response_keys.setter
695
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
696
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
697
+
698
+ @_builtins.property
699
+ @pulumi.getter
700
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
701
+ """
702
+ The unique path this backend should be mounted at. Must
703
+ not begin or end with a `/`. Defaults to `nomad`.
704
+ """
705
+ return pulumi.get(self, "backend")
706
+
707
+ @backend.setter
708
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
709
+ pulumi.set(self, "backend", value)
710
+
711
+ @_builtins.property
712
+ @pulumi.getter(name="caCert")
713
+ def ca_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
714
+ """
715
+ CA certificate to use when verifying the Nomad server certificate, must be
716
+ x509 PEM encoded.
717
+ """
718
+ return pulumi.get(self, "ca_cert")
719
+
720
+ @ca_cert.setter
721
+ def ca_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
722
+ pulumi.set(self, "ca_cert", value)
723
+
724
+ @_builtins.property
725
+ @pulumi.getter(name="clientCert")
726
+ def client_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
727
+ """
728
+ Client certificate to provide to the Nomad server, must be x509 PEM encoded.
729
+ """
730
+ return pulumi.get(self, "client_cert")
731
+
732
+ @client_cert.setter
733
+ def client_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
734
+ pulumi.set(self, "client_cert", value)
735
+
736
+ @_builtins.property
737
+ @pulumi.getter(name="clientKey")
738
+ def client_key(self) -> Optional[pulumi.Input[_builtins.str]]:
739
+ """
740
+ Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
741
+ """
742
+ return pulumi.get(self, "client_key")
743
+
744
+ @client_key.setter
745
+ def client_key(self, value: Optional[pulumi.Input[_builtins.str]]):
746
+ pulumi.set(self, "client_key", value)
747
+
748
+ @_builtins.property
749
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
750
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
751
+ """
752
+ Default lease duration for secrets in seconds.
753
+ """
754
+ return pulumi.get(self, "default_lease_ttl_seconds")
755
+
756
+ @default_lease_ttl_seconds.setter
757
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
758
+ pulumi.set(self, "default_lease_ttl_seconds", value)
759
+
760
+ @_builtins.property
761
+ @pulumi.getter(name="delegatedAuthAccessors")
762
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
763
+ """
764
+ List of headers to allow and pass from the request to the plugin
765
+ """
766
+ return pulumi.get(self, "delegated_auth_accessors")
767
+
768
+ @delegated_auth_accessors.setter
769
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
770
+ pulumi.set(self, "delegated_auth_accessors", value)
771
+
772
+ @_builtins.property
773
+ @pulumi.getter
774
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
775
+ """
776
+ Human-friendly description of the mount for the backend.
777
+ """
778
+ return pulumi.get(self, "description")
779
+
780
+ @description.setter
781
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
782
+ pulumi.set(self, "description", value)
783
+
784
+ @_builtins.property
785
+ @pulumi.getter(name="disableRemount")
786
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
787
+ """
788
+ If set, opts out of mount migration on path updates.
789
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
790
+ """
791
+ return pulumi.get(self, "disable_remount")
792
+
793
+ @disable_remount.setter
794
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
795
+ pulumi.set(self, "disable_remount", value)
796
+
797
+ @_builtins.property
798
+ @pulumi.getter(name="externalEntropyAccess")
799
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
800
+ """
801
+ Enable the secrets engine to access Vault's external entropy source
802
+ """
803
+ return pulumi.get(self, "external_entropy_access")
804
+
805
+ @external_entropy_access.setter
806
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
807
+ pulumi.set(self, "external_entropy_access", value)
808
+
809
+ @_builtins.property
810
+ @pulumi.getter(name="forceNoCache")
811
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
812
+ """
813
+ If set to true, disables caching.
814
+ """
815
+ return pulumi.get(self, "force_no_cache")
816
+
817
+ @force_no_cache.setter
818
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
819
+ pulumi.set(self, "force_no_cache", value)
820
+
821
+ @_builtins.property
822
+ @pulumi.getter(name="identityTokenKey")
823
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
824
+ """
825
+ The key to use for signing plugin workload identity tokens
826
+ """
827
+ return pulumi.get(self, "identity_token_key")
828
+
829
+ @identity_token_key.setter
830
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
831
+ pulumi.set(self, "identity_token_key", value)
832
+
833
+ @_builtins.property
834
+ @pulumi.getter(name="listingVisibility")
835
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
836
+ """
837
+ Specifies whether to show this mount in the UI-specific listing endpoint
838
+ """
839
+ return pulumi.get(self, "listing_visibility")
840
+
841
+ @listing_visibility.setter
842
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
843
+ pulumi.set(self, "listing_visibility", value)
844
+
845
+ @_builtins.property
846
+ @pulumi.getter
847
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
848
+ """
849
+ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time.
850
+ """
851
+ return pulumi.get(self, "local")
852
+
853
+ @local.setter
854
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
855
+ pulumi.set(self, "local", value)
856
+
857
+ @_builtins.property
858
+ @pulumi.getter(name="maxLeaseTtlSeconds")
859
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
860
+ """
861
+ Maximum possible lease duration for secrets in seconds.
862
+ """
863
+ return pulumi.get(self, "max_lease_ttl_seconds")
864
+
865
+ @max_lease_ttl_seconds.setter
866
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
867
+ pulumi.set(self, "max_lease_ttl_seconds", value)
868
+
869
+ @_builtins.property
870
+ @pulumi.getter(name="maxTokenNameLength")
871
+ def max_token_name_length(self) -> Optional[pulumi.Input[_builtins.int]]:
872
+ """
873
+ Specifies the maximum length to use for the name of the Nomad token
874
+ generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
875
+ by the Nomad version.
876
+ """
877
+ return pulumi.get(self, "max_token_name_length")
878
+
879
+ @max_token_name_length.setter
880
+ def max_token_name_length(self, value: Optional[pulumi.Input[_builtins.int]]):
881
+ pulumi.set(self, "max_token_name_length", value)
882
+
883
+ @_builtins.property
884
+ @pulumi.getter(name="maxTtl")
885
+ def max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
886
+ """
887
+ Maximum possible lease duration for secrets in seconds.
888
+ """
889
+ return pulumi.get(self, "max_ttl")
890
+
891
+ @max_ttl.setter
892
+ def max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
893
+ pulumi.set(self, "max_ttl", value)
894
+
895
+ @_builtins.property
896
+ @pulumi.getter
897
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
898
+ """
899
+ The namespace to provision the resource in.
900
+ The value should not contain leading or trailing forward slashes.
901
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
902
+ *Available only for Vault Enterprise*.
903
+ """
904
+ return pulumi.get(self, "namespace")
905
+
906
+ @namespace.setter
907
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
908
+ pulumi.set(self, "namespace", value)
909
+
910
+ @_builtins.property
911
+ @pulumi.getter
912
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
913
+ """
914
+ Specifies mount type specific options that are passed to the backend
915
+ """
916
+ return pulumi.get(self, "options")
917
+
918
+ @options.setter
919
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
920
+ pulumi.set(self, "options", value)
921
+
922
+ @_builtins.property
923
+ @pulumi.getter(name="passthroughRequestHeaders")
924
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
925
+ """
926
+ List of headers to allow and pass from the request to the plugin
927
+ """
928
+ return pulumi.get(self, "passthrough_request_headers")
929
+
930
+ @passthrough_request_headers.setter
931
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
932
+ pulumi.set(self, "passthrough_request_headers", value)
933
+
934
+ @_builtins.property
935
+ @pulumi.getter(name="pluginVersion")
936
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
937
+ """
938
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
939
+ """
940
+ return pulumi.get(self, "plugin_version")
941
+
942
+ @plugin_version.setter
943
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
944
+ pulumi.set(self, "plugin_version", value)
945
+
946
+ @_builtins.property
947
+ @pulumi.getter(name="sealWrap")
948
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
949
+ """
950
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
951
+ """
952
+ return pulumi.get(self, "seal_wrap")
953
+
954
+ @seal_wrap.setter
955
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
956
+ pulumi.set(self, "seal_wrap", value)
957
+
958
+ @_builtins.property
959
+ @pulumi.getter
960
+ def token(self) -> Optional[pulumi.Input[_builtins.str]]:
961
+ """
962
+ Specifies the Nomad Management token to use.
963
+ """
964
+ return pulumi.get(self, "token")
965
+
966
+ @token.setter
967
+ def token(self, value: Optional[pulumi.Input[_builtins.str]]):
968
+ pulumi.set(self, "token", value)
969
+
970
+ @_builtins.property
971
+ @pulumi.getter
972
+ def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
973
+ """
974
+ Specifies the ttl of the lease for the generated token.
975
+ """
976
+ return pulumi.get(self, "ttl")
977
+
978
+ @ttl.setter
979
+ def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
980
+ pulumi.set(self, "ttl", value)
981
+
982
+
983
+ @pulumi.type_token("vault:index/nomadSecretBackend:NomadSecretBackend")
984
+ class NomadSecretBackend(pulumi.CustomResource):
985
+ @overload
986
+ def __init__(__self__,
987
+ resource_name: str,
988
+ opts: Optional[pulumi.ResourceOptions] = None,
989
+ address: Optional[pulumi.Input[_builtins.str]] = None,
990
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
991
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
992
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
993
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
994
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
995
+ ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
996
+ client_cert: Optional[pulumi.Input[_builtins.str]] = None,
997
+ client_key: Optional[pulumi.Input[_builtins.str]] = None,
998
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
999
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1000
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1001
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1002
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1003
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1004
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1005
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1006
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1007
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1008
+ max_token_name_length: Optional[pulumi.Input[_builtins.int]] = None,
1009
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1010
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1011
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1012
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1013
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1014
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1015
+ token: Optional[pulumi.Input[_builtins.str]] = None,
1016
+ ttl: Optional[pulumi.Input[_builtins.int]] = None,
1017
+ __props__=None):
1018
+ """
1019
+ ## Example Usage
1020
+
1021
+ ```python
1022
+ import pulumi
1023
+ import pulumi_vault as vault
1024
+
1025
+ config = vault.NomadSecretBackend("config",
1026
+ backend="nomad",
1027
+ description="test description",
1028
+ default_lease_ttl_seconds=3600,
1029
+ max_lease_ttl_seconds=7200,
1030
+ max_ttl=240,
1031
+ address="https://127.0.0.1:4646",
1032
+ token="ae20ceaa-...",
1033
+ ttl=120)
1034
+ ```
1035
+
1036
+ ## Import
1037
+
1038
+ Nomad secret backend can be imported using the `backend`, e.g.
1039
+
1040
+ ```sh
1041
+ $ pulumi import vault:index/nomadSecretBackend:NomadSecretBackend nomad nomad
1042
+ ```
1043
+
1044
+ :param str resource_name: The name of the resource.
1045
+ :param pulumi.ResourceOptions opts: Options for the resource.
1046
+ :param pulumi.Input[_builtins.str] address: Specifies the address of the Nomad instance, provided
1047
+ as "protocol://host:port" like "http://127.0.0.1:4646".
1048
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1049
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1050
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1051
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1052
+ :param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at. Must
1053
+ not begin or end with a `/`. Defaults to `nomad`.
1054
+ :param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
1055
+ x509 PEM encoded.
1056
+ :param pulumi.Input[_builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
1057
+ :param pulumi.Input[_builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
1058
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
1059
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1060
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
1061
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1062
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1063
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1064
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1065
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1066
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1067
+ :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time.
1068
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
1069
+ :param pulumi.Input[_builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
1070
+ generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
1071
+ by the Nomad version.
1072
+ :param pulumi.Input[_builtins.int] max_ttl: Maximum possible lease duration for secrets in seconds.
1073
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
1074
+ The value should not contain leading or trailing forward slashes.
1075
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1076
+ *Available only for Vault Enterprise*.
1077
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1078
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1079
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1080
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1081
+ :param pulumi.Input[_builtins.str] token: Specifies the Nomad Management token to use.
1082
+ :param pulumi.Input[_builtins.int] ttl: Specifies the ttl of the lease for the generated token.
1083
+ """
1084
+ ...
1085
+ @overload
1086
+ def __init__(__self__,
1087
+ resource_name: str,
1088
+ args: Optional[NomadSecretBackendArgs] = None,
1089
+ opts: Optional[pulumi.ResourceOptions] = None):
1090
+ """
1091
+ ## Example Usage
1092
+
1093
+ ```python
1094
+ import pulumi
1095
+ import pulumi_vault as vault
1096
+
1097
+ config = vault.NomadSecretBackend("config",
1098
+ backend="nomad",
1099
+ description="test description",
1100
+ default_lease_ttl_seconds=3600,
1101
+ max_lease_ttl_seconds=7200,
1102
+ max_ttl=240,
1103
+ address="https://127.0.0.1:4646",
1104
+ token="ae20ceaa-...",
1105
+ ttl=120)
1106
+ ```
1107
+
1108
+ ## Import
1109
+
1110
+ Nomad secret backend can be imported using the `backend`, e.g.
1111
+
1112
+ ```sh
1113
+ $ pulumi import vault:index/nomadSecretBackend:NomadSecretBackend nomad nomad
1114
+ ```
1115
+
1116
+ :param str resource_name: The name of the resource.
1117
+ :param NomadSecretBackendArgs args: The arguments to use to populate this resource's properties.
1118
+ :param pulumi.ResourceOptions opts: Options for the resource.
1119
+ """
1120
+ ...
1121
+ def __init__(__self__, resource_name: str, *args, **kwargs):
1122
+ resource_args, opts = _utilities.get_resource_args_opts(NomadSecretBackendArgs, pulumi.ResourceOptions, *args, **kwargs)
1123
+ if resource_args is not None:
1124
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
1125
+ else:
1126
+ __self__._internal_init(resource_name, *args, **kwargs)
1127
+
1128
+ def _internal_init(__self__,
1129
+ resource_name: str,
1130
+ opts: Optional[pulumi.ResourceOptions] = None,
1131
+ address: Optional[pulumi.Input[_builtins.str]] = None,
1132
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1133
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1134
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1135
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1136
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
1137
+ ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
1138
+ client_cert: Optional[pulumi.Input[_builtins.str]] = None,
1139
+ client_key: Optional[pulumi.Input[_builtins.str]] = None,
1140
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1141
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1142
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1143
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1144
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1145
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1146
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1147
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1148
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1149
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1150
+ max_token_name_length: Optional[pulumi.Input[_builtins.int]] = None,
1151
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1152
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1153
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1154
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1155
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1156
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1157
+ token: Optional[pulumi.Input[_builtins.str]] = None,
1158
+ ttl: Optional[pulumi.Input[_builtins.int]] = None,
1159
+ __props__=None):
1160
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
1161
+ if not isinstance(opts, pulumi.ResourceOptions):
1162
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
1163
+ if opts.id is None:
1164
+ if __props__ is not None:
1165
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
1166
+ __props__ = NomadSecretBackendArgs.__new__(NomadSecretBackendArgs)
1167
+
1168
+ __props__.__dict__["address"] = address
1169
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1170
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1171
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1172
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
1173
+ __props__.__dict__["backend"] = backend
1174
+ __props__.__dict__["ca_cert"] = ca_cert
1175
+ __props__.__dict__["client_cert"] = None if client_cert is None else pulumi.Output.secret(client_cert)
1176
+ __props__.__dict__["client_key"] = None if client_key is None else pulumi.Output.secret(client_key)
1177
+ __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1178
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
1179
+ __props__.__dict__["description"] = description
1180
+ __props__.__dict__["disable_remount"] = disable_remount
1181
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1182
+ __props__.__dict__["force_no_cache"] = force_no_cache
1183
+ __props__.__dict__["identity_token_key"] = identity_token_key
1184
+ __props__.__dict__["listing_visibility"] = listing_visibility
1185
+ __props__.__dict__["local"] = local
1186
+ __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
1187
+ __props__.__dict__["max_token_name_length"] = max_token_name_length
1188
+ __props__.__dict__["max_ttl"] = max_ttl
1189
+ __props__.__dict__["namespace"] = namespace
1190
+ __props__.__dict__["options"] = options
1191
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
1192
+ __props__.__dict__["plugin_version"] = plugin_version
1193
+ __props__.__dict__["seal_wrap"] = seal_wrap
1194
+ __props__.__dict__["token"] = None if token is None else pulumi.Output.secret(token)
1195
+ __props__.__dict__["ttl"] = ttl
1196
+ __props__.__dict__["accessor"] = None
1197
+ secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["clientCert", "clientKey", "token"])
1198
+ opts = pulumi.ResourceOptions.merge(opts, secret_opts)
1199
+ super(NomadSecretBackend, __self__).__init__(
1200
+ 'vault:index/nomadSecretBackend:NomadSecretBackend',
1201
+ resource_name,
1202
+ __props__,
1203
+ opts)
1204
+
1205
+ @staticmethod
1206
+ def get(resource_name: str,
1207
+ id: pulumi.Input[str],
1208
+ opts: Optional[pulumi.ResourceOptions] = None,
1209
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
1210
+ address: Optional[pulumi.Input[_builtins.str]] = None,
1211
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1212
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1213
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1214
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1215
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
1216
+ ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
1217
+ client_cert: Optional[pulumi.Input[_builtins.str]] = None,
1218
+ client_key: Optional[pulumi.Input[_builtins.str]] = None,
1219
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1220
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1221
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1222
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1223
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1224
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1225
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1226
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1227
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1228
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1229
+ max_token_name_length: Optional[pulumi.Input[_builtins.int]] = None,
1230
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1231
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1232
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1233
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1234
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1235
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1236
+ token: Optional[pulumi.Input[_builtins.str]] = None,
1237
+ ttl: Optional[pulumi.Input[_builtins.int]] = None) -> 'NomadSecretBackend':
1238
+ """
1239
+ Get an existing NomadSecretBackend resource's state with the given name, id, and optional extra
1240
+ properties used to qualify the lookup.
1241
+
1242
+ :param str resource_name: The unique name of the resulting resource.
1243
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
1244
+ :param pulumi.ResourceOptions opts: Options for the resource.
1245
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
1246
+ :param pulumi.Input[_builtins.str] address: Specifies the address of the Nomad instance, provided
1247
+ as "protocol://host:port" like "http://127.0.0.1:4646".
1248
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1249
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1250
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1251
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1252
+ :param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at. Must
1253
+ not begin or end with a `/`. Defaults to `nomad`.
1254
+ :param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
1255
+ x509 PEM encoded.
1256
+ :param pulumi.Input[_builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
1257
+ :param pulumi.Input[_builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
1258
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
1259
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1260
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
1261
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1262
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1263
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1264
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1265
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1266
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1267
+ :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time.
1268
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
1269
+ :param pulumi.Input[_builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
1270
+ generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
1271
+ by the Nomad version.
1272
+ :param pulumi.Input[_builtins.int] max_ttl: Maximum possible lease duration for secrets in seconds.
1273
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
1274
+ The value should not contain leading or trailing forward slashes.
1275
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1276
+ *Available only for Vault Enterprise*.
1277
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1278
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1279
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1280
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1281
+ :param pulumi.Input[_builtins.str] token: Specifies the Nomad Management token to use.
1282
+ :param pulumi.Input[_builtins.int] ttl: Specifies the ttl of the lease for the generated token.
1283
+ """
1284
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
1285
+
1286
+ __props__ = _NomadSecretBackendState.__new__(_NomadSecretBackendState)
1287
+
1288
+ __props__.__dict__["accessor"] = accessor
1289
+ __props__.__dict__["address"] = address
1290
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1291
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1292
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1293
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
1294
+ __props__.__dict__["backend"] = backend
1295
+ __props__.__dict__["ca_cert"] = ca_cert
1296
+ __props__.__dict__["client_cert"] = client_cert
1297
+ __props__.__dict__["client_key"] = client_key
1298
+ __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1299
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
1300
+ __props__.__dict__["description"] = description
1301
+ __props__.__dict__["disable_remount"] = disable_remount
1302
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1303
+ __props__.__dict__["force_no_cache"] = force_no_cache
1304
+ __props__.__dict__["identity_token_key"] = identity_token_key
1305
+ __props__.__dict__["listing_visibility"] = listing_visibility
1306
+ __props__.__dict__["local"] = local
1307
+ __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
1308
+ __props__.__dict__["max_token_name_length"] = max_token_name_length
1309
+ __props__.__dict__["max_ttl"] = max_ttl
1310
+ __props__.__dict__["namespace"] = namespace
1311
+ __props__.__dict__["options"] = options
1312
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
1313
+ __props__.__dict__["plugin_version"] = plugin_version
1314
+ __props__.__dict__["seal_wrap"] = seal_wrap
1315
+ __props__.__dict__["token"] = token
1316
+ __props__.__dict__["ttl"] = ttl
1317
+ return NomadSecretBackend(resource_name, opts=opts, __props__=__props__)
1318
+
1319
+ @_builtins.property
1320
+ @pulumi.getter
1321
+ def accessor(self) -> pulumi.Output[_builtins.str]:
1322
+ """
1323
+ Accessor of the mount
1324
+ """
1325
+ return pulumi.get(self, "accessor")
1326
+
1327
+ @_builtins.property
1328
+ @pulumi.getter
1329
+ def address(self) -> pulumi.Output[Optional[_builtins.str]]:
1330
+ """
1331
+ Specifies the address of the Nomad instance, provided
1332
+ as "protocol://host:port" like "http://127.0.0.1:4646".
1333
+ """
1334
+ return pulumi.get(self, "address")
1335
+
1336
+ @_builtins.property
1337
+ @pulumi.getter(name="allowedManagedKeys")
1338
+ def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1339
+ """
1340
+ List of managed key registry entry names that the mount in question is allowed to access
1341
+ """
1342
+ return pulumi.get(self, "allowed_managed_keys")
1343
+
1344
+ @_builtins.property
1345
+ @pulumi.getter(name="allowedResponseHeaders")
1346
+ def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1347
+ """
1348
+ List of headers to allow and pass from the request to the plugin
1349
+ """
1350
+ return pulumi.get(self, "allowed_response_headers")
1351
+
1352
+ @_builtins.property
1353
+ @pulumi.getter(name="auditNonHmacRequestKeys")
1354
+ def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1355
+ """
1356
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1357
+ """
1358
+ return pulumi.get(self, "audit_non_hmac_request_keys")
1359
+
1360
+ @_builtins.property
1361
+ @pulumi.getter(name="auditNonHmacResponseKeys")
1362
+ def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1363
+ """
1364
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1365
+ """
1366
+ return pulumi.get(self, "audit_non_hmac_response_keys")
1367
+
1368
+ @_builtins.property
1369
+ @pulumi.getter
1370
+ def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
1371
+ """
1372
+ The unique path this backend should be mounted at. Must
1373
+ not begin or end with a `/`. Defaults to `nomad`.
1374
+ """
1375
+ return pulumi.get(self, "backend")
1376
+
1377
+ @_builtins.property
1378
+ @pulumi.getter(name="caCert")
1379
+ def ca_cert(self) -> pulumi.Output[Optional[_builtins.str]]:
1380
+ """
1381
+ CA certificate to use when verifying the Nomad server certificate, must be
1382
+ x509 PEM encoded.
1383
+ """
1384
+ return pulumi.get(self, "ca_cert")
1385
+
1386
+ @_builtins.property
1387
+ @pulumi.getter(name="clientCert")
1388
+ def client_cert(self) -> pulumi.Output[Optional[_builtins.str]]:
1389
+ """
1390
+ Client certificate to provide to the Nomad server, must be x509 PEM encoded.
1391
+ """
1392
+ return pulumi.get(self, "client_cert")
1393
+
1394
+ @_builtins.property
1395
+ @pulumi.getter(name="clientKey")
1396
+ def client_key(self) -> pulumi.Output[Optional[_builtins.str]]:
1397
+ """
1398
+ Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
1399
+ """
1400
+ return pulumi.get(self, "client_key")
1401
+
1402
+ @_builtins.property
1403
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
1404
+ def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1405
+ """
1406
+ Default lease duration for secrets in seconds.
1407
+ """
1408
+ return pulumi.get(self, "default_lease_ttl_seconds")
1409
+
1410
+ @_builtins.property
1411
+ @pulumi.getter(name="delegatedAuthAccessors")
1412
+ def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1413
+ """
1414
+ List of headers to allow and pass from the request to the plugin
1415
+ """
1416
+ return pulumi.get(self, "delegated_auth_accessors")
1417
+
1418
+ @_builtins.property
1419
+ @pulumi.getter
1420
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
1421
+ """
1422
+ Human-friendly description of the mount for the backend.
1423
+ """
1424
+ return pulumi.get(self, "description")
1425
+
1426
+ @_builtins.property
1427
+ @pulumi.getter(name="disableRemount")
1428
+ def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
1429
+ """
1430
+ If set, opts out of mount migration on path updates.
1431
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1432
+ """
1433
+ return pulumi.get(self, "disable_remount")
1434
+
1435
+ @_builtins.property
1436
+ @pulumi.getter(name="externalEntropyAccess")
1437
+ def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
1438
+ """
1439
+ Enable the secrets engine to access Vault's external entropy source
1440
+ """
1441
+ return pulumi.get(self, "external_entropy_access")
1442
+
1443
+ @_builtins.property
1444
+ @pulumi.getter(name="forceNoCache")
1445
+ def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
1446
+ """
1447
+ If set to true, disables caching.
1448
+ """
1449
+ return pulumi.get(self, "force_no_cache")
1450
+
1451
+ @_builtins.property
1452
+ @pulumi.getter(name="identityTokenKey")
1453
+ def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
1454
+ """
1455
+ The key to use for signing plugin workload identity tokens
1456
+ """
1457
+ return pulumi.get(self, "identity_token_key")
1458
+
1459
+ @_builtins.property
1460
+ @pulumi.getter(name="listingVisibility")
1461
+ def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
1462
+ """
1463
+ Specifies whether to show this mount in the UI-specific listing endpoint
1464
+ """
1465
+ return pulumi.get(self, "listing_visibility")
1466
+
1467
+ @_builtins.property
1468
+ @pulumi.getter
1469
+ def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
1470
+ """
1471
+ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time.
1472
+ """
1473
+ return pulumi.get(self, "local")
1474
+
1475
+ @_builtins.property
1476
+ @pulumi.getter(name="maxLeaseTtlSeconds")
1477
+ def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1478
+ """
1479
+ Maximum possible lease duration for secrets in seconds.
1480
+ """
1481
+ return pulumi.get(self, "max_lease_ttl_seconds")
1482
+
1483
+ @_builtins.property
1484
+ @pulumi.getter(name="maxTokenNameLength")
1485
+ def max_token_name_length(self) -> pulumi.Output[_builtins.int]:
1486
+ """
1487
+ Specifies the maximum length to use for the name of the Nomad token
1488
+ generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
1489
+ by the Nomad version.
1490
+ """
1491
+ return pulumi.get(self, "max_token_name_length")
1492
+
1493
+ @_builtins.property
1494
+ @pulumi.getter(name="maxTtl")
1495
+ def max_ttl(self) -> pulumi.Output[_builtins.int]:
1496
+ """
1497
+ Maximum possible lease duration for secrets in seconds.
1498
+ """
1499
+ return pulumi.get(self, "max_ttl")
1500
+
1501
+ @_builtins.property
1502
+ @pulumi.getter
1503
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
1504
+ """
1505
+ The namespace to provision the resource in.
1506
+ The value should not contain leading or trailing forward slashes.
1507
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1508
+ *Available only for Vault Enterprise*.
1509
+ """
1510
+ return pulumi.get(self, "namespace")
1511
+
1512
+ @_builtins.property
1513
+ @pulumi.getter
1514
+ def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
1515
+ """
1516
+ Specifies mount type specific options that are passed to the backend
1517
+ """
1518
+ return pulumi.get(self, "options")
1519
+
1520
+ @_builtins.property
1521
+ @pulumi.getter(name="passthroughRequestHeaders")
1522
+ def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1523
+ """
1524
+ List of headers to allow and pass from the request to the plugin
1525
+ """
1526
+ return pulumi.get(self, "passthrough_request_headers")
1527
+
1528
+ @_builtins.property
1529
+ @pulumi.getter(name="pluginVersion")
1530
+ def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
1531
+ """
1532
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1533
+ """
1534
+ return pulumi.get(self, "plugin_version")
1535
+
1536
+ @_builtins.property
1537
+ @pulumi.getter(name="sealWrap")
1538
+ def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
1539
+ """
1540
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1541
+ """
1542
+ return pulumi.get(self, "seal_wrap")
1543
+
1544
+ @_builtins.property
1545
+ @pulumi.getter
1546
+ def token(self) -> pulumi.Output[Optional[_builtins.str]]:
1547
+ """
1548
+ Specifies the Nomad Management token to use.
1549
+ """
1550
+ return pulumi.get(self, "token")
1551
+
1552
+ @_builtins.property
1553
+ @pulumi.getter
1554
+ def ttl(self) -> pulumi.Output[_builtins.int]:
1555
+ """
1556
+ Specifies the ttl of the lease for the generated token.
1557
+ """
1558
+ return pulumi.get(self, "ttl")
1559
+