pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (269) hide show
  1. pulumi_vault/__init__.py +19 -1
  2. pulumi_vault/_inputs.py +873 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +1016 -439
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +1057 -285
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +887 -256
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +426 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +878 -336
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +400 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +1006 -227
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +431 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +732 -693
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +380 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +909 -271
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/oci_auth_backend.py +683 -0
  168. pulumi_vault/oci_auth_backend_role.py +798 -0
  169. pulumi_vault/okta/__init__.py +1 -1
  170. pulumi_vault/okta/_inputs.py +31 -32
  171. pulumi_vault/okta/auth_backend.py +305 -306
  172. pulumi_vault/okta/auth_backend_group.py +69 -70
  173. pulumi_vault/okta/auth_backend_user.py +86 -87
  174. pulumi_vault/okta/outputs.py +21 -22
  175. pulumi_vault/outputs.py +234 -82
  176. pulumi_vault/pkisecret/__init__.py +1 -1
  177. pulumi_vault/pkisecret/_inputs.py +55 -56
  178. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  179. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  180. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  181. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  182. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  183. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  184. pulumi_vault/pkisecret/backend_config_scep.py +205 -159
  185. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  186. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  187. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  188. pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
  189. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  190. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  191. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  192. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  193. pulumi_vault/pkisecret/outputs.py +61 -62
  194. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  195. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  196. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  197. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  198. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  199. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  200. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  201. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  202. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  203. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  204. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  205. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  206. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  207. pulumi_vault/plugin.py +154 -155
  208. pulumi_vault/plugin_pinned_version.py +52 -53
  209. pulumi_vault/policy.py +52 -53
  210. pulumi_vault/provider.py +160 -161
  211. pulumi_vault/pulumi-plugin.json +1 -1
  212. pulumi_vault/quota_lease_count.py +103 -104
  213. pulumi_vault/quota_rate_limit.py +171 -172
  214. pulumi_vault/rabbitmq/__init__.py +1 -1
  215. pulumi_vault/rabbitmq/_inputs.py +50 -51
  216. pulumi_vault/rabbitmq/outputs.py +34 -35
  217. pulumi_vault/rabbitmq/secret_backend.py +902 -231
  218. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  219. pulumi_vault/raft_autopilot.py +137 -138
  220. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  221. pulumi_vault/rgp_policy.py +69 -70
  222. pulumi_vault/saml/__init__.py +1 -1
  223. pulumi_vault/saml/auth_backend.py +188 -189
  224. pulumi_vault/saml/auth_backend_role.py +290 -291
  225. pulumi_vault/scep_auth_backend_role.py +252 -253
  226. pulumi_vault/secrets/__init__.py +1 -1
  227. pulumi_vault/secrets/_inputs.py +19 -20
  228. pulumi_vault/secrets/outputs.py +13 -14
  229. pulumi_vault/secrets/sync_association.py +88 -89
  230. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  231. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  232. pulumi_vault/secrets/sync_config.py +52 -53
  233. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  234. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  235. pulumi_vault/secrets/sync_github_apps.py +78 -79
  236. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  237. pulumi_vault/ssh/__init__.py +1 -1
  238. pulumi_vault/ssh/_inputs.py +13 -14
  239. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  240. pulumi_vault/ssh/outputs.py +9 -10
  241. pulumi_vault/ssh/secret_backend_ca.py +217 -124
  242. pulumi_vault/ssh/secret_backend_role.py +446 -447
  243. pulumi_vault/terraformcloud/__init__.py +1 -1
  244. pulumi_vault/terraformcloud/secret_backend.py +833 -155
  245. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  246. pulumi_vault/terraformcloud/secret_role.py +117 -118
  247. pulumi_vault/token.py +301 -302
  248. pulumi_vault/tokenauth/__init__.py +1 -1
  249. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  250. pulumi_vault/transform/__init__.py +1 -1
  251. pulumi_vault/transform/alphabet.py +69 -70
  252. pulumi_vault/transform/get_decode.py +57 -58
  253. pulumi_vault/transform/get_encode.py +57 -58
  254. pulumi_vault/transform/role.py +69 -70
  255. pulumi_vault/transform/template.py +137 -138
  256. pulumi_vault/transform/transformation.py +171 -172
  257. pulumi_vault/transit/__init__.py +1 -1
  258. pulumi_vault/transit/get_cmac.py +47 -48
  259. pulumi_vault/transit/get_decrypt.py +25 -26
  260. pulumi_vault/transit/get_encrypt.py +29 -30
  261. pulumi_vault/transit/get_sign.py +71 -72
  262. pulumi_vault/transit/get_verify.py +83 -84
  263. pulumi_vault/transit/secret_backend_key.py +377 -350
  264. pulumi_vault/transit/secret_cache_config.py +52 -53
  265. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
  266. pulumi_vault-7.2.0.dist-info/RECORD +270 -0
  267. pulumi_vault-7.1.0.dist-info/RECORD +0 -268
  268. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
  269. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,55 +19,119 @@ __all__ = ['SecretBackendArgs', 'SecretBackend']
20
19
  @pulumi.input_type
21
20
  class SecretBackendArgs:
22
21
  def __init__(__self__, *,
23
- path: pulumi.Input[builtins.str],
24
- default_tls_client_key_bits: Optional[pulumi.Input[builtins.int]] = None,
25
- default_tls_client_key_type: Optional[pulumi.Input[builtins.str]] = None,
26
- default_tls_client_ttl: Optional[pulumi.Input[builtins.int]] = None,
27
- description: Optional[pulumi.Input[builtins.str]] = None,
28
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
29
- listen_addrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
30
- namespace: Optional[pulumi.Input[builtins.str]] = None,
31
- server_hostnames: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
32
- server_ips: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
33
- tls_ca_key_bits: Optional[pulumi.Input[builtins.int]] = None,
34
- tls_ca_key_type: Optional[pulumi.Input[builtins.str]] = None,
35
- tls_min_version: Optional[pulumi.Input[builtins.str]] = None):
22
+ path: pulumi.Input[_builtins.str],
23
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
24
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
25
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
28
+ default_tls_client_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
29
+ default_tls_client_key_type: Optional[pulumi.Input[_builtins.str]] = None,
30
+ default_tls_client_ttl: Optional[pulumi.Input[_builtins.int]] = None,
31
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
32
+ description: Optional[pulumi.Input[_builtins.str]] = None,
33
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
34
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
35
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
36
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
37
+ listen_addrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
38
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
39
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
40
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
41
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
42
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
43
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
44
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
45
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
46
+ server_hostnames: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
47
+ server_ips: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
48
+ tls_ca_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
49
+ tls_ca_key_type: Optional[pulumi.Input[_builtins.str]] = None,
50
+ tls_min_version: Optional[pulumi.Input[_builtins.str]] = None):
36
51
  """
37
52
  The set of arguments for constructing a SecretBackend resource.
38
- :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
53
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
39
54
  not begin or end with a `/`. Defaults to `kmip`.
40
- :param pulumi.Input[builtins.int] default_tls_client_key_bits: Client certificate key bits, valid values depend on key type.
41
- :param pulumi.Input[builtins.str] default_tls_client_key_type: Client certificate key type, `rsa` or `ec`.
42
- :param pulumi.Input[builtins.int] default_tls_client_ttl: Client certificate TTL in seconds
43
- :param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
44
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
55
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
56
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
57
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
58
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
59
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
60
+ :param pulumi.Input[_builtins.int] default_tls_client_key_bits: Client certificate key bits, valid values depend on key type.
61
+ :param pulumi.Input[_builtins.str] default_tls_client_key_type: Client certificate key type, `rsa` or `ec`.
62
+ :param pulumi.Input[_builtins.int] default_tls_client_ttl: Client certificate TTL in seconds
63
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
64
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend
65
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
45
66
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
46
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] listen_addrs: Addresses the KMIP server should listen on (`host:port`).
47
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
67
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
68
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
69
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
70
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] listen_addrs: Addresses the KMIP server should listen on (`host:port`).
71
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
72
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
73
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
74
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
48
75
  The value should not contain leading or trailing forward slashes.
49
76
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
50
77
  *Available only for Vault Enterprise*.
51
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] server_hostnames: Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN).
52
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] server_ips: IPs to include in the server's TLS certificate as SAN IP addresses.
53
- :param pulumi.Input[builtins.int] tls_ca_key_bits: CA key bits, valid values depend on key type.
54
- :param pulumi.Input[builtins.str] tls_ca_key_type: CA key type, rsa or ec.
55
- :param pulumi.Input[builtins.str] tls_min_version: Minimum TLS version to accept.
78
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
79
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
80
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
81
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
82
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] server_hostnames: Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN).
83
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] server_ips: IPs to include in the server's TLS certificate as SAN IP addresses.
84
+ :param pulumi.Input[_builtins.int] tls_ca_key_bits: CA key bits, valid values depend on key type.
85
+ :param pulumi.Input[_builtins.str] tls_ca_key_type: CA key type, rsa or ec.
86
+ :param pulumi.Input[_builtins.str] tls_min_version: Minimum TLS version to accept.
56
87
  """
57
88
  pulumi.set(__self__, "path", path)
89
+ if allowed_managed_keys is not None:
90
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
91
+ if allowed_response_headers is not None:
92
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
93
+ if audit_non_hmac_request_keys is not None:
94
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
95
+ if audit_non_hmac_response_keys is not None:
96
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
97
+ if default_lease_ttl_seconds is not None:
98
+ pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
58
99
  if default_tls_client_key_bits is not None:
59
100
  pulumi.set(__self__, "default_tls_client_key_bits", default_tls_client_key_bits)
60
101
  if default_tls_client_key_type is not None:
61
102
  pulumi.set(__self__, "default_tls_client_key_type", default_tls_client_key_type)
62
103
  if default_tls_client_ttl is not None:
63
104
  pulumi.set(__self__, "default_tls_client_ttl", default_tls_client_ttl)
105
+ if delegated_auth_accessors is not None:
106
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
64
107
  if description is not None:
65
108
  pulumi.set(__self__, "description", description)
66
109
  if disable_remount is not None:
67
110
  pulumi.set(__self__, "disable_remount", disable_remount)
111
+ if external_entropy_access is not None:
112
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
113
+ if force_no_cache is not None:
114
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
115
+ if identity_token_key is not None:
116
+ pulumi.set(__self__, "identity_token_key", identity_token_key)
68
117
  if listen_addrs is not None:
69
118
  pulumi.set(__self__, "listen_addrs", listen_addrs)
119
+ if listing_visibility is not None:
120
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
121
+ if local is not None:
122
+ pulumi.set(__self__, "local", local)
123
+ if max_lease_ttl_seconds is not None:
124
+ pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
70
125
  if namespace is not None:
71
126
  pulumi.set(__self__, "namespace", namespace)
127
+ if options is not None:
128
+ pulumi.set(__self__, "options", options)
129
+ if passthrough_request_headers is not None:
130
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
131
+ if plugin_version is not None:
132
+ pulumi.set(__self__, "plugin_version", plugin_version)
133
+ if seal_wrap is not None:
134
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
72
135
  if server_hostnames is not None:
73
136
  pulumi.set(__self__, "server_hostnames", server_hostnames)
74
137
  if server_ips is not None:
@@ -80,9 +143,9 @@ class SecretBackendArgs:
80
143
  if tls_min_version is not None:
81
144
  pulumi.set(__self__, "tls_min_version", tls_min_version)
82
145
 
83
- @property
146
+ @_builtins.property
84
147
  @pulumi.getter
85
- def path(self) -> pulumi.Input[builtins.str]:
148
+ def path(self) -> pulumi.Input[_builtins.str]:
86
149
  """
87
150
  The unique path this backend should be mounted at. Must
88
151
  not begin or end with a `/`. Defaults to `kmip`.
@@ -90,60 +153,132 @@ class SecretBackendArgs:
90
153
  return pulumi.get(self, "path")
91
154
 
92
155
  @path.setter
93
- def path(self, value: pulumi.Input[builtins.str]):
156
+ def path(self, value: pulumi.Input[_builtins.str]):
94
157
  pulumi.set(self, "path", value)
95
158
 
96
- @property
159
+ @_builtins.property
160
+ @pulumi.getter(name="allowedManagedKeys")
161
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
162
+ """
163
+ List of managed key registry entry names that the mount in question is allowed to access
164
+ """
165
+ return pulumi.get(self, "allowed_managed_keys")
166
+
167
+ @allowed_managed_keys.setter
168
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
169
+ pulumi.set(self, "allowed_managed_keys", value)
170
+
171
+ @_builtins.property
172
+ @pulumi.getter(name="allowedResponseHeaders")
173
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
174
+ """
175
+ List of headers to allow and pass from the request to the plugin
176
+ """
177
+ return pulumi.get(self, "allowed_response_headers")
178
+
179
+ @allowed_response_headers.setter
180
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
181
+ pulumi.set(self, "allowed_response_headers", value)
182
+
183
+ @_builtins.property
184
+ @pulumi.getter(name="auditNonHmacRequestKeys")
185
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
186
+ """
187
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
188
+ """
189
+ return pulumi.get(self, "audit_non_hmac_request_keys")
190
+
191
+ @audit_non_hmac_request_keys.setter
192
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
193
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
194
+
195
+ @_builtins.property
196
+ @pulumi.getter(name="auditNonHmacResponseKeys")
197
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
198
+ """
199
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
200
+ """
201
+ return pulumi.get(self, "audit_non_hmac_response_keys")
202
+
203
+ @audit_non_hmac_response_keys.setter
204
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
205
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
206
+
207
+ @_builtins.property
208
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
209
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
210
+ """
211
+ Default lease duration for tokens and secrets in seconds
212
+ """
213
+ return pulumi.get(self, "default_lease_ttl_seconds")
214
+
215
+ @default_lease_ttl_seconds.setter
216
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
217
+ pulumi.set(self, "default_lease_ttl_seconds", value)
218
+
219
+ @_builtins.property
97
220
  @pulumi.getter(name="defaultTlsClientKeyBits")
98
- def default_tls_client_key_bits(self) -> Optional[pulumi.Input[builtins.int]]:
221
+ def default_tls_client_key_bits(self) -> Optional[pulumi.Input[_builtins.int]]:
99
222
  """
100
223
  Client certificate key bits, valid values depend on key type.
101
224
  """
102
225
  return pulumi.get(self, "default_tls_client_key_bits")
103
226
 
104
227
  @default_tls_client_key_bits.setter
105
- def default_tls_client_key_bits(self, value: Optional[pulumi.Input[builtins.int]]):
228
+ def default_tls_client_key_bits(self, value: Optional[pulumi.Input[_builtins.int]]):
106
229
  pulumi.set(self, "default_tls_client_key_bits", value)
107
230
 
108
- @property
231
+ @_builtins.property
109
232
  @pulumi.getter(name="defaultTlsClientKeyType")
110
- def default_tls_client_key_type(self) -> Optional[pulumi.Input[builtins.str]]:
233
+ def default_tls_client_key_type(self) -> Optional[pulumi.Input[_builtins.str]]:
111
234
  """
112
235
  Client certificate key type, `rsa` or `ec`.
113
236
  """
114
237
  return pulumi.get(self, "default_tls_client_key_type")
115
238
 
116
239
  @default_tls_client_key_type.setter
117
- def default_tls_client_key_type(self, value: Optional[pulumi.Input[builtins.str]]):
240
+ def default_tls_client_key_type(self, value: Optional[pulumi.Input[_builtins.str]]):
118
241
  pulumi.set(self, "default_tls_client_key_type", value)
119
242
 
120
- @property
243
+ @_builtins.property
121
244
  @pulumi.getter(name="defaultTlsClientTtl")
122
- def default_tls_client_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
245
+ def default_tls_client_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
123
246
  """
124
247
  Client certificate TTL in seconds
125
248
  """
126
249
  return pulumi.get(self, "default_tls_client_ttl")
127
250
 
128
251
  @default_tls_client_ttl.setter
129
- def default_tls_client_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
252
+ def default_tls_client_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
130
253
  pulumi.set(self, "default_tls_client_ttl", value)
131
254
 
132
- @property
255
+ @_builtins.property
256
+ @pulumi.getter(name="delegatedAuthAccessors")
257
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
258
+ """
259
+ List of headers to allow and pass from the request to the plugin
260
+ """
261
+ return pulumi.get(self, "delegated_auth_accessors")
262
+
263
+ @delegated_auth_accessors.setter
264
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
265
+ pulumi.set(self, "delegated_auth_accessors", value)
266
+
267
+ @_builtins.property
133
268
  @pulumi.getter
134
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
269
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
135
270
  """
136
- A human-friendly description for this backend.
271
+ Human-friendly description of the mount for the backend
137
272
  """
138
273
  return pulumi.get(self, "description")
139
274
 
140
275
  @description.setter
141
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
276
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
142
277
  pulumi.set(self, "description", value)
143
278
 
144
- @property
279
+ @_builtins.property
145
280
  @pulumi.getter(name="disableRemount")
146
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
281
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
147
282
  """
148
283
  If set, opts out of mount migration on path updates.
149
284
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -151,24 +286,96 @@ class SecretBackendArgs:
151
286
  return pulumi.get(self, "disable_remount")
152
287
 
153
288
  @disable_remount.setter
154
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
289
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
155
290
  pulumi.set(self, "disable_remount", value)
156
291
 
157
- @property
292
+ @_builtins.property
293
+ @pulumi.getter(name="externalEntropyAccess")
294
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
295
+ """
296
+ Enable the secrets engine to access Vault's external entropy source
297
+ """
298
+ return pulumi.get(self, "external_entropy_access")
299
+
300
+ @external_entropy_access.setter
301
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
302
+ pulumi.set(self, "external_entropy_access", value)
303
+
304
+ @_builtins.property
305
+ @pulumi.getter(name="forceNoCache")
306
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
307
+ """
308
+ If set to true, disables caching.
309
+ """
310
+ return pulumi.get(self, "force_no_cache")
311
+
312
+ @force_no_cache.setter
313
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
314
+ pulumi.set(self, "force_no_cache", value)
315
+
316
+ @_builtins.property
317
+ @pulumi.getter(name="identityTokenKey")
318
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
319
+ """
320
+ The key to use for signing plugin workload identity tokens
321
+ """
322
+ return pulumi.get(self, "identity_token_key")
323
+
324
+ @identity_token_key.setter
325
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
326
+ pulumi.set(self, "identity_token_key", value)
327
+
328
+ @_builtins.property
158
329
  @pulumi.getter(name="listenAddrs")
159
- def listen_addrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
330
+ def listen_addrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
160
331
  """
161
332
  Addresses the KMIP server should listen on (`host:port`).
162
333
  """
163
334
  return pulumi.get(self, "listen_addrs")
164
335
 
165
336
  @listen_addrs.setter
166
- def listen_addrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
337
+ def listen_addrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
167
338
  pulumi.set(self, "listen_addrs", value)
168
339
 
169
- @property
340
+ @_builtins.property
341
+ @pulumi.getter(name="listingVisibility")
342
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
343
+ """
344
+ Specifies whether to show this mount in the UI-specific listing endpoint
345
+ """
346
+ return pulumi.get(self, "listing_visibility")
347
+
348
+ @listing_visibility.setter
349
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
350
+ pulumi.set(self, "listing_visibility", value)
351
+
352
+ @_builtins.property
353
+ @pulumi.getter
354
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
355
+ """
356
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
357
+ """
358
+ return pulumi.get(self, "local")
359
+
360
+ @local.setter
361
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
362
+ pulumi.set(self, "local", value)
363
+
364
+ @_builtins.property
365
+ @pulumi.getter(name="maxLeaseTtlSeconds")
366
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
367
+ """
368
+ Maximum possible lease duration for tokens and secrets in seconds
369
+ """
370
+ return pulumi.get(self, "max_lease_ttl_seconds")
371
+
372
+ @max_lease_ttl_seconds.setter
373
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
374
+ pulumi.set(self, "max_lease_ttl_seconds", value)
375
+
376
+ @_builtins.property
170
377
  @pulumi.getter
171
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
378
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
172
379
  """
173
380
  The namespace to provision the resource in.
174
381
  The value should not contain leading or trailing forward slashes.
@@ -178,123 +385,239 @@ class SecretBackendArgs:
178
385
  return pulumi.get(self, "namespace")
179
386
 
180
387
  @namespace.setter
181
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
388
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
182
389
  pulumi.set(self, "namespace", value)
183
390
 
184
- @property
391
+ @_builtins.property
392
+ @pulumi.getter
393
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
394
+ """
395
+ Specifies mount type specific options that are passed to the backend
396
+ """
397
+ return pulumi.get(self, "options")
398
+
399
+ @options.setter
400
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
401
+ pulumi.set(self, "options", value)
402
+
403
+ @_builtins.property
404
+ @pulumi.getter(name="passthroughRequestHeaders")
405
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
406
+ """
407
+ List of headers to allow and pass from the request to the plugin
408
+ """
409
+ return pulumi.get(self, "passthrough_request_headers")
410
+
411
+ @passthrough_request_headers.setter
412
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
413
+ pulumi.set(self, "passthrough_request_headers", value)
414
+
415
+ @_builtins.property
416
+ @pulumi.getter(name="pluginVersion")
417
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
418
+ """
419
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
420
+ """
421
+ return pulumi.get(self, "plugin_version")
422
+
423
+ @plugin_version.setter
424
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
425
+ pulumi.set(self, "plugin_version", value)
426
+
427
+ @_builtins.property
428
+ @pulumi.getter(name="sealWrap")
429
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
430
+ """
431
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
432
+ """
433
+ return pulumi.get(self, "seal_wrap")
434
+
435
+ @seal_wrap.setter
436
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
437
+ pulumi.set(self, "seal_wrap", value)
438
+
439
+ @_builtins.property
185
440
  @pulumi.getter(name="serverHostnames")
186
- def server_hostnames(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
441
+ def server_hostnames(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
187
442
  """
188
443
  Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN).
189
444
  """
190
445
  return pulumi.get(self, "server_hostnames")
191
446
 
192
447
  @server_hostnames.setter
193
- def server_hostnames(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
448
+ def server_hostnames(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
194
449
  pulumi.set(self, "server_hostnames", value)
195
450
 
196
- @property
451
+ @_builtins.property
197
452
  @pulumi.getter(name="serverIps")
198
- def server_ips(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
453
+ def server_ips(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
199
454
  """
200
455
  IPs to include in the server's TLS certificate as SAN IP addresses.
201
456
  """
202
457
  return pulumi.get(self, "server_ips")
203
458
 
204
459
  @server_ips.setter
205
- def server_ips(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
460
+ def server_ips(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
206
461
  pulumi.set(self, "server_ips", value)
207
462
 
208
- @property
463
+ @_builtins.property
209
464
  @pulumi.getter(name="tlsCaKeyBits")
210
- def tls_ca_key_bits(self) -> Optional[pulumi.Input[builtins.int]]:
465
+ def tls_ca_key_bits(self) -> Optional[pulumi.Input[_builtins.int]]:
211
466
  """
212
467
  CA key bits, valid values depend on key type.
213
468
  """
214
469
  return pulumi.get(self, "tls_ca_key_bits")
215
470
 
216
471
  @tls_ca_key_bits.setter
217
- def tls_ca_key_bits(self, value: Optional[pulumi.Input[builtins.int]]):
472
+ def tls_ca_key_bits(self, value: Optional[pulumi.Input[_builtins.int]]):
218
473
  pulumi.set(self, "tls_ca_key_bits", value)
219
474
 
220
- @property
475
+ @_builtins.property
221
476
  @pulumi.getter(name="tlsCaKeyType")
222
- def tls_ca_key_type(self) -> Optional[pulumi.Input[builtins.str]]:
477
+ def tls_ca_key_type(self) -> Optional[pulumi.Input[_builtins.str]]:
223
478
  """
224
479
  CA key type, rsa or ec.
225
480
  """
226
481
  return pulumi.get(self, "tls_ca_key_type")
227
482
 
228
483
  @tls_ca_key_type.setter
229
- def tls_ca_key_type(self, value: Optional[pulumi.Input[builtins.str]]):
484
+ def tls_ca_key_type(self, value: Optional[pulumi.Input[_builtins.str]]):
230
485
  pulumi.set(self, "tls_ca_key_type", value)
231
486
 
232
- @property
487
+ @_builtins.property
233
488
  @pulumi.getter(name="tlsMinVersion")
234
- def tls_min_version(self) -> Optional[pulumi.Input[builtins.str]]:
489
+ def tls_min_version(self) -> Optional[pulumi.Input[_builtins.str]]:
235
490
  """
236
491
  Minimum TLS version to accept.
237
492
  """
238
493
  return pulumi.get(self, "tls_min_version")
239
494
 
240
495
  @tls_min_version.setter
241
- def tls_min_version(self, value: Optional[pulumi.Input[builtins.str]]):
496
+ def tls_min_version(self, value: Optional[pulumi.Input[_builtins.str]]):
242
497
  pulumi.set(self, "tls_min_version", value)
243
498
 
244
499
 
245
500
  @pulumi.input_type
246
501
  class _SecretBackendState:
247
502
  def __init__(__self__, *,
248
- default_tls_client_key_bits: Optional[pulumi.Input[builtins.int]] = None,
249
- default_tls_client_key_type: Optional[pulumi.Input[builtins.str]] = None,
250
- default_tls_client_ttl: Optional[pulumi.Input[builtins.int]] = None,
251
- description: Optional[pulumi.Input[builtins.str]] = None,
252
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
253
- listen_addrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
254
- namespace: Optional[pulumi.Input[builtins.str]] = None,
255
- path: Optional[pulumi.Input[builtins.str]] = None,
256
- server_hostnames: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
257
- server_ips: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
258
- tls_ca_key_bits: Optional[pulumi.Input[builtins.int]] = None,
259
- tls_ca_key_type: Optional[pulumi.Input[builtins.str]] = None,
260
- tls_min_version: Optional[pulumi.Input[builtins.str]] = None):
503
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
504
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
505
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
506
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
507
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
508
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
509
+ default_tls_client_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
510
+ default_tls_client_key_type: Optional[pulumi.Input[_builtins.str]] = None,
511
+ default_tls_client_ttl: Optional[pulumi.Input[_builtins.int]] = None,
512
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
513
+ description: Optional[pulumi.Input[_builtins.str]] = None,
514
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
515
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
516
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
517
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
518
+ listen_addrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
519
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
520
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
521
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
522
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
523
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
524
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
525
+ path: Optional[pulumi.Input[_builtins.str]] = None,
526
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
527
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
528
+ server_hostnames: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
529
+ server_ips: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
530
+ tls_ca_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
531
+ tls_ca_key_type: Optional[pulumi.Input[_builtins.str]] = None,
532
+ tls_min_version: Optional[pulumi.Input[_builtins.str]] = None):
261
533
  """
262
534
  Input properties used for looking up and filtering SecretBackend resources.
263
- :param pulumi.Input[builtins.int] default_tls_client_key_bits: Client certificate key bits, valid values depend on key type.
264
- :param pulumi.Input[builtins.str] default_tls_client_key_type: Client certificate key type, `rsa` or `ec`.
265
- :param pulumi.Input[builtins.int] default_tls_client_ttl: Client certificate TTL in seconds
266
- :param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
267
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
535
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
536
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
537
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
538
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
539
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
540
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
541
+ :param pulumi.Input[_builtins.int] default_tls_client_key_bits: Client certificate key bits, valid values depend on key type.
542
+ :param pulumi.Input[_builtins.str] default_tls_client_key_type: Client certificate key type, `rsa` or `ec`.
543
+ :param pulumi.Input[_builtins.int] default_tls_client_ttl: Client certificate TTL in seconds
544
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
545
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend
546
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
268
547
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
269
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] listen_addrs: Addresses the KMIP server should listen on (`host:port`).
270
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
548
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
549
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
550
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
551
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] listen_addrs: Addresses the KMIP server should listen on (`host:port`).
552
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
553
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
554
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
555
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
271
556
  The value should not contain leading or trailing forward slashes.
272
557
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
273
558
  *Available only for Vault Enterprise*.
274
- :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
559
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
560
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
561
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
275
562
  not begin or end with a `/`. Defaults to `kmip`.
276
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] server_hostnames: Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN).
277
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] server_ips: IPs to include in the server's TLS certificate as SAN IP addresses.
278
- :param pulumi.Input[builtins.int] tls_ca_key_bits: CA key bits, valid values depend on key type.
279
- :param pulumi.Input[builtins.str] tls_ca_key_type: CA key type, rsa or ec.
280
- :param pulumi.Input[builtins.str] tls_min_version: Minimum TLS version to accept.
281
- """
563
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
564
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
565
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] server_hostnames: Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN).
566
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] server_ips: IPs to include in the server's TLS certificate as SAN IP addresses.
567
+ :param pulumi.Input[_builtins.int] tls_ca_key_bits: CA key bits, valid values depend on key type.
568
+ :param pulumi.Input[_builtins.str] tls_ca_key_type: CA key type, rsa or ec.
569
+ :param pulumi.Input[_builtins.str] tls_min_version: Minimum TLS version to accept.
570
+ """
571
+ if accessor is not None:
572
+ pulumi.set(__self__, "accessor", accessor)
573
+ if allowed_managed_keys is not None:
574
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
575
+ if allowed_response_headers is not None:
576
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
577
+ if audit_non_hmac_request_keys is not None:
578
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
579
+ if audit_non_hmac_response_keys is not None:
580
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
581
+ if default_lease_ttl_seconds is not None:
582
+ pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
282
583
  if default_tls_client_key_bits is not None:
283
584
  pulumi.set(__self__, "default_tls_client_key_bits", default_tls_client_key_bits)
284
585
  if default_tls_client_key_type is not None:
285
586
  pulumi.set(__self__, "default_tls_client_key_type", default_tls_client_key_type)
286
587
  if default_tls_client_ttl is not None:
287
588
  pulumi.set(__self__, "default_tls_client_ttl", default_tls_client_ttl)
589
+ if delegated_auth_accessors is not None:
590
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
288
591
  if description is not None:
289
592
  pulumi.set(__self__, "description", description)
290
593
  if disable_remount is not None:
291
594
  pulumi.set(__self__, "disable_remount", disable_remount)
595
+ if external_entropy_access is not None:
596
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
597
+ if force_no_cache is not None:
598
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
599
+ if identity_token_key is not None:
600
+ pulumi.set(__self__, "identity_token_key", identity_token_key)
292
601
  if listen_addrs is not None:
293
602
  pulumi.set(__self__, "listen_addrs", listen_addrs)
603
+ if listing_visibility is not None:
604
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
605
+ if local is not None:
606
+ pulumi.set(__self__, "local", local)
607
+ if max_lease_ttl_seconds is not None:
608
+ pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
294
609
  if namespace is not None:
295
610
  pulumi.set(__self__, "namespace", namespace)
611
+ if options is not None:
612
+ pulumi.set(__self__, "options", options)
613
+ if passthrough_request_headers is not None:
614
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
296
615
  if path is not None:
297
616
  pulumi.set(__self__, "path", path)
617
+ if plugin_version is not None:
618
+ pulumi.set(__self__, "plugin_version", plugin_version)
619
+ if seal_wrap is not None:
620
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
298
621
  if server_hostnames is not None:
299
622
  pulumi.set(__self__, "server_hostnames", server_hostnames)
300
623
  if server_ips is not None:
@@ -306,57 +629,141 @@ class _SecretBackendState:
306
629
  if tls_min_version is not None:
307
630
  pulumi.set(__self__, "tls_min_version", tls_min_version)
308
631
 
309
- @property
632
+ @_builtins.property
633
+ @pulumi.getter
634
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
635
+ """
636
+ Accessor of the mount
637
+ """
638
+ return pulumi.get(self, "accessor")
639
+
640
+ @accessor.setter
641
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
642
+ pulumi.set(self, "accessor", value)
643
+
644
+ @_builtins.property
645
+ @pulumi.getter(name="allowedManagedKeys")
646
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
647
+ """
648
+ List of managed key registry entry names that the mount in question is allowed to access
649
+ """
650
+ return pulumi.get(self, "allowed_managed_keys")
651
+
652
+ @allowed_managed_keys.setter
653
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
654
+ pulumi.set(self, "allowed_managed_keys", value)
655
+
656
+ @_builtins.property
657
+ @pulumi.getter(name="allowedResponseHeaders")
658
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
659
+ """
660
+ List of headers to allow and pass from the request to the plugin
661
+ """
662
+ return pulumi.get(self, "allowed_response_headers")
663
+
664
+ @allowed_response_headers.setter
665
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
666
+ pulumi.set(self, "allowed_response_headers", value)
667
+
668
+ @_builtins.property
669
+ @pulumi.getter(name="auditNonHmacRequestKeys")
670
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
671
+ """
672
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
673
+ """
674
+ return pulumi.get(self, "audit_non_hmac_request_keys")
675
+
676
+ @audit_non_hmac_request_keys.setter
677
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
678
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
679
+
680
+ @_builtins.property
681
+ @pulumi.getter(name="auditNonHmacResponseKeys")
682
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
683
+ """
684
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
685
+ """
686
+ return pulumi.get(self, "audit_non_hmac_response_keys")
687
+
688
+ @audit_non_hmac_response_keys.setter
689
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
690
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
691
+
692
+ @_builtins.property
693
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
694
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
695
+ """
696
+ Default lease duration for tokens and secrets in seconds
697
+ """
698
+ return pulumi.get(self, "default_lease_ttl_seconds")
699
+
700
+ @default_lease_ttl_seconds.setter
701
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
702
+ pulumi.set(self, "default_lease_ttl_seconds", value)
703
+
704
+ @_builtins.property
310
705
  @pulumi.getter(name="defaultTlsClientKeyBits")
311
- def default_tls_client_key_bits(self) -> Optional[pulumi.Input[builtins.int]]:
706
+ def default_tls_client_key_bits(self) -> Optional[pulumi.Input[_builtins.int]]:
312
707
  """
313
708
  Client certificate key bits, valid values depend on key type.
314
709
  """
315
710
  return pulumi.get(self, "default_tls_client_key_bits")
316
711
 
317
712
  @default_tls_client_key_bits.setter
318
- def default_tls_client_key_bits(self, value: Optional[pulumi.Input[builtins.int]]):
713
+ def default_tls_client_key_bits(self, value: Optional[pulumi.Input[_builtins.int]]):
319
714
  pulumi.set(self, "default_tls_client_key_bits", value)
320
715
 
321
- @property
716
+ @_builtins.property
322
717
  @pulumi.getter(name="defaultTlsClientKeyType")
323
- def default_tls_client_key_type(self) -> Optional[pulumi.Input[builtins.str]]:
718
+ def default_tls_client_key_type(self) -> Optional[pulumi.Input[_builtins.str]]:
324
719
  """
325
720
  Client certificate key type, `rsa` or `ec`.
326
721
  """
327
722
  return pulumi.get(self, "default_tls_client_key_type")
328
723
 
329
724
  @default_tls_client_key_type.setter
330
- def default_tls_client_key_type(self, value: Optional[pulumi.Input[builtins.str]]):
725
+ def default_tls_client_key_type(self, value: Optional[pulumi.Input[_builtins.str]]):
331
726
  pulumi.set(self, "default_tls_client_key_type", value)
332
727
 
333
- @property
728
+ @_builtins.property
334
729
  @pulumi.getter(name="defaultTlsClientTtl")
335
- def default_tls_client_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
730
+ def default_tls_client_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
336
731
  """
337
732
  Client certificate TTL in seconds
338
733
  """
339
734
  return pulumi.get(self, "default_tls_client_ttl")
340
735
 
341
736
  @default_tls_client_ttl.setter
342
- def default_tls_client_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
737
+ def default_tls_client_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
343
738
  pulumi.set(self, "default_tls_client_ttl", value)
344
739
 
345
- @property
740
+ @_builtins.property
741
+ @pulumi.getter(name="delegatedAuthAccessors")
742
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
743
+ """
744
+ List of headers to allow and pass from the request to the plugin
745
+ """
746
+ return pulumi.get(self, "delegated_auth_accessors")
747
+
748
+ @delegated_auth_accessors.setter
749
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
750
+ pulumi.set(self, "delegated_auth_accessors", value)
751
+
752
+ @_builtins.property
346
753
  @pulumi.getter
347
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
754
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
348
755
  """
349
- A human-friendly description for this backend.
756
+ Human-friendly description of the mount for the backend
350
757
  """
351
758
  return pulumi.get(self, "description")
352
759
 
353
760
  @description.setter
354
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
761
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
355
762
  pulumi.set(self, "description", value)
356
763
 
357
- @property
764
+ @_builtins.property
358
765
  @pulumi.getter(name="disableRemount")
359
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
766
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
360
767
  """
361
768
  If set, opts out of mount migration on path updates.
362
769
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -364,24 +771,96 @@ class _SecretBackendState:
364
771
  return pulumi.get(self, "disable_remount")
365
772
 
366
773
  @disable_remount.setter
367
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
774
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
368
775
  pulumi.set(self, "disable_remount", value)
369
776
 
370
- @property
777
+ @_builtins.property
778
+ @pulumi.getter(name="externalEntropyAccess")
779
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
780
+ """
781
+ Enable the secrets engine to access Vault's external entropy source
782
+ """
783
+ return pulumi.get(self, "external_entropy_access")
784
+
785
+ @external_entropy_access.setter
786
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
787
+ pulumi.set(self, "external_entropy_access", value)
788
+
789
+ @_builtins.property
790
+ @pulumi.getter(name="forceNoCache")
791
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
792
+ """
793
+ If set to true, disables caching.
794
+ """
795
+ return pulumi.get(self, "force_no_cache")
796
+
797
+ @force_no_cache.setter
798
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
799
+ pulumi.set(self, "force_no_cache", value)
800
+
801
+ @_builtins.property
802
+ @pulumi.getter(name="identityTokenKey")
803
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
804
+ """
805
+ The key to use for signing plugin workload identity tokens
806
+ """
807
+ return pulumi.get(self, "identity_token_key")
808
+
809
+ @identity_token_key.setter
810
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
811
+ pulumi.set(self, "identity_token_key", value)
812
+
813
+ @_builtins.property
371
814
  @pulumi.getter(name="listenAddrs")
372
- def listen_addrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
815
+ def listen_addrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
373
816
  """
374
817
  Addresses the KMIP server should listen on (`host:port`).
375
818
  """
376
819
  return pulumi.get(self, "listen_addrs")
377
820
 
378
821
  @listen_addrs.setter
379
- def listen_addrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
822
+ def listen_addrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
380
823
  pulumi.set(self, "listen_addrs", value)
381
824
 
382
- @property
825
+ @_builtins.property
826
+ @pulumi.getter(name="listingVisibility")
827
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
828
+ """
829
+ Specifies whether to show this mount in the UI-specific listing endpoint
830
+ """
831
+ return pulumi.get(self, "listing_visibility")
832
+
833
+ @listing_visibility.setter
834
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
835
+ pulumi.set(self, "listing_visibility", value)
836
+
837
+ @_builtins.property
838
+ @pulumi.getter
839
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
840
+ """
841
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
842
+ """
843
+ return pulumi.get(self, "local")
844
+
845
+ @local.setter
846
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
847
+ pulumi.set(self, "local", value)
848
+
849
+ @_builtins.property
850
+ @pulumi.getter(name="maxLeaseTtlSeconds")
851
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
852
+ """
853
+ Maximum possible lease duration for tokens and secrets in seconds
854
+ """
855
+ return pulumi.get(self, "max_lease_ttl_seconds")
856
+
857
+ @max_lease_ttl_seconds.setter
858
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
859
+ pulumi.set(self, "max_lease_ttl_seconds", value)
860
+
861
+ @_builtins.property
383
862
  @pulumi.getter
384
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
863
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
385
864
  """
386
865
  The namespace to provision the resource in.
387
866
  The value should not contain leading or trailing forward slashes.
@@ -391,12 +870,36 @@ class _SecretBackendState:
391
870
  return pulumi.get(self, "namespace")
392
871
 
393
872
  @namespace.setter
394
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
873
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
395
874
  pulumi.set(self, "namespace", value)
396
875
 
397
- @property
876
+ @_builtins.property
877
+ @pulumi.getter
878
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
879
+ """
880
+ Specifies mount type specific options that are passed to the backend
881
+ """
882
+ return pulumi.get(self, "options")
883
+
884
+ @options.setter
885
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
886
+ pulumi.set(self, "options", value)
887
+
888
+ @_builtins.property
889
+ @pulumi.getter(name="passthroughRequestHeaders")
890
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
891
+ """
892
+ List of headers to allow and pass from the request to the plugin
893
+ """
894
+ return pulumi.get(self, "passthrough_request_headers")
895
+
896
+ @passthrough_request_headers.setter
897
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
898
+ pulumi.set(self, "passthrough_request_headers", value)
899
+
900
+ @_builtins.property
398
901
  @pulumi.getter
399
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
902
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
400
903
  """
401
904
  The unique path this backend should be mounted at. Must
402
905
  not begin or end with a `/`. Defaults to `kmip`.
@@ -404,67 +907,91 @@ class _SecretBackendState:
404
907
  return pulumi.get(self, "path")
405
908
 
406
909
  @path.setter
407
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
910
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
408
911
  pulumi.set(self, "path", value)
409
912
 
410
- @property
913
+ @_builtins.property
914
+ @pulumi.getter(name="pluginVersion")
915
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
916
+ """
917
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
918
+ """
919
+ return pulumi.get(self, "plugin_version")
920
+
921
+ @plugin_version.setter
922
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
923
+ pulumi.set(self, "plugin_version", value)
924
+
925
+ @_builtins.property
926
+ @pulumi.getter(name="sealWrap")
927
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
928
+ """
929
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
930
+ """
931
+ return pulumi.get(self, "seal_wrap")
932
+
933
+ @seal_wrap.setter
934
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
935
+ pulumi.set(self, "seal_wrap", value)
936
+
937
+ @_builtins.property
411
938
  @pulumi.getter(name="serverHostnames")
412
- def server_hostnames(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
939
+ def server_hostnames(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
413
940
  """
414
941
  Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN).
415
942
  """
416
943
  return pulumi.get(self, "server_hostnames")
417
944
 
418
945
  @server_hostnames.setter
419
- def server_hostnames(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
946
+ def server_hostnames(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
420
947
  pulumi.set(self, "server_hostnames", value)
421
948
 
422
- @property
949
+ @_builtins.property
423
950
  @pulumi.getter(name="serverIps")
424
- def server_ips(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
951
+ def server_ips(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
425
952
  """
426
953
  IPs to include in the server's TLS certificate as SAN IP addresses.
427
954
  """
428
955
  return pulumi.get(self, "server_ips")
429
956
 
430
957
  @server_ips.setter
431
- def server_ips(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
958
+ def server_ips(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
432
959
  pulumi.set(self, "server_ips", value)
433
960
 
434
- @property
961
+ @_builtins.property
435
962
  @pulumi.getter(name="tlsCaKeyBits")
436
- def tls_ca_key_bits(self) -> Optional[pulumi.Input[builtins.int]]:
963
+ def tls_ca_key_bits(self) -> Optional[pulumi.Input[_builtins.int]]:
437
964
  """
438
965
  CA key bits, valid values depend on key type.
439
966
  """
440
967
  return pulumi.get(self, "tls_ca_key_bits")
441
968
 
442
969
  @tls_ca_key_bits.setter
443
- def tls_ca_key_bits(self, value: Optional[pulumi.Input[builtins.int]]):
970
+ def tls_ca_key_bits(self, value: Optional[pulumi.Input[_builtins.int]]):
444
971
  pulumi.set(self, "tls_ca_key_bits", value)
445
972
 
446
- @property
973
+ @_builtins.property
447
974
  @pulumi.getter(name="tlsCaKeyType")
448
- def tls_ca_key_type(self) -> Optional[pulumi.Input[builtins.str]]:
975
+ def tls_ca_key_type(self) -> Optional[pulumi.Input[_builtins.str]]:
449
976
  """
450
977
  CA key type, rsa or ec.
451
978
  """
452
979
  return pulumi.get(self, "tls_ca_key_type")
453
980
 
454
981
  @tls_ca_key_type.setter
455
- def tls_ca_key_type(self, value: Optional[pulumi.Input[builtins.str]]):
982
+ def tls_ca_key_type(self, value: Optional[pulumi.Input[_builtins.str]]):
456
983
  pulumi.set(self, "tls_ca_key_type", value)
457
984
 
458
- @property
985
+ @_builtins.property
459
986
  @pulumi.getter(name="tlsMinVersion")
460
- def tls_min_version(self) -> Optional[pulumi.Input[builtins.str]]:
987
+ def tls_min_version(self) -> Optional[pulumi.Input[_builtins.str]]:
461
988
  """
462
989
  Minimum TLS version to accept.
463
990
  """
464
991
  return pulumi.get(self, "tls_min_version")
465
992
 
466
993
  @tls_min_version.setter
467
- def tls_min_version(self, value: Optional[pulumi.Input[builtins.str]]):
994
+ def tls_min_version(self, value: Optional[pulumi.Input[_builtins.str]]):
468
995
  pulumi.set(self, "tls_min_version", value)
469
996
 
470
997
 
@@ -474,19 +1001,35 @@ class SecretBackend(pulumi.CustomResource):
474
1001
  def __init__(__self__,
475
1002
  resource_name: str,
476
1003
  opts: Optional[pulumi.ResourceOptions] = None,
477
- default_tls_client_key_bits: Optional[pulumi.Input[builtins.int]] = None,
478
- default_tls_client_key_type: Optional[pulumi.Input[builtins.str]] = None,
479
- default_tls_client_ttl: Optional[pulumi.Input[builtins.int]] = None,
480
- description: Optional[pulumi.Input[builtins.str]] = None,
481
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
482
- listen_addrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
483
- namespace: Optional[pulumi.Input[builtins.str]] = None,
484
- path: Optional[pulumi.Input[builtins.str]] = None,
485
- server_hostnames: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
486
- server_ips: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
487
- tls_ca_key_bits: Optional[pulumi.Input[builtins.int]] = None,
488
- tls_ca_key_type: Optional[pulumi.Input[builtins.str]] = None,
489
- tls_min_version: Optional[pulumi.Input[builtins.str]] = None,
1004
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1005
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1006
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1007
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1008
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1009
+ default_tls_client_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
1010
+ default_tls_client_key_type: Optional[pulumi.Input[_builtins.str]] = None,
1011
+ default_tls_client_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1012
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1013
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1014
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1015
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1016
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1017
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1018
+ listen_addrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1019
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1020
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1021
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1022
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1023
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1024
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1025
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1026
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1027
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1028
+ server_hostnames: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1029
+ server_ips: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1030
+ tls_ca_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
1031
+ tls_ca_key_type: Optional[pulumi.Input[_builtins.str]] = None,
1032
+ tls_min_version: Optional[pulumi.Input[_builtins.str]] = None,
490
1033
  __props__=None):
491
1034
  """
492
1035
  Manages KMIP Secret backends in a Vault server. This feature requires
@@ -523,24 +1066,40 @@ class SecretBackend(pulumi.CustomResource):
523
1066
 
524
1067
  :param str resource_name: The name of the resource.
525
1068
  :param pulumi.ResourceOptions opts: Options for the resource.
526
- :param pulumi.Input[builtins.int] default_tls_client_key_bits: Client certificate key bits, valid values depend on key type.
527
- :param pulumi.Input[builtins.str] default_tls_client_key_type: Client certificate key type, `rsa` or `ec`.
528
- :param pulumi.Input[builtins.int] default_tls_client_ttl: Client certificate TTL in seconds
529
- :param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
530
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1069
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1070
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1071
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1072
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1073
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
1074
+ :param pulumi.Input[_builtins.int] default_tls_client_key_bits: Client certificate key bits, valid values depend on key type.
1075
+ :param pulumi.Input[_builtins.str] default_tls_client_key_type: Client certificate key type, `rsa` or `ec`.
1076
+ :param pulumi.Input[_builtins.int] default_tls_client_ttl: Client certificate TTL in seconds
1077
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1078
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend
1079
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
531
1080
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
532
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] listen_addrs: Addresses the KMIP server should listen on (`host:port`).
533
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
1081
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1082
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1083
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1084
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] listen_addrs: Addresses the KMIP server should listen on (`host:port`).
1085
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1086
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1087
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
1088
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
534
1089
  The value should not contain leading or trailing forward slashes.
535
1090
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
536
1091
  *Available only for Vault Enterprise*.
537
- :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
1092
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1093
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1094
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
538
1095
  not begin or end with a `/`. Defaults to `kmip`.
539
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] server_hostnames: Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN).
540
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] server_ips: IPs to include in the server's TLS certificate as SAN IP addresses.
541
- :param pulumi.Input[builtins.int] tls_ca_key_bits: CA key bits, valid values depend on key type.
542
- :param pulumi.Input[builtins.str] tls_ca_key_type: CA key type, rsa or ec.
543
- :param pulumi.Input[builtins.str] tls_min_version: Minimum TLS version to accept.
1096
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1097
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1098
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] server_hostnames: Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN).
1099
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] server_ips: IPs to include in the server's TLS certificate as SAN IP addresses.
1100
+ :param pulumi.Input[_builtins.int] tls_ca_key_bits: CA key bits, valid values depend on key type.
1101
+ :param pulumi.Input[_builtins.str] tls_ca_key_type: CA key type, rsa or ec.
1102
+ :param pulumi.Input[_builtins.str] tls_min_version: Minimum TLS version to accept.
544
1103
  """
545
1104
  ...
546
1105
  @overload
@@ -596,19 +1155,35 @@ class SecretBackend(pulumi.CustomResource):
596
1155
  def _internal_init(__self__,
597
1156
  resource_name: str,
598
1157
  opts: Optional[pulumi.ResourceOptions] = None,
599
- default_tls_client_key_bits: Optional[pulumi.Input[builtins.int]] = None,
600
- default_tls_client_key_type: Optional[pulumi.Input[builtins.str]] = None,
601
- default_tls_client_ttl: Optional[pulumi.Input[builtins.int]] = None,
602
- description: Optional[pulumi.Input[builtins.str]] = None,
603
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
604
- listen_addrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
605
- namespace: Optional[pulumi.Input[builtins.str]] = None,
606
- path: Optional[pulumi.Input[builtins.str]] = None,
607
- server_hostnames: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
608
- server_ips: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
609
- tls_ca_key_bits: Optional[pulumi.Input[builtins.int]] = None,
610
- tls_ca_key_type: Optional[pulumi.Input[builtins.str]] = None,
611
- tls_min_version: Optional[pulumi.Input[builtins.str]] = None,
1158
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1159
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1160
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1161
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1162
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1163
+ default_tls_client_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
1164
+ default_tls_client_key_type: Optional[pulumi.Input[_builtins.str]] = None,
1165
+ default_tls_client_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1166
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1167
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1168
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1169
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1170
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1171
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1172
+ listen_addrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1173
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1174
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1175
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1176
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1177
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1178
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1179
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1180
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1181
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1182
+ server_hostnames: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1183
+ server_ips: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1184
+ tls_ca_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
1185
+ tls_ca_key_type: Optional[pulumi.Input[_builtins.str]] = None,
1186
+ tls_min_version: Optional[pulumi.Input[_builtins.str]] = None,
612
1187
  __props__=None):
613
1188
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
614
1189
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -618,21 +1193,38 @@ class SecretBackend(pulumi.CustomResource):
618
1193
  raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
619
1194
  __props__ = SecretBackendArgs.__new__(SecretBackendArgs)
620
1195
 
1196
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1197
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1198
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1199
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
1200
+ __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
621
1201
  __props__.__dict__["default_tls_client_key_bits"] = default_tls_client_key_bits
622
1202
  __props__.__dict__["default_tls_client_key_type"] = default_tls_client_key_type
623
1203
  __props__.__dict__["default_tls_client_ttl"] = default_tls_client_ttl
1204
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
624
1205
  __props__.__dict__["description"] = description
625
1206
  __props__.__dict__["disable_remount"] = disable_remount
1207
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1208
+ __props__.__dict__["force_no_cache"] = force_no_cache
1209
+ __props__.__dict__["identity_token_key"] = identity_token_key
626
1210
  __props__.__dict__["listen_addrs"] = listen_addrs
1211
+ __props__.__dict__["listing_visibility"] = listing_visibility
1212
+ __props__.__dict__["local"] = local
1213
+ __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
627
1214
  __props__.__dict__["namespace"] = namespace
1215
+ __props__.__dict__["options"] = options
1216
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
628
1217
  if path is None and not opts.urn:
629
1218
  raise TypeError("Missing required property 'path'")
630
1219
  __props__.__dict__["path"] = path
1220
+ __props__.__dict__["plugin_version"] = plugin_version
1221
+ __props__.__dict__["seal_wrap"] = seal_wrap
631
1222
  __props__.__dict__["server_hostnames"] = server_hostnames
632
1223
  __props__.__dict__["server_ips"] = server_ips
633
1224
  __props__.__dict__["tls_ca_key_bits"] = tls_ca_key_bits
634
1225
  __props__.__dict__["tls_ca_key_type"] = tls_ca_key_type
635
1226
  __props__.__dict__["tls_min_version"] = tls_min_version
1227
+ __props__.__dict__["accessor"] = None
636
1228
  super(SecretBackend, __self__).__init__(
637
1229
  'vault:kmip/secretBackend:SecretBackend',
638
1230
  resource_name,
@@ -643,19 +1235,36 @@ class SecretBackend(pulumi.CustomResource):
643
1235
  def get(resource_name: str,
644
1236
  id: pulumi.Input[str],
645
1237
  opts: Optional[pulumi.ResourceOptions] = None,
646
- default_tls_client_key_bits: Optional[pulumi.Input[builtins.int]] = None,
647
- default_tls_client_key_type: Optional[pulumi.Input[builtins.str]] = None,
648
- default_tls_client_ttl: Optional[pulumi.Input[builtins.int]] = None,
649
- description: Optional[pulumi.Input[builtins.str]] = None,
650
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
651
- listen_addrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
652
- namespace: Optional[pulumi.Input[builtins.str]] = None,
653
- path: Optional[pulumi.Input[builtins.str]] = None,
654
- server_hostnames: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
655
- server_ips: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
656
- tls_ca_key_bits: Optional[pulumi.Input[builtins.int]] = None,
657
- tls_ca_key_type: Optional[pulumi.Input[builtins.str]] = None,
658
- tls_min_version: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretBackend':
1238
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
1239
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1240
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1241
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1242
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1243
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1244
+ default_tls_client_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
1245
+ default_tls_client_key_type: Optional[pulumi.Input[_builtins.str]] = None,
1246
+ default_tls_client_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1247
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1248
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1249
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1250
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1251
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1252
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1253
+ listen_addrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1254
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1255
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1256
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1257
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1258
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1259
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1260
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1261
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1262
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1263
+ server_hostnames: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1264
+ server_ips: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1265
+ tls_ca_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
1266
+ tls_ca_key_type: Optional[pulumi.Input[_builtins.str]] = None,
1267
+ tls_min_version: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackend':
659
1268
  """
660
1269
  Get an existing SecretBackend resource's state with the given name, id, and optional extra
661
1270
  properties used to qualify the lookup.
@@ -663,37 +1272,71 @@ class SecretBackend(pulumi.CustomResource):
663
1272
  :param str resource_name: The unique name of the resulting resource.
664
1273
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
665
1274
  :param pulumi.ResourceOptions opts: Options for the resource.
666
- :param pulumi.Input[builtins.int] default_tls_client_key_bits: Client certificate key bits, valid values depend on key type.
667
- :param pulumi.Input[builtins.str] default_tls_client_key_type: Client certificate key type, `rsa` or `ec`.
668
- :param pulumi.Input[builtins.int] default_tls_client_ttl: Client certificate TTL in seconds
669
- :param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
670
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1275
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
1276
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1277
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1278
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1279
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1280
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
1281
+ :param pulumi.Input[_builtins.int] default_tls_client_key_bits: Client certificate key bits, valid values depend on key type.
1282
+ :param pulumi.Input[_builtins.str] default_tls_client_key_type: Client certificate key type, `rsa` or `ec`.
1283
+ :param pulumi.Input[_builtins.int] default_tls_client_ttl: Client certificate TTL in seconds
1284
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1285
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend
1286
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
671
1287
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
672
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] listen_addrs: Addresses the KMIP server should listen on (`host:port`).
673
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
1288
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1289
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1290
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1291
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] listen_addrs: Addresses the KMIP server should listen on (`host:port`).
1292
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1293
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1294
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
1295
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
674
1296
  The value should not contain leading or trailing forward slashes.
675
1297
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
676
1298
  *Available only for Vault Enterprise*.
677
- :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
1299
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1300
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1301
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
678
1302
  not begin or end with a `/`. Defaults to `kmip`.
679
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] server_hostnames: Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN).
680
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] server_ips: IPs to include in the server's TLS certificate as SAN IP addresses.
681
- :param pulumi.Input[builtins.int] tls_ca_key_bits: CA key bits, valid values depend on key type.
682
- :param pulumi.Input[builtins.str] tls_ca_key_type: CA key type, rsa or ec.
683
- :param pulumi.Input[builtins.str] tls_min_version: Minimum TLS version to accept.
1303
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1304
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1305
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] server_hostnames: Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN).
1306
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] server_ips: IPs to include in the server's TLS certificate as SAN IP addresses.
1307
+ :param pulumi.Input[_builtins.int] tls_ca_key_bits: CA key bits, valid values depend on key type.
1308
+ :param pulumi.Input[_builtins.str] tls_ca_key_type: CA key type, rsa or ec.
1309
+ :param pulumi.Input[_builtins.str] tls_min_version: Minimum TLS version to accept.
684
1310
  """
685
1311
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
686
1312
 
687
1313
  __props__ = _SecretBackendState.__new__(_SecretBackendState)
688
1314
 
1315
+ __props__.__dict__["accessor"] = accessor
1316
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1317
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1318
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1319
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
1320
+ __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
689
1321
  __props__.__dict__["default_tls_client_key_bits"] = default_tls_client_key_bits
690
1322
  __props__.__dict__["default_tls_client_key_type"] = default_tls_client_key_type
691
1323
  __props__.__dict__["default_tls_client_ttl"] = default_tls_client_ttl
1324
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
692
1325
  __props__.__dict__["description"] = description
693
1326
  __props__.__dict__["disable_remount"] = disable_remount
1327
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1328
+ __props__.__dict__["force_no_cache"] = force_no_cache
1329
+ __props__.__dict__["identity_token_key"] = identity_token_key
694
1330
  __props__.__dict__["listen_addrs"] = listen_addrs
1331
+ __props__.__dict__["listing_visibility"] = listing_visibility
1332
+ __props__.__dict__["local"] = local
1333
+ __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
695
1334
  __props__.__dict__["namespace"] = namespace
1335
+ __props__.__dict__["options"] = options
1336
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
696
1337
  __props__.__dict__["path"] = path
1338
+ __props__.__dict__["plugin_version"] = plugin_version
1339
+ __props__.__dict__["seal_wrap"] = seal_wrap
697
1340
  __props__.__dict__["server_hostnames"] = server_hostnames
698
1341
  __props__.__dict__["server_ips"] = server_ips
699
1342
  __props__.__dict__["tls_ca_key_bits"] = tls_ca_key_bits
@@ -701,58 +1344,162 @@ class SecretBackend(pulumi.CustomResource):
701
1344
  __props__.__dict__["tls_min_version"] = tls_min_version
702
1345
  return SecretBackend(resource_name, opts=opts, __props__=__props__)
703
1346
 
704
- @property
1347
+ @_builtins.property
1348
+ @pulumi.getter
1349
+ def accessor(self) -> pulumi.Output[_builtins.str]:
1350
+ """
1351
+ Accessor of the mount
1352
+ """
1353
+ return pulumi.get(self, "accessor")
1354
+
1355
+ @_builtins.property
1356
+ @pulumi.getter(name="allowedManagedKeys")
1357
+ def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1358
+ """
1359
+ List of managed key registry entry names that the mount in question is allowed to access
1360
+ """
1361
+ return pulumi.get(self, "allowed_managed_keys")
1362
+
1363
+ @_builtins.property
1364
+ @pulumi.getter(name="allowedResponseHeaders")
1365
+ def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1366
+ """
1367
+ List of headers to allow and pass from the request to the plugin
1368
+ """
1369
+ return pulumi.get(self, "allowed_response_headers")
1370
+
1371
+ @_builtins.property
1372
+ @pulumi.getter(name="auditNonHmacRequestKeys")
1373
+ def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1374
+ """
1375
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1376
+ """
1377
+ return pulumi.get(self, "audit_non_hmac_request_keys")
1378
+
1379
+ @_builtins.property
1380
+ @pulumi.getter(name="auditNonHmacResponseKeys")
1381
+ def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1382
+ """
1383
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1384
+ """
1385
+ return pulumi.get(self, "audit_non_hmac_response_keys")
1386
+
1387
+ @_builtins.property
1388
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
1389
+ def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1390
+ """
1391
+ Default lease duration for tokens and secrets in seconds
1392
+ """
1393
+ return pulumi.get(self, "default_lease_ttl_seconds")
1394
+
1395
+ @_builtins.property
705
1396
  @pulumi.getter(name="defaultTlsClientKeyBits")
706
- def default_tls_client_key_bits(self) -> pulumi.Output[builtins.int]:
1397
+ def default_tls_client_key_bits(self) -> pulumi.Output[_builtins.int]:
707
1398
  """
708
1399
  Client certificate key bits, valid values depend on key type.
709
1400
  """
710
1401
  return pulumi.get(self, "default_tls_client_key_bits")
711
1402
 
712
- @property
1403
+ @_builtins.property
713
1404
  @pulumi.getter(name="defaultTlsClientKeyType")
714
- def default_tls_client_key_type(self) -> pulumi.Output[builtins.str]:
1405
+ def default_tls_client_key_type(self) -> pulumi.Output[_builtins.str]:
715
1406
  """
716
1407
  Client certificate key type, `rsa` or `ec`.
717
1408
  """
718
1409
  return pulumi.get(self, "default_tls_client_key_type")
719
1410
 
720
- @property
1411
+ @_builtins.property
721
1412
  @pulumi.getter(name="defaultTlsClientTtl")
722
- def default_tls_client_ttl(self) -> pulumi.Output[builtins.int]:
1413
+ def default_tls_client_ttl(self) -> pulumi.Output[_builtins.int]:
723
1414
  """
724
1415
  Client certificate TTL in seconds
725
1416
  """
726
1417
  return pulumi.get(self, "default_tls_client_ttl")
727
1418
 
728
- @property
1419
+ @_builtins.property
1420
+ @pulumi.getter(name="delegatedAuthAccessors")
1421
+ def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1422
+ """
1423
+ List of headers to allow and pass from the request to the plugin
1424
+ """
1425
+ return pulumi.get(self, "delegated_auth_accessors")
1426
+
1427
+ @_builtins.property
729
1428
  @pulumi.getter
730
- def description(self) -> pulumi.Output[Optional[builtins.str]]:
1429
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
731
1430
  """
732
- A human-friendly description for this backend.
1431
+ Human-friendly description of the mount for the backend
733
1432
  """
734
1433
  return pulumi.get(self, "description")
735
1434
 
736
- @property
1435
+ @_builtins.property
737
1436
  @pulumi.getter(name="disableRemount")
738
- def disable_remount(self) -> pulumi.Output[Optional[builtins.bool]]:
1437
+ def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
739
1438
  """
740
1439
  If set, opts out of mount migration on path updates.
741
1440
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
742
1441
  """
743
1442
  return pulumi.get(self, "disable_remount")
744
1443
 
745
- @property
1444
+ @_builtins.property
1445
+ @pulumi.getter(name="externalEntropyAccess")
1446
+ def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
1447
+ """
1448
+ Enable the secrets engine to access Vault's external entropy source
1449
+ """
1450
+ return pulumi.get(self, "external_entropy_access")
1451
+
1452
+ @_builtins.property
1453
+ @pulumi.getter(name="forceNoCache")
1454
+ def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
1455
+ """
1456
+ If set to true, disables caching.
1457
+ """
1458
+ return pulumi.get(self, "force_no_cache")
1459
+
1460
+ @_builtins.property
1461
+ @pulumi.getter(name="identityTokenKey")
1462
+ def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
1463
+ """
1464
+ The key to use for signing plugin workload identity tokens
1465
+ """
1466
+ return pulumi.get(self, "identity_token_key")
1467
+
1468
+ @_builtins.property
746
1469
  @pulumi.getter(name="listenAddrs")
747
- def listen_addrs(self) -> pulumi.Output[Sequence[builtins.str]]:
1470
+ def listen_addrs(self) -> pulumi.Output[Sequence[_builtins.str]]:
748
1471
  """
749
1472
  Addresses the KMIP server should listen on (`host:port`).
750
1473
  """
751
1474
  return pulumi.get(self, "listen_addrs")
752
1475
 
753
- @property
1476
+ @_builtins.property
1477
+ @pulumi.getter(name="listingVisibility")
1478
+ def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
1479
+ """
1480
+ Specifies whether to show this mount in the UI-specific listing endpoint
1481
+ """
1482
+ return pulumi.get(self, "listing_visibility")
1483
+
1484
+ @_builtins.property
1485
+ @pulumi.getter
1486
+ def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
1487
+ """
1488
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1489
+ """
1490
+ return pulumi.get(self, "local")
1491
+
1492
+ @_builtins.property
1493
+ @pulumi.getter(name="maxLeaseTtlSeconds")
1494
+ def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1495
+ """
1496
+ Maximum possible lease duration for tokens and secrets in seconds
1497
+ """
1498
+ return pulumi.get(self, "max_lease_ttl_seconds")
1499
+
1500
+ @_builtins.property
754
1501
  @pulumi.getter
755
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
1502
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
756
1503
  """
757
1504
  The namespace to provision the resource in.
758
1505
  The value should not contain leading or trailing forward slashes.
@@ -761,50 +1508,82 @@ class SecretBackend(pulumi.CustomResource):
761
1508
  """
762
1509
  return pulumi.get(self, "namespace")
763
1510
 
764
- @property
1511
+ @_builtins.property
1512
+ @pulumi.getter
1513
+ def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
1514
+ """
1515
+ Specifies mount type specific options that are passed to the backend
1516
+ """
1517
+ return pulumi.get(self, "options")
1518
+
1519
+ @_builtins.property
1520
+ @pulumi.getter(name="passthroughRequestHeaders")
1521
+ def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1522
+ """
1523
+ List of headers to allow and pass from the request to the plugin
1524
+ """
1525
+ return pulumi.get(self, "passthrough_request_headers")
1526
+
1527
+ @_builtins.property
765
1528
  @pulumi.getter
766
- def path(self) -> pulumi.Output[builtins.str]:
1529
+ def path(self) -> pulumi.Output[_builtins.str]:
767
1530
  """
768
1531
  The unique path this backend should be mounted at. Must
769
1532
  not begin or end with a `/`. Defaults to `kmip`.
770
1533
  """
771
1534
  return pulumi.get(self, "path")
772
1535
 
773
- @property
1536
+ @_builtins.property
1537
+ @pulumi.getter(name="pluginVersion")
1538
+ def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
1539
+ """
1540
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1541
+ """
1542
+ return pulumi.get(self, "plugin_version")
1543
+
1544
+ @_builtins.property
1545
+ @pulumi.getter(name="sealWrap")
1546
+ def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
1547
+ """
1548
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1549
+ """
1550
+ return pulumi.get(self, "seal_wrap")
1551
+
1552
+ @_builtins.property
774
1553
  @pulumi.getter(name="serverHostnames")
775
- def server_hostnames(self) -> pulumi.Output[Sequence[builtins.str]]:
1554
+ def server_hostnames(self) -> pulumi.Output[Sequence[_builtins.str]]:
776
1555
  """
777
1556
  Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN).
778
1557
  """
779
1558
  return pulumi.get(self, "server_hostnames")
780
1559
 
781
- @property
1560
+ @_builtins.property
782
1561
  @pulumi.getter(name="serverIps")
783
- def server_ips(self) -> pulumi.Output[Sequence[builtins.str]]:
1562
+ def server_ips(self) -> pulumi.Output[Sequence[_builtins.str]]:
784
1563
  """
785
1564
  IPs to include in the server's TLS certificate as SAN IP addresses.
786
1565
  """
787
1566
  return pulumi.get(self, "server_ips")
788
1567
 
789
- @property
1568
+ @_builtins.property
790
1569
  @pulumi.getter(name="tlsCaKeyBits")
791
- def tls_ca_key_bits(self) -> pulumi.Output[builtins.int]:
1570
+ def tls_ca_key_bits(self) -> pulumi.Output[_builtins.int]:
792
1571
  """
793
1572
  CA key bits, valid values depend on key type.
794
1573
  """
795
1574
  return pulumi.get(self, "tls_ca_key_bits")
796
1575
 
797
- @property
1576
+ @_builtins.property
798
1577
  @pulumi.getter(name="tlsCaKeyType")
799
- def tls_ca_key_type(self) -> pulumi.Output[builtins.str]:
1578
+ def tls_ca_key_type(self) -> pulumi.Output[_builtins.str]:
800
1579
  """
801
1580
  CA key type, rsa or ec.
802
1581
  """
803
1582
  return pulumi.get(self, "tls_ca_key_type")
804
1583
 
805
- @property
1584
+ @_builtins.property
806
1585
  @pulumi.getter(name="tlsMinVersion")
807
- def tls_min_version(self) -> pulumi.Output[builtins.str]:
1586
+ def tls_min_version(self) -> pulumi.Output[_builtins.str]:
808
1587
  """
809
1588
  Minimum TLS version to accept.
810
1589
  """