pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,1807 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['SecretBackendArgs', 'SecretBackend']
18
+
19
+ @pulumi.input_type
20
+ class SecretBackendArgs:
21
+ def __init__(__self__, *,
22
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
23
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
24
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
25
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ credentials: Optional[pulumi.Input[_builtins.str]] = None,
27
+ credentials_wo: Optional[pulumi.Input[_builtins.str]] = None,
28
+ credentials_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
29
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
30
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
31
+ description: Optional[pulumi.Input[_builtins.str]] = None,
32
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
33
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
34
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
35
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
36
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
37
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
38
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
39
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
40
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
41
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
42
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
43
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
44
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
45
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
46
+ path: Optional[pulumi.Input[_builtins.str]] = None,
47
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
48
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
49
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
50
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
51
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
52
+ service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
53
+ ttl: Optional[pulumi.Input[_builtins.int]] = None):
54
+ """
55
+ The set of arguments for constructing a SecretBackend resource.
56
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
57
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
58
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
59
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
60
+ :param pulumi.Input[_builtins.str] credentials: JSON-encoded credentials to use to connect to GCP
61
+ :param pulumi.Input[_builtins.str] credentials_wo: **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
62
+ Write-only JSON-encoded credentials to use to connect to GCP
63
+ :param pulumi.Input[_builtins.int] credentials_wo_version: The version of the `credentials_wo`. For more info see updating write-only attributes.
64
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
65
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
66
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
67
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
68
+ *Available only for Vault Enterprise*.
69
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
70
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
71
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
72
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
73
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value for plugin identity
74
+ tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
75
+ Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
76
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens.
77
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated tokens.
78
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
79
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
80
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
81
+ :param pulumi.Input[_builtins.int] max_ttl: The maximum TTL for long-lived credentials (i.e. service account keys).
82
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
83
+ The value should not contain leading or trailing forward slashes.
84
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
85
+ *Available only for Vault Enterprise*.
86
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
87
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
88
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
89
+ not begin or end with a `/`. Defaults to `gcp`.
90
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
91
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
92
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
93
+ *Available only for Vault Enterprise*.
94
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
95
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
96
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
97
+ a rotation when a scheduled token rotation occurs. The default rotation window is
98
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
99
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
100
+ :param pulumi.Input[_builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
101
+ Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
102
+ :param pulumi.Input[_builtins.int] ttl: The default TTL for long-lived credentials (i.e. service account keys).
103
+ """
104
+ if allowed_managed_keys is not None:
105
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
106
+ if allowed_response_headers is not None:
107
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
108
+ if audit_non_hmac_request_keys is not None:
109
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
110
+ if audit_non_hmac_response_keys is not None:
111
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
112
+ if credentials is not None:
113
+ pulumi.set(__self__, "credentials", credentials)
114
+ if credentials_wo is not None:
115
+ pulumi.set(__self__, "credentials_wo", credentials_wo)
116
+ if credentials_wo_version is not None:
117
+ pulumi.set(__self__, "credentials_wo_version", credentials_wo_version)
118
+ if default_lease_ttl_seconds is not None:
119
+ pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
120
+ if delegated_auth_accessors is not None:
121
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
122
+ if description is not None:
123
+ pulumi.set(__self__, "description", description)
124
+ if disable_automated_rotation is not None:
125
+ pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
126
+ if disable_remount is not None:
127
+ pulumi.set(__self__, "disable_remount", disable_remount)
128
+ if external_entropy_access is not None:
129
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
130
+ if force_no_cache is not None:
131
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
132
+ if identity_token_audience is not None:
133
+ pulumi.set(__self__, "identity_token_audience", identity_token_audience)
134
+ if identity_token_key is not None:
135
+ pulumi.set(__self__, "identity_token_key", identity_token_key)
136
+ if identity_token_ttl is not None:
137
+ pulumi.set(__self__, "identity_token_ttl", identity_token_ttl)
138
+ if listing_visibility is not None:
139
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
140
+ if local is not None:
141
+ pulumi.set(__self__, "local", local)
142
+ if max_lease_ttl_seconds is not None:
143
+ pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
144
+ if max_ttl is not None:
145
+ pulumi.set(__self__, "max_ttl", max_ttl)
146
+ if namespace is not None:
147
+ pulumi.set(__self__, "namespace", namespace)
148
+ if options is not None:
149
+ pulumi.set(__self__, "options", options)
150
+ if passthrough_request_headers is not None:
151
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
152
+ if path is not None:
153
+ pulumi.set(__self__, "path", path)
154
+ if plugin_version is not None:
155
+ pulumi.set(__self__, "plugin_version", plugin_version)
156
+ if rotation_period is not None:
157
+ pulumi.set(__self__, "rotation_period", rotation_period)
158
+ if rotation_schedule is not None:
159
+ pulumi.set(__self__, "rotation_schedule", rotation_schedule)
160
+ if rotation_window is not None:
161
+ pulumi.set(__self__, "rotation_window", rotation_window)
162
+ if seal_wrap is not None:
163
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
164
+ if service_account_email is not None:
165
+ pulumi.set(__self__, "service_account_email", service_account_email)
166
+ if ttl is not None:
167
+ pulumi.set(__self__, "ttl", ttl)
168
+
169
+ @_builtins.property
170
+ @pulumi.getter(name="allowedManagedKeys")
171
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
172
+ """
173
+ List of managed key registry entry names that the mount in question is allowed to access
174
+ """
175
+ return pulumi.get(self, "allowed_managed_keys")
176
+
177
+ @allowed_managed_keys.setter
178
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
179
+ pulumi.set(self, "allowed_managed_keys", value)
180
+
181
+ @_builtins.property
182
+ @pulumi.getter(name="allowedResponseHeaders")
183
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
184
+ """
185
+ List of headers to allow and pass from the request to the plugin
186
+ """
187
+ return pulumi.get(self, "allowed_response_headers")
188
+
189
+ @allowed_response_headers.setter
190
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
191
+ pulumi.set(self, "allowed_response_headers", value)
192
+
193
+ @_builtins.property
194
+ @pulumi.getter(name="auditNonHmacRequestKeys")
195
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
196
+ """
197
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
198
+ """
199
+ return pulumi.get(self, "audit_non_hmac_request_keys")
200
+
201
+ @audit_non_hmac_request_keys.setter
202
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
203
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
204
+
205
+ @_builtins.property
206
+ @pulumi.getter(name="auditNonHmacResponseKeys")
207
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
208
+ """
209
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
210
+ """
211
+ return pulumi.get(self, "audit_non_hmac_response_keys")
212
+
213
+ @audit_non_hmac_response_keys.setter
214
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
215
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
216
+
217
+ @_builtins.property
218
+ @pulumi.getter
219
+ def credentials(self) -> Optional[pulumi.Input[_builtins.str]]:
220
+ """
221
+ JSON-encoded credentials to use to connect to GCP
222
+ """
223
+ return pulumi.get(self, "credentials")
224
+
225
+ @credentials.setter
226
+ def credentials(self, value: Optional[pulumi.Input[_builtins.str]]):
227
+ pulumi.set(self, "credentials", value)
228
+
229
+ @_builtins.property
230
+ @pulumi.getter(name="credentialsWo")
231
+ def credentials_wo(self) -> Optional[pulumi.Input[_builtins.str]]:
232
+ """
233
+ **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
234
+ Write-only JSON-encoded credentials to use to connect to GCP
235
+ """
236
+ return pulumi.get(self, "credentials_wo")
237
+
238
+ @credentials_wo.setter
239
+ def credentials_wo(self, value: Optional[pulumi.Input[_builtins.str]]):
240
+ pulumi.set(self, "credentials_wo", value)
241
+
242
+ @_builtins.property
243
+ @pulumi.getter(name="credentialsWoVersion")
244
+ def credentials_wo_version(self) -> Optional[pulumi.Input[_builtins.int]]:
245
+ """
246
+ The version of the `credentials_wo`. For more info see updating write-only attributes.
247
+ """
248
+ return pulumi.get(self, "credentials_wo_version")
249
+
250
+ @credentials_wo_version.setter
251
+ def credentials_wo_version(self, value: Optional[pulumi.Input[_builtins.int]]):
252
+ pulumi.set(self, "credentials_wo_version", value)
253
+
254
+ @_builtins.property
255
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
256
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
257
+ """
258
+ Default lease duration for secrets in seconds
259
+ """
260
+ return pulumi.get(self, "default_lease_ttl_seconds")
261
+
262
+ @default_lease_ttl_seconds.setter
263
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
264
+ pulumi.set(self, "default_lease_ttl_seconds", value)
265
+
266
+ @_builtins.property
267
+ @pulumi.getter(name="delegatedAuthAccessors")
268
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
269
+ """
270
+ List of headers to allow and pass from the request to the plugin
271
+ """
272
+ return pulumi.get(self, "delegated_auth_accessors")
273
+
274
+ @delegated_auth_accessors.setter
275
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
276
+ pulumi.set(self, "delegated_auth_accessors", value)
277
+
278
+ @_builtins.property
279
+ @pulumi.getter
280
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
281
+ """
282
+ Human-friendly description of the mount for the backend.
283
+ """
284
+ return pulumi.get(self, "description")
285
+
286
+ @description.setter
287
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
288
+ pulumi.set(self, "description", value)
289
+
290
+ @_builtins.property
291
+ @pulumi.getter(name="disableAutomatedRotation")
292
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
293
+ """
294
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
295
+ *Available only for Vault Enterprise*.
296
+ """
297
+ return pulumi.get(self, "disable_automated_rotation")
298
+
299
+ @disable_automated_rotation.setter
300
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
301
+ pulumi.set(self, "disable_automated_rotation", value)
302
+
303
+ @_builtins.property
304
+ @pulumi.getter(name="disableRemount")
305
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
306
+ """
307
+ If set, opts out of mount migration on path updates.
308
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
309
+ """
310
+ return pulumi.get(self, "disable_remount")
311
+
312
+ @disable_remount.setter
313
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
314
+ pulumi.set(self, "disable_remount", value)
315
+
316
+ @_builtins.property
317
+ @pulumi.getter(name="externalEntropyAccess")
318
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
319
+ """
320
+ Enable the secrets engine to access Vault's external entropy source
321
+ """
322
+ return pulumi.get(self, "external_entropy_access")
323
+
324
+ @external_entropy_access.setter
325
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
326
+ pulumi.set(self, "external_entropy_access", value)
327
+
328
+ @_builtins.property
329
+ @pulumi.getter(name="forceNoCache")
330
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
331
+ """
332
+ If set to true, disables caching.
333
+ """
334
+ return pulumi.get(self, "force_no_cache")
335
+
336
+ @force_no_cache.setter
337
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
338
+ pulumi.set(self, "force_no_cache", value)
339
+
340
+ @_builtins.property
341
+ @pulumi.getter(name="identityTokenAudience")
342
+ def identity_token_audience(self) -> Optional[pulumi.Input[_builtins.str]]:
343
+ """
344
+ The audience claim value for plugin identity
345
+ tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
346
+ Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
347
+ """
348
+ return pulumi.get(self, "identity_token_audience")
349
+
350
+ @identity_token_audience.setter
351
+ def identity_token_audience(self, value: Optional[pulumi.Input[_builtins.str]]):
352
+ pulumi.set(self, "identity_token_audience", value)
353
+
354
+ @_builtins.property
355
+ @pulumi.getter(name="identityTokenKey")
356
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
357
+ """
358
+ The key to use for signing identity tokens.
359
+ """
360
+ return pulumi.get(self, "identity_token_key")
361
+
362
+ @identity_token_key.setter
363
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
364
+ pulumi.set(self, "identity_token_key", value)
365
+
366
+ @_builtins.property
367
+ @pulumi.getter(name="identityTokenTtl")
368
+ def identity_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
369
+ """
370
+ The TTL of generated tokens.
371
+ """
372
+ return pulumi.get(self, "identity_token_ttl")
373
+
374
+ @identity_token_ttl.setter
375
+ def identity_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
376
+ pulumi.set(self, "identity_token_ttl", value)
377
+
378
+ @_builtins.property
379
+ @pulumi.getter(name="listingVisibility")
380
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
381
+ """
382
+ Specifies whether to show this mount in the UI-specific listing endpoint
383
+ """
384
+ return pulumi.get(self, "listing_visibility")
385
+
386
+ @listing_visibility.setter
387
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
388
+ pulumi.set(self, "listing_visibility", value)
389
+
390
+ @_builtins.property
391
+ @pulumi.getter
392
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
393
+ """
394
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
395
+ """
396
+ return pulumi.get(self, "local")
397
+
398
+ @local.setter
399
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
400
+ pulumi.set(self, "local", value)
401
+
402
+ @_builtins.property
403
+ @pulumi.getter(name="maxLeaseTtlSeconds")
404
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
405
+ """
406
+ Maximum possible lease duration for secrets in seconds
407
+ """
408
+ return pulumi.get(self, "max_lease_ttl_seconds")
409
+
410
+ @max_lease_ttl_seconds.setter
411
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
412
+ pulumi.set(self, "max_lease_ttl_seconds", value)
413
+
414
+ @_builtins.property
415
+ @pulumi.getter(name="maxTtl")
416
+ def max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
417
+ """
418
+ The maximum TTL for long-lived credentials (i.e. service account keys).
419
+ """
420
+ return pulumi.get(self, "max_ttl")
421
+
422
+ @max_ttl.setter
423
+ def max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
424
+ pulumi.set(self, "max_ttl", value)
425
+
426
+ @_builtins.property
427
+ @pulumi.getter
428
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
429
+ """
430
+ The namespace to provision the resource in.
431
+ The value should not contain leading or trailing forward slashes.
432
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
433
+ *Available only for Vault Enterprise*.
434
+ """
435
+ return pulumi.get(self, "namespace")
436
+
437
+ @namespace.setter
438
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
439
+ pulumi.set(self, "namespace", value)
440
+
441
+ @_builtins.property
442
+ @pulumi.getter
443
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
444
+ """
445
+ Specifies mount type specific options that are passed to the backend
446
+ """
447
+ return pulumi.get(self, "options")
448
+
449
+ @options.setter
450
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
451
+ pulumi.set(self, "options", value)
452
+
453
+ @_builtins.property
454
+ @pulumi.getter(name="passthroughRequestHeaders")
455
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
456
+ """
457
+ List of headers to allow and pass from the request to the plugin
458
+ """
459
+ return pulumi.get(self, "passthrough_request_headers")
460
+
461
+ @passthrough_request_headers.setter
462
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
463
+ pulumi.set(self, "passthrough_request_headers", value)
464
+
465
+ @_builtins.property
466
+ @pulumi.getter
467
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
468
+ """
469
+ The unique path this backend should be mounted at. Must
470
+ not begin or end with a `/`. Defaults to `gcp`.
471
+ """
472
+ return pulumi.get(self, "path")
473
+
474
+ @path.setter
475
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
476
+ pulumi.set(self, "path", value)
477
+
478
+ @_builtins.property
479
+ @pulumi.getter(name="pluginVersion")
480
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
481
+ """
482
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
483
+ """
484
+ return pulumi.get(self, "plugin_version")
485
+
486
+ @plugin_version.setter
487
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
488
+ pulumi.set(self, "plugin_version", value)
489
+
490
+ @_builtins.property
491
+ @pulumi.getter(name="rotationPeriod")
492
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
493
+ """
494
+ The amount of time in seconds Vault should wait before rotating the root credential.
495
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
496
+ *Available only for Vault Enterprise*.
497
+ """
498
+ return pulumi.get(self, "rotation_period")
499
+
500
+ @rotation_period.setter
501
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
502
+ pulumi.set(self, "rotation_period", value)
503
+
504
+ @_builtins.property
505
+ @pulumi.getter(name="rotationSchedule")
506
+ def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
507
+ """
508
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
509
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
510
+ """
511
+ return pulumi.get(self, "rotation_schedule")
512
+
513
+ @rotation_schedule.setter
514
+ def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
515
+ pulumi.set(self, "rotation_schedule", value)
516
+
517
+ @_builtins.property
518
+ @pulumi.getter(name="rotationWindow")
519
+ def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
520
+ """
521
+ The maximum amount of time in seconds allowed to complete
522
+ a rotation when a scheduled token rotation occurs. The default rotation window is
523
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
524
+ """
525
+ return pulumi.get(self, "rotation_window")
526
+
527
+ @rotation_window.setter
528
+ def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
529
+ pulumi.set(self, "rotation_window", value)
530
+
531
+ @_builtins.property
532
+ @pulumi.getter(name="sealWrap")
533
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
534
+ """
535
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
536
+ """
537
+ return pulumi.get(self, "seal_wrap")
538
+
539
+ @seal_wrap.setter
540
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
541
+ pulumi.set(self, "seal_wrap", value)
542
+
543
+ @_builtins.property
544
+ @pulumi.getter(name="serviceAccountEmail")
545
+ def service_account_email(self) -> Optional[pulumi.Input[_builtins.str]]:
546
+ """
547
+ Service Account to impersonate for plugin workload identity federation.
548
+ Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
549
+ """
550
+ return pulumi.get(self, "service_account_email")
551
+
552
+ @service_account_email.setter
553
+ def service_account_email(self, value: Optional[pulumi.Input[_builtins.str]]):
554
+ pulumi.set(self, "service_account_email", value)
555
+
556
+ @_builtins.property
557
+ @pulumi.getter
558
+ def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
559
+ """
560
+ The default TTL for long-lived credentials (i.e. service account keys).
561
+ """
562
+ return pulumi.get(self, "ttl")
563
+
564
+ @ttl.setter
565
+ def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
566
+ pulumi.set(self, "ttl", value)
567
+
568
+
569
+ @pulumi.input_type
570
+ class _SecretBackendState:
571
+ def __init__(__self__, *,
572
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
573
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
574
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
575
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
576
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
577
+ credentials: Optional[pulumi.Input[_builtins.str]] = None,
578
+ credentials_wo: Optional[pulumi.Input[_builtins.str]] = None,
579
+ credentials_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
580
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
581
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
582
+ description: Optional[pulumi.Input[_builtins.str]] = None,
583
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
584
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
585
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
586
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
587
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
588
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
589
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
590
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
591
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
592
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
593
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
594
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
595
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
596
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
597
+ path: Optional[pulumi.Input[_builtins.str]] = None,
598
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
599
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
600
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
601
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
602
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
603
+ service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
604
+ ttl: Optional[pulumi.Input[_builtins.int]] = None):
605
+ """
606
+ Input properties used for looking up and filtering SecretBackend resources.
607
+ :param pulumi.Input[_builtins.str] accessor: The accessor of the created GCP mount.
608
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
609
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
610
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
611
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
612
+ :param pulumi.Input[_builtins.str] credentials: JSON-encoded credentials to use to connect to GCP
613
+ :param pulumi.Input[_builtins.str] credentials_wo: **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
614
+ Write-only JSON-encoded credentials to use to connect to GCP
615
+ :param pulumi.Input[_builtins.int] credentials_wo_version: The version of the `credentials_wo`. For more info see updating write-only attributes.
616
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
617
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
618
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
619
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
620
+ *Available only for Vault Enterprise*.
621
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
622
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
623
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
624
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
625
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value for plugin identity
626
+ tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
627
+ Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
628
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens.
629
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated tokens.
630
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
631
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
632
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
633
+ :param pulumi.Input[_builtins.int] max_ttl: The maximum TTL for long-lived credentials (i.e. service account keys).
634
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
635
+ The value should not contain leading or trailing forward slashes.
636
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
637
+ *Available only for Vault Enterprise*.
638
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
639
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
640
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
641
+ not begin or end with a `/`. Defaults to `gcp`.
642
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
643
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
644
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
645
+ *Available only for Vault Enterprise*.
646
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
647
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
648
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
649
+ a rotation when a scheduled token rotation occurs. The default rotation window is
650
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
651
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
652
+ :param pulumi.Input[_builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
653
+ Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
654
+ :param pulumi.Input[_builtins.int] ttl: The default TTL for long-lived credentials (i.e. service account keys).
655
+ """
656
+ if accessor is not None:
657
+ pulumi.set(__self__, "accessor", accessor)
658
+ if allowed_managed_keys is not None:
659
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
660
+ if allowed_response_headers is not None:
661
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
662
+ if audit_non_hmac_request_keys is not None:
663
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
664
+ if audit_non_hmac_response_keys is not None:
665
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
666
+ if credentials is not None:
667
+ pulumi.set(__self__, "credentials", credentials)
668
+ if credentials_wo is not None:
669
+ pulumi.set(__self__, "credentials_wo", credentials_wo)
670
+ if credentials_wo_version is not None:
671
+ pulumi.set(__self__, "credentials_wo_version", credentials_wo_version)
672
+ if default_lease_ttl_seconds is not None:
673
+ pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
674
+ if delegated_auth_accessors is not None:
675
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
676
+ if description is not None:
677
+ pulumi.set(__self__, "description", description)
678
+ if disable_automated_rotation is not None:
679
+ pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
680
+ if disable_remount is not None:
681
+ pulumi.set(__self__, "disable_remount", disable_remount)
682
+ if external_entropy_access is not None:
683
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
684
+ if force_no_cache is not None:
685
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
686
+ if identity_token_audience is not None:
687
+ pulumi.set(__self__, "identity_token_audience", identity_token_audience)
688
+ if identity_token_key is not None:
689
+ pulumi.set(__self__, "identity_token_key", identity_token_key)
690
+ if identity_token_ttl is not None:
691
+ pulumi.set(__self__, "identity_token_ttl", identity_token_ttl)
692
+ if listing_visibility is not None:
693
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
694
+ if local is not None:
695
+ pulumi.set(__self__, "local", local)
696
+ if max_lease_ttl_seconds is not None:
697
+ pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
698
+ if max_ttl is not None:
699
+ pulumi.set(__self__, "max_ttl", max_ttl)
700
+ if namespace is not None:
701
+ pulumi.set(__self__, "namespace", namespace)
702
+ if options is not None:
703
+ pulumi.set(__self__, "options", options)
704
+ if passthrough_request_headers is not None:
705
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
706
+ if path is not None:
707
+ pulumi.set(__self__, "path", path)
708
+ if plugin_version is not None:
709
+ pulumi.set(__self__, "plugin_version", plugin_version)
710
+ if rotation_period is not None:
711
+ pulumi.set(__self__, "rotation_period", rotation_period)
712
+ if rotation_schedule is not None:
713
+ pulumi.set(__self__, "rotation_schedule", rotation_schedule)
714
+ if rotation_window is not None:
715
+ pulumi.set(__self__, "rotation_window", rotation_window)
716
+ if seal_wrap is not None:
717
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
718
+ if service_account_email is not None:
719
+ pulumi.set(__self__, "service_account_email", service_account_email)
720
+ if ttl is not None:
721
+ pulumi.set(__self__, "ttl", ttl)
722
+
723
+ @_builtins.property
724
+ @pulumi.getter
725
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
726
+ """
727
+ The accessor of the created GCP mount.
728
+ """
729
+ return pulumi.get(self, "accessor")
730
+
731
+ @accessor.setter
732
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
733
+ pulumi.set(self, "accessor", value)
734
+
735
+ @_builtins.property
736
+ @pulumi.getter(name="allowedManagedKeys")
737
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
738
+ """
739
+ List of managed key registry entry names that the mount in question is allowed to access
740
+ """
741
+ return pulumi.get(self, "allowed_managed_keys")
742
+
743
+ @allowed_managed_keys.setter
744
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
745
+ pulumi.set(self, "allowed_managed_keys", value)
746
+
747
+ @_builtins.property
748
+ @pulumi.getter(name="allowedResponseHeaders")
749
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
750
+ """
751
+ List of headers to allow and pass from the request to the plugin
752
+ """
753
+ return pulumi.get(self, "allowed_response_headers")
754
+
755
+ @allowed_response_headers.setter
756
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
757
+ pulumi.set(self, "allowed_response_headers", value)
758
+
759
+ @_builtins.property
760
+ @pulumi.getter(name="auditNonHmacRequestKeys")
761
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
762
+ """
763
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
764
+ """
765
+ return pulumi.get(self, "audit_non_hmac_request_keys")
766
+
767
+ @audit_non_hmac_request_keys.setter
768
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
769
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
770
+
771
+ @_builtins.property
772
+ @pulumi.getter(name="auditNonHmacResponseKeys")
773
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
774
+ """
775
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
776
+ """
777
+ return pulumi.get(self, "audit_non_hmac_response_keys")
778
+
779
+ @audit_non_hmac_response_keys.setter
780
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
781
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
782
+
783
+ @_builtins.property
784
+ @pulumi.getter
785
+ def credentials(self) -> Optional[pulumi.Input[_builtins.str]]:
786
+ """
787
+ JSON-encoded credentials to use to connect to GCP
788
+ """
789
+ return pulumi.get(self, "credentials")
790
+
791
+ @credentials.setter
792
+ def credentials(self, value: Optional[pulumi.Input[_builtins.str]]):
793
+ pulumi.set(self, "credentials", value)
794
+
795
+ @_builtins.property
796
+ @pulumi.getter(name="credentialsWo")
797
+ def credentials_wo(self) -> Optional[pulumi.Input[_builtins.str]]:
798
+ """
799
+ **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
800
+ Write-only JSON-encoded credentials to use to connect to GCP
801
+ """
802
+ return pulumi.get(self, "credentials_wo")
803
+
804
+ @credentials_wo.setter
805
+ def credentials_wo(self, value: Optional[pulumi.Input[_builtins.str]]):
806
+ pulumi.set(self, "credentials_wo", value)
807
+
808
+ @_builtins.property
809
+ @pulumi.getter(name="credentialsWoVersion")
810
+ def credentials_wo_version(self) -> Optional[pulumi.Input[_builtins.int]]:
811
+ """
812
+ The version of the `credentials_wo`. For more info see updating write-only attributes.
813
+ """
814
+ return pulumi.get(self, "credentials_wo_version")
815
+
816
+ @credentials_wo_version.setter
817
+ def credentials_wo_version(self, value: Optional[pulumi.Input[_builtins.int]]):
818
+ pulumi.set(self, "credentials_wo_version", value)
819
+
820
+ @_builtins.property
821
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
822
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
823
+ """
824
+ Default lease duration for secrets in seconds
825
+ """
826
+ return pulumi.get(self, "default_lease_ttl_seconds")
827
+
828
+ @default_lease_ttl_seconds.setter
829
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
830
+ pulumi.set(self, "default_lease_ttl_seconds", value)
831
+
832
+ @_builtins.property
833
+ @pulumi.getter(name="delegatedAuthAccessors")
834
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
835
+ """
836
+ List of headers to allow and pass from the request to the plugin
837
+ """
838
+ return pulumi.get(self, "delegated_auth_accessors")
839
+
840
+ @delegated_auth_accessors.setter
841
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
842
+ pulumi.set(self, "delegated_auth_accessors", value)
843
+
844
+ @_builtins.property
845
+ @pulumi.getter
846
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
847
+ """
848
+ Human-friendly description of the mount for the backend.
849
+ """
850
+ return pulumi.get(self, "description")
851
+
852
+ @description.setter
853
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
854
+ pulumi.set(self, "description", value)
855
+
856
+ @_builtins.property
857
+ @pulumi.getter(name="disableAutomatedRotation")
858
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
859
+ """
860
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
861
+ *Available only for Vault Enterprise*.
862
+ """
863
+ return pulumi.get(self, "disable_automated_rotation")
864
+
865
+ @disable_automated_rotation.setter
866
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
867
+ pulumi.set(self, "disable_automated_rotation", value)
868
+
869
+ @_builtins.property
870
+ @pulumi.getter(name="disableRemount")
871
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
872
+ """
873
+ If set, opts out of mount migration on path updates.
874
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
875
+ """
876
+ return pulumi.get(self, "disable_remount")
877
+
878
+ @disable_remount.setter
879
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
880
+ pulumi.set(self, "disable_remount", value)
881
+
882
+ @_builtins.property
883
+ @pulumi.getter(name="externalEntropyAccess")
884
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
885
+ """
886
+ Enable the secrets engine to access Vault's external entropy source
887
+ """
888
+ return pulumi.get(self, "external_entropy_access")
889
+
890
+ @external_entropy_access.setter
891
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
892
+ pulumi.set(self, "external_entropy_access", value)
893
+
894
+ @_builtins.property
895
+ @pulumi.getter(name="forceNoCache")
896
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
897
+ """
898
+ If set to true, disables caching.
899
+ """
900
+ return pulumi.get(self, "force_no_cache")
901
+
902
+ @force_no_cache.setter
903
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
904
+ pulumi.set(self, "force_no_cache", value)
905
+
906
+ @_builtins.property
907
+ @pulumi.getter(name="identityTokenAudience")
908
+ def identity_token_audience(self) -> Optional[pulumi.Input[_builtins.str]]:
909
+ """
910
+ The audience claim value for plugin identity
911
+ tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
912
+ Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
913
+ """
914
+ return pulumi.get(self, "identity_token_audience")
915
+
916
+ @identity_token_audience.setter
917
+ def identity_token_audience(self, value: Optional[pulumi.Input[_builtins.str]]):
918
+ pulumi.set(self, "identity_token_audience", value)
919
+
920
+ @_builtins.property
921
+ @pulumi.getter(name="identityTokenKey")
922
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
923
+ """
924
+ The key to use for signing identity tokens.
925
+ """
926
+ return pulumi.get(self, "identity_token_key")
927
+
928
+ @identity_token_key.setter
929
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
930
+ pulumi.set(self, "identity_token_key", value)
931
+
932
+ @_builtins.property
933
+ @pulumi.getter(name="identityTokenTtl")
934
+ def identity_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
935
+ """
936
+ The TTL of generated tokens.
937
+ """
938
+ return pulumi.get(self, "identity_token_ttl")
939
+
940
+ @identity_token_ttl.setter
941
+ def identity_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
942
+ pulumi.set(self, "identity_token_ttl", value)
943
+
944
+ @_builtins.property
945
+ @pulumi.getter(name="listingVisibility")
946
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
947
+ """
948
+ Specifies whether to show this mount in the UI-specific listing endpoint
949
+ """
950
+ return pulumi.get(self, "listing_visibility")
951
+
952
+ @listing_visibility.setter
953
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
954
+ pulumi.set(self, "listing_visibility", value)
955
+
956
+ @_builtins.property
957
+ @pulumi.getter
958
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
959
+ """
960
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
961
+ """
962
+ return pulumi.get(self, "local")
963
+
964
+ @local.setter
965
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
966
+ pulumi.set(self, "local", value)
967
+
968
+ @_builtins.property
969
+ @pulumi.getter(name="maxLeaseTtlSeconds")
970
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
971
+ """
972
+ Maximum possible lease duration for secrets in seconds
973
+ """
974
+ return pulumi.get(self, "max_lease_ttl_seconds")
975
+
976
+ @max_lease_ttl_seconds.setter
977
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
978
+ pulumi.set(self, "max_lease_ttl_seconds", value)
979
+
980
+ @_builtins.property
981
+ @pulumi.getter(name="maxTtl")
982
+ def max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
983
+ """
984
+ The maximum TTL for long-lived credentials (i.e. service account keys).
985
+ """
986
+ return pulumi.get(self, "max_ttl")
987
+
988
+ @max_ttl.setter
989
+ def max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
990
+ pulumi.set(self, "max_ttl", value)
991
+
992
+ @_builtins.property
993
+ @pulumi.getter
994
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
995
+ """
996
+ The namespace to provision the resource in.
997
+ The value should not contain leading or trailing forward slashes.
998
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
999
+ *Available only for Vault Enterprise*.
1000
+ """
1001
+ return pulumi.get(self, "namespace")
1002
+
1003
+ @namespace.setter
1004
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
1005
+ pulumi.set(self, "namespace", value)
1006
+
1007
+ @_builtins.property
1008
+ @pulumi.getter
1009
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
1010
+ """
1011
+ Specifies mount type specific options that are passed to the backend
1012
+ """
1013
+ return pulumi.get(self, "options")
1014
+
1015
+ @options.setter
1016
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
1017
+ pulumi.set(self, "options", value)
1018
+
1019
+ @_builtins.property
1020
+ @pulumi.getter(name="passthroughRequestHeaders")
1021
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
1022
+ """
1023
+ List of headers to allow and pass from the request to the plugin
1024
+ """
1025
+ return pulumi.get(self, "passthrough_request_headers")
1026
+
1027
+ @passthrough_request_headers.setter
1028
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
1029
+ pulumi.set(self, "passthrough_request_headers", value)
1030
+
1031
+ @_builtins.property
1032
+ @pulumi.getter
1033
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
1034
+ """
1035
+ The unique path this backend should be mounted at. Must
1036
+ not begin or end with a `/`. Defaults to `gcp`.
1037
+ """
1038
+ return pulumi.get(self, "path")
1039
+
1040
+ @path.setter
1041
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
1042
+ pulumi.set(self, "path", value)
1043
+
1044
+ @_builtins.property
1045
+ @pulumi.getter(name="pluginVersion")
1046
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
1047
+ """
1048
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1049
+ """
1050
+ return pulumi.get(self, "plugin_version")
1051
+
1052
+ @plugin_version.setter
1053
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
1054
+ pulumi.set(self, "plugin_version", value)
1055
+
1056
+ @_builtins.property
1057
+ @pulumi.getter(name="rotationPeriod")
1058
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
1059
+ """
1060
+ The amount of time in seconds Vault should wait before rotating the root credential.
1061
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
1062
+ *Available only for Vault Enterprise*.
1063
+ """
1064
+ return pulumi.get(self, "rotation_period")
1065
+
1066
+ @rotation_period.setter
1067
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
1068
+ pulumi.set(self, "rotation_period", value)
1069
+
1070
+ @_builtins.property
1071
+ @pulumi.getter(name="rotationSchedule")
1072
+ def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
1073
+ """
1074
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1075
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
1076
+ """
1077
+ return pulumi.get(self, "rotation_schedule")
1078
+
1079
+ @rotation_schedule.setter
1080
+ def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
1081
+ pulumi.set(self, "rotation_schedule", value)
1082
+
1083
+ @_builtins.property
1084
+ @pulumi.getter(name="rotationWindow")
1085
+ def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
1086
+ """
1087
+ The maximum amount of time in seconds allowed to complete
1088
+ a rotation when a scheduled token rotation occurs. The default rotation window is
1089
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
1090
+ """
1091
+ return pulumi.get(self, "rotation_window")
1092
+
1093
+ @rotation_window.setter
1094
+ def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
1095
+ pulumi.set(self, "rotation_window", value)
1096
+
1097
+ @_builtins.property
1098
+ @pulumi.getter(name="sealWrap")
1099
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
1100
+ """
1101
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1102
+ """
1103
+ return pulumi.get(self, "seal_wrap")
1104
+
1105
+ @seal_wrap.setter
1106
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
1107
+ pulumi.set(self, "seal_wrap", value)
1108
+
1109
+ @_builtins.property
1110
+ @pulumi.getter(name="serviceAccountEmail")
1111
+ def service_account_email(self) -> Optional[pulumi.Input[_builtins.str]]:
1112
+ """
1113
+ Service Account to impersonate for plugin workload identity federation.
1114
+ Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
1115
+ """
1116
+ return pulumi.get(self, "service_account_email")
1117
+
1118
+ @service_account_email.setter
1119
+ def service_account_email(self, value: Optional[pulumi.Input[_builtins.str]]):
1120
+ pulumi.set(self, "service_account_email", value)
1121
+
1122
+ @_builtins.property
1123
+ @pulumi.getter
1124
+ def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
1125
+ """
1126
+ The default TTL for long-lived credentials (i.e. service account keys).
1127
+ """
1128
+ return pulumi.get(self, "ttl")
1129
+
1130
+ @ttl.setter
1131
+ def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
1132
+ pulumi.set(self, "ttl", value)
1133
+
1134
+
1135
+ @pulumi.type_token("vault:gcp/secretBackend:SecretBackend")
1136
+ class SecretBackend(pulumi.CustomResource):
1137
+ @overload
1138
+ def __init__(__self__,
1139
+ resource_name: str,
1140
+ opts: Optional[pulumi.ResourceOptions] = None,
1141
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1142
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1143
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1144
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1145
+ credentials: Optional[pulumi.Input[_builtins.str]] = None,
1146
+ credentials_wo: Optional[pulumi.Input[_builtins.str]] = None,
1147
+ credentials_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
1148
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1149
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1150
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1151
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
1152
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1153
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1154
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1155
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
1156
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1157
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1158
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1159
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1160
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1161
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1162
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1163
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1164
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1165
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1166
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1167
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
1168
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
1169
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
1170
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1171
+ service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
1172
+ ttl: Optional[pulumi.Input[_builtins.int]] = None,
1173
+ __props__=None):
1174
+ """
1175
+ ## Example Usage
1176
+
1177
+ You can setup the GCP secret backend with Workload Identity Federation (WIF) for a secret-less configuration:
1178
+ ```python
1179
+ import pulumi
1180
+ import pulumi_vault as vault
1181
+
1182
+ gcp = vault.gcp.SecretBackend("gcp",
1183
+ identity_token_key="example-key",
1184
+ identity_token_ttl=1800,
1185
+ identity_token_audience="<TOKEN_AUDIENCE>",
1186
+ service_account_email="<SERVICE_ACCOUNT_EMAIL>",
1187
+ rotation_schedule="0 * * * SAT",
1188
+ rotation_window=3600)
1189
+ ```
1190
+
1191
+ ```python
1192
+ import pulumi
1193
+ import pulumi_std as std
1194
+ import pulumi_vault as vault
1195
+
1196
+ gcp = vault.gcp.SecretBackend("gcp",
1197
+ credentials=std.file(input="credentials.json").result,
1198
+ rotation_schedule="0 * * * SAT",
1199
+ rotation_window=3600)
1200
+ ```
1201
+
1202
+ ## Ephemeral Attributes Reference
1203
+
1204
+ The following write-only attributes are supported:
1205
+
1206
+ * `credentials_wo` - (Optional) The GCP service account credentials in JSON format. Can be updated.
1207
+ **Note**: This property is write-only and will not be read from the API.
1208
+
1209
+ :param str resource_name: The name of the resource.
1210
+ :param pulumi.ResourceOptions opts: Options for the resource.
1211
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1212
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1213
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1214
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1215
+ :param pulumi.Input[_builtins.str] credentials: JSON-encoded credentials to use to connect to GCP
1216
+ :param pulumi.Input[_builtins.str] credentials_wo: **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
1217
+ Write-only JSON-encoded credentials to use to connect to GCP
1218
+ :param pulumi.Input[_builtins.int] credentials_wo_version: The version of the `credentials_wo`. For more info see updating write-only attributes.
1219
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
1220
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1221
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
1222
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1223
+ *Available only for Vault Enterprise*.
1224
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1225
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1226
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1227
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1228
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value for plugin identity
1229
+ tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
1230
+ Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
1231
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens.
1232
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated tokens.
1233
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1234
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1235
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
1236
+ :param pulumi.Input[_builtins.int] max_ttl: The maximum TTL for long-lived credentials (i.e. service account keys).
1237
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
1238
+ The value should not contain leading or trailing forward slashes.
1239
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1240
+ *Available only for Vault Enterprise*.
1241
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1242
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1243
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
1244
+ not begin or end with a `/`. Defaults to `gcp`.
1245
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1246
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
1247
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
1248
+ *Available only for Vault Enterprise*.
1249
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1250
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
1251
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
1252
+ a rotation when a scheduled token rotation occurs. The default rotation window is
1253
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
1254
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1255
+ :param pulumi.Input[_builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
1256
+ Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
1257
+ :param pulumi.Input[_builtins.int] ttl: The default TTL for long-lived credentials (i.e. service account keys).
1258
+ """
1259
+ ...
1260
+ @overload
1261
+ def __init__(__self__,
1262
+ resource_name: str,
1263
+ args: Optional[SecretBackendArgs] = None,
1264
+ opts: Optional[pulumi.ResourceOptions] = None):
1265
+ """
1266
+ ## Example Usage
1267
+
1268
+ You can setup the GCP secret backend with Workload Identity Federation (WIF) for a secret-less configuration:
1269
+ ```python
1270
+ import pulumi
1271
+ import pulumi_vault as vault
1272
+
1273
+ gcp = vault.gcp.SecretBackend("gcp",
1274
+ identity_token_key="example-key",
1275
+ identity_token_ttl=1800,
1276
+ identity_token_audience="<TOKEN_AUDIENCE>",
1277
+ service_account_email="<SERVICE_ACCOUNT_EMAIL>",
1278
+ rotation_schedule="0 * * * SAT",
1279
+ rotation_window=3600)
1280
+ ```
1281
+
1282
+ ```python
1283
+ import pulumi
1284
+ import pulumi_std as std
1285
+ import pulumi_vault as vault
1286
+
1287
+ gcp = vault.gcp.SecretBackend("gcp",
1288
+ credentials=std.file(input="credentials.json").result,
1289
+ rotation_schedule="0 * * * SAT",
1290
+ rotation_window=3600)
1291
+ ```
1292
+
1293
+ ## Ephemeral Attributes Reference
1294
+
1295
+ The following write-only attributes are supported:
1296
+
1297
+ * `credentials_wo` - (Optional) The GCP service account credentials in JSON format. Can be updated.
1298
+ **Note**: This property is write-only and will not be read from the API.
1299
+
1300
+ :param str resource_name: The name of the resource.
1301
+ :param SecretBackendArgs args: The arguments to use to populate this resource's properties.
1302
+ :param pulumi.ResourceOptions opts: Options for the resource.
1303
+ """
1304
+ ...
1305
+ def __init__(__self__, resource_name: str, *args, **kwargs):
1306
+ resource_args, opts = _utilities.get_resource_args_opts(SecretBackendArgs, pulumi.ResourceOptions, *args, **kwargs)
1307
+ if resource_args is not None:
1308
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
1309
+ else:
1310
+ __self__._internal_init(resource_name, *args, **kwargs)
1311
+
1312
+ def _internal_init(__self__,
1313
+ resource_name: str,
1314
+ opts: Optional[pulumi.ResourceOptions] = None,
1315
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1316
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1317
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1318
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1319
+ credentials: Optional[pulumi.Input[_builtins.str]] = None,
1320
+ credentials_wo: Optional[pulumi.Input[_builtins.str]] = None,
1321
+ credentials_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
1322
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1323
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1324
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1325
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
1326
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1327
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1328
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1329
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
1330
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1331
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1332
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1333
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1334
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1335
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1336
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1337
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1338
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1339
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1340
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1341
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
1342
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
1343
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
1344
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1345
+ service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
1346
+ ttl: Optional[pulumi.Input[_builtins.int]] = None,
1347
+ __props__=None):
1348
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
1349
+ if not isinstance(opts, pulumi.ResourceOptions):
1350
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
1351
+ if opts.id is None:
1352
+ if __props__ is not None:
1353
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
1354
+ __props__ = SecretBackendArgs.__new__(SecretBackendArgs)
1355
+
1356
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1357
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1358
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1359
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
1360
+ __props__.__dict__["credentials"] = None if credentials is None else pulumi.Output.secret(credentials)
1361
+ __props__.__dict__["credentials_wo"] = None if credentials_wo is None else pulumi.Output.secret(credentials_wo)
1362
+ __props__.__dict__["credentials_wo_version"] = credentials_wo_version
1363
+ __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1364
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
1365
+ __props__.__dict__["description"] = description
1366
+ __props__.__dict__["disable_automated_rotation"] = disable_automated_rotation
1367
+ __props__.__dict__["disable_remount"] = disable_remount
1368
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1369
+ __props__.__dict__["force_no_cache"] = force_no_cache
1370
+ __props__.__dict__["identity_token_audience"] = identity_token_audience
1371
+ __props__.__dict__["identity_token_key"] = identity_token_key
1372
+ __props__.__dict__["identity_token_ttl"] = identity_token_ttl
1373
+ __props__.__dict__["listing_visibility"] = listing_visibility
1374
+ __props__.__dict__["local"] = local
1375
+ __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
1376
+ __props__.__dict__["max_ttl"] = max_ttl
1377
+ __props__.__dict__["namespace"] = namespace
1378
+ __props__.__dict__["options"] = options
1379
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
1380
+ __props__.__dict__["path"] = path
1381
+ __props__.__dict__["plugin_version"] = plugin_version
1382
+ __props__.__dict__["rotation_period"] = rotation_period
1383
+ __props__.__dict__["rotation_schedule"] = rotation_schedule
1384
+ __props__.__dict__["rotation_window"] = rotation_window
1385
+ __props__.__dict__["seal_wrap"] = seal_wrap
1386
+ __props__.__dict__["service_account_email"] = service_account_email
1387
+ __props__.__dict__["ttl"] = ttl
1388
+ __props__.__dict__["accessor"] = None
1389
+ secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["credentials", "credentialsWo"])
1390
+ opts = pulumi.ResourceOptions.merge(opts, secret_opts)
1391
+ super(SecretBackend, __self__).__init__(
1392
+ 'vault:gcp/secretBackend:SecretBackend',
1393
+ resource_name,
1394
+ __props__,
1395
+ opts)
1396
+
1397
+ @staticmethod
1398
+ def get(resource_name: str,
1399
+ id: pulumi.Input[str],
1400
+ opts: Optional[pulumi.ResourceOptions] = None,
1401
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
1402
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1403
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1404
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1405
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1406
+ credentials: Optional[pulumi.Input[_builtins.str]] = None,
1407
+ credentials_wo: Optional[pulumi.Input[_builtins.str]] = None,
1408
+ credentials_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
1409
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1410
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1411
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1412
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
1413
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1414
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1415
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1416
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
1417
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1418
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1419
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1420
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1421
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1422
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1423
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1424
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1425
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1426
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1427
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1428
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
1429
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
1430
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
1431
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1432
+ service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
1433
+ ttl: Optional[pulumi.Input[_builtins.int]] = None) -> 'SecretBackend':
1434
+ """
1435
+ Get an existing SecretBackend resource's state with the given name, id, and optional extra
1436
+ properties used to qualify the lookup.
1437
+
1438
+ :param str resource_name: The unique name of the resulting resource.
1439
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
1440
+ :param pulumi.ResourceOptions opts: Options for the resource.
1441
+ :param pulumi.Input[_builtins.str] accessor: The accessor of the created GCP mount.
1442
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1443
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1444
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1445
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1446
+ :param pulumi.Input[_builtins.str] credentials: JSON-encoded credentials to use to connect to GCP
1447
+ :param pulumi.Input[_builtins.str] credentials_wo: **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
1448
+ Write-only JSON-encoded credentials to use to connect to GCP
1449
+ :param pulumi.Input[_builtins.int] credentials_wo_version: The version of the `credentials_wo`. For more info see updating write-only attributes.
1450
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
1451
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1452
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
1453
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1454
+ *Available only for Vault Enterprise*.
1455
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1456
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1457
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1458
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1459
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value for plugin identity
1460
+ tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
1461
+ Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
1462
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens.
1463
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated tokens.
1464
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1465
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1466
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
1467
+ :param pulumi.Input[_builtins.int] max_ttl: The maximum TTL for long-lived credentials (i.e. service account keys).
1468
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
1469
+ The value should not contain leading or trailing forward slashes.
1470
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1471
+ *Available only for Vault Enterprise*.
1472
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1473
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1474
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
1475
+ not begin or end with a `/`. Defaults to `gcp`.
1476
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1477
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
1478
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
1479
+ *Available only for Vault Enterprise*.
1480
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1481
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
1482
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
1483
+ a rotation when a scheduled token rotation occurs. The default rotation window is
1484
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
1485
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1486
+ :param pulumi.Input[_builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
1487
+ Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
1488
+ :param pulumi.Input[_builtins.int] ttl: The default TTL for long-lived credentials (i.e. service account keys).
1489
+ """
1490
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
1491
+
1492
+ __props__ = _SecretBackendState.__new__(_SecretBackendState)
1493
+
1494
+ __props__.__dict__["accessor"] = accessor
1495
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1496
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1497
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1498
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
1499
+ __props__.__dict__["credentials"] = credentials
1500
+ __props__.__dict__["credentials_wo"] = credentials_wo
1501
+ __props__.__dict__["credentials_wo_version"] = credentials_wo_version
1502
+ __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1503
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
1504
+ __props__.__dict__["description"] = description
1505
+ __props__.__dict__["disable_automated_rotation"] = disable_automated_rotation
1506
+ __props__.__dict__["disable_remount"] = disable_remount
1507
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1508
+ __props__.__dict__["force_no_cache"] = force_no_cache
1509
+ __props__.__dict__["identity_token_audience"] = identity_token_audience
1510
+ __props__.__dict__["identity_token_key"] = identity_token_key
1511
+ __props__.__dict__["identity_token_ttl"] = identity_token_ttl
1512
+ __props__.__dict__["listing_visibility"] = listing_visibility
1513
+ __props__.__dict__["local"] = local
1514
+ __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
1515
+ __props__.__dict__["max_ttl"] = max_ttl
1516
+ __props__.__dict__["namespace"] = namespace
1517
+ __props__.__dict__["options"] = options
1518
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
1519
+ __props__.__dict__["path"] = path
1520
+ __props__.__dict__["plugin_version"] = plugin_version
1521
+ __props__.__dict__["rotation_period"] = rotation_period
1522
+ __props__.__dict__["rotation_schedule"] = rotation_schedule
1523
+ __props__.__dict__["rotation_window"] = rotation_window
1524
+ __props__.__dict__["seal_wrap"] = seal_wrap
1525
+ __props__.__dict__["service_account_email"] = service_account_email
1526
+ __props__.__dict__["ttl"] = ttl
1527
+ return SecretBackend(resource_name, opts=opts, __props__=__props__)
1528
+
1529
+ @_builtins.property
1530
+ @pulumi.getter
1531
+ def accessor(self) -> pulumi.Output[_builtins.str]:
1532
+ """
1533
+ The accessor of the created GCP mount.
1534
+ """
1535
+ return pulumi.get(self, "accessor")
1536
+
1537
+ @_builtins.property
1538
+ @pulumi.getter(name="allowedManagedKeys")
1539
+ def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1540
+ """
1541
+ List of managed key registry entry names that the mount in question is allowed to access
1542
+ """
1543
+ return pulumi.get(self, "allowed_managed_keys")
1544
+
1545
+ @_builtins.property
1546
+ @pulumi.getter(name="allowedResponseHeaders")
1547
+ def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1548
+ """
1549
+ List of headers to allow and pass from the request to the plugin
1550
+ """
1551
+ return pulumi.get(self, "allowed_response_headers")
1552
+
1553
+ @_builtins.property
1554
+ @pulumi.getter(name="auditNonHmacRequestKeys")
1555
+ def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1556
+ """
1557
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1558
+ """
1559
+ return pulumi.get(self, "audit_non_hmac_request_keys")
1560
+
1561
+ @_builtins.property
1562
+ @pulumi.getter(name="auditNonHmacResponseKeys")
1563
+ def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1564
+ """
1565
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1566
+ """
1567
+ return pulumi.get(self, "audit_non_hmac_response_keys")
1568
+
1569
+ @_builtins.property
1570
+ @pulumi.getter
1571
+ def credentials(self) -> pulumi.Output[Optional[_builtins.str]]:
1572
+ """
1573
+ JSON-encoded credentials to use to connect to GCP
1574
+ """
1575
+ return pulumi.get(self, "credentials")
1576
+
1577
+ @_builtins.property
1578
+ @pulumi.getter(name="credentialsWo")
1579
+ def credentials_wo(self) -> pulumi.Output[Optional[_builtins.str]]:
1580
+ """
1581
+ **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
1582
+ Write-only JSON-encoded credentials to use to connect to GCP
1583
+ """
1584
+ return pulumi.get(self, "credentials_wo")
1585
+
1586
+ @_builtins.property
1587
+ @pulumi.getter(name="credentialsWoVersion")
1588
+ def credentials_wo_version(self) -> pulumi.Output[Optional[_builtins.int]]:
1589
+ """
1590
+ The version of the `credentials_wo`. For more info see updating write-only attributes.
1591
+ """
1592
+ return pulumi.get(self, "credentials_wo_version")
1593
+
1594
+ @_builtins.property
1595
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
1596
+ def default_lease_ttl_seconds(self) -> pulumi.Output[Optional[_builtins.int]]:
1597
+ """
1598
+ Default lease duration for secrets in seconds
1599
+ """
1600
+ return pulumi.get(self, "default_lease_ttl_seconds")
1601
+
1602
+ @_builtins.property
1603
+ @pulumi.getter(name="delegatedAuthAccessors")
1604
+ def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1605
+ """
1606
+ List of headers to allow and pass from the request to the plugin
1607
+ """
1608
+ return pulumi.get(self, "delegated_auth_accessors")
1609
+
1610
+ @_builtins.property
1611
+ @pulumi.getter
1612
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
1613
+ """
1614
+ Human-friendly description of the mount for the backend.
1615
+ """
1616
+ return pulumi.get(self, "description")
1617
+
1618
+ @_builtins.property
1619
+ @pulumi.getter(name="disableAutomatedRotation")
1620
+ def disable_automated_rotation(self) -> pulumi.Output[Optional[_builtins.bool]]:
1621
+ """
1622
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1623
+ *Available only for Vault Enterprise*.
1624
+ """
1625
+ return pulumi.get(self, "disable_automated_rotation")
1626
+
1627
+ @_builtins.property
1628
+ @pulumi.getter(name="disableRemount")
1629
+ def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
1630
+ """
1631
+ If set, opts out of mount migration on path updates.
1632
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1633
+ """
1634
+ return pulumi.get(self, "disable_remount")
1635
+
1636
+ @_builtins.property
1637
+ @pulumi.getter(name="externalEntropyAccess")
1638
+ def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
1639
+ """
1640
+ Enable the secrets engine to access Vault's external entropy source
1641
+ """
1642
+ return pulumi.get(self, "external_entropy_access")
1643
+
1644
+ @_builtins.property
1645
+ @pulumi.getter(name="forceNoCache")
1646
+ def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
1647
+ """
1648
+ If set to true, disables caching.
1649
+ """
1650
+ return pulumi.get(self, "force_no_cache")
1651
+
1652
+ @_builtins.property
1653
+ @pulumi.getter(name="identityTokenAudience")
1654
+ def identity_token_audience(self) -> pulumi.Output[Optional[_builtins.str]]:
1655
+ """
1656
+ The audience claim value for plugin identity
1657
+ tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
1658
+ Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
1659
+ """
1660
+ return pulumi.get(self, "identity_token_audience")
1661
+
1662
+ @_builtins.property
1663
+ @pulumi.getter(name="identityTokenKey")
1664
+ def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
1665
+ """
1666
+ The key to use for signing identity tokens.
1667
+ """
1668
+ return pulumi.get(self, "identity_token_key")
1669
+
1670
+ @_builtins.property
1671
+ @pulumi.getter(name="identityTokenTtl")
1672
+ def identity_token_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1673
+ """
1674
+ The TTL of generated tokens.
1675
+ """
1676
+ return pulumi.get(self, "identity_token_ttl")
1677
+
1678
+ @_builtins.property
1679
+ @pulumi.getter(name="listingVisibility")
1680
+ def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
1681
+ """
1682
+ Specifies whether to show this mount in the UI-specific listing endpoint
1683
+ """
1684
+ return pulumi.get(self, "listing_visibility")
1685
+
1686
+ @_builtins.property
1687
+ @pulumi.getter
1688
+ def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
1689
+ """
1690
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1691
+ """
1692
+ return pulumi.get(self, "local")
1693
+
1694
+ @_builtins.property
1695
+ @pulumi.getter(name="maxLeaseTtlSeconds")
1696
+ def max_lease_ttl_seconds(self) -> pulumi.Output[Optional[_builtins.int]]:
1697
+ """
1698
+ Maximum possible lease duration for secrets in seconds
1699
+ """
1700
+ return pulumi.get(self, "max_lease_ttl_seconds")
1701
+
1702
+ @_builtins.property
1703
+ @pulumi.getter(name="maxTtl")
1704
+ def max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1705
+ """
1706
+ The maximum TTL for long-lived credentials (i.e. service account keys).
1707
+ """
1708
+ return pulumi.get(self, "max_ttl")
1709
+
1710
+ @_builtins.property
1711
+ @pulumi.getter
1712
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
1713
+ """
1714
+ The namespace to provision the resource in.
1715
+ The value should not contain leading or trailing forward slashes.
1716
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1717
+ *Available only for Vault Enterprise*.
1718
+ """
1719
+ return pulumi.get(self, "namespace")
1720
+
1721
+ @_builtins.property
1722
+ @pulumi.getter
1723
+ def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
1724
+ """
1725
+ Specifies mount type specific options that are passed to the backend
1726
+ """
1727
+ return pulumi.get(self, "options")
1728
+
1729
+ @_builtins.property
1730
+ @pulumi.getter(name="passthroughRequestHeaders")
1731
+ def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1732
+ """
1733
+ List of headers to allow and pass from the request to the plugin
1734
+ """
1735
+ return pulumi.get(self, "passthrough_request_headers")
1736
+
1737
+ @_builtins.property
1738
+ @pulumi.getter
1739
+ def path(self) -> pulumi.Output[Optional[_builtins.str]]:
1740
+ """
1741
+ The unique path this backend should be mounted at. Must
1742
+ not begin or end with a `/`. Defaults to `gcp`.
1743
+ """
1744
+ return pulumi.get(self, "path")
1745
+
1746
+ @_builtins.property
1747
+ @pulumi.getter(name="pluginVersion")
1748
+ def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
1749
+ """
1750
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1751
+ """
1752
+ return pulumi.get(self, "plugin_version")
1753
+
1754
+ @_builtins.property
1755
+ @pulumi.getter(name="rotationPeriod")
1756
+ def rotation_period(self) -> pulumi.Output[Optional[_builtins.int]]:
1757
+ """
1758
+ The amount of time in seconds Vault should wait before rotating the root credential.
1759
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
1760
+ *Available only for Vault Enterprise*.
1761
+ """
1762
+ return pulumi.get(self, "rotation_period")
1763
+
1764
+ @_builtins.property
1765
+ @pulumi.getter(name="rotationSchedule")
1766
+ def rotation_schedule(self) -> pulumi.Output[Optional[_builtins.str]]:
1767
+ """
1768
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1769
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
1770
+ """
1771
+ return pulumi.get(self, "rotation_schedule")
1772
+
1773
+ @_builtins.property
1774
+ @pulumi.getter(name="rotationWindow")
1775
+ def rotation_window(self) -> pulumi.Output[Optional[_builtins.int]]:
1776
+ """
1777
+ The maximum amount of time in seconds allowed to complete
1778
+ a rotation when a scheduled token rotation occurs. The default rotation window is
1779
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
1780
+ """
1781
+ return pulumi.get(self, "rotation_window")
1782
+
1783
+ @_builtins.property
1784
+ @pulumi.getter(name="sealWrap")
1785
+ def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
1786
+ """
1787
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1788
+ """
1789
+ return pulumi.get(self, "seal_wrap")
1790
+
1791
+ @_builtins.property
1792
+ @pulumi.getter(name="serviceAccountEmail")
1793
+ def service_account_email(self) -> pulumi.Output[Optional[_builtins.str]]:
1794
+ """
1795
+ Service Account to impersonate for plugin workload identity federation.
1796
+ Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
1797
+ """
1798
+ return pulumi.get(self, "service_account_email")
1799
+
1800
+ @_builtins.property
1801
+ @pulumi.getter
1802
+ def ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1803
+ """
1804
+ The default TTL for long-lived credentials (i.e. service account keys).
1805
+ """
1806
+ return pulumi.get(self, "ttl")
1807
+