pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,1517 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['SecretBackendArgs', 'SecretBackend']
18
+
19
+ @pulumi.input_type
20
+ class SecretBackendArgs:
21
+ def __init__(__self__, *,
22
+ address: pulumi.Input[_builtins.str],
23
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
24
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
25
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ bootstrap: Optional[pulumi.Input[_builtins.bool]] = None,
28
+ ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
29
+ client_cert: Optional[pulumi.Input[_builtins.str]] = None,
30
+ client_key: Optional[pulumi.Input[_builtins.str]] = None,
31
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
32
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
33
+ description: Optional[pulumi.Input[_builtins.str]] = None,
34
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
35
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
36
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
37
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
38
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
39
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
40
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
41
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
42
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
43
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
44
+ path: Optional[pulumi.Input[_builtins.str]] = None,
45
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
46
+ scheme: Optional[pulumi.Input[_builtins.str]] = None,
47
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
48
+ token: Optional[pulumi.Input[_builtins.str]] = None):
49
+ """
50
+ The set of arguments for constructing a SecretBackend resource.
51
+ :param pulumi.Input[_builtins.str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
52
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
53
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
54
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
55
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
56
+ :param pulumi.Input[_builtins.bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
57
+ :param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
58
+ :param pulumi.Input[_builtins.str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
59
+ this is set you need to also set client_key.
60
+ :param pulumi.Input[_builtins.str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
61
+ you need to also set client_cert.
62
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
63
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
64
+ :param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
65
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
66
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
67
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
68
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
69
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
70
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
71
+ :param pulumi.Input[_builtins.bool] local: Specifies if the secret backend is local only
72
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
73
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
74
+ The value should not contain leading or trailing forward slashes.
75
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
76
+ *Available only for Vault Enterprise*.
77
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
78
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
79
+ :param pulumi.Input[_builtins.str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
80
+ to `consul`.
81
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
82
+ :param pulumi.Input[_builtins.str] scheme: Specifies the URL scheme to use. Defaults to `http`.
83
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
84
+ :param pulumi.Input[_builtins.str] token: Specifies the Consul token to use when managing or issuing new tokens.
85
+ """
86
+ pulumi.set(__self__, "address", address)
87
+ if allowed_managed_keys is not None:
88
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
89
+ if allowed_response_headers is not None:
90
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
91
+ if audit_non_hmac_request_keys is not None:
92
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
93
+ if audit_non_hmac_response_keys is not None:
94
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
95
+ if bootstrap is not None:
96
+ pulumi.set(__self__, "bootstrap", bootstrap)
97
+ if ca_cert is not None:
98
+ pulumi.set(__self__, "ca_cert", ca_cert)
99
+ if client_cert is not None:
100
+ pulumi.set(__self__, "client_cert", client_cert)
101
+ if client_key is not None:
102
+ pulumi.set(__self__, "client_key", client_key)
103
+ if default_lease_ttl_seconds is not None:
104
+ pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
105
+ if delegated_auth_accessors is not None:
106
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
107
+ if description is not None:
108
+ pulumi.set(__self__, "description", description)
109
+ if disable_remount is not None:
110
+ pulumi.set(__self__, "disable_remount", disable_remount)
111
+ if external_entropy_access is not None:
112
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
113
+ if force_no_cache is not None:
114
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
115
+ if identity_token_key is not None:
116
+ pulumi.set(__self__, "identity_token_key", identity_token_key)
117
+ if listing_visibility is not None:
118
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
119
+ if local is not None:
120
+ pulumi.set(__self__, "local", local)
121
+ if max_lease_ttl_seconds is not None:
122
+ pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
123
+ if namespace is not None:
124
+ pulumi.set(__self__, "namespace", namespace)
125
+ if options is not None:
126
+ pulumi.set(__self__, "options", options)
127
+ if passthrough_request_headers is not None:
128
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
129
+ if path is not None:
130
+ pulumi.set(__self__, "path", path)
131
+ if plugin_version is not None:
132
+ pulumi.set(__self__, "plugin_version", plugin_version)
133
+ if scheme is not None:
134
+ pulumi.set(__self__, "scheme", scheme)
135
+ if seal_wrap is not None:
136
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
137
+ if token is not None:
138
+ pulumi.set(__self__, "token", token)
139
+
140
+ @_builtins.property
141
+ @pulumi.getter
142
+ def address(self) -> pulumi.Input[_builtins.str]:
143
+ """
144
+ Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
145
+ """
146
+ return pulumi.get(self, "address")
147
+
148
+ @address.setter
149
+ def address(self, value: pulumi.Input[_builtins.str]):
150
+ pulumi.set(self, "address", value)
151
+
152
+ @_builtins.property
153
+ @pulumi.getter(name="allowedManagedKeys")
154
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
155
+ """
156
+ List of managed key registry entry names that the mount in question is allowed to access
157
+ """
158
+ return pulumi.get(self, "allowed_managed_keys")
159
+
160
+ @allowed_managed_keys.setter
161
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
162
+ pulumi.set(self, "allowed_managed_keys", value)
163
+
164
+ @_builtins.property
165
+ @pulumi.getter(name="allowedResponseHeaders")
166
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
167
+ """
168
+ List of headers to allow and pass from the request to the plugin
169
+ """
170
+ return pulumi.get(self, "allowed_response_headers")
171
+
172
+ @allowed_response_headers.setter
173
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
174
+ pulumi.set(self, "allowed_response_headers", value)
175
+
176
+ @_builtins.property
177
+ @pulumi.getter(name="auditNonHmacRequestKeys")
178
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
179
+ """
180
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
181
+ """
182
+ return pulumi.get(self, "audit_non_hmac_request_keys")
183
+
184
+ @audit_non_hmac_request_keys.setter
185
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
186
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
187
+
188
+ @_builtins.property
189
+ @pulumi.getter(name="auditNonHmacResponseKeys")
190
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
191
+ """
192
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
193
+ """
194
+ return pulumi.get(self, "audit_non_hmac_response_keys")
195
+
196
+ @audit_non_hmac_response_keys.setter
197
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
198
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
199
+
200
+ @_builtins.property
201
+ @pulumi.getter
202
+ def bootstrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
203
+ """
204
+ Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
205
+ """
206
+ return pulumi.get(self, "bootstrap")
207
+
208
+ @bootstrap.setter
209
+ def bootstrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
210
+ pulumi.set(self, "bootstrap", value)
211
+
212
+ @_builtins.property
213
+ @pulumi.getter(name="caCert")
214
+ def ca_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
215
+ """
216
+ CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
217
+ """
218
+ return pulumi.get(self, "ca_cert")
219
+
220
+ @ca_cert.setter
221
+ def ca_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
222
+ pulumi.set(self, "ca_cert", value)
223
+
224
+ @_builtins.property
225
+ @pulumi.getter(name="clientCert")
226
+ def client_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
227
+ """
228
+ Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
229
+ this is set you need to also set client_key.
230
+ """
231
+ return pulumi.get(self, "client_cert")
232
+
233
+ @client_cert.setter
234
+ def client_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
235
+ pulumi.set(self, "client_cert", value)
236
+
237
+ @_builtins.property
238
+ @pulumi.getter(name="clientKey")
239
+ def client_key(self) -> Optional[pulumi.Input[_builtins.str]]:
240
+ """
241
+ Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
242
+ you need to also set client_cert.
243
+ """
244
+ return pulumi.get(self, "client_key")
245
+
246
+ @client_key.setter
247
+ def client_key(self, value: Optional[pulumi.Input[_builtins.str]]):
248
+ pulumi.set(self, "client_key", value)
249
+
250
+ @_builtins.property
251
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
252
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
253
+ """
254
+ Default lease duration for secrets in seconds
255
+ """
256
+ return pulumi.get(self, "default_lease_ttl_seconds")
257
+
258
+ @default_lease_ttl_seconds.setter
259
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
260
+ pulumi.set(self, "default_lease_ttl_seconds", value)
261
+
262
+ @_builtins.property
263
+ @pulumi.getter(name="delegatedAuthAccessors")
264
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
265
+ """
266
+ List of headers to allow and pass from the request to the plugin
267
+ """
268
+ return pulumi.get(self, "delegated_auth_accessors")
269
+
270
+ @delegated_auth_accessors.setter
271
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
272
+ pulumi.set(self, "delegated_auth_accessors", value)
273
+
274
+ @_builtins.property
275
+ @pulumi.getter
276
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
277
+ """
278
+ A human-friendly description for this backend.
279
+ """
280
+ return pulumi.get(self, "description")
281
+
282
+ @description.setter
283
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
284
+ pulumi.set(self, "description", value)
285
+
286
+ @_builtins.property
287
+ @pulumi.getter(name="disableRemount")
288
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
289
+ """
290
+ If set, opts out of mount migration on path updates.
291
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
292
+ """
293
+ return pulumi.get(self, "disable_remount")
294
+
295
+ @disable_remount.setter
296
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
297
+ pulumi.set(self, "disable_remount", value)
298
+
299
+ @_builtins.property
300
+ @pulumi.getter(name="externalEntropyAccess")
301
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
302
+ """
303
+ Enable the secrets engine to access Vault's external entropy source
304
+ """
305
+ return pulumi.get(self, "external_entropy_access")
306
+
307
+ @external_entropy_access.setter
308
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
309
+ pulumi.set(self, "external_entropy_access", value)
310
+
311
+ @_builtins.property
312
+ @pulumi.getter(name="forceNoCache")
313
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
314
+ """
315
+ If set to true, disables caching.
316
+ """
317
+ return pulumi.get(self, "force_no_cache")
318
+
319
+ @force_no_cache.setter
320
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
321
+ pulumi.set(self, "force_no_cache", value)
322
+
323
+ @_builtins.property
324
+ @pulumi.getter(name="identityTokenKey")
325
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
326
+ """
327
+ The key to use for signing plugin workload identity tokens
328
+ """
329
+ return pulumi.get(self, "identity_token_key")
330
+
331
+ @identity_token_key.setter
332
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
333
+ pulumi.set(self, "identity_token_key", value)
334
+
335
+ @_builtins.property
336
+ @pulumi.getter(name="listingVisibility")
337
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
338
+ """
339
+ Specifies whether to show this mount in the UI-specific listing endpoint
340
+ """
341
+ return pulumi.get(self, "listing_visibility")
342
+
343
+ @listing_visibility.setter
344
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
345
+ pulumi.set(self, "listing_visibility", value)
346
+
347
+ @_builtins.property
348
+ @pulumi.getter
349
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
350
+ """
351
+ Specifies if the secret backend is local only
352
+ """
353
+ return pulumi.get(self, "local")
354
+
355
+ @local.setter
356
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
357
+ pulumi.set(self, "local", value)
358
+
359
+ @_builtins.property
360
+ @pulumi.getter(name="maxLeaseTtlSeconds")
361
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
362
+ """
363
+ Maximum possible lease duration for secrets in seconds
364
+ """
365
+ return pulumi.get(self, "max_lease_ttl_seconds")
366
+
367
+ @max_lease_ttl_seconds.setter
368
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
369
+ pulumi.set(self, "max_lease_ttl_seconds", value)
370
+
371
+ @_builtins.property
372
+ @pulumi.getter
373
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
374
+ """
375
+ The namespace to provision the resource in.
376
+ The value should not contain leading or trailing forward slashes.
377
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
378
+ *Available only for Vault Enterprise*.
379
+ """
380
+ return pulumi.get(self, "namespace")
381
+
382
+ @namespace.setter
383
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
384
+ pulumi.set(self, "namespace", value)
385
+
386
+ @_builtins.property
387
+ @pulumi.getter
388
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
389
+ """
390
+ Specifies mount type specific options that are passed to the backend
391
+ """
392
+ return pulumi.get(self, "options")
393
+
394
+ @options.setter
395
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
396
+ pulumi.set(self, "options", value)
397
+
398
+ @_builtins.property
399
+ @pulumi.getter(name="passthroughRequestHeaders")
400
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
401
+ """
402
+ List of headers to allow and pass from the request to the plugin
403
+ """
404
+ return pulumi.get(self, "passthrough_request_headers")
405
+
406
+ @passthrough_request_headers.setter
407
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
408
+ pulumi.set(self, "passthrough_request_headers", value)
409
+
410
+ @_builtins.property
411
+ @pulumi.getter
412
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
413
+ """
414
+ The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
415
+ to `consul`.
416
+ """
417
+ return pulumi.get(self, "path")
418
+
419
+ @path.setter
420
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
421
+ pulumi.set(self, "path", value)
422
+
423
+ @_builtins.property
424
+ @pulumi.getter(name="pluginVersion")
425
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
426
+ """
427
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
428
+ """
429
+ return pulumi.get(self, "plugin_version")
430
+
431
+ @plugin_version.setter
432
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
433
+ pulumi.set(self, "plugin_version", value)
434
+
435
+ @_builtins.property
436
+ @pulumi.getter
437
+ def scheme(self) -> Optional[pulumi.Input[_builtins.str]]:
438
+ """
439
+ Specifies the URL scheme to use. Defaults to `http`.
440
+ """
441
+ return pulumi.get(self, "scheme")
442
+
443
+ @scheme.setter
444
+ def scheme(self, value: Optional[pulumi.Input[_builtins.str]]):
445
+ pulumi.set(self, "scheme", value)
446
+
447
+ @_builtins.property
448
+ @pulumi.getter(name="sealWrap")
449
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
450
+ """
451
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
452
+ """
453
+ return pulumi.get(self, "seal_wrap")
454
+
455
+ @seal_wrap.setter
456
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
457
+ pulumi.set(self, "seal_wrap", value)
458
+
459
+ @_builtins.property
460
+ @pulumi.getter
461
+ def token(self) -> Optional[pulumi.Input[_builtins.str]]:
462
+ """
463
+ Specifies the Consul token to use when managing or issuing new tokens.
464
+ """
465
+ return pulumi.get(self, "token")
466
+
467
+ @token.setter
468
+ def token(self, value: Optional[pulumi.Input[_builtins.str]]):
469
+ pulumi.set(self, "token", value)
470
+
471
+
472
+ @pulumi.input_type
473
+ class _SecretBackendState:
474
+ def __init__(__self__, *,
475
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
476
+ address: Optional[pulumi.Input[_builtins.str]] = None,
477
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
478
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
479
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
480
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
481
+ bootstrap: Optional[pulumi.Input[_builtins.bool]] = None,
482
+ ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
483
+ client_cert: Optional[pulumi.Input[_builtins.str]] = None,
484
+ client_key: Optional[pulumi.Input[_builtins.str]] = None,
485
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
486
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
487
+ description: Optional[pulumi.Input[_builtins.str]] = None,
488
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
489
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
490
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
491
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
492
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
493
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
494
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
495
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
496
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
497
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
498
+ path: Optional[pulumi.Input[_builtins.str]] = None,
499
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
500
+ scheme: Optional[pulumi.Input[_builtins.str]] = None,
501
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
502
+ token: Optional[pulumi.Input[_builtins.str]] = None):
503
+ """
504
+ Input properties used for looking up and filtering SecretBackend resources.
505
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
506
+ :param pulumi.Input[_builtins.str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
507
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
508
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
509
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
510
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
511
+ :param pulumi.Input[_builtins.bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
512
+ :param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
513
+ :param pulumi.Input[_builtins.str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
514
+ this is set you need to also set client_key.
515
+ :param pulumi.Input[_builtins.str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
516
+ you need to also set client_cert.
517
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
518
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
519
+ :param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
520
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
521
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
522
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
523
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
524
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
525
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
526
+ :param pulumi.Input[_builtins.bool] local: Specifies if the secret backend is local only
527
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
528
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
529
+ The value should not contain leading or trailing forward slashes.
530
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
531
+ *Available only for Vault Enterprise*.
532
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
533
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
534
+ :param pulumi.Input[_builtins.str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
535
+ to `consul`.
536
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
537
+ :param pulumi.Input[_builtins.str] scheme: Specifies the URL scheme to use. Defaults to `http`.
538
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
539
+ :param pulumi.Input[_builtins.str] token: Specifies the Consul token to use when managing or issuing new tokens.
540
+ """
541
+ if accessor is not None:
542
+ pulumi.set(__self__, "accessor", accessor)
543
+ if address is not None:
544
+ pulumi.set(__self__, "address", address)
545
+ if allowed_managed_keys is not None:
546
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
547
+ if allowed_response_headers is not None:
548
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
549
+ if audit_non_hmac_request_keys is not None:
550
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
551
+ if audit_non_hmac_response_keys is not None:
552
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
553
+ if bootstrap is not None:
554
+ pulumi.set(__self__, "bootstrap", bootstrap)
555
+ if ca_cert is not None:
556
+ pulumi.set(__self__, "ca_cert", ca_cert)
557
+ if client_cert is not None:
558
+ pulumi.set(__self__, "client_cert", client_cert)
559
+ if client_key is not None:
560
+ pulumi.set(__self__, "client_key", client_key)
561
+ if default_lease_ttl_seconds is not None:
562
+ pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
563
+ if delegated_auth_accessors is not None:
564
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
565
+ if description is not None:
566
+ pulumi.set(__self__, "description", description)
567
+ if disable_remount is not None:
568
+ pulumi.set(__self__, "disable_remount", disable_remount)
569
+ if external_entropy_access is not None:
570
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
571
+ if force_no_cache is not None:
572
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
573
+ if identity_token_key is not None:
574
+ pulumi.set(__self__, "identity_token_key", identity_token_key)
575
+ if listing_visibility is not None:
576
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
577
+ if local is not None:
578
+ pulumi.set(__self__, "local", local)
579
+ if max_lease_ttl_seconds is not None:
580
+ pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
581
+ if namespace is not None:
582
+ pulumi.set(__self__, "namespace", namespace)
583
+ if options is not None:
584
+ pulumi.set(__self__, "options", options)
585
+ if passthrough_request_headers is not None:
586
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
587
+ if path is not None:
588
+ pulumi.set(__self__, "path", path)
589
+ if plugin_version is not None:
590
+ pulumi.set(__self__, "plugin_version", plugin_version)
591
+ if scheme is not None:
592
+ pulumi.set(__self__, "scheme", scheme)
593
+ if seal_wrap is not None:
594
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
595
+ if token is not None:
596
+ pulumi.set(__self__, "token", token)
597
+
598
+ @_builtins.property
599
+ @pulumi.getter
600
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
601
+ """
602
+ Accessor of the mount
603
+ """
604
+ return pulumi.get(self, "accessor")
605
+
606
+ @accessor.setter
607
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
608
+ pulumi.set(self, "accessor", value)
609
+
610
+ @_builtins.property
611
+ @pulumi.getter
612
+ def address(self) -> Optional[pulumi.Input[_builtins.str]]:
613
+ """
614
+ Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
615
+ """
616
+ return pulumi.get(self, "address")
617
+
618
+ @address.setter
619
+ def address(self, value: Optional[pulumi.Input[_builtins.str]]):
620
+ pulumi.set(self, "address", value)
621
+
622
+ @_builtins.property
623
+ @pulumi.getter(name="allowedManagedKeys")
624
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
625
+ """
626
+ List of managed key registry entry names that the mount in question is allowed to access
627
+ """
628
+ return pulumi.get(self, "allowed_managed_keys")
629
+
630
+ @allowed_managed_keys.setter
631
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
632
+ pulumi.set(self, "allowed_managed_keys", value)
633
+
634
+ @_builtins.property
635
+ @pulumi.getter(name="allowedResponseHeaders")
636
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
637
+ """
638
+ List of headers to allow and pass from the request to the plugin
639
+ """
640
+ return pulumi.get(self, "allowed_response_headers")
641
+
642
+ @allowed_response_headers.setter
643
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
644
+ pulumi.set(self, "allowed_response_headers", value)
645
+
646
+ @_builtins.property
647
+ @pulumi.getter(name="auditNonHmacRequestKeys")
648
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
649
+ """
650
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
651
+ """
652
+ return pulumi.get(self, "audit_non_hmac_request_keys")
653
+
654
+ @audit_non_hmac_request_keys.setter
655
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
656
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
657
+
658
+ @_builtins.property
659
+ @pulumi.getter(name="auditNonHmacResponseKeys")
660
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
661
+ """
662
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
663
+ """
664
+ return pulumi.get(self, "audit_non_hmac_response_keys")
665
+
666
+ @audit_non_hmac_response_keys.setter
667
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
668
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
669
+
670
+ @_builtins.property
671
+ @pulumi.getter
672
+ def bootstrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
673
+ """
674
+ Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
675
+ """
676
+ return pulumi.get(self, "bootstrap")
677
+
678
+ @bootstrap.setter
679
+ def bootstrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
680
+ pulumi.set(self, "bootstrap", value)
681
+
682
+ @_builtins.property
683
+ @pulumi.getter(name="caCert")
684
+ def ca_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
685
+ """
686
+ CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
687
+ """
688
+ return pulumi.get(self, "ca_cert")
689
+
690
+ @ca_cert.setter
691
+ def ca_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
692
+ pulumi.set(self, "ca_cert", value)
693
+
694
+ @_builtins.property
695
+ @pulumi.getter(name="clientCert")
696
+ def client_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
697
+ """
698
+ Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
699
+ this is set you need to also set client_key.
700
+ """
701
+ return pulumi.get(self, "client_cert")
702
+
703
+ @client_cert.setter
704
+ def client_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
705
+ pulumi.set(self, "client_cert", value)
706
+
707
+ @_builtins.property
708
+ @pulumi.getter(name="clientKey")
709
+ def client_key(self) -> Optional[pulumi.Input[_builtins.str]]:
710
+ """
711
+ Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
712
+ you need to also set client_cert.
713
+ """
714
+ return pulumi.get(self, "client_key")
715
+
716
+ @client_key.setter
717
+ def client_key(self, value: Optional[pulumi.Input[_builtins.str]]):
718
+ pulumi.set(self, "client_key", value)
719
+
720
+ @_builtins.property
721
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
722
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
723
+ """
724
+ Default lease duration for secrets in seconds
725
+ """
726
+ return pulumi.get(self, "default_lease_ttl_seconds")
727
+
728
+ @default_lease_ttl_seconds.setter
729
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
730
+ pulumi.set(self, "default_lease_ttl_seconds", value)
731
+
732
+ @_builtins.property
733
+ @pulumi.getter(name="delegatedAuthAccessors")
734
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
735
+ """
736
+ List of headers to allow and pass from the request to the plugin
737
+ """
738
+ return pulumi.get(self, "delegated_auth_accessors")
739
+
740
+ @delegated_auth_accessors.setter
741
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
742
+ pulumi.set(self, "delegated_auth_accessors", value)
743
+
744
+ @_builtins.property
745
+ @pulumi.getter
746
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
747
+ """
748
+ A human-friendly description for this backend.
749
+ """
750
+ return pulumi.get(self, "description")
751
+
752
+ @description.setter
753
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
754
+ pulumi.set(self, "description", value)
755
+
756
+ @_builtins.property
757
+ @pulumi.getter(name="disableRemount")
758
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
759
+ """
760
+ If set, opts out of mount migration on path updates.
761
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
762
+ """
763
+ return pulumi.get(self, "disable_remount")
764
+
765
+ @disable_remount.setter
766
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
767
+ pulumi.set(self, "disable_remount", value)
768
+
769
+ @_builtins.property
770
+ @pulumi.getter(name="externalEntropyAccess")
771
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
772
+ """
773
+ Enable the secrets engine to access Vault's external entropy source
774
+ """
775
+ return pulumi.get(self, "external_entropy_access")
776
+
777
+ @external_entropy_access.setter
778
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
779
+ pulumi.set(self, "external_entropy_access", value)
780
+
781
+ @_builtins.property
782
+ @pulumi.getter(name="forceNoCache")
783
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
784
+ """
785
+ If set to true, disables caching.
786
+ """
787
+ return pulumi.get(self, "force_no_cache")
788
+
789
+ @force_no_cache.setter
790
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
791
+ pulumi.set(self, "force_no_cache", value)
792
+
793
+ @_builtins.property
794
+ @pulumi.getter(name="identityTokenKey")
795
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
796
+ """
797
+ The key to use for signing plugin workload identity tokens
798
+ """
799
+ return pulumi.get(self, "identity_token_key")
800
+
801
+ @identity_token_key.setter
802
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
803
+ pulumi.set(self, "identity_token_key", value)
804
+
805
+ @_builtins.property
806
+ @pulumi.getter(name="listingVisibility")
807
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
808
+ """
809
+ Specifies whether to show this mount in the UI-specific listing endpoint
810
+ """
811
+ return pulumi.get(self, "listing_visibility")
812
+
813
+ @listing_visibility.setter
814
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
815
+ pulumi.set(self, "listing_visibility", value)
816
+
817
+ @_builtins.property
818
+ @pulumi.getter
819
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
820
+ """
821
+ Specifies if the secret backend is local only
822
+ """
823
+ return pulumi.get(self, "local")
824
+
825
+ @local.setter
826
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
827
+ pulumi.set(self, "local", value)
828
+
829
+ @_builtins.property
830
+ @pulumi.getter(name="maxLeaseTtlSeconds")
831
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
832
+ """
833
+ Maximum possible lease duration for secrets in seconds
834
+ """
835
+ return pulumi.get(self, "max_lease_ttl_seconds")
836
+
837
+ @max_lease_ttl_seconds.setter
838
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
839
+ pulumi.set(self, "max_lease_ttl_seconds", value)
840
+
841
+ @_builtins.property
842
+ @pulumi.getter
843
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
844
+ """
845
+ The namespace to provision the resource in.
846
+ The value should not contain leading or trailing forward slashes.
847
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
848
+ *Available only for Vault Enterprise*.
849
+ """
850
+ return pulumi.get(self, "namespace")
851
+
852
+ @namespace.setter
853
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
854
+ pulumi.set(self, "namespace", value)
855
+
856
+ @_builtins.property
857
+ @pulumi.getter
858
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
859
+ """
860
+ Specifies mount type specific options that are passed to the backend
861
+ """
862
+ return pulumi.get(self, "options")
863
+
864
+ @options.setter
865
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
866
+ pulumi.set(self, "options", value)
867
+
868
+ @_builtins.property
869
+ @pulumi.getter(name="passthroughRequestHeaders")
870
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
871
+ """
872
+ List of headers to allow and pass from the request to the plugin
873
+ """
874
+ return pulumi.get(self, "passthrough_request_headers")
875
+
876
+ @passthrough_request_headers.setter
877
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
878
+ pulumi.set(self, "passthrough_request_headers", value)
879
+
880
+ @_builtins.property
881
+ @pulumi.getter
882
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
883
+ """
884
+ The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
885
+ to `consul`.
886
+ """
887
+ return pulumi.get(self, "path")
888
+
889
+ @path.setter
890
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
891
+ pulumi.set(self, "path", value)
892
+
893
+ @_builtins.property
894
+ @pulumi.getter(name="pluginVersion")
895
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
896
+ """
897
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
898
+ """
899
+ return pulumi.get(self, "plugin_version")
900
+
901
+ @plugin_version.setter
902
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
903
+ pulumi.set(self, "plugin_version", value)
904
+
905
+ @_builtins.property
906
+ @pulumi.getter
907
+ def scheme(self) -> Optional[pulumi.Input[_builtins.str]]:
908
+ """
909
+ Specifies the URL scheme to use. Defaults to `http`.
910
+ """
911
+ return pulumi.get(self, "scheme")
912
+
913
+ @scheme.setter
914
+ def scheme(self, value: Optional[pulumi.Input[_builtins.str]]):
915
+ pulumi.set(self, "scheme", value)
916
+
917
+ @_builtins.property
918
+ @pulumi.getter(name="sealWrap")
919
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
920
+ """
921
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
922
+ """
923
+ return pulumi.get(self, "seal_wrap")
924
+
925
+ @seal_wrap.setter
926
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
927
+ pulumi.set(self, "seal_wrap", value)
928
+
929
+ @_builtins.property
930
+ @pulumi.getter
931
+ def token(self) -> Optional[pulumi.Input[_builtins.str]]:
932
+ """
933
+ Specifies the Consul token to use when managing or issuing new tokens.
934
+ """
935
+ return pulumi.get(self, "token")
936
+
937
+ @token.setter
938
+ def token(self, value: Optional[pulumi.Input[_builtins.str]]):
939
+ pulumi.set(self, "token", value)
940
+
941
+
942
+ @pulumi.type_token("vault:consul/secretBackend:SecretBackend")
943
+ class SecretBackend(pulumi.CustomResource):
944
+ @overload
945
+ def __init__(__self__,
946
+ resource_name: str,
947
+ opts: Optional[pulumi.ResourceOptions] = None,
948
+ address: Optional[pulumi.Input[_builtins.str]] = None,
949
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
950
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
951
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
952
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
953
+ bootstrap: Optional[pulumi.Input[_builtins.bool]] = None,
954
+ ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
955
+ client_cert: Optional[pulumi.Input[_builtins.str]] = None,
956
+ client_key: Optional[pulumi.Input[_builtins.str]] = None,
957
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
958
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
959
+ description: Optional[pulumi.Input[_builtins.str]] = None,
960
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
961
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
962
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
963
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
964
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
965
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
966
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
967
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
968
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
969
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
970
+ path: Optional[pulumi.Input[_builtins.str]] = None,
971
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
972
+ scheme: Optional[pulumi.Input[_builtins.str]] = None,
973
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
974
+ token: Optional[pulumi.Input[_builtins.str]] = None,
975
+ __props__=None):
976
+ """
977
+ ## Example Usage
978
+
979
+ ### Creating a standard backend resource:
980
+ ```python
981
+ import pulumi
982
+ import pulumi_vault as vault
983
+
984
+ test = vault.consul.SecretBackend("test",
985
+ path="consul",
986
+ description="Manages the Consul backend",
987
+ address="127.0.0.1:8500",
988
+ token="4240861b-ce3d-8530-115a-521ff070dd29")
989
+ ```
990
+
991
+ ### Creating a backend resource to bootstrap a new Consul instance:
992
+ ```python
993
+ import pulumi
994
+ import pulumi_vault as vault
995
+
996
+ test = vault.consul.SecretBackend("test",
997
+ path="consul",
998
+ description="Bootstrap the Consul backend",
999
+ address="127.0.0.1:8500",
1000
+ bootstrap=True)
1001
+ ```
1002
+
1003
+ ## Import
1004
+
1005
+ Consul secret backends can be imported using the `path`, e.g.
1006
+
1007
+ ```sh
1008
+ $ pulumi import vault:consul/secretBackend:SecretBackend example consul
1009
+ ```
1010
+
1011
+ :param str resource_name: The name of the resource.
1012
+ :param pulumi.ResourceOptions opts: Options for the resource.
1013
+ :param pulumi.Input[_builtins.str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
1014
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1015
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1016
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1017
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1018
+ :param pulumi.Input[_builtins.bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
1019
+ :param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
1020
+ :param pulumi.Input[_builtins.str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
1021
+ this is set you need to also set client_key.
1022
+ :param pulumi.Input[_builtins.str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
1023
+ you need to also set client_cert.
1024
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
1025
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1026
+ :param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
1027
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1028
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1029
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1030
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1031
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1032
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1033
+ :param pulumi.Input[_builtins.bool] local: Specifies if the secret backend is local only
1034
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
1035
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
1036
+ The value should not contain leading or trailing forward slashes.
1037
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1038
+ *Available only for Vault Enterprise*.
1039
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1040
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1041
+ :param pulumi.Input[_builtins.str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
1042
+ to `consul`.
1043
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1044
+ :param pulumi.Input[_builtins.str] scheme: Specifies the URL scheme to use. Defaults to `http`.
1045
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1046
+ :param pulumi.Input[_builtins.str] token: Specifies the Consul token to use when managing or issuing new tokens.
1047
+ """
1048
+ ...
1049
+ @overload
1050
+ def __init__(__self__,
1051
+ resource_name: str,
1052
+ args: SecretBackendArgs,
1053
+ opts: Optional[pulumi.ResourceOptions] = None):
1054
+ """
1055
+ ## Example Usage
1056
+
1057
+ ### Creating a standard backend resource:
1058
+ ```python
1059
+ import pulumi
1060
+ import pulumi_vault as vault
1061
+
1062
+ test = vault.consul.SecretBackend("test",
1063
+ path="consul",
1064
+ description="Manages the Consul backend",
1065
+ address="127.0.0.1:8500",
1066
+ token="4240861b-ce3d-8530-115a-521ff070dd29")
1067
+ ```
1068
+
1069
+ ### Creating a backend resource to bootstrap a new Consul instance:
1070
+ ```python
1071
+ import pulumi
1072
+ import pulumi_vault as vault
1073
+
1074
+ test = vault.consul.SecretBackend("test",
1075
+ path="consul",
1076
+ description="Bootstrap the Consul backend",
1077
+ address="127.0.0.1:8500",
1078
+ bootstrap=True)
1079
+ ```
1080
+
1081
+ ## Import
1082
+
1083
+ Consul secret backends can be imported using the `path`, e.g.
1084
+
1085
+ ```sh
1086
+ $ pulumi import vault:consul/secretBackend:SecretBackend example consul
1087
+ ```
1088
+
1089
+ :param str resource_name: The name of the resource.
1090
+ :param SecretBackendArgs args: The arguments to use to populate this resource's properties.
1091
+ :param pulumi.ResourceOptions opts: Options for the resource.
1092
+ """
1093
+ ...
1094
+ def __init__(__self__, resource_name: str, *args, **kwargs):
1095
+ resource_args, opts = _utilities.get_resource_args_opts(SecretBackendArgs, pulumi.ResourceOptions, *args, **kwargs)
1096
+ if resource_args is not None:
1097
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
1098
+ else:
1099
+ __self__._internal_init(resource_name, *args, **kwargs)
1100
+
1101
+ def _internal_init(__self__,
1102
+ resource_name: str,
1103
+ opts: Optional[pulumi.ResourceOptions] = None,
1104
+ address: Optional[pulumi.Input[_builtins.str]] = None,
1105
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1106
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1107
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1108
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1109
+ bootstrap: Optional[pulumi.Input[_builtins.bool]] = None,
1110
+ ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
1111
+ client_cert: Optional[pulumi.Input[_builtins.str]] = None,
1112
+ client_key: Optional[pulumi.Input[_builtins.str]] = None,
1113
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1114
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1115
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1116
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1117
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1118
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1119
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1120
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1121
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1122
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1123
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1124
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1125
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1126
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1127
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1128
+ scheme: Optional[pulumi.Input[_builtins.str]] = None,
1129
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1130
+ token: Optional[pulumi.Input[_builtins.str]] = None,
1131
+ __props__=None):
1132
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
1133
+ if not isinstance(opts, pulumi.ResourceOptions):
1134
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
1135
+ if opts.id is None:
1136
+ if __props__ is not None:
1137
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
1138
+ __props__ = SecretBackendArgs.__new__(SecretBackendArgs)
1139
+
1140
+ if address is None and not opts.urn:
1141
+ raise TypeError("Missing required property 'address'")
1142
+ __props__.__dict__["address"] = address
1143
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1144
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1145
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1146
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
1147
+ __props__.__dict__["bootstrap"] = bootstrap
1148
+ __props__.__dict__["ca_cert"] = ca_cert
1149
+ __props__.__dict__["client_cert"] = None if client_cert is None else pulumi.Output.secret(client_cert)
1150
+ __props__.__dict__["client_key"] = None if client_key is None else pulumi.Output.secret(client_key)
1151
+ __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1152
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
1153
+ __props__.__dict__["description"] = description
1154
+ __props__.__dict__["disable_remount"] = disable_remount
1155
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1156
+ __props__.__dict__["force_no_cache"] = force_no_cache
1157
+ __props__.__dict__["identity_token_key"] = identity_token_key
1158
+ __props__.__dict__["listing_visibility"] = listing_visibility
1159
+ __props__.__dict__["local"] = local
1160
+ __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
1161
+ __props__.__dict__["namespace"] = namespace
1162
+ __props__.__dict__["options"] = options
1163
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
1164
+ __props__.__dict__["path"] = path
1165
+ __props__.__dict__["plugin_version"] = plugin_version
1166
+ __props__.__dict__["scheme"] = scheme
1167
+ __props__.__dict__["seal_wrap"] = seal_wrap
1168
+ __props__.__dict__["token"] = None if token is None else pulumi.Output.secret(token)
1169
+ __props__.__dict__["accessor"] = None
1170
+ secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["clientCert", "clientKey", "token"])
1171
+ opts = pulumi.ResourceOptions.merge(opts, secret_opts)
1172
+ super(SecretBackend, __self__).__init__(
1173
+ 'vault:consul/secretBackend:SecretBackend',
1174
+ resource_name,
1175
+ __props__,
1176
+ opts)
1177
+
1178
+ @staticmethod
1179
+ def get(resource_name: str,
1180
+ id: pulumi.Input[str],
1181
+ opts: Optional[pulumi.ResourceOptions] = None,
1182
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
1183
+ address: Optional[pulumi.Input[_builtins.str]] = None,
1184
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1185
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1186
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1187
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1188
+ bootstrap: Optional[pulumi.Input[_builtins.bool]] = None,
1189
+ ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
1190
+ client_cert: Optional[pulumi.Input[_builtins.str]] = None,
1191
+ client_key: Optional[pulumi.Input[_builtins.str]] = None,
1192
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1193
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1194
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1195
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1196
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1197
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1198
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1199
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1200
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1201
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1202
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1203
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1204
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1205
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1206
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1207
+ scheme: Optional[pulumi.Input[_builtins.str]] = None,
1208
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1209
+ token: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackend':
1210
+ """
1211
+ Get an existing SecretBackend resource's state with the given name, id, and optional extra
1212
+ properties used to qualify the lookup.
1213
+
1214
+ :param str resource_name: The unique name of the resulting resource.
1215
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
1216
+ :param pulumi.ResourceOptions opts: Options for the resource.
1217
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
1218
+ :param pulumi.Input[_builtins.str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
1219
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1220
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1221
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1222
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1223
+ :param pulumi.Input[_builtins.bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
1224
+ :param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
1225
+ :param pulumi.Input[_builtins.str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
1226
+ this is set you need to also set client_key.
1227
+ :param pulumi.Input[_builtins.str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
1228
+ you need to also set client_cert.
1229
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
1230
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1231
+ :param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
1232
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1233
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1234
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1235
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1236
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1237
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1238
+ :param pulumi.Input[_builtins.bool] local: Specifies if the secret backend is local only
1239
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
1240
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
1241
+ The value should not contain leading or trailing forward slashes.
1242
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1243
+ *Available only for Vault Enterprise*.
1244
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1245
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1246
+ :param pulumi.Input[_builtins.str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
1247
+ to `consul`.
1248
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1249
+ :param pulumi.Input[_builtins.str] scheme: Specifies the URL scheme to use. Defaults to `http`.
1250
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1251
+ :param pulumi.Input[_builtins.str] token: Specifies the Consul token to use when managing or issuing new tokens.
1252
+ """
1253
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
1254
+
1255
+ __props__ = _SecretBackendState.__new__(_SecretBackendState)
1256
+
1257
+ __props__.__dict__["accessor"] = accessor
1258
+ __props__.__dict__["address"] = address
1259
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1260
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1261
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1262
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
1263
+ __props__.__dict__["bootstrap"] = bootstrap
1264
+ __props__.__dict__["ca_cert"] = ca_cert
1265
+ __props__.__dict__["client_cert"] = client_cert
1266
+ __props__.__dict__["client_key"] = client_key
1267
+ __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1268
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
1269
+ __props__.__dict__["description"] = description
1270
+ __props__.__dict__["disable_remount"] = disable_remount
1271
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1272
+ __props__.__dict__["force_no_cache"] = force_no_cache
1273
+ __props__.__dict__["identity_token_key"] = identity_token_key
1274
+ __props__.__dict__["listing_visibility"] = listing_visibility
1275
+ __props__.__dict__["local"] = local
1276
+ __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
1277
+ __props__.__dict__["namespace"] = namespace
1278
+ __props__.__dict__["options"] = options
1279
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
1280
+ __props__.__dict__["path"] = path
1281
+ __props__.__dict__["plugin_version"] = plugin_version
1282
+ __props__.__dict__["scheme"] = scheme
1283
+ __props__.__dict__["seal_wrap"] = seal_wrap
1284
+ __props__.__dict__["token"] = token
1285
+ return SecretBackend(resource_name, opts=opts, __props__=__props__)
1286
+
1287
+ @_builtins.property
1288
+ @pulumi.getter
1289
+ def accessor(self) -> pulumi.Output[_builtins.str]:
1290
+ """
1291
+ Accessor of the mount
1292
+ """
1293
+ return pulumi.get(self, "accessor")
1294
+
1295
+ @_builtins.property
1296
+ @pulumi.getter
1297
+ def address(self) -> pulumi.Output[_builtins.str]:
1298
+ """
1299
+ Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
1300
+ """
1301
+ return pulumi.get(self, "address")
1302
+
1303
+ @_builtins.property
1304
+ @pulumi.getter(name="allowedManagedKeys")
1305
+ def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1306
+ """
1307
+ List of managed key registry entry names that the mount in question is allowed to access
1308
+ """
1309
+ return pulumi.get(self, "allowed_managed_keys")
1310
+
1311
+ @_builtins.property
1312
+ @pulumi.getter(name="allowedResponseHeaders")
1313
+ def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1314
+ """
1315
+ List of headers to allow and pass from the request to the plugin
1316
+ """
1317
+ return pulumi.get(self, "allowed_response_headers")
1318
+
1319
+ @_builtins.property
1320
+ @pulumi.getter(name="auditNonHmacRequestKeys")
1321
+ def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1322
+ """
1323
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1324
+ """
1325
+ return pulumi.get(self, "audit_non_hmac_request_keys")
1326
+
1327
+ @_builtins.property
1328
+ @pulumi.getter(name="auditNonHmacResponseKeys")
1329
+ def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1330
+ """
1331
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1332
+ """
1333
+ return pulumi.get(self, "audit_non_hmac_response_keys")
1334
+
1335
+ @_builtins.property
1336
+ @pulumi.getter
1337
+ def bootstrap(self) -> pulumi.Output[Optional[_builtins.bool]]:
1338
+ """
1339
+ Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
1340
+ """
1341
+ return pulumi.get(self, "bootstrap")
1342
+
1343
+ @_builtins.property
1344
+ @pulumi.getter(name="caCert")
1345
+ def ca_cert(self) -> pulumi.Output[Optional[_builtins.str]]:
1346
+ """
1347
+ CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
1348
+ """
1349
+ return pulumi.get(self, "ca_cert")
1350
+
1351
+ @_builtins.property
1352
+ @pulumi.getter(name="clientCert")
1353
+ def client_cert(self) -> pulumi.Output[Optional[_builtins.str]]:
1354
+ """
1355
+ Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
1356
+ this is set you need to also set client_key.
1357
+ """
1358
+ return pulumi.get(self, "client_cert")
1359
+
1360
+ @_builtins.property
1361
+ @pulumi.getter(name="clientKey")
1362
+ def client_key(self) -> pulumi.Output[Optional[_builtins.str]]:
1363
+ """
1364
+ Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
1365
+ you need to also set client_cert.
1366
+ """
1367
+ return pulumi.get(self, "client_key")
1368
+
1369
+ @_builtins.property
1370
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
1371
+ def default_lease_ttl_seconds(self) -> pulumi.Output[Optional[_builtins.int]]:
1372
+ """
1373
+ Default lease duration for secrets in seconds
1374
+ """
1375
+ return pulumi.get(self, "default_lease_ttl_seconds")
1376
+
1377
+ @_builtins.property
1378
+ @pulumi.getter(name="delegatedAuthAccessors")
1379
+ def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1380
+ """
1381
+ List of headers to allow and pass from the request to the plugin
1382
+ """
1383
+ return pulumi.get(self, "delegated_auth_accessors")
1384
+
1385
+ @_builtins.property
1386
+ @pulumi.getter
1387
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
1388
+ """
1389
+ A human-friendly description for this backend.
1390
+ """
1391
+ return pulumi.get(self, "description")
1392
+
1393
+ @_builtins.property
1394
+ @pulumi.getter(name="disableRemount")
1395
+ def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
1396
+ """
1397
+ If set, opts out of mount migration on path updates.
1398
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1399
+ """
1400
+ return pulumi.get(self, "disable_remount")
1401
+
1402
+ @_builtins.property
1403
+ @pulumi.getter(name="externalEntropyAccess")
1404
+ def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
1405
+ """
1406
+ Enable the secrets engine to access Vault's external entropy source
1407
+ """
1408
+ return pulumi.get(self, "external_entropy_access")
1409
+
1410
+ @_builtins.property
1411
+ @pulumi.getter(name="forceNoCache")
1412
+ def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
1413
+ """
1414
+ If set to true, disables caching.
1415
+ """
1416
+ return pulumi.get(self, "force_no_cache")
1417
+
1418
+ @_builtins.property
1419
+ @pulumi.getter(name="identityTokenKey")
1420
+ def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
1421
+ """
1422
+ The key to use for signing plugin workload identity tokens
1423
+ """
1424
+ return pulumi.get(self, "identity_token_key")
1425
+
1426
+ @_builtins.property
1427
+ @pulumi.getter(name="listingVisibility")
1428
+ def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
1429
+ """
1430
+ Specifies whether to show this mount in the UI-specific listing endpoint
1431
+ """
1432
+ return pulumi.get(self, "listing_visibility")
1433
+
1434
+ @_builtins.property
1435
+ @pulumi.getter
1436
+ def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
1437
+ """
1438
+ Specifies if the secret backend is local only
1439
+ """
1440
+ return pulumi.get(self, "local")
1441
+
1442
+ @_builtins.property
1443
+ @pulumi.getter(name="maxLeaseTtlSeconds")
1444
+ def max_lease_ttl_seconds(self) -> pulumi.Output[Optional[_builtins.int]]:
1445
+ """
1446
+ Maximum possible lease duration for secrets in seconds
1447
+ """
1448
+ return pulumi.get(self, "max_lease_ttl_seconds")
1449
+
1450
+ @_builtins.property
1451
+ @pulumi.getter
1452
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
1453
+ """
1454
+ The namespace to provision the resource in.
1455
+ The value should not contain leading or trailing forward slashes.
1456
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1457
+ *Available only for Vault Enterprise*.
1458
+ """
1459
+ return pulumi.get(self, "namespace")
1460
+
1461
+ @_builtins.property
1462
+ @pulumi.getter
1463
+ def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
1464
+ """
1465
+ Specifies mount type specific options that are passed to the backend
1466
+ """
1467
+ return pulumi.get(self, "options")
1468
+
1469
+ @_builtins.property
1470
+ @pulumi.getter(name="passthroughRequestHeaders")
1471
+ def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1472
+ """
1473
+ List of headers to allow and pass from the request to the plugin
1474
+ """
1475
+ return pulumi.get(self, "passthrough_request_headers")
1476
+
1477
+ @_builtins.property
1478
+ @pulumi.getter
1479
+ def path(self) -> pulumi.Output[Optional[_builtins.str]]:
1480
+ """
1481
+ The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
1482
+ to `consul`.
1483
+ """
1484
+ return pulumi.get(self, "path")
1485
+
1486
+ @_builtins.property
1487
+ @pulumi.getter(name="pluginVersion")
1488
+ def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
1489
+ """
1490
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1491
+ """
1492
+ return pulumi.get(self, "plugin_version")
1493
+
1494
+ @_builtins.property
1495
+ @pulumi.getter
1496
+ def scheme(self) -> pulumi.Output[Optional[_builtins.str]]:
1497
+ """
1498
+ Specifies the URL scheme to use. Defaults to `http`.
1499
+ """
1500
+ return pulumi.get(self, "scheme")
1501
+
1502
+ @_builtins.property
1503
+ @pulumi.getter(name="sealWrap")
1504
+ def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
1505
+ """
1506
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1507
+ """
1508
+ return pulumi.get(self, "seal_wrap")
1509
+
1510
+ @_builtins.property
1511
+ @pulumi.getter
1512
+ def token(self) -> pulumi.Output[Optional[_builtins.str]]:
1513
+ """
1514
+ Specifies the Consul token to use when managing or issuing new tokens.
1515
+ """
1516
+ return pulumi.get(self, "token")
1517
+