pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (269) hide show
  1. pulumi_vault/__init__.py +19 -1
  2. pulumi_vault/_inputs.py +873 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +1016 -439
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +1057 -285
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +887 -256
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +426 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +878 -336
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +400 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +1006 -227
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +431 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +732 -693
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +380 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +909 -271
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/oci_auth_backend.py +683 -0
  168. pulumi_vault/oci_auth_backend_role.py +798 -0
  169. pulumi_vault/okta/__init__.py +1 -1
  170. pulumi_vault/okta/_inputs.py +31 -32
  171. pulumi_vault/okta/auth_backend.py +305 -306
  172. pulumi_vault/okta/auth_backend_group.py +69 -70
  173. pulumi_vault/okta/auth_backend_user.py +86 -87
  174. pulumi_vault/okta/outputs.py +21 -22
  175. pulumi_vault/outputs.py +234 -82
  176. pulumi_vault/pkisecret/__init__.py +1 -1
  177. pulumi_vault/pkisecret/_inputs.py +55 -56
  178. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  179. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  180. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  181. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  182. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  183. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  184. pulumi_vault/pkisecret/backend_config_scep.py +205 -159
  185. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  186. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  187. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  188. pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
  189. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  190. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  191. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  192. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  193. pulumi_vault/pkisecret/outputs.py +61 -62
  194. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  195. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  196. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  197. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  198. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  199. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  200. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  201. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  202. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  203. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  204. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  205. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  206. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  207. pulumi_vault/plugin.py +154 -155
  208. pulumi_vault/plugin_pinned_version.py +52 -53
  209. pulumi_vault/policy.py +52 -53
  210. pulumi_vault/provider.py +160 -161
  211. pulumi_vault/pulumi-plugin.json +1 -1
  212. pulumi_vault/quota_lease_count.py +103 -104
  213. pulumi_vault/quota_rate_limit.py +171 -172
  214. pulumi_vault/rabbitmq/__init__.py +1 -1
  215. pulumi_vault/rabbitmq/_inputs.py +50 -51
  216. pulumi_vault/rabbitmq/outputs.py +34 -35
  217. pulumi_vault/rabbitmq/secret_backend.py +902 -231
  218. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  219. pulumi_vault/raft_autopilot.py +137 -138
  220. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  221. pulumi_vault/rgp_policy.py +69 -70
  222. pulumi_vault/saml/__init__.py +1 -1
  223. pulumi_vault/saml/auth_backend.py +188 -189
  224. pulumi_vault/saml/auth_backend_role.py +290 -291
  225. pulumi_vault/scep_auth_backend_role.py +252 -253
  226. pulumi_vault/secrets/__init__.py +1 -1
  227. pulumi_vault/secrets/_inputs.py +19 -20
  228. pulumi_vault/secrets/outputs.py +13 -14
  229. pulumi_vault/secrets/sync_association.py +88 -89
  230. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  231. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  232. pulumi_vault/secrets/sync_config.py +52 -53
  233. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  234. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  235. pulumi_vault/secrets/sync_github_apps.py +78 -79
  236. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  237. pulumi_vault/ssh/__init__.py +1 -1
  238. pulumi_vault/ssh/_inputs.py +13 -14
  239. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  240. pulumi_vault/ssh/outputs.py +9 -10
  241. pulumi_vault/ssh/secret_backend_ca.py +217 -124
  242. pulumi_vault/ssh/secret_backend_role.py +446 -447
  243. pulumi_vault/terraformcloud/__init__.py +1 -1
  244. pulumi_vault/terraformcloud/secret_backend.py +833 -155
  245. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  246. pulumi_vault/terraformcloud/secret_role.py +117 -118
  247. pulumi_vault/token.py +301 -302
  248. pulumi_vault/tokenauth/__init__.py +1 -1
  249. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  250. pulumi_vault/transform/__init__.py +1 -1
  251. pulumi_vault/transform/alphabet.py +69 -70
  252. pulumi_vault/transform/get_decode.py +57 -58
  253. pulumi_vault/transform/get_encode.py +57 -58
  254. pulumi_vault/transform/role.py +69 -70
  255. pulumi_vault/transform/template.py +137 -138
  256. pulumi_vault/transform/transformation.py +171 -172
  257. pulumi_vault/transit/__init__.py +1 -1
  258. pulumi_vault/transit/get_cmac.py +47 -48
  259. pulumi_vault/transit/get_decrypt.py +25 -26
  260. pulumi_vault/transit/get_encrypt.py +29 -30
  261. pulumi_vault/transit/get_sign.py +71 -72
  262. pulumi_vault/transit/get_verify.py +83 -84
  263. pulumi_vault/transit/secret_backend_key.py +377 -350
  264. pulumi_vault/transit/secret_cache_config.py +52 -53
  265. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
  266. pulumi_vault-7.2.0.dist-info/RECORD +270 -0
  267. pulumi_vault-7.1.0.dist-info/RECORD +0 -268
  268. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
  269. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,61 +19,104 @@ __all__ = ['BackendArgs', 'Backend']
20
19
  @pulumi.input_type
21
20
  class BackendArgs:
22
21
  def __init__(__self__, *,
23
- subscription_id: pulumi.Input[builtins.str],
24
- tenant_id: pulumi.Input[builtins.str],
25
- client_id: Optional[pulumi.Input[builtins.str]] = None,
26
- client_secret: Optional[pulumi.Input[builtins.str]] = None,
27
- description: Optional[pulumi.Input[builtins.str]] = None,
28
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
29
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
30
- environment: Optional[pulumi.Input[builtins.str]] = None,
31
- identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
32
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
33
- identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
34
- namespace: Optional[pulumi.Input[builtins.str]] = None,
35
- path: Optional[pulumi.Input[builtins.str]] = None,
36
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
37
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
38
- rotation_window: Optional[pulumi.Input[builtins.int]] = None):
22
+ subscription_id: pulumi.Input[_builtins.str],
23
+ tenant_id: pulumi.Input[_builtins.str],
24
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
25
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
28
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
29
+ client_secret: Optional[pulumi.Input[_builtins.str]] = None,
30
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
31
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
32
+ description: Optional[pulumi.Input[_builtins.str]] = None,
33
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
34
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
35
+ environment: Optional[pulumi.Input[_builtins.str]] = None,
36
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
37
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
38
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
39
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
40
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
41
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
42
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
43
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
44
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
45
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
46
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
47
+ path: Optional[pulumi.Input[_builtins.str]] = None,
48
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
49
+ root_password_ttl: Optional[pulumi.Input[_builtins.int]] = None,
50
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
51
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
52
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
53
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None):
39
54
  """
40
55
  The set of arguments for constructing a Backend resource.
41
- :param pulumi.Input[builtins.str] subscription_id: The subscription id for the Azure Active Directory.
42
- :param pulumi.Input[builtins.str] tenant_id: The tenant id for the Azure Active Directory.
43
- :param pulumi.Input[builtins.str] client_id: The OAuth2 client id to connect to Azure.
44
- :param pulumi.Input[builtins.str] client_secret: The OAuth2 client secret to connect to Azure.
45
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount for the backend.
46
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
56
+ :param pulumi.Input[_builtins.str] subscription_id: The subscription id for the Azure Active Directory.
57
+ :param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory.
58
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
59
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
60
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
61
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
62
+ :param pulumi.Input[_builtins.str] client_id: The OAuth2 client id to connect to Azure.
63
+ :param pulumi.Input[_builtins.str] client_secret: The OAuth2 client secret to connect to Azure.
64
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
65
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
66
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
67
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
47
68
  *Available only for Vault Enterprise*
48
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
69
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
49
70
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
50
- :param pulumi.Input[builtins.str] environment: The Azure environment.
51
- :param pulumi.Input[builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.17+.
71
+ :param pulumi.Input[_builtins.str] environment: The Azure environment.
72
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
73
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
74
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.17+.
52
75
  *Available only for Vault Enterprise*
53
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing identity tokens. Requires Vault 1.17+.
76
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens.
77
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
54
78
  *Available only for Vault Enterprise*
55
- :param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
56
- *Available only for Vault Enterprise*
57
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
79
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
80
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
81
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
82
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
58
83
  The value should not contain leading or trailing forward slashes.
59
84
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
60
85
  *Available only for Vault Enterprise*.
61
- :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Defaults to `azure`.
62
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
86
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
87
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
88
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Defaults to `azure`.
89
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
90
+ :param pulumi.Input[_builtins.int] root_password_ttl: The TTL in seconds of the root password in Azure when rotate-root generates a new client secret
91
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
63
92
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
64
93
  *Available only for Vault Enterprise*
65
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
94
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
66
95
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
67
96
  *Available only for Vault Enterprise*
68
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
97
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
69
98
  a rotation when a scheduled token rotation occurs. The default rotation window is
70
99
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*
100
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
71
101
  """
72
102
  pulumi.set(__self__, "subscription_id", subscription_id)
73
103
  pulumi.set(__self__, "tenant_id", tenant_id)
104
+ if allowed_managed_keys is not None:
105
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
106
+ if allowed_response_headers is not None:
107
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
108
+ if audit_non_hmac_request_keys is not None:
109
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
110
+ if audit_non_hmac_response_keys is not None:
111
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
74
112
  if client_id is not None:
75
113
  pulumi.set(__self__, "client_id", client_id)
76
114
  if client_secret is not None:
77
115
  pulumi.set(__self__, "client_secret", client_secret)
116
+ if default_lease_ttl_seconds is not None:
117
+ pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
118
+ if delegated_auth_accessors is not None:
119
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
78
120
  if description is not None:
79
121
  pulumi.set(__self__, "description", description)
80
122
  if disable_automated_rotation is not None:
@@ -83,86 +125,178 @@ class BackendArgs:
83
125
  pulumi.set(__self__, "disable_remount", disable_remount)
84
126
  if environment is not None:
85
127
  pulumi.set(__self__, "environment", environment)
128
+ if external_entropy_access is not None:
129
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
130
+ if force_no_cache is not None:
131
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
86
132
  if identity_token_audience is not None:
87
133
  pulumi.set(__self__, "identity_token_audience", identity_token_audience)
88
134
  if identity_token_key is not None:
89
135
  pulumi.set(__self__, "identity_token_key", identity_token_key)
90
136
  if identity_token_ttl is not None:
91
137
  pulumi.set(__self__, "identity_token_ttl", identity_token_ttl)
138
+ if listing_visibility is not None:
139
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
140
+ if local is not None:
141
+ pulumi.set(__self__, "local", local)
142
+ if max_lease_ttl_seconds is not None:
143
+ pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
92
144
  if namespace is not None:
93
145
  pulumi.set(__self__, "namespace", namespace)
146
+ if options is not None:
147
+ pulumi.set(__self__, "options", options)
148
+ if passthrough_request_headers is not None:
149
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
94
150
  if path is not None:
95
151
  pulumi.set(__self__, "path", path)
152
+ if plugin_version is not None:
153
+ pulumi.set(__self__, "plugin_version", plugin_version)
154
+ if root_password_ttl is not None:
155
+ pulumi.set(__self__, "root_password_ttl", root_password_ttl)
96
156
  if rotation_period is not None:
97
157
  pulumi.set(__self__, "rotation_period", rotation_period)
98
158
  if rotation_schedule is not None:
99
159
  pulumi.set(__self__, "rotation_schedule", rotation_schedule)
100
160
  if rotation_window is not None:
101
161
  pulumi.set(__self__, "rotation_window", rotation_window)
162
+ if seal_wrap is not None:
163
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
102
164
 
103
- @property
165
+ @_builtins.property
104
166
  @pulumi.getter(name="subscriptionId")
105
- def subscription_id(self) -> pulumi.Input[builtins.str]:
167
+ def subscription_id(self) -> pulumi.Input[_builtins.str]:
106
168
  """
107
169
  The subscription id for the Azure Active Directory.
108
170
  """
109
171
  return pulumi.get(self, "subscription_id")
110
172
 
111
173
  @subscription_id.setter
112
- def subscription_id(self, value: pulumi.Input[builtins.str]):
174
+ def subscription_id(self, value: pulumi.Input[_builtins.str]):
113
175
  pulumi.set(self, "subscription_id", value)
114
176
 
115
- @property
177
+ @_builtins.property
116
178
  @pulumi.getter(name="tenantId")
117
- def tenant_id(self) -> pulumi.Input[builtins.str]:
179
+ def tenant_id(self) -> pulumi.Input[_builtins.str]:
118
180
  """
119
181
  The tenant id for the Azure Active Directory.
120
182
  """
121
183
  return pulumi.get(self, "tenant_id")
122
184
 
123
185
  @tenant_id.setter
124
- def tenant_id(self, value: pulumi.Input[builtins.str]):
186
+ def tenant_id(self, value: pulumi.Input[_builtins.str]):
125
187
  pulumi.set(self, "tenant_id", value)
126
188
 
127
- @property
189
+ @_builtins.property
190
+ @pulumi.getter(name="allowedManagedKeys")
191
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
192
+ """
193
+ List of managed key registry entry names that the mount in question is allowed to access
194
+ """
195
+ return pulumi.get(self, "allowed_managed_keys")
196
+
197
+ @allowed_managed_keys.setter
198
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
199
+ pulumi.set(self, "allowed_managed_keys", value)
200
+
201
+ @_builtins.property
202
+ @pulumi.getter(name="allowedResponseHeaders")
203
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
204
+ """
205
+ List of headers to allow and pass from the request to the plugin
206
+ """
207
+ return pulumi.get(self, "allowed_response_headers")
208
+
209
+ @allowed_response_headers.setter
210
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
211
+ pulumi.set(self, "allowed_response_headers", value)
212
+
213
+ @_builtins.property
214
+ @pulumi.getter(name="auditNonHmacRequestKeys")
215
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
216
+ """
217
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
218
+ """
219
+ return pulumi.get(self, "audit_non_hmac_request_keys")
220
+
221
+ @audit_non_hmac_request_keys.setter
222
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
223
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
224
+
225
+ @_builtins.property
226
+ @pulumi.getter(name="auditNonHmacResponseKeys")
227
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
228
+ """
229
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
230
+ """
231
+ return pulumi.get(self, "audit_non_hmac_response_keys")
232
+
233
+ @audit_non_hmac_response_keys.setter
234
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
235
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
236
+
237
+ @_builtins.property
128
238
  @pulumi.getter(name="clientId")
129
- def client_id(self) -> Optional[pulumi.Input[builtins.str]]:
239
+ def client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
130
240
  """
131
241
  The OAuth2 client id to connect to Azure.
132
242
  """
133
243
  return pulumi.get(self, "client_id")
134
244
 
135
245
  @client_id.setter
136
- def client_id(self, value: Optional[pulumi.Input[builtins.str]]):
246
+ def client_id(self, value: Optional[pulumi.Input[_builtins.str]]):
137
247
  pulumi.set(self, "client_id", value)
138
248
 
139
- @property
249
+ @_builtins.property
140
250
  @pulumi.getter(name="clientSecret")
141
- def client_secret(self) -> Optional[pulumi.Input[builtins.str]]:
251
+ def client_secret(self) -> Optional[pulumi.Input[_builtins.str]]:
142
252
  """
143
253
  The OAuth2 client secret to connect to Azure.
144
254
  """
145
255
  return pulumi.get(self, "client_secret")
146
256
 
147
257
  @client_secret.setter
148
- def client_secret(self, value: Optional[pulumi.Input[builtins.str]]):
258
+ def client_secret(self, value: Optional[pulumi.Input[_builtins.str]]):
149
259
  pulumi.set(self, "client_secret", value)
150
260
 
151
- @property
261
+ @_builtins.property
262
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
263
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
264
+ """
265
+ Default lease duration for tokens and secrets in seconds
266
+ """
267
+ return pulumi.get(self, "default_lease_ttl_seconds")
268
+
269
+ @default_lease_ttl_seconds.setter
270
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
271
+ pulumi.set(self, "default_lease_ttl_seconds", value)
272
+
273
+ @_builtins.property
274
+ @pulumi.getter(name="delegatedAuthAccessors")
275
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
276
+ """
277
+ List of headers to allow and pass from the request to the plugin
278
+ """
279
+ return pulumi.get(self, "delegated_auth_accessors")
280
+
281
+ @delegated_auth_accessors.setter
282
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
283
+ pulumi.set(self, "delegated_auth_accessors", value)
284
+
285
+ @_builtins.property
152
286
  @pulumi.getter
153
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
287
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
154
288
  """
155
289
  Human-friendly description of the mount for the backend.
156
290
  """
157
291
  return pulumi.get(self, "description")
158
292
 
159
293
  @description.setter
160
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
294
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
161
295
  pulumi.set(self, "description", value)
162
296
 
163
- @property
297
+ @_builtins.property
164
298
  @pulumi.getter(name="disableAutomatedRotation")
165
- def disable_automated_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
299
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
166
300
  """
167
301
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
168
302
  *Available only for Vault Enterprise*
@@ -170,12 +304,12 @@ class BackendArgs:
170
304
  return pulumi.get(self, "disable_automated_rotation")
171
305
 
172
306
  @disable_automated_rotation.setter
173
- def disable_automated_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
307
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
174
308
  pulumi.set(self, "disable_automated_rotation", value)
175
309
 
176
- @property
310
+ @_builtins.property
177
311
  @pulumi.getter(name="disableRemount")
178
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
312
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
179
313
  """
180
314
  If set, opts out of mount migration on path updates.
181
315
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -183,24 +317,48 @@ class BackendArgs:
183
317
  return pulumi.get(self, "disable_remount")
184
318
 
185
319
  @disable_remount.setter
186
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
320
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
187
321
  pulumi.set(self, "disable_remount", value)
188
322
 
189
- @property
323
+ @_builtins.property
190
324
  @pulumi.getter
191
- def environment(self) -> Optional[pulumi.Input[builtins.str]]:
325
+ def environment(self) -> Optional[pulumi.Input[_builtins.str]]:
192
326
  """
193
327
  The Azure environment.
194
328
  """
195
329
  return pulumi.get(self, "environment")
196
330
 
197
331
  @environment.setter
198
- def environment(self, value: Optional[pulumi.Input[builtins.str]]):
332
+ def environment(self, value: Optional[pulumi.Input[_builtins.str]]):
199
333
  pulumi.set(self, "environment", value)
200
334
 
201
- @property
335
+ @_builtins.property
336
+ @pulumi.getter(name="externalEntropyAccess")
337
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
338
+ """
339
+ Enable the secrets engine to access Vault's external entropy source
340
+ """
341
+ return pulumi.get(self, "external_entropy_access")
342
+
343
+ @external_entropy_access.setter
344
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
345
+ pulumi.set(self, "external_entropy_access", value)
346
+
347
+ @_builtins.property
348
+ @pulumi.getter(name="forceNoCache")
349
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
350
+ """
351
+ If set to true, disables caching.
352
+ """
353
+ return pulumi.get(self, "force_no_cache")
354
+
355
+ @force_no_cache.setter
356
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
357
+ pulumi.set(self, "force_no_cache", value)
358
+
359
+ @_builtins.property
202
360
  @pulumi.getter(name="identityTokenAudience")
203
- def identity_token_audience(self) -> Optional[pulumi.Input[builtins.str]]:
361
+ def identity_token_audience(self) -> Optional[pulumi.Input[_builtins.str]]:
204
362
  """
205
363
  The audience claim value. Requires Vault 1.17+.
206
364
  *Available only for Vault Enterprise*
@@ -208,25 +366,24 @@ class BackendArgs:
208
366
  return pulumi.get(self, "identity_token_audience")
209
367
 
210
368
  @identity_token_audience.setter
211
- def identity_token_audience(self, value: Optional[pulumi.Input[builtins.str]]):
369
+ def identity_token_audience(self, value: Optional[pulumi.Input[_builtins.str]]):
212
370
  pulumi.set(self, "identity_token_audience", value)
213
371
 
214
- @property
372
+ @_builtins.property
215
373
  @pulumi.getter(name="identityTokenKey")
216
- def identity_token_key(self) -> Optional[pulumi.Input[builtins.str]]:
374
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
217
375
  """
218
- The key to use for signing identity tokens. Requires Vault 1.17+.
219
- *Available only for Vault Enterprise*
376
+ The key to use for signing identity tokens.
220
377
  """
221
378
  return pulumi.get(self, "identity_token_key")
222
379
 
223
380
  @identity_token_key.setter
224
- def identity_token_key(self, value: Optional[pulumi.Input[builtins.str]]):
381
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
225
382
  pulumi.set(self, "identity_token_key", value)
226
383
 
227
- @property
384
+ @_builtins.property
228
385
  @pulumi.getter(name="identityTokenTtl")
229
- def identity_token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
386
+ def identity_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
230
387
  """
231
388
  The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
232
389
  *Available only for Vault Enterprise*
@@ -234,12 +391,48 @@ class BackendArgs:
234
391
  return pulumi.get(self, "identity_token_ttl")
235
392
 
236
393
  @identity_token_ttl.setter
237
- def identity_token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
394
+ def identity_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
238
395
  pulumi.set(self, "identity_token_ttl", value)
239
396
 
240
- @property
397
+ @_builtins.property
398
+ @pulumi.getter(name="listingVisibility")
399
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
400
+ """
401
+ Specifies whether to show this mount in the UI-specific listing endpoint
402
+ """
403
+ return pulumi.get(self, "listing_visibility")
404
+
405
+ @listing_visibility.setter
406
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
407
+ pulumi.set(self, "listing_visibility", value)
408
+
409
+ @_builtins.property
241
410
  @pulumi.getter
242
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
411
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
412
+ """
413
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
414
+ """
415
+ return pulumi.get(self, "local")
416
+
417
+ @local.setter
418
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
419
+ pulumi.set(self, "local", value)
420
+
421
+ @_builtins.property
422
+ @pulumi.getter(name="maxLeaseTtlSeconds")
423
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
424
+ """
425
+ Maximum possible lease duration for tokens and secrets in seconds
426
+ """
427
+ return pulumi.get(self, "max_lease_ttl_seconds")
428
+
429
+ @max_lease_ttl_seconds.setter
430
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
431
+ pulumi.set(self, "max_lease_ttl_seconds", value)
432
+
433
+ @_builtins.property
434
+ @pulumi.getter
435
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
243
436
  """
244
437
  The namespace to provision the resource in.
245
438
  The value should not contain leading or trailing forward slashes.
@@ -249,24 +442,72 @@ class BackendArgs:
249
442
  return pulumi.get(self, "namespace")
250
443
 
251
444
  @namespace.setter
252
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
445
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
253
446
  pulumi.set(self, "namespace", value)
254
447
 
255
- @property
448
+ @_builtins.property
449
+ @pulumi.getter
450
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
451
+ """
452
+ Specifies mount type specific options that are passed to the backend
453
+ """
454
+ return pulumi.get(self, "options")
455
+
456
+ @options.setter
457
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
458
+ pulumi.set(self, "options", value)
459
+
460
+ @_builtins.property
461
+ @pulumi.getter(name="passthroughRequestHeaders")
462
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
463
+ """
464
+ List of headers to allow and pass from the request to the plugin
465
+ """
466
+ return pulumi.get(self, "passthrough_request_headers")
467
+
468
+ @passthrough_request_headers.setter
469
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
470
+ pulumi.set(self, "passthrough_request_headers", value)
471
+
472
+ @_builtins.property
256
473
  @pulumi.getter
257
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
474
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
258
475
  """
259
476
  The unique path this backend should be mounted at. Defaults to `azure`.
260
477
  """
261
478
  return pulumi.get(self, "path")
262
479
 
263
480
  @path.setter
264
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
481
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
265
482
  pulumi.set(self, "path", value)
266
483
 
267
- @property
484
+ @_builtins.property
485
+ @pulumi.getter(name="pluginVersion")
486
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
487
+ """
488
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
489
+ """
490
+ return pulumi.get(self, "plugin_version")
491
+
492
+ @plugin_version.setter
493
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
494
+ pulumi.set(self, "plugin_version", value)
495
+
496
+ @_builtins.property
497
+ @pulumi.getter(name="rootPasswordTtl")
498
+ def root_password_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
499
+ """
500
+ The TTL in seconds of the root password in Azure when rotate-root generates a new client secret
501
+ """
502
+ return pulumi.get(self, "root_password_ttl")
503
+
504
+ @root_password_ttl.setter
505
+ def root_password_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
506
+ pulumi.set(self, "root_password_ttl", value)
507
+
508
+ @_builtins.property
268
509
  @pulumi.getter(name="rotationPeriod")
269
- def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
510
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
270
511
  """
271
512
  The amount of time in seconds Vault should wait before rotating the root credential.
272
513
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -275,12 +516,12 @@ class BackendArgs:
275
516
  return pulumi.get(self, "rotation_period")
276
517
 
277
518
  @rotation_period.setter
278
- def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
519
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
279
520
  pulumi.set(self, "rotation_period", value)
280
521
 
281
- @property
522
+ @_builtins.property
282
523
  @pulumi.getter(name="rotationSchedule")
283
- def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
524
+ def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
284
525
  """
285
526
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
286
527
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
@@ -289,12 +530,12 @@ class BackendArgs:
289
530
  return pulumi.get(self, "rotation_schedule")
290
531
 
291
532
  @rotation_schedule.setter
292
- def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
533
+ def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
293
534
  pulumi.set(self, "rotation_schedule", value)
294
535
 
295
- @property
536
+ @_builtins.property
296
537
  @pulumi.getter(name="rotationWindow")
297
- def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
538
+ def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
298
539
  """
299
540
  The maximum amount of time in seconds allowed to complete
300
541
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -303,66 +544,125 @@ class BackendArgs:
303
544
  return pulumi.get(self, "rotation_window")
304
545
 
305
546
  @rotation_window.setter
306
- def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
547
+ def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
307
548
  pulumi.set(self, "rotation_window", value)
308
549
 
550
+ @_builtins.property
551
+ @pulumi.getter(name="sealWrap")
552
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
553
+ """
554
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
555
+ """
556
+ return pulumi.get(self, "seal_wrap")
557
+
558
+ @seal_wrap.setter
559
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
560
+ pulumi.set(self, "seal_wrap", value)
561
+
309
562
 
310
563
  @pulumi.input_type
311
564
  class _BackendState:
312
565
  def __init__(__self__, *,
313
- client_id: Optional[pulumi.Input[builtins.str]] = None,
314
- client_secret: Optional[pulumi.Input[builtins.str]] = None,
315
- description: Optional[pulumi.Input[builtins.str]] = None,
316
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
317
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
318
- environment: Optional[pulumi.Input[builtins.str]] = None,
319
- identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
320
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
321
- identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
322
- namespace: Optional[pulumi.Input[builtins.str]] = None,
323
- path: Optional[pulumi.Input[builtins.str]] = None,
324
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
325
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
326
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
327
- subscription_id: Optional[pulumi.Input[builtins.str]] = None,
328
- tenant_id: Optional[pulumi.Input[builtins.str]] = None):
566
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
567
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
568
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
569
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
570
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
571
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
572
+ client_secret: Optional[pulumi.Input[_builtins.str]] = None,
573
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
574
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
575
+ description: Optional[pulumi.Input[_builtins.str]] = None,
576
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
577
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
578
+ environment: Optional[pulumi.Input[_builtins.str]] = None,
579
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
580
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
581
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
582
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
583
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
584
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
585
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
586
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
587
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
588
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
589
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
590
+ path: Optional[pulumi.Input[_builtins.str]] = None,
591
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
592
+ root_password_ttl: Optional[pulumi.Input[_builtins.int]] = None,
593
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
594
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
595
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
596
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
597
+ subscription_id: Optional[pulumi.Input[_builtins.str]] = None,
598
+ tenant_id: Optional[pulumi.Input[_builtins.str]] = None):
329
599
  """
330
600
  Input properties used for looking up and filtering Backend resources.
331
- :param pulumi.Input[builtins.str] client_id: The OAuth2 client id to connect to Azure.
332
- :param pulumi.Input[builtins.str] client_secret: The OAuth2 client secret to connect to Azure.
333
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount for the backend.
334
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
601
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
602
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
603
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
604
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
605
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
606
+ :param pulumi.Input[_builtins.str] client_id: The OAuth2 client id to connect to Azure.
607
+ :param pulumi.Input[_builtins.str] client_secret: The OAuth2 client secret to connect to Azure.
608
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
609
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
610
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
611
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
335
612
  *Available only for Vault Enterprise*
336
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
613
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
337
614
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
338
- :param pulumi.Input[builtins.str] environment: The Azure environment.
339
- :param pulumi.Input[builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.17+.
340
- *Available only for Vault Enterprise*
341
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing identity tokens. Requires Vault 1.17+.
615
+ :param pulumi.Input[_builtins.str] environment: The Azure environment.
616
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
617
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
618
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.17+.
342
619
  *Available only for Vault Enterprise*
343
- :param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
620
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens.
621
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
344
622
  *Available only for Vault Enterprise*
345
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
623
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
624
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
625
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
626
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
346
627
  The value should not contain leading or trailing forward slashes.
347
628
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
348
629
  *Available only for Vault Enterprise*.
349
- :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Defaults to `azure`.
350
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
630
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
631
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
632
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Defaults to `azure`.
633
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
634
+ :param pulumi.Input[_builtins.int] root_password_ttl: The TTL in seconds of the root password in Azure when rotate-root generates a new client secret
635
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
351
636
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
352
637
  *Available only for Vault Enterprise*
353
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
638
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
354
639
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
355
640
  *Available only for Vault Enterprise*
356
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
641
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
357
642
  a rotation when a scheduled token rotation occurs. The default rotation window is
358
643
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*
359
- :param pulumi.Input[builtins.str] subscription_id: The subscription id for the Azure Active Directory.
360
- :param pulumi.Input[builtins.str] tenant_id: The tenant id for the Azure Active Directory.
361
- """
644
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
645
+ :param pulumi.Input[_builtins.str] subscription_id: The subscription id for the Azure Active Directory.
646
+ :param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory.
647
+ """
648
+ if accessor is not None:
649
+ pulumi.set(__self__, "accessor", accessor)
650
+ if allowed_managed_keys is not None:
651
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
652
+ if allowed_response_headers is not None:
653
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
654
+ if audit_non_hmac_request_keys is not None:
655
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
656
+ if audit_non_hmac_response_keys is not None:
657
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
362
658
  if client_id is not None:
363
659
  pulumi.set(__self__, "client_id", client_id)
364
660
  if client_secret is not None:
365
661
  pulumi.set(__self__, "client_secret", client_secret)
662
+ if default_lease_ttl_seconds is not None:
663
+ pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
664
+ if delegated_auth_accessors is not None:
665
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
366
666
  if description is not None:
367
667
  pulumi.set(__self__, "description", description)
368
668
  if disable_automated_rotation is not None:
@@ -371,66 +671,170 @@ class _BackendState:
371
671
  pulumi.set(__self__, "disable_remount", disable_remount)
372
672
  if environment is not None:
373
673
  pulumi.set(__self__, "environment", environment)
674
+ if external_entropy_access is not None:
675
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
676
+ if force_no_cache is not None:
677
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
374
678
  if identity_token_audience is not None:
375
679
  pulumi.set(__self__, "identity_token_audience", identity_token_audience)
376
680
  if identity_token_key is not None:
377
681
  pulumi.set(__self__, "identity_token_key", identity_token_key)
378
682
  if identity_token_ttl is not None:
379
683
  pulumi.set(__self__, "identity_token_ttl", identity_token_ttl)
684
+ if listing_visibility is not None:
685
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
686
+ if local is not None:
687
+ pulumi.set(__self__, "local", local)
688
+ if max_lease_ttl_seconds is not None:
689
+ pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
380
690
  if namespace is not None:
381
691
  pulumi.set(__self__, "namespace", namespace)
692
+ if options is not None:
693
+ pulumi.set(__self__, "options", options)
694
+ if passthrough_request_headers is not None:
695
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
382
696
  if path is not None:
383
697
  pulumi.set(__self__, "path", path)
698
+ if plugin_version is not None:
699
+ pulumi.set(__self__, "plugin_version", plugin_version)
700
+ if root_password_ttl is not None:
701
+ pulumi.set(__self__, "root_password_ttl", root_password_ttl)
384
702
  if rotation_period is not None:
385
703
  pulumi.set(__self__, "rotation_period", rotation_period)
386
704
  if rotation_schedule is not None:
387
705
  pulumi.set(__self__, "rotation_schedule", rotation_schedule)
388
706
  if rotation_window is not None:
389
707
  pulumi.set(__self__, "rotation_window", rotation_window)
708
+ if seal_wrap is not None:
709
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
390
710
  if subscription_id is not None:
391
711
  pulumi.set(__self__, "subscription_id", subscription_id)
392
712
  if tenant_id is not None:
393
713
  pulumi.set(__self__, "tenant_id", tenant_id)
394
714
 
395
- @property
715
+ @_builtins.property
716
+ @pulumi.getter
717
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
718
+ """
719
+ Accessor of the mount
720
+ """
721
+ return pulumi.get(self, "accessor")
722
+
723
+ @accessor.setter
724
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
725
+ pulumi.set(self, "accessor", value)
726
+
727
+ @_builtins.property
728
+ @pulumi.getter(name="allowedManagedKeys")
729
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
730
+ """
731
+ List of managed key registry entry names that the mount in question is allowed to access
732
+ """
733
+ return pulumi.get(self, "allowed_managed_keys")
734
+
735
+ @allowed_managed_keys.setter
736
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
737
+ pulumi.set(self, "allowed_managed_keys", value)
738
+
739
+ @_builtins.property
740
+ @pulumi.getter(name="allowedResponseHeaders")
741
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
742
+ """
743
+ List of headers to allow and pass from the request to the plugin
744
+ """
745
+ return pulumi.get(self, "allowed_response_headers")
746
+
747
+ @allowed_response_headers.setter
748
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
749
+ pulumi.set(self, "allowed_response_headers", value)
750
+
751
+ @_builtins.property
752
+ @pulumi.getter(name="auditNonHmacRequestKeys")
753
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
754
+ """
755
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
756
+ """
757
+ return pulumi.get(self, "audit_non_hmac_request_keys")
758
+
759
+ @audit_non_hmac_request_keys.setter
760
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
761
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
762
+
763
+ @_builtins.property
764
+ @pulumi.getter(name="auditNonHmacResponseKeys")
765
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
766
+ """
767
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
768
+ """
769
+ return pulumi.get(self, "audit_non_hmac_response_keys")
770
+
771
+ @audit_non_hmac_response_keys.setter
772
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
773
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
774
+
775
+ @_builtins.property
396
776
  @pulumi.getter(name="clientId")
397
- def client_id(self) -> Optional[pulumi.Input[builtins.str]]:
777
+ def client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
398
778
  """
399
779
  The OAuth2 client id to connect to Azure.
400
780
  """
401
781
  return pulumi.get(self, "client_id")
402
782
 
403
783
  @client_id.setter
404
- def client_id(self, value: Optional[pulumi.Input[builtins.str]]):
784
+ def client_id(self, value: Optional[pulumi.Input[_builtins.str]]):
405
785
  pulumi.set(self, "client_id", value)
406
786
 
407
- @property
787
+ @_builtins.property
408
788
  @pulumi.getter(name="clientSecret")
409
- def client_secret(self) -> Optional[pulumi.Input[builtins.str]]:
789
+ def client_secret(self) -> Optional[pulumi.Input[_builtins.str]]:
410
790
  """
411
791
  The OAuth2 client secret to connect to Azure.
412
792
  """
413
793
  return pulumi.get(self, "client_secret")
414
794
 
415
795
  @client_secret.setter
416
- def client_secret(self, value: Optional[pulumi.Input[builtins.str]]):
796
+ def client_secret(self, value: Optional[pulumi.Input[_builtins.str]]):
417
797
  pulumi.set(self, "client_secret", value)
418
798
 
419
- @property
799
+ @_builtins.property
800
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
801
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
802
+ """
803
+ Default lease duration for tokens and secrets in seconds
804
+ """
805
+ return pulumi.get(self, "default_lease_ttl_seconds")
806
+
807
+ @default_lease_ttl_seconds.setter
808
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
809
+ pulumi.set(self, "default_lease_ttl_seconds", value)
810
+
811
+ @_builtins.property
812
+ @pulumi.getter(name="delegatedAuthAccessors")
813
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
814
+ """
815
+ List of headers to allow and pass from the request to the plugin
816
+ """
817
+ return pulumi.get(self, "delegated_auth_accessors")
818
+
819
+ @delegated_auth_accessors.setter
820
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
821
+ pulumi.set(self, "delegated_auth_accessors", value)
822
+
823
+ @_builtins.property
420
824
  @pulumi.getter
421
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
825
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
422
826
  """
423
827
  Human-friendly description of the mount for the backend.
424
828
  """
425
829
  return pulumi.get(self, "description")
426
830
 
427
831
  @description.setter
428
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
832
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
429
833
  pulumi.set(self, "description", value)
430
834
 
431
- @property
835
+ @_builtins.property
432
836
  @pulumi.getter(name="disableAutomatedRotation")
433
- def disable_automated_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
837
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
434
838
  """
435
839
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
436
840
  *Available only for Vault Enterprise*
@@ -438,12 +842,12 @@ class _BackendState:
438
842
  return pulumi.get(self, "disable_automated_rotation")
439
843
 
440
844
  @disable_automated_rotation.setter
441
- def disable_automated_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
845
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
442
846
  pulumi.set(self, "disable_automated_rotation", value)
443
847
 
444
- @property
848
+ @_builtins.property
445
849
  @pulumi.getter(name="disableRemount")
446
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
850
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
447
851
  """
448
852
  If set, opts out of mount migration on path updates.
449
853
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -451,24 +855,48 @@ class _BackendState:
451
855
  return pulumi.get(self, "disable_remount")
452
856
 
453
857
  @disable_remount.setter
454
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
858
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
455
859
  pulumi.set(self, "disable_remount", value)
456
860
 
457
- @property
861
+ @_builtins.property
458
862
  @pulumi.getter
459
- def environment(self) -> Optional[pulumi.Input[builtins.str]]:
863
+ def environment(self) -> Optional[pulumi.Input[_builtins.str]]:
460
864
  """
461
865
  The Azure environment.
462
866
  """
463
867
  return pulumi.get(self, "environment")
464
868
 
465
869
  @environment.setter
466
- def environment(self, value: Optional[pulumi.Input[builtins.str]]):
870
+ def environment(self, value: Optional[pulumi.Input[_builtins.str]]):
467
871
  pulumi.set(self, "environment", value)
468
872
 
469
- @property
873
+ @_builtins.property
874
+ @pulumi.getter(name="externalEntropyAccess")
875
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
876
+ """
877
+ Enable the secrets engine to access Vault's external entropy source
878
+ """
879
+ return pulumi.get(self, "external_entropy_access")
880
+
881
+ @external_entropy_access.setter
882
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
883
+ pulumi.set(self, "external_entropy_access", value)
884
+
885
+ @_builtins.property
886
+ @pulumi.getter(name="forceNoCache")
887
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
888
+ """
889
+ If set to true, disables caching.
890
+ """
891
+ return pulumi.get(self, "force_no_cache")
892
+
893
+ @force_no_cache.setter
894
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
895
+ pulumi.set(self, "force_no_cache", value)
896
+
897
+ @_builtins.property
470
898
  @pulumi.getter(name="identityTokenAudience")
471
- def identity_token_audience(self) -> Optional[pulumi.Input[builtins.str]]:
899
+ def identity_token_audience(self) -> Optional[pulumi.Input[_builtins.str]]:
472
900
  """
473
901
  The audience claim value. Requires Vault 1.17+.
474
902
  *Available only for Vault Enterprise*
@@ -476,25 +904,24 @@ class _BackendState:
476
904
  return pulumi.get(self, "identity_token_audience")
477
905
 
478
906
  @identity_token_audience.setter
479
- def identity_token_audience(self, value: Optional[pulumi.Input[builtins.str]]):
907
+ def identity_token_audience(self, value: Optional[pulumi.Input[_builtins.str]]):
480
908
  pulumi.set(self, "identity_token_audience", value)
481
909
 
482
- @property
910
+ @_builtins.property
483
911
  @pulumi.getter(name="identityTokenKey")
484
- def identity_token_key(self) -> Optional[pulumi.Input[builtins.str]]:
912
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
485
913
  """
486
- The key to use for signing identity tokens. Requires Vault 1.17+.
487
- *Available only for Vault Enterprise*
914
+ The key to use for signing identity tokens.
488
915
  """
489
916
  return pulumi.get(self, "identity_token_key")
490
917
 
491
918
  @identity_token_key.setter
492
- def identity_token_key(self, value: Optional[pulumi.Input[builtins.str]]):
919
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
493
920
  pulumi.set(self, "identity_token_key", value)
494
921
 
495
- @property
922
+ @_builtins.property
496
923
  @pulumi.getter(name="identityTokenTtl")
497
- def identity_token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
924
+ def identity_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
498
925
  """
499
926
  The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
500
927
  *Available only for Vault Enterprise*
@@ -502,12 +929,48 @@ class _BackendState:
502
929
  return pulumi.get(self, "identity_token_ttl")
503
930
 
504
931
  @identity_token_ttl.setter
505
- def identity_token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
932
+ def identity_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
506
933
  pulumi.set(self, "identity_token_ttl", value)
507
934
 
508
- @property
935
+ @_builtins.property
936
+ @pulumi.getter(name="listingVisibility")
937
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
938
+ """
939
+ Specifies whether to show this mount in the UI-specific listing endpoint
940
+ """
941
+ return pulumi.get(self, "listing_visibility")
942
+
943
+ @listing_visibility.setter
944
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
945
+ pulumi.set(self, "listing_visibility", value)
946
+
947
+ @_builtins.property
509
948
  @pulumi.getter
510
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
949
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
950
+ """
951
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
952
+ """
953
+ return pulumi.get(self, "local")
954
+
955
+ @local.setter
956
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
957
+ pulumi.set(self, "local", value)
958
+
959
+ @_builtins.property
960
+ @pulumi.getter(name="maxLeaseTtlSeconds")
961
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
962
+ """
963
+ Maximum possible lease duration for tokens and secrets in seconds
964
+ """
965
+ return pulumi.get(self, "max_lease_ttl_seconds")
966
+
967
+ @max_lease_ttl_seconds.setter
968
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
969
+ pulumi.set(self, "max_lease_ttl_seconds", value)
970
+
971
+ @_builtins.property
972
+ @pulumi.getter
973
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
511
974
  """
512
975
  The namespace to provision the resource in.
513
976
  The value should not contain leading or trailing forward slashes.
@@ -517,24 +980,72 @@ class _BackendState:
517
980
  return pulumi.get(self, "namespace")
518
981
 
519
982
  @namespace.setter
520
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
983
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
521
984
  pulumi.set(self, "namespace", value)
522
985
 
523
- @property
986
+ @_builtins.property
987
+ @pulumi.getter
988
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
989
+ """
990
+ Specifies mount type specific options that are passed to the backend
991
+ """
992
+ return pulumi.get(self, "options")
993
+
994
+ @options.setter
995
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
996
+ pulumi.set(self, "options", value)
997
+
998
+ @_builtins.property
999
+ @pulumi.getter(name="passthroughRequestHeaders")
1000
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
1001
+ """
1002
+ List of headers to allow and pass from the request to the plugin
1003
+ """
1004
+ return pulumi.get(self, "passthrough_request_headers")
1005
+
1006
+ @passthrough_request_headers.setter
1007
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
1008
+ pulumi.set(self, "passthrough_request_headers", value)
1009
+
1010
+ @_builtins.property
524
1011
  @pulumi.getter
525
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
1012
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
526
1013
  """
527
1014
  The unique path this backend should be mounted at. Defaults to `azure`.
528
1015
  """
529
1016
  return pulumi.get(self, "path")
530
1017
 
531
1018
  @path.setter
532
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
1019
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
533
1020
  pulumi.set(self, "path", value)
534
1021
 
535
- @property
1022
+ @_builtins.property
1023
+ @pulumi.getter(name="pluginVersion")
1024
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
1025
+ """
1026
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1027
+ """
1028
+ return pulumi.get(self, "plugin_version")
1029
+
1030
+ @plugin_version.setter
1031
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
1032
+ pulumi.set(self, "plugin_version", value)
1033
+
1034
+ @_builtins.property
1035
+ @pulumi.getter(name="rootPasswordTtl")
1036
+ def root_password_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
1037
+ """
1038
+ The TTL in seconds of the root password in Azure when rotate-root generates a new client secret
1039
+ """
1040
+ return pulumi.get(self, "root_password_ttl")
1041
+
1042
+ @root_password_ttl.setter
1043
+ def root_password_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
1044
+ pulumi.set(self, "root_password_ttl", value)
1045
+
1046
+ @_builtins.property
536
1047
  @pulumi.getter(name="rotationPeriod")
537
- def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
1048
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
538
1049
  """
539
1050
  The amount of time in seconds Vault should wait before rotating the root credential.
540
1051
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -543,12 +1054,12 @@ class _BackendState:
543
1054
  return pulumi.get(self, "rotation_period")
544
1055
 
545
1056
  @rotation_period.setter
546
- def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
1057
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
547
1058
  pulumi.set(self, "rotation_period", value)
548
1059
 
549
- @property
1060
+ @_builtins.property
550
1061
  @pulumi.getter(name="rotationSchedule")
551
- def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
1062
+ def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
552
1063
  """
553
1064
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
554
1065
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
@@ -557,12 +1068,12 @@ class _BackendState:
557
1068
  return pulumi.get(self, "rotation_schedule")
558
1069
 
559
1070
  @rotation_schedule.setter
560
- def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
1071
+ def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
561
1072
  pulumi.set(self, "rotation_schedule", value)
562
1073
 
563
- @property
1074
+ @_builtins.property
564
1075
  @pulumi.getter(name="rotationWindow")
565
- def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
1076
+ def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
566
1077
  """
567
1078
  The maximum amount of time in seconds allowed to complete
568
1079
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -571,31 +1082,43 @@ class _BackendState:
571
1082
  return pulumi.get(self, "rotation_window")
572
1083
 
573
1084
  @rotation_window.setter
574
- def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
1085
+ def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
575
1086
  pulumi.set(self, "rotation_window", value)
576
1087
 
577
- @property
1088
+ @_builtins.property
1089
+ @pulumi.getter(name="sealWrap")
1090
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
1091
+ """
1092
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1093
+ """
1094
+ return pulumi.get(self, "seal_wrap")
1095
+
1096
+ @seal_wrap.setter
1097
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
1098
+ pulumi.set(self, "seal_wrap", value)
1099
+
1100
+ @_builtins.property
578
1101
  @pulumi.getter(name="subscriptionId")
579
- def subscription_id(self) -> Optional[pulumi.Input[builtins.str]]:
1102
+ def subscription_id(self) -> Optional[pulumi.Input[_builtins.str]]:
580
1103
  """
581
1104
  The subscription id for the Azure Active Directory.
582
1105
  """
583
1106
  return pulumi.get(self, "subscription_id")
584
1107
 
585
1108
  @subscription_id.setter
586
- def subscription_id(self, value: Optional[pulumi.Input[builtins.str]]):
1109
+ def subscription_id(self, value: Optional[pulumi.Input[_builtins.str]]):
587
1110
  pulumi.set(self, "subscription_id", value)
588
1111
 
589
- @property
1112
+ @_builtins.property
590
1113
  @pulumi.getter(name="tenantId")
591
- def tenant_id(self) -> Optional[pulumi.Input[builtins.str]]:
1114
+ def tenant_id(self) -> Optional[pulumi.Input[_builtins.str]]:
592
1115
  """
593
1116
  The tenant id for the Azure Active Directory.
594
1117
  """
595
1118
  return pulumi.get(self, "tenant_id")
596
1119
 
597
1120
  @tenant_id.setter
598
- def tenant_id(self, value: Optional[pulumi.Input[builtins.str]]):
1121
+ def tenant_id(self, value: Optional[pulumi.Input[_builtins.str]]):
599
1122
  pulumi.set(self, "tenant_id", value)
600
1123
 
601
1124
 
@@ -605,22 +1128,38 @@ class Backend(pulumi.CustomResource):
605
1128
  def __init__(__self__,
606
1129
  resource_name: str,
607
1130
  opts: Optional[pulumi.ResourceOptions] = None,
608
- client_id: Optional[pulumi.Input[builtins.str]] = None,
609
- client_secret: Optional[pulumi.Input[builtins.str]] = None,
610
- description: Optional[pulumi.Input[builtins.str]] = None,
611
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
612
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
613
- environment: Optional[pulumi.Input[builtins.str]] = None,
614
- identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
615
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
616
- identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
617
- namespace: Optional[pulumi.Input[builtins.str]] = None,
618
- path: Optional[pulumi.Input[builtins.str]] = None,
619
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
620
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
621
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
622
- subscription_id: Optional[pulumi.Input[builtins.str]] = None,
623
- tenant_id: Optional[pulumi.Input[builtins.str]] = None,
1131
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1132
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1133
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1134
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1135
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
1136
+ client_secret: Optional[pulumi.Input[_builtins.str]] = None,
1137
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1138
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1139
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1140
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
1141
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1142
+ environment: Optional[pulumi.Input[_builtins.str]] = None,
1143
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1144
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1145
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
1146
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1147
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1148
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1149
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1150
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1151
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1152
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1153
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1154
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1155
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1156
+ root_password_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1157
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
1158
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
1159
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
1160
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1161
+ subscription_id: Optional[pulumi.Input[_builtins.str]] = None,
1162
+ tenant_id: Optional[pulumi.Input[_builtins.str]] = None,
624
1163
  __props__=None):
625
1164
  """
626
1165
  ## Example Usage
@@ -658,36 +1197,51 @@ class Backend(pulumi.CustomResource):
658
1197
 
659
1198
  :param str resource_name: The name of the resource.
660
1199
  :param pulumi.ResourceOptions opts: Options for the resource.
661
- :param pulumi.Input[builtins.str] client_id: The OAuth2 client id to connect to Azure.
662
- :param pulumi.Input[builtins.str] client_secret: The OAuth2 client secret to connect to Azure.
663
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount for the backend.
664
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1200
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1201
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1202
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1203
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1204
+ :param pulumi.Input[_builtins.str] client_id: The OAuth2 client id to connect to Azure.
1205
+ :param pulumi.Input[_builtins.str] client_secret: The OAuth2 client secret to connect to Azure.
1206
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
1207
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1208
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
1209
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
665
1210
  *Available only for Vault Enterprise*
666
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1211
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
667
1212
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
668
- :param pulumi.Input[builtins.str] environment: The Azure environment.
669
- :param pulumi.Input[builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.17+.
670
- *Available only for Vault Enterprise*
671
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing identity tokens. Requires Vault 1.17+.
1213
+ :param pulumi.Input[_builtins.str] environment: The Azure environment.
1214
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1215
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1216
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.17+.
672
1217
  *Available only for Vault Enterprise*
673
- :param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
1218
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens.
1219
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
674
1220
  *Available only for Vault Enterprise*
675
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
1221
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1222
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1223
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
1224
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
676
1225
  The value should not contain leading or trailing forward slashes.
677
1226
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
678
1227
  *Available only for Vault Enterprise*.
679
- :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Defaults to `azure`.
680
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
1228
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1229
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1230
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Defaults to `azure`.
1231
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1232
+ :param pulumi.Input[_builtins.int] root_password_ttl: The TTL in seconds of the root password in Azure when rotate-root generates a new client secret
1233
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
681
1234
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
682
1235
  *Available only for Vault Enterprise*
683
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1236
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
684
1237
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
685
1238
  *Available only for Vault Enterprise*
686
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
1239
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
687
1240
  a rotation when a scheduled token rotation occurs. The default rotation window is
688
1241
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*
689
- :param pulumi.Input[builtins.str] subscription_id: The subscription id for the Azure Active Directory.
690
- :param pulumi.Input[builtins.str] tenant_id: The tenant id for the Azure Active Directory.
1242
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1243
+ :param pulumi.Input[_builtins.str] subscription_id: The subscription id for the Azure Active Directory.
1244
+ :param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory.
691
1245
  """
692
1246
  ...
693
1247
  @overload
@@ -744,22 +1298,38 @@ class Backend(pulumi.CustomResource):
744
1298
  def _internal_init(__self__,
745
1299
  resource_name: str,
746
1300
  opts: Optional[pulumi.ResourceOptions] = None,
747
- client_id: Optional[pulumi.Input[builtins.str]] = None,
748
- client_secret: Optional[pulumi.Input[builtins.str]] = None,
749
- description: Optional[pulumi.Input[builtins.str]] = None,
750
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
751
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
752
- environment: Optional[pulumi.Input[builtins.str]] = None,
753
- identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
754
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
755
- identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
756
- namespace: Optional[pulumi.Input[builtins.str]] = None,
757
- path: Optional[pulumi.Input[builtins.str]] = None,
758
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
759
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
760
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
761
- subscription_id: Optional[pulumi.Input[builtins.str]] = None,
762
- tenant_id: Optional[pulumi.Input[builtins.str]] = None,
1301
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1302
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1303
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1304
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1305
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
1306
+ client_secret: Optional[pulumi.Input[_builtins.str]] = None,
1307
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1308
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1309
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1310
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
1311
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1312
+ environment: Optional[pulumi.Input[_builtins.str]] = None,
1313
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1314
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1315
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
1316
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1317
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1318
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1319
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1320
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1321
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1322
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1323
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1324
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1325
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1326
+ root_password_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1327
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
1328
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
1329
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
1330
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1331
+ subscription_id: Optional[pulumi.Input[_builtins.str]] = None,
1332
+ tenant_id: Optional[pulumi.Input[_builtins.str]] = None,
763
1333
  __props__=None):
764
1334
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
765
1335
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -769,26 +1339,43 @@ class Backend(pulumi.CustomResource):
769
1339
  raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
770
1340
  __props__ = BackendArgs.__new__(BackendArgs)
771
1341
 
1342
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1343
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1344
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1345
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
772
1346
  __props__.__dict__["client_id"] = None if client_id is None else pulumi.Output.secret(client_id)
773
1347
  __props__.__dict__["client_secret"] = None if client_secret is None else pulumi.Output.secret(client_secret)
1348
+ __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1349
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
774
1350
  __props__.__dict__["description"] = description
775
1351
  __props__.__dict__["disable_automated_rotation"] = disable_automated_rotation
776
1352
  __props__.__dict__["disable_remount"] = disable_remount
777
1353
  __props__.__dict__["environment"] = environment
1354
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1355
+ __props__.__dict__["force_no_cache"] = force_no_cache
778
1356
  __props__.__dict__["identity_token_audience"] = identity_token_audience
779
1357
  __props__.__dict__["identity_token_key"] = identity_token_key
780
1358
  __props__.__dict__["identity_token_ttl"] = identity_token_ttl
1359
+ __props__.__dict__["listing_visibility"] = listing_visibility
1360
+ __props__.__dict__["local"] = local
1361
+ __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
781
1362
  __props__.__dict__["namespace"] = namespace
1363
+ __props__.__dict__["options"] = options
1364
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
782
1365
  __props__.__dict__["path"] = path
1366
+ __props__.__dict__["plugin_version"] = plugin_version
1367
+ __props__.__dict__["root_password_ttl"] = root_password_ttl
783
1368
  __props__.__dict__["rotation_period"] = rotation_period
784
1369
  __props__.__dict__["rotation_schedule"] = rotation_schedule
785
1370
  __props__.__dict__["rotation_window"] = rotation_window
1371
+ __props__.__dict__["seal_wrap"] = seal_wrap
786
1372
  if subscription_id is None and not opts.urn:
787
1373
  raise TypeError("Missing required property 'subscription_id'")
788
1374
  __props__.__dict__["subscription_id"] = None if subscription_id is None else pulumi.Output.secret(subscription_id)
789
1375
  if tenant_id is None and not opts.urn:
790
1376
  raise TypeError("Missing required property 'tenant_id'")
791
1377
  __props__.__dict__["tenant_id"] = None if tenant_id is None else pulumi.Output.secret(tenant_id)
1378
+ __props__.__dict__["accessor"] = None
792
1379
  secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["clientId", "clientSecret", "subscriptionId", "tenantId"])
793
1380
  opts = pulumi.ResourceOptions.merge(opts, secret_opts)
794
1381
  super(Backend, __self__).__init__(
@@ -801,22 +1388,39 @@ class Backend(pulumi.CustomResource):
801
1388
  def get(resource_name: str,
802
1389
  id: pulumi.Input[str],
803
1390
  opts: Optional[pulumi.ResourceOptions] = None,
804
- client_id: Optional[pulumi.Input[builtins.str]] = None,
805
- client_secret: Optional[pulumi.Input[builtins.str]] = None,
806
- description: Optional[pulumi.Input[builtins.str]] = None,
807
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
808
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
809
- environment: Optional[pulumi.Input[builtins.str]] = None,
810
- identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
811
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
812
- identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
813
- namespace: Optional[pulumi.Input[builtins.str]] = None,
814
- path: Optional[pulumi.Input[builtins.str]] = None,
815
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
816
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
817
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
818
- subscription_id: Optional[pulumi.Input[builtins.str]] = None,
819
- tenant_id: Optional[pulumi.Input[builtins.str]] = None) -> 'Backend':
1391
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
1392
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1393
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1394
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1395
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1396
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
1397
+ client_secret: Optional[pulumi.Input[_builtins.str]] = None,
1398
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1399
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1400
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1401
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
1402
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1403
+ environment: Optional[pulumi.Input[_builtins.str]] = None,
1404
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1405
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1406
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
1407
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1408
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1409
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1410
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1411
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1412
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1413
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1414
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1415
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1416
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1417
+ root_password_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1418
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
1419
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
1420
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
1421
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1422
+ subscription_id: Optional[pulumi.Input[_builtins.str]] = None,
1423
+ tenant_id: Optional[pulumi.Input[_builtins.str]] = None) -> 'Backend':
820
1424
  """
821
1425
  Get an existing Backend resource's state with the given name, id, and optional extra
822
1426
  properties used to qualify the lookup.
@@ -824,139 +1428,267 @@ class Backend(pulumi.CustomResource):
824
1428
  :param str resource_name: The unique name of the resulting resource.
825
1429
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
826
1430
  :param pulumi.ResourceOptions opts: Options for the resource.
827
- :param pulumi.Input[builtins.str] client_id: The OAuth2 client id to connect to Azure.
828
- :param pulumi.Input[builtins.str] client_secret: The OAuth2 client secret to connect to Azure.
829
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount for the backend.
830
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1431
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
1432
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1433
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1434
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1435
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1436
+ :param pulumi.Input[_builtins.str] client_id: The OAuth2 client id to connect to Azure.
1437
+ :param pulumi.Input[_builtins.str] client_secret: The OAuth2 client secret to connect to Azure.
1438
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
1439
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1440
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
1441
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
831
1442
  *Available only for Vault Enterprise*
832
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1443
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
833
1444
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
834
- :param pulumi.Input[builtins.str] environment: The Azure environment.
835
- :param pulumi.Input[builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.17+.
836
- *Available only for Vault Enterprise*
837
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing identity tokens. Requires Vault 1.17+.
1445
+ :param pulumi.Input[_builtins.str] environment: The Azure environment.
1446
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1447
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1448
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.17+.
838
1449
  *Available only for Vault Enterprise*
839
- :param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
1450
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens.
1451
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
840
1452
  *Available only for Vault Enterprise*
841
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
1453
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1454
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1455
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
1456
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
842
1457
  The value should not contain leading or trailing forward slashes.
843
1458
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
844
1459
  *Available only for Vault Enterprise*.
845
- :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Defaults to `azure`.
846
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
1460
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1461
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1462
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Defaults to `azure`.
1463
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1464
+ :param pulumi.Input[_builtins.int] root_password_ttl: The TTL in seconds of the root password in Azure when rotate-root generates a new client secret
1465
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
847
1466
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
848
1467
  *Available only for Vault Enterprise*
849
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1468
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
850
1469
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
851
1470
  *Available only for Vault Enterprise*
852
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
1471
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
853
1472
  a rotation when a scheduled token rotation occurs. The default rotation window is
854
1473
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*
855
- :param pulumi.Input[builtins.str] subscription_id: The subscription id for the Azure Active Directory.
856
- :param pulumi.Input[builtins.str] tenant_id: The tenant id for the Azure Active Directory.
1474
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1475
+ :param pulumi.Input[_builtins.str] subscription_id: The subscription id for the Azure Active Directory.
1476
+ :param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory.
857
1477
  """
858
1478
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
859
1479
 
860
1480
  __props__ = _BackendState.__new__(_BackendState)
861
1481
 
1482
+ __props__.__dict__["accessor"] = accessor
1483
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1484
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1485
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1486
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
862
1487
  __props__.__dict__["client_id"] = client_id
863
1488
  __props__.__dict__["client_secret"] = client_secret
1489
+ __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1490
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
864
1491
  __props__.__dict__["description"] = description
865
1492
  __props__.__dict__["disable_automated_rotation"] = disable_automated_rotation
866
1493
  __props__.__dict__["disable_remount"] = disable_remount
867
1494
  __props__.__dict__["environment"] = environment
1495
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1496
+ __props__.__dict__["force_no_cache"] = force_no_cache
868
1497
  __props__.__dict__["identity_token_audience"] = identity_token_audience
869
1498
  __props__.__dict__["identity_token_key"] = identity_token_key
870
1499
  __props__.__dict__["identity_token_ttl"] = identity_token_ttl
1500
+ __props__.__dict__["listing_visibility"] = listing_visibility
1501
+ __props__.__dict__["local"] = local
1502
+ __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
871
1503
  __props__.__dict__["namespace"] = namespace
1504
+ __props__.__dict__["options"] = options
1505
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
872
1506
  __props__.__dict__["path"] = path
1507
+ __props__.__dict__["plugin_version"] = plugin_version
1508
+ __props__.__dict__["root_password_ttl"] = root_password_ttl
873
1509
  __props__.__dict__["rotation_period"] = rotation_period
874
1510
  __props__.__dict__["rotation_schedule"] = rotation_schedule
875
1511
  __props__.__dict__["rotation_window"] = rotation_window
1512
+ __props__.__dict__["seal_wrap"] = seal_wrap
876
1513
  __props__.__dict__["subscription_id"] = subscription_id
877
1514
  __props__.__dict__["tenant_id"] = tenant_id
878
1515
  return Backend(resource_name, opts=opts, __props__=__props__)
879
1516
 
880
- @property
1517
+ @_builtins.property
1518
+ @pulumi.getter
1519
+ def accessor(self) -> pulumi.Output[_builtins.str]:
1520
+ """
1521
+ Accessor of the mount
1522
+ """
1523
+ return pulumi.get(self, "accessor")
1524
+
1525
+ @_builtins.property
1526
+ @pulumi.getter(name="allowedManagedKeys")
1527
+ def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1528
+ """
1529
+ List of managed key registry entry names that the mount in question is allowed to access
1530
+ """
1531
+ return pulumi.get(self, "allowed_managed_keys")
1532
+
1533
+ @_builtins.property
1534
+ @pulumi.getter(name="allowedResponseHeaders")
1535
+ def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1536
+ """
1537
+ List of headers to allow and pass from the request to the plugin
1538
+ """
1539
+ return pulumi.get(self, "allowed_response_headers")
1540
+
1541
+ @_builtins.property
1542
+ @pulumi.getter(name="auditNonHmacRequestKeys")
1543
+ def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1544
+ """
1545
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1546
+ """
1547
+ return pulumi.get(self, "audit_non_hmac_request_keys")
1548
+
1549
+ @_builtins.property
1550
+ @pulumi.getter(name="auditNonHmacResponseKeys")
1551
+ def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1552
+ """
1553
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1554
+ """
1555
+ return pulumi.get(self, "audit_non_hmac_response_keys")
1556
+
1557
+ @_builtins.property
881
1558
  @pulumi.getter(name="clientId")
882
- def client_id(self) -> pulumi.Output[Optional[builtins.str]]:
1559
+ def client_id(self) -> pulumi.Output[Optional[_builtins.str]]:
883
1560
  """
884
1561
  The OAuth2 client id to connect to Azure.
885
1562
  """
886
1563
  return pulumi.get(self, "client_id")
887
1564
 
888
- @property
1565
+ @_builtins.property
889
1566
  @pulumi.getter(name="clientSecret")
890
- def client_secret(self) -> pulumi.Output[Optional[builtins.str]]:
1567
+ def client_secret(self) -> pulumi.Output[Optional[_builtins.str]]:
891
1568
  """
892
1569
  The OAuth2 client secret to connect to Azure.
893
1570
  """
894
1571
  return pulumi.get(self, "client_secret")
895
1572
 
896
- @property
1573
+ @_builtins.property
1574
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
1575
+ def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1576
+ """
1577
+ Default lease duration for tokens and secrets in seconds
1578
+ """
1579
+ return pulumi.get(self, "default_lease_ttl_seconds")
1580
+
1581
+ @_builtins.property
1582
+ @pulumi.getter(name="delegatedAuthAccessors")
1583
+ def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1584
+ """
1585
+ List of headers to allow and pass from the request to the plugin
1586
+ """
1587
+ return pulumi.get(self, "delegated_auth_accessors")
1588
+
1589
+ @_builtins.property
897
1590
  @pulumi.getter
898
- def description(self) -> pulumi.Output[Optional[builtins.str]]:
1591
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
899
1592
  """
900
1593
  Human-friendly description of the mount for the backend.
901
1594
  """
902
1595
  return pulumi.get(self, "description")
903
1596
 
904
- @property
1597
+ @_builtins.property
905
1598
  @pulumi.getter(name="disableAutomatedRotation")
906
- def disable_automated_rotation(self) -> pulumi.Output[Optional[builtins.bool]]:
1599
+ def disable_automated_rotation(self) -> pulumi.Output[Optional[_builtins.bool]]:
907
1600
  """
908
1601
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
909
1602
  *Available only for Vault Enterprise*
910
1603
  """
911
1604
  return pulumi.get(self, "disable_automated_rotation")
912
1605
 
913
- @property
1606
+ @_builtins.property
914
1607
  @pulumi.getter(name="disableRemount")
915
- def disable_remount(self) -> pulumi.Output[Optional[builtins.bool]]:
1608
+ def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
916
1609
  """
917
1610
  If set, opts out of mount migration on path updates.
918
1611
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
919
1612
  """
920
1613
  return pulumi.get(self, "disable_remount")
921
1614
 
922
- @property
1615
+ @_builtins.property
923
1616
  @pulumi.getter
924
- def environment(self) -> pulumi.Output[Optional[builtins.str]]:
1617
+ def environment(self) -> pulumi.Output[Optional[_builtins.str]]:
925
1618
  """
926
1619
  The Azure environment.
927
1620
  """
928
1621
  return pulumi.get(self, "environment")
929
1622
 
930
- @property
1623
+ @_builtins.property
1624
+ @pulumi.getter(name="externalEntropyAccess")
1625
+ def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
1626
+ """
1627
+ Enable the secrets engine to access Vault's external entropy source
1628
+ """
1629
+ return pulumi.get(self, "external_entropy_access")
1630
+
1631
+ @_builtins.property
1632
+ @pulumi.getter(name="forceNoCache")
1633
+ def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
1634
+ """
1635
+ If set to true, disables caching.
1636
+ """
1637
+ return pulumi.get(self, "force_no_cache")
1638
+
1639
+ @_builtins.property
931
1640
  @pulumi.getter(name="identityTokenAudience")
932
- def identity_token_audience(self) -> pulumi.Output[Optional[builtins.str]]:
1641
+ def identity_token_audience(self) -> pulumi.Output[Optional[_builtins.str]]:
933
1642
  """
934
1643
  The audience claim value. Requires Vault 1.17+.
935
1644
  *Available only for Vault Enterprise*
936
1645
  """
937
1646
  return pulumi.get(self, "identity_token_audience")
938
1647
 
939
- @property
1648
+ @_builtins.property
940
1649
  @pulumi.getter(name="identityTokenKey")
941
- def identity_token_key(self) -> pulumi.Output[Optional[builtins.str]]:
1650
+ def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
942
1651
  """
943
- The key to use for signing identity tokens. Requires Vault 1.17+.
944
- *Available only for Vault Enterprise*
1652
+ The key to use for signing identity tokens.
945
1653
  """
946
1654
  return pulumi.get(self, "identity_token_key")
947
1655
 
948
- @property
1656
+ @_builtins.property
949
1657
  @pulumi.getter(name="identityTokenTtl")
950
- def identity_token_ttl(self) -> pulumi.Output[builtins.int]:
1658
+ def identity_token_ttl(self) -> pulumi.Output[_builtins.int]:
951
1659
  """
952
1660
  The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
953
1661
  *Available only for Vault Enterprise*
954
1662
  """
955
1663
  return pulumi.get(self, "identity_token_ttl")
956
1664
 
957
- @property
1665
+ @_builtins.property
1666
+ @pulumi.getter(name="listingVisibility")
1667
+ def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
1668
+ """
1669
+ Specifies whether to show this mount in the UI-specific listing endpoint
1670
+ """
1671
+ return pulumi.get(self, "listing_visibility")
1672
+
1673
+ @_builtins.property
1674
+ @pulumi.getter
1675
+ def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
1676
+ """
1677
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1678
+ """
1679
+ return pulumi.get(self, "local")
1680
+
1681
+ @_builtins.property
1682
+ @pulumi.getter(name="maxLeaseTtlSeconds")
1683
+ def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1684
+ """
1685
+ Maximum possible lease duration for tokens and secrets in seconds
1686
+ """
1687
+ return pulumi.get(self, "max_lease_ttl_seconds")
1688
+
1689
+ @_builtins.property
958
1690
  @pulumi.getter
959
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
1691
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
960
1692
  """
961
1693
  The namespace to provision the resource in.
962
1694
  The value should not contain leading or trailing forward slashes.
@@ -965,17 +1697,49 @@ class Backend(pulumi.CustomResource):
965
1697
  """
966
1698
  return pulumi.get(self, "namespace")
967
1699
 
968
- @property
1700
+ @_builtins.property
1701
+ @pulumi.getter
1702
+ def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
1703
+ """
1704
+ Specifies mount type specific options that are passed to the backend
1705
+ """
1706
+ return pulumi.get(self, "options")
1707
+
1708
+ @_builtins.property
1709
+ @pulumi.getter(name="passthroughRequestHeaders")
1710
+ def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1711
+ """
1712
+ List of headers to allow and pass from the request to the plugin
1713
+ """
1714
+ return pulumi.get(self, "passthrough_request_headers")
1715
+
1716
+ @_builtins.property
969
1717
  @pulumi.getter
970
- def path(self) -> pulumi.Output[Optional[builtins.str]]:
1718
+ def path(self) -> pulumi.Output[Optional[_builtins.str]]:
971
1719
  """
972
1720
  The unique path this backend should be mounted at. Defaults to `azure`.
973
1721
  """
974
1722
  return pulumi.get(self, "path")
975
1723
 
976
- @property
1724
+ @_builtins.property
1725
+ @pulumi.getter(name="pluginVersion")
1726
+ def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
1727
+ """
1728
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1729
+ """
1730
+ return pulumi.get(self, "plugin_version")
1731
+
1732
+ @_builtins.property
1733
+ @pulumi.getter(name="rootPasswordTtl")
1734
+ def root_password_ttl(self) -> pulumi.Output[_builtins.int]:
1735
+ """
1736
+ The TTL in seconds of the root password in Azure when rotate-root generates a new client secret
1737
+ """
1738
+ return pulumi.get(self, "root_password_ttl")
1739
+
1740
+ @_builtins.property
977
1741
  @pulumi.getter(name="rotationPeriod")
978
- def rotation_period(self) -> pulumi.Output[Optional[builtins.int]]:
1742
+ def rotation_period(self) -> pulumi.Output[Optional[_builtins.int]]:
979
1743
  """
980
1744
  The amount of time in seconds Vault should wait before rotating the root credential.
981
1745
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -983,9 +1747,9 @@ class Backend(pulumi.CustomResource):
983
1747
  """
984
1748
  return pulumi.get(self, "rotation_period")
985
1749
 
986
- @property
1750
+ @_builtins.property
987
1751
  @pulumi.getter(name="rotationSchedule")
988
- def rotation_schedule(self) -> pulumi.Output[Optional[builtins.str]]:
1752
+ def rotation_schedule(self) -> pulumi.Output[Optional[_builtins.str]]:
989
1753
  """
990
1754
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
991
1755
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
@@ -993,9 +1757,9 @@ class Backend(pulumi.CustomResource):
993
1757
  """
994
1758
  return pulumi.get(self, "rotation_schedule")
995
1759
 
996
- @property
1760
+ @_builtins.property
997
1761
  @pulumi.getter(name="rotationWindow")
998
- def rotation_window(self) -> pulumi.Output[Optional[builtins.int]]:
1762
+ def rotation_window(self) -> pulumi.Output[Optional[_builtins.int]]:
999
1763
  """
1000
1764
  The maximum amount of time in seconds allowed to complete
1001
1765
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -1003,17 +1767,25 @@ class Backend(pulumi.CustomResource):
1003
1767
  """
1004
1768
  return pulumi.get(self, "rotation_window")
1005
1769
 
1006
- @property
1770
+ @_builtins.property
1771
+ @pulumi.getter(name="sealWrap")
1772
+ def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
1773
+ """
1774
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1775
+ """
1776
+ return pulumi.get(self, "seal_wrap")
1777
+
1778
+ @_builtins.property
1007
1779
  @pulumi.getter(name="subscriptionId")
1008
- def subscription_id(self) -> pulumi.Output[builtins.str]:
1780
+ def subscription_id(self) -> pulumi.Output[_builtins.str]:
1009
1781
  """
1010
1782
  The subscription id for the Azure Active Directory.
1011
1783
  """
1012
1784
  return pulumi.get(self, "subscription_id")
1013
1785
 
1014
- @property
1786
+ @_builtins.property
1015
1787
  @pulumi.getter(name="tenantId")
1016
- def tenant_id(self) -> pulumi.Output[builtins.str]:
1788
+ def tenant_id(self) -> pulumi.Output[_builtins.str]:
1017
1789
  """
1018
1790
  The tenant id for the Azure Active Directory.
1019
1791
  """