pulumi-vault 6.5.0__py3-none-any.whl → 6.5.0a1732277756__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +0 -24
- pulumi_vault/ad/get_access_credentials.py +2 -2
- pulumi_vault/approle/get_auth_backend_role_id.py +2 -2
- pulumi_vault/aws/auth_backend_sts_role.py +0 -47
- pulumi_vault/aws/get_access_credentials.py +2 -2
- pulumi_vault/aws/get_static_access_credentials.py +2 -2
- pulumi_vault/aws/secret_backend.py +0 -141
- pulumi_vault/azure/get_access_credentials.py +2 -2
- pulumi_vault/database/_inputs.py +0 -40
- pulumi_vault/database/outputs.py +0 -28
- pulumi_vault/gcp/get_auth_backend_role.py +2 -2
- pulumi_vault/generic/get_secret.py +2 -2
- pulumi_vault/get_auth_backend.py +2 -2
- pulumi_vault/get_auth_backends.py +2 -2
- pulumi_vault/get_namespace.py +2 -2
- pulumi_vault/get_namespaces.py +2 -2
- pulumi_vault/get_nomad_access_token.py +2 -2
- pulumi_vault/get_policy_document.py +2 -2
- pulumi_vault/get_raft_autopilot_state.py +2 -2
- pulumi_vault/identity/get_entity.py +2 -2
- pulumi_vault/identity/get_group.py +2 -2
- pulumi_vault/identity/get_oidc_client_creds.py +2 -2
- pulumi_vault/identity/get_oidc_openid_config.py +2 -2
- pulumi_vault/identity/get_oidc_public_keys.py +2 -2
- pulumi_vault/kubernetes/get_auth_backend_config.py +2 -2
- pulumi_vault/kubernetes/get_auth_backend_role.py +2 -2
- pulumi_vault/kubernetes/get_service_account_token.py +2 -2
- pulumi_vault/kv/get_secret.py +2 -2
- pulumi_vault/kv/get_secret_subkeys_v2.py +2 -2
- pulumi_vault/kv/get_secret_v2.py +2 -2
- pulumi_vault/kv/get_secrets_list.py +2 -2
- pulumi_vault/kv/get_secrets_list_v2.py +2 -2
- pulumi_vault/ldap/get_dynamic_credentials.py +2 -2
- pulumi_vault/ldap/get_static_credentials.py +2 -2
- pulumi_vault/pkisecret/__init__.py +0 -4
- pulumi_vault/pkisecret/_inputs.py +0 -34
- pulumi_vault/pkisecret/get_backend_config_est.py +2 -2
- pulumi_vault/pkisecret/get_backend_issuer.py +2 -2
- pulumi_vault/pkisecret/get_backend_issuers.py +2 -2
- pulumi_vault/pkisecret/get_backend_key.py +2 -2
- pulumi_vault/pkisecret/get_backend_keys.py +2 -2
- pulumi_vault/pkisecret/outputs.py +0 -40
- pulumi_vault/pkisecret/secret_backend_role.py +0 -47
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/ssh/secret_backend_role.py +0 -27
- pulumi_vault/transform/get_decode.py +2 -2
- pulumi_vault/transform/get_encode.py +2 -2
- pulumi_vault/transit/get_decrypt.py +2 -2
- pulumi_vault/transit/get_encrypt.py +2 -2
- {pulumi_vault-6.5.0.dist-info → pulumi_vault-6.5.0a1732277756.dist-info}/METADATA +4 -4
- {pulumi_vault-6.5.0.dist-info → pulumi_vault-6.5.0a1732277756.dist-info}/RECORD +53 -57
- {pulumi_vault-6.5.0.dist-info → pulumi_vault-6.5.0a1732277756.dist-info}/WHEEL +1 -1
- pulumi_vault/pkisecret/backend_acme_eab.py +0 -549
- pulumi_vault/pkisecret/backend_config_acme.py +0 -642
- pulumi_vault/pkisecret/backend_config_cmpv2.py +0 -525
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +0 -209
- {pulumi_vault-6.5.0.dist-info → pulumi_vault-6.5.0a1732277756.dist-info}/top_level.txt +0 -0
pulumi_vault/__init__.py
CHANGED
@@ -1013,22 +1013,6 @@ _utilities.register(
|
|
1013
1013
|
"vault:okta/authBackendUser:AuthBackendUser": "AuthBackendUser"
|
1014
1014
|
}
|
1015
1015
|
},
|
1016
|
-
{
|
1017
|
-
"pkg": "vault",
|
1018
|
-
"mod": "pkiSecret/backendAcmeEab",
|
1019
|
-
"fqn": "pulumi_vault.pkisecret",
|
1020
|
-
"classes": {
|
1021
|
-
"vault:pkiSecret/backendAcmeEab:BackendAcmeEab": "BackendAcmeEab"
|
1022
|
-
}
|
1023
|
-
},
|
1024
|
-
{
|
1025
|
-
"pkg": "vault",
|
1026
|
-
"mod": "pkiSecret/backendConfigAcme",
|
1027
|
-
"fqn": "pulumi_vault.pkisecret",
|
1028
|
-
"classes": {
|
1029
|
-
"vault:pkiSecret/backendConfigAcme:BackendConfigAcme": "BackendConfigAcme"
|
1030
|
-
}
|
1031
|
-
},
|
1032
1016
|
{
|
1033
1017
|
"pkg": "vault",
|
1034
1018
|
"mod": "pkiSecret/backendConfigCluster",
|
@@ -1037,14 +1021,6 @@ _utilities.register(
|
|
1037
1021
|
"vault:pkiSecret/backendConfigCluster:BackendConfigCluster": "BackendConfigCluster"
|
1038
1022
|
}
|
1039
1023
|
},
|
1040
|
-
{
|
1041
|
-
"pkg": "vault",
|
1042
|
-
"mod": "pkiSecret/backendConfigCmpv2",
|
1043
|
-
"fqn": "pulumi_vault.pkisecret",
|
1044
|
-
"classes": {
|
1045
|
-
"vault:pkiSecret/backendConfigCmpv2:BackendConfigCmpv2": "BackendConfigCmpv2"
|
1046
|
-
}
|
1047
|
-
},
|
1048
1024
|
{
|
1049
1025
|
"pkg": "vault",
|
1050
1026
|
"mod": "pkiSecret/backendConfigEst",
|
@@ -147,7 +147,7 @@ def get_access_credentials(backend: Optional[str] = None,
|
|
147
147
|
def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
|
148
148
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
149
149
|
role: Optional[pulumi.Input[str]] = None,
|
150
|
-
opts: Optional[
|
150
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAccessCredentialsResult]:
|
151
151
|
"""
|
152
152
|
## Example Usage
|
153
153
|
|
@@ -165,7 +165,7 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
|
|
165
165
|
__args__['backend'] = backend
|
166
166
|
__args__['namespace'] = namespace
|
167
167
|
__args__['role'] = role
|
168
|
-
opts = pulumi.
|
168
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
169
169
|
__ret__ = pulumi.runtime.invoke_output('vault:ad/getAccessCredentials:getAccessCredentials', __args__, opts=opts, typ=GetAccessCredentialsResult)
|
170
170
|
return __ret__.apply(lambda __response__: GetAccessCredentialsResult(
|
171
171
|
backend=pulumi.get(__response__, 'backend'),
|
@@ -131,7 +131,7 @@ def get_auth_backend_role_id(backend: Optional[str] = None,
|
|
131
131
|
def get_auth_backend_role_id_output(backend: Optional[pulumi.Input[Optional[str]]] = None,
|
132
132
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
133
133
|
role_name: Optional[pulumi.Input[str]] = None,
|
134
|
-
opts: Optional[
|
134
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendRoleIdResult]:
|
135
135
|
"""
|
136
136
|
Reads the Role ID of an AppRole from a Vault server.
|
137
137
|
|
@@ -159,7 +159,7 @@ def get_auth_backend_role_id_output(backend: Optional[pulumi.Input[Optional[str]
|
|
159
159
|
__args__['backend'] = backend
|
160
160
|
__args__['namespace'] = namespace
|
161
161
|
__args__['roleName'] = role_name
|
162
|
-
opts = pulumi.
|
162
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
163
163
|
__ret__ = pulumi.runtime.invoke_output('vault:appRole/getAuthBackendRoleId:getAuthBackendRoleId', __args__, opts=opts, typ=GetAuthBackendRoleIdResult)
|
164
164
|
return __ret__.apply(lambda __response__: GetAuthBackendRoleIdResult(
|
165
165
|
backend=pulumi.get(__response__, 'backend'),
|
@@ -22,7 +22,6 @@ class AuthBackendStsRoleArgs:
|
|
22
22
|
account_id: pulumi.Input[str],
|
23
23
|
sts_role: pulumi.Input[str],
|
24
24
|
backend: Optional[pulumi.Input[str]] = None,
|
25
|
-
external_id: Optional[pulumi.Input[str]] = None,
|
26
25
|
namespace: Optional[pulumi.Input[str]] = None):
|
27
26
|
"""
|
28
27
|
The set of arguments for constructing a AuthBackendStsRole resource.
|
@@ -31,7 +30,6 @@ class AuthBackendStsRoleArgs:
|
|
31
30
|
by EC2 instances in the account specified by `account_id`.
|
32
31
|
:param pulumi.Input[str] backend: The path the AWS auth backend being configured was
|
33
32
|
mounted at. Defaults to `aws`.
|
34
|
-
:param pulumi.Input[str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
|
35
33
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
36
34
|
The value should not contain leading or trailing forward slashes.
|
37
35
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
@@ -41,8 +39,6 @@ class AuthBackendStsRoleArgs:
|
|
41
39
|
pulumi.set(__self__, "sts_role", sts_role)
|
42
40
|
if backend is not None:
|
43
41
|
pulumi.set(__self__, "backend", backend)
|
44
|
-
if external_id is not None:
|
45
|
-
pulumi.set(__self__, "external_id", external_id)
|
46
42
|
if namespace is not None:
|
47
43
|
pulumi.set(__self__, "namespace", namespace)
|
48
44
|
|
@@ -84,18 +80,6 @@ class AuthBackendStsRoleArgs:
|
|
84
80
|
def backend(self, value: Optional[pulumi.Input[str]]):
|
85
81
|
pulumi.set(self, "backend", value)
|
86
82
|
|
87
|
-
@property
|
88
|
-
@pulumi.getter(name="externalId")
|
89
|
-
def external_id(self) -> Optional[pulumi.Input[str]]:
|
90
|
-
"""
|
91
|
-
External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
|
92
|
-
"""
|
93
|
-
return pulumi.get(self, "external_id")
|
94
|
-
|
95
|
-
@external_id.setter
|
96
|
-
def external_id(self, value: Optional[pulumi.Input[str]]):
|
97
|
-
pulumi.set(self, "external_id", value)
|
98
|
-
|
99
83
|
@property
|
100
84
|
@pulumi.getter
|
101
85
|
def namespace(self) -> Optional[pulumi.Input[str]]:
|
@@ -117,7 +101,6 @@ class _AuthBackendStsRoleState:
|
|
117
101
|
def __init__(__self__, *,
|
118
102
|
account_id: Optional[pulumi.Input[str]] = None,
|
119
103
|
backend: Optional[pulumi.Input[str]] = None,
|
120
|
-
external_id: Optional[pulumi.Input[str]] = None,
|
121
104
|
namespace: Optional[pulumi.Input[str]] = None,
|
122
105
|
sts_role: Optional[pulumi.Input[str]] = None):
|
123
106
|
"""
|
@@ -125,7 +108,6 @@ class _AuthBackendStsRoleState:
|
|
125
108
|
:param pulumi.Input[str] account_id: The AWS account ID to configure the STS role for.
|
126
109
|
:param pulumi.Input[str] backend: The path the AWS auth backend being configured was
|
127
110
|
mounted at. Defaults to `aws`.
|
128
|
-
:param pulumi.Input[str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
|
129
111
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
130
112
|
The value should not contain leading or trailing forward slashes.
|
131
113
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
@@ -137,8 +119,6 @@ class _AuthBackendStsRoleState:
|
|
137
119
|
pulumi.set(__self__, "account_id", account_id)
|
138
120
|
if backend is not None:
|
139
121
|
pulumi.set(__self__, "backend", backend)
|
140
|
-
if external_id is not None:
|
141
|
-
pulumi.set(__self__, "external_id", external_id)
|
142
122
|
if namespace is not None:
|
143
123
|
pulumi.set(__self__, "namespace", namespace)
|
144
124
|
if sts_role is not None:
|
@@ -169,18 +149,6 @@ class _AuthBackendStsRoleState:
|
|
169
149
|
def backend(self, value: Optional[pulumi.Input[str]]):
|
170
150
|
pulumi.set(self, "backend", value)
|
171
151
|
|
172
|
-
@property
|
173
|
-
@pulumi.getter(name="externalId")
|
174
|
-
def external_id(self) -> Optional[pulumi.Input[str]]:
|
175
|
-
"""
|
176
|
-
External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
|
177
|
-
"""
|
178
|
-
return pulumi.get(self, "external_id")
|
179
|
-
|
180
|
-
@external_id.setter
|
181
|
-
def external_id(self, value: Optional[pulumi.Input[str]]):
|
182
|
-
pulumi.set(self, "external_id", value)
|
183
|
-
|
184
152
|
@property
|
185
153
|
@pulumi.getter
|
186
154
|
def namespace(self) -> Optional[pulumi.Input[str]]:
|
@@ -217,7 +185,6 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
217
185
|
opts: Optional[pulumi.ResourceOptions] = None,
|
218
186
|
account_id: Optional[pulumi.Input[str]] = None,
|
219
187
|
backend: Optional[pulumi.Input[str]] = None,
|
220
|
-
external_id: Optional[pulumi.Input[str]] = None,
|
221
188
|
namespace: Optional[pulumi.Input[str]] = None,
|
222
189
|
sts_role: Optional[pulumi.Input[str]] = None,
|
223
190
|
__props__=None):
|
@@ -248,7 +215,6 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
248
215
|
:param pulumi.Input[str] account_id: The AWS account ID to configure the STS role for.
|
249
216
|
:param pulumi.Input[str] backend: The path the AWS auth backend being configured was
|
250
217
|
mounted at. Defaults to `aws`.
|
251
|
-
:param pulumi.Input[str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
|
252
218
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
253
219
|
The value should not contain leading or trailing forward slashes.
|
254
220
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
@@ -301,7 +267,6 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
301
267
|
opts: Optional[pulumi.ResourceOptions] = None,
|
302
268
|
account_id: Optional[pulumi.Input[str]] = None,
|
303
269
|
backend: Optional[pulumi.Input[str]] = None,
|
304
|
-
external_id: Optional[pulumi.Input[str]] = None,
|
305
270
|
namespace: Optional[pulumi.Input[str]] = None,
|
306
271
|
sts_role: Optional[pulumi.Input[str]] = None,
|
307
272
|
__props__=None):
|
@@ -317,7 +282,6 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
317
282
|
raise TypeError("Missing required property 'account_id'")
|
318
283
|
__props__.__dict__["account_id"] = account_id
|
319
284
|
__props__.__dict__["backend"] = backend
|
320
|
-
__props__.__dict__["external_id"] = external_id
|
321
285
|
__props__.__dict__["namespace"] = namespace
|
322
286
|
if sts_role is None and not opts.urn:
|
323
287
|
raise TypeError("Missing required property 'sts_role'")
|
@@ -334,7 +298,6 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
334
298
|
opts: Optional[pulumi.ResourceOptions] = None,
|
335
299
|
account_id: Optional[pulumi.Input[str]] = None,
|
336
300
|
backend: Optional[pulumi.Input[str]] = None,
|
337
|
-
external_id: Optional[pulumi.Input[str]] = None,
|
338
301
|
namespace: Optional[pulumi.Input[str]] = None,
|
339
302
|
sts_role: Optional[pulumi.Input[str]] = None) -> 'AuthBackendStsRole':
|
340
303
|
"""
|
@@ -347,7 +310,6 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
347
310
|
:param pulumi.Input[str] account_id: The AWS account ID to configure the STS role for.
|
348
311
|
:param pulumi.Input[str] backend: The path the AWS auth backend being configured was
|
349
312
|
mounted at. Defaults to `aws`.
|
350
|
-
:param pulumi.Input[str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
|
351
313
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
352
314
|
The value should not contain leading or trailing forward slashes.
|
353
315
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
@@ -361,7 +323,6 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
361
323
|
|
362
324
|
__props__.__dict__["account_id"] = account_id
|
363
325
|
__props__.__dict__["backend"] = backend
|
364
|
-
__props__.__dict__["external_id"] = external_id
|
365
326
|
__props__.__dict__["namespace"] = namespace
|
366
327
|
__props__.__dict__["sts_role"] = sts_role
|
367
328
|
return AuthBackendStsRole(resource_name, opts=opts, __props__=__props__)
|
@@ -383,14 +344,6 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
383
344
|
"""
|
384
345
|
return pulumi.get(self, "backend")
|
385
346
|
|
386
|
-
@property
|
387
|
-
@pulumi.getter(name="externalId")
|
388
|
-
def external_id(self) -> pulumi.Output[Optional[str]]:
|
389
|
-
"""
|
390
|
-
External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
|
391
|
-
"""
|
392
|
-
return pulumi.get(self, "external_id")
|
393
|
-
|
394
347
|
@property
|
395
348
|
@pulumi.getter
|
396
349
|
def namespace(self) -> pulumi.Output[Optional[str]]:
|
@@ -258,7 +258,7 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
|
|
258
258
|
role_arn: Optional[pulumi.Input[Optional[str]]] = None,
|
259
259
|
ttl: Optional[pulumi.Input[Optional[str]]] = None,
|
260
260
|
type: Optional[pulumi.Input[Optional[str]]] = None,
|
261
|
-
opts: Optional[
|
261
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAccessCredentialsResult]:
|
262
262
|
"""
|
263
263
|
## Example Usage
|
264
264
|
|
@@ -291,7 +291,7 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
|
|
291
291
|
__args__['roleArn'] = role_arn
|
292
292
|
__args__['ttl'] = ttl
|
293
293
|
__args__['type'] = type
|
294
|
-
opts = pulumi.
|
294
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
295
295
|
__ret__ = pulumi.runtime.invoke_output('vault:aws/getAccessCredentials:getAccessCredentials', __args__, opts=opts, typ=GetAccessCredentialsResult)
|
296
296
|
return __ret__.apply(lambda __response__: GetAccessCredentialsResult(
|
297
297
|
access_key=pulumi.get(__response__, 'access_key'),
|
@@ -118,7 +118,7 @@ def get_static_access_credentials(backend: Optional[str] = None,
|
|
118
118
|
def get_static_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
|
119
119
|
name: Optional[pulumi.Input[str]] = None,
|
120
120
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
121
|
-
opts: Optional[
|
121
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetStaticAccessCredentialsResult]:
|
122
122
|
"""
|
123
123
|
Use this data source to access information about an existing resource.
|
124
124
|
"""
|
@@ -126,7 +126,7 @@ def get_static_access_credentials_output(backend: Optional[pulumi.Input[str]] =
|
|
126
126
|
__args__['backend'] = backend
|
127
127
|
__args__['name'] = name
|
128
128
|
__args__['namespace'] = namespace
|
129
|
-
opts = pulumi.
|
129
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
130
130
|
__ret__ = pulumi.runtime.invoke_output('vault:aws/getStaticAccessCredentials:getStaticAccessCredentials', __args__, opts=opts, typ=GetStaticAccessCredentialsResult)
|
131
131
|
return __ret__.apply(lambda __response__: GetStaticAccessCredentialsResult(
|
132
132
|
access_key=pulumi.get(__response__, 'access_key'),
|
@@ -35,9 +35,6 @@ class SecretBackendArgs:
|
|
35
35
|
role_arn: Optional[pulumi.Input[str]] = None,
|
36
36
|
secret_key: Optional[pulumi.Input[str]] = None,
|
37
37
|
sts_endpoint: Optional[pulumi.Input[str]] = None,
|
38
|
-
sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
39
|
-
sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
40
|
-
sts_region: Optional[pulumi.Input[str]] = None,
|
41
38
|
username_template: Optional[pulumi.Input[str]] = None):
|
42
39
|
"""
|
43
40
|
The set of arguments for constructing a SecretBackend resource.
|
@@ -74,9 +71,6 @@ class SecretBackendArgs:
|
|
74
71
|
```
|
75
72
|
:param pulumi.Input[str] secret_key: The AWS Secret Access Key to use when generating new credentials.
|
76
73
|
:param pulumi.Input[str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
|
77
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_endpoints: Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
|
78
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_regions: Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
|
79
|
-
:param pulumi.Input[str] sts_region: Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
|
80
74
|
:param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
|
81
75
|
"""
|
82
76
|
if access_key is not None:
|
@@ -111,12 +105,6 @@ class SecretBackendArgs:
|
|
111
105
|
pulumi.set(__self__, "secret_key", secret_key)
|
112
106
|
if sts_endpoint is not None:
|
113
107
|
pulumi.set(__self__, "sts_endpoint", sts_endpoint)
|
114
|
-
if sts_fallback_endpoints is not None:
|
115
|
-
pulumi.set(__self__, "sts_fallback_endpoints", sts_fallback_endpoints)
|
116
|
-
if sts_fallback_regions is not None:
|
117
|
-
pulumi.set(__self__, "sts_fallback_regions", sts_fallback_regions)
|
118
|
-
if sts_region is not None:
|
119
|
-
pulumi.set(__self__, "sts_region", sts_region)
|
120
108
|
if username_template is not None:
|
121
109
|
pulumi.set(__self__, "username_template", username_template)
|
122
110
|
|
@@ -329,42 +317,6 @@ class SecretBackendArgs:
|
|
329
317
|
def sts_endpoint(self, value: Optional[pulumi.Input[str]]):
|
330
318
|
pulumi.set(self, "sts_endpoint", value)
|
331
319
|
|
332
|
-
@property
|
333
|
-
@pulumi.getter(name="stsFallbackEndpoints")
|
334
|
-
def sts_fallback_endpoints(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
335
|
-
"""
|
336
|
-
Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
|
337
|
-
"""
|
338
|
-
return pulumi.get(self, "sts_fallback_endpoints")
|
339
|
-
|
340
|
-
@sts_fallback_endpoints.setter
|
341
|
-
def sts_fallback_endpoints(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
342
|
-
pulumi.set(self, "sts_fallback_endpoints", value)
|
343
|
-
|
344
|
-
@property
|
345
|
-
@pulumi.getter(name="stsFallbackRegions")
|
346
|
-
def sts_fallback_regions(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
347
|
-
"""
|
348
|
-
Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
|
349
|
-
"""
|
350
|
-
return pulumi.get(self, "sts_fallback_regions")
|
351
|
-
|
352
|
-
@sts_fallback_regions.setter
|
353
|
-
def sts_fallback_regions(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
354
|
-
pulumi.set(self, "sts_fallback_regions", value)
|
355
|
-
|
356
|
-
@property
|
357
|
-
@pulumi.getter(name="stsRegion")
|
358
|
-
def sts_region(self) -> Optional[pulumi.Input[str]]:
|
359
|
-
"""
|
360
|
-
Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
|
361
|
-
"""
|
362
|
-
return pulumi.get(self, "sts_region")
|
363
|
-
|
364
|
-
@sts_region.setter
|
365
|
-
def sts_region(self, value: Optional[pulumi.Input[str]]):
|
366
|
-
pulumi.set(self, "sts_region", value)
|
367
|
-
|
368
320
|
@property
|
369
321
|
@pulumi.getter(name="usernameTemplate")
|
370
322
|
def username_template(self) -> Optional[pulumi.Input[str]]:
|
@@ -397,9 +349,6 @@ class _SecretBackendState:
|
|
397
349
|
role_arn: Optional[pulumi.Input[str]] = None,
|
398
350
|
secret_key: Optional[pulumi.Input[str]] = None,
|
399
351
|
sts_endpoint: Optional[pulumi.Input[str]] = None,
|
400
|
-
sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
401
|
-
sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
402
|
-
sts_region: Optional[pulumi.Input[str]] = None,
|
403
352
|
username_template: Optional[pulumi.Input[str]] = None):
|
404
353
|
"""
|
405
354
|
Input properties used for looking up and filtering SecretBackend resources.
|
@@ -436,9 +385,6 @@ class _SecretBackendState:
|
|
436
385
|
```
|
437
386
|
:param pulumi.Input[str] secret_key: The AWS Secret Access Key to use when generating new credentials.
|
438
387
|
:param pulumi.Input[str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
|
439
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_endpoints: Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
|
440
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_regions: Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
|
441
|
-
:param pulumi.Input[str] sts_region: Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
|
442
388
|
:param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
|
443
389
|
"""
|
444
390
|
if access_key is not None:
|
@@ -473,12 +419,6 @@ class _SecretBackendState:
|
|
473
419
|
pulumi.set(__self__, "secret_key", secret_key)
|
474
420
|
if sts_endpoint is not None:
|
475
421
|
pulumi.set(__self__, "sts_endpoint", sts_endpoint)
|
476
|
-
if sts_fallback_endpoints is not None:
|
477
|
-
pulumi.set(__self__, "sts_fallback_endpoints", sts_fallback_endpoints)
|
478
|
-
if sts_fallback_regions is not None:
|
479
|
-
pulumi.set(__self__, "sts_fallback_regions", sts_fallback_regions)
|
480
|
-
if sts_region is not None:
|
481
|
-
pulumi.set(__self__, "sts_region", sts_region)
|
482
422
|
if username_template is not None:
|
483
423
|
pulumi.set(__self__, "username_template", username_template)
|
484
424
|
|
@@ -691,42 +631,6 @@ class _SecretBackendState:
|
|
691
631
|
def sts_endpoint(self, value: Optional[pulumi.Input[str]]):
|
692
632
|
pulumi.set(self, "sts_endpoint", value)
|
693
633
|
|
694
|
-
@property
|
695
|
-
@pulumi.getter(name="stsFallbackEndpoints")
|
696
|
-
def sts_fallback_endpoints(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
697
|
-
"""
|
698
|
-
Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
|
699
|
-
"""
|
700
|
-
return pulumi.get(self, "sts_fallback_endpoints")
|
701
|
-
|
702
|
-
@sts_fallback_endpoints.setter
|
703
|
-
def sts_fallback_endpoints(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
704
|
-
pulumi.set(self, "sts_fallback_endpoints", value)
|
705
|
-
|
706
|
-
@property
|
707
|
-
@pulumi.getter(name="stsFallbackRegions")
|
708
|
-
def sts_fallback_regions(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
709
|
-
"""
|
710
|
-
Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
|
711
|
-
"""
|
712
|
-
return pulumi.get(self, "sts_fallback_regions")
|
713
|
-
|
714
|
-
@sts_fallback_regions.setter
|
715
|
-
def sts_fallback_regions(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
716
|
-
pulumi.set(self, "sts_fallback_regions", value)
|
717
|
-
|
718
|
-
@property
|
719
|
-
@pulumi.getter(name="stsRegion")
|
720
|
-
def sts_region(self) -> Optional[pulumi.Input[str]]:
|
721
|
-
"""
|
722
|
-
Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
|
723
|
-
"""
|
724
|
-
return pulumi.get(self, "sts_region")
|
725
|
-
|
726
|
-
@sts_region.setter
|
727
|
-
def sts_region(self, value: Optional[pulumi.Input[str]]):
|
728
|
-
pulumi.set(self, "sts_region", value)
|
729
|
-
|
730
634
|
@property
|
731
635
|
@pulumi.getter(name="usernameTemplate")
|
732
636
|
def username_template(self) -> Optional[pulumi.Input[str]]:
|
@@ -761,9 +665,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
761
665
|
role_arn: Optional[pulumi.Input[str]] = None,
|
762
666
|
secret_key: Optional[pulumi.Input[str]] = None,
|
763
667
|
sts_endpoint: Optional[pulumi.Input[str]] = None,
|
764
|
-
sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
765
|
-
sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
766
|
-
sts_region: Optional[pulumi.Input[str]] = None,
|
767
668
|
username_template: Optional[pulumi.Input[str]] = None,
|
768
669
|
__props__=None):
|
769
670
|
"""
|
@@ -810,9 +711,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
810
711
|
```
|
811
712
|
:param pulumi.Input[str] secret_key: The AWS Secret Access Key to use when generating new credentials.
|
812
713
|
:param pulumi.Input[str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
|
813
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_endpoints: Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
|
814
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_regions: Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
|
815
|
-
:param pulumi.Input[str] sts_region: Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
|
816
714
|
:param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
|
817
715
|
"""
|
818
716
|
...
|
@@ -861,9 +759,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
861
759
|
role_arn: Optional[pulumi.Input[str]] = None,
|
862
760
|
secret_key: Optional[pulumi.Input[str]] = None,
|
863
761
|
sts_endpoint: Optional[pulumi.Input[str]] = None,
|
864
|
-
sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
865
|
-
sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
866
|
-
sts_region: Optional[pulumi.Input[str]] = None,
|
867
762
|
username_template: Optional[pulumi.Input[str]] = None,
|
868
763
|
__props__=None):
|
869
764
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
@@ -890,9 +785,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
890
785
|
__props__.__dict__["role_arn"] = role_arn
|
891
786
|
__props__.__dict__["secret_key"] = None if secret_key is None else pulumi.Output.secret(secret_key)
|
892
787
|
__props__.__dict__["sts_endpoint"] = sts_endpoint
|
893
|
-
__props__.__dict__["sts_fallback_endpoints"] = sts_fallback_endpoints
|
894
|
-
__props__.__dict__["sts_fallback_regions"] = sts_fallback_regions
|
895
|
-
__props__.__dict__["sts_region"] = sts_region
|
896
788
|
__props__.__dict__["username_template"] = username_template
|
897
789
|
secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["accessKey", "secretKey"])
|
898
790
|
opts = pulumi.ResourceOptions.merge(opts, secret_opts)
|
@@ -922,9 +814,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
922
814
|
role_arn: Optional[pulumi.Input[str]] = None,
|
923
815
|
secret_key: Optional[pulumi.Input[str]] = None,
|
924
816
|
sts_endpoint: Optional[pulumi.Input[str]] = None,
|
925
|
-
sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
926
|
-
sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
927
|
-
sts_region: Optional[pulumi.Input[str]] = None,
|
928
817
|
username_template: Optional[pulumi.Input[str]] = None) -> 'SecretBackend':
|
929
818
|
"""
|
930
819
|
Get an existing SecretBackend resource's state with the given name, id, and optional extra
|
@@ -966,9 +855,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
966
855
|
```
|
967
856
|
:param pulumi.Input[str] secret_key: The AWS Secret Access Key to use when generating new credentials.
|
968
857
|
:param pulumi.Input[str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
|
969
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_endpoints: Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
|
970
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_regions: Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
|
971
|
-
:param pulumi.Input[str] sts_region: Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
|
972
858
|
:param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
|
973
859
|
"""
|
974
860
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -991,9 +877,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
991
877
|
__props__.__dict__["role_arn"] = role_arn
|
992
878
|
__props__.__dict__["secret_key"] = secret_key
|
993
879
|
__props__.__dict__["sts_endpoint"] = sts_endpoint
|
994
|
-
__props__.__dict__["sts_fallback_endpoints"] = sts_fallback_endpoints
|
995
|
-
__props__.__dict__["sts_fallback_regions"] = sts_fallback_regions
|
996
|
-
__props__.__dict__["sts_region"] = sts_region
|
997
880
|
__props__.__dict__["username_template"] = username_template
|
998
881
|
return SecretBackend(resource_name, opts=opts, __props__=__props__)
|
999
882
|
|
@@ -1142,30 +1025,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
1142
1025
|
"""
|
1143
1026
|
return pulumi.get(self, "sts_endpoint")
|
1144
1027
|
|
1145
|
-
@property
|
1146
|
-
@pulumi.getter(name="stsFallbackEndpoints")
|
1147
|
-
def sts_fallback_endpoints(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1148
|
-
"""
|
1149
|
-
Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
|
1150
|
-
"""
|
1151
|
-
return pulumi.get(self, "sts_fallback_endpoints")
|
1152
|
-
|
1153
|
-
@property
|
1154
|
-
@pulumi.getter(name="stsFallbackRegions")
|
1155
|
-
def sts_fallback_regions(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1156
|
-
"""
|
1157
|
-
Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
|
1158
|
-
"""
|
1159
|
-
return pulumi.get(self, "sts_fallback_regions")
|
1160
|
-
|
1161
|
-
@property
|
1162
|
-
@pulumi.getter(name="stsRegion")
|
1163
|
-
def sts_region(self) -> pulumi.Output[Optional[str]]:
|
1164
|
-
"""
|
1165
|
-
Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
|
1166
|
-
"""
|
1167
|
-
return pulumi.get(self, "sts_region")
|
1168
|
-
|
1169
1028
|
@property
|
1170
1029
|
@pulumi.getter(name="usernameTemplate")
|
1171
1030
|
def username_template(self) -> pulumi.Output[str]:
|
@@ -313,7 +313,7 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
|
|
313
313
|
subscription_id: Optional[pulumi.Input[Optional[str]]] = None,
|
314
314
|
tenant_id: Optional[pulumi.Input[Optional[str]]] = None,
|
315
315
|
validate_creds: Optional[pulumi.Input[Optional[bool]]] = None,
|
316
|
-
opts: Optional[
|
316
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAccessCredentialsResult]:
|
317
317
|
"""
|
318
318
|
## Example Usage
|
319
319
|
|
@@ -378,7 +378,7 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
|
|
378
378
|
__args__['subscriptionId'] = subscription_id
|
379
379
|
__args__['tenantId'] = tenant_id
|
380
380
|
__args__['validateCreds'] = validate_creds
|
381
|
-
opts = pulumi.
|
381
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
382
382
|
__ret__ = pulumi.runtime.invoke_output('vault:azure/getAccessCredentials:getAccessCredentials', __args__, opts=opts, typ=GetAccessCredentialsResult)
|
383
383
|
return __ret__.apply(lambda __response__: GetAccessCredentialsResult(
|
384
384
|
backend=pulumi.get(__response__, 'backend'),
|
pulumi_vault/database/_inputs.py
CHANGED
@@ -2625,10 +2625,6 @@ if not MYPY:
|
|
2625
2625
|
"""
|
2626
2626
|
The root credential password used in the connection URL
|
2627
2627
|
"""
|
2628
|
-
password_authentication: NotRequired[pulumi.Input[str]]
|
2629
|
-
"""
|
2630
|
-
When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
|
2631
|
-
"""
|
2632
2628
|
private_key: NotRequired[pulumi.Input[str]]
|
2633
2629
|
"""
|
2634
2630
|
The secret key used for the x509 client certificate. Must be PEM encoded.
|
@@ -2670,7 +2666,6 @@ class SecretBackendConnectionPostgresqlArgs:
|
|
2670
2666
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
2671
2667
|
max_open_connections: Optional[pulumi.Input[int]] = None,
|
2672
2668
|
password: Optional[pulumi.Input[str]] = None,
|
2673
|
-
password_authentication: Optional[pulumi.Input[str]] = None,
|
2674
2669
|
private_key: Optional[pulumi.Input[str]] = None,
|
2675
2670
|
self_managed: Optional[pulumi.Input[bool]] = None,
|
2676
2671
|
service_account_json: Optional[pulumi.Input[str]] = None,
|
@@ -2686,7 +2681,6 @@ class SecretBackendConnectionPostgresqlArgs:
|
|
2686
2681
|
:param pulumi.Input[int] max_idle_connections: Maximum number of idle connections to the database.
|
2687
2682
|
:param pulumi.Input[int] max_open_connections: Maximum number of open connections to the database.
|
2688
2683
|
:param pulumi.Input[str] password: The root credential password used in the connection URL
|
2689
|
-
:param pulumi.Input[str] password_authentication: When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
|
2690
2684
|
:param pulumi.Input[str] private_key: The secret key used for the x509 client certificate. Must be PEM encoded.
|
2691
2685
|
:param pulumi.Input[bool] self_managed: If set, allows onboarding static roles with a rootless connection configuration.
|
2692
2686
|
:param pulumi.Input[str] service_account_json: A JSON encoded credential for use with IAM authorization
|
@@ -2709,8 +2703,6 @@ class SecretBackendConnectionPostgresqlArgs:
|
|
2709
2703
|
pulumi.set(__self__, "max_open_connections", max_open_connections)
|
2710
2704
|
if password is not None:
|
2711
2705
|
pulumi.set(__self__, "password", password)
|
2712
|
-
if password_authentication is not None:
|
2713
|
-
pulumi.set(__self__, "password_authentication", password_authentication)
|
2714
2706
|
if private_key is not None:
|
2715
2707
|
pulumi.set(__self__, "private_key", private_key)
|
2716
2708
|
if self_managed is not None:
|
@@ -2810,18 +2802,6 @@ class SecretBackendConnectionPostgresqlArgs:
|
|
2810
2802
|
def password(self, value: Optional[pulumi.Input[str]]):
|
2811
2803
|
pulumi.set(self, "password", value)
|
2812
2804
|
|
2813
|
-
@property
|
2814
|
-
@pulumi.getter(name="passwordAuthentication")
|
2815
|
-
def password_authentication(self) -> Optional[pulumi.Input[str]]:
|
2816
|
-
"""
|
2817
|
-
When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
|
2818
|
-
"""
|
2819
|
-
return pulumi.get(self, "password_authentication")
|
2820
|
-
|
2821
|
-
@password_authentication.setter
|
2822
|
-
def password_authentication(self, value: Optional[pulumi.Input[str]]):
|
2823
|
-
pulumi.set(self, "password_authentication", value)
|
2824
|
-
|
2825
2805
|
@property
|
2826
2806
|
@pulumi.getter(name="privateKey")
|
2827
2807
|
def private_key(self) -> Optional[pulumi.Input[str]]:
|
@@ -7723,10 +7703,6 @@ if not MYPY:
|
|
7723
7703
|
"""
|
7724
7704
|
The root credential password used in the connection URL
|
7725
7705
|
"""
|
7726
|
-
password_authentication: NotRequired[pulumi.Input[str]]
|
7727
|
-
"""
|
7728
|
-
When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
|
7729
|
-
"""
|
7730
7706
|
plugin_name: NotRequired[pulumi.Input[str]]
|
7731
7707
|
"""
|
7732
7708
|
Specifies the name of the plugin to use.
|
@@ -7784,7 +7760,6 @@ class SecretsMountPostgresqlArgs:
|
|
7784
7760
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
7785
7761
|
max_open_connections: Optional[pulumi.Input[int]] = None,
|
7786
7762
|
password: Optional[pulumi.Input[str]] = None,
|
7787
|
-
password_authentication: Optional[pulumi.Input[str]] = None,
|
7788
7763
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
7789
7764
|
private_key: Optional[pulumi.Input[str]] = None,
|
7790
7765
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
@@ -7809,7 +7784,6 @@ class SecretsMountPostgresqlArgs:
|
|
7809
7784
|
:param pulumi.Input[int] max_idle_connections: Maximum number of idle connections to the database.
|
7810
7785
|
:param pulumi.Input[int] max_open_connections: Maximum number of open connections to the database.
|
7811
7786
|
:param pulumi.Input[str] password: The root credential password used in the connection URL
|
7812
|
-
:param pulumi.Input[str] password_authentication: When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
|
7813
7787
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
7814
7788
|
:param pulumi.Input[str] private_key: The secret key used for the x509 client certificate. Must be PEM encoded.
|
7815
7789
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
@@ -7841,8 +7815,6 @@ class SecretsMountPostgresqlArgs:
|
|
7841
7815
|
pulumi.set(__self__, "max_open_connections", max_open_connections)
|
7842
7816
|
if password is not None:
|
7843
7817
|
pulumi.set(__self__, "password", password)
|
7844
|
-
if password_authentication is not None:
|
7845
|
-
pulumi.set(__self__, "password_authentication", password_authentication)
|
7846
7818
|
if plugin_name is not None:
|
7847
7819
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
7848
7820
|
if private_key is not None:
|
@@ -7987,18 +7959,6 @@ class SecretsMountPostgresqlArgs:
|
|
7987
7959
|
def password(self, value: Optional[pulumi.Input[str]]):
|
7988
7960
|
pulumi.set(self, "password", value)
|
7989
7961
|
|
7990
|
-
@property
|
7991
|
-
@pulumi.getter(name="passwordAuthentication")
|
7992
|
-
def password_authentication(self) -> Optional[pulumi.Input[str]]:
|
7993
|
-
"""
|
7994
|
-
When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
|
7995
|
-
"""
|
7996
|
-
return pulumi.get(self, "password_authentication")
|
7997
|
-
|
7998
|
-
@password_authentication.setter
|
7999
|
-
def password_authentication(self, value: Optional[pulumi.Input[str]]):
|
8000
|
-
pulumi.set(self, "password_authentication", value)
|
8001
|
-
|
8002
7962
|
@property
|
8003
7963
|
@pulumi.getter(name="pluginName")
|
8004
7964
|
def plugin_name(self) -> Optional[pulumi.Input[str]]:
|