pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,1321 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['SecretBackendArgs', 'SecretBackend']
18
+
19
+ @pulumi.input_type
20
+ class SecretBackendArgs:
21
+ def __init__(__self__, *,
22
+ address: Optional[pulumi.Input[_builtins.str]] = None,
23
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
24
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
25
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
28
+ base_path: Optional[pulumi.Input[_builtins.str]] = None,
29
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
30
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
31
+ description: Optional[pulumi.Input[_builtins.str]] = None,
32
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
33
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
34
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
35
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
36
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
37
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
38
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
39
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
40
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
41
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
42
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
43
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
44
+ token: Optional[pulumi.Input[_builtins.str]] = None,
45
+ token_wo: Optional[pulumi.Input[_builtins.str]] = None,
46
+ token_wo_version: Optional[pulumi.Input[_builtins.int]] = None):
47
+ """
48
+ The set of arguments for constructing a SecretBackend resource.
49
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
50
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
51
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
52
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
53
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
54
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
55
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
56
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
57
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
58
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
59
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
60
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
61
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
62
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
63
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
64
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
65
+ The value should not contain leading or trailing forward slashes.
66
+ The `namespace` is always relative to the provider's configured namespace.
67
+ *Available only for Vault Enterprise*.
68
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
69
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
70
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
71
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
72
+ :param pulumi.Input[_builtins.str] token_wo: **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
73
+ :param pulumi.Input[_builtins.int] token_wo_version: Version counter for write-only secret data.
74
+ """
75
+ if address is not None:
76
+ pulumi.set(__self__, "address", address)
77
+ if allowed_managed_keys is not None:
78
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
79
+ if allowed_response_headers is not None:
80
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
81
+ if audit_non_hmac_request_keys is not None:
82
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
83
+ if audit_non_hmac_response_keys is not None:
84
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
85
+ if backend is not None:
86
+ pulumi.set(__self__, "backend", backend)
87
+ if base_path is not None:
88
+ pulumi.set(__self__, "base_path", base_path)
89
+ if default_lease_ttl_seconds is not None:
90
+ pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
91
+ if delegated_auth_accessors is not None:
92
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
93
+ if description is not None:
94
+ pulumi.set(__self__, "description", description)
95
+ if disable_remount is not None:
96
+ pulumi.set(__self__, "disable_remount", disable_remount)
97
+ if external_entropy_access is not None:
98
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
99
+ if force_no_cache is not None:
100
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
101
+ if identity_token_key is not None:
102
+ pulumi.set(__self__, "identity_token_key", identity_token_key)
103
+ if listing_visibility is not None:
104
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
105
+ if local is not None:
106
+ pulumi.set(__self__, "local", local)
107
+ if max_lease_ttl_seconds is not None:
108
+ pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
109
+ if namespace is not None:
110
+ pulumi.set(__self__, "namespace", namespace)
111
+ if options is not None:
112
+ pulumi.set(__self__, "options", options)
113
+ if passthrough_request_headers is not None:
114
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
115
+ if plugin_version is not None:
116
+ pulumi.set(__self__, "plugin_version", plugin_version)
117
+ if seal_wrap is not None:
118
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
119
+ if token is not None:
120
+ pulumi.set(__self__, "token", token)
121
+ if token_wo is not None:
122
+ pulumi.set(__self__, "token_wo", token_wo)
123
+ if token_wo_version is not None:
124
+ pulumi.set(__self__, "token_wo_version", token_wo_version)
125
+
126
+ @_builtins.property
127
+ @pulumi.getter
128
+ def address(self) -> Optional[pulumi.Input[_builtins.str]]:
129
+ return pulumi.get(self, "address")
130
+
131
+ @address.setter
132
+ def address(self, value: Optional[pulumi.Input[_builtins.str]]):
133
+ pulumi.set(self, "address", value)
134
+
135
+ @_builtins.property
136
+ @pulumi.getter(name="allowedManagedKeys")
137
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
138
+ """
139
+ List of managed key registry entry names that the mount in question is allowed to access
140
+ """
141
+ return pulumi.get(self, "allowed_managed_keys")
142
+
143
+ @allowed_managed_keys.setter
144
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
145
+ pulumi.set(self, "allowed_managed_keys", value)
146
+
147
+ @_builtins.property
148
+ @pulumi.getter(name="allowedResponseHeaders")
149
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
150
+ """
151
+ List of headers to allow and pass from the request to the plugin
152
+ """
153
+ return pulumi.get(self, "allowed_response_headers")
154
+
155
+ @allowed_response_headers.setter
156
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
157
+ pulumi.set(self, "allowed_response_headers", value)
158
+
159
+ @_builtins.property
160
+ @pulumi.getter(name="auditNonHmacRequestKeys")
161
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
162
+ """
163
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
164
+ """
165
+ return pulumi.get(self, "audit_non_hmac_request_keys")
166
+
167
+ @audit_non_hmac_request_keys.setter
168
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
169
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
170
+
171
+ @_builtins.property
172
+ @pulumi.getter(name="auditNonHmacResponseKeys")
173
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
174
+ """
175
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
176
+ """
177
+ return pulumi.get(self, "audit_non_hmac_response_keys")
178
+
179
+ @audit_non_hmac_response_keys.setter
180
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
181
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
182
+
183
+ @_builtins.property
184
+ @pulumi.getter
185
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
186
+ return pulumi.get(self, "backend")
187
+
188
+ @backend.setter
189
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
190
+ pulumi.set(self, "backend", value)
191
+
192
+ @_builtins.property
193
+ @pulumi.getter(name="basePath")
194
+ def base_path(self) -> Optional[pulumi.Input[_builtins.str]]:
195
+ return pulumi.get(self, "base_path")
196
+
197
+ @base_path.setter
198
+ def base_path(self, value: Optional[pulumi.Input[_builtins.str]]):
199
+ pulumi.set(self, "base_path", value)
200
+
201
+ @_builtins.property
202
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
203
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
204
+ """
205
+ Default lease duration for secrets in seconds
206
+ """
207
+ return pulumi.get(self, "default_lease_ttl_seconds")
208
+
209
+ @default_lease_ttl_seconds.setter
210
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
211
+ pulumi.set(self, "default_lease_ttl_seconds", value)
212
+
213
+ @_builtins.property
214
+ @pulumi.getter(name="delegatedAuthAccessors")
215
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
216
+ """
217
+ List of headers to allow and pass from the request to the plugin
218
+ """
219
+ return pulumi.get(self, "delegated_auth_accessors")
220
+
221
+ @delegated_auth_accessors.setter
222
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
223
+ pulumi.set(self, "delegated_auth_accessors", value)
224
+
225
+ @_builtins.property
226
+ @pulumi.getter
227
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
228
+ """
229
+ Human-friendly description of the mount for the backend.
230
+ """
231
+ return pulumi.get(self, "description")
232
+
233
+ @description.setter
234
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
235
+ pulumi.set(self, "description", value)
236
+
237
+ @_builtins.property
238
+ @pulumi.getter(name="disableRemount")
239
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
240
+ """
241
+ If set, opts out of mount migration on path updates.
242
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
243
+ """
244
+ return pulumi.get(self, "disable_remount")
245
+
246
+ @disable_remount.setter
247
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
248
+ pulumi.set(self, "disable_remount", value)
249
+
250
+ @_builtins.property
251
+ @pulumi.getter(name="externalEntropyAccess")
252
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
253
+ """
254
+ Enable the secrets engine to access Vault's external entropy source
255
+ """
256
+ return pulumi.get(self, "external_entropy_access")
257
+
258
+ @external_entropy_access.setter
259
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
260
+ pulumi.set(self, "external_entropy_access", value)
261
+
262
+ @_builtins.property
263
+ @pulumi.getter(name="forceNoCache")
264
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
265
+ """
266
+ If set to true, disables caching.
267
+ """
268
+ return pulumi.get(self, "force_no_cache")
269
+
270
+ @force_no_cache.setter
271
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
272
+ pulumi.set(self, "force_no_cache", value)
273
+
274
+ @_builtins.property
275
+ @pulumi.getter(name="identityTokenKey")
276
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
277
+ """
278
+ The key to use for signing plugin workload identity tokens
279
+ """
280
+ return pulumi.get(self, "identity_token_key")
281
+
282
+ @identity_token_key.setter
283
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
284
+ pulumi.set(self, "identity_token_key", value)
285
+
286
+ @_builtins.property
287
+ @pulumi.getter(name="listingVisibility")
288
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
289
+ """
290
+ Specifies whether to show this mount in the UI-specific listing endpoint
291
+ """
292
+ return pulumi.get(self, "listing_visibility")
293
+
294
+ @listing_visibility.setter
295
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
296
+ pulumi.set(self, "listing_visibility", value)
297
+
298
+ @_builtins.property
299
+ @pulumi.getter
300
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
301
+ """
302
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
303
+ """
304
+ return pulumi.get(self, "local")
305
+
306
+ @local.setter
307
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
308
+ pulumi.set(self, "local", value)
309
+
310
+ @_builtins.property
311
+ @pulumi.getter(name="maxLeaseTtlSeconds")
312
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
313
+ """
314
+ Maximum possible lease duration for secrets in seconds
315
+ """
316
+ return pulumi.get(self, "max_lease_ttl_seconds")
317
+
318
+ @max_lease_ttl_seconds.setter
319
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
320
+ pulumi.set(self, "max_lease_ttl_seconds", value)
321
+
322
+ @_builtins.property
323
+ @pulumi.getter
324
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
325
+ """
326
+ The namespace to provision the resource in.
327
+ The value should not contain leading or trailing forward slashes.
328
+ The `namespace` is always relative to the provider's configured namespace.
329
+ *Available only for Vault Enterprise*.
330
+ """
331
+ return pulumi.get(self, "namespace")
332
+
333
+ @namespace.setter
334
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
335
+ pulumi.set(self, "namespace", value)
336
+
337
+ @_builtins.property
338
+ @pulumi.getter
339
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
340
+ """
341
+ Specifies mount type specific options that are passed to the backend
342
+ """
343
+ return pulumi.get(self, "options")
344
+
345
+ @options.setter
346
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
347
+ pulumi.set(self, "options", value)
348
+
349
+ @_builtins.property
350
+ @pulumi.getter(name="passthroughRequestHeaders")
351
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
352
+ """
353
+ List of headers to allow and pass from the request to the plugin
354
+ """
355
+ return pulumi.get(self, "passthrough_request_headers")
356
+
357
+ @passthrough_request_headers.setter
358
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
359
+ pulumi.set(self, "passthrough_request_headers", value)
360
+
361
+ @_builtins.property
362
+ @pulumi.getter(name="pluginVersion")
363
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
364
+ """
365
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
366
+ """
367
+ return pulumi.get(self, "plugin_version")
368
+
369
+ @plugin_version.setter
370
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
371
+ pulumi.set(self, "plugin_version", value)
372
+
373
+ @_builtins.property
374
+ @pulumi.getter(name="sealWrap")
375
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
376
+ """
377
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
378
+ """
379
+ return pulumi.get(self, "seal_wrap")
380
+
381
+ @seal_wrap.setter
382
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
383
+ pulumi.set(self, "seal_wrap", value)
384
+
385
+ @_builtins.property
386
+ @pulumi.getter
387
+ def token(self) -> Optional[pulumi.Input[_builtins.str]]:
388
+ return pulumi.get(self, "token")
389
+
390
+ @token.setter
391
+ def token(self, value: Optional[pulumi.Input[_builtins.str]]):
392
+ pulumi.set(self, "token", value)
393
+
394
+ @_builtins.property
395
+ @pulumi.getter(name="tokenWo")
396
+ def token_wo(self) -> Optional[pulumi.Input[_builtins.str]]:
397
+ """
398
+ **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
399
+ """
400
+ return pulumi.get(self, "token_wo")
401
+
402
+ @token_wo.setter
403
+ def token_wo(self, value: Optional[pulumi.Input[_builtins.str]]):
404
+ pulumi.set(self, "token_wo", value)
405
+
406
+ @_builtins.property
407
+ @pulumi.getter(name="tokenWoVersion")
408
+ def token_wo_version(self) -> Optional[pulumi.Input[_builtins.int]]:
409
+ """
410
+ Version counter for write-only secret data.
411
+ """
412
+ return pulumi.get(self, "token_wo_version")
413
+
414
+ @token_wo_version.setter
415
+ def token_wo_version(self, value: Optional[pulumi.Input[_builtins.int]]):
416
+ pulumi.set(self, "token_wo_version", value)
417
+
418
+
419
+ @pulumi.input_type
420
+ class _SecretBackendState:
421
+ def __init__(__self__, *,
422
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
423
+ address: Optional[pulumi.Input[_builtins.str]] = None,
424
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
425
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
426
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
427
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
428
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
429
+ base_path: Optional[pulumi.Input[_builtins.str]] = None,
430
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
431
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
432
+ description: Optional[pulumi.Input[_builtins.str]] = None,
433
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
434
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
435
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
436
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
437
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
438
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
439
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
440
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
441
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
442
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
443
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
444
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
445
+ token: Optional[pulumi.Input[_builtins.str]] = None,
446
+ token_wo: Optional[pulumi.Input[_builtins.str]] = None,
447
+ token_wo_version: Optional[pulumi.Input[_builtins.int]] = None):
448
+ """
449
+ Input properties used for looking up and filtering SecretBackend resources.
450
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
451
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
452
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
453
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
454
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
455
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
456
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
457
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
458
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
459
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
460
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
461
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
462
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
463
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
464
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
465
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
466
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
467
+ The value should not contain leading or trailing forward slashes.
468
+ The `namespace` is always relative to the provider's configured namespace.
469
+ *Available only for Vault Enterprise*.
470
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
471
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
472
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
473
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
474
+ :param pulumi.Input[_builtins.str] token_wo: **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
475
+ :param pulumi.Input[_builtins.int] token_wo_version: Version counter for write-only secret data.
476
+ """
477
+ if accessor is not None:
478
+ pulumi.set(__self__, "accessor", accessor)
479
+ if address is not None:
480
+ pulumi.set(__self__, "address", address)
481
+ if allowed_managed_keys is not None:
482
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
483
+ if allowed_response_headers is not None:
484
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
485
+ if audit_non_hmac_request_keys is not None:
486
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
487
+ if audit_non_hmac_response_keys is not None:
488
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
489
+ if backend is not None:
490
+ pulumi.set(__self__, "backend", backend)
491
+ if base_path is not None:
492
+ pulumi.set(__self__, "base_path", base_path)
493
+ if default_lease_ttl_seconds is not None:
494
+ pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
495
+ if delegated_auth_accessors is not None:
496
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
497
+ if description is not None:
498
+ pulumi.set(__self__, "description", description)
499
+ if disable_remount is not None:
500
+ pulumi.set(__self__, "disable_remount", disable_remount)
501
+ if external_entropy_access is not None:
502
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
503
+ if force_no_cache is not None:
504
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
505
+ if identity_token_key is not None:
506
+ pulumi.set(__self__, "identity_token_key", identity_token_key)
507
+ if listing_visibility is not None:
508
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
509
+ if local is not None:
510
+ pulumi.set(__self__, "local", local)
511
+ if max_lease_ttl_seconds is not None:
512
+ pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
513
+ if namespace is not None:
514
+ pulumi.set(__self__, "namespace", namespace)
515
+ if options is not None:
516
+ pulumi.set(__self__, "options", options)
517
+ if passthrough_request_headers is not None:
518
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
519
+ if plugin_version is not None:
520
+ pulumi.set(__self__, "plugin_version", plugin_version)
521
+ if seal_wrap is not None:
522
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
523
+ if token is not None:
524
+ pulumi.set(__self__, "token", token)
525
+ if token_wo is not None:
526
+ pulumi.set(__self__, "token_wo", token_wo)
527
+ if token_wo_version is not None:
528
+ pulumi.set(__self__, "token_wo_version", token_wo_version)
529
+
530
+ @_builtins.property
531
+ @pulumi.getter
532
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
533
+ """
534
+ Accessor of the mount
535
+ """
536
+ return pulumi.get(self, "accessor")
537
+
538
+ @accessor.setter
539
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
540
+ pulumi.set(self, "accessor", value)
541
+
542
+ @_builtins.property
543
+ @pulumi.getter
544
+ def address(self) -> Optional[pulumi.Input[_builtins.str]]:
545
+ return pulumi.get(self, "address")
546
+
547
+ @address.setter
548
+ def address(self, value: Optional[pulumi.Input[_builtins.str]]):
549
+ pulumi.set(self, "address", value)
550
+
551
+ @_builtins.property
552
+ @pulumi.getter(name="allowedManagedKeys")
553
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
554
+ """
555
+ List of managed key registry entry names that the mount in question is allowed to access
556
+ """
557
+ return pulumi.get(self, "allowed_managed_keys")
558
+
559
+ @allowed_managed_keys.setter
560
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
561
+ pulumi.set(self, "allowed_managed_keys", value)
562
+
563
+ @_builtins.property
564
+ @pulumi.getter(name="allowedResponseHeaders")
565
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
566
+ """
567
+ List of headers to allow and pass from the request to the plugin
568
+ """
569
+ return pulumi.get(self, "allowed_response_headers")
570
+
571
+ @allowed_response_headers.setter
572
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
573
+ pulumi.set(self, "allowed_response_headers", value)
574
+
575
+ @_builtins.property
576
+ @pulumi.getter(name="auditNonHmacRequestKeys")
577
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
578
+ """
579
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
580
+ """
581
+ return pulumi.get(self, "audit_non_hmac_request_keys")
582
+
583
+ @audit_non_hmac_request_keys.setter
584
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
585
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
586
+
587
+ @_builtins.property
588
+ @pulumi.getter(name="auditNonHmacResponseKeys")
589
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
590
+ """
591
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
592
+ """
593
+ return pulumi.get(self, "audit_non_hmac_response_keys")
594
+
595
+ @audit_non_hmac_response_keys.setter
596
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
597
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
598
+
599
+ @_builtins.property
600
+ @pulumi.getter
601
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
602
+ return pulumi.get(self, "backend")
603
+
604
+ @backend.setter
605
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
606
+ pulumi.set(self, "backend", value)
607
+
608
+ @_builtins.property
609
+ @pulumi.getter(name="basePath")
610
+ def base_path(self) -> Optional[pulumi.Input[_builtins.str]]:
611
+ return pulumi.get(self, "base_path")
612
+
613
+ @base_path.setter
614
+ def base_path(self, value: Optional[pulumi.Input[_builtins.str]]):
615
+ pulumi.set(self, "base_path", value)
616
+
617
+ @_builtins.property
618
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
619
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
620
+ """
621
+ Default lease duration for secrets in seconds
622
+ """
623
+ return pulumi.get(self, "default_lease_ttl_seconds")
624
+
625
+ @default_lease_ttl_seconds.setter
626
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
627
+ pulumi.set(self, "default_lease_ttl_seconds", value)
628
+
629
+ @_builtins.property
630
+ @pulumi.getter(name="delegatedAuthAccessors")
631
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
632
+ """
633
+ List of headers to allow and pass from the request to the plugin
634
+ """
635
+ return pulumi.get(self, "delegated_auth_accessors")
636
+
637
+ @delegated_auth_accessors.setter
638
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
639
+ pulumi.set(self, "delegated_auth_accessors", value)
640
+
641
+ @_builtins.property
642
+ @pulumi.getter
643
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
644
+ """
645
+ Human-friendly description of the mount for the backend.
646
+ """
647
+ return pulumi.get(self, "description")
648
+
649
+ @description.setter
650
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
651
+ pulumi.set(self, "description", value)
652
+
653
+ @_builtins.property
654
+ @pulumi.getter(name="disableRemount")
655
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
656
+ """
657
+ If set, opts out of mount migration on path updates.
658
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
659
+ """
660
+ return pulumi.get(self, "disable_remount")
661
+
662
+ @disable_remount.setter
663
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
664
+ pulumi.set(self, "disable_remount", value)
665
+
666
+ @_builtins.property
667
+ @pulumi.getter(name="externalEntropyAccess")
668
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
669
+ """
670
+ Enable the secrets engine to access Vault's external entropy source
671
+ """
672
+ return pulumi.get(self, "external_entropy_access")
673
+
674
+ @external_entropy_access.setter
675
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
676
+ pulumi.set(self, "external_entropy_access", value)
677
+
678
+ @_builtins.property
679
+ @pulumi.getter(name="forceNoCache")
680
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
681
+ """
682
+ If set to true, disables caching.
683
+ """
684
+ return pulumi.get(self, "force_no_cache")
685
+
686
+ @force_no_cache.setter
687
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
688
+ pulumi.set(self, "force_no_cache", value)
689
+
690
+ @_builtins.property
691
+ @pulumi.getter(name="identityTokenKey")
692
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
693
+ """
694
+ The key to use for signing plugin workload identity tokens
695
+ """
696
+ return pulumi.get(self, "identity_token_key")
697
+
698
+ @identity_token_key.setter
699
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
700
+ pulumi.set(self, "identity_token_key", value)
701
+
702
+ @_builtins.property
703
+ @pulumi.getter(name="listingVisibility")
704
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
705
+ """
706
+ Specifies whether to show this mount in the UI-specific listing endpoint
707
+ """
708
+ return pulumi.get(self, "listing_visibility")
709
+
710
+ @listing_visibility.setter
711
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
712
+ pulumi.set(self, "listing_visibility", value)
713
+
714
+ @_builtins.property
715
+ @pulumi.getter
716
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
717
+ """
718
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
719
+ """
720
+ return pulumi.get(self, "local")
721
+
722
+ @local.setter
723
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
724
+ pulumi.set(self, "local", value)
725
+
726
+ @_builtins.property
727
+ @pulumi.getter(name="maxLeaseTtlSeconds")
728
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
729
+ """
730
+ Maximum possible lease duration for secrets in seconds
731
+ """
732
+ return pulumi.get(self, "max_lease_ttl_seconds")
733
+
734
+ @max_lease_ttl_seconds.setter
735
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
736
+ pulumi.set(self, "max_lease_ttl_seconds", value)
737
+
738
+ @_builtins.property
739
+ @pulumi.getter
740
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
741
+ """
742
+ The namespace to provision the resource in.
743
+ The value should not contain leading or trailing forward slashes.
744
+ The `namespace` is always relative to the provider's configured namespace.
745
+ *Available only for Vault Enterprise*.
746
+ """
747
+ return pulumi.get(self, "namespace")
748
+
749
+ @namespace.setter
750
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
751
+ pulumi.set(self, "namespace", value)
752
+
753
+ @_builtins.property
754
+ @pulumi.getter
755
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
756
+ """
757
+ Specifies mount type specific options that are passed to the backend
758
+ """
759
+ return pulumi.get(self, "options")
760
+
761
+ @options.setter
762
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
763
+ pulumi.set(self, "options", value)
764
+
765
+ @_builtins.property
766
+ @pulumi.getter(name="passthroughRequestHeaders")
767
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
768
+ """
769
+ List of headers to allow and pass from the request to the plugin
770
+ """
771
+ return pulumi.get(self, "passthrough_request_headers")
772
+
773
+ @passthrough_request_headers.setter
774
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
775
+ pulumi.set(self, "passthrough_request_headers", value)
776
+
777
+ @_builtins.property
778
+ @pulumi.getter(name="pluginVersion")
779
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
780
+ """
781
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
782
+ """
783
+ return pulumi.get(self, "plugin_version")
784
+
785
+ @plugin_version.setter
786
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
787
+ pulumi.set(self, "plugin_version", value)
788
+
789
+ @_builtins.property
790
+ @pulumi.getter(name="sealWrap")
791
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
792
+ """
793
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
794
+ """
795
+ return pulumi.get(self, "seal_wrap")
796
+
797
+ @seal_wrap.setter
798
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
799
+ pulumi.set(self, "seal_wrap", value)
800
+
801
+ @_builtins.property
802
+ @pulumi.getter
803
+ def token(self) -> Optional[pulumi.Input[_builtins.str]]:
804
+ return pulumi.get(self, "token")
805
+
806
+ @token.setter
807
+ def token(self, value: Optional[pulumi.Input[_builtins.str]]):
808
+ pulumi.set(self, "token", value)
809
+
810
+ @_builtins.property
811
+ @pulumi.getter(name="tokenWo")
812
+ def token_wo(self) -> Optional[pulumi.Input[_builtins.str]]:
813
+ """
814
+ **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
815
+ """
816
+ return pulumi.get(self, "token_wo")
817
+
818
+ @token_wo.setter
819
+ def token_wo(self, value: Optional[pulumi.Input[_builtins.str]]):
820
+ pulumi.set(self, "token_wo", value)
821
+
822
+ @_builtins.property
823
+ @pulumi.getter(name="tokenWoVersion")
824
+ def token_wo_version(self) -> Optional[pulumi.Input[_builtins.int]]:
825
+ """
826
+ Version counter for write-only secret data.
827
+ """
828
+ return pulumi.get(self, "token_wo_version")
829
+
830
+ @token_wo_version.setter
831
+ def token_wo_version(self, value: Optional[pulumi.Input[_builtins.int]]):
832
+ pulumi.set(self, "token_wo_version", value)
833
+
834
+
835
+ @pulumi.type_token("vault:terraformcloud/secretBackend:SecretBackend")
836
+ class SecretBackend(pulumi.CustomResource):
837
+ @overload
838
+ def __init__(__self__,
839
+ resource_name: str,
840
+ opts: Optional[pulumi.ResourceOptions] = None,
841
+ address: Optional[pulumi.Input[_builtins.str]] = None,
842
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
843
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
844
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
845
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
846
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
847
+ base_path: Optional[pulumi.Input[_builtins.str]] = None,
848
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
849
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
850
+ description: Optional[pulumi.Input[_builtins.str]] = None,
851
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
852
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
853
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
854
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
855
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
856
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
857
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
858
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
859
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
860
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
861
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
862
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
863
+ token: Optional[pulumi.Input[_builtins.str]] = None,
864
+ token_wo: Optional[pulumi.Input[_builtins.str]] = None,
865
+ token_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
866
+ __props__=None):
867
+ """
868
+ ## Example Usage
869
+
870
+ ```python
871
+ import pulumi
872
+ import pulumi_vault as vault
873
+
874
+ test = vault.terraformcloud.SecretBackend("test",
875
+ backend="terraform",
876
+ description="Manages the Terraform Cloud backend",
877
+ token="V0idfhi2iksSDU234ucdbi2nidsi...")
878
+ ```
879
+
880
+ ## Import
881
+
882
+ Terraform Cloud secret backends can be imported using the `backend`, e.g.
883
+
884
+ ```sh
885
+ $ pulumi import vault:terraformcloud/secretBackend:SecretBackend example terraform
886
+ ```
887
+
888
+ :param str resource_name: The name of the resource.
889
+ :param pulumi.ResourceOptions opts: Options for the resource.
890
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
891
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
892
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
893
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
894
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
895
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
896
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
897
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
898
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
899
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
900
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
901
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
902
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
903
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
904
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
905
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
906
+ The value should not contain leading or trailing forward slashes.
907
+ The `namespace` is always relative to the provider's configured namespace.
908
+ *Available only for Vault Enterprise*.
909
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
910
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
911
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
912
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
913
+ :param pulumi.Input[_builtins.str] token_wo: **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
914
+ :param pulumi.Input[_builtins.int] token_wo_version: Version counter for write-only secret data.
915
+ """
916
+ ...
917
+ @overload
918
+ def __init__(__self__,
919
+ resource_name: str,
920
+ args: Optional[SecretBackendArgs] = None,
921
+ opts: Optional[pulumi.ResourceOptions] = None):
922
+ """
923
+ ## Example Usage
924
+
925
+ ```python
926
+ import pulumi
927
+ import pulumi_vault as vault
928
+
929
+ test = vault.terraformcloud.SecretBackend("test",
930
+ backend="terraform",
931
+ description="Manages the Terraform Cloud backend",
932
+ token="V0idfhi2iksSDU234ucdbi2nidsi...")
933
+ ```
934
+
935
+ ## Import
936
+
937
+ Terraform Cloud secret backends can be imported using the `backend`, e.g.
938
+
939
+ ```sh
940
+ $ pulumi import vault:terraformcloud/secretBackend:SecretBackend example terraform
941
+ ```
942
+
943
+ :param str resource_name: The name of the resource.
944
+ :param SecretBackendArgs args: The arguments to use to populate this resource's properties.
945
+ :param pulumi.ResourceOptions opts: Options for the resource.
946
+ """
947
+ ...
948
+ def __init__(__self__, resource_name: str, *args, **kwargs):
949
+ resource_args, opts = _utilities.get_resource_args_opts(SecretBackendArgs, pulumi.ResourceOptions, *args, **kwargs)
950
+ if resource_args is not None:
951
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
952
+ else:
953
+ __self__._internal_init(resource_name, *args, **kwargs)
954
+
955
+ def _internal_init(__self__,
956
+ resource_name: str,
957
+ opts: Optional[pulumi.ResourceOptions] = None,
958
+ address: Optional[pulumi.Input[_builtins.str]] = None,
959
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
960
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
961
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
962
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
963
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
964
+ base_path: Optional[pulumi.Input[_builtins.str]] = None,
965
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
966
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
967
+ description: Optional[pulumi.Input[_builtins.str]] = None,
968
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
969
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
970
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
971
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
972
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
973
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
974
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
975
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
976
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
977
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
978
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
979
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
980
+ token: Optional[pulumi.Input[_builtins.str]] = None,
981
+ token_wo: Optional[pulumi.Input[_builtins.str]] = None,
982
+ token_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
983
+ __props__=None):
984
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
985
+ if not isinstance(opts, pulumi.ResourceOptions):
986
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
987
+ if opts.id is None:
988
+ if __props__ is not None:
989
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
990
+ __props__ = SecretBackendArgs.__new__(SecretBackendArgs)
991
+
992
+ __props__.__dict__["address"] = address
993
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
994
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
995
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
996
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
997
+ __props__.__dict__["backend"] = backend
998
+ __props__.__dict__["base_path"] = base_path
999
+ __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1000
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
1001
+ __props__.__dict__["description"] = description
1002
+ __props__.__dict__["disable_remount"] = disable_remount
1003
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1004
+ __props__.__dict__["force_no_cache"] = force_no_cache
1005
+ __props__.__dict__["identity_token_key"] = identity_token_key
1006
+ __props__.__dict__["listing_visibility"] = listing_visibility
1007
+ __props__.__dict__["local"] = local
1008
+ __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
1009
+ __props__.__dict__["namespace"] = namespace
1010
+ __props__.__dict__["options"] = options
1011
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
1012
+ __props__.__dict__["plugin_version"] = plugin_version
1013
+ __props__.__dict__["seal_wrap"] = seal_wrap
1014
+ __props__.__dict__["token"] = None if token is None else pulumi.Output.secret(token)
1015
+ __props__.__dict__["token_wo"] = None if token_wo is None else pulumi.Output.secret(token_wo)
1016
+ __props__.__dict__["token_wo_version"] = token_wo_version
1017
+ __props__.__dict__["accessor"] = None
1018
+ secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["token", "tokenWo"])
1019
+ opts = pulumi.ResourceOptions.merge(opts, secret_opts)
1020
+ super(SecretBackend, __self__).__init__(
1021
+ 'vault:terraformcloud/secretBackend:SecretBackend',
1022
+ resource_name,
1023
+ __props__,
1024
+ opts)
1025
+
1026
+ @staticmethod
1027
+ def get(resource_name: str,
1028
+ id: pulumi.Input[str],
1029
+ opts: Optional[pulumi.ResourceOptions] = None,
1030
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
1031
+ address: Optional[pulumi.Input[_builtins.str]] = None,
1032
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1033
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1034
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1035
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1036
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
1037
+ base_path: Optional[pulumi.Input[_builtins.str]] = None,
1038
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1039
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1040
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1041
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1042
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1043
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1044
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1045
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1046
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1047
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1048
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1049
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1050
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1051
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1052
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1053
+ token: Optional[pulumi.Input[_builtins.str]] = None,
1054
+ token_wo: Optional[pulumi.Input[_builtins.str]] = None,
1055
+ token_wo_version: Optional[pulumi.Input[_builtins.int]] = None) -> 'SecretBackend':
1056
+ """
1057
+ Get an existing SecretBackend resource's state with the given name, id, and optional extra
1058
+ properties used to qualify the lookup.
1059
+
1060
+ :param str resource_name: The unique name of the resulting resource.
1061
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
1062
+ :param pulumi.ResourceOptions opts: Options for the resource.
1063
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
1064
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1065
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1066
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1067
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1068
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
1069
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1070
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
1071
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1072
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1073
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1074
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1075
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1076
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1077
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1078
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
1079
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
1080
+ The value should not contain leading or trailing forward slashes.
1081
+ The `namespace` is always relative to the provider's configured namespace.
1082
+ *Available only for Vault Enterprise*.
1083
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1084
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1085
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1086
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1087
+ :param pulumi.Input[_builtins.str] token_wo: **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
1088
+ :param pulumi.Input[_builtins.int] token_wo_version: Version counter for write-only secret data.
1089
+ """
1090
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
1091
+
1092
+ __props__ = _SecretBackendState.__new__(_SecretBackendState)
1093
+
1094
+ __props__.__dict__["accessor"] = accessor
1095
+ __props__.__dict__["address"] = address
1096
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1097
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1098
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1099
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
1100
+ __props__.__dict__["backend"] = backend
1101
+ __props__.__dict__["base_path"] = base_path
1102
+ __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1103
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
1104
+ __props__.__dict__["description"] = description
1105
+ __props__.__dict__["disable_remount"] = disable_remount
1106
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1107
+ __props__.__dict__["force_no_cache"] = force_no_cache
1108
+ __props__.__dict__["identity_token_key"] = identity_token_key
1109
+ __props__.__dict__["listing_visibility"] = listing_visibility
1110
+ __props__.__dict__["local"] = local
1111
+ __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
1112
+ __props__.__dict__["namespace"] = namespace
1113
+ __props__.__dict__["options"] = options
1114
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
1115
+ __props__.__dict__["plugin_version"] = plugin_version
1116
+ __props__.__dict__["seal_wrap"] = seal_wrap
1117
+ __props__.__dict__["token"] = token
1118
+ __props__.__dict__["token_wo"] = token_wo
1119
+ __props__.__dict__["token_wo_version"] = token_wo_version
1120
+ return SecretBackend(resource_name, opts=opts, __props__=__props__)
1121
+
1122
+ @_builtins.property
1123
+ @pulumi.getter
1124
+ def accessor(self) -> pulumi.Output[_builtins.str]:
1125
+ """
1126
+ Accessor of the mount
1127
+ """
1128
+ return pulumi.get(self, "accessor")
1129
+
1130
+ @_builtins.property
1131
+ @pulumi.getter
1132
+ def address(self) -> pulumi.Output[Optional[_builtins.str]]:
1133
+ return pulumi.get(self, "address")
1134
+
1135
+ @_builtins.property
1136
+ @pulumi.getter(name="allowedManagedKeys")
1137
+ def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1138
+ """
1139
+ List of managed key registry entry names that the mount in question is allowed to access
1140
+ """
1141
+ return pulumi.get(self, "allowed_managed_keys")
1142
+
1143
+ @_builtins.property
1144
+ @pulumi.getter(name="allowedResponseHeaders")
1145
+ def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1146
+ """
1147
+ List of headers to allow and pass from the request to the plugin
1148
+ """
1149
+ return pulumi.get(self, "allowed_response_headers")
1150
+
1151
+ @_builtins.property
1152
+ @pulumi.getter(name="auditNonHmacRequestKeys")
1153
+ def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1154
+ """
1155
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1156
+ """
1157
+ return pulumi.get(self, "audit_non_hmac_request_keys")
1158
+
1159
+ @_builtins.property
1160
+ @pulumi.getter(name="auditNonHmacResponseKeys")
1161
+ def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1162
+ """
1163
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1164
+ """
1165
+ return pulumi.get(self, "audit_non_hmac_response_keys")
1166
+
1167
+ @_builtins.property
1168
+ @pulumi.getter
1169
+ def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
1170
+ return pulumi.get(self, "backend")
1171
+
1172
+ @_builtins.property
1173
+ @pulumi.getter(name="basePath")
1174
+ def base_path(self) -> pulumi.Output[Optional[_builtins.str]]:
1175
+ return pulumi.get(self, "base_path")
1176
+
1177
+ @_builtins.property
1178
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
1179
+ def default_lease_ttl_seconds(self) -> pulumi.Output[Optional[_builtins.int]]:
1180
+ """
1181
+ Default lease duration for secrets in seconds
1182
+ """
1183
+ return pulumi.get(self, "default_lease_ttl_seconds")
1184
+
1185
+ @_builtins.property
1186
+ @pulumi.getter(name="delegatedAuthAccessors")
1187
+ def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1188
+ """
1189
+ List of headers to allow and pass from the request to the plugin
1190
+ """
1191
+ return pulumi.get(self, "delegated_auth_accessors")
1192
+
1193
+ @_builtins.property
1194
+ @pulumi.getter
1195
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
1196
+ """
1197
+ Human-friendly description of the mount for the backend.
1198
+ """
1199
+ return pulumi.get(self, "description")
1200
+
1201
+ @_builtins.property
1202
+ @pulumi.getter(name="disableRemount")
1203
+ def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
1204
+ """
1205
+ If set, opts out of mount migration on path updates.
1206
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1207
+ """
1208
+ return pulumi.get(self, "disable_remount")
1209
+
1210
+ @_builtins.property
1211
+ @pulumi.getter(name="externalEntropyAccess")
1212
+ def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
1213
+ """
1214
+ Enable the secrets engine to access Vault's external entropy source
1215
+ """
1216
+ return pulumi.get(self, "external_entropy_access")
1217
+
1218
+ @_builtins.property
1219
+ @pulumi.getter(name="forceNoCache")
1220
+ def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
1221
+ """
1222
+ If set to true, disables caching.
1223
+ """
1224
+ return pulumi.get(self, "force_no_cache")
1225
+
1226
+ @_builtins.property
1227
+ @pulumi.getter(name="identityTokenKey")
1228
+ def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
1229
+ """
1230
+ The key to use for signing plugin workload identity tokens
1231
+ """
1232
+ return pulumi.get(self, "identity_token_key")
1233
+
1234
+ @_builtins.property
1235
+ @pulumi.getter(name="listingVisibility")
1236
+ def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
1237
+ """
1238
+ Specifies whether to show this mount in the UI-specific listing endpoint
1239
+ """
1240
+ return pulumi.get(self, "listing_visibility")
1241
+
1242
+ @_builtins.property
1243
+ @pulumi.getter
1244
+ def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
1245
+ """
1246
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1247
+ """
1248
+ return pulumi.get(self, "local")
1249
+
1250
+ @_builtins.property
1251
+ @pulumi.getter(name="maxLeaseTtlSeconds")
1252
+ def max_lease_ttl_seconds(self) -> pulumi.Output[Optional[_builtins.int]]:
1253
+ """
1254
+ Maximum possible lease duration for secrets in seconds
1255
+ """
1256
+ return pulumi.get(self, "max_lease_ttl_seconds")
1257
+
1258
+ @_builtins.property
1259
+ @pulumi.getter
1260
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
1261
+ """
1262
+ The namespace to provision the resource in.
1263
+ The value should not contain leading or trailing forward slashes.
1264
+ The `namespace` is always relative to the provider's configured namespace.
1265
+ *Available only for Vault Enterprise*.
1266
+ """
1267
+ return pulumi.get(self, "namespace")
1268
+
1269
+ @_builtins.property
1270
+ @pulumi.getter
1271
+ def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
1272
+ """
1273
+ Specifies mount type specific options that are passed to the backend
1274
+ """
1275
+ return pulumi.get(self, "options")
1276
+
1277
+ @_builtins.property
1278
+ @pulumi.getter(name="passthroughRequestHeaders")
1279
+ def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1280
+ """
1281
+ List of headers to allow and pass from the request to the plugin
1282
+ """
1283
+ return pulumi.get(self, "passthrough_request_headers")
1284
+
1285
+ @_builtins.property
1286
+ @pulumi.getter(name="pluginVersion")
1287
+ def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
1288
+ """
1289
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1290
+ """
1291
+ return pulumi.get(self, "plugin_version")
1292
+
1293
+ @_builtins.property
1294
+ @pulumi.getter(name="sealWrap")
1295
+ def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
1296
+ """
1297
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1298
+ """
1299
+ return pulumi.get(self, "seal_wrap")
1300
+
1301
+ @_builtins.property
1302
+ @pulumi.getter
1303
+ def token(self) -> pulumi.Output[Optional[_builtins.str]]:
1304
+ return pulumi.get(self, "token")
1305
+
1306
+ @_builtins.property
1307
+ @pulumi.getter(name="tokenWo")
1308
+ def token_wo(self) -> pulumi.Output[Optional[_builtins.str]]:
1309
+ """
1310
+ **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
1311
+ """
1312
+ return pulumi.get(self, "token_wo")
1313
+
1314
+ @_builtins.property
1315
+ @pulumi.getter(name="tokenWoVersion")
1316
+ def token_wo_version(self) -> pulumi.Output[Optional[_builtins.int]]:
1317
+ """
1318
+ Version counter for write-only secret data.
1319
+ """
1320
+ return pulumi.get(self, "token_wo_version")
1321
+