pulumi-vault 7.2.0a1755297899__py3-none-any.whl → 7.2.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -20,24 +20,41 @@ __all__ = ['NomadSecretBackendArgs', 'NomadSecretBackend']
20
20
  class NomadSecretBackendArgs:
21
21
  def __init__(__self__, *,
22
22
  address: Optional[pulumi.Input[_builtins.str]] = None,
23
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
24
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
25
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
23
27
  backend: Optional[pulumi.Input[_builtins.str]] = None,
24
28
  ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
25
29
  client_cert: Optional[pulumi.Input[_builtins.str]] = None,
26
30
  client_key: Optional[pulumi.Input[_builtins.str]] = None,
27
31
  default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
32
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
28
33
  description: Optional[pulumi.Input[_builtins.str]] = None,
29
34
  disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
35
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
36
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
37
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
38
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
30
39
  local: Optional[pulumi.Input[_builtins.bool]] = None,
31
40
  max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
32
41
  max_token_name_length: Optional[pulumi.Input[_builtins.int]] = None,
33
42
  max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
34
43
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
44
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
45
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
46
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
47
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
35
48
  token: Optional[pulumi.Input[_builtins.str]] = None,
36
49
  ttl: Optional[pulumi.Input[_builtins.int]] = None):
37
50
  """
38
51
  The set of arguments for constructing a NomadSecretBackend resource.
39
52
  :param pulumi.Input[_builtins.str] address: Specifies the address of the Nomad instance, provided
40
53
  as "protocol://host:port" like "http://127.0.0.1:4646".
54
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
55
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
56
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
57
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
41
58
  :param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at. Must
42
59
  not begin or end with a `/`. Defaults to `nomad`.
43
60
  :param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
@@ -45,11 +62,16 @@ class NomadSecretBackendArgs:
45
62
  :param pulumi.Input[_builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
46
63
  :param pulumi.Input[_builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
47
64
  :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
48
- :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
65
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
66
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
49
67
  :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
50
68
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
51
- :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
52
- replication.Tolerance duration to use when checking the last rotation time.
69
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
70
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
71
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
72
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
73
+ :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
74
+ use when checking the last rotation time.
53
75
  :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
54
76
  :param pulumi.Input[_builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
55
77
  generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
@@ -59,11 +81,23 @@ class NomadSecretBackendArgs:
59
81
  The value should not contain leading or trailing forward slashes.
60
82
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
61
83
  *Available only for Vault Enterprise*.
84
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
85
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
86
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
87
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
62
88
  :param pulumi.Input[_builtins.str] token: Specifies the Nomad Management token to use.
63
89
  :param pulumi.Input[_builtins.int] ttl: Specifies the ttl of the lease for the generated token.
64
90
  """
65
91
  if address is not None:
66
92
  pulumi.set(__self__, "address", address)
93
+ if allowed_managed_keys is not None:
94
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
95
+ if allowed_response_headers is not None:
96
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
97
+ if audit_non_hmac_request_keys is not None:
98
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
99
+ if audit_non_hmac_response_keys is not None:
100
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
67
101
  if backend is not None:
68
102
  pulumi.set(__self__, "backend", backend)
69
103
  if ca_cert is not None:
@@ -74,10 +108,20 @@ class NomadSecretBackendArgs:
74
108
  pulumi.set(__self__, "client_key", client_key)
75
109
  if default_lease_ttl_seconds is not None:
76
110
  pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
111
+ if delegated_auth_accessors is not None:
112
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
77
113
  if description is not None:
78
114
  pulumi.set(__self__, "description", description)
79
115
  if disable_remount is not None:
80
116
  pulumi.set(__self__, "disable_remount", disable_remount)
117
+ if external_entropy_access is not None:
118
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
119
+ if force_no_cache is not None:
120
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
121
+ if identity_token_key is not None:
122
+ pulumi.set(__self__, "identity_token_key", identity_token_key)
123
+ if listing_visibility is not None:
124
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
81
125
  if local is not None:
82
126
  pulumi.set(__self__, "local", local)
83
127
  if max_lease_ttl_seconds is not None:
@@ -88,6 +132,14 @@ class NomadSecretBackendArgs:
88
132
  pulumi.set(__self__, "max_ttl", max_ttl)
89
133
  if namespace is not None:
90
134
  pulumi.set(__self__, "namespace", namespace)
135
+ if options is not None:
136
+ pulumi.set(__self__, "options", options)
137
+ if passthrough_request_headers is not None:
138
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
139
+ if plugin_version is not None:
140
+ pulumi.set(__self__, "plugin_version", plugin_version)
141
+ if seal_wrap is not None:
142
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
91
143
  if token is not None:
92
144
  pulumi.set(__self__, "token", token)
93
145
  if ttl is not None:
@@ -106,6 +158,54 @@ class NomadSecretBackendArgs:
106
158
  def address(self, value: Optional[pulumi.Input[_builtins.str]]):
107
159
  pulumi.set(self, "address", value)
108
160
 
161
+ @_builtins.property
162
+ @pulumi.getter(name="allowedManagedKeys")
163
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
164
+ """
165
+ List of managed key registry entry names that the mount in question is allowed to access
166
+ """
167
+ return pulumi.get(self, "allowed_managed_keys")
168
+
169
+ @allowed_managed_keys.setter
170
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
171
+ pulumi.set(self, "allowed_managed_keys", value)
172
+
173
+ @_builtins.property
174
+ @pulumi.getter(name="allowedResponseHeaders")
175
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
176
+ """
177
+ List of headers to allow and pass from the request to the plugin
178
+ """
179
+ return pulumi.get(self, "allowed_response_headers")
180
+
181
+ @allowed_response_headers.setter
182
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
183
+ pulumi.set(self, "allowed_response_headers", value)
184
+
185
+ @_builtins.property
186
+ @pulumi.getter(name="auditNonHmacRequestKeys")
187
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
188
+ """
189
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
190
+ """
191
+ return pulumi.get(self, "audit_non_hmac_request_keys")
192
+
193
+ @audit_non_hmac_request_keys.setter
194
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
195
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
196
+
197
+ @_builtins.property
198
+ @pulumi.getter(name="auditNonHmacResponseKeys")
199
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
200
+ """
201
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
202
+ """
203
+ return pulumi.get(self, "audit_non_hmac_response_keys")
204
+
205
+ @audit_non_hmac_response_keys.setter
206
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
207
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
208
+
109
209
  @_builtins.property
110
210
  @pulumi.getter
111
211
  def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -168,11 +268,23 @@ class NomadSecretBackendArgs:
168
268
  def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
169
269
  pulumi.set(self, "default_lease_ttl_seconds", value)
170
270
 
271
+ @_builtins.property
272
+ @pulumi.getter(name="delegatedAuthAccessors")
273
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
274
+ """
275
+ List of headers to allow and pass from the request to the plugin
276
+ """
277
+ return pulumi.get(self, "delegated_auth_accessors")
278
+
279
+ @delegated_auth_accessors.setter
280
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
281
+ pulumi.set(self, "delegated_auth_accessors", value)
282
+
171
283
  @_builtins.property
172
284
  @pulumi.getter
173
285
  def description(self) -> Optional[pulumi.Input[_builtins.str]]:
174
286
  """
175
- Human-friendly description of the mount for the Active Directory backend.
287
+ Human-friendly description of the mount for the backend.
176
288
  """
177
289
  return pulumi.get(self, "description")
178
290
 
@@ -193,12 +305,60 @@ class NomadSecretBackendArgs:
193
305
  def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
194
306
  pulumi.set(self, "disable_remount", value)
195
307
 
308
+ @_builtins.property
309
+ @pulumi.getter(name="externalEntropyAccess")
310
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
311
+ """
312
+ Enable the secrets engine to access Vault's external entropy source
313
+ """
314
+ return pulumi.get(self, "external_entropy_access")
315
+
316
+ @external_entropy_access.setter
317
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
318
+ pulumi.set(self, "external_entropy_access", value)
319
+
320
+ @_builtins.property
321
+ @pulumi.getter(name="forceNoCache")
322
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
323
+ """
324
+ If set to true, disables caching.
325
+ """
326
+ return pulumi.get(self, "force_no_cache")
327
+
328
+ @force_no_cache.setter
329
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
330
+ pulumi.set(self, "force_no_cache", value)
331
+
332
+ @_builtins.property
333
+ @pulumi.getter(name="identityTokenKey")
334
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
335
+ """
336
+ The key to use for signing plugin workload identity tokens
337
+ """
338
+ return pulumi.get(self, "identity_token_key")
339
+
340
+ @identity_token_key.setter
341
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
342
+ pulumi.set(self, "identity_token_key", value)
343
+
344
+ @_builtins.property
345
+ @pulumi.getter(name="listingVisibility")
346
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
347
+ """
348
+ Specifies whether to show this mount in the UI-specific listing endpoint
349
+ """
350
+ return pulumi.get(self, "listing_visibility")
351
+
352
+ @listing_visibility.setter
353
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
354
+ pulumi.set(self, "listing_visibility", value)
355
+
196
356
  @_builtins.property
197
357
  @pulumi.getter
198
358
  def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
199
359
  """
200
- Mark the secrets engine as local-only. Local engines are not replicated or removed by
201
- replication.Tolerance duration to use when checking the last rotation time.
360
+ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
361
+ use when checking the last rotation time.
202
362
  """
203
363
  return pulumi.get(self, "local")
204
364
 
@@ -259,6 +419,54 @@ class NomadSecretBackendArgs:
259
419
  def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
260
420
  pulumi.set(self, "namespace", value)
261
421
 
422
+ @_builtins.property
423
+ @pulumi.getter
424
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
425
+ """
426
+ Specifies mount type specific options that are passed to the backend
427
+ """
428
+ return pulumi.get(self, "options")
429
+
430
+ @options.setter
431
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
432
+ pulumi.set(self, "options", value)
433
+
434
+ @_builtins.property
435
+ @pulumi.getter(name="passthroughRequestHeaders")
436
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
437
+ """
438
+ List of headers to allow and pass from the request to the plugin
439
+ """
440
+ return pulumi.get(self, "passthrough_request_headers")
441
+
442
+ @passthrough_request_headers.setter
443
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
444
+ pulumi.set(self, "passthrough_request_headers", value)
445
+
446
+ @_builtins.property
447
+ @pulumi.getter(name="pluginVersion")
448
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
449
+ """
450
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
451
+ """
452
+ return pulumi.get(self, "plugin_version")
453
+
454
+ @plugin_version.setter
455
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
456
+ pulumi.set(self, "plugin_version", value)
457
+
458
+ @_builtins.property
459
+ @pulumi.getter(name="sealWrap")
460
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
461
+ """
462
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
463
+ """
464
+ return pulumi.get(self, "seal_wrap")
465
+
466
+ @seal_wrap.setter
467
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
468
+ pulumi.set(self, "seal_wrap", value)
469
+
262
470
  @_builtins.property
263
471
  @pulumi.getter
264
472
  def token(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -287,25 +495,44 @@ class NomadSecretBackendArgs:
287
495
  @pulumi.input_type
288
496
  class _NomadSecretBackendState:
289
497
  def __init__(__self__, *,
498
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
290
499
  address: Optional[pulumi.Input[_builtins.str]] = None,
500
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
501
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
502
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
503
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
291
504
  backend: Optional[pulumi.Input[_builtins.str]] = None,
292
505
  ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
293
506
  client_cert: Optional[pulumi.Input[_builtins.str]] = None,
294
507
  client_key: Optional[pulumi.Input[_builtins.str]] = None,
295
508
  default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
509
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
296
510
  description: Optional[pulumi.Input[_builtins.str]] = None,
297
511
  disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
512
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
513
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
514
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
515
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
298
516
  local: Optional[pulumi.Input[_builtins.bool]] = None,
299
517
  max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
300
518
  max_token_name_length: Optional[pulumi.Input[_builtins.int]] = None,
301
519
  max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
302
520
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
521
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
522
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
523
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
524
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
303
525
  token: Optional[pulumi.Input[_builtins.str]] = None,
304
526
  ttl: Optional[pulumi.Input[_builtins.int]] = None):
305
527
  """
306
528
  Input properties used for looking up and filtering NomadSecretBackend resources.
529
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
307
530
  :param pulumi.Input[_builtins.str] address: Specifies the address of the Nomad instance, provided
308
531
  as "protocol://host:port" like "http://127.0.0.1:4646".
532
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
533
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
534
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
535
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
309
536
  :param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at. Must
310
537
  not begin or end with a `/`. Defaults to `nomad`.
311
538
  :param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
@@ -313,11 +540,16 @@ class _NomadSecretBackendState:
313
540
  :param pulumi.Input[_builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
314
541
  :param pulumi.Input[_builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
315
542
  :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
316
- :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
543
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
544
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
317
545
  :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
318
546
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
319
- :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
320
- replication.Tolerance duration to use when checking the last rotation time.
547
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
548
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
549
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
550
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
551
+ :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
552
+ use when checking the last rotation time.
321
553
  :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
322
554
  :param pulumi.Input[_builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
323
555
  generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
@@ -327,11 +559,25 @@ class _NomadSecretBackendState:
327
559
  The value should not contain leading or trailing forward slashes.
328
560
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
329
561
  *Available only for Vault Enterprise*.
562
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
563
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
564
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
565
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
330
566
  :param pulumi.Input[_builtins.str] token: Specifies the Nomad Management token to use.
331
567
  :param pulumi.Input[_builtins.int] ttl: Specifies the ttl of the lease for the generated token.
332
568
  """
569
+ if accessor is not None:
570
+ pulumi.set(__self__, "accessor", accessor)
333
571
  if address is not None:
334
572
  pulumi.set(__self__, "address", address)
573
+ if allowed_managed_keys is not None:
574
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
575
+ if allowed_response_headers is not None:
576
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
577
+ if audit_non_hmac_request_keys is not None:
578
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
579
+ if audit_non_hmac_response_keys is not None:
580
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
335
581
  if backend is not None:
336
582
  pulumi.set(__self__, "backend", backend)
337
583
  if ca_cert is not None:
@@ -342,10 +588,20 @@ class _NomadSecretBackendState:
342
588
  pulumi.set(__self__, "client_key", client_key)
343
589
  if default_lease_ttl_seconds is not None:
344
590
  pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
591
+ if delegated_auth_accessors is not None:
592
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
345
593
  if description is not None:
346
594
  pulumi.set(__self__, "description", description)
347
595
  if disable_remount is not None:
348
596
  pulumi.set(__self__, "disable_remount", disable_remount)
597
+ if external_entropy_access is not None:
598
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
599
+ if force_no_cache is not None:
600
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
601
+ if identity_token_key is not None:
602
+ pulumi.set(__self__, "identity_token_key", identity_token_key)
603
+ if listing_visibility is not None:
604
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
349
605
  if local is not None:
350
606
  pulumi.set(__self__, "local", local)
351
607
  if max_lease_ttl_seconds is not None:
@@ -356,11 +612,31 @@ class _NomadSecretBackendState:
356
612
  pulumi.set(__self__, "max_ttl", max_ttl)
357
613
  if namespace is not None:
358
614
  pulumi.set(__self__, "namespace", namespace)
615
+ if options is not None:
616
+ pulumi.set(__self__, "options", options)
617
+ if passthrough_request_headers is not None:
618
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
619
+ if plugin_version is not None:
620
+ pulumi.set(__self__, "plugin_version", plugin_version)
621
+ if seal_wrap is not None:
622
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
359
623
  if token is not None:
360
624
  pulumi.set(__self__, "token", token)
361
625
  if ttl is not None:
362
626
  pulumi.set(__self__, "ttl", ttl)
363
627
 
628
+ @_builtins.property
629
+ @pulumi.getter
630
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
631
+ """
632
+ Accessor of the mount
633
+ """
634
+ return pulumi.get(self, "accessor")
635
+
636
+ @accessor.setter
637
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
638
+ pulumi.set(self, "accessor", value)
639
+
364
640
  @_builtins.property
365
641
  @pulumi.getter
366
642
  def address(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -374,6 +650,54 @@ class _NomadSecretBackendState:
374
650
  def address(self, value: Optional[pulumi.Input[_builtins.str]]):
375
651
  pulumi.set(self, "address", value)
376
652
 
653
+ @_builtins.property
654
+ @pulumi.getter(name="allowedManagedKeys")
655
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
656
+ """
657
+ List of managed key registry entry names that the mount in question is allowed to access
658
+ """
659
+ return pulumi.get(self, "allowed_managed_keys")
660
+
661
+ @allowed_managed_keys.setter
662
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
663
+ pulumi.set(self, "allowed_managed_keys", value)
664
+
665
+ @_builtins.property
666
+ @pulumi.getter(name="allowedResponseHeaders")
667
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
668
+ """
669
+ List of headers to allow and pass from the request to the plugin
670
+ """
671
+ return pulumi.get(self, "allowed_response_headers")
672
+
673
+ @allowed_response_headers.setter
674
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
675
+ pulumi.set(self, "allowed_response_headers", value)
676
+
677
+ @_builtins.property
678
+ @pulumi.getter(name="auditNonHmacRequestKeys")
679
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
680
+ """
681
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
682
+ """
683
+ return pulumi.get(self, "audit_non_hmac_request_keys")
684
+
685
+ @audit_non_hmac_request_keys.setter
686
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
687
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
688
+
689
+ @_builtins.property
690
+ @pulumi.getter(name="auditNonHmacResponseKeys")
691
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
692
+ """
693
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
694
+ """
695
+ return pulumi.get(self, "audit_non_hmac_response_keys")
696
+
697
+ @audit_non_hmac_response_keys.setter
698
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
699
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
700
+
377
701
  @_builtins.property
378
702
  @pulumi.getter
379
703
  def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -436,11 +760,23 @@ class _NomadSecretBackendState:
436
760
  def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
437
761
  pulumi.set(self, "default_lease_ttl_seconds", value)
438
762
 
763
+ @_builtins.property
764
+ @pulumi.getter(name="delegatedAuthAccessors")
765
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
766
+ """
767
+ List of headers to allow and pass from the request to the plugin
768
+ """
769
+ return pulumi.get(self, "delegated_auth_accessors")
770
+
771
+ @delegated_auth_accessors.setter
772
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
773
+ pulumi.set(self, "delegated_auth_accessors", value)
774
+
439
775
  @_builtins.property
440
776
  @pulumi.getter
441
777
  def description(self) -> Optional[pulumi.Input[_builtins.str]]:
442
778
  """
443
- Human-friendly description of the mount for the Active Directory backend.
779
+ Human-friendly description of the mount for the backend.
444
780
  """
445
781
  return pulumi.get(self, "description")
446
782
 
@@ -461,12 +797,60 @@ class _NomadSecretBackendState:
461
797
  def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
462
798
  pulumi.set(self, "disable_remount", value)
463
799
 
800
+ @_builtins.property
801
+ @pulumi.getter(name="externalEntropyAccess")
802
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
803
+ """
804
+ Enable the secrets engine to access Vault's external entropy source
805
+ """
806
+ return pulumi.get(self, "external_entropy_access")
807
+
808
+ @external_entropy_access.setter
809
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
810
+ pulumi.set(self, "external_entropy_access", value)
811
+
812
+ @_builtins.property
813
+ @pulumi.getter(name="forceNoCache")
814
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
815
+ """
816
+ If set to true, disables caching.
817
+ """
818
+ return pulumi.get(self, "force_no_cache")
819
+
820
+ @force_no_cache.setter
821
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
822
+ pulumi.set(self, "force_no_cache", value)
823
+
824
+ @_builtins.property
825
+ @pulumi.getter(name="identityTokenKey")
826
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
827
+ """
828
+ The key to use for signing plugin workload identity tokens
829
+ """
830
+ return pulumi.get(self, "identity_token_key")
831
+
832
+ @identity_token_key.setter
833
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
834
+ pulumi.set(self, "identity_token_key", value)
835
+
836
+ @_builtins.property
837
+ @pulumi.getter(name="listingVisibility")
838
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
839
+ """
840
+ Specifies whether to show this mount in the UI-specific listing endpoint
841
+ """
842
+ return pulumi.get(self, "listing_visibility")
843
+
844
+ @listing_visibility.setter
845
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
846
+ pulumi.set(self, "listing_visibility", value)
847
+
464
848
  @_builtins.property
465
849
  @pulumi.getter
466
850
  def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
467
851
  """
468
- Mark the secrets engine as local-only. Local engines are not replicated or removed by
469
- replication.Tolerance duration to use when checking the last rotation time.
852
+ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
853
+ use when checking the last rotation time.
470
854
  """
471
855
  return pulumi.get(self, "local")
472
856
 
@@ -527,6 +911,54 @@ class _NomadSecretBackendState:
527
911
  def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
528
912
  pulumi.set(self, "namespace", value)
529
913
 
914
+ @_builtins.property
915
+ @pulumi.getter
916
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
917
+ """
918
+ Specifies mount type specific options that are passed to the backend
919
+ """
920
+ return pulumi.get(self, "options")
921
+
922
+ @options.setter
923
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
924
+ pulumi.set(self, "options", value)
925
+
926
+ @_builtins.property
927
+ @pulumi.getter(name="passthroughRequestHeaders")
928
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
929
+ """
930
+ List of headers to allow and pass from the request to the plugin
931
+ """
932
+ return pulumi.get(self, "passthrough_request_headers")
933
+
934
+ @passthrough_request_headers.setter
935
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
936
+ pulumi.set(self, "passthrough_request_headers", value)
937
+
938
+ @_builtins.property
939
+ @pulumi.getter(name="pluginVersion")
940
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
941
+ """
942
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
943
+ """
944
+ return pulumi.get(self, "plugin_version")
945
+
946
+ @plugin_version.setter
947
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
948
+ pulumi.set(self, "plugin_version", value)
949
+
950
+ @_builtins.property
951
+ @pulumi.getter(name="sealWrap")
952
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
953
+ """
954
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
955
+ """
956
+ return pulumi.get(self, "seal_wrap")
957
+
958
+ @seal_wrap.setter
959
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
960
+ pulumi.set(self, "seal_wrap", value)
961
+
530
962
  @_builtins.property
531
963
  @pulumi.getter
532
964
  def token(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -559,18 +991,31 @@ class NomadSecretBackend(pulumi.CustomResource):
559
991
  resource_name: str,
560
992
  opts: Optional[pulumi.ResourceOptions] = None,
561
993
  address: Optional[pulumi.Input[_builtins.str]] = None,
994
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
995
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
996
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
997
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
562
998
  backend: Optional[pulumi.Input[_builtins.str]] = None,
563
999
  ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
564
1000
  client_cert: Optional[pulumi.Input[_builtins.str]] = None,
565
1001
  client_key: Optional[pulumi.Input[_builtins.str]] = None,
566
1002
  default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1003
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
567
1004
  description: Optional[pulumi.Input[_builtins.str]] = None,
568
1005
  disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1006
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1007
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1008
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1009
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
569
1010
  local: Optional[pulumi.Input[_builtins.bool]] = None,
570
1011
  max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
571
1012
  max_token_name_length: Optional[pulumi.Input[_builtins.int]] = None,
572
1013
  max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
573
1014
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
1015
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1016
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1017
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1018
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
574
1019
  token: Optional[pulumi.Input[_builtins.str]] = None,
575
1020
  ttl: Optional[pulumi.Input[_builtins.int]] = None,
576
1021
  __props__=None):
@@ -604,6 +1049,10 @@ class NomadSecretBackend(pulumi.CustomResource):
604
1049
  :param pulumi.ResourceOptions opts: Options for the resource.
605
1050
  :param pulumi.Input[_builtins.str] address: Specifies the address of the Nomad instance, provided
606
1051
  as "protocol://host:port" like "http://127.0.0.1:4646".
1052
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1053
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1054
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1055
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
607
1056
  :param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at. Must
608
1057
  not begin or end with a `/`. Defaults to `nomad`.
609
1058
  :param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
@@ -611,11 +1060,16 @@ class NomadSecretBackend(pulumi.CustomResource):
611
1060
  :param pulumi.Input[_builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
612
1061
  :param pulumi.Input[_builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
613
1062
  :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
614
- :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
1063
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1064
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
615
1065
  :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
616
1066
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
617
- :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
618
- replication.Tolerance duration to use when checking the last rotation time.
1067
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1068
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1069
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1070
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1071
+ :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
1072
+ use when checking the last rotation time.
619
1073
  :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
620
1074
  :param pulumi.Input[_builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
621
1075
  generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
@@ -625,6 +1079,10 @@ class NomadSecretBackend(pulumi.CustomResource):
625
1079
  The value should not contain leading or trailing forward slashes.
626
1080
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
627
1081
  *Available only for Vault Enterprise*.
1082
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1083
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1084
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1085
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
628
1086
  :param pulumi.Input[_builtins.str] token: Specifies the Nomad Management token to use.
629
1087
  :param pulumi.Input[_builtins.int] ttl: Specifies the ttl of the lease for the generated token.
630
1088
  """
@@ -676,18 +1134,31 @@ class NomadSecretBackend(pulumi.CustomResource):
676
1134
  resource_name: str,
677
1135
  opts: Optional[pulumi.ResourceOptions] = None,
678
1136
  address: Optional[pulumi.Input[_builtins.str]] = None,
1137
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1138
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1139
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1140
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
679
1141
  backend: Optional[pulumi.Input[_builtins.str]] = None,
680
1142
  ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
681
1143
  client_cert: Optional[pulumi.Input[_builtins.str]] = None,
682
1144
  client_key: Optional[pulumi.Input[_builtins.str]] = None,
683
1145
  default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1146
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
684
1147
  description: Optional[pulumi.Input[_builtins.str]] = None,
685
1148
  disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1149
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1150
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1151
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1152
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
686
1153
  local: Optional[pulumi.Input[_builtins.bool]] = None,
687
1154
  max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
688
1155
  max_token_name_length: Optional[pulumi.Input[_builtins.int]] = None,
689
1156
  max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
690
1157
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
1158
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1159
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1160
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1161
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
691
1162
  token: Optional[pulumi.Input[_builtins.str]] = None,
692
1163
  ttl: Optional[pulumi.Input[_builtins.int]] = None,
693
1164
  __props__=None):
@@ -700,20 +1171,34 @@ class NomadSecretBackend(pulumi.CustomResource):
700
1171
  __props__ = NomadSecretBackendArgs.__new__(NomadSecretBackendArgs)
701
1172
 
702
1173
  __props__.__dict__["address"] = address
1174
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1175
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1176
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1177
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
703
1178
  __props__.__dict__["backend"] = backend
704
1179
  __props__.__dict__["ca_cert"] = ca_cert
705
1180
  __props__.__dict__["client_cert"] = None if client_cert is None else pulumi.Output.secret(client_cert)
706
1181
  __props__.__dict__["client_key"] = None if client_key is None else pulumi.Output.secret(client_key)
707
1182
  __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1183
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
708
1184
  __props__.__dict__["description"] = description
709
1185
  __props__.__dict__["disable_remount"] = disable_remount
1186
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1187
+ __props__.__dict__["force_no_cache"] = force_no_cache
1188
+ __props__.__dict__["identity_token_key"] = identity_token_key
1189
+ __props__.__dict__["listing_visibility"] = listing_visibility
710
1190
  __props__.__dict__["local"] = local
711
1191
  __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
712
1192
  __props__.__dict__["max_token_name_length"] = max_token_name_length
713
1193
  __props__.__dict__["max_ttl"] = max_ttl
714
1194
  __props__.__dict__["namespace"] = namespace
1195
+ __props__.__dict__["options"] = options
1196
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
1197
+ __props__.__dict__["plugin_version"] = plugin_version
1198
+ __props__.__dict__["seal_wrap"] = seal_wrap
715
1199
  __props__.__dict__["token"] = None if token is None else pulumi.Output.secret(token)
716
1200
  __props__.__dict__["ttl"] = ttl
1201
+ __props__.__dict__["accessor"] = None
717
1202
  secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["clientCert", "clientKey", "token"])
718
1203
  opts = pulumi.ResourceOptions.merge(opts, secret_opts)
719
1204
  super(NomadSecretBackend, __self__).__init__(
@@ -726,19 +1211,33 @@ class NomadSecretBackend(pulumi.CustomResource):
726
1211
  def get(resource_name: str,
727
1212
  id: pulumi.Input[str],
728
1213
  opts: Optional[pulumi.ResourceOptions] = None,
1214
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
729
1215
  address: Optional[pulumi.Input[_builtins.str]] = None,
1216
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1217
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1218
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1219
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
730
1220
  backend: Optional[pulumi.Input[_builtins.str]] = None,
731
1221
  ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
732
1222
  client_cert: Optional[pulumi.Input[_builtins.str]] = None,
733
1223
  client_key: Optional[pulumi.Input[_builtins.str]] = None,
734
1224
  default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1225
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
735
1226
  description: Optional[pulumi.Input[_builtins.str]] = None,
736
1227
  disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1228
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1229
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1230
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1231
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
737
1232
  local: Optional[pulumi.Input[_builtins.bool]] = None,
738
1233
  max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
739
1234
  max_token_name_length: Optional[pulumi.Input[_builtins.int]] = None,
740
1235
  max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
741
1236
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
1237
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1238
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1239
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1240
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
742
1241
  token: Optional[pulumi.Input[_builtins.str]] = None,
743
1242
  ttl: Optional[pulumi.Input[_builtins.int]] = None) -> 'NomadSecretBackend':
744
1243
  """
@@ -748,8 +1247,13 @@ class NomadSecretBackend(pulumi.CustomResource):
748
1247
  :param str resource_name: The unique name of the resulting resource.
749
1248
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
750
1249
  :param pulumi.ResourceOptions opts: Options for the resource.
1250
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
751
1251
  :param pulumi.Input[_builtins.str] address: Specifies the address of the Nomad instance, provided
752
1252
  as "protocol://host:port" like "http://127.0.0.1:4646".
1253
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1254
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1255
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1256
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
753
1257
  :param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at. Must
754
1258
  not begin or end with a `/`. Defaults to `nomad`.
755
1259
  :param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
@@ -757,11 +1261,16 @@ class NomadSecretBackend(pulumi.CustomResource):
757
1261
  :param pulumi.Input[_builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
758
1262
  :param pulumi.Input[_builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
759
1263
  :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
760
- :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
1264
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1265
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
761
1266
  :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
762
1267
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
763
- :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
764
- replication.Tolerance duration to use when checking the last rotation time.
1268
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1269
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1270
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1271
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1272
+ :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
1273
+ use when checking the last rotation time.
765
1274
  :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
766
1275
  :param pulumi.Input[_builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
767
1276
  generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
@@ -771,6 +1280,10 @@ class NomadSecretBackend(pulumi.CustomResource):
771
1280
  The value should not contain leading or trailing forward slashes.
772
1281
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
773
1282
  *Available only for Vault Enterprise*.
1283
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1284
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1285
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1286
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
774
1287
  :param pulumi.Input[_builtins.str] token: Specifies the Nomad Management token to use.
775
1288
  :param pulumi.Input[_builtins.int] ttl: Specifies the ttl of the lease for the generated token.
776
1289
  """
@@ -778,23 +1291,45 @@ class NomadSecretBackend(pulumi.CustomResource):
778
1291
 
779
1292
  __props__ = _NomadSecretBackendState.__new__(_NomadSecretBackendState)
780
1293
 
1294
+ __props__.__dict__["accessor"] = accessor
781
1295
  __props__.__dict__["address"] = address
1296
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1297
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1298
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1299
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
782
1300
  __props__.__dict__["backend"] = backend
783
1301
  __props__.__dict__["ca_cert"] = ca_cert
784
1302
  __props__.__dict__["client_cert"] = client_cert
785
1303
  __props__.__dict__["client_key"] = client_key
786
1304
  __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1305
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
787
1306
  __props__.__dict__["description"] = description
788
1307
  __props__.__dict__["disable_remount"] = disable_remount
1308
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1309
+ __props__.__dict__["force_no_cache"] = force_no_cache
1310
+ __props__.__dict__["identity_token_key"] = identity_token_key
1311
+ __props__.__dict__["listing_visibility"] = listing_visibility
789
1312
  __props__.__dict__["local"] = local
790
1313
  __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
791
1314
  __props__.__dict__["max_token_name_length"] = max_token_name_length
792
1315
  __props__.__dict__["max_ttl"] = max_ttl
793
1316
  __props__.__dict__["namespace"] = namespace
1317
+ __props__.__dict__["options"] = options
1318
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
1319
+ __props__.__dict__["plugin_version"] = plugin_version
1320
+ __props__.__dict__["seal_wrap"] = seal_wrap
794
1321
  __props__.__dict__["token"] = token
795
1322
  __props__.__dict__["ttl"] = ttl
796
1323
  return NomadSecretBackend(resource_name, opts=opts, __props__=__props__)
797
1324
 
1325
+ @_builtins.property
1326
+ @pulumi.getter
1327
+ def accessor(self) -> pulumi.Output[_builtins.str]:
1328
+ """
1329
+ Accessor of the mount
1330
+ """
1331
+ return pulumi.get(self, "accessor")
1332
+
798
1333
  @_builtins.property
799
1334
  @pulumi.getter
800
1335
  def address(self) -> pulumi.Output[Optional[_builtins.str]]:
@@ -804,6 +1339,38 @@ class NomadSecretBackend(pulumi.CustomResource):
804
1339
  """
805
1340
  return pulumi.get(self, "address")
806
1341
 
1342
+ @_builtins.property
1343
+ @pulumi.getter(name="allowedManagedKeys")
1344
+ def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1345
+ """
1346
+ List of managed key registry entry names that the mount in question is allowed to access
1347
+ """
1348
+ return pulumi.get(self, "allowed_managed_keys")
1349
+
1350
+ @_builtins.property
1351
+ @pulumi.getter(name="allowedResponseHeaders")
1352
+ def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1353
+ """
1354
+ List of headers to allow and pass from the request to the plugin
1355
+ """
1356
+ return pulumi.get(self, "allowed_response_headers")
1357
+
1358
+ @_builtins.property
1359
+ @pulumi.getter(name="auditNonHmacRequestKeys")
1360
+ def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1361
+ """
1362
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1363
+ """
1364
+ return pulumi.get(self, "audit_non_hmac_request_keys")
1365
+
1366
+ @_builtins.property
1367
+ @pulumi.getter(name="auditNonHmacResponseKeys")
1368
+ def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1369
+ """
1370
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1371
+ """
1372
+ return pulumi.get(self, "audit_non_hmac_response_keys")
1373
+
807
1374
  @_builtins.property
808
1375
  @pulumi.getter
809
1376
  def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
@@ -846,11 +1413,19 @@ class NomadSecretBackend(pulumi.CustomResource):
846
1413
  """
847
1414
  return pulumi.get(self, "default_lease_ttl_seconds")
848
1415
 
1416
+ @_builtins.property
1417
+ @pulumi.getter(name="delegatedAuthAccessors")
1418
+ def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1419
+ """
1420
+ List of headers to allow and pass from the request to the plugin
1421
+ """
1422
+ return pulumi.get(self, "delegated_auth_accessors")
1423
+
849
1424
  @_builtins.property
850
1425
  @pulumi.getter
851
1426
  def description(self) -> pulumi.Output[Optional[_builtins.str]]:
852
1427
  """
853
- Human-friendly description of the mount for the Active Directory backend.
1428
+ Human-friendly description of the mount for the backend.
854
1429
  """
855
1430
  return pulumi.get(self, "description")
856
1431
 
@@ -863,12 +1438,44 @@ class NomadSecretBackend(pulumi.CustomResource):
863
1438
  """
864
1439
  return pulumi.get(self, "disable_remount")
865
1440
 
1441
+ @_builtins.property
1442
+ @pulumi.getter(name="externalEntropyAccess")
1443
+ def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
1444
+ """
1445
+ Enable the secrets engine to access Vault's external entropy source
1446
+ """
1447
+ return pulumi.get(self, "external_entropy_access")
1448
+
1449
+ @_builtins.property
1450
+ @pulumi.getter(name="forceNoCache")
1451
+ def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
1452
+ """
1453
+ If set to true, disables caching.
1454
+ """
1455
+ return pulumi.get(self, "force_no_cache")
1456
+
1457
+ @_builtins.property
1458
+ @pulumi.getter(name="identityTokenKey")
1459
+ def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
1460
+ """
1461
+ The key to use for signing plugin workload identity tokens
1462
+ """
1463
+ return pulumi.get(self, "identity_token_key")
1464
+
1465
+ @_builtins.property
1466
+ @pulumi.getter(name="listingVisibility")
1467
+ def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
1468
+ """
1469
+ Specifies whether to show this mount in the UI-specific listing endpoint
1470
+ """
1471
+ return pulumi.get(self, "listing_visibility")
1472
+
866
1473
  @_builtins.property
867
1474
  @pulumi.getter
868
1475
  def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
869
1476
  """
870
- Mark the secrets engine as local-only. Local engines are not replicated or removed by
871
- replication.Tolerance duration to use when checking the last rotation time.
1477
+ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
1478
+ use when checking the last rotation time.
872
1479
  """
873
1480
  return pulumi.get(self, "local")
874
1481
 
@@ -909,6 +1516,38 @@ class NomadSecretBackend(pulumi.CustomResource):
909
1516
  """
910
1517
  return pulumi.get(self, "namespace")
911
1518
 
1519
+ @_builtins.property
1520
+ @pulumi.getter
1521
+ def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
1522
+ """
1523
+ Specifies mount type specific options that are passed to the backend
1524
+ """
1525
+ return pulumi.get(self, "options")
1526
+
1527
+ @_builtins.property
1528
+ @pulumi.getter(name="passthroughRequestHeaders")
1529
+ def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1530
+ """
1531
+ List of headers to allow and pass from the request to the plugin
1532
+ """
1533
+ return pulumi.get(self, "passthrough_request_headers")
1534
+
1535
+ @_builtins.property
1536
+ @pulumi.getter(name="pluginVersion")
1537
+ def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
1538
+ """
1539
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1540
+ """
1541
+ return pulumi.get(self, "plugin_version")
1542
+
1543
+ @_builtins.property
1544
+ @pulumi.getter(name="sealWrap")
1545
+ def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
1546
+ """
1547
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1548
+ """
1549
+ return pulumi.get(self, "seal_wrap")
1550
+
912
1551
  @_builtins.property
913
1552
  @pulumi.getter
914
1553
  def token(self) -> pulumi.Output[Optional[_builtins.str]]: