pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (269) hide show
  1. pulumi_vault/__init__.py +19 -1
  2. pulumi_vault/_inputs.py +873 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +1016 -439
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +1057 -285
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +887 -256
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +426 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +878 -336
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +400 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +1006 -227
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +431 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +732 -693
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +380 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +909 -271
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/oci_auth_backend.py +683 -0
  168. pulumi_vault/oci_auth_backend_role.py +798 -0
  169. pulumi_vault/okta/__init__.py +1 -1
  170. pulumi_vault/okta/_inputs.py +31 -32
  171. pulumi_vault/okta/auth_backend.py +305 -306
  172. pulumi_vault/okta/auth_backend_group.py +69 -70
  173. pulumi_vault/okta/auth_backend_user.py +86 -87
  174. pulumi_vault/okta/outputs.py +21 -22
  175. pulumi_vault/outputs.py +234 -82
  176. pulumi_vault/pkisecret/__init__.py +1 -1
  177. pulumi_vault/pkisecret/_inputs.py +55 -56
  178. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  179. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  180. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  181. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  182. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  183. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  184. pulumi_vault/pkisecret/backend_config_scep.py +205 -159
  185. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  186. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  187. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  188. pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
  189. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  190. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  191. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  192. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  193. pulumi_vault/pkisecret/outputs.py +61 -62
  194. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  195. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  196. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  197. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  198. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  199. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  200. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  201. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  202. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  203. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  204. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  205. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  206. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  207. pulumi_vault/plugin.py +154 -155
  208. pulumi_vault/plugin_pinned_version.py +52 -53
  209. pulumi_vault/policy.py +52 -53
  210. pulumi_vault/provider.py +160 -161
  211. pulumi_vault/pulumi-plugin.json +1 -1
  212. pulumi_vault/quota_lease_count.py +103 -104
  213. pulumi_vault/quota_rate_limit.py +171 -172
  214. pulumi_vault/rabbitmq/__init__.py +1 -1
  215. pulumi_vault/rabbitmq/_inputs.py +50 -51
  216. pulumi_vault/rabbitmq/outputs.py +34 -35
  217. pulumi_vault/rabbitmq/secret_backend.py +902 -231
  218. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  219. pulumi_vault/raft_autopilot.py +137 -138
  220. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  221. pulumi_vault/rgp_policy.py +69 -70
  222. pulumi_vault/saml/__init__.py +1 -1
  223. pulumi_vault/saml/auth_backend.py +188 -189
  224. pulumi_vault/saml/auth_backend_role.py +290 -291
  225. pulumi_vault/scep_auth_backend_role.py +252 -253
  226. pulumi_vault/secrets/__init__.py +1 -1
  227. pulumi_vault/secrets/_inputs.py +19 -20
  228. pulumi_vault/secrets/outputs.py +13 -14
  229. pulumi_vault/secrets/sync_association.py +88 -89
  230. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  231. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  232. pulumi_vault/secrets/sync_config.py +52 -53
  233. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  234. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  235. pulumi_vault/secrets/sync_github_apps.py +78 -79
  236. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  237. pulumi_vault/ssh/__init__.py +1 -1
  238. pulumi_vault/ssh/_inputs.py +13 -14
  239. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  240. pulumi_vault/ssh/outputs.py +9 -10
  241. pulumi_vault/ssh/secret_backend_ca.py +217 -124
  242. pulumi_vault/ssh/secret_backend_role.py +446 -447
  243. pulumi_vault/terraformcloud/__init__.py +1 -1
  244. pulumi_vault/terraformcloud/secret_backend.py +833 -155
  245. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  246. pulumi_vault/terraformcloud/secret_role.py +117 -118
  247. pulumi_vault/token.py +301 -302
  248. pulumi_vault/tokenauth/__init__.py +1 -1
  249. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  250. pulumi_vault/transform/__init__.py +1 -1
  251. pulumi_vault/transform/alphabet.py +69 -70
  252. pulumi_vault/transform/get_decode.py +57 -58
  253. pulumi_vault/transform/get_encode.py +57 -58
  254. pulumi_vault/transform/role.py +69 -70
  255. pulumi_vault/transform/template.py +137 -138
  256. pulumi_vault/transform/transformation.py +171 -172
  257. pulumi_vault/transit/__init__.py +1 -1
  258. pulumi_vault/transit/get_cmac.py +47 -48
  259. pulumi_vault/transit/get_decrypt.py +25 -26
  260. pulumi_vault/transit/get_encrypt.py +29 -30
  261. pulumi_vault/transit/get_sign.py +71 -72
  262. pulumi_vault/transit/get_verify.py +83 -84
  263. pulumi_vault/transit/secret_backend_key.py +377 -350
  264. pulumi_vault/transit/secret_cache_config.py +52 -53
  265. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
  266. pulumi_vault-7.2.0.dist-info/RECORD +270 -0
  267. pulumi_vault-7.1.0.dist-info/RECORD +0 -268
  268. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
  269. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,46 +19,79 @@ __all__ = ['SecretBackendArgs', 'SecretBackend']
20
19
  @pulumi.input_type
21
20
  class SecretBackendArgs:
22
21
  def __init__(__self__, *,
23
- address: pulumi.Input[builtins.str],
24
- bootstrap: Optional[pulumi.Input[builtins.bool]] = None,
25
- ca_cert: Optional[pulumi.Input[builtins.str]] = None,
26
- client_cert: Optional[pulumi.Input[builtins.str]] = None,
27
- client_key: Optional[pulumi.Input[builtins.str]] = None,
28
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
29
- description: Optional[pulumi.Input[builtins.str]] = None,
30
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
31
- local: Optional[pulumi.Input[builtins.bool]] = None,
32
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
33
- namespace: Optional[pulumi.Input[builtins.str]] = None,
34
- path: Optional[pulumi.Input[builtins.str]] = None,
35
- scheme: Optional[pulumi.Input[builtins.str]] = None,
36
- token: Optional[pulumi.Input[builtins.str]] = None):
22
+ address: pulumi.Input[_builtins.str],
23
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
24
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
25
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ bootstrap: Optional[pulumi.Input[_builtins.bool]] = None,
28
+ ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
29
+ client_cert: Optional[pulumi.Input[_builtins.str]] = None,
30
+ client_key: Optional[pulumi.Input[_builtins.str]] = None,
31
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
32
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
33
+ description: Optional[pulumi.Input[_builtins.str]] = None,
34
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
35
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
36
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
37
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
38
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
39
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
40
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
41
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
42
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
43
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
44
+ path: Optional[pulumi.Input[_builtins.str]] = None,
45
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
46
+ scheme: Optional[pulumi.Input[_builtins.str]] = None,
47
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
48
+ token: Optional[pulumi.Input[_builtins.str]] = None):
37
49
  """
38
50
  The set of arguments for constructing a SecretBackend resource.
39
- :param pulumi.Input[builtins.str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
40
- :param pulumi.Input[builtins.bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
41
- :param pulumi.Input[builtins.str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
42
- :param pulumi.Input[builtins.str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
51
+ :param pulumi.Input[_builtins.str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
52
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
53
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
54
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
55
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
56
+ :param pulumi.Input[_builtins.bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
57
+ :param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
58
+ :param pulumi.Input[_builtins.str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
43
59
  this is set you need to also set client_key.
44
- :param pulumi.Input[builtins.str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
60
+ :param pulumi.Input[_builtins.str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
45
61
  you need to also set client_cert.
46
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
47
- :param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
48
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
62
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
63
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
64
+ :param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
65
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
49
66
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
50
- :param pulumi.Input[builtins.bool] local: Specifies if the secret backend is local only.
51
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
52
- for credentials issued by this backend.
53
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
67
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
68
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
69
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
70
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
71
+ :param pulumi.Input[_builtins.bool] local: Specifies if the secret backend is local only
72
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
73
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
54
74
  The value should not contain leading or trailing forward slashes.
55
75
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
56
76
  *Available only for Vault Enterprise*.
57
- :param pulumi.Input[builtins.str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
77
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
78
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
79
+ :param pulumi.Input[_builtins.str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
58
80
  to `consul`.
59
- :param pulumi.Input[builtins.str] scheme: Specifies the URL scheme to use. Defaults to `http`.
60
- :param pulumi.Input[builtins.str] token: Specifies the Consul token to use when managing or issuing new tokens.
81
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
82
+ :param pulumi.Input[_builtins.str] scheme: Specifies the URL scheme to use. Defaults to `http`.
83
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
84
+ :param pulumi.Input[_builtins.str] token: Specifies the Consul token to use when managing or issuing new tokens.
61
85
  """
62
86
  pulumi.set(__self__, "address", address)
87
+ if allowed_managed_keys is not None:
88
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
89
+ if allowed_response_headers is not None:
90
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
91
+ if audit_non_hmac_request_keys is not None:
92
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
93
+ if audit_non_hmac_response_keys is not None:
94
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
63
95
  if bootstrap is not None:
64
96
  pulumi.set(__self__, "bootstrap", bootstrap)
65
97
  if ca_cert is not None:
@@ -70,62 +102,128 @@ class SecretBackendArgs:
70
102
  pulumi.set(__self__, "client_key", client_key)
71
103
  if default_lease_ttl_seconds is not None:
72
104
  pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
105
+ if delegated_auth_accessors is not None:
106
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
73
107
  if description is not None:
74
108
  pulumi.set(__self__, "description", description)
75
109
  if disable_remount is not None:
76
110
  pulumi.set(__self__, "disable_remount", disable_remount)
111
+ if external_entropy_access is not None:
112
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
113
+ if force_no_cache is not None:
114
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
115
+ if identity_token_key is not None:
116
+ pulumi.set(__self__, "identity_token_key", identity_token_key)
117
+ if listing_visibility is not None:
118
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
77
119
  if local is not None:
78
120
  pulumi.set(__self__, "local", local)
79
121
  if max_lease_ttl_seconds is not None:
80
122
  pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
81
123
  if namespace is not None:
82
124
  pulumi.set(__self__, "namespace", namespace)
125
+ if options is not None:
126
+ pulumi.set(__self__, "options", options)
127
+ if passthrough_request_headers is not None:
128
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
83
129
  if path is not None:
84
130
  pulumi.set(__self__, "path", path)
131
+ if plugin_version is not None:
132
+ pulumi.set(__self__, "plugin_version", plugin_version)
85
133
  if scheme is not None:
86
134
  pulumi.set(__self__, "scheme", scheme)
135
+ if seal_wrap is not None:
136
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
87
137
  if token is not None:
88
138
  pulumi.set(__self__, "token", token)
89
139
 
90
- @property
140
+ @_builtins.property
91
141
  @pulumi.getter
92
- def address(self) -> pulumi.Input[builtins.str]:
142
+ def address(self) -> pulumi.Input[_builtins.str]:
93
143
  """
94
144
  Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
95
145
  """
96
146
  return pulumi.get(self, "address")
97
147
 
98
148
  @address.setter
99
- def address(self, value: pulumi.Input[builtins.str]):
149
+ def address(self, value: pulumi.Input[_builtins.str]):
100
150
  pulumi.set(self, "address", value)
101
151
 
102
- @property
152
+ @_builtins.property
153
+ @pulumi.getter(name="allowedManagedKeys")
154
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
155
+ """
156
+ List of managed key registry entry names that the mount in question is allowed to access
157
+ """
158
+ return pulumi.get(self, "allowed_managed_keys")
159
+
160
+ @allowed_managed_keys.setter
161
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
162
+ pulumi.set(self, "allowed_managed_keys", value)
163
+
164
+ @_builtins.property
165
+ @pulumi.getter(name="allowedResponseHeaders")
166
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
167
+ """
168
+ List of headers to allow and pass from the request to the plugin
169
+ """
170
+ return pulumi.get(self, "allowed_response_headers")
171
+
172
+ @allowed_response_headers.setter
173
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
174
+ pulumi.set(self, "allowed_response_headers", value)
175
+
176
+ @_builtins.property
177
+ @pulumi.getter(name="auditNonHmacRequestKeys")
178
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
179
+ """
180
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
181
+ """
182
+ return pulumi.get(self, "audit_non_hmac_request_keys")
183
+
184
+ @audit_non_hmac_request_keys.setter
185
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
186
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
187
+
188
+ @_builtins.property
189
+ @pulumi.getter(name="auditNonHmacResponseKeys")
190
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
191
+ """
192
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
193
+ """
194
+ return pulumi.get(self, "audit_non_hmac_response_keys")
195
+
196
+ @audit_non_hmac_response_keys.setter
197
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
198
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
199
+
200
+ @_builtins.property
103
201
  @pulumi.getter
104
- def bootstrap(self) -> Optional[pulumi.Input[builtins.bool]]:
202
+ def bootstrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
105
203
  """
106
204
  Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
107
205
  """
108
206
  return pulumi.get(self, "bootstrap")
109
207
 
110
208
  @bootstrap.setter
111
- def bootstrap(self, value: Optional[pulumi.Input[builtins.bool]]):
209
+ def bootstrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
112
210
  pulumi.set(self, "bootstrap", value)
113
211
 
114
- @property
212
+ @_builtins.property
115
213
  @pulumi.getter(name="caCert")
116
- def ca_cert(self) -> Optional[pulumi.Input[builtins.str]]:
214
+ def ca_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
117
215
  """
118
216
  CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
119
217
  """
120
218
  return pulumi.get(self, "ca_cert")
121
219
 
122
220
  @ca_cert.setter
123
- def ca_cert(self, value: Optional[pulumi.Input[builtins.str]]):
221
+ def ca_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
124
222
  pulumi.set(self, "ca_cert", value)
125
223
 
126
- @property
224
+ @_builtins.property
127
225
  @pulumi.getter(name="clientCert")
128
- def client_cert(self) -> Optional[pulumi.Input[builtins.str]]:
226
+ def client_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
129
227
  """
130
228
  Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
131
229
  this is set you need to also set client_key.
@@ -133,12 +231,12 @@ class SecretBackendArgs:
133
231
  return pulumi.get(self, "client_cert")
134
232
 
135
233
  @client_cert.setter
136
- def client_cert(self, value: Optional[pulumi.Input[builtins.str]]):
234
+ def client_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
137
235
  pulumi.set(self, "client_cert", value)
138
236
 
139
- @property
237
+ @_builtins.property
140
238
  @pulumi.getter(name="clientKey")
141
- def client_key(self) -> Optional[pulumi.Input[builtins.str]]:
239
+ def client_key(self) -> Optional[pulumi.Input[_builtins.str]]:
142
240
  """
143
241
  Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
144
242
  you need to also set client_cert.
@@ -146,36 +244,48 @@ class SecretBackendArgs:
146
244
  return pulumi.get(self, "client_key")
147
245
 
148
246
  @client_key.setter
149
- def client_key(self, value: Optional[pulumi.Input[builtins.str]]):
247
+ def client_key(self, value: Optional[pulumi.Input[_builtins.str]]):
150
248
  pulumi.set(self, "client_key", value)
151
249
 
152
- @property
250
+ @_builtins.property
153
251
  @pulumi.getter(name="defaultLeaseTtlSeconds")
154
- def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
252
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
155
253
  """
156
- The default TTL for credentials issued by this backend.
254
+ Default lease duration for secrets in seconds
157
255
  """
158
256
  return pulumi.get(self, "default_lease_ttl_seconds")
159
257
 
160
258
  @default_lease_ttl_seconds.setter
161
- def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
259
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
162
260
  pulumi.set(self, "default_lease_ttl_seconds", value)
163
261
 
164
- @property
262
+ @_builtins.property
263
+ @pulumi.getter(name="delegatedAuthAccessors")
264
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
265
+ """
266
+ List of headers to allow and pass from the request to the plugin
267
+ """
268
+ return pulumi.get(self, "delegated_auth_accessors")
269
+
270
+ @delegated_auth_accessors.setter
271
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
272
+ pulumi.set(self, "delegated_auth_accessors", value)
273
+
274
+ @_builtins.property
165
275
  @pulumi.getter
166
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
276
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
167
277
  """
168
278
  A human-friendly description for this backend.
169
279
  """
170
280
  return pulumi.get(self, "description")
171
281
 
172
282
  @description.setter
173
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
283
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
174
284
  pulumi.set(self, "description", value)
175
285
 
176
- @property
286
+ @_builtins.property
177
287
  @pulumi.getter(name="disableRemount")
178
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
288
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
179
289
  """
180
290
  If set, opts out of mount migration on path updates.
181
291
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -183,37 +293,84 @@ class SecretBackendArgs:
183
293
  return pulumi.get(self, "disable_remount")
184
294
 
185
295
  @disable_remount.setter
186
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
296
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
187
297
  pulumi.set(self, "disable_remount", value)
188
298
 
189
- @property
299
+ @_builtins.property
300
+ @pulumi.getter(name="externalEntropyAccess")
301
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
302
+ """
303
+ Enable the secrets engine to access Vault's external entropy source
304
+ """
305
+ return pulumi.get(self, "external_entropy_access")
306
+
307
+ @external_entropy_access.setter
308
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
309
+ pulumi.set(self, "external_entropy_access", value)
310
+
311
+ @_builtins.property
312
+ @pulumi.getter(name="forceNoCache")
313
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
314
+ """
315
+ If set to true, disables caching.
316
+ """
317
+ return pulumi.get(self, "force_no_cache")
318
+
319
+ @force_no_cache.setter
320
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
321
+ pulumi.set(self, "force_no_cache", value)
322
+
323
+ @_builtins.property
324
+ @pulumi.getter(name="identityTokenKey")
325
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
326
+ """
327
+ The key to use for signing plugin workload identity tokens
328
+ """
329
+ return pulumi.get(self, "identity_token_key")
330
+
331
+ @identity_token_key.setter
332
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
333
+ pulumi.set(self, "identity_token_key", value)
334
+
335
+ @_builtins.property
336
+ @pulumi.getter(name="listingVisibility")
337
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
338
+ """
339
+ Specifies whether to show this mount in the UI-specific listing endpoint
340
+ """
341
+ return pulumi.get(self, "listing_visibility")
342
+
343
+ @listing_visibility.setter
344
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
345
+ pulumi.set(self, "listing_visibility", value)
346
+
347
+ @_builtins.property
190
348
  @pulumi.getter
191
- def local(self) -> Optional[pulumi.Input[builtins.bool]]:
349
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
192
350
  """
193
- Specifies if the secret backend is local only.
351
+ Specifies if the secret backend is local only
194
352
  """
195
353
  return pulumi.get(self, "local")
196
354
 
197
355
  @local.setter
198
- def local(self, value: Optional[pulumi.Input[builtins.bool]]):
356
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
199
357
  pulumi.set(self, "local", value)
200
358
 
201
- @property
359
+ @_builtins.property
202
360
  @pulumi.getter(name="maxLeaseTtlSeconds")
203
- def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
361
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
204
362
  """
205
- The maximum TTL that can be requested
206
- for credentials issued by this backend.
363
+ Maximum possible lease duration for secrets in seconds
207
364
  """
208
365
  return pulumi.get(self, "max_lease_ttl_seconds")
209
366
 
210
367
  @max_lease_ttl_seconds.setter
211
- def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
368
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
212
369
  pulumi.set(self, "max_lease_ttl_seconds", value)
213
370
 
214
- @property
371
+ @_builtins.property
215
372
  @pulumi.getter
216
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
373
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
217
374
  """
218
375
  The namespace to provision the resource in.
219
376
  The value should not contain leading or trailing forward slashes.
@@ -223,12 +380,36 @@ class SecretBackendArgs:
223
380
  return pulumi.get(self, "namespace")
224
381
 
225
382
  @namespace.setter
226
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
383
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
227
384
  pulumi.set(self, "namespace", value)
228
385
 
229
- @property
386
+ @_builtins.property
387
+ @pulumi.getter
388
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
389
+ """
390
+ Specifies mount type specific options that are passed to the backend
391
+ """
392
+ return pulumi.get(self, "options")
393
+
394
+ @options.setter
395
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
396
+ pulumi.set(self, "options", value)
397
+
398
+ @_builtins.property
399
+ @pulumi.getter(name="passthroughRequestHeaders")
400
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
401
+ """
402
+ List of headers to allow and pass from the request to the plugin
403
+ """
404
+ return pulumi.get(self, "passthrough_request_headers")
405
+
406
+ @passthrough_request_headers.setter
407
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
408
+ pulumi.set(self, "passthrough_request_headers", value)
409
+
410
+ @_builtins.property
230
411
  @pulumi.getter
231
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
412
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
232
413
  """
233
414
  The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
234
415
  to `consul`.
@@ -236,78 +417,139 @@ class SecretBackendArgs:
236
417
  return pulumi.get(self, "path")
237
418
 
238
419
  @path.setter
239
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
420
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
240
421
  pulumi.set(self, "path", value)
241
422
 
242
- @property
423
+ @_builtins.property
424
+ @pulumi.getter(name="pluginVersion")
425
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
426
+ """
427
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
428
+ """
429
+ return pulumi.get(self, "plugin_version")
430
+
431
+ @plugin_version.setter
432
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
433
+ pulumi.set(self, "plugin_version", value)
434
+
435
+ @_builtins.property
243
436
  @pulumi.getter
244
- def scheme(self) -> Optional[pulumi.Input[builtins.str]]:
437
+ def scheme(self) -> Optional[pulumi.Input[_builtins.str]]:
245
438
  """
246
439
  Specifies the URL scheme to use. Defaults to `http`.
247
440
  """
248
441
  return pulumi.get(self, "scheme")
249
442
 
250
443
  @scheme.setter
251
- def scheme(self, value: Optional[pulumi.Input[builtins.str]]):
444
+ def scheme(self, value: Optional[pulumi.Input[_builtins.str]]):
252
445
  pulumi.set(self, "scheme", value)
253
446
 
254
- @property
447
+ @_builtins.property
448
+ @pulumi.getter(name="sealWrap")
449
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
450
+ """
451
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
452
+ """
453
+ return pulumi.get(self, "seal_wrap")
454
+
455
+ @seal_wrap.setter
456
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
457
+ pulumi.set(self, "seal_wrap", value)
458
+
459
+ @_builtins.property
255
460
  @pulumi.getter
256
- def token(self) -> Optional[pulumi.Input[builtins.str]]:
461
+ def token(self) -> Optional[pulumi.Input[_builtins.str]]:
257
462
  """
258
463
  Specifies the Consul token to use when managing or issuing new tokens.
259
464
  """
260
465
  return pulumi.get(self, "token")
261
466
 
262
467
  @token.setter
263
- def token(self, value: Optional[pulumi.Input[builtins.str]]):
468
+ def token(self, value: Optional[pulumi.Input[_builtins.str]]):
264
469
  pulumi.set(self, "token", value)
265
470
 
266
471
 
267
472
  @pulumi.input_type
268
473
  class _SecretBackendState:
269
474
  def __init__(__self__, *,
270
- address: Optional[pulumi.Input[builtins.str]] = None,
271
- bootstrap: Optional[pulumi.Input[builtins.bool]] = None,
272
- ca_cert: Optional[pulumi.Input[builtins.str]] = None,
273
- client_cert: Optional[pulumi.Input[builtins.str]] = None,
274
- client_key: Optional[pulumi.Input[builtins.str]] = None,
275
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
276
- description: Optional[pulumi.Input[builtins.str]] = None,
277
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
278
- local: Optional[pulumi.Input[builtins.bool]] = None,
279
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
280
- namespace: Optional[pulumi.Input[builtins.str]] = None,
281
- path: Optional[pulumi.Input[builtins.str]] = None,
282
- scheme: Optional[pulumi.Input[builtins.str]] = None,
283
- token: Optional[pulumi.Input[builtins.str]] = None):
475
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
476
+ address: Optional[pulumi.Input[_builtins.str]] = None,
477
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
478
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
479
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
480
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
481
+ bootstrap: Optional[pulumi.Input[_builtins.bool]] = None,
482
+ ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
483
+ client_cert: Optional[pulumi.Input[_builtins.str]] = None,
484
+ client_key: Optional[pulumi.Input[_builtins.str]] = None,
485
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
486
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
487
+ description: Optional[pulumi.Input[_builtins.str]] = None,
488
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
489
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
490
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
491
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
492
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
493
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
494
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
495
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
496
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
497
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
498
+ path: Optional[pulumi.Input[_builtins.str]] = None,
499
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
500
+ scheme: Optional[pulumi.Input[_builtins.str]] = None,
501
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
502
+ token: Optional[pulumi.Input[_builtins.str]] = None):
284
503
  """
285
504
  Input properties used for looking up and filtering SecretBackend resources.
286
- :param pulumi.Input[builtins.str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
287
- :param pulumi.Input[builtins.bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
288
- :param pulumi.Input[builtins.str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
289
- :param pulumi.Input[builtins.str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
505
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
506
+ :param pulumi.Input[_builtins.str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
507
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
508
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
509
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
510
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
511
+ :param pulumi.Input[_builtins.bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
512
+ :param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
513
+ :param pulumi.Input[_builtins.str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
290
514
  this is set you need to also set client_key.
291
- :param pulumi.Input[builtins.str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
515
+ :param pulumi.Input[_builtins.str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
292
516
  you need to also set client_cert.
293
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
294
- :param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
295
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
517
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
518
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
519
+ :param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
520
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
296
521
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
297
- :param pulumi.Input[builtins.bool] local: Specifies if the secret backend is local only.
298
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
299
- for credentials issued by this backend.
300
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
522
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
523
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
524
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
525
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
526
+ :param pulumi.Input[_builtins.bool] local: Specifies if the secret backend is local only
527
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
528
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
301
529
  The value should not contain leading or trailing forward slashes.
302
530
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
303
531
  *Available only for Vault Enterprise*.
304
- :param pulumi.Input[builtins.str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
532
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
533
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
534
+ :param pulumi.Input[_builtins.str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
305
535
  to `consul`.
306
- :param pulumi.Input[builtins.str] scheme: Specifies the URL scheme to use. Defaults to `http`.
307
- :param pulumi.Input[builtins.str] token: Specifies the Consul token to use when managing or issuing new tokens.
536
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
537
+ :param pulumi.Input[_builtins.str] scheme: Specifies the URL scheme to use. Defaults to `http`.
538
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
539
+ :param pulumi.Input[_builtins.str] token: Specifies the Consul token to use when managing or issuing new tokens.
308
540
  """
541
+ if accessor is not None:
542
+ pulumi.set(__self__, "accessor", accessor)
309
543
  if address is not None:
310
544
  pulumi.set(__self__, "address", address)
545
+ if allowed_managed_keys is not None:
546
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
547
+ if allowed_response_headers is not None:
548
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
549
+ if audit_non_hmac_request_keys is not None:
550
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
551
+ if audit_non_hmac_response_keys is not None:
552
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
311
553
  if bootstrap is not None:
312
554
  pulumi.set(__self__, "bootstrap", bootstrap)
313
555
  if ca_cert is not None:
@@ -318,62 +560,140 @@ class _SecretBackendState:
318
560
  pulumi.set(__self__, "client_key", client_key)
319
561
  if default_lease_ttl_seconds is not None:
320
562
  pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
563
+ if delegated_auth_accessors is not None:
564
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
321
565
  if description is not None:
322
566
  pulumi.set(__self__, "description", description)
323
567
  if disable_remount is not None:
324
568
  pulumi.set(__self__, "disable_remount", disable_remount)
569
+ if external_entropy_access is not None:
570
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
571
+ if force_no_cache is not None:
572
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
573
+ if identity_token_key is not None:
574
+ pulumi.set(__self__, "identity_token_key", identity_token_key)
575
+ if listing_visibility is not None:
576
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
325
577
  if local is not None:
326
578
  pulumi.set(__self__, "local", local)
327
579
  if max_lease_ttl_seconds is not None:
328
580
  pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
329
581
  if namespace is not None:
330
582
  pulumi.set(__self__, "namespace", namespace)
583
+ if options is not None:
584
+ pulumi.set(__self__, "options", options)
585
+ if passthrough_request_headers is not None:
586
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
331
587
  if path is not None:
332
588
  pulumi.set(__self__, "path", path)
589
+ if plugin_version is not None:
590
+ pulumi.set(__self__, "plugin_version", plugin_version)
333
591
  if scheme is not None:
334
592
  pulumi.set(__self__, "scheme", scheme)
593
+ if seal_wrap is not None:
594
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
335
595
  if token is not None:
336
596
  pulumi.set(__self__, "token", token)
337
597
 
338
- @property
598
+ @_builtins.property
599
+ @pulumi.getter
600
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
601
+ """
602
+ Accessor of the mount
603
+ """
604
+ return pulumi.get(self, "accessor")
605
+
606
+ @accessor.setter
607
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
608
+ pulumi.set(self, "accessor", value)
609
+
610
+ @_builtins.property
339
611
  @pulumi.getter
340
- def address(self) -> Optional[pulumi.Input[builtins.str]]:
612
+ def address(self) -> Optional[pulumi.Input[_builtins.str]]:
341
613
  """
342
614
  Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
343
615
  """
344
616
  return pulumi.get(self, "address")
345
617
 
346
618
  @address.setter
347
- def address(self, value: Optional[pulumi.Input[builtins.str]]):
619
+ def address(self, value: Optional[pulumi.Input[_builtins.str]]):
348
620
  pulumi.set(self, "address", value)
349
621
 
350
- @property
622
+ @_builtins.property
623
+ @pulumi.getter(name="allowedManagedKeys")
624
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
625
+ """
626
+ List of managed key registry entry names that the mount in question is allowed to access
627
+ """
628
+ return pulumi.get(self, "allowed_managed_keys")
629
+
630
+ @allowed_managed_keys.setter
631
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
632
+ pulumi.set(self, "allowed_managed_keys", value)
633
+
634
+ @_builtins.property
635
+ @pulumi.getter(name="allowedResponseHeaders")
636
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
637
+ """
638
+ List of headers to allow and pass from the request to the plugin
639
+ """
640
+ return pulumi.get(self, "allowed_response_headers")
641
+
642
+ @allowed_response_headers.setter
643
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
644
+ pulumi.set(self, "allowed_response_headers", value)
645
+
646
+ @_builtins.property
647
+ @pulumi.getter(name="auditNonHmacRequestKeys")
648
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
649
+ """
650
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
651
+ """
652
+ return pulumi.get(self, "audit_non_hmac_request_keys")
653
+
654
+ @audit_non_hmac_request_keys.setter
655
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
656
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
657
+
658
+ @_builtins.property
659
+ @pulumi.getter(name="auditNonHmacResponseKeys")
660
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
661
+ """
662
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
663
+ """
664
+ return pulumi.get(self, "audit_non_hmac_response_keys")
665
+
666
+ @audit_non_hmac_response_keys.setter
667
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
668
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
669
+
670
+ @_builtins.property
351
671
  @pulumi.getter
352
- def bootstrap(self) -> Optional[pulumi.Input[builtins.bool]]:
672
+ def bootstrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
353
673
  """
354
674
  Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
355
675
  """
356
676
  return pulumi.get(self, "bootstrap")
357
677
 
358
678
  @bootstrap.setter
359
- def bootstrap(self, value: Optional[pulumi.Input[builtins.bool]]):
679
+ def bootstrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
360
680
  pulumi.set(self, "bootstrap", value)
361
681
 
362
- @property
682
+ @_builtins.property
363
683
  @pulumi.getter(name="caCert")
364
- def ca_cert(self) -> Optional[pulumi.Input[builtins.str]]:
684
+ def ca_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
365
685
  """
366
686
  CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
367
687
  """
368
688
  return pulumi.get(self, "ca_cert")
369
689
 
370
690
  @ca_cert.setter
371
- def ca_cert(self, value: Optional[pulumi.Input[builtins.str]]):
691
+ def ca_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
372
692
  pulumi.set(self, "ca_cert", value)
373
693
 
374
- @property
694
+ @_builtins.property
375
695
  @pulumi.getter(name="clientCert")
376
- def client_cert(self) -> Optional[pulumi.Input[builtins.str]]:
696
+ def client_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
377
697
  """
378
698
  Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
379
699
  this is set you need to also set client_key.
@@ -381,12 +701,12 @@ class _SecretBackendState:
381
701
  return pulumi.get(self, "client_cert")
382
702
 
383
703
  @client_cert.setter
384
- def client_cert(self, value: Optional[pulumi.Input[builtins.str]]):
704
+ def client_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
385
705
  pulumi.set(self, "client_cert", value)
386
706
 
387
- @property
707
+ @_builtins.property
388
708
  @pulumi.getter(name="clientKey")
389
- def client_key(self) -> Optional[pulumi.Input[builtins.str]]:
709
+ def client_key(self) -> Optional[pulumi.Input[_builtins.str]]:
390
710
  """
391
711
  Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
392
712
  you need to also set client_cert.
@@ -394,36 +714,48 @@ class _SecretBackendState:
394
714
  return pulumi.get(self, "client_key")
395
715
 
396
716
  @client_key.setter
397
- def client_key(self, value: Optional[pulumi.Input[builtins.str]]):
717
+ def client_key(self, value: Optional[pulumi.Input[_builtins.str]]):
398
718
  pulumi.set(self, "client_key", value)
399
719
 
400
- @property
720
+ @_builtins.property
401
721
  @pulumi.getter(name="defaultLeaseTtlSeconds")
402
- def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
722
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
403
723
  """
404
- The default TTL for credentials issued by this backend.
724
+ Default lease duration for secrets in seconds
405
725
  """
406
726
  return pulumi.get(self, "default_lease_ttl_seconds")
407
727
 
408
728
  @default_lease_ttl_seconds.setter
409
- def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
729
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
410
730
  pulumi.set(self, "default_lease_ttl_seconds", value)
411
731
 
412
- @property
732
+ @_builtins.property
733
+ @pulumi.getter(name="delegatedAuthAccessors")
734
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
735
+ """
736
+ List of headers to allow and pass from the request to the plugin
737
+ """
738
+ return pulumi.get(self, "delegated_auth_accessors")
739
+
740
+ @delegated_auth_accessors.setter
741
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
742
+ pulumi.set(self, "delegated_auth_accessors", value)
743
+
744
+ @_builtins.property
413
745
  @pulumi.getter
414
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
746
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
415
747
  """
416
748
  A human-friendly description for this backend.
417
749
  """
418
750
  return pulumi.get(self, "description")
419
751
 
420
752
  @description.setter
421
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
753
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
422
754
  pulumi.set(self, "description", value)
423
755
 
424
- @property
756
+ @_builtins.property
425
757
  @pulumi.getter(name="disableRemount")
426
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
758
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
427
759
  """
428
760
  If set, opts out of mount migration on path updates.
429
761
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -431,37 +763,84 @@ class _SecretBackendState:
431
763
  return pulumi.get(self, "disable_remount")
432
764
 
433
765
  @disable_remount.setter
434
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
766
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
435
767
  pulumi.set(self, "disable_remount", value)
436
768
 
437
- @property
769
+ @_builtins.property
770
+ @pulumi.getter(name="externalEntropyAccess")
771
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
772
+ """
773
+ Enable the secrets engine to access Vault's external entropy source
774
+ """
775
+ return pulumi.get(self, "external_entropy_access")
776
+
777
+ @external_entropy_access.setter
778
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
779
+ pulumi.set(self, "external_entropy_access", value)
780
+
781
+ @_builtins.property
782
+ @pulumi.getter(name="forceNoCache")
783
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
784
+ """
785
+ If set to true, disables caching.
786
+ """
787
+ return pulumi.get(self, "force_no_cache")
788
+
789
+ @force_no_cache.setter
790
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
791
+ pulumi.set(self, "force_no_cache", value)
792
+
793
+ @_builtins.property
794
+ @pulumi.getter(name="identityTokenKey")
795
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
796
+ """
797
+ The key to use for signing plugin workload identity tokens
798
+ """
799
+ return pulumi.get(self, "identity_token_key")
800
+
801
+ @identity_token_key.setter
802
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
803
+ pulumi.set(self, "identity_token_key", value)
804
+
805
+ @_builtins.property
806
+ @pulumi.getter(name="listingVisibility")
807
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
808
+ """
809
+ Specifies whether to show this mount in the UI-specific listing endpoint
810
+ """
811
+ return pulumi.get(self, "listing_visibility")
812
+
813
+ @listing_visibility.setter
814
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
815
+ pulumi.set(self, "listing_visibility", value)
816
+
817
+ @_builtins.property
438
818
  @pulumi.getter
439
- def local(self) -> Optional[pulumi.Input[builtins.bool]]:
819
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
440
820
  """
441
- Specifies if the secret backend is local only.
821
+ Specifies if the secret backend is local only
442
822
  """
443
823
  return pulumi.get(self, "local")
444
824
 
445
825
  @local.setter
446
- def local(self, value: Optional[pulumi.Input[builtins.bool]]):
826
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
447
827
  pulumi.set(self, "local", value)
448
828
 
449
- @property
829
+ @_builtins.property
450
830
  @pulumi.getter(name="maxLeaseTtlSeconds")
451
- def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
831
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
452
832
  """
453
- The maximum TTL that can be requested
454
- for credentials issued by this backend.
833
+ Maximum possible lease duration for secrets in seconds
455
834
  """
456
835
  return pulumi.get(self, "max_lease_ttl_seconds")
457
836
 
458
837
  @max_lease_ttl_seconds.setter
459
- def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
838
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
460
839
  pulumi.set(self, "max_lease_ttl_seconds", value)
461
840
 
462
- @property
841
+ @_builtins.property
463
842
  @pulumi.getter
464
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
843
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
465
844
  """
466
845
  The namespace to provision the resource in.
467
846
  The value should not contain leading or trailing forward slashes.
@@ -471,12 +850,36 @@ class _SecretBackendState:
471
850
  return pulumi.get(self, "namespace")
472
851
 
473
852
  @namespace.setter
474
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
853
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
475
854
  pulumi.set(self, "namespace", value)
476
855
 
477
- @property
856
+ @_builtins.property
478
857
  @pulumi.getter
479
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
858
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
859
+ """
860
+ Specifies mount type specific options that are passed to the backend
861
+ """
862
+ return pulumi.get(self, "options")
863
+
864
+ @options.setter
865
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
866
+ pulumi.set(self, "options", value)
867
+
868
+ @_builtins.property
869
+ @pulumi.getter(name="passthroughRequestHeaders")
870
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
871
+ """
872
+ List of headers to allow and pass from the request to the plugin
873
+ """
874
+ return pulumi.get(self, "passthrough_request_headers")
875
+
876
+ @passthrough_request_headers.setter
877
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
878
+ pulumi.set(self, "passthrough_request_headers", value)
879
+
880
+ @_builtins.property
881
+ @pulumi.getter
882
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
480
883
  """
481
884
  The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
482
885
  to `consul`.
@@ -484,31 +887,55 @@ class _SecretBackendState:
484
887
  return pulumi.get(self, "path")
485
888
 
486
889
  @path.setter
487
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
890
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
488
891
  pulumi.set(self, "path", value)
489
892
 
490
- @property
893
+ @_builtins.property
894
+ @pulumi.getter(name="pluginVersion")
895
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
896
+ """
897
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
898
+ """
899
+ return pulumi.get(self, "plugin_version")
900
+
901
+ @plugin_version.setter
902
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
903
+ pulumi.set(self, "plugin_version", value)
904
+
905
+ @_builtins.property
491
906
  @pulumi.getter
492
- def scheme(self) -> Optional[pulumi.Input[builtins.str]]:
907
+ def scheme(self) -> Optional[pulumi.Input[_builtins.str]]:
493
908
  """
494
909
  Specifies the URL scheme to use. Defaults to `http`.
495
910
  """
496
911
  return pulumi.get(self, "scheme")
497
912
 
498
913
  @scheme.setter
499
- def scheme(self, value: Optional[pulumi.Input[builtins.str]]):
914
+ def scheme(self, value: Optional[pulumi.Input[_builtins.str]]):
500
915
  pulumi.set(self, "scheme", value)
501
916
 
502
- @property
917
+ @_builtins.property
918
+ @pulumi.getter(name="sealWrap")
919
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
920
+ """
921
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
922
+ """
923
+ return pulumi.get(self, "seal_wrap")
924
+
925
+ @seal_wrap.setter
926
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
927
+ pulumi.set(self, "seal_wrap", value)
928
+
929
+ @_builtins.property
503
930
  @pulumi.getter
504
- def token(self) -> Optional[pulumi.Input[builtins.str]]:
931
+ def token(self) -> Optional[pulumi.Input[_builtins.str]]:
505
932
  """
506
933
  Specifies the Consul token to use when managing or issuing new tokens.
507
934
  """
508
935
  return pulumi.get(self, "token")
509
936
 
510
937
  @token.setter
511
- def token(self, value: Optional[pulumi.Input[builtins.str]]):
938
+ def token(self, value: Optional[pulumi.Input[_builtins.str]]):
512
939
  pulumi.set(self, "token", value)
513
940
 
514
941
 
@@ -518,20 +945,33 @@ class SecretBackend(pulumi.CustomResource):
518
945
  def __init__(__self__,
519
946
  resource_name: str,
520
947
  opts: Optional[pulumi.ResourceOptions] = None,
521
- address: Optional[pulumi.Input[builtins.str]] = None,
522
- bootstrap: Optional[pulumi.Input[builtins.bool]] = None,
523
- ca_cert: Optional[pulumi.Input[builtins.str]] = None,
524
- client_cert: Optional[pulumi.Input[builtins.str]] = None,
525
- client_key: Optional[pulumi.Input[builtins.str]] = None,
526
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
527
- description: Optional[pulumi.Input[builtins.str]] = None,
528
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
529
- local: Optional[pulumi.Input[builtins.bool]] = None,
530
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
531
- namespace: Optional[pulumi.Input[builtins.str]] = None,
532
- path: Optional[pulumi.Input[builtins.str]] = None,
533
- scheme: Optional[pulumi.Input[builtins.str]] = None,
534
- token: Optional[pulumi.Input[builtins.str]] = None,
948
+ address: Optional[pulumi.Input[_builtins.str]] = None,
949
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
950
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
951
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
952
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
953
+ bootstrap: Optional[pulumi.Input[_builtins.bool]] = None,
954
+ ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
955
+ client_cert: Optional[pulumi.Input[_builtins.str]] = None,
956
+ client_key: Optional[pulumi.Input[_builtins.str]] = None,
957
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
958
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
959
+ description: Optional[pulumi.Input[_builtins.str]] = None,
960
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
961
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
962
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
963
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
964
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
965
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
966
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
967
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
968
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
969
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
970
+ path: Optional[pulumi.Input[_builtins.str]] = None,
971
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
972
+ scheme: Optional[pulumi.Input[_builtins.str]] = None,
973
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
974
+ token: Optional[pulumi.Input[_builtins.str]] = None,
535
975
  __props__=None):
536
976
  """
537
977
  ## Example Usage
@@ -570,28 +1010,40 @@ class SecretBackend(pulumi.CustomResource):
570
1010
 
571
1011
  :param str resource_name: The name of the resource.
572
1012
  :param pulumi.ResourceOptions opts: Options for the resource.
573
- :param pulumi.Input[builtins.str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
574
- :param pulumi.Input[builtins.bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
575
- :param pulumi.Input[builtins.str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
576
- :param pulumi.Input[builtins.str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
1013
+ :param pulumi.Input[_builtins.str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
1014
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1015
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1016
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1017
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1018
+ :param pulumi.Input[_builtins.bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
1019
+ :param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
1020
+ :param pulumi.Input[_builtins.str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
577
1021
  this is set you need to also set client_key.
578
- :param pulumi.Input[builtins.str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
1022
+ :param pulumi.Input[_builtins.str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
579
1023
  you need to also set client_cert.
580
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
581
- :param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
582
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1024
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
1025
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1026
+ :param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
1027
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
583
1028
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
584
- :param pulumi.Input[builtins.bool] local: Specifies if the secret backend is local only.
585
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
586
- for credentials issued by this backend.
587
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
1029
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1030
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1031
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1032
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1033
+ :param pulumi.Input[_builtins.bool] local: Specifies if the secret backend is local only
1034
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
1035
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
588
1036
  The value should not contain leading or trailing forward slashes.
589
1037
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
590
1038
  *Available only for Vault Enterprise*.
591
- :param pulumi.Input[builtins.str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
1039
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1040
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1041
+ :param pulumi.Input[_builtins.str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
592
1042
  to `consul`.
593
- :param pulumi.Input[builtins.str] scheme: Specifies the URL scheme to use. Defaults to `http`.
594
- :param pulumi.Input[builtins.str] token: Specifies the Consul token to use when managing or issuing new tokens.
1043
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1044
+ :param pulumi.Input[_builtins.str] scheme: Specifies the URL scheme to use. Defaults to `http`.
1045
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1046
+ :param pulumi.Input[_builtins.str] token: Specifies the Consul token to use when managing or issuing new tokens.
595
1047
  """
596
1048
  ...
597
1049
  @overload
@@ -649,20 +1101,33 @@ class SecretBackend(pulumi.CustomResource):
649
1101
  def _internal_init(__self__,
650
1102
  resource_name: str,
651
1103
  opts: Optional[pulumi.ResourceOptions] = None,
652
- address: Optional[pulumi.Input[builtins.str]] = None,
653
- bootstrap: Optional[pulumi.Input[builtins.bool]] = None,
654
- ca_cert: Optional[pulumi.Input[builtins.str]] = None,
655
- client_cert: Optional[pulumi.Input[builtins.str]] = None,
656
- client_key: Optional[pulumi.Input[builtins.str]] = None,
657
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
658
- description: Optional[pulumi.Input[builtins.str]] = None,
659
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
660
- local: Optional[pulumi.Input[builtins.bool]] = None,
661
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
662
- namespace: Optional[pulumi.Input[builtins.str]] = None,
663
- path: Optional[pulumi.Input[builtins.str]] = None,
664
- scheme: Optional[pulumi.Input[builtins.str]] = None,
665
- token: Optional[pulumi.Input[builtins.str]] = None,
1104
+ address: Optional[pulumi.Input[_builtins.str]] = None,
1105
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1106
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1107
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1108
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1109
+ bootstrap: Optional[pulumi.Input[_builtins.bool]] = None,
1110
+ ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
1111
+ client_cert: Optional[pulumi.Input[_builtins.str]] = None,
1112
+ client_key: Optional[pulumi.Input[_builtins.str]] = None,
1113
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1114
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1115
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1116
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1117
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1118
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1119
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1120
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1121
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1122
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1123
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1124
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1125
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1126
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1127
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1128
+ scheme: Optional[pulumi.Input[_builtins.str]] = None,
1129
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1130
+ token: Optional[pulumi.Input[_builtins.str]] = None,
666
1131
  __props__=None):
667
1132
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
668
1133
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -675,19 +1140,33 @@ class SecretBackend(pulumi.CustomResource):
675
1140
  if address is None and not opts.urn:
676
1141
  raise TypeError("Missing required property 'address'")
677
1142
  __props__.__dict__["address"] = address
1143
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1144
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1145
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1146
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
678
1147
  __props__.__dict__["bootstrap"] = bootstrap
679
1148
  __props__.__dict__["ca_cert"] = ca_cert
680
1149
  __props__.__dict__["client_cert"] = None if client_cert is None else pulumi.Output.secret(client_cert)
681
1150
  __props__.__dict__["client_key"] = None if client_key is None else pulumi.Output.secret(client_key)
682
1151
  __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1152
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
683
1153
  __props__.__dict__["description"] = description
684
1154
  __props__.__dict__["disable_remount"] = disable_remount
1155
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1156
+ __props__.__dict__["force_no_cache"] = force_no_cache
1157
+ __props__.__dict__["identity_token_key"] = identity_token_key
1158
+ __props__.__dict__["listing_visibility"] = listing_visibility
685
1159
  __props__.__dict__["local"] = local
686
1160
  __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
687
1161
  __props__.__dict__["namespace"] = namespace
1162
+ __props__.__dict__["options"] = options
1163
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
688
1164
  __props__.__dict__["path"] = path
1165
+ __props__.__dict__["plugin_version"] = plugin_version
689
1166
  __props__.__dict__["scheme"] = scheme
1167
+ __props__.__dict__["seal_wrap"] = seal_wrap
690
1168
  __props__.__dict__["token"] = None if token is None else pulumi.Output.secret(token)
1169
+ __props__.__dict__["accessor"] = None
691
1170
  secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["clientCert", "clientKey", "token"])
692
1171
  opts = pulumi.ResourceOptions.merge(opts, secret_opts)
693
1172
  super(SecretBackend, __self__).__init__(
@@ -700,20 +1179,34 @@ class SecretBackend(pulumi.CustomResource):
700
1179
  def get(resource_name: str,
701
1180
  id: pulumi.Input[str],
702
1181
  opts: Optional[pulumi.ResourceOptions] = None,
703
- address: Optional[pulumi.Input[builtins.str]] = None,
704
- bootstrap: Optional[pulumi.Input[builtins.bool]] = None,
705
- ca_cert: Optional[pulumi.Input[builtins.str]] = None,
706
- client_cert: Optional[pulumi.Input[builtins.str]] = None,
707
- client_key: Optional[pulumi.Input[builtins.str]] = None,
708
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
709
- description: Optional[pulumi.Input[builtins.str]] = None,
710
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
711
- local: Optional[pulumi.Input[builtins.bool]] = None,
712
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
713
- namespace: Optional[pulumi.Input[builtins.str]] = None,
714
- path: Optional[pulumi.Input[builtins.str]] = None,
715
- scheme: Optional[pulumi.Input[builtins.str]] = None,
716
- token: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretBackend':
1182
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
1183
+ address: Optional[pulumi.Input[_builtins.str]] = None,
1184
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1185
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1186
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1187
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1188
+ bootstrap: Optional[pulumi.Input[_builtins.bool]] = None,
1189
+ ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
1190
+ client_cert: Optional[pulumi.Input[_builtins.str]] = None,
1191
+ client_key: Optional[pulumi.Input[_builtins.str]] = None,
1192
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1193
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1194
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1195
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1196
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1197
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1198
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1199
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1200
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1201
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1202
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1203
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1204
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1205
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1206
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1207
+ scheme: Optional[pulumi.Input[_builtins.str]] = None,
1208
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1209
+ token: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackend':
717
1210
  """
718
1211
  Get an existing SecretBackend resource's state with the given name, id, and optional extra
719
1212
  properties used to qualify the lookup.
@@ -721,136 +1214,242 @@ class SecretBackend(pulumi.CustomResource):
721
1214
  :param str resource_name: The unique name of the resulting resource.
722
1215
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
723
1216
  :param pulumi.ResourceOptions opts: Options for the resource.
724
- :param pulumi.Input[builtins.str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
725
- :param pulumi.Input[builtins.bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
726
- :param pulumi.Input[builtins.str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
727
- :param pulumi.Input[builtins.str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
1217
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
1218
+ :param pulumi.Input[_builtins.str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
1219
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1220
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1221
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1222
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1223
+ :param pulumi.Input[_builtins.bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
1224
+ :param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
1225
+ :param pulumi.Input[_builtins.str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
728
1226
  this is set you need to also set client_key.
729
- :param pulumi.Input[builtins.str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
1227
+ :param pulumi.Input[_builtins.str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
730
1228
  you need to also set client_cert.
731
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
732
- :param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
733
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1229
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
1230
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1231
+ :param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
1232
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
734
1233
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
735
- :param pulumi.Input[builtins.bool] local: Specifies if the secret backend is local only.
736
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
737
- for credentials issued by this backend.
738
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
1234
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1235
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1236
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1237
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1238
+ :param pulumi.Input[_builtins.bool] local: Specifies if the secret backend is local only
1239
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
1240
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
739
1241
  The value should not contain leading or trailing forward slashes.
740
1242
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
741
1243
  *Available only for Vault Enterprise*.
742
- :param pulumi.Input[builtins.str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
1244
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1245
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1246
+ :param pulumi.Input[_builtins.str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
743
1247
  to `consul`.
744
- :param pulumi.Input[builtins.str] scheme: Specifies the URL scheme to use. Defaults to `http`.
745
- :param pulumi.Input[builtins.str] token: Specifies the Consul token to use when managing or issuing new tokens.
1248
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1249
+ :param pulumi.Input[_builtins.str] scheme: Specifies the URL scheme to use. Defaults to `http`.
1250
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1251
+ :param pulumi.Input[_builtins.str] token: Specifies the Consul token to use when managing or issuing new tokens.
746
1252
  """
747
1253
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
748
1254
 
749
1255
  __props__ = _SecretBackendState.__new__(_SecretBackendState)
750
1256
 
1257
+ __props__.__dict__["accessor"] = accessor
751
1258
  __props__.__dict__["address"] = address
1259
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1260
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1261
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1262
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
752
1263
  __props__.__dict__["bootstrap"] = bootstrap
753
1264
  __props__.__dict__["ca_cert"] = ca_cert
754
1265
  __props__.__dict__["client_cert"] = client_cert
755
1266
  __props__.__dict__["client_key"] = client_key
756
1267
  __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1268
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
757
1269
  __props__.__dict__["description"] = description
758
1270
  __props__.__dict__["disable_remount"] = disable_remount
1271
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1272
+ __props__.__dict__["force_no_cache"] = force_no_cache
1273
+ __props__.__dict__["identity_token_key"] = identity_token_key
1274
+ __props__.__dict__["listing_visibility"] = listing_visibility
759
1275
  __props__.__dict__["local"] = local
760
1276
  __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
761
1277
  __props__.__dict__["namespace"] = namespace
1278
+ __props__.__dict__["options"] = options
1279
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
762
1280
  __props__.__dict__["path"] = path
1281
+ __props__.__dict__["plugin_version"] = plugin_version
763
1282
  __props__.__dict__["scheme"] = scheme
1283
+ __props__.__dict__["seal_wrap"] = seal_wrap
764
1284
  __props__.__dict__["token"] = token
765
1285
  return SecretBackend(resource_name, opts=opts, __props__=__props__)
766
1286
 
767
- @property
1287
+ @_builtins.property
768
1288
  @pulumi.getter
769
- def address(self) -> pulumi.Output[builtins.str]:
1289
+ def accessor(self) -> pulumi.Output[_builtins.str]:
1290
+ """
1291
+ Accessor of the mount
1292
+ """
1293
+ return pulumi.get(self, "accessor")
1294
+
1295
+ @_builtins.property
1296
+ @pulumi.getter
1297
+ def address(self) -> pulumi.Output[_builtins.str]:
770
1298
  """
771
1299
  Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
772
1300
  """
773
1301
  return pulumi.get(self, "address")
774
1302
 
775
- @property
1303
+ @_builtins.property
1304
+ @pulumi.getter(name="allowedManagedKeys")
1305
+ def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1306
+ """
1307
+ List of managed key registry entry names that the mount in question is allowed to access
1308
+ """
1309
+ return pulumi.get(self, "allowed_managed_keys")
1310
+
1311
+ @_builtins.property
1312
+ @pulumi.getter(name="allowedResponseHeaders")
1313
+ def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1314
+ """
1315
+ List of headers to allow and pass from the request to the plugin
1316
+ """
1317
+ return pulumi.get(self, "allowed_response_headers")
1318
+
1319
+ @_builtins.property
1320
+ @pulumi.getter(name="auditNonHmacRequestKeys")
1321
+ def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1322
+ """
1323
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1324
+ """
1325
+ return pulumi.get(self, "audit_non_hmac_request_keys")
1326
+
1327
+ @_builtins.property
1328
+ @pulumi.getter(name="auditNonHmacResponseKeys")
1329
+ def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1330
+ """
1331
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1332
+ """
1333
+ return pulumi.get(self, "audit_non_hmac_response_keys")
1334
+
1335
+ @_builtins.property
776
1336
  @pulumi.getter
777
- def bootstrap(self) -> pulumi.Output[Optional[builtins.bool]]:
1337
+ def bootstrap(self) -> pulumi.Output[Optional[_builtins.bool]]:
778
1338
  """
779
1339
  Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
780
1340
  """
781
1341
  return pulumi.get(self, "bootstrap")
782
1342
 
783
- @property
1343
+ @_builtins.property
784
1344
  @pulumi.getter(name="caCert")
785
- def ca_cert(self) -> pulumi.Output[Optional[builtins.str]]:
1345
+ def ca_cert(self) -> pulumi.Output[Optional[_builtins.str]]:
786
1346
  """
787
1347
  CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
788
1348
  """
789
1349
  return pulumi.get(self, "ca_cert")
790
1350
 
791
- @property
1351
+ @_builtins.property
792
1352
  @pulumi.getter(name="clientCert")
793
- def client_cert(self) -> pulumi.Output[Optional[builtins.str]]:
1353
+ def client_cert(self) -> pulumi.Output[Optional[_builtins.str]]:
794
1354
  """
795
1355
  Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
796
1356
  this is set you need to also set client_key.
797
1357
  """
798
1358
  return pulumi.get(self, "client_cert")
799
1359
 
800
- @property
1360
+ @_builtins.property
801
1361
  @pulumi.getter(name="clientKey")
802
- def client_key(self) -> pulumi.Output[Optional[builtins.str]]:
1362
+ def client_key(self) -> pulumi.Output[Optional[_builtins.str]]:
803
1363
  """
804
1364
  Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
805
1365
  you need to also set client_cert.
806
1366
  """
807
1367
  return pulumi.get(self, "client_key")
808
1368
 
809
- @property
1369
+ @_builtins.property
810
1370
  @pulumi.getter(name="defaultLeaseTtlSeconds")
811
- def default_lease_ttl_seconds(self) -> pulumi.Output[Optional[builtins.int]]:
1371
+ def default_lease_ttl_seconds(self) -> pulumi.Output[Optional[_builtins.int]]:
812
1372
  """
813
- The default TTL for credentials issued by this backend.
1373
+ Default lease duration for secrets in seconds
814
1374
  """
815
1375
  return pulumi.get(self, "default_lease_ttl_seconds")
816
1376
 
817
- @property
1377
+ @_builtins.property
1378
+ @pulumi.getter(name="delegatedAuthAccessors")
1379
+ def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1380
+ """
1381
+ List of headers to allow and pass from the request to the plugin
1382
+ """
1383
+ return pulumi.get(self, "delegated_auth_accessors")
1384
+
1385
+ @_builtins.property
818
1386
  @pulumi.getter
819
- def description(self) -> pulumi.Output[Optional[builtins.str]]:
1387
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
820
1388
  """
821
1389
  A human-friendly description for this backend.
822
1390
  """
823
1391
  return pulumi.get(self, "description")
824
1392
 
825
- @property
1393
+ @_builtins.property
826
1394
  @pulumi.getter(name="disableRemount")
827
- def disable_remount(self) -> pulumi.Output[Optional[builtins.bool]]:
1395
+ def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
828
1396
  """
829
1397
  If set, opts out of mount migration on path updates.
830
1398
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
831
1399
  """
832
1400
  return pulumi.get(self, "disable_remount")
833
1401
 
834
- @property
1402
+ @_builtins.property
1403
+ @pulumi.getter(name="externalEntropyAccess")
1404
+ def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
1405
+ """
1406
+ Enable the secrets engine to access Vault's external entropy source
1407
+ """
1408
+ return pulumi.get(self, "external_entropy_access")
1409
+
1410
+ @_builtins.property
1411
+ @pulumi.getter(name="forceNoCache")
1412
+ def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
1413
+ """
1414
+ If set to true, disables caching.
1415
+ """
1416
+ return pulumi.get(self, "force_no_cache")
1417
+
1418
+ @_builtins.property
1419
+ @pulumi.getter(name="identityTokenKey")
1420
+ def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
1421
+ """
1422
+ The key to use for signing plugin workload identity tokens
1423
+ """
1424
+ return pulumi.get(self, "identity_token_key")
1425
+
1426
+ @_builtins.property
1427
+ @pulumi.getter(name="listingVisibility")
1428
+ def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
1429
+ """
1430
+ Specifies whether to show this mount in the UI-specific listing endpoint
1431
+ """
1432
+ return pulumi.get(self, "listing_visibility")
1433
+
1434
+ @_builtins.property
835
1435
  @pulumi.getter
836
- def local(self) -> pulumi.Output[Optional[builtins.bool]]:
1436
+ def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
837
1437
  """
838
- Specifies if the secret backend is local only.
1438
+ Specifies if the secret backend is local only
839
1439
  """
840
1440
  return pulumi.get(self, "local")
841
1441
 
842
- @property
1442
+ @_builtins.property
843
1443
  @pulumi.getter(name="maxLeaseTtlSeconds")
844
- def max_lease_ttl_seconds(self) -> pulumi.Output[Optional[builtins.int]]:
1444
+ def max_lease_ttl_seconds(self) -> pulumi.Output[Optional[_builtins.int]]:
845
1445
  """
846
- The maximum TTL that can be requested
847
- for credentials issued by this backend.
1446
+ Maximum possible lease duration for secrets in seconds
848
1447
  """
849
1448
  return pulumi.get(self, "max_lease_ttl_seconds")
850
1449
 
851
- @property
1450
+ @_builtins.property
852
1451
  @pulumi.getter
853
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
1452
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
854
1453
  """
855
1454
  The namespace to provision the resource in.
856
1455
  The value should not contain leading or trailing forward slashes.
@@ -859,26 +1458,58 @@ class SecretBackend(pulumi.CustomResource):
859
1458
  """
860
1459
  return pulumi.get(self, "namespace")
861
1460
 
862
- @property
1461
+ @_builtins.property
863
1462
  @pulumi.getter
864
- def path(self) -> pulumi.Output[Optional[builtins.str]]:
1463
+ def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
1464
+ """
1465
+ Specifies mount type specific options that are passed to the backend
1466
+ """
1467
+ return pulumi.get(self, "options")
1468
+
1469
+ @_builtins.property
1470
+ @pulumi.getter(name="passthroughRequestHeaders")
1471
+ def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1472
+ """
1473
+ List of headers to allow and pass from the request to the plugin
1474
+ """
1475
+ return pulumi.get(self, "passthrough_request_headers")
1476
+
1477
+ @_builtins.property
1478
+ @pulumi.getter
1479
+ def path(self) -> pulumi.Output[Optional[_builtins.str]]:
865
1480
  """
866
1481
  The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
867
1482
  to `consul`.
868
1483
  """
869
1484
  return pulumi.get(self, "path")
870
1485
 
871
- @property
1486
+ @_builtins.property
1487
+ @pulumi.getter(name="pluginVersion")
1488
+ def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
1489
+ """
1490
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1491
+ """
1492
+ return pulumi.get(self, "plugin_version")
1493
+
1494
+ @_builtins.property
872
1495
  @pulumi.getter
873
- def scheme(self) -> pulumi.Output[Optional[builtins.str]]:
1496
+ def scheme(self) -> pulumi.Output[Optional[_builtins.str]]:
874
1497
  """
875
1498
  Specifies the URL scheme to use. Defaults to `http`.
876
1499
  """
877
1500
  return pulumi.get(self, "scheme")
878
1501
 
879
- @property
1502
+ @_builtins.property
1503
+ @pulumi.getter(name="sealWrap")
1504
+ def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
1505
+ """
1506
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1507
+ """
1508
+ return pulumi.get(self, "seal_wrap")
1509
+
1510
+ @_builtins.property
880
1511
  @pulumi.getter
881
- def token(self) -> pulumi.Output[Optional[builtins.str]]:
1512
+ def token(self) -> pulumi.Output[Optional[_builtins.str]]:
882
1513
  """
883
1514
  Specifies the Consul token to use when managing or issuing new tokens.
884
1515
  """