pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712731873__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (192) hide show
  1. pulumi_vault/__init__.py +0 -26
  2. pulumi_vault/_inputs.py +20 -0
  3. pulumi_vault/ad/secret_backend.py +6 -2
  4. pulumi_vault/ad/secret_library.py +4 -2
  5. pulumi_vault/ad/secret_role.py +4 -0
  6. pulumi_vault/alicloud/auth_backend_role.py +192 -69
  7. pulumi_vault/approle/auth_backend_login.py +4 -0
  8. pulumi_vault/approle/auth_backend_role.py +186 -63
  9. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  10. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  11. pulumi_vault/audit.py +20 -12
  12. pulumi_vault/audit_request_header.py +6 -6
  13. pulumi_vault/auth_backend.py +0 -47
  14. pulumi_vault/aws/auth_backend_client.py +17 -253
  15. pulumi_vault/aws/auth_backend_config_identity.py +4 -0
  16. pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
  17. pulumi_vault/aws/auth_backend_login.py +8 -0
  18. pulumi_vault/aws/auth_backend_role.py +186 -63
  19. pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
  20. pulumi_vault/aws/auth_backend_sts_role.py +4 -0
  21. pulumi_vault/aws/secret_backend_role.py +4 -56
  22. pulumi_vault/aws/secret_backend_static_role.py +4 -2
  23. pulumi_vault/azure/auth_backend_config.py +10 -139
  24. pulumi_vault/azure/auth_backend_role.py +186 -63
  25. pulumi_vault/azure/backend.py +22 -217
  26. pulumi_vault/azure/backend_role.py +18 -14
  27. pulumi_vault/azure/get_access_credentials.py +4 -0
  28. pulumi_vault/cert_auth_backend_role.py +208 -75
  29. pulumi_vault/consul/secret_backend.py +18 -10
  30. pulumi_vault/consul/secret_backend_role.py +4 -2
  31. pulumi_vault/database/_inputs.py +784 -522
  32. pulumi_vault/database/outputs.py +784 -522
  33. pulumi_vault/database/secret_backend_connection.py +4 -2
  34. pulumi_vault/database/secret_backend_role.py +4 -4
  35. pulumi_vault/database/secret_backend_static_role.py +8 -10
  36. pulumi_vault/database/secrets_mount.py +4 -286
  37. pulumi_vault/egp_policy.py +8 -4
  38. pulumi_vault/gcp/auth_backend.py +18 -226
  39. pulumi_vault/gcp/auth_backend_role.py +264 -63
  40. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  41. pulumi_vault/gcp/secret_backend.py +9 -275
  42. pulumi_vault/gcp/secret_impersonated_account.py +14 -12
  43. pulumi_vault/gcp/secret_roleset.py +6 -4
  44. pulumi_vault/gcp/secret_static_account.py +16 -14
  45. pulumi_vault/generic/endpoint.py +8 -4
  46. pulumi_vault/generic/get_secret.py +4 -40
  47. pulumi_vault/get_auth_backend.py +4 -0
  48. pulumi_vault/get_auth_backends.py +8 -0
  49. pulumi_vault/get_namespace.py +12 -0
  50. pulumi_vault/get_namespaces.py +12 -4
  51. pulumi_vault/get_nomad_access_token.py +4 -0
  52. pulumi_vault/get_policy_document.py +8 -8
  53. pulumi_vault/get_raft_autopilot_state.py +4 -0
  54. pulumi_vault/github/auth_backend.py +4 -0
  55. pulumi_vault/github/team.py +6 -2
  56. pulumi_vault/github/user.py +6 -2
  57. pulumi_vault/identity/entity.py +8 -6
  58. pulumi_vault/identity/entity_alias.py +8 -6
  59. pulumi_vault/identity/entity_policies.py +12 -12
  60. pulumi_vault/identity/get_entity.py +4 -0
  61. pulumi_vault/identity/get_group.py +4 -0
  62. pulumi_vault/identity/get_oidc_client_creds.py +4 -2
  63. pulumi_vault/identity/get_oidc_openid_config.py +6 -10
  64. pulumi_vault/identity/get_oidc_public_keys.py +6 -10
  65. pulumi_vault/identity/group.py +42 -38
  66. pulumi_vault/identity/group_alias.py +4 -2
  67. pulumi_vault/identity/group_member_entity_ids.py +16 -12
  68. pulumi_vault/identity/group_member_group_ids.py +20 -24
  69. pulumi_vault/identity/group_policies.py +8 -4
  70. pulumi_vault/identity/mfa_duo.py +8 -4
  71. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  72. pulumi_vault/identity/mfa_okta.py +8 -4
  73. pulumi_vault/identity/mfa_pingid.py +4 -0
  74. pulumi_vault/identity/mfa_totp.py +4 -0
  75. pulumi_vault/identity/oidc.py +4 -0
  76. pulumi_vault/identity/oidc_assignment.py +6 -10
  77. pulumi_vault/identity/oidc_client.py +10 -10
  78. pulumi_vault/identity/oidc_key.py +12 -16
  79. pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
  80. pulumi_vault/identity/oidc_provider.py +16 -22
  81. pulumi_vault/identity/oidc_role.py +20 -28
  82. pulumi_vault/identity/oidc_scope.py +8 -6
  83. pulumi_vault/jwt/auth_backend.py +32 -20
  84. pulumi_vault/jwt/auth_backend_role.py +225 -91
  85. pulumi_vault/kmip/secret_backend.py +14 -10
  86. pulumi_vault/kmip/secret_role.py +4 -0
  87. pulumi_vault/kmip/secret_scope.py +4 -0
  88. pulumi_vault/kubernetes/auth_backend_config.py +4 -0
  89. pulumi_vault/kubernetes/auth_backend_role.py +172 -56
  90. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  91. pulumi_vault/kubernetes/secret_backend.py +8 -288
  92. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  93. pulumi_vault/kv/get_secret.py +4 -0
  94. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
  95. pulumi_vault/kv/get_secret_v2.py +0 -58
  96. pulumi_vault/kv/get_secrets_list.py +8 -4
  97. pulumi_vault/kv/get_secrets_list_v2.py +12 -14
  98. pulumi_vault/kv/secret.py +4 -0
  99. pulumi_vault/kv/secret_backend_v2.py +4 -0
  100. pulumi_vault/kv/secret_v2.py +4 -2
  101. pulumi_vault/ldap/auth_backend.py +161 -66
  102. pulumi_vault/ldap/auth_backend_group.py +4 -0
  103. pulumi_vault/ldap/auth_backend_user.py +4 -0
  104. pulumi_vault/ldap/secret_backend.py +8 -286
  105. pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
  106. pulumi_vault/ldap/secret_backend_library_set.py +4 -2
  107. pulumi_vault/ldap/secret_backend_static_role.py +4 -0
  108. pulumi_vault/managed/_inputs.py +132 -84
  109. pulumi_vault/managed/keys.py +28 -7
  110. pulumi_vault/managed/outputs.py +132 -84
  111. pulumi_vault/mfa_duo.py +6 -4
  112. pulumi_vault/mfa_okta.py +6 -4
  113. pulumi_vault/mfa_pingid.py +6 -4
  114. pulumi_vault/mfa_totp.py +12 -10
  115. pulumi_vault/mongodbatlas/secret_backend.py +4 -0
  116. pulumi_vault/mongodbatlas/secret_role.py +4 -2
  117. pulumi_vault/mount.py +42 -350
  118. pulumi_vault/nomad_secret_backend.py +8 -4
  119. pulumi_vault/nomad_secret_role.py +4 -0
  120. pulumi_vault/okta/_inputs.py +8 -8
  121. pulumi_vault/okta/auth_backend.py +10 -459
  122. pulumi_vault/okta/auth_backend_group.py +4 -0
  123. pulumi_vault/okta/auth_backend_user.py +4 -0
  124. pulumi_vault/okta/outputs.py +8 -8
  125. pulumi_vault/outputs.py +20 -0
  126. pulumi_vault/password_policy.py +8 -6
  127. pulumi_vault/pkisecret/__init__.py +0 -2
  128. pulumi_vault/pkisecret/_inputs.py +0 -30
  129. pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
  130. pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
  131. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  132. pulumi_vault/pkisecret/get_backend_key.py +6 -2
  133. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  134. pulumi_vault/pkisecret/outputs.py +0 -54
  135. pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
  136. pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
  137. pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
  138. pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
  139. pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
  140. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
  141. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
  142. pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
  143. pulumi_vault/pkisecret/secret_backend_role.py +4 -2
  144. pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
  145. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
  146. pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
  147. pulumi_vault/provider.py +8 -0
  148. pulumi_vault/pulumi-plugin.json +1 -2
  149. pulumi_vault/quota_lease_count.py +8 -53
  150. pulumi_vault/quota_rate_limit.py +4 -49
  151. pulumi_vault/rabbitmq/secret_backend.py +8 -4
  152. pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
  153. pulumi_vault/raft_autopilot.py +4 -0
  154. pulumi_vault/raft_snapshot_agent_config.py +304 -109
  155. pulumi_vault/rgp_policy.py +6 -2
  156. pulumi_vault/saml/auth_backend.py +12 -8
  157. pulumi_vault/saml/auth_backend_role.py +178 -64
  158. pulumi_vault/secrets/sync_association.py +10 -12
  159. pulumi_vault/secrets/sync_aws_destination.py +8 -6
  160. pulumi_vault/secrets/sync_azure_destination.py +12 -10
  161. pulumi_vault/secrets/sync_config.py +6 -2
  162. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  163. pulumi_vault/secrets/sync_gh_destination.py +8 -6
  164. pulumi_vault/secrets/sync_github_apps.py +8 -8
  165. pulumi_vault/secrets/sync_vercel_destination.py +8 -6
  166. pulumi_vault/ssh/_inputs.py +32 -6
  167. pulumi_vault/ssh/outputs.py +32 -6
  168. pulumi_vault/ssh/secret_backend_ca.py +4 -94
  169. pulumi_vault/ssh/secret_backend_role.py +4 -4
  170. pulumi_vault/terraformcloud/secret_backend.py +56 -0
  171. pulumi_vault/terraformcloud/secret_creds.py +17 -2
  172. pulumi_vault/terraformcloud/secret_role.py +69 -2
  173. pulumi_vault/token.py +18 -14
  174. pulumi_vault/tokenauth/auth_backend_role.py +180 -64
  175. pulumi_vault/transform/alphabet.py +6 -4
  176. pulumi_vault/transform/get_decode.py +4 -4
  177. pulumi_vault/transform/get_encode.py +4 -4
  178. pulumi_vault/transform/role.py +6 -4
  179. pulumi_vault/transform/template.py +4 -4
  180. pulumi_vault/transit/get_decrypt.py +20 -4
  181. pulumi_vault/transit/get_encrypt.py +14 -0
  182. pulumi_vault/transit/secret_backend_key.py +6 -6
  183. pulumi_vault/transit/secret_cache_config.py +4 -0
  184. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712731873.dist-info}/METADATA +1 -1
  185. pulumi_vault-6.2.0a1712731873.dist-info/RECORD +252 -0
  186. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712731873.dist-info}/WHEEL +1 -1
  187. pulumi_vault/pkisecret/backend_config_est.py +0 -614
  188. pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
  189. pulumi_vault/plugin.py +0 -590
  190. pulumi_vault/plugin_pinned_version.py +0 -293
  191. pulumi_vault-6.2.0.dist-info/RECORD +0 -256
  192. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712731873.dist-info}/top_level.txt +0 -0
pulumi_vault/mount.py CHANGED
@@ -17,39 +17,26 @@ class MountArgs:
17
17
  path: pulumi.Input[str],
18
18
  type: pulumi.Input[str],
19
19
  allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
20
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
21
20
  audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
22
21
  audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
23
22
  default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
24
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
25
23
  description: Optional[pulumi.Input[str]] = None,
26
24
  external_entropy_access: Optional[pulumi.Input[bool]] = None,
27
- identity_token_key: Optional[pulumi.Input[str]] = None,
28
- listing_visibility: Optional[pulumi.Input[str]] = None,
29
25
  local: Optional[pulumi.Input[bool]] = None,
30
26
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
31
27
  namespace: Optional[pulumi.Input[str]] = None,
32
28
  options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
33
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
34
- plugin_version: Optional[pulumi.Input[str]] = None,
35
29
  seal_wrap: Optional[pulumi.Input[bool]] = None):
36
30
  """
37
31
  The set of arguments for constructing a Mount resource.
38
32
  :param pulumi.Input[str] path: Where the secret backend will be mounted
39
33
  :param pulumi.Input[str] type: Type of the backend, such as "aws"
40
34
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
41
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow, allowing a plugin to include
42
- them in the response.
43
35
  :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
44
36
  :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
45
37
  :param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
46
- :param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of allowed authentication mount accessors the
47
- backend can request delegated authentication for.
48
38
  :param pulumi.Input[str] description: Human-friendly description of the mount
49
39
  :param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
50
- :param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
51
- not provided, this will default to Vault's OIDC default key.
52
- :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
53
40
  :param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
54
41
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
55
42
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
@@ -57,35 +44,22 @@ class MountArgs:
57
44
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
58
45
  *Available only for Vault Enterprise*.
59
46
  :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
60
- :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to
61
- the plugin.
62
- :param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
63
- If unspecified, the server will select any matching unversioned plugin that may have been
64
- registered, the latest versioned plugin registered, or a built-in plugin in that order of precedence.
65
47
  :param pulumi.Input[bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
66
48
  """
67
49
  pulumi.set(__self__, "path", path)
68
50
  pulumi.set(__self__, "type", type)
69
51
  if allowed_managed_keys is not None:
70
52
  pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
71
- if allowed_response_headers is not None:
72
- pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
73
53
  if audit_non_hmac_request_keys is not None:
74
54
  pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
75
55
  if audit_non_hmac_response_keys is not None:
76
56
  pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
77
57
  if default_lease_ttl_seconds is not None:
78
58
  pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
79
- if delegated_auth_accessors is not None:
80
- pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
81
59
  if description is not None:
82
60
  pulumi.set(__self__, "description", description)
83
61
  if external_entropy_access is not None:
84
62
  pulumi.set(__self__, "external_entropy_access", external_entropy_access)
85
- if identity_token_key is not None:
86
- pulumi.set(__self__, "identity_token_key", identity_token_key)
87
- if listing_visibility is not None:
88
- pulumi.set(__self__, "listing_visibility", listing_visibility)
89
63
  if local is not None:
90
64
  pulumi.set(__self__, "local", local)
91
65
  if max_lease_ttl_seconds is not None:
@@ -94,10 +68,6 @@ class MountArgs:
94
68
  pulumi.set(__self__, "namespace", namespace)
95
69
  if options is not None:
96
70
  pulumi.set(__self__, "options", options)
97
- if passthrough_request_headers is not None:
98
- pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
99
- if plugin_version is not None:
100
- pulumi.set(__self__, "plugin_version", plugin_version)
101
71
  if seal_wrap is not None:
102
72
  pulumi.set(__self__, "seal_wrap", seal_wrap)
103
73
 
@@ -137,19 +107,6 @@ class MountArgs:
137
107
  def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
138
108
  pulumi.set(self, "allowed_managed_keys", value)
139
109
 
140
- @property
141
- @pulumi.getter(name="allowedResponseHeaders")
142
- def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
143
- """
144
- List of headers to allow, allowing a plugin to include
145
- them in the response.
146
- """
147
- return pulumi.get(self, "allowed_response_headers")
148
-
149
- @allowed_response_headers.setter
150
- def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
151
- pulumi.set(self, "allowed_response_headers", value)
152
-
153
110
  @property
154
111
  @pulumi.getter(name="auditNonHmacRequestKeys")
155
112
  def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
@@ -186,19 +143,6 @@ class MountArgs:
186
143
  def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
187
144
  pulumi.set(self, "default_lease_ttl_seconds", value)
188
145
 
189
- @property
190
- @pulumi.getter(name="delegatedAuthAccessors")
191
- def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
192
- """
193
- List of allowed authentication mount accessors the
194
- backend can request delegated authentication for.
195
- """
196
- return pulumi.get(self, "delegated_auth_accessors")
197
-
198
- @delegated_auth_accessors.setter
199
- def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
200
- pulumi.set(self, "delegated_auth_accessors", value)
201
-
202
146
  @property
203
147
  @pulumi.getter
204
148
  def description(self) -> Optional[pulumi.Input[str]]:
@@ -223,31 +167,6 @@ class MountArgs:
223
167
  def external_entropy_access(self, value: Optional[pulumi.Input[bool]]):
224
168
  pulumi.set(self, "external_entropy_access", value)
225
169
 
226
- @property
227
- @pulumi.getter(name="identityTokenKey")
228
- def identity_token_key(self) -> Optional[pulumi.Input[str]]:
229
- """
230
- The key to use for signing plugin workload identity tokens. If
231
- not provided, this will default to Vault's OIDC default key.
232
- """
233
- return pulumi.get(self, "identity_token_key")
234
-
235
- @identity_token_key.setter
236
- def identity_token_key(self, value: Optional[pulumi.Input[str]]):
237
- pulumi.set(self, "identity_token_key", value)
238
-
239
- @property
240
- @pulumi.getter(name="listingVisibility")
241
- def listing_visibility(self) -> Optional[pulumi.Input[str]]:
242
- """
243
- Specifies whether to show this mount in the UI-specific listing endpoint
244
- """
245
- return pulumi.get(self, "listing_visibility")
246
-
247
- @listing_visibility.setter
248
- def listing_visibility(self, value: Optional[pulumi.Input[str]]):
249
- pulumi.set(self, "listing_visibility", value)
250
-
251
170
  @property
252
171
  @pulumi.getter
253
172
  def local(self) -> Optional[pulumi.Input[bool]]:
@@ -299,33 +218,6 @@ class MountArgs:
299
218
  def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
300
219
  pulumi.set(self, "options", value)
301
220
 
302
- @property
303
- @pulumi.getter(name="passthroughRequestHeaders")
304
- def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
305
- """
306
- List of headers to allow and pass from the request to
307
- the plugin.
308
- """
309
- return pulumi.get(self, "passthrough_request_headers")
310
-
311
- @passthrough_request_headers.setter
312
- def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
313
- pulumi.set(self, "passthrough_request_headers", value)
314
-
315
- @property
316
- @pulumi.getter(name="pluginVersion")
317
- def plugin_version(self) -> Optional[pulumi.Input[str]]:
318
- """
319
- Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
320
- If unspecified, the server will select any matching unversioned plugin that may have been
321
- registered, the latest versioned plugin registered, or a built-in plugin in that order of precedence.
322
- """
323
- return pulumi.get(self, "plugin_version")
324
-
325
- @plugin_version.setter
326
- def plugin_version(self, value: Optional[pulumi.Input[str]]):
327
- pulumi.set(self, "plugin_version", value)
328
-
329
221
  @property
330
222
  @pulumi.getter(name="sealWrap")
331
223
  def seal_wrap(self) -> Optional[pulumi.Input[bool]]:
@@ -344,40 +236,27 @@ class _MountState:
344
236
  def __init__(__self__, *,
345
237
  accessor: Optional[pulumi.Input[str]] = None,
346
238
  allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
347
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
348
239
  audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
349
240
  audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
350
241
  default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
351
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
352
242
  description: Optional[pulumi.Input[str]] = None,
353
243
  external_entropy_access: Optional[pulumi.Input[bool]] = None,
354
- identity_token_key: Optional[pulumi.Input[str]] = None,
355
- listing_visibility: Optional[pulumi.Input[str]] = None,
356
244
  local: Optional[pulumi.Input[bool]] = None,
357
245
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
358
246
  namespace: Optional[pulumi.Input[str]] = None,
359
247
  options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
360
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
361
248
  path: Optional[pulumi.Input[str]] = None,
362
- plugin_version: Optional[pulumi.Input[str]] = None,
363
249
  seal_wrap: Optional[pulumi.Input[bool]] = None,
364
250
  type: Optional[pulumi.Input[str]] = None):
365
251
  """
366
252
  Input properties used for looking up and filtering Mount resources.
367
253
  :param pulumi.Input[str] accessor: The accessor for this mount.
368
254
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
369
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow, allowing a plugin to include
370
- them in the response.
371
255
  :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
372
256
  :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
373
257
  :param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
374
- :param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of allowed authentication mount accessors the
375
- backend can request delegated authentication for.
376
258
  :param pulumi.Input[str] description: Human-friendly description of the mount
377
259
  :param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
378
- :param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
379
- not provided, this will default to Vault's OIDC default key.
380
- :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
381
260
  :param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
382
261
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
383
262
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
@@ -385,12 +264,7 @@ class _MountState:
385
264
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
386
265
  *Available only for Vault Enterprise*.
387
266
  :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
388
- :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to
389
- the plugin.
390
267
  :param pulumi.Input[str] path: Where the secret backend will be mounted
391
- :param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
392
- If unspecified, the server will select any matching unversioned plugin that may have been
393
- registered, the latest versioned plugin registered, or a built-in plugin in that order of precedence.
394
268
  :param pulumi.Input[bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
395
269
  :param pulumi.Input[str] type: Type of the backend, such as "aws"
396
270
  """
@@ -398,24 +272,16 @@ class _MountState:
398
272
  pulumi.set(__self__, "accessor", accessor)
399
273
  if allowed_managed_keys is not None:
400
274
  pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
401
- if allowed_response_headers is not None:
402
- pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
403
275
  if audit_non_hmac_request_keys is not None:
404
276
  pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
405
277
  if audit_non_hmac_response_keys is not None:
406
278
  pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
407
279
  if default_lease_ttl_seconds is not None:
408
280
  pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
409
- if delegated_auth_accessors is not None:
410
- pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
411
281
  if description is not None:
412
282
  pulumi.set(__self__, "description", description)
413
283
  if external_entropy_access is not None:
414
284
  pulumi.set(__self__, "external_entropy_access", external_entropy_access)
415
- if identity_token_key is not None:
416
- pulumi.set(__self__, "identity_token_key", identity_token_key)
417
- if listing_visibility is not None:
418
- pulumi.set(__self__, "listing_visibility", listing_visibility)
419
285
  if local is not None:
420
286
  pulumi.set(__self__, "local", local)
421
287
  if max_lease_ttl_seconds is not None:
@@ -424,12 +290,8 @@ class _MountState:
424
290
  pulumi.set(__self__, "namespace", namespace)
425
291
  if options is not None:
426
292
  pulumi.set(__self__, "options", options)
427
- if passthrough_request_headers is not None:
428
- pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
429
293
  if path is not None:
430
294
  pulumi.set(__self__, "path", path)
431
- if plugin_version is not None:
432
- pulumi.set(__self__, "plugin_version", plugin_version)
433
295
  if seal_wrap is not None:
434
296
  pulumi.set(__self__, "seal_wrap", seal_wrap)
435
297
  if type is not None:
@@ -459,19 +321,6 @@ class _MountState:
459
321
  def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
460
322
  pulumi.set(self, "allowed_managed_keys", value)
461
323
 
462
- @property
463
- @pulumi.getter(name="allowedResponseHeaders")
464
- def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
465
- """
466
- List of headers to allow, allowing a plugin to include
467
- them in the response.
468
- """
469
- return pulumi.get(self, "allowed_response_headers")
470
-
471
- @allowed_response_headers.setter
472
- def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
473
- pulumi.set(self, "allowed_response_headers", value)
474
-
475
324
  @property
476
325
  @pulumi.getter(name="auditNonHmacRequestKeys")
477
326
  def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
@@ -508,19 +357,6 @@ class _MountState:
508
357
  def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
509
358
  pulumi.set(self, "default_lease_ttl_seconds", value)
510
359
 
511
- @property
512
- @pulumi.getter(name="delegatedAuthAccessors")
513
- def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
514
- """
515
- List of allowed authentication mount accessors the
516
- backend can request delegated authentication for.
517
- """
518
- return pulumi.get(self, "delegated_auth_accessors")
519
-
520
- @delegated_auth_accessors.setter
521
- def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
522
- pulumi.set(self, "delegated_auth_accessors", value)
523
-
524
360
  @property
525
361
  @pulumi.getter
526
362
  def description(self) -> Optional[pulumi.Input[str]]:
@@ -545,31 +381,6 @@ class _MountState:
545
381
  def external_entropy_access(self, value: Optional[pulumi.Input[bool]]):
546
382
  pulumi.set(self, "external_entropy_access", value)
547
383
 
548
- @property
549
- @pulumi.getter(name="identityTokenKey")
550
- def identity_token_key(self) -> Optional[pulumi.Input[str]]:
551
- """
552
- The key to use for signing plugin workload identity tokens. If
553
- not provided, this will default to Vault's OIDC default key.
554
- """
555
- return pulumi.get(self, "identity_token_key")
556
-
557
- @identity_token_key.setter
558
- def identity_token_key(self, value: Optional[pulumi.Input[str]]):
559
- pulumi.set(self, "identity_token_key", value)
560
-
561
- @property
562
- @pulumi.getter(name="listingVisibility")
563
- def listing_visibility(self) -> Optional[pulumi.Input[str]]:
564
- """
565
- Specifies whether to show this mount in the UI-specific listing endpoint
566
- """
567
- return pulumi.get(self, "listing_visibility")
568
-
569
- @listing_visibility.setter
570
- def listing_visibility(self, value: Optional[pulumi.Input[str]]):
571
- pulumi.set(self, "listing_visibility", value)
572
-
573
384
  @property
574
385
  @pulumi.getter
575
386
  def local(self) -> Optional[pulumi.Input[bool]]:
@@ -621,19 +432,6 @@ class _MountState:
621
432
  def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
622
433
  pulumi.set(self, "options", value)
623
434
 
624
- @property
625
- @pulumi.getter(name="passthroughRequestHeaders")
626
- def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
627
- """
628
- List of headers to allow and pass from the request to
629
- the plugin.
630
- """
631
- return pulumi.get(self, "passthrough_request_headers")
632
-
633
- @passthrough_request_headers.setter
634
- def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
635
- pulumi.set(self, "passthrough_request_headers", value)
636
-
637
435
  @property
638
436
  @pulumi.getter
639
437
  def path(self) -> Optional[pulumi.Input[str]]:
@@ -646,20 +444,6 @@ class _MountState:
646
444
  def path(self, value: Optional[pulumi.Input[str]]):
647
445
  pulumi.set(self, "path", value)
648
446
 
649
- @property
650
- @pulumi.getter(name="pluginVersion")
651
- def plugin_version(self) -> Optional[pulumi.Input[str]]:
652
- """
653
- Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
654
- If unspecified, the server will select any matching unversioned plugin that may have been
655
- registered, the latest versioned plugin registered, or a built-in plugin in that order of precedence.
656
- """
657
- return pulumi.get(self, "plugin_version")
658
-
659
- @plugin_version.setter
660
- def plugin_version(self, value: Optional[pulumi.Input[str]]):
661
- pulumi.set(self, "plugin_version", value)
662
-
663
447
  @property
664
448
  @pulumi.getter(name="sealWrap")
665
449
  def seal_wrap(self) -> Optional[pulumi.Input[bool]]:
@@ -691,22 +475,16 @@ class Mount(pulumi.CustomResource):
691
475
  resource_name: str,
692
476
  opts: Optional[pulumi.ResourceOptions] = None,
693
477
  allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
694
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
695
478
  audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
696
479
  audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
697
480
  default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
698
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
699
481
  description: Optional[pulumi.Input[str]] = None,
700
482
  external_entropy_access: Optional[pulumi.Input[bool]] = None,
701
- identity_token_key: Optional[pulumi.Input[str]] = None,
702
- listing_visibility: Optional[pulumi.Input[str]] = None,
703
483
  local: Optional[pulumi.Input[bool]] = None,
704
484
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
705
485
  namespace: Optional[pulumi.Input[str]] = None,
706
486
  options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
707
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
708
487
  path: Optional[pulumi.Input[str]] = None,
709
- plugin_version: Optional[pulumi.Input[str]] = None,
710
488
  seal_wrap: Optional[pulumi.Input[bool]] = None,
711
489
  type: Optional[pulumi.Input[str]] = None,
712
490
  __props__=None):
@@ -715,54 +493,62 @@ class Mount(pulumi.CustomResource):
715
493
 
716
494
  ## Example Usage
717
495
 
496
+ <!--Start PulumiCodeChooser -->
718
497
  ```python
719
498
  import pulumi
720
499
  import pulumi_vault as vault
721
500
 
722
501
  example = vault.Mount("example",
502
+ description="This is an example mount",
723
503
  path="dummy",
724
- type="generic",
725
- description="This is an example mount")
504
+ type="generic")
726
505
  ```
506
+ <!--End PulumiCodeChooser -->
727
507
 
508
+ <!--Start PulumiCodeChooser -->
728
509
  ```python
729
510
  import pulumi
730
511
  import pulumi_vault as vault
731
512
 
732
513
  kvv2_example = vault.Mount("kvv2-example",
733
- path="version2-example",
734
- type="kv-v2",
514
+ description="This is an example KV Version 2 secret engine mount",
735
515
  options={
736
- "version": "2",
737
516
  "type": "kv-v2",
517
+ "version": "2",
738
518
  },
739
- description="This is an example KV Version 2 secret engine mount")
519
+ path="version2-example",
520
+ type="kv-v2")
740
521
  ```
522
+ <!--End PulumiCodeChooser -->
741
523
 
524
+ <!--Start PulumiCodeChooser -->
742
525
  ```python
743
526
  import pulumi
744
527
  import pulumi_vault as vault
745
528
 
746
529
  transit_example = vault.Mount("transit-example",
747
- path="transit-example",
748
- type="transit",
749
530
  description="This is an example transit secret engine mount",
750
531
  options={
751
532
  "convergent_encryption": False,
752
- })
533
+ },
534
+ path="transit-example",
535
+ type="transit")
753
536
  ```
537
+ <!--End PulumiCodeChooser -->
754
538
 
539
+ <!--Start PulumiCodeChooser -->
755
540
  ```python
756
541
  import pulumi
757
542
  import pulumi_vault as vault
758
543
 
759
544
  pki_example = vault.Mount("pki-example",
760
- path="pki-example",
761
- type="pki",
762
- description="This is an example PKI mount",
763
545
  default_lease_ttl_seconds=3600,
764
- max_lease_ttl_seconds=86400)
546
+ description="This is an example PKI mount",
547
+ max_lease_ttl_seconds=86400,
548
+ path="pki-example",
549
+ type="pki")
765
550
  ```
551
+ <!--End PulumiCodeChooser -->
766
552
 
767
553
  ## Import
768
554
 
@@ -775,18 +561,11 @@ class Mount(pulumi.CustomResource):
775
561
  :param str resource_name: The name of the resource.
776
562
  :param pulumi.ResourceOptions opts: Options for the resource.
777
563
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
778
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow, allowing a plugin to include
779
- them in the response.
780
564
  :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
781
565
  :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
782
566
  :param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
783
- :param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of allowed authentication mount accessors the
784
- backend can request delegated authentication for.
785
567
  :param pulumi.Input[str] description: Human-friendly description of the mount
786
568
  :param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
787
- :param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
788
- not provided, this will default to Vault's OIDC default key.
789
- :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
790
569
  :param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
791
570
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
792
571
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
@@ -794,12 +573,7 @@ class Mount(pulumi.CustomResource):
794
573
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
795
574
  *Available only for Vault Enterprise*.
796
575
  :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
797
- :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to
798
- the plugin.
799
576
  :param pulumi.Input[str] path: Where the secret backend will be mounted
800
- :param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
801
- If unspecified, the server will select any matching unversioned plugin that may have been
802
- registered, the latest versioned plugin registered, or a built-in plugin in that order of precedence.
803
577
  :param pulumi.Input[bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
804
578
  :param pulumi.Input[str] type: Type of the backend, such as "aws"
805
579
  """
@@ -814,54 +588,62 @@ class Mount(pulumi.CustomResource):
814
588
 
815
589
  ## Example Usage
816
590
 
591
+ <!--Start PulumiCodeChooser -->
817
592
  ```python
818
593
  import pulumi
819
594
  import pulumi_vault as vault
820
595
 
821
596
  example = vault.Mount("example",
597
+ description="This is an example mount",
822
598
  path="dummy",
823
- type="generic",
824
- description="This is an example mount")
599
+ type="generic")
825
600
  ```
601
+ <!--End PulumiCodeChooser -->
826
602
 
603
+ <!--Start PulumiCodeChooser -->
827
604
  ```python
828
605
  import pulumi
829
606
  import pulumi_vault as vault
830
607
 
831
608
  kvv2_example = vault.Mount("kvv2-example",
832
- path="version2-example",
833
- type="kv-v2",
609
+ description="This is an example KV Version 2 secret engine mount",
834
610
  options={
835
- "version": "2",
836
611
  "type": "kv-v2",
612
+ "version": "2",
837
613
  },
838
- description="This is an example KV Version 2 secret engine mount")
614
+ path="version2-example",
615
+ type="kv-v2")
839
616
  ```
617
+ <!--End PulumiCodeChooser -->
840
618
 
619
+ <!--Start PulumiCodeChooser -->
841
620
  ```python
842
621
  import pulumi
843
622
  import pulumi_vault as vault
844
623
 
845
624
  transit_example = vault.Mount("transit-example",
846
- path="transit-example",
847
- type="transit",
848
625
  description="This is an example transit secret engine mount",
849
626
  options={
850
627
  "convergent_encryption": False,
851
- })
628
+ },
629
+ path="transit-example",
630
+ type="transit")
852
631
  ```
632
+ <!--End PulumiCodeChooser -->
853
633
 
634
+ <!--Start PulumiCodeChooser -->
854
635
  ```python
855
636
  import pulumi
856
637
  import pulumi_vault as vault
857
638
 
858
639
  pki_example = vault.Mount("pki-example",
859
- path="pki-example",
860
- type="pki",
861
- description="This is an example PKI mount",
862
640
  default_lease_ttl_seconds=3600,
863
- max_lease_ttl_seconds=86400)
641
+ description="This is an example PKI mount",
642
+ max_lease_ttl_seconds=86400,
643
+ path="pki-example",
644
+ type="pki")
864
645
  ```
646
+ <!--End PulumiCodeChooser -->
865
647
 
866
648
  ## Import
867
649
 
@@ -887,22 +669,16 @@ class Mount(pulumi.CustomResource):
887
669
  resource_name: str,
888
670
  opts: Optional[pulumi.ResourceOptions] = None,
889
671
  allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
890
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
891
672
  audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
892
673
  audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
893
674
  default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
894
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
895
675
  description: Optional[pulumi.Input[str]] = None,
896
676
  external_entropy_access: Optional[pulumi.Input[bool]] = None,
897
- identity_token_key: Optional[pulumi.Input[str]] = None,
898
- listing_visibility: Optional[pulumi.Input[str]] = None,
899
677
  local: Optional[pulumi.Input[bool]] = None,
900
678
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
901
679
  namespace: Optional[pulumi.Input[str]] = None,
902
680
  options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
903
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
904
681
  path: Optional[pulumi.Input[str]] = None,
905
- plugin_version: Optional[pulumi.Input[str]] = None,
906
682
  seal_wrap: Optional[pulumi.Input[bool]] = None,
907
683
  type: Optional[pulumi.Input[str]] = None,
908
684
  __props__=None):
@@ -915,24 +691,18 @@ class Mount(pulumi.CustomResource):
915
691
  __props__ = MountArgs.__new__(MountArgs)
916
692
 
917
693
  __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
918
- __props__.__dict__["allowed_response_headers"] = allowed_response_headers
919
694
  __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
920
695
  __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
921
696
  __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
922
- __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
923
697
  __props__.__dict__["description"] = description
924
698
  __props__.__dict__["external_entropy_access"] = external_entropy_access
925
- __props__.__dict__["identity_token_key"] = identity_token_key
926
- __props__.__dict__["listing_visibility"] = listing_visibility
927
699
  __props__.__dict__["local"] = local
928
700
  __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
929
701
  __props__.__dict__["namespace"] = namespace
930
702
  __props__.__dict__["options"] = options
931
- __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
932
703
  if path is None and not opts.urn:
933
704
  raise TypeError("Missing required property 'path'")
934
705
  __props__.__dict__["path"] = path
935
- __props__.__dict__["plugin_version"] = plugin_version
936
706
  __props__.__dict__["seal_wrap"] = seal_wrap
937
707
  if type is None and not opts.urn:
938
708
  raise TypeError("Missing required property 'type'")
@@ -950,22 +720,16 @@ class Mount(pulumi.CustomResource):
950
720
  opts: Optional[pulumi.ResourceOptions] = None,
951
721
  accessor: Optional[pulumi.Input[str]] = None,
952
722
  allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
953
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
954
723
  audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
955
724
  audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
956
725
  default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
957
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
958
726
  description: Optional[pulumi.Input[str]] = None,
959
727
  external_entropy_access: Optional[pulumi.Input[bool]] = None,
960
- identity_token_key: Optional[pulumi.Input[str]] = None,
961
- listing_visibility: Optional[pulumi.Input[str]] = None,
962
728
  local: Optional[pulumi.Input[bool]] = None,
963
729
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
964
730
  namespace: Optional[pulumi.Input[str]] = None,
965
731
  options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
966
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
967
732
  path: Optional[pulumi.Input[str]] = None,
968
- plugin_version: Optional[pulumi.Input[str]] = None,
969
733
  seal_wrap: Optional[pulumi.Input[bool]] = None,
970
734
  type: Optional[pulumi.Input[str]] = None) -> 'Mount':
971
735
  """
@@ -977,18 +741,11 @@ class Mount(pulumi.CustomResource):
977
741
  :param pulumi.ResourceOptions opts: Options for the resource.
978
742
  :param pulumi.Input[str] accessor: The accessor for this mount.
979
743
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
980
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow, allowing a plugin to include
981
- them in the response.
982
744
  :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
983
745
  :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
984
746
  :param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
985
- :param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of allowed authentication mount accessors the
986
- backend can request delegated authentication for.
987
747
  :param pulumi.Input[str] description: Human-friendly description of the mount
988
748
  :param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
989
- :param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
990
- not provided, this will default to Vault's OIDC default key.
991
- :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
992
749
  :param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
993
750
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
994
751
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
@@ -996,12 +753,7 @@ class Mount(pulumi.CustomResource):
996
753
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
997
754
  *Available only for Vault Enterprise*.
998
755
  :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
999
- :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to
1000
- the plugin.
1001
756
  :param pulumi.Input[str] path: Where the secret backend will be mounted
1002
- :param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
1003
- If unspecified, the server will select any matching unversioned plugin that may have been
1004
- registered, the latest versioned plugin registered, or a built-in plugin in that order of precedence.
1005
757
  :param pulumi.Input[bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1006
758
  :param pulumi.Input[str] type: Type of the backend, such as "aws"
1007
759
  """
@@ -1011,22 +763,16 @@ class Mount(pulumi.CustomResource):
1011
763
 
1012
764
  __props__.__dict__["accessor"] = accessor
1013
765
  __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1014
- __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1015
766
  __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1016
767
  __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
1017
768
  __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1018
- __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
1019
769
  __props__.__dict__["description"] = description
1020
770
  __props__.__dict__["external_entropy_access"] = external_entropy_access
1021
- __props__.__dict__["identity_token_key"] = identity_token_key
1022
- __props__.__dict__["listing_visibility"] = listing_visibility
1023
771
  __props__.__dict__["local"] = local
1024
772
  __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
1025
773
  __props__.__dict__["namespace"] = namespace
1026
774
  __props__.__dict__["options"] = options
1027
- __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
1028
775
  __props__.__dict__["path"] = path
1029
- __props__.__dict__["plugin_version"] = plugin_version
1030
776
  __props__.__dict__["seal_wrap"] = seal_wrap
1031
777
  __props__.__dict__["type"] = type
1032
778
  return Mount(resource_name, opts=opts, __props__=__props__)
@@ -1047,15 +793,6 @@ class Mount(pulumi.CustomResource):
1047
793
  """
1048
794
  return pulumi.get(self, "allowed_managed_keys")
1049
795
 
1050
- @property
1051
- @pulumi.getter(name="allowedResponseHeaders")
1052
- def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[str]]]:
1053
- """
1054
- List of headers to allow, allowing a plugin to include
1055
- them in the response.
1056
- """
1057
- return pulumi.get(self, "allowed_response_headers")
1058
-
1059
796
  @property
1060
797
  @pulumi.getter(name="auditNonHmacRequestKeys")
1061
798
  def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[str]]:
@@ -1080,15 +817,6 @@ class Mount(pulumi.CustomResource):
1080
817
  """
1081
818
  return pulumi.get(self, "default_lease_ttl_seconds")
1082
819
 
1083
- @property
1084
- @pulumi.getter(name="delegatedAuthAccessors")
1085
- def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[str]]]:
1086
- """
1087
- List of allowed authentication mount accessors the
1088
- backend can request delegated authentication for.
1089
- """
1090
- return pulumi.get(self, "delegated_auth_accessors")
1091
-
1092
820
  @property
1093
821
  @pulumi.getter
1094
822
  def description(self) -> pulumi.Output[Optional[str]]:
@@ -1105,23 +833,6 @@ class Mount(pulumi.CustomResource):
1105
833
  """
1106
834
  return pulumi.get(self, "external_entropy_access")
1107
835
 
1108
- @property
1109
- @pulumi.getter(name="identityTokenKey")
1110
- def identity_token_key(self) -> pulumi.Output[Optional[str]]:
1111
- """
1112
- The key to use for signing plugin workload identity tokens. If
1113
- not provided, this will default to Vault's OIDC default key.
1114
- """
1115
- return pulumi.get(self, "identity_token_key")
1116
-
1117
- @property
1118
- @pulumi.getter(name="listingVisibility")
1119
- def listing_visibility(self) -> pulumi.Output[Optional[str]]:
1120
- """
1121
- Specifies whether to show this mount in the UI-specific listing endpoint
1122
- """
1123
- return pulumi.get(self, "listing_visibility")
1124
-
1125
836
  @property
1126
837
  @pulumi.getter
1127
838
  def local(self) -> pulumi.Output[Optional[bool]]:
@@ -1157,15 +868,6 @@ class Mount(pulumi.CustomResource):
1157
868
  """
1158
869
  return pulumi.get(self, "options")
1159
870
 
1160
- @property
1161
- @pulumi.getter(name="passthroughRequestHeaders")
1162
- def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[str]]]:
1163
- """
1164
- List of headers to allow and pass from the request to
1165
- the plugin.
1166
- """
1167
- return pulumi.get(self, "passthrough_request_headers")
1168
-
1169
871
  @property
1170
872
  @pulumi.getter
1171
873
  def path(self) -> pulumi.Output[str]:
@@ -1174,16 +876,6 @@ class Mount(pulumi.CustomResource):
1174
876
  """
1175
877
  return pulumi.get(self, "path")
1176
878
 
1177
- @property
1178
- @pulumi.getter(name="pluginVersion")
1179
- def plugin_version(self) -> pulumi.Output[Optional[str]]:
1180
- """
1181
- Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
1182
- If unspecified, the server will select any matching unversioned plugin that may have been
1183
- registered, the latest versioned plugin registered, or a built-in plugin in that order of precedence.
1184
- """
1185
- return pulumi.get(self, "plugin_version")
1186
-
1187
879
  @property
1188
880
  @pulumi.getter(name="sealWrap")
1189
881
  def seal_wrap(self) -> pulumi.Output[bool]: