pulumi-vault 6.5.0__py3-none-any.whl → 6.5.0a1732603022__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (57) hide show
  1. pulumi_vault/__init__.py +0 -24
  2. pulumi_vault/ad/get_access_credentials.py +2 -2
  3. pulumi_vault/approle/get_auth_backend_role_id.py +2 -2
  4. pulumi_vault/aws/auth_backend_sts_role.py +0 -47
  5. pulumi_vault/aws/get_access_credentials.py +2 -2
  6. pulumi_vault/aws/get_static_access_credentials.py +2 -2
  7. pulumi_vault/aws/secret_backend.py +0 -141
  8. pulumi_vault/azure/get_access_credentials.py +2 -2
  9. pulumi_vault/database/_inputs.py +0 -40
  10. pulumi_vault/database/outputs.py +0 -28
  11. pulumi_vault/gcp/get_auth_backend_role.py +2 -2
  12. pulumi_vault/generic/get_secret.py +2 -2
  13. pulumi_vault/get_auth_backend.py +2 -2
  14. pulumi_vault/get_auth_backends.py +2 -2
  15. pulumi_vault/get_namespace.py +2 -2
  16. pulumi_vault/get_namespaces.py +2 -2
  17. pulumi_vault/get_nomad_access_token.py +2 -2
  18. pulumi_vault/get_policy_document.py +2 -2
  19. pulumi_vault/get_raft_autopilot_state.py +2 -2
  20. pulumi_vault/identity/get_entity.py +2 -2
  21. pulumi_vault/identity/get_group.py +2 -2
  22. pulumi_vault/identity/get_oidc_client_creds.py +2 -2
  23. pulumi_vault/identity/get_oidc_openid_config.py +2 -2
  24. pulumi_vault/identity/get_oidc_public_keys.py +2 -2
  25. pulumi_vault/kubernetes/get_auth_backend_config.py +2 -2
  26. pulumi_vault/kubernetes/get_auth_backend_role.py +2 -2
  27. pulumi_vault/kubernetes/get_service_account_token.py +2 -2
  28. pulumi_vault/kv/get_secret.py +2 -2
  29. pulumi_vault/kv/get_secret_subkeys_v2.py +2 -2
  30. pulumi_vault/kv/get_secret_v2.py +2 -2
  31. pulumi_vault/kv/get_secrets_list.py +2 -2
  32. pulumi_vault/kv/get_secrets_list_v2.py +2 -2
  33. pulumi_vault/ldap/get_dynamic_credentials.py +2 -2
  34. pulumi_vault/ldap/get_static_credentials.py +2 -2
  35. pulumi_vault/pkisecret/__init__.py +0 -4
  36. pulumi_vault/pkisecret/_inputs.py +0 -34
  37. pulumi_vault/pkisecret/get_backend_config_est.py +2 -2
  38. pulumi_vault/pkisecret/get_backend_issuer.py +2 -2
  39. pulumi_vault/pkisecret/get_backend_issuers.py +2 -2
  40. pulumi_vault/pkisecret/get_backend_key.py +2 -2
  41. pulumi_vault/pkisecret/get_backend_keys.py +2 -2
  42. pulumi_vault/pkisecret/outputs.py +0 -40
  43. pulumi_vault/pkisecret/secret_backend_role.py +0 -47
  44. pulumi_vault/pulumi-plugin.json +1 -1
  45. pulumi_vault/ssh/secret_backend_role.py +0 -27
  46. pulumi_vault/transform/get_decode.py +2 -2
  47. pulumi_vault/transform/get_encode.py +2 -2
  48. pulumi_vault/transit/get_decrypt.py +2 -2
  49. pulumi_vault/transit/get_encrypt.py +2 -2
  50. {pulumi_vault-6.5.0.dist-info → pulumi_vault-6.5.0a1732603022.dist-info}/METADATA +4 -4
  51. {pulumi_vault-6.5.0.dist-info → pulumi_vault-6.5.0a1732603022.dist-info}/RECORD +53 -57
  52. {pulumi_vault-6.5.0.dist-info → pulumi_vault-6.5.0a1732603022.dist-info}/WHEEL +1 -1
  53. pulumi_vault/pkisecret/backend_acme_eab.py +0 -549
  54. pulumi_vault/pkisecret/backend_config_acme.py +0 -642
  55. pulumi_vault/pkisecret/backend_config_cmpv2.py +0 -525
  56. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +0 -209
  57. {pulumi_vault-6.5.0.dist-info → pulumi_vault-6.5.0a1732603022.dist-info}/top_level.txt +0 -0
pulumi_vault/__init__.py CHANGED
@@ -1013,22 +1013,6 @@ _utilities.register(
1013
1013
  "vault:okta/authBackendUser:AuthBackendUser": "AuthBackendUser"
1014
1014
  }
1015
1015
  },
1016
- {
1017
- "pkg": "vault",
1018
- "mod": "pkiSecret/backendAcmeEab",
1019
- "fqn": "pulumi_vault.pkisecret",
1020
- "classes": {
1021
- "vault:pkiSecret/backendAcmeEab:BackendAcmeEab": "BackendAcmeEab"
1022
- }
1023
- },
1024
- {
1025
- "pkg": "vault",
1026
- "mod": "pkiSecret/backendConfigAcme",
1027
- "fqn": "pulumi_vault.pkisecret",
1028
- "classes": {
1029
- "vault:pkiSecret/backendConfigAcme:BackendConfigAcme": "BackendConfigAcme"
1030
- }
1031
- },
1032
1016
  {
1033
1017
  "pkg": "vault",
1034
1018
  "mod": "pkiSecret/backendConfigCluster",
@@ -1037,14 +1021,6 @@ _utilities.register(
1037
1021
  "vault:pkiSecret/backendConfigCluster:BackendConfigCluster": "BackendConfigCluster"
1038
1022
  }
1039
1023
  },
1040
- {
1041
- "pkg": "vault",
1042
- "mod": "pkiSecret/backendConfigCmpv2",
1043
- "fqn": "pulumi_vault.pkisecret",
1044
- "classes": {
1045
- "vault:pkiSecret/backendConfigCmpv2:BackendConfigCmpv2": "BackendConfigCmpv2"
1046
- }
1047
- },
1048
1024
  {
1049
1025
  "pkg": "vault",
1050
1026
  "mod": "pkiSecret/backendConfigEst",
@@ -147,7 +147,7 @@ def get_access_credentials(backend: Optional[str] = None,
147
147
  def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
148
148
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
149
149
  role: Optional[pulumi.Input[str]] = None,
150
- opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAccessCredentialsResult]:
150
+ opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAccessCredentialsResult]:
151
151
  """
152
152
  ## Example Usage
153
153
 
@@ -165,7 +165,7 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
165
165
  __args__['backend'] = backend
166
166
  __args__['namespace'] = namespace
167
167
  __args__['role'] = role
168
- opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
168
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
169
169
  __ret__ = pulumi.runtime.invoke_output('vault:ad/getAccessCredentials:getAccessCredentials', __args__, opts=opts, typ=GetAccessCredentialsResult)
170
170
  return __ret__.apply(lambda __response__: GetAccessCredentialsResult(
171
171
  backend=pulumi.get(__response__, 'backend'),
@@ -131,7 +131,7 @@ def get_auth_backend_role_id(backend: Optional[str] = None,
131
131
  def get_auth_backend_role_id_output(backend: Optional[pulumi.Input[Optional[str]]] = None,
132
132
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
133
133
  role_name: Optional[pulumi.Input[str]] = None,
134
- opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAuthBackendRoleIdResult]:
134
+ opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendRoleIdResult]:
135
135
  """
136
136
  Reads the Role ID of an AppRole from a Vault server.
137
137
 
@@ -159,7 +159,7 @@ def get_auth_backend_role_id_output(backend: Optional[pulumi.Input[Optional[str]
159
159
  __args__['backend'] = backend
160
160
  __args__['namespace'] = namespace
161
161
  __args__['roleName'] = role_name
162
- opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
162
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
163
163
  __ret__ = pulumi.runtime.invoke_output('vault:appRole/getAuthBackendRoleId:getAuthBackendRoleId', __args__, opts=opts, typ=GetAuthBackendRoleIdResult)
164
164
  return __ret__.apply(lambda __response__: GetAuthBackendRoleIdResult(
165
165
  backend=pulumi.get(__response__, 'backend'),
@@ -22,7 +22,6 @@ class AuthBackendStsRoleArgs:
22
22
  account_id: pulumi.Input[str],
23
23
  sts_role: pulumi.Input[str],
24
24
  backend: Optional[pulumi.Input[str]] = None,
25
- external_id: Optional[pulumi.Input[str]] = None,
26
25
  namespace: Optional[pulumi.Input[str]] = None):
27
26
  """
28
27
  The set of arguments for constructing a AuthBackendStsRole resource.
@@ -31,7 +30,6 @@ class AuthBackendStsRoleArgs:
31
30
  by EC2 instances in the account specified by `account_id`.
32
31
  :param pulumi.Input[str] backend: The path the AWS auth backend being configured was
33
32
  mounted at. Defaults to `aws`.
34
- :param pulumi.Input[str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
35
33
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
36
34
  The value should not contain leading or trailing forward slashes.
37
35
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -41,8 +39,6 @@ class AuthBackendStsRoleArgs:
41
39
  pulumi.set(__self__, "sts_role", sts_role)
42
40
  if backend is not None:
43
41
  pulumi.set(__self__, "backend", backend)
44
- if external_id is not None:
45
- pulumi.set(__self__, "external_id", external_id)
46
42
  if namespace is not None:
47
43
  pulumi.set(__self__, "namespace", namespace)
48
44
 
@@ -84,18 +80,6 @@ class AuthBackendStsRoleArgs:
84
80
  def backend(self, value: Optional[pulumi.Input[str]]):
85
81
  pulumi.set(self, "backend", value)
86
82
 
87
- @property
88
- @pulumi.getter(name="externalId")
89
- def external_id(self) -> Optional[pulumi.Input[str]]:
90
- """
91
- External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
92
- """
93
- return pulumi.get(self, "external_id")
94
-
95
- @external_id.setter
96
- def external_id(self, value: Optional[pulumi.Input[str]]):
97
- pulumi.set(self, "external_id", value)
98
-
99
83
  @property
100
84
  @pulumi.getter
101
85
  def namespace(self) -> Optional[pulumi.Input[str]]:
@@ -117,7 +101,6 @@ class _AuthBackendStsRoleState:
117
101
  def __init__(__self__, *,
118
102
  account_id: Optional[pulumi.Input[str]] = None,
119
103
  backend: Optional[pulumi.Input[str]] = None,
120
- external_id: Optional[pulumi.Input[str]] = None,
121
104
  namespace: Optional[pulumi.Input[str]] = None,
122
105
  sts_role: Optional[pulumi.Input[str]] = None):
123
106
  """
@@ -125,7 +108,6 @@ class _AuthBackendStsRoleState:
125
108
  :param pulumi.Input[str] account_id: The AWS account ID to configure the STS role for.
126
109
  :param pulumi.Input[str] backend: The path the AWS auth backend being configured was
127
110
  mounted at. Defaults to `aws`.
128
- :param pulumi.Input[str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
129
111
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
130
112
  The value should not contain leading or trailing forward slashes.
131
113
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -137,8 +119,6 @@ class _AuthBackendStsRoleState:
137
119
  pulumi.set(__self__, "account_id", account_id)
138
120
  if backend is not None:
139
121
  pulumi.set(__self__, "backend", backend)
140
- if external_id is not None:
141
- pulumi.set(__self__, "external_id", external_id)
142
122
  if namespace is not None:
143
123
  pulumi.set(__self__, "namespace", namespace)
144
124
  if sts_role is not None:
@@ -169,18 +149,6 @@ class _AuthBackendStsRoleState:
169
149
  def backend(self, value: Optional[pulumi.Input[str]]):
170
150
  pulumi.set(self, "backend", value)
171
151
 
172
- @property
173
- @pulumi.getter(name="externalId")
174
- def external_id(self) -> Optional[pulumi.Input[str]]:
175
- """
176
- External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
177
- """
178
- return pulumi.get(self, "external_id")
179
-
180
- @external_id.setter
181
- def external_id(self, value: Optional[pulumi.Input[str]]):
182
- pulumi.set(self, "external_id", value)
183
-
184
152
  @property
185
153
  @pulumi.getter
186
154
  def namespace(self) -> Optional[pulumi.Input[str]]:
@@ -217,7 +185,6 @@ class AuthBackendStsRole(pulumi.CustomResource):
217
185
  opts: Optional[pulumi.ResourceOptions] = None,
218
186
  account_id: Optional[pulumi.Input[str]] = None,
219
187
  backend: Optional[pulumi.Input[str]] = None,
220
- external_id: Optional[pulumi.Input[str]] = None,
221
188
  namespace: Optional[pulumi.Input[str]] = None,
222
189
  sts_role: Optional[pulumi.Input[str]] = None,
223
190
  __props__=None):
@@ -248,7 +215,6 @@ class AuthBackendStsRole(pulumi.CustomResource):
248
215
  :param pulumi.Input[str] account_id: The AWS account ID to configure the STS role for.
249
216
  :param pulumi.Input[str] backend: The path the AWS auth backend being configured was
250
217
  mounted at. Defaults to `aws`.
251
- :param pulumi.Input[str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
252
218
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
253
219
  The value should not contain leading or trailing forward slashes.
254
220
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -301,7 +267,6 @@ class AuthBackendStsRole(pulumi.CustomResource):
301
267
  opts: Optional[pulumi.ResourceOptions] = None,
302
268
  account_id: Optional[pulumi.Input[str]] = None,
303
269
  backend: Optional[pulumi.Input[str]] = None,
304
- external_id: Optional[pulumi.Input[str]] = None,
305
270
  namespace: Optional[pulumi.Input[str]] = None,
306
271
  sts_role: Optional[pulumi.Input[str]] = None,
307
272
  __props__=None):
@@ -317,7 +282,6 @@ class AuthBackendStsRole(pulumi.CustomResource):
317
282
  raise TypeError("Missing required property 'account_id'")
318
283
  __props__.__dict__["account_id"] = account_id
319
284
  __props__.__dict__["backend"] = backend
320
- __props__.__dict__["external_id"] = external_id
321
285
  __props__.__dict__["namespace"] = namespace
322
286
  if sts_role is None and not opts.urn:
323
287
  raise TypeError("Missing required property 'sts_role'")
@@ -334,7 +298,6 @@ class AuthBackendStsRole(pulumi.CustomResource):
334
298
  opts: Optional[pulumi.ResourceOptions] = None,
335
299
  account_id: Optional[pulumi.Input[str]] = None,
336
300
  backend: Optional[pulumi.Input[str]] = None,
337
- external_id: Optional[pulumi.Input[str]] = None,
338
301
  namespace: Optional[pulumi.Input[str]] = None,
339
302
  sts_role: Optional[pulumi.Input[str]] = None) -> 'AuthBackendStsRole':
340
303
  """
@@ -347,7 +310,6 @@ class AuthBackendStsRole(pulumi.CustomResource):
347
310
  :param pulumi.Input[str] account_id: The AWS account ID to configure the STS role for.
348
311
  :param pulumi.Input[str] backend: The path the AWS auth backend being configured was
349
312
  mounted at. Defaults to `aws`.
350
- :param pulumi.Input[str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
351
313
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
352
314
  The value should not contain leading or trailing forward slashes.
353
315
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -361,7 +323,6 @@ class AuthBackendStsRole(pulumi.CustomResource):
361
323
 
362
324
  __props__.__dict__["account_id"] = account_id
363
325
  __props__.__dict__["backend"] = backend
364
- __props__.__dict__["external_id"] = external_id
365
326
  __props__.__dict__["namespace"] = namespace
366
327
  __props__.__dict__["sts_role"] = sts_role
367
328
  return AuthBackendStsRole(resource_name, opts=opts, __props__=__props__)
@@ -383,14 +344,6 @@ class AuthBackendStsRole(pulumi.CustomResource):
383
344
  """
384
345
  return pulumi.get(self, "backend")
385
346
 
386
- @property
387
- @pulumi.getter(name="externalId")
388
- def external_id(self) -> pulumi.Output[Optional[str]]:
389
- """
390
- External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
391
- """
392
- return pulumi.get(self, "external_id")
393
-
394
347
  @property
395
348
  @pulumi.getter
396
349
  def namespace(self) -> pulumi.Output[Optional[str]]:
@@ -258,7 +258,7 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
258
258
  role_arn: Optional[pulumi.Input[Optional[str]]] = None,
259
259
  ttl: Optional[pulumi.Input[Optional[str]]] = None,
260
260
  type: Optional[pulumi.Input[Optional[str]]] = None,
261
- opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAccessCredentialsResult]:
261
+ opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAccessCredentialsResult]:
262
262
  """
263
263
  ## Example Usage
264
264
 
@@ -291,7 +291,7 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
291
291
  __args__['roleArn'] = role_arn
292
292
  __args__['ttl'] = ttl
293
293
  __args__['type'] = type
294
- opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
294
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
295
295
  __ret__ = pulumi.runtime.invoke_output('vault:aws/getAccessCredentials:getAccessCredentials', __args__, opts=opts, typ=GetAccessCredentialsResult)
296
296
  return __ret__.apply(lambda __response__: GetAccessCredentialsResult(
297
297
  access_key=pulumi.get(__response__, 'access_key'),
@@ -118,7 +118,7 @@ def get_static_access_credentials(backend: Optional[str] = None,
118
118
  def get_static_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
119
119
  name: Optional[pulumi.Input[str]] = None,
120
120
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
121
- opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetStaticAccessCredentialsResult]:
121
+ opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetStaticAccessCredentialsResult]:
122
122
  """
123
123
  Use this data source to access information about an existing resource.
124
124
  """
@@ -126,7 +126,7 @@ def get_static_access_credentials_output(backend: Optional[pulumi.Input[str]] =
126
126
  __args__['backend'] = backend
127
127
  __args__['name'] = name
128
128
  __args__['namespace'] = namespace
129
- opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
129
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
130
130
  __ret__ = pulumi.runtime.invoke_output('vault:aws/getStaticAccessCredentials:getStaticAccessCredentials', __args__, opts=opts, typ=GetStaticAccessCredentialsResult)
131
131
  return __ret__.apply(lambda __response__: GetStaticAccessCredentialsResult(
132
132
  access_key=pulumi.get(__response__, 'access_key'),
@@ -35,9 +35,6 @@ class SecretBackendArgs:
35
35
  role_arn: Optional[pulumi.Input[str]] = None,
36
36
  secret_key: Optional[pulumi.Input[str]] = None,
37
37
  sts_endpoint: Optional[pulumi.Input[str]] = None,
38
- sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
39
- sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
40
- sts_region: Optional[pulumi.Input[str]] = None,
41
38
  username_template: Optional[pulumi.Input[str]] = None):
42
39
  """
43
40
  The set of arguments for constructing a SecretBackend resource.
@@ -74,9 +71,6 @@ class SecretBackendArgs:
74
71
  ```
75
72
  :param pulumi.Input[str] secret_key: The AWS Secret Access Key to use when generating new credentials.
76
73
  :param pulumi.Input[str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
77
- :param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_endpoints: Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
78
- :param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_regions: Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
79
- :param pulumi.Input[str] sts_region: Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
80
74
  :param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
81
75
  """
82
76
  if access_key is not None:
@@ -111,12 +105,6 @@ class SecretBackendArgs:
111
105
  pulumi.set(__self__, "secret_key", secret_key)
112
106
  if sts_endpoint is not None:
113
107
  pulumi.set(__self__, "sts_endpoint", sts_endpoint)
114
- if sts_fallback_endpoints is not None:
115
- pulumi.set(__self__, "sts_fallback_endpoints", sts_fallback_endpoints)
116
- if sts_fallback_regions is not None:
117
- pulumi.set(__self__, "sts_fallback_regions", sts_fallback_regions)
118
- if sts_region is not None:
119
- pulumi.set(__self__, "sts_region", sts_region)
120
108
  if username_template is not None:
121
109
  pulumi.set(__self__, "username_template", username_template)
122
110
 
@@ -329,42 +317,6 @@ class SecretBackendArgs:
329
317
  def sts_endpoint(self, value: Optional[pulumi.Input[str]]):
330
318
  pulumi.set(self, "sts_endpoint", value)
331
319
 
332
- @property
333
- @pulumi.getter(name="stsFallbackEndpoints")
334
- def sts_fallback_endpoints(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
335
- """
336
- Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
337
- """
338
- return pulumi.get(self, "sts_fallback_endpoints")
339
-
340
- @sts_fallback_endpoints.setter
341
- def sts_fallback_endpoints(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
342
- pulumi.set(self, "sts_fallback_endpoints", value)
343
-
344
- @property
345
- @pulumi.getter(name="stsFallbackRegions")
346
- def sts_fallback_regions(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
347
- """
348
- Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
349
- """
350
- return pulumi.get(self, "sts_fallback_regions")
351
-
352
- @sts_fallback_regions.setter
353
- def sts_fallback_regions(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
354
- pulumi.set(self, "sts_fallback_regions", value)
355
-
356
- @property
357
- @pulumi.getter(name="stsRegion")
358
- def sts_region(self) -> Optional[pulumi.Input[str]]:
359
- """
360
- Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
361
- """
362
- return pulumi.get(self, "sts_region")
363
-
364
- @sts_region.setter
365
- def sts_region(self, value: Optional[pulumi.Input[str]]):
366
- pulumi.set(self, "sts_region", value)
367
-
368
320
  @property
369
321
  @pulumi.getter(name="usernameTemplate")
370
322
  def username_template(self) -> Optional[pulumi.Input[str]]:
@@ -397,9 +349,6 @@ class _SecretBackendState:
397
349
  role_arn: Optional[pulumi.Input[str]] = None,
398
350
  secret_key: Optional[pulumi.Input[str]] = None,
399
351
  sts_endpoint: Optional[pulumi.Input[str]] = None,
400
- sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
401
- sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
402
- sts_region: Optional[pulumi.Input[str]] = None,
403
352
  username_template: Optional[pulumi.Input[str]] = None):
404
353
  """
405
354
  Input properties used for looking up and filtering SecretBackend resources.
@@ -436,9 +385,6 @@ class _SecretBackendState:
436
385
  ```
437
386
  :param pulumi.Input[str] secret_key: The AWS Secret Access Key to use when generating new credentials.
438
387
  :param pulumi.Input[str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
439
- :param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_endpoints: Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
440
- :param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_regions: Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
441
- :param pulumi.Input[str] sts_region: Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
442
388
  :param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
443
389
  """
444
390
  if access_key is not None:
@@ -473,12 +419,6 @@ class _SecretBackendState:
473
419
  pulumi.set(__self__, "secret_key", secret_key)
474
420
  if sts_endpoint is not None:
475
421
  pulumi.set(__self__, "sts_endpoint", sts_endpoint)
476
- if sts_fallback_endpoints is not None:
477
- pulumi.set(__self__, "sts_fallback_endpoints", sts_fallback_endpoints)
478
- if sts_fallback_regions is not None:
479
- pulumi.set(__self__, "sts_fallback_regions", sts_fallback_regions)
480
- if sts_region is not None:
481
- pulumi.set(__self__, "sts_region", sts_region)
482
422
  if username_template is not None:
483
423
  pulumi.set(__self__, "username_template", username_template)
484
424
 
@@ -691,42 +631,6 @@ class _SecretBackendState:
691
631
  def sts_endpoint(self, value: Optional[pulumi.Input[str]]):
692
632
  pulumi.set(self, "sts_endpoint", value)
693
633
 
694
- @property
695
- @pulumi.getter(name="stsFallbackEndpoints")
696
- def sts_fallback_endpoints(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
697
- """
698
- Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
699
- """
700
- return pulumi.get(self, "sts_fallback_endpoints")
701
-
702
- @sts_fallback_endpoints.setter
703
- def sts_fallback_endpoints(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
704
- pulumi.set(self, "sts_fallback_endpoints", value)
705
-
706
- @property
707
- @pulumi.getter(name="stsFallbackRegions")
708
- def sts_fallback_regions(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
709
- """
710
- Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
711
- """
712
- return pulumi.get(self, "sts_fallback_regions")
713
-
714
- @sts_fallback_regions.setter
715
- def sts_fallback_regions(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
716
- pulumi.set(self, "sts_fallback_regions", value)
717
-
718
- @property
719
- @pulumi.getter(name="stsRegion")
720
- def sts_region(self) -> Optional[pulumi.Input[str]]:
721
- """
722
- Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
723
- """
724
- return pulumi.get(self, "sts_region")
725
-
726
- @sts_region.setter
727
- def sts_region(self, value: Optional[pulumi.Input[str]]):
728
- pulumi.set(self, "sts_region", value)
729
-
730
634
  @property
731
635
  @pulumi.getter(name="usernameTemplate")
732
636
  def username_template(self) -> Optional[pulumi.Input[str]]:
@@ -761,9 +665,6 @@ class SecretBackend(pulumi.CustomResource):
761
665
  role_arn: Optional[pulumi.Input[str]] = None,
762
666
  secret_key: Optional[pulumi.Input[str]] = None,
763
667
  sts_endpoint: Optional[pulumi.Input[str]] = None,
764
- sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
765
- sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
766
- sts_region: Optional[pulumi.Input[str]] = None,
767
668
  username_template: Optional[pulumi.Input[str]] = None,
768
669
  __props__=None):
769
670
  """
@@ -810,9 +711,6 @@ class SecretBackend(pulumi.CustomResource):
810
711
  ```
811
712
  :param pulumi.Input[str] secret_key: The AWS Secret Access Key to use when generating new credentials.
812
713
  :param pulumi.Input[str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
813
- :param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_endpoints: Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
814
- :param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_regions: Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
815
- :param pulumi.Input[str] sts_region: Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
816
714
  :param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
817
715
  """
818
716
  ...
@@ -861,9 +759,6 @@ class SecretBackend(pulumi.CustomResource):
861
759
  role_arn: Optional[pulumi.Input[str]] = None,
862
760
  secret_key: Optional[pulumi.Input[str]] = None,
863
761
  sts_endpoint: Optional[pulumi.Input[str]] = None,
864
- sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
865
- sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
866
- sts_region: Optional[pulumi.Input[str]] = None,
867
762
  username_template: Optional[pulumi.Input[str]] = None,
868
763
  __props__=None):
869
764
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
@@ -890,9 +785,6 @@ class SecretBackend(pulumi.CustomResource):
890
785
  __props__.__dict__["role_arn"] = role_arn
891
786
  __props__.__dict__["secret_key"] = None if secret_key is None else pulumi.Output.secret(secret_key)
892
787
  __props__.__dict__["sts_endpoint"] = sts_endpoint
893
- __props__.__dict__["sts_fallback_endpoints"] = sts_fallback_endpoints
894
- __props__.__dict__["sts_fallback_regions"] = sts_fallback_regions
895
- __props__.__dict__["sts_region"] = sts_region
896
788
  __props__.__dict__["username_template"] = username_template
897
789
  secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["accessKey", "secretKey"])
898
790
  opts = pulumi.ResourceOptions.merge(opts, secret_opts)
@@ -922,9 +814,6 @@ class SecretBackend(pulumi.CustomResource):
922
814
  role_arn: Optional[pulumi.Input[str]] = None,
923
815
  secret_key: Optional[pulumi.Input[str]] = None,
924
816
  sts_endpoint: Optional[pulumi.Input[str]] = None,
925
- sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
926
- sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
927
- sts_region: Optional[pulumi.Input[str]] = None,
928
817
  username_template: Optional[pulumi.Input[str]] = None) -> 'SecretBackend':
929
818
  """
930
819
  Get an existing SecretBackend resource's state with the given name, id, and optional extra
@@ -966,9 +855,6 @@ class SecretBackend(pulumi.CustomResource):
966
855
  ```
967
856
  :param pulumi.Input[str] secret_key: The AWS Secret Access Key to use when generating new credentials.
968
857
  :param pulumi.Input[str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
969
- :param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_endpoints: Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
970
- :param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_regions: Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
971
- :param pulumi.Input[str] sts_region: Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
972
858
  :param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
973
859
  """
974
860
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -991,9 +877,6 @@ class SecretBackend(pulumi.CustomResource):
991
877
  __props__.__dict__["role_arn"] = role_arn
992
878
  __props__.__dict__["secret_key"] = secret_key
993
879
  __props__.__dict__["sts_endpoint"] = sts_endpoint
994
- __props__.__dict__["sts_fallback_endpoints"] = sts_fallback_endpoints
995
- __props__.__dict__["sts_fallback_regions"] = sts_fallback_regions
996
- __props__.__dict__["sts_region"] = sts_region
997
880
  __props__.__dict__["username_template"] = username_template
998
881
  return SecretBackend(resource_name, opts=opts, __props__=__props__)
999
882
 
@@ -1142,30 +1025,6 @@ class SecretBackend(pulumi.CustomResource):
1142
1025
  """
1143
1026
  return pulumi.get(self, "sts_endpoint")
1144
1027
 
1145
- @property
1146
- @pulumi.getter(name="stsFallbackEndpoints")
1147
- def sts_fallback_endpoints(self) -> pulumi.Output[Optional[Sequence[str]]]:
1148
- """
1149
- Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
1150
- """
1151
- return pulumi.get(self, "sts_fallback_endpoints")
1152
-
1153
- @property
1154
- @pulumi.getter(name="stsFallbackRegions")
1155
- def sts_fallback_regions(self) -> pulumi.Output[Optional[Sequence[str]]]:
1156
- """
1157
- Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
1158
- """
1159
- return pulumi.get(self, "sts_fallback_regions")
1160
-
1161
- @property
1162
- @pulumi.getter(name="stsRegion")
1163
- def sts_region(self) -> pulumi.Output[Optional[str]]:
1164
- """
1165
- Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
1166
- """
1167
- return pulumi.get(self, "sts_region")
1168
-
1169
1028
  @property
1170
1029
  @pulumi.getter(name="usernameTemplate")
1171
1030
  def username_template(self) -> pulumi.Output[str]:
@@ -313,7 +313,7 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
313
313
  subscription_id: Optional[pulumi.Input[Optional[str]]] = None,
314
314
  tenant_id: Optional[pulumi.Input[Optional[str]]] = None,
315
315
  validate_creds: Optional[pulumi.Input[Optional[bool]]] = None,
316
- opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAccessCredentialsResult]:
316
+ opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAccessCredentialsResult]:
317
317
  """
318
318
  ## Example Usage
319
319
 
@@ -378,7 +378,7 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
378
378
  __args__['subscriptionId'] = subscription_id
379
379
  __args__['tenantId'] = tenant_id
380
380
  __args__['validateCreds'] = validate_creds
381
- opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
381
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
382
382
  __ret__ = pulumi.runtime.invoke_output('vault:azure/getAccessCredentials:getAccessCredentials', __args__, opts=opts, typ=GetAccessCredentialsResult)
383
383
  return __ret__.apply(lambda __response__: GetAccessCredentialsResult(
384
384
  backend=pulumi.get(__response__, 'backend'),
@@ -2625,10 +2625,6 @@ if not MYPY:
2625
2625
  """
2626
2626
  The root credential password used in the connection URL
2627
2627
  """
2628
- password_authentication: NotRequired[pulumi.Input[str]]
2629
- """
2630
- When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
2631
- """
2632
2628
  private_key: NotRequired[pulumi.Input[str]]
2633
2629
  """
2634
2630
  The secret key used for the x509 client certificate. Must be PEM encoded.
@@ -2670,7 +2666,6 @@ class SecretBackendConnectionPostgresqlArgs:
2670
2666
  max_idle_connections: Optional[pulumi.Input[int]] = None,
2671
2667
  max_open_connections: Optional[pulumi.Input[int]] = None,
2672
2668
  password: Optional[pulumi.Input[str]] = None,
2673
- password_authentication: Optional[pulumi.Input[str]] = None,
2674
2669
  private_key: Optional[pulumi.Input[str]] = None,
2675
2670
  self_managed: Optional[pulumi.Input[bool]] = None,
2676
2671
  service_account_json: Optional[pulumi.Input[str]] = None,
@@ -2686,7 +2681,6 @@ class SecretBackendConnectionPostgresqlArgs:
2686
2681
  :param pulumi.Input[int] max_idle_connections: Maximum number of idle connections to the database.
2687
2682
  :param pulumi.Input[int] max_open_connections: Maximum number of open connections to the database.
2688
2683
  :param pulumi.Input[str] password: The root credential password used in the connection URL
2689
- :param pulumi.Input[str] password_authentication: When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
2690
2684
  :param pulumi.Input[str] private_key: The secret key used for the x509 client certificate. Must be PEM encoded.
2691
2685
  :param pulumi.Input[bool] self_managed: If set, allows onboarding static roles with a rootless connection configuration.
2692
2686
  :param pulumi.Input[str] service_account_json: A JSON encoded credential for use with IAM authorization
@@ -2709,8 +2703,6 @@ class SecretBackendConnectionPostgresqlArgs:
2709
2703
  pulumi.set(__self__, "max_open_connections", max_open_connections)
2710
2704
  if password is not None:
2711
2705
  pulumi.set(__self__, "password", password)
2712
- if password_authentication is not None:
2713
- pulumi.set(__self__, "password_authentication", password_authentication)
2714
2706
  if private_key is not None:
2715
2707
  pulumi.set(__self__, "private_key", private_key)
2716
2708
  if self_managed is not None:
@@ -2810,18 +2802,6 @@ class SecretBackendConnectionPostgresqlArgs:
2810
2802
  def password(self, value: Optional[pulumi.Input[str]]):
2811
2803
  pulumi.set(self, "password", value)
2812
2804
 
2813
- @property
2814
- @pulumi.getter(name="passwordAuthentication")
2815
- def password_authentication(self) -> Optional[pulumi.Input[str]]:
2816
- """
2817
- When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
2818
- """
2819
- return pulumi.get(self, "password_authentication")
2820
-
2821
- @password_authentication.setter
2822
- def password_authentication(self, value: Optional[pulumi.Input[str]]):
2823
- pulumi.set(self, "password_authentication", value)
2824
-
2825
2805
  @property
2826
2806
  @pulumi.getter(name="privateKey")
2827
2807
  def private_key(self) -> Optional[pulumi.Input[str]]:
@@ -7723,10 +7703,6 @@ if not MYPY:
7723
7703
  """
7724
7704
  The root credential password used in the connection URL
7725
7705
  """
7726
- password_authentication: NotRequired[pulumi.Input[str]]
7727
- """
7728
- When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
7729
- """
7730
7706
  plugin_name: NotRequired[pulumi.Input[str]]
7731
7707
  """
7732
7708
  Specifies the name of the plugin to use.
@@ -7784,7 +7760,6 @@ class SecretsMountPostgresqlArgs:
7784
7760
  max_idle_connections: Optional[pulumi.Input[int]] = None,
7785
7761
  max_open_connections: Optional[pulumi.Input[int]] = None,
7786
7762
  password: Optional[pulumi.Input[str]] = None,
7787
- password_authentication: Optional[pulumi.Input[str]] = None,
7788
7763
  plugin_name: Optional[pulumi.Input[str]] = None,
7789
7764
  private_key: Optional[pulumi.Input[str]] = None,
7790
7765
  root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
@@ -7809,7 +7784,6 @@ class SecretsMountPostgresqlArgs:
7809
7784
  :param pulumi.Input[int] max_idle_connections: Maximum number of idle connections to the database.
7810
7785
  :param pulumi.Input[int] max_open_connections: Maximum number of open connections to the database.
7811
7786
  :param pulumi.Input[str] password: The root credential password used in the connection URL
7812
- :param pulumi.Input[str] password_authentication: When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
7813
7787
  :param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
7814
7788
  :param pulumi.Input[str] private_key: The secret key used for the x509 client certificate. Must be PEM encoded.
7815
7789
  :param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
@@ -7841,8 +7815,6 @@ class SecretsMountPostgresqlArgs:
7841
7815
  pulumi.set(__self__, "max_open_connections", max_open_connections)
7842
7816
  if password is not None:
7843
7817
  pulumi.set(__self__, "password", password)
7844
- if password_authentication is not None:
7845
- pulumi.set(__self__, "password_authentication", password_authentication)
7846
7818
  if plugin_name is not None:
7847
7819
  pulumi.set(__self__, "plugin_name", plugin_name)
7848
7820
  if private_key is not None:
@@ -7987,18 +7959,6 @@ class SecretsMountPostgresqlArgs:
7987
7959
  def password(self, value: Optional[pulumi.Input[str]]):
7988
7960
  pulumi.set(self, "password", value)
7989
7961
 
7990
- @property
7991
- @pulumi.getter(name="passwordAuthentication")
7992
- def password_authentication(self) -> Optional[pulumi.Input[str]]:
7993
- """
7994
- When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
7995
- """
7996
- return pulumi.get(self, "password_authentication")
7997
-
7998
- @password_authentication.setter
7999
- def password_authentication(self, value: Optional[pulumi.Input[str]]):
8000
- pulumi.set(self, "password_authentication", value)
8001
-
8002
7962
  @property
8003
7963
  @pulumi.getter(name="pluginName")
8004
7964
  def plugin_name(self) -> Optional[pulumi.Input[str]]: