pulumi-vault 7.2.0a1755297899__py3-none-any.whl → 7.2.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -20,23 +20,35 @@ __all__ = ['SecretBackendArgs', 'SecretBackend']
20
20
  class SecretBackendArgs:
21
21
  def __init__(__self__, *,
22
22
  access_key: Optional[pulumi.Input[_builtins.str]] = None,
23
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
24
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
25
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
23
27
  default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
28
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
24
29
  description: Optional[pulumi.Input[_builtins.str]] = None,
25
30
  disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
26
31
  disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
32
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
33
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
27
34
  iam_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
28
35
  identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
29
36
  identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
30
37
  identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
38
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
31
39
  local: Optional[pulumi.Input[_builtins.bool]] = None,
32
40
  max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
33
41
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
42
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
43
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
34
44
  path: Optional[pulumi.Input[_builtins.str]] = None,
45
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
35
46
  region: Optional[pulumi.Input[_builtins.str]] = None,
36
47
  role_arn: Optional[pulumi.Input[_builtins.str]] = None,
37
48
  rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
38
49
  rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
39
50
  rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
51
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
40
52
  secret_key: Optional[pulumi.Input[_builtins.str]] = None,
41
53
  sts_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
42
54
  sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
@@ -47,25 +59,34 @@ class SecretBackendArgs:
47
59
  The set of arguments for constructing a SecretBackend resource.
48
60
  :param pulumi.Input[_builtins.str] access_key: The AWS Access Key ID this backend should use to
49
61
  issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
50
- :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: The default TTL for credentials
51
- issued by this backend.
52
- :param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
62
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
63
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
64
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
65
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
66
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
67
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
68
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
53
69
  :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
54
70
  :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
55
71
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
72
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
73
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
56
74
  :param pulumi.Input[_builtins.str] iam_endpoint: Specifies a custom HTTP IAM endpoint to use.
57
75
  :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.16+.
58
- :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens. Requires Vault 1.16+.
76
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens.
59
77
  :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.16+.
60
- :param pulumi.Input[_builtins.bool] local: Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
61
- :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
62
- for credentials issued by this backend.
78
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
79
+ :param pulumi.Input[_builtins.bool] local: Specifies if the secret backend is local only
80
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
63
81
  :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
64
82
  The value should not contain leading or trailing forward slashes.
65
83
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
66
84
  *Available only for Vault Enterprise*.
85
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
86
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
67
87
  :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
68
88
  not begin or end with a `/`. Defaults to `aws`.
89
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
69
90
  :param pulumi.Input[_builtins.str] region: The AWS region to make API calls against. Defaults to us-east-1.
70
91
  :param pulumi.Input[_builtins.str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
71
92
  :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
@@ -75,6 +96,7 @@ class SecretBackendArgs:
75
96
  :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
76
97
  a rotation when a scheduled token rotation occurs. The default rotation window is
77
98
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
99
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
78
100
  :param pulumi.Input[_builtins.str] secret_key: The AWS Secret Access Key to use when generating new credentials.
79
101
  :param pulumi.Input[_builtins.str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
80
102
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] sts_fallback_endpoints: Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
@@ -93,14 +115,28 @@ class SecretBackendArgs:
93
115
  """
94
116
  if access_key is not None:
95
117
  pulumi.set(__self__, "access_key", access_key)
118
+ if allowed_managed_keys is not None:
119
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
120
+ if allowed_response_headers is not None:
121
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
122
+ if audit_non_hmac_request_keys is not None:
123
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
124
+ if audit_non_hmac_response_keys is not None:
125
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
96
126
  if default_lease_ttl_seconds is not None:
97
127
  pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
128
+ if delegated_auth_accessors is not None:
129
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
98
130
  if description is not None:
99
131
  pulumi.set(__self__, "description", description)
100
132
  if disable_automated_rotation is not None:
101
133
  pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
102
134
  if disable_remount is not None:
103
135
  pulumi.set(__self__, "disable_remount", disable_remount)
136
+ if external_entropy_access is not None:
137
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
138
+ if force_no_cache is not None:
139
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
104
140
  if iam_endpoint is not None:
105
141
  pulumi.set(__self__, "iam_endpoint", iam_endpoint)
106
142
  if identity_token_audience is not None:
@@ -109,14 +145,22 @@ class SecretBackendArgs:
109
145
  pulumi.set(__self__, "identity_token_key", identity_token_key)
110
146
  if identity_token_ttl is not None:
111
147
  pulumi.set(__self__, "identity_token_ttl", identity_token_ttl)
148
+ if listing_visibility is not None:
149
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
112
150
  if local is not None:
113
151
  pulumi.set(__self__, "local", local)
114
152
  if max_lease_ttl_seconds is not None:
115
153
  pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
116
154
  if namespace is not None:
117
155
  pulumi.set(__self__, "namespace", namespace)
156
+ if options is not None:
157
+ pulumi.set(__self__, "options", options)
158
+ if passthrough_request_headers is not None:
159
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
118
160
  if path is not None:
119
161
  pulumi.set(__self__, "path", path)
162
+ if plugin_version is not None:
163
+ pulumi.set(__self__, "plugin_version", plugin_version)
120
164
  if region is not None:
121
165
  pulumi.set(__self__, "region", region)
122
166
  if role_arn is not None:
@@ -127,6 +171,8 @@ class SecretBackendArgs:
127
171
  pulumi.set(__self__, "rotation_schedule", rotation_schedule)
128
172
  if rotation_window is not None:
129
173
  pulumi.set(__self__, "rotation_window", rotation_window)
174
+ if seal_wrap is not None:
175
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
130
176
  if secret_key is not None:
131
177
  pulumi.set(__self__, "secret_key", secret_key)
132
178
  if sts_endpoint is not None:
@@ -153,12 +199,59 @@ class SecretBackendArgs:
153
199
  def access_key(self, value: Optional[pulumi.Input[_builtins.str]]):
154
200
  pulumi.set(self, "access_key", value)
155
201
 
202
+ @_builtins.property
203
+ @pulumi.getter(name="allowedManagedKeys")
204
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
205
+ """
206
+ List of managed key registry entry names that the mount in question is allowed to access
207
+ """
208
+ return pulumi.get(self, "allowed_managed_keys")
209
+
210
+ @allowed_managed_keys.setter
211
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
212
+ pulumi.set(self, "allowed_managed_keys", value)
213
+
214
+ @_builtins.property
215
+ @pulumi.getter(name="allowedResponseHeaders")
216
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
217
+ """
218
+ List of headers to allow and pass from the request to the plugin
219
+ """
220
+ return pulumi.get(self, "allowed_response_headers")
221
+
222
+ @allowed_response_headers.setter
223
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
224
+ pulumi.set(self, "allowed_response_headers", value)
225
+
226
+ @_builtins.property
227
+ @pulumi.getter(name="auditNonHmacRequestKeys")
228
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
229
+ """
230
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
231
+ """
232
+ return pulumi.get(self, "audit_non_hmac_request_keys")
233
+
234
+ @audit_non_hmac_request_keys.setter
235
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
236
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
237
+
238
+ @_builtins.property
239
+ @pulumi.getter(name="auditNonHmacResponseKeys")
240
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
241
+ """
242
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
243
+ """
244
+ return pulumi.get(self, "audit_non_hmac_response_keys")
245
+
246
+ @audit_non_hmac_response_keys.setter
247
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
248
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
249
+
156
250
  @_builtins.property
157
251
  @pulumi.getter(name="defaultLeaseTtlSeconds")
158
252
  def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
159
253
  """
160
- The default TTL for credentials
161
- issued by this backend.
254
+ Default lease duration for secrets in seconds
162
255
  """
163
256
  return pulumi.get(self, "default_lease_ttl_seconds")
164
257
 
@@ -166,11 +259,23 @@ class SecretBackendArgs:
166
259
  def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
167
260
  pulumi.set(self, "default_lease_ttl_seconds", value)
168
261
 
262
+ @_builtins.property
263
+ @pulumi.getter(name="delegatedAuthAccessors")
264
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
265
+ """
266
+ List of headers to allow and pass from the request to the plugin
267
+ """
268
+ return pulumi.get(self, "delegated_auth_accessors")
269
+
270
+ @delegated_auth_accessors.setter
271
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
272
+ pulumi.set(self, "delegated_auth_accessors", value)
273
+
169
274
  @_builtins.property
170
275
  @pulumi.getter
171
276
  def description(self) -> Optional[pulumi.Input[_builtins.str]]:
172
277
  """
173
- A human-friendly description for this backend.
278
+ Human-friendly description of the mount for the backend.
174
279
  """
175
280
  return pulumi.get(self, "description")
176
281
 
@@ -203,6 +308,30 @@ class SecretBackendArgs:
203
308
  def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
204
309
  pulumi.set(self, "disable_remount", value)
205
310
 
311
+ @_builtins.property
312
+ @pulumi.getter(name="externalEntropyAccess")
313
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
314
+ """
315
+ Enable the secrets engine to access Vault's external entropy source
316
+ """
317
+ return pulumi.get(self, "external_entropy_access")
318
+
319
+ @external_entropy_access.setter
320
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
321
+ pulumi.set(self, "external_entropy_access", value)
322
+
323
+ @_builtins.property
324
+ @pulumi.getter(name="forceNoCache")
325
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
326
+ """
327
+ If set to true, disables caching.
328
+ """
329
+ return pulumi.get(self, "force_no_cache")
330
+
331
+ @force_no_cache.setter
332
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
333
+ pulumi.set(self, "force_no_cache", value)
334
+
206
335
  @_builtins.property
207
336
  @pulumi.getter(name="iamEndpoint")
208
337
  def iam_endpoint(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -231,7 +360,7 @@ class SecretBackendArgs:
231
360
  @pulumi.getter(name="identityTokenKey")
232
361
  def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
233
362
  """
234
- The key to use for signing identity tokens. Requires Vault 1.16+.
363
+ The key to use for signing identity tokens.
235
364
  """
236
365
  return pulumi.get(self, "identity_token_key")
237
366
 
@@ -251,11 +380,23 @@ class SecretBackendArgs:
251
380
  def identity_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
252
381
  pulumi.set(self, "identity_token_ttl", value)
253
382
 
383
+ @_builtins.property
384
+ @pulumi.getter(name="listingVisibility")
385
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
386
+ """
387
+ Specifies whether to show this mount in the UI-specific listing endpoint
388
+ """
389
+ return pulumi.get(self, "listing_visibility")
390
+
391
+ @listing_visibility.setter
392
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
393
+ pulumi.set(self, "listing_visibility", value)
394
+
254
395
  @_builtins.property
255
396
  @pulumi.getter
256
397
  def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
257
398
  """
258
- Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
399
+ Specifies if the secret backend is local only
259
400
  """
260
401
  return pulumi.get(self, "local")
261
402
 
@@ -267,8 +408,7 @@ class SecretBackendArgs:
267
408
  @pulumi.getter(name="maxLeaseTtlSeconds")
268
409
  def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
269
410
  """
270
- The maximum TTL that can be requested
271
- for credentials issued by this backend.
411
+ Maximum possible lease duration for secrets in seconds
272
412
  """
273
413
  return pulumi.get(self, "max_lease_ttl_seconds")
274
414
 
@@ -291,6 +431,30 @@ class SecretBackendArgs:
291
431
  def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
292
432
  pulumi.set(self, "namespace", value)
293
433
 
434
+ @_builtins.property
435
+ @pulumi.getter
436
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
437
+ """
438
+ Specifies mount type specific options that are passed to the backend
439
+ """
440
+ return pulumi.get(self, "options")
441
+
442
+ @options.setter
443
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
444
+ pulumi.set(self, "options", value)
445
+
446
+ @_builtins.property
447
+ @pulumi.getter(name="passthroughRequestHeaders")
448
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
449
+ """
450
+ List of headers to allow and pass from the request to the plugin
451
+ """
452
+ return pulumi.get(self, "passthrough_request_headers")
453
+
454
+ @passthrough_request_headers.setter
455
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
456
+ pulumi.set(self, "passthrough_request_headers", value)
457
+
294
458
  @_builtins.property
295
459
  @pulumi.getter
296
460
  def path(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -304,6 +468,18 @@ class SecretBackendArgs:
304
468
  def path(self, value: Optional[pulumi.Input[_builtins.str]]):
305
469
  pulumi.set(self, "path", value)
306
470
 
471
+ @_builtins.property
472
+ @pulumi.getter(name="pluginVersion")
473
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
474
+ """
475
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
476
+ """
477
+ return pulumi.get(self, "plugin_version")
478
+
479
+ @plugin_version.setter
480
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
481
+ pulumi.set(self, "plugin_version", value)
482
+
307
483
  @_builtins.property
308
484
  @pulumi.getter
309
485
  def region(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -368,6 +544,18 @@ class SecretBackendArgs:
368
544
  def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
369
545
  pulumi.set(self, "rotation_window", value)
370
546
 
547
+ @_builtins.property
548
+ @pulumi.getter(name="sealWrap")
549
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
550
+ """
551
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
552
+ """
553
+ return pulumi.get(self, "seal_wrap")
554
+
555
+ @seal_wrap.setter
556
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
557
+ pulumi.set(self, "seal_wrap", value)
558
+
371
559
  @_builtins.property
372
560
  @pulumi.getter(name="secretKey")
373
561
  def secret_key(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -454,23 +642,36 @@ class SecretBackendArgs:
454
642
  class _SecretBackendState:
455
643
  def __init__(__self__, *,
456
644
  access_key: Optional[pulumi.Input[_builtins.str]] = None,
645
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
646
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
647
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
648
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
649
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
457
650
  default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
651
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
458
652
  description: Optional[pulumi.Input[_builtins.str]] = None,
459
653
  disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
460
654
  disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
655
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
656
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
461
657
  iam_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
462
658
  identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
463
659
  identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
464
660
  identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
661
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
465
662
  local: Optional[pulumi.Input[_builtins.bool]] = None,
466
663
  max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
467
664
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
665
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
666
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
468
667
  path: Optional[pulumi.Input[_builtins.str]] = None,
668
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
469
669
  region: Optional[pulumi.Input[_builtins.str]] = None,
470
670
  role_arn: Optional[pulumi.Input[_builtins.str]] = None,
471
671
  rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
472
672
  rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
473
673
  rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
674
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
474
675
  secret_key: Optional[pulumi.Input[_builtins.str]] = None,
475
676
  sts_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
476
677
  sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
@@ -481,25 +682,35 @@ class _SecretBackendState:
481
682
  Input properties used for looking up and filtering SecretBackend resources.
482
683
  :param pulumi.Input[_builtins.str] access_key: The AWS Access Key ID this backend should use to
483
684
  issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
484
- :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: The default TTL for credentials
485
- issued by this backend.
486
- :param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
685
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
686
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
687
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
688
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
689
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
690
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
691
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
692
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
487
693
  :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
488
694
  :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
489
695
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
696
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
697
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
490
698
  :param pulumi.Input[_builtins.str] iam_endpoint: Specifies a custom HTTP IAM endpoint to use.
491
699
  :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.16+.
492
- :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens. Requires Vault 1.16+.
700
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens.
493
701
  :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.16+.
494
- :param pulumi.Input[_builtins.bool] local: Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
495
- :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
496
- for credentials issued by this backend.
702
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
703
+ :param pulumi.Input[_builtins.bool] local: Specifies if the secret backend is local only
704
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
497
705
  :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
498
706
  The value should not contain leading or trailing forward slashes.
499
707
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
500
708
  *Available only for Vault Enterprise*.
709
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
710
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
501
711
  :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
502
712
  not begin or end with a `/`. Defaults to `aws`.
713
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
503
714
  :param pulumi.Input[_builtins.str] region: The AWS region to make API calls against. Defaults to us-east-1.
504
715
  :param pulumi.Input[_builtins.str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
505
716
  :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
@@ -509,6 +720,7 @@ class _SecretBackendState:
509
720
  :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
510
721
  a rotation when a scheduled token rotation occurs. The default rotation window is
511
722
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
723
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
512
724
  :param pulumi.Input[_builtins.str] secret_key: The AWS Secret Access Key to use when generating new credentials.
513
725
  :param pulumi.Input[_builtins.str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
514
726
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] sts_fallback_endpoints: Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
@@ -527,14 +739,30 @@ class _SecretBackendState:
527
739
  """
528
740
  if access_key is not None:
529
741
  pulumi.set(__self__, "access_key", access_key)
742
+ if accessor is not None:
743
+ pulumi.set(__self__, "accessor", accessor)
744
+ if allowed_managed_keys is not None:
745
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
746
+ if allowed_response_headers is not None:
747
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
748
+ if audit_non_hmac_request_keys is not None:
749
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
750
+ if audit_non_hmac_response_keys is not None:
751
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
530
752
  if default_lease_ttl_seconds is not None:
531
753
  pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
754
+ if delegated_auth_accessors is not None:
755
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
532
756
  if description is not None:
533
757
  pulumi.set(__self__, "description", description)
534
758
  if disable_automated_rotation is not None:
535
759
  pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
536
760
  if disable_remount is not None:
537
761
  pulumi.set(__self__, "disable_remount", disable_remount)
762
+ if external_entropy_access is not None:
763
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
764
+ if force_no_cache is not None:
765
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
538
766
  if iam_endpoint is not None:
539
767
  pulumi.set(__self__, "iam_endpoint", iam_endpoint)
540
768
  if identity_token_audience is not None:
@@ -543,14 +771,22 @@ class _SecretBackendState:
543
771
  pulumi.set(__self__, "identity_token_key", identity_token_key)
544
772
  if identity_token_ttl is not None:
545
773
  pulumi.set(__self__, "identity_token_ttl", identity_token_ttl)
774
+ if listing_visibility is not None:
775
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
546
776
  if local is not None:
547
777
  pulumi.set(__self__, "local", local)
548
778
  if max_lease_ttl_seconds is not None:
549
779
  pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
550
780
  if namespace is not None:
551
781
  pulumi.set(__self__, "namespace", namespace)
782
+ if options is not None:
783
+ pulumi.set(__self__, "options", options)
784
+ if passthrough_request_headers is not None:
785
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
552
786
  if path is not None:
553
787
  pulumi.set(__self__, "path", path)
788
+ if plugin_version is not None:
789
+ pulumi.set(__self__, "plugin_version", plugin_version)
554
790
  if region is not None:
555
791
  pulumi.set(__self__, "region", region)
556
792
  if role_arn is not None:
@@ -561,6 +797,8 @@ class _SecretBackendState:
561
797
  pulumi.set(__self__, "rotation_schedule", rotation_schedule)
562
798
  if rotation_window is not None:
563
799
  pulumi.set(__self__, "rotation_window", rotation_window)
800
+ if seal_wrap is not None:
801
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
564
802
  if secret_key is not None:
565
803
  pulumi.set(__self__, "secret_key", secret_key)
566
804
  if sts_endpoint is not None:
@@ -587,12 +825,71 @@ class _SecretBackendState:
587
825
  def access_key(self, value: Optional[pulumi.Input[_builtins.str]]):
588
826
  pulumi.set(self, "access_key", value)
589
827
 
828
+ @_builtins.property
829
+ @pulumi.getter
830
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
831
+ """
832
+ Accessor of the mount
833
+ """
834
+ return pulumi.get(self, "accessor")
835
+
836
+ @accessor.setter
837
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
838
+ pulumi.set(self, "accessor", value)
839
+
840
+ @_builtins.property
841
+ @pulumi.getter(name="allowedManagedKeys")
842
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
843
+ """
844
+ List of managed key registry entry names that the mount in question is allowed to access
845
+ """
846
+ return pulumi.get(self, "allowed_managed_keys")
847
+
848
+ @allowed_managed_keys.setter
849
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
850
+ pulumi.set(self, "allowed_managed_keys", value)
851
+
852
+ @_builtins.property
853
+ @pulumi.getter(name="allowedResponseHeaders")
854
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
855
+ """
856
+ List of headers to allow and pass from the request to the plugin
857
+ """
858
+ return pulumi.get(self, "allowed_response_headers")
859
+
860
+ @allowed_response_headers.setter
861
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
862
+ pulumi.set(self, "allowed_response_headers", value)
863
+
864
+ @_builtins.property
865
+ @pulumi.getter(name="auditNonHmacRequestKeys")
866
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
867
+ """
868
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
869
+ """
870
+ return pulumi.get(self, "audit_non_hmac_request_keys")
871
+
872
+ @audit_non_hmac_request_keys.setter
873
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
874
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
875
+
876
+ @_builtins.property
877
+ @pulumi.getter(name="auditNonHmacResponseKeys")
878
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
879
+ """
880
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
881
+ """
882
+ return pulumi.get(self, "audit_non_hmac_response_keys")
883
+
884
+ @audit_non_hmac_response_keys.setter
885
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
886
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
887
+
590
888
  @_builtins.property
591
889
  @pulumi.getter(name="defaultLeaseTtlSeconds")
592
890
  def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
593
891
  """
594
- The default TTL for credentials
595
- issued by this backend.
892
+ Default lease duration for secrets in seconds
596
893
  """
597
894
  return pulumi.get(self, "default_lease_ttl_seconds")
598
895
 
@@ -600,11 +897,23 @@ class _SecretBackendState:
600
897
  def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
601
898
  pulumi.set(self, "default_lease_ttl_seconds", value)
602
899
 
900
+ @_builtins.property
901
+ @pulumi.getter(name="delegatedAuthAccessors")
902
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
903
+ """
904
+ List of headers to allow and pass from the request to the plugin
905
+ """
906
+ return pulumi.get(self, "delegated_auth_accessors")
907
+
908
+ @delegated_auth_accessors.setter
909
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
910
+ pulumi.set(self, "delegated_auth_accessors", value)
911
+
603
912
  @_builtins.property
604
913
  @pulumi.getter
605
914
  def description(self) -> Optional[pulumi.Input[_builtins.str]]:
606
915
  """
607
- A human-friendly description for this backend.
916
+ Human-friendly description of the mount for the backend.
608
917
  """
609
918
  return pulumi.get(self, "description")
610
919
 
@@ -637,6 +946,30 @@ class _SecretBackendState:
637
946
  def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
638
947
  pulumi.set(self, "disable_remount", value)
639
948
 
949
+ @_builtins.property
950
+ @pulumi.getter(name="externalEntropyAccess")
951
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
952
+ """
953
+ Enable the secrets engine to access Vault's external entropy source
954
+ """
955
+ return pulumi.get(self, "external_entropy_access")
956
+
957
+ @external_entropy_access.setter
958
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
959
+ pulumi.set(self, "external_entropy_access", value)
960
+
961
+ @_builtins.property
962
+ @pulumi.getter(name="forceNoCache")
963
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
964
+ """
965
+ If set to true, disables caching.
966
+ """
967
+ return pulumi.get(self, "force_no_cache")
968
+
969
+ @force_no_cache.setter
970
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
971
+ pulumi.set(self, "force_no_cache", value)
972
+
640
973
  @_builtins.property
641
974
  @pulumi.getter(name="iamEndpoint")
642
975
  def iam_endpoint(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -665,7 +998,7 @@ class _SecretBackendState:
665
998
  @pulumi.getter(name="identityTokenKey")
666
999
  def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
667
1000
  """
668
- The key to use for signing identity tokens. Requires Vault 1.16+.
1001
+ The key to use for signing identity tokens.
669
1002
  """
670
1003
  return pulumi.get(self, "identity_token_key")
671
1004
 
@@ -685,11 +1018,23 @@ class _SecretBackendState:
685
1018
  def identity_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
686
1019
  pulumi.set(self, "identity_token_ttl", value)
687
1020
 
1021
+ @_builtins.property
1022
+ @pulumi.getter(name="listingVisibility")
1023
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
1024
+ """
1025
+ Specifies whether to show this mount in the UI-specific listing endpoint
1026
+ """
1027
+ return pulumi.get(self, "listing_visibility")
1028
+
1029
+ @listing_visibility.setter
1030
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
1031
+ pulumi.set(self, "listing_visibility", value)
1032
+
688
1033
  @_builtins.property
689
1034
  @pulumi.getter
690
1035
  def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
691
1036
  """
692
- Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
1037
+ Specifies if the secret backend is local only
693
1038
  """
694
1039
  return pulumi.get(self, "local")
695
1040
 
@@ -701,8 +1046,7 @@ class _SecretBackendState:
701
1046
  @pulumi.getter(name="maxLeaseTtlSeconds")
702
1047
  def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
703
1048
  """
704
- The maximum TTL that can be requested
705
- for credentials issued by this backend.
1049
+ Maximum possible lease duration for secrets in seconds
706
1050
  """
707
1051
  return pulumi.get(self, "max_lease_ttl_seconds")
708
1052
 
@@ -725,6 +1069,30 @@ class _SecretBackendState:
725
1069
  def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
726
1070
  pulumi.set(self, "namespace", value)
727
1071
 
1072
+ @_builtins.property
1073
+ @pulumi.getter
1074
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
1075
+ """
1076
+ Specifies mount type specific options that are passed to the backend
1077
+ """
1078
+ return pulumi.get(self, "options")
1079
+
1080
+ @options.setter
1081
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
1082
+ pulumi.set(self, "options", value)
1083
+
1084
+ @_builtins.property
1085
+ @pulumi.getter(name="passthroughRequestHeaders")
1086
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
1087
+ """
1088
+ List of headers to allow and pass from the request to the plugin
1089
+ """
1090
+ return pulumi.get(self, "passthrough_request_headers")
1091
+
1092
+ @passthrough_request_headers.setter
1093
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
1094
+ pulumi.set(self, "passthrough_request_headers", value)
1095
+
728
1096
  @_builtins.property
729
1097
  @pulumi.getter
730
1098
  def path(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -738,6 +1106,18 @@ class _SecretBackendState:
738
1106
  def path(self, value: Optional[pulumi.Input[_builtins.str]]):
739
1107
  pulumi.set(self, "path", value)
740
1108
 
1109
+ @_builtins.property
1110
+ @pulumi.getter(name="pluginVersion")
1111
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
1112
+ """
1113
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1114
+ """
1115
+ return pulumi.get(self, "plugin_version")
1116
+
1117
+ @plugin_version.setter
1118
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
1119
+ pulumi.set(self, "plugin_version", value)
1120
+
741
1121
  @_builtins.property
742
1122
  @pulumi.getter
743
1123
  def region(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -802,6 +1182,18 @@ class _SecretBackendState:
802
1182
  def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
803
1183
  pulumi.set(self, "rotation_window", value)
804
1184
 
1185
+ @_builtins.property
1186
+ @pulumi.getter(name="sealWrap")
1187
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
1188
+ """
1189
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1190
+ """
1191
+ return pulumi.get(self, "seal_wrap")
1192
+
1193
+ @seal_wrap.setter
1194
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
1195
+ pulumi.set(self, "seal_wrap", value)
1196
+
805
1197
  @_builtins.property
806
1198
  @pulumi.getter(name="secretKey")
807
1199
  def secret_key(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -891,23 +1283,35 @@ class SecretBackend(pulumi.CustomResource):
891
1283
  resource_name: str,
892
1284
  opts: Optional[pulumi.ResourceOptions] = None,
893
1285
  access_key: Optional[pulumi.Input[_builtins.str]] = None,
1286
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1287
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1288
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1289
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
894
1290
  default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1291
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
895
1292
  description: Optional[pulumi.Input[_builtins.str]] = None,
896
1293
  disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
897
1294
  disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1295
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1296
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
898
1297
  iam_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
899
1298
  identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
900
1299
  identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
901
1300
  identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1301
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
902
1302
  local: Optional[pulumi.Input[_builtins.bool]] = None,
903
1303
  max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
904
1304
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
1305
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1306
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
905
1307
  path: Optional[pulumi.Input[_builtins.str]] = None,
1308
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
906
1309
  region: Optional[pulumi.Input[_builtins.str]] = None,
907
1310
  role_arn: Optional[pulumi.Input[_builtins.str]] = None,
908
1311
  rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
909
1312
  rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
910
1313
  rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
1314
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
911
1315
  secret_key: Optional[pulumi.Input[_builtins.str]] = None,
912
1316
  sts_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
913
1317
  sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
@@ -928,25 +1332,34 @@ class SecretBackend(pulumi.CustomResource):
928
1332
  :param pulumi.ResourceOptions opts: Options for the resource.
929
1333
  :param pulumi.Input[_builtins.str] access_key: The AWS Access Key ID this backend should use to
930
1334
  issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
931
- :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: The default TTL for credentials
932
- issued by this backend.
933
- :param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
1335
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1336
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1337
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1338
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1339
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
1340
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1341
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
934
1342
  :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
935
1343
  :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
936
1344
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1345
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1346
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
937
1347
  :param pulumi.Input[_builtins.str] iam_endpoint: Specifies a custom HTTP IAM endpoint to use.
938
1348
  :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.16+.
939
- :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens. Requires Vault 1.16+.
1349
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens.
940
1350
  :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.16+.
941
- :param pulumi.Input[_builtins.bool] local: Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
942
- :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
943
- for credentials issued by this backend.
1351
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1352
+ :param pulumi.Input[_builtins.bool] local: Specifies if the secret backend is local only
1353
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
944
1354
  :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
945
1355
  The value should not contain leading or trailing forward slashes.
946
1356
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
947
1357
  *Available only for Vault Enterprise*.
1358
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1359
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
948
1360
  :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
949
1361
  not begin or end with a `/`. Defaults to `aws`.
1362
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
950
1363
  :param pulumi.Input[_builtins.str] region: The AWS region to make API calls against. Defaults to us-east-1.
951
1364
  :param pulumi.Input[_builtins.str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
952
1365
  :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
@@ -956,6 +1369,7 @@ class SecretBackend(pulumi.CustomResource):
956
1369
  :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
957
1370
  a rotation when a scheduled token rotation occurs. The default rotation window is
958
1371
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
1372
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
959
1373
  :param pulumi.Input[_builtins.str] secret_key: The AWS Secret Access Key to use when generating new credentials.
960
1374
  :param pulumi.Input[_builtins.str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
961
1375
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] sts_fallback_endpoints: Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
@@ -1003,23 +1417,35 @@ class SecretBackend(pulumi.CustomResource):
1003
1417
  resource_name: str,
1004
1418
  opts: Optional[pulumi.ResourceOptions] = None,
1005
1419
  access_key: Optional[pulumi.Input[_builtins.str]] = None,
1420
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1421
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1422
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1423
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1006
1424
  default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1425
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1007
1426
  description: Optional[pulumi.Input[_builtins.str]] = None,
1008
1427
  disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
1009
1428
  disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1429
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1430
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1010
1431
  iam_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
1011
1432
  identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
1012
1433
  identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1013
1434
  identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1435
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1014
1436
  local: Optional[pulumi.Input[_builtins.bool]] = None,
1015
1437
  max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1016
1438
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
1439
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1440
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1017
1441
  path: Optional[pulumi.Input[_builtins.str]] = None,
1442
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1018
1443
  region: Optional[pulumi.Input[_builtins.str]] = None,
1019
1444
  role_arn: Optional[pulumi.Input[_builtins.str]] = None,
1020
1445
  rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
1021
1446
  rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
1022
1447
  rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
1448
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1023
1449
  secret_key: Optional[pulumi.Input[_builtins.str]] = None,
1024
1450
  sts_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
1025
1451
  sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
@@ -1036,29 +1462,42 @@ class SecretBackend(pulumi.CustomResource):
1036
1462
  __props__ = SecretBackendArgs.__new__(SecretBackendArgs)
1037
1463
 
1038
1464
  __props__.__dict__["access_key"] = None if access_key is None else pulumi.Output.secret(access_key)
1465
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1466
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1467
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1468
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
1039
1469
  __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1470
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
1040
1471
  __props__.__dict__["description"] = description
1041
1472
  __props__.__dict__["disable_automated_rotation"] = disable_automated_rotation
1042
1473
  __props__.__dict__["disable_remount"] = disable_remount
1474
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1475
+ __props__.__dict__["force_no_cache"] = force_no_cache
1043
1476
  __props__.__dict__["iam_endpoint"] = iam_endpoint
1044
1477
  __props__.__dict__["identity_token_audience"] = identity_token_audience
1045
1478
  __props__.__dict__["identity_token_key"] = identity_token_key
1046
1479
  __props__.__dict__["identity_token_ttl"] = identity_token_ttl
1480
+ __props__.__dict__["listing_visibility"] = listing_visibility
1047
1481
  __props__.__dict__["local"] = local
1048
1482
  __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
1049
1483
  __props__.__dict__["namespace"] = namespace
1484
+ __props__.__dict__["options"] = options
1485
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
1050
1486
  __props__.__dict__["path"] = path
1487
+ __props__.__dict__["plugin_version"] = plugin_version
1051
1488
  __props__.__dict__["region"] = region
1052
1489
  __props__.__dict__["role_arn"] = role_arn
1053
1490
  __props__.__dict__["rotation_period"] = rotation_period
1054
1491
  __props__.__dict__["rotation_schedule"] = rotation_schedule
1055
1492
  __props__.__dict__["rotation_window"] = rotation_window
1493
+ __props__.__dict__["seal_wrap"] = seal_wrap
1056
1494
  __props__.__dict__["secret_key"] = None if secret_key is None else pulumi.Output.secret(secret_key)
1057
1495
  __props__.__dict__["sts_endpoint"] = sts_endpoint
1058
1496
  __props__.__dict__["sts_fallback_endpoints"] = sts_fallback_endpoints
1059
1497
  __props__.__dict__["sts_fallback_regions"] = sts_fallback_regions
1060
1498
  __props__.__dict__["sts_region"] = sts_region
1061
1499
  __props__.__dict__["username_template"] = username_template
1500
+ __props__.__dict__["accessor"] = None
1062
1501
  secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["accessKey", "secretKey"])
1063
1502
  opts = pulumi.ResourceOptions.merge(opts, secret_opts)
1064
1503
  super(SecretBackend, __self__).__init__(
@@ -1072,23 +1511,36 @@ class SecretBackend(pulumi.CustomResource):
1072
1511
  id: pulumi.Input[str],
1073
1512
  opts: Optional[pulumi.ResourceOptions] = None,
1074
1513
  access_key: Optional[pulumi.Input[_builtins.str]] = None,
1514
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
1515
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1516
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1517
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1518
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1075
1519
  default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1520
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1076
1521
  description: Optional[pulumi.Input[_builtins.str]] = None,
1077
1522
  disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
1078
1523
  disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1524
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1525
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1079
1526
  iam_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
1080
1527
  identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
1081
1528
  identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1082
1529
  identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1530
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1083
1531
  local: Optional[pulumi.Input[_builtins.bool]] = None,
1084
1532
  max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1085
1533
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
1534
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1535
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1086
1536
  path: Optional[pulumi.Input[_builtins.str]] = None,
1537
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1087
1538
  region: Optional[pulumi.Input[_builtins.str]] = None,
1088
1539
  role_arn: Optional[pulumi.Input[_builtins.str]] = None,
1089
1540
  rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
1090
1541
  rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
1091
1542
  rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
1543
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1092
1544
  secret_key: Optional[pulumi.Input[_builtins.str]] = None,
1093
1545
  sts_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
1094
1546
  sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
@@ -1104,25 +1556,35 @@ class SecretBackend(pulumi.CustomResource):
1104
1556
  :param pulumi.ResourceOptions opts: Options for the resource.
1105
1557
  :param pulumi.Input[_builtins.str] access_key: The AWS Access Key ID this backend should use to
1106
1558
  issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
1107
- :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: The default TTL for credentials
1108
- issued by this backend.
1109
- :param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
1559
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
1560
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1561
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1562
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1563
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1564
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
1565
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1566
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
1110
1567
  :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1111
1568
  :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1112
1569
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1570
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1571
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1113
1572
  :param pulumi.Input[_builtins.str] iam_endpoint: Specifies a custom HTTP IAM endpoint to use.
1114
1573
  :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.16+.
1115
- :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens. Requires Vault 1.16+.
1574
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens.
1116
1575
  :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.16+.
1117
- :param pulumi.Input[_builtins.bool] local: Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
1118
- :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
1119
- for credentials issued by this backend.
1576
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1577
+ :param pulumi.Input[_builtins.bool] local: Specifies if the secret backend is local only
1578
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
1120
1579
  :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
1121
1580
  The value should not contain leading or trailing forward slashes.
1122
1581
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1123
1582
  *Available only for Vault Enterprise*.
1583
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1584
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1124
1585
  :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
1125
1586
  not begin or end with a `/`. Defaults to `aws`.
1587
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1126
1588
  :param pulumi.Input[_builtins.str] region: The AWS region to make API calls against. Defaults to us-east-1.
1127
1589
  :param pulumi.Input[_builtins.str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
1128
1590
  :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
@@ -1132,6 +1594,7 @@ class SecretBackend(pulumi.CustomResource):
1132
1594
  :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
1133
1595
  a rotation when a scheduled token rotation occurs. The default rotation window is
1134
1596
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
1597
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1135
1598
  :param pulumi.Input[_builtins.str] secret_key: The AWS Secret Access Key to use when generating new credentials.
1136
1599
  :param pulumi.Input[_builtins.str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
1137
1600
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] sts_fallback_endpoints: Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
@@ -1153,23 +1616,36 @@ class SecretBackend(pulumi.CustomResource):
1153
1616
  __props__ = _SecretBackendState.__new__(_SecretBackendState)
1154
1617
 
1155
1618
  __props__.__dict__["access_key"] = access_key
1619
+ __props__.__dict__["accessor"] = accessor
1620
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1621
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1622
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1623
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
1156
1624
  __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1625
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
1157
1626
  __props__.__dict__["description"] = description
1158
1627
  __props__.__dict__["disable_automated_rotation"] = disable_automated_rotation
1159
1628
  __props__.__dict__["disable_remount"] = disable_remount
1629
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1630
+ __props__.__dict__["force_no_cache"] = force_no_cache
1160
1631
  __props__.__dict__["iam_endpoint"] = iam_endpoint
1161
1632
  __props__.__dict__["identity_token_audience"] = identity_token_audience
1162
1633
  __props__.__dict__["identity_token_key"] = identity_token_key
1163
1634
  __props__.__dict__["identity_token_ttl"] = identity_token_ttl
1635
+ __props__.__dict__["listing_visibility"] = listing_visibility
1164
1636
  __props__.__dict__["local"] = local
1165
1637
  __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
1166
1638
  __props__.__dict__["namespace"] = namespace
1639
+ __props__.__dict__["options"] = options
1640
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
1167
1641
  __props__.__dict__["path"] = path
1642
+ __props__.__dict__["plugin_version"] = plugin_version
1168
1643
  __props__.__dict__["region"] = region
1169
1644
  __props__.__dict__["role_arn"] = role_arn
1170
1645
  __props__.__dict__["rotation_period"] = rotation_period
1171
1646
  __props__.__dict__["rotation_schedule"] = rotation_schedule
1172
1647
  __props__.__dict__["rotation_window"] = rotation_window
1648
+ __props__.__dict__["seal_wrap"] = seal_wrap
1173
1649
  __props__.__dict__["secret_key"] = secret_key
1174
1650
  __props__.__dict__["sts_endpoint"] = sts_endpoint
1175
1651
  __props__.__dict__["sts_fallback_endpoints"] = sts_fallback_endpoints
@@ -1187,20 +1663,67 @@ class SecretBackend(pulumi.CustomResource):
1187
1663
  """
1188
1664
  return pulumi.get(self, "access_key")
1189
1665
 
1666
+ @_builtins.property
1667
+ @pulumi.getter
1668
+ def accessor(self) -> pulumi.Output[_builtins.str]:
1669
+ """
1670
+ Accessor of the mount
1671
+ """
1672
+ return pulumi.get(self, "accessor")
1673
+
1674
+ @_builtins.property
1675
+ @pulumi.getter(name="allowedManagedKeys")
1676
+ def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1677
+ """
1678
+ List of managed key registry entry names that the mount in question is allowed to access
1679
+ """
1680
+ return pulumi.get(self, "allowed_managed_keys")
1681
+
1682
+ @_builtins.property
1683
+ @pulumi.getter(name="allowedResponseHeaders")
1684
+ def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1685
+ """
1686
+ List of headers to allow and pass from the request to the plugin
1687
+ """
1688
+ return pulumi.get(self, "allowed_response_headers")
1689
+
1690
+ @_builtins.property
1691
+ @pulumi.getter(name="auditNonHmacRequestKeys")
1692
+ def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1693
+ """
1694
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1695
+ """
1696
+ return pulumi.get(self, "audit_non_hmac_request_keys")
1697
+
1698
+ @_builtins.property
1699
+ @pulumi.getter(name="auditNonHmacResponseKeys")
1700
+ def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1701
+ """
1702
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1703
+ """
1704
+ return pulumi.get(self, "audit_non_hmac_response_keys")
1705
+
1190
1706
  @_builtins.property
1191
1707
  @pulumi.getter(name="defaultLeaseTtlSeconds")
1192
1708
  def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1193
1709
  """
1194
- The default TTL for credentials
1195
- issued by this backend.
1710
+ Default lease duration for secrets in seconds
1196
1711
  """
1197
1712
  return pulumi.get(self, "default_lease_ttl_seconds")
1198
1713
 
1714
+ @_builtins.property
1715
+ @pulumi.getter(name="delegatedAuthAccessors")
1716
+ def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1717
+ """
1718
+ List of headers to allow and pass from the request to the plugin
1719
+ """
1720
+ return pulumi.get(self, "delegated_auth_accessors")
1721
+
1199
1722
  @_builtins.property
1200
1723
  @pulumi.getter
1201
1724
  def description(self) -> pulumi.Output[Optional[_builtins.str]]:
1202
1725
  """
1203
- A human-friendly description for this backend.
1726
+ Human-friendly description of the mount for the backend.
1204
1727
  """
1205
1728
  return pulumi.get(self, "description")
1206
1729
 
@@ -1221,6 +1744,22 @@ class SecretBackend(pulumi.CustomResource):
1221
1744
  """
1222
1745
  return pulumi.get(self, "disable_remount")
1223
1746
 
1747
+ @_builtins.property
1748
+ @pulumi.getter(name="externalEntropyAccess")
1749
+ def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
1750
+ """
1751
+ Enable the secrets engine to access Vault's external entropy source
1752
+ """
1753
+ return pulumi.get(self, "external_entropy_access")
1754
+
1755
+ @_builtins.property
1756
+ @pulumi.getter(name="forceNoCache")
1757
+ def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
1758
+ """
1759
+ If set to true, disables caching.
1760
+ """
1761
+ return pulumi.get(self, "force_no_cache")
1762
+
1224
1763
  @_builtins.property
1225
1764
  @pulumi.getter(name="iamEndpoint")
1226
1765
  def iam_endpoint(self) -> pulumi.Output[Optional[_builtins.str]]:
@@ -1241,7 +1780,7 @@ class SecretBackend(pulumi.CustomResource):
1241
1780
  @pulumi.getter(name="identityTokenKey")
1242
1781
  def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
1243
1782
  """
1244
- The key to use for signing identity tokens. Requires Vault 1.16+.
1783
+ The key to use for signing identity tokens.
1245
1784
  """
1246
1785
  return pulumi.get(self, "identity_token_key")
1247
1786
 
@@ -1253,11 +1792,19 @@ class SecretBackend(pulumi.CustomResource):
1253
1792
  """
1254
1793
  return pulumi.get(self, "identity_token_ttl")
1255
1794
 
1795
+ @_builtins.property
1796
+ @pulumi.getter(name="listingVisibility")
1797
+ def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
1798
+ """
1799
+ Specifies whether to show this mount in the UI-specific listing endpoint
1800
+ """
1801
+ return pulumi.get(self, "listing_visibility")
1802
+
1256
1803
  @_builtins.property
1257
1804
  @pulumi.getter
1258
1805
  def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
1259
1806
  """
1260
- Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
1807
+ Specifies if the secret backend is local only
1261
1808
  """
1262
1809
  return pulumi.get(self, "local")
1263
1810
 
@@ -1265,8 +1812,7 @@ class SecretBackend(pulumi.CustomResource):
1265
1812
  @pulumi.getter(name="maxLeaseTtlSeconds")
1266
1813
  def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1267
1814
  """
1268
- The maximum TTL that can be requested
1269
- for credentials issued by this backend.
1815
+ Maximum possible lease duration for secrets in seconds
1270
1816
  """
1271
1817
  return pulumi.get(self, "max_lease_ttl_seconds")
1272
1818
 
@@ -1281,6 +1827,22 @@ class SecretBackend(pulumi.CustomResource):
1281
1827
  """
1282
1828
  return pulumi.get(self, "namespace")
1283
1829
 
1830
+ @_builtins.property
1831
+ @pulumi.getter
1832
+ def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
1833
+ """
1834
+ Specifies mount type specific options that are passed to the backend
1835
+ """
1836
+ return pulumi.get(self, "options")
1837
+
1838
+ @_builtins.property
1839
+ @pulumi.getter(name="passthroughRequestHeaders")
1840
+ def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1841
+ """
1842
+ List of headers to allow and pass from the request to the plugin
1843
+ """
1844
+ return pulumi.get(self, "passthrough_request_headers")
1845
+
1284
1846
  @_builtins.property
1285
1847
  @pulumi.getter
1286
1848
  def path(self) -> pulumi.Output[Optional[_builtins.str]]:
@@ -1290,6 +1852,14 @@ class SecretBackend(pulumi.CustomResource):
1290
1852
  """
1291
1853
  return pulumi.get(self, "path")
1292
1854
 
1855
+ @_builtins.property
1856
+ @pulumi.getter(name="pluginVersion")
1857
+ def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
1858
+ """
1859
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1860
+ """
1861
+ return pulumi.get(self, "plugin_version")
1862
+
1293
1863
  @_builtins.property
1294
1864
  @pulumi.getter
1295
1865
  def region(self) -> pulumi.Output[_builtins.str]:
@@ -1334,6 +1904,14 @@ class SecretBackend(pulumi.CustomResource):
1334
1904
  """
1335
1905
  return pulumi.get(self, "rotation_window")
1336
1906
 
1907
+ @_builtins.property
1908
+ @pulumi.getter(name="sealWrap")
1909
+ def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
1910
+ """
1911
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1912
+ """
1913
+ return pulumi.get(self, "seal_wrap")
1914
+
1337
1915
  @_builtins.property
1338
1916
  @pulumi.getter(name="secretKey")
1339
1917
  def secret_key(self) -> pulumi.Output[Optional[_builtins.str]]: