pulumi-vault 6.4.0__py3-none-any.whl → 6.4.0a1723820369__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +0 -560
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +4 -19
  4. pulumi_vault/ad/secret_backend.py +0 -5
  5. pulumi_vault/ad/secret_library.py +0 -5
  6. pulumi_vault/ad/secret_role.py +0 -5
  7. pulumi_vault/alicloud/auth_backend_role.py +0 -5
  8. pulumi_vault/approle/auth_backend_login.py +0 -5
  9. pulumi_vault/approle/auth_backend_role.py +0 -5
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -99
  11. pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
  12. pulumi_vault/audit.py +0 -5
  13. pulumi_vault/audit_request_header.py +0 -5
  14. pulumi_vault/auth_backend.py +0 -5
  15. pulumi_vault/aws/auth_backend_cert.py +0 -5
  16. pulumi_vault/aws/auth_backend_client.py +0 -5
  17. pulumi_vault/aws/auth_backend_config_identity.py +0 -5
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
  19. pulumi_vault/aws/auth_backend_login.py +0 -5
  20. pulumi_vault/aws/auth_backend_role.py +0 -5
  21. pulumi_vault/aws/auth_backend_role_tag.py +0 -5
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
  23. pulumi_vault/aws/auth_backend_sts_role.py +0 -5
  24. pulumi_vault/aws/get_access_credentials.py +4 -31
  25. pulumi_vault/aws/get_static_access_credentials.py +4 -18
  26. pulumi_vault/aws/secret_backend.py +0 -5
  27. pulumi_vault/aws/secret_backend_role.py +0 -5
  28. pulumi_vault/aws/secret_backend_static_role.py +0 -5
  29. pulumi_vault/azure/_inputs.py +0 -24
  30. pulumi_vault/azure/auth_backend_config.py +0 -5
  31. pulumi_vault/azure/auth_backend_role.py +0 -5
  32. pulumi_vault/azure/backend.py +0 -5
  33. pulumi_vault/azure/backend_role.py +0 -5
  34. pulumi_vault/azure/get_access_credentials.py +4 -36
  35. pulumi_vault/azure/outputs.py +0 -5
  36. pulumi_vault/cert_auth_backend_role.py +0 -5
  37. pulumi_vault/config/__init__.pyi +0 -5
  38. pulumi_vault/config/_inputs.py +0 -21
  39. pulumi_vault/config/outputs.py +0 -5
  40. pulumi_vault/config/ui_custom_message.py +0 -5
  41. pulumi_vault/config/vars.py +0 -5
  42. pulumi_vault/consul/secret_backend.py +0 -5
  43. pulumi_vault/consul/secret_backend_role.py +0 -5
  44. pulumi_vault/database/_inputs.py +34 -2185
  45. pulumi_vault/database/outputs.py +0 -145
  46. pulumi_vault/database/secret_backend_connection.py +0 -5
  47. pulumi_vault/database/secret_backend_role.py +0 -5
  48. pulumi_vault/database/secret_backend_static_role.py +1 -69
  49. pulumi_vault/database/secrets_mount.py +0 -5
  50. pulumi_vault/egp_policy.py +0 -5
  51. pulumi_vault/gcp/_inputs.py +0 -111
  52. pulumi_vault/gcp/auth_backend.py +0 -5
  53. pulumi_vault/gcp/auth_backend_role.py +0 -5
  54. pulumi_vault/gcp/get_auth_backend_role.py +4 -42
  55. pulumi_vault/gcp/outputs.py +0 -5
  56. pulumi_vault/gcp/secret_backend.py +0 -5
  57. pulumi_vault/gcp/secret_impersonated_account.py +3 -62
  58. pulumi_vault/gcp/secret_roleset.py +0 -5
  59. pulumi_vault/gcp/secret_static_account.py +0 -5
  60. pulumi_vault/generic/endpoint.py +0 -5
  61. pulumi_vault/generic/get_secret.py +4 -24
  62. pulumi_vault/generic/secret.py +0 -5
  63. pulumi_vault/get_auth_backend.py +4 -21
  64. pulumi_vault/get_auth_backends.py +4 -16
  65. pulumi_vault/get_namespace.py +4 -17
  66. pulumi_vault/get_namespaces.py +4 -13
  67. pulumi_vault/get_nomad_access_token.py +4 -18
  68. pulumi_vault/get_policy_document.py +4 -15
  69. pulumi_vault/get_raft_autopilot_state.py +4 -23
  70. pulumi_vault/github/_inputs.py +0 -55
  71. pulumi_vault/github/auth_backend.py +0 -5
  72. pulumi_vault/github/outputs.py +0 -5
  73. pulumi_vault/github/team.py +0 -5
  74. pulumi_vault/github/user.py +0 -5
  75. pulumi_vault/identity/entity.py +0 -5
  76. pulumi_vault/identity/entity_alias.py +0 -5
  77. pulumi_vault/identity/entity_policies.py +0 -5
  78. pulumi_vault/identity/get_entity.py +4 -34
  79. pulumi_vault/identity/get_group.py +4 -40
  80. pulumi_vault/identity/get_oidc_client_creds.py +4 -16
  81. pulumi_vault/identity/get_oidc_openid_config.py +4 -26
  82. pulumi_vault/identity/get_oidc_public_keys.py +4 -15
  83. pulumi_vault/identity/group.py +0 -5
  84. pulumi_vault/identity/group_alias.py +0 -5
  85. pulumi_vault/identity/group_member_entity_ids.py +0 -5
  86. pulumi_vault/identity/group_member_group_ids.py +0 -5
  87. pulumi_vault/identity/group_policies.py +0 -5
  88. pulumi_vault/identity/mfa_duo.py +0 -5
  89. pulumi_vault/identity/mfa_login_enforcement.py +0 -5
  90. pulumi_vault/identity/mfa_okta.py +0 -5
  91. pulumi_vault/identity/mfa_pingid.py +0 -5
  92. pulumi_vault/identity/mfa_totp.py +0 -5
  93. pulumi_vault/identity/oidc.py +0 -5
  94. pulumi_vault/identity/oidc_assignment.py +0 -5
  95. pulumi_vault/identity/oidc_client.py +0 -5
  96. pulumi_vault/identity/oidc_key.py +0 -5
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
  98. pulumi_vault/identity/oidc_provider.py +0 -5
  99. pulumi_vault/identity/oidc_role.py +0 -5
  100. pulumi_vault/identity/oidc_scope.py +0 -5
  101. pulumi_vault/identity/outputs.py +0 -5
  102. pulumi_vault/jwt/_inputs.py +0 -55
  103. pulumi_vault/jwt/auth_backend.py +0 -5
  104. pulumi_vault/jwt/auth_backend_role.py +0 -5
  105. pulumi_vault/jwt/outputs.py +0 -5
  106. pulumi_vault/kmip/secret_backend.py +0 -5
  107. pulumi_vault/kmip/secret_role.py +0 -5
  108. pulumi_vault/kmip/secret_scope.py +0 -5
  109. pulumi_vault/kubernetes/auth_backend_config.py +3 -55
  110. pulumi_vault/kubernetes/auth_backend_role.py +0 -5
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +7 -59
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
  113. pulumi_vault/kubernetes/get_service_account_token.py +4 -28
  114. pulumi_vault/kubernetes/secret_backend.py +0 -5
  115. pulumi_vault/kubernetes/secret_backend_role.py +0 -5
  116. pulumi_vault/kv/_inputs.py +0 -32
  117. pulumi_vault/kv/get_secret.py +4 -19
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +4 -23
  119. pulumi_vault/kv/get_secret_v2.py +6 -25
  120. pulumi_vault/kv/get_secrets_list.py +4 -15
  121. pulumi_vault/kv/get_secrets_list_v2.py +4 -18
  122. pulumi_vault/kv/outputs.py +0 -5
  123. pulumi_vault/kv/secret.py +0 -5
  124. pulumi_vault/kv/secret_backend_v2.py +0 -5
  125. pulumi_vault/kv/secret_v2.py +0 -5
  126. pulumi_vault/ldap/auth_backend.py +0 -52
  127. pulumi_vault/ldap/auth_backend_group.py +0 -5
  128. pulumi_vault/ldap/auth_backend_user.py +0 -5
  129. pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
  130. pulumi_vault/ldap/get_static_credentials.py +4 -23
  131. pulumi_vault/ldap/secret_backend.py +0 -5
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
  133. pulumi_vault/ldap/secret_backend_library_set.py +0 -5
  134. pulumi_vault/ldap/secret_backend_static_role.py +0 -5
  135. pulumi_vault/managed/_inputs.py +0 -205
  136. pulumi_vault/managed/keys.py +0 -5
  137. pulumi_vault/managed/outputs.py +0 -5
  138. pulumi_vault/mfa_duo.py +0 -5
  139. pulumi_vault/mfa_okta.py +0 -5
  140. pulumi_vault/mfa_pingid.py +0 -5
  141. pulumi_vault/mfa_totp.py +0 -5
  142. pulumi_vault/mongodbatlas/secret_backend.py +0 -5
  143. pulumi_vault/mongodbatlas/secret_role.py +0 -5
  144. pulumi_vault/mount.py +0 -5
  145. pulumi_vault/namespace.py +0 -5
  146. pulumi_vault/nomad_secret_backend.py +0 -5
  147. pulumi_vault/nomad_secret_role.py +0 -5
  148. pulumi_vault/okta/_inputs.py +0 -39
  149. pulumi_vault/okta/auth_backend.py +0 -5
  150. pulumi_vault/okta/auth_backend_group.py +0 -5
  151. pulumi_vault/okta/auth_backend_user.py +0 -5
  152. pulumi_vault/okta/outputs.py +0 -5
  153. pulumi_vault/outputs.py +0 -5
  154. pulumi_vault/password_policy.py +0 -5
  155. pulumi_vault/pkisecret/_inputs.py +0 -41
  156. pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
  157. pulumi_vault/pkisecret/backend_config_est.py +0 -5
  158. pulumi_vault/pkisecret/get_backend_config_est.py +4 -22
  159. pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
  160. pulumi_vault/pkisecret/get_backend_issuers.py +4 -17
  161. pulumi_vault/pkisecret/get_backend_key.py +4 -19
  162. pulumi_vault/pkisecret/get_backend_keys.py +4 -17
  163. pulumi_vault/pkisecret/outputs.py +0 -5
  164. pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
  172. pulumi_vault/pkisecret/secret_backend_key.py +0 -5
  173. pulumi_vault/pkisecret/secret_backend_role.py +0 -5
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
  176. pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
  177. pulumi_vault/plugin.py +0 -5
  178. pulumi_vault/plugin_pinned_version.py +0 -5
  179. pulumi_vault/policy.py +0 -5
  180. pulumi_vault/provider.py +0 -5
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +0 -5
  183. pulumi_vault/quota_rate_limit.py +0 -5
  184. pulumi_vault/rabbitmq/_inputs.py +0 -61
  185. pulumi_vault/rabbitmq/outputs.py +0 -5
  186. pulumi_vault/rabbitmq/secret_backend.py +0 -5
  187. pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
  188. pulumi_vault/raft_autopilot.py +0 -5
  189. pulumi_vault/raft_snapshot_agent_config.py +0 -5
  190. pulumi_vault/rgp_policy.py +0 -5
  191. pulumi_vault/saml/auth_backend.py +0 -5
  192. pulumi_vault/saml/auth_backend_role.py +0 -5
  193. pulumi_vault/secrets/_inputs.py +0 -30
  194. pulumi_vault/secrets/outputs.py +0 -5
  195. pulumi_vault/secrets/sync_association.py +0 -5
  196. pulumi_vault/secrets/sync_aws_destination.py +0 -5
  197. pulumi_vault/secrets/sync_azure_destination.py +0 -5
  198. pulumi_vault/secrets/sync_config.py +0 -5
  199. pulumi_vault/secrets/sync_gcp_destination.py +0 -5
  200. pulumi_vault/secrets/sync_gh_destination.py +0 -5
  201. pulumi_vault/secrets/sync_github_apps.py +0 -5
  202. pulumi_vault/secrets/sync_vercel_destination.py +0 -5
  203. pulumi_vault/ssh/_inputs.py +0 -22
  204. pulumi_vault/ssh/outputs.py +0 -5
  205. pulumi_vault/ssh/secret_backend_ca.py +0 -5
  206. pulumi_vault/ssh/secret_backend_role.py +0 -39
  207. pulumi_vault/terraformcloud/secret_backend.py +0 -5
  208. pulumi_vault/terraformcloud/secret_creds.py +0 -5
  209. pulumi_vault/terraformcloud/secret_role.py +0 -5
  210. pulumi_vault/token.py +0 -5
  211. pulumi_vault/tokenauth/auth_backend_role.py +14 -5
  212. pulumi_vault/transform/alphabet.py +0 -5
  213. pulumi_vault/transform/get_decode.py +4 -28
  214. pulumi_vault/transform/get_encode.py +4 -28
  215. pulumi_vault/transform/role.py +0 -5
  216. pulumi_vault/transform/template.py +0 -5
  217. pulumi_vault/transform/transformation.py +0 -5
  218. pulumi_vault/transit/get_decrypt.py +4 -21
  219. pulumi_vault/transit/get_encrypt.py +4 -23
  220. pulumi_vault/transit/secret_backend_key.py +0 -5
  221. pulumi_vault/transit/secret_cache_config.py +0 -5
  222. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/METADATA +2 -3
  223. pulumi_vault-6.4.0a1723820369.dist-info/RECORD +256 -0
  224. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/WHEEL +1 -1
  225. pulumi_vault-6.4.0.dist-info/RECORD +0 -256
  226. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/top_level.txt +0 -0
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -68,8 +63,6 @@ class SecretBackendConnectionCassandra(dict):
68
63
  suggest = "pem_json"
69
64
  elif key == "protocolVersion":
70
65
  suggest = "protocol_version"
71
- elif key == "skipVerification":
72
- suggest = "skip_verification"
73
66
 
74
67
  if suggest:
75
68
  pulumi.log.warn(f"Key '{key}' not found in SecretBackendConnectionCassandra. Access the value via the '{suggest}' property getter instead.")
@@ -91,7 +84,6 @@ class SecretBackendConnectionCassandra(dict):
91
84
  pem_json: Optional[str] = None,
92
85
  port: Optional[int] = None,
93
86
  protocol_version: Optional[int] = None,
94
- skip_verification: Optional[bool] = None,
95
87
  tls: Optional[bool] = None,
96
88
  username: Optional[str] = None):
97
89
  """
@@ -103,7 +95,6 @@ class SecretBackendConnectionCassandra(dict):
103
95
  :param str pem_json: Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
104
96
  :param int port: The transport port to use to connect to Cassandra.
105
97
  :param int protocol_version: The CQL protocol version to use.
106
- :param bool skip_verification: Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
107
98
  :param bool tls: Whether to use TLS when connecting to Cassandra.
108
99
  :param str username: The username to use when authenticating with Cassandra.
109
100
  """
@@ -123,8 +114,6 @@ class SecretBackendConnectionCassandra(dict):
123
114
  pulumi.set(__self__, "port", port)
124
115
  if protocol_version is not None:
125
116
  pulumi.set(__self__, "protocol_version", protocol_version)
126
- if skip_verification is not None:
127
- pulumi.set(__self__, "skip_verification", skip_verification)
128
117
  if tls is not None:
129
118
  pulumi.set(__self__, "tls", tls)
130
119
  if username is not None:
@@ -194,14 +183,6 @@ class SecretBackendConnectionCassandra(dict):
194
183
  """
195
184
  return pulumi.get(self, "protocol_version")
196
185
 
197
- @property
198
- @pulumi.getter(name="skipVerification")
199
- def skip_verification(self) -> Optional[bool]:
200
- """
201
- Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
202
- """
203
- return pulumi.get(self, "skip_verification")
204
-
205
186
  @property
206
187
  @pulumi.getter
207
188
  def tls(self) -> Optional[bool]:
@@ -1928,16 +1909,8 @@ class SecretBackendConnectionPostgresql(dict):
1928
1909
  suggest = "max_idle_connections"
1929
1910
  elif key == "maxOpenConnections":
1930
1911
  suggest = "max_open_connections"
1931
- elif key == "privateKey":
1932
- suggest = "private_key"
1933
- elif key == "selfManaged":
1934
- suggest = "self_managed"
1935
1912
  elif key == "serviceAccountJson":
1936
1913
  suggest = "service_account_json"
1937
- elif key == "tlsCa":
1938
- suggest = "tls_ca"
1939
- elif key == "tlsCertificate":
1940
- suggest = "tls_certificate"
1941
1914
  elif key == "usernameTemplate":
1942
1915
  suggest = "username_template"
1943
1916
 
@@ -1960,11 +1933,7 @@ class SecretBackendConnectionPostgresql(dict):
1960
1933
  max_idle_connections: Optional[int] = None,
1961
1934
  max_open_connections: Optional[int] = None,
1962
1935
  password: Optional[str] = None,
1963
- private_key: Optional[str] = None,
1964
- self_managed: Optional[bool] = None,
1965
1936
  service_account_json: Optional[str] = None,
1966
- tls_ca: Optional[str] = None,
1967
- tls_certificate: Optional[str] = None,
1968
1937
  username: Optional[str] = None,
1969
1938
  username_template: Optional[str] = None):
1970
1939
  """
@@ -1975,11 +1944,7 @@ class SecretBackendConnectionPostgresql(dict):
1975
1944
  :param int max_idle_connections: Maximum number of idle connections to the database.
1976
1945
  :param int max_open_connections: Maximum number of open connections to the database.
1977
1946
  :param str password: The root credential password used in the connection URL
1978
- :param str private_key: The secret key used for the x509 client certificate. Must be PEM encoded.
1979
- :param bool self_managed: If set, allows onboarding static roles with a rootless connection configuration.
1980
1947
  :param str service_account_json: A JSON encoded credential for use with IAM authorization
1981
- :param str tls_ca: The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
1982
- :param str tls_certificate: The x509 client certificate for connecting to the database. Must be PEM encoded.
1983
1948
  :param str username: The root credential username used in the connection URL
1984
1949
  :param str username_template: Username generation template.
1985
1950
  """
@@ -1997,16 +1962,8 @@ class SecretBackendConnectionPostgresql(dict):
1997
1962
  pulumi.set(__self__, "max_open_connections", max_open_connections)
1998
1963
  if password is not None:
1999
1964
  pulumi.set(__self__, "password", password)
2000
- if private_key is not None:
2001
- pulumi.set(__self__, "private_key", private_key)
2002
- if self_managed is not None:
2003
- pulumi.set(__self__, "self_managed", self_managed)
2004
1965
  if service_account_json is not None:
2005
1966
  pulumi.set(__self__, "service_account_json", service_account_json)
2006
- if tls_ca is not None:
2007
- pulumi.set(__self__, "tls_ca", tls_ca)
2008
- if tls_certificate is not None:
2009
- pulumi.set(__self__, "tls_certificate", tls_certificate)
2010
1967
  if username is not None:
2011
1968
  pulumi.set(__self__, "username", username)
2012
1969
  if username_template is not None:
@@ -2068,22 +2025,6 @@ class SecretBackendConnectionPostgresql(dict):
2068
2025
  """
2069
2026
  return pulumi.get(self, "password")
2070
2027
 
2071
- @property
2072
- @pulumi.getter(name="privateKey")
2073
- def private_key(self) -> Optional[str]:
2074
- """
2075
- The secret key used for the x509 client certificate. Must be PEM encoded.
2076
- """
2077
- return pulumi.get(self, "private_key")
2078
-
2079
- @property
2080
- @pulumi.getter(name="selfManaged")
2081
- def self_managed(self) -> Optional[bool]:
2082
- """
2083
- If set, allows onboarding static roles with a rootless connection configuration.
2084
- """
2085
- return pulumi.get(self, "self_managed")
2086
-
2087
2028
  @property
2088
2029
  @pulumi.getter(name="serviceAccountJson")
2089
2030
  def service_account_json(self) -> Optional[str]:
@@ -2092,22 +2033,6 @@ class SecretBackendConnectionPostgresql(dict):
2092
2033
  """
2093
2034
  return pulumi.get(self, "service_account_json")
2094
2035
 
2095
- @property
2096
- @pulumi.getter(name="tlsCa")
2097
- def tls_ca(self) -> Optional[str]:
2098
- """
2099
- The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
2100
- """
2101
- return pulumi.get(self, "tls_ca")
2102
-
2103
- @property
2104
- @pulumi.getter(name="tlsCertificate")
2105
- def tls_certificate(self) -> Optional[str]:
2106
- """
2107
- The x509 client certificate for connecting to the database. Must be PEM encoded.
2108
- """
2109
- return pulumi.get(self, "tls_certificate")
2110
-
2111
2036
  @property
2112
2037
  @pulumi.getter
2113
2038
  def username(self) -> Optional[str]:
@@ -2553,8 +2478,6 @@ class SecretsMountCassandra(dict):
2553
2478
  suggest = "protocol_version"
2554
2479
  elif key == "rootRotationStatements":
2555
2480
  suggest = "root_rotation_statements"
2556
- elif key == "skipVerification":
2557
- suggest = "skip_verification"
2558
2481
  elif key == "verifyConnection":
2559
2482
  suggest = "verify_connection"
2560
2483
 
@@ -2583,7 +2506,6 @@ class SecretsMountCassandra(dict):
2583
2506
  port: Optional[int] = None,
2584
2507
  protocol_version: Optional[int] = None,
2585
2508
  root_rotation_statements: Optional[Sequence[str]] = None,
2586
- skip_verification: Optional[bool] = None,
2587
2509
  tls: Optional[bool] = None,
2588
2510
  username: Optional[str] = None,
2589
2511
  verify_connection: Optional[bool] = None):
@@ -2604,7 +2526,6 @@ class SecretsMountCassandra(dict):
2604
2526
  :param int port: The transport port to use to connect to Cassandra.
2605
2527
  :param int protocol_version: The CQL protocol version to use.
2606
2528
  :param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
2607
- :param bool skip_verification: Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
2608
2529
  :param bool tls: Whether to use TLS when connecting to Cassandra.
2609
2530
  :param str username: The username to use when authenticating with Cassandra.
2610
2531
  :param bool verify_connection: Whether the connection should be verified on
@@ -2635,8 +2556,6 @@ class SecretsMountCassandra(dict):
2635
2556
  pulumi.set(__self__, "protocol_version", protocol_version)
2636
2557
  if root_rotation_statements is not None:
2637
2558
  pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
2638
- if skip_verification is not None:
2639
- pulumi.set(__self__, "skip_verification", skip_verification)
2640
2559
  if tls is not None:
2641
2560
  pulumi.set(__self__, "tls", tls)
2642
2561
  if username is not None:
@@ -2751,14 +2670,6 @@ class SecretsMountCassandra(dict):
2751
2670
  """
2752
2671
  return pulumi.get(self, "root_rotation_statements")
2753
2672
 
2754
- @property
2755
- @pulumi.getter(name="skipVerification")
2756
- def skip_verification(self) -> Optional[bool]:
2757
- """
2758
- Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
2759
- """
2760
- return pulumi.get(self, "skip_verification")
2761
-
2762
2673
  @property
2763
2674
  @pulumi.getter
2764
2675
  def tls(self) -> Optional[bool]:
@@ -5542,18 +5453,10 @@ class SecretsMountPostgresql(dict):
5542
5453
  suggest = "max_open_connections"
5543
5454
  elif key == "pluginName":
5544
5455
  suggest = "plugin_name"
5545
- elif key == "privateKey":
5546
- suggest = "private_key"
5547
5456
  elif key == "rootRotationStatements":
5548
5457
  suggest = "root_rotation_statements"
5549
- elif key == "selfManaged":
5550
- suggest = "self_managed"
5551
5458
  elif key == "serviceAccountJson":
5552
5459
  suggest = "service_account_json"
5553
- elif key == "tlsCa":
5554
- suggest = "tls_ca"
5555
- elif key == "tlsCertificate":
5556
- suggest = "tls_certificate"
5557
5460
  elif key == "usernameTemplate":
5558
5461
  suggest = "username_template"
5559
5462
  elif key == "verifyConnection":
@@ -5582,12 +5485,8 @@ class SecretsMountPostgresql(dict):
5582
5485
  max_open_connections: Optional[int] = None,
5583
5486
  password: Optional[str] = None,
5584
5487
  plugin_name: Optional[str] = None,
5585
- private_key: Optional[str] = None,
5586
5488
  root_rotation_statements: Optional[Sequence[str]] = None,
5587
- self_managed: Optional[bool] = None,
5588
5489
  service_account_json: Optional[str] = None,
5589
- tls_ca: Optional[str] = None,
5590
- tls_certificate: Optional[str] = None,
5591
5490
  username: Optional[str] = None,
5592
5491
  username_template: Optional[str] = None,
5593
5492
  verify_connection: Optional[bool] = None):
@@ -5606,12 +5505,8 @@ class SecretsMountPostgresql(dict):
5606
5505
  :param int max_open_connections: Maximum number of open connections to the database.
5607
5506
  :param str password: The root credential password used in the connection URL
5608
5507
  :param str plugin_name: Specifies the name of the plugin to use.
5609
- :param str private_key: The secret key used for the x509 client certificate. Must be PEM encoded.
5610
5508
  :param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
5611
- :param bool self_managed: If set, allows onboarding static roles with a rootless connection configuration.
5612
5509
  :param str service_account_json: A JSON encoded credential for use with IAM authorization
5613
- :param str tls_ca: The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
5614
- :param str tls_certificate: The x509 client certificate for connecting to the database. Must be PEM encoded.
5615
5510
  :param str username: The root credential username used in the connection URL
5616
5511
  :param str username_template: Username generation template.
5617
5512
  :param bool verify_connection: Whether the connection should be verified on
@@ -5638,18 +5533,10 @@ class SecretsMountPostgresql(dict):
5638
5533
  pulumi.set(__self__, "password", password)
5639
5534
  if plugin_name is not None:
5640
5535
  pulumi.set(__self__, "plugin_name", plugin_name)
5641
- if private_key is not None:
5642
- pulumi.set(__self__, "private_key", private_key)
5643
5536
  if root_rotation_statements is not None:
5644
5537
  pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
5645
- if self_managed is not None:
5646
- pulumi.set(__self__, "self_managed", self_managed)
5647
5538
  if service_account_json is not None:
5648
5539
  pulumi.set(__self__, "service_account_json", service_account_json)
5649
- if tls_ca is not None:
5650
- pulumi.set(__self__, "tls_ca", tls_ca)
5651
- if tls_certificate is not None:
5652
- pulumi.set(__self__, "tls_certificate", tls_certificate)
5653
5540
  if username is not None:
5654
5541
  pulumi.set(__self__, "username", username)
5655
5542
  if username_template is not None:
@@ -5748,14 +5635,6 @@ class SecretsMountPostgresql(dict):
5748
5635
  """
5749
5636
  return pulumi.get(self, "plugin_name")
5750
5637
 
5751
- @property
5752
- @pulumi.getter(name="privateKey")
5753
- def private_key(self) -> Optional[str]:
5754
- """
5755
- The secret key used for the x509 client certificate. Must be PEM encoded.
5756
- """
5757
- return pulumi.get(self, "private_key")
5758
-
5759
5638
  @property
5760
5639
  @pulumi.getter(name="rootRotationStatements")
5761
5640
  def root_rotation_statements(self) -> Optional[Sequence[str]]:
@@ -5764,14 +5643,6 @@ class SecretsMountPostgresql(dict):
5764
5643
  """
5765
5644
  return pulumi.get(self, "root_rotation_statements")
5766
5645
 
5767
- @property
5768
- @pulumi.getter(name="selfManaged")
5769
- def self_managed(self) -> Optional[bool]:
5770
- """
5771
- If set, allows onboarding static roles with a rootless connection configuration.
5772
- """
5773
- return pulumi.get(self, "self_managed")
5774
-
5775
5646
  @property
5776
5647
  @pulumi.getter(name="serviceAccountJson")
5777
5648
  def service_account_json(self) -> Optional[str]:
@@ -5780,22 +5651,6 @@ class SecretsMountPostgresql(dict):
5780
5651
  """
5781
5652
  return pulumi.get(self, "service_account_json")
5782
5653
 
5783
- @property
5784
- @pulumi.getter(name="tlsCa")
5785
- def tls_ca(self) -> Optional[str]:
5786
- """
5787
- The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
5788
- """
5789
- return pulumi.get(self, "tls_ca")
5790
-
5791
- @property
5792
- @pulumi.getter(name="tlsCertificate")
5793
- def tls_certificate(self) -> Optional[str]:
5794
- """
5795
- The x509 client certificate for connecting to the database. Must be PEM encoded.
5796
- """
5797
- return pulumi.get(self, "tls_certificate")
5798
-
5799
5654
  @property
5800
5655
  @pulumi.getter
5801
5656
  def username(self) -> Optional[str]:
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
  from . import outputs
17
12
  from ._inputs import *
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole']
@@ -27,8 +22,7 @@ class SecretBackendStaticRoleArgs:
27
22
  rotation_period: Optional[pulumi.Input[int]] = None,
28
23
  rotation_schedule: Optional[pulumi.Input[str]] = None,
29
24
  rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
30
- rotation_window: Optional[pulumi.Input[int]] = None,
31
- self_managed_password: Optional[pulumi.Input[str]] = None):
25
+ rotation_window: Optional[pulumi.Input[int]] = None):
32
26
  """
33
27
  The set of arguments for constructing a SecretBackendStaticRole resource.
34
28
  :param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
@@ -49,9 +43,6 @@ class SecretBackendStaticRoleArgs:
49
43
  :param pulumi.Input[Sequence[pulumi.Input[str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
50
44
  :param pulumi.Input[int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
51
45
  from a given `rotation_schedule`.
52
- :param pulumi.Input[str] self_managed_password: The password corresponding to the username in the database.
53
- Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
54
- select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
55
46
  """
56
47
  pulumi.set(__self__, "backend", backend)
57
48
  pulumi.set(__self__, "db_name", db_name)
@@ -68,8 +59,6 @@ class SecretBackendStaticRoleArgs:
68
59
  pulumi.set(__self__, "rotation_statements", rotation_statements)
69
60
  if rotation_window is not None:
70
61
  pulumi.set(__self__, "rotation_window", rotation_window)
71
- if self_managed_password is not None:
72
- pulumi.set(__self__, "self_managed_password", self_managed_password)
73
62
 
74
63
  @property
75
64
  @pulumi.getter
@@ -188,20 +177,6 @@ class SecretBackendStaticRoleArgs:
188
177
  def rotation_window(self, value: Optional[pulumi.Input[int]]):
189
178
  pulumi.set(self, "rotation_window", value)
190
179
 
191
- @property
192
- @pulumi.getter(name="selfManagedPassword")
193
- def self_managed_password(self) -> Optional[pulumi.Input[str]]:
194
- """
195
- The password corresponding to the username in the database.
196
- Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
197
- select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
198
- """
199
- return pulumi.get(self, "self_managed_password")
200
-
201
- @self_managed_password.setter
202
- def self_managed_password(self, value: Optional[pulumi.Input[str]]):
203
- pulumi.set(self, "self_managed_password", value)
204
-
205
180
 
206
181
  @pulumi.input_type
207
182
  class _SecretBackendStaticRoleState:
@@ -214,7 +189,6 @@ class _SecretBackendStaticRoleState:
214
189
  rotation_schedule: Optional[pulumi.Input[str]] = None,
215
190
  rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
216
191
  rotation_window: Optional[pulumi.Input[int]] = None,
217
- self_managed_password: Optional[pulumi.Input[str]] = None,
218
192
  username: Optional[pulumi.Input[str]] = None):
219
193
  """
220
194
  Input properties used for looking up and filtering SecretBackendStaticRole resources.
@@ -235,9 +209,6 @@ class _SecretBackendStaticRoleState:
235
209
  :param pulumi.Input[Sequence[pulumi.Input[str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
236
210
  :param pulumi.Input[int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
237
211
  from a given `rotation_schedule`.
238
- :param pulumi.Input[str] self_managed_password: The password corresponding to the username in the database.
239
- Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
240
- select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
241
212
  :param pulumi.Input[str] username: The database username that this static role corresponds to.
242
213
  """
243
214
  if backend is not None:
@@ -256,8 +227,6 @@ class _SecretBackendStaticRoleState:
256
227
  pulumi.set(__self__, "rotation_statements", rotation_statements)
257
228
  if rotation_window is not None:
258
229
  pulumi.set(__self__, "rotation_window", rotation_window)
259
- if self_managed_password is not None:
260
- pulumi.set(__self__, "self_managed_password", self_managed_password)
261
230
  if username is not None:
262
231
  pulumi.set(__self__, "username", username)
263
232
 
@@ -366,20 +335,6 @@ class _SecretBackendStaticRoleState:
366
335
  def rotation_window(self, value: Optional[pulumi.Input[int]]):
367
336
  pulumi.set(self, "rotation_window", value)
368
337
 
369
- @property
370
- @pulumi.getter(name="selfManagedPassword")
371
- def self_managed_password(self) -> Optional[pulumi.Input[str]]:
372
- """
373
- The password corresponding to the username in the database.
374
- Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
375
- select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
376
- """
377
- return pulumi.get(self, "self_managed_password")
378
-
379
- @self_managed_password.setter
380
- def self_managed_password(self, value: Optional[pulumi.Input[str]]):
381
- pulumi.set(self, "self_managed_password", value)
382
-
383
338
  @property
384
339
  @pulumi.getter
385
340
  def username(self) -> Optional[pulumi.Input[str]]:
@@ -406,7 +361,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
406
361
  rotation_schedule: Optional[pulumi.Input[str]] = None,
407
362
  rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
408
363
  rotation_window: Optional[pulumi.Input[int]] = None,
409
- self_managed_password: Optional[pulumi.Input[str]] = None,
410
364
  username: Optional[pulumi.Input[str]] = None,
411
365
  __props__=None):
412
366
  """
@@ -476,9 +430,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
476
430
  :param pulumi.Input[Sequence[pulumi.Input[str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
477
431
  :param pulumi.Input[int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
478
432
  from a given `rotation_schedule`.
479
- :param pulumi.Input[str] self_managed_password: The password corresponding to the username in the database.
480
- Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
481
- select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
482
433
  :param pulumi.Input[str] username: The database username that this static role corresponds to.
483
434
  """
484
435
  ...
@@ -558,7 +509,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
558
509
  rotation_schedule: Optional[pulumi.Input[str]] = None,
559
510
  rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
560
511
  rotation_window: Optional[pulumi.Input[int]] = None,
561
- self_managed_password: Optional[pulumi.Input[str]] = None,
562
512
  username: Optional[pulumi.Input[str]] = None,
563
513
  __props__=None):
564
514
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
@@ -581,12 +531,9 @@ class SecretBackendStaticRole(pulumi.CustomResource):
581
531
  __props__.__dict__["rotation_schedule"] = rotation_schedule
582
532
  __props__.__dict__["rotation_statements"] = rotation_statements
583
533
  __props__.__dict__["rotation_window"] = rotation_window
584
- __props__.__dict__["self_managed_password"] = None if self_managed_password is None else pulumi.Output.secret(self_managed_password)
585
534
  if username is None and not opts.urn:
586
535
  raise TypeError("Missing required property 'username'")
587
536
  __props__.__dict__["username"] = username
588
- secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["selfManagedPassword"])
589
- opts = pulumi.ResourceOptions.merge(opts, secret_opts)
590
537
  super(SecretBackendStaticRole, __self__).__init__(
591
538
  'vault:database/secretBackendStaticRole:SecretBackendStaticRole',
592
539
  resource_name,
@@ -605,7 +552,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
605
552
  rotation_schedule: Optional[pulumi.Input[str]] = None,
606
553
  rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
607
554
  rotation_window: Optional[pulumi.Input[int]] = None,
608
- self_managed_password: Optional[pulumi.Input[str]] = None,
609
555
  username: Optional[pulumi.Input[str]] = None) -> 'SecretBackendStaticRole':
610
556
  """
611
557
  Get an existing SecretBackendStaticRole resource's state with the given name, id, and optional extra
@@ -631,9 +577,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
631
577
  :param pulumi.Input[Sequence[pulumi.Input[str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
632
578
  :param pulumi.Input[int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
633
579
  from a given `rotation_schedule`.
634
- :param pulumi.Input[str] self_managed_password: The password corresponding to the username in the database.
635
- Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
636
- select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
637
580
  :param pulumi.Input[str] username: The database username that this static role corresponds to.
638
581
  """
639
582
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -648,7 +591,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
648
591
  __props__.__dict__["rotation_schedule"] = rotation_schedule
649
592
  __props__.__dict__["rotation_statements"] = rotation_statements
650
593
  __props__.__dict__["rotation_window"] = rotation_window
651
- __props__.__dict__["self_managed_password"] = self_managed_password
652
594
  __props__.__dict__["username"] = username
653
595
  return SecretBackendStaticRole(resource_name, opts=opts, __props__=__props__)
654
596
 
@@ -725,16 +667,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
725
667
  """
726
668
  return pulumi.get(self, "rotation_window")
727
669
 
728
- @property
729
- @pulumi.getter(name="selfManagedPassword")
730
- def self_managed_password(self) -> pulumi.Output[Optional[str]]:
731
- """
732
- The password corresponding to the username in the database.
733
- Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
734
- select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
735
- """
736
- return pulumi.get(self, "self_managed_password")
737
-
738
670
  @property
739
671
  @pulumi.getter
740
672
  def username(self) -> pulumi.Output[str]:
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
  from . import outputs
17
12
  from ._inputs import *
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
 
17
12
  __all__ = ['EgpPolicyArgs', 'EgpPolicy']