pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (269) hide show
  1. pulumi_vault/__init__.py +19 -1
  2. pulumi_vault/_inputs.py +873 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +1016 -439
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +1057 -285
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +887 -256
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +426 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +878 -336
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +400 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +1006 -227
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +431 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +732 -693
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +380 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +909 -271
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/oci_auth_backend.py +683 -0
  168. pulumi_vault/oci_auth_backend_role.py +798 -0
  169. pulumi_vault/okta/__init__.py +1 -1
  170. pulumi_vault/okta/_inputs.py +31 -32
  171. pulumi_vault/okta/auth_backend.py +305 -306
  172. pulumi_vault/okta/auth_backend_group.py +69 -70
  173. pulumi_vault/okta/auth_backend_user.py +86 -87
  174. pulumi_vault/okta/outputs.py +21 -22
  175. pulumi_vault/outputs.py +234 -82
  176. pulumi_vault/pkisecret/__init__.py +1 -1
  177. pulumi_vault/pkisecret/_inputs.py +55 -56
  178. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  179. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  180. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  181. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  182. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  183. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  184. pulumi_vault/pkisecret/backend_config_scep.py +205 -159
  185. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  186. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  187. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  188. pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
  189. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  190. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  191. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  192. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  193. pulumi_vault/pkisecret/outputs.py +61 -62
  194. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  195. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  196. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  197. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  198. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  199. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  200. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  201. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  202. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  203. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  204. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  205. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  206. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  207. pulumi_vault/plugin.py +154 -155
  208. pulumi_vault/plugin_pinned_version.py +52 -53
  209. pulumi_vault/policy.py +52 -53
  210. pulumi_vault/provider.py +160 -161
  211. pulumi_vault/pulumi-plugin.json +1 -1
  212. pulumi_vault/quota_lease_count.py +103 -104
  213. pulumi_vault/quota_rate_limit.py +171 -172
  214. pulumi_vault/rabbitmq/__init__.py +1 -1
  215. pulumi_vault/rabbitmq/_inputs.py +50 -51
  216. pulumi_vault/rabbitmq/outputs.py +34 -35
  217. pulumi_vault/rabbitmq/secret_backend.py +902 -231
  218. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  219. pulumi_vault/raft_autopilot.py +137 -138
  220. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  221. pulumi_vault/rgp_policy.py +69 -70
  222. pulumi_vault/saml/__init__.py +1 -1
  223. pulumi_vault/saml/auth_backend.py +188 -189
  224. pulumi_vault/saml/auth_backend_role.py +290 -291
  225. pulumi_vault/scep_auth_backend_role.py +252 -253
  226. pulumi_vault/secrets/__init__.py +1 -1
  227. pulumi_vault/secrets/_inputs.py +19 -20
  228. pulumi_vault/secrets/outputs.py +13 -14
  229. pulumi_vault/secrets/sync_association.py +88 -89
  230. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  231. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  232. pulumi_vault/secrets/sync_config.py +52 -53
  233. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  234. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  235. pulumi_vault/secrets/sync_github_apps.py +78 -79
  236. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  237. pulumi_vault/ssh/__init__.py +1 -1
  238. pulumi_vault/ssh/_inputs.py +13 -14
  239. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  240. pulumi_vault/ssh/outputs.py +9 -10
  241. pulumi_vault/ssh/secret_backend_ca.py +217 -124
  242. pulumi_vault/ssh/secret_backend_role.py +446 -447
  243. pulumi_vault/terraformcloud/__init__.py +1 -1
  244. pulumi_vault/terraformcloud/secret_backend.py +833 -155
  245. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  246. pulumi_vault/terraformcloud/secret_role.py +117 -118
  247. pulumi_vault/token.py +301 -302
  248. pulumi_vault/tokenauth/__init__.py +1 -1
  249. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  250. pulumi_vault/transform/__init__.py +1 -1
  251. pulumi_vault/transform/alphabet.py +69 -70
  252. pulumi_vault/transform/get_decode.py +57 -58
  253. pulumi_vault/transform/get_encode.py +57 -58
  254. pulumi_vault/transform/role.py +69 -70
  255. pulumi_vault/transform/template.py +137 -138
  256. pulumi_vault/transform/transformation.py +171 -172
  257. pulumi_vault/transit/__init__.py +1 -1
  258. pulumi_vault/transit/get_cmac.py +47 -48
  259. pulumi_vault/transit/get_decrypt.py +25 -26
  260. pulumi_vault/transit/get_encrypt.py +29 -30
  261. pulumi_vault/transit/get_sign.py +71 -72
  262. pulumi_vault/transit/get_verify.py +83 -84
  263. pulumi_vault/transit/secret_backend_key.py +377 -350
  264. pulumi_vault/transit/secret_cache_config.py +52 -53
  265. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
  266. pulumi_vault-7.2.0.dist-info/RECORD +270 -0
  267. pulumi_vault-7.1.0.dist-info/RECORD +0 -268
  268. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
  269. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,147 +19,251 @@ __all__ = ['SecretBackendArgs', 'SecretBackend']
20
19
  @pulumi.input_type
21
20
  class SecretBackendArgs:
22
21
  def __init__(__self__, *,
23
- credentials: Optional[pulumi.Input[builtins.str]] = None,
24
- credentials_wo_version: Optional[pulumi.Input[builtins.int]] = None,
25
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
26
- description: Optional[pulumi.Input[builtins.str]] = None,
27
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
28
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
29
- identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
30
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
31
- identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
32
- local: Optional[pulumi.Input[builtins.bool]] = None,
33
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
34
- namespace: Optional[pulumi.Input[builtins.str]] = None,
35
- path: Optional[pulumi.Input[builtins.str]] = None,
36
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
37
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
38
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
39
- service_account_email: Optional[pulumi.Input[builtins.str]] = None):
22
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
23
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
24
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
25
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ credentials: Optional[pulumi.Input[_builtins.str]] = None,
27
+ credentials_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
28
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
29
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
30
+ description: Optional[pulumi.Input[_builtins.str]] = None,
31
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
32
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
33
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
34
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
35
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
36
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
37
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
38
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
39
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
40
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
41
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
42
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
43
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
44
+ path: Optional[pulumi.Input[_builtins.str]] = None,
45
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
46
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
47
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
48
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
49
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
50
+ service_account_email: Optional[pulumi.Input[_builtins.str]] = None):
40
51
  """
41
52
  The set of arguments for constructing a SecretBackend resource.
42
- :param pulumi.Input[builtins.str] credentials: JSON-encoded credentials to use to connect to GCP
43
- :param pulumi.Input[builtins.int] credentials_wo_version: The version of the `credentials_wo`. For more info see updating write-only attributes.
44
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: The default TTL for credentials
45
- issued by this backend. Defaults to '0'.
46
- :param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
47
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
53
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
54
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
55
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
56
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
57
+ :param pulumi.Input[_builtins.str] credentials: JSON-encoded credentials to use to connect to GCP
58
+ :param pulumi.Input[_builtins.int] credentials_wo_version: The version of the `credentials_wo`. For more info see updating write-only attributes.
59
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
60
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
61
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
62
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
48
63
  *Available only for Vault Enterprise*.
49
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
64
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
50
65
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
51
- :param pulumi.Input[builtins.str] identity_token_audience: The audience claim value for plugin identity
66
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
67
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
68
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value for plugin identity
52
69
  tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
53
70
  Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
54
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin identity
55
- tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
56
- :param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated tokens.
57
- :param pulumi.Input[builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
58
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
59
- for credentials issued by this backend. Defaults to '0'.
60
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
71
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens.
72
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated tokens.
73
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
74
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
75
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
76
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
61
77
  The value should not contain leading or trailing forward slashes.
62
78
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
63
79
  *Available only for Vault Enterprise*.
64
- :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
80
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
81
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
82
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
65
83
  not begin or end with a `/`. Defaults to `gcp`.
66
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
84
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
85
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
67
86
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
68
87
  *Available only for Vault Enterprise*.
69
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
88
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
70
89
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
71
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
90
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
72
91
  a rotation when a scheduled token rotation occurs. The default rotation window is
73
92
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
74
- :param pulumi.Input[builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
93
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
94
+ :param pulumi.Input[_builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
75
95
  Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
76
96
  """
97
+ if allowed_managed_keys is not None:
98
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
99
+ if allowed_response_headers is not None:
100
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
101
+ if audit_non_hmac_request_keys is not None:
102
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
103
+ if audit_non_hmac_response_keys is not None:
104
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
77
105
  if credentials is not None:
78
106
  pulumi.set(__self__, "credentials", credentials)
79
107
  if credentials_wo_version is not None:
80
108
  pulumi.set(__self__, "credentials_wo_version", credentials_wo_version)
81
109
  if default_lease_ttl_seconds is not None:
82
110
  pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
111
+ if delegated_auth_accessors is not None:
112
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
83
113
  if description is not None:
84
114
  pulumi.set(__self__, "description", description)
85
115
  if disable_automated_rotation is not None:
86
116
  pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
87
117
  if disable_remount is not None:
88
118
  pulumi.set(__self__, "disable_remount", disable_remount)
119
+ if external_entropy_access is not None:
120
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
121
+ if force_no_cache is not None:
122
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
89
123
  if identity_token_audience is not None:
90
124
  pulumi.set(__self__, "identity_token_audience", identity_token_audience)
91
125
  if identity_token_key is not None:
92
126
  pulumi.set(__self__, "identity_token_key", identity_token_key)
93
127
  if identity_token_ttl is not None:
94
128
  pulumi.set(__self__, "identity_token_ttl", identity_token_ttl)
129
+ if listing_visibility is not None:
130
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
95
131
  if local is not None:
96
132
  pulumi.set(__self__, "local", local)
97
133
  if max_lease_ttl_seconds is not None:
98
134
  pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
99
135
  if namespace is not None:
100
136
  pulumi.set(__self__, "namespace", namespace)
137
+ if options is not None:
138
+ pulumi.set(__self__, "options", options)
139
+ if passthrough_request_headers is not None:
140
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
101
141
  if path is not None:
102
142
  pulumi.set(__self__, "path", path)
143
+ if plugin_version is not None:
144
+ pulumi.set(__self__, "plugin_version", plugin_version)
103
145
  if rotation_period is not None:
104
146
  pulumi.set(__self__, "rotation_period", rotation_period)
105
147
  if rotation_schedule is not None:
106
148
  pulumi.set(__self__, "rotation_schedule", rotation_schedule)
107
149
  if rotation_window is not None:
108
150
  pulumi.set(__self__, "rotation_window", rotation_window)
151
+ if seal_wrap is not None:
152
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
109
153
  if service_account_email is not None:
110
154
  pulumi.set(__self__, "service_account_email", service_account_email)
111
155
 
112
- @property
156
+ @_builtins.property
157
+ @pulumi.getter(name="allowedManagedKeys")
158
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
159
+ """
160
+ List of managed key registry entry names that the mount in question is allowed to access
161
+ """
162
+ return pulumi.get(self, "allowed_managed_keys")
163
+
164
+ @allowed_managed_keys.setter
165
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
166
+ pulumi.set(self, "allowed_managed_keys", value)
167
+
168
+ @_builtins.property
169
+ @pulumi.getter(name="allowedResponseHeaders")
170
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
171
+ """
172
+ List of headers to allow and pass from the request to the plugin
173
+ """
174
+ return pulumi.get(self, "allowed_response_headers")
175
+
176
+ @allowed_response_headers.setter
177
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
178
+ pulumi.set(self, "allowed_response_headers", value)
179
+
180
+ @_builtins.property
181
+ @pulumi.getter(name="auditNonHmacRequestKeys")
182
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
183
+ """
184
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
185
+ """
186
+ return pulumi.get(self, "audit_non_hmac_request_keys")
187
+
188
+ @audit_non_hmac_request_keys.setter
189
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
190
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
191
+
192
+ @_builtins.property
193
+ @pulumi.getter(name="auditNonHmacResponseKeys")
194
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
195
+ """
196
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
197
+ """
198
+ return pulumi.get(self, "audit_non_hmac_response_keys")
199
+
200
+ @audit_non_hmac_response_keys.setter
201
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
202
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
203
+
204
+ @_builtins.property
113
205
  @pulumi.getter
114
- def credentials(self) -> Optional[pulumi.Input[builtins.str]]:
206
+ def credentials(self) -> Optional[pulumi.Input[_builtins.str]]:
115
207
  """
116
208
  JSON-encoded credentials to use to connect to GCP
117
209
  """
118
210
  return pulumi.get(self, "credentials")
119
211
 
120
212
  @credentials.setter
121
- def credentials(self, value: Optional[pulumi.Input[builtins.str]]):
213
+ def credentials(self, value: Optional[pulumi.Input[_builtins.str]]):
122
214
  pulumi.set(self, "credentials", value)
123
215
 
124
- @property
216
+ @_builtins.property
125
217
  @pulumi.getter(name="credentialsWoVersion")
126
- def credentials_wo_version(self) -> Optional[pulumi.Input[builtins.int]]:
218
+ def credentials_wo_version(self) -> Optional[pulumi.Input[_builtins.int]]:
127
219
  """
128
220
  The version of the `credentials_wo`. For more info see updating write-only attributes.
129
221
  """
130
222
  return pulumi.get(self, "credentials_wo_version")
131
223
 
132
224
  @credentials_wo_version.setter
133
- def credentials_wo_version(self, value: Optional[pulumi.Input[builtins.int]]):
225
+ def credentials_wo_version(self, value: Optional[pulumi.Input[_builtins.int]]):
134
226
  pulumi.set(self, "credentials_wo_version", value)
135
227
 
136
- @property
228
+ @_builtins.property
137
229
  @pulumi.getter(name="defaultLeaseTtlSeconds")
138
- def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
230
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
139
231
  """
140
- The default TTL for credentials
141
- issued by this backend. Defaults to '0'.
232
+ Default lease duration for secrets in seconds
142
233
  """
143
234
  return pulumi.get(self, "default_lease_ttl_seconds")
144
235
 
145
236
  @default_lease_ttl_seconds.setter
146
- def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
237
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
147
238
  pulumi.set(self, "default_lease_ttl_seconds", value)
148
239
 
149
- @property
240
+ @_builtins.property
241
+ @pulumi.getter(name="delegatedAuthAccessors")
242
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
243
+ """
244
+ List of headers to allow and pass from the request to the plugin
245
+ """
246
+ return pulumi.get(self, "delegated_auth_accessors")
247
+
248
+ @delegated_auth_accessors.setter
249
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
250
+ pulumi.set(self, "delegated_auth_accessors", value)
251
+
252
+ @_builtins.property
150
253
  @pulumi.getter
151
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
254
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
152
255
  """
153
- A human-friendly description for this backend.
256
+ Human-friendly description of the mount for the backend.
154
257
  """
155
258
  return pulumi.get(self, "description")
156
259
 
157
260
  @description.setter
158
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
261
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
159
262
  pulumi.set(self, "description", value)
160
263
 
161
- @property
264
+ @_builtins.property
162
265
  @pulumi.getter(name="disableAutomatedRotation")
163
- def disable_automated_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
266
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
164
267
  """
165
268
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
166
269
  *Available only for Vault Enterprise*.
@@ -168,12 +271,12 @@ class SecretBackendArgs:
168
271
  return pulumi.get(self, "disable_automated_rotation")
169
272
 
170
273
  @disable_automated_rotation.setter
171
- def disable_automated_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
274
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
172
275
  pulumi.set(self, "disable_automated_rotation", value)
173
276
 
174
- @property
277
+ @_builtins.property
175
278
  @pulumi.getter(name="disableRemount")
176
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
279
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
177
280
  """
178
281
  If set, opts out of mount migration on path updates.
179
282
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -181,12 +284,36 @@ class SecretBackendArgs:
181
284
  return pulumi.get(self, "disable_remount")
182
285
 
183
286
  @disable_remount.setter
184
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
287
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
185
288
  pulumi.set(self, "disable_remount", value)
186
289
 
187
- @property
290
+ @_builtins.property
291
+ @pulumi.getter(name="externalEntropyAccess")
292
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
293
+ """
294
+ Enable the secrets engine to access Vault's external entropy source
295
+ """
296
+ return pulumi.get(self, "external_entropy_access")
297
+
298
+ @external_entropy_access.setter
299
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
300
+ pulumi.set(self, "external_entropy_access", value)
301
+
302
+ @_builtins.property
303
+ @pulumi.getter(name="forceNoCache")
304
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
305
+ """
306
+ If set to true, disables caching.
307
+ """
308
+ return pulumi.get(self, "force_no_cache")
309
+
310
+ @force_no_cache.setter
311
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
312
+ pulumi.set(self, "force_no_cache", value)
313
+
314
+ @_builtins.property
188
315
  @pulumi.getter(name="identityTokenAudience")
189
- def identity_token_audience(self) -> Optional[pulumi.Input[builtins.str]]:
316
+ def identity_token_audience(self) -> Optional[pulumi.Input[_builtins.str]]:
190
317
  """
191
318
  The audience claim value for plugin identity
192
319
  tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
@@ -195,62 +322,72 @@ class SecretBackendArgs:
195
322
  return pulumi.get(self, "identity_token_audience")
196
323
 
197
324
  @identity_token_audience.setter
198
- def identity_token_audience(self, value: Optional[pulumi.Input[builtins.str]]):
325
+ def identity_token_audience(self, value: Optional[pulumi.Input[_builtins.str]]):
199
326
  pulumi.set(self, "identity_token_audience", value)
200
327
 
201
- @property
328
+ @_builtins.property
202
329
  @pulumi.getter(name="identityTokenKey")
203
- def identity_token_key(self) -> Optional[pulumi.Input[builtins.str]]:
330
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
204
331
  """
205
- The key to use for signing plugin identity
206
- tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
332
+ The key to use for signing identity tokens.
207
333
  """
208
334
  return pulumi.get(self, "identity_token_key")
209
335
 
210
336
  @identity_token_key.setter
211
- def identity_token_key(self, value: Optional[pulumi.Input[builtins.str]]):
337
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
212
338
  pulumi.set(self, "identity_token_key", value)
213
339
 
214
- @property
340
+ @_builtins.property
215
341
  @pulumi.getter(name="identityTokenTtl")
216
- def identity_token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
342
+ def identity_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
217
343
  """
218
344
  The TTL of generated tokens.
219
345
  """
220
346
  return pulumi.get(self, "identity_token_ttl")
221
347
 
222
348
  @identity_token_ttl.setter
223
- def identity_token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
349
+ def identity_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
224
350
  pulumi.set(self, "identity_token_ttl", value)
225
351
 
226
- @property
352
+ @_builtins.property
353
+ @pulumi.getter(name="listingVisibility")
354
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
355
+ """
356
+ Specifies whether to show this mount in the UI-specific listing endpoint
357
+ """
358
+ return pulumi.get(self, "listing_visibility")
359
+
360
+ @listing_visibility.setter
361
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
362
+ pulumi.set(self, "listing_visibility", value)
363
+
364
+ @_builtins.property
227
365
  @pulumi.getter
228
- def local(self) -> Optional[pulumi.Input[builtins.bool]]:
366
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
229
367
  """
230
- Boolean flag that can be explicitly set to true to enforce local mount in HA environment
368
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
231
369
  """
232
370
  return pulumi.get(self, "local")
233
371
 
234
372
  @local.setter
235
- def local(self, value: Optional[pulumi.Input[builtins.bool]]):
373
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
236
374
  pulumi.set(self, "local", value)
237
375
 
238
- @property
376
+ @_builtins.property
239
377
  @pulumi.getter(name="maxLeaseTtlSeconds")
240
- def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
378
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
241
379
  """
242
- The maximum TTL that can be requested
243
- for credentials issued by this backend. Defaults to '0'.
380
+ Maximum possible lease duration for secrets in seconds
244
381
  """
245
382
  return pulumi.get(self, "max_lease_ttl_seconds")
246
383
 
247
384
  @max_lease_ttl_seconds.setter
248
- def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
385
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
249
386
  pulumi.set(self, "max_lease_ttl_seconds", value)
250
387
 
251
- @property
388
+ @_builtins.property
252
389
  @pulumi.getter
253
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
390
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
254
391
  """
255
392
  The namespace to provision the resource in.
256
393
  The value should not contain leading or trailing forward slashes.
@@ -260,12 +397,36 @@ class SecretBackendArgs:
260
397
  return pulumi.get(self, "namespace")
261
398
 
262
399
  @namespace.setter
263
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
400
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
264
401
  pulumi.set(self, "namespace", value)
265
402
 
266
- @property
403
+ @_builtins.property
404
+ @pulumi.getter
405
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
406
+ """
407
+ Specifies mount type specific options that are passed to the backend
408
+ """
409
+ return pulumi.get(self, "options")
410
+
411
+ @options.setter
412
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
413
+ pulumi.set(self, "options", value)
414
+
415
+ @_builtins.property
416
+ @pulumi.getter(name="passthroughRequestHeaders")
417
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
418
+ """
419
+ List of headers to allow and pass from the request to the plugin
420
+ """
421
+ return pulumi.get(self, "passthrough_request_headers")
422
+
423
+ @passthrough_request_headers.setter
424
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
425
+ pulumi.set(self, "passthrough_request_headers", value)
426
+
427
+ @_builtins.property
267
428
  @pulumi.getter
268
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
429
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
269
430
  """
270
431
  The unique path this backend should be mounted at. Must
271
432
  not begin or end with a `/`. Defaults to `gcp`.
@@ -273,12 +434,24 @@ class SecretBackendArgs:
273
434
  return pulumi.get(self, "path")
274
435
 
275
436
  @path.setter
276
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
437
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
277
438
  pulumi.set(self, "path", value)
278
439
 
279
- @property
440
+ @_builtins.property
441
+ @pulumi.getter(name="pluginVersion")
442
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
443
+ """
444
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
445
+ """
446
+ return pulumi.get(self, "plugin_version")
447
+
448
+ @plugin_version.setter
449
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
450
+ pulumi.set(self, "plugin_version", value)
451
+
452
+ @_builtins.property
280
453
  @pulumi.getter(name="rotationPeriod")
281
- def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
454
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
282
455
  """
283
456
  The amount of time in seconds Vault should wait before rotating the root credential.
284
457
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -287,12 +460,12 @@ class SecretBackendArgs:
287
460
  return pulumi.get(self, "rotation_period")
288
461
 
289
462
  @rotation_period.setter
290
- def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
463
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
291
464
  pulumi.set(self, "rotation_period", value)
292
465
 
293
- @property
466
+ @_builtins.property
294
467
  @pulumi.getter(name="rotationSchedule")
295
- def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
468
+ def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
296
469
  """
297
470
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
298
471
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
@@ -300,12 +473,12 @@ class SecretBackendArgs:
300
473
  return pulumi.get(self, "rotation_schedule")
301
474
 
302
475
  @rotation_schedule.setter
303
- def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
476
+ def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
304
477
  pulumi.set(self, "rotation_schedule", value)
305
478
 
306
- @property
479
+ @_builtins.property
307
480
  @pulumi.getter(name="rotationWindow")
308
- def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
481
+ def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
309
482
  """
310
483
  The maximum amount of time in seconds allowed to complete
311
484
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -314,12 +487,24 @@ class SecretBackendArgs:
314
487
  return pulumi.get(self, "rotation_window")
315
488
 
316
489
  @rotation_window.setter
317
- def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
490
+ def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
318
491
  pulumi.set(self, "rotation_window", value)
319
492
 
320
- @property
493
+ @_builtins.property
494
+ @pulumi.getter(name="sealWrap")
495
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
496
+ """
497
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
498
+ """
499
+ return pulumi.get(self, "seal_wrap")
500
+
501
+ @seal_wrap.setter
502
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
503
+ pulumi.set(self, "seal_wrap", value)
504
+
505
+ @_builtins.property
321
506
  @pulumi.getter(name="serviceAccountEmail")
322
- def service_account_email(self) -> Optional[pulumi.Input[builtins.str]]:
507
+ def service_account_email(self) -> Optional[pulumi.Input[_builtins.str]]:
323
508
  """
324
509
  Service Account to impersonate for plugin workload identity federation.
325
510
  Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
@@ -327,170 +512,274 @@ class SecretBackendArgs:
327
512
  return pulumi.get(self, "service_account_email")
328
513
 
329
514
  @service_account_email.setter
330
- def service_account_email(self, value: Optional[pulumi.Input[builtins.str]]):
515
+ def service_account_email(self, value: Optional[pulumi.Input[_builtins.str]]):
331
516
  pulumi.set(self, "service_account_email", value)
332
517
 
333
518
 
334
519
  @pulumi.input_type
335
520
  class _SecretBackendState:
336
521
  def __init__(__self__, *,
337
- accessor: Optional[pulumi.Input[builtins.str]] = None,
338
- credentials: Optional[pulumi.Input[builtins.str]] = None,
339
- credentials_wo_version: Optional[pulumi.Input[builtins.int]] = None,
340
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
341
- description: Optional[pulumi.Input[builtins.str]] = None,
342
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
343
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
344
- identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
345
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
346
- identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
347
- local: Optional[pulumi.Input[builtins.bool]] = None,
348
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
349
- namespace: Optional[pulumi.Input[builtins.str]] = None,
350
- path: Optional[pulumi.Input[builtins.str]] = None,
351
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
352
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
353
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
354
- service_account_email: Optional[pulumi.Input[builtins.str]] = None):
522
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
523
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
524
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
525
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
526
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
527
+ credentials: Optional[pulumi.Input[_builtins.str]] = None,
528
+ credentials_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
529
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
530
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
531
+ description: Optional[pulumi.Input[_builtins.str]] = None,
532
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
533
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
534
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
535
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
536
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
537
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
538
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
539
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
540
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
541
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
542
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
543
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
544
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
545
+ path: Optional[pulumi.Input[_builtins.str]] = None,
546
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
547
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
548
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
549
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
550
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
551
+ service_account_email: Optional[pulumi.Input[_builtins.str]] = None):
355
552
  """
356
553
  Input properties used for looking up and filtering SecretBackend resources.
357
- :param pulumi.Input[builtins.str] accessor: The accessor of the created GCP mount.
358
- :param pulumi.Input[builtins.str] credentials: JSON-encoded credentials to use to connect to GCP
359
- :param pulumi.Input[builtins.int] credentials_wo_version: The version of the `credentials_wo`. For more info see updating write-only attributes.
360
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: The default TTL for credentials
361
- issued by this backend. Defaults to '0'.
362
- :param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
363
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
554
+ :param pulumi.Input[_builtins.str] accessor: The accessor of the created GCP mount.
555
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
556
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
557
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
558
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
559
+ :param pulumi.Input[_builtins.str] credentials: JSON-encoded credentials to use to connect to GCP
560
+ :param pulumi.Input[_builtins.int] credentials_wo_version: The version of the `credentials_wo`. For more info see updating write-only attributes.
561
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
562
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
563
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
564
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
364
565
  *Available only for Vault Enterprise*.
365
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
566
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
366
567
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
367
- :param pulumi.Input[builtins.str] identity_token_audience: The audience claim value for plugin identity
568
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
569
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
570
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value for plugin identity
368
571
  tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
369
572
  Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
370
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin identity
371
- tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
372
- :param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated tokens.
373
- :param pulumi.Input[builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
374
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
375
- for credentials issued by this backend. Defaults to '0'.
376
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
573
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens.
574
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated tokens.
575
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
576
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
577
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
578
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
377
579
  The value should not contain leading or trailing forward slashes.
378
580
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
379
581
  *Available only for Vault Enterprise*.
380
- :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
582
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
583
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
584
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
381
585
  not begin or end with a `/`. Defaults to `gcp`.
382
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
586
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
587
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
383
588
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
384
589
  *Available only for Vault Enterprise*.
385
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
590
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
386
591
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
387
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
592
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
388
593
  a rotation when a scheduled token rotation occurs. The default rotation window is
389
594
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
390
- :param pulumi.Input[builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
595
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
596
+ :param pulumi.Input[_builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
391
597
  Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
392
598
  """
393
599
  if accessor is not None:
394
600
  pulumi.set(__self__, "accessor", accessor)
601
+ if allowed_managed_keys is not None:
602
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
603
+ if allowed_response_headers is not None:
604
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
605
+ if audit_non_hmac_request_keys is not None:
606
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
607
+ if audit_non_hmac_response_keys is not None:
608
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
395
609
  if credentials is not None:
396
610
  pulumi.set(__self__, "credentials", credentials)
397
611
  if credentials_wo_version is not None:
398
612
  pulumi.set(__self__, "credentials_wo_version", credentials_wo_version)
399
613
  if default_lease_ttl_seconds is not None:
400
614
  pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
615
+ if delegated_auth_accessors is not None:
616
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
401
617
  if description is not None:
402
618
  pulumi.set(__self__, "description", description)
403
619
  if disable_automated_rotation is not None:
404
620
  pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
405
621
  if disable_remount is not None:
406
622
  pulumi.set(__self__, "disable_remount", disable_remount)
623
+ if external_entropy_access is not None:
624
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
625
+ if force_no_cache is not None:
626
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
407
627
  if identity_token_audience is not None:
408
628
  pulumi.set(__self__, "identity_token_audience", identity_token_audience)
409
629
  if identity_token_key is not None:
410
630
  pulumi.set(__self__, "identity_token_key", identity_token_key)
411
631
  if identity_token_ttl is not None:
412
632
  pulumi.set(__self__, "identity_token_ttl", identity_token_ttl)
633
+ if listing_visibility is not None:
634
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
413
635
  if local is not None:
414
636
  pulumi.set(__self__, "local", local)
415
637
  if max_lease_ttl_seconds is not None:
416
638
  pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
417
639
  if namespace is not None:
418
640
  pulumi.set(__self__, "namespace", namespace)
641
+ if options is not None:
642
+ pulumi.set(__self__, "options", options)
643
+ if passthrough_request_headers is not None:
644
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
419
645
  if path is not None:
420
646
  pulumi.set(__self__, "path", path)
647
+ if plugin_version is not None:
648
+ pulumi.set(__self__, "plugin_version", plugin_version)
421
649
  if rotation_period is not None:
422
650
  pulumi.set(__self__, "rotation_period", rotation_period)
423
651
  if rotation_schedule is not None:
424
652
  pulumi.set(__self__, "rotation_schedule", rotation_schedule)
425
653
  if rotation_window is not None:
426
654
  pulumi.set(__self__, "rotation_window", rotation_window)
655
+ if seal_wrap is not None:
656
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
427
657
  if service_account_email is not None:
428
658
  pulumi.set(__self__, "service_account_email", service_account_email)
429
659
 
430
- @property
660
+ @_builtins.property
431
661
  @pulumi.getter
432
- def accessor(self) -> Optional[pulumi.Input[builtins.str]]:
662
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
433
663
  """
434
664
  The accessor of the created GCP mount.
435
665
  """
436
666
  return pulumi.get(self, "accessor")
437
667
 
438
668
  @accessor.setter
439
- def accessor(self, value: Optional[pulumi.Input[builtins.str]]):
669
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
440
670
  pulumi.set(self, "accessor", value)
441
671
 
442
- @property
672
+ @_builtins.property
673
+ @pulumi.getter(name="allowedManagedKeys")
674
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
675
+ """
676
+ List of managed key registry entry names that the mount in question is allowed to access
677
+ """
678
+ return pulumi.get(self, "allowed_managed_keys")
679
+
680
+ @allowed_managed_keys.setter
681
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
682
+ pulumi.set(self, "allowed_managed_keys", value)
683
+
684
+ @_builtins.property
685
+ @pulumi.getter(name="allowedResponseHeaders")
686
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
687
+ """
688
+ List of headers to allow and pass from the request to the plugin
689
+ """
690
+ return pulumi.get(self, "allowed_response_headers")
691
+
692
+ @allowed_response_headers.setter
693
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
694
+ pulumi.set(self, "allowed_response_headers", value)
695
+
696
+ @_builtins.property
697
+ @pulumi.getter(name="auditNonHmacRequestKeys")
698
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
699
+ """
700
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
701
+ """
702
+ return pulumi.get(self, "audit_non_hmac_request_keys")
703
+
704
+ @audit_non_hmac_request_keys.setter
705
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
706
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
707
+
708
+ @_builtins.property
709
+ @pulumi.getter(name="auditNonHmacResponseKeys")
710
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
711
+ """
712
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
713
+ """
714
+ return pulumi.get(self, "audit_non_hmac_response_keys")
715
+
716
+ @audit_non_hmac_response_keys.setter
717
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
718
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
719
+
720
+ @_builtins.property
443
721
  @pulumi.getter
444
- def credentials(self) -> Optional[pulumi.Input[builtins.str]]:
722
+ def credentials(self) -> Optional[pulumi.Input[_builtins.str]]:
445
723
  """
446
724
  JSON-encoded credentials to use to connect to GCP
447
725
  """
448
726
  return pulumi.get(self, "credentials")
449
727
 
450
728
  @credentials.setter
451
- def credentials(self, value: Optional[pulumi.Input[builtins.str]]):
729
+ def credentials(self, value: Optional[pulumi.Input[_builtins.str]]):
452
730
  pulumi.set(self, "credentials", value)
453
731
 
454
- @property
732
+ @_builtins.property
455
733
  @pulumi.getter(name="credentialsWoVersion")
456
- def credentials_wo_version(self) -> Optional[pulumi.Input[builtins.int]]:
734
+ def credentials_wo_version(self) -> Optional[pulumi.Input[_builtins.int]]:
457
735
  """
458
736
  The version of the `credentials_wo`. For more info see updating write-only attributes.
459
737
  """
460
738
  return pulumi.get(self, "credentials_wo_version")
461
739
 
462
740
  @credentials_wo_version.setter
463
- def credentials_wo_version(self, value: Optional[pulumi.Input[builtins.int]]):
741
+ def credentials_wo_version(self, value: Optional[pulumi.Input[_builtins.int]]):
464
742
  pulumi.set(self, "credentials_wo_version", value)
465
743
 
466
- @property
744
+ @_builtins.property
467
745
  @pulumi.getter(name="defaultLeaseTtlSeconds")
468
- def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
746
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
469
747
  """
470
- The default TTL for credentials
471
- issued by this backend. Defaults to '0'.
748
+ Default lease duration for secrets in seconds
472
749
  """
473
750
  return pulumi.get(self, "default_lease_ttl_seconds")
474
751
 
475
752
  @default_lease_ttl_seconds.setter
476
- def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
753
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
477
754
  pulumi.set(self, "default_lease_ttl_seconds", value)
478
755
 
479
- @property
756
+ @_builtins.property
757
+ @pulumi.getter(name="delegatedAuthAccessors")
758
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
759
+ """
760
+ List of headers to allow and pass from the request to the plugin
761
+ """
762
+ return pulumi.get(self, "delegated_auth_accessors")
763
+
764
+ @delegated_auth_accessors.setter
765
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
766
+ pulumi.set(self, "delegated_auth_accessors", value)
767
+
768
+ @_builtins.property
480
769
  @pulumi.getter
481
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
770
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
482
771
  """
483
- A human-friendly description for this backend.
772
+ Human-friendly description of the mount for the backend.
484
773
  """
485
774
  return pulumi.get(self, "description")
486
775
 
487
776
  @description.setter
488
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
777
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
489
778
  pulumi.set(self, "description", value)
490
779
 
491
- @property
780
+ @_builtins.property
492
781
  @pulumi.getter(name="disableAutomatedRotation")
493
- def disable_automated_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
782
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
494
783
  """
495
784
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
496
785
  *Available only for Vault Enterprise*.
@@ -498,12 +787,12 @@ class _SecretBackendState:
498
787
  return pulumi.get(self, "disable_automated_rotation")
499
788
 
500
789
  @disable_automated_rotation.setter
501
- def disable_automated_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
790
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
502
791
  pulumi.set(self, "disable_automated_rotation", value)
503
792
 
504
- @property
793
+ @_builtins.property
505
794
  @pulumi.getter(name="disableRemount")
506
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
795
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
507
796
  """
508
797
  If set, opts out of mount migration on path updates.
509
798
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -511,12 +800,36 @@ class _SecretBackendState:
511
800
  return pulumi.get(self, "disable_remount")
512
801
 
513
802
  @disable_remount.setter
514
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
803
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
515
804
  pulumi.set(self, "disable_remount", value)
516
805
 
517
- @property
806
+ @_builtins.property
807
+ @pulumi.getter(name="externalEntropyAccess")
808
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
809
+ """
810
+ Enable the secrets engine to access Vault's external entropy source
811
+ """
812
+ return pulumi.get(self, "external_entropy_access")
813
+
814
+ @external_entropy_access.setter
815
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
816
+ pulumi.set(self, "external_entropy_access", value)
817
+
818
+ @_builtins.property
819
+ @pulumi.getter(name="forceNoCache")
820
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
821
+ """
822
+ If set to true, disables caching.
823
+ """
824
+ return pulumi.get(self, "force_no_cache")
825
+
826
+ @force_no_cache.setter
827
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
828
+ pulumi.set(self, "force_no_cache", value)
829
+
830
+ @_builtins.property
518
831
  @pulumi.getter(name="identityTokenAudience")
519
- def identity_token_audience(self) -> Optional[pulumi.Input[builtins.str]]:
832
+ def identity_token_audience(self) -> Optional[pulumi.Input[_builtins.str]]:
520
833
  """
521
834
  The audience claim value for plugin identity
522
835
  tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
@@ -525,62 +838,72 @@ class _SecretBackendState:
525
838
  return pulumi.get(self, "identity_token_audience")
526
839
 
527
840
  @identity_token_audience.setter
528
- def identity_token_audience(self, value: Optional[pulumi.Input[builtins.str]]):
841
+ def identity_token_audience(self, value: Optional[pulumi.Input[_builtins.str]]):
529
842
  pulumi.set(self, "identity_token_audience", value)
530
843
 
531
- @property
844
+ @_builtins.property
532
845
  @pulumi.getter(name="identityTokenKey")
533
- def identity_token_key(self) -> Optional[pulumi.Input[builtins.str]]:
846
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
534
847
  """
535
- The key to use for signing plugin identity
536
- tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
848
+ The key to use for signing identity tokens.
537
849
  """
538
850
  return pulumi.get(self, "identity_token_key")
539
851
 
540
852
  @identity_token_key.setter
541
- def identity_token_key(self, value: Optional[pulumi.Input[builtins.str]]):
853
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
542
854
  pulumi.set(self, "identity_token_key", value)
543
855
 
544
- @property
856
+ @_builtins.property
545
857
  @pulumi.getter(name="identityTokenTtl")
546
- def identity_token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
858
+ def identity_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
547
859
  """
548
860
  The TTL of generated tokens.
549
861
  """
550
862
  return pulumi.get(self, "identity_token_ttl")
551
863
 
552
864
  @identity_token_ttl.setter
553
- def identity_token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
865
+ def identity_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
554
866
  pulumi.set(self, "identity_token_ttl", value)
555
867
 
556
- @property
868
+ @_builtins.property
869
+ @pulumi.getter(name="listingVisibility")
870
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
871
+ """
872
+ Specifies whether to show this mount in the UI-specific listing endpoint
873
+ """
874
+ return pulumi.get(self, "listing_visibility")
875
+
876
+ @listing_visibility.setter
877
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
878
+ pulumi.set(self, "listing_visibility", value)
879
+
880
+ @_builtins.property
557
881
  @pulumi.getter
558
- def local(self) -> Optional[pulumi.Input[builtins.bool]]:
882
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
559
883
  """
560
- Boolean flag that can be explicitly set to true to enforce local mount in HA environment
884
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
561
885
  """
562
886
  return pulumi.get(self, "local")
563
887
 
564
888
  @local.setter
565
- def local(self, value: Optional[pulumi.Input[builtins.bool]]):
889
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
566
890
  pulumi.set(self, "local", value)
567
891
 
568
- @property
892
+ @_builtins.property
569
893
  @pulumi.getter(name="maxLeaseTtlSeconds")
570
- def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
894
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
571
895
  """
572
- The maximum TTL that can be requested
573
- for credentials issued by this backend. Defaults to '0'.
896
+ Maximum possible lease duration for secrets in seconds
574
897
  """
575
898
  return pulumi.get(self, "max_lease_ttl_seconds")
576
899
 
577
900
  @max_lease_ttl_seconds.setter
578
- def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
901
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
579
902
  pulumi.set(self, "max_lease_ttl_seconds", value)
580
903
 
581
- @property
904
+ @_builtins.property
582
905
  @pulumi.getter
583
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
906
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
584
907
  """
585
908
  The namespace to provision the resource in.
586
909
  The value should not contain leading or trailing forward slashes.
@@ -590,12 +913,36 @@ class _SecretBackendState:
590
913
  return pulumi.get(self, "namespace")
591
914
 
592
915
  @namespace.setter
593
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
916
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
594
917
  pulumi.set(self, "namespace", value)
595
918
 
596
- @property
919
+ @_builtins.property
920
+ @pulumi.getter
921
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
922
+ """
923
+ Specifies mount type specific options that are passed to the backend
924
+ """
925
+ return pulumi.get(self, "options")
926
+
927
+ @options.setter
928
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
929
+ pulumi.set(self, "options", value)
930
+
931
+ @_builtins.property
932
+ @pulumi.getter(name="passthroughRequestHeaders")
933
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
934
+ """
935
+ List of headers to allow and pass from the request to the plugin
936
+ """
937
+ return pulumi.get(self, "passthrough_request_headers")
938
+
939
+ @passthrough_request_headers.setter
940
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
941
+ pulumi.set(self, "passthrough_request_headers", value)
942
+
943
+ @_builtins.property
597
944
  @pulumi.getter
598
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
945
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
599
946
  """
600
947
  The unique path this backend should be mounted at. Must
601
948
  not begin or end with a `/`. Defaults to `gcp`.
@@ -603,12 +950,24 @@ class _SecretBackendState:
603
950
  return pulumi.get(self, "path")
604
951
 
605
952
  @path.setter
606
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
953
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
607
954
  pulumi.set(self, "path", value)
608
955
 
609
- @property
956
+ @_builtins.property
957
+ @pulumi.getter(name="pluginVersion")
958
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
959
+ """
960
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
961
+ """
962
+ return pulumi.get(self, "plugin_version")
963
+
964
+ @plugin_version.setter
965
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
966
+ pulumi.set(self, "plugin_version", value)
967
+
968
+ @_builtins.property
610
969
  @pulumi.getter(name="rotationPeriod")
611
- def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
970
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
612
971
  """
613
972
  The amount of time in seconds Vault should wait before rotating the root credential.
614
973
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -617,12 +976,12 @@ class _SecretBackendState:
617
976
  return pulumi.get(self, "rotation_period")
618
977
 
619
978
  @rotation_period.setter
620
- def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
979
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
621
980
  pulumi.set(self, "rotation_period", value)
622
981
 
623
- @property
982
+ @_builtins.property
624
983
  @pulumi.getter(name="rotationSchedule")
625
- def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
984
+ def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
626
985
  """
627
986
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
628
987
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
@@ -630,12 +989,12 @@ class _SecretBackendState:
630
989
  return pulumi.get(self, "rotation_schedule")
631
990
 
632
991
  @rotation_schedule.setter
633
- def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
992
+ def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
634
993
  pulumi.set(self, "rotation_schedule", value)
635
994
 
636
- @property
995
+ @_builtins.property
637
996
  @pulumi.getter(name="rotationWindow")
638
- def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
997
+ def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
639
998
  """
640
999
  The maximum amount of time in seconds allowed to complete
641
1000
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -644,12 +1003,24 @@ class _SecretBackendState:
644
1003
  return pulumi.get(self, "rotation_window")
645
1004
 
646
1005
  @rotation_window.setter
647
- def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
1006
+ def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
648
1007
  pulumi.set(self, "rotation_window", value)
649
1008
 
650
- @property
1009
+ @_builtins.property
1010
+ @pulumi.getter(name="sealWrap")
1011
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
1012
+ """
1013
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1014
+ """
1015
+ return pulumi.get(self, "seal_wrap")
1016
+
1017
+ @seal_wrap.setter
1018
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
1019
+ pulumi.set(self, "seal_wrap", value)
1020
+
1021
+ @_builtins.property
651
1022
  @pulumi.getter(name="serviceAccountEmail")
652
- def service_account_email(self) -> Optional[pulumi.Input[builtins.str]]:
1023
+ def service_account_email(self) -> Optional[pulumi.Input[_builtins.str]]:
653
1024
  """
654
1025
  Service Account to impersonate for plugin workload identity federation.
655
1026
  Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
@@ -657,7 +1028,7 @@ class _SecretBackendState:
657
1028
  return pulumi.get(self, "service_account_email")
658
1029
 
659
1030
  @service_account_email.setter
660
- def service_account_email(self, value: Optional[pulumi.Input[builtins.str]]):
1031
+ def service_account_email(self, value: Optional[pulumi.Input[_builtins.str]]):
661
1032
  pulumi.set(self, "service_account_email", value)
662
1033
 
663
1034
 
@@ -667,23 +1038,35 @@ class SecretBackend(pulumi.CustomResource):
667
1038
  def __init__(__self__,
668
1039
  resource_name: str,
669
1040
  opts: Optional[pulumi.ResourceOptions] = None,
670
- credentials: Optional[pulumi.Input[builtins.str]] = None,
671
- credentials_wo_version: Optional[pulumi.Input[builtins.int]] = None,
672
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
673
- description: Optional[pulumi.Input[builtins.str]] = None,
674
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
675
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
676
- identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
677
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
678
- identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
679
- local: Optional[pulumi.Input[builtins.bool]] = None,
680
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
681
- namespace: Optional[pulumi.Input[builtins.str]] = None,
682
- path: Optional[pulumi.Input[builtins.str]] = None,
683
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
684
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
685
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
686
- service_account_email: Optional[pulumi.Input[builtins.str]] = None,
1041
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1042
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1043
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1044
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1045
+ credentials: Optional[pulumi.Input[_builtins.str]] = None,
1046
+ credentials_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
1047
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1048
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1049
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1050
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
1051
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1052
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1053
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1054
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
1055
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1056
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1057
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1058
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1059
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1060
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1061
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1062
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1063
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1064
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1065
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
1066
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
1067
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
1068
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1069
+ service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
687
1070
  __props__=None):
688
1071
  """
689
1072
  ## Example Usage
@@ -722,39 +1105,48 @@ class SecretBackend(pulumi.CustomResource):
722
1105
 
723
1106
  :param str resource_name: The name of the resource.
724
1107
  :param pulumi.ResourceOptions opts: Options for the resource.
725
- :param pulumi.Input[builtins.str] credentials: JSON-encoded credentials to use to connect to GCP
726
- :param pulumi.Input[builtins.int] credentials_wo_version: The version of the `credentials_wo`. For more info see updating write-only attributes.
727
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: The default TTL for credentials
728
- issued by this backend. Defaults to '0'.
729
- :param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
730
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1108
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1109
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1110
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1111
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1112
+ :param pulumi.Input[_builtins.str] credentials: JSON-encoded credentials to use to connect to GCP
1113
+ :param pulumi.Input[_builtins.int] credentials_wo_version: The version of the `credentials_wo`. For more info see updating write-only attributes.
1114
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
1115
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1116
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
1117
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
731
1118
  *Available only for Vault Enterprise*.
732
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1119
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
733
1120
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
734
- :param pulumi.Input[builtins.str] identity_token_audience: The audience claim value for plugin identity
1121
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1122
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1123
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value for plugin identity
735
1124
  tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
736
1125
  Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
737
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin identity
738
- tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
739
- :param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated tokens.
740
- :param pulumi.Input[builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
741
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
742
- for credentials issued by this backend. Defaults to '0'.
743
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
1126
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens.
1127
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated tokens.
1128
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1129
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1130
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
1131
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
744
1132
  The value should not contain leading or trailing forward slashes.
745
1133
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
746
1134
  *Available only for Vault Enterprise*.
747
- :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
1135
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1136
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1137
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
748
1138
  not begin or end with a `/`. Defaults to `gcp`.
749
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
1139
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1140
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
750
1141
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
751
1142
  *Available only for Vault Enterprise*.
752
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1143
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
753
1144
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
754
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
1145
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
755
1146
  a rotation when a scheduled token rotation occurs. The default rotation window is
756
1147
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
757
- :param pulumi.Input[builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
1148
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1149
+ :param pulumi.Input[_builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
758
1150
  Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
759
1151
  """
760
1152
  ...
@@ -813,23 +1205,35 @@ class SecretBackend(pulumi.CustomResource):
813
1205
  def _internal_init(__self__,
814
1206
  resource_name: str,
815
1207
  opts: Optional[pulumi.ResourceOptions] = None,
816
- credentials: Optional[pulumi.Input[builtins.str]] = None,
817
- credentials_wo_version: Optional[pulumi.Input[builtins.int]] = None,
818
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
819
- description: Optional[pulumi.Input[builtins.str]] = None,
820
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
821
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
822
- identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
823
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
824
- identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
825
- local: Optional[pulumi.Input[builtins.bool]] = None,
826
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
827
- namespace: Optional[pulumi.Input[builtins.str]] = None,
828
- path: Optional[pulumi.Input[builtins.str]] = None,
829
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
830
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
831
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
832
- service_account_email: Optional[pulumi.Input[builtins.str]] = None,
1208
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1209
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1210
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1211
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1212
+ credentials: Optional[pulumi.Input[_builtins.str]] = None,
1213
+ credentials_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
1214
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1215
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1216
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1217
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
1218
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1219
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1220
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1221
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
1222
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1223
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1224
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1225
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1226
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1227
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1228
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1229
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1230
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1231
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1232
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
1233
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
1234
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
1235
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1236
+ service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
833
1237
  __props__=None):
834
1238
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
835
1239
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -839,22 +1243,34 @@ class SecretBackend(pulumi.CustomResource):
839
1243
  raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
840
1244
  __props__ = SecretBackendArgs.__new__(SecretBackendArgs)
841
1245
 
1246
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1247
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1248
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1249
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
842
1250
  __props__.__dict__["credentials"] = None if credentials is None else pulumi.Output.secret(credentials)
843
1251
  __props__.__dict__["credentials_wo_version"] = credentials_wo_version
844
1252
  __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1253
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
845
1254
  __props__.__dict__["description"] = description
846
1255
  __props__.__dict__["disable_automated_rotation"] = disable_automated_rotation
847
1256
  __props__.__dict__["disable_remount"] = disable_remount
1257
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1258
+ __props__.__dict__["force_no_cache"] = force_no_cache
848
1259
  __props__.__dict__["identity_token_audience"] = identity_token_audience
849
1260
  __props__.__dict__["identity_token_key"] = identity_token_key
850
1261
  __props__.__dict__["identity_token_ttl"] = identity_token_ttl
1262
+ __props__.__dict__["listing_visibility"] = listing_visibility
851
1263
  __props__.__dict__["local"] = local
852
1264
  __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
853
1265
  __props__.__dict__["namespace"] = namespace
1266
+ __props__.__dict__["options"] = options
1267
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
854
1268
  __props__.__dict__["path"] = path
1269
+ __props__.__dict__["plugin_version"] = plugin_version
855
1270
  __props__.__dict__["rotation_period"] = rotation_period
856
1271
  __props__.__dict__["rotation_schedule"] = rotation_schedule
857
1272
  __props__.__dict__["rotation_window"] = rotation_window
1273
+ __props__.__dict__["seal_wrap"] = seal_wrap
858
1274
  __props__.__dict__["service_account_email"] = service_account_email
859
1275
  __props__.__dict__["accessor"] = None
860
1276
  secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["credentials"])
@@ -869,24 +1285,36 @@ class SecretBackend(pulumi.CustomResource):
869
1285
  def get(resource_name: str,
870
1286
  id: pulumi.Input[str],
871
1287
  opts: Optional[pulumi.ResourceOptions] = None,
872
- accessor: Optional[pulumi.Input[builtins.str]] = None,
873
- credentials: Optional[pulumi.Input[builtins.str]] = None,
874
- credentials_wo_version: Optional[pulumi.Input[builtins.int]] = None,
875
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
876
- description: Optional[pulumi.Input[builtins.str]] = None,
877
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
878
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
879
- identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
880
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
881
- identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
882
- local: Optional[pulumi.Input[builtins.bool]] = None,
883
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
884
- namespace: Optional[pulumi.Input[builtins.str]] = None,
885
- path: Optional[pulumi.Input[builtins.str]] = None,
886
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
887
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
888
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
889
- service_account_email: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretBackend':
1288
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
1289
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1290
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1291
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1292
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1293
+ credentials: Optional[pulumi.Input[_builtins.str]] = None,
1294
+ credentials_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
1295
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1296
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1297
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1298
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
1299
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1300
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1301
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1302
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
1303
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1304
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1305
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1306
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1307
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1308
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1309
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1310
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1311
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1312
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1313
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
1314
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
1315
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
1316
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1317
+ service_account_email: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackend':
890
1318
  """
891
1319
  Get an existing SecretBackend resource's state with the given name, id, and optional extra
892
1320
  properties used to qualify the lookup.
@@ -894,40 +1322,49 @@ class SecretBackend(pulumi.CustomResource):
894
1322
  :param str resource_name: The unique name of the resulting resource.
895
1323
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
896
1324
  :param pulumi.ResourceOptions opts: Options for the resource.
897
- :param pulumi.Input[builtins.str] accessor: The accessor of the created GCP mount.
898
- :param pulumi.Input[builtins.str] credentials: JSON-encoded credentials to use to connect to GCP
899
- :param pulumi.Input[builtins.int] credentials_wo_version: The version of the `credentials_wo`. For more info see updating write-only attributes.
900
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: The default TTL for credentials
901
- issued by this backend. Defaults to '0'.
902
- :param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
903
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1325
+ :param pulumi.Input[_builtins.str] accessor: The accessor of the created GCP mount.
1326
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1327
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1328
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1329
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1330
+ :param pulumi.Input[_builtins.str] credentials: JSON-encoded credentials to use to connect to GCP
1331
+ :param pulumi.Input[_builtins.int] credentials_wo_version: The version of the `credentials_wo`. For more info see updating write-only attributes.
1332
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
1333
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1334
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
1335
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
904
1336
  *Available only for Vault Enterprise*.
905
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1337
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
906
1338
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
907
- :param pulumi.Input[builtins.str] identity_token_audience: The audience claim value for plugin identity
1339
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1340
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1341
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value for plugin identity
908
1342
  tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
909
1343
  Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
910
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin identity
911
- tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
912
- :param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated tokens.
913
- :param pulumi.Input[builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
914
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
915
- for credentials issued by this backend. Defaults to '0'.
916
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
1344
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens.
1345
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated tokens.
1346
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1347
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1348
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
1349
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
917
1350
  The value should not contain leading or trailing forward slashes.
918
1351
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
919
1352
  *Available only for Vault Enterprise*.
920
- :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
1353
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1354
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1355
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
921
1356
  not begin or end with a `/`. Defaults to `gcp`.
922
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
1357
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1358
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
923
1359
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
924
1360
  *Available only for Vault Enterprise*.
925
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1361
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
926
1362
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
927
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
1363
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
928
1364
  a rotation when a scheduled token rotation occurs. The default rotation window is
929
1365
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
930
- :param pulumi.Input[builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
1366
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1367
+ :param pulumi.Input[_builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
931
1368
  Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
932
1369
  """
933
1370
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -935,87 +1372,154 @@ class SecretBackend(pulumi.CustomResource):
935
1372
  __props__ = _SecretBackendState.__new__(_SecretBackendState)
936
1373
 
937
1374
  __props__.__dict__["accessor"] = accessor
1375
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1376
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1377
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1378
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
938
1379
  __props__.__dict__["credentials"] = credentials
939
1380
  __props__.__dict__["credentials_wo_version"] = credentials_wo_version
940
1381
  __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1382
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
941
1383
  __props__.__dict__["description"] = description
942
1384
  __props__.__dict__["disable_automated_rotation"] = disable_automated_rotation
943
1385
  __props__.__dict__["disable_remount"] = disable_remount
1386
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1387
+ __props__.__dict__["force_no_cache"] = force_no_cache
944
1388
  __props__.__dict__["identity_token_audience"] = identity_token_audience
945
1389
  __props__.__dict__["identity_token_key"] = identity_token_key
946
1390
  __props__.__dict__["identity_token_ttl"] = identity_token_ttl
1391
+ __props__.__dict__["listing_visibility"] = listing_visibility
947
1392
  __props__.__dict__["local"] = local
948
1393
  __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
949
1394
  __props__.__dict__["namespace"] = namespace
1395
+ __props__.__dict__["options"] = options
1396
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
950
1397
  __props__.__dict__["path"] = path
1398
+ __props__.__dict__["plugin_version"] = plugin_version
951
1399
  __props__.__dict__["rotation_period"] = rotation_period
952
1400
  __props__.__dict__["rotation_schedule"] = rotation_schedule
953
1401
  __props__.__dict__["rotation_window"] = rotation_window
1402
+ __props__.__dict__["seal_wrap"] = seal_wrap
954
1403
  __props__.__dict__["service_account_email"] = service_account_email
955
1404
  return SecretBackend(resource_name, opts=opts, __props__=__props__)
956
1405
 
957
- @property
1406
+ @_builtins.property
958
1407
  @pulumi.getter
959
- def accessor(self) -> pulumi.Output[builtins.str]:
1408
+ def accessor(self) -> pulumi.Output[_builtins.str]:
960
1409
  """
961
1410
  The accessor of the created GCP mount.
962
1411
  """
963
1412
  return pulumi.get(self, "accessor")
964
1413
 
965
- @property
1414
+ @_builtins.property
1415
+ @pulumi.getter(name="allowedManagedKeys")
1416
+ def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1417
+ """
1418
+ List of managed key registry entry names that the mount in question is allowed to access
1419
+ """
1420
+ return pulumi.get(self, "allowed_managed_keys")
1421
+
1422
+ @_builtins.property
1423
+ @pulumi.getter(name="allowedResponseHeaders")
1424
+ def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1425
+ """
1426
+ List of headers to allow and pass from the request to the plugin
1427
+ """
1428
+ return pulumi.get(self, "allowed_response_headers")
1429
+
1430
+ @_builtins.property
1431
+ @pulumi.getter(name="auditNonHmacRequestKeys")
1432
+ def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1433
+ """
1434
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1435
+ """
1436
+ return pulumi.get(self, "audit_non_hmac_request_keys")
1437
+
1438
+ @_builtins.property
1439
+ @pulumi.getter(name="auditNonHmacResponseKeys")
1440
+ def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1441
+ """
1442
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1443
+ """
1444
+ return pulumi.get(self, "audit_non_hmac_response_keys")
1445
+
1446
+ @_builtins.property
966
1447
  @pulumi.getter
967
- def credentials(self) -> pulumi.Output[Optional[builtins.str]]:
1448
+ def credentials(self) -> pulumi.Output[Optional[_builtins.str]]:
968
1449
  """
969
1450
  JSON-encoded credentials to use to connect to GCP
970
1451
  """
971
1452
  return pulumi.get(self, "credentials")
972
1453
 
973
- @property
1454
+ @_builtins.property
974
1455
  @pulumi.getter(name="credentialsWoVersion")
975
- def credentials_wo_version(self) -> pulumi.Output[Optional[builtins.int]]:
1456
+ def credentials_wo_version(self) -> pulumi.Output[Optional[_builtins.int]]:
976
1457
  """
977
1458
  The version of the `credentials_wo`. For more info see updating write-only attributes.
978
1459
  """
979
1460
  return pulumi.get(self, "credentials_wo_version")
980
1461
 
981
- @property
1462
+ @_builtins.property
982
1463
  @pulumi.getter(name="defaultLeaseTtlSeconds")
983
- def default_lease_ttl_seconds(self) -> pulumi.Output[Optional[builtins.int]]:
1464
+ def default_lease_ttl_seconds(self) -> pulumi.Output[Optional[_builtins.int]]:
984
1465
  """
985
- The default TTL for credentials
986
- issued by this backend. Defaults to '0'.
1466
+ Default lease duration for secrets in seconds
987
1467
  """
988
1468
  return pulumi.get(self, "default_lease_ttl_seconds")
989
1469
 
990
- @property
1470
+ @_builtins.property
1471
+ @pulumi.getter(name="delegatedAuthAccessors")
1472
+ def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1473
+ """
1474
+ List of headers to allow and pass from the request to the plugin
1475
+ """
1476
+ return pulumi.get(self, "delegated_auth_accessors")
1477
+
1478
+ @_builtins.property
991
1479
  @pulumi.getter
992
- def description(self) -> pulumi.Output[Optional[builtins.str]]:
1480
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
993
1481
  """
994
- A human-friendly description for this backend.
1482
+ Human-friendly description of the mount for the backend.
995
1483
  """
996
1484
  return pulumi.get(self, "description")
997
1485
 
998
- @property
1486
+ @_builtins.property
999
1487
  @pulumi.getter(name="disableAutomatedRotation")
1000
- def disable_automated_rotation(self) -> pulumi.Output[Optional[builtins.bool]]:
1488
+ def disable_automated_rotation(self) -> pulumi.Output[Optional[_builtins.bool]]:
1001
1489
  """
1002
1490
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1003
1491
  *Available only for Vault Enterprise*.
1004
1492
  """
1005
1493
  return pulumi.get(self, "disable_automated_rotation")
1006
1494
 
1007
- @property
1495
+ @_builtins.property
1008
1496
  @pulumi.getter(name="disableRemount")
1009
- def disable_remount(self) -> pulumi.Output[Optional[builtins.bool]]:
1497
+ def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
1010
1498
  """
1011
1499
  If set, opts out of mount migration on path updates.
1012
1500
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1013
1501
  """
1014
1502
  return pulumi.get(self, "disable_remount")
1015
1503
 
1016
- @property
1504
+ @_builtins.property
1505
+ @pulumi.getter(name="externalEntropyAccess")
1506
+ def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
1507
+ """
1508
+ Enable the secrets engine to access Vault's external entropy source
1509
+ """
1510
+ return pulumi.get(self, "external_entropy_access")
1511
+
1512
+ @_builtins.property
1513
+ @pulumi.getter(name="forceNoCache")
1514
+ def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
1515
+ """
1516
+ If set to true, disables caching.
1517
+ """
1518
+ return pulumi.get(self, "force_no_cache")
1519
+
1520
+ @_builtins.property
1017
1521
  @pulumi.getter(name="identityTokenAudience")
1018
- def identity_token_audience(self) -> pulumi.Output[Optional[builtins.str]]:
1522
+ def identity_token_audience(self) -> pulumi.Output[Optional[_builtins.str]]:
1019
1523
  """
1020
1524
  The audience claim value for plugin identity
1021
1525
  tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
@@ -1023,43 +1527,49 @@ class SecretBackend(pulumi.CustomResource):
1023
1527
  """
1024
1528
  return pulumi.get(self, "identity_token_audience")
1025
1529
 
1026
- @property
1530
+ @_builtins.property
1027
1531
  @pulumi.getter(name="identityTokenKey")
1028
- def identity_token_key(self) -> pulumi.Output[Optional[builtins.str]]:
1532
+ def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
1029
1533
  """
1030
- The key to use for signing plugin identity
1031
- tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
1534
+ The key to use for signing identity tokens.
1032
1535
  """
1033
1536
  return pulumi.get(self, "identity_token_key")
1034
1537
 
1035
- @property
1538
+ @_builtins.property
1036
1539
  @pulumi.getter(name="identityTokenTtl")
1037
- def identity_token_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
1540
+ def identity_token_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1038
1541
  """
1039
1542
  The TTL of generated tokens.
1040
1543
  """
1041
1544
  return pulumi.get(self, "identity_token_ttl")
1042
1545
 
1043
- @property
1546
+ @_builtins.property
1547
+ @pulumi.getter(name="listingVisibility")
1548
+ def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
1549
+ """
1550
+ Specifies whether to show this mount in the UI-specific listing endpoint
1551
+ """
1552
+ return pulumi.get(self, "listing_visibility")
1553
+
1554
+ @_builtins.property
1044
1555
  @pulumi.getter
1045
- def local(self) -> pulumi.Output[Optional[builtins.bool]]:
1556
+ def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
1046
1557
  """
1047
- Boolean flag that can be explicitly set to true to enforce local mount in HA environment
1558
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1048
1559
  """
1049
1560
  return pulumi.get(self, "local")
1050
1561
 
1051
- @property
1562
+ @_builtins.property
1052
1563
  @pulumi.getter(name="maxLeaseTtlSeconds")
1053
- def max_lease_ttl_seconds(self) -> pulumi.Output[Optional[builtins.int]]:
1564
+ def max_lease_ttl_seconds(self) -> pulumi.Output[Optional[_builtins.int]]:
1054
1565
  """
1055
- The maximum TTL that can be requested
1056
- for credentials issued by this backend. Defaults to '0'.
1566
+ Maximum possible lease duration for secrets in seconds
1057
1567
  """
1058
1568
  return pulumi.get(self, "max_lease_ttl_seconds")
1059
1569
 
1060
- @property
1570
+ @_builtins.property
1061
1571
  @pulumi.getter
1062
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
1572
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
1063
1573
  """
1064
1574
  The namespace to provision the resource in.
1065
1575
  The value should not contain leading or trailing forward slashes.
@@ -1068,18 +1578,42 @@ class SecretBackend(pulumi.CustomResource):
1068
1578
  """
1069
1579
  return pulumi.get(self, "namespace")
1070
1580
 
1071
- @property
1581
+ @_builtins.property
1582
+ @pulumi.getter
1583
+ def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
1584
+ """
1585
+ Specifies mount type specific options that are passed to the backend
1586
+ """
1587
+ return pulumi.get(self, "options")
1588
+
1589
+ @_builtins.property
1590
+ @pulumi.getter(name="passthroughRequestHeaders")
1591
+ def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1592
+ """
1593
+ List of headers to allow and pass from the request to the plugin
1594
+ """
1595
+ return pulumi.get(self, "passthrough_request_headers")
1596
+
1597
+ @_builtins.property
1072
1598
  @pulumi.getter
1073
- def path(self) -> pulumi.Output[Optional[builtins.str]]:
1599
+ def path(self) -> pulumi.Output[Optional[_builtins.str]]:
1074
1600
  """
1075
1601
  The unique path this backend should be mounted at. Must
1076
1602
  not begin or end with a `/`. Defaults to `gcp`.
1077
1603
  """
1078
1604
  return pulumi.get(self, "path")
1079
1605
 
1080
- @property
1606
+ @_builtins.property
1607
+ @pulumi.getter(name="pluginVersion")
1608
+ def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
1609
+ """
1610
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1611
+ """
1612
+ return pulumi.get(self, "plugin_version")
1613
+
1614
+ @_builtins.property
1081
1615
  @pulumi.getter(name="rotationPeriod")
1082
- def rotation_period(self) -> pulumi.Output[Optional[builtins.int]]:
1616
+ def rotation_period(self) -> pulumi.Output[Optional[_builtins.int]]:
1083
1617
  """
1084
1618
  The amount of time in seconds Vault should wait before rotating the root credential.
1085
1619
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -1087,18 +1621,18 @@ class SecretBackend(pulumi.CustomResource):
1087
1621
  """
1088
1622
  return pulumi.get(self, "rotation_period")
1089
1623
 
1090
- @property
1624
+ @_builtins.property
1091
1625
  @pulumi.getter(name="rotationSchedule")
1092
- def rotation_schedule(self) -> pulumi.Output[Optional[builtins.str]]:
1626
+ def rotation_schedule(self) -> pulumi.Output[Optional[_builtins.str]]:
1093
1627
  """
1094
1628
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1095
1629
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
1096
1630
  """
1097
1631
  return pulumi.get(self, "rotation_schedule")
1098
1632
 
1099
- @property
1633
+ @_builtins.property
1100
1634
  @pulumi.getter(name="rotationWindow")
1101
- def rotation_window(self) -> pulumi.Output[Optional[builtins.int]]:
1635
+ def rotation_window(self) -> pulumi.Output[Optional[_builtins.int]]:
1102
1636
  """
1103
1637
  The maximum amount of time in seconds allowed to complete
1104
1638
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -1106,9 +1640,17 @@ class SecretBackend(pulumi.CustomResource):
1106
1640
  """
1107
1641
  return pulumi.get(self, "rotation_window")
1108
1642
 
1109
- @property
1643
+ @_builtins.property
1644
+ @pulumi.getter(name="sealWrap")
1645
+ def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
1646
+ """
1647
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1648
+ """
1649
+ return pulumi.get(self, "seal_wrap")
1650
+
1651
+ @_builtins.property
1110
1652
  @pulumi.getter(name="serviceAccountEmail")
1111
- def service_account_email(self) -> pulumi.Output[Optional[builtins.str]]:
1653
+ def service_account_email(self) -> pulumi.Output[Optional[_builtins.str]]:
1112
1654
  """
1113
1655
  Service Account to impersonate for plugin workload identity federation.
1114
1656
  Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.