pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,1437 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['SecretBackendArgs', 'SecretBackend']
18
+
19
+ @pulumi.input_type
20
+ class SecretBackendArgs:
21
+ def __init__(__self__, *,
22
+ connection_uri: pulumi.Input[_builtins.str],
23
+ password: pulumi.Input[_builtins.str],
24
+ username: pulumi.Input[_builtins.str],
25
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
28
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
29
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
30
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
31
+ description: Optional[pulumi.Input[_builtins.str]] = None,
32
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
33
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
34
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
35
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
36
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
37
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
38
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
39
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
40
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
41
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
42
+ password_policy: Optional[pulumi.Input[_builtins.str]] = None,
43
+ path: Optional[pulumi.Input[_builtins.str]] = None,
44
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
45
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
46
+ username_template: Optional[pulumi.Input[_builtins.str]] = None,
47
+ verify_connection: Optional[pulumi.Input[_builtins.bool]] = None):
48
+ """
49
+ The set of arguments for constructing a SecretBackend resource.
50
+ :param pulumi.Input[_builtins.str] connection_uri: Specifies the RabbitMQ connection URI.
51
+ :param pulumi.Input[_builtins.str] password: Specifies the RabbitMQ management administrator password.
52
+ :param pulumi.Input[_builtins.str] username: Specifies the RabbitMQ management administrator username.
53
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
54
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
55
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
56
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
57
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
58
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
59
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
60
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
61
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
62
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
63
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
64
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
65
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
66
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
67
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
68
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
69
+ The value should not contain leading or trailing forward slashes.
70
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
71
+ *Available only for Vault Enterprise*.
72
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
73
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
74
+ :param pulumi.Input[_builtins.str] password_policy: Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set.
75
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
76
+ not begin or end with a `/`. Defaults to `rabbitmq`.
77
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
78
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
79
+ :param pulumi.Input[_builtins.str] username_template: Template describing how dynamic usernames are generated.
80
+ :param pulumi.Input[_builtins.bool] verify_connection: Specifies whether to verify connection URI, username, and password.
81
+ Defaults to `true`.
82
+ """
83
+ pulumi.set(__self__, "connection_uri", connection_uri)
84
+ pulumi.set(__self__, "password", password)
85
+ pulumi.set(__self__, "username", username)
86
+ if allowed_managed_keys is not None:
87
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
88
+ if allowed_response_headers is not None:
89
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
90
+ if audit_non_hmac_request_keys is not None:
91
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
92
+ if audit_non_hmac_response_keys is not None:
93
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
94
+ if default_lease_ttl_seconds is not None:
95
+ pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
96
+ if delegated_auth_accessors is not None:
97
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
98
+ if description is not None:
99
+ pulumi.set(__self__, "description", description)
100
+ if disable_remount is not None:
101
+ pulumi.set(__self__, "disable_remount", disable_remount)
102
+ if external_entropy_access is not None:
103
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
104
+ if force_no_cache is not None:
105
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
106
+ if identity_token_key is not None:
107
+ pulumi.set(__self__, "identity_token_key", identity_token_key)
108
+ if listing_visibility is not None:
109
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
110
+ if local is not None:
111
+ pulumi.set(__self__, "local", local)
112
+ if max_lease_ttl_seconds is not None:
113
+ pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
114
+ if namespace is not None:
115
+ pulumi.set(__self__, "namespace", namespace)
116
+ if options is not None:
117
+ pulumi.set(__self__, "options", options)
118
+ if passthrough_request_headers is not None:
119
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
120
+ if password_policy is not None:
121
+ pulumi.set(__self__, "password_policy", password_policy)
122
+ if path is not None:
123
+ pulumi.set(__self__, "path", path)
124
+ if plugin_version is not None:
125
+ pulumi.set(__self__, "plugin_version", plugin_version)
126
+ if seal_wrap is not None:
127
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
128
+ if username_template is not None:
129
+ pulumi.set(__self__, "username_template", username_template)
130
+ if verify_connection is not None:
131
+ pulumi.set(__self__, "verify_connection", verify_connection)
132
+
133
+ @_builtins.property
134
+ @pulumi.getter(name="connectionUri")
135
+ def connection_uri(self) -> pulumi.Input[_builtins.str]:
136
+ """
137
+ Specifies the RabbitMQ connection URI.
138
+ """
139
+ return pulumi.get(self, "connection_uri")
140
+
141
+ @connection_uri.setter
142
+ def connection_uri(self, value: pulumi.Input[_builtins.str]):
143
+ pulumi.set(self, "connection_uri", value)
144
+
145
+ @_builtins.property
146
+ @pulumi.getter
147
+ def password(self) -> pulumi.Input[_builtins.str]:
148
+ """
149
+ Specifies the RabbitMQ management administrator password.
150
+ """
151
+ return pulumi.get(self, "password")
152
+
153
+ @password.setter
154
+ def password(self, value: pulumi.Input[_builtins.str]):
155
+ pulumi.set(self, "password", value)
156
+
157
+ @_builtins.property
158
+ @pulumi.getter
159
+ def username(self) -> pulumi.Input[_builtins.str]:
160
+ """
161
+ Specifies the RabbitMQ management administrator username.
162
+ """
163
+ return pulumi.get(self, "username")
164
+
165
+ @username.setter
166
+ def username(self, value: pulumi.Input[_builtins.str]):
167
+ pulumi.set(self, "username", value)
168
+
169
+ @_builtins.property
170
+ @pulumi.getter(name="allowedManagedKeys")
171
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
172
+ """
173
+ List of managed key registry entry names that the mount in question is allowed to access
174
+ """
175
+ return pulumi.get(self, "allowed_managed_keys")
176
+
177
+ @allowed_managed_keys.setter
178
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
179
+ pulumi.set(self, "allowed_managed_keys", value)
180
+
181
+ @_builtins.property
182
+ @pulumi.getter(name="allowedResponseHeaders")
183
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
184
+ """
185
+ List of headers to allow and pass from the request to the plugin
186
+ """
187
+ return pulumi.get(self, "allowed_response_headers")
188
+
189
+ @allowed_response_headers.setter
190
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
191
+ pulumi.set(self, "allowed_response_headers", value)
192
+
193
+ @_builtins.property
194
+ @pulumi.getter(name="auditNonHmacRequestKeys")
195
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
196
+ """
197
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
198
+ """
199
+ return pulumi.get(self, "audit_non_hmac_request_keys")
200
+
201
+ @audit_non_hmac_request_keys.setter
202
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
203
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
204
+
205
+ @_builtins.property
206
+ @pulumi.getter(name="auditNonHmacResponseKeys")
207
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
208
+ """
209
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
210
+ """
211
+ return pulumi.get(self, "audit_non_hmac_response_keys")
212
+
213
+ @audit_non_hmac_response_keys.setter
214
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
215
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
216
+
217
+ @_builtins.property
218
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
219
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
220
+ """
221
+ Default lease duration for secrets in seconds
222
+ """
223
+ return pulumi.get(self, "default_lease_ttl_seconds")
224
+
225
+ @default_lease_ttl_seconds.setter
226
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
227
+ pulumi.set(self, "default_lease_ttl_seconds", value)
228
+
229
+ @_builtins.property
230
+ @pulumi.getter(name="delegatedAuthAccessors")
231
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
232
+ """
233
+ List of headers to allow and pass from the request to the plugin
234
+ """
235
+ return pulumi.get(self, "delegated_auth_accessors")
236
+
237
+ @delegated_auth_accessors.setter
238
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
239
+ pulumi.set(self, "delegated_auth_accessors", value)
240
+
241
+ @_builtins.property
242
+ @pulumi.getter
243
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
244
+ """
245
+ Human-friendly description of the mount for the backend.
246
+ """
247
+ return pulumi.get(self, "description")
248
+
249
+ @description.setter
250
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
251
+ pulumi.set(self, "description", value)
252
+
253
+ @_builtins.property
254
+ @pulumi.getter(name="disableRemount")
255
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
256
+ """
257
+ If set, opts out of mount migration on path updates.
258
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
259
+ """
260
+ return pulumi.get(self, "disable_remount")
261
+
262
+ @disable_remount.setter
263
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
264
+ pulumi.set(self, "disable_remount", value)
265
+
266
+ @_builtins.property
267
+ @pulumi.getter(name="externalEntropyAccess")
268
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
269
+ """
270
+ Enable the secrets engine to access Vault's external entropy source
271
+ """
272
+ return pulumi.get(self, "external_entropy_access")
273
+
274
+ @external_entropy_access.setter
275
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
276
+ pulumi.set(self, "external_entropy_access", value)
277
+
278
+ @_builtins.property
279
+ @pulumi.getter(name="forceNoCache")
280
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
281
+ """
282
+ If set to true, disables caching.
283
+ """
284
+ return pulumi.get(self, "force_no_cache")
285
+
286
+ @force_no_cache.setter
287
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
288
+ pulumi.set(self, "force_no_cache", value)
289
+
290
+ @_builtins.property
291
+ @pulumi.getter(name="identityTokenKey")
292
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
293
+ """
294
+ The key to use for signing plugin workload identity tokens
295
+ """
296
+ return pulumi.get(self, "identity_token_key")
297
+
298
+ @identity_token_key.setter
299
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
300
+ pulumi.set(self, "identity_token_key", value)
301
+
302
+ @_builtins.property
303
+ @pulumi.getter(name="listingVisibility")
304
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
305
+ """
306
+ Specifies whether to show this mount in the UI-specific listing endpoint
307
+ """
308
+ return pulumi.get(self, "listing_visibility")
309
+
310
+ @listing_visibility.setter
311
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
312
+ pulumi.set(self, "listing_visibility", value)
313
+
314
+ @_builtins.property
315
+ @pulumi.getter
316
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
317
+ """
318
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
319
+ """
320
+ return pulumi.get(self, "local")
321
+
322
+ @local.setter
323
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
324
+ pulumi.set(self, "local", value)
325
+
326
+ @_builtins.property
327
+ @pulumi.getter(name="maxLeaseTtlSeconds")
328
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
329
+ """
330
+ Maximum possible lease duration for secrets in seconds
331
+ """
332
+ return pulumi.get(self, "max_lease_ttl_seconds")
333
+
334
+ @max_lease_ttl_seconds.setter
335
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
336
+ pulumi.set(self, "max_lease_ttl_seconds", value)
337
+
338
+ @_builtins.property
339
+ @pulumi.getter
340
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
341
+ """
342
+ The namespace to provision the resource in.
343
+ The value should not contain leading or trailing forward slashes.
344
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
345
+ *Available only for Vault Enterprise*.
346
+ """
347
+ return pulumi.get(self, "namespace")
348
+
349
+ @namespace.setter
350
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
351
+ pulumi.set(self, "namespace", value)
352
+
353
+ @_builtins.property
354
+ @pulumi.getter
355
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
356
+ """
357
+ Specifies mount type specific options that are passed to the backend
358
+ """
359
+ return pulumi.get(self, "options")
360
+
361
+ @options.setter
362
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
363
+ pulumi.set(self, "options", value)
364
+
365
+ @_builtins.property
366
+ @pulumi.getter(name="passthroughRequestHeaders")
367
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
368
+ """
369
+ List of headers to allow and pass from the request to the plugin
370
+ """
371
+ return pulumi.get(self, "passthrough_request_headers")
372
+
373
+ @passthrough_request_headers.setter
374
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
375
+ pulumi.set(self, "passthrough_request_headers", value)
376
+
377
+ @_builtins.property
378
+ @pulumi.getter(name="passwordPolicy")
379
+ def password_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
380
+ """
381
+ Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set.
382
+ """
383
+ return pulumi.get(self, "password_policy")
384
+
385
+ @password_policy.setter
386
+ def password_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
387
+ pulumi.set(self, "password_policy", value)
388
+
389
+ @_builtins.property
390
+ @pulumi.getter
391
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
392
+ """
393
+ The unique path this backend should be mounted at. Must
394
+ not begin or end with a `/`. Defaults to `rabbitmq`.
395
+ """
396
+ return pulumi.get(self, "path")
397
+
398
+ @path.setter
399
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
400
+ pulumi.set(self, "path", value)
401
+
402
+ @_builtins.property
403
+ @pulumi.getter(name="pluginVersion")
404
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
405
+ """
406
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
407
+ """
408
+ return pulumi.get(self, "plugin_version")
409
+
410
+ @plugin_version.setter
411
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
412
+ pulumi.set(self, "plugin_version", value)
413
+
414
+ @_builtins.property
415
+ @pulumi.getter(name="sealWrap")
416
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
417
+ """
418
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
419
+ """
420
+ return pulumi.get(self, "seal_wrap")
421
+
422
+ @seal_wrap.setter
423
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
424
+ pulumi.set(self, "seal_wrap", value)
425
+
426
+ @_builtins.property
427
+ @pulumi.getter(name="usernameTemplate")
428
+ def username_template(self) -> Optional[pulumi.Input[_builtins.str]]:
429
+ """
430
+ Template describing how dynamic usernames are generated.
431
+ """
432
+ return pulumi.get(self, "username_template")
433
+
434
+ @username_template.setter
435
+ def username_template(self, value: Optional[pulumi.Input[_builtins.str]]):
436
+ pulumi.set(self, "username_template", value)
437
+
438
+ @_builtins.property
439
+ @pulumi.getter(name="verifyConnection")
440
+ def verify_connection(self) -> Optional[pulumi.Input[_builtins.bool]]:
441
+ """
442
+ Specifies whether to verify connection URI, username, and password.
443
+ Defaults to `true`.
444
+ """
445
+ return pulumi.get(self, "verify_connection")
446
+
447
+ @verify_connection.setter
448
+ def verify_connection(self, value: Optional[pulumi.Input[_builtins.bool]]):
449
+ pulumi.set(self, "verify_connection", value)
450
+
451
+
452
+ @pulumi.input_type
453
+ class _SecretBackendState:
454
+ def __init__(__self__, *,
455
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
456
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
457
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
458
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
459
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
460
+ connection_uri: Optional[pulumi.Input[_builtins.str]] = None,
461
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
462
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
463
+ description: Optional[pulumi.Input[_builtins.str]] = None,
464
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
465
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
466
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
467
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
468
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
469
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
470
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
471
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
472
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
473
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
474
+ password: Optional[pulumi.Input[_builtins.str]] = None,
475
+ password_policy: Optional[pulumi.Input[_builtins.str]] = None,
476
+ path: Optional[pulumi.Input[_builtins.str]] = None,
477
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
478
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
479
+ username: Optional[pulumi.Input[_builtins.str]] = None,
480
+ username_template: Optional[pulumi.Input[_builtins.str]] = None,
481
+ verify_connection: Optional[pulumi.Input[_builtins.bool]] = None):
482
+ """
483
+ Input properties used for looking up and filtering SecretBackend resources.
484
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
485
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
486
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
487
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
488
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
489
+ :param pulumi.Input[_builtins.str] connection_uri: Specifies the RabbitMQ connection URI.
490
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
491
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
492
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
493
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
494
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
495
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
496
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
497
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
498
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
499
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
500
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
501
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
502
+ The value should not contain leading or trailing forward slashes.
503
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
504
+ *Available only for Vault Enterprise*.
505
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
506
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
507
+ :param pulumi.Input[_builtins.str] password: Specifies the RabbitMQ management administrator password.
508
+ :param pulumi.Input[_builtins.str] password_policy: Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set.
509
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
510
+ not begin or end with a `/`. Defaults to `rabbitmq`.
511
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
512
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
513
+ :param pulumi.Input[_builtins.str] username: Specifies the RabbitMQ management administrator username.
514
+ :param pulumi.Input[_builtins.str] username_template: Template describing how dynamic usernames are generated.
515
+ :param pulumi.Input[_builtins.bool] verify_connection: Specifies whether to verify connection URI, username, and password.
516
+ Defaults to `true`.
517
+ """
518
+ if accessor is not None:
519
+ pulumi.set(__self__, "accessor", accessor)
520
+ if allowed_managed_keys is not None:
521
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
522
+ if allowed_response_headers is not None:
523
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
524
+ if audit_non_hmac_request_keys is not None:
525
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
526
+ if audit_non_hmac_response_keys is not None:
527
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
528
+ if connection_uri is not None:
529
+ pulumi.set(__self__, "connection_uri", connection_uri)
530
+ if default_lease_ttl_seconds is not None:
531
+ pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
532
+ if delegated_auth_accessors is not None:
533
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
534
+ if description is not None:
535
+ pulumi.set(__self__, "description", description)
536
+ if disable_remount is not None:
537
+ pulumi.set(__self__, "disable_remount", disable_remount)
538
+ if external_entropy_access is not None:
539
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
540
+ if force_no_cache is not None:
541
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
542
+ if identity_token_key is not None:
543
+ pulumi.set(__self__, "identity_token_key", identity_token_key)
544
+ if listing_visibility is not None:
545
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
546
+ if local is not None:
547
+ pulumi.set(__self__, "local", local)
548
+ if max_lease_ttl_seconds is not None:
549
+ pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
550
+ if namespace is not None:
551
+ pulumi.set(__self__, "namespace", namespace)
552
+ if options is not None:
553
+ pulumi.set(__self__, "options", options)
554
+ if passthrough_request_headers is not None:
555
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
556
+ if password is not None:
557
+ pulumi.set(__self__, "password", password)
558
+ if password_policy is not None:
559
+ pulumi.set(__self__, "password_policy", password_policy)
560
+ if path is not None:
561
+ pulumi.set(__self__, "path", path)
562
+ if plugin_version is not None:
563
+ pulumi.set(__self__, "plugin_version", plugin_version)
564
+ if seal_wrap is not None:
565
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
566
+ if username is not None:
567
+ pulumi.set(__self__, "username", username)
568
+ if username_template is not None:
569
+ pulumi.set(__self__, "username_template", username_template)
570
+ if verify_connection is not None:
571
+ pulumi.set(__self__, "verify_connection", verify_connection)
572
+
573
+ @_builtins.property
574
+ @pulumi.getter
575
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
576
+ """
577
+ Accessor of the mount
578
+ """
579
+ return pulumi.get(self, "accessor")
580
+
581
+ @accessor.setter
582
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
583
+ pulumi.set(self, "accessor", value)
584
+
585
+ @_builtins.property
586
+ @pulumi.getter(name="allowedManagedKeys")
587
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
588
+ """
589
+ List of managed key registry entry names that the mount in question is allowed to access
590
+ """
591
+ return pulumi.get(self, "allowed_managed_keys")
592
+
593
+ @allowed_managed_keys.setter
594
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
595
+ pulumi.set(self, "allowed_managed_keys", value)
596
+
597
+ @_builtins.property
598
+ @pulumi.getter(name="allowedResponseHeaders")
599
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
600
+ """
601
+ List of headers to allow and pass from the request to the plugin
602
+ """
603
+ return pulumi.get(self, "allowed_response_headers")
604
+
605
+ @allowed_response_headers.setter
606
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
607
+ pulumi.set(self, "allowed_response_headers", value)
608
+
609
+ @_builtins.property
610
+ @pulumi.getter(name="auditNonHmacRequestKeys")
611
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
612
+ """
613
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
614
+ """
615
+ return pulumi.get(self, "audit_non_hmac_request_keys")
616
+
617
+ @audit_non_hmac_request_keys.setter
618
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
619
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
620
+
621
+ @_builtins.property
622
+ @pulumi.getter(name="auditNonHmacResponseKeys")
623
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
624
+ """
625
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
626
+ """
627
+ return pulumi.get(self, "audit_non_hmac_response_keys")
628
+
629
+ @audit_non_hmac_response_keys.setter
630
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
631
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
632
+
633
+ @_builtins.property
634
+ @pulumi.getter(name="connectionUri")
635
+ def connection_uri(self) -> Optional[pulumi.Input[_builtins.str]]:
636
+ """
637
+ Specifies the RabbitMQ connection URI.
638
+ """
639
+ return pulumi.get(self, "connection_uri")
640
+
641
+ @connection_uri.setter
642
+ def connection_uri(self, value: Optional[pulumi.Input[_builtins.str]]):
643
+ pulumi.set(self, "connection_uri", value)
644
+
645
+ @_builtins.property
646
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
647
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
648
+ """
649
+ Default lease duration for secrets in seconds
650
+ """
651
+ return pulumi.get(self, "default_lease_ttl_seconds")
652
+
653
+ @default_lease_ttl_seconds.setter
654
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
655
+ pulumi.set(self, "default_lease_ttl_seconds", value)
656
+
657
+ @_builtins.property
658
+ @pulumi.getter(name="delegatedAuthAccessors")
659
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
660
+ """
661
+ List of headers to allow and pass from the request to the plugin
662
+ """
663
+ return pulumi.get(self, "delegated_auth_accessors")
664
+
665
+ @delegated_auth_accessors.setter
666
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
667
+ pulumi.set(self, "delegated_auth_accessors", value)
668
+
669
+ @_builtins.property
670
+ @pulumi.getter
671
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
672
+ """
673
+ Human-friendly description of the mount for the backend.
674
+ """
675
+ return pulumi.get(self, "description")
676
+
677
+ @description.setter
678
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
679
+ pulumi.set(self, "description", value)
680
+
681
+ @_builtins.property
682
+ @pulumi.getter(name="disableRemount")
683
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
684
+ """
685
+ If set, opts out of mount migration on path updates.
686
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
687
+ """
688
+ return pulumi.get(self, "disable_remount")
689
+
690
+ @disable_remount.setter
691
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
692
+ pulumi.set(self, "disable_remount", value)
693
+
694
+ @_builtins.property
695
+ @pulumi.getter(name="externalEntropyAccess")
696
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
697
+ """
698
+ Enable the secrets engine to access Vault's external entropy source
699
+ """
700
+ return pulumi.get(self, "external_entropy_access")
701
+
702
+ @external_entropy_access.setter
703
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
704
+ pulumi.set(self, "external_entropy_access", value)
705
+
706
+ @_builtins.property
707
+ @pulumi.getter(name="forceNoCache")
708
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
709
+ """
710
+ If set to true, disables caching.
711
+ """
712
+ return pulumi.get(self, "force_no_cache")
713
+
714
+ @force_no_cache.setter
715
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
716
+ pulumi.set(self, "force_no_cache", value)
717
+
718
+ @_builtins.property
719
+ @pulumi.getter(name="identityTokenKey")
720
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
721
+ """
722
+ The key to use for signing plugin workload identity tokens
723
+ """
724
+ return pulumi.get(self, "identity_token_key")
725
+
726
+ @identity_token_key.setter
727
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
728
+ pulumi.set(self, "identity_token_key", value)
729
+
730
+ @_builtins.property
731
+ @pulumi.getter(name="listingVisibility")
732
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
733
+ """
734
+ Specifies whether to show this mount in the UI-specific listing endpoint
735
+ """
736
+ return pulumi.get(self, "listing_visibility")
737
+
738
+ @listing_visibility.setter
739
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
740
+ pulumi.set(self, "listing_visibility", value)
741
+
742
+ @_builtins.property
743
+ @pulumi.getter
744
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
745
+ """
746
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
747
+ """
748
+ return pulumi.get(self, "local")
749
+
750
+ @local.setter
751
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
752
+ pulumi.set(self, "local", value)
753
+
754
+ @_builtins.property
755
+ @pulumi.getter(name="maxLeaseTtlSeconds")
756
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
757
+ """
758
+ Maximum possible lease duration for secrets in seconds
759
+ """
760
+ return pulumi.get(self, "max_lease_ttl_seconds")
761
+
762
+ @max_lease_ttl_seconds.setter
763
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
764
+ pulumi.set(self, "max_lease_ttl_seconds", value)
765
+
766
+ @_builtins.property
767
+ @pulumi.getter
768
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
769
+ """
770
+ The namespace to provision the resource in.
771
+ The value should not contain leading or trailing forward slashes.
772
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
773
+ *Available only for Vault Enterprise*.
774
+ """
775
+ return pulumi.get(self, "namespace")
776
+
777
+ @namespace.setter
778
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
779
+ pulumi.set(self, "namespace", value)
780
+
781
+ @_builtins.property
782
+ @pulumi.getter
783
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
784
+ """
785
+ Specifies mount type specific options that are passed to the backend
786
+ """
787
+ return pulumi.get(self, "options")
788
+
789
+ @options.setter
790
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
791
+ pulumi.set(self, "options", value)
792
+
793
+ @_builtins.property
794
+ @pulumi.getter(name="passthroughRequestHeaders")
795
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
796
+ """
797
+ List of headers to allow and pass from the request to the plugin
798
+ """
799
+ return pulumi.get(self, "passthrough_request_headers")
800
+
801
+ @passthrough_request_headers.setter
802
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
803
+ pulumi.set(self, "passthrough_request_headers", value)
804
+
805
+ @_builtins.property
806
+ @pulumi.getter
807
+ def password(self) -> Optional[pulumi.Input[_builtins.str]]:
808
+ """
809
+ Specifies the RabbitMQ management administrator password.
810
+ """
811
+ return pulumi.get(self, "password")
812
+
813
+ @password.setter
814
+ def password(self, value: Optional[pulumi.Input[_builtins.str]]):
815
+ pulumi.set(self, "password", value)
816
+
817
+ @_builtins.property
818
+ @pulumi.getter(name="passwordPolicy")
819
+ def password_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
820
+ """
821
+ Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set.
822
+ """
823
+ return pulumi.get(self, "password_policy")
824
+
825
+ @password_policy.setter
826
+ def password_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
827
+ pulumi.set(self, "password_policy", value)
828
+
829
+ @_builtins.property
830
+ @pulumi.getter
831
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
832
+ """
833
+ The unique path this backend should be mounted at. Must
834
+ not begin or end with a `/`. Defaults to `rabbitmq`.
835
+ """
836
+ return pulumi.get(self, "path")
837
+
838
+ @path.setter
839
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
840
+ pulumi.set(self, "path", value)
841
+
842
+ @_builtins.property
843
+ @pulumi.getter(name="pluginVersion")
844
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
845
+ """
846
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
847
+ """
848
+ return pulumi.get(self, "plugin_version")
849
+
850
+ @plugin_version.setter
851
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
852
+ pulumi.set(self, "plugin_version", value)
853
+
854
+ @_builtins.property
855
+ @pulumi.getter(name="sealWrap")
856
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
857
+ """
858
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
859
+ """
860
+ return pulumi.get(self, "seal_wrap")
861
+
862
+ @seal_wrap.setter
863
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
864
+ pulumi.set(self, "seal_wrap", value)
865
+
866
+ @_builtins.property
867
+ @pulumi.getter
868
+ def username(self) -> Optional[pulumi.Input[_builtins.str]]:
869
+ """
870
+ Specifies the RabbitMQ management administrator username.
871
+ """
872
+ return pulumi.get(self, "username")
873
+
874
+ @username.setter
875
+ def username(self, value: Optional[pulumi.Input[_builtins.str]]):
876
+ pulumi.set(self, "username", value)
877
+
878
+ @_builtins.property
879
+ @pulumi.getter(name="usernameTemplate")
880
+ def username_template(self) -> Optional[pulumi.Input[_builtins.str]]:
881
+ """
882
+ Template describing how dynamic usernames are generated.
883
+ """
884
+ return pulumi.get(self, "username_template")
885
+
886
+ @username_template.setter
887
+ def username_template(self, value: Optional[pulumi.Input[_builtins.str]]):
888
+ pulumi.set(self, "username_template", value)
889
+
890
+ @_builtins.property
891
+ @pulumi.getter(name="verifyConnection")
892
+ def verify_connection(self) -> Optional[pulumi.Input[_builtins.bool]]:
893
+ """
894
+ Specifies whether to verify connection URI, username, and password.
895
+ Defaults to `true`.
896
+ """
897
+ return pulumi.get(self, "verify_connection")
898
+
899
+ @verify_connection.setter
900
+ def verify_connection(self, value: Optional[pulumi.Input[_builtins.bool]]):
901
+ pulumi.set(self, "verify_connection", value)
902
+
903
+
904
+ @pulumi.type_token("vault:rabbitMq/secretBackend:SecretBackend")
905
+ class SecretBackend(pulumi.CustomResource):
906
+ @overload
907
+ def __init__(__self__,
908
+ resource_name: str,
909
+ opts: Optional[pulumi.ResourceOptions] = None,
910
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
911
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
912
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
913
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
914
+ connection_uri: Optional[pulumi.Input[_builtins.str]] = None,
915
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
916
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
917
+ description: Optional[pulumi.Input[_builtins.str]] = None,
918
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
919
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
920
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
921
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
922
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
923
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
924
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
925
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
926
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
927
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
928
+ password: Optional[pulumi.Input[_builtins.str]] = None,
929
+ password_policy: Optional[pulumi.Input[_builtins.str]] = None,
930
+ path: Optional[pulumi.Input[_builtins.str]] = None,
931
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
932
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
933
+ username: Optional[pulumi.Input[_builtins.str]] = None,
934
+ username_template: Optional[pulumi.Input[_builtins.str]] = None,
935
+ verify_connection: Optional[pulumi.Input[_builtins.bool]] = None,
936
+ __props__=None):
937
+ """
938
+ ## Example Usage
939
+
940
+ ```python
941
+ import pulumi
942
+ import pulumi_vault as vault
943
+
944
+ rabbitmq = vault.rabbitmq.SecretBackend("rabbitmq",
945
+ connection_uri="https://.....",
946
+ username="user",
947
+ password="password")
948
+ ```
949
+
950
+ ## Import
951
+
952
+ RabbitMQ secret backends can be imported using the `path`, e.g.
953
+
954
+ ```sh
955
+ $ pulumi import vault:rabbitMq/secretBackend:SecretBackend rabbitmq rabbitmq
956
+ ```
957
+
958
+ :param str resource_name: The name of the resource.
959
+ :param pulumi.ResourceOptions opts: Options for the resource.
960
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
961
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
962
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
963
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
964
+ :param pulumi.Input[_builtins.str] connection_uri: Specifies the RabbitMQ connection URI.
965
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
966
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
967
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
968
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
969
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
970
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
971
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
972
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
973
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
974
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
975
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
976
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
977
+ The value should not contain leading or trailing forward slashes.
978
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
979
+ *Available only for Vault Enterprise*.
980
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
981
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
982
+ :param pulumi.Input[_builtins.str] password: Specifies the RabbitMQ management administrator password.
983
+ :param pulumi.Input[_builtins.str] password_policy: Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set.
984
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
985
+ not begin or end with a `/`. Defaults to `rabbitmq`.
986
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
987
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
988
+ :param pulumi.Input[_builtins.str] username: Specifies the RabbitMQ management administrator username.
989
+ :param pulumi.Input[_builtins.str] username_template: Template describing how dynamic usernames are generated.
990
+ :param pulumi.Input[_builtins.bool] verify_connection: Specifies whether to verify connection URI, username, and password.
991
+ Defaults to `true`.
992
+ """
993
+ ...
994
+ @overload
995
+ def __init__(__self__,
996
+ resource_name: str,
997
+ args: SecretBackendArgs,
998
+ opts: Optional[pulumi.ResourceOptions] = None):
999
+ """
1000
+ ## Example Usage
1001
+
1002
+ ```python
1003
+ import pulumi
1004
+ import pulumi_vault as vault
1005
+
1006
+ rabbitmq = vault.rabbitmq.SecretBackend("rabbitmq",
1007
+ connection_uri="https://.....",
1008
+ username="user",
1009
+ password="password")
1010
+ ```
1011
+
1012
+ ## Import
1013
+
1014
+ RabbitMQ secret backends can be imported using the `path`, e.g.
1015
+
1016
+ ```sh
1017
+ $ pulumi import vault:rabbitMq/secretBackend:SecretBackend rabbitmq rabbitmq
1018
+ ```
1019
+
1020
+ :param str resource_name: The name of the resource.
1021
+ :param SecretBackendArgs args: The arguments to use to populate this resource's properties.
1022
+ :param pulumi.ResourceOptions opts: Options for the resource.
1023
+ """
1024
+ ...
1025
+ def __init__(__self__, resource_name: str, *args, **kwargs):
1026
+ resource_args, opts = _utilities.get_resource_args_opts(SecretBackendArgs, pulumi.ResourceOptions, *args, **kwargs)
1027
+ if resource_args is not None:
1028
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
1029
+ else:
1030
+ __self__._internal_init(resource_name, *args, **kwargs)
1031
+
1032
+ def _internal_init(__self__,
1033
+ resource_name: str,
1034
+ opts: Optional[pulumi.ResourceOptions] = None,
1035
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1036
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1037
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1038
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1039
+ connection_uri: Optional[pulumi.Input[_builtins.str]] = None,
1040
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1041
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1042
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1043
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1044
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1045
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1046
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1047
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1048
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1049
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1050
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1051
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1052
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1053
+ password: Optional[pulumi.Input[_builtins.str]] = None,
1054
+ password_policy: Optional[pulumi.Input[_builtins.str]] = None,
1055
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1056
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1057
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1058
+ username: Optional[pulumi.Input[_builtins.str]] = None,
1059
+ username_template: Optional[pulumi.Input[_builtins.str]] = None,
1060
+ verify_connection: Optional[pulumi.Input[_builtins.bool]] = None,
1061
+ __props__=None):
1062
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
1063
+ if not isinstance(opts, pulumi.ResourceOptions):
1064
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
1065
+ if opts.id is None:
1066
+ if __props__ is not None:
1067
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
1068
+ __props__ = SecretBackendArgs.__new__(SecretBackendArgs)
1069
+
1070
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1071
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1072
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1073
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
1074
+ if connection_uri is None and not opts.urn:
1075
+ raise TypeError("Missing required property 'connection_uri'")
1076
+ __props__.__dict__["connection_uri"] = connection_uri
1077
+ __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1078
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
1079
+ __props__.__dict__["description"] = description
1080
+ __props__.__dict__["disable_remount"] = disable_remount
1081
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1082
+ __props__.__dict__["force_no_cache"] = force_no_cache
1083
+ __props__.__dict__["identity_token_key"] = identity_token_key
1084
+ __props__.__dict__["listing_visibility"] = listing_visibility
1085
+ __props__.__dict__["local"] = local
1086
+ __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
1087
+ __props__.__dict__["namespace"] = namespace
1088
+ __props__.__dict__["options"] = options
1089
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
1090
+ if password is None and not opts.urn:
1091
+ raise TypeError("Missing required property 'password'")
1092
+ __props__.__dict__["password"] = None if password is None else pulumi.Output.secret(password)
1093
+ __props__.__dict__["password_policy"] = password_policy
1094
+ __props__.__dict__["path"] = path
1095
+ __props__.__dict__["plugin_version"] = plugin_version
1096
+ __props__.__dict__["seal_wrap"] = seal_wrap
1097
+ if username is None and not opts.urn:
1098
+ raise TypeError("Missing required property 'username'")
1099
+ __props__.__dict__["username"] = None if username is None else pulumi.Output.secret(username)
1100
+ __props__.__dict__["username_template"] = username_template
1101
+ __props__.__dict__["verify_connection"] = verify_connection
1102
+ __props__.__dict__["accessor"] = None
1103
+ secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["password", "username"])
1104
+ opts = pulumi.ResourceOptions.merge(opts, secret_opts)
1105
+ super(SecretBackend, __self__).__init__(
1106
+ 'vault:rabbitMq/secretBackend:SecretBackend',
1107
+ resource_name,
1108
+ __props__,
1109
+ opts)
1110
+
1111
+ @staticmethod
1112
+ def get(resource_name: str,
1113
+ id: pulumi.Input[str],
1114
+ opts: Optional[pulumi.ResourceOptions] = None,
1115
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
1116
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1117
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1118
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1119
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1120
+ connection_uri: Optional[pulumi.Input[_builtins.str]] = None,
1121
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1122
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1123
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1124
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1125
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1126
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1127
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1128
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1129
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1130
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1131
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1132
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1133
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1134
+ password: Optional[pulumi.Input[_builtins.str]] = None,
1135
+ password_policy: Optional[pulumi.Input[_builtins.str]] = None,
1136
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1137
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1138
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1139
+ username: Optional[pulumi.Input[_builtins.str]] = None,
1140
+ username_template: Optional[pulumi.Input[_builtins.str]] = None,
1141
+ verify_connection: Optional[pulumi.Input[_builtins.bool]] = None) -> 'SecretBackend':
1142
+ """
1143
+ Get an existing SecretBackend resource's state with the given name, id, and optional extra
1144
+ properties used to qualify the lookup.
1145
+
1146
+ :param str resource_name: The unique name of the resulting resource.
1147
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
1148
+ :param pulumi.ResourceOptions opts: Options for the resource.
1149
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
1150
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1151
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1152
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1153
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1154
+ :param pulumi.Input[_builtins.str] connection_uri: Specifies the RabbitMQ connection URI.
1155
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
1156
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1157
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
1158
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1159
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1160
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1161
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1162
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1163
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1164
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1165
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
1166
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
1167
+ The value should not contain leading or trailing forward slashes.
1168
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1169
+ *Available only for Vault Enterprise*.
1170
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1171
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1172
+ :param pulumi.Input[_builtins.str] password: Specifies the RabbitMQ management administrator password.
1173
+ :param pulumi.Input[_builtins.str] password_policy: Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set.
1174
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
1175
+ not begin or end with a `/`. Defaults to `rabbitmq`.
1176
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1177
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1178
+ :param pulumi.Input[_builtins.str] username: Specifies the RabbitMQ management administrator username.
1179
+ :param pulumi.Input[_builtins.str] username_template: Template describing how dynamic usernames are generated.
1180
+ :param pulumi.Input[_builtins.bool] verify_connection: Specifies whether to verify connection URI, username, and password.
1181
+ Defaults to `true`.
1182
+ """
1183
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
1184
+
1185
+ __props__ = _SecretBackendState.__new__(_SecretBackendState)
1186
+
1187
+ __props__.__dict__["accessor"] = accessor
1188
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1189
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1190
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1191
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
1192
+ __props__.__dict__["connection_uri"] = connection_uri
1193
+ __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1194
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
1195
+ __props__.__dict__["description"] = description
1196
+ __props__.__dict__["disable_remount"] = disable_remount
1197
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1198
+ __props__.__dict__["force_no_cache"] = force_no_cache
1199
+ __props__.__dict__["identity_token_key"] = identity_token_key
1200
+ __props__.__dict__["listing_visibility"] = listing_visibility
1201
+ __props__.__dict__["local"] = local
1202
+ __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
1203
+ __props__.__dict__["namespace"] = namespace
1204
+ __props__.__dict__["options"] = options
1205
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
1206
+ __props__.__dict__["password"] = password
1207
+ __props__.__dict__["password_policy"] = password_policy
1208
+ __props__.__dict__["path"] = path
1209
+ __props__.__dict__["plugin_version"] = plugin_version
1210
+ __props__.__dict__["seal_wrap"] = seal_wrap
1211
+ __props__.__dict__["username"] = username
1212
+ __props__.__dict__["username_template"] = username_template
1213
+ __props__.__dict__["verify_connection"] = verify_connection
1214
+ return SecretBackend(resource_name, opts=opts, __props__=__props__)
1215
+
1216
+ @_builtins.property
1217
+ @pulumi.getter
1218
+ def accessor(self) -> pulumi.Output[_builtins.str]:
1219
+ """
1220
+ Accessor of the mount
1221
+ """
1222
+ return pulumi.get(self, "accessor")
1223
+
1224
+ @_builtins.property
1225
+ @pulumi.getter(name="allowedManagedKeys")
1226
+ def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1227
+ """
1228
+ List of managed key registry entry names that the mount in question is allowed to access
1229
+ """
1230
+ return pulumi.get(self, "allowed_managed_keys")
1231
+
1232
+ @_builtins.property
1233
+ @pulumi.getter(name="allowedResponseHeaders")
1234
+ def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1235
+ """
1236
+ List of headers to allow and pass from the request to the plugin
1237
+ """
1238
+ return pulumi.get(self, "allowed_response_headers")
1239
+
1240
+ @_builtins.property
1241
+ @pulumi.getter(name="auditNonHmacRequestKeys")
1242
+ def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1243
+ """
1244
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1245
+ """
1246
+ return pulumi.get(self, "audit_non_hmac_request_keys")
1247
+
1248
+ @_builtins.property
1249
+ @pulumi.getter(name="auditNonHmacResponseKeys")
1250
+ def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1251
+ """
1252
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1253
+ """
1254
+ return pulumi.get(self, "audit_non_hmac_response_keys")
1255
+
1256
+ @_builtins.property
1257
+ @pulumi.getter(name="connectionUri")
1258
+ def connection_uri(self) -> pulumi.Output[_builtins.str]:
1259
+ """
1260
+ Specifies the RabbitMQ connection URI.
1261
+ """
1262
+ return pulumi.get(self, "connection_uri")
1263
+
1264
+ @_builtins.property
1265
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
1266
+ def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1267
+ """
1268
+ Default lease duration for secrets in seconds
1269
+ """
1270
+ return pulumi.get(self, "default_lease_ttl_seconds")
1271
+
1272
+ @_builtins.property
1273
+ @pulumi.getter(name="delegatedAuthAccessors")
1274
+ def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1275
+ """
1276
+ List of headers to allow and pass from the request to the plugin
1277
+ """
1278
+ return pulumi.get(self, "delegated_auth_accessors")
1279
+
1280
+ @_builtins.property
1281
+ @pulumi.getter
1282
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
1283
+ """
1284
+ Human-friendly description of the mount for the backend.
1285
+ """
1286
+ return pulumi.get(self, "description")
1287
+
1288
+ @_builtins.property
1289
+ @pulumi.getter(name="disableRemount")
1290
+ def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
1291
+ """
1292
+ If set, opts out of mount migration on path updates.
1293
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1294
+ """
1295
+ return pulumi.get(self, "disable_remount")
1296
+
1297
+ @_builtins.property
1298
+ @pulumi.getter(name="externalEntropyAccess")
1299
+ def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
1300
+ """
1301
+ Enable the secrets engine to access Vault's external entropy source
1302
+ """
1303
+ return pulumi.get(self, "external_entropy_access")
1304
+
1305
+ @_builtins.property
1306
+ @pulumi.getter(name="forceNoCache")
1307
+ def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
1308
+ """
1309
+ If set to true, disables caching.
1310
+ """
1311
+ return pulumi.get(self, "force_no_cache")
1312
+
1313
+ @_builtins.property
1314
+ @pulumi.getter(name="identityTokenKey")
1315
+ def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
1316
+ """
1317
+ The key to use for signing plugin workload identity tokens
1318
+ """
1319
+ return pulumi.get(self, "identity_token_key")
1320
+
1321
+ @_builtins.property
1322
+ @pulumi.getter(name="listingVisibility")
1323
+ def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
1324
+ """
1325
+ Specifies whether to show this mount in the UI-specific listing endpoint
1326
+ """
1327
+ return pulumi.get(self, "listing_visibility")
1328
+
1329
+ @_builtins.property
1330
+ @pulumi.getter
1331
+ def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
1332
+ """
1333
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1334
+ """
1335
+ return pulumi.get(self, "local")
1336
+
1337
+ @_builtins.property
1338
+ @pulumi.getter(name="maxLeaseTtlSeconds")
1339
+ def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1340
+ """
1341
+ Maximum possible lease duration for secrets in seconds
1342
+ """
1343
+ return pulumi.get(self, "max_lease_ttl_seconds")
1344
+
1345
+ @_builtins.property
1346
+ @pulumi.getter
1347
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
1348
+ """
1349
+ The namespace to provision the resource in.
1350
+ The value should not contain leading or trailing forward slashes.
1351
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1352
+ *Available only for Vault Enterprise*.
1353
+ """
1354
+ return pulumi.get(self, "namespace")
1355
+
1356
+ @_builtins.property
1357
+ @pulumi.getter
1358
+ def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
1359
+ """
1360
+ Specifies mount type specific options that are passed to the backend
1361
+ """
1362
+ return pulumi.get(self, "options")
1363
+
1364
+ @_builtins.property
1365
+ @pulumi.getter(name="passthroughRequestHeaders")
1366
+ def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1367
+ """
1368
+ List of headers to allow and pass from the request to the plugin
1369
+ """
1370
+ return pulumi.get(self, "passthrough_request_headers")
1371
+
1372
+ @_builtins.property
1373
+ @pulumi.getter
1374
+ def password(self) -> pulumi.Output[_builtins.str]:
1375
+ """
1376
+ Specifies the RabbitMQ management administrator password.
1377
+ """
1378
+ return pulumi.get(self, "password")
1379
+
1380
+ @_builtins.property
1381
+ @pulumi.getter(name="passwordPolicy")
1382
+ def password_policy(self) -> pulumi.Output[Optional[_builtins.str]]:
1383
+ """
1384
+ Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set.
1385
+ """
1386
+ return pulumi.get(self, "password_policy")
1387
+
1388
+ @_builtins.property
1389
+ @pulumi.getter
1390
+ def path(self) -> pulumi.Output[Optional[_builtins.str]]:
1391
+ """
1392
+ The unique path this backend should be mounted at. Must
1393
+ not begin or end with a `/`. Defaults to `rabbitmq`.
1394
+ """
1395
+ return pulumi.get(self, "path")
1396
+
1397
+ @_builtins.property
1398
+ @pulumi.getter(name="pluginVersion")
1399
+ def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
1400
+ """
1401
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1402
+ """
1403
+ return pulumi.get(self, "plugin_version")
1404
+
1405
+ @_builtins.property
1406
+ @pulumi.getter(name="sealWrap")
1407
+ def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
1408
+ """
1409
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1410
+ """
1411
+ return pulumi.get(self, "seal_wrap")
1412
+
1413
+ @_builtins.property
1414
+ @pulumi.getter
1415
+ def username(self) -> pulumi.Output[_builtins.str]:
1416
+ """
1417
+ Specifies the RabbitMQ management administrator username.
1418
+ """
1419
+ return pulumi.get(self, "username")
1420
+
1421
+ @_builtins.property
1422
+ @pulumi.getter(name="usernameTemplate")
1423
+ def username_template(self) -> pulumi.Output[Optional[_builtins.str]]:
1424
+ """
1425
+ Template describing how dynamic usernames are generated.
1426
+ """
1427
+ return pulumi.get(self, "username_template")
1428
+
1429
+ @_builtins.property
1430
+ @pulumi.getter(name="verifyConnection")
1431
+ def verify_connection(self) -> pulumi.Output[Optional[_builtins.bool]]:
1432
+ """
1433
+ Specifies whether to verify connection URI, username, and password.
1434
+ Defaults to `true`.
1435
+ """
1436
+ return pulumi.get(self, "verify_connection")
1437
+