pulumi-vault 6.4.0__py3-none-any.whl → 6.4.0a1723454543__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -560
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +4 -19
- pulumi_vault/ad/secret_backend.py +0 -5
- pulumi_vault/ad/secret_library.py +0 -5
- pulumi_vault/ad/secret_role.py +0 -5
- pulumi_vault/alicloud/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_login.py +0 -5
- pulumi_vault/approle/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -99
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
- pulumi_vault/audit.py +0 -5
- pulumi_vault/audit_request_header.py +0 -5
- pulumi_vault/auth_backend.py +0 -5
- pulumi_vault/aws/auth_backend_cert.py +0 -5
- pulumi_vault/aws/auth_backend_client.py +0 -5
- pulumi_vault/aws/auth_backend_config_identity.py +0 -5
- pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
- pulumi_vault/aws/auth_backend_login.py +7 -12
- pulumi_vault/aws/auth_backend_role.py +0 -5
- pulumi_vault/aws/auth_backend_role_tag.py +0 -5
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
- pulumi_vault/aws/auth_backend_sts_role.py +0 -5
- pulumi_vault/aws/get_access_credentials.py +4 -31
- pulumi_vault/aws/get_static_access_credentials.py +4 -18
- pulumi_vault/aws/secret_backend.py +0 -5
- pulumi_vault/aws/secret_backend_role.py +0 -5
- pulumi_vault/aws/secret_backend_static_role.py +0 -5
- pulumi_vault/azure/_inputs.py +0 -24
- pulumi_vault/azure/auth_backend_config.py +0 -5
- pulumi_vault/azure/auth_backend_role.py +0 -5
- pulumi_vault/azure/backend.py +0 -5
- pulumi_vault/azure/backend_role.py +0 -5
- pulumi_vault/azure/get_access_credentials.py +4 -36
- pulumi_vault/azure/outputs.py +0 -5
- pulumi_vault/cert_auth_backend_role.py +0 -5
- pulumi_vault/config/__init__.pyi +0 -5
- pulumi_vault/config/_inputs.py +0 -21
- pulumi_vault/config/outputs.py +0 -5
- pulumi_vault/config/ui_custom_message.py +14 -19
- pulumi_vault/config/vars.py +0 -5
- pulumi_vault/consul/secret_backend.py +0 -5
- pulumi_vault/consul/secret_backend_role.py +0 -5
- pulumi_vault/database/_inputs.py +105 -2256
- pulumi_vault/database/outputs.py +54 -199
- pulumi_vault/database/secret_backend_connection.py +14 -19
- pulumi_vault/database/secret_backend_role.py +14 -19
- pulumi_vault/database/secret_backend_static_role.py +1 -69
- pulumi_vault/database/secrets_mount.py +14 -19
- pulumi_vault/egp_policy.py +0 -5
- pulumi_vault/gcp/_inputs.py +0 -111
- pulumi_vault/gcp/auth_backend.py +0 -5
- pulumi_vault/gcp/auth_backend_role.py +0 -5
- pulumi_vault/gcp/get_auth_backend_role.py +4 -42
- pulumi_vault/gcp/outputs.py +0 -5
- pulumi_vault/gcp/secret_backend.py +0 -5
- pulumi_vault/gcp/secret_impersonated_account.py +3 -62
- pulumi_vault/gcp/secret_roleset.py +0 -5
- pulumi_vault/gcp/secret_static_account.py +0 -5
- pulumi_vault/generic/endpoint.py +0 -5
- pulumi_vault/generic/get_secret.py +5 -25
- pulumi_vault/generic/secret.py +7 -12
- pulumi_vault/get_auth_backend.py +4 -21
- pulumi_vault/get_auth_backends.py +4 -16
- pulumi_vault/get_namespace.py +5 -18
- pulumi_vault/get_namespaces.py +4 -13
- pulumi_vault/get_nomad_access_token.py +8 -28
- pulumi_vault/get_policy_document.py +4 -15
- pulumi_vault/get_raft_autopilot_state.py +7 -26
- pulumi_vault/github/_inputs.py +0 -55
- pulumi_vault/github/auth_backend.py +0 -5
- pulumi_vault/github/outputs.py +0 -5
- pulumi_vault/github/team.py +0 -5
- pulumi_vault/github/user.py +0 -5
- pulumi_vault/identity/entity.py +0 -5
- pulumi_vault/identity/entity_alias.py +0 -5
- pulumi_vault/identity/entity_policies.py +0 -5
- pulumi_vault/identity/get_entity.py +5 -35
- pulumi_vault/identity/get_group.py +6 -42
- pulumi_vault/identity/get_oidc_client_creds.py +4 -16
- pulumi_vault/identity/get_oidc_openid_config.py +4 -26
- pulumi_vault/identity/get_oidc_public_keys.py +5 -16
- pulumi_vault/identity/group.py +0 -5
- pulumi_vault/identity/group_alias.py +0 -5
- pulumi_vault/identity/group_member_entity_ids.py +0 -5
- pulumi_vault/identity/group_member_group_ids.py +0 -5
- pulumi_vault/identity/group_policies.py +0 -5
- pulumi_vault/identity/mfa_duo.py +0 -5
- pulumi_vault/identity/mfa_login_enforcement.py +0 -5
- pulumi_vault/identity/mfa_okta.py +0 -5
- pulumi_vault/identity/mfa_pingid.py +0 -5
- pulumi_vault/identity/mfa_totp.py +0 -5
- pulumi_vault/identity/oidc.py +0 -5
- pulumi_vault/identity/oidc_assignment.py +0 -5
- pulumi_vault/identity/oidc_client.py +0 -5
- pulumi_vault/identity/oidc_key.py +0 -5
- pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
- pulumi_vault/identity/oidc_provider.py +0 -5
- pulumi_vault/identity/oidc_role.py +0 -5
- pulumi_vault/identity/oidc_scope.py +0 -5
- pulumi_vault/identity/outputs.py +3 -8
- pulumi_vault/jwt/_inputs.py +0 -55
- pulumi_vault/jwt/auth_backend.py +0 -5
- pulumi_vault/jwt/auth_backend_role.py +28 -33
- pulumi_vault/jwt/outputs.py +0 -5
- pulumi_vault/kmip/secret_backend.py +0 -5
- pulumi_vault/kmip/secret_role.py +0 -5
- pulumi_vault/kmip/secret_scope.py +0 -5
- pulumi_vault/kubernetes/auth_backend_config.py +3 -55
- pulumi_vault/kubernetes/auth_backend_role.py +0 -5
- pulumi_vault/kubernetes/get_auth_backend_config.py +7 -59
- pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
- pulumi_vault/kubernetes/get_service_account_token.py +4 -28
- pulumi_vault/kubernetes/secret_backend.py +14 -19
- pulumi_vault/kubernetes/secret_backend_role.py +0 -5
- pulumi_vault/kv/_inputs.py +4 -36
- pulumi_vault/kv/get_secret.py +5 -20
- pulumi_vault/kv/get_secret_subkeys_v2.py +5 -24
- pulumi_vault/kv/get_secret_v2.py +8 -27
- pulumi_vault/kv/get_secrets_list.py +4 -15
- pulumi_vault/kv/get_secrets_list_v2.py +4 -18
- pulumi_vault/kv/outputs.py +3 -8
- pulumi_vault/kv/secret.py +7 -12
- pulumi_vault/kv/secret_backend_v2.py +0 -5
- pulumi_vault/kv/secret_v2.py +28 -33
- pulumi_vault/ldap/auth_backend.py +0 -52
- pulumi_vault/ldap/auth_backend_group.py +0 -5
- pulumi_vault/ldap/auth_backend_user.py +0 -5
- pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
- pulumi_vault/ldap/get_static_credentials.py +4 -23
- pulumi_vault/ldap/secret_backend.py +14 -19
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
- pulumi_vault/ldap/secret_backend_library_set.py +0 -5
- pulumi_vault/ldap/secret_backend_static_role.py +0 -5
- pulumi_vault/managed/_inputs.py +0 -205
- pulumi_vault/managed/keys.py +0 -5
- pulumi_vault/managed/outputs.py +0 -5
- pulumi_vault/mfa_duo.py +0 -5
- pulumi_vault/mfa_okta.py +0 -5
- pulumi_vault/mfa_pingid.py +0 -5
- pulumi_vault/mfa_totp.py +0 -5
- pulumi_vault/mongodbatlas/secret_backend.py +0 -5
- pulumi_vault/mongodbatlas/secret_role.py +0 -5
- pulumi_vault/mount.py +16 -21
- pulumi_vault/namespace.py +14 -19
- pulumi_vault/nomad_secret_backend.py +0 -5
- pulumi_vault/nomad_secret_role.py +0 -5
- pulumi_vault/okta/_inputs.py +0 -39
- pulumi_vault/okta/auth_backend.py +0 -5
- pulumi_vault/okta/auth_backend_group.py +0 -5
- pulumi_vault/okta/auth_backend_user.py +0 -5
- pulumi_vault/okta/outputs.py +0 -5
- pulumi_vault/outputs.py +0 -5
- pulumi_vault/password_policy.py +0 -5
- pulumi_vault/pkisecret/_inputs.py +8 -49
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
- pulumi_vault/pkisecret/backend_config_est.py +14 -19
- pulumi_vault/pkisecret/get_backend_config_est.py +5 -23
- pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
- pulumi_vault/pkisecret/get_backend_issuers.py +5 -18
- pulumi_vault/pkisecret/get_backend_key.py +4 -19
- pulumi_vault/pkisecret/get_backend_keys.py +5 -18
- pulumi_vault/pkisecret/outputs.py +12 -17
- pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
- pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
- pulumi_vault/pkisecret/secret_backend_key.py +0 -5
- pulumi_vault/pkisecret/secret_backend_role.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
- pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
- pulumi_vault/plugin.py +0 -5
- pulumi_vault/plugin_pinned_version.py +0 -5
- pulumi_vault/policy.py +0 -5
- pulumi_vault/provider.py +0 -5
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +0 -5
- pulumi_vault/quota_rate_limit.py +0 -5
- pulumi_vault/rabbitmq/_inputs.py +0 -61
- pulumi_vault/rabbitmq/outputs.py +0 -5
- pulumi_vault/rabbitmq/secret_backend.py +0 -5
- pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
- pulumi_vault/raft_autopilot.py +0 -5
- pulumi_vault/raft_snapshot_agent_config.py +0 -5
- pulumi_vault/rgp_policy.py +0 -5
- pulumi_vault/saml/auth_backend.py +0 -5
- pulumi_vault/saml/auth_backend_role.py +14 -19
- pulumi_vault/secrets/_inputs.py +0 -30
- pulumi_vault/secrets/outputs.py +0 -5
- pulumi_vault/secrets/sync_association.py +0 -5
- pulumi_vault/secrets/sync_aws_destination.py +14 -19
- pulumi_vault/secrets/sync_azure_destination.py +14 -19
- pulumi_vault/secrets/sync_config.py +0 -5
- pulumi_vault/secrets/sync_gcp_destination.py +14 -19
- pulumi_vault/secrets/sync_gh_destination.py +0 -5
- pulumi_vault/secrets/sync_github_apps.py +0 -5
- pulumi_vault/secrets/sync_vercel_destination.py +0 -5
- pulumi_vault/ssh/_inputs.py +0 -22
- pulumi_vault/ssh/outputs.py +0 -5
- pulumi_vault/ssh/secret_backend_ca.py +0 -5
- pulumi_vault/ssh/secret_backend_role.py +28 -67
- pulumi_vault/terraformcloud/secret_backend.py +0 -5
- pulumi_vault/terraformcloud/secret_creds.py +0 -5
- pulumi_vault/terraformcloud/secret_role.py +0 -5
- pulumi_vault/token.py +0 -5
- pulumi_vault/tokenauth/auth_backend_role.py +14 -5
- pulumi_vault/transform/alphabet.py +0 -5
- pulumi_vault/transform/get_decode.py +14 -38
- pulumi_vault/transform/get_encode.py +14 -38
- pulumi_vault/transform/role.py +0 -5
- pulumi_vault/transform/template.py +14 -19
- pulumi_vault/transform/transformation.py +0 -5
- pulumi_vault/transit/get_decrypt.py +4 -21
- pulumi_vault/transit/get_encrypt.py +4 -23
- pulumi_vault/transit/secret_backend_key.py +7 -12
- pulumi_vault/transit/secret_cache_config.py +0 -5
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/METADATA +2 -3
- pulumi_vault-6.4.0a1723454543.dist-info/RECORD +256 -0
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/WHEEL +1 -1
- pulumi_vault-6.4.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/top_level.txt +0 -0
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
from . import outputs
|
17
12
|
from ._inputs import *
|
@@ -25,7 +20,7 @@ class SecretBackendConnectionArgs:
|
|
25
20
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
26
21
|
cassandra: Optional[pulumi.Input['SecretBackendConnectionCassandraArgs']] = None,
|
27
22
|
couchbase: Optional[pulumi.Input['SecretBackendConnectionCouchbaseArgs']] = None,
|
28
|
-
data: Optional[pulumi.Input[Mapping[str,
|
23
|
+
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
29
24
|
elasticsearch: Optional[pulumi.Input['SecretBackendConnectionElasticsearchArgs']] = None,
|
30
25
|
hana: Optional[pulumi.Input['SecretBackendConnectionHanaArgs']] = None,
|
31
26
|
influxdb: Optional[pulumi.Input['SecretBackendConnectionInfluxdbArgs']] = None,
|
@@ -54,7 +49,7 @@ class SecretBackendConnectionArgs:
|
|
54
49
|
connection.
|
55
50
|
:param pulumi.Input['SecretBackendConnectionCassandraArgs'] cassandra: A nested block containing configuration options for Cassandra connections.
|
56
51
|
:param pulumi.Input['SecretBackendConnectionCouchbaseArgs'] couchbase: A nested block containing configuration options for Couchbase connections.
|
57
|
-
:param pulumi.Input[Mapping[str,
|
52
|
+
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
58
53
|
:param pulumi.Input['SecretBackendConnectionElasticsearchArgs'] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
|
59
54
|
:param pulumi.Input['SecretBackendConnectionHanaArgs'] hana: A nested block containing configuration options for SAP HanaDB connections.
|
60
55
|
:param pulumi.Input['SecretBackendConnectionInfluxdbArgs'] influxdb: A nested block containing configuration options for InfluxDB connections.
|
@@ -186,14 +181,14 @@ class SecretBackendConnectionArgs:
|
|
186
181
|
|
187
182
|
@property
|
188
183
|
@pulumi.getter
|
189
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
184
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
190
185
|
"""
|
191
186
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
192
187
|
"""
|
193
188
|
return pulumi.get(self, "data")
|
194
189
|
|
195
190
|
@data.setter
|
196
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
191
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
197
192
|
pulumi.set(self, "data", value)
|
198
193
|
|
199
194
|
@property
|
@@ -462,7 +457,7 @@ class _SecretBackendConnectionState:
|
|
462
457
|
backend: Optional[pulumi.Input[str]] = None,
|
463
458
|
cassandra: Optional[pulumi.Input['SecretBackendConnectionCassandraArgs']] = None,
|
464
459
|
couchbase: Optional[pulumi.Input['SecretBackendConnectionCouchbaseArgs']] = None,
|
465
|
-
data: Optional[pulumi.Input[Mapping[str,
|
460
|
+
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
466
461
|
elasticsearch: Optional[pulumi.Input['SecretBackendConnectionElasticsearchArgs']] = None,
|
467
462
|
hana: Optional[pulumi.Input['SecretBackendConnectionHanaArgs']] = None,
|
468
463
|
influxdb: Optional[pulumi.Input['SecretBackendConnectionInfluxdbArgs']] = None,
|
@@ -491,7 +486,7 @@ class _SecretBackendConnectionState:
|
|
491
486
|
:param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
|
492
487
|
:param pulumi.Input['SecretBackendConnectionCassandraArgs'] cassandra: A nested block containing configuration options for Cassandra connections.
|
493
488
|
:param pulumi.Input['SecretBackendConnectionCouchbaseArgs'] couchbase: A nested block containing configuration options for Couchbase connections.
|
494
|
-
:param pulumi.Input[Mapping[str,
|
489
|
+
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
495
490
|
:param pulumi.Input['SecretBackendConnectionElasticsearchArgs'] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
|
496
491
|
:param pulumi.Input['SecretBackendConnectionHanaArgs'] hana: A nested block containing configuration options for SAP HanaDB connections.
|
497
492
|
:param pulumi.Input['SecretBackendConnectionInfluxdbArgs'] influxdb: A nested block containing configuration options for InfluxDB connections.
|
@@ -624,14 +619,14 @@ class _SecretBackendConnectionState:
|
|
624
619
|
|
625
620
|
@property
|
626
621
|
@pulumi.getter
|
627
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
622
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
628
623
|
"""
|
629
624
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
630
625
|
"""
|
631
626
|
return pulumi.get(self, "data")
|
632
627
|
|
633
628
|
@data.setter
|
634
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
629
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
635
630
|
pulumi.set(self, "data", value)
|
636
631
|
|
637
632
|
@property
|
@@ -902,7 +897,7 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
902
897
|
backend: Optional[pulumi.Input[str]] = None,
|
903
898
|
cassandra: Optional[pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']]] = None,
|
904
899
|
couchbase: Optional[pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']]] = None,
|
905
|
-
data: Optional[pulumi.Input[Mapping[str,
|
900
|
+
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
906
901
|
elasticsearch: Optional[pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']]] = None,
|
907
902
|
hana: Optional[pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']]] = None,
|
908
903
|
influxdb: Optional[pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']]] = None,
|
@@ -962,7 +957,7 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
962
957
|
:param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
|
963
958
|
:param pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']] cassandra: A nested block containing configuration options for Cassandra connections.
|
964
959
|
:param pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']] couchbase: A nested block containing configuration options for Couchbase connections.
|
965
|
-
:param pulumi.Input[Mapping[str,
|
960
|
+
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
966
961
|
:param pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
|
967
962
|
:param pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']] hana: A nested block containing configuration options for SAP HanaDB connections.
|
968
963
|
:param pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']] influxdb: A nested block containing configuration options for InfluxDB connections.
|
@@ -1046,7 +1041,7 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1046
1041
|
backend: Optional[pulumi.Input[str]] = None,
|
1047
1042
|
cassandra: Optional[pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']]] = None,
|
1048
1043
|
couchbase: Optional[pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']]] = None,
|
1049
|
-
data: Optional[pulumi.Input[Mapping[str,
|
1044
|
+
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1050
1045
|
elasticsearch: Optional[pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']]] = None,
|
1051
1046
|
hana: Optional[pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']]] = None,
|
1052
1047
|
influxdb: Optional[pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']]] = None,
|
@@ -1119,7 +1114,7 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1119
1114
|
backend: Optional[pulumi.Input[str]] = None,
|
1120
1115
|
cassandra: Optional[pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']]] = None,
|
1121
1116
|
couchbase: Optional[pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']]] = None,
|
1122
|
-
data: Optional[pulumi.Input[Mapping[str,
|
1117
|
+
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1123
1118
|
elasticsearch: Optional[pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']]] = None,
|
1124
1119
|
hana: Optional[pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']]] = None,
|
1125
1120
|
influxdb: Optional[pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']]] = None,
|
@@ -1153,7 +1148,7 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1153
1148
|
:param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
|
1154
1149
|
:param pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']] cassandra: A nested block containing configuration options for Cassandra connections.
|
1155
1150
|
:param pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']] couchbase: A nested block containing configuration options for Couchbase connections.
|
1156
|
-
:param pulumi.Input[Mapping[str,
|
1151
|
+
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
1157
1152
|
:param pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
|
1158
1153
|
:param pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']] hana: A nested block containing configuration options for SAP HanaDB connections.
|
1159
1154
|
:param pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']] influxdb: A nested block containing configuration options for InfluxDB connections.
|
@@ -1249,7 +1244,7 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1249
1244
|
|
1250
1245
|
@property
|
1251
1246
|
@pulumi.getter
|
1252
|
-
def data(self) -> pulumi.Output[Optional[Mapping[str,
|
1247
|
+
def data(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
|
1253
1248
|
"""
|
1254
1249
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
1255
1250
|
"""
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
|
@@ -22,7 +17,7 @@ class SecretBackendRoleArgs:
|
|
22
17
|
backend: pulumi.Input[str],
|
23
18
|
creation_statements: pulumi.Input[Sequence[pulumi.Input[str]]],
|
24
19
|
db_name: pulumi.Input[str],
|
25
|
-
credential_config: Optional[pulumi.Input[Mapping[str,
|
20
|
+
credential_config: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
26
21
|
credential_type: Optional[pulumi.Input[str]] = None,
|
27
22
|
default_ttl: Optional[pulumi.Input[int]] = None,
|
28
23
|
max_ttl: Optional[pulumi.Input[int]] = None,
|
@@ -38,7 +33,7 @@ class SecretBackendRoleArgs:
|
|
38
33
|
creating a user.
|
39
34
|
:param pulumi.Input[str] db_name: The unique name of the database connection to use for
|
40
35
|
the role.
|
41
|
-
:param pulumi.Input[Mapping[str,
|
36
|
+
:param pulumi.Input[Mapping[str, Any]] credential_config: Specifies the configuration
|
42
37
|
for the given `credential_type`.
|
43
38
|
|
44
39
|
The following options are available for each `credential_type` value:
|
@@ -123,7 +118,7 @@ class SecretBackendRoleArgs:
|
|
123
118
|
|
124
119
|
@property
|
125
120
|
@pulumi.getter(name="credentialConfig")
|
126
|
-
def credential_config(self) -> Optional[pulumi.Input[Mapping[str,
|
121
|
+
def credential_config(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
127
122
|
"""
|
128
123
|
Specifies the configuration
|
129
124
|
for the given `credential_type`.
|
@@ -133,7 +128,7 @@ class SecretBackendRoleArgs:
|
|
133
128
|
return pulumi.get(self, "credential_config")
|
134
129
|
|
135
130
|
@credential_config.setter
|
136
|
-
def credential_config(self, value: Optional[pulumi.Input[Mapping[str,
|
131
|
+
def credential_config(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
137
132
|
pulumi.set(self, "credential_config", value)
|
138
133
|
|
139
134
|
@property
|
@@ -248,7 +243,7 @@ class _SecretBackendRoleState:
|
|
248
243
|
def __init__(__self__, *,
|
249
244
|
backend: Optional[pulumi.Input[str]] = None,
|
250
245
|
creation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
251
|
-
credential_config: Optional[pulumi.Input[Mapping[str,
|
246
|
+
credential_config: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
252
247
|
credential_type: Optional[pulumi.Input[str]] = None,
|
253
248
|
db_name: Optional[pulumi.Input[str]] = None,
|
254
249
|
default_ttl: Optional[pulumi.Input[int]] = None,
|
@@ -263,7 +258,7 @@ class _SecretBackendRoleState:
|
|
263
258
|
:param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
|
264
259
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] creation_statements: The database statements to execute when
|
265
260
|
creating a user.
|
266
|
-
:param pulumi.Input[Mapping[str,
|
261
|
+
:param pulumi.Input[Mapping[str, Any]] credential_config: Specifies the configuration
|
267
262
|
for the given `credential_type`.
|
268
263
|
|
269
264
|
The following options are available for each `credential_type` value:
|
@@ -340,7 +335,7 @@ class _SecretBackendRoleState:
|
|
340
335
|
|
341
336
|
@property
|
342
337
|
@pulumi.getter(name="credentialConfig")
|
343
|
-
def credential_config(self) -> Optional[pulumi.Input[Mapping[str,
|
338
|
+
def credential_config(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
344
339
|
"""
|
345
340
|
Specifies the configuration
|
346
341
|
for the given `credential_type`.
|
@@ -350,7 +345,7 @@ class _SecretBackendRoleState:
|
|
350
345
|
return pulumi.get(self, "credential_config")
|
351
346
|
|
352
347
|
@credential_config.setter
|
353
|
-
def credential_config(self, value: Optional[pulumi.Input[Mapping[str,
|
348
|
+
def credential_config(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
354
349
|
pulumi.set(self, "credential_config", value)
|
355
350
|
|
356
351
|
@property
|
@@ -480,7 +475,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
480
475
|
opts: Optional[pulumi.ResourceOptions] = None,
|
481
476
|
backend: Optional[pulumi.Input[str]] = None,
|
482
477
|
creation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
483
|
-
credential_config: Optional[pulumi.Input[Mapping[str,
|
478
|
+
credential_config: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
484
479
|
credential_type: Optional[pulumi.Input[str]] = None,
|
485
480
|
db_name: Optional[pulumi.Input[str]] = None,
|
486
481
|
default_ttl: Optional[pulumi.Input[int]] = None,
|
@@ -531,7 +526,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
531
526
|
:param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
|
532
527
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] creation_statements: The database statements to execute when
|
533
528
|
creating a user.
|
534
|
-
:param pulumi.Input[Mapping[str,
|
529
|
+
:param pulumi.Input[Mapping[str, Any]] credential_config: Specifies the configuration
|
535
530
|
for the given `credential_type`.
|
536
531
|
|
537
532
|
The following options are available for each `credential_type` value:
|
@@ -614,7 +609,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
614
609
|
opts: Optional[pulumi.ResourceOptions] = None,
|
615
610
|
backend: Optional[pulumi.Input[str]] = None,
|
616
611
|
creation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
617
|
-
credential_config: Optional[pulumi.Input[Mapping[str,
|
612
|
+
credential_config: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
618
613
|
credential_type: Optional[pulumi.Input[str]] = None,
|
619
614
|
db_name: Optional[pulumi.Input[str]] = None,
|
620
615
|
default_ttl: Optional[pulumi.Input[int]] = None,
|
@@ -663,7 +658,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
663
658
|
opts: Optional[pulumi.ResourceOptions] = None,
|
664
659
|
backend: Optional[pulumi.Input[str]] = None,
|
665
660
|
creation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
666
|
-
credential_config: Optional[pulumi.Input[Mapping[str,
|
661
|
+
credential_config: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
667
662
|
credential_type: Optional[pulumi.Input[str]] = None,
|
668
663
|
db_name: Optional[pulumi.Input[str]] = None,
|
669
664
|
default_ttl: Optional[pulumi.Input[int]] = None,
|
@@ -683,7 +678,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
683
678
|
:param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
|
684
679
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] creation_statements: The database statements to execute when
|
685
680
|
creating a user.
|
686
|
-
:param pulumi.Input[Mapping[str,
|
681
|
+
:param pulumi.Input[Mapping[str, Any]] credential_config: Specifies the configuration
|
687
682
|
for the given `credential_type`.
|
688
683
|
|
689
684
|
The following options are available for each `credential_type` value:
|
@@ -745,7 +740,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
745
740
|
|
746
741
|
@property
|
747
742
|
@pulumi.getter(name="credentialConfig")
|
748
|
-
def credential_config(self) -> pulumi.Output[Optional[Mapping[str,
|
743
|
+
def credential_config(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
|
749
744
|
"""
|
750
745
|
Specifies the configuration
|
751
746
|
for the given `credential_type`.
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole']
|
@@ -27,8 +22,7 @@ class SecretBackendStaticRoleArgs:
|
|
27
22
|
rotation_period: Optional[pulumi.Input[int]] = None,
|
28
23
|
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
29
24
|
rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
30
|
-
rotation_window: Optional[pulumi.Input[int]] = None
|
31
|
-
self_managed_password: Optional[pulumi.Input[str]] = None):
|
25
|
+
rotation_window: Optional[pulumi.Input[int]] = None):
|
32
26
|
"""
|
33
27
|
The set of arguments for constructing a SecretBackendStaticRole resource.
|
34
28
|
:param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
|
@@ -49,9 +43,6 @@ class SecretBackendStaticRoleArgs:
|
|
49
43
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
|
50
44
|
:param pulumi.Input[int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
|
51
45
|
from a given `rotation_schedule`.
|
52
|
-
:param pulumi.Input[str] self_managed_password: The password corresponding to the username in the database.
|
53
|
-
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
54
|
-
select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
|
55
46
|
"""
|
56
47
|
pulumi.set(__self__, "backend", backend)
|
57
48
|
pulumi.set(__self__, "db_name", db_name)
|
@@ -68,8 +59,6 @@ class SecretBackendStaticRoleArgs:
|
|
68
59
|
pulumi.set(__self__, "rotation_statements", rotation_statements)
|
69
60
|
if rotation_window is not None:
|
70
61
|
pulumi.set(__self__, "rotation_window", rotation_window)
|
71
|
-
if self_managed_password is not None:
|
72
|
-
pulumi.set(__self__, "self_managed_password", self_managed_password)
|
73
62
|
|
74
63
|
@property
|
75
64
|
@pulumi.getter
|
@@ -188,20 +177,6 @@ class SecretBackendStaticRoleArgs:
|
|
188
177
|
def rotation_window(self, value: Optional[pulumi.Input[int]]):
|
189
178
|
pulumi.set(self, "rotation_window", value)
|
190
179
|
|
191
|
-
@property
|
192
|
-
@pulumi.getter(name="selfManagedPassword")
|
193
|
-
def self_managed_password(self) -> Optional[pulumi.Input[str]]:
|
194
|
-
"""
|
195
|
-
The password corresponding to the username in the database.
|
196
|
-
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
197
|
-
select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
|
198
|
-
"""
|
199
|
-
return pulumi.get(self, "self_managed_password")
|
200
|
-
|
201
|
-
@self_managed_password.setter
|
202
|
-
def self_managed_password(self, value: Optional[pulumi.Input[str]]):
|
203
|
-
pulumi.set(self, "self_managed_password", value)
|
204
|
-
|
205
180
|
|
206
181
|
@pulumi.input_type
|
207
182
|
class _SecretBackendStaticRoleState:
|
@@ -214,7 +189,6 @@ class _SecretBackendStaticRoleState:
|
|
214
189
|
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
215
190
|
rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
216
191
|
rotation_window: Optional[pulumi.Input[int]] = None,
|
217
|
-
self_managed_password: Optional[pulumi.Input[str]] = None,
|
218
192
|
username: Optional[pulumi.Input[str]] = None):
|
219
193
|
"""
|
220
194
|
Input properties used for looking up and filtering SecretBackendStaticRole resources.
|
@@ -235,9 +209,6 @@ class _SecretBackendStaticRoleState:
|
|
235
209
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
|
236
210
|
:param pulumi.Input[int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
|
237
211
|
from a given `rotation_schedule`.
|
238
|
-
:param pulumi.Input[str] self_managed_password: The password corresponding to the username in the database.
|
239
|
-
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
240
|
-
select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
|
241
212
|
:param pulumi.Input[str] username: The database username that this static role corresponds to.
|
242
213
|
"""
|
243
214
|
if backend is not None:
|
@@ -256,8 +227,6 @@ class _SecretBackendStaticRoleState:
|
|
256
227
|
pulumi.set(__self__, "rotation_statements", rotation_statements)
|
257
228
|
if rotation_window is not None:
|
258
229
|
pulumi.set(__self__, "rotation_window", rotation_window)
|
259
|
-
if self_managed_password is not None:
|
260
|
-
pulumi.set(__self__, "self_managed_password", self_managed_password)
|
261
230
|
if username is not None:
|
262
231
|
pulumi.set(__self__, "username", username)
|
263
232
|
|
@@ -366,20 +335,6 @@ class _SecretBackendStaticRoleState:
|
|
366
335
|
def rotation_window(self, value: Optional[pulumi.Input[int]]):
|
367
336
|
pulumi.set(self, "rotation_window", value)
|
368
337
|
|
369
|
-
@property
|
370
|
-
@pulumi.getter(name="selfManagedPassword")
|
371
|
-
def self_managed_password(self) -> Optional[pulumi.Input[str]]:
|
372
|
-
"""
|
373
|
-
The password corresponding to the username in the database.
|
374
|
-
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
375
|
-
select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
|
376
|
-
"""
|
377
|
-
return pulumi.get(self, "self_managed_password")
|
378
|
-
|
379
|
-
@self_managed_password.setter
|
380
|
-
def self_managed_password(self, value: Optional[pulumi.Input[str]]):
|
381
|
-
pulumi.set(self, "self_managed_password", value)
|
382
|
-
|
383
338
|
@property
|
384
339
|
@pulumi.getter
|
385
340
|
def username(self) -> Optional[pulumi.Input[str]]:
|
@@ -406,7 +361,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
406
361
|
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
407
362
|
rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
408
363
|
rotation_window: Optional[pulumi.Input[int]] = None,
|
409
|
-
self_managed_password: Optional[pulumi.Input[str]] = None,
|
410
364
|
username: Optional[pulumi.Input[str]] = None,
|
411
365
|
__props__=None):
|
412
366
|
"""
|
@@ -476,9 +430,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
476
430
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
|
477
431
|
:param pulumi.Input[int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
|
478
432
|
from a given `rotation_schedule`.
|
479
|
-
:param pulumi.Input[str] self_managed_password: The password corresponding to the username in the database.
|
480
|
-
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
481
|
-
select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
|
482
433
|
:param pulumi.Input[str] username: The database username that this static role corresponds to.
|
483
434
|
"""
|
484
435
|
...
|
@@ -558,7 +509,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
558
509
|
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
559
510
|
rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
560
511
|
rotation_window: Optional[pulumi.Input[int]] = None,
|
561
|
-
self_managed_password: Optional[pulumi.Input[str]] = None,
|
562
512
|
username: Optional[pulumi.Input[str]] = None,
|
563
513
|
__props__=None):
|
564
514
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
@@ -581,12 +531,9 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
581
531
|
__props__.__dict__["rotation_schedule"] = rotation_schedule
|
582
532
|
__props__.__dict__["rotation_statements"] = rotation_statements
|
583
533
|
__props__.__dict__["rotation_window"] = rotation_window
|
584
|
-
__props__.__dict__["self_managed_password"] = None if self_managed_password is None else pulumi.Output.secret(self_managed_password)
|
585
534
|
if username is None and not opts.urn:
|
586
535
|
raise TypeError("Missing required property 'username'")
|
587
536
|
__props__.__dict__["username"] = username
|
588
|
-
secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["selfManagedPassword"])
|
589
|
-
opts = pulumi.ResourceOptions.merge(opts, secret_opts)
|
590
537
|
super(SecretBackendStaticRole, __self__).__init__(
|
591
538
|
'vault:database/secretBackendStaticRole:SecretBackendStaticRole',
|
592
539
|
resource_name,
|
@@ -605,7 +552,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
605
552
|
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
606
553
|
rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
607
554
|
rotation_window: Optional[pulumi.Input[int]] = None,
|
608
|
-
self_managed_password: Optional[pulumi.Input[str]] = None,
|
609
555
|
username: Optional[pulumi.Input[str]] = None) -> 'SecretBackendStaticRole':
|
610
556
|
"""
|
611
557
|
Get an existing SecretBackendStaticRole resource's state with the given name, id, and optional extra
|
@@ -631,9 +577,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
631
577
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
|
632
578
|
:param pulumi.Input[int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
|
633
579
|
from a given `rotation_schedule`.
|
634
|
-
:param pulumi.Input[str] self_managed_password: The password corresponding to the username in the database.
|
635
|
-
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
636
|
-
select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
|
637
580
|
:param pulumi.Input[str] username: The database username that this static role corresponds to.
|
638
581
|
"""
|
639
582
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -648,7 +591,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
648
591
|
__props__.__dict__["rotation_schedule"] = rotation_schedule
|
649
592
|
__props__.__dict__["rotation_statements"] = rotation_statements
|
650
593
|
__props__.__dict__["rotation_window"] = rotation_window
|
651
|
-
__props__.__dict__["self_managed_password"] = self_managed_password
|
652
594
|
__props__.__dict__["username"] = username
|
653
595
|
return SecretBackendStaticRole(resource_name, opts=opts, __props__=__props__)
|
654
596
|
|
@@ -725,16 +667,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
725
667
|
"""
|
726
668
|
return pulumi.get(self, "rotation_window")
|
727
669
|
|
728
|
-
@property
|
729
|
-
@pulumi.getter(name="selfManagedPassword")
|
730
|
-
def self_managed_password(self) -> pulumi.Output[Optional[str]]:
|
731
|
-
"""
|
732
|
-
The password corresponding to the username in the database.
|
733
|
-
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
734
|
-
select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
|
735
|
-
"""
|
736
|
-
return pulumi.get(self, "self_managed_password")
|
737
|
-
|
738
670
|
@property
|
739
671
|
@pulumi.getter
|
740
672
|
def username(self) -> pulumi.Output[str]:
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
from . import outputs
|
17
12
|
from ._inputs import *
|
@@ -47,7 +42,7 @@ class SecretsMountArgs:
|
|
47
42
|
mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]] = None,
|
48
43
|
mysqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]] = None,
|
49
44
|
namespace: Optional[pulumi.Input[str]] = None,
|
50
|
-
options: Optional[pulumi.Input[Mapping[str,
|
45
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
51
46
|
oracles: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]] = None,
|
52
47
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
53
48
|
plugin_version: Optional[pulumi.Input[str]] = None,
|
@@ -99,7 +94,7 @@ class SecretsMountArgs:
|
|
99
94
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]] mysqls: A nested block containing configuration options for MySQL connections.
|
100
95
|
*See Configuration Options for more info*
|
101
96
|
:param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
|
102
|
-
:param pulumi.Input[Mapping[str,
|
97
|
+
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
103
98
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]] oracles: A nested block containing configuration options for Oracle connections.
|
104
99
|
*See Configuration Options for more info*
|
105
100
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
@@ -516,14 +511,14 @@ class SecretsMountArgs:
|
|
516
511
|
|
517
512
|
@property
|
518
513
|
@pulumi.getter
|
519
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str,
|
514
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
520
515
|
"""
|
521
516
|
Specifies mount type specific options that are passed to the backend
|
522
517
|
"""
|
523
518
|
return pulumi.get(self, "options")
|
524
519
|
|
525
520
|
@options.setter
|
526
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str,
|
521
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
527
522
|
pulumi.set(self, "options", value)
|
528
523
|
|
529
524
|
@property
|
@@ -671,7 +666,7 @@ class _SecretsMountState:
|
|
671
666
|
mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]] = None,
|
672
667
|
mysqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]] = None,
|
673
668
|
namespace: Optional[pulumi.Input[str]] = None,
|
674
|
-
options: Optional[pulumi.Input[Mapping[str,
|
669
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
675
670
|
oracles: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]] = None,
|
676
671
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
677
672
|
path: Optional[pulumi.Input[str]] = None,
|
@@ -725,7 +720,7 @@ class _SecretsMountState:
|
|
725
720
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]] mysqls: A nested block containing configuration options for MySQL connections.
|
726
721
|
*See Configuration Options for more info*
|
727
722
|
:param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
|
728
|
-
:param pulumi.Input[Mapping[str,
|
723
|
+
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
729
724
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]] oracles: A nested block containing configuration options for Oracle connections.
|
730
725
|
*See Configuration Options for more info*
|
731
726
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
@@ -1160,14 +1155,14 @@ class _SecretsMountState:
|
|
1160
1155
|
|
1161
1156
|
@property
|
1162
1157
|
@pulumi.getter
|
1163
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str,
|
1158
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
1164
1159
|
"""
|
1165
1160
|
Specifies mount type specific options that are passed to the backend
|
1166
1161
|
"""
|
1167
1162
|
return pulumi.get(self, "options")
|
1168
1163
|
|
1169
1164
|
@options.setter
|
1170
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str,
|
1165
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
1171
1166
|
pulumi.set(self, "options", value)
|
1172
1167
|
|
1173
1168
|
@property
|
@@ -1327,7 +1322,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1327
1322
|
mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]]] = None,
|
1328
1323
|
mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]]] = None,
|
1329
1324
|
namespace: Optional[pulumi.Input[str]] = None,
|
1330
|
-
options: Optional[pulumi.Input[Mapping[str,
|
1325
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1331
1326
|
oracles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]]] = None,
|
1332
1327
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1333
1328
|
path: Optional[pulumi.Input[str]] = None,
|
@@ -1431,7 +1426,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1431
1426
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]] mysqls: A nested block containing configuration options for MySQL connections.
|
1432
1427
|
*See Configuration Options for more info*
|
1433
1428
|
:param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
|
1434
|
-
:param pulumi.Input[Mapping[str,
|
1429
|
+
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
1435
1430
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]] oracles: A nested block containing configuration options for Oracle connections.
|
1436
1431
|
*See Configuration Options for more info*
|
1437
1432
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
@@ -1546,7 +1541,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1546
1541
|
mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]]] = None,
|
1547
1542
|
mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]]] = None,
|
1548
1543
|
namespace: Optional[pulumi.Input[str]] = None,
|
1549
|
-
options: Optional[pulumi.Input[Mapping[str,
|
1544
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1550
1545
|
oracles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]]] = None,
|
1551
1546
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1552
1547
|
path: Optional[pulumi.Input[str]] = None,
|
@@ -1643,7 +1638,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1643
1638
|
mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]]] = None,
|
1644
1639
|
mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]]] = None,
|
1645
1640
|
namespace: Optional[pulumi.Input[str]] = None,
|
1646
|
-
options: Optional[pulumi.Input[Mapping[str,
|
1641
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1647
1642
|
oracles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]]] = None,
|
1648
1643
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1649
1644
|
path: Optional[pulumi.Input[str]] = None,
|
@@ -1702,7 +1697,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1702
1697
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]] mysqls: A nested block containing configuration options for MySQL connections.
|
1703
1698
|
*See Configuration Options for more info*
|
1704
1699
|
:param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
|
1705
|
-
:param pulumi.Input[Mapping[str,
|
1700
|
+
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
1706
1701
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]] oracles: A nested block containing configuration options for Oracle connections.
|
1707
1702
|
*See Configuration Options for more info*
|
1708
1703
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
@@ -1996,7 +1991,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1996
1991
|
|
1997
1992
|
@property
|
1998
1993
|
@pulumi.getter
|
1999
|
-
def options(self) -> pulumi.Output[Optional[Mapping[str,
|
1994
|
+
def options(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
|
2000
1995
|
"""
|
2001
1996
|
Specifies mount type specific options that are passed to the backend
|
2002
1997
|
"""
|
pulumi_vault/egp_policy.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = ['EgpPolicyArgs', 'EgpPolicy']
|