pulumi-vault 7.1.0a1752118888__py3-none-any.whl → 7.2.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (269) hide show
  1. pulumi_vault/__init__.py +19 -1
  2. pulumi_vault/_inputs.py +873 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +1016 -439
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +1057 -285
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +887 -256
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +426 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +878 -336
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +400 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +1006 -227
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +431 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +732 -693
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +380 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +909 -271
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/oci_auth_backend.py +683 -0
  168. pulumi_vault/oci_auth_backend_role.py +798 -0
  169. pulumi_vault/okta/__init__.py +1 -1
  170. pulumi_vault/okta/_inputs.py +31 -32
  171. pulumi_vault/okta/auth_backend.py +305 -306
  172. pulumi_vault/okta/auth_backend_group.py +69 -70
  173. pulumi_vault/okta/auth_backend_user.py +86 -87
  174. pulumi_vault/okta/outputs.py +21 -22
  175. pulumi_vault/outputs.py +234 -82
  176. pulumi_vault/pkisecret/__init__.py +1 -1
  177. pulumi_vault/pkisecret/_inputs.py +55 -56
  178. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  179. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  180. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  181. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  182. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  183. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  184. pulumi_vault/pkisecret/backend_config_scep.py +205 -159
  185. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  186. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  187. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  188. pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
  189. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  190. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  191. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  192. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  193. pulumi_vault/pkisecret/outputs.py +61 -62
  194. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  195. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  196. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  197. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  198. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  199. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  200. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  201. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  202. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  203. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  204. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  205. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  206. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  207. pulumi_vault/plugin.py +154 -155
  208. pulumi_vault/plugin_pinned_version.py +52 -53
  209. pulumi_vault/policy.py +52 -53
  210. pulumi_vault/provider.py +160 -161
  211. pulumi_vault/pulumi-plugin.json +1 -1
  212. pulumi_vault/quota_lease_count.py +103 -104
  213. pulumi_vault/quota_rate_limit.py +171 -172
  214. pulumi_vault/rabbitmq/__init__.py +1 -1
  215. pulumi_vault/rabbitmq/_inputs.py +50 -51
  216. pulumi_vault/rabbitmq/outputs.py +34 -35
  217. pulumi_vault/rabbitmq/secret_backend.py +902 -231
  218. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  219. pulumi_vault/raft_autopilot.py +137 -138
  220. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  221. pulumi_vault/rgp_policy.py +69 -70
  222. pulumi_vault/saml/__init__.py +1 -1
  223. pulumi_vault/saml/auth_backend.py +188 -189
  224. pulumi_vault/saml/auth_backend_role.py +290 -291
  225. pulumi_vault/scep_auth_backend_role.py +252 -253
  226. pulumi_vault/secrets/__init__.py +1 -1
  227. pulumi_vault/secrets/_inputs.py +19 -20
  228. pulumi_vault/secrets/outputs.py +13 -14
  229. pulumi_vault/secrets/sync_association.py +88 -89
  230. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  231. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  232. pulumi_vault/secrets/sync_config.py +52 -53
  233. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  234. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  235. pulumi_vault/secrets/sync_github_apps.py +78 -79
  236. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  237. pulumi_vault/ssh/__init__.py +1 -1
  238. pulumi_vault/ssh/_inputs.py +13 -14
  239. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  240. pulumi_vault/ssh/outputs.py +9 -10
  241. pulumi_vault/ssh/secret_backend_ca.py +217 -124
  242. pulumi_vault/ssh/secret_backend_role.py +446 -447
  243. pulumi_vault/terraformcloud/__init__.py +1 -1
  244. pulumi_vault/terraformcloud/secret_backend.py +833 -155
  245. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  246. pulumi_vault/terraformcloud/secret_role.py +117 -118
  247. pulumi_vault/token.py +301 -302
  248. pulumi_vault/tokenauth/__init__.py +1 -1
  249. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  250. pulumi_vault/transform/__init__.py +1 -1
  251. pulumi_vault/transform/alphabet.py +69 -70
  252. pulumi_vault/transform/get_decode.py +57 -58
  253. pulumi_vault/transform/get_encode.py +57 -58
  254. pulumi_vault/transform/role.py +69 -70
  255. pulumi_vault/transform/template.py +137 -138
  256. pulumi_vault/transform/transformation.py +171 -172
  257. pulumi_vault/transit/__init__.py +1 -1
  258. pulumi_vault/transit/get_cmac.py +47 -48
  259. pulumi_vault/transit/get_decrypt.py +25 -26
  260. pulumi_vault/transit/get_encrypt.py +29 -30
  261. pulumi_vault/transit/get_sign.py +71 -72
  262. pulumi_vault/transit/get_verify.py +83 -84
  263. pulumi_vault/transit/secret_backend_key.py +377 -350
  264. pulumi_vault/transit/secret_cache_config.py +52 -53
  265. {pulumi_vault-7.1.0a1752118888.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
  266. pulumi_vault-7.2.0.dist-info/RECORD +270 -0
  267. pulumi_vault-7.1.0a1752118888.dist-info/RECORD +0 -268
  268. {pulumi_vault-7.1.0a1752118888.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
  269. {pulumi_vault-7.1.0a1752118888.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,51 +19,85 @@ __all__ = ['NomadSecretBackendArgs', 'NomadSecretBackend']
20
19
  @pulumi.input_type
21
20
  class NomadSecretBackendArgs:
22
21
  def __init__(__self__, *,
23
- address: Optional[pulumi.Input[builtins.str]] = None,
24
- backend: Optional[pulumi.Input[builtins.str]] = None,
25
- ca_cert: Optional[pulumi.Input[builtins.str]] = None,
26
- client_cert: Optional[pulumi.Input[builtins.str]] = None,
27
- client_key: Optional[pulumi.Input[builtins.str]] = None,
28
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
29
- description: Optional[pulumi.Input[builtins.str]] = None,
30
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
31
- local: Optional[pulumi.Input[builtins.bool]] = None,
32
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
33
- max_token_name_length: Optional[pulumi.Input[builtins.int]] = None,
34
- max_ttl: Optional[pulumi.Input[builtins.int]] = None,
35
- namespace: Optional[pulumi.Input[builtins.str]] = None,
36
- token: Optional[pulumi.Input[builtins.str]] = None,
37
- ttl: Optional[pulumi.Input[builtins.int]] = None):
22
+ address: Optional[pulumi.Input[_builtins.str]] = None,
23
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
24
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
25
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
28
+ ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
29
+ client_cert: Optional[pulumi.Input[_builtins.str]] = None,
30
+ client_key: Optional[pulumi.Input[_builtins.str]] = None,
31
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
32
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
33
+ description: Optional[pulumi.Input[_builtins.str]] = None,
34
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
35
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
36
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
37
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
38
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
39
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
40
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
41
+ max_token_name_length: Optional[pulumi.Input[_builtins.int]] = None,
42
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
43
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
44
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
45
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
46
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
47
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
48
+ token: Optional[pulumi.Input[_builtins.str]] = None,
49
+ ttl: Optional[pulumi.Input[_builtins.int]] = None):
38
50
  """
39
51
  The set of arguments for constructing a NomadSecretBackend resource.
40
- :param pulumi.Input[builtins.str] address: Specifies the address of the Nomad instance, provided
52
+ :param pulumi.Input[_builtins.str] address: Specifies the address of the Nomad instance, provided
41
53
  as "protocol://host:port" like "http://127.0.0.1:4646".
42
- :param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at. Must
54
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
55
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
56
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
57
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
58
+ :param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at. Must
43
59
  not begin or end with a `/`. Defaults to `nomad`.
44
- :param pulumi.Input[builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
60
+ :param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
45
61
  x509 PEM encoded.
46
- :param pulumi.Input[builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
47
- :param pulumi.Input[builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
48
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
49
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
50
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
62
+ :param pulumi.Input[_builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
63
+ :param pulumi.Input[_builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
64
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
65
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
66
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
67
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
51
68
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
52
- :param pulumi.Input[builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
53
- replication.Tolerance duration to use when checking the last rotation time.
54
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
55
- :param pulumi.Input[builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
69
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
70
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
71
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
72
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
73
+ :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
74
+ use when checking the last rotation time.
75
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
76
+ :param pulumi.Input[_builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
56
77
  generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
57
78
  by the Nomad version.
58
- :param pulumi.Input[builtins.int] max_ttl: Maximum possible lease duration for secrets in seconds.
59
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
79
+ :param pulumi.Input[_builtins.int] max_ttl: Maximum possible lease duration for secrets in seconds.
80
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
60
81
  The value should not contain leading or trailing forward slashes.
61
82
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
62
83
  *Available only for Vault Enterprise*.
63
- :param pulumi.Input[builtins.str] token: Specifies the Nomad Management token to use.
64
- :param pulumi.Input[builtins.int] ttl: Specifies the ttl of the lease for the generated token.
84
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
85
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
86
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
87
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
88
+ :param pulumi.Input[_builtins.str] token: Specifies the Nomad Management token to use.
89
+ :param pulumi.Input[_builtins.int] ttl: Specifies the ttl of the lease for the generated token.
65
90
  """
66
91
  if address is not None:
67
92
  pulumi.set(__self__, "address", address)
93
+ if allowed_managed_keys is not None:
94
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
95
+ if allowed_response_headers is not None:
96
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
97
+ if audit_non_hmac_request_keys is not None:
98
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
99
+ if audit_non_hmac_response_keys is not None:
100
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
68
101
  if backend is not None:
69
102
  pulumi.set(__self__, "backend", backend)
70
103
  if ca_cert is not None:
@@ -75,10 +108,20 @@ class NomadSecretBackendArgs:
75
108
  pulumi.set(__self__, "client_key", client_key)
76
109
  if default_lease_ttl_seconds is not None:
77
110
  pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
111
+ if delegated_auth_accessors is not None:
112
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
78
113
  if description is not None:
79
114
  pulumi.set(__self__, "description", description)
80
115
  if disable_remount is not None:
81
116
  pulumi.set(__self__, "disable_remount", disable_remount)
117
+ if external_entropy_access is not None:
118
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
119
+ if force_no_cache is not None:
120
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
121
+ if identity_token_key is not None:
122
+ pulumi.set(__self__, "identity_token_key", identity_token_key)
123
+ if listing_visibility is not None:
124
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
82
125
  if local is not None:
83
126
  pulumi.set(__self__, "local", local)
84
127
  if max_lease_ttl_seconds is not None:
@@ -89,14 +132,22 @@ class NomadSecretBackendArgs:
89
132
  pulumi.set(__self__, "max_ttl", max_ttl)
90
133
  if namespace is not None:
91
134
  pulumi.set(__self__, "namespace", namespace)
135
+ if options is not None:
136
+ pulumi.set(__self__, "options", options)
137
+ if passthrough_request_headers is not None:
138
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
139
+ if plugin_version is not None:
140
+ pulumi.set(__self__, "plugin_version", plugin_version)
141
+ if seal_wrap is not None:
142
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
92
143
  if token is not None:
93
144
  pulumi.set(__self__, "token", token)
94
145
  if ttl is not None:
95
146
  pulumi.set(__self__, "ttl", ttl)
96
147
 
97
- @property
148
+ @_builtins.property
98
149
  @pulumi.getter
99
- def address(self) -> Optional[pulumi.Input[builtins.str]]:
150
+ def address(self) -> Optional[pulumi.Input[_builtins.str]]:
100
151
  """
101
152
  Specifies the address of the Nomad instance, provided
102
153
  as "protocol://host:port" like "http://127.0.0.1:4646".
@@ -104,12 +155,60 @@ class NomadSecretBackendArgs:
104
155
  return pulumi.get(self, "address")
105
156
 
106
157
  @address.setter
107
- def address(self, value: Optional[pulumi.Input[builtins.str]]):
158
+ def address(self, value: Optional[pulumi.Input[_builtins.str]]):
108
159
  pulumi.set(self, "address", value)
109
160
 
110
- @property
161
+ @_builtins.property
162
+ @pulumi.getter(name="allowedManagedKeys")
163
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
164
+ """
165
+ List of managed key registry entry names that the mount in question is allowed to access
166
+ """
167
+ return pulumi.get(self, "allowed_managed_keys")
168
+
169
+ @allowed_managed_keys.setter
170
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
171
+ pulumi.set(self, "allowed_managed_keys", value)
172
+
173
+ @_builtins.property
174
+ @pulumi.getter(name="allowedResponseHeaders")
175
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
176
+ """
177
+ List of headers to allow and pass from the request to the plugin
178
+ """
179
+ return pulumi.get(self, "allowed_response_headers")
180
+
181
+ @allowed_response_headers.setter
182
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
183
+ pulumi.set(self, "allowed_response_headers", value)
184
+
185
+ @_builtins.property
186
+ @pulumi.getter(name="auditNonHmacRequestKeys")
187
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
188
+ """
189
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
190
+ """
191
+ return pulumi.get(self, "audit_non_hmac_request_keys")
192
+
193
+ @audit_non_hmac_request_keys.setter
194
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
195
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
196
+
197
+ @_builtins.property
198
+ @pulumi.getter(name="auditNonHmacResponseKeys")
199
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
200
+ """
201
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
202
+ """
203
+ return pulumi.get(self, "audit_non_hmac_response_keys")
204
+
205
+ @audit_non_hmac_response_keys.setter
206
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
207
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
208
+
209
+ @_builtins.property
111
210
  @pulumi.getter
112
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
211
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
113
212
  """
114
213
  The unique path this backend should be mounted at. Must
115
214
  not begin or end with a `/`. Defaults to `nomad`.
@@ -117,12 +216,12 @@ class NomadSecretBackendArgs:
117
216
  return pulumi.get(self, "backend")
118
217
 
119
218
  @backend.setter
120
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
219
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
121
220
  pulumi.set(self, "backend", value)
122
221
 
123
- @property
222
+ @_builtins.property
124
223
  @pulumi.getter(name="caCert")
125
- def ca_cert(self) -> Optional[pulumi.Input[builtins.str]]:
224
+ def ca_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
126
225
  """
127
226
  CA certificate to use when verifying the Nomad server certificate, must be
128
227
  x509 PEM encoded.
@@ -130,60 +229,72 @@ class NomadSecretBackendArgs:
130
229
  return pulumi.get(self, "ca_cert")
131
230
 
132
231
  @ca_cert.setter
133
- def ca_cert(self, value: Optional[pulumi.Input[builtins.str]]):
232
+ def ca_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
134
233
  pulumi.set(self, "ca_cert", value)
135
234
 
136
- @property
235
+ @_builtins.property
137
236
  @pulumi.getter(name="clientCert")
138
- def client_cert(self) -> Optional[pulumi.Input[builtins.str]]:
237
+ def client_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
139
238
  """
140
239
  Client certificate to provide to the Nomad server, must be x509 PEM encoded.
141
240
  """
142
241
  return pulumi.get(self, "client_cert")
143
242
 
144
243
  @client_cert.setter
145
- def client_cert(self, value: Optional[pulumi.Input[builtins.str]]):
244
+ def client_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
146
245
  pulumi.set(self, "client_cert", value)
147
246
 
148
- @property
247
+ @_builtins.property
149
248
  @pulumi.getter(name="clientKey")
150
- def client_key(self) -> Optional[pulumi.Input[builtins.str]]:
249
+ def client_key(self) -> Optional[pulumi.Input[_builtins.str]]:
151
250
  """
152
251
  Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
153
252
  """
154
253
  return pulumi.get(self, "client_key")
155
254
 
156
255
  @client_key.setter
157
- def client_key(self, value: Optional[pulumi.Input[builtins.str]]):
256
+ def client_key(self, value: Optional[pulumi.Input[_builtins.str]]):
158
257
  pulumi.set(self, "client_key", value)
159
258
 
160
- @property
259
+ @_builtins.property
161
260
  @pulumi.getter(name="defaultLeaseTtlSeconds")
162
- def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
261
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
163
262
  """
164
263
  Default lease duration for secrets in seconds.
165
264
  """
166
265
  return pulumi.get(self, "default_lease_ttl_seconds")
167
266
 
168
267
  @default_lease_ttl_seconds.setter
169
- def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
268
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
170
269
  pulumi.set(self, "default_lease_ttl_seconds", value)
171
270
 
172
- @property
271
+ @_builtins.property
272
+ @pulumi.getter(name="delegatedAuthAccessors")
273
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
274
+ """
275
+ List of headers to allow and pass from the request to the plugin
276
+ """
277
+ return pulumi.get(self, "delegated_auth_accessors")
278
+
279
+ @delegated_auth_accessors.setter
280
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
281
+ pulumi.set(self, "delegated_auth_accessors", value)
282
+
283
+ @_builtins.property
173
284
  @pulumi.getter
174
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
285
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
175
286
  """
176
- Human-friendly description of the mount for the Active Directory backend.
287
+ Human-friendly description of the mount for the backend.
177
288
  """
178
289
  return pulumi.get(self, "description")
179
290
 
180
291
  @description.setter
181
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
292
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
182
293
  pulumi.set(self, "description", value)
183
294
 
184
- @property
295
+ @_builtins.property
185
296
  @pulumi.getter(name="disableRemount")
186
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
297
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
187
298
  """
188
299
  If set, opts out of mount migration on path updates.
189
300
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -191,37 +302,85 @@ class NomadSecretBackendArgs:
191
302
  return pulumi.get(self, "disable_remount")
192
303
 
193
304
  @disable_remount.setter
194
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
305
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
195
306
  pulumi.set(self, "disable_remount", value)
196
307
 
197
- @property
308
+ @_builtins.property
309
+ @pulumi.getter(name="externalEntropyAccess")
310
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
311
+ """
312
+ Enable the secrets engine to access Vault's external entropy source
313
+ """
314
+ return pulumi.get(self, "external_entropy_access")
315
+
316
+ @external_entropy_access.setter
317
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
318
+ pulumi.set(self, "external_entropy_access", value)
319
+
320
+ @_builtins.property
321
+ @pulumi.getter(name="forceNoCache")
322
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
323
+ """
324
+ If set to true, disables caching.
325
+ """
326
+ return pulumi.get(self, "force_no_cache")
327
+
328
+ @force_no_cache.setter
329
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
330
+ pulumi.set(self, "force_no_cache", value)
331
+
332
+ @_builtins.property
333
+ @pulumi.getter(name="identityTokenKey")
334
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
335
+ """
336
+ The key to use for signing plugin workload identity tokens
337
+ """
338
+ return pulumi.get(self, "identity_token_key")
339
+
340
+ @identity_token_key.setter
341
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
342
+ pulumi.set(self, "identity_token_key", value)
343
+
344
+ @_builtins.property
345
+ @pulumi.getter(name="listingVisibility")
346
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
347
+ """
348
+ Specifies whether to show this mount in the UI-specific listing endpoint
349
+ """
350
+ return pulumi.get(self, "listing_visibility")
351
+
352
+ @listing_visibility.setter
353
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
354
+ pulumi.set(self, "listing_visibility", value)
355
+
356
+ @_builtins.property
198
357
  @pulumi.getter
199
- def local(self) -> Optional[pulumi.Input[builtins.bool]]:
358
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
200
359
  """
201
- Mark the secrets engine as local-only. Local engines are not replicated or removed by
202
- replication.Tolerance duration to use when checking the last rotation time.
360
+ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
361
+ use when checking the last rotation time.
203
362
  """
204
363
  return pulumi.get(self, "local")
205
364
 
206
365
  @local.setter
207
- def local(self, value: Optional[pulumi.Input[builtins.bool]]):
366
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
208
367
  pulumi.set(self, "local", value)
209
368
 
210
- @property
369
+ @_builtins.property
211
370
  @pulumi.getter(name="maxLeaseTtlSeconds")
212
- def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
371
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
213
372
  """
214
373
  Maximum possible lease duration for secrets in seconds.
215
374
  """
216
375
  return pulumi.get(self, "max_lease_ttl_seconds")
217
376
 
218
377
  @max_lease_ttl_seconds.setter
219
- def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
378
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
220
379
  pulumi.set(self, "max_lease_ttl_seconds", value)
221
380
 
222
- @property
381
+ @_builtins.property
223
382
  @pulumi.getter(name="maxTokenNameLength")
224
- def max_token_name_length(self) -> Optional[pulumi.Input[builtins.int]]:
383
+ def max_token_name_length(self) -> Optional[pulumi.Input[_builtins.int]]:
225
384
  """
226
385
  Specifies the maximum length to use for the name of the Nomad token
227
386
  generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
@@ -230,24 +389,24 @@ class NomadSecretBackendArgs:
230
389
  return pulumi.get(self, "max_token_name_length")
231
390
 
232
391
  @max_token_name_length.setter
233
- def max_token_name_length(self, value: Optional[pulumi.Input[builtins.int]]):
392
+ def max_token_name_length(self, value: Optional[pulumi.Input[_builtins.int]]):
234
393
  pulumi.set(self, "max_token_name_length", value)
235
394
 
236
- @property
395
+ @_builtins.property
237
396
  @pulumi.getter(name="maxTtl")
238
- def max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
397
+ def max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
239
398
  """
240
399
  Maximum possible lease duration for secrets in seconds.
241
400
  """
242
401
  return pulumi.get(self, "max_ttl")
243
402
 
244
403
  @max_ttl.setter
245
- def max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
404
+ def max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
246
405
  pulumi.set(self, "max_ttl", value)
247
406
 
248
- @property
407
+ @_builtins.property
249
408
  @pulumi.getter
250
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
409
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
251
410
  """
252
411
  The namespace to provision the resource in.
253
412
  The value should not contain leading or trailing forward slashes.
@@ -257,82 +416,168 @@ class NomadSecretBackendArgs:
257
416
  return pulumi.get(self, "namespace")
258
417
 
259
418
  @namespace.setter
260
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
419
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
261
420
  pulumi.set(self, "namespace", value)
262
421
 
263
- @property
422
+ @_builtins.property
423
+ @pulumi.getter
424
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
425
+ """
426
+ Specifies mount type specific options that are passed to the backend
427
+ """
428
+ return pulumi.get(self, "options")
429
+
430
+ @options.setter
431
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
432
+ pulumi.set(self, "options", value)
433
+
434
+ @_builtins.property
435
+ @pulumi.getter(name="passthroughRequestHeaders")
436
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
437
+ """
438
+ List of headers to allow and pass from the request to the plugin
439
+ """
440
+ return pulumi.get(self, "passthrough_request_headers")
441
+
442
+ @passthrough_request_headers.setter
443
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
444
+ pulumi.set(self, "passthrough_request_headers", value)
445
+
446
+ @_builtins.property
447
+ @pulumi.getter(name="pluginVersion")
448
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
449
+ """
450
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
451
+ """
452
+ return pulumi.get(self, "plugin_version")
453
+
454
+ @plugin_version.setter
455
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
456
+ pulumi.set(self, "plugin_version", value)
457
+
458
+ @_builtins.property
459
+ @pulumi.getter(name="sealWrap")
460
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
461
+ """
462
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
463
+ """
464
+ return pulumi.get(self, "seal_wrap")
465
+
466
+ @seal_wrap.setter
467
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
468
+ pulumi.set(self, "seal_wrap", value)
469
+
470
+ @_builtins.property
264
471
  @pulumi.getter
265
- def token(self) -> Optional[pulumi.Input[builtins.str]]:
472
+ def token(self) -> Optional[pulumi.Input[_builtins.str]]:
266
473
  """
267
474
  Specifies the Nomad Management token to use.
268
475
  """
269
476
  return pulumi.get(self, "token")
270
477
 
271
478
  @token.setter
272
- def token(self, value: Optional[pulumi.Input[builtins.str]]):
479
+ def token(self, value: Optional[pulumi.Input[_builtins.str]]):
273
480
  pulumi.set(self, "token", value)
274
481
 
275
- @property
482
+ @_builtins.property
276
483
  @pulumi.getter
277
- def ttl(self) -> Optional[pulumi.Input[builtins.int]]:
484
+ def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
278
485
  """
279
486
  Specifies the ttl of the lease for the generated token.
280
487
  """
281
488
  return pulumi.get(self, "ttl")
282
489
 
283
490
  @ttl.setter
284
- def ttl(self, value: Optional[pulumi.Input[builtins.int]]):
491
+ def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
285
492
  pulumi.set(self, "ttl", value)
286
493
 
287
494
 
288
495
  @pulumi.input_type
289
496
  class _NomadSecretBackendState:
290
497
  def __init__(__self__, *,
291
- address: Optional[pulumi.Input[builtins.str]] = None,
292
- backend: Optional[pulumi.Input[builtins.str]] = None,
293
- ca_cert: Optional[pulumi.Input[builtins.str]] = None,
294
- client_cert: Optional[pulumi.Input[builtins.str]] = None,
295
- client_key: Optional[pulumi.Input[builtins.str]] = None,
296
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
297
- description: Optional[pulumi.Input[builtins.str]] = None,
298
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
299
- local: Optional[pulumi.Input[builtins.bool]] = None,
300
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
301
- max_token_name_length: Optional[pulumi.Input[builtins.int]] = None,
302
- max_ttl: Optional[pulumi.Input[builtins.int]] = None,
303
- namespace: Optional[pulumi.Input[builtins.str]] = None,
304
- token: Optional[pulumi.Input[builtins.str]] = None,
305
- ttl: Optional[pulumi.Input[builtins.int]] = None):
498
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
499
+ address: Optional[pulumi.Input[_builtins.str]] = None,
500
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
501
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
502
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
503
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
504
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
505
+ ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
506
+ client_cert: Optional[pulumi.Input[_builtins.str]] = None,
507
+ client_key: Optional[pulumi.Input[_builtins.str]] = None,
508
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
509
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
510
+ description: Optional[pulumi.Input[_builtins.str]] = None,
511
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
512
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
513
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
514
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
515
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
516
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
517
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
518
+ max_token_name_length: Optional[pulumi.Input[_builtins.int]] = None,
519
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
520
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
521
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
522
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
523
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
524
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
525
+ token: Optional[pulumi.Input[_builtins.str]] = None,
526
+ ttl: Optional[pulumi.Input[_builtins.int]] = None):
306
527
  """
307
528
  Input properties used for looking up and filtering NomadSecretBackend resources.
308
- :param pulumi.Input[builtins.str] address: Specifies the address of the Nomad instance, provided
529
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
530
+ :param pulumi.Input[_builtins.str] address: Specifies the address of the Nomad instance, provided
309
531
  as "protocol://host:port" like "http://127.0.0.1:4646".
310
- :param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at. Must
532
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
533
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
534
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
535
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
536
+ :param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at. Must
311
537
  not begin or end with a `/`. Defaults to `nomad`.
312
- :param pulumi.Input[builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
538
+ :param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
313
539
  x509 PEM encoded.
314
- :param pulumi.Input[builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
315
- :param pulumi.Input[builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
316
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
317
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
318
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
540
+ :param pulumi.Input[_builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
541
+ :param pulumi.Input[_builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
542
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
543
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
544
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
545
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
319
546
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
320
- :param pulumi.Input[builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
321
- replication.Tolerance duration to use when checking the last rotation time.
322
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
323
- :param pulumi.Input[builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
547
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
548
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
549
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
550
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
551
+ :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
552
+ use when checking the last rotation time.
553
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
554
+ :param pulumi.Input[_builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
324
555
  generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
325
556
  by the Nomad version.
326
- :param pulumi.Input[builtins.int] max_ttl: Maximum possible lease duration for secrets in seconds.
327
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
557
+ :param pulumi.Input[_builtins.int] max_ttl: Maximum possible lease duration for secrets in seconds.
558
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
328
559
  The value should not contain leading or trailing forward slashes.
329
560
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
330
561
  *Available only for Vault Enterprise*.
331
- :param pulumi.Input[builtins.str] token: Specifies the Nomad Management token to use.
332
- :param pulumi.Input[builtins.int] ttl: Specifies the ttl of the lease for the generated token.
333
- """
562
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
563
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
564
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
565
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
566
+ :param pulumi.Input[_builtins.str] token: Specifies the Nomad Management token to use.
567
+ :param pulumi.Input[_builtins.int] ttl: Specifies the ttl of the lease for the generated token.
568
+ """
569
+ if accessor is not None:
570
+ pulumi.set(__self__, "accessor", accessor)
334
571
  if address is not None:
335
572
  pulumi.set(__self__, "address", address)
573
+ if allowed_managed_keys is not None:
574
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
575
+ if allowed_response_headers is not None:
576
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
577
+ if audit_non_hmac_request_keys is not None:
578
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
579
+ if audit_non_hmac_response_keys is not None:
580
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
336
581
  if backend is not None:
337
582
  pulumi.set(__self__, "backend", backend)
338
583
  if ca_cert is not None:
@@ -343,10 +588,20 @@ class _NomadSecretBackendState:
343
588
  pulumi.set(__self__, "client_key", client_key)
344
589
  if default_lease_ttl_seconds is not None:
345
590
  pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
591
+ if delegated_auth_accessors is not None:
592
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
346
593
  if description is not None:
347
594
  pulumi.set(__self__, "description", description)
348
595
  if disable_remount is not None:
349
596
  pulumi.set(__self__, "disable_remount", disable_remount)
597
+ if external_entropy_access is not None:
598
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
599
+ if force_no_cache is not None:
600
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
601
+ if identity_token_key is not None:
602
+ pulumi.set(__self__, "identity_token_key", identity_token_key)
603
+ if listing_visibility is not None:
604
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
350
605
  if local is not None:
351
606
  pulumi.set(__self__, "local", local)
352
607
  if max_lease_ttl_seconds is not None:
@@ -357,14 +612,34 @@ class _NomadSecretBackendState:
357
612
  pulumi.set(__self__, "max_ttl", max_ttl)
358
613
  if namespace is not None:
359
614
  pulumi.set(__self__, "namespace", namespace)
615
+ if options is not None:
616
+ pulumi.set(__self__, "options", options)
617
+ if passthrough_request_headers is not None:
618
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
619
+ if plugin_version is not None:
620
+ pulumi.set(__self__, "plugin_version", plugin_version)
621
+ if seal_wrap is not None:
622
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
360
623
  if token is not None:
361
624
  pulumi.set(__self__, "token", token)
362
625
  if ttl is not None:
363
626
  pulumi.set(__self__, "ttl", ttl)
364
627
 
365
- @property
628
+ @_builtins.property
629
+ @pulumi.getter
630
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
631
+ """
632
+ Accessor of the mount
633
+ """
634
+ return pulumi.get(self, "accessor")
635
+
636
+ @accessor.setter
637
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
638
+ pulumi.set(self, "accessor", value)
639
+
640
+ @_builtins.property
366
641
  @pulumi.getter
367
- def address(self) -> Optional[pulumi.Input[builtins.str]]:
642
+ def address(self) -> Optional[pulumi.Input[_builtins.str]]:
368
643
  """
369
644
  Specifies the address of the Nomad instance, provided
370
645
  as "protocol://host:port" like "http://127.0.0.1:4646".
@@ -372,12 +647,60 @@ class _NomadSecretBackendState:
372
647
  return pulumi.get(self, "address")
373
648
 
374
649
  @address.setter
375
- def address(self, value: Optional[pulumi.Input[builtins.str]]):
650
+ def address(self, value: Optional[pulumi.Input[_builtins.str]]):
376
651
  pulumi.set(self, "address", value)
377
652
 
378
- @property
653
+ @_builtins.property
654
+ @pulumi.getter(name="allowedManagedKeys")
655
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
656
+ """
657
+ List of managed key registry entry names that the mount in question is allowed to access
658
+ """
659
+ return pulumi.get(self, "allowed_managed_keys")
660
+
661
+ @allowed_managed_keys.setter
662
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
663
+ pulumi.set(self, "allowed_managed_keys", value)
664
+
665
+ @_builtins.property
666
+ @pulumi.getter(name="allowedResponseHeaders")
667
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
668
+ """
669
+ List of headers to allow and pass from the request to the plugin
670
+ """
671
+ return pulumi.get(self, "allowed_response_headers")
672
+
673
+ @allowed_response_headers.setter
674
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
675
+ pulumi.set(self, "allowed_response_headers", value)
676
+
677
+ @_builtins.property
678
+ @pulumi.getter(name="auditNonHmacRequestKeys")
679
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
680
+ """
681
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
682
+ """
683
+ return pulumi.get(self, "audit_non_hmac_request_keys")
684
+
685
+ @audit_non_hmac_request_keys.setter
686
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
687
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
688
+
689
+ @_builtins.property
690
+ @pulumi.getter(name="auditNonHmacResponseKeys")
691
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
692
+ """
693
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
694
+ """
695
+ return pulumi.get(self, "audit_non_hmac_response_keys")
696
+
697
+ @audit_non_hmac_response_keys.setter
698
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
699
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
700
+
701
+ @_builtins.property
379
702
  @pulumi.getter
380
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
703
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
381
704
  """
382
705
  The unique path this backend should be mounted at. Must
383
706
  not begin or end with a `/`. Defaults to `nomad`.
@@ -385,12 +708,12 @@ class _NomadSecretBackendState:
385
708
  return pulumi.get(self, "backend")
386
709
 
387
710
  @backend.setter
388
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
711
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
389
712
  pulumi.set(self, "backend", value)
390
713
 
391
- @property
714
+ @_builtins.property
392
715
  @pulumi.getter(name="caCert")
393
- def ca_cert(self) -> Optional[pulumi.Input[builtins.str]]:
716
+ def ca_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
394
717
  """
395
718
  CA certificate to use when verifying the Nomad server certificate, must be
396
719
  x509 PEM encoded.
@@ -398,60 +721,72 @@ class _NomadSecretBackendState:
398
721
  return pulumi.get(self, "ca_cert")
399
722
 
400
723
  @ca_cert.setter
401
- def ca_cert(self, value: Optional[pulumi.Input[builtins.str]]):
724
+ def ca_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
402
725
  pulumi.set(self, "ca_cert", value)
403
726
 
404
- @property
727
+ @_builtins.property
405
728
  @pulumi.getter(name="clientCert")
406
- def client_cert(self) -> Optional[pulumi.Input[builtins.str]]:
729
+ def client_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
407
730
  """
408
731
  Client certificate to provide to the Nomad server, must be x509 PEM encoded.
409
732
  """
410
733
  return pulumi.get(self, "client_cert")
411
734
 
412
735
  @client_cert.setter
413
- def client_cert(self, value: Optional[pulumi.Input[builtins.str]]):
736
+ def client_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
414
737
  pulumi.set(self, "client_cert", value)
415
738
 
416
- @property
739
+ @_builtins.property
417
740
  @pulumi.getter(name="clientKey")
418
- def client_key(self) -> Optional[pulumi.Input[builtins.str]]:
741
+ def client_key(self) -> Optional[pulumi.Input[_builtins.str]]:
419
742
  """
420
743
  Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
421
744
  """
422
745
  return pulumi.get(self, "client_key")
423
746
 
424
747
  @client_key.setter
425
- def client_key(self, value: Optional[pulumi.Input[builtins.str]]):
748
+ def client_key(self, value: Optional[pulumi.Input[_builtins.str]]):
426
749
  pulumi.set(self, "client_key", value)
427
750
 
428
- @property
751
+ @_builtins.property
429
752
  @pulumi.getter(name="defaultLeaseTtlSeconds")
430
- def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
753
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
431
754
  """
432
755
  Default lease duration for secrets in seconds.
433
756
  """
434
757
  return pulumi.get(self, "default_lease_ttl_seconds")
435
758
 
436
759
  @default_lease_ttl_seconds.setter
437
- def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
760
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
438
761
  pulumi.set(self, "default_lease_ttl_seconds", value)
439
762
 
440
- @property
763
+ @_builtins.property
764
+ @pulumi.getter(name="delegatedAuthAccessors")
765
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
766
+ """
767
+ List of headers to allow and pass from the request to the plugin
768
+ """
769
+ return pulumi.get(self, "delegated_auth_accessors")
770
+
771
+ @delegated_auth_accessors.setter
772
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
773
+ pulumi.set(self, "delegated_auth_accessors", value)
774
+
775
+ @_builtins.property
441
776
  @pulumi.getter
442
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
777
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
443
778
  """
444
- Human-friendly description of the mount for the Active Directory backend.
779
+ Human-friendly description of the mount for the backend.
445
780
  """
446
781
  return pulumi.get(self, "description")
447
782
 
448
783
  @description.setter
449
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
784
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
450
785
  pulumi.set(self, "description", value)
451
786
 
452
- @property
787
+ @_builtins.property
453
788
  @pulumi.getter(name="disableRemount")
454
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
789
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
455
790
  """
456
791
  If set, opts out of mount migration on path updates.
457
792
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -459,37 +794,85 @@ class _NomadSecretBackendState:
459
794
  return pulumi.get(self, "disable_remount")
460
795
 
461
796
  @disable_remount.setter
462
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
797
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
463
798
  pulumi.set(self, "disable_remount", value)
464
799
 
465
- @property
800
+ @_builtins.property
801
+ @pulumi.getter(name="externalEntropyAccess")
802
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
803
+ """
804
+ Enable the secrets engine to access Vault's external entropy source
805
+ """
806
+ return pulumi.get(self, "external_entropy_access")
807
+
808
+ @external_entropy_access.setter
809
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
810
+ pulumi.set(self, "external_entropy_access", value)
811
+
812
+ @_builtins.property
813
+ @pulumi.getter(name="forceNoCache")
814
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
815
+ """
816
+ If set to true, disables caching.
817
+ """
818
+ return pulumi.get(self, "force_no_cache")
819
+
820
+ @force_no_cache.setter
821
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
822
+ pulumi.set(self, "force_no_cache", value)
823
+
824
+ @_builtins.property
825
+ @pulumi.getter(name="identityTokenKey")
826
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
827
+ """
828
+ The key to use for signing plugin workload identity tokens
829
+ """
830
+ return pulumi.get(self, "identity_token_key")
831
+
832
+ @identity_token_key.setter
833
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
834
+ pulumi.set(self, "identity_token_key", value)
835
+
836
+ @_builtins.property
837
+ @pulumi.getter(name="listingVisibility")
838
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
839
+ """
840
+ Specifies whether to show this mount in the UI-specific listing endpoint
841
+ """
842
+ return pulumi.get(self, "listing_visibility")
843
+
844
+ @listing_visibility.setter
845
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
846
+ pulumi.set(self, "listing_visibility", value)
847
+
848
+ @_builtins.property
466
849
  @pulumi.getter
467
- def local(self) -> Optional[pulumi.Input[builtins.bool]]:
850
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
468
851
  """
469
- Mark the secrets engine as local-only. Local engines are not replicated or removed by
470
- replication.Tolerance duration to use when checking the last rotation time.
852
+ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
853
+ use when checking the last rotation time.
471
854
  """
472
855
  return pulumi.get(self, "local")
473
856
 
474
857
  @local.setter
475
- def local(self, value: Optional[pulumi.Input[builtins.bool]]):
858
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
476
859
  pulumi.set(self, "local", value)
477
860
 
478
- @property
861
+ @_builtins.property
479
862
  @pulumi.getter(name="maxLeaseTtlSeconds")
480
- def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
863
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
481
864
  """
482
865
  Maximum possible lease duration for secrets in seconds.
483
866
  """
484
867
  return pulumi.get(self, "max_lease_ttl_seconds")
485
868
 
486
869
  @max_lease_ttl_seconds.setter
487
- def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
870
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
488
871
  pulumi.set(self, "max_lease_ttl_seconds", value)
489
872
 
490
- @property
873
+ @_builtins.property
491
874
  @pulumi.getter(name="maxTokenNameLength")
492
- def max_token_name_length(self) -> Optional[pulumi.Input[builtins.int]]:
875
+ def max_token_name_length(self) -> Optional[pulumi.Input[_builtins.int]]:
493
876
  """
494
877
  Specifies the maximum length to use for the name of the Nomad token
495
878
  generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
@@ -498,24 +881,24 @@ class _NomadSecretBackendState:
498
881
  return pulumi.get(self, "max_token_name_length")
499
882
 
500
883
  @max_token_name_length.setter
501
- def max_token_name_length(self, value: Optional[pulumi.Input[builtins.int]]):
884
+ def max_token_name_length(self, value: Optional[pulumi.Input[_builtins.int]]):
502
885
  pulumi.set(self, "max_token_name_length", value)
503
886
 
504
- @property
887
+ @_builtins.property
505
888
  @pulumi.getter(name="maxTtl")
506
- def max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
889
+ def max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
507
890
  """
508
891
  Maximum possible lease duration for secrets in seconds.
509
892
  """
510
893
  return pulumi.get(self, "max_ttl")
511
894
 
512
895
  @max_ttl.setter
513
- def max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
896
+ def max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
514
897
  pulumi.set(self, "max_ttl", value)
515
898
 
516
- @property
899
+ @_builtins.property
517
900
  @pulumi.getter
518
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
901
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
519
902
  """
520
903
  The namespace to provision the resource in.
521
904
  The value should not contain leading or trailing forward slashes.
@@ -525,31 +908,79 @@ class _NomadSecretBackendState:
525
908
  return pulumi.get(self, "namespace")
526
909
 
527
910
  @namespace.setter
528
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
911
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
529
912
  pulumi.set(self, "namespace", value)
530
913
 
531
- @property
914
+ @_builtins.property
532
915
  @pulumi.getter
533
- def token(self) -> Optional[pulumi.Input[builtins.str]]:
916
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
917
+ """
918
+ Specifies mount type specific options that are passed to the backend
919
+ """
920
+ return pulumi.get(self, "options")
921
+
922
+ @options.setter
923
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
924
+ pulumi.set(self, "options", value)
925
+
926
+ @_builtins.property
927
+ @pulumi.getter(name="passthroughRequestHeaders")
928
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
929
+ """
930
+ List of headers to allow and pass from the request to the plugin
931
+ """
932
+ return pulumi.get(self, "passthrough_request_headers")
933
+
934
+ @passthrough_request_headers.setter
935
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
936
+ pulumi.set(self, "passthrough_request_headers", value)
937
+
938
+ @_builtins.property
939
+ @pulumi.getter(name="pluginVersion")
940
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
941
+ """
942
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
943
+ """
944
+ return pulumi.get(self, "plugin_version")
945
+
946
+ @plugin_version.setter
947
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
948
+ pulumi.set(self, "plugin_version", value)
949
+
950
+ @_builtins.property
951
+ @pulumi.getter(name="sealWrap")
952
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
953
+ """
954
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
955
+ """
956
+ return pulumi.get(self, "seal_wrap")
957
+
958
+ @seal_wrap.setter
959
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
960
+ pulumi.set(self, "seal_wrap", value)
961
+
962
+ @_builtins.property
963
+ @pulumi.getter
964
+ def token(self) -> Optional[pulumi.Input[_builtins.str]]:
534
965
  """
535
966
  Specifies the Nomad Management token to use.
536
967
  """
537
968
  return pulumi.get(self, "token")
538
969
 
539
970
  @token.setter
540
- def token(self, value: Optional[pulumi.Input[builtins.str]]):
971
+ def token(self, value: Optional[pulumi.Input[_builtins.str]]):
541
972
  pulumi.set(self, "token", value)
542
973
 
543
- @property
974
+ @_builtins.property
544
975
  @pulumi.getter
545
- def ttl(self) -> Optional[pulumi.Input[builtins.int]]:
976
+ def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
546
977
  """
547
978
  Specifies the ttl of the lease for the generated token.
548
979
  """
549
980
  return pulumi.get(self, "ttl")
550
981
 
551
982
  @ttl.setter
552
- def ttl(self, value: Optional[pulumi.Input[builtins.int]]):
983
+ def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
553
984
  pulumi.set(self, "ttl", value)
554
985
 
555
986
 
@@ -559,21 +990,34 @@ class NomadSecretBackend(pulumi.CustomResource):
559
990
  def __init__(__self__,
560
991
  resource_name: str,
561
992
  opts: Optional[pulumi.ResourceOptions] = None,
562
- address: Optional[pulumi.Input[builtins.str]] = None,
563
- backend: Optional[pulumi.Input[builtins.str]] = None,
564
- ca_cert: Optional[pulumi.Input[builtins.str]] = None,
565
- client_cert: Optional[pulumi.Input[builtins.str]] = None,
566
- client_key: Optional[pulumi.Input[builtins.str]] = None,
567
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
568
- description: Optional[pulumi.Input[builtins.str]] = None,
569
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
570
- local: Optional[pulumi.Input[builtins.bool]] = None,
571
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
572
- max_token_name_length: Optional[pulumi.Input[builtins.int]] = None,
573
- max_ttl: Optional[pulumi.Input[builtins.int]] = None,
574
- namespace: Optional[pulumi.Input[builtins.str]] = None,
575
- token: Optional[pulumi.Input[builtins.str]] = None,
576
- ttl: Optional[pulumi.Input[builtins.int]] = None,
993
+ address: Optional[pulumi.Input[_builtins.str]] = None,
994
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
995
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
996
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
997
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
998
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
999
+ ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
1000
+ client_cert: Optional[pulumi.Input[_builtins.str]] = None,
1001
+ client_key: Optional[pulumi.Input[_builtins.str]] = None,
1002
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1003
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1004
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1005
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1006
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1007
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1008
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1009
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1010
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1011
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1012
+ max_token_name_length: Optional[pulumi.Input[_builtins.int]] = None,
1013
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1014
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1015
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1016
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1017
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1018
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1019
+ token: Optional[pulumi.Input[_builtins.str]] = None,
1020
+ ttl: Optional[pulumi.Input[_builtins.int]] = None,
577
1021
  __props__=None):
578
1022
  """
579
1023
  ## Example Usage
@@ -603,31 +1047,44 @@ class NomadSecretBackend(pulumi.CustomResource):
603
1047
 
604
1048
  :param str resource_name: The name of the resource.
605
1049
  :param pulumi.ResourceOptions opts: Options for the resource.
606
- :param pulumi.Input[builtins.str] address: Specifies the address of the Nomad instance, provided
1050
+ :param pulumi.Input[_builtins.str] address: Specifies the address of the Nomad instance, provided
607
1051
  as "protocol://host:port" like "http://127.0.0.1:4646".
608
- :param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at. Must
1052
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1053
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1054
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1055
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1056
+ :param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at. Must
609
1057
  not begin or end with a `/`. Defaults to `nomad`.
610
- :param pulumi.Input[builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
1058
+ :param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
611
1059
  x509 PEM encoded.
612
- :param pulumi.Input[builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
613
- :param pulumi.Input[builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
614
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
615
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
616
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1060
+ :param pulumi.Input[_builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
1061
+ :param pulumi.Input[_builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
1062
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
1063
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1064
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
1065
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
617
1066
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
618
- :param pulumi.Input[builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
619
- replication.Tolerance duration to use when checking the last rotation time.
620
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
621
- :param pulumi.Input[builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
1067
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1068
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1069
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1070
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1071
+ :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
1072
+ use when checking the last rotation time.
1073
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
1074
+ :param pulumi.Input[_builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
622
1075
  generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
623
1076
  by the Nomad version.
624
- :param pulumi.Input[builtins.int] max_ttl: Maximum possible lease duration for secrets in seconds.
625
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
1077
+ :param pulumi.Input[_builtins.int] max_ttl: Maximum possible lease duration for secrets in seconds.
1078
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
626
1079
  The value should not contain leading or trailing forward slashes.
627
1080
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
628
1081
  *Available only for Vault Enterprise*.
629
- :param pulumi.Input[builtins.str] token: Specifies the Nomad Management token to use.
630
- :param pulumi.Input[builtins.int] ttl: Specifies the ttl of the lease for the generated token.
1082
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1083
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1084
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1085
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1086
+ :param pulumi.Input[_builtins.str] token: Specifies the Nomad Management token to use.
1087
+ :param pulumi.Input[_builtins.int] ttl: Specifies the ttl of the lease for the generated token.
631
1088
  """
632
1089
  ...
633
1090
  @overload
@@ -676,21 +1133,34 @@ class NomadSecretBackend(pulumi.CustomResource):
676
1133
  def _internal_init(__self__,
677
1134
  resource_name: str,
678
1135
  opts: Optional[pulumi.ResourceOptions] = None,
679
- address: Optional[pulumi.Input[builtins.str]] = None,
680
- backend: Optional[pulumi.Input[builtins.str]] = None,
681
- ca_cert: Optional[pulumi.Input[builtins.str]] = None,
682
- client_cert: Optional[pulumi.Input[builtins.str]] = None,
683
- client_key: Optional[pulumi.Input[builtins.str]] = None,
684
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
685
- description: Optional[pulumi.Input[builtins.str]] = None,
686
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
687
- local: Optional[pulumi.Input[builtins.bool]] = None,
688
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
689
- max_token_name_length: Optional[pulumi.Input[builtins.int]] = None,
690
- max_ttl: Optional[pulumi.Input[builtins.int]] = None,
691
- namespace: Optional[pulumi.Input[builtins.str]] = None,
692
- token: Optional[pulumi.Input[builtins.str]] = None,
693
- ttl: Optional[pulumi.Input[builtins.int]] = None,
1136
+ address: Optional[pulumi.Input[_builtins.str]] = None,
1137
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1138
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1139
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1140
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1141
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
1142
+ ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
1143
+ client_cert: Optional[pulumi.Input[_builtins.str]] = None,
1144
+ client_key: Optional[pulumi.Input[_builtins.str]] = None,
1145
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1146
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1147
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1148
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1149
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1150
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1151
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1152
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1153
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1154
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1155
+ max_token_name_length: Optional[pulumi.Input[_builtins.int]] = None,
1156
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1157
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1158
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1159
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1160
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1161
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1162
+ token: Optional[pulumi.Input[_builtins.str]] = None,
1163
+ ttl: Optional[pulumi.Input[_builtins.int]] = None,
694
1164
  __props__=None):
695
1165
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
696
1166
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -701,20 +1171,34 @@ class NomadSecretBackend(pulumi.CustomResource):
701
1171
  __props__ = NomadSecretBackendArgs.__new__(NomadSecretBackendArgs)
702
1172
 
703
1173
  __props__.__dict__["address"] = address
1174
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1175
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1176
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1177
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
704
1178
  __props__.__dict__["backend"] = backend
705
1179
  __props__.__dict__["ca_cert"] = ca_cert
706
1180
  __props__.__dict__["client_cert"] = None if client_cert is None else pulumi.Output.secret(client_cert)
707
1181
  __props__.__dict__["client_key"] = None if client_key is None else pulumi.Output.secret(client_key)
708
1182
  __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1183
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
709
1184
  __props__.__dict__["description"] = description
710
1185
  __props__.__dict__["disable_remount"] = disable_remount
1186
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1187
+ __props__.__dict__["force_no_cache"] = force_no_cache
1188
+ __props__.__dict__["identity_token_key"] = identity_token_key
1189
+ __props__.__dict__["listing_visibility"] = listing_visibility
711
1190
  __props__.__dict__["local"] = local
712
1191
  __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
713
1192
  __props__.__dict__["max_token_name_length"] = max_token_name_length
714
1193
  __props__.__dict__["max_ttl"] = max_ttl
715
1194
  __props__.__dict__["namespace"] = namespace
1195
+ __props__.__dict__["options"] = options
1196
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
1197
+ __props__.__dict__["plugin_version"] = plugin_version
1198
+ __props__.__dict__["seal_wrap"] = seal_wrap
716
1199
  __props__.__dict__["token"] = None if token is None else pulumi.Output.secret(token)
717
1200
  __props__.__dict__["ttl"] = ttl
1201
+ __props__.__dict__["accessor"] = None
718
1202
  secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["clientCert", "clientKey", "token"])
719
1203
  opts = pulumi.ResourceOptions.merge(opts, secret_opts)
720
1204
  super(NomadSecretBackend, __self__).__init__(
@@ -727,21 +1211,35 @@ class NomadSecretBackend(pulumi.CustomResource):
727
1211
  def get(resource_name: str,
728
1212
  id: pulumi.Input[str],
729
1213
  opts: Optional[pulumi.ResourceOptions] = None,
730
- address: Optional[pulumi.Input[builtins.str]] = None,
731
- backend: Optional[pulumi.Input[builtins.str]] = None,
732
- ca_cert: Optional[pulumi.Input[builtins.str]] = None,
733
- client_cert: Optional[pulumi.Input[builtins.str]] = None,
734
- client_key: Optional[pulumi.Input[builtins.str]] = None,
735
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
736
- description: Optional[pulumi.Input[builtins.str]] = None,
737
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
738
- local: Optional[pulumi.Input[builtins.bool]] = None,
739
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
740
- max_token_name_length: Optional[pulumi.Input[builtins.int]] = None,
741
- max_ttl: Optional[pulumi.Input[builtins.int]] = None,
742
- namespace: Optional[pulumi.Input[builtins.str]] = None,
743
- token: Optional[pulumi.Input[builtins.str]] = None,
744
- ttl: Optional[pulumi.Input[builtins.int]] = None) -> 'NomadSecretBackend':
1214
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
1215
+ address: Optional[pulumi.Input[_builtins.str]] = None,
1216
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1217
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1218
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1219
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1220
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
1221
+ ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
1222
+ client_cert: Optional[pulumi.Input[_builtins.str]] = None,
1223
+ client_key: Optional[pulumi.Input[_builtins.str]] = None,
1224
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1225
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1226
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1227
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1228
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1229
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1230
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1231
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1232
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1233
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1234
+ max_token_name_length: Optional[pulumi.Input[_builtins.int]] = None,
1235
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1236
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1237
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1238
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1239
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1240
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1241
+ token: Optional[pulumi.Input[_builtins.str]] = None,
1242
+ ttl: Optional[pulumi.Input[_builtins.int]] = None) -> 'NomadSecretBackend':
745
1243
  """
746
1244
  Get an existing NomadSecretBackend resource's state with the given name, id, and optional extra
747
1245
  properties used to qualify the lookup.
@@ -749,141 +1247,249 @@ class NomadSecretBackend(pulumi.CustomResource):
749
1247
  :param str resource_name: The unique name of the resulting resource.
750
1248
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
751
1249
  :param pulumi.ResourceOptions opts: Options for the resource.
752
- :param pulumi.Input[builtins.str] address: Specifies the address of the Nomad instance, provided
1250
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
1251
+ :param pulumi.Input[_builtins.str] address: Specifies the address of the Nomad instance, provided
753
1252
  as "protocol://host:port" like "http://127.0.0.1:4646".
754
- :param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at. Must
1253
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1254
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1255
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1256
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1257
+ :param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at. Must
755
1258
  not begin or end with a `/`. Defaults to `nomad`.
756
- :param pulumi.Input[builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
1259
+ :param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
757
1260
  x509 PEM encoded.
758
- :param pulumi.Input[builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
759
- :param pulumi.Input[builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
760
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
761
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
762
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1261
+ :param pulumi.Input[_builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
1262
+ :param pulumi.Input[_builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
1263
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
1264
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1265
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
1266
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
763
1267
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
764
- :param pulumi.Input[builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
765
- replication.Tolerance duration to use when checking the last rotation time.
766
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
767
- :param pulumi.Input[builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
1268
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1269
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1270
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1271
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1272
+ :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
1273
+ use when checking the last rotation time.
1274
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
1275
+ :param pulumi.Input[_builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
768
1276
  generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
769
1277
  by the Nomad version.
770
- :param pulumi.Input[builtins.int] max_ttl: Maximum possible lease duration for secrets in seconds.
771
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
1278
+ :param pulumi.Input[_builtins.int] max_ttl: Maximum possible lease duration for secrets in seconds.
1279
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
772
1280
  The value should not contain leading or trailing forward slashes.
773
1281
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
774
1282
  *Available only for Vault Enterprise*.
775
- :param pulumi.Input[builtins.str] token: Specifies the Nomad Management token to use.
776
- :param pulumi.Input[builtins.int] ttl: Specifies the ttl of the lease for the generated token.
1283
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1284
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1285
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1286
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1287
+ :param pulumi.Input[_builtins.str] token: Specifies the Nomad Management token to use.
1288
+ :param pulumi.Input[_builtins.int] ttl: Specifies the ttl of the lease for the generated token.
777
1289
  """
778
1290
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
779
1291
 
780
1292
  __props__ = _NomadSecretBackendState.__new__(_NomadSecretBackendState)
781
1293
 
1294
+ __props__.__dict__["accessor"] = accessor
782
1295
  __props__.__dict__["address"] = address
1296
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1297
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1298
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1299
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
783
1300
  __props__.__dict__["backend"] = backend
784
1301
  __props__.__dict__["ca_cert"] = ca_cert
785
1302
  __props__.__dict__["client_cert"] = client_cert
786
1303
  __props__.__dict__["client_key"] = client_key
787
1304
  __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1305
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
788
1306
  __props__.__dict__["description"] = description
789
1307
  __props__.__dict__["disable_remount"] = disable_remount
1308
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1309
+ __props__.__dict__["force_no_cache"] = force_no_cache
1310
+ __props__.__dict__["identity_token_key"] = identity_token_key
1311
+ __props__.__dict__["listing_visibility"] = listing_visibility
790
1312
  __props__.__dict__["local"] = local
791
1313
  __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
792
1314
  __props__.__dict__["max_token_name_length"] = max_token_name_length
793
1315
  __props__.__dict__["max_ttl"] = max_ttl
794
1316
  __props__.__dict__["namespace"] = namespace
1317
+ __props__.__dict__["options"] = options
1318
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
1319
+ __props__.__dict__["plugin_version"] = plugin_version
1320
+ __props__.__dict__["seal_wrap"] = seal_wrap
795
1321
  __props__.__dict__["token"] = token
796
1322
  __props__.__dict__["ttl"] = ttl
797
1323
  return NomadSecretBackend(resource_name, opts=opts, __props__=__props__)
798
1324
 
799
- @property
1325
+ @_builtins.property
800
1326
  @pulumi.getter
801
- def address(self) -> pulumi.Output[Optional[builtins.str]]:
1327
+ def accessor(self) -> pulumi.Output[_builtins.str]:
1328
+ """
1329
+ Accessor of the mount
1330
+ """
1331
+ return pulumi.get(self, "accessor")
1332
+
1333
+ @_builtins.property
1334
+ @pulumi.getter
1335
+ def address(self) -> pulumi.Output[Optional[_builtins.str]]:
802
1336
  """
803
1337
  Specifies the address of the Nomad instance, provided
804
1338
  as "protocol://host:port" like "http://127.0.0.1:4646".
805
1339
  """
806
1340
  return pulumi.get(self, "address")
807
1341
 
808
- @property
1342
+ @_builtins.property
1343
+ @pulumi.getter(name="allowedManagedKeys")
1344
+ def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1345
+ """
1346
+ List of managed key registry entry names that the mount in question is allowed to access
1347
+ """
1348
+ return pulumi.get(self, "allowed_managed_keys")
1349
+
1350
+ @_builtins.property
1351
+ @pulumi.getter(name="allowedResponseHeaders")
1352
+ def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1353
+ """
1354
+ List of headers to allow and pass from the request to the plugin
1355
+ """
1356
+ return pulumi.get(self, "allowed_response_headers")
1357
+
1358
+ @_builtins.property
1359
+ @pulumi.getter(name="auditNonHmacRequestKeys")
1360
+ def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1361
+ """
1362
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1363
+ """
1364
+ return pulumi.get(self, "audit_non_hmac_request_keys")
1365
+
1366
+ @_builtins.property
1367
+ @pulumi.getter(name="auditNonHmacResponseKeys")
1368
+ def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1369
+ """
1370
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1371
+ """
1372
+ return pulumi.get(self, "audit_non_hmac_response_keys")
1373
+
1374
+ @_builtins.property
809
1375
  @pulumi.getter
810
- def backend(self) -> pulumi.Output[Optional[builtins.str]]:
1376
+ def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
811
1377
  """
812
1378
  The unique path this backend should be mounted at. Must
813
1379
  not begin or end with a `/`. Defaults to `nomad`.
814
1380
  """
815
1381
  return pulumi.get(self, "backend")
816
1382
 
817
- @property
1383
+ @_builtins.property
818
1384
  @pulumi.getter(name="caCert")
819
- def ca_cert(self) -> pulumi.Output[Optional[builtins.str]]:
1385
+ def ca_cert(self) -> pulumi.Output[Optional[_builtins.str]]:
820
1386
  """
821
1387
  CA certificate to use when verifying the Nomad server certificate, must be
822
1388
  x509 PEM encoded.
823
1389
  """
824
1390
  return pulumi.get(self, "ca_cert")
825
1391
 
826
- @property
1392
+ @_builtins.property
827
1393
  @pulumi.getter(name="clientCert")
828
- def client_cert(self) -> pulumi.Output[Optional[builtins.str]]:
1394
+ def client_cert(self) -> pulumi.Output[Optional[_builtins.str]]:
829
1395
  """
830
1396
  Client certificate to provide to the Nomad server, must be x509 PEM encoded.
831
1397
  """
832
1398
  return pulumi.get(self, "client_cert")
833
1399
 
834
- @property
1400
+ @_builtins.property
835
1401
  @pulumi.getter(name="clientKey")
836
- def client_key(self) -> pulumi.Output[Optional[builtins.str]]:
1402
+ def client_key(self) -> pulumi.Output[Optional[_builtins.str]]:
837
1403
  """
838
1404
  Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
839
1405
  """
840
1406
  return pulumi.get(self, "client_key")
841
1407
 
842
- @property
1408
+ @_builtins.property
843
1409
  @pulumi.getter(name="defaultLeaseTtlSeconds")
844
- def default_lease_ttl_seconds(self) -> pulumi.Output[builtins.int]:
1410
+ def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
845
1411
  """
846
1412
  Default lease duration for secrets in seconds.
847
1413
  """
848
1414
  return pulumi.get(self, "default_lease_ttl_seconds")
849
1415
 
850
- @property
1416
+ @_builtins.property
1417
+ @pulumi.getter(name="delegatedAuthAccessors")
1418
+ def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1419
+ """
1420
+ List of headers to allow and pass from the request to the plugin
1421
+ """
1422
+ return pulumi.get(self, "delegated_auth_accessors")
1423
+
1424
+ @_builtins.property
851
1425
  @pulumi.getter
852
- def description(self) -> pulumi.Output[Optional[builtins.str]]:
1426
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
853
1427
  """
854
- Human-friendly description of the mount for the Active Directory backend.
1428
+ Human-friendly description of the mount for the backend.
855
1429
  """
856
1430
  return pulumi.get(self, "description")
857
1431
 
858
- @property
1432
+ @_builtins.property
859
1433
  @pulumi.getter(name="disableRemount")
860
- def disable_remount(self) -> pulumi.Output[Optional[builtins.bool]]:
1434
+ def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
861
1435
  """
862
1436
  If set, opts out of mount migration on path updates.
863
1437
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
864
1438
  """
865
1439
  return pulumi.get(self, "disable_remount")
866
1440
 
867
- @property
1441
+ @_builtins.property
1442
+ @pulumi.getter(name="externalEntropyAccess")
1443
+ def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
1444
+ """
1445
+ Enable the secrets engine to access Vault's external entropy source
1446
+ """
1447
+ return pulumi.get(self, "external_entropy_access")
1448
+
1449
+ @_builtins.property
1450
+ @pulumi.getter(name="forceNoCache")
1451
+ def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
1452
+ """
1453
+ If set to true, disables caching.
1454
+ """
1455
+ return pulumi.get(self, "force_no_cache")
1456
+
1457
+ @_builtins.property
1458
+ @pulumi.getter(name="identityTokenKey")
1459
+ def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
1460
+ """
1461
+ The key to use for signing plugin workload identity tokens
1462
+ """
1463
+ return pulumi.get(self, "identity_token_key")
1464
+
1465
+ @_builtins.property
1466
+ @pulumi.getter(name="listingVisibility")
1467
+ def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
1468
+ """
1469
+ Specifies whether to show this mount in the UI-specific listing endpoint
1470
+ """
1471
+ return pulumi.get(self, "listing_visibility")
1472
+
1473
+ @_builtins.property
868
1474
  @pulumi.getter
869
- def local(self) -> pulumi.Output[Optional[builtins.bool]]:
1475
+ def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
870
1476
  """
871
- Mark the secrets engine as local-only. Local engines are not replicated or removed by
872
- replication.Tolerance duration to use when checking the last rotation time.
1477
+ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
1478
+ use when checking the last rotation time.
873
1479
  """
874
1480
  return pulumi.get(self, "local")
875
1481
 
876
- @property
1482
+ @_builtins.property
877
1483
  @pulumi.getter(name="maxLeaseTtlSeconds")
878
- def max_lease_ttl_seconds(self) -> pulumi.Output[builtins.int]:
1484
+ def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
879
1485
  """
880
1486
  Maximum possible lease duration for secrets in seconds.
881
1487
  """
882
1488
  return pulumi.get(self, "max_lease_ttl_seconds")
883
1489
 
884
- @property
1490
+ @_builtins.property
885
1491
  @pulumi.getter(name="maxTokenNameLength")
886
- def max_token_name_length(self) -> pulumi.Output[builtins.int]:
1492
+ def max_token_name_length(self) -> pulumi.Output[_builtins.int]:
887
1493
  """
888
1494
  Specifies the maximum length to use for the name of the Nomad token
889
1495
  generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
@@ -891,17 +1497,17 @@ class NomadSecretBackend(pulumi.CustomResource):
891
1497
  """
892
1498
  return pulumi.get(self, "max_token_name_length")
893
1499
 
894
- @property
1500
+ @_builtins.property
895
1501
  @pulumi.getter(name="maxTtl")
896
- def max_ttl(self) -> pulumi.Output[builtins.int]:
1502
+ def max_ttl(self) -> pulumi.Output[_builtins.int]:
897
1503
  """
898
1504
  Maximum possible lease duration for secrets in seconds.
899
1505
  """
900
1506
  return pulumi.get(self, "max_ttl")
901
1507
 
902
- @property
1508
+ @_builtins.property
903
1509
  @pulumi.getter
904
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
1510
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
905
1511
  """
906
1512
  The namespace to provision the resource in.
907
1513
  The value should not contain leading or trailing forward slashes.
@@ -910,17 +1516,49 @@ class NomadSecretBackend(pulumi.CustomResource):
910
1516
  """
911
1517
  return pulumi.get(self, "namespace")
912
1518
 
913
- @property
1519
+ @_builtins.property
1520
+ @pulumi.getter
1521
+ def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
1522
+ """
1523
+ Specifies mount type specific options that are passed to the backend
1524
+ """
1525
+ return pulumi.get(self, "options")
1526
+
1527
+ @_builtins.property
1528
+ @pulumi.getter(name="passthroughRequestHeaders")
1529
+ def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1530
+ """
1531
+ List of headers to allow and pass from the request to the plugin
1532
+ """
1533
+ return pulumi.get(self, "passthrough_request_headers")
1534
+
1535
+ @_builtins.property
1536
+ @pulumi.getter(name="pluginVersion")
1537
+ def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
1538
+ """
1539
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1540
+ """
1541
+ return pulumi.get(self, "plugin_version")
1542
+
1543
+ @_builtins.property
1544
+ @pulumi.getter(name="sealWrap")
1545
+ def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
1546
+ """
1547
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1548
+ """
1549
+ return pulumi.get(self, "seal_wrap")
1550
+
1551
+ @_builtins.property
914
1552
  @pulumi.getter
915
- def token(self) -> pulumi.Output[Optional[builtins.str]]:
1553
+ def token(self) -> pulumi.Output[Optional[_builtins.str]]:
916
1554
  """
917
1555
  Specifies the Nomad Management token to use.
918
1556
  """
919
1557
  return pulumi.get(self, "token")
920
1558
 
921
- @property
1559
+ @_builtins.property
922
1560
  @pulumi.getter
923
- def ttl(self) -> pulumi.Output[builtins.int]:
1561
+ def ttl(self) -> pulumi.Output[_builtins.int]:
924
1562
  """
925
1563
  Specifies the ttl of the lease for the generated token.
926
1564
  """