pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,291 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = [
18
+ 'GetEncodeResult',
19
+ 'AwaitableGetEncodeResult',
20
+ 'get_encode',
21
+ 'get_encode_output',
22
+ ]
23
+
24
+ @pulumi.output_type
25
+ class GetEncodeResult:
26
+ """
27
+ A collection of values returned by getEncode.
28
+ """
29
+ def __init__(__self__, batch_inputs=None, batch_results=None, encoded_value=None, id=None, namespace=None, path=None, role_name=None, transformation=None, tweak=None, value=None):
30
+ if batch_inputs and not isinstance(batch_inputs, list):
31
+ raise TypeError("Expected argument 'batch_inputs' to be a list")
32
+ pulumi.set(__self__, "batch_inputs", batch_inputs)
33
+ if batch_results and not isinstance(batch_results, list):
34
+ raise TypeError("Expected argument 'batch_results' to be a list")
35
+ pulumi.set(__self__, "batch_results", batch_results)
36
+ if encoded_value and not isinstance(encoded_value, str):
37
+ raise TypeError("Expected argument 'encoded_value' to be a str")
38
+ pulumi.set(__self__, "encoded_value", encoded_value)
39
+ if id and not isinstance(id, str):
40
+ raise TypeError("Expected argument 'id' to be a str")
41
+ pulumi.set(__self__, "id", id)
42
+ if namespace and not isinstance(namespace, str):
43
+ raise TypeError("Expected argument 'namespace' to be a str")
44
+ pulumi.set(__self__, "namespace", namespace)
45
+ if path and not isinstance(path, str):
46
+ raise TypeError("Expected argument 'path' to be a str")
47
+ pulumi.set(__self__, "path", path)
48
+ if role_name and not isinstance(role_name, str):
49
+ raise TypeError("Expected argument 'role_name' to be a str")
50
+ pulumi.set(__self__, "role_name", role_name)
51
+ if transformation and not isinstance(transformation, str):
52
+ raise TypeError("Expected argument 'transformation' to be a str")
53
+ pulumi.set(__self__, "transformation", transformation)
54
+ if tweak and not isinstance(tweak, str):
55
+ raise TypeError("Expected argument 'tweak' to be a str")
56
+ pulumi.set(__self__, "tweak", tweak)
57
+ if value and not isinstance(value, str):
58
+ raise TypeError("Expected argument 'value' to be a str")
59
+ pulumi.set(__self__, "value", value)
60
+
61
+ @_builtins.property
62
+ @pulumi.getter(name="batchInputs")
63
+ def batch_inputs(self) -> Optional[Sequence[Mapping[str, _builtins.str]]]:
64
+ return pulumi.get(self, "batch_inputs")
65
+
66
+ @_builtins.property
67
+ @pulumi.getter(name="batchResults")
68
+ def batch_results(self) -> Sequence[Mapping[str, _builtins.str]]:
69
+ return pulumi.get(self, "batch_results")
70
+
71
+ @_builtins.property
72
+ @pulumi.getter(name="encodedValue")
73
+ def encoded_value(self) -> _builtins.str:
74
+ return pulumi.get(self, "encoded_value")
75
+
76
+ @_builtins.property
77
+ @pulumi.getter
78
+ def id(self) -> _builtins.str:
79
+ """
80
+ The provider-assigned unique ID for this managed resource.
81
+ """
82
+ return pulumi.get(self, "id")
83
+
84
+ @_builtins.property
85
+ @pulumi.getter
86
+ def namespace(self) -> Optional[_builtins.str]:
87
+ return pulumi.get(self, "namespace")
88
+
89
+ @_builtins.property
90
+ @pulumi.getter
91
+ def path(self) -> _builtins.str:
92
+ return pulumi.get(self, "path")
93
+
94
+ @_builtins.property
95
+ @pulumi.getter(name="roleName")
96
+ def role_name(self) -> _builtins.str:
97
+ return pulumi.get(self, "role_name")
98
+
99
+ @_builtins.property
100
+ @pulumi.getter
101
+ def transformation(self) -> Optional[_builtins.str]:
102
+ return pulumi.get(self, "transformation")
103
+
104
+ @_builtins.property
105
+ @pulumi.getter
106
+ def tweak(self) -> Optional[_builtins.str]:
107
+ return pulumi.get(self, "tweak")
108
+
109
+ @_builtins.property
110
+ @pulumi.getter
111
+ def value(self) -> Optional[_builtins.str]:
112
+ return pulumi.get(self, "value")
113
+
114
+
115
+ class AwaitableGetEncodeResult(GetEncodeResult):
116
+ # pylint: disable=using-constant-test
117
+ def __await__(self):
118
+ if False:
119
+ yield self
120
+ return GetEncodeResult(
121
+ batch_inputs=self.batch_inputs,
122
+ batch_results=self.batch_results,
123
+ encoded_value=self.encoded_value,
124
+ id=self.id,
125
+ namespace=self.namespace,
126
+ path=self.path,
127
+ role_name=self.role_name,
128
+ transformation=self.transformation,
129
+ tweak=self.tweak,
130
+ value=self.value)
131
+
132
+
133
+ def get_encode(batch_inputs: Optional[Sequence[Mapping[str, _builtins.str]]] = None,
134
+ batch_results: Optional[Sequence[Mapping[str, _builtins.str]]] = None,
135
+ encoded_value: Optional[_builtins.str] = None,
136
+ namespace: Optional[_builtins.str] = None,
137
+ path: Optional[_builtins.str] = None,
138
+ role_name: Optional[_builtins.str] = None,
139
+ transformation: Optional[_builtins.str] = None,
140
+ tweak: Optional[_builtins.str] = None,
141
+ value: Optional[_builtins.str] = None,
142
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetEncodeResult:
143
+ """
144
+ This data source supports the "/transform/encode/{role_name}" Vault endpoint.
145
+
146
+ It encodes the provided value using a named role.
147
+
148
+ ## Example Usage
149
+
150
+ ```python
151
+ import pulumi
152
+ import pulumi_vault as vault
153
+
154
+ transform = vault.Mount("transform",
155
+ path="transform",
156
+ type="transform")
157
+ ccn_fpe = vault.transform.Transformation("ccn-fpe",
158
+ path=transform.path,
159
+ name="ccn-fpe",
160
+ type="fpe",
161
+ template="builtin/creditcardnumber",
162
+ tweak_source="internal",
163
+ allowed_roles=["payments"])
164
+ payments = vault.transform.Role("payments",
165
+ path=ccn_fpe.path,
166
+ name="payments",
167
+ transformations=["ccn-fpe"])
168
+ test = vault.transform.get_encode_output(path=payments.path,
169
+ role_name="payments",
170
+ batch_inputs=[{
171
+ "value": "1111-2222-3333-4444",
172
+ }])
173
+ ```
174
+
175
+
176
+ :param Sequence[Mapping[str, _builtins.str]] batch_inputs: Specifies a list of items to be encoded in a single batch. If this parameter is set, the parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.
177
+ :param Sequence[Mapping[str, _builtins.str]] batch_results: The result of encoding a batch.
178
+ :param _builtins.str encoded_value: The result of encoding a value.
179
+ :param _builtins.str namespace: The namespace of the target resource.
180
+ The value should not contain leading or trailing forward slashes.
181
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
182
+ *Available only for Vault Enterprise*.
183
+ :param _builtins.str path: Path to where the back-end is mounted within Vault.
184
+ :param _builtins.str role_name: The name of the role.
185
+ :param _builtins.str transformation: The transformation to perform. If no value is provided and the role contains a single transformation, this value will be inferred from the role.
186
+ :param _builtins.str tweak: The tweak value to use. Only applicable for FPE transformations
187
+ :param _builtins.str value: The value in which to encode.
188
+ """
189
+ __args__ = dict()
190
+ __args__['batchInputs'] = batch_inputs
191
+ __args__['batchResults'] = batch_results
192
+ __args__['encodedValue'] = encoded_value
193
+ __args__['namespace'] = namespace
194
+ __args__['path'] = path
195
+ __args__['roleName'] = role_name
196
+ __args__['transformation'] = transformation
197
+ __args__['tweak'] = tweak
198
+ __args__['value'] = value
199
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
200
+ __ret__ = pulumi.runtime.invoke('vault:transform/getEncode:getEncode', __args__, opts=opts, typ=GetEncodeResult).value
201
+
202
+ return AwaitableGetEncodeResult(
203
+ batch_inputs=pulumi.get(__ret__, 'batch_inputs'),
204
+ batch_results=pulumi.get(__ret__, 'batch_results'),
205
+ encoded_value=pulumi.get(__ret__, 'encoded_value'),
206
+ id=pulumi.get(__ret__, 'id'),
207
+ namespace=pulumi.get(__ret__, 'namespace'),
208
+ path=pulumi.get(__ret__, 'path'),
209
+ role_name=pulumi.get(__ret__, 'role_name'),
210
+ transformation=pulumi.get(__ret__, 'transformation'),
211
+ tweak=pulumi.get(__ret__, 'tweak'),
212
+ value=pulumi.get(__ret__, 'value'))
213
+ def get_encode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapping[str, _builtins.str]]]]] = None,
214
+ batch_results: Optional[pulumi.Input[Optional[Sequence[Mapping[str, _builtins.str]]]]] = None,
215
+ encoded_value: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
216
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
217
+ path: Optional[pulumi.Input[_builtins.str]] = None,
218
+ role_name: Optional[pulumi.Input[_builtins.str]] = None,
219
+ transformation: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
220
+ tweak: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
221
+ value: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
222
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetEncodeResult]:
223
+ """
224
+ This data source supports the "/transform/encode/{role_name}" Vault endpoint.
225
+
226
+ It encodes the provided value using a named role.
227
+
228
+ ## Example Usage
229
+
230
+ ```python
231
+ import pulumi
232
+ import pulumi_vault as vault
233
+
234
+ transform = vault.Mount("transform",
235
+ path="transform",
236
+ type="transform")
237
+ ccn_fpe = vault.transform.Transformation("ccn-fpe",
238
+ path=transform.path,
239
+ name="ccn-fpe",
240
+ type="fpe",
241
+ template="builtin/creditcardnumber",
242
+ tweak_source="internal",
243
+ allowed_roles=["payments"])
244
+ payments = vault.transform.Role("payments",
245
+ path=ccn_fpe.path,
246
+ name="payments",
247
+ transformations=["ccn-fpe"])
248
+ test = vault.transform.get_encode_output(path=payments.path,
249
+ role_name="payments",
250
+ batch_inputs=[{
251
+ "value": "1111-2222-3333-4444",
252
+ }])
253
+ ```
254
+
255
+
256
+ :param Sequence[Mapping[str, _builtins.str]] batch_inputs: Specifies a list of items to be encoded in a single batch. If this parameter is set, the parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.
257
+ :param Sequence[Mapping[str, _builtins.str]] batch_results: The result of encoding a batch.
258
+ :param _builtins.str encoded_value: The result of encoding a value.
259
+ :param _builtins.str namespace: The namespace of the target resource.
260
+ The value should not contain leading or trailing forward slashes.
261
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
262
+ *Available only for Vault Enterprise*.
263
+ :param _builtins.str path: Path to where the back-end is mounted within Vault.
264
+ :param _builtins.str role_name: The name of the role.
265
+ :param _builtins.str transformation: The transformation to perform. If no value is provided and the role contains a single transformation, this value will be inferred from the role.
266
+ :param _builtins.str tweak: The tweak value to use. Only applicable for FPE transformations
267
+ :param _builtins.str value: The value in which to encode.
268
+ """
269
+ __args__ = dict()
270
+ __args__['batchInputs'] = batch_inputs
271
+ __args__['batchResults'] = batch_results
272
+ __args__['encodedValue'] = encoded_value
273
+ __args__['namespace'] = namespace
274
+ __args__['path'] = path
275
+ __args__['roleName'] = role_name
276
+ __args__['transformation'] = transformation
277
+ __args__['tweak'] = tweak
278
+ __args__['value'] = value
279
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
280
+ __ret__ = pulumi.runtime.invoke_output('vault:transform/getEncode:getEncode', __args__, opts=opts, typ=GetEncodeResult)
281
+ return __ret__.apply(lambda __response__: GetEncodeResult(
282
+ batch_inputs=pulumi.get(__response__, 'batch_inputs'),
283
+ batch_results=pulumi.get(__response__, 'batch_results'),
284
+ encoded_value=pulumi.get(__response__, 'encoded_value'),
285
+ id=pulumi.get(__response__, 'id'),
286
+ namespace=pulumi.get(__response__, 'namespace'),
287
+ path=pulumi.get(__response__, 'path'),
288
+ role_name=pulumi.get(__response__, 'role_name'),
289
+ transformation=pulumi.get(__response__, 'transformation'),
290
+ tweak=pulumi.get(__response__, 'tweak'),
291
+ value=pulumi.get(__response__, 'value')))
@@ -0,0 +1,350 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['RoleArgs', 'Role']
18
+
19
+ @pulumi.input_type
20
+ class RoleArgs:
21
+ def __init__(__self__, *,
22
+ path: pulumi.Input[_builtins.str],
23
+ name: Optional[pulumi.Input[_builtins.str]] = None,
24
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
25
+ transformations: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
26
+ """
27
+ The set of arguments for constructing a Role resource.
28
+ :param pulumi.Input[_builtins.str] path: Path to where the back-end is mounted within Vault.
29
+ :param pulumi.Input[_builtins.str] name: The name of the role.
30
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
31
+ The value should not contain leading or trailing forward slashes.
32
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
33
+ *Available only for Vault Enterprise*.
34
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] transformations: A comma separated string or slice of transformations to use.
35
+ """
36
+ pulumi.set(__self__, "path", path)
37
+ if name is not None:
38
+ pulumi.set(__self__, "name", name)
39
+ if namespace is not None:
40
+ pulumi.set(__self__, "namespace", namespace)
41
+ if transformations is not None:
42
+ pulumi.set(__self__, "transformations", transformations)
43
+
44
+ @_builtins.property
45
+ @pulumi.getter
46
+ def path(self) -> pulumi.Input[_builtins.str]:
47
+ """
48
+ Path to where the back-end is mounted within Vault.
49
+ """
50
+ return pulumi.get(self, "path")
51
+
52
+ @path.setter
53
+ def path(self, value: pulumi.Input[_builtins.str]):
54
+ pulumi.set(self, "path", value)
55
+
56
+ @_builtins.property
57
+ @pulumi.getter
58
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
59
+ """
60
+ The name of the role.
61
+ """
62
+ return pulumi.get(self, "name")
63
+
64
+ @name.setter
65
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
66
+ pulumi.set(self, "name", value)
67
+
68
+ @_builtins.property
69
+ @pulumi.getter
70
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
71
+ """
72
+ The namespace to provision the resource in.
73
+ The value should not contain leading or trailing forward slashes.
74
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
75
+ *Available only for Vault Enterprise*.
76
+ """
77
+ return pulumi.get(self, "namespace")
78
+
79
+ @namespace.setter
80
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
81
+ pulumi.set(self, "namespace", value)
82
+
83
+ @_builtins.property
84
+ @pulumi.getter
85
+ def transformations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
86
+ """
87
+ A comma separated string or slice of transformations to use.
88
+ """
89
+ return pulumi.get(self, "transformations")
90
+
91
+ @transformations.setter
92
+ def transformations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
93
+ pulumi.set(self, "transformations", value)
94
+
95
+
96
+ @pulumi.input_type
97
+ class _RoleState:
98
+ def __init__(__self__, *,
99
+ name: Optional[pulumi.Input[_builtins.str]] = None,
100
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
101
+ path: Optional[pulumi.Input[_builtins.str]] = None,
102
+ transformations: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
103
+ """
104
+ Input properties used for looking up and filtering Role resources.
105
+ :param pulumi.Input[_builtins.str] name: The name of the role.
106
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
107
+ The value should not contain leading or trailing forward slashes.
108
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
109
+ *Available only for Vault Enterprise*.
110
+ :param pulumi.Input[_builtins.str] path: Path to where the back-end is mounted within Vault.
111
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] transformations: A comma separated string or slice of transformations to use.
112
+ """
113
+ if name is not None:
114
+ pulumi.set(__self__, "name", name)
115
+ if namespace is not None:
116
+ pulumi.set(__self__, "namespace", namespace)
117
+ if path is not None:
118
+ pulumi.set(__self__, "path", path)
119
+ if transformations is not None:
120
+ pulumi.set(__self__, "transformations", transformations)
121
+
122
+ @_builtins.property
123
+ @pulumi.getter
124
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
125
+ """
126
+ The name of the role.
127
+ """
128
+ return pulumi.get(self, "name")
129
+
130
+ @name.setter
131
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
132
+ pulumi.set(self, "name", value)
133
+
134
+ @_builtins.property
135
+ @pulumi.getter
136
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
137
+ """
138
+ The namespace to provision the resource in.
139
+ The value should not contain leading or trailing forward slashes.
140
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
141
+ *Available only for Vault Enterprise*.
142
+ """
143
+ return pulumi.get(self, "namespace")
144
+
145
+ @namespace.setter
146
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
147
+ pulumi.set(self, "namespace", value)
148
+
149
+ @_builtins.property
150
+ @pulumi.getter
151
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
152
+ """
153
+ Path to where the back-end is mounted within Vault.
154
+ """
155
+ return pulumi.get(self, "path")
156
+
157
+ @path.setter
158
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
159
+ pulumi.set(self, "path", value)
160
+
161
+ @_builtins.property
162
+ @pulumi.getter
163
+ def transformations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
164
+ """
165
+ A comma separated string or slice of transformations to use.
166
+ """
167
+ return pulumi.get(self, "transformations")
168
+
169
+ @transformations.setter
170
+ def transformations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
171
+ pulumi.set(self, "transformations", value)
172
+
173
+
174
+ @pulumi.type_token("vault:transform/role:Role")
175
+ class Role(pulumi.CustomResource):
176
+ @overload
177
+ def __init__(__self__,
178
+ resource_name: str,
179
+ opts: Optional[pulumi.ResourceOptions] = None,
180
+ name: Optional[pulumi.Input[_builtins.str]] = None,
181
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
182
+ path: Optional[pulumi.Input[_builtins.str]] = None,
183
+ transformations: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
184
+ __props__=None):
185
+ """
186
+ This resource supports the "/transform/role/{name}" Vault endpoint.
187
+
188
+ It creates or updates the role with the given name. If a role with the name does not exist, it will be created.
189
+ If the role exists, it will be updated with the new attributes.
190
+
191
+ ## Example Usage
192
+
193
+ ```python
194
+ import pulumi
195
+ import pulumi_vault as vault
196
+
197
+ mount_transform = vault.Mount("mount_transform",
198
+ path="transform",
199
+ type="transform")
200
+ test = vault.transform.Role("test",
201
+ path=mount_transform.path,
202
+ name="payments",
203
+ transformations=["ccn-fpe"])
204
+ ```
205
+
206
+ :param str resource_name: The name of the resource.
207
+ :param pulumi.ResourceOptions opts: Options for the resource.
208
+ :param pulumi.Input[_builtins.str] name: The name of the role.
209
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
210
+ The value should not contain leading or trailing forward slashes.
211
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
212
+ *Available only for Vault Enterprise*.
213
+ :param pulumi.Input[_builtins.str] path: Path to where the back-end is mounted within Vault.
214
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] transformations: A comma separated string or slice of transformations to use.
215
+ """
216
+ ...
217
+ @overload
218
+ def __init__(__self__,
219
+ resource_name: str,
220
+ args: RoleArgs,
221
+ opts: Optional[pulumi.ResourceOptions] = None):
222
+ """
223
+ This resource supports the "/transform/role/{name}" Vault endpoint.
224
+
225
+ It creates or updates the role with the given name. If a role with the name does not exist, it will be created.
226
+ If the role exists, it will be updated with the new attributes.
227
+
228
+ ## Example Usage
229
+
230
+ ```python
231
+ import pulumi
232
+ import pulumi_vault as vault
233
+
234
+ mount_transform = vault.Mount("mount_transform",
235
+ path="transform",
236
+ type="transform")
237
+ test = vault.transform.Role("test",
238
+ path=mount_transform.path,
239
+ name="payments",
240
+ transformations=["ccn-fpe"])
241
+ ```
242
+
243
+ :param str resource_name: The name of the resource.
244
+ :param RoleArgs args: The arguments to use to populate this resource's properties.
245
+ :param pulumi.ResourceOptions opts: Options for the resource.
246
+ """
247
+ ...
248
+ def __init__(__self__, resource_name: str, *args, **kwargs):
249
+ resource_args, opts = _utilities.get_resource_args_opts(RoleArgs, pulumi.ResourceOptions, *args, **kwargs)
250
+ if resource_args is not None:
251
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
252
+ else:
253
+ __self__._internal_init(resource_name, *args, **kwargs)
254
+
255
+ def _internal_init(__self__,
256
+ resource_name: str,
257
+ opts: Optional[pulumi.ResourceOptions] = None,
258
+ name: Optional[pulumi.Input[_builtins.str]] = None,
259
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
260
+ path: Optional[pulumi.Input[_builtins.str]] = None,
261
+ transformations: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
262
+ __props__=None):
263
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
264
+ if not isinstance(opts, pulumi.ResourceOptions):
265
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
266
+ if opts.id is None:
267
+ if __props__ is not None:
268
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
269
+ __props__ = RoleArgs.__new__(RoleArgs)
270
+
271
+ __props__.__dict__["name"] = name
272
+ __props__.__dict__["namespace"] = namespace
273
+ if path is None and not opts.urn:
274
+ raise TypeError("Missing required property 'path'")
275
+ __props__.__dict__["path"] = path
276
+ __props__.__dict__["transformations"] = transformations
277
+ super(Role, __self__).__init__(
278
+ 'vault:transform/role:Role',
279
+ resource_name,
280
+ __props__,
281
+ opts)
282
+
283
+ @staticmethod
284
+ def get(resource_name: str,
285
+ id: pulumi.Input[str],
286
+ opts: Optional[pulumi.ResourceOptions] = None,
287
+ name: Optional[pulumi.Input[_builtins.str]] = None,
288
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
289
+ path: Optional[pulumi.Input[_builtins.str]] = None,
290
+ transformations: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None) -> 'Role':
291
+ """
292
+ Get an existing Role resource's state with the given name, id, and optional extra
293
+ properties used to qualify the lookup.
294
+
295
+ :param str resource_name: The unique name of the resulting resource.
296
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
297
+ :param pulumi.ResourceOptions opts: Options for the resource.
298
+ :param pulumi.Input[_builtins.str] name: The name of the role.
299
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
300
+ The value should not contain leading or trailing forward slashes.
301
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
302
+ *Available only for Vault Enterprise*.
303
+ :param pulumi.Input[_builtins.str] path: Path to where the back-end is mounted within Vault.
304
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] transformations: A comma separated string or slice of transformations to use.
305
+ """
306
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
307
+
308
+ __props__ = _RoleState.__new__(_RoleState)
309
+
310
+ __props__.__dict__["name"] = name
311
+ __props__.__dict__["namespace"] = namespace
312
+ __props__.__dict__["path"] = path
313
+ __props__.__dict__["transformations"] = transformations
314
+ return Role(resource_name, opts=opts, __props__=__props__)
315
+
316
+ @_builtins.property
317
+ @pulumi.getter
318
+ def name(self) -> pulumi.Output[_builtins.str]:
319
+ """
320
+ The name of the role.
321
+ """
322
+ return pulumi.get(self, "name")
323
+
324
+ @_builtins.property
325
+ @pulumi.getter
326
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
327
+ """
328
+ The namespace to provision the resource in.
329
+ The value should not contain leading or trailing forward slashes.
330
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
331
+ *Available only for Vault Enterprise*.
332
+ """
333
+ return pulumi.get(self, "namespace")
334
+
335
+ @_builtins.property
336
+ @pulumi.getter
337
+ def path(self) -> pulumi.Output[_builtins.str]:
338
+ """
339
+ Path to where the back-end is mounted within Vault.
340
+ """
341
+ return pulumi.get(self, "path")
342
+
343
+ @_builtins.property
344
+ @pulumi.getter
345
+ def transformations(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
346
+ """
347
+ A comma separated string or slice of transformations to use.
348
+ """
349
+ return pulumi.get(self, "transformations")
350
+