pulumi-vault 7.2.0a1755240850__py3-none-any.whl → 7.2.0a1755574606__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -20,45 +20,78 @@ __all__ = ['SecretBackendArgs', 'SecretBackend']
20
20
  class SecretBackendArgs:
21
21
  def __init__(__self__, *,
22
22
  address: pulumi.Input[_builtins.str],
23
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
24
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
25
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
23
27
  bootstrap: Optional[pulumi.Input[_builtins.bool]] = None,
24
28
  ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
25
29
  client_cert: Optional[pulumi.Input[_builtins.str]] = None,
26
30
  client_key: Optional[pulumi.Input[_builtins.str]] = None,
27
31
  default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
32
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
28
33
  description: Optional[pulumi.Input[_builtins.str]] = None,
29
34
  disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
35
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
36
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
37
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
38
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
30
39
  local: Optional[pulumi.Input[_builtins.bool]] = None,
31
40
  max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
32
41
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
42
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
43
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
33
44
  path: Optional[pulumi.Input[_builtins.str]] = None,
45
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
34
46
  scheme: Optional[pulumi.Input[_builtins.str]] = None,
47
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
35
48
  token: Optional[pulumi.Input[_builtins.str]] = None):
36
49
  """
37
50
  The set of arguments for constructing a SecretBackend resource.
38
51
  :param pulumi.Input[_builtins.str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
52
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
53
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
54
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
55
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
39
56
  :param pulumi.Input[_builtins.bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
40
57
  :param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
41
58
  :param pulumi.Input[_builtins.str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
42
59
  this is set you need to also set client_key.
43
60
  :param pulumi.Input[_builtins.str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
44
61
  you need to also set client_cert.
45
- :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
62
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
63
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
46
64
  :param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
47
65
  :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
48
66
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
49
- :param pulumi.Input[_builtins.bool] local: Specifies if the secret backend is local only.
50
- :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
51
- for credentials issued by this backend.
67
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
68
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
69
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
70
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
71
+ :param pulumi.Input[_builtins.bool] local: Specifies if the secret backend is local only
72
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
52
73
  :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
53
74
  The value should not contain leading or trailing forward slashes.
54
75
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
55
76
  *Available only for Vault Enterprise*.
77
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
78
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
56
79
  :param pulumi.Input[_builtins.str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
57
80
  to `consul`.
81
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
58
82
  :param pulumi.Input[_builtins.str] scheme: Specifies the URL scheme to use. Defaults to `http`.
83
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
59
84
  :param pulumi.Input[_builtins.str] token: Specifies the Consul token to use when managing or issuing new tokens.
60
85
  """
61
86
  pulumi.set(__self__, "address", address)
87
+ if allowed_managed_keys is not None:
88
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
89
+ if allowed_response_headers is not None:
90
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
91
+ if audit_non_hmac_request_keys is not None:
92
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
93
+ if audit_non_hmac_response_keys is not None:
94
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
62
95
  if bootstrap is not None:
63
96
  pulumi.set(__self__, "bootstrap", bootstrap)
64
97
  if ca_cert is not None:
@@ -69,20 +102,38 @@ class SecretBackendArgs:
69
102
  pulumi.set(__self__, "client_key", client_key)
70
103
  if default_lease_ttl_seconds is not None:
71
104
  pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
105
+ if delegated_auth_accessors is not None:
106
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
72
107
  if description is not None:
73
108
  pulumi.set(__self__, "description", description)
74
109
  if disable_remount is not None:
75
110
  pulumi.set(__self__, "disable_remount", disable_remount)
111
+ if external_entropy_access is not None:
112
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
113
+ if force_no_cache is not None:
114
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
115
+ if identity_token_key is not None:
116
+ pulumi.set(__self__, "identity_token_key", identity_token_key)
117
+ if listing_visibility is not None:
118
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
76
119
  if local is not None:
77
120
  pulumi.set(__self__, "local", local)
78
121
  if max_lease_ttl_seconds is not None:
79
122
  pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
80
123
  if namespace is not None:
81
124
  pulumi.set(__self__, "namespace", namespace)
125
+ if options is not None:
126
+ pulumi.set(__self__, "options", options)
127
+ if passthrough_request_headers is not None:
128
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
82
129
  if path is not None:
83
130
  pulumi.set(__self__, "path", path)
131
+ if plugin_version is not None:
132
+ pulumi.set(__self__, "plugin_version", plugin_version)
84
133
  if scheme is not None:
85
134
  pulumi.set(__self__, "scheme", scheme)
135
+ if seal_wrap is not None:
136
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
86
137
  if token is not None:
87
138
  pulumi.set(__self__, "token", token)
88
139
 
@@ -98,6 +149,54 @@ class SecretBackendArgs:
98
149
  def address(self, value: pulumi.Input[_builtins.str]):
99
150
  pulumi.set(self, "address", value)
100
151
 
152
+ @_builtins.property
153
+ @pulumi.getter(name="allowedManagedKeys")
154
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
155
+ """
156
+ List of managed key registry entry names that the mount in question is allowed to access
157
+ """
158
+ return pulumi.get(self, "allowed_managed_keys")
159
+
160
+ @allowed_managed_keys.setter
161
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
162
+ pulumi.set(self, "allowed_managed_keys", value)
163
+
164
+ @_builtins.property
165
+ @pulumi.getter(name="allowedResponseHeaders")
166
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
167
+ """
168
+ List of headers to allow and pass from the request to the plugin
169
+ """
170
+ return pulumi.get(self, "allowed_response_headers")
171
+
172
+ @allowed_response_headers.setter
173
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
174
+ pulumi.set(self, "allowed_response_headers", value)
175
+
176
+ @_builtins.property
177
+ @pulumi.getter(name="auditNonHmacRequestKeys")
178
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
179
+ """
180
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
181
+ """
182
+ return pulumi.get(self, "audit_non_hmac_request_keys")
183
+
184
+ @audit_non_hmac_request_keys.setter
185
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
186
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
187
+
188
+ @_builtins.property
189
+ @pulumi.getter(name="auditNonHmacResponseKeys")
190
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
191
+ """
192
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
193
+ """
194
+ return pulumi.get(self, "audit_non_hmac_response_keys")
195
+
196
+ @audit_non_hmac_response_keys.setter
197
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
198
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
199
+
101
200
  @_builtins.property
102
201
  @pulumi.getter
103
202
  def bootstrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
@@ -152,7 +251,7 @@ class SecretBackendArgs:
152
251
  @pulumi.getter(name="defaultLeaseTtlSeconds")
153
252
  def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
154
253
  """
155
- The default TTL for credentials issued by this backend.
254
+ Default lease duration for secrets in seconds
156
255
  """
157
256
  return pulumi.get(self, "default_lease_ttl_seconds")
158
257
 
@@ -160,6 +259,18 @@ class SecretBackendArgs:
160
259
  def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
161
260
  pulumi.set(self, "default_lease_ttl_seconds", value)
162
261
 
262
+ @_builtins.property
263
+ @pulumi.getter(name="delegatedAuthAccessors")
264
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
265
+ """
266
+ List of headers to allow and pass from the request to the plugin
267
+ """
268
+ return pulumi.get(self, "delegated_auth_accessors")
269
+
270
+ @delegated_auth_accessors.setter
271
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
272
+ pulumi.set(self, "delegated_auth_accessors", value)
273
+
163
274
  @_builtins.property
164
275
  @pulumi.getter
165
276
  def description(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -185,11 +296,59 @@ class SecretBackendArgs:
185
296
  def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
186
297
  pulumi.set(self, "disable_remount", value)
187
298
 
299
+ @_builtins.property
300
+ @pulumi.getter(name="externalEntropyAccess")
301
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
302
+ """
303
+ Enable the secrets engine to access Vault's external entropy source
304
+ """
305
+ return pulumi.get(self, "external_entropy_access")
306
+
307
+ @external_entropy_access.setter
308
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
309
+ pulumi.set(self, "external_entropy_access", value)
310
+
311
+ @_builtins.property
312
+ @pulumi.getter(name="forceNoCache")
313
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
314
+ """
315
+ If set to true, disables caching.
316
+ """
317
+ return pulumi.get(self, "force_no_cache")
318
+
319
+ @force_no_cache.setter
320
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
321
+ pulumi.set(self, "force_no_cache", value)
322
+
323
+ @_builtins.property
324
+ @pulumi.getter(name="identityTokenKey")
325
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
326
+ """
327
+ The key to use for signing plugin workload identity tokens
328
+ """
329
+ return pulumi.get(self, "identity_token_key")
330
+
331
+ @identity_token_key.setter
332
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
333
+ pulumi.set(self, "identity_token_key", value)
334
+
335
+ @_builtins.property
336
+ @pulumi.getter(name="listingVisibility")
337
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
338
+ """
339
+ Specifies whether to show this mount in the UI-specific listing endpoint
340
+ """
341
+ return pulumi.get(self, "listing_visibility")
342
+
343
+ @listing_visibility.setter
344
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
345
+ pulumi.set(self, "listing_visibility", value)
346
+
188
347
  @_builtins.property
189
348
  @pulumi.getter
190
349
  def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
191
350
  """
192
- Specifies if the secret backend is local only.
351
+ Specifies if the secret backend is local only
193
352
  """
194
353
  return pulumi.get(self, "local")
195
354
 
@@ -201,8 +360,7 @@ class SecretBackendArgs:
201
360
  @pulumi.getter(name="maxLeaseTtlSeconds")
202
361
  def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
203
362
  """
204
- The maximum TTL that can be requested
205
- for credentials issued by this backend.
363
+ Maximum possible lease duration for secrets in seconds
206
364
  """
207
365
  return pulumi.get(self, "max_lease_ttl_seconds")
208
366
 
@@ -225,6 +383,30 @@ class SecretBackendArgs:
225
383
  def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
226
384
  pulumi.set(self, "namespace", value)
227
385
 
386
+ @_builtins.property
387
+ @pulumi.getter
388
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
389
+ """
390
+ Specifies mount type specific options that are passed to the backend
391
+ """
392
+ return pulumi.get(self, "options")
393
+
394
+ @options.setter
395
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
396
+ pulumi.set(self, "options", value)
397
+
398
+ @_builtins.property
399
+ @pulumi.getter(name="passthroughRequestHeaders")
400
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
401
+ """
402
+ List of headers to allow and pass from the request to the plugin
403
+ """
404
+ return pulumi.get(self, "passthrough_request_headers")
405
+
406
+ @passthrough_request_headers.setter
407
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
408
+ pulumi.set(self, "passthrough_request_headers", value)
409
+
228
410
  @_builtins.property
229
411
  @pulumi.getter
230
412
  def path(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -238,6 +420,18 @@ class SecretBackendArgs:
238
420
  def path(self, value: Optional[pulumi.Input[_builtins.str]]):
239
421
  pulumi.set(self, "path", value)
240
422
 
423
+ @_builtins.property
424
+ @pulumi.getter(name="pluginVersion")
425
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
426
+ """
427
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
428
+ """
429
+ return pulumi.get(self, "plugin_version")
430
+
431
+ @plugin_version.setter
432
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
433
+ pulumi.set(self, "plugin_version", value)
434
+
241
435
  @_builtins.property
242
436
  @pulumi.getter
243
437
  def scheme(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -250,6 +444,18 @@ class SecretBackendArgs:
250
444
  def scheme(self, value: Optional[pulumi.Input[_builtins.str]]):
251
445
  pulumi.set(self, "scheme", value)
252
446
 
447
+ @_builtins.property
448
+ @pulumi.getter(name="sealWrap")
449
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
450
+ """
451
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
452
+ """
453
+ return pulumi.get(self, "seal_wrap")
454
+
455
+ @seal_wrap.setter
456
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
457
+ pulumi.set(self, "seal_wrap", value)
458
+
253
459
  @_builtins.property
254
460
  @pulumi.getter
255
461
  def token(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -266,47 +472,84 @@ class SecretBackendArgs:
266
472
  @pulumi.input_type
267
473
  class _SecretBackendState:
268
474
  def __init__(__self__, *,
475
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
269
476
  address: Optional[pulumi.Input[_builtins.str]] = None,
477
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
478
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
479
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
480
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
270
481
  bootstrap: Optional[pulumi.Input[_builtins.bool]] = None,
271
482
  ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
272
483
  client_cert: Optional[pulumi.Input[_builtins.str]] = None,
273
484
  client_key: Optional[pulumi.Input[_builtins.str]] = None,
274
485
  default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
486
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
275
487
  description: Optional[pulumi.Input[_builtins.str]] = None,
276
488
  disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
489
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
490
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
491
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
492
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
277
493
  local: Optional[pulumi.Input[_builtins.bool]] = None,
278
494
  max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
279
495
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
496
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
497
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
280
498
  path: Optional[pulumi.Input[_builtins.str]] = None,
499
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
281
500
  scheme: Optional[pulumi.Input[_builtins.str]] = None,
501
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
282
502
  token: Optional[pulumi.Input[_builtins.str]] = None):
283
503
  """
284
504
  Input properties used for looking up and filtering SecretBackend resources.
505
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
285
506
  :param pulumi.Input[_builtins.str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
507
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
508
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
509
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
510
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
286
511
  :param pulumi.Input[_builtins.bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
287
512
  :param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
288
513
  :param pulumi.Input[_builtins.str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
289
514
  this is set you need to also set client_key.
290
515
  :param pulumi.Input[_builtins.str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
291
516
  you need to also set client_cert.
292
- :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
517
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
518
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
293
519
  :param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
294
520
  :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
295
521
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
296
- :param pulumi.Input[_builtins.bool] local: Specifies if the secret backend is local only.
297
- :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
298
- for credentials issued by this backend.
522
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
523
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
524
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
525
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
526
+ :param pulumi.Input[_builtins.bool] local: Specifies if the secret backend is local only
527
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
299
528
  :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
300
529
  The value should not contain leading or trailing forward slashes.
301
530
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
302
531
  *Available only for Vault Enterprise*.
532
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
533
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
303
534
  :param pulumi.Input[_builtins.str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
304
535
  to `consul`.
536
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
305
537
  :param pulumi.Input[_builtins.str] scheme: Specifies the URL scheme to use. Defaults to `http`.
538
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
306
539
  :param pulumi.Input[_builtins.str] token: Specifies the Consul token to use when managing or issuing new tokens.
307
540
  """
541
+ if accessor is not None:
542
+ pulumi.set(__self__, "accessor", accessor)
308
543
  if address is not None:
309
544
  pulumi.set(__self__, "address", address)
545
+ if allowed_managed_keys is not None:
546
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
547
+ if allowed_response_headers is not None:
548
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
549
+ if audit_non_hmac_request_keys is not None:
550
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
551
+ if audit_non_hmac_response_keys is not None:
552
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
310
553
  if bootstrap is not None:
311
554
  pulumi.set(__self__, "bootstrap", bootstrap)
312
555
  if ca_cert is not None:
@@ -317,23 +560,53 @@ class _SecretBackendState:
317
560
  pulumi.set(__self__, "client_key", client_key)
318
561
  if default_lease_ttl_seconds is not None:
319
562
  pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
563
+ if delegated_auth_accessors is not None:
564
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
320
565
  if description is not None:
321
566
  pulumi.set(__self__, "description", description)
322
567
  if disable_remount is not None:
323
568
  pulumi.set(__self__, "disable_remount", disable_remount)
569
+ if external_entropy_access is not None:
570
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
571
+ if force_no_cache is not None:
572
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
573
+ if identity_token_key is not None:
574
+ pulumi.set(__self__, "identity_token_key", identity_token_key)
575
+ if listing_visibility is not None:
576
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
324
577
  if local is not None:
325
578
  pulumi.set(__self__, "local", local)
326
579
  if max_lease_ttl_seconds is not None:
327
580
  pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
328
581
  if namespace is not None:
329
582
  pulumi.set(__self__, "namespace", namespace)
583
+ if options is not None:
584
+ pulumi.set(__self__, "options", options)
585
+ if passthrough_request_headers is not None:
586
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
330
587
  if path is not None:
331
588
  pulumi.set(__self__, "path", path)
589
+ if plugin_version is not None:
590
+ pulumi.set(__self__, "plugin_version", plugin_version)
332
591
  if scheme is not None:
333
592
  pulumi.set(__self__, "scheme", scheme)
593
+ if seal_wrap is not None:
594
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
334
595
  if token is not None:
335
596
  pulumi.set(__self__, "token", token)
336
597
 
598
+ @_builtins.property
599
+ @pulumi.getter
600
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
601
+ """
602
+ Accessor of the mount
603
+ """
604
+ return pulumi.get(self, "accessor")
605
+
606
+ @accessor.setter
607
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
608
+ pulumi.set(self, "accessor", value)
609
+
337
610
  @_builtins.property
338
611
  @pulumi.getter
339
612
  def address(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -346,6 +619,54 @@ class _SecretBackendState:
346
619
  def address(self, value: Optional[pulumi.Input[_builtins.str]]):
347
620
  pulumi.set(self, "address", value)
348
621
 
622
+ @_builtins.property
623
+ @pulumi.getter(name="allowedManagedKeys")
624
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
625
+ """
626
+ List of managed key registry entry names that the mount in question is allowed to access
627
+ """
628
+ return pulumi.get(self, "allowed_managed_keys")
629
+
630
+ @allowed_managed_keys.setter
631
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
632
+ pulumi.set(self, "allowed_managed_keys", value)
633
+
634
+ @_builtins.property
635
+ @pulumi.getter(name="allowedResponseHeaders")
636
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
637
+ """
638
+ List of headers to allow and pass from the request to the plugin
639
+ """
640
+ return pulumi.get(self, "allowed_response_headers")
641
+
642
+ @allowed_response_headers.setter
643
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
644
+ pulumi.set(self, "allowed_response_headers", value)
645
+
646
+ @_builtins.property
647
+ @pulumi.getter(name="auditNonHmacRequestKeys")
648
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
649
+ """
650
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
651
+ """
652
+ return pulumi.get(self, "audit_non_hmac_request_keys")
653
+
654
+ @audit_non_hmac_request_keys.setter
655
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
656
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
657
+
658
+ @_builtins.property
659
+ @pulumi.getter(name="auditNonHmacResponseKeys")
660
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
661
+ """
662
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
663
+ """
664
+ return pulumi.get(self, "audit_non_hmac_response_keys")
665
+
666
+ @audit_non_hmac_response_keys.setter
667
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
668
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
669
+
349
670
  @_builtins.property
350
671
  @pulumi.getter
351
672
  def bootstrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
@@ -400,7 +721,7 @@ class _SecretBackendState:
400
721
  @pulumi.getter(name="defaultLeaseTtlSeconds")
401
722
  def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
402
723
  """
403
- The default TTL for credentials issued by this backend.
724
+ Default lease duration for secrets in seconds
404
725
  """
405
726
  return pulumi.get(self, "default_lease_ttl_seconds")
406
727
 
@@ -408,6 +729,18 @@ class _SecretBackendState:
408
729
  def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
409
730
  pulumi.set(self, "default_lease_ttl_seconds", value)
410
731
 
732
+ @_builtins.property
733
+ @pulumi.getter(name="delegatedAuthAccessors")
734
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
735
+ """
736
+ List of headers to allow and pass from the request to the plugin
737
+ """
738
+ return pulumi.get(self, "delegated_auth_accessors")
739
+
740
+ @delegated_auth_accessors.setter
741
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
742
+ pulumi.set(self, "delegated_auth_accessors", value)
743
+
411
744
  @_builtins.property
412
745
  @pulumi.getter
413
746
  def description(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -433,11 +766,59 @@ class _SecretBackendState:
433
766
  def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
434
767
  pulumi.set(self, "disable_remount", value)
435
768
 
769
+ @_builtins.property
770
+ @pulumi.getter(name="externalEntropyAccess")
771
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
772
+ """
773
+ Enable the secrets engine to access Vault's external entropy source
774
+ """
775
+ return pulumi.get(self, "external_entropy_access")
776
+
777
+ @external_entropy_access.setter
778
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
779
+ pulumi.set(self, "external_entropy_access", value)
780
+
781
+ @_builtins.property
782
+ @pulumi.getter(name="forceNoCache")
783
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
784
+ """
785
+ If set to true, disables caching.
786
+ """
787
+ return pulumi.get(self, "force_no_cache")
788
+
789
+ @force_no_cache.setter
790
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
791
+ pulumi.set(self, "force_no_cache", value)
792
+
793
+ @_builtins.property
794
+ @pulumi.getter(name="identityTokenKey")
795
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
796
+ """
797
+ The key to use for signing plugin workload identity tokens
798
+ """
799
+ return pulumi.get(self, "identity_token_key")
800
+
801
+ @identity_token_key.setter
802
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
803
+ pulumi.set(self, "identity_token_key", value)
804
+
805
+ @_builtins.property
806
+ @pulumi.getter(name="listingVisibility")
807
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
808
+ """
809
+ Specifies whether to show this mount in the UI-specific listing endpoint
810
+ """
811
+ return pulumi.get(self, "listing_visibility")
812
+
813
+ @listing_visibility.setter
814
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
815
+ pulumi.set(self, "listing_visibility", value)
816
+
436
817
  @_builtins.property
437
818
  @pulumi.getter
438
819
  def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
439
820
  """
440
- Specifies if the secret backend is local only.
821
+ Specifies if the secret backend is local only
441
822
  """
442
823
  return pulumi.get(self, "local")
443
824
 
@@ -449,8 +830,7 @@ class _SecretBackendState:
449
830
  @pulumi.getter(name="maxLeaseTtlSeconds")
450
831
  def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
451
832
  """
452
- The maximum TTL that can be requested
453
- for credentials issued by this backend.
833
+ Maximum possible lease duration for secrets in seconds
454
834
  """
455
835
  return pulumi.get(self, "max_lease_ttl_seconds")
456
836
 
@@ -473,6 +853,30 @@ class _SecretBackendState:
473
853
  def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
474
854
  pulumi.set(self, "namespace", value)
475
855
 
856
+ @_builtins.property
857
+ @pulumi.getter
858
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
859
+ """
860
+ Specifies mount type specific options that are passed to the backend
861
+ """
862
+ return pulumi.get(self, "options")
863
+
864
+ @options.setter
865
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
866
+ pulumi.set(self, "options", value)
867
+
868
+ @_builtins.property
869
+ @pulumi.getter(name="passthroughRequestHeaders")
870
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
871
+ """
872
+ List of headers to allow and pass from the request to the plugin
873
+ """
874
+ return pulumi.get(self, "passthrough_request_headers")
875
+
876
+ @passthrough_request_headers.setter
877
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
878
+ pulumi.set(self, "passthrough_request_headers", value)
879
+
476
880
  @_builtins.property
477
881
  @pulumi.getter
478
882
  def path(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -486,6 +890,18 @@ class _SecretBackendState:
486
890
  def path(self, value: Optional[pulumi.Input[_builtins.str]]):
487
891
  pulumi.set(self, "path", value)
488
892
 
893
+ @_builtins.property
894
+ @pulumi.getter(name="pluginVersion")
895
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
896
+ """
897
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
898
+ """
899
+ return pulumi.get(self, "plugin_version")
900
+
901
+ @plugin_version.setter
902
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
903
+ pulumi.set(self, "plugin_version", value)
904
+
489
905
  @_builtins.property
490
906
  @pulumi.getter
491
907
  def scheme(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -498,6 +914,18 @@ class _SecretBackendState:
498
914
  def scheme(self, value: Optional[pulumi.Input[_builtins.str]]):
499
915
  pulumi.set(self, "scheme", value)
500
916
 
917
+ @_builtins.property
918
+ @pulumi.getter(name="sealWrap")
919
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
920
+ """
921
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
922
+ """
923
+ return pulumi.get(self, "seal_wrap")
924
+
925
+ @seal_wrap.setter
926
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
927
+ pulumi.set(self, "seal_wrap", value)
928
+
501
929
  @_builtins.property
502
930
  @pulumi.getter
503
931
  def token(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -518,18 +946,31 @@ class SecretBackend(pulumi.CustomResource):
518
946
  resource_name: str,
519
947
  opts: Optional[pulumi.ResourceOptions] = None,
520
948
  address: Optional[pulumi.Input[_builtins.str]] = None,
949
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
950
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
951
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
952
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
521
953
  bootstrap: Optional[pulumi.Input[_builtins.bool]] = None,
522
954
  ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
523
955
  client_cert: Optional[pulumi.Input[_builtins.str]] = None,
524
956
  client_key: Optional[pulumi.Input[_builtins.str]] = None,
525
957
  default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
958
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
526
959
  description: Optional[pulumi.Input[_builtins.str]] = None,
527
960
  disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
961
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
962
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
963
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
964
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
528
965
  local: Optional[pulumi.Input[_builtins.bool]] = None,
529
966
  max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
530
967
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
968
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
969
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
531
970
  path: Optional[pulumi.Input[_builtins.str]] = None,
971
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
532
972
  scheme: Optional[pulumi.Input[_builtins.str]] = None,
973
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
533
974
  token: Optional[pulumi.Input[_builtins.str]] = None,
534
975
  __props__=None):
535
976
  """
@@ -570,26 +1011,38 @@ class SecretBackend(pulumi.CustomResource):
570
1011
  :param str resource_name: The name of the resource.
571
1012
  :param pulumi.ResourceOptions opts: Options for the resource.
572
1013
  :param pulumi.Input[_builtins.str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
1014
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1015
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1016
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1017
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
573
1018
  :param pulumi.Input[_builtins.bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
574
1019
  :param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
575
1020
  :param pulumi.Input[_builtins.str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
576
1021
  this is set you need to also set client_key.
577
1022
  :param pulumi.Input[_builtins.str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
578
1023
  you need to also set client_cert.
579
- :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
1024
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
1025
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
580
1026
  :param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
581
1027
  :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
582
1028
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
583
- :param pulumi.Input[_builtins.bool] local: Specifies if the secret backend is local only.
584
- :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
585
- for credentials issued by this backend.
1029
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1030
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1031
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1032
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1033
+ :param pulumi.Input[_builtins.bool] local: Specifies if the secret backend is local only
1034
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
586
1035
  :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
587
1036
  The value should not contain leading or trailing forward slashes.
588
1037
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
589
1038
  *Available only for Vault Enterprise*.
1039
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1040
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
590
1041
  :param pulumi.Input[_builtins.str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
591
1042
  to `consul`.
1043
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
592
1044
  :param pulumi.Input[_builtins.str] scheme: Specifies the URL scheme to use. Defaults to `http`.
1045
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
593
1046
  :param pulumi.Input[_builtins.str] token: Specifies the Consul token to use when managing or issuing new tokens.
594
1047
  """
595
1048
  ...
@@ -649,18 +1102,31 @@ class SecretBackend(pulumi.CustomResource):
649
1102
  resource_name: str,
650
1103
  opts: Optional[pulumi.ResourceOptions] = None,
651
1104
  address: Optional[pulumi.Input[_builtins.str]] = None,
1105
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1106
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1107
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1108
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
652
1109
  bootstrap: Optional[pulumi.Input[_builtins.bool]] = None,
653
1110
  ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
654
1111
  client_cert: Optional[pulumi.Input[_builtins.str]] = None,
655
1112
  client_key: Optional[pulumi.Input[_builtins.str]] = None,
656
1113
  default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1114
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
657
1115
  description: Optional[pulumi.Input[_builtins.str]] = None,
658
1116
  disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1117
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1118
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1119
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1120
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
659
1121
  local: Optional[pulumi.Input[_builtins.bool]] = None,
660
1122
  max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
661
1123
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
1124
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1125
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
662
1126
  path: Optional[pulumi.Input[_builtins.str]] = None,
1127
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
663
1128
  scheme: Optional[pulumi.Input[_builtins.str]] = None,
1129
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
664
1130
  token: Optional[pulumi.Input[_builtins.str]] = None,
665
1131
  __props__=None):
666
1132
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
@@ -674,19 +1140,33 @@ class SecretBackend(pulumi.CustomResource):
674
1140
  if address is None and not opts.urn:
675
1141
  raise TypeError("Missing required property 'address'")
676
1142
  __props__.__dict__["address"] = address
1143
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1144
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1145
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1146
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
677
1147
  __props__.__dict__["bootstrap"] = bootstrap
678
1148
  __props__.__dict__["ca_cert"] = ca_cert
679
1149
  __props__.__dict__["client_cert"] = None if client_cert is None else pulumi.Output.secret(client_cert)
680
1150
  __props__.__dict__["client_key"] = None if client_key is None else pulumi.Output.secret(client_key)
681
1151
  __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1152
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
682
1153
  __props__.__dict__["description"] = description
683
1154
  __props__.__dict__["disable_remount"] = disable_remount
1155
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1156
+ __props__.__dict__["force_no_cache"] = force_no_cache
1157
+ __props__.__dict__["identity_token_key"] = identity_token_key
1158
+ __props__.__dict__["listing_visibility"] = listing_visibility
684
1159
  __props__.__dict__["local"] = local
685
1160
  __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
686
1161
  __props__.__dict__["namespace"] = namespace
1162
+ __props__.__dict__["options"] = options
1163
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
687
1164
  __props__.__dict__["path"] = path
1165
+ __props__.__dict__["plugin_version"] = plugin_version
688
1166
  __props__.__dict__["scheme"] = scheme
1167
+ __props__.__dict__["seal_wrap"] = seal_wrap
689
1168
  __props__.__dict__["token"] = None if token is None else pulumi.Output.secret(token)
1169
+ __props__.__dict__["accessor"] = None
690
1170
  secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["clientCert", "clientKey", "token"])
691
1171
  opts = pulumi.ResourceOptions.merge(opts, secret_opts)
692
1172
  super(SecretBackend, __self__).__init__(
@@ -699,19 +1179,33 @@ class SecretBackend(pulumi.CustomResource):
699
1179
  def get(resource_name: str,
700
1180
  id: pulumi.Input[str],
701
1181
  opts: Optional[pulumi.ResourceOptions] = None,
1182
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
702
1183
  address: Optional[pulumi.Input[_builtins.str]] = None,
1184
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1185
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1186
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1187
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
703
1188
  bootstrap: Optional[pulumi.Input[_builtins.bool]] = None,
704
1189
  ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
705
1190
  client_cert: Optional[pulumi.Input[_builtins.str]] = None,
706
1191
  client_key: Optional[pulumi.Input[_builtins.str]] = None,
707
1192
  default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1193
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
708
1194
  description: Optional[pulumi.Input[_builtins.str]] = None,
709
1195
  disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1196
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1197
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1198
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1199
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
710
1200
  local: Optional[pulumi.Input[_builtins.bool]] = None,
711
1201
  max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
712
1202
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
1203
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1204
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
713
1205
  path: Optional[pulumi.Input[_builtins.str]] = None,
1206
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
714
1207
  scheme: Optional[pulumi.Input[_builtins.str]] = None,
1208
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
715
1209
  token: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackend':
716
1210
  """
717
1211
  Get an existing SecretBackend resource's state with the given name, id, and optional extra
@@ -720,49 +1214,84 @@ class SecretBackend(pulumi.CustomResource):
720
1214
  :param str resource_name: The unique name of the resulting resource.
721
1215
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
722
1216
  :param pulumi.ResourceOptions opts: Options for the resource.
1217
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
723
1218
  :param pulumi.Input[_builtins.str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
1219
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1220
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1221
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1222
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
724
1223
  :param pulumi.Input[_builtins.bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
725
1224
  :param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
726
1225
  :param pulumi.Input[_builtins.str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
727
1226
  this is set you need to also set client_key.
728
1227
  :param pulumi.Input[_builtins.str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
729
1228
  you need to also set client_cert.
730
- :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
1229
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
1230
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
731
1231
  :param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
732
1232
  :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
733
1233
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
734
- :param pulumi.Input[_builtins.bool] local: Specifies if the secret backend is local only.
735
- :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
736
- for credentials issued by this backend.
1234
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1235
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1236
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1237
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1238
+ :param pulumi.Input[_builtins.bool] local: Specifies if the secret backend is local only
1239
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
737
1240
  :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
738
1241
  The value should not contain leading or trailing forward slashes.
739
1242
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
740
1243
  *Available only for Vault Enterprise*.
1244
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1245
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
741
1246
  :param pulumi.Input[_builtins.str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
742
1247
  to `consul`.
1248
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
743
1249
  :param pulumi.Input[_builtins.str] scheme: Specifies the URL scheme to use. Defaults to `http`.
1250
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
744
1251
  :param pulumi.Input[_builtins.str] token: Specifies the Consul token to use when managing or issuing new tokens.
745
1252
  """
746
1253
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
747
1254
 
748
1255
  __props__ = _SecretBackendState.__new__(_SecretBackendState)
749
1256
 
1257
+ __props__.__dict__["accessor"] = accessor
750
1258
  __props__.__dict__["address"] = address
1259
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1260
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1261
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1262
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
751
1263
  __props__.__dict__["bootstrap"] = bootstrap
752
1264
  __props__.__dict__["ca_cert"] = ca_cert
753
1265
  __props__.__dict__["client_cert"] = client_cert
754
1266
  __props__.__dict__["client_key"] = client_key
755
1267
  __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1268
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
756
1269
  __props__.__dict__["description"] = description
757
1270
  __props__.__dict__["disable_remount"] = disable_remount
1271
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1272
+ __props__.__dict__["force_no_cache"] = force_no_cache
1273
+ __props__.__dict__["identity_token_key"] = identity_token_key
1274
+ __props__.__dict__["listing_visibility"] = listing_visibility
758
1275
  __props__.__dict__["local"] = local
759
1276
  __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
760
1277
  __props__.__dict__["namespace"] = namespace
1278
+ __props__.__dict__["options"] = options
1279
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
761
1280
  __props__.__dict__["path"] = path
1281
+ __props__.__dict__["plugin_version"] = plugin_version
762
1282
  __props__.__dict__["scheme"] = scheme
1283
+ __props__.__dict__["seal_wrap"] = seal_wrap
763
1284
  __props__.__dict__["token"] = token
764
1285
  return SecretBackend(resource_name, opts=opts, __props__=__props__)
765
1286
 
1287
+ @_builtins.property
1288
+ @pulumi.getter
1289
+ def accessor(self) -> pulumi.Output[_builtins.str]:
1290
+ """
1291
+ Accessor of the mount
1292
+ """
1293
+ return pulumi.get(self, "accessor")
1294
+
766
1295
  @_builtins.property
767
1296
  @pulumi.getter
768
1297
  def address(self) -> pulumi.Output[_builtins.str]:
@@ -771,6 +1300,38 @@ class SecretBackend(pulumi.CustomResource):
771
1300
  """
772
1301
  return pulumi.get(self, "address")
773
1302
 
1303
+ @_builtins.property
1304
+ @pulumi.getter(name="allowedManagedKeys")
1305
+ def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1306
+ """
1307
+ List of managed key registry entry names that the mount in question is allowed to access
1308
+ """
1309
+ return pulumi.get(self, "allowed_managed_keys")
1310
+
1311
+ @_builtins.property
1312
+ @pulumi.getter(name="allowedResponseHeaders")
1313
+ def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1314
+ """
1315
+ List of headers to allow and pass from the request to the plugin
1316
+ """
1317
+ return pulumi.get(self, "allowed_response_headers")
1318
+
1319
+ @_builtins.property
1320
+ @pulumi.getter(name="auditNonHmacRequestKeys")
1321
+ def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1322
+ """
1323
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1324
+ """
1325
+ return pulumi.get(self, "audit_non_hmac_request_keys")
1326
+
1327
+ @_builtins.property
1328
+ @pulumi.getter(name="auditNonHmacResponseKeys")
1329
+ def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1330
+ """
1331
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1332
+ """
1333
+ return pulumi.get(self, "audit_non_hmac_response_keys")
1334
+
774
1335
  @_builtins.property
775
1336
  @pulumi.getter
776
1337
  def bootstrap(self) -> pulumi.Output[Optional[_builtins.bool]]:
@@ -809,10 +1370,18 @@ class SecretBackend(pulumi.CustomResource):
809
1370
  @pulumi.getter(name="defaultLeaseTtlSeconds")
810
1371
  def default_lease_ttl_seconds(self) -> pulumi.Output[Optional[_builtins.int]]:
811
1372
  """
812
- The default TTL for credentials issued by this backend.
1373
+ Default lease duration for secrets in seconds
813
1374
  """
814
1375
  return pulumi.get(self, "default_lease_ttl_seconds")
815
1376
 
1377
+ @_builtins.property
1378
+ @pulumi.getter(name="delegatedAuthAccessors")
1379
+ def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1380
+ """
1381
+ List of headers to allow and pass from the request to the plugin
1382
+ """
1383
+ return pulumi.get(self, "delegated_auth_accessors")
1384
+
816
1385
  @_builtins.property
817
1386
  @pulumi.getter
818
1387
  def description(self) -> pulumi.Output[Optional[_builtins.str]]:
@@ -830,11 +1399,43 @@ class SecretBackend(pulumi.CustomResource):
830
1399
  """
831
1400
  return pulumi.get(self, "disable_remount")
832
1401
 
1402
+ @_builtins.property
1403
+ @pulumi.getter(name="externalEntropyAccess")
1404
+ def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
1405
+ """
1406
+ Enable the secrets engine to access Vault's external entropy source
1407
+ """
1408
+ return pulumi.get(self, "external_entropy_access")
1409
+
1410
+ @_builtins.property
1411
+ @pulumi.getter(name="forceNoCache")
1412
+ def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
1413
+ """
1414
+ If set to true, disables caching.
1415
+ """
1416
+ return pulumi.get(self, "force_no_cache")
1417
+
1418
+ @_builtins.property
1419
+ @pulumi.getter(name="identityTokenKey")
1420
+ def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
1421
+ """
1422
+ The key to use for signing plugin workload identity tokens
1423
+ """
1424
+ return pulumi.get(self, "identity_token_key")
1425
+
1426
+ @_builtins.property
1427
+ @pulumi.getter(name="listingVisibility")
1428
+ def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
1429
+ """
1430
+ Specifies whether to show this mount in the UI-specific listing endpoint
1431
+ """
1432
+ return pulumi.get(self, "listing_visibility")
1433
+
833
1434
  @_builtins.property
834
1435
  @pulumi.getter
835
1436
  def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
836
1437
  """
837
- Specifies if the secret backend is local only.
1438
+ Specifies if the secret backend is local only
838
1439
  """
839
1440
  return pulumi.get(self, "local")
840
1441
 
@@ -842,8 +1443,7 @@ class SecretBackend(pulumi.CustomResource):
842
1443
  @pulumi.getter(name="maxLeaseTtlSeconds")
843
1444
  def max_lease_ttl_seconds(self) -> pulumi.Output[Optional[_builtins.int]]:
844
1445
  """
845
- The maximum TTL that can be requested
846
- for credentials issued by this backend.
1446
+ Maximum possible lease duration for secrets in seconds
847
1447
  """
848
1448
  return pulumi.get(self, "max_lease_ttl_seconds")
849
1449
 
@@ -858,6 +1458,22 @@ class SecretBackend(pulumi.CustomResource):
858
1458
  """
859
1459
  return pulumi.get(self, "namespace")
860
1460
 
1461
+ @_builtins.property
1462
+ @pulumi.getter
1463
+ def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
1464
+ """
1465
+ Specifies mount type specific options that are passed to the backend
1466
+ """
1467
+ return pulumi.get(self, "options")
1468
+
1469
+ @_builtins.property
1470
+ @pulumi.getter(name="passthroughRequestHeaders")
1471
+ def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1472
+ """
1473
+ List of headers to allow and pass from the request to the plugin
1474
+ """
1475
+ return pulumi.get(self, "passthrough_request_headers")
1476
+
861
1477
  @_builtins.property
862
1478
  @pulumi.getter
863
1479
  def path(self) -> pulumi.Output[Optional[_builtins.str]]:
@@ -867,6 +1483,14 @@ class SecretBackend(pulumi.CustomResource):
867
1483
  """
868
1484
  return pulumi.get(self, "path")
869
1485
 
1486
+ @_builtins.property
1487
+ @pulumi.getter(name="pluginVersion")
1488
+ def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
1489
+ """
1490
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1491
+ """
1492
+ return pulumi.get(self, "plugin_version")
1493
+
870
1494
  @_builtins.property
871
1495
  @pulumi.getter
872
1496
  def scheme(self) -> pulumi.Output[Optional[_builtins.str]]:
@@ -875,6 +1499,14 @@ class SecretBackend(pulumi.CustomResource):
875
1499
  """
876
1500
  return pulumi.get(self, "scheme")
877
1501
 
1502
+ @_builtins.property
1503
+ @pulumi.getter(name="sealWrap")
1504
+ def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
1505
+ """
1506
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1507
+ """
1508
+ return pulumi.get(self, "seal_wrap")
1509
+
878
1510
  @_builtins.property
879
1511
  @pulumi.getter
880
1512
  def token(self) -> pulumi.Output[Optional[_builtins.str]]: