pulumi-vault 6.4.0__py3-none-any.whl → 6.4.0a1723454543__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +0 -560
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +4 -19
  4. pulumi_vault/ad/secret_backend.py +0 -5
  5. pulumi_vault/ad/secret_library.py +0 -5
  6. pulumi_vault/ad/secret_role.py +0 -5
  7. pulumi_vault/alicloud/auth_backend_role.py +0 -5
  8. pulumi_vault/approle/auth_backend_login.py +0 -5
  9. pulumi_vault/approle/auth_backend_role.py +0 -5
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -99
  11. pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
  12. pulumi_vault/audit.py +0 -5
  13. pulumi_vault/audit_request_header.py +0 -5
  14. pulumi_vault/auth_backend.py +0 -5
  15. pulumi_vault/aws/auth_backend_cert.py +0 -5
  16. pulumi_vault/aws/auth_backend_client.py +0 -5
  17. pulumi_vault/aws/auth_backend_config_identity.py +0 -5
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
  19. pulumi_vault/aws/auth_backend_login.py +7 -12
  20. pulumi_vault/aws/auth_backend_role.py +0 -5
  21. pulumi_vault/aws/auth_backend_role_tag.py +0 -5
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
  23. pulumi_vault/aws/auth_backend_sts_role.py +0 -5
  24. pulumi_vault/aws/get_access_credentials.py +4 -31
  25. pulumi_vault/aws/get_static_access_credentials.py +4 -18
  26. pulumi_vault/aws/secret_backend.py +0 -5
  27. pulumi_vault/aws/secret_backend_role.py +0 -5
  28. pulumi_vault/aws/secret_backend_static_role.py +0 -5
  29. pulumi_vault/azure/_inputs.py +0 -24
  30. pulumi_vault/azure/auth_backend_config.py +0 -5
  31. pulumi_vault/azure/auth_backend_role.py +0 -5
  32. pulumi_vault/azure/backend.py +0 -5
  33. pulumi_vault/azure/backend_role.py +0 -5
  34. pulumi_vault/azure/get_access_credentials.py +4 -36
  35. pulumi_vault/azure/outputs.py +0 -5
  36. pulumi_vault/cert_auth_backend_role.py +0 -5
  37. pulumi_vault/config/__init__.pyi +0 -5
  38. pulumi_vault/config/_inputs.py +0 -21
  39. pulumi_vault/config/outputs.py +0 -5
  40. pulumi_vault/config/ui_custom_message.py +14 -19
  41. pulumi_vault/config/vars.py +0 -5
  42. pulumi_vault/consul/secret_backend.py +0 -5
  43. pulumi_vault/consul/secret_backend_role.py +0 -5
  44. pulumi_vault/database/_inputs.py +105 -2256
  45. pulumi_vault/database/outputs.py +54 -199
  46. pulumi_vault/database/secret_backend_connection.py +14 -19
  47. pulumi_vault/database/secret_backend_role.py +14 -19
  48. pulumi_vault/database/secret_backend_static_role.py +1 -69
  49. pulumi_vault/database/secrets_mount.py +14 -19
  50. pulumi_vault/egp_policy.py +0 -5
  51. pulumi_vault/gcp/_inputs.py +0 -111
  52. pulumi_vault/gcp/auth_backend.py +0 -5
  53. pulumi_vault/gcp/auth_backend_role.py +0 -5
  54. pulumi_vault/gcp/get_auth_backend_role.py +4 -42
  55. pulumi_vault/gcp/outputs.py +0 -5
  56. pulumi_vault/gcp/secret_backend.py +0 -5
  57. pulumi_vault/gcp/secret_impersonated_account.py +3 -62
  58. pulumi_vault/gcp/secret_roleset.py +0 -5
  59. pulumi_vault/gcp/secret_static_account.py +0 -5
  60. pulumi_vault/generic/endpoint.py +0 -5
  61. pulumi_vault/generic/get_secret.py +5 -25
  62. pulumi_vault/generic/secret.py +7 -12
  63. pulumi_vault/get_auth_backend.py +4 -21
  64. pulumi_vault/get_auth_backends.py +4 -16
  65. pulumi_vault/get_namespace.py +5 -18
  66. pulumi_vault/get_namespaces.py +4 -13
  67. pulumi_vault/get_nomad_access_token.py +8 -28
  68. pulumi_vault/get_policy_document.py +4 -15
  69. pulumi_vault/get_raft_autopilot_state.py +7 -26
  70. pulumi_vault/github/_inputs.py +0 -55
  71. pulumi_vault/github/auth_backend.py +0 -5
  72. pulumi_vault/github/outputs.py +0 -5
  73. pulumi_vault/github/team.py +0 -5
  74. pulumi_vault/github/user.py +0 -5
  75. pulumi_vault/identity/entity.py +0 -5
  76. pulumi_vault/identity/entity_alias.py +0 -5
  77. pulumi_vault/identity/entity_policies.py +0 -5
  78. pulumi_vault/identity/get_entity.py +5 -35
  79. pulumi_vault/identity/get_group.py +6 -42
  80. pulumi_vault/identity/get_oidc_client_creds.py +4 -16
  81. pulumi_vault/identity/get_oidc_openid_config.py +4 -26
  82. pulumi_vault/identity/get_oidc_public_keys.py +5 -16
  83. pulumi_vault/identity/group.py +0 -5
  84. pulumi_vault/identity/group_alias.py +0 -5
  85. pulumi_vault/identity/group_member_entity_ids.py +0 -5
  86. pulumi_vault/identity/group_member_group_ids.py +0 -5
  87. pulumi_vault/identity/group_policies.py +0 -5
  88. pulumi_vault/identity/mfa_duo.py +0 -5
  89. pulumi_vault/identity/mfa_login_enforcement.py +0 -5
  90. pulumi_vault/identity/mfa_okta.py +0 -5
  91. pulumi_vault/identity/mfa_pingid.py +0 -5
  92. pulumi_vault/identity/mfa_totp.py +0 -5
  93. pulumi_vault/identity/oidc.py +0 -5
  94. pulumi_vault/identity/oidc_assignment.py +0 -5
  95. pulumi_vault/identity/oidc_client.py +0 -5
  96. pulumi_vault/identity/oidc_key.py +0 -5
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
  98. pulumi_vault/identity/oidc_provider.py +0 -5
  99. pulumi_vault/identity/oidc_role.py +0 -5
  100. pulumi_vault/identity/oidc_scope.py +0 -5
  101. pulumi_vault/identity/outputs.py +3 -8
  102. pulumi_vault/jwt/_inputs.py +0 -55
  103. pulumi_vault/jwt/auth_backend.py +0 -5
  104. pulumi_vault/jwt/auth_backend_role.py +28 -33
  105. pulumi_vault/jwt/outputs.py +0 -5
  106. pulumi_vault/kmip/secret_backend.py +0 -5
  107. pulumi_vault/kmip/secret_role.py +0 -5
  108. pulumi_vault/kmip/secret_scope.py +0 -5
  109. pulumi_vault/kubernetes/auth_backend_config.py +3 -55
  110. pulumi_vault/kubernetes/auth_backend_role.py +0 -5
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +7 -59
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
  113. pulumi_vault/kubernetes/get_service_account_token.py +4 -28
  114. pulumi_vault/kubernetes/secret_backend.py +14 -19
  115. pulumi_vault/kubernetes/secret_backend_role.py +0 -5
  116. pulumi_vault/kv/_inputs.py +4 -36
  117. pulumi_vault/kv/get_secret.py +5 -20
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +5 -24
  119. pulumi_vault/kv/get_secret_v2.py +8 -27
  120. pulumi_vault/kv/get_secrets_list.py +4 -15
  121. pulumi_vault/kv/get_secrets_list_v2.py +4 -18
  122. pulumi_vault/kv/outputs.py +3 -8
  123. pulumi_vault/kv/secret.py +7 -12
  124. pulumi_vault/kv/secret_backend_v2.py +0 -5
  125. pulumi_vault/kv/secret_v2.py +28 -33
  126. pulumi_vault/ldap/auth_backend.py +0 -52
  127. pulumi_vault/ldap/auth_backend_group.py +0 -5
  128. pulumi_vault/ldap/auth_backend_user.py +0 -5
  129. pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
  130. pulumi_vault/ldap/get_static_credentials.py +4 -23
  131. pulumi_vault/ldap/secret_backend.py +14 -19
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
  133. pulumi_vault/ldap/secret_backend_library_set.py +0 -5
  134. pulumi_vault/ldap/secret_backend_static_role.py +0 -5
  135. pulumi_vault/managed/_inputs.py +0 -205
  136. pulumi_vault/managed/keys.py +0 -5
  137. pulumi_vault/managed/outputs.py +0 -5
  138. pulumi_vault/mfa_duo.py +0 -5
  139. pulumi_vault/mfa_okta.py +0 -5
  140. pulumi_vault/mfa_pingid.py +0 -5
  141. pulumi_vault/mfa_totp.py +0 -5
  142. pulumi_vault/mongodbatlas/secret_backend.py +0 -5
  143. pulumi_vault/mongodbatlas/secret_role.py +0 -5
  144. pulumi_vault/mount.py +16 -21
  145. pulumi_vault/namespace.py +14 -19
  146. pulumi_vault/nomad_secret_backend.py +0 -5
  147. pulumi_vault/nomad_secret_role.py +0 -5
  148. pulumi_vault/okta/_inputs.py +0 -39
  149. pulumi_vault/okta/auth_backend.py +0 -5
  150. pulumi_vault/okta/auth_backend_group.py +0 -5
  151. pulumi_vault/okta/auth_backend_user.py +0 -5
  152. pulumi_vault/okta/outputs.py +0 -5
  153. pulumi_vault/outputs.py +0 -5
  154. pulumi_vault/password_policy.py +0 -5
  155. pulumi_vault/pkisecret/_inputs.py +8 -49
  156. pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
  157. pulumi_vault/pkisecret/backend_config_est.py +14 -19
  158. pulumi_vault/pkisecret/get_backend_config_est.py +5 -23
  159. pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
  160. pulumi_vault/pkisecret/get_backend_issuers.py +5 -18
  161. pulumi_vault/pkisecret/get_backend_key.py +4 -19
  162. pulumi_vault/pkisecret/get_backend_keys.py +5 -18
  163. pulumi_vault/pkisecret/outputs.py +12 -17
  164. pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
  172. pulumi_vault/pkisecret/secret_backend_key.py +0 -5
  173. pulumi_vault/pkisecret/secret_backend_role.py +0 -5
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
  176. pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
  177. pulumi_vault/plugin.py +0 -5
  178. pulumi_vault/plugin_pinned_version.py +0 -5
  179. pulumi_vault/policy.py +0 -5
  180. pulumi_vault/provider.py +0 -5
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +0 -5
  183. pulumi_vault/quota_rate_limit.py +0 -5
  184. pulumi_vault/rabbitmq/_inputs.py +0 -61
  185. pulumi_vault/rabbitmq/outputs.py +0 -5
  186. pulumi_vault/rabbitmq/secret_backend.py +0 -5
  187. pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
  188. pulumi_vault/raft_autopilot.py +0 -5
  189. pulumi_vault/raft_snapshot_agent_config.py +0 -5
  190. pulumi_vault/rgp_policy.py +0 -5
  191. pulumi_vault/saml/auth_backend.py +0 -5
  192. pulumi_vault/saml/auth_backend_role.py +14 -19
  193. pulumi_vault/secrets/_inputs.py +0 -30
  194. pulumi_vault/secrets/outputs.py +0 -5
  195. pulumi_vault/secrets/sync_association.py +0 -5
  196. pulumi_vault/secrets/sync_aws_destination.py +14 -19
  197. pulumi_vault/secrets/sync_azure_destination.py +14 -19
  198. pulumi_vault/secrets/sync_config.py +0 -5
  199. pulumi_vault/secrets/sync_gcp_destination.py +14 -19
  200. pulumi_vault/secrets/sync_gh_destination.py +0 -5
  201. pulumi_vault/secrets/sync_github_apps.py +0 -5
  202. pulumi_vault/secrets/sync_vercel_destination.py +0 -5
  203. pulumi_vault/ssh/_inputs.py +0 -22
  204. pulumi_vault/ssh/outputs.py +0 -5
  205. pulumi_vault/ssh/secret_backend_ca.py +0 -5
  206. pulumi_vault/ssh/secret_backend_role.py +28 -67
  207. pulumi_vault/terraformcloud/secret_backend.py +0 -5
  208. pulumi_vault/terraformcloud/secret_creds.py +0 -5
  209. pulumi_vault/terraformcloud/secret_role.py +0 -5
  210. pulumi_vault/token.py +0 -5
  211. pulumi_vault/tokenauth/auth_backend_role.py +14 -5
  212. pulumi_vault/transform/alphabet.py +0 -5
  213. pulumi_vault/transform/get_decode.py +14 -38
  214. pulumi_vault/transform/get_encode.py +14 -38
  215. pulumi_vault/transform/role.py +0 -5
  216. pulumi_vault/transform/template.py +14 -19
  217. pulumi_vault/transform/transformation.py +0 -5
  218. pulumi_vault/transit/get_decrypt.py +4 -21
  219. pulumi_vault/transit/get_encrypt.py +4 -23
  220. pulumi_vault/transit/secret_backend_key.py +7 -12
  221. pulumi_vault/transit/secret_cache_config.py +0 -5
  222. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/METADATA +2 -3
  223. pulumi_vault-6.4.0a1723454543.dist-info/RECORD +256 -0
  224. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/WHEEL +1 -1
  225. pulumi_vault-6.4.0.dist-info/RECORD +0 -256
  226. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/top_level.txt +0 -0
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
  from . import outputs
17
12
  from ._inputs import *
@@ -25,7 +20,7 @@ class SecretBackendConnectionArgs:
25
20
  allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
26
21
  cassandra: Optional[pulumi.Input['SecretBackendConnectionCassandraArgs']] = None,
27
22
  couchbase: Optional[pulumi.Input['SecretBackendConnectionCouchbaseArgs']] = None,
28
- data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
23
+ data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
29
24
  elasticsearch: Optional[pulumi.Input['SecretBackendConnectionElasticsearchArgs']] = None,
30
25
  hana: Optional[pulumi.Input['SecretBackendConnectionHanaArgs']] = None,
31
26
  influxdb: Optional[pulumi.Input['SecretBackendConnectionInfluxdbArgs']] = None,
@@ -54,7 +49,7 @@ class SecretBackendConnectionArgs:
54
49
  connection.
55
50
  :param pulumi.Input['SecretBackendConnectionCassandraArgs'] cassandra: A nested block containing configuration options for Cassandra connections.
56
51
  :param pulumi.Input['SecretBackendConnectionCouchbaseArgs'] couchbase: A nested block containing configuration options for Couchbase connections.
57
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
52
+ :param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
58
53
  :param pulumi.Input['SecretBackendConnectionElasticsearchArgs'] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
59
54
  :param pulumi.Input['SecretBackendConnectionHanaArgs'] hana: A nested block containing configuration options for SAP HanaDB connections.
60
55
  :param pulumi.Input['SecretBackendConnectionInfluxdbArgs'] influxdb: A nested block containing configuration options for InfluxDB connections.
@@ -186,14 +181,14 @@ class SecretBackendConnectionArgs:
186
181
 
187
182
  @property
188
183
  @pulumi.getter
189
- def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
184
+ def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
190
185
  """
191
186
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
192
187
  """
193
188
  return pulumi.get(self, "data")
194
189
 
195
190
  @data.setter
196
- def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
191
+ def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
197
192
  pulumi.set(self, "data", value)
198
193
 
199
194
  @property
@@ -462,7 +457,7 @@ class _SecretBackendConnectionState:
462
457
  backend: Optional[pulumi.Input[str]] = None,
463
458
  cassandra: Optional[pulumi.Input['SecretBackendConnectionCassandraArgs']] = None,
464
459
  couchbase: Optional[pulumi.Input['SecretBackendConnectionCouchbaseArgs']] = None,
465
- data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
460
+ data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
466
461
  elasticsearch: Optional[pulumi.Input['SecretBackendConnectionElasticsearchArgs']] = None,
467
462
  hana: Optional[pulumi.Input['SecretBackendConnectionHanaArgs']] = None,
468
463
  influxdb: Optional[pulumi.Input['SecretBackendConnectionInfluxdbArgs']] = None,
@@ -491,7 +486,7 @@ class _SecretBackendConnectionState:
491
486
  :param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
492
487
  :param pulumi.Input['SecretBackendConnectionCassandraArgs'] cassandra: A nested block containing configuration options for Cassandra connections.
493
488
  :param pulumi.Input['SecretBackendConnectionCouchbaseArgs'] couchbase: A nested block containing configuration options for Couchbase connections.
494
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
489
+ :param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
495
490
  :param pulumi.Input['SecretBackendConnectionElasticsearchArgs'] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
496
491
  :param pulumi.Input['SecretBackendConnectionHanaArgs'] hana: A nested block containing configuration options for SAP HanaDB connections.
497
492
  :param pulumi.Input['SecretBackendConnectionInfluxdbArgs'] influxdb: A nested block containing configuration options for InfluxDB connections.
@@ -624,14 +619,14 @@ class _SecretBackendConnectionState:
624
619
 
625
620
  @property
626
621
  @pulumi.getter
627
- def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
622
+ def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
628
623
  """
629
624
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
630
625
  """
631
626
  return pulumi.get(self, "data")
632
627
 
633
628
  @data.setter
634
- def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
629
+ def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
635
630
  pulumi.set(self, "data", value)
636
631
 
637
632
  @property
@@ -902,7 +897,7 @@ class SecretBackendConnection(pulumi.CustomResource):
902
897
  backend: Optional[pulumi.Input[str]] = None,
903
898
  cassandra: Optional[pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']]] = None,
904
899
  couchbase: Optional[pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']]] = None,
905
- data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
900
+ data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
906
901
  elasticsearch: Optional[pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']]] = None,
907
902
  hana: Optional[pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']]] = None,
908
903
  influxdb: Optional[pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']]] = None,
@@ -962,7 +957,7 @@ class SecretBackendConnection(pulumi.CustomResource):
962
957
  :param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
963
958
  :param pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']] cassandra: A nested block containing configuration options for Cassandra connections.
964
959
  :param pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']] couchbase: A nested block containing configuration options for Couchbase connections.
965
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
960
+ :param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
966
961
  :param pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
967
962
  :param pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']] hana: A nested block containing configuration options for SAP HanaDB connections.
968
963
  :param pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']] influxdb: A nested block containing configuration options for InfluxDB connections.
@@ -1046,7 +1041,7 @@ class SecretBackendConnection(pulumi.CustomResource):
1046
1041
  backend: Optional[pulumi.Input[str]] = None,
1047
1042
  cassandra: Optional[pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']]] = None,
1048
1043
  couchbase: Optional[pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']]] = None,
1049
- data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1044
+ data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1050
1045
  elasticsearch: Optional[pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']]] = None,
1051
1046
  hana: Optional[pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']]] = None,
1052
1047
  influxdb: Optional[pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']]] = None,
@@ -1119,7 +1114,7 @@ class SecretBackendConnection(pulumi.CustomResource):
1119
1114
  backend: Optional[pulumi.Input[str]] = None,
1120
1115
  cassandra: Optional[pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']]] = None,
1121
1116
  couchbase: Optional[pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']]] = None,
1122
- data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1117
+ data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1123
1118
  elasticsearch: Optional[pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']]] = None,
1124
1119
  hana: Optional[pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']]] = None,
1125
1120
  influxdb: Optional[pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']]] = None,
@@ -1153,7 +1148,7 @@ class SecretBackendConnection(pulumi.CustomResource):
1153
1148
  :param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
1154
1149
  :param pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']] cassandra: A nested block containing configuration options for Cassandra connections.
1155
1150
  :param pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']] couchbase: A nested block containing configuration options for Couchbase connections.
1156
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
1151
+ :param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
1157
1152
  :param pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
1158
1153
  :param pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']] hana: A nested block containing configuration options for SAP HanaDB connections.
1159
1154
  :param pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']] influxdb: A nested block containing configuration options for InfluxDB connections.
@@ -1249,7 +1244,7 @@ class SecretBackendConnection(pulumi.CustomResource):
1249
1244
 
1250
1245
  @property
1251
1246
  @pulumi.getter
1252
- def data(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
1247
+ def data(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
1253
1248
  """
1254
1249
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
1255
1250
  """
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
@@ -22,7 +17,7 @@ class SecretBackendRoleArgs:
22
17
  backend: pulumi.Input[str],
23
18
  creation_statements: pulumi.Input[Sequence[pulumi.Input[str]]],
24
19
  db_name: pulumi.Input[str],
25
- credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
20
+ credential_config: Optional[pulumi.Input[Mapping[str, Any]]] = None,
26
21
  credential_type: Optional[pulumi.Input[str]] = None,
27
22
  default_ttl: Optional[pulumi.Input[int]] = None,
28
23
  max_ttl: Optional[pulumi.Input[int]] = None,
@@ -38,7 +33,7 @@ class SecretBackendRoleArgs:
38
33
  creating a user.
39
34
  :param pulumi.Input[str] db_name: The unique name of the database connection to use for
40
35
  the role.
41
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] credential_config: Specifies the configuration
36
+ :param pulumi.Input[Mapping[str, Any]] credential_config: Specifies the configuration
42
37
  for the given `credential_type`.
43
38
 
44
39
  The following options are available for each `credential_type` value:
@@ -123,7 +118,7 @@ class SecretBackendRoleArgs:
123
118
 
124
119
  @property
125
120
  @pulumi.getter(name="credentialConfig")
126
- def credential_config(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
121
+ def credential_config(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
127
122
  """
128
123
  Specifies the configuration
129
124
  for the given `credential_type`.
@@ -133,7 +128,7 @@ class SecretBackendRoleArgs:
133
128
  return pulumi.get(self, "credential_config")
134
129
 
135
130
  @credential_config.setter
136
- def credential_config(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
131
+ def credential_config(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
137
132
  pulumi.set(self, "credential_config", value)
138
133
 
139
134
  @property
@@ -248,7 +243,7 @@ class _SecretBackendRoleState:
248
243
  def __init__(__self__, *,
249
244
  backend: Optional[pulumi.Input[str]] = None,
250
245
  creation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
251
- credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
246
+ credential_config: Optional[pulumi.Input[Mapping[str, Any]]] = None,
252
247
  credential_type: Optional[pulumi.Input[str]] = None,
253
248
  db_name: Optional[pulumi.Input[str]] = None,
254
249
  default_ttl: Optional[pulumi.Input[int]] = None,
@@ -263,7 +258,7 @@ class _SecretBackendRoleState:
263
258
  :param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
264
259
  :param pulumi.Input[Sequence[pulumi.Input[str]]] creation_statements: The database statements to execute when
265
260
  creating a user.
266
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] credential_config: Specifies the configuration
261
+ :param pulumi.Input[Mapping[str, Any]] credential_config: Specifies the configuration
267
262
  for the given `credential_type`.
268
263
 
269
264
  The following options are available for each `credential_type` value:
@@ -340,7 +335,7 @@ class _SecretBackendRoleState:
340
335
 
341
336
  @property
342
337
  @pulumi.getter(name="credentialConfig")
343
- def credential_config(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
338
+ def credential_config(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
344
339
  """
345
340
  Specifies the configuration
346
341
  for the given `credential_type`.
@@ -350,7 +345,7 @@ class _SecretBackendRoleState:
350
345
  return pulumi.get(self, "credential_config")
351
346
 
352
347
  @credential_config.setter
353
- def credential_config(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
348
+ def credential_config(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
354
349
  pulumi.set(self, "credential_config", value)
355
350
 
356
351
  @property
@@ -480,7 +475,7 @@ class SecretBackendRole(pulumi.CustomResource):
480
475
  opts: Optional[pulumi.ResourceOptions] = None,
481
476
  backend: Optional[pulumi.Input[str]] = None,
482
477
  creation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
483
- credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
478
+ credential_config: Optional[pulumi.Input[Mapping[str, Any]]] = None,
484
479
  credential_type: Optional[pulumi.Input[str]] = None,
485
480
  db_name: Optional[pulumi.Input[str]] = None,
486
481
  default_ttl: Optional[pulumi.Input[int]] = None,
@@ -531,7 +526,7 @@ class SecretBackendRole(pulumi.CustomResource):
531
526
  :param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
532
527
  :param pulumi.Input[Sequence[pulumi.Input[str]]] creation_statements: The database statements to execute when
533
528
  creating a user.
534
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] credential_config: Specifies the configuration
529
+ :param pulumi.Input[Mapping[str, Any]] credential_config: Specifies the configuration
535
530
  for the given `credential_type`.
536
531
 
537
532
  The following options are available for each `credential_type` value:
@@ -614,7 +609,7 @@ class SecretBackendRole(pulumi.CustomResource):
614
609
  opts: Optional[pulumi.ResourceOptions] = None,
615
610
  backend: Optional[pulumi.Input[str]] = None,
616
611
  creation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
617
- credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
612
+ credential_config: Optional[pulumi.Input[Mapping[str, Any]]] = None,
618
613
  credential_type: Optional[pulumi.Input[str]] = None,
619
614
  db_name: Optional[pulumi.Input[str]] = None,
620
615
  default_ttl: Optional[pulumi.Input[int]] = None,
@@ -663,7 +658,7 @@ class SecretBackendRole(pulumi.CustomResource):
663
658
  opts: Optional[pulumi.ResourceOptions] = None,
664
659
  backend: Optional[pulumi.Input[str]] = None,
665
660
  creation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
666
- credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
661
+ credential_config: Optional[pulumi.Input[Mapping[str, Any]]] = None,
667
662
  credential_type: Optional[pulumi.Input[str]] = None,
668
663
  db_name: Optional[pulumi.Input[str]] = None,
669
664
  default_ttl: Optional[pulumi.Input[int]] = None,
@@ -683,7 +678,7 @@ class SecretBackendRole(pulumi.CustomResource):
683
678
  :param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
684
679
  :param pulumi.Input[Sequence[pulumi.Input[str]]] creation_statements: The database statements to execute when
685
680
  creating a user.
686
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] credential_config: Specifies the configuration
681
+ :param pulumi.Input[Mapping[str, Any]] credential_config: Specifies the configuration
687
682
  for the given `credential_type`.
688
683
 
689
684
  The following options are available for each `credential_type` value:
@@ -745,7 +740,7 @@ class SecretBackendRole(pulumi.CustomResource):
745
740
 
746
741
  @property
747
742
  @pulumi.getter(name="credentialConfig")
748
- def credential_config(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
743
+ def credential_config(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
749
744
  """
750
745
  Specifies the configuration
751
746
  for the given `credential_type`.
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole']
@@ -27,8 +22,7 @@ class SecretBackendStaticRoleArgs:
27
22
  rotation_period: Optional[pulumi.Input[int]] = None,
28
23
  rotation_schedule: Optional[pulumi.Input[str]] = None,
29
24
  rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
30
- rotation_window: Optional[pulumi.Input[int]] = None,
31
- self_managed_password: Optional[pulumi.Input[str]] = None):
25
+ rotation_window: Optional[pulumi.Input[int]] = None):
32
26
  """
33
27
  The set of arguments for constructing a SecretBackendStaticRole resource.
34
28
  :param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
@@ -49,9 +43,6 @@ class SecretBackendStaticRoleArgs:
49
43
  :param pulumi.Input[Sequence[pulumi.Input[str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
50
44
  :param pulumi.Input[int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
51
45
  from a given `rotation_schedule`.
52
- :param pulumi.Input[str] self_managed_password: The password corresponding to the username in the database.
53
- Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
54
- select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
55
46
  """
56
47
  pulumi.set(__self__, "backend", backend)
57
48
  pulumi.set(__self__, "db_name", db_name)
@@ -68,8 +59,6 @@ class SecretBackendStaticRoleArgs:
68
59
  pulumi.set(__self__, "rotation_statements", rotation_statements)
69
60
  if rotation_window is not None:
70
61
  pulumi.set(__self__, "rotation_window", rotation_window)
71
- if self_managed_password is not None:
72
- pulumi.set(__self__, "self_managed_password", self_managed_password)
73
62
 
74
63
  @property
75
64
  @pulumi.getter
@@ -188,20 +177,6 @@ class SecretBackendStaticRoleArgs:
188
177
  def rotation_window(self, value: Optional[pulumi.Input[int]]):
189
178
  pulumi.set(self, "rotation_window", value)
190
179
 
191
- @property
192
- @pulumi.getter(name="selfManagedPassword")
193
- def self_managed_password(self) -> Optional[pulumi.Input[str]]:
194
- """
195
- The password corresponding to the username in the database.
196
- Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
197
- select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
198
- """
199
- return pulumi.get(self, "self_managed_password")
200
-
201
- @self_managed_password.setter
202
- def self_managed_password(self, value: Optional[pulumi.Input[str]]):
203
- pulumi.set(self, "self_managed_password", value)
204
-
205
180
 
206
181
  @pulumi.input_type
207
182
  class _SecretBackendStaticRoleState:
@@ -214,7 +189,6 @@ class _SecretBackendStaticRoleState:
214
189
  rotation_schedule: Optional[pulumi.Input[str]] = None,
215
190
  rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
216
191
  rotation_window: Optional[pulumi.Input[int]] = None,
217
- self_managed_password: Optional[pulumi.Input[str]] = None,
218
192
  username: Optional[pulumi.Input[str]] = None):
219
193
  """
220
194
  Input properties used for looking up and filtering SecretBackendStaticRole resources.
@@ -235,9 +209,6 @@ class _SecretBackendStaticRoleState:
235
209
  :param pulumi.Input[Sequence[pulumi.Input[str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
236
210
  :param pulumi.Input[int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
237
211
  from a given `rotation_schedule`.
238
- :param pulumi.Input[str] self_managed_password: The password corresponding to the username in the database.
239
- Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
240
- select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
241
212
  :param pulumi.Input[str] username: The database username that this static role corresponds to.
242
213
  """
243
214
  if backend is not None:
@@ -256,8 +227,6 @@ class _SecretBackendStaticRoleState:
256
227
  pulumi.set(__self__, "rotation_statements", rotation_statements)
257
228
  if rotation_window is not None:
258
229
  pulumi.set(__self__, "rotation_window", rotation_window)
259
- if self_managed_password is not None:
260
- pulumi.set(__self__, "self_managed_password", self_managed_password)
261
230
  if username is not None:
262
231
  pulumi.set(__self__, "username", username)
263
232
 
@@ -366,20 +335,6 @@ class _SecretBackendStaticRoleState:
366
335
  def rotation_window(self, value: Optional[pulumi.Input[int]]):
367
336
  pulumi.set(self, "rotation_window", value)
368
337
 
369
- @property
370
- @pulumi.getter(name="selfManagedPassword")
371
- def self_managed_password(self) -> Optional[pulumi.Input[str]]:
372
- """
373
- The password corresponding to the username in the database.
374
- Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
375
- select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
376
- """
377
- return pulumi.get(self, "self_managed_password")
378
-
379
- @self_managed_password.setter
380
- def self_managed_password(self, value: Optional[pulumi.Input[str]]):
381
- pulumi.set(self, "self_managed_password", value)
382
-
383
338
  @property
384
339
  @pulumi.getter
385
340
  def username(self) -> Optional[pulumi.Input[str]]:
@@ -406,7 +361,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
406
361
  rotation_schedule: Optional[pulumi.Input[str]] = None,
407
362
  rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
408
363
  rotation_window: Optional[pulumi.Input[int]] = None,
409
- self_managed_password: Optional[pulumi.Input[str]] = None,
410
364
  username: Optional[pulumi.Input[str]] = None,
411
365
  __props__=None):
412
366
  """
@@ -476,9 +430,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
476
430
  :param pulumi.Input[Sequence[pulumi.Input[str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
477
431
  :param pulumi.Input[int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
478
432
  from a given `rotation_schedule`.
479
- :param pulumi.Input[str] self_managed_password: The password corresponding to the username in the database.
480
- Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
481
- select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
482
433
  :param pulumi.Input[str] username: The database username that this static role corresponds to.
483
434
  """
484
435
  ...
@@ -558,7 +509,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
558
509
  rotation_schedule: Optional[pulumi.Input[str]] = None,
559
510
  rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
560
511
  rotation_window: Optional[pulumi.Input[int]] = None,
561
- self_managed_password: Optional[pulumi.Input[str]] = None,
562
512
  username: Optional[pulumi.Input[str]] = None,
563
513
  __props__=None):
564
514
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
@@ -581,12 +531,9 @@ class SecretBackendStaticRole(pulumi.CustomResource):
581
531
  __props__.__dict__["rotation_schedule"] = rotation_schedule
582
532
  __props__.__dict__["rotation_statements"] = rotation_statements
583
533
  __props__.__dict__["rotation_window"] = rotation_window
584
- __props__.__dict__["self_managed_password"] = None if self_managed_password is None else pulumi.Output.secret(self_managed_password)
585
534
  if username is None and not opts.urn:
586
535
  raise TypeError("Missing required property 'username'")
587
536
  __props__.__dict__["username"] = username
588
- secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["selfManagedPassword"])
589
- opts = pulumi.ResourceOptions.merge(opts, secret_opts)
590
537
  super(SecretBackendStaticRole, __self__).__init__(
591
538
  'vault:database/secretBackendStaticRole:SecretBackendStaticRole',
592
539
  resource_name,
@@ -605,7 +552,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
605
552
  rotation_schedule: Optional[pulumi.Input[str]] = None,
606
553
  rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
607
554
  rotation_window: Optional[pulumi.Input[int]] = None,
608
- self_managed_password: Optional[pulumi.Input[str]] = None,
609
555
  username: Optional[pulumi.Input[str]] = None) -> 'SecretBackendStaticRole':
610
556
  """
611
557
  Get an existing SecretBackendStaticRole resource's state with the given name, id, and optional extra
@@ -631,9 +577,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
631
577
  :param pulumi.Input[Sequence[pulumi.Input[str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
632
578
  :param pulumi.Input[int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
633
579
  from a given `rotation_schedule`.
634
- :param pulumi.Input[str] self_managed_password: The password corresponding to the username in the database.
635
- Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
636
- select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
637
580
  :param pulumi.Input[str] username: The database username that this static role corresponds to.
638
581
  """
639
582
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -648,7 +591,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
648
591
  __props__.__dict__["rotation_schedule"] = rotation_schedule
649
592
  __props__.__dict__["rotation_statements"] = rotation_statements
650
593
  __props__.__dict__["rotation_window"] = rotation_window
651
- __props__.__dict__["self_managed_password"] = self_managed_password
652
594
  __props__.__dict__["username"] = username
653
595
  return SecretBackendStaticRole(resource_name, opts=opts, __props__=__props__)
654
596
 
@@ -725,16 +667,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
725
667
  """
726
668
  return pulumi.get(self, "rotation_window")
727
669
 
728
- @property
729
- @pulumi.getter(name="selfManagedPassword")
730
- def self_managed_password(self) -> pulumi.Output[Optional[str]]:
731
- """
732
- The password corresponding to the username in the database.
733
- Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
734
- select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
735
- """
736
- return pulumi.get(self, "self_managed_password")
737
-
738
670
  @property
739
671
  @pulumi.getter
740
672
  def username(self) -> pulumi.Output[str]:
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
  from . import outputs
17
12
  from ._inputs import *
@@ -47,7 +42,7 @@ class SecretsMountArgs:
47
42
  mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]] = None,
48
43
  mysqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]] = None,
49
44
  namespace: Optional[pulumi.Input[str]] = None,
50
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
45
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
51
46
  oracles: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]] = None,
52
47
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
53
48
  plugin_version: Optional[pulumi.Input[str]] = None,
@@ -99,7 +94,7 @@ class SecretsMountArgs:
99
94
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]] mysqls: A nested block containing configuration options for MySQL connections.
100
95
  *See Configuration Options for more info*
101
96
  :param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
102
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
97
+ :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
103
98
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]] oracles: A nested block containing configuration options for Oracle connections.
104
99
  *See Configuration Options for more info*
105
100
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
@@ -516,14 +511,14 @@ class SecretsMountArgs:
516
511
 
517
512
  @property
518
513
  @pulumi.getter
519
- def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
514
+ def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
520
515
  """
521
516
  Specifies mount type specific options that are passed to the backend
522
517
  """
523
518
  return pulumi.get(self, "options")
524
519
 
525
520
  @options.setter
526
- def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
521
+ def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
527
522
  pulumi.set(self, "options", value)
528
523
 
529
524
  @property
@@ -671,7 +666,7 @@ class _SecretsMountState:
671
666
  mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]] = None,
672
667
  mysqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]] = None,
673
668
  namespace: Optional[pulumi.Input[str]] = None,
674
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
669
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
675
670
  oracles: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]] = None,
676
671
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
677
672
  path: Optional[pulumi.Input[str]] = None,
@@ -725,7 +720,7 @@ class _SecretsMountState:
725
720
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]] mysqls: A nested block containing configuration options for MySQL connections.
726
721
  *See Configuration Options for more info*
727
722
  :param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
728
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
723
+ :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
729
724
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]] oracles: A nested block containing configuration options for Oracle connections.
730
725
  *See Configuration Options for more info*
731
726
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
@@ -1160,14 +1155,14 @@ class _SecretsMountState:
1160
1155
 
1161
1156
  @property
1162
1157
  @pulumi.getter
1163
- def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
1158
+ def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
1164
1159
  """
1165
1160
  Specifies mount type specific options that are passed to the backend
1166
1161
  """
1167
1162
  return pulumi.get(self, "options")
1168
1163
 
1169
1164
  @options.setter
1170
- def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
1165
+ def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
1171
1166
  pulumi.set(self, "options", value)
1172
1167
 
1173
1168
  @property
@@ -1327,7 +1322,7 @@ class SecretsMount(pulumi.CustomResource):
1327
1322
  mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]]] = None,
1328
1323
  mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]]] = None,
1329
1324
  namespace: Optional[pulumi.Input[str]] = None,
1330
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1325
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1331
1326
  oracles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]]] = None,
1332
1327
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1333
1328
  path: Optional[pulumi.Input[str]] = None,
@@ -1431,7 +1426,7 @@ class SecretsMount(pulumi.CustomResource):
1431
1426
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]] mysqls: A nested block containing configuration options for MySQL connections.
1432
1427
  *See Configuration Options for more info*
1433
1428
  :param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
1434
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
1429
+ :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
1435
1430
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]] oracles: A nested block containing configuration options for Oracle connections.
1436
1431
  *See Configuration Options for more info*
1437
1432
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
@@ -1546,7 +1541,7 @@ class SecretsMount(pulumi.CustomResource):
1546
1541
  mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]]] = None,
1547
1542
  mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]]] = None,
1548
1543
  namespace: Optional[pulumi.Input[str]] = None,
1549
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1544
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1550
1545
  oracles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]]] = None,
1551
1546
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1552
1547
  path: Optional[pulumi.Input[str]] = None,
@@ -1643,7 +1638,7 @@ class SecretsMount(pulumi.CustomResource):
1643
1638
  mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]]] = None,
1644
1639
  mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]]] = None,
1645
1640
  namespace: Optional[pulumi.Input[str]] = None,
1646
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1641
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1647
1642
  oracles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]]] = None,
1648
1643
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1649
1644
  path: Optional[pulumi.Input[str]] = None,
@@ -1702,7 +1697,7 @@ class SecretsMount(pulumi.CustomResource):
1702
1697
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]] mysqls: A nested block containing configuration options for MySQL connections.
1703
1698
  *See Configuration Options for more info*
1704
1699
  :param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
1705
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
1700
+ :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
1706
1701
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]] oracles: A nested block containing configuration options for Oracle connections.
1707
1702
  *See Configuration Options for more info*
1708
1703
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
@@ -1996,7 +1991,7 @@ class SecretsMount(pulumi.CustomResource):
1996
1991
 
1997
1992
  @property
1998
1993
  @pulumi.getter
1999
- def options(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
1994
+ def options(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
2000
1995
  """
2001
1996
  Specifies mount type specific options that are passed to the backend
2002
1997
  """
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
 
17
12
  __all__ = ['EgpPolicyArgs', 'EgpPolicy']