pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712731873__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (192) hide show
  1. pulumi_vault/__init__.py +0 -26
  2. pulumi_vault/_inputs.py +20 -0
  3. pulumi_vault/ad/secret_backend.py +6 -2
  4. pulumi_vault/ad/secret_library.py +4 -2
  5. pulumi_vault/ad/secret_role.py +4 -0
  6. pulumi_vault/alicloud/auth_backend_role.py +192 -69
  7. pulumi_vault/approle/auth_backend_login.py +4 -0
  8. pulumi_vault/approle/auth_backend_role.py +186 -63
  9. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  10. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  11. pulumi_vault/audit.py +20 -12
  12. pulumi_vault/audit_request_header.py +6 -6
  13. pulumi_vault/auth_backend.py +0 -47
  14. pulumi_vault/aws/auth_backend_client.py +17 -253
  15. pulumi_vault/aws/auth_backend_config_identity.py +4 -0
  16. pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
  17. pulumi_vault/aws/auth_backend_login.py +8 -0
  18. pulumi_vault/aws/auth_backend_role.py +186 -63
  19. pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
  20. pulumi_vault/aws/auth_backend_sts_role.py +4 -0
  21. pulumi_vault/aws/secret_backend_role.py +4 -56
  22. pulumi_vault/aws/secret_backend_static_role.py +4 -2
  23. pulumi_vault/azure/auth_backend_config.py +10 -139
  24. pulumi_vault/azure/auth_backend_role.py +186 -63
  25. pulumi_vault/azure/backend.py +22 -217
  26. pulumi_vault/azure/backend_role.py +18 -14
  27. pulumi_vault/azure/get_access_credentials.py +4 -0
  28. pulumi_vault/cert_auth_backend_role.py +208 -75
  29. pulumi_vault/consul/secret_backend.py +18 -10
  30. pulumi_vault/consul/secret_backend_role.py +4 -2
  31. pulumi_vault/database/_inputs.py +784 -522
  32. pulumi_vault/database/outputs.py +784 -522
  33. pulumi_vault/database/secret_backend_connection.py +4 -2
  34. pulumi_vault/database/secret_backend_role.py +4 -4
  35. pulumi_vault/database/secret_backend_static_role.py +8 -10
  36. pulumi_vault/database/secrets_mount.py +4 -286
  37. pulumi_vault/egp_policy.py +8 -4
  38. pulumi_vault/gcp/auth_backend.py +18 -226
  39. pulumi_vault/gcp/auth_backend_role.py +264 -63
  40. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  41. pulumi_vault/gcp/secret_backend.py +9 -275
  42. pulumi_vault/gcp/secret_impersonated_account.py +14 -12
  43. pulumi_vault/gcp/secret_roleset.py +6 -4
  44. pulumi_vault/gcp/secret_static_account.py +16 -14
  45. pulumi_vault/generic/endpoint.py +8 -4
  46. pulumi_vault/generic/get_secret.py +4 -40
  47. pulumi_vault/get_auth_backend.py +4 -0
  48. pulumi_vault/get_auth_backends.py +8 -0
  49. pulumi_vault/get_namespace.py +12 -0
  50. pulumi_vault/get_namespaces.py +12 -4
  51. pulumi_vault/get_nomad_access_token.py +4 -0
  52. pulumi_vault/get_policy_document.py +8 -8
  53. pulumi_vault/get_raft_autopilot_state.py +4 -0
  54. pulumi_vault/github/auth_backend.py +4 -0
  55. pulumi_vault/github/team.py +6 -2
  56. pulumi_vault/github/user.py +6 -2
  57. pulumi_vault/identity/entity.py +8 -6
  58. pulumi_vault/identity/entity_alias.py +8 -6
  59. pulumi_vault/identity/entity_policies.py +12 -12
  60. pulumi_vault/identity/get_entity.py +4 -0
  61. pulumi_vault/identity/get_group.py +4 -0
  62. pulumi_vault/identity/get_oidc_client_creds.py +4 -2
  63. pulumi_vault/identity/get_oidc_openid_config.py +6 -10
  64. pulumi_vault/identity/get_oidc_public_keys.py +6 -10
  65. pulumi_vault/identity/group.py +42 -38
  66. pulumi_vault/identity/group_alias.py +4 -2
  67. pulumi_vault/identity/group_member_entity_ids.py +16 -12
  68. pulumi_vault/identity/group_member_group_ids.py +20 -24
  69. pulumi_vault/identity/group_policies.py +8 -4
  70. pulumi_vault/identity/mfa_duo.py +8 -4
  71. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  72. pulumi_vault/identity/mfa_okta.py +8 -4
  73. pulumi_vault/identity/mfa_pingid.py +4 -0
  74. pulumi_vault/identity/mfa_totp.py +4 -0
  75. pulumi_vault/identity/oidc.py +4 -0
  76. pulumi_vault/identity/oidc_assignment.py +6 -10
  77. pulumi_vault/identity/oidc_client.py +10 -10
  78. pulumi_vault/identity/oidc_key.py +12 -16
  79. pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
  80. pulumi_vault/identity/oidc_provider.py +16 -22
  81. pulumi_vault/identity/oidc_role.py +20 -28
  82. pulumi_vault/identity/oidc_scope.py +8 -6
  83. pulumi_vault/jwt/auth_backend.py +32 -20
  84. pulumi_vault/jwt/auth_backend_role.py +225 -91
  85. pulumi_vault/kmip/secret_backend.py +14 -10
  86. pulumi_vault/kmip/secret_role.py +4 -0
  87. pulumi_vault/kmip/secret_scope.py +4 -0
  88. pulumi_vault/kubernetes/auth_backend_config.py +4 -0
  89. pulumi_vault/kubernetes/auth_backend_role.py +172 -56
  90. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  91. pulumi_vault/kubernetes/secret_backend.py +8 -288
  92. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  93. pulumi_vault/kv/get_secret.py +4 -0
  94. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
  95. pulumi_vault/kv/get_secret_v2.py +0 -58
  96. pulumi_vault/kv/get_secrets_list.py +8 -4
  97. pulumi_vault/kv/get_secrets_list_v2.py +12 -14
  98. pulumi_vault/kv/secret.py +4 -0
  99. pulumi_vault/kv/secret_backend_v2.py +4 -0
  100. pulumi_vault/kv/secret_v2.py +4 -2
  101. pulumi_vault/ldap/auth_backend.py +161 -66
  102. pulumi_vault/ldap/auth_backend_group.py +4 -0
  103. pulumi_vault/ldap/auth_backend_user.py +4 -0
  104. pulumi_vault/ldap/secret_backend.py +8 -286
  105. pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
  106. pulumi_vault/ldap/secret_backend_library_set.py +4 -2
  107. pulumi_vault/ldap/secret_backend_static_role.py +4 -0
  108. pulumi_vault/managed/_inputs.py +132 -84
  109. pulumi_vault/managed/keys.py +28 -7
  110. pulumi_vault/managed/outputs.py +132 -84
  111. pulumi_vault/mfa_duo.py +6 -4
  112. pulumi_vault/mfa_okta.py +6 -4
  113. pulumi_vault/mfa_pingid.py +6 -4
  114. pulumi_vault/mfa_totp.py +12 -10
  115. pulumi_vault/mongodbatlas/secret_backend.py +4 -0
  116. pulumi_vault/mongodbatlas/secret_role.py +4 -2
  117. pulumi_vault/mount.py +42 -350
  118. pulumi_vault/nomad_secret_backend.py +8 -4
  119. pulumi_vault/nomad_secret_role.py +4 -0
  120. pulumi_vault/okta/_inputs.py +8 -8
  121. pulumi_vault/okta/auth_backend.py +10 -459
  122. pulumi_vault/okta/auth_backend_group.py +4 -0
  123. pulumi_vault/okta/auth_backend_user.py +4 -0
  124. pulumi_vault/okta/outputs.py +8 -8
  125. pulumi_vault/outputs.py +20 -0
  126. pulumi_vault/password_policy.py +8 -6
  127. pulumi_vault/pkisecret/__init__.py +0 -2
  128. pulumi_vault/pkisecret/_inputs.py +0 -30
  129. pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
  130. pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
  131. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  132. pulumi_vault/pkisecret/get_backend_key.py +6 -2
  133. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  134. pulumi_vault/pkisecret/outputs.py +0 -54
  135. pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
  136. pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
  137. pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
  138. pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
  139. pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
  140. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
  141. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
  142. pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
  143. pulumi_vault/pkisecret/secret_backend_role.py +4 -2
  144. pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
  145. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
  146. pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
  147. pulumi_vault/provider.py +8 -0
  148. pulumi_vault/pulumi-plugin.json +1 -2
  149. pulumi_vault/quota_lease_count.py +8 -53
  150. pulumi_vault/quota_rate_limit.py +4 -49
  151. pulumi_vault/rabbitmq/secret_backend.py +8 -4
  152. pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
  153. pulumi_vault/raft_autopilot.py +4 -0
  154. pulumi_vault/raft_snapshot_agent_config.py +304 -109
  155. pulumi_vault/rgp_policy.py +6 -2
  156. pulumi_vault/saml/auth_backend.py +12 -8
  157. pulumi_vault/saml/auth_backend_role.py +178 -64
  158. pulumi_vault/secrets/sync_association.py +10 -12
  159. pulumi_vault/secrets/sync_aws_destination.py +8 -6
  160. pulumi_vault/secrets/sync_azure_destination.py +12 -10
  161. pulumi_vault/secrets/sync_config.py +6 -2
  162. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  163. pulumi_vault/secrets/sync_gh_destination.py +8 -6
  164. pulumi_vault/secrets/sync_github_apps.py +8 -8
  165. pulumi_vault/secrets/sync_vercel_destination.py +8 -6
  166. pulumi_vault/ssh/_inputs.py +32 -6
  167. pulumi_vault/ssh/outputs.py +32 -6
  168. pulumi_vault/ssh/secret_backend_ca.py +4 -94
  169. pulumi_vault/ssh/secret_backend_role.py +4 -4
  170. pulumi_vault/terraformcloud/secret_backend.py +56 -0
  171. pulumi_vault/terraformcloud/secret_creds.py +17 -2
  172. pulumi_vault/terraformcloud/secret_role.py +69 -2
  173. pulumi_vault/token.py +18 -14
  174. pulumi_vault/tokenauth/auth_backend_role.py +180 -64
  175. pulumi_vault/transform/alphabet.py +6 -4
  176. pulumi_vault/transform/get_decode.py +4 -4
  177. pulumi_vault/transform/get_encode.py +4 -4
  178. pulumi_vault/transform/role.py +6 -4
  179. pulumi_vault/transform/template.py +4 -4
  180. pulumi_vault/transit/get_decrypt.py +20 -4
  181. pulumi_vault/transit/get_encrypt.py +14 -0
  182. pulumi_vault/transit/secret_backend_key.py +6 -6
  183. pulumi_vault/transit/secret_cache_config.py +4 -0
  184. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712731873.dist-info}/METADATA +1 -1
  185. pulumi_vault-6.2.0a1712731873.dist-info/RECORD +252 -0
  186. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712731873.dist-info}/WHEEL +1 -1
  187. pulumi_vault/pkisecret/backend_config_est.py +0 -614
  188. pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
  189. pulumi_vault/plugin.py +0 -590
  190. pulumi_vault/plugin_pinned_version.py +0 -293
  191. pulumi_vault-6.2.0.dist-info/RECORD +0 -256
  192. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712731873.dist-info}/top_level.txt +0 -0
@@ -16,40 +16,31 @@ class SecretBackendArgs:
16
16
  def __init__(__self__, *,
17
17
  path: pulumi.Input[str],
18
18
  allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
19
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
20
19
  audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
21
20
  audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
22
21
  default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
23
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
24
22
  description: Optional[pulumi.Input[str]] = None,
25
23
  disable_local_ca_jwt: Optional[pulumi.Input[bool]] = None,
26
24
  external_entropy_access: Optional[pulumi.Input[bool]] = None,
27
- identity_token_key: Optional[pulumi.Input[str]] = None,
28
25
  kubernetes_ca_cert: Optional[pulumi.Input[str]] = None,
29
26
  kubernetes_host: Optional[pulumi.Input[str]] = None,
30
- listing_visibility: Optional[pulumi.Input[str]] = None,
31
27
  local: Optional[pulumi.Input[bool]] = None,
32
28
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
33
29
  namespace: Optional[pulumi.Input[str]] = None,
34
30
  options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
35
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
36
- plugin_version: Optional[pulumi.Input[str]] = None,
37
31
  seal_wrap: Optional[pulumi.Input[bool]] = None,
38
32
  service_account_jwt: Optional[pulumi.Input[str]] = None):
39
33
  """
40
34
  The set of arguments for constructing a SecretBackend resource.
41
35
  :param pulumi.Input[str] path: Where the secret backend will be mounted
42
36
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
43
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
44
37
  :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
45
38
  :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
46
39
  :param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
47
- :param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
48
40
  :param pulumi.Input[str] description: Human-friendly description of the mount
49
41
  :param pulumi.Input[bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
50
42
  service account JWT when Vault is running in a Kubernetes pod.
51
43
  :param pulumi.Input[bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
52
- :param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens
53
44
  :param pulumi.Input[str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
54
45
  secrets engine to verify the Kubernetes API server certificate. Defaults to the local
55
46
  pod’s CA if Vault is running in Kubernetes. Otherwise, defaults to the root CA set where
@@ -57,7 +48,6 @@ class SecretBackendArgs:
57
48
  :param pulumi.Input[str] kubernetes_host: The Kubernetes API URL to connect to. Required if the
58
49
  standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
59
50
  are not set on the host that Vault is running on.
60
- :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
61
51
  :param pulumi.Input[bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
62
52
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
63
53
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
@@ -65,8 +55,6 @@ class SecretBackendArgs:
65
55
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
66
56
  *Available only for Vault Enterprise*.
67
57
  :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
68
- :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
69
- :param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
70
58
  :param pulumi.Input[bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
71
59
  :param pulumi.Input[str] service_account_jwt: The JSON web token of the service account used by the
72
60
  secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
@@ -75,30 +63,22 @@ class SecretBackendArgs:
75
63
  pulumi.set(__self__, "path", path)
76
64
  if allowed_managed_keys is not None:
77
65
  pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
78
- if allowed_response_headers is not None:
79
- pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
80
66
  if audit_non_hmac_request_keys is not None:
81
67
  pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
82
68
  if audit_non_hmac_response_keys is not None:
83
69
  pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
84
70
  if default_lease_ttl_seconds is not None:
85
71
  pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
86
- if delegated_auth_accessors is not None:
87
- pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
88
72
  if description is not None:
89
73
  pulumi.set(__self__, "description", description)
90
74
  if disable_local_ca_jwt is not None:
91
75
  pulumi.set(__self__, "disable_local_ca_jwt", disable_local_ca_jwt)
92
76
  if external_entropy_access is not None:
93
77
  pulumi.set(__self__, "external_entropy_access", external_entropy_access)
94
- if identity_token_key is not None:
95
- pulumi.set(__self__, "identity_token_key", identity_token_key)
96
78
  if kubernetes_ca_cert is not None:
97
79
  pulumi.set(__self__, "kubernetes_ca_cert", kubernetes_ca_cert)
98
80
  if kubernetes_host is not None:
99
81
  pulumi.set(__self__, "kubernetes_host", kubernetes_host)
100
- if listing_visibility is not None:
101
- pulumi.set(__self__, "listing_visibility", listing_visibility)
102
82
  if local is not None:
103
83
  pulumi.set(__self__, "local", local)
104
84
  if max_lease_ttl_seconds is not None:
@@ -107,10 +87,6 @@ class SecretBackendArgs:
107
87
  pulumi.set(__self__, "namespace", namespace)
108
88
  if options is not None:
109
89
  pulumi.set(__self__, "options", options)
110
- if passthrough_request_headers is not None:
111
- pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
112
- if plugin_version is not None:
113
- pulumi.set(__self__, "plugin_version", plugin_version)
114
90
  if seal_wrap is not None:
115
91
  pulumi.set(__self__, "seal_wrap", seal_wrap)
116
92
  if service_account_jwt is not None:
@@ -140,18 +116,6 @@ class SecretBackendArgs:
140
116
  def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
141
117
  pulumi.set(self, "allowed_managed_keys", value)
142
118
 
143
- @property
144
- @pulumi.getter(name="allowedResponseHeaders")
145
- def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
146
- """
147
- List of headers to allow and pass from the request to the plugin
148
- """
149
- return pulumi.get(self, "allowed_response_headers")
150
-
151
- @allowed_response_headers.setter
152
- def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
153
- pulumi.set(self, "allowed_response_headers", value)
154
-
155
119
  @property
156
120
  @pulumi.getter(name="auditNonHmacRequestKeys")
157
121
  def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
@@ -188,18 +152,6 @@ class SecretBackendArgs:
188
152
  def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
189
153
  pulumi.set(self, "default_lease_ttl_seconds", value)
190
154
 
191
- @property
192
- @pulumi.getter(name="delegatedAuthAccessors")
193
- def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
194
- """
195
- List of headers to allow and pass from the request to the plugin
196
- """
197
- return pulumi.get(self, "delegated_auth_accessors")
198
-
199
- @delegated_auth_accessors.setter
200
- def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
201
- pulumi.set(self, "delegated_auth_accessors", value)
202
-
203
155
  @property
204
156
  @pulumi.getter
205
157
  def description(self) -> Optional[pulumi.Input[str]]:
@@ -237,18 +189,6 @@ class SecretBackendArgs:
237
189
  def external_entropy_access(self, value: Optional[pulumi.Input[bool]]):
238
190
  pulumi.set(self, "external_entropy_access", value)
239
191
 
240
- @property
241
- @pulumi.getter(name="identityTokenKey")
242
- def identity_token_key(self) -> Optional[pulumi.Input[str]]:
243
- """
244
- The key to use for signing plugin workload identity tokens
245
- """
246
- return pulumi.get(self, "identity_token_key")
247
-
248
- @identity_token_key.setter
249
- def identity_token_key(self, value: Optional[pulumi.Input[str]]):
250
- pulumi.set(self, "identity_token_key", value)
251
-
252
192
  @property
253
193
  @pulumi.getter(name="kubernetesCaCert")
254
194
  def kubernetes_ca_cert(self) -> Optional[pulumi.Input[str]]:
@@ -278,18 +218,6 @@ class SecretBackendArgs:
278
218
  def kubernetes_host(self, value: Optional[pulumi.Input[str]]):
279
219
  pulumi.set(self, "kubernetes_host", value)
280
220
 
281
- @property
282
- @pulumi.getter(name="listingVisibility")
283
- def listing_visibility(self) -> Optional[pulumi.Input[str]]:
284
- """
285
- Specifies whether to show this mount in the UI-specific listing endpoint
286
- """
287
- return pulumi.get(self, "listing_visibility")
288
-
289
- @listing_visibility.setter
290
- def listing_visibility(self, value: Optional[pulumi.Input[str]]):
291
- pulumi.set(self, "listing_visibility", value)
292
-
293
221
  @property
294
222
  @pulumi.getter
295
223
  def local(self) -> Optional[pulumi.Input[bool]]:
@@ -341,30 +269,6 @@ class SecretBackendArgs:
341
269
  def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
342
270
  pulumi.set(self, "options", value)
343
271
 
344
- @property
345
- @pulumi.getter(name="passthroughRequestHeaders")
346
- def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
347
- """
348
- List of headers to allow and pass from the request to the plugin
349
- """
350
- return pulumi.get(self, "passthrough_request_headers")
351
-
352
- @passthrough_request_headers.setter
353
- def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
354
- pulumi.set(self, "passthrough_request_headers", value)
355
-
356
- @property
357
- @pulumi.getter(name="pluginVersion")
358
- def plugin_version(self) -> Optional[pulumi.Input[str]]:
359
- """
360
- Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
361
- """
362
- return pulumi.get(self, "plugin_version")
363
-
364
- @plugin_version.setter
365
- def plugin_version(self, value: Optional[pulumi.Input[str]]):
366
- pulumi.set(self, "plugin_version", value)
367
-
368
272
  @property
369
273
  @pulumi.getter(name="sealWrap")
370
274
  def seal_wrap(self) -> Optional[pulumi.Input[bool]]:
@@ -397,41 +301,32 @@ class _SecretBackendState:
397
301
  def __init__(__self__, *,
398
302
  accessor: Optional[pulumi.Input[str]] = None,
399
303
  allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
400
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
401
304
  audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
402
305
  audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
403
306
  default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
404
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
405
307
  description: Optional[pulumi.Input[str]] = None,
406
308
  disable_local_ca_jwt: Optional[pulumi.Input[bool]] = None,
407
309
  external_entropy_access: Optional[pulumi.Input[bool]] = None,
408
- identity_token_key: Optional[pulumi.Input[str]] = None,
409
310
  kubernetes_ca_cert: Optional[pulumi.Input[str]] = None,
410
311
  kubernetes_host: Optional[pulumi.Input[str]] = None,
411
- listing_visibility: Optional[pulumi.Input[str]] = None,
412
312
  local: Optional[pulumi.Input[bool]] = None,
413
313
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
414
314
  namespace: Optional[pulumi.Input[str]] = None,
415
315
  options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
416
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
417
316
  path: Optional[pulumi.Input[str]] = None,
418
- plugin_version: Optional[pulumi.Input[str]] = None,
419
317
  seal_wrap: Optional[pulumi.Input[bool]] = None,
420
318
  service_account_jwt: Optional[pulumi.Input[str]] = None):
421
319
  """
422
320
  Input properties used for looking up and filtering SecretBackend resources.
423
321
  :param pulumi.Input[str] accessor: Accessor of the mount
424
322
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
425
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
426
323
  :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
427
324
  :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
428
325
  :param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
429
- :param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
430
326
  :param pulumi.Input[str] description: Human-friendly description of the mount
431
327
  :param pulumi.Input[bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
432
328
  service account JWT when Vault is running in a Kubernetes pod.
433
329
  :param pulumi.Input[bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
434
- :param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens
435
330
  :param pulumi.Input[str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
436
331
  secrets engine to verify the Kubernetes API server certificate. Defaults to the local
437
332
  pod’s CA if Vault is running in Kubernetes. Otherwise, defaults to the root CA set where
@@ -439,7 +334,6 @@ class _SecretBackendState:
439
334
  :param pulumi.Input[str] kubernetes_host: The Kubernetes API URL to connect to. Required if the
440
335
  standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
441
336
  are not set on the host that Vault is running on.
442
- :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
443
337
  :param pulumi.Input[bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
444
338
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
445
339
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
@@ -447,9 +341,7 @@ class _SecretBackendState:
447
341
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
448
342
  *Available only for Vault Enterprise*.
449
343
  :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
450
- :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
451
344
  :param pulumi.Input[str] path: Where the secret backend will be mounted
452
- :param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
453
345
  :param pulumi.Input[bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
454
346
  :param pulumi.Input[str] service_account_jwt: The JSON web token of the service account used by the
455
347
  secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
@@ -459,30 +351,22 @@ class _SecretBackendState:
459
351
  pulumi.set(__self__, "accessor", accessor)
460
352
  if allowed_managed_keys is not None:
461
353
  pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
462
- if allowed_response_headers is not None:
463
- pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
464
354
  if audit_non_hmac_request_keys is not None:
465
355
  pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
466
356
  if audit_non_hmac_response_keys is not None:
467
357
  pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
468
358
  if default_lease_ttl_seconds is not None:
469
359
  pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
470
- if delegated_auth_accessors is not None:
471
- pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
472
360
  if description is not None:
473
361
  pulumi.set(__self__, "description", description)
474
362
  if disable_local_ca_jwt is not None:
475
363
  pulumi.set(__self__, "disable_local_ca_jwt", disable_local_ca_jwt)
476
364
  if external_entropy_access is not None:
477
365
  pulumi.set(__self__, "external_entropy_access", external_entropy_access)
478
- if identity_token_key is not None:
479
- pulumi.set(__self__, "identity_token_key", identity_token_key)
480
366
  if kubernetes_ca_cert is not None:
481
367
  pulumi.set(__self__, "kubernetes_ca_cert", kubernetes_ca_cert)
482
368
  if kubernetes_host is not None:
483
369
  pulumi.set(__self__, "kubernetes_host", kubernetes_host)
484
- if listing_visibility is not None:
485
- pulumi.set(__self__, "listing_visibility", listing_visibility)
486
370
  if local is not None:
487
371
  pulumi.set(__self__, "local", local)
488
372
  if max_lease_ttl_seconds is not None:
@@ -491,12 +375,8 @@ class _SecretBackendState:
491
375
  pulumi.set(__self__, "namespace", namespace)
492
376
  if options is not None:
493
377
  pulumi.set(__self__, "options", options)
494
- if passthrough_request_headers is not None:
495
- pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
496
378
  if path is not None:
497
379
  pulumi.set(__self__, "path", path)
498
- if plugin_version is not None:
499
- pulumi.set(__self__, "plugin_version", plugin_version)
500
380
  if seal_wrap is not None:
501
381
  pulumi.set(__self__, "seal_wrap", seal_wrap)
502
382
  if service_account_jwt is not None:
@@ -526,18 +406,6 @@ class _SecretBackendState:
526
406
  def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
527
407
  pulumi.set(self, "allowed_managed_keys", value)
528
408
 
529
- @property
530
- @pulumi.getter(name="allowedResponseHeaders")
531
- def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
532
- """
533
- List of headers to allow and pass from the request to the plugin
534
- """
535
- return pulumi.get(self, "allowed_response_headers")
536
-
537
- @allowed_response_headers.setter
538
- def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
539
- pulumi.set(self, "allowed_response_headers", value)
540
-
541
409
  @property
542
410
  @pulumi.getter(name="auditNonHmacRequestKeys")
543
411
  def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
@@ -574,18 +442,6 @@ class _SecretBackendState:
574
442
  def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
575
443
  pulumi.set(self, "default_lease_ttl_seconds", value)
576
444
 
577
- @property
578
- @pulumi.getter(name="delegatedAuthAccessors")
579
- def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
580
- """
581
- List of headers to allow and pass from the request to the plugin
582
- """
583
- return pulumi.get(self, "delegated_auth_accessors")
584
-
585
- @delegated_auth_accessors.setter
586
- def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
587
- pulumi.set(self, "delegated_auth_accessors", value)
588
-
589
445
  @property
590
446
  @pulumi.getter
591
447
  def description(self) -> Optional[pulumi.Input[str]]:
@@ -623,18 +479,6 @@ class _SecretBackendState:
623
479
  def external_entropy_access(self, value: Optional[pulumi.Input[bool]]):
624
480
  pulumi.set(self, "external_entropy_access", value)
625
481
 
626
- @property
627
- @pulumi.getter(name="identityTokenKey")
628
- def identity_token_key(self) -> Optional[pulumi.Input[str]]:
629
- """
630
- The key to use for signing plugin workload identity tokens
631
- """
632
- return pulumi.get(self, "identity_token_key")
633
-
634
- @identity_token_key.setter
635
- def identity_token_key(self, value: Optional[pulumi.Input[str]]):
636
- pulumi.set(self, "identity_token_key", value)
637
-
638
482
  @property
639
483
  @pulumi.getter(name="kubernetesCaCert")
640
484
  def kubernetes_ca_cert(self) -> Optional[pulumi.Input[str]]:
@@ -664,18 +508,6 @@ class _SecretBackendState:
664
508
  def kubernetes_host(self, value: Optional[pulumi.Input[str]]):
665
509
  pulumi.set(self, "kubernetes_host", value)
666
510
 
667
- @property
668
- @pulumi.getter(name="listingVisibility")
669
- def listing_visibility(self) -> Optional[pulumi.Input[str]]:
670
- """
671
- Specifies whether to show this mount in the UI-specific listing endpoint
672
- """
673
- return pulumi.get(self, "listing_visibility")
674
-
675
- @listing_visibility.setter
676
- def listing_visibility(self, value: Optional[pulumi.Input[str]]):
677
- pulumi.set(self, "listing_visibility", value)
678
-
679
511
  @property
680
512
  @pulumi.getter
681
513
  def local(self) -> Optional[pulumi.Input[bool]]:
@@ -727,18 +559,6 @@ class _SecretBackendState:
727
559
  def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
728
560
  pulumi.set(self, "options", value)
729
561
 
730
- @property
731
- @pulumi.getter(name="passthroughRequestHeaders")
732
- def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
733
- """
734
- List of headers to allow and pass from the request to the plugin
735
- """
736
- return pulumi.get(self, "passthrough_request_headers")
737
-
738
- @passthrough_request_headers.setter
739
- def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
740
- pulumi.set(self, "passthrough_request_headers", value)
741
-
742
562
  @property
743
563
  @pulumi.getter
744
564
  def path(self) -> Optional[pulumi.Input[str]]:
@@ -751,18 +571,6 @@ class _SecretBackendState:
751
571
  def path(self, value: Optional[pulumi.Input[str]]):
752
572
  pulumi.set(self, "path", value)
753
573
 
754
- @property
755
- @pulumi.getter(name="pluginVersion")
756
- def plugin_version(self) -> Optional[pulumi.Input[str]]:
757
- """
758
- Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
759
- """
760
- return pulumi.get(self, "plugin_version")
761
-
762
- @plugin_version.setter
763
- def plugin_version(self, value: Optional[pulumi.Input[str]]):
764
- pulumi.set(self, "plugin_version", value)
765
-
766
574
  @property
767
575
  @pulumi.getter(name="sealWrap")
768
576
  def seal_wrap(self) -> Optional[pulumi.Input[bool]]:
@@ -796,34 +604,28 @@ class SecretBackend(pulumi.CustomResource):
796
604
  resource_name: str,
797
605
  opts: Optional[pulumi.ResourceOptions] = None,
798
606
  allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
799
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
800
607
  audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
801
608
  audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
802
609
  default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
803
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
804
610
  description: Optional[pulumi.Input[str]] = None,
805
611
  disable_local_ca_jwt: Optional[pulumi.Input[bool]] = None,
806
612
  external_entropy_access: Optional[pulumi.Input[bool]] = None,
807
- identity_token_key: Optional[pulumi.Input[str]] = None,
808
613
  kubernetes_ca_cert: Optional[pulumi.Input[str]] = None,
809
614
  kubernetes_host: Optional[pulumi.Input[str]] = None,
810
- listing_visibility: Optional[pulumi.Input[str]] = None,
811
615
  local: Optional[pulumi.Input[bool]] = None,
812
616
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
813
617
  namespace: Optional[pulumi.Input[str]] = None,
814
618
  options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
815
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
816
619
  path: Optional[pulumi.Input[str]] = None,
817
- plugin_version: Optional[pulumi.Input[str]] = None,
818
620
  seal_wrap: Optional[pulumi.Input[bool]] = None,
819
621
  service_account_jwt: Optional[pulumi.Input[str]] = None,
820
622
  __props__=None):
821
623
  """
822
624
  ## Example Usage
823
625
 
626
+ <!--Start PulumiCodeChooser -->
824
627
  ```python
825
628
  import pulumi
826
- import pulumi_std as std
827
629
  import pulumi_vault as vault
828
630
 
829
631
  config = vault.kubernetes.SecretBackend("config",
@@ -832,10 +634,11 @@ class SecretBackend(pulumi.CustomResource):
832
634
  default_lease_ttl_seconds=43200,
833
635
  max_lease_ttl_seconds=86400,
834
636
  kubernetes_host="https://127.0.0.1:61233",
835
- kubernetes_ca_cert=std.file(input="/path/to/cert").result,
836
- service_account_jwt=std.file(input="/path/to/token").result,
637
+ kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
638
+ service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
837
639
  disable_local_ca_jwt=False)
838
640
  ```
641
+ <!--End PulumiCodeChooser -->
839
642
 
840
643
  ## Import
841
644
 
@@ -848,16 +651,13 @@ class SecretBackend(pulumi.CustomResource):
848
651
  :param str resource_name: The name of the resource.
849
652
  :param pulumi.ResourceOptions opts: Options for the resource.
850
653
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
851
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
852
654
  :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
853
655
  :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
854
656
  :param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
855
- :param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
856
657
  :param pulumi.Input[str] description: Human-friendly description of the mount
857
658
  :param pulumi.Input[bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
858
659
  service account JWT when Vault is running in a Kubernetes pod.
859
660
  :param pulumi.Input[bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
860
- :param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens
861
661
  :param pulumi.Input[str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
862
662
  secrets engine to verify the Kubernetes API server certificate. Defaults to the local
863
663
  pod’s CA if Vault is running in Kubernetes. Otherwise, defaults to the root CA set where
@@ -865,7 +665,6 @@ class SecretBackend(pulumi.CustomResource):
865
665
  :param pulumi.Input[str] kubernetes_host: The Kubernetes API URL to connect to. Required if the
866
666
  standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
867
667
  are not set on the host that Vault is running on.
868
- :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
869
668
  :param pulumi.Input[bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
870
669
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
871
670
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
@@ -873,9 +672,7 @@ class SecretBackend(pulumi.CustomResource):
873
672
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
874
673
  *Available only for Vault Enterprise*.
875
674
  :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
876
- :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
877
675
  :param pulumi.Input[str] path: Where the secret backend will be mounted
878
- :param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
879
676
  :param pulumi.Input[bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
880
677
  :param pulumi.Input[str] service_account_jwt: The JSON web token of the service account used by the
881
678
  secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
@@ -890,9 +687,9 @@ class SecretBackend(pulumi.CustomResource):
890
687
  """
891
688
  ## Example Usage
892
689
 
690
+ <!--Start PulumiCodeChooser -->
893
691
  ```python
894
692
  import pulumi
895
- import pulumi_std as std
896
693
  import pulumi_vault as vault
897
694
 
898
695
  config = vault.kubernetes.SecretBackend("config",
@@ -901,10 +698,11 @@ class SecretBackend(pulumi.CustomResource):
901
698
  default_lease_ttl_seconds=43200,
902
699
  max_lease_ttl_seconds=86400,
903
700
  kubernetes_host="https://127.0.0.1:61233",
904
- kubernetes_ca_cert=std.file(input="/path/to/cert").result,
905
- service_account_jwt=std.file(input="/path/to/token").result,
701
+ kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
702
+ service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
906
703
  disable_local_ca_jwt=False)
907
704
  ```
705
+ <!--End PulumiCodeChooser -->
908
706
 
909
707
  ## Import
910
708
 
@@ -930,25 +728,19 @@ class SecretBackend(pulumi.CustomResource):
930
728
  resource_name: str,
931
729
  opts: Optional[pulumi.ResourceOptions] = None,
932
730
  allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
933
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
934
731
  audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
935
732
  audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
936
733
  default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
937
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
938
734
  description: Optional[pulumi.Input[str]] = None,
939
735
  disable_local_ca_jwt: Optional[pulumi.Input[bool]] = None,
940
736
  external_entropy_access: Optional[pulumi.Input[bool]] = None,
941
- identity_token_key: Optional[pulumi.Input[str]] = None,
942
737
  kubernetes_ca_cert: Optional[pulumi.Input[str]] = None,
943
738
  kubernetes_host: Optional[pulumi.Input[str]] = None,
944
- listing_visibility: Optional[pulumi.Input[str]] = None,
945
739
  local: Optional[pulumi.Input[bool]] = None,
946
740
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
947
741
  namespace: Optional[pulumi.Input[str]] = None,
948
742
  options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
949
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
950
743
  path: Optional[pulumi.Input[str]] = None,
951
- plugin_version: Optional[pulumi.Input[str]] = None,
952
744
  seal_wrap: Optional[pulumi.Input[bool]] = None,
953
745
  service_account_jwt: Optional[pulumi.Input[str]] = None,
954
746
  __props__=None):
@@ -961,27 +753,21 @@ class SecretBackend(pulumi.CustomResource):
961
753
  __props__ = SecretBackendArgs.__new__(SecretBackendArgs)
962
754
 
963
755
  __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
964
- __props__.__dict__["allowed_response_headers"] = allowed_response_headers
965
756
  __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
966
757
  __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
967
758
  __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
968
- __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
969
759
  __props__.__dict__["description"] = description
970
760
  __props__.__dict__["disable_local_ca_jwt"] = disable_local_ca_jwt
971
761
  __props__.__dict__["external_entropy_access"] = external_entropy_access
972
- __props__.__dict__["identity_token_key"] = identity_token_key
973
762
  __props__.__dict__["kubernetes_ca_cert"] = kubernetes_ca_cert
974
763
  __props__.__dict__["kubernetes_host"] = kubernetes_host
975
- __props__.__dict__["listing_visibility"] = listing_visibility
976
764
  __props__.__dict__["local"] = local
977
765
  __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
978
766
  __props__.__dict__["namespace"] = namespace
979
767
  __props__.__dict__["options"] = options
980
- __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
981
768
  if path is None and not opts.urn:
982
769
  raise TypeError("Missing required property 'path'")
983
770
  __props__.__dict__["path"] = path
984
- __props__.__dict__["plugin_version"] = plugin_version
985
771
  __props__.__dict__["seal_wrap"] = seal_wrap
986
772
  __props__.__dict__["service_account_jwt"] = None if service_account_jwt is None else pulumi.Output.secret(service_account_jwt)
987
773
  __props__.__dict__["accessor"] = None
@@ -999,25 +785,19 @@ class SecretBackend(pulumi.CustomResource):
999
785
  opts: Optional[pulumi.ResourceOptions] = None,
1000
786
  accessor: Optional[pulumi.Input[str]] = None,
1001
787
  allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1002
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1003
788
  audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1004
789
  audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1005
790
  default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1006
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1007
791
  description: Optional[pulumi.Input[str]] = None,
1008
792
  disable_local_ca_jwt: Optional[pulumi.Input[bool]] = None,
1009
793
  external_entropy_access: Optional[pulumi.Input[bool]] = None,
1010
- identity_token_key: Optional[pulumi.Input[str]] = None,
1011
794
  kubernetes_ca_cert: Optional[pulumi.Input[str]] = None,
1012
795
  kubernetes_host: Optional[pulumi.Input[str]] = None,
1013
- listing_visibility: Optional[pulumi.Input[str]] = None,
1014
796
  local: Optional[pulumi.Input[bool]] = None,
1015
797
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1016
798
  namespace: Optional[pulumi.Input[str]] = None,
1017
799
  options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1018
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1019
800
  path: Optional[pulumi.Input[str]] = None,
1020
- plugin_version: Optional[pulumi.Input[str]] = None,
1021
801
  seal_wrap: Optional[pulumi.Input[bool]] = None,
1022
802
  service_account_jwt: Optional[pulumi.Input[str]] = None) -> 'SecretBackend':
1023
803
  """
@@ -1029,16 +809,13 @@ class SecretBackend(pulumi.CustomResource):
1029
809
  :param pulumi.ResourceOptions opts: Options for the resource.
1030
810
  :param pulumi.Input[str] accessor: Accessor of the mount
1031
811
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1032
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1033
812
  :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1034
813
  :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1035
814
  :param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
1036
- :param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1037
815
  :param pulumi.Input[str] description: Human-friendly description of the mount
1038
816
  :param pulumi.Input[bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
1039
817
  service account JWT when Vault is running in a Kubernetes pod.
1040
818
  :param pulumi.Input[bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1041
- :param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens
1042
819
  :param pulumi.Input[str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
1043
820
  secrets engine to verify the Kubernetes API server certificate. Defaults to the local
1044
821
  pod’s CA if Vault is running in Kubernetes. Otherwise, defaults to the root CA set where
@@ -1046,7 +823,6 @@ class SecretBackend(pulumi.CustomResource):
1046
823
  :param pulumi.Input[str] kubernetes_host: The Kubernetes API URL to connect to. Required if the
1047
824
  standard pod environment variables `KUBERNETES_SERVICE_HOST` or `KUBERNETES_SERVICE_PORT`
1048
825
  are not set on the host that Vault is running on.
1049
- :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1050
826
  :param pulumi.Input[bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1051
827
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
1052
828
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
@@ -1054,9 +830,7 @@ class SecretBackend(pulumi.CustomResource):
1054
830
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1055
831
  *Available only for Vault Enterprise*.
1056
832
  :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
1057
- :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1058
833
  :param pulumi.Input[str] path: Where the secret backend will be mounted
1059
- :param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1060
834
  :param pulumi.Input[bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1061
835
  :param pulumi.Input[str] service_account_jwt: The JSON web token of the service account used by the
1062
836
  secrets engine to manage Kubernetes credentials. Defaults to the local pod’s JWT if Vault
@@ -1068,25 +842,19 @@ class SecretBackend(pulumi.CustomResource):
1068
842
 
1069
843
  __props__.__dict__["accessor"] = accessor
1070
844
  __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1071
- __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1072
845
  __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1073
846
  __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
1074
847
  __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1075
- __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
1076
848
  __props__.__dict__["description"] = description
1077
849
  __props__.__dict__["disable_local_ca_jwt"] = disable_local_ca_jwt
1078
850
  __props__.__dict__["external_entropy_access"] = external_entropy_access
1079
- __props__.__dict__["identity_token_key"] = identity_token_key
1080
851
  __props__.__dict__["kubernetes_ca_cert"] = kubernetes_ca_cert
1081
852
  __props__.__dict__["kubernetes_host"] = kubernetes_host
1082
- __props__.__dict__["listing_visibility"] = listing_visibility
1083
853
  __props__.__dict__["local"] = local
1084
854
  __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
1085
855
  __props__.__dict__["namespace"] = namespace
1086
856
  __props__.__dict__["options"] = options
1087
- __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
1088
857
  __props__.__dict__["path"] = path
1089
- __props__.__dict__["plugin_version"] = plugin_version
1090
858
  __props__.__dict__["seal_wrap"] = seal_wrap
1091
859
  __props__.__dict__["service_account_jwt"] = service_account_jwt
1092
860
  return SecretBackend(resource_name, opts=opts, __props__=__props__)
@@ -1107,14 +875,6 @@ class SecretBackend(pulumi.CustomResource):
1107
875
  """
1108
876
  return pulumi.get(self, "allowed_managed_keys")
1109
877
 
1110
- @property
1111
- @pulumi.getter(name="allowedResponseHeaders")
1112
- def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[str]]]:
1113
- """
1114
- List of headers to allow and pass from the request to the plugin
1115
- """
1116
- return pulumi.get(self, "allowed_response_headers")
1117
-
1118
878
  @property
1119
879
  @pulumi.getter(name="auditNonHmacRequestKeys")
1120
880
  def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[str]]:
@@ -1139,14 +899,6 @@ class SecretBackend(pulumi.CustomResource):
1139
899
  """
1140
900
  return pulumi.get(self, "default_lease_ttl_seconds")
1141
901
 
1142
- @property
1143
- @pulumi.getter(name="delegatedAuthAccessors")
1144
- def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[str]]]:
1145
- """
1146
- List of headers to allow and pass from the request to the plugin
1147
- """
1148
- return pulumi.get(self, "delegated_auth_accessors")
1149
-
1150
902
  @property
1151
903
  @pulumi.getter
1152
904
  def description(self) -> pulumi.Output[Optional[str]]:
@@ -1172,14 +924,6 @@ class SecretBackend(pulumi.CustomResource):
1172
924
  """
1173
925
  return pulumi.get(self, "external_entropy_access")
1174
926
 
1175
- @property
1176
- @pulumi.getter(name="identityTokenKey")
1177
- def identity_token_key(self) -> pulumi.Output[Optional[str]]:
1178
- """
1179
- The key to use for signing plugin workload identity tokens
1180
- """
1181
- return pulumi.get(self, "identity_token_key")
1182
-
1183
927
  @property
1184
928
  @pulumi.getter(name="kubernetesCaCert")
1185
929
  def kubernetes_ca_cert(self) -> pulumi.Output[Optional[str]]:
@@ -1201,14 +945,6 @@ class SecretBackend(pulumi.CustomResource):
1201
945
  """
1202
946
  return pulumi.get(self, "kubernetes_host")
1203
947
 
1204
- @property
1205
- @pulumi.getter(name="listingVisibility")
1206
- def listing_visibility(self) -> pulumi.Output[Optional[str]]:
1207
- """
1208
- Specifies whether to show this mount in the UI-specific listing endpoint
1209
- """
1210
- return pulumi.get(self, "listing_visibility")
1211
-
1212
948
  @property
1213
949
  @pulumi.getter
1214
950
  def local(self) -> pulumi.Output[Optional[bool]]:
@@ -1244,14 +980,6 @@ class SecretBackend(pulumi.CustomResource):
1244
980
  """
1245
981
  return pulumi.get(self, "options")
1246
982
 
1247
- @property
1248
- @pulumi.getter(name="passthroughRequestHeaders")
1249
- def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[str]]]:
1250
- """
1251
- List of headers to allow and pass from the request to the plugin
1252
- """
1253
- return pulumi.get(self, "passthrough_request_headers")
1254
-
1255
983
  @property
1256
984
  @pulumi.getter
1257
985
  def path(self) -> pulumi.Output[str]:
@@ -1260,14 +988,6 @@ class SecretBackend(pulumi.CustomResource):
1260
988
  """
1261
989
  return pulumi.get(self, "path")
1262
990
 
1263
- @property
1264
- @pulumi.getter(name="pluginVersion")
1265
- def plugin_version(self) -> pulumi.Output[Optional[str]]:
1266
- """
1267
- Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1268
- """
1269
- return pulumi.get(self, "plugin_version")
1270
-
1271
991
  @property
1272
992
  @pulumi.getter(name="sealWrap")
1273
993
  def seal_wrap(self) -> pulumi.Output[bool]: