pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,2160 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+ from . import outputs
17
+ from ._inputs import *
18
+
19
+ __all__ = ['SecretsMountArgs', 'SecretsMount']
20
+
21
+ @pulumi.input_type
22
+ class SecretsMountArgs:
23
+ def __init__(__self__, *,
24
+ path: pulumi.Input[_builtins.str],
25
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
28
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
29
+ cassandras: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]]] = None,
30
+ couchbases: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]]] = None,
31
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
32
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
33
+ description: Optional[pulumi.Input[_builtins.str]] = None,
34
+ elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]]] = None,
35
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
36
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
37
+ hanas: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]]] = None,
38
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
39
+ influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]] = None,
40
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
41
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
42
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
43
+ mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]]] = None,
44
+ mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]]] = None,
45
+ mssqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMssqlArgs']]]] = None,
46
+ mysql_auroras: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlAuroraArgs']]]] = None,
47
+ mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlLegacyArgs']]]] = None,
48
+ mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]] = None,
49
+ mysqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]] = None,
50
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
51
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
52
+ oracles: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]] = None,
53
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
54
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
55
+ postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]]] = None,
56
+ redis: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]]] = None,
57
+ redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedisElasticachArgs']]]] = None,
58
+ redshifts: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]]] = None,
59
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
60
+ snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountSnowflakeArgs']]]] = None):
61
+ """
62
+ The set of arguments for constructing a SecretsMount resource.
63
+ :param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
64
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
65
+
66
+ The following arguments are common to all database engines:
67
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
68
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
69
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
70
+ :param pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]] cassandras: A nested block containing configuration options for Cassandra connections.
71
+ *See Configuration Options for more info*
72
+ :param pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]] couchbases: A nested block containing configuration options for Couchbase connections.
73
+ *See Configuration Options for more info*
74
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
75
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
76
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
77
+ :param pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]] elasticsearches: A nested block containing configuration options for Elasticsearch connections.
78
+ *See Configuration Options for more info*
79
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
80
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
81
+ :param pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]] hanas: A nested block containing configuration options for SAP HanaDB connections.
82
+ *See Configuration Options for more info*
83
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
84
+ :param pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]] influxdbs: A nested block containing configuration options for InfluxDB connections.
85
+ *See Configuration Options for more info*
86
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
87
+ :param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
88
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
89
+ :param pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
90
+ *See Configuration Options for more info*
91
+ :param pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]] mongodbs: A nested block containing configuration options for MongoDB connections.
92
+ *See Configuration Options for more info*
93
+ :param pulumi.Input[Sequence[pulumi.Input['SecretsMountMssqlArgs']]] mssqls: A nested block containing configuration options for MSSQL connections.
94
+ *See Configuration Options for more info*
95
+ :param pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlAuroraArgs']]] mysql_auroras: A nested block containing configuration options for Aurora MySQL connections.
96
+ *See Configuration Options for more info*
97
+ :param pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlLegacyArgs']]] mysql_legacies: A nested block containing configuration options for legacy MySQL connections.
98
+ *See Configuration Options for more info*
99
+ :param pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]] mysql_rds: A nested block containing configuration options for RDS MySQL connections.
100
+ *See Configuration Options for more info*
101
+ :param pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]] mysqls: A nested block containing configuration options for MySQL connections.
102
+ *See Configuration Options for more info*
103
+ :param pulumi.Input[_builtins.str] namespace: Target namespace. (requires Enterprise)
104
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
105
+ :param pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]] oracles: A nested block containing configuration options for Oracle connections.
106
+ *See Configuration Options for more info*
107
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
108
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
109
+ :param pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]] postgresqls: A nested block containing configuration options for PostgreSQL connections.
110
+ *See Configuration Options for more info*
111
+ :param pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]] redis: A nested block containing configuration options for Redis connections.
112
+ *See Configuration Options for more info*
113
+ :param pulumi.Input[Sequence[pulumi.Input['SecretsMountRedisElasticachArgs']]] redis_elasticaches: A nested block containing configuration options for Redis ElastiCache connections.
114
+ *See Configuration Options for more info*
115
+ :param pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]] redshifts: A nested block containing configuration options for AWS Redshift connections.
116
+ *See Configuration Options for more info*
117
+ :param pulumi.Input[_builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
118
+ :param pulumi.Input[Sequence[pulumi.Input['SecretsMountSnowflakeArgs']]] snowflakes: A nested block containing configuration options for Snowflake connections.
119
+ *See Configuration Options for more info*
120
+ """
121
+ pulumi.set(__self__, "path", path)
122
+ if allowed_managed_keys is not None:
123
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
124
+ if allowed_response_headers is not None:
125
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
126
+ if audit_non_hmac_request_keys is not None:
127
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
128
+ if audit_non_hmac_response_keys is not None:
129
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
130
+ if cassandras is not None:
131
+ pulumi.set(__self__, "cassandras", cassandras)
132
+ if couchbases is not None:
133
+ pulumi.set(__self__, "couchbases", couchbases)
134
+ if default_lease_ttl_seconds is not None:
135
+ pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
136
+ if delegated_auth_accessors is not None:
137
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
138
+ if description is not None:
139
+ pulumi.set(__self__, "description", description)
140
+ if elasticsearches is not None:
141
+ pulumi.set(__self__, "elasticsearches", elasticsearches)
142
+ if external_entropy_access is not None:
143
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
144
+ if force_no_cache is not None:
145
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
146
+ if hanas is not None:
147
+ pulumi.set(__self__, "hanas", hanas)
148
+ if identity_token_key is not None:
149
+ pulumi.set(__self__, "identity_token_key", identity_token_key)
150
+ if influxdbs is not None:
151
+ pulumi.set(__self__, "influxdbs", influxdbs)
152
+ if listing_visibility is not None:
153
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
154
+ if local is not None:
155
+ pulumi.set(__self__, "local", local)
156
+ if max_lease_ttl_seconds is not None:
157
+ pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
158
+ if mongodbatlas is not None:
159
+ pulumi.set(__self__, "mongodbatlas", mongodbatlas)
160
+ if mongodbs is not None:
161
+ pulumi.set(__self__, "mongodbs", mongodbs)
162
+ if mssqls is not None:
163
+ pulumi.set(__self__, "mssqls", mssqls)
164
+ if mysql_auroras is not None:
165
+ pulumi.set(__self__, "mysql_auroras", mysql_auroras)
166
+ if mysql_legacies is not None:
167
+ pulumi.set(__self__, "mysql_legacies", mysql_legacies)
168
+ if mysql_rds is not None:
169
+ pulumi.set(__self__, "mysql_rds", mysql_rds)
170
+ if mysqls is not None:
171
+ pulumi.set(__self__, "mysqls", mysqls)
172
+ if namespace is not None:
173
+ pulumi.set(__self__, "namespace", namespace)
174
+ if options is not None:
175
+ pulumi.set(__self__, "options", options)
176
+ if oracles is not None:
177
+ pulumi.set(__self__, "oracles", oracles)
178
+ if passthrough_request_headers is not None:
179
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
180
+ if plugin_version is not None:
181
+ pulumi.set(__self__, "plugin_version", plugin_version)
182
+ if postgresqls is not None:
183
+ pulumi.set(__self__, "postgresqls", postgresqls)
184
+ if redis is not None:
185
+ pulumi.set(__self__, "redis", redis)
186
+ if redis_elasticaches is not None:
187
+ pulumi.set(__self__, "redis_elasticaches", redis_elasticaches)
188
+ if redshifts is not None:
189
+ pulumi.set(__self__, "redshifts", redshifts)
190
+ if seal_wrap is not None:
191
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
192
+ if snowflakes is not None:
193
+ pulumi.set(__self__, "snowflakes", snowflakes)
194
+
195
+ @_builtins.property
196
+ @pulumi.getter
197
+ def path(self) -> pulumi.Input[_builtins.str]:
198
+ """
199
+ Where the secret backend will be mounted
200
+ """
201
+ return pulumi.get(self, "path")
202
+
203
+ @path.setter
204
+ def path(self, value: pulumi.Input[_builtins.str]):
205
+ pulumi.set(self, "path", value)
206
+
207
+ @_builtins.property
208
+ @pulumi.getter(name="allowedManagedKeys")
209
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
210
+ """
211
+ Set of managed key registry entry names that the mount in question is allowed to access
212
+
213
+ The following arguments are common to all database engines:
214
+ """
215
+ return pulumi.get(self, "allowed_managed_keys")
216
+
217
+ @allowed_managed_keys.setter
218
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
219
+ pulumi.set(self, "allowed_managed_keys", value)
220
+
221
+ @_builtins.property
222
+ @pulumi.getter(name="allowedResponseHeaders")
223
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
224
+ """
225
+ List of headers to allow and pass from the request to the plugin
226
+ """
227
+ return pulumi.get(self, "allowed_response_headers")
228
+
229
+ @allowed_response_headers.setter
230
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
231
+ pulumi.set(self, "allowed_response_headers", value)
232
+
233
+ @_builtins.property
234
+ @pulumi.getter(name="auditNonHmacRequestKeys")
235
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
236
+ """
237
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
238
+ """
239
+ return pulumi.get(self, "audit_non_hmac_request_keys")
240
+
241
+ @audit_non_hmac_request_keys.setter
242
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
243
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
244
+
245
+ @_builtins.property
246
+ @pulumi.getter(name="auditNonHmacResponseKeys")
247
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
248
+ """
249
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
250
+ """
251
+ return pulumi.get(self, "audit_non_hmac_response_keys")
252
+
253
+ @audit_non_hmac_response_keys.setter
254
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
255
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
256
+
257
+ @_builtins.property
258
+ @pulumi.getter
259
+ def cassandras(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]]]:
260
+ """
261
+ A nested block containing configuration options for Cassandra connections.
262
+ *See Configuration Options for more info*
263
+ """
264
+ return pulumi.get(self, "cassandras")
265
+
266
+ @cassandras.setter
267
+ def cassandras(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]]]):
268
+ pulumi.set(self, "cassandras", value)
269
+
270
+ @_builtins.property
271
+ @pulumi.getter
272
+ def couchbases(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]]]:
273
+ """
274
+ A nested block containing configuration options for Couchbase connections.
275
+ *See Configuration Options for more info*
276
+ """
277
+ return pulumi.get(self, "couchbases")
278
+
279
+ @couchbases.setter
280
+ def couchbases(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]]]):
281
+ pulumi.set(self, "couchbases", value)
282
+
283
+ @_builtins.property
284
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
285
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
286
+ """
287
+ Default lease duration for tokens and secrets in seconds
288
+ """
289
+ return pulumi.get(self, "default_lease_ttl_seconds")
290
+
291
+ @default_lease_ttl_seconds.setter
292
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
293
+ pulumi.set(self, "default_lease_ttl_seconds", value)
294
+
295
+ @_builtins.property
296
+ @pulumi.getter(name="delegatedAuthAccessors")
297
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
298
+ """
299
+ List of headers to allow and pass from the request to the plugin
300
+ """
301
+ return pulumi.get(self, "delegated_auth_accessors")
302
+
303
+ @delegated_auth_accessors.setter
304
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
305
+ pulumi.set(self, "delegated_auth_accessors", value)
306
+
307
+ @_builtins.property
308
+ @pulumi.getter
309
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
310
+ """
311
+ Human-friendly description of the mount
312
+ """
313
+ return pulumi.get(self, "description")
314
+
315
+ @description.setter
316
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
317
+ pulumi.set(self, "description", value)
318
+
319
+ @_builtins.property
320
+ @pulumi.getter
321
+ def elasticsearches(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]]]:
322
+ """
323
+ A nested block containing configuration options for Elasticsearch connections.
324
+ *See Configuration Options for more info*
325
+ """
326
+ return pulumi.get(self, "elasticsearches")
327
+
328
+ @elasticsearches.setter
329
+ def elasticsearches(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]]]):
330
+ pulumi.set(self, "elasticsearches", value)
331
+
332
+ @_builtins.property
333
+ @pulumi.getter(name="externalEntropyAccess")
334
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
335
+ """
336
+ Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
337
+ """
338
+ return pulumi.get(self, "external_entropy_access")
339
+
340
+ @external_entropy_access.setter
341
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
342
+ pulumi.set(self, "external_entropy_access", value)
343
+
344
+ @_builtins.property
345
+ @pulumi.getter(name="forceNoCache")
346
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
347
+ """
348
+ If set to true, disables caching.
349
+ """
350
+ return pulumi.get(self, "force_no_cache")
351
+
352
+ @force_no_cache.setter
353
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
354
+ pulumi.set(self, "force_no_cache", value)
355
+
356
+ @_builtins.property
357
+ @pulumi.getter
358
+ def hanas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]]]:
359
+ """
360
+ A nested block containing configuration options for SAP HanaDB connections.
361
+ *See Configuration Options for more info*
362
+ """
363
+ return pulumi.get(self, "hanas")
364
+
365
+ @hanas.setter
366
+ def hanas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]]]):
367
+ pulumi.set(self, "hanas", value)
368
+
369
+ @_builtins.property
370
+ @pulumi.getter(name="identityTokenKey")
371
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
372
+ """
373
+ The key to use for signing plugin workload identity tokens
374
+ """
375
+ return pulumi.get(self, "identity_token_key")
376
+
377
+ @identity_token_key.setter
378
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
379
+ pulumi.set(self, "identity_token_key", value)
380
+
381
+ @_builtins.property
382
+ @pulumi.getter
383
+ def influxdbs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]]:
384
+ """
385
+ A nested block containing configuration options for InfluxDB connections.
386
+ *See Configuration Options for more info*
387
+ """
388
+ return pulumi.get(self, "influxdbs")
389
+
390
+ @influxdbs.setter
391
+ def influxdbs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]]):
392
+ pulumi.set(self, "influxdbs", value)
393
+
394
+ @_builtins.property
395
+ @pulumi.getter(name="listingVisibility")
396
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
397
+ """
398
+ Specifies whether to show this mount in the UI-specific listing endpoint
399
+ """
400
+ return pulumi.get(self, "listing_visibility")
401
+
402
+ @listing_visibility.setter
403
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
404
+ pulumi.set(self, "listing_visibility", value)
405
+
406
+ @_builtins.property
407
+ @pulumi.getter
408
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
409
+ """
410
+ Boolean flag that can be explicitly set to true to enforce local mount in HA environment
411
+ """
412
+ return pulumi.get(self, "local")
413
+
414
+ @local.setter
415
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
416
+ pulumi.set(self, "local", value)
417
+
418
+ @_builtins.property
419
+ @pulumi.getter(name="maxLeaseTtlSeconds")
420
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
421
+ """
422
+ Maximum possible lease duration for tokens and secrets in seconds
423
+ """
424
+ return pulumi.get(self, "max_lease_ttl_seconds")
425
+
426
+ @max_lease_ttl_seconds.setter
427
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
428
+ pulumi.set(self, "max_lease_ttl_seconds", value)
429
+
430
+ @_builtins.property
431
+ @pulumi.getter
432
+ def mongodbatlas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]]]:
433
+ """
434
+ A nested block containing configuration options for MongoDB Atlas connections.
435
+ *See Configuration Options for more info*
436
+ """
437
+ return pulumi.get(self, "mongodbatlas")
438
+
439
+ @mongodbatlas.setter
440
+ def mongodbatlas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]]]):
441
+ pulumi.set(self, "mongodbatlas", value)
442
+
443
+ @_builtins.property
444
+ @pulumi.getter
445
+ def mongodbs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]]]:
446
+ """
447
+ A nested block containing configuration options for MongoDB connections.
448
+ *See Configuration Options for more info*
449
+ """
450
+ return pulumi.get(self, "mongodbs")
451
+
452
+ @mongodbs.setter
453
+ def mongodbs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]]]):
454
+ pulumi.set(self, "mongodbs", value)
455
+
456
+ @_builtins.property
457
+ @pulumi.getter
458
+ def mssqls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMssqlArgs']]]]:
459
+ """
460
+ A nested block containing configuration options for MSSQL connections.
461
+ *See Configuration Options for more info*
462
+ """
463
+ return pulumi.get(self, "mssqls")
464
+
465
+ @mssqls.setter
466
+ def mssqls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMssqlArgs']]]]):
467
+ pulumi.set(self, "mssqls", value)
468
+
469
+ @_builtins.property
470
+ @pulumi.getter(name="mysqlAuroras")
471
+ def mysql_auroras(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlAuroraArgs']]]]:
472
+ """
473
+ A nested block containing configuration options for Aurora MySQL connections.
474
+ *See Configuration Options for more info*
475
+ """
476
+ return pulumi.get(self, "mysql_auroras")
477
+
478
+ @mysql_auroras.setter
479
+ def mysql_auroras(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlAuroraArgs']]]]):
480
+ pulumi.set(self, "mysql_auroras", value)
481
+
482
+ @_builtins.property
483
+ @pulumi.getter(name="mysqlLegacies")
484
+ def mysql_legacies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlLegacyArgs']]]]:
485
+ """
486
+ A nested block containing configuration options for legacy MySQL connections.
487
+ *See Configuration Options for more info*
488
+ """
489
+ return pulumi.get(self, "mysql_legacies")
490
+
491
+ @mysql_legacies.setter
492
+ def mysql_legacies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlLegacyArgs']]]]):
493
+ pulumi.set(self, "mysql_legacies", value)
494
+
495
+ @_builtins.property
496
+ @pulumi.getter(name="mysqlRds")
497
+ def mysql_rds(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]]:
498
+ """
499
+ A nested block containing configuration options for RDS MySQL connections.
500
+ *See Configuration Options for more info*
501
+ """
502
+ return pulumi.get(self, "mysql_rds")
503
+
504
+ @mysql_rds.setter
505
+ def mysql_rds(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]]):
506
+ pulumi.set(self, "mysql_rds", value)
507
+
508
+ @_builtins.property
509
+ @pulumi.getter
510
+ def mysqls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]]:
511
+ """
512
+ A nested block containing configuration options for MySQL connections.
513
+ *See Configuration Options for more info*
514
+ """
515
+ return pulumi.get(self, "mysqls")
516
+
517
+ @mysqls.setter
518
+ def mysqls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]]):
519
+ pulumi.set(self, "mysqls", value)
520
+
521
+ @_builtins.property
522
+ @pulumi.getter
523
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
524
+ """
525
+ Target namespace. (requires Enterprise)
526
+ """
527
+ return pulumi.get(self, "namespace")
528
+
529
+ @namespace.setter
530
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
531
+ pulumi.set(self, "namespace", value)
532
+
533
+ @_builtins.property
534
+ @pulumi.getter
535
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
536
+ """
537
+ Specifies mount type specific options that are passed to the backend
538
+ """
539
+ return pulumi.get(self, "options")
540
+
541
+ @options.setter
542
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
543
+ pulumi.set(self, "options", value)
544
+
545
+ @_builtins.property
546
+ @pulumi.getter
547
+ def oracles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]]:
548
+ """
549
+ A nested block containing configuration options for Oracle connections.
550
+ *See Configuration Options for more info*
551
+ """
552
+ return pulumi.get(self, "oracles")
553
+
554
+ @oracles.setter
555
+ def oracles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]]):
556
+ pulumi.set(self, "oracles", value)
557
+
558
+ @_builtins.property
559
+ @pulumi.getter(name="passthroughRequestHeaders")
560
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
561
+ """
562
+ List of headers to allow and pass from the request to the plugin
563
+ """
564
+ return pulumi.get(self, "passthrough_request_headers")
565
+
566
+ @passthrough_request_headers.setter
567
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
568
+ pulumi.set(self, "passthrough_request_headers", value)
569
+
570
+ @_builtins.property
571
+ @pulumi.getter(name="pluginVersion")
572
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
573
+ """
574
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
575
+ """
576
+ return pulumi.get(self, "plugin_version")
577
+
578
+ @plugin_version.setter
579
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
580
+ pulumi.set(self, "plugin_version", value)
581
+
582
+ @_builtins.property
583
+ @pulumi.getter
584
+ def postgresqls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]]]:
585
+ """
586
+ A nested block containing configuration options for PostgreSQL connections.
587
+ *See Configuration Options for more info*
588
+ """
589
+ return pulumi.get(self, "postgresqls")
590
+
591
+ @postgresqls.setter
592
+ def postgresqls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]]]):
593
+ pulumi.set(self, "postgresqls", value)
594
+
595
+ @_builtins.property
596
+ @pulumi.getter
597
+ def redis(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]]]:
598
+ """
599
+ A nested block containing configuration options for Redis connections.
600
+ *See Configuration Options for more info*
601
+ """
602
+ return pulumi.get(self, "redis")
603
+
604
+ @redis.setter
605
+ def redis(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]]]):
606
+ pulumi.set(self, "redis", value)
607
+
608
+ @_builtins.property
609
+ @pulumi.getter(name="redisElasticaches")
610
+ def redis_elasticaches(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedisElasticachArgs']]]]:
611
+ """
612
+ A nested block containing configuration options for Redis ElastiCache connections.
613
+ *See Configuration Options for more info*
614
+ """
615
+ return pulumi.get(self, "redis_elasticaches")
616
+
617
+ @redis_elasticaches.setter
618
+ def redis_elasticaches(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedisElasticachArgs']]]]):
619
+ pulumi.set(self, "redis_elasticaches", value)
620
+
621
+ @_builtins.property
622
+ @pulumi.getter
623
+ def redshifts(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]]]:
624
+ """
625
+ A nested block containing configuration options for AWS Redshift connections.
626
+ *See Configuration Options for more info*
627
+ """
628
+ return pulumi.get(self, "redshifts")
629
+
630
+ @redshifts.setter
631
+ def redshifts(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]]]):
632
+ pulumi.set(self, "redshifts", value)
633
+
634
+ @_builtins.property
635
+ @pulumi.getter(name="sealWrap")
636
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
637
+ """
638
+ Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
639
+ """
640
+ return pulumi.get(self, "seal_wrap")
641
+
642
+ @seal_wrap.setter
643
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
644
+ pulumi.set(self, "seal_wrap", value)
645
+
646
+ @_builtins.property
647
+ @pulumi.getter
648
+ def snowflakes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountSnowflakeArgs']]]]:
649
+ """
650
+ A nested block containing configuration options for Snowflake connections.
651
+ *See Configuration Options for more info*
652
+ """
653
+ return pulumi.get(self, "snowflakes")
654
+
655
+ @snowflakes.setter
656
+ def snowflakes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountSnowflakeArgs']]]]):
657
+ pulumi.set(self, "snowflakes", value)
658
+
659
+
660
+ @pulumi.input_type
661
+ class _SecretsMountState:
662
+ def __init__(__self__, *,
663
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
664
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
665
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
666
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
667
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
668
+ cassandras: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]]] = None,
669
+ couchbases: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]]] = None,
670
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
671
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
672
+ description: Optional[pulumi.Input[_builtins.str]] = None,
673
+ elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]]] = None,
674
+ engine_count: Optional[pulumi.Input[_builtins.int]] = None,
675
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
676
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
677
+ hanas: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]]] = None,
678
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
679
+ influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]] = None,
680
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
681
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
682
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
683
+ mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]]] = None,
684
+ mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]]] = None,
685
+ mssqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMssqlArgs']]]] = None,
686
+ mysql_auroras: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlAuroraArgs']]]] = None,
687
+ mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlLegacyArgs']]]] = None,
688
+ mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]] = None,
689
+ mysqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]] = None,
690
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
691
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
692
+ oracles: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]] = None,
693
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
694
+ path: Optional[pulumi.Input[_builtins.str]] = None,
695
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
696
+ postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]]] = None,
697
+ redis: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]]] = None,
698
+ redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedisElasticachArgs']]]] = None,
699
+ redshifts: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]]] = None,
700
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
701
+ snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountSnowflakeArgs']]]] = None):
702
+ """
703
+ Input properties used for looking up and filtering SecretsMount resources.
704
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
705
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
706
+
707
+ The following arguments are common to all database engines:
708
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
709
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
710
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
711
+ :param pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]] cassandras: A nested block containing configuration options for Cassandra connections.
712
+ *See Configuration Options for more info*
713
+ :param pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]] couchbases: A nested block containing configuration options for Couchbase connections.
714
+ *See Configuration Options for more info*
715
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
716
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
717
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
718
+ :param pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]] elasticsearches: A nested block containing configuration options for Elasticsearch connections.
719
+ *See Configuration Options for more info*
720
+ :param pulumi.Input[_builtins.int] engine_count: The total number of database secrets engines configured.
721
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
722
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
723
+ :param pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]] hanas: A nested block containing configuration options for SAP HanaDB connections.
724
+ *See Configuration Options for more info*
725
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
726
+ :param pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]] influxdbs: A nested block containing configuration options for InfluxDB connections.
727
+ *See Configuration Options for more info*
728
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
729
+ :param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
730
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
731
+ :param pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
732
+ *See Configuration Options for more info*
733
+ :param pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]] mongodbs: A nested block containing configuration options for MongoDB connections.
734
+ *See Configuration Options for more info*
735
+ :param pulumi.Input[Sequence[pulumi.Input['SecretsMountMssqlArgs']]] mssqls: A nested block containing configuration options for MSSQL connections.
736
+ *See Configuration Options for more info*
737
+ :param pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlAuroraArgs']]] mysql_auroras: A nested block containing configuration options for Aurora MySQL connections.
738
+ *See Configuration Options for more info*
739
+ :param pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlLegacyArgs']]] mysql_legacies: A nested block containing configuration options for legacy MySQL connections.
740
+ *See Configuration Options for more info*
741
+ :param pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]] mysql_rds: A nested block containing configuration options for RDS MySQL connections.
742
+ *See Configuration Options for more info*
743
+ :param pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]] mysqls: A nested block containing configuration options for MySQL connections.
744
+ *See Configuration Options for more info*
745
+ :param pulumi.Input[_builtins.str] namespace: Target namespace. (requires Enterprise)
746
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
747
+ :param pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]] oracles: A nested block containing configuration options for Oracle connections.
748
+ *See Configuration Options for more info*
749
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
750
+ :param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
751
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
752
+ :param pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]] postgresqls: A nested block containing configuration options for PostgreSQL connections.
753
+ *See Configuration Options for more info*
754
+ :param pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]] redis: A nested block containing configuration options for Redis connections.
755
+ *See Configuration Options for more info*
756
+ :param pulumi.Input[Sequence[pulumi.Input['SecretsMountRedisElasticachArgs']]] redis_elasticaches: A nested block containing configuration options for Redis ElastiCache connections.
757
+ *See Configuration Options for more info*
758
+ :param pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]] redshifts: A nested block containing configuration options for AWS Redshift connections.
759
+ *See Configuration Options for more info*
760
+ :param pulumi.Input[_builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
761
+ :param pulumi.Input[Sequence[pulumi.Input['SecretsMountSnowflakeArgs']]] snowflakes: A nested block containing configuration options for Snowflake connections.
762
+ *See Configuration Options for more info*
763
+ """
764
+ if accessor is not None:
765
+ pulumi.set(__self__, "accessor", accessor)
766
+ if allowed_managed_keys is not None:
767
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
768
+ if allowed_response_headers is not None:
769
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
770
+ if audit_non_hmac_request_keys is not None:
771
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
772
+ if audit_non_hmac_response_keys is not None:
773
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
774
+ if cassandras is not None:
775
+ pulumi.set(__self__, "cassandras", cassandras)
776
+ if couchbases is not None:
777
+ pulumi.set(__self__, "couchbases", couchbases)
778
+ if default_lease_ttl_seconds is not None:
779
+ pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
780
+ if delegated_auth_accessors is not None:
781
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
782
+ if description is not None:
783
+ pulumi.set(__self__, "description", description)
784
+ if elasticsearches is not None:
785
+ pulumi.set(__self__, "elasticsearches", elasticsearches)
786
+ if engine_count is not None:
787
+ pulumi.set(__self__, "engine_count", engine_count)
788
+ if external_entropy_access is not None:
789
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
790
+ if force_no_cache is not None:
791
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
792
+ if hanas is not None:
793
+ pulumi.set(__self__, "hanas", hanas)
794
+ if identity_token_key is not None:
795
+ pulumi.set(__self__, "identity_token_key", identity_token_key)
796
+ if influxdbs is not None:
797
+ pulumi.set(__self__, "influxdbs", influxdbs)
798
+ if listing_visibility is not None:
799
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
800
+ if local is not None:
801
+ pulumi.set(__self__, "local", local)
802
+ if max_lease_ttl_seconds is not None:
803
+ pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
804
+ if mongodbatlas is not None:
805
+ pulumi.set(__self__, "mongodbatlas", mongodbatlas)
806
+ if mongodbs is not None:
807
+ pulumi.set(__self__, "mongodbs", mongodbs)
808
+ if mssqls is not None:
809
+ pulumi.set(__self__, "mssqls", mssqls)
810
+ if mysql_auroras is not None:
811
+ pulumi.set(__self__, "mysql_auroras", mysql_auroras)
812
+ if mysql_legacies is not None:
813
+ pulumi.set(__self__, "mysql_legacies", mysql_legacies)
814
+ if mysql_rds is not None:
815
+ pulumi.set(__self__, "mysql_rds", mysql_rds)
816
+ if mysqls is not None:
817
+ pulumi.set(__self__, "mysqls", mysqls)
818
+ if namespace is not None:
819
+ pulumi.set(__self__, "namespace", namespace)
820
+ if options is not None:
821
+ pulumi.set(__self__, "options", options)
822
+ if oracles is not None:
823
+ pulumi.set(__self__, "oracles", oracles)
824
+ if passthrough_request_headers is not None:
825
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
826
+ if path is not None:
827
+ pulumi.set(__self__, "path", path)
828
+ if plugin_version is not None:
829
+ pulumi.set(__self__, "plugin_version", plugin_version)
830
+ if postgresqls is not None:
831
+ pulumi.set(__self__, "postgresqls", postgresqls)
832
+ if redis is not None:
833
+ pulumi.set(__self__, "redis", redis)
834
+ if redis_elasticaches is not None:
835
+ pulumi.set(__self__, "redis_elasticaches", redis_elasticaches)
836
+ if redshifts is not None:
837
+ pulumi.set(__self__, "redshifts", redshifts)
838
+ if seal_wrap is not None:
839
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
840
+ if snowflakes is not None:
841
+ pulumi.set(__self__, "snowflakes", snowflakes)
842
+
843
+ @_builtins.property
844
+ @pulumi.getter
845
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
846
+ """
847
+ Accessor of the mount
848
+ """
849
+ return pulumi.get(self, "accessor")
850
+
851
+ @accessor.setter
852
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
853
+ pulumi.set(self, "accessor", value)
854
+
855
+ @_builtins.property
856
+ @pulumi.getter(name="allowedManagedKeys")
857
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
858
+ """
859
+ Set of managed key registry entry names that the mount in question is allowed to access
860
+
861
+ The following arguments are common to all database engines:
862
+ """
863
+ return pulumi.get(self, "allowed_managed_keys")
864
+
865
+ @allowed_managed_keys.setter
866
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
867
+ pulumi.set(self, "allowed_managed_keys", value)
868
+
869
+ @_builtins.property
870
+ @pulumi.getter(name="allowedResponseHeaders")
871
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
872
+ """
873
+ List of headers to allow and pass from the request to the plugin
874
+ """
875
+ return pulumi.get(self, "allowed_response_headers")
876
+
877
+ @allowed_response_headers.setter
878
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
879
+ pulumi.set(self, "allowed_response_headers", value)
880
+
881
+ @_builtins.property
882
+ @pulumi.getter(name="auditNonHmacRequestKeys")
883
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
884
+ """
885
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
886
+ """
887
+ return pulumi.get(self, "audit_non_hmac_request_keys")
888
+
889
+ @audit_non_hmac_request_keys.setter
890
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
891
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
892
+
893
+ @_builtins.property
894
+ @pulumi.getter(name="auditNonHmacResponseKeys")
895
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
896
+ """
897
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
898
+ """
899
+ return pulumi.get(self, "audit_non_hmac_response_keys")
900
+
901
+ @audit_non_hmac_response_keys.setter
902
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
903
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
904
+
905
+ @_builtins.property
906
+ @pulumi.getter
907
+ def cassandras(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]]]:
908
+ """
909
+ A nested block containing configuration options for Cassandra connections.
910
+ *See Configuration Options for more info*
911
+ """
912
+ return pulumi.get(self, "cassandras")
913
+
914
+ @cassandras.setter
915
+ def cassandras(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]]]):
916
+ pulumi.set(self, "cassandras", value)
917
+
918
+ @_builtins.property
919
+ @pulumi.getter
920
+ def couchbases(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]]]:
921
+ """
922
+ A nested block containing configuration options for Couchbase connections.
923
+ *See Configuration Options for more info*
924
+ """
925
+ return pulumi.get(self, "couchbases")
926
+
927
+ @couchbases.setter
928
+ def couchbases(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]]]):
929
+ pulumi.set(self, "couchbases", value)
930
+
931
+ @_builtins.property
932
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
933
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
934
+ """
935
+ Default lease duration for tokens and secrets in seconds
936
+ """
937
+ return pulumi.get(self, "default_lease_ttl_seconds")
938
+
939
+ @default_lease_ttl_seconds.setter
940
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
941
+ pulumi.set(self, "default_lease_ttl_seconds", value)
942
+
943
+ @_builtins.property
944
+ @pulumi.getter(name="delegatedAuthAccessors")
945
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
946
+ """
947
+ List of headers to allow and pass from the request to the plugin
948
+ """
949
+ return pulumi.get(self, "delegated_auth_accessors")
950
+
951
+ @delegated_auth_accessors.setter
952
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
953
+ pulumi.set(self, "delegated_auth_accessors", value)
954
+
955
+ @_builtins.property
956
+ @pulumi.getter
957
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
958
+ """
959
+ Human-friendly description of the mount
960
+ """
961
+ return pulumi.get(self, "description")
962
+
963
+ @description.setter
964
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
965
+ pulumi.set(self, "description", value)
966
+
967
+ @_builtins.property
968
+ @pulumi.getter
969
+ def elasticsearches(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]]]:
970
+ """
971
+ A nested block containing configuration options for Elasticsearch connections.
972
+ *See Configuration Options for more info*
973
+ """
974
+ return pulumi.get(self, "elasticsearches")
975
+
976
+ @elasticsearches.setter
977
+ def elasticsearches(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]]]):
978
+ pulumi.set(self, "elasticsearches", value)
979
+
980
+ @_builtins.property
981
+ @pulumi.getter(name="engineCount")
982
+ def engine_count(self) -> Optional[pulumi.Input[_builtins.int]]:
983
+ """
984
+ The total number of database secrets engines configured.
985
+ """
986
+ return pulumi.get(self, "engine_count")
987
+
988
+ @engine_count.setter
989
+ def engine_count(self, value: Optional[pulumi.Input[_builtins.int]]):
990
+ pulumi.set(self, "engine_count", value)
991
+
992
+ @_builtins.property
993
+ @pulumi.getter(name="externalEntropyAccess")
994
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
995
+ """
996
+ Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
997
+ """
998
+ return pulumi.get(self, "external_entropy_access")
999
+
1000
+ @external_entropy_access.setter
1001
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
1002
+ pulumi.set(self, "external_entropy_access", value)
1003
+
1004
+ @_builtins.property
1005
+ @pulumi.getter(name="forceNoCache")
1006
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
1007
+ """
1008
+ If set to true, disables caching.
1009
+ """
1010
+ return pulumi.get(self, "force_no_cache")
1011
+
1012
+ @force_no_cache.setter
1013
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
1014
+ pulumi.set(self, "force_no_cache", value)
1015
+
1016
+ @_builtins.property
1017
+ @pulumi.getter
1018
+ def hanas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]]]:
1019
+ """
1020
+ A nested block containing configuration options for SAP HanaDB connections.
1021
+ *See Configuration Options for more info*
1022
+ """
1023
+ return pulumi.get(self, "hanas")
1024
+
1025
+ @hanas.setter
1026
+ def hanas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]]]):
1027
+ pulumi.set(self, "hanas", value)
1028
+
1029
+ @_builtins.property
1030
+ @pulumi.getter(name="identityTokenKey")
1031
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
1032
+ """
1033
+ The key to use for signing plugin workload identity tokens
1034
+ """
1035
+ return pulumi.get(self, "identity_token_key")
1036
+
1037
+ @identity_token_key.setter
1038
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
1039
+ pulumi.set(self, "identity_token_key", value)
1040
+
1041
+ @_builtins.property
1042
+ @pulumi.getter
1043
+ def influxdbs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]]:
1044
+ """
1045
+ A nested block containing configuration options for InfluxDB connections.
1046
+ *See Configuration Options for more info*
1047
+ """
1048
+ return pulumi.get(self, "influxdbs")
1049
+
1050
+ @influxdbs.setter
1051
+ def influxdbs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]]):
1052
+ pulumi.set(self, "influxdbs", value)
1053
+
1054
+ @_builtins.property
1055
+ @pulumi.getter(name="listingVisibility")
1056
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
1057
+ """
1058
+ Specifies whether to show this mount in the UI-specific listing endpoint
1059
+ """
1060
+ return pulumi.get(self, "listing_visibility")
1061
+
1062
+ @listing_visibility.setter
1063
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
1064
+ pulumi.set(self, "listing_visibility", value)
1065
+
1066
+ @_builtins.property
1067
+ @pulumi.getter
1068
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
1069
+ """
1070
+ Boolean flag that can be explicitly set to true to enforce local mount in HA environment
1071
+ """
1072
+ return pulumi.get(self, "local")
1073
+
1074
+ @local.setter
1075
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
1076
+ pulumi.set(self, "local", value)
1077
+
1078
+ @_builtins.property
1079
+ @pulumi.getter(name="maxLeaseTtlSeconds")
1080
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
1081
+ """
1082
+ Maximum possible lease duration for tokens and secrets in seconds
1083
+ """
1084
+ return pulumi.get(self, "max_lease_ttl_seconds")
1085
+
1086
+ @max_lease_ttl_seconds.setter
1087
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
1088
+ pulumi.set(self, "max_lease_ttl_seconds", value)
1089
+
1090
+ @_builtins.property
1091
+ @pulumi.getter
1092
+ def mongodbatlas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]]]:
1093
+ """
1094
+ A nested block containing configuration options for MongoDB Atlas connections.
1095
+ *See Configuration Options for more info*
1096
+ """
1097
+ return pulumi.get(self, "mongodbatlas")
1098
+
1099
+ @mongodbatlas.setter
1100
+ def mongodbatlas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]]]):
1101
+ pulumi.set(self, "mongodbatlas", value)
1102
+
1103
+ @_builtins.property
1104
+ @pulumi.getter
1105
+ def mongodbs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]]]:
1106
+ """
1107
+ A nested block containing configuration options for MongoDB connections.
1108
+ *See Configuration Options for more info*
1109
+ """
1110
+ return pulumi.get(self, "mongodbs")
1111
+
1112
+ @mongodbs.setter
1113
+ def mongodbs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbArgs']]]]):
1114
+ pulumi.set(self, "mongodbs", value)
1115
+
1116
+ @_builtins.property
1117
+ @pulumi.getter
1118
+ def mssqls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMssqlArgs']]]]:
1119
+ """
1120
+ A nested block containing configuration options for MSSQL connections.
1121
+ *See Configuration Options for more info*
1122
+ """
1123
+ return pulumi.get(self, "mssqls")
1124
+
1125
+ @mssqls.setter
1126
+ def mssqls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMssqlArgs']]]]):
1127
+ pulumi.set(self, "mssqls", value)
1128
+
1129
+ @_builtins.property
1130
+ @pulumi.getter(name="mysqlAuroras")
1131
+ def mysql_auroras(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlAuroraArgs']]]]:
1132
+ """
1133
+ A nested block containing configuration options for Aurora MySQL connections.
1134
+ *See Configuration Options for more info*
1135
+ """
1136
+ return pulumi.get(self, "mysql_auroras")
1137
+
1138
+ @mysql_auroras.setter
1139
+ def mysql_auroras(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlAuroraArgs']]]]):
1140
+ pulumi.set(self, "mysql_auroras", value)
1141
+
1142
+ @_builtins.property
1143
+ @pulumi.getter(name="mysqlLegacies")
1144
+ def mysql_legacies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlLegacyArgs']]]]:
1145
+ """
1146
+ A nested block containing configuration options for legacy MySQL connections.
1147
+ *See Configuration Options for more info*
1148
+ """
1149
+ return pulumi.get(self, "mysql_legacies")
1150
+
1151
+ @mysql_legacies.setter
1152
+ def mysql_legacies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlLegacyArgs']]]]):
1153
+ pulumi.set(self, "mysql_legacies", value)
1154
+
1155
+ @_builtins.property
1156
+ @pulumi.getter(name="mysqlRds")
1157
+ def mysql_rds(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]]:
1158
+ """
1159
+ A nested block containing configuration options for RDS MySQL connections.
1160
+ *See Configuration Options for more info*
1161
+ """
1162
+ return pulumi.get(self, "mysql_rds")
1163
+
1164
+ @mysql_rds.setter
1165
+ def mysql_rds(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]]):
1166
+ pulumi.set(self, "mysql_rds", value)
1167
+
1168
+ @_builtins.property
1169
+ @pulumi.getter
1170
+ def mysqls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]]:
1171
+ """
1172
+ A nested block containing configuration options for MySQL connections.
1173
+ *See Configuration Options for more info*
1174
+ """
1175
+ return pulumi.get(self, "mysqls")
1176
+
1177
+ @mysqls.setter
1178
+ def mysqls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]]):
1179
+ pulumi.set(self, "mysqls", value)
1180
+
1181
+ @_builtins.property
1182
+ @pulumi.getter
1183
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
1184
+ """
1185
+ Target namespace. (requires Enterprise)
1186
+ """
1187
+ return pulumi.get(self, "namespace")
1188
+
1189
+ @namespace.setter
1190
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
1191
+ pulumi.set(self, "namespace", value)
1192
+
1193
+ @_builtins.property
1194
+ @pulumi.getter
1195
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
1196
+ """
1197
+ Specifies mount type specific options that are passed to the backend
1198
+ """
1199
+ return pulumi.get(self, "options")
1200
+
1201
+ @options.setter
1202
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
1203
+ pulumi.set(self, "options", value)
1204
+
1205
+ @_builtins.property
1206
+ @pulumi.getter
1207
+ def oracles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]]:
1208
+ """
1209
+ A nested block containing configuration options for Oracle connections.
1210
+ *See Configuration Options for more info*
1211
+ """
1212
+ return pulumi.get(self, "oracles")
1213
+
1214
+ @oracles.setter
1215
+ def oracles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]]):
1216
+ pulumi.set(self, "oracles", value)
1217
+
1218
+ @_builtins.property
1219
+ @pulumi.getter(name="passthroughRequestHeaders")
1220
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
1221
+ """
1222
+ List of headers to allow and pass from the request to the plugin
1223
+ """
1224
+ return pulumi.get(self, "passthrough_request_headers")
1225
+
1226
+ @passthrough_request_headers.setter
1227
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
1228
+ pulumi.set(self, "passthrough_request_headers", value)
1229
+
1230
+ @_builtins.property
1231
+ @pulumi.getter
1232
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
1233
+ """
1234
+ Where the secret backend will be mounted
1235
+ """
1236
+ return pulumi.get(self, "path")
1237
+
1238
+ @path.setter
1239
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
1240
+ pulumi.set(self, "path", value)
1241
+
1242
+ @_builtins.property
1243
+ @pulumi.getter(name="pluginVersion")
1244
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
1245
+ """
1246
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1247
+ """
1248
+ return pulumi.get(self, "plugin_version")
1249
+
1250
+ @plugin_version.setter
1251
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
1252
+ pulumi.set(self, "plugin_version", value)
1253
+
1254
+ @_builtins.property
1255
+ @pulumi.getter
1256
+ def postgresqls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]]]:
1257
+ """
1258
+ A nested block containing configuration options for PostgreSQL connections.
1259
+ *See Configuration Options for more info*
1260
+ """
1261
+ return pulumi.get(self, "postgresqls")
1262
+
1263
+ @postgresqls.setter
1264
+ def postgresqls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]]]):
1265
+ pulumi.set(self, "postgresqls", value)
1266
+
1267
+ @_builtins.property
1268
+ @pulumi.getter
1269
+ def redis(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]]]:
1270
+ """
1271
+ A nested block containing configuration options for Redis connections.
1272
+ *See Configuration Options for more info*
1273
+ """
1274
+ return pulumi.get(self, "redis")
1275
+
1276
+ @redis.setter
1277
+ def redis(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]]]):
1278
+ pulumi.set(self, "redis", value)
1279
+
1280
+ @_builtins.property
1281
+ @pulumi.getter(name="redisElasticaches")
1282
+ def redis_elasticaches(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedisElasticachArgs']]]]:
1283
+ """
1284
+ A nested block containing configuration options for Redis ElastiCache connections.
1285
+ *See Configuration Options for more info*
1286
+ """
1287
+ return pulumi.get(self, "redis_elasticaches")
1288
+
1289
+ @redis_elasticaches.setter
1290
+ def redis_elasticaches(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedisElasticachArgs']]]]):
1291
+ pulumi.set(self, "redis_elasticaches", value)
1292
+
1293
+ @_builtins.property
1294
+ @pulumi.getter
1295
+ def redshifts(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]]]:
1296
+ """
1297
+ A nested block containing configuration options for AWS Redshift connections.
1298
+ *See Configuration Options for more info*
1299
+ """
1300
+ return pulumi.get(self, "redshifts")
1301
+
1302
+ @redshifts.setter
1303
+ def redshifts(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedshiftArgs']]]]):
1304
+ pulumi.set(self, "redshifts", value)
1305
+
1306
+ @_builtins.property
1307
+ @pulumi.getter(name="sealWrap")
1308
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
1309
+ """
1310
+ Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1311
+ """
1312
+ return pulumi.get(self, "seal_wrap")
1313
+
1314
+ @seal_wrap.setter
1315
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
1316
+ pulumi.set(self, "seal_wrap", value)
1317
+
1318
+ @_builtins.property
1319
+ @pulumi.getter
1320
+ def snowflakes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountSnowflakeArgs']]]]:
1321
+ """
1322
+ A nested block containing configuration options for Snowflake connections.
1323
+ *See Configuration Options for more info*
1324
+ """
1325
+ return pulumi.get(self, "snowflakes")
1326
+
1327
+ @snowflakes.setter
1328
+ def snowflakes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountSnowflakeArgs']]]]):
1329
+ pulumi.set(self, "snowflakes", value)
1330
+
1331
+
1332
+ @pulumi.type_token("vault:database/secretsMount:SecretsMount")
1333
+ class SecretsMount(pulumi.CustomResource):
1334
+ @overload
1335
+ def __init__(__self__,
1336
+ resource_name: str,
1337
+ opts: Optional[pulumi.ResourceOptions] = None,
1338
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1339
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1340
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1341
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1342
+ cassandras: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCassandraArgs', 'SecretsMountCassandraArgsDict']]]]] = None,
1343
+ couchbases: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCouchbaseArgs', 'SecretsMountCouchbaseArgsDict']]]]] = None,
1344
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1345
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1346
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1347
+ elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountElasticsearchArgs', 'SecretsMountElasticsearchArgsDict']]]]] = None,
1348
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1349
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1350
+ hanas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountHanaArgs', 'SecretsMountHanaArgsDict']]]]] = None,
1351
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1352
+ influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountInfluxdbArgs', 'SecretsMountInfluxdbArgsDict']]]]] = None,
1353
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1354
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1355
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1356
+ mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbatlaArgs', 'SecretsMountMongodbatlaArgsDict']]]]] = None,
1357
+ mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbArgs', 'SecretsMountMongodbArgsDict']]]]] = None,
1358
+ mssqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMssqlArgs', 'SecretsMountMssqlArgsDict']]]]] = None,
1359
+ mysql_auroras: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlAuroraArgs', 'SecretsMountMysqlAuroraArgsDict']]]]] = None,
1360
+ mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlLegacyArgs', 'SecretsMountMysqlLegacyArgsDict']]]]] = None,
1361
+ mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]]] = None,
1362
+ mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]]] = None,
1363
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1364
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1365
+ oracles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]]] = None,
1366
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1367
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1368
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1369
+ postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountPostgresqlArgs', 'SecretsMountPostgresqlArgsDict']]]]] = None,
1370
+ redis: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRediArgs', 'SecretsMountRediArgsDict']]]]] = None,
1371
+ redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedisElasticachArgs', 'SecretsMountRedisElasticachArgsDict']]]]] = None,
1372
+ redshifts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedshiftArgs', 'SecretsMountRedshiftArgsDict']]]]] = None,
1373
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1374
+ snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountSnowflakeArgs', 'SecretsMountSnowflakeArgsDict']]]]] = None,
1375
+ __props__=None):
1376
+ """
1377
+ ## Example Usage
1378
+
1379
+ ```python
1380
+ import pulumi
1381
+ import pulumi_vault as vault
1382
+
1383
+ db = vault.database.SecretsMount("db",
1384
+ path="db",
1385
+ mssqls=[{
1386
+ "name": "db1",
1387
+ "username": "sa",
1388
+ "password": "super_secret_1",
1389
+ "connection_url": "sqlserver://{{username}}:{{password}}@127.0.0.1:1433",
1390
+ "allowed_roles": ["dev1"],
1391
+ "rotation_schedule": "0 * * * SAT",
1392
+ "rotation_window": 3600,
1393
+ }],
1394
+ postgresqls=[{
1395
+ "name": "db2",
1396
+ "username": "postgres",
1397
+ "password": "super_secret_2",
1398
+ "connection_url": "postgresql://{{username}}:{{password}}@127.0.0.1:5432/postgres",
1399
+ "verify_connection": True,
1400
+ "allowed_roles": ["dev2"],
1401
+ "rotation_schedule": "0 * * * SAT",
1402
+ "rotation_window": 3600,
1403
+ }])
1404
+ dev1 = vault.database.SecretBackendRole("dev1",
1405
+ name="dev1",
1406
+ backend=db.path,
1407
+ db_name=db.mssqls[0].name,
1408
+ creation_statements=[
1409
+ "CREATE LOGIN [{{name}}] WITH PASSWORD = '{{password}}';",
1410
+ "CREATE USER [{{name}}] FOR LOGIN [{{name}}];",
1411
+ "GRANT SELECT ON SCHEMA::dbo TO [{{name}}];",
1412
+ ])
1413
+ dev2 = vault.database.SecretBackendRole("dev2",
1414
+ name="dev2",
1415
+ backend=db.path,
1416
+ db_name=db.postgresqls[0].name,
1417
+ creation_statements=[
1418
+ "CREATE ROLE \\"{{name}}\\" WITH LOGIN PASSWORD '{{password}}' VALID UNTIL '{{expiration}}';",
1419
+ "GRANT SELECT ON ALL TABLES IN SCHEMA public TO \\"{{name}}\\";",
1420
+ ])
1421
+ ```
1422
+
1423
+ ## Ephemeral Attributes Reference
1424
+
1425
+ The following write-only attributes are supported for all DBs that support username/password:
1426
+
1427
+ * `password_wo` - (Optional) The password for the user. Can be updated.
1428
+ **Note**: This property is write-only and will not be read from the API.
1429
+
1430
+ ## Import
1431
+
1432
+ Database secret backend connections can be imported using the `path` e.g.
1433
+
1434
+ ```sh
1435
+ $ pulumi import vault:database/secretsMount:SecretsMount db db
1436
+ ```
1437
+
1438
+ :param str resource_name: The name of the resource.
1439
+ :param pulumi.ResourceOptions opts: Options for the resource.
1440
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
1441
+
1442
+ The following arguments are common to all database engines:
1443
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1444
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1445
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1446
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCassandraArgs', 'SecretsMountCassandraArgsDict']]]] cassandras: A nested block containing configuration options for Cassandra connections.
1447
+ *See Configuration Options for more info*
1448
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCouchbaseArgs', 'SecretsMountCouchbaseArgsDict']]]] couchbases: A nested block containing configuration options for Couchbase connections.
1449
+ *See Configuration Options for more info*
1450
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
1451
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1452
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
1453
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountElasticsearchArgs', 'SecretsMountElasticsearchArgsDict']]]] elasticsearches: A nested block containing configuration options for Elasticsearch connections.
1454
+ *See Configuration Options for more info*
1455
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
1456
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1457
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountHanaArgs', 'SecretsMountHanaArgsDict']]]] hanas: A nested block containing configuration options for SAP HanaDB connections.
1458
+ *See Configuration Options for more info*
1459
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1460
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountInfluxdbArgs', 'SecretsMountInfluxdbArgsDict']]]] influxdbs: A nested block containing configuration options for InfluxDB connections.
1461
+ *See Configuration Options for more info*
1462
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1463
+ :param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
1464
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
1465
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbatlaArgs', 'SecretsMountMongodbatlaArgsDict']]]] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
1466
+ *See Configuration Options for more info*
1467
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbArgs', 'SecretsMountMongodbArgsDict']]]] mongodbs: A nested block containing configuration options for MongoDB connections.
1468
+ *See Configuration Options for more info*
1469
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMssqlArgs', 'SecretsMountMssqlArgsDict']]]] mssqls: A nested block containing configuration options for MSSQL connections.
1470
+ *See Configuration Options for more info*
1471
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlAuroraArgs', 'SecretsMountMysqlAuroraArgsDict']]]] mysql_auroras: A nested block containing configuration options for Aurora MySQL connections.
1472
+ *See Configuration Options for more info*
1473
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlLegacyArgs', 'SecretsMountMysqlLegacyArgsDict']]]] mysql_legacies: A nested block containing configuration options for legacy MySQL connections.
1474
+ *See Configuration Options for more info*
1475
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]] mysql_rds: A nested block containing configuration options for RDS MySQL connections.
1476
+ *See Configuration Options for more info*
1477
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]] mysqls: A nested block containing configuration options for MySQL connections.
1478
+ *See Configuration Options for more info*
1479
+ :param pulumi.Input[_builtins.str] namespace: Target namespace. (requires Enterprise)
1480
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1481
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]] oracles: A nested block containing configuration options for Oracle connections.
1482
+ *See Configuration Options for more info*
1483
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1484
+ :param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
1485
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1486
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountPostgresqlArgs', 'SecretsMountPostgresqlArgsDict']]]] postgresqls: A nested block containing configuration options for PostgreSQL connections.
1487
+ *See Configuration Options for more info*
1488
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRediArgs', 'SecretsMountRediArgsDict']]]] redis: A nested block containing configuration options for Redis connections.
1489
+ *See Configuration Options for more info*
1490
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedisElasticachArgs', 'SecretsMountRedisElasticachArgsDict']]]] redis_elasticaches: A nested block containing configuration options for Redis ElastiCache connections.
1491
+ *See Configuration Options for more info*
1492
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedshiftArgs', 'SecretsMountRedshiftArgsDict']]]] redshifts: A nested block containing configuration options for AWS Redshift connections.
1493
+ *See Configuration Options for more info*
1494
+ :param pulumi.Input[_builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1495
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountSnowflakeArgs', 'SecretsMountSnowflakeArgsDict']]]] snowflakes: A nested block containing configuration options for Snowflake connections.
1496
+ *See Configuration Options for more info*
1497
+ """
1498
+ ...
1499
+ @overload
1500
+ def __init__(__self__,
1501
+ resource_name: str,
1502
+ args: SecretsMountArgs,
1503
+ opts: Optional[pulumi.ResourceOptions] = None):
1504
+ """
1505
+ ## Example Usage
1506
+
1507
+ ```python
1508
+ import pulumi
1509
+ import pulumi_vault as vault
1510
+
1511
+ db = vault.database.SecretsMount("db",
1512
+ path="db",
1513
+ mssqls=[{
1514
+ "name": "db1",
1515
+ "username": "sa",
1516
+ "password": "super_secret_1",
1517
+ "connection_url": "sqlserver://{{username}}:{{password}}@127.0.0.1:1433",
1518
+ "allowed_roles": ["dev1"],
1519
+ "rotation_schedule": "0 * * * SAT",
1520
+ "rotation_window": 3600,
1521
+ }],
1522
+ postgresqls=[{
1523
+ "name": "db2",
1524
+ "username": "postgres",
1525
+ "password": "super_secret_2",
1526
+ "connection_url": "postgresql://{{username}}:{{password}}@127.0.0.1:5432/postgres",
1527
+ "verify_connection": True,
1528
+ "allowed_roles": ["dev2"],
1529
+ "rotation_schedule": "0 * * * SAT",
1530
+ "rotation_window": 3600,
1531
+ }])
1532
+ dev1 = vault.database.SecretBackendRole("dev1",
1533
+ name="dev1",
1534
+ backend=db.path,
1535
+ db_name=db.mssqls[0].name,
1536
+ creation_statements=[
1537
+ "CREATE LOGIN [{{name}}] WITH PASSWORD = '{{password}}';",
1538
+ "CREATE USER [{{name}}] FOR LOGIN [{{name}}];",
1539
+ "GRANT SELECT ON SCHEMA::dbo TO [{{name}}];",
1540
+ ])
1541
+ dev2 = vault.database.SecretBackendRole("dev2",
1542
+ name="dev2",
1543
+ backend=db.path,
1544
+ db_name=db.postgresqls[0].name,
1545
+ creation_statements=[
1546
+ "CREATE ROLE \\"{{name}}\\" WITH LOGIN PASSWORD '{{password}}' VALID UNTIL '{{expiration}}';",
1547
+ "GRANT SELECT ON ALL TABLES IN SCHEMA public TO \\"{{name}}\\";",
1548
+ ])
1549
+ ```
1550
+
1551
+ ## Ephemeral Attributes Reference
1552
+
1553
+ The following write-only attributes are supported for all DBs that support username/password:
1554
+
1555
+ * `password_wo` - (Optional) The password for the user. Can be updated.
1556
+ **Note**: This property is write-only and will not be read from the API.
1557
+
1558
+ ## Import
1559
+
1560
+ Database secret backend connections can be imported using the `path` e.g.
1561
+
1562
+ ```sh
1563
+ $ pulumi import vault:database/secretsMount:SecretsMount db db
1564
+ ```
1565
+
1566
+ :param str resource_name: The name of the resource.
1567
+ :param SecretsMountArgs args: The arguments to use to populate this resource's properties.
1568
+ :param pulumi.ResourceOptions opts: Options for the resource.
1569
+ """
1570
+ ...
1571
+ def __init__(__self__, resource_name: str, *args, **kwargs):
1572
+ resource_args, opts = _utilities.get_resource_args_opts(SecretsMountArgs, pulumi.ResourceOptions, *args, **kwargs)
1573
+ if resource_args is not None:
1574
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
1575
+ else:
1576
+ __self__._internal_init(resource_name, *args, **kwargs)
1577
+
1578
+ def _internal_init(__self__,
1579
+ resource_name: str,
1580
+ opts: Optional[pulumi.ResourceOptions] = None,
1581
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1582
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1583
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1584
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1585
+ cassandras: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCassandraArgs', 'SecretsMountCassandraArgsDict']]]]] = None,
1586
+ couchbases: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCouchbaseArgs', 'SecretsMountCouchbaseArgsDict']]]]] = None,
1587
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1588
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1589
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1590
+ elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountElasticsearchArgs', 'SecretsMountElasticsearchArgsDict']]]]] = None,
1591
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1592
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1593
+ hanas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountHanaArgs', 'SecretsMountHanaArgsDict']]]]] = None,
1594
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1595
+ influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountInfluxdbArgs', 'SecretsMountInfluxdbArgsDict']]]]] = None,
1596
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1597
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1598
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1599
+ mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbatlaArgs', 'SecretsMountMongodbatlaArgsDict']]]]] = None,
1600
+ mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbArgs', 'SecretsMountMongodbArgsDict']]]]] = None,
1601
+ mssqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMssqlArgs', 'SecretsMountMssqlArgsDict']]]]] = None,
1602
+ mysql_auroras: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlAuroraArgs', 'SecretsMountMysqlAuroraArgsDict']]]]] = None,
1603
+ mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlLegacyArgs', 'SecretsMountMysqlLegacyArgsDict']]]]] = None,
1604
+ mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]]] = None,
1605
+ mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]]] = None,
1606
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1607
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1608
+ oracles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]]] = None,
1609
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1610
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1611
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1612
+ postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountPostgresqlArgs', 'SecretsMountPostgresqlArgsDict']]]]] = None,
1613
+ redis: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRediArgs', 'SecretsMountRediArgsDict']]]]] = None,
1614
+ redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedisElasticachArgs', 'SecretsMountRedisElasticachArgsDict']]]]] = None,
1615
+ redshifts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedshiftArgs', 'SecretsMountRedshiftArgsDict']]]]] = None,
1616
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1617
+ snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountSnowflakeArgs', 'SecretsMountSnowflakeArgsDict']]]]] = None,
1618
+ __props__=None):
1619
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
1620
+ if not isinstance(opts, pulumi.ResourceOptions):
1621
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
1622
+ if opts.id is None:
1623
+ if __props__ is not None:
1624
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
1625
+ __props__ = SecretsMountArgs.__new__(SecretsMountArgs)
1626
+
1627
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1628
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1629
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1630
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
1631
+ __props__.__dict__["cassandras"] = cassandras
1632
+ __props__.__dict__["couchbases"] = couchbases
1633
+ __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1634
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
1635
+ __props__.__dict__["description"] = description
1636
+ __props__.__dict__["elasticsearches"] = elasticsearches
1637
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1638
+ __props__.__dict__["force_no_cache"] = force_no_cache
1639
+ __props__.__dict__["hanas"] = hanas
1640
+ __props__.__dict__["identity_token_key"] = identity_token_key
1641
+ __props__.__dict__["influxdbs"] = influxdbs
1642
+ __props__.__dict__["listing_visibility"] = listing_visibility
1643
+ __props__.__dict__["local"] = local
1644
+ __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
1645
+ __props__.__dict__["mongodbatlas"] = mongodbatlas
1646
+ __props__.__dict__["mongodbs"] = mongodbs
1647
+ __props__.__dict__["mssqls"] = mssqls
1648
+ __props__.__dict__["mysql_auroras"] = mysql_auroras
1649
+ __props__.__dict__["mysql_legacies"] = mysql_legacies
1650
+ __props__.__dict__["mysql_rds"] = mysql_rds
1651
+ __props__.__dict__["mysqls"] = mysqls
1652
+ __props__.__dict__["namespace"] = namespace
1653
+ __props__.__dict__["options"] = options
1654
+ __props__.__dict__["oracles"] = oracles
1655
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
1656
+ if path is None and not opts.urn:
1657
+ raise TypeError("Missing required property 'path'")
1658
+ __props__.__dict__["path"] = path
1659
+ __props__.__dict__["plugin_version"] = plugin_version
1660
+ __props__.__dict__["postgresqls"] = postgresqls
1661
+ __props__.__dict__["redis"] = redis
1662
+ __props__.__dict__["redis_elasticaches"] = redis_elasticaches
1663
+ __props__.__dict__["redshifts"] = redshifts
1664
+ __props__.__dict__["seal_wrap"] = seal_wrap
1665
+ __props__.__dict__["snowflakes"] = snowflakes
1666
+ __props__.__dict__["accessor"] = None
1667
+ __props__.__dict__["engine_count"] = None
1668
+ super(SecretsMount, __self__).__init__(
1669
+ 'vault:database/secretsMount:SecretsMount',
1670
+ resource_name,
1671
+ __props__,
1672
+ opts)
1673
+
1674
+ @staticmethod
1675
+ def get(resource_name: str,
1676
+ id: pulumi.Input[str],
1677
+ opts: Optional[pulumi.ResourceOptions] = None,
1678
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
1679
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1680
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1681
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1682
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1683
+ cassandras: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCassandraArgs', 'SecretsMountCassandraArgsDict']]]]] = None,
1684
+ couchbases: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCouchbaseArgs', 'SecretsMountCouchbaseArgsDict']]]]] = None,
1685
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1686
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1687
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1688
+ elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountElasticsearchArgs', 'SecretsMountElasticsearchArgsDict']]]]] = None,
1689
+ engine_count: Optional[pulumi.Input[_builtins.int]] = None,
1690
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1691
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1692
+ hanas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountHanaArgs', 'SecretsMountHanaArgsDict']]]]] = None,
1693
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1694
+ influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountInfluxdbArgs', 'SecretsMountInfluxdbArgsDict']]]]] = None,
1695
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1696
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1697
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1698
+ mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbatlaArgs', 'SecretsMountMongodbatlaArgsDict']]]]] = None,
1699
+ mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbArgs', 'SecretsMountMongodbArgsDict']]]]] = None,
1700
+ mssqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMssqlArgs', 'SecretsMountMssqlArgsDict']]]]] = None,
1701
+ mysql_auroras: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlAuroraArgs', 'SecretsMountMysqlAuroraArgsDict']]]]] = None,
1702
+ mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlLegacyArgs', 'SecretsMountMysqlLegacyArgsDict']]]]] = None,
1703
+ mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]]] = None,
1704
+ mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]]] = None,
1705
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1706
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1707
+ oracles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]]] = None,
1708
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1709
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1710
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1711
+ postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountPostgresqlArgs', 'SecretsMountPostgresqlArgsDict']]]]] = None,
1712
+ redis: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRediArgs', 'SecretsMountRediArgsDict']]]]] = None,
1713
+ redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedisElasticachArgs', 'SecretsMountRedisElasticachArgsDict']]]]] = None,
1714
+ redshifts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedshiftArgs', 'SecretsMountRedshiftArgsDict']]]]] = None,
1715
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1716
+ snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountSnowflakeArgs', 'SecretsMountSnowflakeArgsDict']]]]] = None) -> 'SecretsMount':
1717
+ """
1718
+ Get an existing SecretsMount resource's state with the given name, id, and optional extra
1719
+ properties used to qualify the lookup.
1720
+
1721
+ :param str resource_name: The unique name of the resulting resource.
1722
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
1723
+ :param pulumi.ResourceOptions opts: Options for the resource.
1724
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
1725
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
1726
+
1727
+ The following arguments are common to all database engines:
1728
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1729
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1730
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1731
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCassandraArgs', 'SecretsMountCassandraArgsDict']]]] cassandras: A nested block containing configuration options for Cassandra connections.
1732
+ *See Configuration Options for more info*
1733
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCouchbaseArgs', 'SecretsMountCouchbaseArgsDict']]]] couchbases: A nested block containing configuration options for Couchbase connections.
1734
+ *See Configuration Options for more info*
1735
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
1736
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1737
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
1738
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountElasticsearchArgs', 'SecretsMountElasticsearchArgsDict']]]] elasticsearches: A nested block containing configuration options for Elasticsearch connections.
1739
+ *See Configuration Options for more info*
1740
+ :param pulumi.Input[_builtins.int] engine_count: The total number of database secrets engines configured.
1741
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
1742
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1743
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountHanaArgs', 'SecretsMountHanaArgsDict']]]] hanas: A nested block containing configuration options for SAP HanaDB connections.
1744
+ *See Configuration Options for more info*
1745
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1746
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountInfluxdbArgs', 'SecretsMountInfluxdbArgsDict']]]] influxdbs: A nested block containing configuration options for InfluxDB connections.
1747
+ *See Configuration Options for more info*
1748
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1749
+ :param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
1750
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
1751
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbatlaArgs', 'SecretsMountMongodbatlaArgsDict']]]] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
1752
+ *See Configuration Options for more info*
1753
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbArgs', 'SecretsMountMongodbArgsDict']]]] mongodbs: A nested block containing configuration options for MongoDB connections.
1754
+ *See Configuration Options for more info*
1755
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMssqlArgs', 'SecretsMountMssqlArgsDict']]]] mssqls: A nested block containing configuration options for MSSQL connections.
1756
+ *See Configuration Options for more info*
1757
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlAuroraArgs', 'SecretsMountMysqlAuroraArgsDict']]]] mysql_auroras: A nested block containing configuration options for Aurora MySQL connections.
1758
+ *See Configuration Options for more info*
1759
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlLegacyArgs', 'SecretsMountMysqlLegacyArgsDict']]]] mysql_legacies: A nested block containing configuration options for legacy MySQL connections.
1760
+ *See Configuration Options for more info*
1761
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]] mysql_rds: A nested block containing configuration options for RDS MySQL connections.
1762
+ *See Configuration Options for more info*
1763
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]] mysqls: A nested block containing configuration options for MySQL connections.
1764
+ *See Configuration Options for more info*
1765
+ :param pulumi.Input[_builtins.str] namespace: Target namespace. (requires Enterprise)
1766
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1767
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]] oracles: A nested block containing configuration options for Oracle connections.
1768
+ *See Configuration Options for more info*
1769
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1770
+ :param pulumi.Input[_builtins.str] path: Where the secret backend will be mounted
1771
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1772
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountPostgresqlArgs', 'SecretsMountPostgresqlArgsDict']]]] postgresqls: A nested block containing configuration options for PostgreSQL connections.
1773
+ *See Configuration Options for more info*
1774
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRediArgs', 'SecretsMountRediArgsDict']]]] redis: A nested block containing configuration options for Redis connections.
1775
+ *See Configuration Options for more info*
1776
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedisElasticachArgs', 'SecretsMountRedisElasticachArgsDict']]]] redis_elasticaches: A nested block containing configuration options for Redis ElastiCache connections.
1777
+ *See Configuration Options for more info*
1778
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedshiftArgs', 'SecretsMountRedshiftArgsDict']]]] redshifts: A nested block containing configuration options for AWS Redshift connections.
1779
+ *See Configuration Options for more info*
1780
+ :param pulumi.Input[_builtins.bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1781
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountSnowflakeArgs', 'SecretsMountSnowflakeArgsDict']]]] snowflakes: A nested block containing configuration options for Snowflake connections.
1782
+ *See Configuration Options for more info*
1783
+ """
1784
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
1785
+
1786
+ __props__ = _SecretsMountState.__new__(_SecretsMountState)
1787
+
1788
+ __props__.__dict__["accessor"] = accessor
1789
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1790
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1791
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1792
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
1793
+ __props__.__dict__["cassandras"] = cassandras
1794
+ __props__.__dict__["couchbases"] = couchbases
1795
+ __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1796
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
1797
+ __props__.__dict__["description"] = description
1798
+ __props__.__dict__["elasticsearches"] = elasticsearches
1799
+ __props__.__dict__["engine_count"] = engine_count
1800
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1801
+ __props__.__dict__["force_no_cache"] = force_no_cache
1802
+ __props__.__dict__["hanas"] = hanas
1803
+ __props__.__dict__["identity_token_key"] = identity_token_key
1804
+ __props__.__dict__["influxdbs"] = influxdbs
1805
+ __props__.__dict__["listing_visibility"] = listing_visibility
1806
+ __props__.__dict__["local"] = local
1807
+ __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
1808
+ __props__.__dict__["mongodbatlas"] = mongodbatlas
1809
+ __props__.__dict__["mongodbs"] = mongodbs
1810
+ __props__.__dict__["mssqls"] = mssqls
1811
+ __props__.__dict__["mysql_auroras"] = mysql_auroras
1812
+ __props__.__dict__["mysql_legacies"] = mysql_legacies
1813
+ __props__.__dict__["mysql_rds"] = mysql_rds
1814
+ __props__.__dict__["mysqls"] = mysqls
1815
+ __props__.__dict__["namespace"] = namespace
1816
+ __props__.__dict__["options"] = options
1817
+ __props__.__dict__["oracles"] = oracles
1818
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
1819
+ __props__.__dict__["path"] = path
1820
+ __props__.__dict__["plugin_version"] = plugin_version
1821
+ __props__.__dict__["postgresqls"] = postgresqls
1822
+ __props__.__dict__["redis"] = redis
1823
+ __props__.__dict__["redis_elasticaches"] = redis_elasticaches
1824
+ __props__.__dict__["redshifts"] = redshifts
1825
+ __props__.__dict__["seal_wrap"] = seal_wrap
1826
+ __props__.__dict__["snowflakes"] = snowflakes
1827
+ return SecretsMount(resource_name, opts=opts, __props__=__props__)
1828
+
1829
+ @_builtins.property
1830
+ @pulumi.getter
1831
+ def accessor(self) -> pulumi.Output[_builtins.str]:
1832
+ """
1833
+ Accessor of the mount
1834
+ """
1835
+ return pulumi.get(self, "accessor")
1836
+
1837
+ @_builtins.property
1838
+ @pulumi.getter(name="allowedManagedKeys")
1839
+ def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1840
+ """
1841
+ Set of managed key registry entry names that the mount in question is allowed to access
1842
+
1843
+ The following arguments are common to all database engines:
1844
+ """
1845
+ return pulumi.get(self, "allowed_managed_keys")
1846
+
1847
+ @_builtins.property
1848
+ @pulumi.getter(name="allowedResponseHeaders")
1849
+ def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1850
+ """
1851
+ List of headers to allow and pass from the request to the plugin
1852
+ """
1853
+ return pulumi.get(self, "allowed_response_headers")
1854
+
1855
+ @_builtins.property
1856
+ @pulumi.getter(name="auditNonHmacRequestKeys")
1857
+ def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1858
+ """
1859
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1860
+ """
1861
+ return pulumi.get(self, "audit_non_hmac_request_keys")
1862
+
1863
+ @_builtins.property
1864
+ @pulumi.getter(name="auditNonHmacResponseKeys")
1865
+ def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1866
+ """
1867
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1868
+ """
1869
+ return pulumi.get(self, "audit_non_hmac_response_keys")
1870
+
1871
+ @_builtins.property
1872
+ @pulumi.getter
1873
+ def cassandras(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountCassandra']]]:
1874
+ """
1875
+ A nested block containing configuration options for Cassandra connections.
1876
+ *See Configuration Options for more info*
1877
+ """
1878
+ return pulumi.get(self, "cassandras")
1879
+
1880
+ @_builtins.property
1881
+ @pulumi.getter
1882
+ def couchbases(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountCouchbase']]]:
1883
+ """
1884
+ A nested block containing configuration options for Couchbase connections.
1885
+ *See Configuration Options for more info*
1886
+ """
1887
+ return pulumi.get(self, "couchbases")
1888
+
1889
+ @_builtins.property
1890
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
1891
+ def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1892
+ """
1893
+ Default lease duration for tokens and secrets in seconds
1894
+ """
1895
+ return pulumi.get(self, "default_lease_ttl_seconds")
1896
+
1897
+ @_builtins.property
1898
+ @pulumi.getter(name="delegatedAuthAccessors")
1899
+ def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1900
+ """
1901
+ List of headers to allow and pass from the request to the plugin
1902
+ """
1903
+ return pulumi.get(self, "delegated_auth_accessors")
1904
+
1905
+ @_builtins.property
1906
+ @pulumi.getter
1907
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
1908
+ """
1909
+ Human-friendly description of the mount
1910
+ """
1911
+ return pulumi.get(self, "description")
1912
+
1913
+ @_builtins.property
1914
+ @pulumi.getter
1915
+ def elasticsearches(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountElasticsearch']]]:
1916
+ """
1917
+ A nested block containing configuration options for Elasticsearch connections.
1918
+ *See Configuration Options for more info*
1919
+ """
1920
+ return pulumi.get(self, "elasticsearches")
1921
+
1922
+ @_builtins.property
1923
+ @pulumi.getter(name="engineCount")
1924
+ def engine_count(self) -> pulumi.Output[_builtins.int]:
1925
+ """
1926
+ The total number of database secrets engines configured.
1927
+ """
1928
+ return pulumi.get(self, "engine_count")
1929
+
1930
+ @_builtins.property
1931
+ @pulumi.getter(name="externalEntropyAccess")
1932
+ def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
1933
+ """
1934
+ Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
1935
+ """
1936
+ return pulumi.get(self, "external_entropy_access")
1937
+
1938
+ @_builtins.property
1939
+ @pulumi.getter(name="forceNoCache")
1940
+ def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
1941
+ """
1942
+ If set to true, disables caching.
1943
+ """
1944
+ return pulumi.get(self, "force_no_cache")
1945
+
1946
+ @_builtins.property
1947
+ @pulumi.getter
1948
+ def hanas(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountHana']]]:
1949
+ """
1950
+ A nested block containing configuration options for SAP HanaDB connections.
1951
+ *See Configuration Options for more info*
1952
+ """
1953
+ return pulumi.get(self, "hanas")
1954
+
1955
+ @_builtins.property
1956
+ @pulumi.getter(name="identityTokenKey")
1957
+ def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
1958
+ """
1959
+ The key to use for signing plugin workload identity tokens
1960
+ """
1961
+ return pulumi.get(self, "identity_token_key")
1962
+
1963
+ @_builtins.property
1964
+ @pulumi.getter
1965
+ def influxdbs(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountInfluxdb']]]:
1966
+ """
1967
+ A nested block containing configuration options for InfluxDB connections.
1968
+ *See Configuration Options for more info*
1969
+ """
1970
+ return pulumi.get(self, "influxdbs")
1971
+
1972
+ @_builtins.property
1973
+ @pulumi.getter(name="listingVisibility")
1974
+ def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
1975
+ """
1976
+ Specifies whether to show this mount in the UI-specific listing endpoint
1977
+ """
1978
+ return pulumi.get(self, "listing_visibility")
1979
+
1980
+ @_builtins.property
1981
+ @pulumi.getter
1982
+ def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
1983
+ """
1984
+ Boolean flag that can be explicitly set to true to enforce local mount in HA environment
1985
+ """
1986
+ return pulumi.get(self, "local")
1987
+
1988
+ @_builtins.property
1989
+ @pulumi.getter(name="maxLeaseTtlSeconds")
1990
+ def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1991
+ """
1992
+ Maximum possible lease duration for tokens and secrets in seconds
1993
+ """
1994
+ return pulumi.get(self, "max_lease_ttl_seconds")
1995
+
1996
+ @_builtins.property
1997
+ @pulumi.getter
1998
+ def mongodbatlas(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountMongodbatla']]]:
1999
+ """
2000
+ A nested block containing configuration options for MongoDB Atlas connections.
2001
+ *See Configuration Options for more info*
2002
+ """
2003
+ return pulumi.get(self, "mongodbatlas")
2004
+
2005
+ @_builtins.property
2006
+ @pulumi.getter
2007
+ def mongodbs(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountMongodb']]]:
2008
+ """
2009
+ A nested block containing configuration options for MongoDB connections.
2010
+ *See Configuration Options for more info*
2011
+ """
2012
+ return pulumi.get(self, "mongodbs")
2013
+
2014
+ @_builtins.property
2015
+ @pulumi.getter
2016
+ def mssqls(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountMssql']]]:
2017
+ """
2018
+ A nested block containing configuration options for MSSQL connections.
2019
+ *See Configuration Options for more info*
2020
+ """
2021
+ return pulumi.get(self, "mssqls")
2022
+
2023
+ @_builtins.property
2024
+ @pulumi.getter(name="mysqlAuroras")
2025
+ def mysql_auroras(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountMysqlAurora']]]:
2026
+ """
2027
+ A nested block containing configuration options for Aurora MySQL connections.
2028
+ *See Configuration Options for more info*
2029
+ """
2030
+ return pulumi.get(self, "mysql_auroras")
2031
+
2032
+ @_builtins.property
2033
+ @pulumi.getter(name="mysqlLegacies")
2034
+ def mysql_legacies(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountMysqlLegacy']]]:
2035
+ """
2036
+ A nested block containing configuration options for legacy MySQL connections.
2037
+ *See Configuration Options for more info*
2038
+ """
2039
+ return pulumi.get(self, "mysql_legacies")
2040
+
2041
+ @_builtins.property
2042
+ @pulumi.getter(name="mysqlRds")
2043
+ def mysql_rds(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountMysqlRd']]]:
2044
+ """
2045
+ A nested block containing configuration options for RDS MySQL connections.
2046
+ *See Configuration Options for more info*
2047
+ """
2048
+ return pulumi.get(self, "mysql_rds")
2049
+
2050
+ @_builtins.property
2051
+ @pulumi.getter
2052
+ def mysqls(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountMysql']]]:
2053
+ """
2054
+ A nested block containing configuration options for MySQL connections.
2055
+ *See Configuration Options for more info*
2056
+ """
2057
+ return pulumi.get(self, "mysqls")
2058
+
2059
+ @_builtins.property
2060
+ @pulumi.getter
2061
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
2062
+ """
2063
+ Target namespace. (requires Enterprise)
2064
+ """
2065
+ return pulumi.get(self, "namespace")
2066
+
2067
+ @_builtins.property
2068
+ @pulumi.getter
2069
+ def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
2070
+ """
2071
+ Specifies mount type specific options that are passed to the backend
2072
+ """
2073
+ return pulumi.get(self, "options")
2074
+
2075
+ @_builtins.property
2076
+ @pulumi.getter
2077
+ def oracles(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountOracle']]]:
2078
+ """
2079
+ A nested block containing configuration options for Oracle connections.
2080
+ *See Configuration Options for more info*
2081
+ """
2082
+ return pulumi.get(self, "oracles")
2083
+
2084
+ @_builtins.property
2085
+ @pulumi.getter(name="passthroughRequestHeaders")
2086
+ def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
2087
+ """
2088
+ List of headers to allow and pass from the request to the plugin
2089
+ """
2090
+ return pulumi.get(self, "passthrough_request_headers")
2091
+
2092
+ @_builtins.property
2093
+ @pulumi.getter
2094
+ def path(self) -> pulumi.Output[_builtins.str]:
2095
+ """
2096
+ Where the secret backend will be mounted
2097
+ """
2098
+ return pulumi.get(self, "path")
2099
+
2100
+ @_builtins.property
2101
+ @pulumi.getter(name="pluginVersion")
2102
+ def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
2103
+ """
2104
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
2105
+ """
2106
+ return pulumi.get(self, "plugin_version")
2107
+
2108
+ @_builtins.property
2109
+ @pulumi.getter
2110
+ def postgresqls(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountPostgresql']]]:
2111
+ """
2112
+ A nested block containing configuration options for PostgreSQL connections.
2113
+ *See Configuration Options for more info*
2114
+ """
2115
+ return pulumi.get(self, "postgresqls")
2116
+
2117
+ @_builtins.property
2118
+ @pulumi.getter
2119
+ def redis(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountRedi']]]:
2120
+ """
2121
+ A nested block containing configuration options for Redis connections.
2122
+ *See Configuration Options for more info*
2123
+ """
2124
+ return pulumi.get(self, "redis")
2125
+
2126
+ @_builtins.property
2127
+ @pulumi.getter(name="redisElasticaches")
2128
+ def redis_elasticaches(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountRedisElasticach']]]:
2129
+ """
2130
+ A nested block containing configuration options for Redis ElastiCache connections.
2131
+ *See Configuration Options for more info*
2132
+ """
2133
+ return pulumi.get(self, "redis_elasticaches")
2134
+
2135
+ @_builtins.property
2136
+ @pulumi.getter
2137
+ def redshifts(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountRedshift']]]:
2138
+ """
2139
+ A nested block containing configuration options for AWS Redshift connections.
2140
+ *See Configuration Options for more info*
2141
+ """
2142
+ return pulumi.get(self, "redshifts")
2143
+
2144
+ @_builtins.property
2145
+ @pulumi.getter(name="sealWrap")
2146
+ def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
2147
+ """
2148
+ Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
2149
+ """
2150
+ return pulumi.get(self, "seal_wrap")
2151
+
2152
+ @_builtins.property
2153
+ @pulumi.getter
2154
+ def snowflakes(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountSnowflake']]]:
2155
+ """
2156
+ A nested block containing configuration options for Snowflake connections.
2157
+ *See Configuration Options for more info*
2158
+ """
2159
+ return pulumi.get(self, "snowflakes")
2160
+