pulumi-vault 7.2.0a1755240850__py3-none-any.whl → 7.2.0a1755574606__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -21,43 +21,73 @@ class BackendArgs:
21
21
  def __init__(__self__, *,
22
22
  subscription_id: pulumi.Input[_builtins.str],
23
23
  tenant_id: pulumi.Input[_builtins.str],
24
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
25
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
24
28
  client_id: Optional[pulumi.Input[_builtins.str]] = None,
25
29
  client_secret: Optional[pulumi.Input[_builtins.str]] = None,
30
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
31
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
32
  description: Optional[pulumi.Input[_builtins.str]] = None,
27
33
  disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
28
34
  disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
29
35
  environment: Optional[pulumi.Input[_builtins.str]] = None,
36
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
37
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
30
38
  identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
31
39
  identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
32
40
  identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
41
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
42
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
43
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
33
44
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
45
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
46
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
34
47
  path: Optional[pulumi.Input[_builtins.str]] = None,
48
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
49
+ root_password_ttl: Optional[pulumi.Input[_builtins.int]] = None,
35
50
  rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
36
51
  rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
37
- rotation_window: Optional[pulumi.Input[_builtins.int]] = None):
52
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
53
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None):
38
54
  """
39
55
  The set of arguments for constructing a Backend resource.
40
56
  :param pulumi.Input[_builtins.str] subscription_id: The subscription id for the Azure Active Directory.
41
57
  :param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory.
58
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
59
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
60
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
61
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
42
62
  :param pulumi.Input[_builtins.str] client_id: The OAuth2 client id to connect to Azure.
43
63
  :param pulumi.Input[_builtins.str] client_secret: The OAuth2 client secret to connect to Azure.
64
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
65
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
44
66
  :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
45
67
  :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
46
68
  *Available only for Vault Enterprise*
47
69
  :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
48
70
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
49
71
  :param pulumi.Input[_builtins.str] environment: The Azure environment.
72
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
73
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
50
74
  :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.17+.
51
75
  *Available only for Vault Enterprise*
52
- :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens. Requires Vault 1.17+.
53
- *Available only for Vault Enterprise*
76
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens.
54
77
  :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
55
78
  *Available only for Vault Enterprise*
79
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
80
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
81
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
56
82
  :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
57
83
  The value should not contain leading or trailing forward slashes.
58
84
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
59
85
  *Available only for Vault Enterprise*.
86
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
87
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
60
88
  :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Defaults to `azure`.
89
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
90
+ :param pulumi.Input[_builtins.int] root_password_ttl: The TTL in seconds of the root password in Azure when rotate-root generates a new client secret
61
91
  :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
62
92
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
63
93
  *Available only for Vault Enterprise*
@@ -67,13 +97,26 @@ class BackendArgs:
67
97
  :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
68
98
  a rotation when a scheduled token rotation occurs. The default rotation window is
69
99
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*
100
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
70
101
  """
71
102
  pulumi.set(__self__, "subscription_id", subscription_id)
72
103
  pulumi.set(__self__, "tenant_id", tenant_id)
104
+ if allowed_managed_keys is not None:
105
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
106
+ if allowed_response_headers is not None:
107
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
108
+ if audit_non_hmac_request_keys is not None:
109
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
110
+ if audit_non_hmac_response_keys is not None:
111
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
73
112
  if client_id is not None:
74
113
  pulumi.set(__self__, "client_id", client_id)
75
114
  if client_secret is not None:
76
115
  pulumi.set(__self__, "client_secret", client_secret)
116
+ if default_lease_ttl_seconds is not None:
117
+ pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
118
+ if delegated_auth_accessors is not None:
119
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
77
120
  if description is not None:
78
121
  pulumi.set(__self__, "description", description)
79
122
  if disable_automated_rotation is not None:
@@ -82,22 +125,42 @@ class BackendArgs:
82
125
  pulumi.set(__self__, "disable_remount", disable_remount)
83
126
  if environment is not None:
84
127
  pulumi.set(__self__, "environment", environment)
128
+ if external_entropy_access is not None:
129
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
130
+ if force_no_cache is not None:
131
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
85
132
  if identity_token_audience is not None:
86
133
  pulumi.set(__self__, "identity_token_audience", identity_token_audience)
87
134
  if identity_token_key is not None:
88
135
  pulumi.set(__self__, "identity_token_key", identity_token_key)
89
136
  if identity_token_ttl is not None:
90
137
  pulumi.set(__self__, "identity_token_ttl", identity_token_ttl)
138
+ if listing_visibility is not None:
139
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
140
+ if local is not None:
141
+ pulumi.set(__self__, "local", local)
142
+ if max_lease_ttl_seconds is not None:
143
+ pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
91
144
  if namespace is not None:
92
145
  pulumi.set(__self__, "namespace", namespace)
146
+ if options is not None:
147
+ pulumi.set(__self__, "options", options)
148
+ if passthrough_request_headers is not None:
149
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
93
150
  if path is not None:
94
151
  pulumi.set(__self__, "path", path)
152
+ if plugin_version is not None:
153
+ pulumi.set(__self__, "plugin_version", plugin_version)
154
+ if root_password_ttl is not None:
155
+ pulumi.set(__self__, "root_password_ttl", root_password_ttl)
95
156
  if rotation_period is not None:
96
157
  pulumi.set(__self__, "rotation_period", rotation_period)
97
158
  if rotation_schedule is not None:
98
159
  pulumi.set(__self__, "rotation_schedule", rotation_schedule)
99
160
  if rotation_window is not None:
100
161
  pulumi.set(__self__, "rotation_window", rotation_window)
162
+ if seal_wrap is not None:
163
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
101
164
 
102
165
  @_builtins.property
103
166
  @pulumi.getter(name="subscriptionId")
@@ -123,6 +186,54 @@ class BackendArgs:
123
186
  def tenant_id(self, value: pulumi.Input[_builtins.str]):
124
187
  pulumi.set(self, "tenant_id", value)
125
188
 
189
+ @_builtins.property
190
+ @pulumi.getter(name="allowedManagedKeys")
191
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
192
+ """
193
+ List of managed key registry entry names that the mount in question is allowed to access
194
+ """
195
+ return pulumi.get(self, "allowed_managed_keys")
196
+
197
+ @allowed_managed_keys.setter
198
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
199
+ pulumi.set(self, "allowed_managed_keys", value)
200
+
201
+ @_builtins.property
202
+ @pulumi.getter(name="allowedResponseHeaders")
203
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
204
+ """
205
+ List of headers to allow and pass from the request to the plugin
206
+ """
207
+ return pulumi.get(self, "allowed_response_headers")
208
+
209
+ @allowed_response_headers.setter
210
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
211
+ pulumi.set(self, "allowed_response_headers", value)
212
+
213
+ @_builtins.property
214
+ @pulumi.getter(name="auditNonHmacRequestKeys")
215
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
216
+ """
217
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
218
+ """
219
+ return pulumi.get(self, "audit_non_hmac_request_keys")
220
+
221
+ @audit_non_hmac_request_keys.setter
222
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
223
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
224
+
225
+ @_builtins.property
226
+ @pulumi.getter(name="auditNonHmacResponseKeys")
227
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
228
+ """
229
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
230
+ """
231
+ return pulumi.get(self, "audit_non_hmac_response_keys")
232
+
233
+ @audit_non_hmac_response_keys.setter
234
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
235
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
236
+
126
237
  @_builtins.property
127
238
  @pulumi.getter(name="clientId")
128
239
  def client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -147,6 +258,30 @@ class BackendArgs:
147
258
  def client_secret(self, value: Optional[pulumi.Input[_builtins.str]]):
148
259
  pulumi.set(self, "client_secret", value)
149
260
 
261
+ @_builtins.property
262
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
263
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
264
+ """
265
+ Default lease duration for tokens and secrets in seconds
266
+ """
267
+ return pulumi.get(self, "default_lease_ttl_seconds")
268
+
269
+ @default_lease_ttl_seconds.setter
270
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
271
+ pulumi.set(self, "default_lease_ttl_seconds", value)
272
+
273
+ @_builtins.property
274
+ @pulumi.getter(name="delegatedAuthAccessors")
275
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
276
+ """
277
+ List of headers to allow and pass from the request to the plugin
278
+ """
279
+ return pulumi.get(self, "delegated_auth_accessors")
280
+
281
+ @delegated_auth_accessors.setter
282
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
283
+ pulumi.set(self, "delegated_auth_accessors", value)
284
+
150
285
  @_builtins.property
151
286
  @pulumi.getter
152
287
  def description(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -197,6 +332,30 @@ class BackendArgs:
197
332
  def environment(self, value: Optional[pulumi.Input[_builtins.str]]):
198
333
  pulumi.set(self, "environment", value)
199
334
 
335
+ @_builtins.property
336
+ @pulumi.getter(name="externalEntropyAccess")
337
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
338
+ """
339
+ Enable the secrets engine to access Vault's external entropy source
340
+ """
341
+ return pulumi.get(self, "external_entropy_access")
342
+
343
+ @external_entropy_access.setter
344
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
345
+ pulumi.set(self, "external_entropy_access", value)
346
+
347
+ @_builtins.property
348
+ @pulumi.getter(name="forceNoCache")
349
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
350
+ """
351
+ If set to true, disables caching.
352
+ """
353
+ return pulumi.get(self, "force_no_cache")
354
+
355
+ @force_no_cache.setter
356
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
357
+ pulumi.set(self, "force_no_cache", value)
358
+
200
359
  @_builtins.property
201
360
  @pulumi.getter(name="identityTokenAudience")
202
361
  def identity_token_audience(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -214,8 +373,7 @@ class BackendArgs:
214
373
  @pulumi.getter(name="identityTokenKey")
215
374
  def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
216
375
  """
217
- The key to use for signing identity tokens. Requires Vault 1.17+.
218
- *Available only for Vault Enterprise*
376
+ The key to use for signing identity tokens.
219
377
  """
220
378
  return pulumi.get(self, "identity_token_key")
221
379
 
@@ -236,6 +394,42 @@ class BackendArgs:
236
394
  def identity_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
237
395
  pulumi.set(self, "identity_token_ttl", value)
238
396
 
397
+ @_builtins.property
398
+ @pulumi.getter(name="listingVisibility")
399
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
400
+ """
401
+ Specifies whether to show this mount in the UI-specific listing endpoint
402
+ """
403
+ return pulumi.get(self, "listing_visibility")
404
+
405
+ @listing_visibility.setter
406
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
407
+ pulumi.set(self, "listing_visibility", value)
408
+
409
+ @_builtins.property
410
+ @pulumi.getter
411
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
412
+ """
413
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
414
+ """
415
+ return pulumi.get(self, "local")
416
+
417
+ @local.setter
418
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
419
+ pulumi.set(self, "local", value)
420
+
421
+ @_builtins.property
422
+ @pulumi.getter(name="maxLeaseTtlSeconds")
423
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
424
+ """
425
+ Maximum possible lease duration for tokens and secrets in seconds
426
+ """
427
+ return pulumi.get(self, "max_lease_ttl_seconds")
428
+
429
+ @max_lease_ttl_seconds.setter
430
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
431
+ pulumi.set(self, "max_lease_ttl_seconds", value)
432
+
239
433
  @_builtins.property
240
434
  @pulumi.getter
241
435
  def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -251,6 +445,30 @@ class BackendArgs:
251
445
  def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
252
446
  pulumi.set(self, "namespace", value)
253
447
 
448
+ @_builtins.property
449
+ @pulumi.getter
450
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
451
+ """
452
+ Specifies mount type specific options that are passed to the backend
453
+ """
454
+ return pulumi.get(self, "options")
455
+
456
+ @options.setter
457
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
458
+ pulumi.set(self, "options", value)
459
+
460
+ @_builtins.property
461
+ @pulumi.getter(name="passthroughRequestHeaders")
462
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
463
+ """
464
+ List of headers to allow and pass from the request to the plugin
465
+ """
466
+ return pulumi.get(self, "passthrough_request_headers")
467
+
468
+ @passthrough_request_headers.setter
469
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
470
+ pulumi.set(self, "passthrough_request_headers", value)
471
+
254
472
  @_builtins.property
255
473
  @pulumi.getter
256
474
  def path(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -263,6 +481,30 @@ class BackendArgs:
263
481
  def path(self, value: Optional[pulumi.Input[_builtins.str]]):
264
482
  pulumi.set(self, "path", value)
265
483
 
484
+ @_builtins.property
485
+ @pulumi.getter(name="pluginVersion")
486
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
487
+ """
488
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
489
+ """
490
+ return pulumi.get(self, "plugin_version")
491
+
492
+ @plugin_version.setter
493
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
494
+ pulumi.set(self, "plugin_version", value)
495
+
496
+ @_builtins.property
497
+ @pulumi.getter(name="rootPasswordTtl")
498
+ def root_password_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
499
+ """
500
+ The TTL in seconds of the root password in Azure when rotate-root generates a new client secret
501
+ """
502
+ return pulumi.get(self, "root_password_ttl")
503
+
504
+ @root_password_ttl.setter
505
+ def root_password_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
506
+ pulumi.set(self, "root_password_ttl", value)
507
+
266
508
  @_builtins.property
267
509
  @pulumi.getter(name="rotationPeriod")
268
510
  def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
@@ -305,47 +547,91 @@ class BackendArgs:
305
547
  def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
306
548
  pulumi.set(self, "rotation_window", value)
307
549
 
550
+ @_builtins.property
551
+ @pulumi.getter(name="sealWrap")
552
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
553
+ """
554
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
555
+ """
556
+ return pulumi.get(self, "seal_wrap")
557
+
558
+ @seal_wrap.setter
559
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
560
+ pulumi.set(self, "seal_wrap", value)
561
+
308
562
 
309
563
  @pulumi.input_type
310
564
  class _BackendState:
311
565
  def __init__(__self__, *,
566
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
567
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
568
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
569
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
570
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
312
571
  client_id: Optional[pulumi.Input[_builtins.str]] = None,
313
572
  client_secret: Optional[pulumi.Input[_builtins.str]] = None,
573
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
574
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
314
575
  description: Optional[pulumi.Input[_builtins.str]] = None,
315
576
  disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
316
577
  disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
317
578
  environment: Optional[pulumi.Input[_builtins.str]] = None,
579
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
580
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
318
581
  identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
319
582
  identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
320
583
  identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
584
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
585
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
586
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
321
587
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
588
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
589
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
322
590
  path: Optional[pulumi.Input[_builtins.str]] = None,
591
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
592
+ root_password_ttl: Optional[pulumi.Input[_builtins.int]] = None,
323
593
  rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
324
594
  rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
325
595
  rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
596
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
326
597
  subscription_id: Optional[pulumi.Input[_builtins.str]] = None,
327
598
  tenant_id: Optional[pulumi.Input[_builtins.str]] = None):
328
599
  """
329
600
  Input properties used for looking up and filtering Backend resources.
601
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
602
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
603
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
604
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
605
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
330
606
  :param pulumi.Input[_builtins.str] client_id: The OAuth2 client id to connect to Azure.
331
607
  :param pulumi.Input[_builtins.str] client_secret: The OAuth2 client secret to connect to Azure.
608
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
609
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
332
610
  :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
333
611
  :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
334
612
  *Available only for Vault Enterprise*
335
613
  :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
336
614
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
337
615
  :param pulumi.Input[_builtins.str] environment: The Azure environment.
616
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
617
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
338
618
  :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.17+.
339
619
  *Available only for Vault Enterprise*
340
- :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens. Requires Vault 1.17+.
341
- *Available only for Vault Enterprise*
620
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens.
342
621
  :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
343
622
  *Available only for Vault Enterprise*
623
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
624
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
625
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
344
626
  :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
345
627
  The value should not contain leading or trailing forward slashes.
346
628
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
347
629
  *Available only for Vault Enterprise*.
630
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
631
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
348
632
  :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Defaults to `azure`.
633
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
634
+ :param pulumi.Input[_builtins.int] root_password_ttl: The TTL in seconds of the root password in Azure when rotate-root generates a new client secret
349
635
  :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
350
636
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
351
637
  *Available only for Vault Enterprise*
@@ -355,13 +641,28 @@ class _BackendState:
355
641
  :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
356
642
  a rotation when a scheduled token rotation occurs. The default rotation window is
357
643
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*
644
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
358
645
  :param pulumi.Input[_builtins.str] subscription_id: The subscription id for the Azure Active Directory.
359
646
  :param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory.
360
647
  """
648
+ if accessor is not None:
649
+ pulumi.set(__self__, "accessor", accessor)
650
+ if allowed_managed_keys is not None:
651
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
652
+ if allowed_response_headers is not None:
653
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
654
+ if audit_non_hmac_request_keys is not None:
655
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
656
+ if audit_non_hmac_response_keys is not None:
657
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
361
658
  if client_id is not None:
362
659
  pulumi.set(__self__, "client_id", client_id)
363
660
  if client_secret is not None:
364
661
  pulumi.set(__self__, "client_secret", client_secret)
662
+ if default_lease_ttl_seconds is not None:
663
+ pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
664
+ if delegated_auth_accessors is not None:
665
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
365
666
  if description is not None:
366
667
  pulumi.set(__self__, "description", description)
367
668
  if disable_automated_rotation is not None:
@@ -370,27 +671,107 @@ class _BackendState:
370
671
  pulumi.set(__self__, "disable_remount", disable_remount)
371
672
  if environment is not None:
372
673
  pulumi.set(__self__, "environment", environment)
674
+ if external_entropy_access is not None:
675
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
676
+ if force_no_cache is not None:
677
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
373
678
  if identity_token_audience is not None:
374
679
  pulumi.set(__self__, "identity_token_audience", identity_token_audience)
375
680
  if identity_token_key is not None:
376
681
  pulumi.set(__self__, "identity_token_key", identity_token_key)
377
682
  if identity_token_ttl is not None:
378
683
  pulumi.set(__self__, "identity_token_ttl", identity_token_ttl)
684
+ if listing_visibility is not None:
685
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
686
+ if local is not None:
687
+ pulumi.set(__self__, "local", local)
688
+ if max_lease_ttl_seconds is not None:
689
+ pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
379
690
  if namespace is not None:
380
691
  pulumi.set(__self__, "namespace", namespace)
692
+ if options is not None:
693
+ pulumi.set(__self__, "options", options)
694
+ if passthrough_request_headers is not None:
695
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
381
696
  if path is not None:
382
697
  pulumi.set(__self__, "path", path)
698
+ if plugin_version is not None:
699
+ pulumi.set(__self__, "plugin_version", plugin_version)
700
+ if root_password_ttl is not None:
701
+ pulumi.set(__self__, "root_password_ttl", root_password_ttl)
383
702
  if rotation_period is not None:
384
703
  pulumi.set(__self__, "rotation_period", rotation_period)
385
704
  if rotation_schedule is not None:
386
705
  pulumi.set(__self__, "rotation_schedule", rotation_schedule)
387
706
  if rotation_window is not None:
388
707
  pulumi.set(__self__, "rotation_window", rotation_window)
708
+ if seal_wrap is not None:
709
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
389
710
  if subscription_id is not None:
390
711
  pulumi.set(__self__, "subscription_id", subscription_id)
391
712
  if tenant_id is not None:
392
713
  pulumi.set(__self__, "tenant_id", tenant_id)
393
714
 
715
+ @_builtins.property
716
+ @pulumi.getter
717
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
718
+ """
719
+ Accessor of the mount
720
+ """
721
+ return pulumi.get(self, "accessor")
722
+
723
+ @accessor.setter
724
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
725
+ pulumi.set(self, "accessor", value)
726
+
727
+ @_builtins.property
728
+ @pulumi.getter(name="allowedManagedKeys")
729
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
730
+ """
731
+ List of managed key registry entry names that the mount in question is allowed to access
732
+ """
733
+ return pulumi.get(self, "allowed_managed_keys")
734
+
735
+ @allowed_managed_keys.setter
736
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
737
+ pulumi.set(self, "allowed_managed_keys", value)
738
+
739
+ @_builtins.property
740
+ @pulumi.getter(name="allowedResponseHeaders")
741
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
742
+ """
743
+ List of headers to allow and pass from the request to the plugin
744
+ """
745
+ return pulumi.get(self, "allowed_response_headers")
746
+
747
+ @allowed_response_headers.setter
748
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
749
+ pulumi.set(self, "allowed_response_headers", value)
750
+
751
+ @_builtins.property
752
+ @pulumi.getter(name="auditNonHmacRequestKeys")
753
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
754
+ """
755
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
756
+ """
757
+ return pulumi.get(self, "audit_non_hmac_request_keys")
758
+
759
+ @audit_non_hmac_request_keys.setter
760
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
761
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
762
+
763
+ @_builtins.property
764
+ @pulumi.getter(name="auditNonHmacResponseKeys")
765
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
766
+ """
767
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
768
+ """
769
+ return pulumi.get(self, "audit_non_hmac_response_keys")
770
+
771
+ @audit_non_hmac_response_keys.setter
772
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
773
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
774
+
394
775
  @_builtins.property
395
776
  @pulumi.getter(name="clientId")
396
777
  def client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -415,6 +796,30 @@ class _BackendState:
415
796
  def client_secret(self, value: Optional[pulumi.Input[_builtins.str]]):
416
797
  pulumi.set(self, "client_secret", value)
417
798
 
799
+ @_builtins.property
800
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
801
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
802
+ """
803
+ Default lease duration for tokens and secrets in seconds
804
+ """
805
+ return pulumi.get(self, "default_lease_ttl_seconds")
806
+
807
+ @default_lease_ttl_seconds.setter
808
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
809
+ pulumi.set(self, "default_lease_ttl_seconds", value)
810
+
811
+ @_builtins.property
812
+ @pulumi.getter(name="delegatedAuthAccessors")
813
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
814
+ """
815
+ List of headers to allow and pass from the request to the plugin
816
+ """
817
+ return pulumi.get(self, "delegated_auth_accessors")
818
+
819
+ @delegated_auth_accessors.setter
820
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
821
+ pulumi.set(self, "delegated_auth_accessors", value)
822
+
418
823
  @_builtins.property
419
824
  @pulumi.getter
420
825
  def description(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -465,6 +870,30 @@ class _BackendState:
465
870
  def environment(self, value: Optional[pulumi.Input[_builtins.str]]):
466
871
  pulumi.set(self, "environment", value)
467
872
 
873
+ @_builtins.property
874
+ @pulumi.getter(name="externalEntropyAccess")
875
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
876
+ """
877
+ Enable the secrets engine to access Vault's external entropy source
878
+ """
879
+ return pulumi.get(self, "external_entropy_access")
880
+
881
+ @external_entropy_access.setter
882
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
883
+ pulumi.set(self, "external_entropy_access", value)
884
+
885
+ @_builtins.property
886
+ @pulumi.getter(name="forceNoCache")
887
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
888
+ """
889
+ If set to true, disables caching.
890
+ """
891
+ return pulumi.get(self, "force_no_cache")
892
+
893
+ @force_no_cache.setter
894
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
895
+ pulumi.set(self, "force_no_cache", value)
896
+
468
897
  @_builtins.property
469
898
  @pulumi.getter(name="identityTokenAudience")
470
899
  def identity_token_audience(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -482,8 +911,7 @@ class _BackendState:
482
911
  @pulumi.getter(name="identityTokenKey")
483
912
  def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
484
913
  """
485
- The key to use for signing identity tokens. Requires Vault 1.17+.
486
- *Available only for Vault Enterprise*
914
+ The key to use for signing identity tokens.
487
915
  """
488
916
  return pulumi.get(self, "identity_token_key")
489
917
 
@@ -504,6 +932,42 @@ class _BackendState:
504
932
  def identity_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
505
933
  pulumi.set(self, "identity_token_ttl", value)
506
934
 
935
+ @_builtins.property
936
+ @pulumi.getter(name="listingVisibility")
937
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
938
+ """
939
+ Specifies whether to show this mount in the UI-specific listing endpoint
940
+ """
941
+ return pulumi.get(self, "listing_visibility")
942
+
943
+ @listing_visibility.setter
944
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
945
+ pulumi.set(self, "listing_visibility", value)
946
+
947
+ @_builtins.property
948
+ @pulumi.getter
949
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
950
+ """
951
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
952
+ """
953
+ return pulumi.get(self, "local")
954
+
955
+ @local.setter
956
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
957
+ pulumi.set(self, "local", value)
958
+
959
+ @_builtins.property
960
+ @pulumi.getter(name="maxLeaseTtlSeconds")
961
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
962
+ """
963
+ Maximum possible lease duration for tokens and secrets in seconds
964
+ """
965
+ return pulumi.get(self, "max_lease_ttl_seconds")
966
+
967
+ @max_lease_ttl_seconds.setter
968
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
969
+ pulumi.set(self, "max_lease_ttl_seconds", value)
970
+
507
971
  @_builtins.property
508
972
  @pulumi.getter
509
973
  def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -519,6 +983,30 @@ class _BackendState:
519
983
  def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
520
984
  pulumi.set(self, "namespace", value)
521
985
 
986
+ @_builtins.property
987
+ @pulumi.getter
988
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
989
+ """
990
+ Specifies mount type specific options that are passed to the backend
991
+ """
992
+ return pulumi.get(self, "options")
993
+
994
+ @options.setter
995
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
996
+ pulumi.set(self, "options", value)
997
+
998
+ @_builtins.property
999
+ @pulumi.getter(name="passthroughRequestHeaders")
1000
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
1001
+ """
1002
+ List of headers to allow and pass from the request to the plugin
1003
+ """
1004
+ return pulumi.get(self, "passthrough_request_headers")
1005
+
1006
+ @passthrough_request_headers.setter
1007
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
1008
+ pulumi.set(self, "passthrough_request_headers", value)
1009
+
522
1010
  @_builtins.property
523
1011
  @pulumi.getter
524
1012
  def path(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -531,6 +1019,30 @@ class _BackendState:
531
1019
  def path(self, value: Optional[pulumi.Input[_builtins.str]]):
532
1020
  pulumi.set(self, "path", value)
533
1021
 
1022
+ @_builtins.property
1023
+ @pulumi.getter(name="pluginVersion")
1024
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
1025
+ """
1026
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1027
+ """
1028
+ return pulumi.get(self, "plugin_version")
1029
+
1030
+ @plugin_version.setter
1031
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
1032
+ pulumi.set(self, "plugin_version", value)
1033
+
1034
+ @_builtins.property
1035
+ @pulumi.getter(name="rootPasswordTtl")
1036
+ def root_password_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
1037
+ """
1038
+ The TTL in seconds of the root password in Azure when rotate-root generates a new client secret
1039
+ """
1040
+ return pulumi.get(self, "root_password_ttl")
1041
+
1042
+ @root_password_ttl.setter
1043
+ def root_password_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
1044
+ pulumi.set(self, "root_password_ttl", value)
1045
+
534
1046
  @_builtins.property
535
1047
  @pulumi.getter(name="rotationPeriod")
536
1048
  def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
@@ -573,6 +1085,18 @@ class _BackendState:
573
1085
  def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
574
1086
  pulumi.set(self, "rotation_window", value)
575
1087
 
1088
+ @_builtins.property
1089
+ @pulumi.getter(name="sealWrap")
1090
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
1091
+ """
1092
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1093
+ """
1094
+ return pulumi.get(self, "seal_wrap")
1095
+
1096
+ @seal_wrap.setter
1097
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
1098
+ pulumi.set(self, "seal_wrap", value)
1099
+
576
1100
  @_builtins.property
577
1101
  @pulumi.getter(name="subscriptionId")
578
1102
  def subscription_id(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -604,20 +1128,36 @@ class Backend(pulumi.CustomResource):
604
1128
  def __init__(__self__,
605
1129
  resource_name: str,
606
1130
  opts: Optional[pulumi.ResourceOptions] = None,
1131
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1132
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1133
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1134
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
607
1135
  client_id: Optional[pulumi.Input[_builtins.str]] = None,
608
1136
  client_secret: Optional[pulumi.Input[_builtins.str]] = None,
1137
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1138
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
609
1139
  description: Optional[pulumi.Input[_builtins.str]] = None,
610
1140
  disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
611
1141
  disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
612
1142
  environment: Optional[pulumi.Input[_builtins.str]] = None,
1143
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1144
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
613
1145
  identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
614
1146
  identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
615
1147
  identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1148
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1149
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1150
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
616
1151
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
1152
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1153
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
617
1154
  path: Optional[pulumi.Input[_builtins.str]] = None,
1155
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1156
+ root_password_ttl: Optional[pulumi.Input[_builtins.int]] = None,
618
1157
  rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
619
1158
  rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
620
1159
  rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
1160
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
621
1161
  subscription_id: Optional[pulumi.Input[_builtins.str]] = None,
622
1162
  tenant_id: Optional[pulumi.Input[_builtins.str]] = None,
623
1163
  __props__=None):
@@ -657,25 +1197,39 @@ class Backend(pulumi.CustomResource):
657
1197
 
658
1198
  :param str resource_name: The name of the resource.
659
1199
  :param pulumi.ResourceOptions opts: Options for the resource.
1200
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1201
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1202
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1203
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
660
1204
  :param pulumi.Input[_builtins.str] client_id: The OAuth2 client id to connect to Azure.
661
1205
  :param pulumi.Input[_builtins.str] client_secret: The OAuth2 client secret to connect to Azure.
1206
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
1207
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
662
1208
  :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
663
1209
  :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
664
1210
  *Available only for Vault Enterprise*
665
1211
  :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
666
1212
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
667
1213
  :param pulumi.Input[_builtins.str] environment: The Azure environment.
1214
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1215
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
668
1216
  :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.17+.
669
1217
  *Available only for Vault Enterprise*
670
- :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens. Requires Vault 1.17+.
671
- *Available only for Vault Enterprise*
1218
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens.
672
1219
  :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
673
1220
  *Available only for Vault Enterprise*
1221
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1222
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1223
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
674
1224
  :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
675
1225
  The value should not contain leading or trailing forward slashes.
676
1226
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
677
1227
  *Available only for Vault Enterprise*.
1228
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1229
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
678
1230
  :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Defaults to `azure`.
1231
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1232
+ :param pulumi.Input[_builtins.int] root_password_ttl: The TTL in seconds of the root password in Azure when rotate-root generates a new client secret
679
1233
  :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
680
1234
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
681
1235
  *Available only for Vault Enterprise*
@@ -685,6 +1239,7 @@ class Backend(pulumi.CustomResource):
685
1239
  :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
686
1240
  a rotation when a scheduled token rotation occurs. The default rotation window is
687
1241
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*
1242
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
688
1243
  :param pulumi.Input[_builtins.str] subscription_id: The subscription id for the Azure Active Directory.
689
1244
  :param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory.
690
1245
  """
@@ -743,20 +1298,36 @@ class Backend(pulumi.CustomResource):
743
1298
  def _internal_init(__self__,
744
1299
  resource_name: str,
745
1300
  opts: Optional[pulumi.ResourceOptions] = None,
1301
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1302
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1303
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1304
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
746
1305
  client_id: Optional[pulumi.Input[_builtins.str]] = None,
747
1306
  client_secret: Optional[pulumi.Input[_builtins.str]] = None,
1307
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1308
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
748
1309
  description: Optional[pulumi.Input[_builtins.str]] = None,
749
1310
  disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
750
1311
  disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
751
1312
  environment: Optional[pulumi.Input[_builtins.str]] = None,
1313
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1314
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
752
1315
  identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
753
1316
  identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
754
1317
  identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1318
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1319
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1320
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
755
1321
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
1322
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1323
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
756
1324
  path: Optional[pulumi.Input[_builtins.str]] = None,
1325
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1326
+ root_password_ttl: Optional[pulumi.Input[_builtins.int]] = None,
757
1327
  rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
758
1328
  rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
759
1329
  rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
1330
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
760
1331
  subscription_id: Optional[pulumi.Input[_builtins.str]] = None,
761
1332
  tenant_id: Optional[pulumi.Input[_builtins.str]] = None,
762
1333
  __props__=None):
@@ -768,26 +1339,43 @@ class Backend(pulumi.CustomResource):
768
1339
  raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
769
1340
  __props__ = BackendArgs.__new__(BackendArgs)
770
1341
 
1342
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1343
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1344
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1345
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
771
1346
  __props__.__dict__["client_id"] = None if client_id is None else pulumi.Output.secret(client_id)
772
1347
  __props__.__dict__["client_secret"] = None if client_secret is None else pulumi.Output.secret(client_secret)
1348
+ __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1349
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
773
1350
  __props__.__dict__["description"] = description
774
1351
  __props__.__dict__["disable_automated_rotation"] = disable_automated_rotation
775
1352
  __props__.__dict__["disable_remount"] = disable_remount
776
1353
  __props__.__dict__["environment"] = environment
1354
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1355
+ __props__.__dict__["force_no_cache"] = force_no_cache
777
1356
  __props__.__dict__["identity_token_audience"] = identity_token_audience
778
1357
  __props__.__dict__["identity_token_key"] = identity_token_key
779
1358
  __props__.__dict__["identity_token_ttl"] = identity_token_ttl
1359
+ __props__.__dict__["listing_visibility"] = listing_visibility
1360
+ __props__.__dict__["local"] = local
1361
+ __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
780
1362
  __props__.__dict__["namespace"] = namespace
1363
+ __props__.__dict__["options"] = options
1364
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
781
1365
  __props__.__dict__["path"] = path
1366
+ __props__.__dict__["plugin_version"] = plugin_version
1367
+ __props__.__dict__["root_password_ttl"] = root_password_ttl
782
1368
  __props__.__dict__["rotation_period"] = rotation_period
783
1369
  __props__.__dict__["rotation_schedule"] = rotation_schedule
784
1370
  __props__.__dict__["rotation_window"] = rotation_window
1371
+ __props__.__dict__["seal_wrap"] = seal_wrap
785
1372
  if subscription_id is None and not opts.urn:
786
1373
  raise TypeError("Missing required property 'subscription_id'")
787
1374
  __props__.__dict__["subscription_id"] = None if subscription_id is None else pulumi.Output.secret(subscription_id)
788
1375
  if tenant_id is None and not opts.urn:
789
1376
  raise TypeError("Missing required property 'tenant_id'")
790
1377
  __props__.__dict__["tenant_id"] = None if tenant_id is None else pulumi.Output.secret(tenant_id)
1378
+ __props__.__dict__["accessor"] = None
791
1379
  secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["clientId", "clientSecret", "subscriptionId", "tenantId"])
792
1380
  opts = pulumi.ResourceOptions.merge(opts, secret_opts)
793
1381
  super(Backend, __self__).__init__(
@@ -800,20 +1388,37 @@ class Backend(pulumi.CustomResource):
800
1388
  def get(resource_name: str,
801
1389
  id: pulumi.Input[str],
802
1390
  opts: Optional[pulumi.ResourceOptions] = None,
1391
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
1392
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1393
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1394
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1395
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
803
1396
  client_id: Optional[pulumi.Input[_builtins.str]] = None,
804
1397
  client_secret: Optional[pulumi.Input[_builtins.str]] = None,
1398
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1399
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
805
1400
  description: Optional[pulumi.Input[_builtins.str]] = None,
806
1401
  disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
807
1402
  disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
808
1403
  environment: Optional[pulumi.Input[_builtins.str]] = None,
1404
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1405
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
809
1406
  identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
810
1407
  identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
811
1408
  identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1409
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1410
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1411
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
812
1412
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
1413
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1414
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
813
1415
  path: Optional[pulumi.Input[_builtins.str]] = None,
1416
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1417
+ root_password_ttl: Optional[pulumi.Input[_builtins.int]] = None,
814
1418
  rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
815
1419
  rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
816
1420
  rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
1421
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
817
1422
  subscription_id: Optional[pulumi.Input[_builtins.str]] = None,
818
1423
  tenant_id: Optional[pulumi.Input[_builtins.str]] = None) -> 'Backend':
819
1424
  """
@@ -823,25 +1428,40 @@ class Backend(pulumi.CustomResource):
823
1428
  :param str resource_name: The unique name of the resulting resource.
824
1429
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
825
1430
  :param pulumi.ResourceOptions opts: Options for the resource.
1431
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
1432
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1433
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1434
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1435
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
826
1436
  :param pulumi.Input[_builtins.str] client_id: The OAuth2 client id to connect to Azure.
827
1437
  :param pulumi.Input[_builtins.str] client_secret: The OAuth2 client secret to connect to Azure.
1438
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
1439
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
828
1440
  :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
829
1441
  :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
830
1442
  *Available only for Vault Enterprise*
831
1443
  :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
832
1444
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
833
1445
  :param pulumi.Input[_builtins.str] environment: The Azure environment.
1446
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1447
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
834
1448
  :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.17+.
835
1449
  *Available only for Vault Enterprise*
836
- :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens. Requires Vault 1.17+.
837
- *Available only for Vault Enterprise*
1450
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens.
838
1451
  :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
839
1452
  *Available only for Vault Enterprise*
1453
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1454
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1455
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
840
1456
  :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
841
1457
  The value should not contain leading or trailing forward slashes.
842
1458
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
843
1459
  *Available only for Vault Enterprise*.
1460
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1461
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
844
1462
  :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Defaults to `azure`.
1463
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1464
+ :param pulumi.Input[_builtins.int] root_password_ttl: The TTL in seconds of the root password in Azure when rotate-root generates a new client secret
845
1465
  :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
846
1466
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
847
1467
  *Available only for Vault Enterprise*
@@ -851,6 +1471,7 @@ class Backend(pulumi.CustomResource):
851
1471
  :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
852
1472
  a rotation when a scheduled token rotation occurs. The default rotation window is
853
1473
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*
1474
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
854
1475
  :param pulumi.Input[_builtins.str] subscription_id: The subscription id for the Azure Active Directory.
855
1476
  :param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory.
856
1477
  """
@@ -858,24 +1479,81 @@ class Backend(pulumi.CustomResource):
858
1479
 
859
1480
  __props__ = _BackendState.__new__(_BackendState)
860
1481
 
1482
+ __props__.__dict__["accessor"] = accessor
1483
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1484
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1485
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1486
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
861
1487
  __props__.__dict__["client_id"] = client_id
862
1488
  __props__.__dict__["client_secret"] = client_secret
1489
+ __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1490
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
863
1491
  __props__.__dict__["description"] = description
864
1492
  __props__.__dict__["disable_automated_rotation"] = disable_automated_rotation
865
1493
  __props__.__dict__["disable_remount"] = disable_remount
866
1494
  __props__.__dict__["environment"] = environment
1495
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1496
+ __props__.__dict__["force_no_cache"] = force_no_cache
867
1497
  __props__.__dict__["identity_token_audience"] = identity_token_audience
868
1498
  __props__.__dict__["identity_token_key"] = identity_token_key
869
1499
  __props__.__dict__["identity_token_ttl"] = identity_token_ttl
1500
+ __props__.__dict__["listing_visibility"] = listing_visibility
1501
+ __props__.__dict__["local"] = local
1502
+ __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
870
1503
  __props__.__dict__["namespace"] = namespace
1504
+ __props__.__dict__["options"] = options
1505
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
871
1506
  __props__.__dict__["path"] = path
1507
+ __props__.__dict__["plugin_version"] = plugin_version
1508
+ __props__.__dict__["root_password_ttl"] = root_password_ttl
872
1509
  __props__.__dict__["rotation_period"] = rotation_period
873
1510
  __props__.__dict__["rotation_schedule"] = rotation_schedule
874
1511
  __props__.__dict__["rotation_window"] = rotation_window
1512
+ __props__.__dict__["seal_wrap"] = seal_wrap
875
1513
  __props__.__dict__["subscription_id"] = subscription_id
876
1514
  __props__.__dict__["tenant_id"] = tenant_id
877
1515
  return Backend(resource_name, opts=opts, __props__=__props__)
878
1516
 
1517
+ @_builtins.property
1518
+ @pulumi.getter
1519
+ def accessor(self) -> pulumi.Output[_builtins.str]:
1520
+ """
1521
+ Accessor of the mount
1522
+ """
1523
+ return pulumi.get(self, "accessor")
1524
+
1525
+ @_builtins.property
1526
+ @pulumi.getter(name="allowedManagedKeys")
1527
+ def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1528
+ """
1529
+ List of managed key registry entry names that the mount in question is allowed to access
1530
+ """
1531
+ return pulumi.get(self, "allowed_managed_keys")
1532
+
1533
+ @_builtins.property
1534
+ @pulumi.getter(name="allowedResponseHeaders")
1535
+ def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1536
+ """
1537
+ List of headers to allow and pass from the request to the plugin
1538
+ """
1539
+ return pulumi.get(self, "allowed_response_headers")
1540
+
1541
+ @_builtins.property
1542
+ @pulumi.getter(name="auditNonHmacRequestKeys")
1543
+ def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1544
+ """
1545
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1546
+ """
1547
+ return pulumi.get(self, "audit_non_hmac_request_keys")
1548
+
1549
+ @_builtins.property
1550
+ @pulumi.getter(name="auditNonHmacResponseKeys")
1551
+ def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1552
+ """
1553
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1554
+ """
1555
+ return pulumi.get(self, "audit_non_hmac_response_keys")
1556
+
879
1557
  @_builtins.property
880
1558
  @pulumi.getter(name="clientId")
881
1559
  def client_id(self) -> pulumi.Output[Optional[_builtins.str]]:
@@ -892,6 +1570,22 @@ class Backend(pulumi.CustomResource):
892
1570
  """
893
1571
  return pulumi.get(self, "client_secret")
894
1572
 
1573
+ @_builtins.property
1574
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
1575
+ def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1576
+ """
1577
+ Default lease duration for tokens and secrets in seconds
1578
+ """
1579
+ return pulumi.get(self, "default_lease_ttl_seconds")
1580
+
1581
+ @_builtins.property
1582
+ @pulumi.getter(name="delegatedAuthAccessors")
1583
+ def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1584
+ """
1585
+ List of headers to allow and pass from the request to the plugin
1586
+ """
1587
+ return pulumi.get(self, "delegated_auth_accessors")
1588
+
895
1589
  @_builtins.property
896
1590
  @pulumi.getter
897
1591
  def description(self) -> pulumi.Output[Optional[_builtins.str]]:
@@ -926,6 +1620,22 @@ class Backend(pulumi.CustomResource):
926
1620
  """
927
1621
  return pulumi.get(self, "environment")
928
1622
 
1623
+ @_builtins.property
1624
+ @pulumi.getter(name="externalEntropyAccess")
1625
+ def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
1626
+ """
1627
+ Enable the secrets engine to access Vault's external entropy source
1628
+ """
1629
+ return pulumi.get(self, "external_entropy_access")
1630
+
1631
+ @_builtins.property
1632
+ @pulumi.getter(name="forceNoCache")
1633
+ def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
1634
+ """
1635
+ If set to true, disables caching.
1636
+ """
1637
+ return pulumi.get(self, "force_no_cache")
1638
+
929
1639
  @_builtins.property
930
1640
  @pulumi.getter(name="identityTokenAudience")
931
1641
  def identity_token_audience(self) -> pulumi.Output[Optional[_builtins.str]]:
@@ -939,8 +1649,7 @@ class Backend(pulumi.CustomResource):
939
1649
  @pulumi.getter(name="identityTokenKey")
940
1650
  def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
941
1651
  """
942
- The key to use for signing identity tokens. Requires Vault 1.17+.
943
- *Available only for Vault Enterprise*
1652
+ The key to use for signing identity tokens.
944
1653
  """
945
1654
  return pulumi.get(self, "identity_token_key")
946
1655
 
@@ -953,6 +1662,30 @@ class Backend(pulumi.CustomResource):
953
1662
  """
954
1663
  return pulumi.get(self, "identity_token_ttl")
955
1664
 
1665
+ @_builtins.property
1666
+ @pulumi.getter(name="listingVisibility")
1667
+ def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
1668
+ """
1669
+ Specifies whether to show this mount in the UI-specific listing endpoint
1670
+ """
1671
+ return pulumi.get(self, "listing_visibility")
1672
+
1673
+ @_builtins.property
1674
+ @pulumi.getter
1675
+ def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
1676
+ """
1677
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1678
+ """
1679
+ return pulumi.get(self, "local")
1680
+
1681
+ @_builtins.property
1682
+ @pulumi.getter(name="maxLeaseTtlSeconds")
1683
+ def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1684
+ """
1685
+ Maximum possible lease duration for tokens and secrets in seconds
1686
+ """
1687
+ return pulumi.get(self, "max_lease_ttl_seconds")
1688
+
956
1689
  @_builtins.property
957
1690
  @pulumi.getter
958
1691
  def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
@@ -964,6 +1697,22 @@ class Backend(pulumi.CustomResource):
964
1697
  """
965
1698
  return pulumi.get(self, "namespace")
966
1699
 
1700
+ @_builtins.property
1701
+ @pulumi.getter
1702
+ def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
1703
+ """
1704
+ Specifies mount type specific options that are passed to the backend
1705
+ """
1706
+ return pulumi.get(self, "options")
1707
+
1708
+ @_builtins.property
1709
+ @pulumi.getter(name="passthroughRequestHeaders")
1710
+ def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1711
+ """
1712
+ List of headers to allow and pass from the request to the plugin
1713
+ """
1714
+ return pulumi.get(self, "passthrough_request_headers")
1715
+
967
1716
  @_builtins.property
968
1717
  @pulumi.getter
969
1718
  def path(self) -> pulumi.Output[Optional[_builtins.str]]:
@@ -972,6 +1721,22 @@ class Backend(pulumi.CustomResource):
972
1721
  """
973
1722
  return pulumi.get(self, "path")
974
1723
 
1724
+ @_builtins.property
1725
+ @pulumi.getter(name="pluginVersion")
1726
+ def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
1727
+ """
1728
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1729
+ """
1730
+ return pulumi.get(self, "plugin_version")
1731
+
1732
+ @_builtins.property
1733
+ @pulumi.getter(name="rootPasswordTtl")
1734
+ def root_password_ttl(self) -> pulumi.Output[_builtins.int]:
1735
+ """
1736
+ The TTL in seconds of the root password in Azure when rotate-root generates a new client secret
1737
+ """
1738
+ return pulumi.get(self, "root_password_ttl")
1739
+
975
1740
  @_builtins.property
976
1741
  @pulumi.getter(name="rotationPeriod")
977
1742
  def rotation_period(self) -> pulumi.Output[Optional[_builtins.int]]:
@@ -1002,6 +1767,14 @@ class Backend(pulumi.CustomResource):
1002
1767
  """
1003
1768
  return pulumi.get(self, "rotation_window")
1004
1769
 
1770
+ @_builtins.property
1771
+ @pulumi.getter(name="sealWrap")
1772
+ def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
1773
+ """
1774
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1775
+ """
1776
+ return pulumi.get(self, "seal_wrap")
1777
+
1005
1778
  @_builtins.property
1006
1779
  @pulumi.getter(name="subscriptionId")
1007
1780
  def subscription_id(self) -> pulumi.Output[_builtins.str]: