pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (269) hide show
  1. pulumi_vault/__init__.py +19 -1
  2. pulumi_vault/_inputs.py +873 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +1016 -439
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +1057 -285
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +887 -256
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +426 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +878 -336
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +400 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +1006 -227
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +431 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +732 -693
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +380 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +909 -271
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/oci_auth_backend.py +683 -0
  168. pulumi_vault/oci_auth_backend_role.py +798 -0
  169. pulumi_vault/okta/__init__.py +1 -1
  170. pulumi_vault/okta/_inputs.py +31 -32
  171. pulumi_vault/okta/auth_backend.py +305 -306
  172. pulumi_vault/okta/auth_backend_group.py +69 -70
  173. pulumi_vault/okta/auth_backend_user.py +86 -87
  174. pulumi_vault/okta/outputs.py +21 -22
  175. pulumi_vault/outputs.py +234 -82
  176. pulumi_vault/pkisecret/__init__.py +1 -1
  177. pulumi_vault/pkisecret/_inputs.py +55 -56
  178. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  179. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  180. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  181. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  182. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  183. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  184. pulumi_vault/pkisecret/backend_config_scep.py +205 -159
  185. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  186. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  187. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  188. pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
  189. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  190. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  191. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  192. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  193. pulumi_vault/pkisecret/outputs.py +61 -62
  194. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  195. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  196. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  197. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  198. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  199. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  200. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  201. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  202. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  203. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  204. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  205. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  206. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  207. pulumi_vault/plugin.py +154 -155
  208. pulumi_vault/plugin_pinned_version.py +52 -53
  209. pulumi_vault/policy.py +52 -53
  210. pulumi_vault/provider.py +160 -161
  211. pulumi_vault/pulumi-plugin.json +1 -1
  212. pulumi_vault/quota_lease_count.py +103 -104
  213. pulumi_vault/quota_rate_limit.py +171 -172
  214. pulumi_vault/rabbitmq/__init__.py +1 -1
  215. pulumi_vault/rabbitmq/_inputs.py +50 -51
  216. pulumi_vault/rabbitmq/outputs.py +34 -35
  217. pulumi_vault/rabbitmq/secret_backend.py +902 -231
  218. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  219. pulumi_vault/raft_autopilot.py +137 -138
  220. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  221. pulumi_vault/rgp_policy.py +69 -70
  222. pulumi_vault/saml/__init__.py +1 -1
  223. pulumi_vault/saml/auth_backend.py +188 -189
  224. pulumi_vault/saml/auth_backend_role.py +290 -291
  225. pulumi_vault/scep_auth_backend_role.py +252 -253
  226. pulumi_vault/secrets/__init__.py +1 -1
  227. pulumi_vault/secrets/_inputs.py +19 -20
  228. pulumi_vault/secrets/outputs.py +13 -14
  229. pulumi_vault/secrets/sync_association.py +88 -89
  230. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  231. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  232. pulumi_vault/secrets/sync_config.py +52 -53
  233. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  234. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  235. pulumi_vault/secrets/sync_github_apps.py +78 -79
  236. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  237. pulumi_vault/ssh/__init__.py +1 -1
  238. pulumi_vault/ssh/_inputs.py +13 -14
  239. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  240. pulumi_vault/ssh/outputs.py +9 -10
  241. pulumi_vault/ssh/secret_backend_ca.py +217 -124
  242. pulumi_vault/ssh/secret_backend_role.py +446 -447
  243. pulumi_vault/terraformcloud/__init__.py +1 -1
  244. pulumi_vault/terraformcloud/secret_backend.py +833 -155
  245. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  246. pulumi_vault/terraformcloud/secret_role.py +117 -118
  247. pulumi_vault/token.py +301 -302
  248. pulumi_vault/tokenauth/__init__.py +1 -1
  249. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  250. pulumi_vault/transform/__init__.py +1 -1
  251. pulumi_vault/transform/alphabet.py +69 -70
  252. pulumi_vault/transform/get_decode.py +57 -58
  253. pulumi_vault/transform/get_encode.py +57 -58
  254. pulumi_vault/transform/role.py +69 -70
  255. pulumi_vault/transform/template.py +137 -138
  256. pulumi_vault/transform/transformation.py +171 -172
  257. pulumi_vault/transit/__init__.py +1 -1
  258. pulumi_vault/transit/get_cmac.py +47 -48
  259. pulumi_vault/transit/get_decrypt.py +25 -26
  260. pulumi_vault/transit/get_encrypt.py +29 -30
  261. pulumi_vault/transit/get_sign.py +71 -72
  262. pulumi_vault/transit/get_verify.py +83 -84
  263. pulumi_vault/transit/secret_backend_key.py +377 -350
  264. pulumi_vault/transit/secret_cache_config.py +52 -53
  265. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
  266. pulumi_vault-7.2.0.dist-info/RECORD +270 -0
  267. pulumi_vault-7.1.0.dist-info/RECORD +0 -268
  268. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
  269. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,101 +19,216 @@ __all__ = ['SecretBackendArgs', 'SecretBackend']
20
19
  @pulumi.input_type
21
20
  class SecretBackendArgs:
22
21
  def __init__(__self__, *,
23
- address: Optional[pulumi.Input[builtins.str]] = None,
24
- backend: Optional[pulumi.Input[builtins.str]] = None,
25
- base_path: Optional[pulumi.Input[builtins.str]] = None,
26
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
27
- description: Optional[pulumi.Input[builtins.str]] = None,
28
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
29
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
30
- namespace: Optional[pulumi.Input[builtins.str]] = None,
31
- token: Optional[pulumi.Input[builtins.str]] = None):
22
+ address: Optional[pulumi.Input[_builtins.str]] = None,
23
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
24
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
25
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
28
+ base_path: Optional[pulumi.Input[_builtins.str]] = None,
29
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
30
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
31
+ description: Optional[pulumi.Input[_builtins.str]] = None,
32
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
33
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
34
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
35
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
36
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
37
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
38
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
39
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
40
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
41
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
42
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
43
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
44
+ token: Optional[pulumi.Input[_builtins.str]] = None):
32
45
  """
33
46
  The set of arguments for constructing a SecretBackend resource.
34
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
35
- :param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
36
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
47
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
48
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
49
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
50
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
51
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
52
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
53
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
54
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
37
55
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
38
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
39
- for credentials issued by this backend.
40
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
56
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
57
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
58
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
59
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
60
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
61
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
62
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
41
63
  The value should not contain leading or trailing forward slashes.
42
64
  The `namespace` is always relative to the provider's configured namespace.
43
65
  *Available only for Vault Enterprise*.
66
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
67
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
68
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
69
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
44
70
  """
45
71
  if address is not None:
46
72
  pulumi.set(__self__, "address", address)
73
+ if allowed_managed_keys is not None:
74
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
75
+ if allowed_response_headers is not None:
76
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
77
+ if audit_non_hmac_request_keys is not None:
78
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
79
+ if audit_non_hmac_response_keys is not None:
80
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
47
81
  if backend is not None:
48
82
  pulumi.set(__self__, "backend", backend)
49
83
  if base_path is not None:
50
84
  pulumi.set(__self__, "base_path", base_path)
51
85
  if default_lease_ttl_seconds is not None:
52
86
  pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
87
+ if delegated_auth_accessors is not None:
88
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
53
89
  if description is not None:
54
90
  pulumi.set(__self__, "description", description)
55
91
  if disable_remount is not None:
56
92
  pulumi.set(__self__, "disable_remount", disable_remount)
93
+ if external_entropy_access is not None:
94
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
95
+ if force_no_cache is not None:
96
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
97
+ if identity_token_key is not None:
98
+ pulumi.set(__self__, "identity_token_key", identity_token_key)
99
+ if listing_visibility is not None:
100
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
101
+ if local is not None:
102
+ pulumi.set(__self__, "local", local)
57
103
  if max_lease_ttl_seconds is not None:
58
104
  pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
59
105
  if namespace is not None:
60
106
  pulumi.set(__self__, "namespace", namespace)
107
+ if options is not None:
108
+ pulumi.set(__self__, "options", options)
109
+ if passthrough_request_headers is not None:
110
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
111
+ if plugin_version is not None:
112
+ pulumi.set(__self__, "plugin_version", plugin_version)
113
+ if seal_wrap is not None:
114
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
61
115
  if token is not None:
62
116
  pulumi.set(__self__, "token", token)
63
117
 
64
- @property
118
+ @_builtins.property
65
119
  @pulumi.getter
66
- def address(self) -> Optional[pulumi.Input[builtins.str]]:
120
+ def address(self) -> Optional[pulumi.Input[_builtins.str]]:
67
121
  return pulumi.get(self, "address")
68
122
 
69
123
  @address.setter
70
- def address(self, value: Optional[pulumi.Input[builtins.str]]):
124
+ def address(self, value: Optional[pulumi.Input[_builtins.str]]):
71
125
  pulumi.set(self, "address", value)
72
126
 
73
- @property
127
+ @_builtins.property
128
+ @pulumi.getter(name="allowedManagedKeys")
129
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
130
+ """
131
+ List of managed key registry entry names that the mount in question is allowed to access
132
+ """
133
+ return pulumi.get(self, "allowed_managed_keys")
134
+
135
+ @allowed_managed_keys.setter
136
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
137
+ pulumi.set(self, "allowed_managed_keys", value)
138
+
139
+ @_builtins.property
140
+ @pulumi.getter(name="allowedResponseHeaders")
141
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
142
+ """
143
+ List of headers to allow and pass from the request to the plugin
144
+ """
145
+ return pulumi.get(self, "allowed_response_headers")
146
+
147
+ @allowed_response_headers.setter
148
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
149
+ pulumi.set(self, "allowed_response_headers", value)
150
+
151
+ @_builtins.property
152
+ @pulumi.getter(name="auditNonHmacRequestKeys")
153
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
154
+ """
155
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
156
+ """
157
+ return pulumi.get(self, "audit_non_hmac_request_keys")
158
+
159
+ @audit_non_hmac_request_keys.setter
160
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
161
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
162
+
163
+ @_builtins.property
164
+ @pulumi.getter(name="auditNonHmacResponseKeys")
165
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
166
+ """
167
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
168
+ """
169
+ return pulumi.get(self, "audit_non_hmac_response_keys")
170
+
171
+ @audit_non_hmac_response_keys.setter
172
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
173
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
174
+
175
+ @_builtins.property
74
176
  @pulumi.getter
75
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
177
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
76
178
  return pulumi.get(self, "backend")
77
179
 
78
180
  @backend.setter
79
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
181
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
80
182
  pulumi.set(self, "backend", value)
81
183
 
82
- @property
184
+ @_builtins.property
83
185
  @pulumi.getter(name="basePath")
84
- def base_path(self) -> Optional[pulumi.Input[builtins.str]]:
186
+ def base_path(self) -> Optional[pulumi.Input[_builtins.str]]:
85
187
  return pulumi.get(self, "base_path")
86
188
 
87
189
  @base_path.setter
88
- def base_path(self, value: Optional[pulumi.Input[builtins.str]]):
190
+ def base_path(self, value: Optional[pulumi.Input[_builtins.str]]):
89
191
  pulumi.set(self, "base_path", value)
90
192
 
91
- @property
193
+ @_builtins.property
92
194
  @pulumi.getter(name="defaultLeaseTtlSeconds")
93
- def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
195
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
94
196
  """
95
- The default TTL for credentials issued by this backend.
197
+ Default lease duration for secrets in seconds
96
198
  """
97
199
  return pulumi.get(self, "default_lease_ttl_seconds")
98
200
 
99
201
  @default_lease_ttl_seconds.setter
100
- def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
202
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
101
203
  pulumi.set(self, "default_lease_ttl_seconds", value)
102
204
 
103
- @property
205
+ @_builtins.property
206
+ @pulumi.getter(name="delegatedAuthAccessors")
207
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
208
+ """
209
+ List of headers to allow and pass from the request to the plugin
210
+ """
211
+ return pulumi.get(self, "delegated_auth_accessors")
212
+
213
+ @delegated_auth_accessors.setter
214
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
215
+ pulumi.set(self, "delegated_auth_accessors", value)
216
+
217
+ @_builtins.property
104
218
  @pulumi.getter
105
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
219
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
106
220
  """
107
- A human-friendly description for this backend.
221
+ Human-friendly description of the mount for the backend.
108
222
  """
109
223
  return pulumi.get(self, "description")
110
224
 
111
225
  @description.setter
112
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
226
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
113
227
  pulumi.set(self, "description", value)
114
228
 
115
- @property
229
+ @_builtins.property
116
230
  @pulumi.getter(name="disableRemount")
117
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
231
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
118
232
  """
119
233
  If set, opts out of mount migration on path updates.
120
234
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -122,25 +236,84 @@ class SecretBackendArgs:
122
236
  return pulumi.get(self, "disable_remount")
123
237
 
124
238
  @disable_remount.setter
125
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
239
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
126
240
  pulumi.set(self, "disable_remount", value)
127
241
 
128
- @property
242
+ @_builtins.property
243
+ @pulumi.getter(name="externalEntropyAccess")
244
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
245
+ """
246
+ Enable the secrets engine to access Vault's external entropy source
247
+ """
248
+ return pulumi.get(self, "external_entropy_access")
249
+
250
+ @external_entropy_access.setter
251
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
252
+ pulumi.set(self, "external_entropy_access", value)
253
+
254
+ @_builtins.property
255
+ @pulumi.getter(name="forceNoCache")
256
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
257
+ """
258
+ If set to true, disables caching.
259
+ """
260
+ return pulumi.get(self, "force_no_cache")
261
+
262
+ @force_no_cache.setter
263
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
264
+ pulumi.set(self, "force_no_cache", value)
265
+
266
+ @_builtins.property
267
+ @pulumi.getter(name="identityTokenKey")
268
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
269
+ """
270
+ The key to use for signing plugin workload identity tokens
271
+ """
272
+ return pulumi.get(self, "identity_token_key")
273
+
274
+ @identity_token_key.setter
275
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
276
+ pulumi.set(self, "identity_token_key", value)
277
+
278
+ @_builtins.property
279
+ @pulumi.getter(name="listingVisibility")
280
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
281
+ """
282
+ Specifies whether to show this mount in the UI-specific listing endpoint
283
+ """
284
+ return pulumi.get(self, "listing_visibility")
285
+
286
+ @listing_visibility.setter
287
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
288
+ pulumi.set(self, "listing_visibility", value)
289
+
290
+ @_builtins.property
291
+ @pulumi.getter
292
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
293
+ """
294
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
295
+ """
296
+ return pulumi.get(self, "local")
297
+
298
+ @local.setter
299
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
300
+ pulumi.set(self, "local", value)
301
+
302
+ @_builtins.property
129
303
  @pulumi.getter(name="maxLeaseTtlSeconds")
130
- def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
304
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
131
305
  """
132
- The maximum TTL that can be requested
133
- for credentials issued by this backend.
306
+ Maximum possible lease duration for secrets in seconds
134
307
  """
135
308
  return pulumi.get(self, "max_lease_ttl_seconds")
136
309
 
137
310
  @max_lease_ttl_seconds.setter
138
- def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
311
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
139
312
  pulumi.set(self, "max_lease_ttl_seconds", value)
140
313
 
141
- @property
314
+ @_builtins.property
142
315
  @pulumi.getter
143
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
316
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
144
317
  """
145
318
  The namespace to provision the resource in.
146
319
  The value should not contain leading or trailing forward slashes.
@@ -150,117 +323,296 @@ class SecretBackendArgs:
150
323
  return pulumi.get(self, "namespace")
151
324
 
152
325
  @namespace.setter
153
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
326
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
154
327
  pulumi.set(self, "namespace", value)
155
328
 
156
- @property
329
+ @_builtins.property
157
330
  @pulumi.getter
158
- def token(self) -> Optional[pulumi.Input[builtins.str]]:
331
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
332
+ """
333
+ Specifies mount type specific options that are passed to the backend
334
+ """
335
+ return pulumi.get(self, "options")
336
+
337
+ @options.setter
338
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
339
+ pulumi.set(self, "options", value)
340
+
341
+ @_builtins.property
342
+ @pulumi.getter(name="passthroughRequestHeaders")
343
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
344
+ """
345
+ List of headers to allow and pass from the request to the plugin
346
+ """
347
+ return pulumi.get(self, "passthrough_request_headers")
348
+
349
+ @passthrough_request_headers.setter
350
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
351
+ pulumi.set(self, "passthrough_request_headers", value)
352
+
353
+ @_builtins.property
354
+ @pulumi.getter(name="pluginVersion")
355
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
356
+ """
357
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
358
+ """
359
+ return pulumi.get(self, "plugin_version")
360
+
361
+ @plugin_version.setter
362
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
363
+ pulumi.set(self, "plugin_version", value)
364
+
365
+ @_builtins.property
366
+ @pulumi.getter(name="sealWrap")
367
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
368
+ """
369
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
370
+ """
371
+ return pulumi.get(self, "seal_wrap")
372
+
373
+ @seal_wrap.setter
374
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
375
+ pulumi.set(self, "seal_wrap", value)
376
+
377
+ @_builtins.property
378
+ @pulumi.getter
379
+ def token(self) -> Optional[pulumi.Input[_builtins.str]]:
159
380
  return pulumi.get(self, "token")
160
381
 
161
382
  @token.setter
162
- def token(self, value: Optional[pulumi.Input[builtins.str]]):
383
+ def token(self, value: Optional[pulumi.Input[_builtins.str]]):
163
384
  pulumi.set(self, "token", value)
164
385
 
165
386
 
166
387
  @pulumi.input_type
167
388
  class _SecretBackendState:
168
389
  def __init__(__self__, *,
169
- address: Optional[pulumi.Input[builtins.str]] = None,
170
- backend: Optional[pulumi.Input[builtins.str]] = None,
171
- base_path: Optional[pulumi.Input[builtins.str]] = None,
172
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
173
- description: Optional[pulumi.Input[builtins.str]] = None,
174
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
175
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
176
- namespace: Optional[pulumi.Input[builtins.str]] = None,
177
- token: Optional[pulumi.Input[builtins.str]] = None):
390
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
391
+ address: Optional[pulumi.Input[_builtins.str]] = None,
392
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
393
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
394
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
395
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
396
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
397
+ base_path: Optional[pulumi.Input[_builtins.str]] = None,
398
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
399
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
400
+ description: Optional[pulumi.Input[_builtins.str]] = None,
401
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
402
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
403
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
404
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
405
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
406
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
407
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
408
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
409
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
410
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
411
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
412
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
413
+ token: Optional[pulumi.Input[_builtins.str]] = None):
178
414
  """
179
415
  Input properties used for looking up and filtering SecretBackend resources.
180
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
181
- :param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
182
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
416
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
417
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
418
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
419
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
420
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
421
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
422
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
423
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
424
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
183
425
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
184
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
185
- for credentials issued by this backend.
186
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
426
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
427
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
428
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
429
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
430
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
431
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
432
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
187
433
  The value should not contain leading or trailing forward slashes.
188
434
  The `namespace` is always relative to the provider's configured namespace.
189
435
  *Available only for Vault Enterprise*.
436
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
437
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
438
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
439
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
190
440
  """
441
+ if accessor is not None:
442
+ pulumi.set(__self__, "accessor", accessor)
191
443
  if address is not None:
192
444
  pulumi.set(__self__, "address", address)
445
+ if allowed_managed_keys is not None:
446
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
447
+ if allowed_response_headers is not None:
448
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
449
+ if audit_non_hmac_request_keys is not None:
450
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
451
+ if audit_non_hmac_response_keys is not None:
452
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
193
453
  if backend is not None:
194
454
  pulumi.set(__self__, "backend", backend)
195
455
  if base_path is not None:
196
456
  pulumi.set(__self__, "base_path", base_path)
197
457
  if default_lease_ttl_seconds is not None:
198
458
  pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
459
+ if delegated_auth_accessors is not None:
460
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
199
461
  if description is not None:
200
462
  pulumi.set(__self__, "description", description)
201
463
  if disable_remount is not None:
202
464
  pulumi.set(__self__, "disable_remount", disable_remount)
465
+ if external_entropy_access is not None:
466
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
467
+ if force_no_cache is not None:
468
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
469
+ if identity_token_key is not None:
470
+ pulumi.set(__self__, "identity_token_key", identity_token_key)
471
+ if listing_visibility is not None:
472
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
473
+ if local is not None:
474
+ pulumi.set(__self__, "local", local)
203
475
  if max_lease_ttl_seconds is not None:
204
476
  pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
205
477
  if namespace is not None:
206
478
  pulumi.set(__self__, "namespace", namespace)
479
+ if options is not None:
480
+ pulumi.set(__self__, "options", options)
481
+ if passthrough_request_headers is not None:
482
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
483
+ if plugin_version is not None:
484
+ pulumi.set(__self__, "plugin_version", plugin_version)
485
+ if seal_wrap is not None:
486
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
207
487
  if token is not None:
208
488
  pulumi.set(__self__, "token", token)
209
489
 
210
- @property
490
+ @_builtins.property
491
+ @pulumi.getter
492
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
493
+ """
494
+ Accessor of the mount
495
+ """
496
+ return pulumi.get(self, "accessor")
497
+
498
+ @accessor.setter
499
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
500
+ pulumi.set(self, "accessor", value)
501
+
502
+ @_builtins.property
211
503
  @pulumi.getter
212
- def address(self) -> Optional[pulumi.Input[builtins.str]]:
504
+ def address(self) -> Optional[pulumi.Input[_builtins.str]]:
213
505
  return pulumi.get(self, "address")
214
506
 
215
507
  @address.setter
216
- def address(self, value: Optional[pulumi.Input[builtins.str]]):
508
+ def address(self, value: Optional[pulumi.Input[_builtins.str]]):
217
509
  pulumi.set(self, "address", value)
218
510
 
219
- @property
511
+ @_builtins.property
512
+ @pulumi.getter(name="allowedManagedKeys")
513
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
514
+ """
515
+ List of managed key registry entry names that the mount in question is allowed to access
516
+ """
517
+ return pulumi.get(self, "allowed_managed_keys")
518
+
519
+ @allowed_managed_keys.setter
520
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
521
+ pulumi.set(self, "allowed_managed_keys", value)
522
+
523
+ @_builtins.property
524
+ @pulumi.getter(name="allowedResponseHeaders")
525
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
526
+ """
527
+ List of headers to allow and pass from the request to the plugin
528
+ """
529
+ return pulumi.get(self, "allowed_response_headers")
530
+
531
+ @allowed_response_headers.setter
532
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
533
+ pulumi.set(self, "allowed_response_headers", value)
534
+
535
+ @_builtins.property
536
+ @pulumi.getter(name="auditNonHmacRequestKeys")
537
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
538
+ """
539
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
540
+ """
541
+ return pulumi.get(self, "audit_non_hmac_request_keys")
542
+
543
+ @audit_non_hmac_request_keys.setter
544
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
545
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
546
+
547
+ @_builtins.property
548
+ @pulumi.getter(name="auditNonHmacResponseKeys")
549
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
550
+ """
551
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
552
+ """
553
+ return pulumi.get(self, "audit_non_hmac_response_keys")
554
+
555
+ @audit_non_hmac_response_keys.setter
556
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
557
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
558
+
559
+ @_builtins.property
220
560
  @pulumi.getter
221
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
561
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
222
562
  return pulumi.get(self, "backend")
223
563
 
224
564
  @backend.setter
225
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
565
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
226
566
  pulumi.set(self, "backend", value)
227
567
 
228
- @property
568
+ @_builtins.property
229
569
  @pulumi.getter(name="basePath")
230
- def base_path(self) -> Optional[pulumi.Input[builtins.str]]:
570
+ def base_path(self) -> Optional[pulumi.Input[_builtins.str]]:
231
571
  return pulumi.get(self, "base_path")
232
572
 
233
573
  @base_path.setter
234
- def base_path(self, value: Optional[pulumi.Input[builtins.str]]):
574
+ def base_path(self, value: Optional[pulumi.Input[_builtins.str]]):
235
575
  pulumi.set(self, "base_path", value)
236
576
 
237
- @property
577
+ @_builtins.property
238
578
  @pulumi.getter(name="defaultLeaseTtlSeconds")
239
- def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
579
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
240
580
  """
241
- The default TTL for credentials issued by this backend.
581
+ Default lease duration for secrets in seconds
242
582
  """
243
583
  return pulumi.get(self, "default_lease_ttl_seconds")
244
584
 
245
585
  @default_lease_ttl_seconds.setter
246
- def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
586
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
247
587
  pulumi.set(self, "default_lease_ttl_seconds", value)
248
588
 
249
- @property
589
+ @_builtins.property
590
+ @pulumi.getter(name="delegatedAuthAccessors")
591
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
592
+ """
593
+ List of headers to allow and pass from the request to the plugin
594
+ """
595
+ return pulumi.get(self, "delegated_auth_accessors")
596
+
597
+ @delegated_auth_accessors.setter
598
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
599
+ pulumi.set(self, "delegated_auth_accessors", value)
600
+
601
+ @_builtins.property
250
602
  @pulumi.getter
251
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
603
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
252
604
  """
253
- A human-friendly description for this backend.
605
+ Human-friendly description of the mount for the backend.
254
606
  """
255
607
  return pulumi.get(self, "description")
256
608
 
257
609
  @description.setter
258
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
610
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
259
611
  pulumi.set(self, "description", value)
260
612
 
261
- @property
613
+ @_builtins.property
262
614
  @pulumi.getter(name="disableRemount")
263
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
615
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
264
616
  """
265
617
  If set, opts out of mount migration on path updates.
266
618
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -268,25 +620,84 @@ class _SecretBackendState:
268
620
  return pulumi.get(self, "disable_remount")
269
621
 
270
622
  @disable_remount.setter
271
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
623
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
272
624
  pulumi.set(self, "disable_remount", value)
273
625
 
274
- @property
626
+ @_builtins.property
627
+ @pulumi.getter(name="externalEntropyAccess")
628
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
629
+ """
630
+ Enable the secrets engine to access Vault's external entropy source
631
+ """
632
+ return pulumi.get(self, "external_entropy_access")
633
+
634
+ @external_entropy_access.setter
635
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
636
+ pulumi.set(self, "external_entropy_access", value)
637
+
638
+ @_builtins.property
639
+ @pulumi.getter(name="forceNoCache")
640
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
641
+ """
642
+ If set to true, disables caching.
643
+ """
644
+ return pulumi.get(self, "force_no_cache")
645
+
646
+ @force_no_cache.setter
647
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
648
+ pulumi.set(self, "force_no_cache", value)
649
+
650
+ @_builtins.property
651
+ @pulumi.getter(name="identityTokenKey")
652
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
653
+ """
654
+ The key to use for signing plugin workload identity tokens
655
+ """
656
+ return pulumi.get(self, "identity_token_key")
657
+
658
+ @identity_token_key.setter
659
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
660
+ pulumi.set(self, "identity_token_key", value)
661
+
662
+ @_builtins.property
663
+ @pulumi.getter(name="listingVisibility")
664
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
665
+ """
666
+ Specifies whether to show this mount in the UI-specific listing endpoint
667
+ """
668
+ return pulumi.get(self, "listing_visibility")
669
+
670
+ @listing_visibility.setter
671
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
672
+ pulumi.set(self, "listing_visibility", value)
673
+
674
+ @_builtins.property
675
+ @pulumi.getter
676
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
677
+ """
678
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
679
+ """
680
+ return pulumi.get(self, "local")
681
+
682
+ @local.setter
683
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
684
+ pulumi.set(self, "local", value)
685
+
686
+ @_builtins.property
275
687
  @pulumi.getter(name="maxLeaseTtlSeconds")
276
- def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
688
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
277
689
  """
278
- The maximum TTL that can be requested
279
- for credentials issued by this backend.
690
+ Maximum possible lease duration for secrets in seconds
280
691
  """
281
692
  return pulumi.get(self, "max_lease_ttl_seconds")
282
693
 
283
694
  @max_lease_ttl_seconds.setter
284
- def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
695
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
285
696
  pulumi.set(self, "max_lease_ttl_seconds", value)
286
697
 
287
- @property
698
+ @_builtins.property
288
699
  @pulumi.getter
289
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
700
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
290
701
  """
291
702
  The namespace to provision the resource in.
292
703
  The value should not contain leading or trailing forward slashes.
@@ -296,16 +707,64 @@ class _SecretBackendState:
296
707
  return pulumi.get(self, "namespace")
297
708
 
298
709
  @namespace.setter
299
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
710
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
300
711
  pulumi.set(self, "namespace", value)
301
712
 
302
- @property
713
+ @_builtins.property
714
+ @pulumi.getter
715
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
716
+ """
717
+ Specifies mount type specific options that are passed to the backend
718
+ """
719
+ return pulumi.get(self, "options")
720
+
721
+ @options.setter
722
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
723
+ pulumi.set(self, "options", value)
724
+
725
+ @_builtins.property
726
+ @pulumi.getter(name="passthroughRequestHeaders")
727
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
728
+ """
729
+ List of headers to allow and pass from the request to the plugin
730
+ """
731
+ return pulumi.get(self, "passthrough_request_headers")
732
+
733
+ @passthrough_request_headers.setter
734
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
735
+ pulumi.set(self, "passthrough_request_headers", value)
736
+
737
+ @_builtins.property
738
+ @pulumi.getter(name="pluginVersion")
739
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
740
+ """
741
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
742
+ """
743
+ return pulumi.get(self, "plugin_version")
744
+
745
+ @plugin_version.setter
746
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
747
+ pulumi.set(self, "plugin_version", value)
748
+
749
+ @_builtins.property
750
+ @pulumi.getter(name="sealWrap")
751
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
752
+ """
753
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
754
+ """
755
+ return pulumi.get(self, "seal_wrap")
756
+
757
+ @seal_wrap.setter
758
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
759
+ pulumi.set(self, "seal_wrap", value)
760
+
761
+ @_builtins.property
303
762
  @pulumi.getter
304
- def token(self) -> Optional[pulumi.Input[builtins.str]]:
763
+ def token(self) -> Optional[pulumi.Input[_builtins.str]]:
305
764
  return pulumi.get(self, "token")
306
765
 
307
766
  @token.setter
308
- def token(self, value: Optional[pulumi.Input[builtins.str]]):
767
+ def token(self, value: Optional[pulumi.Input[_builtins.str]]):
309
768
  pulumi.set(self, "token", value)
310
769
 
311
770
 
@@ -315,15 +774,29 @@ class SecretBackend(pulumi.CustomResource):
315
774
  def __init__(__self__,
316
775
  resource_name: str,
317
776
  opts: Optional[pulumi.ResourceOptions] = None,
318
- address: Optional[pulumi.Input[builtins.str]] = None,
319
- backend: Optional[pulumi.Input[builtins.str]] = None,
320
- base_path: Optional[pulumi.Input[builtins.str]] = None,
321
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
322
- description: Optional[pulumi.Input[builtins.str]] = None,
323
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
324
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
325
- namespace: Optional[pulumi.Input[builtins.str]] = None,
326
- token: Optional[pulumi.Input[builtins.str]] = None,
777
+ address: Optional[pulumi.Input[_builtins.str]] = None,
778
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
779
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
780
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
781
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
782
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
783
+ base_path: Optional[pulumi.Input[_builtins.str]] = None,
784
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
785
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
786
+ description: Optional[pulumi.Input[_builtins.str]] = None,
787
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
788
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
789
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
790
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
791
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
792
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
793
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
794
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
795
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
796
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
797
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
798
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
799
+ token: Optional[pulumi.Input[_builtins.str]] = None,
327
800
  __props__=None):
328
801
  """
329
802
  ## Example Usage
@@ -348,16 +821,29 @@ class SecretBackend(pulumi.CustomResource):
348
821
 
349
822
  :param str resource_name: The name of the resource.
350
823
  :param pulumi.ResourceOptions opts: Options for the resource.
351
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
352
- :param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
353
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
824
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
825
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
826
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
827
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
828
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
829
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
830
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
831
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
354
832
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
355
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
356
- for credentials issued by this backend.
357
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
833
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
834
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
835
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
836
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
837
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
838
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
839
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
358
840
  The value should not contain leading or trailing forward slashes.
359
841
  The `namespace` is always relative to the provider's configured namespace.
360
842
  *Available only for Vault Enterprise*.
843
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
844
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
845
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
846
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
361
847
  """
362
848
  ...
363
849
  @overload
@@ -401,15 +887,29 @@ class SecretBackend(pulumi.CustomResource):
401
887
  def _internal_init(__self__,
402
888
  resource_name: str,
403
889
  opts: Optional[pulumi.ResourceOptions] = None,
404
- address: Optional[pulumi.Input[builtins.str]] = None,
405
- backend: Optional[pulumi.Input[builtins.str]] = None,
406
- base_path: Optional[pulumi.Input[builtins.str]] = None,
407
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
408
- description: Optional[pulumi.Input[builtins.str]] = None,
409
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
410
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
411
- namespace: Optional[pulumi.Input[builtins.str]] = None,
412
- token: Optional[pulumi.Input[builtins.str]] = None,
890
+ address: Optional[pulumi.Input[_builtins.str]] = None,
891
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
892
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
893
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
894
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
895
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
896
+ base_path: Optional[pulumi.Input[_builtins.str]] = None,
897
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
898
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
899
+ description: Optional[pulumi.Input[_builtins.str]] = None,
900
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
901
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
902
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
903
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
904
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
905
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
906
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
907
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
908
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
909
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
910
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
911
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
912
+ token: Optional[pulumi.Input[_builtins.str]] = None,
413
913
  __props__=None):
414
914
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
415
915
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -420,14 +920,29 @@ class SecretBackend(pulumi.CustomResource):
420
920
  __props__ = SecretBackendArgs.__new__(SecretBackendArgs)
421
921
 
422
922
  __props__.__dict__["address"] = address
923
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
924
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
925
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
926
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
423
927
  __props__.__dict__["backend"] = backend
424
928
  __props__.__dict__["base_path"] = base_path
425
929
  __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
930
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
426
931
  __props__.__dict__["description"] = description
427
932
  __props__.__dict__["disable_remount"] = disable_remount
933
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
934
+ __props__.__dict__["force_no_cache"] = force_no_cache
935
+ __props__.__dict__["identity_token_key"] = identity_token_key
936
+ __props__.__dict__["listing_visibility"] = listing_visibility
937
+ __props__.__dict__["local"] = local
428
938
  __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
429
939
  __props__.__dict__["namespace"] = namespace
940
+ __props__.__dict__["options"] = options
941
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
942
+ __props__.__dict__["plugin_version"] = plugin_version
943
+ __props__.__dict__["seal_wrap"] = seal_wrap
430
944
  __props__.__dict__["token"] = None if token is None else pulumi.Output.secret(token)
945
+ __props__.__dict__["accessor"] = None
431
946
  secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["token"])
432
947
  opts = pulumi.ResourceOptions.merge(opts, secret_opts)
433
948
  super(SecretBackend, __self__).__init__(
@@ -440,15 +955,30 @@ class SecretBackend(pulumi.CustomResource):
440
955
  def get(resource_name: str,
441
956
  id: pulumi.Input[str],
442
957
  opts: Optional[pulumi.ResourceOptions] = None,
443
- address: Optional[pulumi.Input[builtins.str]] = None,
444
- backend: Optional[pulumi.Input[builtins.str]] = None,
445
- base_path: Optional[pulumi.Input[builtins.str]] = None,
446
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
447
- description: Optional[pulumi.Input[builtins.str]] = None,
448
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
449
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
450
- namespace: Optional[pulumi.Input[builtins.str]] = None,
451
- token: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretBackend':
958
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
959
+ address: Optional[pulumi.Input[_builtins.str]] = None,
960
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
961
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
962
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
963
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
964
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
965
+ base_path: Optional[pulumi.Input[_builtins.str]] = None,
966
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
967
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
968
+ description: Optional[pulumi.Input[_builtins.str]] = None,
969
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
970
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
971
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
972
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
973
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
974
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
975
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
976
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
977
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
978
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
979
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
980
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
981
+ token: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackend':
452
982
  """
453
983
  Get an existing SecretBackend resource's state with the given name, id, and optional extra
454
984
  properties used to qualify the lookup.
@@ -456,84 +986,200 @@ class SecretBackend(pulumi.CustomResource):
456
986
  :param str resource_name: The unique name of the resulting resource.
457
987
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
458
988
  :param pulumi.ResourceOptions opts: Options for the resource.
459
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
460
- :param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
461
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
989
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
990
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
991
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
992
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
993
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
994
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
995
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
996
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
997
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
462
998
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
463
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
464
- for credentials issued by this backend.
465
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
999
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1000
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1001
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1002
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1003
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1004
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
1005
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
466
1006
  The value should not contain leading or trailing forward slashes.
467
1007
  The `namespace` is always relative to the provider's configured namespace.
468
1008
  *Available only for Vault Enterprise*.
1009
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1010
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1011
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1012
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
469
1013
  """
470
1014
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
471
1015
 
472
1016
  __props__ = _SecretBackendState.__new__(_SecretBackendState)
473
1017
 
1018
+ __props__.__dict__["accessor"] = accessor
474
1019
  __props__.__dict__["address"] = address
1020
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1021
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1022
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1023
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
475
1024
  __props__.__dict__["backend"] = backend
476
1025
  __props__.__dict__["base_path"] = base_path
477
1026
  __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1027
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
478
1028
  __props__.__dict__["description"] = description
479
1029
  __props__.__dict__["disable_remount"] = disable_remount
1030
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1031
+ __props__.__dict__["force_no_cache"] = force_no_cache
1032
+ __props__.__dict__["identity_token_key"] = identity_token_key
1033
+ __props__.__dict__["listing_visibility"] = listing_visibility
1034
+ __props__.__dict__["local"] = local
480
1035
  __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
481
1036
  __props__.__dict__["namespace"] = namespace
1037
+ __props__.__dict__["options"] = options
1038
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
1039
+ __props__.__dict__["plugin_version"] = plugin_version
1040
+ __props__.__dict__["seal_wrap"] = seal_wrap
482
1041
  __props__.__dict__["token"] = token
483
1042
  return SecretBackend(resource_name, opts=opts, __props__=__props__)
484
1043
 
485
- @property
1044
+ @_builtins.property
1045
+ @pulumi.getter
1046
+ def accessor(self) -> pulumi.Output[_builtins.str]:
1047
+ """
1048
+ Accessor of the mount
1049
+ """
1050
+ return pulumi.get(self, "accessor")
1051
+
1052
+ @_builtins.property
486
1053
  @pulumi.getter
487
- def address(self) -> pulumi.Output[Optional[builtins.str]]:
1054
+ def address(self) -> pulumi.Output[Optional[_builtins.str]]:
488
1055
  return pulumi.get(self, "address")
489
1056
 
490
- @property
1057
+ @_builtins.property
1058
+ @pulumi.getter(name="allowedManagedKeys")
1059
+ def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1060
+ """
1061
+ List of managed key registry entry names that the mount in question is allowed to access
1062
+ """
1063
+ return pulumi.get(self, "allowed_managed_keys")
1064
+
1065
+ @_builtins.property
1066
+ @pulumi.getter(name="allowedResponseHeaders")
1067
+ def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1068
+ """
1069
+ List of headers to allow and pass from the request to the plugin
1070
+ """
1071
+ return pulumi.get(self, "allowed_response_headers")
1072
+
1073
+ @_builtins.property
1074
+ @pulumi.getter(name="auditNonHmacRequestKeys")
1075
+ def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1076
+ """
1077
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1078
+ """
1079
+ return pulumi.get(self, "audit_non_hmac_request_keys")
1080
+
1081
+ @_builtins.property
1082
+ @pulumi.getter(name="auditNonHmacResponseKeys")
1083
+ def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1084
+ """
1085
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1086
+ """
1087
+ return pulumi.get(self, "audit_non_hmac_response_keys")
1088
+
1089
+ @_builtins.property
491
1090
  @pulumi.getter
492
- def backend(self) -> pulumi.Output[Optional[builtins.str]]:
1091
+ def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
493
1092
  return pulumi.get(self, "backend")
494
1093
 
495
- @property
1094
+ @_builtins.property
496
1095
  @pulumi.getter(name="basePath")
497
- def base_path(self) -> pulumi.Output[Optional[builtins.str]]:
1096
+ def base_path(self) -> pulumi.Output[Optional[_builtins.str]]:
498
1097
  return pulumi.get(self, "base_path")
499
1098
 
500
- @property
1099
+ @_builtins.property
501
1100
  @pulumi.getter(name="defaultLeaseTtlSeconds")
502
- def default_lease_ttl_seconds(self) -> pulumi.Output[Optional[builtins.int]]:
1101
+ def default_lease_ttl_seconds(self) -> pulumi.Output[Optional[_builtins.int]]:
503
1102
  """
504
- The default TTL for credentials issued by this backend.
1103
+ Default lease duration for secrets in seconds
505
1104
  """
506
1105
  return pulumi.get(self, "default_lease_ttl_seconds")
507
1106
 
508
- @property
1107
+ @_builtins.property
1108
+ @pulumi.getter(name="delegatedAuthAccessors")
1109
+ def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1110
+ """
1111
+ List of headers to allow and pass from the request to the plugin
1112
+ """
1113
+ return pulumi.get(self, "delegated_auth_accessors")
1114
+
1115
+ @_builtins.property
509
1116
  @pulumi.getter
510
- def description(self) -> pulumi.Output[Optional[builtins.str]]:
1117
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
511
1118
  """
512
- A human-friendly description for this backend.
1119
+ Human-friendly description of the mount for the backend.
513
1120
  """
514
1121
  return pulumi.get(self, "description")
515
1122
 
516
- @property
1123
+ @_builtins.property
517
1124
  @pulumi.getter(name="disableRemount")
518
- def disable_remount(self) -> pulumi.Output[Optional[builtins.bool]]:
1125
+ def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
519
1126
  """
520
1127
  If set, opts out of mount migration on path updates.
521
1128
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
522
1129
  """
523
1130
  return pulumi.get(self, "disable_remount")
524
1131
 
525
- @property
1132
+ @_builtins.property
1133
+ @pulumi.getter(name="externalEntropyAccess")
1134
+ def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
1135
+ """
1136
+ Enable the secrets engine to access Vault's external entropy source
1137
+ """
1138
+ return pulumi.get(self, "external_entropy_access")
1139
+
1140
+ @_builtins.property
1141
+ @pulumi.getter(name="forceNoCache")
1142
+ def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
1143
+ """
1144
+ If set to true, disables caching.
1145
+ """
1146
+ return pulumi.get(self, "force_no_cache")
1147
+
1148
+ @_builtins.property
1149
+ @pulumi.getter(name="identityTokenKey")
1150
+ def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
1151
+ """
1152
+ The key to use for signing plugin workload identity tokens
1153
+ """
1154
+ return pulumi.get(self, "identity_token_key")
1155
+
1156
+ @_builtins.property
1157
+ @pulumi.getter(name="listingVisibility")
1158
+ def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
1159
+ """
1160
+ Specifies whether to show this mount in the UI-specific listing endpoint
1161
+ """
1162
+ return pulumi.get(self, "listing_visibility")
1163
+
1164
+ @_builtins.property
1165
+ @pulumi.getter
1166
+ def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
1167
+ """
1168
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1169
+ """
1170
+ return pulumi.get(self, "local")
1171
+
1172
+ @_builtins.property
526
1173
  @pulumi.getter(name="maxLeaseTtlSeconds")
527
- def max_lease_ttl_seconds(self) -> pulumi.Output[Optional[builtins.int]]:
1174
+ def max_lease_ttl_seconds(self) -> pulumi.Output[Optional[_builtins.int]]:
528
1175
  """
529
- The maximum TTL that can be requested
530
- for credentials issued by this backend.
1176
+ Maximum possible lease duration for secrets in seconds
531
1177
  """
532
1178
  return pulumi.get(self, "max_lease_ttl_seconds")
533
1179
 
534
- @property
1180
+ @_builtins.property
535
1181
  @pulumi.getter
536
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
1182
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
537
1183
  """
538
1184
  The namespace to provision the resource in.
539
1185
  The value should not contain leading or trailing forward slashes.
@@ -542,8 +1188,40 @@ class SecretBackend(pulumi.CustomResource):
542
1188
  """
543
1189
  return pulumi.get(self, "namespace")
544
1190
 
545
- @property
1191
+ @_builtins.property
1192
+ @pulumi.getter
1193
+ def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
1194
+ """
1195
+ Specifies mount type specific options that are passed to the backend
1196
+ """
1197
+ return pulumi.get(self, "options")
1198
+
1199
+ @_builtins.property
1200
+ @pulumi.getter(name="passthroughRequestHeaders")
1201
+ def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1202
+ """
1203
+ List of headers to allow and pass from the request to the plugin
1204
+ """
1205
+ return pulumi.get(self, "passthrough_request_headers")
1206
+
1207
+ @_builtins.property
1208
+ @pulumi.getter(name="pluginVersion")
1209
+ def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
1210
+ """
1211
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1212
+ """
1213
+ return pulumi.get(self, "plugin_version")
1214
+
1215
+ @_builtins.property
1216
+ @pulumi.getter(name="sealWrap")
1217
+ def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
1218
+ """
1219
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1220
+ """
1221
+ return pulumi.get(self, "seal_wrap")
1222
+
1223
+ @_builtins.property
546
1224
  @pulumi.getter
547
- def token(self) -> pulumi.Output[Optional[builtins.str]]:
1225
+ def token(self) -> pulumi.Output[Optional[_builtins.str]]:
548
1226
  return pulumi.get(self, "token")
549
1227