pulumi-vault 7.2.0a1755297899__py3-none-any.whl → 7.3.0a1755586140__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -22,13 +22,27 @@ class SecretBackendArgs:
22
22
  connection_uri: pulumi.Input[_builtins.str],
23
23
  password: pulumi.Input[_builtins.str],
24
24
  username: pulumi.Input[_builtins.str],
25
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
28
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
25
29
  default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
30
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
31
  description: Optional[pulumi.Input[_builtins.str]] = None,
27
32
  disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
33
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
34
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
35
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
36
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
37
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
28
38
  max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
29
39
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
40
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
41
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
30
42
  password_policy: Optional[pulumi.Input[_builtins.str]] = None,
31
43
  path: Optional[pulumi.Input[_builtins.str]] = None,
44
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
45
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
32
46
  username_template: Optional[pulumi.Input[_builtins.str]] = None,
33
47
  verify_connection: Optional[pulumi.Input[_builtins.bool]] = None):
34
48
  """
@@ -36,20 +50,32 @@ class SecretBackendArgs:
36
50
  :param pulumi.Input[_builtins.str] connection_uri: Specifies the RabbitMQ connection URI.
37
51
  :param pulumi.Input[_builtins.str] password: Specifies the RabbitMQ management administrator password.
38
52
  :param pulumi.Input[_builtins.str] username: Specifies the RabbitMQ management administrator username.
39
- :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: The default TTL for credentials
40
- issued by this backend.
41
- :param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
53
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
54
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
55
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
56
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
57
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
58
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
59
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
42
60
  :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
43
61
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
44
- :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
45
- for credentials issued by this backend.
62
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
63
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
64
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
65
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
66
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
67
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
46
68
  :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
47
69
  The value should not contain leading or trailing forward slashes.
48
70
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
49
71
  *Available only for Vault Enterprise*.
72
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
73
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
50
74
  :param pulumi.Input[_builtins.str] password_policy: Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set.
51
75
  :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
52
76
  not begin or end with a `/`. Defaults to `rabbitmq`.
77
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
78
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
53
79
  :param pulumi.Input[_builtins.str] username_template: Template describing how dynamic usernames are generated.
54
80
  :param pulumi.Input[_builtins.bool] verify_connection: Specifies whether to verify connection URI, username, and password.
55
81
  Defaults to `true`.
@@ -57,20 +83,48 @@ class SecretBackendArgs:
57
83
  pulumi.set(__self__, "connection_uri", connection_uri)
58
84
  pulumi.set(__self__, "password", password)
59
85
  pulumi.set(__self__, "username", username)
86
+ if allowed_managed_keys is not None:
87
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
88
+ if allowed_response_headers is not None:
89
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
90
+ if audit_non_hmac_request_keys is not None:
91
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
92
+ if audit_non_hmac_response_keys is not None:
93
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
60
94
  if default_lease_ttl_seconds is not None:
61
95
  pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
96
+ if delegated_auth_accessors is not None:
97
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
62
98
  if description is not None:
63
99
  pulumi.set(__self__, "description", description)
64
100
  if disable_remount is not None:
65
101
  pulumi.set(__self__, "disable_remount", disable_remount)
102
+ if external_entropy_access is not None:
103
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
104
+ if force_no_cache is not None:
105
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
106
+ if identity_token_key is not None:
107
+ pulumi.set(__self__, "identity_token_key", identity_token_key)
108
+ if listing_visibility is not None:
109
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
110
+ if local is not None:
111
+ pulumi.set(__self__, "local", local)
66
112
  if max_lease_ttl_seconds is not None:
67
113
  pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
68
114
  if namespace is not None:
69
115
  pulumi.set(__self__, "namespace", namespace)
116
+ if options is not None:
117
+ pulumi.set(__self__, "options", options)
118
+ if passthrough_request_headers is not None:
119
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
70
120
  if password_policy is not None:
71
121
  pulumi.set(__self__, "password_policy", password_policy)
72
122
  if path is not None:
73
123
  pulumi.set(__self__, "path", path)
124
+ if plugin_version is not None:
125
+ pulumi.set(__self__, "plugin_version", plugin_version)
126
+ if seal_wrap is not None:
127
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
74
128
  if username_template is not None:
75
129
  pulumi.set(__self__, "username_template", username_template)
76
130
  if verify_connection is not None:
@@ -112,12 +166,59 @@ class SecretBackendArgs:
112
166
  def username(self, value: pulumi.Input[_builtins.str]):
113
167
  pulumi.set(self, "username", value)
114
168
 
169
+ @_builtins.property
170
+ @pulumi.getter(name="allowedManagedKeys")
171
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
172
+ """
173
+ List of managed key registry entry names that the mount in question is allowed to access
174
+ """
175
+ return pulumi.get(self, "allowed_managed_keys")
176
+
177
+ @allowed_managed_keys.setter
178
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
179
+ pulumi.set(self, "allowed_managed_keys", value)
180
+
181
+ @_builtins.property
182
+ @pulumi.getter(name="allowedResponseHeaders")
183
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
184
+ """
185
+ List of headers to allow and pass from the request to the plugin
186
+ """
187
+ return pulumi.get(self, "allowed_response_headers")
188
+
189
+ @allowed_response_headers.setter
190
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
191
+ pulumi.set(self, "allowed_response_headers", value)
192
+
193
+ @_builtins.property
194
+ @pulumi.getter(name="auditNonHmacRequestKeys")
195
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
196
+ """
197
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
198
+ """
199
+ return pulumi.get(self, "audit_non_hmac_request_keys")
200
+
201
+ @audit_non_hmac_request_keys.setter
202
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
203
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
204
+
205
+ @_builtins.property
206
+ @pulumi.getter(name="auditNonHmacResponseKeys")
207
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
208
+ """
209
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
210
+ """
211
+ return pulumi.get(self, "audit_non_hmac_response_keys")
212
+
213
+ @audit_non_hmac_response_keys.setter
214
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
215
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
216
+
115
217
  @_builtins.property
116
218
  @pulumi.getter(name="defaultLeaseTtlSeconds")
117
219
  def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
118
220
  """
119
- The default TTL for credentials
120
- issued by this backend.
221
+ Default lease duration for secrets in seconds
121
222
  """
122
223
  return pulumi.get(self, "default_lease_ttl_seconds")
123
224
 
@@ -125,11 +226,23 @@ class SecretBackendArgs:
125
226
  def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
126
227
  pulumi.set(self, "default_lease_ttl_seconds", value)
127
228
 
229
+ @_builtins.property
230
+ @pulumi.getter(name="delegatedAuthAccessors")
231
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
232
+ """
233
+ List of headers to allow and pass from the request to the plugin
234
+ """
235
+ return pulumi.get(self, "delegated_auth_accessors")
236
+
237
+ @delegated_auth_accessors.setter
238
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
239
+ pulumi.set(self, "delegated_auth_accessors", value)
240
+
128
241
  @_builtins.property
129
242
  @pulumi.getter
130
243
  def description(self) -> Optional[pulumi.Input[_builtins.str]]:
131
244
  """
132
- A human-friendly description for this backend.
245
+ Human-friendly description of the mount for the backend.
133
246
  """
134
247
  return pulumi.get(self, "description")
135
248
 
@@ -150,12 +263,71 @@ class SecretBackendArgs:
150
263
  def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
151
264
  pulumi.set(self, "disable_remount", value)
152
265
 
266
+ @_builtins.property
267
+ @pulumi.getter(name="externalEntropyAccess")
268
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
269
+ """
270
+ Enable the secrets engine to access Vault's external entropy source
271
+ """
272
+ return pulumi.get(self, "external_entropy_access")
273
+
274
+ @external_entropy_access.setter
275
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
276
+ pulumi.set(self, "external_entropy_access", value)
277
+
278
+ @_builtins.property
279
+ @pulumi.getter(name="forceNoCache")
280
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
281
+ """
282
+ If set to true, disables caching.
283
+ """
284
+ return pulumi.get(self, "force_no_cache")
285
+
286
+ @force_no_cache.setter
287
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
288
+ pulumi.set(self, "force_no_cache", value)
289
+
290
+ @_builtins.property
291
+ @pulumi.getter(name="identityTokenKey")
292
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
293
+ """
294
+ The key to use for signing plugin workload identity tokens
295
+ """
296
+ return pulumi.get(self, "identity_token_key")
297
+
298
+ @identity_token_key.setter
299
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
300
+ pulumi.set(self, "identity_token_key", value)
301
+
302
+ @_builtins.property
303
+ @pulumi.getter(name="listingVisibility")
304
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
305
+ """
306
+ Specifies whether to show this mount in the UI-specific listing endpoint
307
+ """
308
+ return pulumi.get(self, "listing_visibility")
309
+
310
+ @listing_visibility.setter
311
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
312
+ pulumi.set(self, "listing_visibility", value)
313
+
314
+ @_builtins.property
315
+ @pulumi.getter
316
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
317
+ """
318
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
319
+ """
320
+ return pulumi.get(self, "local")
321
+
322
+ @local.setter
323
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
324
+ pulumi.set(self, "local", value)
325
+
153
326
  @_builtins.property
154
327
  @pulumi.getter(name="maxLeaseTtlSeconds")
155
328
  def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
156
329
  """
157
- The maximum TTL that can be requested
158
- for credentials issued by this backend.
330
+ Maximum possible lease duration for secrets in seconds
159
331
  """
160
332
  return pulumi.get(self, "max_lease_ttl_seconds")
161
333
 
@@ -178,6 +350,30 @@ class SecretBackendArgs:
178
350
  def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
179
351
  pulumi.set(self, "namespace", value)
180
352
 
353
+ @_builtins.property
354
+ @pulumi.getter
355
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
356
+ """
357
+ Specifies mount type specific options that are passed to the backend
358
+ """
359
+ return pulumi.get(self, "options")
360
+
361
+ @options.setter
362
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
363
+ pulumi.set(self, "options", value)
364
+
365
+ @_builtins.property
366
+ @pulumi.getter(name="passthroughRequestHeaders")
367
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
368
+ """
369
+ List of headers to allow and pass from the request to the plugin
370
+ """
371
+ return pulumi.get(self, "passthrough_request_headers")
372
+
373
+ @passthrough_request_headers.setter
374
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
375
+ pulumi.set(self, "passthrough_request_headers", value)
376
+
181
377
  @_builtins.property
182
378
  @pulumi.getter(name="passwordPolicy")
183
379
  def password_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -203,6 +399,30 @@ class SecretBackendArgs:
203
399
  def path(self, value: Optional[pulumi.Input[_builtins.str]]):
204
400
  pulumi.set(self, "path", value)
205
401
 
402
+ @_builtins.property
403
+ @pulumi.getter(name="pluginVersion")
404
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
405
+ """
406
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
407
+ """
408
+ return pulumi.get(self, "plugin_version")
409
+
410
+ @plugin_version.setter
411
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
412
+ pulumi.set(self, "plugin_version", value)
413
+
414
+ @_builtins.property
415
+ @pulumi.getter(name="sealWrap")
416
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
417
+ """
418
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
419
+ """
420
+ return pulumi.get(self, "seal_wrap")
421
+
422
+ @seal_wrap.setter
423
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
424
+ pulumi.set(self, "seal_wrap", value)
425
+
206
426
  @_builtins.property
207
427
  @pulumi.getter(name="usernameTemplate")
208
428
  def username_template(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -232,59 +452,117 @@ class SecretBackendArgs:
232
452
  @pulumi.input_type
233
453
  class _SecretBackendState:
234
454
  def __init__(__self__, *,
455
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
456
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
457
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
458
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
459
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
235
460
  connection_uri: Optional[pulumi.Input[_builtins.str]] = None,
236
461
  default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
462
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
237
463
  description: Optional[pulumi.Input[_builtins.str]] = None,
238
464
  disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
465
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
466
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
467
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
468
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
469
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
239
470
  max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
240
471
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
472
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
473
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
241
474
  password: Optional[pulumi.Input[_builtins.str]] = None,
242
475
  password_policy: Optional[pulumi.Input[_builtins.str]] = None,
243
476
  path: Optional[pulumi.Input[_builtins.str]] = None,
477
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
478
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
244
479
  username: Optional[pulumi.Input[_builtins.str]] = None,
245
480
  username_template: Optional[pulumi.Input[_builtins.str]] = None,
246
481
  verify_connection: Optional[pulumi.Input[_builtins.bool]] = None):
247
482
  """
248
483
  Input properties used for looking up and filtering SecretBackend resources.
484
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
485
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
486
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
487
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
488
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
249
489
  :param pulumi.Input[_builtins.str] connection_uri: Specifies the RabbitMQ connection URI.
250
- :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: The default TTL for credentials
251
- issued by this backend.
252
- :param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
490
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
491
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
492
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
253
493
  :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
254
494
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
255
- :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
256
- for credentials issued by this backend.
495
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
496
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
497
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
498
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
499
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
500
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
257
501
  :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
258
502
  The value should not contain leading or trailing forward slashes.
259
503
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
260
504
  *Available only for Vault Enterprise*.
505
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
506
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
261
507
  :param pulumi.Input[_builtins.str] password: Specifies the RabbitMQ management administrator password.
262
508
  :param pulumi.Input[_builtins.str] password_policy: Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set.
263
509
  :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
264
510
  not begin or end with a `/`. Defaults to `rabbitmq`.
511
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
512
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
265
513
  :param pulumi.Input[_builtins.str] username: Specifies the RabbitMQ management administrator username.
266
514
  :param pulumi.Input[_builtins.str] username_template: Template describing how dynamic usernames are generated.
267
515
  :param pulumi.Input[_builtins.bool] verify_connection: Specifies whether to verify connection URI, username, and password.
268
516
  Defaults to `true`.
269
517
  """
518
+ if accessor is not None:
519
+ pulumi.set(__self__, "accessor", accessor)
520
+ if allowed_managed_keys is not None:
521
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
522
+ if allowed_response_headers is not None:
523
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
524
+ if audit_non_hmac_request_keys is not None:
525
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
526
+ if audit_non_hmac_response_keys is not None:
527
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
270
528
  if connection_uri is not None:
271
529
  pulumi.set(__self__, "connection_uri", connection_uri)
272
530
  if default_lease_ttl_seconds is not None:
273
531
  pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
532
+ if delegated_auth_accessors is not None:
533
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
274
534
  if description is not None:
275
535
  pulumi.set(__self__, "description", description)
276
536
  if disable_remount is not None:
277
537
  pulumi.set(__self__, "disable_remount", disable_remount)
538
+ if external_entropy_access is not None:
539
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
540
+ if force_no_cache is not None:
541
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
542
+ if identity_token_key is not None:
543
+ pulumi.set(__self__, "identity_token_key", identity_token_key)
544
+ if listing_visibility is not None:
545
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
546
+ if local is not None:
547
+ pulumi.set(__self__, "local", local)
278
548
  if max_lease_ttl_seconds is not None:
279
549
  pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
280
550
  if namespace is not None:
281
551
  pulumi.set(__self__, "namespace", namespace)
552
+ if options is not None:
553
+ pulumi.set(__self__, "options", options)
554
+ if passthrough_request_headers is not None:
555
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
282
556
  if password is not None:
283
557
  pulumi.set(__self__, "password", password)
284
558
  if password_policy is not None:
285
559
  pulumi.set(__self__, "password_policy", password_policy)
286
560
  if path is not None:
287
561
  pulumi.set(__self__, "path", path)
562
+ if plugin_version is not None:
563
+ pulumi.set(__self__, "plugin_version", plugin_version)
564
+ if seal_wrap is not None:
565
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
288
566
  if username is not None:
289
567
  pulumi.set(__self__, "username", username)
290
568
  if username_template is not None:
@@ -292,6 +570,66 @@ class _SecretBackendState:
292
570
  if verify_connection is not None:
293
571
  pulumi.set(__self__, "verify_connection", verify_connection)
294
572
 
573
+ @_builtins.property
574
+ @pulumi.getter
575
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
576
+ """
577
+ Accessor of the mount
578
+ """
579
+ return pulumi.get(self, "accessor")
580
+
581
+ @accessor.setter
582
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
583
+ pulumi.set(self, "accessor", value)
584
+
585
+ @_builtins.property
586
+ @pulumi.getter(name="allowedManagedKeys")
587
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
588
+ """
589
+ List of managed key registry entry names that the mount in question is allowed to access
590
+ """
591
+ return pulumi.get(self, "allowed_managed_keys")
592
+
593
+ @allowed_managed_keys.setter
594
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
595
+ pulumi.set(self, "allowed_managed_keys", value)
596
+
597
+ @_builtins.property
598
+ @pulumi.getter(name="allowedResponseHeaders")
599
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
600
+ """
601
+ List of headers to allow and pass from the request to the plugin
602
+ """
603
+ return pulumi.get(self, "allowed_response_headers")
604
+
605
+ @allowed_response_headers.setter
606
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
607
+ pulumi.set(self, "allowed_response_headers", value)
608
+
609
+ @_builtins.property
610
+ @pulumi.getter(name="auditNonHmacRequestKeys")
611
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
612
+ """
613
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
614
+ """
615
+ return pulumi.get(self, "audit_non_hmac_request_keys")
616
+
617
+ @audit_non_hmac_request_keys.setter
618
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
619
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
620
+
621
+ @_builtins.property
622
+ @pulumi.getter(name="auditNonHmacResponseKeys")
623
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
624
+ """
625
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
626
+ """
627
+ return pulumi.get(self, "audit_non_hmac_response_keys")
628
+
629
+ @audit_non_hmac_response_keys.setter
630
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
631
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
632
+
295
633
  @_builtins.property
296
634
  @pulumi.getter(name="connectionUri")
297
635
  def connection_uri(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -308,8 +646,7 @@ class _SecretBackendState:
308
646
  @pulumi.getter(name="defaultLeaseTtlSeconds")
309
647
  def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
310
648
  """
311
- The default TTL for credentials
312
- issued by this backend.
649
+ Default lease duration for secrets in seconds
313
650
  """
314
651
  return pulumi.get(self, "default_lease_ttl_seconds")
315
652
 
@@ -317,11 +654,23 @@ class _SecretBackendState:
317
654
  def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
318
655
  pulumi.set(self, "default_lease_ttl_seconds", value)
319
656
 
657
+ @_builtins.property
658
+ @pulumi.getter(name="delegatedAuthAccessors")
659
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
660
+ """
661
+ List of headers to allow and pass from the request to the plugin
662
+ """
663
+ return pulumi.get(self, "delegated_auth_accessors")
664
+
665
+ @delegated_auth_accessors.setter
666
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
667
+ pulumi.set(self, "delegated_auth_accessors", value)
668
+
320
669
  @_builtins.property
321
670
  @pulumi.getter
322
671
  def description(self) -> Optional[pulumi.Input[_builtins.str]]:
323
672
  """
324
- A human-friendly description for this backend.
673
+ Human-friendly description of the mount for the backend.
325
674
  """
326
675
  return pulumi.get(self, "description")
327
676
 
@@ -342,12 +691,71 @@ class _SecretBackendState:
342
691
  def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
343
692
  pulumi.set(self, "disable_remount", value)
344
693
 
694
+ @_builtins.property
695
+ @pulumi.getter(name="externalEntropyAccess")
696
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
697
+ """
698
+ Enable the secrets engine to access Vault's external entropy source
699
+ """
700
+ return pulumi.get(self, "external_entropy_access")
701
+
702
+ @external_entropy_access.setter
703
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
704
+ pulumi.set(self, "external_entropy_access", value)
705
+
706
+ @_builtins.property
707
+ @pulumi.getter(name="forceNoCache")
708
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
709
+ """
710
+ If set to true, disables caching.
711
+ """
712
+ return pulumi.get(self, "force_no_cache")
713
+
714
+ @force_no_cache.setter
715
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
716
+ pulumi.set(self, "force_no_cache", value)
717
+
718
+ @_builtins.property
719
+ @pulumi.getter(name="identityTokenKey")
720
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
721
+ """
722
+ The key to use for signing plugin workload identity tokens
723
+ """
724
+ return pulumi.get(self, "identity_token_key")
725
+
726
+ @identity_token_key.setter
727
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
728
+ pulumi.set(self, "identity_token_key", value)
729
+
730
+ @_builtins.property
731
+ @pulumi.getter(name="listingVisibility")
732
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
733
+ """
734
+ Specifies whether to show this mount in the UI-specific listing endpoint
735
+ """
736
+ return pulumi.get(self, "listing_visibility")
737
+
738
+ @listing_visibility.setter
739
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
740
+ pulumi.set(self, "listing_visibility", value)
741
+
742
+ @_builtins.property
743
+ @pulumi.getter
744
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
745
+ """
746
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
747
+ """
748
+ return pulumi.get(self, "local")
749
+
750
+ @local.setter
751
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
752
+ pulumi.set(self, "local", value)
753
+
345
754
  @_builtins.property
346
755
  @pulumi.getter(name="maxLeaseTtlSeconds")
347
756
  def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
348
757
  """
349
- The maximum TTL that can be requested
350
- for credentials issued by this backend.
758
+ Maximum possible lease duration for secrets in seconds
351
759
  """
352
760
  return pulumi.get(self, "max_lease_ttl_seconds")
353
761
 
@@ -370,6 +778,30 @@ class _SecretBackendState:
370
778
  def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
371
779
  pulumi.set(self, "namespace", value)
372
780
 
781
+ @_builtins.property
782
+ @pulumi.getter
783
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
784
+ """
785
+ Specifies mount type specific options that are passed to the backend
786
+ """
787
+ return pulumi.get(self, "options")
788
+
789
+ @options.setter
790
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
791
+ pulumi.set(self, "options", value)
792
+
793
+ @_builtins.property
794
+ @pulumi.getter(name="passthroughRequestHeaders")
795
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
796
+ """
797
+ List of headers to allow and pass from the request to the plugin
798
+ """
799
+ return pulumi.get(self, "passthrough_request_headers")
800
+
801
+ @passthrough_request_headers.setter
802
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
803
+ pulumi.set(self, "passthrough_request_headers", value)
804
+
373
805
  @_builtins.property
374
806
  @pulumi.getter
375
807
  def password(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -407,6 +839,30 @@ class _SecretBackendState:
407
839
  def path(self, value: Optional[pulumi.Input[_builtins.str]]):
408
840
  pulumi.set(self, "path", value)
409
841
 
842
+ @_builtins.property
843
+ @pulumi.getter(name="pluginVersion")
844
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
845
+ """
846
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
847
+ """
848
+ return pulumi.get(self, "plugin_version")
849
+
850
+ @plugin_version.setter
851
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
852
+ pulumi.set(self, "plugin_version", value)
853
+
854
+ @_builtins.property
855
+ @pulumi.getter(name="sealWrap")
856
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
857
+ """
858
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
859
+ """
860
+ return pulumi.get(self, "seal_wrap")
861
+
862
+ @seal_wrap.setter
863
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
864
+ pulumi.set(self, "seal_wrap", value)
865
+
410
866
  @_builtins.property
411
867
  @pulumi.getter
412
868
  def username(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -451,15 +907,29 @@ class SecretBackend(pulumi.CustomResource):
451
907
  def __init__(__self__,
452
908
  resource_name: str,
453
909
  opts: Optional[pulumi.ResourceOptions] = None,
910
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
911
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
912
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
913
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
454
914
  connection_uri: Optional[pulumi.Input[_builtins.str]] = None,
455
915
  default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
916
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
456
917
  description: Optional[pulumi.Input[_builtins.str]] = None,
457
918
  disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
919
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
920
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
921
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
922
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
923
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
458
924
  max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
459
925
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
926
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
927
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
460
928
  password: Optional[pulumi.Input[_builtins.str]] = None,
461
929
  password_policy: Optional[pulumi.Input[_builtins.str]] = None,
462
930
  path: Optional[pulumi.Input[_builtins.str]] = None,
931
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
932
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
463
933
  username: Optional[pulumi.Input[_builtins.str]] = None,
464
934
  username_template: Optional[pulumi.Input[_builtins.str]] = None,
465
935
  verify_connection: Optional[pulumi.Input[_builtins.bool]] = None,
@@ -487,22 +957,34 @@ class SecretBackend(pulumi.CustomResource):
487
957
 
488
958
  :param str resource_name: The name of the resource.
489
959
  :param pulumi.ResourceOptions opts: Options for the resource.
960
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
961
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
962
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
963
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
490
964
  :param pulumi.Input[_builtins.str] connection_uri: Specifies the RabbitMQ connection URI.
491
- :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: The default TTL for credentials
492
- issued by this backend.
493
- :param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
965
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
966
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
967
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
494
968
  :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
495
969
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
496
- :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
497
- for credentials issued by this backend.
970
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
971
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
972
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
973
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
974
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
975
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
498
976
  :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
499
977
  The value should not contain leading or trailing forward slashes.
500
978
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
501
979
  *Available only for Vault Enterprise*.
980
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
981
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
502
982
  :param pulumi.Input[_builtins.str] password: Specifies the RabbitMQ management administrator password.
503
983
  :param pulumi.Input[_builtins.str] password_policy: Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set.
504
984
  :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
505
985
  not begin or end with a `/`. Defaults to `rabbitmq`.
986
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
987
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
506
988
  :param pulumi.Input[_builtins.str] username: Specifies the RabbitMQ management administrator username.
507
989
  :param pulumi.Input[_builtins.str] username_template: Template describing how dynamic usernames are generated.
508
990
  :param pulumi.Input[_builtins.bool] verify_connection: Specifies whether to verify connection URI, username, and password.
@@ -550,15 +1032,29 @@ class SecretBackend(pulumi.CustomResource):
550
1032
  def _internal_init(__self__,
551
1033
  resource_name: str,
552
1034
  opts: Optional[pulumi.ResourceOptions] = None,
1035
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1036
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1037
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1038
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
553
1039
  connection_uri: Optional[pulumi.Input[_builtins.str]] = None,
554
1040
  default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1041
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
555
1042
  description: Optional[pulumi.Input[_builtins.str]] = None,
556
1043
  disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1044
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1045
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1046
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1047
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1048
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
557
1049
  max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
558
1050
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
1051
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1052
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
559
1053
  password: Optional[pulumi.Input[_builtins.str]] = None,
560
1054
  password_policy: Optional[pulumi.Input[_builtins.str]] = None,
561
1055
  path: Optional[pulumi.Input[_builtins.str]] = None,
1056
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1057
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
562
1058
  username: Optional[pulumi.Input[_builtins.str]] = None,
563
1059
  username_template: Optional[pulumi.Input[_builtins.str]] = None,
564
1060
  verify_connection: Optional[pulumi.Input[_builtins.bool]] = None,
@@ -571,24 +1067,39 @@ class SecretBackend(pulumi.CustomResource):
571
1067
  raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
572
1068
  __props__ = SecretBackendArgs.__new__(SecretBackendArgs)
573
1069
 
1070
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1071
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1072
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1073
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
574
1074
  if connection_uri is None and not opts.urn:
575
1075
  raise TypeError("Missing required property 'connection_uri'")
576
1076
  __props__.__dict__["connection_uri"] = connection_uri
577
1077
  __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1078
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
578
1079
  __props__.__dict__["description"] = description
579
1080
  __props__.__dict__["disable_remount"] = disable_remount
1081
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1082
+ __props__.__dict__["force_no_cache"] = force_no_cache
1083
+ __props__.__dict__["identity_token_key"] = identity_token_key
1084
+ __props__.__dict__["listing_visibility"] = listing_visibility
1085
+ __props__.__dict__["local"] = local
580
1086
  __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
581
1087
  __props__.__dict__["namespace"] = namespace
1088
+ __props__.__dict__["options"] = options
1089
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
582
1090
  if password is None and not opts.urn:
583
1091
  raise TypeError("Missing required property 'password'")
584
1092
  __props__.__dict__["password"] = None if password is None else pulumi.Output.secret(password)
585
1093
  __props__.__dict__["password_policy"] = password_policy
586
1094
  __props__.__dict__["path"] = path
1095
+ __props__.__dict__["plugin_version"] = plugin_version
1096
+ __props__.__dict__["seal_wrap"] = seal_wrap
587
1097
  if username is None and not opts.urn:
588
1098
  raise TypeError("Missing required property 'username'")
589
1099
  __props__.__dict__["username"] = None if username is None else pulumi.Output.secret(username)
590
1100
  __props__.__dict__["username_template"] = username_template
591
1101
  __props__.__dict__["verify_connection"] = verify_connection
1102
+ __props__.__dict__["accessor"] = None
592
1103
  secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["password", "username"])
593
1104
  opts = pulumi.ResourceOptions.merge(opts, secret_opts)
594
1105
  super(SecretBackend, __self__).__init__(
@@ -601,15 +1112,30 @@ class SecretBackend(pulumi.CustomResource):
601
1112
  def get(resource_name: str,
602
1113
  id: pulumi.Input[str],
603
1114
  opts: Optional[pulumi.ResourceOptions] = None,
1115
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
1116
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1117
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1118
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1119
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
604
1120
  connection_uri: Optional[pulumi.Input[_builtins.str]] = None,
605
1121
  default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1122
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
606
1123
  description: Optional[pulumi.Input[_builtins.str]] = None,
607
1124
  disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1125
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1126
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1127
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1128
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1129
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
608
1130
  max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
609
1131
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
1132
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1133
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
610
1134
  password: Optional[pulumi.Input[_builtins.str]] = None,
611
1135
  password_policy: Optional[pulumi.Input[_builtins.str]] = None,
612
1136
  path: Optional[pulumi.Input[_builtins.str]] = None,
1137
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1138
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
613
1139
  username: Optional[pulumi.Input[_builtins.str]] = None,
614
1140
  username_template: Optional[pulumi.Input[_builtins.str]] = None,
615
1141
  verify_connection: Optional[pulumi.Input[_builtins.bool]] = None) -> 'SecretBackend':
@@ -620,22 +1146,35 @@ class SecretBackend(pulumi.CustomResource):
620
1146
  :param str resource_name: The unique name of the resulting resource.
621
1147
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
622
1148
  :param pulumi.ResourceOptions opts: Options for the resource.
1149
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
1150
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1151
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1152
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1153
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
623
1154
  :param pulumi.Input[_builtins.str] connection_uri: Specifies the RabbitMQ connection URI.
624
- :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: The default TTL for credentials
625
- issued by this backend.
626
- :param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
1155
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds
1156
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1157
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
627
1158
  :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
628
1159
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
629
- :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
630
- for credentials issued by this backend.
1160
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1161
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1162
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1163
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1164
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1165
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds
631
1166
  :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
632
1167
  The value should not contain leading or trailing forward slashes.
633
1168
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
634
1169
  *Available only for Vault Enterprise*.
1170
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1171
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
635
1172
  :param pulumi.Input[_builtins.str] password: Specifies the RabbitMQ management administrator password.
636
1173
  :param pulumi.Input[_builtins.str] password_policy: Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set.
637
1174
  :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
638
1175
  not begin or end with a `/`. Defaults to `rabbitmq`.
1176
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1177
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
639
1178
  :param pulumi.Input[_builtins.str] username: Specifies the RabbitMQ management administrator username.
640
1179
  :param pulumi.Input[_builtins.str] username_template: Template describing how dynamic usernames are generated.
641
1180
  :param pulumi.Input[_builtins.bool] verify_connection: Specifies whether to verify connection URI, username, and password.
@@ -645,20 +1184,75 @@ class SecretBackend(pulumi.CustomResource):
645
1184
 
646
1185
  __props__ = _SecretBackendState.__new__(_SecretBackendState)
647
1186
 
1187
+ __props__.__dict__["accessor"] = accessor
1188
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1189
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1190
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1191
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
648
1192
  __props__.__dict__["connection_uri"] = connection_uri
649
1193
  __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1194
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
650
1195
  __props__.__dict__["description"] = description
651
1196
  __props__.__dict__["disable_remount"] = disable_remount
1197
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1198
+ __props__.__dict__["force_no_cache"] = force_no_cache
1199
+ __props__.__dict__["identity_token_key"] = identity_token_key
1200
+ __props__.__dict__["listing_visibility"] = listing_visibility
1201
+ __props__.__dict__["local"] = local
652
1202
  __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
653
1203
  __props__.__dict__["namespace"] = namespace
1204
+ __props__.__dict__["options"] = options
1205
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
654
1206
  __props__.__dict__["password"] = password
655
1207
  __props__.__dict__["password_policy"] = password_policy
656
1208
  __props__.__dict__["path"] = path
1209
+ __props__.__dict__["plugin_version"] = plugin_version
1210
+ __props__.__dict__["seal_wrap"] = seal_wrap
657
1211
  __props__.__dict__["username"] = username
658
1212
  __props__.__dict__["username_template"] = username_template
659
1213
  __props__.__dict__["verify_connection"] = verify_connection
660
1214
  return SecretBackend(resource_name, opts=opts, __props__=__props__)
661
1215
 
1216
+ @_builtins.property
1217
+ @pulumi.getter
1218
+ def accessor(self) -> pulumi.Output[_builtins.str]:
1219
+ """
1220
+ Accessor of the mount
1221
+ """
1222
+ return pulumi.get(self, "accessor")
1223
+
1224
+ @_builtins.property
1225
+ @pulumi.getter(name="allowedManagedKeys")
1226
+ def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1227
+ """
1228
+ List of managed key registry entry names that the mount in question is allowed to access
1229
+ """
1230
+ return pulumi.get(self, "allowed_managed_keys")
1231
+
1232
+ @_builtins.property
1233
+ @pulumi.getter(name="allowedResponseHeaders")
1234
+ def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1235
+ """
1236
+ List of headers to allow and pass from the request to the plugin
1237
+ """
1238
+ return pulumi.get(self, "allowed_response_headers")
1239
+
1240
+ @_builtins.property
1241
+ @pulumi.getter(name="auditNonHmacRequestKeys")
1242
+ def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1243
+ """
1244
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1245
+ """
1246
+ return pulumi.get(self, "audit_non_hmac_request_keys")
1247
+
1248
+ @_builtins.property
1249
+ @pulumi.getter(name="auditNonHmacResponseKeys")
1250
+ def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1251
+ """
1252
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1253
+ """
1254
+ return pulumi.get(self, "audit_non_hmac_response_keys")
1255
+
662
1256
  @_builtins.property
663
1257
  @pulumi.getter(name="connectionUri")
664
1258
  def connection_uri(self) -> pulumi.Output[_builtins.str]:
@@ -671,16 +1265,23 @@ class SecretBackend(pulumi.CustomResource):
671
1265
  @pulumi.getter(name="defaultLeaseTtlSeconds")
672
1266
  def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
673
1267
  """
674
- The default TTL for credentials
675
- issued by this backend.
1268
+ Default lease duration for secrets in seconds
676
1269
  """
677
1270
  return pulumi.get(self, "default_lease_ttl_seconds")
678
1271
 
1272
+ @_builtins.property
1273
+ @pulumi.getter(name="delegatedAuthAccessors")
1274
+ def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1275
+ """
1276
+ List of headers to allow and pass from the request to the plugin
1277
+ """
1278
+ return pulumi.get(self, "delegated_auth_accessors")
1279
+
679
1280
  @_builtins.property
680
1281
  @pulumi.getter
681
1282
  def description(self) -> pulumi.Output[Optional[_builtins.str]]:
682
1283
  """
683
- A human-friendly description for this backend.
1284
+ Human-friendly description of the mount for the backend.
684
1285
  """
685
1286
  return pulumi.get(self, "description")
686
1287
 
@@ -693,12 +1294,51 @@ class SecretBackend(pulumi.CustomResource):
693
1294
  """
694
1295
  return pulumi.get(self, "disable_remount")
695
1296
 
1297
+ @_builtins.property
1298
+ @pulumi.getter(name="externalEntropyAccess")
1299
+ def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
1300
+ """
1301
+ Enable the secrets engine to access Vault's external entropy source
1302
+ """
1303
+ return pulumi.get(self, "external_entropy_access")
1304
+
1305
+ @_builtins.property
1306
+ @pulumi.getter(name="forceNoCache")
1307
+ def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
1308
+ """
1309
+ If set to true, disables caching.
1310
+ """
1311
+ return pulumi.get(self, "force_no_cache")
1312
+
1313
+ @_builtins.property
1314
+ @pulumi.getter(name="identityTokenKey")
1315
+ def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
1316
+ """
1317
+ The key to use for signing plugin workload identity tokens
1318
+ """
1319
+ return pulumi.get(self, "identity_token_key")
1320
+
1321
+ @_builtins.property
1322
+ @pulumi.getter(name="listingVisibility")
1323
+ def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
1324
+ """
1325
+ Specifies whether to show this mount in the UI-specific listing endpoint
1326
+ """
1327
+ return pulumi.get(self, "listing_visibility")
1328
+
1329
+ @_builtins.property
1330
+ @pulumi.getter
1331
+ def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
1332
+ """
1333
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1334
+ """
1335
+ return pulumi.get(self, "local")
1336
+
696
1337
  @_builtins.property
697
1338
  @pulumi.getter(name="maxLeaseTtlSeconds")
698
1339
  def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
699
1340
  """
700
- The maximum TTL that can be requested
701
- for credentials issued by this backend.
1341
+ Maximum possible lease duration for secrets in seconds
702
1342
  """
703
1343
  return pulumi.get(self, "max_lease_ttl_seconds")
704
1344
 
@@ -713,6 +1353,22 @@ class SecretBackend(pulumi.CustomResource):
713
1353
  """
714
1354
  return pulumi.get(self, "namespace")
715
1355
 
1356
+ @_builtins.property
1357
+ @pulumi.getter
1358
+ def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
1359
+ """
1360
+ Specifies mount type specific options that are passed to the backend
1361
+ """
1362
+ return pulumi.get(self, "options")
1363
+
1364
+ @_builtins.property
1365
+ @pulumi.getter(name="passthroughRequestHeaders")
1366
+ def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1367
+ """
1368
+ List of headers to allow and pass from the request to the plugin
1369
+ """
1370
+ return pulumi.get(self, "passthrough_request_headers")
1371
+
716
1372
  @_builtins.property
717
1373
  @pulumi.getter
718
1374
  def password(self) -> pulumi.Output[_builtins.str]:
@@ -738,6 +1394,22 @@ class SecretBackend(pulumi.CustomResource):
738
1394
  """
739
1395
  return pulumi.get(self, "path")
740
1396
 
1397
+ @_builtins.property
1398
+ @pulumi.getter(name="pluginVersion")
1399
+ def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
1400
+ """
1401
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1402
+ """
1403
+ return pulumi.get(self, "plugin_version")
1404
+
1405
+ @_builtins.property
1406
+ @pulumi.getter(name="sealWrap")
1407
+ def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
1408
+ """
1409
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1410
+ """
1411
+ return pulumi.get(self, "seal_wrap")
1412
+
741
1413
  @_builtins.property
742
1414
  @pulumi.getter
743
1415
  def username(self) -> pulumi.Output[_builtins.str]: