pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (269) hide show
  1. pulumi_vault/__init__.py +19 -1
  2. pulumi_vault/_inputs.py +873 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +1016 -439
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +1057 -285
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +887 -256
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +426 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +878 -336
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +400 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +1006 -227
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +431 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +732 -693
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +380 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +909 -271
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/oci_auth_backend.py +683 -0
  168. pulumi_vault/oci_auth_backend_role.py +798 -0
  169. pulumi_vault/okta/__init__.py +1 -1
  170. pulumi_vault/okta/_inputs.py +31 -32
  171. pulumi_vault/okta/auth_backend.py +305 -306
  172. pulumi_vault/okta/auth_backend_group.py +69 -70
  173. pulumi_vault/okta/auth_backend_user.py +86 -87
  174. pulumi_vault/okta/outputs.py +21 -22
  175. pulumi_vault/outputs.py +234 -82
  176. pulumi_vault/pkisecret/__init__.py +1 -1
  177. pulumi_vault/pkisecret/_inputs.py +55 -56
  178. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  179. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  180. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  181. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  182. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  183. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  184. pulumi_vault/pkisecret/backend_config_scep.py +205 -159
  185. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  186. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  187. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  188. pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
  189. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  190. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  191. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  192. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  193. pulumi_vault/pkisecret/outputs.py +61 -62
  194. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  195. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  196. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  197. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  198. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  199. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  200. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  201. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  202. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  203. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  204. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  205. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  206. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  207. pulumi_vault/plugin.py +154 -155
  208. pulumi_vault/plugin_pinned_version.py +52 -53
  209. pulumi_vault/policy.py +52 -53
  210. pulumi_vault/provider.py +160 -161
  211. pulumi_vault/pulumi-plugin.json +1 -1
  212. pulumi_vault/quota_lease_count.py +103 -104
  213. pulumi_vault/quota_rate_limit.py +171 -172
  214. pulumi_vault/rabbitmq/__init__.py +1 -1
  215. pulumi_vault/rabbitmq/_inputs.py +50 -51
  216. pulumi_vault/rabbitmq/outputs.py +34 -35
  217. pulumi_vault/rabbitmq/secret_backend.py +902 -231
  218. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  219. pulumi_vault/raft_autopilot.py +137 -138
  220. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  221. pulumi_vault/rgp_policy.py +69 -70
  222. pulumi_vault/saml/__init__.py +1 -1
  223. pulumi_vault/saml/auth_backend.py +188 -189
  224. pulumi_vault/saml/auth_backend_role.py +290 -291
  225. pulumi_vault/scep_auth_backend_role.py +252 -253
  226. pulumi_vault/secrets/__init__.py +1 -1
  227. pulumi_vault/secrets/_inputs.py +19 -20
  228. pulumi_vault/secrets/outputs.py +13 -14
  229. pulumi_vault/secrets/sync_association.py +88 -89
  230. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  231. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  232. pulumi_vault/secrets/sync_config.py +52 -53
  233. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  234. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  235. pulumi_vault/secrets/sync_github_apps.py +78 -79
  236. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  237. pulumi_vault/ssh/__init__.py +1 -1
  238. pulumi_vault/ssh/_inputs.py +13 -14
  239. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  240. pulumi_vault/ssh/outputs.py +9 -10
  241. pulumi_vault/ssh/secret_backend_ca.py +217 -124
  242. pulumi_vault/ssh/secret_backend_role.py +446 -447
  243. pulumi_vault/terraformcloud/__init__.py +1 -1
  244. pulumi_vault/terraformcloud/secret_backend.py +833 -155
  245. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  246. pulumi_vault/terraformcloud/secret_role.py +117 -118
  247. pulumi_vault/token.py +301 -302
  248. pulumi_vault/tokenauth/__init__.py +1 -1
  249. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  250. pulumi_vault/transform/__init__.py +1 -1
  251. pulumi_vault/transform/alphabet.py +69 -70
  252. pulumi_vault/transform/get_decode.py +57 -58
  253. pulumi_vault/transform/get_encode.py +57 -58
  254. pulumi_vault/transform/role.py +69 -70
  255. pulumi_vault/transform/template.py +137 -138
  256. pulumi_vault/transform/transformation.py +171 -172
  257. pulumi_vault/transit/__init__.py +1 -1
  258. pulumi_vault/transit/get_cmac.py +47 -48
  259. pulumi_vault/transit/get_decrypt.py +25 -26
  260. pulumi_vault/transit/get_encrypt.py +29 -30
  261. pulumi_vault/transit/get_sign.py +71 -72
  262. pulumi_vault/transit/get_verify.py +83 -84
  263. pulumi_vault/transit/secret_backend_key.py +377 -350
  264. pulumi_vault/transit/secret_cache_config.py +52 -53
  265. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
  266. pulumi_vault-7.2.0.dist-info/RECORD +270 -0
  267. pulumi_vault-7.1.0.dist-info/RECORD +0 -268
  268. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
  269. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,127 +19,240 @@ __all__ = ['SecretBackendArgs', 'SecretBackend']
20
19
  @pulumi.input_type
21
20
  class SecretBackendArgs:
22
21
  def __init__(__self__, *,
23
- connection_uri: pulumi.Input[builtins.str],
24
- password: pulumi.Input[builtins.str],
25
- username: pulumi.Input[builtins.str],
26
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
27
- description: Optional[pulumi.Input[builtins.str]] = None,
28
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
29
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
30
- namespace: Optional[pulumi.Input[builtins.str]] = None,
31
- password_policy: Optional[pulumi.Input[builtins.str]] = None,
32
- path: Optional[pulumi.Input[builtins.str]] = None,
33
- username_template: Optional[pulumi.Input[builtins.str]] = None,
34
- verify_connection: Optional[pulumi.Input[builtins.bool]] = None):
22
+ connection_uri: pulumi.Input[_builtins.str],
23
+ password: pulumi.Input[_builtins.str],
24
+ username: pulumi.Input[_builtins.str],
25
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
28
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
29
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
30
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
31
+ description: Optional[pulumi.Input[_builtins.str]] = None,
32
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
33
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
34
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
35
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
36
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
37
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
38
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
39
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
40
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
41
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
42
+ password_policy: Optional[pulumi.Input[_builtins.str]] = None,
43
+ path: Optional[pulumi.Input[_builtins.str]] = None,
44
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
45
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
46
+ username_template: Optional[pulumi.Input[_builtins.str]] = None,
47
+ verify_connection: Optional[pulumi.Input[_builtins.bool]] = None):
35
48
  """
36
49
  The set of arguments for constructing a SecretBackend resource.
37
- :param pulumi.Input[builtins.str] connection_uri: Specifies the RabbitMQ connection URI.
38
- :param pulumi.Input[builtins.str] password: Specifies the RabbitMQ management administrator password.
39
- :param pulumi.Input[builtins.str] username: Specifies the RabbitMQ management administrator username.
40
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: The default TTL for credentials
41
- issued by this backend.
42
- :param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
43
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
50
+ :param pulumi.Input[_builtins.str] connection_uri: Specifies the RabbitMQ connection URI.
51
+ :param pulumi.Input[_builtins.str] password: Specifies the RabbitMQ management administrator password.
52
+ :param pulumi.Input[_builtins.str] username: Specifies the RabbitMQ management administrator username.
53
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
54
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
55
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
56
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
57
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
58
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
59
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
60
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
44
61
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
45
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
46
- for credentials issued by this backend.
47
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
62
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
63
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
64
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
65
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
66
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
67
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
68
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
48
69
  The value should not contain leading or trailing forward slashes.
49
70
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
50
71
  *Available only for Vault Enterprise*.
51
- :param pulumi.Input[builtins.str] password_policy: Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set.
52
- :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
72
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
73
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
74
+ :param pulumi.Input[_builtins.str] password_policy: Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set.
75
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
53
76
  not begin or end with a `/`. Defaults to `rabbitmq`.
54
- :param pulumi.Input[builtins.str] username_template: Template describing how dynamic usernames are generated.
55
- :param pulumi.Input[builtins.bool] verify_connection: Specifies whether to verify connection URI, username, and password.
77
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
78
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
79
+ :param pulumi.Input[_builtins.str] username_template: Template describing how dynamic usernames are generated.
80
+ :param pulumi.Input[_builtins.bool] verify_connection: Specifies whether to verify connection URI, username, and password.
56
81
  Defaults to `true`.
57
82
  """
58
83
  pulumi.set(__self__, "connection_uri", connection_uri)
59
84
  pulumi.set(__self__, "password", password)
60
85
  pulumi.set(__self__, "username", username)
86
+ if allowed_managed_keys is not None:
87
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
88
+ if allowed_response_headers is not None:
89
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
90
+ if audit_non_hmac_request_keys is not None:
91
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
92
+ if audit_non_hmac_response_keys is not None:
93
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
61
94
  if default_lease_ttl_seconds is not None:
62
95
  pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
96
+ if delegated_auth_accessors is not None:
97
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
63
98
  if description is not None:
64
99
  pulumi.set(__self__, "description", description)
65
100
  if disable_remount is not None:
66
101
  pulumi.set(__self__, "disable_remount", disable_remount)
102
+ if external_entropy_access is not None:
103
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
104
+ if force_no_cache is not None:
105
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
106
+ if identity_token_key is not None:
107
+ pulumi.set(__self__, "identity_token_key", identity_token_key)
108
+ if listing_visibility is not None:
109
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
110
+ if local is not None:
111
+ pulumi.set(__self__, "local", local)
67
112
  if max_lease_ttl_seconds is not None:
68
113
  pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
69
114
  if namespace is not None:
70
115
  pulumi.set(__self__, "namespace", namespace)
116
+ if options is not None:
117
+ pulumi.set(__self__, "options", options)
118
+ if passthrough_request_headers is not None:
119
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
71
120
  if password_policy is not None:
72
121
  pulumi.set(__self__, "password_policy", password_policy)
73
122
  if path is not None:
74
123
  pulumi.set(__self__, "path", path)
124
+ if plugin_version is not None:
125
+ pulumi.set(__self__, "plugin_version", plugin_version)
126
+ if seal_wrap is not None:
127
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
75
128
  if username_template is not None:
76
129
  pulumi.set(__self__, "username_template", username_template)
77
130
  if verify_connection is not None:
78
131
  pulumi.set(__self__, "verify_connection", verify_connection)
79
132
 
80
- @property
133
+ @_builtins.property
81
134
  @pulumi.getter(name="connectionUri")
82
- def connection_uri(self) -> pulumi.Input[builtins.str]:
135
+ def connection_uri(self) -> pulumi.Input[_builtins.str]:
83
136
  """
84
137
  Specifies the RabbitMQ connection URI.
85
138
  """
86
139
  return pulumi.get(self, "connection_uri")
87
140
 
88
141
  @connection_uri.setter
89
- def connection_uri(self, value: pulumi.Input[builtins.str]):
142
+ def connection_uri(self, value: pulumi.Input[_builtins.str]):
90
143
  pulumi.set(self, "connection_uri", value)
91
144
 
92
- @property
145
+ @_builtins.property
93
146
  @pulumi.getter
94
- def password(self) -> pulumi.Input[builtins.str]:
147
+ def password(self) -> pulumi.Input[_builtins.str]:
95
148
  """
96
149
  Specifies the RabbitMQ management administrator password.
97
150
  """
98
151
  return pulumi.get(self, "password")
99
152
 
100
153
  @password.setter
101
- def password(self, value: pulumi.Input[builtins.str]):
154
+ def password(self, value: pulumi.Input[_builtins.str]):
102
155
  pulumi.set(self, "password", value)
103
156
 
104
- @property
157
+ @_builtins.property
105
158
  @pulumi.getter
106
- def username(self) -> pulumi.Input[builtins.str]:
159
+ def username(self) -> pulumi.Input[_builtins.str]:
107
160
  """
108
161
  Specifies the RabbitMQ management administrator username.
109
162
  """
110
163
  return pulumi.get(self, "username")
111
164
 
112
165
  @username.setter
113
- def username(self, value: pulumi.Input[builtins.str]):
166
+ def username(self, value: pulumi.Input[_builtins.str]):
114
167
  pulumi.set(self, "username", value)
115
168
 
116
- @property
169
+ @_builtins.property
170
+ @pulumi.getter(name="allowedManagedKeys")
171
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
172
+ """
173
+ List of managed key registry entry names that the mount in question is allowed to access
174
+ """
175
+ return pulumi.get(self, "allowed_managed_keys")
176
+
177
+ @allowed_managed_keys.setter
178
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
179
+ pulumi.set(self, "allowed_managed_keys", value)
180
+
181
+ @_builtins.property
182
+ @pulumi.getter(name="allowedResponseHeaders")
183
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
184
+ """
185
+ List of headers to allow and pass from the request to the plugin
186
+ """
187
+ return pulumi.get(self, "allowed_response_headers")
188
+
189
+ @allowed_response_headers.setter
190
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
191
+ pulumi.set(self, "allowed_response_headers", value)
192
+
193
+ @_builtins.property
194
+ @pulumi.getter(name="auditNonHmacRequestKeys")
195
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
196
+ """
197
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
198
+ """
199
+ return pulumi.get(self, "audit_non_hmac_request_keys")
200
+
201
+ @audit_non_hmac_request_keys.setter
202
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
203
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
204
+
205
+ @_builtins.property
206
+ @pulumi.getter(name="auditNonHmacResponseKeys")
207
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
208
+ """
209
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
210
+ """
211
+ return pulumi.get(self, "audit_non_hmac_response_keys")
212
+
213
+ @audit_non_hmac_response_keys.setter
214
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
215
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
216
+
217
+ @_builtins.property
117
218
  @pulumi.getter(name="defaultLeaseTtlSeconds")
118
- def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
219
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
119
220
  """
120
- The default TTL for credentials
121
- issued by this backend.
221
+ Default lease duration for secrets in seconds
122
222
  """
123
223
  return pulumi.get(self, "default_lease_ttl_seconds")
124
224
 
125
225
  @default_lease_ttl_seconds.setter
126
- def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
226
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
127
227
  pulumi.set(self, "default_lease_ttl_seconds", value)
128
228
 
129
- @property
229
+ @_builtins.property
230
+ @pulumi.getter(name="delegatedAuthAccessors")
231
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
232
+ """
233
+ List of headers to allow and pass from the request to the plugin
234
+ """
235
+ return pulumi.get(self, "delegated_auth_accessors")
236
+
237
+ @delegated_auth_accessors.setter
238
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
239
+ pulumi.set(self, "delegated_auth_accessors", value)
240
+
241
+ @_builtins.property
130
242
  @pulumi.getter
131
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
243
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
132
244
  """
133
- A human-friendly description for this backend.
245
+ Human-friendly description of the mount for the backend.
134
246
  """
135
247
  return pulumi.get(self, "description")
136
248
 
137
249
  @description.setter
138
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
250
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
139
251
  pulumi.set(self, "description", value)
140
252
 
141
- @property
253
+ @_builtins.property
142
254
  @pulumi.getter(name="disableRemount")
143
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
255
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
144
256
  """
145
257
  If set, opts out of mount migration on path updates.
146
258
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -148,25 +260,84 @@ class SecretBackendArgs:
148
260
  return pulumi.get(self, "disable_remount")
149
261
 
150
262
  @disable_remount.setter
151
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
263
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
152
264
  pulumi.set(self, "disable_remount", value)
153
265
 
154
- @property
266
+ @_builtins.property
267
+ @pulumi.getter(name="externalEntropyAccess")
268
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
269
+ """
270
+ Enable the secrets engine to access Vault's external entropy source
271
+ """
272
+ return pulumi.get(self, "external_entropy_access")
273
+
274
+ @external_entropy_access.setter
275
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
276
+ pulumi.set(self, "external_entropy_access", value)
277
+
278
+ @_builtins.property
279
+ @pulumi.getter(name="forceNoCache")
280
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
281
+ """
282
+ If set to true, disables caching.
283
+ """
284
+ return pulumi.get(self, "force_no_cache")
285
+
286
+ @force_no_cache.setter
287
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
288
+ pulumi.set(self, "force_no_cache", value)
289
+
290
+ @_builtins.property
291
+ @pulumi.getter(name="identityTokenKey")
292
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
293
+ """
294
+ The key to use for signing plugin workload identity tokens
295
+ """
296
+ return pulumi.get(self, "identity_token_key")
297
+
298
+ @identity_token_key.setter
299
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
300
+ pulumi.set(self, "identity_token_key", value)
301
+
302
+ @_builtins.property
303
+ @pulumi.getter(name="listingVisibility")
304
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
305
+ """
306
+ Specifies whether to show this mount in the UI-specific listing endpoint
307
+ """
308
+ return pulumi.get(self, "listing_visibility")
309
+
310
+ @listing_visibility.setter
311
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
312
+ pulumi.set(self, "listing_visibility", value)
313
+
314
+ @_builtins.property
315
+ @pulumi.getter
316
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
317
+ """
318
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
319
+ """
320
+ return pulumi.get(self, "local")
321
+
322
+ @local.setter
323
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
324
+ pulumi.set(self, "local", value)
325
+
326
+ @_builtins.property
155
327
  @pulumi.getter(name="maxLeaseTtlSeconds")
156
- def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
328
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
157
329
  """
158
- The maximum TTL that can be requested
159
- for credentials issued by this backend.
330
+ Maximum possible lease duration for secrets in seconds
160
331
  """
161
332
  return pulumi.get(self, "max_lease_ttl_seconds")
162
333
 
163
334
  @max_lease_ttl_seconds.setter
164
- def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
335
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
165
336
  pulumi.set(self, "max_lease_ttl_seconds", value)
166
337
 
167
- @property
338
+ @_builtins.property
168
339
  @pulumi.getter
169
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
340
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
170
341
  """
171
342
  The namespace to provision the resource in.
172
343
  The value should not contain leading or trailing forward slashes.
@@ -176,24 +347,48 @@ class SecretBackendArgs:
176
347
  return pulumi.get(self, "namespace")
177
348
 
178
349
  @namespace.setter
179
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
350
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
180
351
  pulumi.set(self, "namespace", value)
181
352
 
182
- @property
353
+ @_builtins.property
354
+ @pulumi.getter
355
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
356
+ """
357
+ Specifies mount type specific options that are passed to the backend
358
+ """
359
+ return pulumi.get(self, "options")
360
+
361
+ @options.setter
362
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
363
+ pulumi.set(self, "options", value)
364
+
365
+ @_builtins.property
366
+ @pulumi.getter(name="passthroughRequestHeaders")
367
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
368
+ """
369
+ List of headers to allow and pass from the request to the plugin
370
+ """
371
+ return pulumi.get(self, "passthrough_request_headers")
372
+
373
+ @passthrough_request_headers.setter
374
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
375
+ pulumi.set(self, "passthrough_request_headers", value)
376
+
377
+ @_builtins.property
183
378
  @pulumi.getter(name="passwordPolicy")
184
- def password_policy(self) -> Optional[pulumi.Input[builtins.str]]:
379
+ def password_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
185
380
  """
186
381
  Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set.
187
382
  """
188
383
  return pulumi.get(self, "password_policy")
189
384
 
190
385
  @password_policy.setter
191
- def password_policy(self, value: Optional[pulumi.Input[builtins.str]]):
386
+ def password_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
192
387
  pulumi.set(self, "password_policy", value)
193
388
 
194
- @property
389
+ @_builtins.property
195
390
  @pulumi.getter
196
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
391
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
197
392
  """
198
393
  The unique path this backend should be mounted at. Must
199
394
  not begin or end with a `/`. Defaults to `rabbitmq`.
@@ -201,24 +396,48 @@ class SecretBackendArgs:
201
396
  return pulumi.get(self, "path")
202
397
 
203
398
  @path.setter
204
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
399
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
205
400
  pulumi.set(self, "path", value)
206
401
 
207
- @property
402
+ @_builtins.property
403
+ @pulumi.getter(name="pluginVersion")
404
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
405
+ """
406
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
407
+ """
408
+ return pulumi.get(self, "plugin_version")
409
+
410
+ @plugin_version.setter
411
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
412
+ pulumi.set(self, "plugin_version", value)
413
+
414
+ @_builtins.property
415
+ @pulumi.getter(name="sealWrap")
416
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
417
+ """
418
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
419
+ """
420
+ return pulumi.get(self, "seal_wrap")
421
+
422
+ @seal_wrap.setter
423
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
424
+ pulumi.set(self, "seal_wrap", value)
425
+
426
+ @_builtins.property
208
427
  @pulumi.getter(name="usernameTemplate")
209
- def username_template(self) -> Optional[pulumi.Input[builtins.str]]:
428
+ def username_template(self) -> Optional[pulumi.Input[_builtins.str]]:
210
429
  """
211
430
  Template describing how dynamic usernames are generated.
212
431
  """
213
432
  return pulumi.get(self, "username_template")
214
433
 
215
434
  @username_template.setter
216
- def username_template(self, value: Optional[pulumi.Input[builtins.str]]):
435
+ def username_template(self, value: Optional[pulumi.Input[_builtins.str]]):
217
436
  pulumi.set(self, "username_template", value)
218
437
 
219
- @property
438
+ @_builtins.property
220
439
  @pulumi.getter(name="verifyConnection")
221
- def verify_connection(self) -> Optional[pulumi.Input[builtins.bool]]:
440
+ def verify_connection(self) -> Optional[pulumi.Input[_builtins.bool]]:
222
441
  """
223
442
  Specifies whether to verify connection URI, username, and password.
224
443
  Defaults to `true`.
@@ -226,66 +445,124 @@ class SecretBackendArgs:
226
445
  return pulumi.get(self, "verify_connection")
227
446
 
228
447
  @verify_connection.setter
229
- def verify_connection(self, value: Optional[pulumi.Input[builtins.bool]]):
448
+ def verify_connection(self, value: Optional[pulumi.Input[_builtins.bool]]):
230
449
  pulumi.set(self, "verify_connection", value)
231
450
 
232
451
 
233
452
  @pulumi.input_type
234
453
  class _SecretBackendState:
235
454
  def __init__(__self__, *,
236
- connection_uri: Optional[pulumi.Input[builtins.str]] = None,
237
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
238
- description: Optional[pulumi.Input[builtins.str]] = None,
239
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
240
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
241
- namespace: Optional[pulumi.Input[builtins.str]] = None,
242
- password: Optional[pulumi.Input[builtins.str]] = None,
243
- password_policy: Optional[pulumi.Input[builtins.str]] = None,
244
- path: Optional[pulumi.Input[builtins.str]] = None,
245
- username: Optional[pulumi.Input[builtins.str]] = None,
246
- username_template: Optional[pulumi.Input[builtins.str]] = None,
247
- verify_connection: Optional[pulumi.Input[builtins.bool]] = None):
455
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
456
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
457
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
458
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
459
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
460
+ connection_uri: Optional[pulumi.Input[_builtins.str]] = None,
461
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
462
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
463
+ description: Optional[pulumi.Input[_builtins.str]] = None,
464
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
465
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
466
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
467
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
468
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
469
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
470
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
471
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
472
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
473
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
474
+ password: Optional[pulumi.Input[_builtins.str]] = None,
475
+ password_policy: Optional[pulumi.Input[_builtins.str]] = None,
476
+ path: Optional[pulumi.Input[_builtins.str]] = None,
477
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
478
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
479
+ username: Optional[pulumi.Input[_builtins.str]] = None,
480
+ username_template: Optional[pulumi.Input[_builtins.str]] = None,
481
+ verify_connection: Optional[pulumi.Input[_builtins.bool]] = None):
248
482
  """
249
483
  Input properties used for looking up and filtering SecretBackend resources.
250
- :param pulumi.Input[builtins.str] connection_uri: Specifies the RabbitMQ connection URI.
251
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: The default TTL for credentials
252
- issued by this backend.
253
- :param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
254
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
484
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
485
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
486
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
487
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
488
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
489
+ :param pulumi.Input[_builtins.str] connection_uri: Specifies the RabbitMQ connection URI.
490
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
491
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
492
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
493
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
255
494
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
256
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
257
- for credentials issued by this backend.
258
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
495
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
496
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
497
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
498
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
499
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
500
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
501
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
259
502
  The value should not contain leading or trailing forward slashes.
260
503
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
261
504
  *Available only for Vault Enterprise*.
262
- :param pulumi.Input[builtins.str] password: Specifies the RabbitMQ management administrator password.
263
- :param pulumi.Input[builtins.str] password_policy: Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set.
264
- :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
505
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
506
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
507
+ :param pulumi.Input[_builtins.str] password: Specifies the RabbitMQ management administrator password.
508
+ :param pulumi.Input[_builtins.str] password_policy: Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set.
509
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
265
510
  not begin or end with a `/`. Defaults to `rabbitmq`.
266
- :param pulumi.Input[builtins.str] username: Specifies the RabbitMQ management administrator username.
267
- :param pulumi.Input[builtins.str] username_template: Template describing how dynamic usernames are generated.
268
- :param pulumi.Input[builtins.bool] verify_connection: Specifies whether to verify connection URI, username, and password.
511
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
512
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
513
+ :param pulumi.Input[_builtins.str] username: Specifies the RabbitMQ management administrator username.
514
+ :param pulumi.Input[_builtins.str] username_template: Template describing how dynamic usernames are generated.
515
+ :param pulumi.Input[_builtins.bool] verify_connection: Specifies whether to verify connection URI, username, and password.
269
516
  Defaults to `true`.
270
517
  """
518
+ if accessor is not None:
519
+ pulumi.set(__self__, "accessor", accessor)
520
+ if allowed_managed_keys is not None:
521
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
522
+ if allowed_response_headers is not None:
523
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
524
+ if audit_non_hmac_request_keys is not None:
525
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
526
+ if audit_non_hmac_response_keys is not None:
527
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
271
528
  if connection_uri is not None:
272
529
  pulumi.set(__self__, "connection_uri", connection_uri)
273
530
  if default_lease_ttl_seconds is not None:
274
531
  pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
532
+ if delegated_auth_accessors is not None:
533
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
275
534
  if description is not None:
276
535
  pulumi.set(__self__, "description", description)
277
536
  if disable_remount is not None:
278
537
  pulumi.set(__self__, "disable_remount", disable_remount)
538
+ if external_entropy_access is not None:
539
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
540
+ if force_no_cache is not None:
541
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
542
+ if identity_token_key is not None:
543
+ pulumi.set(__self__, "identity_token_key", identity_token_key)
544
+ if listing_visibility is not None:
545
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
546
+ if local is not None:
547
+ pulumi.set(__self__, "local", local)
279
548
  if max_lease_ttl_seconds is not None:
280
549
  pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
281
550
  if namespace is not None:
282
551
  pulumi.set(__self__, "namespace", namespace)
552
+ if options is not None:
553
+ pulumi.set(__self__, "options", options)
554
+ if passthrough_request_headers is not None:
555
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
283
556
  if password is not None:
284
557
  pulumi.set(__self__, "password", password)
285
558
  if password_policy is not None:
286
559
  pulumi.set(__self__, "password_policy", password_policy)
287
560
  if path is not None:
288
561
  pulumi.set(__self__, "path", path)
562
+ if plugin_version is not None:
563
+ pulumi.set(__self__, "plugin_version", plugin_version)
564
+ if seal_wrap is not None:
565
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
289
566
  if username is not None:
290
567
  pulumi.set(__self__, "username", username)
291
568
  if username_template is not None:
@@ -293,46 +570,117 @@ class _SecretBackendState:
293
570
  if verify_connection is not None:
294
571
  pulumi.set(__self__, "verify_connection", verify_connection)
295
572
 
296
- @property
573
+ @_builtins.property
574
+ @pulumi.getter
575
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
576
+ """
577
+ Accessor of the mount
578
+ """
579
+ return pulumi.get(self, "accessor")
580
+
581
+ @accessor.setter
582
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
583
+ pulumi.set(self, "accessor", value)
584
+
585
+ @_builtins.property
586
+ @pulumi.getter(name="allowedManagedKeys")
587
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
588
+ """
589
+ List of managed key registry entry names that the mount in question is allowed to access
590
+ """
591
+ return pulumi.get(self, "allowed_managed_keys")
592
+
593
+ @allowed_managed_keys.setter
594
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
595
+ pulumi.set(self, "allowed_managed_keys", value)
596
+
597
+ @_builtins.property
598
+ @pulumi.getter(name="allowedResponseHeaders")
599
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
600
+ """
601
+ List of headers to allow and pass from the request to the plugin
602
+ """
603
+ return pulumi.get(self, "allowed_response_headers")
604
+
605
+ @allowed_response_headers.setter
606
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
607
+ pulumi.set(self, "allowed_response_headers", value)
608
+
609
+ @_builtins.property
610
+ @pulumi.getter(name="auditNonHmacRequestKeys")
611
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
612
+ """
613
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
614
+ """
615
+ return pulumi.get(self, "audit_non_hmac_request_keys")
616
+
617
+ @audit_non_hmac_request_keys.setter
618
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
619
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
620
+
621
+ @_builtins.property
622
+ @pulumi.getter(name="auditNonHmacResponseKeys")
623
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
624
+ """
625
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
626
+ """
627
+ return pulumi.get(self, "audit_non_hmac_response_keys")
628
+
629
+ @audit_non_hmac_response_keys.setter
630
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
631
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
632
+
633
+ @_builtins.property
297
634
  @pulumi.getter(name="connectionUri")
298
- def connection_uri(self) -> Optional[pulumi.Input[builtins.str]]:
635
+ def connection_uri(self) -> Optional[pulumi.Input[_builtins.str]]:
299
636
  """
300
637
  Specifies the RabbitMQ connection URI.
301
638
  """
302
639
  return pulumi.get(self, "connection_uri")
303
640
 
304
641
  @connection_uri.setter
305
- def connection_uri(self, value: Optional[pulumi.Input[builtins.str]]):
642
+ def connection_uri(self, value: Optional[pulumi.Input[_builtins.str]]):
306
643
  pulumi.set(self, "connection_uri", value)
307
644
 
308
- @property
645
+ @_builtins.property
309
646
  @pulumi.getter(name="defaultLeaseTtlSeconds")
310
- def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
647
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
311
648
  """
312
- The default TTL for credentials
313
- issued by this backend.
649
+ Default lease duration for secrets in seconds
314
650
  """
315
651
  return pulumi.get(self, "default_lease_ttl_seconds")
316
652
 
317
653
  @default_lease_ttl_seconds.setter
318
- def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
654
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
319
655
  pulumi.set(self, "default_lease_ttl_seconds", value)
320
656
 
321
- @property
657
+ @_builtins.property
658
+ @pulumi.getter(name="delegatedAuthAccessors")
659
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
660
+ """
661
+ List of headers to allow and pass from the request to the plugin
662
+ """
663
+ return pulumi.get(self, "delegated_auth_accessors")
664
+
665
+ @delegated_auth_accessors.setter
666
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
667
+ pulumi.set(self, "delegated_auth_accessors", value)
668
+
669
+ @_builtins.property
322
670
  @pulumi.getter
323
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
671
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
324
672
  """
325
- A human-friendly description for this backend.
673
+ Human-friendly description of the mount for the backend.
326
674
  """
327
675
  return pulumi.get(self, "description")
328
676
 
329
677
  @description.setter
330
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
678
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
331
679
  pulumi.set(self, "description", value)
332
680
 
333
- @property
681
+ @_builtins.property
334
682
  @pulumi.getter(name="disableRemount")
335
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
683
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
336
684
  """
337
685
  If set, opts out of mount migration on path updates.
338
686
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -340,25 +688,84 @@ class _SecretBackendState:
340
688
  return pulumi.get(self, "disable_remount")
341
689
 
342
690
  @disable_remount.setter
343
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
691
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
344
692
  pulumi.set(self, "disable_remount", value)
345
693
 
346
- @property
694
+ @_builtins.property
695
+ @pulumi.getter(name="externalEntropyAccess")
696
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
697
+ """
698
+ Enable the secrets engine to access Vault's external entropy source
699
+ """
700
+ return pulumi.get(self, "external_entropy_access")
701
+
702
+ @external_entropy_access.setter
703
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
704
+ pulumi.set(self, "external_entropy_access", value)
705
+
706
+ @_builtins.property
707
+ @pulumi.getter(name="forceNoCache")
708
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
709
+ """
710
+ If set to true, disables caching.
711
+ """
712
+ return pulumi.get(self, "force_no_cache")
713
+
714
+ @force_no_cache.setter
715
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
716
+ pulumi.set(self, "force_no_cache", value)
717
+
718
+ @_builtins.property
719
+ @pulumi.getter(name="identityTokenKey")
720
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
721
+ """
722
+ The key to use for signing plugin workload identity tokens
723
+ """
724
+ return pulumi.get(self, "identity_token_key")
725
+
726
+ @identity_token_key.setter
727
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
728
+ pulumi.set(self, "identity_token_key", value)
729
+
730
+ @_builtins.property
731
+ @pulumi.getter(name="listingVisibility")
732
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
733
+ """
734
+ Specifies whether to show this mount in the UI-specific listing endpoint
735
+ """
736
+ return pulumi.get(self, "listing_visibility")
737
+
738
+ @listing_visibility.setter
739
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
740
+ pulumi.set(self, "listing_visibility", value)
741
+
742
+ @_builtins.property
743
+ @pulumi.getter
744
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
745
+ """
746
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
747
+ """
748
+ return pulumi.get(self, "local")
749
+
750
+ @local.setter
751
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
752
+ pulumi.set(self, "local", value)
753
+
754
+ @_builtins.property
347
755
  @pulumi.getter(name="maxLeaseTtlSeconds")
348
- def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
756
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
349
757
  """
350
- The maximum TTL that can be requested
351
- for credentials issued by this backend.
758
+ Maximum possible lease duration for secrets in seconds
352
759
  """
353
760
  return pulumi.get(self, "max_lease_ttl_seconds")
354
761
 
355
762
  @max_lease_ttl_seconds.setter
356
- def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
763
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
357
764
  pulumi.set(self, "max_lease_ttl_seconds", value)
358
765
 
359
- @property
766
+ @_builtins.property
360
767
  @pulumi.getter
361
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
768
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
362
769
  """
363
770
  The namespace to provision the resource in.
364
771
  The value should not contain leading or trailing forward slashes.
@@ -368,36 +775,60 @@ class _SecretBackendState:
368
775
  return pulumi.get(self, "namespace")
369
776
 
370
777
  @namespace.setter
371
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
778
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
372
779
  pulumi.set(self, "namespace", value)
373
780
 
374
- @property
781
+ @_builtins.property
782
+ @pulumi.getter
783
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
784
+ """
785
+ Specifies mount type specific options that are passed to the backend
786
+ """
787
+ return pulumi.get(self, "options")
788
+
789
+ @options.setter
790
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
791
+ pulumi.set(self, "options", value)
792
+
793
+ @_builtins.property
794
+ @pulumi.getter(name="passthroughRequestHeaders")
795
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
796
+ """
797
+ List of headers to allow and pass from the request to the plugin
798
+ """
799
+ return pulumi.get(self, "passthrough_request_headers")
800
+
801
+ @passthrough_request_headers.setter
802
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
803
+ pulumi.set(self, "passthrough_request_headers", value)
804
+
805
+ @_builtins.property
375
806
  @pulumi.getter
376
- def password(self) -> Optional[pulumi.Input[builtins.str]]:
807
+ def password(self) -> Optional[pulumi.Input[_builtins.str]]:
377
808
  """
378
809
  Specifies the RabbitMQ management administrator password.
379
810
  """
380
811
  return pulumi.get(self, "password")
381
812
 
382
813
  @password.setter
383
- def password(self, value: Optional[pulumi.Input[builtins.str]]):
814
+ def password(self, value: Optional[pulumi.Input[_builtins.str]]):
384
815
  pulumi.set(self, "password", value)
385
816
 
386
- @property
817
+ @_builtins.property
387
818
  @pulumi.getter(name="passwordPolicy")
388
- def password_policy(self) -> Optional[pulumi.Input[builtins.str]]:
819
+ def password_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
389
820
  """
390
821
  Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set.
391
822
  """
392
823
  return pulumi.get(self, "password_policy")
393
824
 
394
825
  @password_policy.setter
395
- def password_policy(self, value: Optional[pulumi.Input[builtins.str]]):
826
+ def password_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
396
827
  pulumi.set(self, "password_policy", value)
397
828
 
398
- @property
829
+ @_builtins.property
399
830
  @pulumi.getter
400
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
831
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
401
832
  """
402
833
  The unique path this backend should be mounted at. Must
403
834
  not begin or end with a `/`. Defaults to `rabbitmq`.
@@ -405,36 +836,60 @@ class _SecretBackendState:
405
836
  return pulumi.get(self, "path")
406
837
 
407
838
  @path.setter
408
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
839
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
409
840
  pulumi.set(self, "path", value)
410
841
 
411
- @property
842
+ @_builtins.property
843
+ @pulumi.getter(name="pluginVersion")
844
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
845
+ """
846
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
847
+ """
848
+ return pulumi.get(self, "plugin_version")
849
+
850
+ @plugin_version.setter
851
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
852
+ pulumi.set(self, "plugin_version", value)
853
+
854
+ @_builtins.property
855
+ @pulumi.getter(name="sealWrap")
856
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
857
+ """
858
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
859
+ """
860
+ return pulumi.get(self, "seal_wrap")
861
+
862
+ @seal_wrap.setter
863
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
864
+ pulumi.set(self, "seal_wrap", value)
865
+
866
+ @_builtins.property
412
867
  @pulumi.getter
413
- def username(self) -> Optional[pulumi.Input[builtins.str]]:
868
+ def username(self) -> Optional[pulumi.Input[_builtins.str]]:
414
869
  """
415
870
  Specifies the RabbitMQ management administrator username.
416
871
  """
417
872
  return pulumi.get(self, "username")
418
873
 
419
874
  @username.setter
420
- def username(self, value: Optional[pulumi.Input[builtins.str]]):
875
+ def username(self, value: Optional[pulumi.Input[_builtins.str]]):
421
876
  pulumi.set(self, "username", value)
422
877
 
423
- @property
878
+ @_builtins.property
424
879
  @pulumi.getter(name="usernameTemplate")
425
- def username_template(self) -> Optional[pulumi.Input[builtins.str]]:
880
+ def username_template(self) -> Optional[pulumi.Input[_builtins.str]]:
426
881
  """
427
882
  Template describing how dynamic usernames are generated.
428
883
  """
429
884
  return pulumi.get(self, "username_template")
430
885
 
431
886
  @username_template.setter
432
- def username_template(self, value: Optional[pulumi.Input[builtins.str]]):
887
+ def username_template(self, value: Optional[pulumi.Input[_builtins.str]]):
433
888
  pulumi.set(self, "username_template", value)
434
889
 
435
- @property
890
+ @_builtins.property
436
891
  @pulumi.getter(name="verifyConnection")
437
- def verify_connection(self) -> Optional[pulumi.Input[builtins.bool]]:
892
+ def verify_connection(self) -> Optional[pulumi.Input[_builtins.bool]]:
438
893
  """
439
894
  Specifies whether to verify connection URI, username, and password.
440
895
  Defaults to `true`.
@@ -442,7 +897,7 @@ class _SecretBackendState:
442
897
  return pulumi.get(self, "verify_connection")
443
898
 
444
899
  @verify_connection.setter
445
- def verify_connection(self, value: Optional[pulumi.Input[builtins.bool]]):
900
+ def verify_connection(self, value: Optional[pulumi.Input[_builtins.bool]]):
446
901
  pulumi.set(self, "verify_connection", value)
447
902
 
448
903
 
@@ -452,18 +907,32 @@ class SecretBackend(pulumi.CustomResource):
452
907
  def __init__(__self__,
453
908
  resource_name: str,
454
909
  opts: Optional[pulumi.ResourceOptions] = None,
455
- connection_uri: Optional[pulumi.Input[builtins.str]] = None,
456
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
457
- description: Optional[pulumi.Input[builtins.str]] = None,
458
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
459
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
460
- namespace: Optional[pulumi.Input[builtins.str]] = None,
461
- password: Optional[pulumi.Input[builtins.str]] = None,
462
- password_policy: Optional[pulumi.Input[builtins.str]] = None,
463
- path: Optional[pulumi.Input[builtins.str]] = None,
464
- username: Optional[pulumi.Input[builtins.str]] = None,
465
- username_template: Optional[pulumi.Input[builtins.str]] = None,
466
- verify_connection: Optional[pulumi.Input[builtins.bool]] = None,
910
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
911
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
912
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
913
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
914
+ connection_uri: Optional[pulumi.Input[_builtins.str]] = None,
915
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
916
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
917
+ description: Optional[pulumi.Input[_builtins.str]] = None,
918
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
919
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
920
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
921
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
922
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
923
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
924
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
925
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
926
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
927
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
928
+ password: Optional[pulumi.Input[_builtins.str]] = None,
929
+ password_policy: Optional[pulumi.Input[_builtins.str]] = None,
930
+ path: Optional[pulumi.Input[_builtins.str]] = None,
931
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
932
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
933
+ username: Optional[pulumi.Input[_builtins.str]] = None,
934
+ username_template: Optional[pulumi.Input[_builtins.str]] = None,
935
+ verify_connection: Optional[pulumi.Input[_builtins.bool]] = None,
467
936
  __props__=None):
468
937
  """
469
938
  ## Example Usage
@@ -472,7 +941,7 @@ class SecretBackend(pulumi.CustomResource):
472
941
  import pulumi
473
942
  import pulumi_vault as vault
474
943
 
475
- rabbitmq = vault.rabbit_mq.SecretBackend("rabbitmq",
944
+ rabbitmq = vault.rabbitmq.SecretBackend("rabbitmq",
476
945
  connection_uri="https://.....",
477
946
  username="user",
478
947
  password="password")
@@ -488,25 +957,37 @@ class SecretBackend(pulumi.CustomResource):
488
957
 
489
958
  :param str resource_name: The name of the resource.
490
959
  :param pulumi.ResourceOptions opts: Options for the resource.
491
- :param pulumi.Input[builtins.str] connection_uri: Specifies the RabbitMQ connection URI.
492
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: The default TTL for credentials
493
- issued by this backend.
494
- :param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
495
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
960
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
961
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
962
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
963
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
964
+ :param pulumi.Input[_builtins.str] connection_uri: Specifies the RabbitMQ connection URI.
965
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
966
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
967
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
968
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
496
969
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
497
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
498
- for credentials issued by this backend.
499
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
970
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
971
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
972
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
973
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
974
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
975
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
976
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
500
977
  The value should not contain leading or trailing forward slashes.
501
978
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
502
979
  *Available only for Vault Enterprise*.
503
- :param pulumi.Input[builtins.str] password: Specifies the RabbitMQ management administrator password.
504
- :param pulumi.Input[builtins.str] password_policy: Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set.
505
- :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
980
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
981
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
982
+ :param pulumi.Input[_builtins.str] password: Specifies the RabbitMQ management administrator password.
983
+ :param pulumi.Input[_builtins.str] password_policy: Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set.
984
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
506
985
  not begin or end with a `/`. Defaults to `rabbitmq`.
507
- :param pulumi.Input[builtins.str] username: Specifies the RabbitMQ management administrator username.
508
- :param pulumi.Input[builtins.str] username_template: Template describing how dynamic usernames are generated.
509
- :param pulumi.Input[builtins.bool] verify_connection: Specifies whether to verify connection URI, username, and password.
986
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
987
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
988
+ :param pulumi.Input[_builtins.str] username: Specifies the RabbitMQ management administrator username.
989
+ :param pulumi.Input[_builtins.str] username_template: Template describing how dynamic usernames are generated.
990
+ :param pulumi.Input[_builtins.bool] verify_connection: Specifies whether to verify connection URI, username, and password.
510
991
  Defaults to `true`.
511
992
  """
512
993
  ...
@@ -522,7 +1003,7 @@ class SecretBackend(pulumi.CustomResource):
522
1003
  import pulumi
523
1004
  import pulumi_vault as vault
524
1005
 
525
- rabbitmq = vault.rabbit_mq.SecretBackend("rabbitmq",
1006
+ rabbitmq = vault.rabbitmq.SecretBackend("rabbitmq",
526
1007
  connection_uri="https://.....",
527
1008
  username="user",
528
1009
  password="password")
@@ -551,18 +1032,32 @@ class SecretBackend(pulumi.CustomResource):
551
1032
  def _internal_init(__self__,
552
1033
  resource_name: str,
553
1034
  opts: Optional[pulumi.ResourceOptions] = None,
554
- connection_uri: Optional[pulumi.Input[builtins.str]] = None,
555
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
556
- description: Optional[pulumi.Input[builtins.str]] = None,
557
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
558
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
559
- namespace: Optional[pulumi.Input[builtins.str]] = None,
560
- password: Optional[pulumi.Input[builtins.str]] = None,
561
- password_policy: Optional[pulumi.Input[builtins.str]] = None,
562
- path: Optional[pulumi.Input[builtins.str]] = None,
563
- username: Optional[pulumi.Input[builtins.str]] = None,
564
- username_template: Optional[pulumi.Input[builtins.str]] = None,
565
- verify_connection: Optional[pulumi.Input[builtins.bool]] = None,
1035
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1036
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1037
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1038
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1039
+ connection_uri: Optional[pulumi.Input[_builtins.str]] = None,
1040
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1041
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1042
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1043
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1044
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1045
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1046
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1047
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1048
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1049
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1050
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1051
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1052
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1053
+ password: Optional[pulumi.Input[_builtins.str]] = None,
1054
+ password_policy: Optional[pulumi.Input[_builtins.str]] = None,
1055
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1056
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1057
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1058
+ username: Optional[pulumi.Input[_builtins.str]] = None,
1059
+ username_template: Optional[pulumi.Input[_builtins.str]] = None,
1060
+ verify_connection: Optional[pulumi.Input[_builtins.bool]] = None,
566
1061
  __props__=None):
567
1062
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
568
1063
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -572,24 +1067,39 @@ class SecretBackend(pulumi.CustomResource):
572
1067
  raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
573
1068
  __props__ = SecretBackendArgs.__new__(SecretBackendArgs)
574
1069
 
1070
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1071
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1072
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1073
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
575
1074
  if connection_uri is None and not opts.urn:
576
1075
  raise TypeError("Missing required property 'connection_uri'")
577
1076
  __props__.__dict__["connection_uri"] = connection_uri
578
1077
  __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1078
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
579
1079
  __props__.__dict__["description"] = description
580
1080
  __props__.__dict__["disable_remount"] = disable_remount
1081
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1082
+ __props__.__dict__["force_no_cache"] = force_no_cache
1083
+ __props__.__dict__["identity_token_key"] = identity_token_key
1084
+ __props__.__dict__["listing_visibility"] = listing_visibility
1085
+ __props__.__dict__["local"] = local
581
1086
  __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
582
1087
  __props__.__dict__["namespace"] = namespace
1088
+ __props__.__dict__["options"] = options
1089
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
583
1090
  if password is None and not opts.urn:
584
1091
  raise TypeError("Missing required property 'password'")
585
1092
  __props__.__dict__["password"] = None if password is None else pulumi.Output.secret(password)
586
1093
  __props__.__dict__["password_policy"] = password_policy
587
1094
  __props__.__dict__["path"] = path
1095
+ __props__.__dict__["plugin_version"] = plugin_version
1096
+ __props__.__dict__["seal_wrap"] = seal_wrap
588
1097
  if username is None and not opts.urn:
589
1098
  raise TypeError("Missing required property 'username'")
590
1099
  __props__.__dict__["username"] = None if username is None else pulumi.Output.secret(username)
591
1100
  __props__.__dict__["username_template"] = username_template
592
1101
  __props__.__dict__["verify_connection"] = verify_connection
1102
+ __props__.__dict__["accessor"] = None
593
1103
  secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["password", "username"])
594
1104
  opts = pulumi.ResourceOptions.merge(opts, secret_opts)
595
1105
  super(SecretBackend, __self__).__init__(
@@ -602,18 +1112,33 @@ class SecretBackend(pulumi.CustomResource):
602
1112
  def get(resource_name: str,
603
1113
  id: pulumi.Input[str],
604
1114
  opts: Optional[pulumi.ResourceOptions] = None,
605
- connection_uri: Optional[pulumi.Input[builtins.str]] = None,
606
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
607
- description: Optional[pulumi.Input[builtins.str]] = None,
608
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
609
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
610
- namespace: Optional[pulumi.Input[builtins.str]] = None,
611
- password: Optional[pulumi.Input[builtins.str]] = None,
612
- password_policy: Optional[pulumi.Input[builtins.str]] = None,
613
- path: Optional[pulumi.Input[builtins.str]] = None,
614
- username: Optional[pulumi.Input[builtins.str]] = None,
615
- username_template: Optional[pulumi.Input[builtins.str]] = None,
616
- verify_connection: Optional[pulumi.Input[builtins.bool]] = None) -> 'SecretBackend':
1115
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
1116
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1117
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1118
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1119
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1120
+ connection_uri: Optional[pulumi.Input[_builtins.str]] = None,
1121
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1122
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1123
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1124
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1125
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1126
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1127
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1128
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1129
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1130
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1131
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1132
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1133
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1134
+ password: Optional[pulumi.Input[_builtins.str]] = None,
1135
+ password_policy: Optional[pulumi.Input[_builtins.str]] = None,
1136
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1137
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1138
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1139
+ username: Optional[pulumi.Input[_builtins.str]] = None,
1140
+ username_template: Optional[pulumi.Input[_builtins.str]] = None,
1141
+ verify_connection: Optional[pulumi.Input[_builtins.bool]] = None) -> 'SecretBackend':
617
1142
  """
618
1143
  Get an existing SecretBackend resource's state with the given name, id, and optional extra
619
1144
  properties used to qualify the lookup.
@@ -621,91 +1146,205 @@ class SecretBackend(pulumi.CustomResource):
621
1146
  :param str resource_name: The unique name of the resulting resource.
622
1147
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
623
1148
  :param pulumi.ResourceOptions opts: Options for the resource.
624
- :param pulumi.Input[builtins.str] connection_uri: Specifies the RabbitMQ connection URI.
625
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: The default TTL for credentials
626
- issued by this backend.
627
- :param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
628
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1149
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
1150
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1151
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1152
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1153
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1154
+ :param pulumi.Input[_builtins.str] connection_uri: Specifies the RabbitMQ connection URI.
1155
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
1156
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1157
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
1158
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
629
1159
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
630
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
631
- for credentials issued by this backend.
632
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
1160
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1161
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1162
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1163
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1164
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1165
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
1166
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
633
1167
  The value should not contain leading or trailing forward slashes.
634
1168
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
635
1169
  *Available only for Vault Enterprise*.
636
- :param pulumi.Input[builtins.str] password: Specifies the RabbitMQ management administrator password.
637
- :param pulumi.Input[builtins.str] password_policy: Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set.
638
- :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
1170
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1171
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1172
+ :param pulumi.Input[_builtins.str] password: Specifies the RabbitMQ management administrator password.
1173
+ :param pulumi.Input[_builtins.str] password_policy: Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set.
1174
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
639
1175
  not begin or end with a `/`. Defaults to `rabbitmq`.
640
- :param pulumi.Input[builtins.str] username: Specifies the RabbitMQ management administrator username.
641
- :param pulumi.Input[builtins.str] username_template: Template describing how dynamic usernames are generated.
642
- :param pulumi.Input[builtins.bool] verify_connection: Specifies whether to verify connection URI, username, and password.
1176
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1177
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1178
+ :param pulumi.Input[_builtins.str] username: Specifies the RabbitMQ management administrator username.
1179
+ :param pulumi.Input[_builtins.str] username_template: Template describing how dynamic usernames are generated.
1180
+ :param pulumi.Input[_builtins.bool] verify_connection: Specifies whether to verify connection URI, username, and password.
643
1181
  Defaults to `true`.
644
1182
  """
645
1183
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
646
1184
 
647
1185
  __props__ = _SecretBackendState.__new__(_SecretBackendState)
648
1186
 
1187
+ __props__.__dict__["accessor"] = accessor
1188
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1189
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1190
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1191
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
649
1192
  __props__.__dict__["connection_uri"] = connection_uri
650
1193
  __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1194
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
651
1195
  __props__.__dict__["description"] = description
652
1196
  __props__.__dict__["disable_remount"] = disable_remount
1197
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1198
+ __props__.__dict__["force_no_cache"] = force_no_cache
1199
+ __props__.__dict__["identity_token_key"] = identity_token_key
1200
+ __props__.__dict__["listing_visibility"] = listing_visibility
1201
+ __props__.__dict__["local"] = local
653
1202
  __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
654
1203
  __props__.__dict__["namespace"] = namespace
1204
+ __props__.__dict__["options"] = options
1205
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
655
1206
  __props__.__dict__["password"] = password
656
1207
  __props__.__dict__["password_policy"] = password_policy
657
1208
  __props__.__dict__["path"] = path
1209
+ __props__.__dict__["plugin_version"] = plugin_version
1210
+ __props__.__dict__["seal_wrap"] = seal_wrap
658
1211
  __props__.__dict__["username"] = username
659
1212
  __props__.__dict__["username_template"] = username_template
660
1213
  __props__.__dict__["verify_connection"] = verify_connection
661
1214
  return SecretBackend(resource_name, opts=opts, __props__=__props__)
662
1215
 
663
- @property
1216
+ @_builtins.property
1217
+ @pulumi.getter
1218
+ def accessor(self) -> pulumi.Output[_builtins.str]:
1219
+ """
1220
+ Accessor of the mount
1221
+ """
1222
+ return pulumi.get(self, "accessor")
1223
+
1224
+ @_builtins.property
1225
+ @pulumi.getter(name="allowedManagedKeys")
1226
+ def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1227
+ """
1228
+ List of managed key registry entry names that the mount in question is allowed to access
1229
+ """
1230
+ return pulumi.get(self, "allowed_managed_keys")
1231
+
1232
+ @_builtins.property
1233
+ @pulumi.getter(name="allowedResponseHeaders")
1234
+ def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1235
+ """
1236
+ List of headers to allow and pass from the request to the plugin
1237
+ """
1238
+ return pulumi.get(self, "allowed_response_headers")
1239
+
1240
+ @_builtins.property
1241
+ @pulumi.getter(name="auditNonHmacRequestKeys")
1242
+ def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1243
+ """
1244
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1245
+ """
1246
+ return pulumi.get(self, "audit_non_hmac_request_keys")
1247
+
1248
+ @_builtins.property
1249
+ @pulumi.getter(name="auditNonHmacResponseKeys")
1250
+ def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1251
+ """
1252
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1253
+ """
1254
+ return pulumi.get(self, "audit_non_hmac_response_keys")
1255
+
1256
+ @_builtins.property
664
1257
  @pulumi.getter(name="connectionUri")
665
- def connection_uri(self) -> pulumi.Output[builtins.str]:
1258
+ def connection_uri(self) -> pulumi.Output[_builtins.str]:
666
1259
  """
667
1260
  Specifies the RabbitMQ connection URI.
668
1261
  """
669
1262
  return pulumi.get(self, "connection_uri")
670
1263
 
671
- @property
1264
+ @_builtins.property
672
1265
  @pulumi.getter(name="defaultLeaseTtlSeconds")
673
- def default_lease_ttl_seconds(self) -> pulumi.Output[builtins.int]:
1266
+ def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
674
1267
  """
675
- The default TTL for credentials
676
- issued by this backend.
1268
+ Default lease duration for secrets in seconds
677
1269
  """
678
1270
  return pulumi.get(self, "default_lease_ttl_seconds")
679
1271
 
680
- @property
1272
+ @_builtins.property
1273
+ @pulumi.getter(name="delegatedAuthAccessors")
1274
+ def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1275
+ """
1276
+ List of headers to allow and pass from the request to the plugin
1277
+ """
1278
+ return pulumi.get(self, "delegated_auth_accessors")
1279
+
1280
+ @_builtins.property
681
1281
  @pulumi.getter
682
- def description(self) -> pulumi.Output[Optional[builtins.str]]:
1282
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
683
1283
  """
684
- A human-friendly description for this backend.
1284
+ Human-friendly description of the mount for the backend.
685
1285
  """
686
1286
  return pulumi.get(self, "description")
687
1287
 
688
- @property
1288
+ @_builtins.property
689
1289
  @pulumi.getter(name="disableRemount")
690
- def disable_remount(self) -> pulumi.Output[Optional[builtins.bool]]:
1290
+ def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
691
1291
  """
692
1292
  If set, opts out of mount migration on path updates.
693
1293
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
694
1294
  """
695
1295
  return pulumi.get(self, "disable_remount")
696
1296
 
697
- @property
1297
+ @_builtins.property
1298
+ @pulumi.getter(name="externalEntropyAccess")
1299
+ def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
1300
+ """
1301
+ Enable the secrets engine to access Vault's external entropy source
1302
+ """
1303
+ return pulumi.get(self, "external_entropy_access")
1304
+
1305
+ @_builtins.property
1306
+ @pulumi.getter(name="forceNoCache")
1307
+ def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
1308
+ """
1309
+ If set to true, disables caching.
1310
+ """
1311
+ return pulumi.get(self, "force_no_cache")
1312
+
1313
+ @_builtins.property
1314
+ @pulumi.getter(name="identityTokenKey")
1315
+ def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
1316
+ """
1317
+ The key to use for signing plugin workload identity tokens
1318
+ """
1319
+ return pulumi.get(self, "identity_token_key")
1320
+
1321
+ @_builtins.property
1322
+ @pulumi.getter(name="listingVisibility")
1323
+ def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
1324
+ """
1325
+ Specifies whether to show this mount in the UI-specific listing endpoint
1326
+ """
1327
+ return pulumi.get(self, "listing_visibility")
1328
+
1329
+ @_builtins.property
1330
+ @pulumi.getter
1331
+ def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
1332
+ """
1333
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1334
+ """
1335
+ return pulumi.get(self, "local")
1336
+
1337
+ @_builtins.property
698
1338
  @pulumi.getter(name="maxLeaseTtlSeconds")
699
- def max_lease_ttl_seconds(self) -> pulumi.Output[builtins.int]:
1339
+ def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
700
1340
  """
701
- The maximum TTL that can be requested
702
- for credentials issued by this backend.
1341
+ Maximum possible lease duration for secrets in seconds
703
1342
  """
704
1343
  return pulumi.get(self, "max_lease_ttl_seconds")
705
1344
 
706
- @property
1345
+ @_builtins.property
707
1346
  @pulumi.getter
708
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
1347
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
709
1348
  """
710
1349
  The namespace to provision the resource in.
711
1350
  The value should not contain leading or trailing forward slashes.
@@ -714,50 +1353,82 @@ class SecretBackend(pulumi.CustomResource):
714
1353
  """
715
1354
  return pulumi.get(self, "namespace")
716
1355
 
717
- @property
1356
+ @_builtins.property
718
1357
  @pulumi.getter
719
- def password(self) -> pulumi.Output[builtins.str]:
1358
+ def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
1359
+ """
1360
+ Specifies mount type specific options that are passed to the backend
1361
+ """
1362
+ return pulumi.get(self, "options")
1363
+
1364
+ @_builtins.property
1365
+ @pulumi.getter(name="passthroughRequestHeaders")
1366
+ def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1367
+ """
1368
+ List of headers to allow and pass from the request to the plugin
1369
+ """
1370
+ return pulumi.get(self, "passthrough_request_headers")
1371
+
1372
+ @_builtins.property
1373
+ @pulumi.getter
1374
+ def password(self) -> pulumi.Output[_builtins.str]:
720
1375
  """
721
1376
  Specifies the RabbitMQ management administrator password.
722
1377
  """
723
1378
  return pulumi.get(self, "password")
724
1379
 
725
- @property
1380
+ @_builtins.property
726
1381
  @pulumi.getter(name="passwordPolicy")
727
- def password_policy(self) -> pulumi.Output[Optional[builtins.str]]:
1382
+ def password_policy(self) -> pulumi.Output[Optional[_builtins.str]]:
728
1383
  """
729
1384
  Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set.
730
1385
  """
731
1386
  return pulumi.get(self, "password_policy")
732
1387
 
733
- @property
1388
+ @_builtins.property
734
1389
  @pulumi.getter
735
- def path(self) -> pulumi.Output[Optional[builtins.str]]:
1390
+ def path(self) -> pulumi.Output[Optional[_builtins.str]]:
736
1391
  """
737
1392
  The unique path this backend should be mounted at. Must
738
1393
  not begin or end with a `/`. Defaults to `rabbitmq`.
739
1394
  """
740
1395
  return pulumi.get(self, "path")
741
1396
 
742
- @property
1397
+ @_builtins.property
1398
+ @pulumi.getter(name="pluginVersion")
1399
+ def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
1400
+ """
1401
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1402
+ """
1403
+ return pulumi.get(self, "plugin_version")
1404
+
1405
+ @_builtins.property
1406
+ @pulumi.getter(name="sealWrap")
1407
+ def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
1408
+ """
1409
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1410
+ """
1411
+ return pulumi.get(self, "seal_wrap")
1412
+
1413
+ @_builtins.property
743
1414
  @pulumi.getter
744
- def username(self) -> pulumi.Output[builtins.str]:
1415
+ def username(self) -> pulumi.Output[_builtins.str]:
745
1416
  """
746
1417
  Specifies the RabbitMQ management administrator username.
747
1418
  """
748
1419
  return pulumi.get(self, "username")
749
1420
 
750
- @property
1421
+ @_builtins.property
751
1422
  @pulumi.getter(name="usernameTemplate")
752
- def username_template(self) -> pulumi.Output[Optional[builtins.str]]:
1423
+ def username_template(self) -> pulumi.Output[Optional[_builtins.str]]:
753
1424
  """
754
1425
  Template describing how dynamic usernames are generated.
755
1426
  """
756
1427
  return pulumi.get(self, "username_template")
757
1428
 
758
- @property
1429
+ @_builtins.property
759
1430
  @pulumi.getter(name="verifyConnection")
760
- def verify_connection(self) -> pulumi.Output[Optional[builtins.bool]]:
1431
+ def verify_connection(self) -> pulumi.Output[Optional[_builtins.bool]]:
761
1432
  """
762
1433
  Specifies whether to verify connection URI, username, and password.
763
1434
  Defaults to `true`.