pulumi-vault 6.5.0a1736850018__py3-none-any.whl → 6.5.0a1737047276__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
pulumi_vault/__init__.py CHANGED
@@ -1013,6 +1013,22 @@ _utilities.register(
1013
1013
  "vault:okta/authBackendUser:AuthBackendUser": "AuthBackendUser"
1014
1014
  }
1015
1015
  },
1016
+ {
1017
+ "pkg": "vault",
1018
+ "mod": "pkiSecret/backendAcmeEab",
1019
+ "fqn": "pulumi_vault.pkisecret",
1020
+ "classes": {
1021
+ "vault:pkiSecret/backendAcmeEab:BackendAcmeEab": "BackendAcmeEab"
1022
+ }
1023
+ },
1024
+ {
1025
+ "pkg": "vault",
1026
+ "mod": "pkiSecret/backendConfigAcme",
1027
+ "fqn": "pulumi_vault.pkisecret",
1028
+ "classes": {
1029
+ "vault:pkiSecret/backendConfigAcme:BackendConfigAcme": "BackendConfigAcme"
1030
+ }
1031
+ },
1016
1032
  {
1017
1033
  "pkg": "vault",
1018
1034
  "mod": "pkiSecret/backendConfigCluster",
@@ -1021,6 +1037,14 @@ _utilities.register(
1021
1037
  "vault:pkiSecret/backendConfigCluster:BackendConfigCluster": "BackendConfigCluster"
1022
1038
  }
1023
1039
  },
1040
+ {
1041
+ "pkg": "vault",
1042
+ "mod": "pkiSecret/backendConfigCmpv2",
1043
+ "fqn": "pulumi_vault.pkisecret",
1044
+ "classes": {
1045
+ "vault:pkiSecret/backendConfigCmpv2:BackendConfigCmpv2": "BackendConfigCmpv2"
1046
+ }
1047
+ },
1024
1048
  {
1025
1049
  "pkg": "vault",
1026
1050
  "mod": "pkiSecret/backendConfigEst",
@@ -22,6 +22,7 @@ class AuthBackendStsRoleArgs:
22
22
  account_id: pulumi.Input[str],
23
23
  sts_role: pulumi.Input[str],
24
24
  backend: Optional[pulumi.Input[str]] = None,
25
+ external_id: Optional[pulumi.Input[str]] = None,
25
26
  namespace: Optional[pulumi.Input[str]] = None):
26
27
  """
27
28
  The set of arguments for constructing a AuthBackendStsRole resource.
@@ -30,6 +31,7 @@ class AuthBackendStsRoleArgs:
30
31
  by EC2 instances in the account specified by `account_id`.
31
32
  :param pulumi.Input[str] backend: The path the AWS auth backend being configured was
32
33
  mounted at. Defaults to `aws`.
34
+ :param pulumi.Input[str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
33
35
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
34
36
  The value should not contain leading or trailing forward slashes.
35
37
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -39,6 +41,8 @@ class AuthBackendStsRoleArgs:
39
41
  pulumi.set(__self__, "sts_role", sts_role)
40
42
  if backend is not None:
41
43
  pulumi.set(__self__, "backend", backend)
44
+ if external_id is not None:
45
+ pulumi.set(__self__, "external_id", external_id)
42
46
  if namespace is not None:
43
47
  pulumi.set(__self__, "namespace", namespace)
44
48
 
@@ -80,6 +84,18 @@ class AuthBackendStsRoleArgs:
80
84
  def backend(self, value: Optional[pulumi.Input[str]]):
81
85
  pulumi.set(self, "backend", value)
82
86
 
87
+ @property
88
+ @pulumi.getter(name="externalId")
89
+ def external_id(self) -> Optional[pulumi.Input[str]]:
90
+ """
91
+ External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
92
+ """
93
+ return pulumi.get(self, "external_id")
94
+
95
+ @external_id.setter
96
+ def external_id(self, value: Optional[pulumi.Input[str]]):
97
+ pulumi.set(self, "external_id", value)
98
+
83
99
  @property
84
100
  @pulumi.getter
85
101
  def namespace(self) -> Optional[pulumi.Input[str]]:
@@ -101,6 +117,7 @@ class _AuthBackendStsRoleState:
101
117
  def __init__(__self__, *,
102
118
  account_id: Optional[pulumi.Input[str]] = None,
103
119
  backend: Optional[pulumi.Input[str]] = None,
120
+ external_id: Optional[pulumi.Input[str]] = None,
104
121
  namespace: Optional[pulumi.Input[str]] = None,
105
122
  sts_role: Optional[pulumi.Input[str]] = None):
106
123
  """
@@ -108,6 +125,7 @@ class _AuthBackendStsRoleState:
108
125
  :param pulumi.Input[str] account_id: The AWS account ID to configure the STS role for.
109
126
  :param pulumi.Input[str] backend: The path the AWS auth backend being configured was
110
127
  mounted at. Defaults to `aws`.
128
+ :param pulumi.Input[str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
111
129
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
112
130
  The value should not contain leading or trailing forward slashes.
113
131
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -119,6 +137,8 @@ class _AuthBackendStsRoleState:
119
137
  pulumi.set(__self__, "account_id", account_id)
120
138
  if backend is not None:
121
139
  pulumi.set(__self__, "backend", backend)
140
+ if external_id is not None:
141
+ pulumi.set(__self__, "external_id", external_id)
122
142
  if namespace is not None:
123
143
  pulumi.set(__self__, "namespace", namespace)
124
144
  if sts_role is not None:
@@ -149,6 +169,18 @@ class _AuthBackendStsRoleState:
149
169
  def backend(self, value: Optional[pulumi.Input[str]]):
150
170
  pulumi.set(self, "backend", value)
151
171
 
172
+ @property
173
+ @pulumi.getter(name="externalId")
174
+ def external_id(self) -> Optional[pulumi.Input[str]]:
175
+ """
176
+ External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
177
+ """
178
+ return pulumi.get(self, "external_id")
179
+
180
+ @external_id.setter
181
+ def external_id(self, value: Optional[pulumi.Input[str]]):
182
+ pulumi.set(self, "external_id", value)
183
+
152
184
  @property
153
185
  @pulumi.getter
154
186
  def namespace(self) -> Optional[pulumi.Input[str]]:
@@ -185,6 +217,7 @@ class AuthBackendStsRole(pulumi.CustomResource):
185
217
  opts: Optional[pulumi.ResourceOptions] = None,
186
218
  account_id: Optional[pulumi.Input[str]] = None,
187
219
  backend: Optional[pulumi.Input[str]] = None,
220
+ external_id: Optional[pulumi.Input[str]] = None,
188
221
  namespace: Optional[pulumi.Input[str]] = None,
189
222
  sts_role: Optional[pulumi.Input[str]] = None,
190
223
  __props__=None):
@@ -215,6 +248,7 @@ class AuthBackendStsRole(pulumi.CustomResource):
215
248
  :param pulumi.Input[str] account_id: The AWS account ID to configure the STS role for.
216
249
  :param pulumi.Input[str] backend: The path the AWS auth backend being configured was
217
250
  mounted at. Defaults to `aws`.
251
+ :param pulumi.Input[str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
218
252
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
219
253
  The value should not contain leading or trailing forward slashes.
220
254
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -267,6 +301,7 @@ class AuthBackendStsRole(pulumi.CustomResource):
267
301
  opts: Optional[pulumi.ResourceOptions] = None,
268
302
  account_id: Optional[pulumi.Input[str]] = None,
269
303
  backend: Optional[pulumi.Input[str]] = None,
304
+ external_id: Optional[pulumi.Input[str]] = None,
270
305
  namespace: Optional[pulumi.Input[str]] = None,
271
306
  sts_role: Optional[pulumi.Input[str]] = None,
272
307
  __props__=None):
@@ -282,6 +317,7 @@ class AuthBackendStsRole(pulumi.CustomResource):
282
317
  raise TypeError("Missing required property 'account_id'")
283
318
  __props__.__dict__["account_id"] = account_id
284
319
  __props__.__dict__["backend"] = backend
320
+ __props__.__dict__["external_id"] = external_id
285
321
  __props__.__dict__["namespace"] = namespace
286
322
  if sts_role is None and not opts.urn:
287
323
  raise TypeError("Missing required property 'sts_role'")
@@ -298,6 +334,7 @@ class AuthBackendStsRole(pulumi.CustomResource):
298
334
  opts: Optional[pulumi.ResourceOptions] = None,
299
335
  account_id: Optional[pulumi.Input[str]] = None,
300
336
  backend: Optional[pulumi.Input[str]] = None,
337
+ external_id: Optional[pulumi.Input[str]] = None,
301
338
  namespace: Optional[pulumi.Input[str]] = None,
302
339
  sts_role: Optional[pulumi.Input[str]] = None) -> 'AuthBackendStsRole':
303
340
  """
@@ -310,6 +347,7 @@ class AuthBackendStsRole(pulumi.CustomResource):
310
347
  :param pulumi.Input[str] account_id: The AWS account ID to configure the STS role for.
311
348
  :param pulumi.Input[str] backend: The path the AWS auth backend being configured was
312
349
  mounted at. Defaults to `aws`.
350
+ :param pulumi.Input[str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
313
351
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
314
352
  The value should not contain leading or trailing forward slashes.
315
353
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -323,6 +361,7 @@ class AuthBackendStsRole(pulumi.CustomResource):
323
361
 
324
362
  __props__.__dict__["account_id"] = account_id
325
363
  __props__.__dict__["backend"] = backend
364
+ __props__.__dict__["external_id"] = external_id
326
365
  __props__.__dict__["namespace"] = namespace
327
366
  __props__.__dict__["sts_role"] = sts_role
328
367
  return AuthBackendStsRole(resource_name, opts=opts, __props__=__props__)
@@ -344,6 +383,14 @@ class AuthBackendStsRole(pulumi.CustomResource):
344
383
  """
345
384
  return pulumi.get(self, "backend")
346
385
 
386
+ @property
387
+ @pulumi.getter(name="externalId")
388
+ def external_id(self) -> pulumi.Output[Optional[str]]:
389
+ """
390
+ External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
391
+ """
392
+ return pulumi.get(self, "external_id")
393
+
347
394
  @property
348
395
  @pulumi.getter
349
396
  def namespace(self) -> pulumi.Output[Optional[str]]:
@@ -35,6 +35,9 @@ class SecretBackendArgs:
35
35
  role_arn: Optional[pulumi.Input[str]] = None,
36
36
  secret_key: Optional[pulumi.Input[str]] = None,
37
37
  sts_endpoint: Optional[pulumi.Input[str]] = None,
38
+ sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
39
+ sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
40
+ sts_region: Optional[pulumi.Input[str]] = None,
38
41
  username_template: Optional[pulumi.Input[str]] = None):
39
42
  """
40
43
  The set of arguments for constructing a SecretBackend resource.
@@ -71,6 +74,9 @@ class SecretBackendArgs:
71
74
  ```
72
75
  :param pulumi.Input[str] secret_key: The AWS Secret Access Key to use when generating new credentials.
73
76
  :param pulumi.Input[str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
77
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_endpoints: Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
78
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_regions: Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
79
+ :param pulumi.Input[str] sts_region: Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
74
80
  :param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
75
81
  """
76
82
  if access_key is not None:
@@ -105,6 +111,12 @@ class SecretBackendArgs:
105
111
  pulumi.set(__self__, "secret_key", secret_key)
106
112
  if sts_endpoint is not None:
107
113
  pulumi.set(__self__, "sts_endpoint", sts_endpoint)
114
+ if sts_fallback_endpoints is not None:
115
+ pulumi.set(__self__, "sts_fallback_endpoints", sts_fallback_endpoints)
116
+ if sts_fallback_regions is not None:
117
+ pulumi.set(__self__, "sts_fallback_regions", sts_fallback_regions)
118
+ if sts_region is not None:
119
+ pulumi.set(__self__, "sts_region", sts_region)
108
120
  if username_template is not None:
109
121
  pulumi.set(__self__, "username_template", username_template)
110
122
 
@@ -317,6 +329,42 @@ class SecretBackendArgs:
317
329
  def sts_endpoint(self, value: Optional[pulumi.Input[str]]):
318
330
  pulumi.set(self, "sts_endpoint", value)
319
331
 
332
+ @property
333
+ @pulumi.getter(name="stsFallbackEndpoints")
334
+ def sts_fallback_endpoints(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
335
+ """
336
+ Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
337
+ """
338
+ return pulumi.get(self, "sts_fallback_endpoints")
339
+
340
+ @sts_fallback_endpoints.setter
341
+ def sts_fallback_endpoints(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
342
+ pulumi.set(self, "sts_fallback_endpoints", value)
343
+
344
+ @property
345
+ @pulumi.getter(name="stsFallbackRegions")
346
+ def sts_fallback_regions(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
347
+ """
348
+ Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
349
+ """
350
+ return pulumi.get(self, "sts_fallback_regions")
351
+
352
+ @sts_fallback_regions.setter
353
+ def sts_fallback_regions(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
354
+ pulumi.set(self, "sts_fallback_regions", value)
355
+
356
+ @property
357
+ @pulumi.getter(name="stsRegion")
358
+ def sts_region(self) -> Optional[pulumi.Input[str]]:
359
+ """
360
+ Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
361
+ """
362
+ return pulumi.get(self, "sts_region")
363
+
364
+ @sts_region.setter
365
+ def sts_region(self, value: Optional[pulumi.Input[str]]):
366
+ pulumi.set(self, "sts_region", value)
367
+
320
368
  @property
321
369
  @pulumi.getter(name="usernameTemplate")
322
370
  def username_template(self) -> Optional[pulumi.Input[str]]:
@@ -349,6 +397,9 @@ class _SecretBackendState:
349
397
  role_arn: Optional[pulumi.Input[str]] = None,
350
398
  secret_key: Optional[pulumi.Input[str]] = None,
351
399
  sts_endpoint: Optional[pulumi.Input[str]] = None,
400
+ sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
401
+ sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
402
+ sts_region: Optional[pulumi.Input[str]] = None,
352
403
  username_template: Optional[pulumi.Input[str]] = None):
353
404
  """
354
405
  Input properties used for looking up and filtering SecretBackend resources.
@@ -385,6 +436,9 @@ class _SecretBackendState:
385
436
  ```
386
437
  :param pulumi.Input[str] secret_key: The AWS Secret Access Key to use when generating new credentials.
387
438
  :param pulumi.Input[str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
439
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_endpoints: Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
440
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_regions: Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
441
+ :param pulumi.Input[str] sts_region: Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
388
442
  :param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
389
443
  """
390
444
  if access_key is not None:
@@ -419,6 +473,12 @@ class _SecretBackendState:
419
473
  pulumi.set(__self__, "secret_key", secret_key)
420
474
  if sts_endpoint is not None:
421
475
  pulumi.set(__self__, "sts_endpoint", sts_endpoint)
476
+ if sts_fallback_endpoints is not None:
477
+ pulumi.set(__self__, "sts_fallback_endpoints", sts_fallback_endpoints)
478
+ if sts_fallback_regions is not None:
479
+ pulumi.set(__self__, "sts_fallback_regions", sts_fallback_regions)
480
+ if sts_region is not None:
481
+ pulumi.set(__self__, "sts_region", sts_region)
422
482
  if username_template is not None:
423
483
  pulumi.set(__self__, "username_template", username_template)
424
484
 
@@ -631,6 +691,42 @@ class _SecretBackendState:
631
691
  def sts_endpoint(self, value: Optional[pulumi.Input[str]]):
632
692
  pulumi.set(self, "sts_endpoint", value)
633
693
 
694
+ @property
695
+ @pulumi.getter(name="stsFallbackEndpoints")
696
+ def sts_fallback_endpoints(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
697
+ """
698
+ Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
699
+ """
700
+ return pulumi.get(self, "sts_fallback_endpoints")
701
+
702
+ @sts_fallback_endpoints.setter
703
+ def sts_fallback_endpoints(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
704
+ pulumi.set(self, "sts_fallback_endpoints", value)
705
+
706
+ @property
707
+ @pulumi.getter(name="stsFallbackRegions")
708
+ def sts_fallback_regions(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
709
+ """
710
+ Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
711
+ """
712
+ return pulumi.get(self, "sts_fallback_regions")
713
+
714
+ @sts_fallback_regions.setter
715
+ def sts_fallback_regions(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
716
+ pulumi.set(self, "sts_fallback_regions", value)
717
+
718
+ @property
719
+ @pulumi.getter(name="stsRegion")
720
+ def sts_region(self) -> Optional[pulumi.Input[str]]:
721
+ """
722
+ Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
723
+ """
724
+ return pulumi.get(self, "sts_region")
725
+
726
+ @sts_region.setter
727
+ def sts_region(self, value: Optional[pulumi.Input[str]]):
728
+ pulumi.set(self, "sts_region", value)
729
+
634
730
  @property
635
731
  @pulumi.getter(name="usernameTemplate")
636
732
  def username_template(self) -> Optional[pulumi.Input[str]]:
@@ -665,6 +761,9 @@ class SecretBackend(pulumi.CustomResource):
665
761
  role_arn: Optional[pulumi.Input[str]] = None,
666
762
  secret_key: Optional[pulumi.Input[str]] = None,
667
763
  sts_endpoint: Optional[pulumi.Input[str]] = None,
764
+ sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
765
+ sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
766
+ sts_region: Optional[pulumi.Input[str]] = None,
668
767
  username_template: Optional[pulumi.Input[str]] = None,
669
768
  __props__=None):
670
769
  """
@@ -711,6 +810,9 @@ class SecretBackend(pulumi.CustomResource):
711
810
  ```
712
811
  :param pulumi.Input[str] secret_key: The AWS Secret Access Key to use when generating new credentials.
713
812
  :param pulumi.Input[str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
813
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_endpoints: Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
814
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_regions: Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
815
+ :param pulumi.Input[str] sts_region: Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
714
816
  :param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
715
817
  """
716
818
  ...
@@ -759,6 +861,9 @@ class SecretBackend(pulumi.CustomResource):
759
861
  role_arn: Optional[pulumi.Input[str]] = None,
760
862
  secret_key: Optional[pulumi.Input[str]] = None,
761
863
  sts_endpoint: Optional[pulumi.Input[str]] = None,
864
+ sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
865
+ sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
866
+ sts_region: Optional[pulumi.Input[str]] = None,
762
867
  username_template: Optional[pulumi.Input[str]] = None,
763
868
  __props__=None):
764
869
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
@@ -785,6 +890,9 @@ class SecretBackend(pulumi.CustomResource):
785
890
  __props__.__dict__["role_arn"] = role_arn
786
891
  __props__.__dict__["secret_key"] = None if secret_key is None else pulumi.Output.secret(secret_key)
787
892
  __props__.__dict__["sts_endpoint"] = sts_endpoint
893
+ __props__.__dict__["sts_fallback_endpoints"] = sts_fallback_endpoints
894
+ __props__.__dict__["sts_fallback_regions"] = sts_fallback_regions
895
+ __props__.__dict__["sts_region"] = sts_region
788
896
  __props__.__dict__["username_template"] = username_template
789
897
  secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["accessKey", "secretKey"])
790
898
  opts = pulumi.ResourceOptions.merge(opts, secret_opts)
@@ -814,6 +922,9 @@ class SecretBackend(pulumi.CustomResource):
814
922
  role_arn: Optional[pulumi.Input[str]] = None,
815
923
  secret_key: Optional[pulumi.Input[str]] = None,
816
924
  sts_endpoint: Optional[pulumi.Input[str]] = None,
925
+ sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
926
+ sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
927
+ sts_region: Optional[pulumi.Input[str]] = None,
817
928
  username_template: Optional[pulumi.Input[str]] = None) -> 'SecretBackend':
818
929
  """
819
930
  Get an existing SecretBackend resource's state with the given name, id, and optional extra
@@ -855,6 +966,9 @@ class SecretBackend(pulumi.CustomResource):
855
966
  ```
856
967
  :param pulumi.Input[str] secret_key: The AWS Secret Access Key to use when generating new credentials.
857
968
  :param pulumi.Input[str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
969
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_endpoints: Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
970
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_regions: Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
971
+ :param pulumi.Input[str] sts_region: Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
858
972
  :param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
859
973
  """
860
974
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -877,6 +991,9 @@ class SecretBackend(pulumi.CustomResource):
877
991
  __props__.__dict__["role_arn"] = role_arn
878
992
  __props__.__dict__["secret_key"] = secret_key
879
993
  __props__.__dict__["sts_endpoint"] = sts_endpoint
994
+ __props__.__dict__["sts_fallback_endpoints"] = sts_fallback_endpoints
995
+ __props__.__dict__["sts_fallback_regions"] = sts_fallback_regions
996
+ __props__.__dict__["sts_region"] = sts_region
880
997
  __props__.__dict__["username_template"] = username_template
881
998
  return SecretBackend(resource_name, opts=opts, __props__=__props__)
882
999
 
@@ -1025,6 +1142,30 @@ class SecretBackend(pulumi.CustomResource):
1025
1142
  """
1026
1143
  return pulumi.get(self, "sts_endpoint")
1027
1144
 
1145
+ @property
1146
+ @pulumi.getter(name="stsFallbackEndpoints")
1147
+ def sts_fallback_endpoints(self) -> pulumi.Output[Optional[Sequence[str]]]:
1148
+ """
1149
+ Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
1150
+ """
1151
+ return pulumi.get(self, "sts_fallback_endpoints")
1152
+
1153
+ @property
1154
+ @pulumi.getter(name="stsFallbackRegions")
1155
+ def sts_fallback_regions(self) -> pulumi.Output[Optional[Sequence[str]]]:
1156
+ """
1157
+ Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
1158
+ """
1159
+ return pulumi.get(self, "sts_fallback_regions")
1160
+
1161
+ @property
1162
+ @pulumi.getter(name="stsRegion")
1163
+ def sts_region(self) -> pulumi.Output[Optional[str]]:
1164
+ """
1165
+ Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
1166
+ """
1167
+ return pulumi.get(self, "sts_region")
1168
+
1028
1169
  @property
1029
1170
  @pulumi.getter(name="usernameTemplate")
1030
1171
  def username_template(self) -> pulumi.Output[str]:
@@ -2625,6 +2625,10 @@ if not MYPY:
2625
2625
  """
2626
2626
  The root credential password used in the connection URL
2627
2627
  """
2628
+ password_authentication: NotRequired[pulumi.Input[str]]
2629
+ """
2630
+ When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
2631
+ """
2628
2632
  private_key: NotRequired[pulumi.Input[str]]
2629
2633
  """
2630
2634
  The secret key used for the x509 client certificate. Must be PEM encoded.
@@ -2666,6 +2670,7 @@ class SecretBackendConnectionPostgresqlArgs:
2666
2670
  max_idle_connections: Optional[pulumi.Input[int]] = None,
2667
2671
  max_open_connections: Optional[pulumi.Input[int]] = None,
2668
2672
  password: Optional[pulumi.Input[str]] = None,
2673
+ password_authentication: Optional[pulumi.Input[str]] = None,
2669
2674
  private_key: Optional[pulumi.Input[str]] = None,
2670
2675
  self_managed: Optional[pulumi.Input[bool]] = None,
2671
2676
  service_account_json: Optional[pulumi.Input[str]] = None,
@@ -2681,6 +2686,7 @@ class SecretBackendConnectionPostgresqlArgs:
2681
2686
  :param pulumi.Input[int] max_idle_connections: Maximum number of idle connections to the database.
2682
2687
  :param pulumi.Input[int] max_open_connections: Maximum number of open connections to the database.
2683
2688
  :param pulumi.Input[str] password: The root credential password used in the connection URL
2689
+ :param pulumi.Input[str] password_authentication: When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
2684
2690
  :param pulumi.Input[str] private_key: The secret key used for the x509 client certificate. Must be PEM encoded.
2685
2691
  :param pulumi.Input[bool] self_managed: If set, allows onboarding static roles with a rootless connection configuration.
2686
2692
  :param pulumi.Input[str] service_account_json: A JSON encoded credential for use with IAM authorization
@@ -2703,6 +2709,8 @@ class SecretBackendConnectionPostgresqlArgs:
2703
2709
  pulumi.set(__self__, "max_open_connections", max_open_connections)
2704
2710
  if password is not None:
2705
2711
  pulumi.set(__self__, "password", password)
2712
+ if password_authentication is not None:
2713
+ pulumi.set(__self__, "password_authentication", password_authentication)
2706
2714
  if private_key is not None:
2707
2715
  pulumi.set(__self__, "private_key", private_key)
2708
2716
  if self_managed is not None:
@@ -2802,6 +2810,18 @@ class SecretBackendConnectionPostgresqlArgs:
2802
2810
  def password(self, value: Optional[pulumi.Input[str]]):
2803
2811
  pulumi.set(self, "password", value)
2804
2812
 
2813
+ @property
2814
+ @pulumi.getter(name="passwordAuthentication")
2815
+ def password_authentication(self) -> Optional[pulumi.Input[str]]:
2816
+ """
2817
+ When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
2818
+ """
2819
+ return pulumi.get(self, "password_authentication")
2820
+
2821
+ @password_authentication.setter
2822
+ def password_authentication(self, value: Optional[pulumi.Input[str]]):
2823
+ pulumi.set(self, "password_authentication", value)
2824
+
2805
2825
  @property
2806
2826
  @pulumi.getter(name="privateKey")
2807
2827
  def private_key(self) -> Optional[pulumi.Input[str]]:
@@ -7703,6 +7723,10 @@ if not MYPY:
7703
7723
  """
7704
7724
  The root credential password used in the connection URL
7705
7725
  """
7726
+ password_authentication: NotRequired[pulumi.Input[str]]
7727
+ """
7728
+ When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
7729
+ """
7706
7730
  plugin_name: NotRequired[pulumi.Input[str]]
7707
7731
  """
7708
7732
  Specifies the name of the plugin to use.
@@ -7760,6 +7784,7 @@ class SecretsMountPostgresqlArgs:
7760
7784
  max_idle_connections: Optional[pulumi.Input[int]] = None,
7761
7785
  max_open_connections: Optional[pulumi.Input[int]] = None,
7762
7786
  password: Optional[pulumi.Input[str]] = None,
7787
+ password_authentication: Optional[pulumi.Input[str]] = None,
7763
7788
  plugin_name: Optional[pulumi.Input[str]] = None,
7764
7789
  private_key: Optional[pulumi.Input[str]] = None,
7765
7790
  root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
@@ -7784,6 +7809,7 @@ class SecretsMountPostgresqlArgs:
7784
7809
  :param pulumi.Input[int] max_idle_connections: Maximum number of idle connections to the database.
7785
7810
  :param pulumi.Input[int] max_open_connections: Maximum number of open connections to the database.
7786
7811
  :param pulumi.Input[str] password: The root credential password used in the connection URL
7812
+ :param pulumi.Input[str] password_authentication: When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
7787
7813
  :param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
7788
7814
  :param pulumi.Input[str] private_key: The secret key used for the x509 client certificate. Must be PEM encoded.
7789
7815
  :param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
@@ -7815,6 +7841,8 @@ class SecretsMountPostgresqlArgs:
7815
7841
  pulumi.set(__self__, "max_open_connections", max_open_connections)
7816
7842
  if password is not None:
7817
7843
  pulumi.set(__self__, "password", password)
7844
+ if password_authentication is not None:
7845
+ pulumi.set(__self__, "password_authentication", password_authentication)
7818
7846
  if plugin_name is not None:
7819
7847
  pulumi.set(__self__, "plugin_name", plugin_name)
7820
7848
  if private_key is not None:
@@ -7959,6 +7987,18 @@ class SecretsMountPostgresqlArgs:
7959
7987
  def password(self, value: Optional[pulumi.Input[str]]):
7960
7988
  pulumi.set(self, "password", value)
7961
7989
 
7990
+ @property
7991
+ @pulumi.getter(name="passwordAuthentication")
7992
+ def password_authentication(self) -> Optional[pulumi.Input[str]]:
7993
+ """
7994
+ When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
7995
+ """
7996
+ return pulumi.get(self, "password_authentication")
7997
+
7998
+ @password_authentication.setter
7999
+ def password_authentication(self, value: Optional[pulumi.Input[str]]):
8000
+ pulumi.set(self, "password_authentication", value)
8001
+
7962
8002
  @property
7963
8003
  @pulumi.getter(name="pluginName")
7964
8004
  def plugin_name(self) -> Optional[pulumi.Input[str]]:
@@ -1928,6 +1928,8 @@ class SecretBackendConnectionPostgresql(dict):
1928
1928
  suggest = "max_idle_connections"
1929
1929
  elif key == "maxOpenConnections":
1930
1930
  suggest = "max_open_connections"
1931
+ elif key == "passwordAuthentication":
1932
+ suggest = "password_authentication"
1931
1933
  elif key == "privateKey":
1932
1934
  suggest = "private_key"
1933
1935
  elif key == "selfManaged":
@@ -1960,6 +1962,7 @@ class SecretBackendConnectionPostgresql(dict):
1960
1962
  max_idle_connections: Optional[int] = None,
1961
1963
  max_open_connections: Optional[int] = None,
1962
1964
  password: Optional[str] = None,
1965
+ password_authentication: Optional[str] = None,
1963
1966
  private_key: Optional[str] = None,
1964
1967
  self_managed: Optional[bool] = None,
1965
1968
  service_account_json: Optional[str] = None,
@@ -1975,6 +1978,7 @@ class SecretBackendConnectionPostgresql(dict):
1975
1978
  :param int max_idle_connections: Maximum number of idle connections to the database.
1976
1979
  :param int max_open_connections: Maximum number of open connections to the database.
1977
1980
  :param str password: The root credential password used in the connection URL
1981
+ :param str password_authentication: When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
1978
1982
  :param str private_key: The secret key used for the x509 client certificate. Must be PEM encoded.
1979
1983
  :param bool self_managed: If set, allows onboarding static roles with a rootless connection configuration.
1980
1984
  :param str service_account_json: A JSON encoded credential for use with IAM authorization
@@ -1997,6 +2001,8 @@ class SecretBackendConnectionPostgresql(dict):
1997
2001
  pulumi.set(__self__, "max_open_connections", max_open_connections)
1998
2002
  if password is not None:
1999
2003
  pulumi.set(__self__, "password", password)
2004
+ if password_authentication is not None:
2005
+ pulumi.set(__self__, "password_authentication", password_authentication)
2000
2006
  if private_key is not None:
2001
2007
  pulumi.set(__self__, "private_key", private_key)
2002
2008
  if self_managed is not None:
@@ -2068,6 +2074,14 @@ class SecretBackendConnectionPostgresql(dict):
2068
2074
  """
2069
2075
  return pulumi.get(self, "password")
2070
2076
 
2077
+ @property
2078
+ @pulumi.getter(name="passwordAuthentication")
2079
+ def password_authentication(self) -> Optional[str]:
2080
+ """
2081
+ When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
2082
+ """
2083
+ return pulumi.get(self, "password_authentication")
2084
+
2071
2085
  @property
2072
2086
  @pulumi.getter(name="privateKey")
2073
2087
  def private_key(self) -> Optional[str]:
@@ -5540,6 +5554,8 @@ class SecretsMountPostgresql(dict):
5540
5554
  suggest = "max_idle_connections"
5541
5555
  elif key == "maxOpenConnections":
5542
5556
  suggest = "max_open_connections"
5557
+ elif key == "passwordAuthentication":
5558
+ suggest = "password_authentication"
5543
5559
  elif key == "pluginName":
5544
5560
  suggest = "plugin_name"
5545
5561
  elif key == "privateKey":
@@ -5581,6 +5597,7 @@ class SecretsMountPostgresql(dict):
5581
5597
  max_idle_connections: Optional[int] = None,
5582
5598
  max_open_connections: Optional[int] = None,
5583
5599
  password: Optional[str] = None,
5600
+ password_authentication: Optional[str] = None,
5584
5601
  plugin_name: Optional[str] = None,
5585
5602
  private_key: Optional[str] = None,
5586
5603
  root_rotation_statements: Optional[Sequence[str]] = None,
@@ -5605,6 +5622,7 @@ class SecretsMountPostgresql(dict):
5605
5622
  :param int max_idle_connections: Maximum number of idle connections to the database.
5606
5623
  :param int max_open_connections: Maximum number of open connections to the database.
5607
5624
  :param str password: The root credential password used in the connection URL
5625
+ :param str password_authentication: When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
5608
5626
  :param str plugin_name: Specifies the name of the plugin to use.
5609
5627
  :param str private_key: The secret key used for the x509 client certificate. Must be PEM encoded.
5610
5628
  :param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
@@ -5636,6 +5654,8 @@ class SecretsMountPostgresql(dict):
5636
5654
  pulumi.set(__self__, "max_open_connections", max_open_connections)
5637
5655
  if password is not None:
5638
5656
  pulumi.set(__self__, "password", password)
5657
+ if password_authentication is not None:
5658
+ pulumi.set(__self__, "password_authentication", password_authentication)
5639
5659
  if plugin_name is not None:
5640
5660
  pulumi.set(__self__, "plugin_name", plugin_name)
5641
5661
  if private_key is not None:
@@ -5740,6 +5760,14 @@ class SecretsMountPostgresql(dict):
5740
5760
  """
5741
5761
  return pulumi.get(self, "password")
5742
5762
 
5763
+ @property
5764
+ @pulumi.getter(name="passwordAuthentication")
5765
+ def password_authentication(self) -> Optional[str]:
5766
+ """
5767
+ When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
5768
+ """
5769
+ return pulumi.get(self, "password_authentication")
5770
+
5743
5771
  @property
5744
5772
  @pulumi.getter(name="pluginName")
5745
5773
  def plugin_name(self) -> Optional[str]:
@@ -5,8 +5,12 @@
5
5
  from .. import _utilities
6
6
  import typing
7
7
  # Export this package's modules as members:
8
+ from .backend_acme_eab import *
9
+ from .backend_config_acme import *
8
10
  from .backend_config_cluster import *
11
+ from .backend_config_cmpv2 import *
9
12
  from .backend_config_est import *
13
+ from .get_backend_config_cmpv2 import *
10
14
  from .get_backend_config_est import *
11
15
  from .get_backend_issuer import *
12
16
  from .get_backend_issuers import *