pulumi-vault 5.16.0a1697145324__tar.gz → 5.16.0a1697217180__tar.gz

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (227) hide show
  1. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/PKG-INFO +1 -1
  2. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/approle/auth_backend_login.py +3 -1
  3. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/aws/secret_backend.py +47 -0
  4. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/database/_inputs.py +112 -0
  5. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/database/outputs.py +98 -2
  6. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/database/secret_backend_static_role.py +153 -21
  7. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/nomad_secret_role.py +7 -14
  8. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/pkisecret/secret_backend_role.py +21 -7
  9. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/ssh/secret_backend_role.py +54 -0
  10. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/transit/secret_backend_key.py +61 -14
  11. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault.egg-info/PKG-INFO +1 -1
  12. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/setup.py +2 -2
  13. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/README.md +0 -0
  14. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/__init__.py +0 -0
  15. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/_inputs.py +0 -0
  16. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/_utilities.py +0 -0
  17. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/ad/__init__.py +0 -0
  18. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/ad/get_access_credentials.py +0 -0
  19. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/ad/secret_backend.py +0 -0
  20. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/ad/secret_library.py +0 -0
  21. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/ad/secret_role.py +0 -0
  22. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/alicloud/__init__.py +0 -0
  23. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/alicloud/auth_backend_role.py +0 -0
  24. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/approle/__init__.py +0 -0
  25. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/approle/auth_backend_role.py +0 -0
  26. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/approle/auth_backend_role_secret_id.py +0 -0
  27. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/approle/get_auth_backend_role_id.py +0 -0
  28. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/audit.py +0 -0
  29. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/audit_request_header.py +0 -0
  30. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/auth_backend.py +0 -0
  31. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/aws/__init__.py +0 -0
  32. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/aws/auth_backend_cert.py +0 -0
  33. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/aws/auth_backend_client.py +0 -0
  34. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/aws/auth_backend_config_identity.py +0 -0
  35. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -0
  36. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/aws/auth_backend_login.py +0 -0
  37. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/aws/auth_backend_role.py +0 -0
  38. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/aws/auth_backend_role_tag.py +0 -0
  39. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -0
  40. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/aws/auth_backend_sts_role.py +0 -0
  41. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/aws/get_access_credentials.py +0 -0
  42. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/aws/secret_backend_role.py +0 -0
  43. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/aws/secret_backend_static_role.py +0 -0
  44. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/azure/__init__.py +0 -0
  45. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/azure/_inputs.py +0 -0
  46. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/azure/auth_backend_config.py +0 -0
  47. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/azure/auth_backend_role.py +0 -0
  48. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/azure/backend.py +0 -0
  49. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/azure/backend_role.py +0 -0
  50. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/azure/get_access_credentials.py +0 -0
  51. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/azure/outputs.py +0 -0
  52. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/cert_auth_backend_role.py +0 -0
  53. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/config/__init__.py +0 -0
  54. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/config/outputs.py +0 -0
  55. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/config/vars.py +0 -0
  56. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/consul/__init__.py +0 -0
  57. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/consul/secret_backend.py +0 -0
  58. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/consul/secret_backend_role.py +0 -0
  59. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/database/__init__.py +0 -0
  60. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/database/secret_backend_connection.py +0 -0
  61. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/database/secret_backend_role.py +0 -0
  62. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/database/secrets_mount.py +0 -0
  63. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/egp_policy.py +0 -0
  64. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/gcp/__init__.py +0 -0
  65. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/gcp/_inputs.py +0 -0
  66. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/gcp/auth_backend.py +0 -0
  67. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/gcp/auth_backend_role.py +0 -0
  68. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/gcp/get_auth_backend_role.py +0 -0
  69. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/gcp/outputs.py +0 -0
  70. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/gcp/secret_backend.py +0 -0
  71. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/gcp/secret_impersonated_account.py +0 -0
  72. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/gcp/secret_roleset.py +0 -0
  73. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/gcp/secret_static_account.py +0 -0
  74. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/generic/__init__.py +0 -0
  75. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/generic/endpoint.py +0 -0
  76. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/generic/get_secret.py +0 -0
  77. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/generic/secret.py +0 -0
  78. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/get_auth_backend.py +0 -0
  79. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/get_nomad_access_token.py +0 -0
  80. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/get_policy_document.py +0 -0
  81. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/github/__init__.py +0 -0
  82. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/github/_inputs.py +0 -0
  83. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/github/auth_backend.py +0 -0
  84. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/github/outputs.py +0 -0
  85. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/github/team.py +0 -0
  86. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/github/user.py +0 -0
  87. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/__init__.py +0 -0
  88. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/entity.py +0 -0
  89. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/entity_alias.py +0 -0
  90. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/entity_policies.py +0 -0
  91. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/get_entity.py +0 -0
  92. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/get_group.py +0 -0
  93. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/get_oidc_client_creds.py +0 -0
  94. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/get_oidc_openid_config.py +0 -0
  95. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/get_oidc_public_keys.py +0 -0
  96. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/group.py +0 -0
  97. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/group_alias.py +0 -0
  98. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/group_member_entity_ids.py +0 -0
  99. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/group_member_group_ids.py +0 -0
  100. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/group_policies.py +0 -0
  101. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/mfa_duo.py +0 -0
  102. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/mfa_login_enforcement.py +0 -0
  103. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/mfa_okta.py +0 -0
  104. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/mfa_pingid.py +0 -0
  105. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/mfa_totp.py +0 -0
  106. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/oidc.py +0 -0
  107. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/oidc_assignment.py +0 -0
  108. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/oidc_client.py +0 -0
  109. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/oidc_key.py +0 -0
  110. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -0
  111. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/oidc_provider.py +0 -0
  112. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/oidc_role.py +0 -0
  113. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/oidc_scope.py +0 -0
  114. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/outputs.py +0 -0
  115. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/jwt/__init__.py +0 -0
  116. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/jwt/_inputs.py +0 -0
  117. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/jwt/auth_backend.py +0 -0
  118. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/jwt/auth_backend_role.py +0 -0
  119. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/jwt/outputs.py +0 -0
  120. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kmip/__init__.py +0 -0
  121. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kmip/secret_backend.py +0 -0
  122. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kmip/secret_role.py +0 -0
  123. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kmip/secret_scope.py +0 -0
  124. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kubernetes/__init__.py +0 -0
  125. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kubernetes/auth_backend_config.py +0 -0
  126. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kubernetes/auth_backend_role.py +0 -0
  127. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kubernetes/get_auth_backend_config.py +0 -0
  128. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kubernetes/get_auth_backend_role.py +0 -0
  129. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kubernetes/get_service_account_token.py +0 -0
  130. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kubernetes/secret_backend.py +0 -0
  131. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kubernetes/secret_backend_role.py +0 -0
  132. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kv/__init__.py +0 -0
  133. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kv/_inputs.py +0 -0
  134. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kv/get_secret.py +0 -0
  135. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kv/get_secret_subkeys_v2.py +0 -0
  136. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kv/get_secret_v2.py +0 -0
  137. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kv/get_secrets_list.py +0 -0
  138. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kv/get_secrets_list_v2.py +0 -0
  139. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kv/outputs.py +0 -0
  140. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kv/secret.py +0 -0
  141. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kv/secret_backend_v2.py +0 -0
  142. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kv/secret_v2.py +0 -0
  143. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/ldap/__init__.py +0 -0
  144. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/ldap/auth_backend.py +0 -0
  145. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/ldap/auth_backend_group.py +0 -0
  146. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/ldap/auth_backend_user.py +0 -0
  147. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/ldap/secret_backend.py +0 -0
  148. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -0
  149. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/ldap/secret_backend_library_set.py +0 -0
  150. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/ldap/secret_backend_static_role.py +0 -0
  151. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/managed/__init__.py +0 -0
  152. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/managed/_inputs.py +0 -0
  153. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/managed/keys.py +0 -0
  154. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/managed/outputs.py +0 -0
  155. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/mfa_duo.py +0 -0
  156. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/mfa_okta.py +0 -0
  157. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/mfa_pingid.py +0 -0
  158. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/mfa_totp.py +0 -0
  159. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/mongodbatlas/__init__.py +0 -0
  160. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/mongodbatlas/secret_backend.py +0 -0
  161. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/mongodbatlas/secret_role.py +0 -0
  162. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/mount.py +0 -0
  163. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/namespace.py +0 -0
  164. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/nomad_secret_backend.py +0 -0
  165. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/okta/__init__.py +0 -0
  166. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/okta/_inputs.py +0 -0
  167. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/okta/auth_backend.py +0 -0
  168. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/okta/auth_backend_group.py +0 -0
  169. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/okta/auth_backend_user.py +0 -0
  170. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/okta/outputs.py +0 -0
  171. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/outputs.py +0 -0
  172. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/password_policy.py +0 -0
  173. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/pkisecret/__init__.py +0 -0
  174. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/pkisecret/secret_backend_cert.py +0 -0
  175. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -0
  176. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -0
  177. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -0
  178. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -0
  179. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -0
  180. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -0
  181. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/pkisecret/secret_backend_issuer.py +0 -0
  182. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/pkisecret/secret_backend_key.py +0 -0
  183. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -0
  184. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -0
  185. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/pkisecret/secret_backend_sign.py +0 -0
  186. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/policy.py +0 -0
  187. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/provider.py +0 -0
  188. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/pulumi-plugin.json +0 -0
  189. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/py.typed +0 -0
  190. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/quota_lease_count.py +0 -0
  191. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/quota_rate_limit.py +0 -0
  192. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/rabbitmq/__init__.py +0 -0
  193. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/rabbitmq/_inputs.py +0 -0
  194. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/rabbitmq/outputs.py +0 -0
  195. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/rabbitmq/secret_backend.py +0 -0
  196. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/rabbitmq/secret_backend_role.py +0 -0
  197. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/raft_autopilot.py +0 -0
  198. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/raft_snapshot_agent_config.py +0 -0
  199. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/rgp_policy.py +0 -0
  200. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/ssh/__init__.py +0 -0
  201. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/ssh/_inputs.py +0 -0
  202. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/ssh/outputs.py +0 -0
  203. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/ssh/secret_backend_ca.py +0 -0
  204. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/terraformcloud/__init__.py +0 -0
  205. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/terraformcloud/secret_backend.py +0 -0
  206. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/terraformcloud/secret_creds.py +0 -0
  207. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/terraformcloud/secret_role.py +0 -0
  208. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/token.py +0 -0
  209. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/tokenauth/__init__.py +0 -0
  210. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/tokenauth/auth_backend_role.py +0 -0
  211. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/transform/__init__.py +0 -0
  212. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/transform/alphabet.py +0 -0
  213. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/transform/get_decode.py +0 -0
  214. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/transform/get_encode.py +0 -0
  215. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/transform/role.py +0 -0
  216. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/transform/template.py +0 -0
  217. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/transform/transformation.py +0 -0
  218. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/transit/__init__.py +0 -0
  219. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/transit/get_decrypt.py +0 -0
  220. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/transit/get_encrypt.py +0 -0
  221. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/transit/secret_cache_config.py +0 -0
  222. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault.egg-info/SOURCES.txt +0 -0
  223. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault.egg-info/dependency_links.txt +0 -0
  224. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault.egg-info/not-zip-safe +0 -0
  225. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault.egg-info/requires.txt +0 -0
  226. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault.egg-info/top_level.txt +0 -0
  227. {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/setup.cfg +0 -0
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: pulumi_vault
3
- Version: 5.16.0a1697145324
3
+ Version: 5.16.0a1697217180
4
4
  Summary: A Pulumi package for creating and managing HashiCorp Vault cloud resources.
5
5
  Home-page: https://pulumi.io
6
6
  License: Apache-2.0
@@ -400,7 +400,7 @@ class AuthBackendLogin(pulumi.CustomResource):
400
400
  if role_id is None and not opts.urn:
401
401
  raise TypeError("Missing required property 'role_id'")
402
402
  __props__.__dict__["role_id"] = role_id
403
- __props__.__dict__["secret_id"] = secret_id
403
+ __props__.__dict__["secret_id"] = None if secret_id is None else pulumi.Output.secret(secret_id)
404
404
  __props__.__dict__["accessor"] = None
405
405
  __props__.__dict__["client_token"] = None
406
406
  __props__.__dict__["lease_duration"] = None
@@ -408,6 +408,8 @@ class AuthBackendLogin(pulumi.CustomResource):
408
408
  __props__.__dict__["metadata"] = None
409
409
  __props__.__dict__["policies"] = None
410
410
  __props__.__dict__["renewable"] = None
411
+ secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["clientToken", "secretId"])
412
+ opts = pulumi.ResourceOptions.merge(opts, secret_opts)
411
413
  super(AuthBackendLogin, __self__).__init__(
412
414
  'vault:appRole/authBackendLogin:AuthBackendLogin',
413
415
  resource_name,
@@ -19,6 +19,7 @@ class SecretBackendArgs:
19
19
  description: Optional[pulumi.Input[str]] = None,
20
20
  disable_remount: Optional[pulumi.Input[bool]] = None,
21
21
  iam_endpoint: Optional[pulumi.Input[str]] = None,
22
+ local: Optional[pulumi.Input[bool]] = None,
22
23
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
23
24
  namespace: Optional[pulumi.Input[str]] = None,
24
25
  path: Optional[pulumi.Input[str]] = None,
@@ -36,6 +37,7 @@ class SecretBackendArgs:
36
37
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
37
38
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
38
39
  :param pulumi.Input[str] iam_endpoint: Specifies a custom HTTP IAM endpoint to use.
40
+ :param pulumi.Input[bool] local: Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
39
41
  :param pulumi.Input[int] max_lease_ttl_seconds: The maximum TTL that can be requested
40
42
  for credentials issued by this backend.
41
43
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
@@ -60,6 +62,8 @@ class SecretBackendArgs:
60
62
  pulumi.set(__self__, "disable_remount", disable_remount)
61
63
  if iam_endpoint is not None:
62
64
  pulumi.set(__self__, "iam_endpoint", iam_endpoint)
65
+ if local is not None:
66
+ pulumi.set(__self__, "local", local)
63
67
  if max_lease_ttl_seconds is not None:
64
68
  pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
65
69
  if namespace is not None:
@@ -138,6 +142,18 @@ class SecretBackendArgs:
138
142
  def iam_endpoint(self, value: Optional[pulumi.Input[str]]):
139
143
  pulumi.set(self, "iam_endpoint", value)
140
144
 
145
+ @property
146
+ @pulumi.getter
147
+ def local(self) -> Optional[pulumi.Input[bool]]:
148
+ """
149
+ Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
150
+ """
151
+ return pulumi.get(self, "local")
152
+
153
+ @local.setter
154
+ def local(self, value: Optional[pulumi.Input[bool]]):
155
+ pulumi.set(self, "local", value)
156
+
141
157
  @property
142
158
  @pulumi.getter(name="maxLeaseTtlSeconds")
143
159
  def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[int]]:
@@ -237,6 +253,7 @@ class _SecretBackendState:
237
253
  description: Optional[pulumi.Input[str]] = None,
238
254
  disable_remount: Optional[pulumi.Input[bool]] = None,
239
255
  iam_endpoint: Optional[pulumi.Input[str]] = None,
256
+ local: Optional[pulumi.Input[bool]] = None,
240
257
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
241
258
  namespace: Optional[pulumi.Input[str]] = None,
242
259
  path: Optional[pulumi.Input[str]] = None,
@@ -254,6 +271,7 @@ class _SecretBackendState:
254
271
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
255
272
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
256
273
  :param pulumi.Input[str] iam_endpoint: Specifies a custom HTTP IAM endpoint to use.
274
+ :param pulumi.Input[bool] local: Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
257
275
  :param pulumi.Input[int] max_lease_ttl_seconds: The maximum TTL that can be requested
258
276
  for credentials issued by this backend.
259
277
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
@@ -278,6 +296,8 @@ class _SecretBackendState:
278
296
  pulumi.set(__self__, "disable_remount", disable_remount)
279
297
  if iam_endpoint is not None:
280
298
  pulumi.set(__self__, "iam_endpoint", iam_endpoint)
299
+ if local is not None:
300
+ pulumi.set(__self__, "local", local)
281
301
  if max_lease_ttl_seconds is not None:
282
302
  pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
283
303
  if namespace is not None:
@@ -356,6 +376,18 @@ class _SecretBackendState:
356
376
  def iam_endpoint(self, value: Optional[pulumi.Input[str]]):
357
377
  pulumi.set(self, "iam_endpoint", value)
358
378
 
379
+ @property
380
+ @pulumi.getter
381
+ def local(self) -> Optional[pulumi.Input[bool]]:
382
+ """
383
+ Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
384
+ """
385
+ return pulumi.get(self, "local")
386
+
387
+ @local.setter
388
+ def local(self, value: Optional[pulumi.Input[bool]]):
389
+ pulumi.set(self, "local", value)
390
+
359
391
  @property
360
392
  @pulumi.getter(name="maxLeaseTtlSeconds")
361
393
  def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[int]]:
@@ -457,6 +489,7 @@ class SecretBackend(pulumi.CustomResource):
457
489
  description: Optional[pulumi.Input[str]] = None,
458
490
  disable_remount: Optional[pulumi.Input[bool]] = None,
459
491
  iam_endpoint: Optional[pulumi.Input[str]] = None,
492
+ local: Optional[pulumi.Input[bool]] = None,
460
493
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
461
494
  namespace: Optional[pulumi.Input[str]] = None,
462
495
  path: Optional[pulumi.Input[str]] = None,
@@ -484,6 +517,7 @@ class SecretBackend(pulumi.CustomResource):
484
517
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
485
518
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
486
519
  :param pulumi.Input[str] iam_endpoint: Specifies a custom HTTP IAM endpoint to use.
520
+ :param pulumi.Input[bool] local: Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
487
521
  :param pulumi.Input[int] max_lease_ttl_seconds: The maximum TTL that can be requested
488
522
  for credentials issued by this backend.
489
523
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
@@ -533,6 +567,7 @@ class SecretBackend(pulumi.CustomResource):
533
567
  description: Optional[pulumi.Input[str]] = None,
534
568
  disable_remount: Optional[pulumi.Input[bool]] = None,
535
569
  iam_endpoint: Optional[pulumi.Input[str]] = None,
570
+ local: Optional[pulumi.Input[bool]] = None,
536
571
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
537
572
  namespace: Optional[pulumi.Input[str]] = None,
538
573
  path: Optional[pulumi.Input[str]] = None,
@@ -554,6 +589,7 @@ class SecretBackend(pulumi.CustomResource):
554
589
  __props__.__dict__["description"] = description
555
590
  __props__.__dict__["disable_remount"] = disable_remount
556
591
  __props__.__dict__["iam_endpoint"] = iam_endpoint
592
+ __props__.__dict__["local"] = local
557
593
  __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
558
594
  __props__.__dict__["namespace"] = namespace
559
595
  __props__.__dict__["path"] = path
@@ -578,6 +614,7 @@ class SecretBackend(pulumi.CustomResource):
578
614
  description: Optional[pulumi.Input[str]] = None,
579
615
  disable_remount: Optional[pulumi.Input[bool]] = None,
580
616
  iam_endpoint: Optional[pulumi.Input[str]] = None,
617
+ local: Optional[pulumi.Input[bool]] = None,
581
618
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
582
619
  namespace: Optional[pulumi.Input[str]] = None,
583
620
  path: Optional[pulumi.Input[str]] = None,
@@ -600,6 +637,7 @@ class SecretBackend(pulumi.CustomResource):
600
637
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
601
638
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
602
639
  :param pulumi.Input[str] iam_endpoint: Specifies a custom HTTP IAM endpoint to use.
640
+ :param pulumi.Input[bool] local: Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
603
641
  :param pulumi.Input[int] max_lease_ttl_seconds: The maximum TTL that can be requested
604
642
  for credentials issued by this backend.
605
643
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
@@ -623,6 +661,7 @@ class SecretBackend(pulumi.CustomResource):
623
661
  __props__.__dict__["description"] = description
624
662
  __props__.__dict__["disable_remount"] = disable_remount
625
663
  __props__.__dict__["iam_endpoint"] = iam_endpoint
664
+ __props__.__dict__["local"] = local
626
665
  __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
627
666
  __props__.__dict__["namespace"] = namespace
628
667
  __props__.__dict__["path"] = path
@@ -675,6 +714,14 @@ class SecretBackend(pulumi.CustomResource):
675
714
  """
676
715
  return pulumi.get(self, "iam_endpoint")
677
716
 
717
+ @property
718
+ @pulumi.getter
719
+ def local(self) -> pulumi.Output[Optional[bool]]:
720
+ """
721
+ Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
722
+ """
723
+ return pulumi.get(self, "local")
724
+
678
725
  @property
679
726
  @pulumi.getter(name="maxLeaseTtlSeconds")
680
727
  def max_lease_ttl_seconds(self) -> pulumi.Output[int]:
@@ -1175,16 +1175,19 @@ class SecretBackendConnectionMssqlArgs:
1175
1175
  @pulumi.input_type
1176
1176
  class SecretBackendConnectionMysqlArgs:
1177
1177
  def __init__(__self__, *,
1178
+ auth_type: Optional[pulumi.Input[str]] = None,
1178
1179
  connection_url: Optional[pulumi.Input[str]] = None,
1179
1180
  max_connection_lifetime: Optional[pulumi.Input[int]] = None,
1180
1181
  max_idle_connections: Optional[pulumi.Input[int]] = None,
1181
1182
  max_open_connections: Optional[pulumi.Input[int]] = None,
1182
1183
  password: Optional[pulumi.Input[str]] = None,
1184
+ service_account_json: Optional[pulumi.Input[str]] = None,
1183
1185
  tls_ca: Optional[pulumi.Input[str]] = None,
1184
1186
  tls_certificate_key: Optional[pulumi.Input[str]] = None,
1185
1187
  username: Optional[pulumi.Input[str]] = None,
1186
1188
  username_template: Optional[pulumi.Input[str]] = None):
1187
1189
  """
1190
+ :param pulumi.Input[str] auth_type: Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
1188
1191
  :param pulumi.Input[str] connection_url: Specifies the Redshift DSN. See
1189
1192
  the [Vault
1190
1193
  docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
@@ -1195,11 +1198,14 @@ class SecretBackendConnectionMysqlArgs:
1195
1198
  :param pulumi.Input[int] max_open_connections: The maximum number of open connections to
1196
1199
  the database.
1197
1200
  :param pulumi.Input[str] password: The root credential password used in the connection URL.
1201
+ :param pulumi.Input[str] service_account_json: JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
1198
1202
  :param pulumi.Input[str] tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
1199
1203
  :param pulumi.Input[str] tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
1200
1204
  :param pulumi.Input[str] username: The root credential username used in the connection URL.
1201
1205
  :param pulumi.Input[str] username_template: - [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
1202
1206
  """
1207
+ if auth_type is not None:
1208
+ pulumi.set(__self__, "auth_type", auth_type)
1203
1209
  if connection_url is not None:
1204
1210
  pulumi.set(__self__, "connection_url", connection_url)
1205
1211
  if max_connection_lifetime is not None:
@@ -1210,6 +1216,8 @@ class SecretBackendConnectionMysqlArgs:
1210
1216
  pulumi.set(__self__, "max_open_connections", max_open_connections)
1211
1217
  if password is not None:
1212
1218
  pulumi.set(__self__, "password", password)
1219
+ if service_account_json is not None:
1220
+ pulumi.set(__self__, "service_account_json", service_account_json)
1213
1221
  if tls_ca is not None:
1214
1222
  pulumi.set(__self__, "tls_ca", tls_ca)
1215
1223
  if tls_certificate_key is not None:
@@ -1219,6 +1227,18 @@ class SecretBackendConnectionMysqlArgs:
1219
1227
  if username_template is not None:
1220
1228
  pulumi.set(__self__, "username_template", username_template)
1221
1229
 
1230
+ @property
1231
+ @pulumi.getter(name="authType")
1232
+ def auth_type(self) -> Optional[pulumi.Input[str]]:
1233
+ """
1234
+ Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
1235
+ """
1236
+ return pulumi.get(self, "auth_type")
1237
+
1238
+ @auth_type.setter
1239
+ def auth_type(self, value: Optional[pulumi.Input[str]]):
1240
+ pulumi.set(self, "auth_type", value)
1241
+
1222
1242
  @property
1223
1243
  @pulumi.getter(name="connectionUrl")
1224
1244
  def connection_url(self) -> Optional[pulumi.Input[str]]:
@@ -1284,6 +1304,18 @@ class SecretBackendConnectionMysqlArgs:
1284
1304
  def password(self, value: Optional[pulumi.Input[str]]):
1285
1305
  pulumi.set(self, "password", value)
1286
1306
 
1307
+ @property
1308
+ @pulumi.getter(name="serviceAccountJson")
1309
+ def service_account_json(self) -> Optional[pulumi.Input[str]]:
1310
+ """
1311
+ JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
1312
+ """
1313
+ return pulumi.get(self, "service_account_json")
1314
+
1315
+ @service_account_json.setter
1316
+ def service_account_json(self, value: Optional[pulumi.Input[str]]):
1317
+ pulumi.set(self, "service_account_json", value)
1318
+
1287
1319
  @property
1288
1320
  @pulumi.getter(name="tlsCa")
1289
1321
  def tls_ca(self) -> Optional[pulumi.Input[str]]:
@@ -1852,15 +1884,18 @@ class SecretBackendConnectionOracleArgs:
1852
1884
  @pulumi.input_type
1853
1885
  class SecretBackendConnectionPostgresqlArgs:
1854
1886
  def __init__(__self__, *,
1887
+ auth_type: Optional[pulumi.Input[str]] = None,
1855
1888
  connection_url: Optional[pulumi.Input[str]] = None,
1856
1889
  disable_escaping: Optional[pulumi.Input[bool]] = None,
1857
1890
  max_connection_lifetime: Optional[pulumi.Input[int]] = None,
1858
1891
  max_idle_connections: Optional[pulumi.Input[int]] = None,
1859
1892
  max_open_connections: Optional[pulumi.Input[int]] = None,
1860
1893
  password: Optional[pulumi.Input[str]] = None,
1894
+ service_account_json: Optional[pulumi.Input[str]] = None,
1861
1895
  username: Optional[pulumi.Input[str]] = None,
1862
1896
  username_template: Optional[pulumi.Input[str]] = None):
1863
1897
  """
1898
+ :param pulumi.Input[str] auth_type: Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
1864
1899
  :param pulumi.Input[str] connection_url: Specifies the Redshift DSN. See
1865
1900
  the [Vault
1866
1901
  docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
@@ -1872,9 +1907,12 @@ class SecretBackendConnectionPostgresqlArgs:
1872
1907
  :param pulumi.Input[int] max_open_connections: The maximum number of open connections to
1873
1908
  the database.
1874
1909
  :param pulumi.Input[str] password: The root credential password used in the connection URL.
1910
+ :param pulumi.Input[str] service_account_json: JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
1875
1911
  :param pulumi.Input[str] username: The root credential username used in the connection URL.
1876
1912
  :param pulumi.Input[str] username_template: - [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
1877
1913
  """
1914
+ if auth_type is not None:
1915
+ pulumi.set(__self__, "auth_type", auth_type)
1878
1916
  if connection_url is not None:
1879
1917
  pulumi.set(__self__, "connection_url", connection_url)
1880
1918
  if disable_escaping is not None:
@@ -1887,11 +1925,25 @@ class SecretBackendConnectionPostgresqlArgs:
1887
1925
  pulumi.set(__self__, "max_open_connections", max_open_connections)
1888
1926
  if password is not None:
1889
1927
  pulumi.set(__self__, "password", password)
1928
+ if service_account_json is not None:
1929
+ pulumi.set(__self__, "service_account_json", service_account_json)
1890
1930
  if username is not None:
1891
1931
  pulumi.set(__self__, "username", username)
1892
1932
  if username_template is not None:
1893
1933
  pulumi.set(__self__, "username_template", username_template)
1894
1934
 
1935
+ @property
1936
+ @pulumi.getter(name="authType")
1937
+ def auth_type(self) -> Optional[pulumi.Input[str]]:
1938
+ """
1939
+ Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
1940
+ """
1941
+ return pulumi.get(self, "auth_type")
1942
+
1943
+ @auth_type.setter
1944
+ def auth_type(self, value: Optional[pulumi.Input[str]]):
1945
+ pulumi.set(self, "auth_type", value)
1946
+
1895
1947
  @property
1896
1948
  @pulumi.getter(name="connectionUrl")
1897
1949
  def connection_url(self) -> Optional[pulumi.Input[str]]:
@@ -1969,6 +2021,18 @@ class SecretBackendConnectionPostgresqlArgs:
1969
2021
  def password(self, value: Optional[pulumi.Input[str]]):
1970
2022
  pulumi.set(self, "password", value)
1971
2023
 
2024
+ @property
2025
+ @pulumi.getter(name="serviceAccountJson")
2026
+ def service_account_json(self) -> Optional[pulumi.Input[str]]:
2027
+ """
2028
+ JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
2029
+ """
2030
+ return pulumi.get(self, "service_account_json")
2031
+
2032
+ @service_account_json.setter
2033
+ def service_account_json(self, value: Optional[pulumi.Input[str]]):
2034
+ pulumi.set(self, "service_account_json", value)
2035
+
1972
2036
  @property
1973
2037
  @pulumi.getter
1974
2038
  def username(self) -> Optional[pulumi.Input[str]]:
@@ -4339,6 +4403,7 @@ class SecretsMountMysqlArgs:
4339
4403
  def __init__(__self__, *,
4340
4404
  name: pulumi.Input[str],
4341
4405
  allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
4406
+ auth_type: Optional[pulumi.Input[str]] = None,
4342
4407
  connection_url: Optional[pulumi.Input[str]] = None,
4343
4408
  data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
4344
4409
  max_connection_lifetime: Optional[pulumi.Input[int]] = None,
@@ -4347,6 +4412,7 @@ class SecretsMountMysqlArgs:
4347
4412
  password: Optional[pulumi.Input[str]] = None,
4348
4413
  plugin_name: Optional[pulumi.Input[str]] = None,
4349
4414
  root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
4415
+ service_account_json: Optional[pulumi.Input[str]] = None,
4350
4416
  tls_ca: Optional[pulumi.Input[str]] = None,
4351
4417
  tls_certificate_key: Optional[pulumi.Input[str]] = None,
4352
4418
  username: Optional[pulumi.Input[str]] = None,
@@ -4377,6 +4443,8 @@ class SecretsMountMysqlArgs:
4377
4443
  pulumi.set(__self__, "name", name)
4378
4444
  if allowed_roles is not None:
4379
4445
  pulumi.set(__self__, "allowed_roles", allowed_roles)
4446
+ if auth_type is not None:
4447
+ pulumi.set(__self__, "auth_type", auth_type)
4380
4448
  if connection_url is not None:
4381
4449
  pulumi.set(__self__, "connection_url", connection_url)
4382
4450
  if data is not None:
@@ -4393,6 +4461,8 @@ class SecretsMountMysqlArgs:
4393
4461
  pulumi.set(__self__, "plugin_name", plugin_name)
4394
4462
  if root_rotation_statements is not None:
4395
4463
  pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
4464
+ if service_account_json is not None:
4465
+ pulumi.set(__self__, "service_account_json", service_account_json)
4396
4466
  if tls_ca is not None:
4397
4467
  pulumi.set(__self__, "tls_ca", tls_ca)
4398
4468
  if tls_certificate_key is not None:
@@ -4426,6 +4496,15 @@ class SecretsMountMysqlArgs:
4426
4496
  def allowed_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
4427
4497
  pulumi.set(self, "allowed_roles", value)
4428
4498
 
4499
+ @property
4500
+ @pulumi.getter(name="authType")
4501
+ def auth_type(self) -> Optional[pulumi.Input[str]]:
4502
+ return pulumi.get(self, "auth_type")
4503
+
4504
+ @auth_type.setter
4505
+ def auth_type(self, value: Optional[pulumi.Input[str]]):
4506
+ pulumi.set(self, "auth_type", value)
4507
+
4429
4508
  @property
4430
4509
  @pulumi.getter(name="connectionUrl")
4431
4510
  def connection_url(self) -> Optional[pulumi.Input[str]]:
@@ -4526,6 +4605,15 @@ class SecretsMountMysqlArgs:
4526
4605
  def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
4527
4606
  pulumi.set(self, "root_rotation_statements", value)
4528
4607
 
4608
+ @property
4609
+ @pulumi.getter(name="serviceAccountJson")
4610
+ def service_account_json(self) -> Optional[pulumi.Input[str]]:
4611
+ return pulumi.get(self, "service_account_json")
4612
+
4613
+ @service_account_json.setter
4614
+ def service_account_json(self, value: Optional[pulumi.Input[str]]):
4615
+ pulumi.set(self, "service_account_json", value)
4616
+
4529
4617
  @property
4530
4618
  @pulumi.getter(name="tlsCa")
4531
4619
  def tls_ca(self) -> Optional[pulumi.Input[str]]:
@@ -5481,6 +5569,7 @@ class SecretsMountPostgresqlArgs:
5481
5569
  def __init__(__self__, *,
5482
5570
  name: pulumi.Input[str],
5483
5571
  allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
5572
+ auth_type: Optional[pulumi.Input[str]] = None,
5484
5573
  connection_url: Optional[pulumi.Input[str]] = None,
5485
5574
  data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
5486
5575
  disable_escaping: Optional[pulumi.Input[bool]] = None,
@@ -5490,6 +5579,7 @@ class SecretsMountPostgresqlArgs:
5490
5579
  password: Optional[pulumi.Input[str]] = None,
5491
5580
  plugin_name: Optional[pulumi.Input[str]] = None,
5492
5581
  root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
5582
+ service_account_json: Optional[pulumi.Input[str]] = None,
5493
5583
  username: Optional[pulumi.Input[str]] = None,
5494
5584
  username_template: Optional[pulumi.Input[str]] = None,
5495
5585
  verify_connection: Optional[pulumi.Input[bool]] = None):
@@ -5517,6 +5607,8 @@ class SecretsMountPostgresqlArgs:
5517
5607
  pulumi.set(__self__, "name", name)
5518
5608
  if allowed_roles is not None:
5519
5609
  pulumi.set(__self__, "allowed_roles", allowed_roles)
5610
+ if auth_type is not None:
5611
+ pulumi.set(__self__, "auth_type", auth_type)
5520
5612
  if connection_url is not None:
5521
5613
  pulumi.set(__self__, "connection_url", connection_url)
5522
5614
  if data is not None:
@@ -5535,6 +5627,8 @@ class SecretsMountPostgresqlArgs:
5535
5627
  pulumi.set(__self__, "plugin_name", plugin_name)
5536
5628
  if root_rotation_statements is not None:
5537
5629
  pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
5630
+ if service_account_json is not None:
5631
+ pulumi.set(__self__, "service_account_json", service_account_json)
5538
5632
  if username is not None:
5539
5633
  pulumi.set(__self__, "username", username)
5540
5634
  if username_template is not None:
@@ -5564,6 +5658,15 @@ class SecretsMountPostgresqlArgs:
5564
5658
  def allowed_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
5565
5659
  pulumi.set(self, "allowed_roles", value)
5566
5660
 
5661
+ @property
5662
+ @pulumi.getter(name="authType")
5663
+ def auth_type(self) -> Optional[pulumi.Input[str]]:
5664
+ return pulumi.get(self, "auth_type")
5665
+
5666
+ @auth_type.setter
5667
+ def auth_type(self, value: Optional[pulumi.Input[str]]):
5668
+ pulumi.set(self, "auth_type", value)
5669
+
5567
5670
  @property
5568
5671
  @pulumi.getter(name="connectionUrl")
5569
5672
  def connection_url(self) -> Optional[pulumi.Input[str]]:
@@ -5676,6 +5779,15 @@ class SecretsMountPostgresqlArgs:
5676
5779
  def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
5677
5780
  pulumi.set(self, "root_rotation_statements", value)
5678
5781
 
5782
+ @property
5783
+ @pulumi.getter(name="serviceAccountJson")
5784
+ def service_account_json(self) -> Optional[pulumi.Input[str]]:
5785
+ return pulumi.get(self, "service_account_json")
5786
+
5787
+ @service_account_json.setter
5788
+ def service_account_json(self, value: Optional[pulumi.Input[str]]):
5789
+ pulumi.set(self, "service_account_json", value)
5790
+
5679
5791
  @property
5680
5792
  @pulumi.getter
5681
5793
  def username(self) -> Optional[pulumi.Input[str]]: