pulumi-vault 7.2.0a1755297899__py3-none-any.whl → 7.3.0a1755586140__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -20,13 +20,29 @@ __all__ = ['SecretBackendArgs', 'SecretBackend']
20
20
  class SecretBackendArgs:
21
21
  def __init__(__self__, *,
22
22
  path: pulumi.Input[_builtins.str],
23
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
24
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
25
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
23
28
  default_tls_client_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
24
29
  default_tls_client_key_type: Optional[pulumi.Input[_builtins.str]] = None,
25
30
  default_tls_client_ttl: Optional[pulumi.Input[_builtins.int]] = None,
31
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
32
  description: Optional[pulumi.Input[_builtins.str]] = None,
27
33
  disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
34
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
35
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
36
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
28
37
  listen_addrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
38
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
39
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
40
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
29
41
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
42
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
43
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
44
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
45
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
30
46
  server_hostnames: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
31
47
  server_ips: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
32
48
  tls_ca_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
@@ -36,17 +52,33 @@ class SecretBackendArgs:
36
52
  The set of arguments for constructing a SecretBackend resource.
37
53
  :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
38
54
  not begin or end with a `/`. Defaults to `kmip`.
55
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
56
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
57
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
58
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
59
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
39
60
  :param pulumi.Input[_builtins.int] default_tls_client_key_bits: Client certificate key bits, valid values depend on key type.
40
61
  :param pulumi.Input[_builtins.str] default_tls_client_key_type: Client certificate key type, `rsa` or `ec`.
41
62
  :param pulumi.Input[_builtins.int] default_tls_client_ttl: Client certificate TTL in seconds
42
- :param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
63
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
64
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend
43
65
  :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
44
66
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
67
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
68
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
69
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
45
70
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] listen_addrs: Addresses the KMIP server should listen on (`host:port`).
71
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
72
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
73
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
46
74
  :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
47
75
  The value should not contain leading or trailing forward slashes.
48
76
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
49
77
  *Available only for Vault Enterprise*.
78
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
79
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
80
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
81
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
50
82
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] server_hostnames: Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN).
51
83
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] server_ips: IPs to include in the server's TLS certificate as SAN IP addresses.
52
84
  :param pulumi.Input[_builtins.int] tls_ca_key_bits: CA key bits, valid values depend on key type.
@@ -54,20 +86,52 @@ class SecretBackendArgs:
54
86
  :param pulumi.Input[_builtins.str] tls_min_version: Minimum TLS version to accept.
55
87
  """
56
88
  pulumi.set(__self__, "path", path)
89
+ if allowed_managed_keys is not None:
90
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
91
+ if allowed_response_headers is not None:
92
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
93
+ if audit_non_hmac_request_keys is not None:
94
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
95
+ if audit_non_hmac_response_keys is not None:
96
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
97
+ if default_lease_ttl_seconds is not None:
98
+ pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
57
99
  if default_tls_client_key_bits is not None:
58
100
  pulumi.set(__self__, "default_tls_client_key_bits", default_tls_client_key_bits)
59
101
  if default_tls_client_key_type is not None:
60
102
  pulumi.set(__self__, "default_tls_client_key_type", default_tls_client_key_type)
61
103
  if default_tls_client_ttl is not None:
62
104
  pulumi.set(__self__, "default_tls_client_ttl", default_tls_client_ttl)
105
+ if delegated_auth_accessors is not None:
106
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
63
107
  if description is not None:
64
108
  pulumi.set(__self__, "description", description)
65
109
  if disable_remount is not None:
66
110
  pulumi.set(__self__, "disable_remount", disable_remount)
111
+ if external_entropy_access is not None:
112
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
113
+ if force_no_cache is not None:
114
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
115
+ if identity_token_key is not None:
116
+ pulumi.set(__self__, "identity_token_key", identity_token_key)
67
117
  if listen_addrs is not None:
68
118
  pulumi.set(__self__, "listen_addrs", listen_addrs)
119
+ if listing_visibility is not None:
120
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
121
+ if local is not None:
122
+ pulumi.set(__self__, "local", local)
123
+ if max_lease_ttl_seconds is not None:
124
+ pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
69
125
  if namespace is not None:
70
126
  pulumi.set(__self__, "namespace", namespace)
127
+ if options is not None:
128
+ pulumi.set(__self__, "options", options)
129
+ if passthrough_request_headers is not None:
130
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
131
+ if plugin_version is not None:
132
+ pulumi.set(__self__, "plugin_version", plugin_version)
133
+ if seal_wrap is not None:
134
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
71
135
  if server_hostnames is not None:
72
136
  pulumi.set(__self__, "server_hostnames", server_hostnames)
73
137
  if server_ips is not None:
@@ -92,6 +156,66 @@ class SecretBackendArgs:
92
156
  def path(self, value: pulumi.Input[_builtins.str]):
93
157
  pulumi.set(self, "path", value)
94
158
 
159
+ @_builtins.property
160
+ @pulumi.getter(name="allowedManagedKeys")
161
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
162
+ """
163
+ List of managed key registry entry names that the mount in question is allowed to access
164
+ """
165
+ return pulumi.get(self, "allowed_managed_keys")
166
+
167
+ @allowed_managed_keys.setter
168
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
169
+ pulumi.set(self, "allowed_managed_keys", value)
170
+
171
+ @_builtins.property
172
+ @pulumi.getter(name="allowedResponseHeaders")
173
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
174
+ """
175
+ List of headers to allow and pass from the request to the plugin
176
+ """
177
+ return pulumi.get(self, "allowed_response_headers")
178
+
179
+ @allowed_response_headers.setter
180
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
181
+ pulumi.set(self, "allowed_response_headers", value)
182
+
183
+ @_builtins.property
184
+ @pulumi.getter(name="auditNonHmacRequestKeys")
185
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
186
+ """
187
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
188
+ """
189
+ return pulumi.get(self, "audit_non_hmac_request_keys")
190
+
191
+ @audit_non_hmac_request_keys.setter
192
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
193
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
194
+
195
+ @_builtins.property
196
+ @pulumi.getter(name="auditNonHmacResponseKeys")
197
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
198
+ """
199
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
200
+ """
201
+ return pulumi.get(self, "audit_non_hmac_response_keys")
202
+
203
+ @audit_non_hmac_response_keys.setter
204
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
205
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
206
+
207
+ @_builtins.property
208
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
209
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
210
+ """
211
+ Default lease duration for tokens and secrets in seconds
212
+ """
213
+ return pulumi.get(self, "default_lease_ttl_seconds")
214
+
215
+ @default_lease_ttl_seconds.setter
216
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
217
+ pulumi.set(self, "default_lease_ttl_seconds", value)
218
+
95
219
  @_builtins.property
96
220
  @pulumi.getter(name="defaultTlsClientKeyBits")
97
221
  def default_tls_client_key_bits(self) -> Optional[pulumi.Input[_builtins.int]]:
@@ -128,11 +252,23 @@ class SecretBackendArgs:
128
252
  def default_tls_client_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
129
253
  pulumi.set(self, "default_tls_client_ttl", value)
130
254
 
255
+ @_builtins.property
256
+ @pulumi.getter(name="delegatedAuthAccessors")
257
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
258
+ """
259
+ List of headers to allow and pass from the request to the plugin
260
+ """
261
+ return pulumi.get(self, "delegated_auth_accessors")
262
+
263
+ @delegated_auth_accessors.setter
264
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
265
+ pulumi.set(self, "delegated_auth_accessors", value)
266
+
131
267
  @_builtins.property
132
268
  @pulumi.getter
133
269
  def description(self) -> Optional[pulumi.Input[_builtins.str]]:
134
270
  """
135
- A human-friendly description for this backend.
271
+ Human-friendly description of the mount for the backend
136
272
  """
137
273
  return pulumi.get(self, "description")
138
274
 
@@ -153,6 +289,42 @@ class SecretBackendArgs:
153
289
  def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
154
290
  pulumi.set(self, "disable_remount", value)
155
291
 
292
+ @_builtins.property
293
+ @pulumi.getter(name="externalEntropyAccess")
294
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
295
+ """
296
+ Enable the secrets engine to access Vault's external entropy source
297
+ """
298
+ return pulumi.get(self, "external_entropy_access")
299
+
300
+ @external_entropy_access.setter
301
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
302
+ pulumi.set(self, "external_entropy_access", value)
303
+
304
+ @_builtins.property
305
+ @pulumi.getter(name="forceNoCache")
306
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
307
+ """
308
+ If set to true, disables caching.
309
+ """
310
+ return pulumi.get(self, "force_no_cache")
311
+
312
+ @force_no_cache.setter
313
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
314
+ pulumi.set(self, "force_no_cache", value)
315
+
316
+ @_builtins.property
317
+ @pulumi.getter(name="identityTokenKey")
318
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
319
+ """
320
+ The key to use for signing plugin workload identity tokens
321
+ """
322
+ return pulumi.get(self, "identity_token_key")
323
+
324
+ @identity_token_key.setter
325
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
326
+ pulumi.set(self, "identity_token_key", value)
327
+
156
328
  @_builtins.property
157
329
  @pulumi.getter(name="listenAddrs")
158
330
  def listen_addrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
@@ -165,6 +337,42 @@ class SecretBackendArgs:
165
337
  def listen_addrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
166
338
  pulumi.set(self, "listen_addrs", value)
167
339
 
340
+ @_builtins.property
341
+ @pulumi.getter(name="listingVisibility")
342
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
343
+ """
344
+ Specifies whether to show this mount in the UI-specific listing endpoint
345
+ """
346
+ return pulumi.get(self, "listing_visibility")
347
+
348
+ @listing_visibility.setter
349
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
350
+ pulumi.set(self, "listing_visibility", value)
351
+
352
+ @_builtins.property
353
+ @pulumi.getter
354
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
355
+ """
356
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
357
+ """
358
+ return pulumi.get(self, "local")
359
+
360
+ @local.setter
361
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
362
+ pulumi.set(self, "local", value)
363
+
364
+ @_builtins.property
365
+ @pulumi.getter(name="maxLeaseTtlSeconds")
366
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
367
+ """
368
+ Maximum possible lease duration for tokens and secrets in seconds
369
+ """
370
+ return pulumi.get(self, "max_lease_ttl_seconds")
371
+
372
+ @max_lease_ttl_seconds.setter
373
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
374
+ pulumi.set(self, "max_lease_ttl_seconds", value)
375
+
168
376
  @_builtins.property
169
377
  @pulumi.getter
170
378
  def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -180,6 +388,54 @@ class SecretBackendArgs:
180
388
  def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
181
389
  pulumi.set(self, "namespace", value)
182
390
 
391
+ @_builtins.property
392
+ @pulumi.getter
393
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
394
+ """
395
+ Specifies mount type specific options that are passed to the backend
396
+ """
397
+ return pulumi.get(self, "options")
398
+
399
+ @options.setter
400
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
401
+ pulumi.set(self, "options", value)
402
+
403
+ @_builtins.property
404
+ @pulumi.getter(name="passthroughRequestHeaders")
405
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
406
+ """
407
+ List of headers to allow and pass from the request to the plugin
408
+ """
409
+ return pulumi.get(self, "passthrough_request_headers")
410
+
411
+ @passthrough_request_headers.setter
412
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
413
+ pulumi.set(self, "passthrough_request_headers", value)
414
+
415
+ @_builtins.property
416
+ @pulumi.getter(name="pluginVersion")
417
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
418
+ """
419
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
420
+ """
421
+ return pulumi.get(self, "plugin_version")
422
+
423
+ @plugin_version.setter
424
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
425
+ pulumi.set(self, "plugin_version", value)
426
+
427
+ @_builtins.property
428
+ @pulumi.getter(name="sealWrap")
429
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
430
+ """
431
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
432
+ """
433
+ return pulumi.get(self, "seal_wrap")
434
+
435
+ @seal_wrap.setter
436
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
437
+ pulumi.set(self, "seal_wrap", value)
438
+
183
439
  @_builtins.property
184
440
  @pulumi.getter(name="serverHostnames")
185
441
  def server_hostnames(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
@@ -244,14 +500,31 @@ class SecretBackendArgs:
244
500
  @pulumi.input_type
245
501
  class _SecretBackendState:
246
502
  def __init__(__self__, *,
503
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
504
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
505
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
506
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
507
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
508
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
247
509
  default_tls_client_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
248
510
  default_tls_client_key_type: Optional[pulumi.Input[_builtins.str]] = None,
249
511
  default_tls_client_ttl: Optional[pulumi.Input[_builtins.int]] = None,
512
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
250
513
  description: Optional[pulumi.Input[_builtins.str]] = None,
251
514
  disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
515
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
516
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
517
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
252
518
  listen_addrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
519
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
520
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
521
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
253
522
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
523
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
524
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
254
525
  path: Optional[pulumi.Input[_builtins.str]] = None,
526
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
527
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
255
528
  server_hostnames: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
256
529
  server_ips: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
257
530
  tls_ca_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
@@ -259,41 +532,92 @@ class _SecretBackendState:
259
532
  tls_min_version: Optional[pulumi.Input[_builtins.str]] = None):
260
533
  """
261
534
  Input properties used for looking up and filtering SecretBackend resources.
535
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
536
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
537
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
538
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
539
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
540
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
262
541
  :param pulumi.Input[_builtins.int] default_tls_client_key_bits: Client certificate key bits, valid values depend on key type.
263
542
  :param pulumi.Input[_builtins.str] default_tls_client_key_type: Client certificate key type, `rsa` or `ec`.
264
543
  :param pulumi.Input[_builtins.int] default_tls_client_ttl: Client certificate TTL in seconds
265
- :param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
544
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
545
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend
266
546
  :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
267
547
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
548
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
549
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
550
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
268
551
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] listen_addrs: Addresses the KMIP server should listen on (`host:port`).
552
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
553
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
554
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
269
555
  :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
270
556
  The value should not contain leading or trailing forward slashes.
271
557
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
272
558
  *Available only for Vault Enterprise*.
559
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
560
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
273
561
  :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
274
562
  not begin or end with a `/`. Defaults to `kmip`.
563
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
564
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
275
565
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] server_hostnames: Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN).
276
566
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] server_ips: IPs to include in the server's TLS certificate as SAN IP addresses.
277
567
  :param pulumi.Input[_builtins.int] tls_ca_key_bits: CA key bits, valid values depend on key type.
278
568
  :param pulumi.Input[_builtins.str] tls_ca_key_type: CA key type, rsa or ec.
279
569
  :param pulumi.Input[_builtins.str] tls_min_version: Minimum TLS version to accept.
280
570
  """
571
+ if accessor is not None:
572
+ pulumi.set(__self__, "accessor", accessor)
573
+ if allowed_managed_keys is not None:
574
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
575
+ if allowed_response_headers is not None:
576
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
577
+ if audit_non_hmac_request_keys is not None:
578
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
579
+ if audit_non_hmac_response_keys is not None:
580
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
581
+ if default_lease_ttl_seconds is not None:
582
+ pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
281
583
  if default_tls_client_key_bits is not None:
282
584
  pulumi.set(__self__, "default_tls_client_key_bits", default_tls_client_key_bits)
283
585
  if default_tls_client_key_type is not None:
284
586
  pulumi.set(__self__, "default_tls_client_key_type", default_tls_client_key_type)
285
587
  if default_tls_client_ttl is not None:
286
588
  pulumi.set(__self__, "default_tls_client_ttl", default_tls_client_ttl)
589
+ if delegated_auth_accessors is not None:
590
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
287
591
  if description is not None:
288
592
  pulumi.set(__self__, "description", description)
289
593
  if disable_remount is not None:
290
594
  pulumi.set(__self__, "disable_remount", disable_remount)
595
+ if external_entropy_access is not None:
596
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
597
+ if force_no_cache is not None:
598
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
599
+ if identity_token_key is not None:
600
+ pulumi.set(__self__, "identity_token_key", identity_token_key)
291
601
  if listen_addrs is not None:
292
602
  pulumi.set(__self__, "listen_addrs", listen_addrs)
603
+ if listing_visibility is not None:
604
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
605
+ if local is not None:
606
+ pulumi.set(__self__, "local", local)
607
+ if max_lease_ttl_seconds is not None:
608
+ pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
293
609
  if namespace is not None:
294
610
  pulumi.set(__self__, "namespace", namespace)
611
+ if options is not None:
612
+ pulumi.set(__self__, "options", options)
613
+ if passthrough_request_headers is not None:
614
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
295
615
  if path is not None:
296
616
  pulumi.set(__self__, "path", path)
617
+ if plugin_version is not None:
618
+ pulumi.set(__self__, "plugin_version", plugin_version)
619
+ if seal_wrap is not None:
620
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
297
621
  if server_hostnames is not None:
298
622
  pulumi.set(__self__, "server_hostnames", server_hostnames)
299
623
  if server_ips is not None:
@@ -305,6 +629,78 @@ class _SecretBackendState:
305
629
  if tls_min_version is not None:
306
630
  pulumi.set(__self__, "tls_min_version", tls_min_version)
307
631
 
632
+ @_builtins.property
633
+ @pulumi.getter
634
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
635
+ """
636
+ Accessor of the mount
637
+ """
638
+ return pulumi.get(self, "accessor")
639
+
640
+ @accessor.setter
641
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
642
+ pulumi.set(self, "accessor", value)
643
+
644
+ @_builtins.property
645
+ @pulumi.getter(name="allowedManagedKeys")
646
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
647
+ """
648
+ List of managed key registry entry names that the mount in question is allowed to access
649
+ """
650
+ return pulumi.get(self, "allowed_managed_keys")
651
+
652
+ @allowed_managed_keys.setter
653
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
654
+ pulumi.set(self, "allowed_managed_keys", value)
655
+
656
+ @_builtins.property
657
+ @pulumi.getter(name="allowedResponseHeaders")
658
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
659
+ """
660
+ List of headers to allow and pass from the request to the plugin
661
+ """
662
+ return pulumi.get(self, "allowed_response_headers")
663
+
664
+ @allowed_response_headers.setter
665
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
666
+ pulumi.set(self, "allowed_response_headers", value)
667
+
668
+ @_builtins.property
669
+ @pulumi.getter(name="auditNonHmacRequestKeys")
670
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
671
+ """
672
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
673
+ """
674
+ return pulumi.get(self, "audit_non_hmac_request_keys")
675
+
676
+ @audit_non_hmac_request_keys.setter
677
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
678
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
679
+
680
+ @_builtins.property
681
+ @pulumi.getter(name="auditNonHmacResponseKeys")
682
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
683
+ """
684
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
685
+ """
686
+ return pulumi.get(self, "audit_non_hmac_response_keys")
687
+
688
+ @audit_non_hmac_response_keys.setter
689
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
690
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
691
+
692
+ @_builtins.property
693
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
694
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
695
+ """
696
+ Default lease duration for tokens and secrets in seconds
697
+ """
698
+ return pulumi.get(self, "default_lease_ttl_seconds")
699
+
700
+ @default_lease_ttl_seconds.setter
701
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
702
+ pulumi.set(self, "default_lease_ttl_seconds", value)
703
+
308
704
  @_builtins.property
309
705
  @pulumi.getter(name="defaultTlsClientKeyBits")
310
706
  def default_tls_client_key_bits(self) -> Optional[pulumi.Input[_builtins.int]]:
@@ -341,11 +737,23 @@ class _SecretBackendState:
341
737
  def default_tls_client_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
342
738
  pulumi.set(self, "default_tls_client_ttl", value)
343
739
 
740
+ @_builtins.property
741
+ @pulumi.getter(name="delegatedAuthAccessors")
742
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
743
+ """
744
+ List of headers to allow and pass from the request to the plugin
745
+ """
746
+ return pulumi.get(self, "delegated_auth_accessors")
747
+
748
+ @delegated_auth_accessors.setter
749
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
750
+ pulumi.set(self, "delegated_auth_accessors", value)
751
+
344
752
  @_builtins.property
345
753
  @pulumi.getter
346
754
  def description(self) -> Optional[pulumi.Input[_builtins.str]]:
347
755
  """
348
- A human-friendly description for this backend.
756
+ Human-friendly description of the mount for the backend
349
757
  """
350
758
  return pulumi.get(self, "description")
351
759
 
@@ -366,6 +774,42 @@ class _SecretBackendState:
366
774
  def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
367
775
  pulumi.set(self, "disable_remount", value)
368
776
 
777
+ @_builtins.property
778
+ @pulumi.getter(name="externalEntropyAccess")
779
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
780
+ """
781
+ Enable the secrets engine to access Vault's external entropy source
782
+ """
783
+ return pulumi.get(self, "external_entropy_access")
784
+
785
+ @external_entropy_access.setter
786
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
787
+ pulumi.set(self, "external_entropy_access", value)
788
+
789
+ @_builtins.property
790
+ @pulumi.getter(name="forceNoCache")
791
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
792
+ """
793
+ If set to true, disables caching.
794
+ """
795
+ return pulumi.get(self, "force_no_cache")
796
+
797
+ @force_no_cache.setter
798
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
799
+ pulumi.set(self, "force_no_cache", value)
800
+
801
+ @_builtins.property
802
+ @pulumi.getter(name="identityTokenKey")
803
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
804
+ """
805
+ The key to use for signing plugin workload identity tokens
806
+ """
807
+ return pulumi.get(self, "identity_token_key")
808
+
809
+ @identity_token_key.setter
810
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
811
+ pulumi.set(self, "identity_token_key", value)
812
+
369
813
  @_builtins.property
370
814
  @pulumi.getter(name="listenAddrs")
371
815
  def listen_addrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
@@ -378,6 +822,42 @@ class _SecretBackendState:
378
822
  def listen_addrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
379
823
  pulumi.set(self, "listen_addrs", value)
380
824
 
825
+ @_builtins.property
826
+ @pulumi.getter(name="listingVisibility")
827
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
828
+ """
829
+ Specifies whether to show this mount in the UI-specific listing endpoint
830
+ """
831
+ return pulumi.get(self, "listing_visibility")
832
+
833
+ @listing_visibility.setter
834
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
835
+ pulumi.set(self, "listing_visibility", value)
836
+
837
+ @_builtins.property
838
+ @pulumi.getter
839
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
840
+ """
841
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
842
+ """
843
+ return pulumi.get(self, "local")
844
+
845
+ @local.setter
846
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
847
+ pulumi.set(self, "local", value)
848
+
849
+ @_builtins.property
850
+ @pulumi.getter(name="maxLeaseTtlSeconds")
851
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
852
+ """
853
+ Maximum possible lease duration for tokens and secrets in seconds
854
+ """
855
+ return pulumi.get(self, "max_lease_ttl_seconds")
856
+
857
+ @max_lease_ttl_seconds.setter
858
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
859
+ pulumi.set(self, "max_lease_ttl_seconds", value)
860
+
381
861
  @_builtins.property
382
862
  @pulumi.getter
383
863
  def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -393,6 +873,30 @@ class _SecretBackendState:
393
873
  def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
394
874
  pulumi.set(self, "namespace", value)
395
875
 
876
+ @_builtins.property
877
+ @pulumi.getter
878
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
879
+ """
880
+ Specifies mount type specific options that are passed to the backend
881
+ """
882
+ return pulumi.get(self, "options")
883
+
884
+ @options.setter
885
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
886
+ pulumi.set(self, "options", value)
887
+
888
+ @_builtins.property
889
+ @pulumi.getter(name="passthroughRequestHeaders")
890
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
891
+ """
892
+ List of headers to allow and pass from the request to the plugin
893
+ """
894
+ return pulumi.get(self, "passthrough_request_headers")
895
+
896
+ @passthrough_request_headers.setter
897
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
898
+ pulumi.set(self, "passthrough_request_headers", value)
899
+
396
900
  @_builtins.property
397
901
  @pulumi.getter
398
902
  def path(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -406,6 +910,30 @@ class _SecretBackendState:
406
910
  def path(self, value: Optional[pulumi.Input[_builtins.str]]):
407
911
  pulumi.set(self, "path", value)
408
912
 
913
+ @_builtins.property
914
+ @pulumi.getter(name="pluginVersion")
915
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
916
+ """
917
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
918
+ """
919
+ return pulumi.get(self, "plugin_version")
920
+
921
+ @plugin_version.setter
922
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
923
+ pulumi.set(self, "plugin_version", value)
924
+
925
+ @_builtins.property
926
+ @pulumi.getter(name="sealWrap")
927
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
928
+ """
929
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
930
+ """
931
+ return pulumi.get(self, "seal_wrap")
932
+
933
+ @seal_wrap.setter
934
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
935
+ pulumi.set(self, "seal_wrap", value)
936
+
409
937
  @_builtins.property
410
938
  @pulumi.getter(name="serverHostnames")
411
939
  def server_hostnames(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
@@ -473,14 +1001,30 @@ class SecretBackend(pulumi.CustomResource):
473
1001
  def __init__(__self__,
474
1002
  resource_name: str,
475
1003
  opts: Optional[pulumi.ResourceOptions] = None,
1004
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1005
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1006
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1007
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1008
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
476
1009
  default_tls_client_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
477
1010
  default_tls_client_key_type: Optional[pulumi.Input[_builtins.str]] = None,
478
1011
  default_tls_client_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1012
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
479
1013
  description: Optional[pulumi.Input[_builtins.str]] = None,
480
1014
  disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1015
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1016
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1017
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
481
1018
  listen_addrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1019
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1020
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1021
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
482
1022
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
1023
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1024
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
483
1025
  path: Optional[pulumi.Input[_builtins.str]] = None,
1026
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1027
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
484
1028
  server_hostnames: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
485
1029
  server_ips: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
486
1030
  tls_ca_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
@@ -522,19 +1066,35 @@ class SecretBackend(pulumi.CustomResource):
522
1066
 
523
1067
  :param str resource_name: The name of the resource.
524
1068
  :param pulumi.ResourceOptions opts: Options for the resource.
1069
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1070
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1071
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1072
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1073
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
525
1074
  :param pulumi.Input[_builtins.int] default_tls_client_key_bits: Client certificate key bits, valid values depend on key type.
526
1075
  :param pulumi.Input[_builtins.str] default_tls_client_key_type: Client certificate key type, `rsa` or `ec`.
527
1076
  :param pulumi.Input[_builtins.int] default_tls_client_ttl: Client certificate TTL in seconds
528
- :param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
1077
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1078
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend
529
1079
  :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
530
1080
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1081
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1082
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1083
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
531
1084
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] listen_addrs: Addresses the KMIP server should listen on (`host:port`).
1085
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1086
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1087
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
532
1088
  :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
533
1089
  The value should not contain leading or trailing forward slashes.
534
1090
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
535
1091
  *Available only for Vault Enterprise*.
1092
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1093
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
536
1094
  :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
537
1095
  not begin or end with a `/`. Defaults to `kmip`.
1096
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1097
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
538
1098
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] server_hostnames: Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN).
539
1099
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] server_ips: IPs to include in the server's TLS certificate as SAN IP addresses.
540
1100
  :param pulumi.Input[_builtins.int] tls_ca_key_bits: CA key bits, valid values depend on key type.
@@ -595,14 +1155,30 @@ class SecretBackend(pulumi.CustomResource):
595
1155
  def _internal_init(__self__,
596
1156
  resource_name: str,
597
1157
  opts: Optional[pulumi.ResourceOptions] = None,
1158
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1159
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1160
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1161
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1162
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
598
1163
  default_tls_client_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
599
1164
  default_tls_client_key_type: Optional[pulumi.Input[_builtins.str]] = None,
600
1165
  default_tls_client_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1166
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
601
1167
  description: Optional[pulumi.Input[_builtins.str]] = None,
602
1168
  disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1169
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1170
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1171
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
603
1172
  listen_addrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1173
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1174
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1175
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
604
1176
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
1177
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1178
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
605
1179
  path: Optional[pulumi.Input[_builtins.str]] = None,
1180
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1181
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
606
1182
  server_hostnames: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
607
1183
  server_ips: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
608
1184
  tls_ca_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
@@ -617,21 +1193,38 @@ class SecretBackend(pulumi.CustomResource):
617
1193
  raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
618
1194
  __props__ = SecretBackendArgs.__new__(SecretBackendArgs)
619
1195
 
1196
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1197
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1198
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1199
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
1200
+ __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
620
1201
  __props__.__dict__["default_tls_client_key_bits"] = default_tls_client_key_bits
621
1202
  __props__.__dict__["default_tls_client_key_type"] = default_tls_client_key_type
622
1203
  __props__.__dict__["default_tls_client_ttl"] = default_tls_client_ttl
1204
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
623
1205
  __props__.__dict__["description"] = description
624
1206
  __props__.__dict__["disable_remount"] = disable_remount
1207
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1208
+ __props__.__dict__["force_no_cache"] = force_no_cache
1209
+ __props__.__dict__["identity_token_key"] = identity_token_key
625
1210
  __props__.__dict__["listen_addrs"] = listen_addrs
1211
+ __props__.__dict__["listing_visibility"] = listing_visibility
1212
+ __props__.__dict__["local"] = local
1213
+ __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
626
1214
  __props__.__dict__["namespace"] = namespace
1215
+ __props__.__dict__["options"] = options
1216
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
627
1217
  if path is None and not opts.urn:
628
1218
  raise TypeError("Missing required property 'path'")
629
1219
  __props__.__dict__["path"] = path
1220
+ __props__.__dict__["plugin_version"] = plugin_version
1221
+ __props__.__dict__["seal_wrap"] = seal_wrap
630
1222
  __props__.__dict__["server_hostnames"] = server_hostnames
631
1223
  __props__.__dict__["server_ips"] = server_ips
632
1224
  __props__.__dict__["tls_ca_key_bits"] = tls_ca_key_bits
633
1225
  __props__.__dict__["tls_ca_key_type"] = tls_ca_key_type
634
1226
  __props__.__dict__["tls_min_version"] = tls_min_version
1227
+ __props__.__dict__["accessor"] = None
635
1228
  super(SecretBackend, __self__).__init__(
636
1229
  'vault:kmip/secretBackend:SecretBackend',
637
1230
  resource_name,
@@ -642,14 +1235,31 @@ class SecretBackend(pulumi.CustomResource):
642
1235
  def get(resource_name: str,
643
1236
  id: pulumi.Input[str],
644
1237
  opts: Optional[pulumi.ResourceOptions] = None,
1238
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
1239
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1240
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1241
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1242
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1243
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
645
1244
  default_tls_client_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
646
1245
  default_tls_client_key_type: Optional[pulumi.Input[_builtins.str]] = None,
647
1246
  default_tls_client_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1247
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
648
1248
  description: Optional[pulumi.Input[_builtins.str]] = None,
649
1249
  disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1250
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1251
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1252
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
650
1253
  listen_addrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1254
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1255
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1256
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
651
1257
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
1258
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1259
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
652
1260
  path: Optional[pulumi.Input[_builtins.str]] = None,
1261
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1262
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
653
1263
  server_hostnames: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
654
1264
  server_ips: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
655
1265
  tls_ca_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
@@ -662,19 +1272,36 @@ class SecretBackend(pulumi.CustomResource):
662
1272
  :param str resource_name: The unique name of the resulting resource.
663
1273
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
664
1274
  :param pulumi.ResourceOptions opts: Options for the resource.
1275
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
1276
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1277
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1278
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1279
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1280
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
665
1281
  :param pulumi.Input[_builtins.int] default_tls_client_key_bits: Client certificate key bits, valid values depend on key type.
666
1282
  :param pulumi.Input[_builtins.str] default_tls_client_key_type: Client certificate key type, `rsa` or `ec`.
667
1283
  :param pulumi.Input[_builtins.int] default_tls_client_ttl: Client certificate TTL in seconds
668
- :param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
1284
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1285
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend
669
1286
  :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
670
1287
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1288
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1289
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1290
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
671
1291
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] listen_addrs: Addresses the KMIP server should listen on (`host:port`).
1292
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1293
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1294
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
672
1295
  :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
673
1296
  The value should not contain leading or trailing forward slashes.
674
1297
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
675
1298
  *Available only for Vault Enterprise*.
1299
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1300
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
676
1301
  :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
677
1302
  not begin or end with a `/`. Defaults to `kmip`.
1303
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1304
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
678
1305
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] server_hostnames: Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN).
679
1306
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] server_ips: IPs to include in the server's TLS certificate as SAN IP addresses.
680
1307
  :param pulumi.Input[_builtins.int] tls_ca_key_bits: CA key bits, valid values depend on key type.
@@ -685,14 +1312,31 @@ class SecretBackend(pulumi.CustomResource):
685
1312
 
686
1313
  __props__ = _SecretBackendState.__new__(_SecretBackendState)
687
1314
 
1315
+ __props__.__dict__["accessor"] = accessor
1316
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1317
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1318
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1319
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
1320
+ __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
688
1321
  __props__.__dict__["default_tls_client_key_bits"] = default_tls_client_key_bits
689
1322
  __props__.__dict__["default_tls_client_key_type"] = default_tls_client_key_type
690
1323
  __props__.__dict__["default_tls_client_ttl"] = default_tls_client_ttl
1324
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
691
1325
  __props__.__dict__["description"] = description
692
1326
  __props__.__dict__["disable_remount"] = disable_remount
1327
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1328
+ __props__.__dict__["force_no_cache"] = force_no_cache
1329
+ __props__.__dict__["identity_token_key"] = identity_token_key
693
1330
  __props__.__dict__["listen_addrs"] = listen_addrs
1331
+ __props__.__dict__["listing_visibility"] = listing_visibility
1332
+ __props__.__dict__["local"] = local
1333
+ __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
694
1334
  __props__.__dict__["namespace"] = namespace
1335
+ __props__.__dict__["options"] = options
1336
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
695
1337
  __props__.__dict__["path"] = path
1338
+ __props__.__dict__["plugin_version"] = plugin_version
1339
+ __props__.__dict__["seal_wrap"] = seal_wrap
696
1340
  __props__.__dict__["server_hostnames"] = server_hostnames
697
1341
  __props__.__dict__["server_ips"] = server_ips
698
1342
  __props__.__dict__["tls_ca_key_bits"] = tls_ca_key_bits
@@ -700,6 +1344,54 @@ class SecretBackend(pulumi.CustomResource):
700
1344
  __props__.__dict__["tls_min_version"] = tls_min_version
701
1345
  return SecretBackend(resource_name, opts=opts, __props__=__props__)
702
1346
 
1347
+ @_builtins.property
1348
+ @pulumi.getter
1349
+ def accessor(self) -> pulumi.Output[_builtins.str]:
1350
+ """
1351
+ Accessor of the mount
1352
+ """
1353
+ return pulumi.get(self, "accessor")
1354
+
1355
+ @_builtins.property
1356
+ @pulumi.getter(name="allowedManagedKeys")
1357
+ def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1358
+ """
1359
+ List of managed key registry entry names that the mount in question is allowed to access
1360
+ """
1361
+ return pulumi.get(self, "allowed_managed_keys")
1362
+
1363
+ @_builtins.property
1364
+ @pulumi.getter(name="allowedResponseHeaders")
1365
+ def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1366
+ """
1367
+ List of headers to allow and pass from the request to the plugin
1368
+ """
1369
+ return pulumi.get(self, "allowed_response_headers")
1370
+
1371
+ @_builtins.property
1372
+ @pulumi.getter(name="auditNonHmacRequestKeys")
1373
+ def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1374
+ """
1375
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1376
+ """
1377
+ return pulumi.get(self, "audit_non_hmac_request_keys")
1378
+
1379
+ @_builtins.property
1380
+ @pulumi.getter(name="auditNonHmacResponseKeys")
1381
+ def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1382
+ """
1383
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1384
+ """
1385
+ return pulumi.get(self, "audit_non_hmac_response_keys")
1386
+
1387
+ @_builtins.property
1388
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
1389
+ def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1390
+ """
1391
+ Default lease duration for tokens and secrets in seconds
1392
+ """
1393
+ return pulumi.get(self, "default_lease_ttl_seconds")
1394
+
703
1395
  @_builtins.property
704
1396
  @pulumi.getter(name="defaultTlsClientKeyBits")
705
1397
  def default_tls_client_key_bits(self) -> pulumi.Output[_builtins.int]:
@@ -724,11 +1416,19 @@ class SecretBackend(pulumi.CustomResource):
724
1416
  """
725
1417
  return pulumi.get(self, "default_tls_client_ttl")
726
1418
 
1419
+ @_builtins.property
1420
+ @pulumi.getter(name="delegatedAuthAccessors")
1421
+ def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1422
+ """
1423
+ List of headers to allow and pass from the request to the plugin
1424
+ """
1425
+ return pulumi.get(self, "delegated_auth_accessors")
1426
+
727
1427
  @_builtins.property
728
1428
  @pulumi.getter
729
1429
  def description(self) -> pulumi.Output[Optional[_builtins.str]]:
730
1430
  """
731
- A human-friendly description for this backend.
1431
+ Human-friendly description of the mount for the backend
732
1432
  """
733
1433
  return pulumi.get(self, "description")
734
1434
 
@@ -741,6 +1441,30 @@ class SecretBackend(pulumi.CustomResource):
741
1441
  """
742
1442
  return pulumi.get(self, "disable_remount")
743
1443
 
1444
+ @_builtins.property
1445
+ @pulumi.getter(name="externalEntropyAccess")
1446
+ def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
1447
+ """
1448
+ Enable the secrets engine to access Vault's external entropy source
1449
+ """
1450
+ return pulumi.get(self, "external_entropy_access")
1451
+
1452
+ @_builtins.property
1453
+ @pulumi.getter(name="forceNoCache")
1454
+ def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
1455
+ """
1456
+ If set to true, disables caching.
1457
+ """
1458
+ return pulumi.get(self, "force_no_cache")
1459
+
1460
+ @_builtins.property
1461
+ @pulumi.getter(name="identityTokenKey")
1462
+ def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
1463
+ """
1464
+ The key to use for signing plugin workload identity tokens
1465
+ """
1466
+ return pulumi.get(self, "identity_token_key")
1467
+
744
1468
  @_builtins.property
745
1469
  @pulumi.getter(name="listenAddrs")
746
1470
  def listen_addrs(self) -> pulumi.Output[Sequence[_builtins.str]]:
@@ -749,6 +1473,30 @@ class SecretBackend(pulumi.CustomResource):
749
1473
  """
750
1474
  return pulumi.get(self, "listen_addrs")
751
1475
 
1476
+ @_builtins.property
1477
+ @pulumi.getter(name="listingVisibility")
1478
+ def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
1479
+ """
1480
+ Specifies whether to show this mount in the UI-specific listing endpoint
1481
+ """
1482
+ return pulumi.get(self, "listing_visibility")
1483
+
1484
+ @_builtins.property
1485
+ @pulumi.getter
1486
+ def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
1487
+ """
1488
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1489
+ """
1490
+ return pulumi.get(self, "local")
1491
+
1492
+ @_builtins.property
1493
+ @pulumi.getter(name="maxLeaseTtlSeconds")
1494
+ def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1495
+ """
1496
+ Maximum possible lease duration for tokens and secrets in seconds
1497
+ """
1498
+ return pulumi.get(self, "max_lease_ttl_seconds")
1499
+
752
1500
  @_builtins.property
753
1501
  @pulumi.getter
754
1502
  def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
@@ -760,6 +1508,22 @@ class SecretBackend(pulumi.CustomResource):
760
1508
  """
761
1509
  return pulumi.get(self, "namespace")
762
1510
 
1511
+ @_builtins.property
1512
+ @pulumi.getter
1513
+ def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
1514
+ """
1515
+ Specifies mount type specific options that are passed to the backend
1516
+ """
1517
+ return pulumi.get(self, "options")
1518
+
1519
+ @_builtins.property
1520
+ @pulumi.getter(name="passthroughRequestHeaders")
1521
+ def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1522
+ """
1523
+ List of headers to allow and pass from the request to the plugin
1524
+ """
1525
+ return pulumi.get(self, "passthrough_request_headers")
1526
+
763
1527
  @_builtins.property
764
1528
  @pulumi.getter
765
1529
  def path(self) -> pulumi.Output[_builtins.str]:
@@ -769,6 +1533,22 @@ class SecretBackend(pulumi.CustomResource):
769
1533
  """
770
1534
  return pulumi.get(self, "path")
771
1535
 
1536
+ @_builtins.property
1537
+ @pulumi.getter(name="pluginVersion")
1538
+ def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
1539
+ """
1540
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1541
+ """
1542
+ return pulumi.get(self, "plugin_version")
1543
+
1544
+ @_builtins.property
1545
+ @pulumi.getter(name="sealWrap")
1546
+ def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
1547
+ """
1548
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1549
+ """
1550
+ return pulumi.get(self, "seal_wrap")
1551
+
772
1552
  @_builtins.property
773
1553
  @pulumi.getter(name="serverHostnames")
774
1554
  def server_hostnames(self) -> pulumi.Output[Sequence[_builtins.str]]: