pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,1591 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['SecretBackendArgs', 'SecretBackend']
18
+
19
+ @pulumi.input_type
20
+ class SecretBackendArgs:
21
+ def __init__(__self__, *,
22
+ path: pulumi.Input[_builtins.str],
23
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
24
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
25
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
28
+ default_tls_client_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
29
+ default_tls_client_key_type: Optional[pulumi.Input[_builtins.str]] = None,
30
+ default_tls_client_ttl: Optional[pulumi.Input[_builtins.int]] = None,
31
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
32
+ description: Optional[pulumi.Input[_builtins.str]] = None,
33
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
34
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
35
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
36
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
37
+ listen_addrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
38
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
39
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
40
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
41
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
42
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
43
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
44
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
45
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
46
+ server_hostnames: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
47
+ server_ips: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
48
+ tls_ca_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
49
+ tls_ca_key_type: Optional[pulumi.Input[_builtins.str]] = None,
50
+ tls_min_version: Optional[pulumi.Input[_builtins.str]] = None):
51
+ """
52
+ The set of arguments for constructing a SecretBackend resource.
53
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
54
+ not begin or end with a `/`. Defaults to `kmip`.
55
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
56
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
57
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
58
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
59
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
60
+ :param pulumi.Input[_builtins.int] default_tls_client_key_bits: Client certificate key bits, valid values depend on key type.
61
+ :param pulumi.Input[_builtins.str] default_tls_client_key_type: Client certificate key type, `rsa` or `ec`.
62
+ :param pulumi.Input[_builtins.int] default_tls_client_ttl: Client certificate TTL in seconds
63
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
64
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend
65
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
66
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
67
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
68
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
69
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
70
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] listen_addrs: Addresses the KMIP server should listen on (`host:port`).
71
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
72
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
73
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
74
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
75
+ The value should not contain leading or trailing forward slashes.
76
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
77
+ *Available only for Vault Enterprise*.
78
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
79
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
80
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
81
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
82
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] server_hostnames: Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN).
83
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] server_ips: IPs to include in the server's TLS certificate as SAN IP addresses.
84
+ :param pulumi.Input[_builtins.int] tls_ca_key_bits: CA key bits, valid values depend on key type.
85
+ :param pulumi.Input[_builtins.str] tls_ca_key_type: CA key type, rsa or ec.
86
+ :param pulumi.Input[_builtins.str] tls_min_version: Minimum TLS version to accept.
87
+ """
88
+ pulumi.set(__self__, "path", path)
89
+ if allowed_managed_keys is not None:
90
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
91
+ if allowed_response_headers is not None:
92
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
93
+ if audit_non_hmac_request_keys is not None:
94
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
95
+ if audit_non_hmac_response_keys is not None:
96
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
97
+ if default_lease_ttl_seconds is not None:
98
+ pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
99
+ if default_tls_client_key_bits is not None:
100
+ pulumi.set(__self__, "default_tls_client_key_bits", default_tls_client_key_bits)
101
+ if default_tls_client_key_type is not None:
102
+ pulumi.set(__self__, "default_tls_client_key_type", default_tls_client_key_type)
103
+ if default_tls_client_ttl is not None:
104
+ pulumi.set(__self__, "default_tls_client_ttl", default_tls_client_ttl)
105
+ if delegated_auth_accessors is not None:
106
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
107
+ if description is not None:
108
+ pulumi.set(__self__, "description", description)
109
+ if disable_remount is not None:
110
+ pulumi.set(__self__, "disable_remount", disable_remount)
111
+ if external_entropy_access is not None:
112
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
113
+ if force_no_cache is not None:
114
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
115
+ if identity_token_key is not None:
116
+ pulumi.set(__self__, "identity_token_key", identity_token_key)
117
+ if listen_addrs is not None:
118
+ pulumi.set(__self__, "listen_addrs", listen_addrs)
119
+ if listing_visibility is not None:
120
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
121
+ if local is not None:
122
+ pulumi.set(__self__, "local", local)
123
+ if max_lease_ttl_seconds is not None:
124
+ pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
125
+ if namespace is not None:
126
+ pulumi.set(__self__, "namespace", namespace)
127
+ if options is not None:
128
+ pulumi.set(__self__, "options", options)
129
+ if passthrough_request_headers is not None:
130
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
131
+ if plugin_version is not None:
132
+ pulumi.set(__self__, "plugin_version", plugin_version)
133
+ if seal_wrap is not None:
134
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
135
+ if server_hostnames is not None:
136
+ pulumi.set(__self__, "server_hostnames", server_hostnames)
137
+ if server_ips is not None:
138
+ pulumi.set(__self__, "server_ips", server_ips)
139
+ if tls_ca_key_bits is not None:
140
+ pulumi.set(__self__, "tls_ca_key_bits", tls_ca_key_bits)
141
+ if tls_ca_key_type is not None:
142
+ pulumi.set(__self__, "tls_ca_key_type", tls_ca_key_type)
143
+ if tls_min_version is not None:
144
+ pulumi.set(__self__, "tls_min_version", tls_min_version)
145
+
146
+ @_builtins.property
147
+ @pulumi.getter
148
+ def path(self) -> pulumi.Input[_builtins.str]:
149
+ """
150
+ The unique path this backend should be mounted at. Must
151
+ not begin or end with a `/`. Defaults to `kmip`.
152
+ """
153
+ return pulumi.get(self, "path")
154
+
155
+ @path.setter
156
+ def path(self, value: pulumi.Input[_builtins.str]):
157
+ pulumi.set(self, "path", value)
158
+
159
+ @_builtins.property
160
+ @pulumi.getter(name="allowedManagedKeys")
161
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
162
+ """
163
+ List of managed key registry entry names that the mount in question is allowed to access
164
+ """
165
+ return pulumi.get(self, "allowed_managed_keys")
166
+
167
+ @allowed_managed_keys.setter
168
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
169
+ pulumi.set(self, "allowed_managed_keys", value)
170
+
171
+ @_builtins.property
172
+ @pulumi.getter(name="allowedResponseHeaders")
173
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
174
+ """
175
+ List of headers to allow and pass from the request to the plugin
176
+ """
177
+ return pulumi.get(self, "allowed_response_headers")
178
+
179
+ @allowed_response_headers.setter
180
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
181
+ pulumi.set(self, "allowed_response_headers", value)
182
+
183
+ @_builtins.property
184
+ @pulumi.getter(name="auditNonHmacRequestKeys")
185
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
186
+ """
187
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
188
+ """
189
+ return pulumi.get(self, "audit_non_hmac_request_keys")
190
+
191
+ @audit_non_hmac_request_keys.setter
192
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
193
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
194
+
195
+ @_builtins.property
196
+ @pulumi.getter(name="auditNonHmacResponseKeys")
197
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
198
+ """
199
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
200
+ """
201
+ return pulumi.get(self, "audit_non_hmac_response_keys")
202
+
203
+ @audit_non_hmac_response_keys.setter
204
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
205
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
206
+
207
+ @_builtins.property
208
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
209
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
210
+ """
211
+ Default lease duration for tokens and secrets in seconds
212
+ """
213
+ return pulumi.get(self, "default_lease_ttl_seconds")
214
+
215
+ @default_lease_ttl_seconds.setter
216
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
217
+ pulumi.set(self, "default_lease_ttl_seconds", value)
218
+
219
+ @_builtins.property
220
+ @pulumi.getter(name="defaultTlsClientKeyBits")
221
+ def default_tls_client_key_bits(self) -> Optional[pulumi.Input[_builtins.int]]:
222
+ """
223
+ Client certificate key bits, valid values depend on key type.
224
+ """
225
+ return pulumi.get(self, "default_tls_client_key_bits")
226
+
227
+ @default_tls_client_key_bits.setter
228
+ def default_tls_client_key_bits(self, value: Optional[pulumi.Input[_builtins.int]]):
229
+ pulumi.set(self, "default_tls_client_key_bits", value)
230
+
231
+ @_builtins.property
232
+ @pulumi.getter(name="defaultTlsClientKeyType")
233
+ def default_tls_client_key_type(self) -> Optional[pulumi.Input[_builtins.str]]:
234
+ """
235
+ Client certificate key type, `rsa` or `ec`.
236
+ """
237
+ return pulumi.get(self, "default_tls_client_key_type")
238
+
239
+ @default_tls_client_key_type.setter
240
+ def default_tls_client_key_type(self, value: Optional[pulumi.Input[_builtins.str]]):
241
+ pulumi.set(self, "default_tls_client_key_type", value)
242
+
243
+ @_builtins.property
244
+ @pulumi.getter(name="defaultTlsClientTtl")
245
+ def default_tls_client_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
246
+ """
247
+ Client certificate TTL in seconds
248
+ """
249
+ return pulumi.get(self, "default_tls_client_ttl")
250
+
251
+ @default_tls_client_ttl.setter
252
+ def default_tls_client_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
253
+ pulumi.set(self, "default_tls_client_ttl", value)
254
+
255
+ @_builtins.property
256
+ @pulumi.getter(name="delegatedAuthAccessors")
257
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
258
+ """
259
+ List of headers to allow and pass from the request to the plugin
260
+ """
261
+ return pulumi.get(self, "delegated_auth_accessors")
262
+
263
+ @delegated_auth_accessors.setter
264
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
265
+ pulumi.set(self, "delegated_auth_accessors", value)
266
+
267
+ @_builtins.property
268
+ @pulumi.getter
269
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
270
+ """
271
+ Human-friendly description of the mount for the backend
272
+ """
273
+ return pulumi.get(self, "description")
274
+
275
+ @description.setter
276
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
277
+ pulumi.set(self, "description", value)
278
+
279
+ @_builtins.property
280
+ @pulumi.getter(name="disableRemount")
281
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
282
+ """
283
+ If set, opts out of mount migration on path updates.
284
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
285
+ """
286
+ return pulumi.get(self, "disable_remount")
287
+
288
+ @disable_remount.setter
289
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
290
+ pulumi.set(self, "disable_remount", value)
291
+
292
+ @_builtins.property
293
+ @pulumi.getter(name="externalEntropyAccess")
294
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
295
+ """
296
+ Enable the secrets engine to access Vault's external entropy source
297
+ """
298
+ return pulumi.get(self, "external_entropy_access")
299
+
300
+ @external_entropy_access.setter
301
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
302
+ pulumi.set(self, "external_entropy_access", value)
303
+
304
+ @_builtins.property
305
+ @pulumi.getter(name="forceNoCache")
306
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
307
+ """
308
+ If set to true, disables caching.
309
+ """
310
+ return pulumi.get(self, "force_no_cache")
311
+
312
+ @force_no_cache.setter
313
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
314
+ pulumi.set(self, "force_no_cache", value)
315
+
316
+ @_builtins.property
317
+ @pulumi.getter(name="identityTokenKey")
318
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
319
+ """
320
+ The key to use for signing plugin workload identity tokens
321
+ """
322
+ return pulumi.get(self, "identity_token_key")
323
+
324
+ @identity_token_key.setter
325
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
326
+ pulumi.set(self, "identity_token_key", value)
327
+
328
+ @_builtins.property
329
+ @pulumi.getter(name="listenAddrs")
330
+ def listen_addrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
331
+ """
332
+ Addresses the KMIP server should listen on (`host:port`).
333
+ """
334
+ return pulumi.get(self, "listen_addrs")
335
+
336
+ @listen_addrs.setter
337
+ def listen_addrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
338
+ pulumi.set(self, "listen_addrs", value)
339
+
340
+ @_builtins.property
341
+ @pulumi.getter(name="listingVisibility")
342
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
343
+ """
344
+ Specifies whether to show this mount in the UI-specific listing endpoint
345
+ """
346
+ return pulumi.get(self, "listing_visibility")
347
+
348
+ @listing_visibility.setter
349
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
350
+ pulumi.set(self, "listing_visibility", value)
351
+
352
+ @_builtins.property
353
+ @pulumi.getter
354
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
355
+ """
356
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
357
+ """
358
+ return pulumi.get(self, "local")
359
+
360
+ @local.setter
361
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
362
+ pulumi.set(self, "local", value)
363
+
364
+ @_builtins.property
365
+ @pulumi.getter(name="maxLeaseTtlSeconds")
366
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
367
+ """
368
+ Maximum possible lease duration for tokens and secrets in seconds
369
+ """
370
+ return pulumi.get(self, "max_lease_ttl_seconds")
371
+
372
+ @max_lease_ttl_seconds.setter
373
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
374
+ pulumi.set(self, "max_lease_ttl_seconds", value)
375
+
376
+ @_builtins.property
377
+ @pulumi.getter
378
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
379
+ """
380
+ The namespace to provision the resource in.
381
+ The value should not contain leading or trailing forward slashes.
382
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
383
+ *Available only for Vault Enterprise*.
384
+ """
385
+ return pulumi.get(self, "namespace")
386
+
387
+ @namespace.setter
388
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
389
+ pulumi.set(self, "namespace", value)
390
+
391
+ @_builtins.property
392
+ @pulumi.getter
393
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
394
+ """
395
+ Specifies mount type specific options that are passed to the backend
396
+ """
397
+ return pulumi.get(self, "options")
398
+
399
+ @options.setter
400
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
401
+ pulumi.set(self, "options", value)
402
+
403
+ @_builtins.property
404
+ @pulumi.getter(name="passthroughRequestHeaders")
405
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
406
+ """
407
+ List of headers to allow and pass from the request to the plugin
408
+ """
409
+ return pulumi.get(self, "passthrough_request_headers")
410
+
411
+ @passthrough_request_headers.setter
412
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
413
+ pulumi.set(self, "passthrough_request_headers", value)
414
+
415
+ @_builtins.property
416
+ @pulumi.getter(name="pluginVersion")
417
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
418
+ """
419
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
420
+ """
421
+ return pulumi.get(self, "plugin_version")
422
+
423
+ @plugin_version.setter
424
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
425
+ pulumi.set(self, "plugin_version", value)
426
+
427
+ @_builtins.property
428
+ @pulumi.getter(name="sealWrap")
429
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
430
+ """
431
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
432
+ """
433
+ return pulumi.get(self, "seal_wrap")
434
+
435
+ @seal_wrap.setter
436
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
437
+ pulumi.set(self, "seal_wrap", value)
438
+
439
+ @_builtins.property
440
+ @pulumi.getter(name="serverHostnames")
441
+ def server_hostnames(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
442
+ """
443
+ Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN).
444
+ """
445
+ return pulumi.get(self, "server_hostnames")
446
+
447
+ @server_hostnames.setter
448
+ def server_hostnames(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
449
+ pulumi.set(self, "server_hostnames", value)
450
+
451
+ @_builtins.property
452
+ @pulumi.getter(name="serverIps")
453
+ def server_ips(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
454
+ """
455
+ IPs to include in the server's TLS certificate as SAN IP addresses.
456
+ """
457
+ return pulumi.get(self, "server_ips")
458
+
459
+ @server_ips.setter
460
+ def server_ips(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
461
+ pulumi.set(self, "server_ips", value)
462
+
463
+ @_builtins.property
464
+ @pulumi.getter(name="tlsCaKeyBits")
465
+ def tls_ca_key_bits(self) -> Optional[pulumi.Input[_builtins.int]]:
466
+ """
467
+ CA key bits, valid values depend on key type.
468
+ """
469
+ return pulumi.get(self, "tls_ca_key_bits")
470
+
471
+ @tls_ca_key_bits.setter
472
+ def tls_ca_key_bits(self, value: Optional[pulumi.Input[_builtins.int]]):
473
+ pulumi.set(self, "tls_ca_key_bits", value)
474
+
475
+ @_builtins.property
476
+ @pulumi.getter(name="tlsCaKeyType")
477
+ def tls_ca_key_type(self) -> Optional[pulumi.Input[_builtins.str]]:
478
+ """
479
+ CA key type, rsa or ec.
480
+ """
481
+ return pulumi.get(self, "tls_ca_key_type")
482
+
483
+ @tls_ca_key_type.setter
484
+ def tls_ca_key_type(self, value: Optional[pulumi.Input[_builtins.str]]):
485
+ pulumi.set(self, "tls_ca_key_type", value)
486
+
487
+ @_builtins.property
488
+ @pulumi.getter(name="tlsMinVersion")
489
+ def tls_min_version(self) -> Optional[pulumi.Input[_builtins.str]]:
490
+ """
491
+ Minimum TLS version to accept.
492
+ """
493
+ return pulumi.get(self, "tls_min_version")
494
+
495
+ @tls_min_version.setter
496
+ def tls_min_version(self, value: Optional[pulumi.Input[_builtins.str]]):
497
+ pulumi.set(self, "tls_min_version", value)
498
+
499
+
500
+ @pulumi.input_type
501
+ class _SecretBackendState:
502
+ def __init__(__self__, *,
503
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
504
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
505
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
506
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
507
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
508
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
509
+ default_tls_client_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
510
+ default_tls_client_key_type: Optional[pulumi.Input[_builtins.str]] = None,
511
+ default_tls_client_ttl: Optional[pulumi.Input[_builtins.int]] = None,
512
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
513
+ description: Optional[pulumi.Input[_builtins.str]] = None,
514
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
515
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
516
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
517
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
518
+ listen_addrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
519
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
520
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
521
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
522
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
523
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
524
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
525
+ path: Optional[pulumi.Input[_builtins.str]] = None,
526
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
527
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
528
+ server_hostnames: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
529
+ server_ips: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
530
+ tls_ca_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
531
+ tls_ca_key_type: Optional[pulumi.Input[_builtins.str]] = None,
532
+ tls_min_version: Optional[pulumi.Input[_builtins.str]] = None):
533
+ """
534
+ Input properties used for looking up and filtering SecretBackend resources.
535
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
536
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
537
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
538
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
539
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
540
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
541
+ :param pulumi.Input[_builtins.int] default_tls_client_key_bits: Client certificate key bits, valid values depend on key type.
542
+ :param pulumi.Input[_builtins.str] default_tls_client_key_type: Client certificate key type, `rsa` or `ec`.
543
+ :param pulumi.Input[_builtins.int] default_tls_client_ttl: Client certificate TTL in seconds
544
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
545
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend
546
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
547
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
548
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
549
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
550
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
551
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] listen_addrs: Addresses the KMIP server should listen on (`host:port`).
552
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
553
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
554
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
555
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
556
+ The value should not contain leading or trailing forward slashes.
557
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
558
+ *Available only for Vault Enterprise*.
559
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
560
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
561
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
562
+ not begin or end with a `/`. Defaults to `kmip`.
563
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
564
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
565
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] server_hostnames: Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN).
566
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] server_ips: IPs to include in the server's TLS certificate as SAN IP addresses.
567
+ :param pulumi.Input[_builtins.int] tls_ca_key_bits: CA key bits, valid values depend on key type.
568
+ :param pulumi.Input[_builtins.str] tls_ca_key_type: CA key type, rsa or ec.
569
+ :param pulumi.Input[_builtins.str] tls_min_version: Minimum TLS version to accept.
570
+ """
571
+ if accessor is not None:
572
+ pulumi.set(__self__, "accessor", accessor)
573
+ if allowed_managed_keys is not None:
574
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
575
+ if allowed_response_headers is not None:
576
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
577
+ if audit_non_hmac_request_keys is not None:
578
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
579
+ if audit_non_hmac_response_keys is not None:
580
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
581
+ if default_lease_ttl_seconds is not None:
582
+ pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
583
+ if default_tls_client_key_bits is not None:
584
+ pulumi.set(__self__, "default_tls_client_key_bits", default_tls_client_key_bits)
585
+ if default_tls_client_key_type is not None:
586
+ pulumi.set(__self__, "default_tls_client_key_type", default_tls_client_key_type)
587
+ if default_tls_client_ttl is not None:
588
+ pulumi.set(__self__, "default_tls_client_ttl", default_tls_client_ttl)
589
+ if delegated_auth_accessors is not None:
590
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
591
+ if description is not None:
592
+ pulumi.set(__self__, "description", description)
593
+ if disable_remount is not None:
594
+ pulumi.set(__self__, "disable_remount", disable_remount)
595
+ if external_entropy_access is not None:
596
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
597
+ if force_no_cache is not None:
598
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
599
+ if identity_token_key is not None:
600
+ pulumi.set(__self__, "identity_token_key", identity_token_key)
601
+ if listen_addrs is not None:
602
+ pulumi.set(__self__, "listen_addrs", listen_addrs)
603
+ if listing_visibility is not None:
604
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
605
+ if local is not None:
606
+ pulumi.set(__self__, "local", local)
607
+ if max_lease_ttl_seconds is not None:
608
+ pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
609
+ if namespace is not None:
610
+ pulumi.set(__self__, "namespace", namespace)
611
+ if options is not None:
612
+ pulumi.set(__self__, "options", options)
613
+ if passthrough_request_headers is not None:
614
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
615
+ if path is not None:
616
+ pulumi.set(__self__, "path", path)
617
+ if plugin_version is not None:
618
+ pulumi.set(__self__, "plugin_version", plugin_version)
619
+ if seal_wrap is not None:
620
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
621
+ if server_hostnames is not None:
622
+ pulumi.set(__self__, "server_hostnames", server_hostnames)
623
+ if server_ips is not None:
624
+ pulumi.set(__self__, "server_ips", server_ips)
625
+ if tls_ca_key_bits is not None:
626
+ pulumi.set(__self__, "tls_ca_key_bits", tls_ca_key_bits)
627
+ if tls_ca_key_type is not None:
628
+ pulumi.set(__self__, "tls_ca_key_type", tls_ca_key_type)
629
+ if tls_min_version is not None:
630
+ pulumi.set(__self__, "tls_min_version", tls_min_version)
631
+
632
+ @_builtins.property
633
+ @pulumi.getter
634
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
635
+ """
636
+ Accessor of the mount
637
+ """
638
+ return pulumi.get(self, "accessor")
639
+
640
+ @accessor.setter
641
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
642
+ pulumi.set(self, "accessor", value)
643
+
644
+ @_builtins.property
645
+ @pulumi.getter(name="allowedManagedKeys")
646
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
647
+ """
648
+ List of managed key registry entry names that the mount in question is allowed to access
649
+ """
650
+ return pulumi.get(self, "allowed_managed_keys")
651
+
652
+ @allowed_managed_keys.setter
653
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
654
+ pulumi.set(self, "allowed_managed_keys", value)
655
+
656
+ @_builtins.property
657
+ @pulumi.getter(name="allowedResponseHeaders")
658
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
659
+ """
660
+ List of headers to allow and pass from the request to the plugin
661
+ """
662
+ return pulumi.get(self, "allowed_response_headers")
663
+
664
+ @allowed_response_headers.setter
665
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
666
+ pulumi.set(self, "allowed_response_headers", value)
667
+
668
+ @_builtins.property
669
+ @pulumi.getter(name="auditNonHmacRequestKeys")
670
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
671
+ """
672
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
673
+ """
674
+ return pulumi.get(self, "audit_non_hmac_request_keys")
675
+
676
+ @audit_non_hmac_request_keys.setter
677
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
678
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
679
+
680
+ @_builtins.property
681
+ @pulumi.getter(name="auditNonHmacResponseKeys")
682
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
683
+ """
684
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
685
+ """
686
+ return pulumi.get(self, "audit_non_hmac_response_keys")
687
+
688
+ @audit_non_hmac_response_keys.setter
689
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
690
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
691
+
692
+ @_builtins.property
693
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
694
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
695
+ """
696
+ Default lease duration for tokens and secrets in seconds
697
+ """
698
+ return pulumi.get(self, "default_lease_ttl_seconds")
699
+
700
+ @default_lease_ttl_seconds.setter
701
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
702
+ pulumi.set(self, "default_lease_ttl_seconds", value)
703
+
704
+ @_builtins.property
705
+ @pulumi.getter(name="defaultTlsClientKeyBits")
706
+ def default_tls_client_key_bits(self) -> Optional[pulumi.Input[_builtins.int]]:
707
+ """
708
+ Client certificate key bits, valid values depend on key type.
709
+ """
710
+ return pulumi.get(self, "default_tls_client_key_bits")
711
+
712
+ @default_tls_client_key_bits.setter
713
+ def default_tls_client_key_bits(self, value: Optional[pulumi.Input[_builtins.int]]):
714
+ pulumi.set(self, "default_tls_client_key_bits", value)
715
+
716
+ @_builtins.property
717
+ @pulumi.getter(name="defaultTlsClientKeyType")
718
+ def default_tls_client_key_type(self) -> Optional[pulumi.Input[_builtins.str]]:
719
+ """
720
+ Client certificate key type, `rsa` or `ec`.
721
+ """
722
+ return pulumi.get(self, "default_tls_client_key_type")
723
+
724
+ @default_tls_client_key_type.setter
725
+ def default_tls_client_key_type(self, value: Optional[pulumi.Input[_builtins.str]]):
726
+ pulumi.set(self, "default_tls_client_key_type", value)
727
+
728
+ @_builtins.property
729
+ @pulumi.getter(name="defaultTlsClientTtl")
730
+ def default_tls_client_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
731
+ """
732
+ Client certificate TTL in seconds
733
+ """
734
+ return pulumi.get(self, "default_tls_client_ttl")
735
+
736
+ @default_tls_client_ttl.setter
737
+ def default_tls_client_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
738
+ pulumi.set(self, "default_tls_client_ttl", value)
739
+
740
+ @_builtins.property
741
+ @pulumi.getter(name="delegatedAuthAccessors")
742
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
743
+ """
744
+ List of headers to allow and pass from the request to the plugin
745
+ """
746
+ return pulumi.get(self, "delegated_auth_accessors")
747
+
748
+ @delegated_auth_accessors.setter
749
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
750
+ pulumi.set(self, "delegated_auth_accessors", value)
751
+
752
+ @_builtins.property
753
+ @pulumi.getter
754
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
755
+ """
756
+ Human-friendly description of the mount for the backend
757
+ """
758
+ return pulumi.get(self, "description")
759
+
760
+ @description.setter
761
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
762
+ pulumi.set(self, "description", value)
763
+
764
+ @_builtins.property
765
+ @pulumi.getter(name="disableRemount")
766
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
767
+ """
768
+ If set, opts out of mount migration on path updates.
769
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
770
+ """
771
+ return pulumi.get(self, "disable_remount")
772
+
773
+ @disable_remount.setter
774
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
775
+ pulumi.set(self, "disable_remount", value)
776
+
777
+ @_builtins.property
778
+ @pulumi.getter(name="externalEntropyAccess")
779
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
780
+ """
781
+ Enable the secrets engine to access Vault's external entropy source
782
+ """
783
+ return pulumi.get(self, "external_entropy_access")
784
+
785
+ @external_entropy_access.setter
786
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
787
+ pulumi.set(self, "external_entropy_access", value)
788
+
789
+ @_builtins.property
790
+ @pulumi.getter(name="forceNoCache")
791
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
792
+ """
793
+ If set to true, disables caching.
794
+ """
795
+ return pulumi.get(self, "force_no_cache")
796
+
797
+ @force_no_cache.setter
798
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
799
+ pulumi.set(self, "force_no_cache", value)
800
+
801
+ @_builtins.property
802
+ @pulumi.getter(name="identityTokenKey")
803
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
804
+ """
805
+ The key to use for signing plugin workload identity tokens
806
+ """
807
+ return pulumi.get(self, "identity_token_key")
808
+
809
+ @identity_token_key.setter
810
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
811
+ pulumi.set(self, "identity_token_key", value)
812
+
813
+ @_builtins.property
814
+ @pulumi.getter(name="listenAddrs")
815
+ def listen_addrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
816
+ """
817
+ Addresses the KMIP server should listen on (`host:port`).
818
+ """
819
+ return pulumi.get(self, "listen_addrs")
820
+
821
+ @listen_addrs.setter
822
+ def listen_addrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
823
+ pulumi.set(self, "listen_addrs", value)
824
+
825
+ @_builtins.property
826
+ @pulumi.getter(name="listingVisibility")
827
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
828
+ """
829
+ Specifies whether to show this mount in the UI-specific listing endpoint
830
+ """
831
+ return pulumi.get(self, "listing_visibility")
832
+
833
+ @listing_visibility.setter
834
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
835
+ pulumi.set(self, "listing_visibility", value)
836
+
837
+ @_builtins.property
838
+ @pulumi.getter
839
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
840
+ """
841
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
842
+ """
843
+ return pulumi.get(self, "local")
844
+
845
+ @local.setter
846
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
847
+ pulumi.set(self, "local", value)
848
+
849
+ @_builtins.property
850
+ @pulumi.getter(name="maxLeaseTtlSeconds")
851
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
852
+ """
853
+ Maximum possible lease duration for tokens and secrets in seconds
854
+ """
855
+ return pulumi.get(self, "max_lease_ttl_seconds")
856
+
857
+ @max_lease_ttl_seconds.setter
858
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
859
+ pulumi.set(self, "max_lease_ttl_seconds", value)
860
+
861
+ @_builtins.property
862
+ @pulumi.getter
863
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
864
+ """
865
+ The namespace to provision the resource in.
866
+ The value should not contain leading or trailing forward slashes.
867
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
868
+ *Available only for Vault Enterprise*.
869
+ """
870
+ return pulumi.get(self, "namespace")
871
+
872
+ @namespace.setter
873
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
874
+ pulumi.set(self, "namespace", value)
875
+
876
+ @_builtins.property
877
+ @pulumi.getter
878
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
879
+ """
880
+ Specifies mount type specific options that are passed to the backend
881
+ """
882
+ return pulumi.get(self, "options")
883
+
884
+ @options.setter
885
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
886
+ pulumi.set(self, "options", value)
887
+
888
+ @_builtins.property
889
+ @pulumi.getter(name="passthroughRequestHeaders")
890
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
891
+ """
892
+ List of headers to allow and pass from the request to the plugin
893
+ """
894
+ return pulumi.get(self, "passthrough_request_headers")
895
+
896
+ @passthrough_request_headers.setter
897
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
898
+ pulumi.set(self, "passthrough_request_headers", value)
899
+
900
+ @_builtins.property
901
+ @pulumi.getter
902
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
903
+ """
904
+ The unique path this backend should be mounted at. Must
905
+ not begin or end with a `/`. Defaults to `kmip`.
906
+ """
907
+ return pulumi.get(self, "path")
908
+
909
+ @path.setter
910
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
911
+ pulumi.set(self, "path", value)
912
+
913
+ @_builtins.property
914
+ @pulumi.getter(name="pluginVersion")
915
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
916
+ """
917
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
918
+ """
919
+ return pulumi.get(self, "plugin_version")
920
+
921
+ @plugin_version.setter
922
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
923
+ pulumi.set(self, "plugin_version", value)
924
+
925
+ @_builtins.property
926
+ @pulumi.getter(name="sealWrap")
927
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
928
+ """
929
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
930
+ """
931
+ return pulumi.get(self, "seal_wrap")
932
+
933
+ @seal_wrap.setter
934
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
935
+ pulumi.set(self, "seal_wrap", value)
936
+
937
+ @_builtins.property
938
+ @pulumi.getter(name="serverHostnames")
939
+ def server_hostnames(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
940
+ """
941
+ Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN).
942
+ """
943
+ return pulumi.get(self, "server_hostnames")
944
+
945
+ @server_hostnames.setter
946
+ def server_hostnames(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
947
+ pulumi.set(self, "server_hostnames", value)
948
+
949
+ @_builtins.property
950
+ @pulumi.getter(name="serverIps")
951
+ def server_ips(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
952
+ """
953
+ IPs to include in the server's TLS certificate as SAN IP addresses.
954
+ """
955
+ return pulumi.get(self, "server_ips")
956
+
957
+ @server_ips.setter
958
+ def server_ips(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
959
+ pulumi.set(self, "server_ips", value)
960
+
961
+ @_builtins.property
962
+ @pulumi.getter(name="tlsCaKeyBits")
963
+ def tls_ca_key_bits(self) -> Optional[pulumi.Input[_builtins.int]]:
964
+ """
965
+ CA key bits, valid values depend on key type.
966
+ """
967
+ return pulumi.get(self, "tls_ca_key_bits")
968
+
969
+ @tls_ca_key_bits.setter
970
+ def tls_ca_key_bits(self, value: Optional[pulumi.Input[_builtins.int]]):
971
+ pulumi.set(self, "tls_ca_key_bits", value)
972
+
973
+ @_builtins.property
974
+ @pulumi.getter(name="tlsCaKeyType")
975
+ def tls_ca_key_type(self) -> Optional[pulumi.Input[_builtins.str]]:
976
+ """
977
+ CA key type, rsa or ec.
978
+ """
979
+ return pulumi.get(self, "tls_ca_key_type")
980
+
981
+ @tls_ca_key_type.setter
982
+ def tls_ca_key_type(self, value: Optional[pulumi.Input[_builtins.str]]):
983
+ pulumi.set(self, "tls_ca_key_type", value)
984
+
985
+ @_builtins.property
986
+ @pulumi.getter(name="tlsMinVersion")
987
+ def tls_min_version(self) -> Optional[pulumi.Input[_builtins.str]]:
988
+ """
989
+ Minimum TLS version to accept.
990
+ """
991
+ return pulumi.get(self, "tls_min_version")
992
+
993
+ @tls_min_version.setter
994
+ def tls_min_version(self, value: Optional[pulumi.Input[_builtins.str]]):
995
+ pulumi.set(self, "tls_min_version", value)
996
+
997
+
998
+ @pulumi.type_token("vault:kmip/secretBackend:SecretBackend")
999
+ class SecretBackend(pulumi.CustomResource):
1000
+ @overload
1001
+ def __init__(__self__,
1002
+ resource_name: str,
1003
+ opts: Optional[pulumi.ResourceOptions] = None,
1004
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1005
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1006
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1007
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1008
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1009
+ default_tls_client_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
1010
+ default_tls_client_key_type: Optional[pulumi.Input[_builtins.str]] = None,
1011
+ default_tls_client_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1012
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1013
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1014
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1015
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1016
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1017
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1018
+ listen_addrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1019
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1020
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1021
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1022
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1023
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1024
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1025
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1026
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1027
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1028
+ server_hostnames: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1029
+ server_ips: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1030
+ tls_ca_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
1031
+ tls_ca_key_type: Optional[pulumi.Input[_builtins.str]] = None,
1032
+ tls_min_version: Optional[pulumi.Input[_builtins.str]] = None,
1033
+ __props__=None):
1034
+ """
1035
+ Manages KMIP Secret backends in a Vault server. This feature requires
1036
+ Vault Enterprise. See the [Vault documentation](https://www.vaultproject.io/docs/secrets/kmip)
1037
+ for more information.
1038
+
1039
+ ## Example Usage
1040
+
1041
+ ```python
1042
+ import pulumi
1043
+ import pulumi_vault as vault
1044
+
1045
+ default = vault.kmip.SecretBackend("default",
1046
+ path="kmip",
1047
+ description="Vault KMIP backend",
1048
+ listen_addrs=[
1049
+ "127.0.0.1:5696",
1050
+ "127.0.0.1:8080",
1051
+ ],
1052
+ tls_ca_key_type="rsa",
1053
+ tls_ca_key_bits=4096,
1054
+ default_tls_client_key_type="rsa",
1055
+ default_tls_client_key_bits=4096,
1056
+ default_tls_client_ttl=86400)
1057
+ ```
1058
+
1059
+ ## Import
1060
+
1061
+ KMIP Secret backend can be imported using the `path`, e.g.
1062
+
1063
+ ```sh
1064
+ $ pulumi import vault:kmip/secretBackend:SecretBackend default kmip
1065
+ ```
1066
+
1067
+ :param str resource_name: The name of the resource.
1068
+ :param pulumi.ResourceOptions opts: Options for the resource.
1069
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1070
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1071
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1072
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1073
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
1074
+ :param pulumi.Input[_builtins.int] default_tls_client_key_bits: Client certificate key bits, valid values depend on key type.
1075
+ :param pulumi.Input[_builtins.str] default_tls_client_key_type: Client certificate key type, `rsa` or `ec`.
1076
+ :param pulumi.Input[_builtins.int] default_tls_client_ttl: Client certificate TTL in seconds
1077
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1078
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend
1079
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1080
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1081
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1082
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1083
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1084
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] listen_addrs: Addresses the KMIP server should listen on (`host:port`).
1085
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1086
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1087
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
1088
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
1089
+ The value should not contain leading or trailing forward slashes.
1090
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1091
+ *Available only for Vault Enterprise*.
1092
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1093
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1094
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
1095
+ not begin or end with a `/`. Defaults to `kmip`.
1096
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1097
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1098
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] server_hostnames: Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN).
1099
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] server_ips: IPs to include in the server's TLS certificate as SAN IP addresses.
1100
+ :param pulumi.Input[_builtins.int] tls_ca_key_bits: CA key bits, valid values depend on key type.
1101
+ :param pulumi.Input[_builtins.str] tls_ca_key_type: CA key type, rsa or ec.
1102
+ :param pulumi.Input[_builtins.str] tls_min_version: Minimum TLS version to accept.
1103
+ """
1104
+ ...
1105
+ @overload
1106
+ def __init__(__self__,
1107
+ resource_name: str,
1108
+ args: SecretBackendArgs,
1109
+ opts: Optional[pulumi.ResourceOptions] = None):
1110
+ """
1111
+ Manages KMIP Secret backends in a Vault server. This feature requires
1112
+ Vault Enterprise. See the [Vault documentation](https://www.vaultproject.io/docs/secrets/kmip)
1113
+ for more information.
1114
+
1115
+ ## Example Usage
1116
+
1117
+ ```python
1118
+ import pulumi
1119
+ import pulumi_vault as vault
1120
+
1121
+ default = vault.kmip.SecretBackend("default",
1122
+ path="kmip",
1123
+ description="Vault KMIP backend",
1124
+ listen_addrs=[
1125
+ "127.0.0.1:5696",
1126
+ "127.0.0.1:8080",
1127
+ ],
1128
+ tls_ca_key_type="rsa",
1129
+ tls_ca_key_bits=4096,
1130
+ default_tls_client_key_type="rsa",
1131
+ default_tls_client_key_bits=4096,
1132
+ default_tls_client_ttl=86400)
1133
+ ```
1134
+
1135
+ ## Import
1136
+
1137
+ KMIP Secret backend can be imported using the `path`, e.g.
1138
+
1139
+ ```sh
1140
+ $ pulumi import vault:kmip/secretBackend:SecretBackend default kmip
1141
+ ```
1142
+
1143
+ :param str resource_name: The name of the resource.
1144
+ :param SecretBackendArgs args: The arguments to use to populate this resource's properties.
1145
+ :param pulumi.ResourceOptions opts: Options for the resource.
1146
+ """
1147
+ ...
1148
+ def __init__(__self__, resource_name: str, *args, **kwargs):
1149
+ resource_args, opts = _utilities.get_resource_args_opts(SecretBackendArgs, pulumi.ResourceOptions, *args, **kwargs)
1150
+ if resource_args is not None:
1151
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
1152
+ else:
1153
+ __self__._internal_init(resource_name, *args, **kwargs)
1154
+
1155
+ def _internal_init(__self__,
1156
+ resource_name: str,
1157
+ opts: Optional[pulumi.ResourceOptions] = None,
1158
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1159
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1160
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1161
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1162
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1163
+ default_tls_client_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
1164
+ default_tls_client_key_type: Optional[pulumi.Input[_builtins.str]] = None,
1165
+ default_tls_client_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1166
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1167
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1168
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1169
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1170
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1171
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1172
+ listen_addrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1173
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1174
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1175
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1176
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1177
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1178
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1179
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1180
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1181
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1182
+ server_hostnames: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1183
+ server_ips: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1184
+ tls_ca_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
1185
+ tls_ca_key_type: Optional[pulumi.Input[_builtins.str]] = None,
1186
+ tls_min_version: Optional[pulumi.Input[_builtins.str]] = None,
1187
+ __props__=None):
1188
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
1189
+ if not isinstance(opts, pulumi.ResourceOptions):
1190
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
1191
+ if opts.id is None:
1192
+ if __props__ is not None:
1193
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
1194
+ __props__ = SecretBackendArgs.__new__(SecretBackendArgs)
1195
+
1196
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1197
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1198
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1199
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
1200
+ __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1201
+ __props__.__dict__["default_tls_client_key_bits"] = default_tls_client_key_bits
1202
+ __props__.__dict__["default_tls_client_key_type"] = default_tls_client_key_type
1203
+ __props__.__dict__["default_tls_client_ttl"] = default_tls_client_ttl
1204
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
1205
+ __props__.__dict__["description"] = description
1206
+ __props__.__dict__["disable_remount"] = disable_remount
1207
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1208
+ __props__.__dict__["force_no_cache"] = force_no_cache
1209
+ __props__.__dict__["identity_token_key"] = identity_token_key
1210
+ __props__.__dict__["listen_addrs"] = listen_addrs
1211
+ __props__.__dict__["listing_visibility"] = listing_visibility
1212
+ __props__.__dict__["local"] = local
1213
+ __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
1214
+ __props__.__dict__["namespace"] = namespace
1215
+ __props__.__dict__["options"] = options
1216
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
1217
+ if path is None and not opts.urn:
1218
+ raise TypeError("Missing required property 'path'")
1219
+ __props__.__dict__["path"] = path
1220
+ __props__.__dict__["plugin_version"] = plugin_version
1221
+ __props__.__dict__["seal_wrap"] = seal_wrap
1222
+ __props__.__dict__["server_hostnames"] = server_hostnames
1223
+ __props__.__dict__["server_ips"] = server_ips
1224
+ __props__.__dict__["tls_ca_key_bits"] = tls_ca_key_bits
1225
+ __props__.__dict__["tls_ca_key_type"] = tls_ca_key_type
1226
+ __props__.__dict__["tls_min_version"] = tls_min_version
1227
+ __props__.__dict__["accessor"] = None
1228
+ super(SecretBackend, __self__).__init__(
1229
+ 'vault:kmip/secretBackend:SecretBackend',
1230
+ resource_name,
1231
+ __props__,
1232
+ opts)
1233
+
1234
+ @staticmethod
1235
+ def get(resource_name: str,
1236
+ id: pulumi.Input[str],
1237
+ opts: Optional[pulumi.ResourceOptions] = None,
1238
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
1239
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1240
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1241
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1242
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1243
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1244
+ default_tls_client_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
1245
+ default_tls_client_key_type: Optional[pulumi.Input[_builtins.str]] = None,
1246
+ default_tls_client_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1247
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1248
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1249
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1250
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1251
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1252
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1253
+ listen_addrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1254
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1255
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1256
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1257
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1258
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1259
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1260
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1261
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1262
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1263
+ server_hostnames: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1264
+ server_ips: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1265
+ tls_ca_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
1266
+ tls_ca_key_type: Optional[pulumi.Input[_builtins.str]] = None,
1267
+ tls_min_version: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackend':
1268
+ """
1269
+ Get an existing SecretBackend resource's state with the given name, id, and optional extra
1270
+ properties used to qualify the lookup.
1271
+
1272
+ :param str resource_name: The unique name of the resulting resource.
1273
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
1274
+ :param pulumi.ResourceOptions opts: Options for the resource.
1275
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
1276
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1277
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1278
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1279
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1280
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
1281
+ :param pulumi.Input[_builtins.int] default_tls_client_key_bits: Client certificate key bits, valid values depend on key type.
1282
+ :param pulumi.Input[_builtins.str] default_tls_client_key_type: Client certificate key type, `rsa` or `ec`.
1283
+ :param pulumi.Input[_builtins.int] default_tls_client_ttl: Client certificate TTL in seconds
1284
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1285
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend
1286
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1287
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1288
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1289
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1290
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1291
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] listen_addrs: Addresses the KMIP server should listen on (`host:port`).
1292
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1293
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1294
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
1295
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
1296
+ The value should not contain leading or trailing forward slashes.
1297
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1298
+ *Available only for Vault Enterprise*.
1299
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1300
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1301
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
1302
+ not begin or end with a `/`. Defaults to `kmip`.
1303
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1304
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1305
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] server_hostnames: Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN).
1306
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] server_ips: IPs to include in the server's TLS certificate as SAN IP addresses.
1307
+ :param pulumi.Input[_builtins.int] tls_ca_key_bits: CA key bits, valid values depend on key type.
1308
+ :param pulumi.Input[_builtins.str] tls_ca_key_type: CA key type, rsa or ec.
1309
+ :param pulumi.Input[_builtins.str] tls_min_version: Minimum TLS version to accept.
1310
+ """
1311
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
1312
+
1313
+ __props__ = _SecretBackendState.__new__(_SecretBackendState)
1314
+
1315
+ __props__.__dict__["accessor"] = accessor
1316
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1317
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1318
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1319
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
1320
+ __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1321
+ __props__.__dict__["default_tls_client_key_bits"] = default_tls_client_key_bits
1322
+ __props__.__dict__["default_tls_client_key_type"] = default_tls_client_key_type
1323
+ __props__.__dict__["default_tls_client_ttl"] = default_tls_client_ttl
1324
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
1325
+ __props__.__dict__["description"] = description
1326
+ __props__.__dict__["disable_remount"] = disable_remount
1327
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1328
+ __props__.__dict__["force_no_cache"] = force_no_cache
1329
+ __props__.__dict__["identity_token_key"] = identity_token_key
1330
+ __props__.__dict__["listen_addrs"] = listen_addrs
1331
+ __props__.__dict__["listing_visibility"] = listing_visibility
1332
+ __props__.__dict__["local"] = local
1333
+ __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
1334
+ __props__.__dict__["namespace"] = namespace
1335
+ __props__.__dict__["options"] = options
1336
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
1337
+ __props__.__dict__["path"] = path
1338
+ __props__.__dict__["plugin_version"] = plugin_version
1339
+ __props__.__dict__["seal_wrap"] = seal_wrap
1340
+ __props__.__dict__["server_hostnames"] = server_hostnames
1341
+ __props__.__dict__["server_ips"] = server_ips
1342
+ __props__.__dict__["tls_ca_key_bits"] = tls_ca_key_bits
1343
+ __props__.__dict__["tls_ca_key_type"] = tls_ca_key_type
1344
+ __props__.__dict__["tls_min_version"] = tls_min_version
1345
+ return SecretBackend(resource_name, opts=opts, __props__=__props__)
1346
+
1347
+ @_builtins.property
1348
+ @pulumi.getter
1349
+ def accessor(self) -> pulumi.Output[_builtins.str]:
1350
+ """
1351
+ Accessor of the mount
1352
+ """
1353
+ return pulumi.get(self, "accessor")
1354
+
1355
+ @_builtins.property
1356
+ @pulumi.getter(name="allowedManagedKeys")
1357
+ def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1358
+ """
1359
+ List of managed key registry entry names that the mount in question is allowed to access
1360
+ """
1361
+ return pulumi.get(self, "allowed_managed_keys")
1362
+
1363
+ @_builtins.property
1364
+ @pulumi.getter(name="allowedResponseHeaders")
1365
+ def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1366
+ """
1367
+ List of headers to allow and pass from the request to the plugin
1368
+ """
1369
+ return pulumi.get(self, "allowed_response_headers")
1370
+
1371
+ @_builtins.property
1372
+ @pulumi.getter(name="auditNonHmacRequestKeys")
1373
+ def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1374
+ """
1375
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1376
+ """
1377
+ return pulumi.get(self, "audit_non_hmac_request_keys")
1378
+
1379
+ @_builtins.property
1380
+ @pulumi.getter(name="auditNonHmacResponseKeys")
1381
+ def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1382
+ """
1383
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1384
+ """
1385
+ return pulumi.get(self, "audit_non_hmac_response_keys")
1386
+
1387
+ @_builtins.property
1388
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
1389
+ def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1390
+ """
1391
+ Default lease duration for tokens and secrets in seconds
1392
+ """
1393
+ return pulumi.get(self, "default_lease_ttl_seconds")
1394
+
1395
+ @_builtins.property
1396
+ @pulumi.getter(name="defaultTlsClientKeyBits")
1397
+ def default_tls_client_key_bits(self) -> pulumi.Output[_builtins.int]:
1398
+ """
1399
+ Client certificate key bits, valid values depend on key type.
1400
+ """
1401
+ return pulumi.get(self, "default_tls_client_key_bits")
1402
+
1403
+ @_builtins.property
1404
+ @pulumi.getter(name="defaultTlsClientKeyType")
1405
+ def default_tls_client_key_type(self) -> pulumi.Output[_builtins.str]:
1406
+ """
1407
+ Client certificate key type, `rsa` or `ec`.
1408
+ """
1409
+ return pulumi.get(self, "default_tls_client_key_type")
1410
+
1411
+ @_builtins.property
1412
+ @pulumi.getter(name="defaultTlsClientTtl")
1413
+ def default_tls_client_ttl(self) -> pulumi.Output[_builtins.int]:
1414
+ """
1415
+ Client certificate TTL in seconds
1416
+ """
1417
+ return pulumi.get(self, "default_tls_client_ttl")
1418
+
1419
+ @_builtins.property
1420
+ @pulumi.getter(name="delegatedAuthAccessors")
1421
+ def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1422
+ """
1423
+ List of headers to allow and pass from the request to the plugin
1424
+ """
1425
+ return pulumi.get(self, "delegated_auth_accessors")
1426
+
1427
+ @_builtins.property
1428
+ @pulumi.getter
1429
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
1430
+ """
1431
+ Human-friendly description of the mount for the backend
1432
+ """
1433
+ return pulumi.get(self, "description")
1434
+
1435
+ @_builtins.property
1436
+ @pulumi.getter(name="disableRemount")
1437
+ def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
1438
+ """
1439
+ If set, opts out of mount migration on path updates.
1440
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1441
+ """
1442
+ return pulumi.get(self, "disable_remount")
1443
+
1444
+ @_builtins.property
1445
+ @pulumi.getter(name="externalEntropyAccess")
1446
+ def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
1447
+ """
1448
+ Enable the secrets engine to access Vault's external entropy source
1449
+ """
1450
+ return pulumi.get(self, "external_entropy_access")
1451
+
1452
+ @_builtins.property
1453
+ @pulumi.getter(name="forceNoCache")
1454
+ def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
1455
+ """
1456
+ If set to true, disables caching.
1457
+ """
1458
+ return pulumi.get(self, "force_no_cache")
1459
+
1460
+ @_builtins.property
1461
+ @pulumi.getter(name="identityTokenKey")
1462
+ def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
1463
+ """
1464
+ The key to use for signing plugin workload identity tokens
1465
+ """
1466
+ return pulumi.get(self, "identity_token_key")
1467
+
1468
+ @_builtins.property
1469
+ @pulumi.getter(name="listenAddrs")
1470
+ def listen_addrs(self) -> pulumi.Output[Sequence[_builtins.str]]:
1471
+ """
1472
+ Addresses the KMIP server should listen on (`host:port`).
1473
+ """
1474
+ return pulumi.get(self, "listen_addrs")
1475
+
1476
+ @_builtins.property
1477
+ @pulumi.getter(name="listingVisibility")
1478
+ def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
1479
+ """
1480
+ Specifies whether to show this mount in the UI-specific listing endpoint
1481
+ """
1482
+ return pulumi.get(self, "listing_visibility")
1483
+
1484
+ @_builtins.property
1485
+ @pulumi.getter
1486
+ def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
1487
+ """
1488
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1489
+ """
1490
+ return pulumi.get(self, "local")
1491
+
1492
+ @_builtins.property
1493
+ @pulumi.getter(name="maxLeaseTtlSeconds")
1494
+ def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1495
+ """
1496
+ Maximum possible lease duration for tokens and secrets in seconds
1497
+ """
1498
+ return pulumi.get(self, "max_lease_ttl_seconds")
1499
+
1500
+ @_builtins.property
1501
+ @pulumi.getter
1502
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
1503
+ """
1504
+ The namespace to provision the resource in.
1505
+ The value should not contain leading or trailing forward slashes.
1506
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1507
+ *Available only for Vault Enterprise*.
1508
+ """
1509
+ return pulumi.get(self, "namespace")
1510
+
1511
+ @_builtins.property
1512
+ @pulumi.getter
1513
+ def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
1514
+ """
1515
+ Specifies mount type specific options that are passed to the backend
1516
+ """
1517
+ return pulumi.get(self, "options")
1518
+
1519
+ @_builtins.property
1520
+ @pulumi.getter(name="passthroughRequestHeaders")
1521
+ def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1522
+ """
1523
+ List of headers to allow and pass from the request to the plugin
1524
+ """
1525
+ return pulumi.get(self, "passthrough_request_headers")
1526
+
1527
+ @_builtins.property
1528
+ @pulumi.getter
1529
+ def path(self) -> pulumi.Output[_builtins.str]:
1530
+ """
1531
+ The unique path this backend should be mounted at. Must
1532
+ not begin or end with a `/`. Defaults to `kmip`.
1533
+ """
1534
+ return pulumi.get(self, "path")
1535
+
1536
+ @_builtins.property
1537
+ @pulumi.getter(name="pluginVersion")
1538
+ def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
1539
+ """
1540
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1541
+ """
1542
+ return pulumi.get(self, "plugin_version")
1543
+
1544
+ @_builtins.property
1545
+ @pulumi.getter(name="sealWrap")
1546
+ def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
1547
+ """
1548
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1549
+ """
1550
+ return pulumi.get(self, "seal_wrap")
1551
+
1552
+ @_builtins.property
1553
+ @pulumi.getter(name="serverHostnames")
1554
+ def server_hostnames(self) -> pulumi.Output[Sequence[_builtins.str]]:
1555
+ """
1556
+ Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN).
1557
+ """
1558
+ return pulumi.get(self, "server_hostnames")
1559
+
1560
+ @_builtins.property
1561
+ @pulumi.getter(name="serverIps")
1562
+ def server_ips(self) -> pulumi.Output[Sequence[_builtins.str]]:
1563
+ """
1564
+ IPs to include in the server's TLS certificate as SAN IP addresses.
1565
+ """
1566
+ return pulumi.get(self, "server_ips")
1567
+
1568
+ @_builtins.property
1569
+ @pulumi.getter(name="tlsCaKeyBits")
1570
+ def tls_ca_key_bits(self) -> pulumi.Output[_builtins.int]:
1571
+ """
1572
+ CA key bits, valid values depend on key type.
1573
+ """
1574
+ return pulumi.get(self, "tls_ca_key_bits")
1575
+
1576
+ @_builtins.property
1577
+ @pulumi.getter(name="tlsCaKeyType")
1578
+ def tls_ca_key_type(self) -> pulumi.Output[_builtins.str]:
1579
+ """
1580
+ CA key type, rsa or ec.
1581
+ """
1582
+ return pulumi.get(self, "tls_ca_key_type")
1583
+
1584
+ @_builtins.property
1585
+ @pulumi.getter(name="tlsMinVersion")
1586
+ def tls_min_version(self) -> pulumi.Output[_builtins.str]:
1587
+ """
1588
+ Minimum TLS version to accept.
1589
+ """
1590
+ return pulumi.get(self, "tls_min_version")
1591
+