pulumi-vault 6.4.0__py3-none-any.whl → 6.4.0a1723820369__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -560
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +4 -19
- pulumi_vault/ad/secret_backend.py +0 -5
- pulumi_vault/ad/secret_library.py +0 -5
- pulumi_vault/ad/secret_role.py +0 -5
- pulumi_vault/alicloud/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_login.py +0 -5
- pulumi_vault/approle/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -99
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
- pulumi_vault/audit.py +0 -5
- pulumi_vault/audit_request_header.py +0 -5
- pulumi_vault/auth_backend.py +0 -5
- pulumi_vault/aws/auth_backend_cert.py +0 -5
- pulumi_vault/aws/auth_backend_client.py +0 -5
- pulumi_vault/aws/auth_backend_config_identity.py +0 -5
- pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
- pulumi_vault/aws/auth_backend_login.py +0 -5
- pulumi_vault/aws/auth_backend_role.py +0 -5
- pulumi_vault/aws/auth_backend_role_tag.py +0 -5
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
- pulumi_vault/aws/auth_backend_sts_role.py +0 -5
- pulumi_vault/aws/get_access_credentials.py +4 -31
- pulumi_vault/aws/get_static_access_credentials.py +4 -18
- pulumi_vault/aws/secret_backend.py +0 -5
- pulumi_vault/aws/secret_backend_role.py +0 -5
- pulumi_vault/aws/secret_backend_static_role.py +0 -5
- pulumi_vault/azure/_inputs.py +0 -24
- pulumi_vault/azure/auth_backend_config.py +0 -5
- pulumi_vault/azure/auth_backend_role.py +0 -5
- pulumi_vault/azure/backend.py +0 -5
- pulumi_vault/azure/backend_role.py +0 -5
- pulumi_vault/azure/get_access_credentials.py +4 -36
- pulumi_vault/azure/outputs.py +0 -5
- pulumi_vault/cert_auth_backend_role.py +0 -5
- pulumi_vault/config/__init__.pyi +0 -5
- pulumi_vault/config/_inputs.py +0 -21
- pulumi_vault/config/outputs.py +0 -5
- pulumi_vault/config/ui_custom_message.py +0 -5
- pulumi_vault/config/vars.py +0 -5
- pulumi_vault/consul/secret_backend.py +0 -5
- pulumi_vault/consul/secret_backend_role.py +0 -5
- pulumi_vault/database/_inputs.py +34 -2185
- pulumi_vault/database/outputs.py +0 -145
- pulumi_vault/database/secret_backend_connection.py +0 -5
- pulumi_vault/database/secret_backend_role.py +0 -5
- pulumi_vault/database/secret_backend_static_role.py +1 -69
- pulumi_vault/database/secrets_mount.py +0 -5
- pulumi_vault/egp_policy.py +0 -5
- pulumi_vault/gcp/_inputs.py +0 -111
- pulumi_vault/gcp/auth_backend.py +0 -5
- pulumi_vault/gcp/auth_backend_role.py +0 -5
- pulumi_vault/gcp/get_auth_backend_role.py +4 -42
- pulumi_vault/gcp/outputs.py +0 -5
- pulumi_vault/gcp/secret_backend.py +0 -5
- pulumi_vault/gcp/secret_impersonated_account.py +3 -62
- pulumi_vault/gcp/secret_roleset.py +0 -5
- pulumi_vault/gcp/secret_static_account.py +0 -5
- pulumi_vault/generic/endpoint.py +0 -5
- pulumi_vault/generic/get_secret.py +4 -24
- pulumi_vault/generic/secret.py +0 -5
- pulumi_vault/get_auth_backend.py +4 -21
- pulumi_vault/get_auth_backends.py +4 -16
- pulumi_vault/get_namespace.py +4 -17
- pulumi_vault/get_namespaces.py +4 -13
- pulumi_vault/get_nomad_access_token.py +4 -18
- pulumi_vault/get_policy_document.py +4 -15
- pulumi_vault/get_raft_autopilot_state.py +4 -23
- pulumi_vault/github/_inputs.py +0 -55
- pulumi_vault/github/auth_backend.py +0 -5
- pulumi_vault/github/outputs.py +0 -5
- pulumi_vault/github/team.py +0 -5
- pulumi_vault/github/user.py +0 -5
- pulumi_vault/identity/entity.py +0 -5
- pulumi_vault/identity/entity_alias.py +0 -5
- pulumi_vault/identity/entity_policies.py +0 -5
- pulumi_vault/identity/get_entity.py +4 -34
- pulumi_vault/identity/get_group.py +4 -40
- pulumi_vault/identity/get_oidc_client_creds.py +4 -16
- pulumi_vault/identity/get_oidc_openid_config.py +4 -26
- pulumi_vault/identity/get_oidc_public_keys.py +4 -15
- pulumi_vault/identity/group.py +0 -5
- pulumi_vault/identity/group_alias.py +0 -5
- pulumi_vault/identity/group_member_entity_ids.py +0 -5
- pulumi_vault/identity/group_member_group_ids.py +0 -5
- pulumi_vault/identity/group_policies.py +0 -5
- pulumi_vault/identity/mfa_duo.py +0 -5
- pulumi_vault/identity/mfa_login_enforcement.py +0 -5
- pulumi_vault/identity/mfa_okta.py +0 -5
- pulumi_vault/identity/mfa_pingid.py +0 -5
- pulumi_vault/identity/mfa_totp.py +0 -5
- pulumi_vault/identity/oidc.py +0 -5
- pulumi_vault/identity/oidc_assignment.py +0 -5
- pulumi_vault/identity/oidc_client.py +0 -5
- pulumi_vault/identity/oidc_key.py +0 -5
- pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
- pulumi_vault/identity/oidc_provider.py +0 -5
- pulumi_vault/identity/oidc_role.py +0 -5
- pulumi_vault/identity/oidc_scope.py +0 -5
- pulumi_vault/identity/outputs.py +0 -5
- pulumi_vault/jwt/_inputs.py +0 -55
- pulumi_vault/jwt/auth_backend.py +0 -5
- pulumi_vault/jwt/auth_backend_role.py +0 -5
- pulumi_vault/jwt/outputs.py +0 -5
- pulumi_vault/kmip/secret_backend.py +0 -5
- pulumi_vault/kmip/secret_role.py +0 -5
- pulumi_vault/kmip/secret_scope.py +0 -5
- pulumi_vault/kubernetes/auth_backend_config.py +3 -55
- pulumi_vault/kubernetes/auth_backend_role.py +0 -5
- pulumi_vault/kubernetes/get_auth_backend_config.py +7 -59
- pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
- pulumi_vault/kubernetes/get_service_account_token.py +4 -28
- pulumi_vault/kubernetes/secret_backend.py +0 -5
- pulumi_vault/kubernetes/secret_backend_role.py +0 -5
- pulumi_vault/kv/_inputs.py +0 -32
- pulumi_vault/kv/get_secret.py +4 -19
- pulumi_vault/kv/get_secret_subkeys_v2.py +4 -23
- pulumi_vault/kv/get_secret_v2.py +6 -25
- pulumi_vault/kv/get_secrets_list.py +4 -15
- pulumi_vault/kv/get_secrets_list_v2.py +4 -18
- pulumi_vault/kv/outputs.py +0 -5
- pulumi_vault/kv/secret.py +0 -5
- pulumi_vault/kv/secret_backend_v2.py +0 -5
- pulumi_vault/kv/secret_v2.py +0 -5
- pulumi_vault/ldap/auth_backend.py +0 -52
- pulumi_vault/ldap/auth_backend_group.py +0 -5
- pulumi_vault/ldap/auth_backend_user.py +0 -5
- pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
- pulumi_vault/ldap/get_static_credentials.py +4 -23
- pulumi_vault/ldap/secret_backend.py +0 -5
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
- pulumi_vault/ldap/secret_backend_library_set.py +0 -5
- pulumi_vault/ldap/secret_backend_static_role.py +0 -5
- pulumi_vault/managed/_inputs.py +0 -205
- pulumi_vault/managed/keys.py +0 -5
- pulumi_vault/managed/outputs.py +0 -5
- pulumi_vault/mfa_duo.py +0 -5
- pulumi_vault/mfa_okta.py +0 -5
- pulumi_vault/mfa_pingid.py +0 -5
- pulumi_vault/mfa_totp.py +0 -5
- pulumi_vault/mongodbatlas/secret_backend.py +0 -5
- pulumi_vault/mongodbatlas/secret_role.py +0 -5
- pulumi_vault/mount.py +0 -5
- pulumi_vault/namespace.py +0 -5
- pulumi_vault/nomad_secret_backend.py +0 -5
- pulumi_vault/nomad_secret_role.py +0 -5
- pulumi_vault/okta/_inputs.py +0 -39
- pulumi_vault/okta/auth_backend.py +0 -5
- pulumi_vault/okta/auth_backend_group.py +0 -5
- pulumi_vault/okta/auth_backend_user.py +0 -5
- pulumi_vault/okta/outputs.py +0 -5
- pulumi_vault/outputs.py +0 -5
- pulumi_vault/password_policy.py +0 -5
- pulumi_vault/pkisecret/_inputs.py +0 -41
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
- pulumi_vault/pkisecret/backend_config_est.py +0 -5
- pulumi_vault/pkisecret/get_backend_config_est.py +4 -22
- pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -17
- pulumi_vault/pkisecret/get_backend_key.py +4 -19
- pulumi_vault/pkisecret/get_backend_keys.py +4 -17
- pulumi_vault/pkisecret/outputs.py +0 -5
- pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
- pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
- pulumi_vault/pkisecret/secret_backend_key.py +0 -5
- pulumi_vault/pkisecret/secret_backend_role.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
- pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
- pulumi_vault/plugin.py +0 -5
- pulumi_vault/plugin_pinned_version.py +0 -5
- pulumi_vault/policy.py +0 -5
- pulumi_vault/provider.py +0 -5
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +0 -5
- pulumi_vault/quota_rate_limit.py +0 -5
- pulumi_vault/rabbitmq/_inputs.py +0 -61
- pulumi_vault/rabbitmq/outputs.py +0 -5
- pulumi_vault/rabbitmq/secret_backend.py +0 -5
- pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
- pulumi_vault/raft_autopilot.py +0 -5
- pulumi_vault/raft_snapshot_agent_config.py +0 -5
- pulumi_vault/rgp_policy.py +0 -5
- pulumi_vault/saml/auth_backend.py +0 -5
- pulumi_vault/saml/auth_backend_role.py +0 -5
- pulumi_vault/secrets/_inputs.py +0 -30
- pulumi_vault/secrets/outputs.py +0 -5
- pulumi_vault/secrets/sync_association.py +0 -5
- pulumi_vault/secrets/sync_aws_destination.py +0 -5
- pulumi_vault/secrets/sync_azure_destination.py +0 -5
- pulumi_vault/secrets/sync_config.py +0 -5
- pulumi_vault/secrets/sync_gcp_destination.py +0 -5
- pulumi_vault/secrets/sync_gh_destination.py +0 -5
- pulumi_vault/secrets/sync_github_apps.py +0 -5
- pulumi_vault/secrets/sync_vercel_destination.py +0 -5
- pulumi_vault/ssh/_inputs.py +0 -22
- pulumi_vault/ssh/outputs.py +0 -5
- pulumi_vault/ssh/secret_backend_ca.py +0 -5
- pulumi_vault/ssh/secret_backend_role.py +0 -39
- pulumi_vault/terraformcloud/secret_backend.py +0 -5
- pulumi_vault/terraformcloud/secret_creds.py +0 -5
- pulumi_vault/terraformcloud/secret_role.py +0 -5
- pulumi_vault/token.py +0 -5
- pulumi_vault/tokenauth/auth_backend_role.py +14 -5
- pulumi_vault/transform/alphabet.py +0 -5
- pulumi_vault/transform/get_decode.py +4 -28
- pulumi_vault/transform/get_encode.py +4 -28
- pulumi_vault/transform/role.py +0 -5
- pulumi_vault/transform/template.py +0 -5
- pulumi_vault/transform/transformation.py +0 -5
- pulumi_vault/transit/get_decrypt.py +4 -21
- pulumi_vault/transit/get_encrypt.py +4 -23
- pulumi_vault/transit/secret_backend_key.py +0 -5
- pulumi_vault/transit/secret_cache_config.py +0 -5
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/METADATA +2 -3
- pulumi_vault-6.4.0a1723820369.dist-info/RECORD +256 -0
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/WHEEL +1 -1
- pulumi_vault-6.4.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/top_level.txt +0 -0
pulumi_vault/database/outputs.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -68,8 +63,6 @@ class SecretBackendConnectionCassandra(dict):
|
|
68
63
|
suggest = "pem_json"
|
69
64
|
elif key == "protocolVersion":
|
70
65
|
suggest = "protocol_version"
|
71
|
-
elif key == "skipVerification":
|
72
|
-
suggest = "skip_verification"
|
73
66
|
|
74
67
|
if suggest:
|
75
68
|
pulumi.log.warn(f"Key '{key}' not found in SecretBackendConnectionCassandra. Access the value via the '{suggest}' property getter instead.")
|
@@ -91,7 +84,6 @@ class SecretBackendConnectionCassandra(dict):
|
|
91
84
|
pem_json: Optional[str] = None,
|
92
85
|
port: Optional[int] = None,
|
93
86
|
protocol_version: Optional[int] = None,
|
94
|
-
skip_verification: Optional[bool] = None,
|
95
87
|
tls: Optional[bool] = None,
|
96
88
|
username: Optional[str] = None):
|
97
89
|
"""
|
@@ -103,7 +95,6 @@ class SecretBackendConnectionCassandra(dict):
|
|
103
95
|
:param str pem_json: Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
104
96
|
:param int port: The transport port to use to connect to Cassandra.
|
105
97
|
:param int protocol_version: The CQL protocol version to use.
|
106
|
-
:param bool skip_verification: Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
|
107
98
|
:param bool tls: Whether to use TLS when connecting to Cassandra.
|
108
99
|
:param str username: The username to use when authenticating with Cassandra.
|
109
100
|
"""
|
@@ -123,8 +114,6 @@ class SecretBackendConnectionCassandra(dict):
|
|
123
114
|
pulumi.set(__self__, "port", port)
|
124
115
|
if protocol_version is not None:
|
125
116
|
pulumi.set(__self__, "protocol_version", protocol_version)
|
126
|
-
if skip_verification is not None:
|
127
|
-
pulumi.set(__self__, "skip_verification", skip_verification)
|
128
117
|
if tls is not None:
|
129
118
|
pulumi.set(__self__, "tls", tls)
|
130
119
|
if username is not None:
|
@@ -194,14 +183,6 @@ class SecretBackendConnectionCassandra(dict):
|
|
194
183
|
"""
|
195
184
|
return pulumi.get(self, "protocol_version")
|
196
185
|
|
197
|
-
@property
|
198
|
-
@pulumi.getter(name="skipVerification")
|
199
|
-
def skip_verification(self) -> Optional[bool]:
|
200
|
-
"""
|
201
|
-
Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
|
202
|
-
"""
|
203
|
-
return pulumi.get(self, "skip_verification")
|
204
|
-
|
205
186
|
@property
|
206
187
|
@pulumi.getter
|
207
188
|
def tls(self) -> Optional[bool]:
|
@@ -1928,16 +1909,8 @@ class SecretBackendConnectionPostgresql(dict):
|
|
1928
1909
|
suggest = "max_idle_connections"
|
1929
1910
|
elif key == "maxOpenConnections":
|
1930
1911
|
suggest = "max_open_connections"
|
1931
|
-
elif key == "privateKey":
|
1932
|
-
suggest = "private_key"
|
1933
|
-
elif key == "selfManaged":
|
1934
|
-
suggest = "self_managed"
|
1935
1912
|
elif key == "serviceAccountJson":
|
1936
1913
|
suggest = "service_account_json"
|
1937
|
-
elif key == "tlsCa":
|
1938
|
-
suggest = "tls_ca"
|
1939
|
-
elif key == "tlsCertificate":
|
1940
|
-
suggest = "tls_certificate"
|
1941
1914
|
elif key == "usernameTemplate":
|
1942
1915
|
suggest = "username_template"
|
1943
1916
|
|
@@ -1960,11 +1933,7 @@ class SecretBackendConnectionPostgresql(dict):
|
|
1960
1933
|
max_idle_connections: Optional[int] = None,
|
1961
1934
|
max_open_connections: Optional[int] = None,
|
1962
1935
|
password: Optional[str] = None,
|
1963
|
-
private_key: Optional[str] = None,
|
1964
|
-
self_managed: Optional[bool] = None,
|
1965
1936
|
service_account_json: Optional[str] = None,
|
1966
|
-
tls_ca: Optional[str] = None,
|
1967
|
-
tls_certificate: Optional[str] = None,
|
1968
1937
|
username: Optional[str] = None,
|
1969
1938
|
username_template: Optional[str] = None):
|
1970
1939
|
"""
|
@@ -1975,11 +1944,7 @@ class SecretBackendConnectionPostgresql(dict):
|
|
1975
1944
|
:param int max_idle_connections: Maximum number of idle connections to the database.
|
1976
1945
|
:param int max_open_connections: Maximum number of open connections to the database.
|
1977
1946
|
:param str password: The root credential password used in the connection URL
|
1978
|
-
:param str private_key: The secret key used for the x509 client certificate. Must be PEM encoded.
|
1979
|
-
:param bool self_managed: If set, allows onboarding static roles with a rootless connection configuration.
|
1980
1947
|
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
1981
|
-
:param str tls_ca: The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
|
1982
|
-
:param str tls_certificate: The x509 client certificate for connecting to the database. Must be PEM encoded.
|
1983
1948
|
:param str username: The root credential username used in the connection URL
|
1984
1949
|
:param str username_template: Username generation template.
|
1985
1950
|
"""
|
@@ -1997,16 +1962,8 @@ class SecretBackendConnectionPostgresql(dict):
|
|
1997
1962
|
pulumi.set(__self__, "max_open_connections", max_open_connections)
|
1998
1963
|
if password is not None:
|
1999
1964
|
pulumi.set(__self__, "password", password)
|
2000
|
-
if private_key is not None:
|
2001
|
-
pulumi.set(__self__, "private_key", private_key)
|
2002
|
-
if self_managed is not None:
|
2003
|
-
pulumi.set(__self__, "self_managed", self_managed)
|
2004
1965
|
if service_account_json is not None:
|
2005
1966
|
pulumi.set(__self__, "service_account_json", service_account_json)
|
2006
|
-
if tls_ca is not None:
|
2007
|
-
pulumi.set(__self__, "tls_ca", tls_ca)
|
2008
|
-
if tls_certificate is not None:
|
2009
|
-
pulumi.set(__self__, "tls_certificate", tls_certificate)
|
2010
1967
|
if username is not None:
|
2011
1968
|
pulumi.set(__self__, "username", username)
|
2012
1969
|
if username_template is not None:
|
@@ -2068,22 +2025,6 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2068
2025
|
"""
|
2069
2026
|
return pulumi.get(self, "password")
|
2070
2027
|
|
2071
|
-
@property
|
2072
|
-
@pulumi.getter(name="privateKey")
|
2073
|
-
def private_key(self) -> Optional[str]:
|
2074
|
-
"""
|
2075
|
-
The secret key used for the x509 client certificate. Must be PEM encoded.
|
2076
|
-
"""
|
2077
|
-
return pulumi.get(self, "private_key")
|
2078
|
-
|
2079
|
-
@property
|
2080
|
-
@pulumi.getter(name="selfManaged")
|
2081
|
-
def self_managed(self) -> Optional[bool]:
|
2082
|
-
"""
|
2083
|
-
If set, allows onboarding static roles with a rootless connection configuration.
|
2084
|
-
"""
|
2085
|
-
return pulumi.get(self, "self_managed")
|
2086
|
-
|
2087
2028
|
@property
|
2088
2029
|
@pulumi.getter(name="serviceAccountJson")
|
2089
2030
|
def service_account_json(self) -> Optional[str]:
|
@@ -2092,22 +2033,6 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2092
2033
|
"""
|
2093
2034
|
return pulumi.get(self, "service_account_json")
|
2094
2035
|
|
2095
|
-
@property
|
2096
|
-
@pulumi.getter(name="tlsCa")
|
2097
|
-
def tls_ca(self) -> Optional[str]:
|
2098
|
-
"""
|
2099
|
-
The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
|
2100
|
-
"""
|
2101
|
-
return pulumi.get(self, "tls_ca")
|
2102
|
-
|
2103
|
-
@property
|
2104
|
-
@pulumi.getter(name="tlsCertificate")
|
2105
|
-
def tls_certificate(self) -> Optional[str]:
|
2106
|
-
"""
|
2107
|
-
The x509 client certificate for connecting to the database. Must be PEM encoded.
|
2108
|
-
"""
|
2109
|
-
return pulumi.get(self, "tls_certificate")
|
2110
|
-
|
2111
2036
|
@property
|
2112
2037
|
@pulumi.getter
|
2113
2038
|
def username(self) -> Optional[str]:
|
@@ -2553,8 +2478,6 @@ class SecretsMountCassandra(dict):
|
|
2553
2478
|
suggest = "protocol_version"
|
2554
2479
|
elif key == "rootRotationStatements":
|
2555
2480
|
suggest = "root_rotation_statements"
|
2556
|
-
elif key == "skipVerification":
|
2557
|
-
suggest = "skip_verification"
|
2558
2481
|
elif key == "verifyConnection":
|
2559
2482
|
suggest = "verify_connection"
|
2560
2483
|
|
@@ -2583,7 +2506,6 @@ class SecretsMountCassandra(dict):
|
|
2583
2506
|
port: Optional[int] = None,
|
2584
2507
|
protocol_version: Optional[int] = None,
|
2585
2508
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
2586
|
-
skip_verification: Optional[bool] = None,
|
2587
2509
|
tls: Optional[bool] = None,
|
2588
2510
|
username: Optional[str] = None,
|
2589
2511
|
verify_connection: Optional[bool] = None):
|
@@ -2604,7 +2526,6 @@ class SecretsMountCassandra(dict):
|
|
2604
2526
|
:param int port: The transport port to use to connect to Cassandra.
|
2605
2527
|
:param int protocol_version: The CQL protocol version to use.
|
2606
2528
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
2607
|
-
:param bool skip_verification: Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
|
2608
2529
|
:param bool tls: Whether to use TLS when connecting to Cassandra.
|
2609
2530
|
:param str username: The username to use when authenticating with Cassandra.
|
2610
2531
|
:param bool verify_connection: Whether the connection should be verified on
|
@@ -2635,8 +2556,6 @@ class SecretsMountCassandra(dict):
|
|
2635
2556
|
pulumi.set(__self__, "protocol_version", protocol_version)
|
2636
2557
|
if root_rotation_statements is not None:
|
2637
2558
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
2638
|
-
if skip_verification is not None:
|
2639
|
-
pulumi.set(__self__, "skip_verification", skip_verification)
|
2640
2559
|
if tls is not None:
|
2641
2560
|
pulumi.set(__self__, "tls", tls)
|
2642
2561
|
if username is not None:
|
@@ -2751,14 +2670,6 @@ class SecretsMountCassandra(dict):
|
|
2751
2670
|
"""
|
2752
2671
|
return pulumi.get(self, "root_rotation_statements")
|
2753
2672
|
|
2754
|
-
@property
|
2755
|
-
@pulumi.getter(name="skipVerification")
|
2756
|
-
def skip_verification(self) -> Optional[bool]:
|
2757
|
-
"""
|
2758
|
-
Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
|
2759
|
-
"""
|
2760
|
-
return pulumi.get(self, "skip_verification")
|
2761
|
-
|
2762
2673
|
@property
|
2763
2674
|
@pulumi.getter
|
2764
2675
|
def tls(self) -> Optional[bool]:
|
@@ -5542,18 +5453,10 @@ class SecretsMountPostgresql(dict):
|
|
5542
5453
|
suggest = "max_open_connections"
|
5543
5454
|
elif key == "pluginName":
|
5544
5455
|
suggest = "plugin_name"
|
5545
|
-
elif key == "privateKey":
|
5546
|
-
suggest = "private_key"
|
5547
5456
|
elif key == "rootRotationStatements":
|
5548
5457
|
suggest = "root_rotation_statements"
|
5549
|
-
elif key == "selfManaged":
|
5550
|
-
suggest = "self_managed"
|
5551
5458
|
elif key == "serviceAccountJson":
|
5552
5459
|
suggest = "service_account_json"
|
5553
|
-
elif key == "tlsCa":
|
5554
|
-
suggest = "tls_ca"
|
5555
|
-
elif key == "tlsCertificate":
|
5556
|
-
suggest = "tls_certificate"
|
5557
5460
|
elif key == "usernameTemplate":
|
5558
5461
|
suggest = "username_template"
|
5559
5462
|
elif key == "verifyConnection":
|
@@ -5582,12 +5485,8 @@ class SecretsMountPostgresql(dict):
|
|
5582
5485
|
max_open_connections: Optional[int] = None,
|
5583
5486
|
password: Optional[str] = None,
|
5584
5487
|
plugin_name: Optional[str] = None,
|
5585
|
-
private_key: Optional[str] = None,
|
5586
5488
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
5587
|
-
self_managed: Optional[bool] = None,
|
5588
5489
|
service_account_json: Optional[str] = None,
|
5589
|
-
tls_ca: Optional[str] = None,
|
5590
|
-
tls_certificate: Optional[str] = None,
|
5591
5490
|
username: Optional[str] = None,
|
5592
5491
|
username_template: Optional[str] = None,
|
5593
5492
|
verify_connection: Optional[bool] = None):
|
@@ -5606,12 +5505,8 @@ class SecretsMountPostgresql(dict):
|
|
5606
5505
|
:param int max_open_connections: Maximum number of open connections to the database.
|
5607
5506
|
:param str password: The root credential password used in the connection URL
|
5608
5507
|
:param str plugin_name: Specifies the name of the plugin to use.
|
5609
|
-
:param str private_key: The secret key used for the x509 client certificate. Must be PEM encoded.
|
5610
5508
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
5611
|
-
:param bool self_managed: If set, allows onboarding static roles with a rootless connection configuration.
|
5612
5509
|
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
5613
|
-
:param str tls_ca: The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
|
5614
|
-
:param str tls_certificate: The x509 client certificate for connecting to the database. Must be PEM encoded.
|
5615
5510
|
:param str username: The root credential username used in the connection URL
|
5616
5511
|
:param str username_template: Username generation template.
|
5617
5512
|
:param bool verify_connection: Whether the connection should be verified on
|
@@ -5638,18 +5533,10 @@ class SecretsMountPostgresql(dict):
|
|
5638
5533
|
pulumi.set(__self__, "password", password)
|
5639
5534
|
if plugin_name is not None:
|
5640
5535
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
5641
|
-
if private_key is not None:
|
5642
|
-
pulumi.set(__self__, "private_key", private_key)
|
5643
5536
|
if root_rotation_statements is not None:
|
5644
5537
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
5645
|
-
if self_managed is not None:
|
5646
|
-
pulumi.set(__self__, "self_managed", self_managed)
|
5647
5538
|
if service_account_json is not None:
|
5648
5539
|
pulumi.set(__self__, "service_account_json", service_account_json)
|
5649
|
-
if tls_ca is not None:
|
5650
|
-
pulumi.set(__self__, "tls_ca", tls_ca)
|
5651
|
-
if tls_certificate is not None:
|
5652
|
-
pulumi.set(__self__, "tls_certificate", tls_certificate)
|
5653
5540
|
if username is not None:
|
5654
5541
|
pulumi.set(__self__, "username", username)
|
5655
5542
|
if username_template is not None:
|
@@ -5748,14 +5635,6 @@ class SecretsMountPostgresql(dict):
|
|
5748
5635
|
"""
|
5749
5636
|
return pulumi.get(self, "plugin_name")
|
5750
5637
|
|
5751
|
-
@property
|
5752
|
-
@pulumi.getter(name="privateKey")
|
5753
|
-
def private_key(self) -> Optional[str]:
|
5754
|
-
"""
|
5755
|
-
The secret key used for the x509 client certificate. Must be PEM encoded.
|
5756
|
-
"""
|
5757
|
-
return pulumi.get(self, "private_key")
|
5758
|
-
|
5759
5638
|
@property
|
5760
5639
|
@pulumi.getter(name="rootRotationStatements")
|
5761
5640
|
def root_rotation_statements(self) -> Optional[Sequence[str]]:
|
@@ -5764,14 +5643,6 @@ class SecretsMountPostgresql(dict):
|
|
5764
5643
|
"""
|
5765
5644
|
return pulumi.get(self, "root_rotation_statements")
|
5766
5645
|
|
5767
|
-
@property
|
5768
|
-
@pulumi.getter(name="selfManaged")
|
5769
|
-
def self_managed(self) -> Optional[bool]:
|
5770
|
-
"""
|
5771
|
-
If set, allows onboarding static roles with a rootless connection configuration.
|
5772
|
-
"""
|
5773
|
-
return pulumi.get(self, "self_managed")
|
5774
|
-
|
5775
5646
|
@property
|
5776
5647
|
@pulumi.getter(name="serviceAccountJson")
|
5777
5648
|
def service_account_json(self) -> Optional[str]:
|
@@ -5780,22 +5651,6 @@ class SecretsMountPostgresql(dict):
|
|
5780
5651
|
"""
|
5781
5652
|
return pulumi.get(self, "service_account_json")
|
5782
5653
|
|
5783
|
-
@property
|
5784
|
-
@pulumi.getter(name="tlsCa")
|
5785
|
-
def tls_ca(self) -> Optional[str]:
|
5786
|
-
"""
|
5787
|
-
The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
|
5788
|
-
"""
|
5789
|
-
return pulumi.get(self, "tls_ca")
|
5790
|
-
|
5791
|
-
@property
|
5792
|
-
@pulumi.getter(name="tlsCertificate")
|
5793
|
-
def tls_certificate(self) -> Optional[str]:
|
5794
|
-
"""
|
5795
|
-
The x509 client certificate for connecting to the database. Must be PEM encoded.
|
5796
|
-
"""
|
5797
|
-
return pulumi.get(self, "tls_certificate")
|
5798
|
-
|
5799
5654
|
@property
|
5800
5655
|
@pulumi.getter
|
5801
5656
|
def username(self) -> Optional[str]:
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
from . import outputs
|
17
12
|
from ._inputs import *
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole']
|
@@ -27,8 +22,7 @@ class SecretBackendStaticRoleArgs:
|
|
27
22
|
rotation_period: Optional[pulumi.Input[int]] = None,
|
28
23
|
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
29
24
|
rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
30
|
-
rotation_window: Optional[pulumi.Input[int]] = None
|
31
|
-
self_managed_password: Optional[pulumi.Input[str]] = None):
|
25
|
+
rotation_window: Optional[pulumi.Input[int]] = None):
|
32
26
|
"""
|
33
27
|
The set of arguments for constructing a SecretBackendStaticRole resource.
|
34
28
|
:param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
|
@@ -49,9 +43,6 @@ class SecretBackendStaticRoleArgs:
|
|
49
43
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
|
50
44
|
:param pulumi.Input[int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
|
51
45
|
from a given `rotation_schedule`.
|
52
|
-
:param pulumi.Input[str] self_managed_password: The password corresponding to the username in the database.
|
53
|
-
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
54
|
-
select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
|
55
46
|
"""
|
56
47
|
pulumi.set(__self__, "backend", backend)
|
57
48
|
pulumi.set(__self__, "db_name", db_name)
|
@@ -68,8 +59,6 @@ class SecretBackendStaticRoleArgs:
|
|
68
59
|
pulumi.set(__self__, "rotation_statements", rotation_statements)
|
69
60
|
if rotation_window is not None:
|
70
61
|
pulumi.set(__self__, "rotation_window", rotation_window)
|
71
|
-
if self_managed_password is not None:
|
72
|
-
pulumi.set(__self__, "self_managed_password", self_managed_password)
|
73
62
|
|
74
63
|
@property
|
75
64
|
@pulumi.getter
|
@@ -188,20 +177,6 @@ class SecretBackendStaticRoleArgs:
|
|
188
177
|
def rotation_window(self, value: Optional[pulumi.Input[int]]):
|
189
178
|
pulumi.set(self, "rotation_window", value)
|
190
179
|
|
191
|
-
@property
|
192
|
-
@pulumi.getter(name="selfManagedPassword")
|
193
|
-
def self_managed_password(self) -> Optional[pulumi.Input[str]]:
|
194
|
-
"""
|
195
|
-
The password corresponding to the username in the database.
|
196
|
-
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
197
|
-
select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
|
198
|
-
"""
|
199
|
-
return pulumi.get(self, "self_managed_password")
|
200
|
-
|
201
|
-
@self_managed_password.setter
|
202
|
-
def self_managed_password(self, value: Optional[pulumi.Input[str]]):
|
203
|
-
pulumi.set(self, "self_managed_password", value)
|
204
|
-
|
205
180
|
|
206
181
|
@pulumi.input_type
|
207
182
|
class _SecretBackendStaticRoleState:
|
@@ -214,7 +189,6 @@ class _SecretBackendStaticRoleState:
|
|
214
189
|
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
215
190
|
rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
216
191
|
rotation_window: Optional[pulumi.Input[int]] = None,
|
217
|
-
self_managed_password: Optional[pulumi.Input[str]] = None,
|
218
192
|
username: Optional[pulumi.Input[str]] = None):
|
219
193
|
"""
|
220
194
|
Input properties used for looking up and filtering SecretBackendStaticRole resources.
|
@@ -235,9 +209,6 @@ class _SecretBackendStaticRoleState:
|
|
235
209
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
|
236
210
|
:param pulumi.Input[int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
|
237
211
|
from a given `rotation_schedule`.
|
238
|
-
:param pulumi.Input[str] self_managed_password: The password corresponding to the username in the database.
|
239
|
-
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
240
|
-
select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
|
241
212
|
:param pulumi.Input[str] username: The database username that this static role corresponds to.
|
242
213
|
"""
|
243
214
|
if backend is not None:
|
@@ -256,8 +227,6 @@ class _SecretBackendStaticRoleState:
|
|
256
227
|
pulumi.set(__self__, "rotation_statements", rotation_statements)
|
257
228
|
if rotation_window is not None:
|
258
229
|
pulumi.set(__self__, "rotation_window", rotation_window)
|
259
|
-
if self_managed_password is not None:
|
260
|
-
pulumi.set(__self__, "self_managed_password", self_managed_password)
|
261
230
|
if username is not None:
|
262
231
|
pulumi.set(__self__, "username", username)
|
263
232
|
|
@@ -366,20 +335,6 @@ class _SecretBackendStaticRoleState:
|
|
366
335
|
def rotation_window(self, value: Optional[pulumi.Input[int]]):
|
367
336
|
pulumi.set(self, "rotation_window", value)
|
368
337
|
|
369
|
-
@property
|
370
|
-
@pulumi.getter(name="selfManagedPassword")
|
371
|
-
def self_managed_password(self) -> Optional[pulumi.Input[str]]:
|
372
|
-
"""
|
373
|
-
The password corresponding to the username in the database.
|
374
|
-
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
375
|
-
select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
|
376
|
-
"""
|
377
|
-
return pulumi.get(self, "self_managed_password")
|
378
|
-
|
379
|
-
@self_managed_password.setter
|
380
|
-
def self_managed_password(self, value: Optional[pulumi.Input[str]]):
|
381
|
-
pulumi.set(self, "self_managed_password", value)
|
382
|
-
|
383
338
|
@property
|
384
339
|
@pulumi.getter
|
385
340
|
def username(self) -> Optional[pulumi.Input[str]]:
|
@@ -406,7 +361,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
406
361
|
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
407
362
|
rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
408
363
|
rotation_window: Optional[pulumi.Input[int]] = None,
|
409
|
-
self_managed_password: Optional[pulumi.Input[str]] = None,
|
410
364
|
username: Optional[pulumi.Input[str]] = None,
|
411
365
|
__props__=None):
|
412
366
|
"""
|
@@ -476,9 +430,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
476
430
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
|
477
431
|
:param pulumi.Input[int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
|
478
432
|
from a given `rotation_schedule`.
|
479
|
-
:param pulumi.Input[str] self_managed_password: The password corresponding to the username in the database.
|
480
|
-
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
481
|
-
select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
|
482
433
|
:param pulumi.Input[str] username: The database username that this static role corresponds to.
|
483
434
|
"""
|
484
435
|
...
|
@@ -558,7 +509,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
558
509
|
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
559
510
|
rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
560
511
|
rotation_window: Optional[pulumi.Input[int]] = None,
|
561
|
-
self_managed_password: Optional[pulumi.Input[str]] = None,
|
562
512
|
username: Optional[pulumi.Input[str]] = None,
|
563
513
|
__props__=None):
|
564
514
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
@@ -581,12 +531,9 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
581
531
|
__props__.__dict__["rotation_schedule"] = rotation_schedule
|
582
532
|
__props__.__dict__["rotation_statements"] = rotation_statements
|
583
533
|
__props__.__dict__["rotation_window"] = rotation_window
|
584
|
-
__props__.__dict__["self_managed_password"] = None if self_managed_password is None else pulumi.Output.secret(self_managed_password)
|
585
534
|
if username is None and not opts.urn:
|
586
535
|
raise TypeError("Missing required property 'username'")
|
587
536
|
__props__.__dict__["username"] = username
|
588
|
-
secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["selfManagedPassword"])
|
589
|
-
opts = pulumi.ResourceOptions.merge(opts, secret_opts)
|
590
537
|
super(SecretBackendStaticRole, __self__).__init__(
|
591
538
|
'vault:database/secretBackendStaticRole:SecretBackendStaticRole',
|
592
539
|
resource_name,
|
@@ -605,7 +552,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
605
552
|
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
606
553
|
rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
607
554
|
rotation_window: Optional[pulumi.Input[int]] = None,
|
608
|
-
self_managed_password: Optional[pulumi.Input[str]] = None,
|
609
555
|
username: Optional[pulumi.Input[str]] = None) -> 'SecretBackendStaticRole':
|
610
556
|
"""
|
611
557
|
Get an existing SecretBackendStaticRole resource's state with the given name, id, and optional extra
|
@@ -631,9 +577,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
631
577
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
|
632
578
|
:param pulumi.Input[int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
|
633
579
|
from a given `rotation_schedule`.
|
634
|
-
:param pulumi.Input[str] self_managed_password: The password corresponding to the username in the database.
|
635
|
-
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
636
|
-
select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
|
637
580
|
:param pulumi.Input[str] username: The database username that this static role corresponds to.
|
638
581
|
"""
|
639
582
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -648,7 +591,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
648
591
|
__props__.__dict__["rotation_schedule"] = rotation_schedule
|
649
592
|
__props__.__dict__["rotation_statements"] = rotation_statements
|
650
593
|
__props__.__dict__["rotation_window"] = rotation_window
|
651
|
-
__props__.__dict__["self_managed_password"] = self_managed_password
|
652
594
|
__props__.__dict__["username"] = username
|
653
595
|
return SecretBackendStaticRole(resource_name, opts=opts, __props__=__props__)
|
654
596
|
|
@@ -725,16 +667,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
725
667
|
"""
|
726
668
|
return pulumi.get(self, "rotation_window")
|
727
669
|
|
728
|
-
@property
|
729
|
-
@pulumi.getter(name="selfManagedPassword")
|
730
|
-
def self_managed_password(self) -> pulumi.Output[Optional[str]]:
|
731
|
-
"""
|
732
|
-
The password corresponding to the username in the database.
|
733
|
-
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
734
|
-
select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
|
735
|
-
"""
|
736
|
-
return pulumi.get(self, "self_managed_password")
|
737
|
-
|
738
670
|
@property
|
739
671
|
@pulumi.getter
|
740
672
|
def username(self) -> pulumi.Output[str]:
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
from . import outputs
|
17
12
|
from ._inputs import *
|
pulumi_vault/egp_policy.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = ['EgpPolicyArgs', 'EgpPolicy']
|