pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,45 +20,45 @@ __all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole']
19
20
  @pulumi.input_type
20
21
  class SecretBackendStaticRoleArgs:
21
22
  def __init__(__self__, *,
22
- backend: pulumi.Input[str],
23
- db_name: pulumi.Input[str],
24
- username: pulumi.Input[str],
25
- credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
26
- credential_type: Optional[pulumi.Input[str]] = None,
27
- name: Optional[pulumi.Input[str]] = None,
28
- namespace: Optional[pulumi.Input[str]] = None,
29
- rotation_period: Optional[pulumi.Input[int]] = None,
30
- rotation_schedule: Optional[pulumi.Input[str]] = None,
31
- rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
32
- rotation_window: Optional[pulumi.Input[int]] = None,
33
- self_managed_password: Optional[pulumi.Input[str]] = None,
34
- skip_import_rotation: Optional[pulumi.Input[bool]] = None):
23
+ backend: pulumi.Input[builtins.str],
24
+ db_name: pulumi.Input[builtins.str],
25
+ username: pulumi.Input[builtins.str],
26
+ credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
27
+ credential_type: Optional[pulumi.Input[builtins.str]] = None,
28
+ name: Optional[pulumi.Input[builtins.str]] = None,
29
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
30
+ rotation_period: Optional[pulumi.Input[builtins.int]] = None,
31
+ rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
32
+ rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
33
+ rotation_window: Optional[pulumi.Input[builtins.int]] = None,
34
+ self_managed_password: Optional[pulumi.Input[builtins.str]] = None,
35
+ skip_import_rotation: Optional[pulumi.Input[builtins.bool]] = None):
35
36
  """
36
37
  The set of arguments for constructing a SecretBackendStaticRole resource.
37
- :param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
38
- :param pulumi.Input[str] db_name: The unique name of the database connection to use for the static role.
39
- :param pulumi.Input[str] username: The database username that this static role corresponds to.
40
- :param pulumi.Input[str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
38
+ :param pulumi.Input[builtins.str] backend: The unique name of the Vault mount to configure.
39
+ :param pulumi.Input[builtins.str] db_name: The unique name of the database connection to use for the static role.
40
+ :param pulumi.Input[builtins.str] username: The database username that this static role corresponds to.
41
+ :param pulumi.Input[builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
41
42
  can be done in `credential_config`.
42
- :param pulumi.Input[str] name: A unique name to give the static role.
43
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
43
+ :param pulumi.Input[builtins.str] name: A unique name to give the static role.
44
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
44
45
  The value should not contain leading or trailing forward slashes.
45
46
  The `namespace` is always relative to the provider's configured namespace.
46
47
  *Available only for Vault Enterprise*.
47
- :param pulumi.Input[int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
48
+ :param pulumi.Input[builtins.int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
48
49
  Mutually exclusive with `rotation_schedule`.
49
- :param pulumi.Input[str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
50
+ :param pulumi.Input[builtins.str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
50
51
  Mutually exclusive with `rotation_period`.
51
52
 
52
53
  **Warning**: The `rotation_period` and `rotation_schedule` fields are
53
54
  mutually exclusive. One of them must be set but not both.
54
- :param pulumi.Input[Sequence[pulumi.Input[str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
55
- :param pulumi.Input[int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
55
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
56
+ :param pulumi.Input[builtins.int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
56
57
  from a given `rotation_schedule`.
57
- :param pulumi.Input[str] self_managed_password: The password corresponding to the username in the database.
58
+ :param pulumi.Input[builtins.str] self_managed_password: The password corresponding to the username in the database.
58
59
  Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
59
60
  select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
60
- :param pulumi.Input[bool] skip_import_rotation: If set to true, Vault will skip the
61
+ :param pulumi.Input[builtins.bool] skip_import_rotation: If set to true, Vault will skip the
61
62
  initial secret rotation on import. Requires Vault 1.18+ Enterprise.
62
63
  """
63
64
  pulumi.set(__self__, "backend", backend)
@@ -86,52 +87,52 @@ class SecretBackendStaticRoleArgs:
86
87
 
87
88
  @property
88
89
  @pulumi.getter
89
- def backend(self) -> pulumi.Input[str]:
90
+ def backend(self) -> pulumi.Input[builtins.str]:
90
91
  """
91
92
  The unique name of the Vault mount to configure.
92
93
  """
93
94
  return pulumi.get(self, "backend")
94
95
 
95
96
  @backend.setter
96
- def backend(self, value: pulumi.Input[str]):
97
+ def backend(self, value: pulumi.Input[builtins.str]):
97
98
  pulumi.set(self, "backend", value)
98
99
 
99
100
  @property
100
101
  @pulumi.getter(name="dbName")
101
- def db_name(self) -> pulumi.Input[str]:
102
+ def db_name(self) -> pulumi.Input[builtins.str]:
102
103
  """
103
104
  The unique name of the database connection to use for the static role.
104
105
  """
105
106
  return pulumi.get(self, "db_name")
106
107
 
107
108
  @db_name.setter
108
- def db_name(self, value: pulumi.Input[str]):
109
+ def db_name(self, value: pulumi.Input[builtins.str]):
109
110
  pulumi.set(self, "db_name", value)
110
111
 
111
112
  @property
112
113
  @pulumi.getter
113
- def username(self) -> pulumi.Input[str]:
114
+ def username(self) -> pulumi.Input[builtins.str]:
114
115
  """
115
116
  The database username that this static role corresponds to.
116
117
  """
117
118
  return pulumi.get(self, "username")
118
119
 
119
120
  @username.setter
120
- def username(self, value: pulumi.Input[str]):
121
+ def username(self, value: pulumi.Input[builtins.str]):
121
122
  pulumi.set(self, "username", value)
122
123
 
123
124
  @property
124
125
  @pulumi.getter(name="credentialConfig")
125
- def credential_config(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
126
+ def credential_config(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
126
127
  return pulumi.get(self, "credential_config")
127
128
 
128
129
  @credential_config.setter
129
- def credential_config(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
130
+ def credential_config(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
130
131
  pulumi.set(self, "credential_config", value)
131
132
 
132
133
  @property
133
134
  @pulumi.getter(name="credentialType")
134
- def credential_type(self) -> Optional[pulumi.Input[str]]:
135
+ def credential_type(self) -> Optional[pulumi.Input[builtins.str]]:
135
136
  """
136
137
  The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
137
138
  can be done in `credential_config`.
@@ -139,24 +140,24 @@ class SecretBackendStaticRoleArgs:
139
140
  return pulumi.get(self, "credential_type")
140
141
 
141
142
  @credential_type.setter
142
- def credential_type(self, value: Optional[pulumi.Input[str]]):
143
+ def credential_type(self, value: Optional[pulumi.Input[builtins.str]]):
143
144
  pulumi.set(self, "credential_type", value)
144
145
 
145
146
  @property
146
147
  @pulumi.getter
147
- def name(self) -> Optional[pulumi.Input[str]]:
148
+ def name(self) -> Optional[pulumi.Input[builtins.str]]:
148
149
  """
149
150
  A unique name to give the static role.
150
151
  """
151
152
  return pulumi.get(self, "name")
152
153
 
153
154
  @name.setter
154
- def name(self, value: Optional[pulumi.Input[str]]):
155
+ def name(self, value: Optional[pulumi.Input[builtins.str]]):
155
156
  pulumi.set(self, "name", value)
156
157
 
157
158
  @property
158
159
  @pulumi.getter
159
- def namespace(self) -> Optional[pulumi.Input[str]]:
160
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
160
161
  """
161
162
  The namespace to provision the resource in.
162
163
  The value should not contain leading or trailing forward slashes.
@@ -166,12 +167,12 @@ class SecretBackendStaticRoleArgs:
166
167
  return pulumi.get(self, "namespace")
167
168
 
168
169
  @namespace.setter
169
- def namespace(self, value: Optional[pulumi.Input[str]]):
170
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
170
171
  pulumi.set(self, "namespace", value)
171
172
 
172
173
  @property
173
174
  @pulumi.getter(name="rotationPeriod")
174
- def rotation_period(self) -> Optional[pulumi.Input[int]]:
175
+ def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
175
176
  """
176
177
  The amount of time Vault should wait before rotating the password, in seconds.
177
178
  Mutually exclusive with `rotation_schedule`.
@@ -179,12 +180,12 @@ class SecretBackendStaticRoleArgs:
179
180
  return pulumi.get(self, "rotation_period")
180
181
 
181
182
  @rotation_period.setter
182
- def rotation_period(self, value: Optional[pulumi.Input[int]]):
183
+ def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
183
184
  pulumi.set(self, "rotation_period", value)
184
185
 
185
186
  @property
186
187
  @pulumi.getter(name="rotationSchedule")
187
- def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
188
+ def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
188
189
  """
189
190
  A cron-style string that will define the schedule on which rotations should occur.
190
191
  Mutually exclusive with `rotation_period`.
@@ -195,24 +196,24 @@ class SecretBackendStaticRoleArgs:
195
196
  return pulumi.get(self, "rotation_schedule")
196
197
 
197
198
  @rotation_schedule.setter
198
- def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
199
+ def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
199
200
  pulumi.set(self, "rotation_schedule", value)
200
201
 
201
202
  @property
202
203
  @pulumi.getter(name="rotationStatements")
203
- def rotation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
204
+ def rotation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
204
205
  """
205
206
  Database statements to execute to rotate the password for the configured database user.
206
207
  """
207
208
  return pulumi.get(self, "rotation_statements")
208
209
 
209
210
  @rotation_statements.setter
210
- def rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
211
+ def rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
211
212
  pulumi.set(self, "rotation_statements", value)
212
213
 
213
214
  @property
214
215
  @pulumi.getter(name="rotationWindow")
215
- def rotation_window(self) -> Optional[pulumi.Input[int]]:
216
+ def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
216
217
  """
217
218
  The amount of time, in seconds, in which rotations are allowed to occur starting
218
219
  from a given `rotation_schedule`.
@@ -220,12 +221,12 @@ class SecretBackendStaticRoleArgs:
220
221
  return pulumi.get(self, "rotation_window")
221
222
 
222
223
  @rotation_window.setter
223
- def rotation_window(self, value: Optional[pulumi.Input[int]]):
224
+ def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
224
225
  pulumi.set(self, "rotation_window", value)
225
226
 
226
227
  @property
227
228
  @pulumi.getter(name="selfManagedPassword")
228
- def self_managed_password(self) -> Optional[pulumi.Input[str]]:
229
+ def self_managed_password(self) -> Optional[pulumi.Input[builtins.str]]:
229
230
  """
230
231
  The password corresponding to the username in the database.
231
232
  Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
@@ -234,12 +235,12 @@ class SecretBackendStaticRoleArgs:
234
235
  return pulumi.get(self, "self_managed_password")
235
236
 
236
237
  @self_managed_password.setter
237
- def self_managed_password(self, value: Optional[pulumi.Input[str]]):
238
+ def self_managed_password(self, value: Optional[pulumi.Input[builtins.str]]):
238
239
  pulumi.set(self, "self_managed_password", value)
239
240
 
240
241
  @property
241
242
  @pulumi.getter(name="skipImportRotation")
242
- def skip_import_rotation(self) -> Optional[pulumi.Input[bool]]:
243
+ def skip_import_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
243
244
  """
244
245
  If set to true, Vault will skip the
245
246
  initial secret rotation on import. Requires Vault 1.18+ Enterprise.
@@ -247,53 +248,53 @@ class SecretBackendStaticRoleArgs:
247
248
  return pulumi.get(self, "skip_import_rotation")
248
249
 
249
250
  @skip_import_rotation.setter
250
- def skip_import_rotation(self, value: Optional[pulumi.Input[bool]]):
251
+ def skip_import_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
251
252
  pulumi.set(self, "skip_import_rotation", value)
252
253
 
253
254
 
254
255
  @pulumi.input_type
255
256
  class _SecretBackendStaticRoleState:
256
257
  def __init__(__self__, *,
257
- backend: Optional[pulumi.Input[str]] = None,
258
- credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
259
- credential_type: Optional[pulumi.Input[str]] = None,
260
- db_name: Optional[pulumi.Input[str]] = None,
261
- name: Optional[pulumi.Input[str]] = None,
262
- namespace: Optional[pulumi.Input[str]] = None,
263
- rotation_period: Optional[pulumi.Input[int]] = None,
264
- rotation_schedule: Optional[pulumi.Input[str]] = None,
265
- rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
266
- rotation_window: Optional[pulumi.Input[int]] = None,
267
- self_managed_password: Optional[pulumi.Input[str]] = None,
268
- skip_import_rotation: Optional[pulumi.Input[bool]] = None,
269
- username: Optional[pulumi.Input[str]] = None):
258
+ backend: Optional[pulumi.Input[builtins.str]] = None,
259
+ credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
260
+ credential_type: Optional[pulumi.Input[builtins.str]] = None,
261
+ db_name: Optional[pulumi.Input[builtins.str]] = None,
262
+ name: Optional[pulumi.Input[builtins.str]] = None,
263
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
264
+ rotation_period: Optional[pulumi.Input[builtins.int]] = None,
265
+ rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
266
+ rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
267
+ rotation_window: Optional[pulumi.Input[builtins.int]] = None,
268
+ self_managed_password: Optional[pulumi.Input[builtins.str]] = None,
269
+ skip_import_rotation: Optional[pulumi.Input[builtins.bool]] = None,
270
+ username: Optional[pulumi.Input[builtins.str]] = None):
270
271
  """
271
272
  Input properties used for looking up and filtering SecretBackendStaticRole resources.
272
- :param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
273
- :param pulumi.Input[str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
273
+ :param pulumi.Input[builtins.str] backend: The unique name of the Vault mount to configure.
274
+ :param pulumi.Input[builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
274
275
  can be done in `credential_config`.
275
- :param pulumi.Input[str] db_name: The unique name of the database connection to use for the static role.
276
- :param pulumi.Input[str] name: A unique name to give the static role.
277
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
276
+ :param pulumi.Input[builtins.str] db_name: The unique name of the database connection to use for the static role.
277
+ :param pulumi.Input[builtins.str] name: A unique name to give the static role.
278
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
278
279
  The value should not contain leading or trailing forward slashes.
279
280
  The `namespace` is always relative to the provider's configured namespace.
280
281
  *Available only for Vault Enterprise*.
281
- :param pulumi.Input[int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
282
+ :param pulumi.Input[builtins.int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
282
283
  Mutually exclusive with `rotation_schedule`.
283
- :param pulumi.Input[str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
284
+ :param pulumi.Input[builtins.str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
284
285
  Mutually exclusive with `rotation_period`.
285
286
 
286
287
  **Warning**: The `rotation_period` and `rotation_schedule` fields are
287
288
  mutually exclusive. One of them must be set but not both.
288
- :param pulumi.Input[Sequence[pulumi.Input[str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
289
- :param pulumi.Input[int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
289
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
290
+ :param pulumi.Input[builtins.int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
290
291
  from a given `rotation_schedule`.
291
- :param pulumi.Input[str] self_managed_password: The password corresponding to the username in the database.
292
+ :param pulumi.Input[builtins.str] self_managed_password: The password corresponding to the username in the database.
292
293
  Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
293
294
  select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
294
- :param pulumi.Input[bool] skip_import_rotation: If set to true, Vault will skip the
295
+ :param pulumi.Input[builtins.bool] skip_import_rotation: If set to true, Vault will skip the
295
296
  initial secret rotation on import. Requires Vault 1.18+ Enterprise.
296
- :param pulumi.Input[str] username: The database username that this static role corresponds to.
297
+ :param pulumi.Input[builtins.str] username: The database username that this static role corresponds to.
297
298
  """
298
299
  if backend is not None:
299
300
  pulumi.set(__self__, "backend", backend)
@@ -324,28 +325,28 @@ class _SecretBackendStaticRoleState:
324
325
 
325
326
  @property
326
327
  @pulumi.getter
327
- def backend(self) -> Optional[pulumi.Input[str]]:
328
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
328
329
  """
329
330
  The unique name of the Vault mount to configure.
330
331
  """
331
332
  return pulumi.get(self, "backend")
332
333
 
333
334
  @backend.setter
334
- def backend(self, value: Optional[pulumi.Input[str]]):
335
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
335
336
  pulumi.set(self, "backend", value)
336
337
 
337
338
  @property
338
339
  @pulumi.getter(name="credentialConfig")
339
- def credential_config(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
340
+ def credential_config(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
340
341
  return pulumi.get(self, "credential_config")
341
342
 
342
343
  @credential_config.setter
343
- def credential_config(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
344
+ def credential_config(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
344
345
  pulumi.set(self, "credential_config", value)
345
346
 
346
347
  @property
347
348
  @pulumi.getter(name="credentialType")
348
- def credential_type(self) -> Optional[pulumi.Input[str]]:
349
+ def credential_type(self) -> Optional[pulumi.Input[builtins.str]]:
349
350
  """
350
351
  The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
351
352
  can be done in `credential_config`.
@@ -353,36 +354,36 @@ class _SecretBackendStaticRoleState:
353
354
  return pulumi.get(self, "credential_type")
354
355
 
355
356
  @credential_type.setter
356
- def credential_type(self, value: Optional[pulumi.Input[str]]):
357
+ def credential_type(self, value: Optional[pulumi.Input[builtins.str]]):
357
358
  pulumi.set(self, "credential_type", value)
358
359
 
359
360
  @property
360
361
  @pulumi.getter(name="dbName")
361
- def db_name(self) -> Optional[pulumi.Input[str]]:
362
+ def db_name(self) -> Optional[pulumi.Input[builtins.str]]:
362
363
  """
363
364
  The unique name of the database connection to use for the static role.
364
365
  """
365
366
  return pulumi.get(self, "db_name")
366
367
 
367
368
  @db_name.setter
368
- def db_name(self, value: Optional[pulumi.Input[str]]):
369
+ def db_name(self, value: Optional[pulumi.Input[builtins.str]]):
369
370
  pulumi.set(self, "db_name", value)
370
371
 
371
372
  @property
372
373
  @pulumi.getter
373
- def name(self) -> Optional[pulumi.Input[str]]:
374
+ def name(self) -> Optional[pulumi.Input[builtins.str]]:
374
375
  """
375
376
  A unique name to give the static role.
376
377
  """
377
378
  return pulumi.get(self, "name")
378
379
 
379
380
  @name.setter
380
- def name(self, value: Optional[pulumi.Input[str]]):
381
+ def name(self, value: Optional[pulumi.Input[builtins.str]]):
381
382
  pulumi.set(self, "name", value)
382
383
 
383
384
  @property
384
385
  @pulumi.getter
385
- def namespace(self) -> Optional[pulumi.Input[str]]:
386
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
386
387
  """
387
388
  The namespace to provision the resource in.
388
389
  The value should not contain leading or trailing forward slashes.
@@ -392,12 +393,12 @@ class _SecretBackendStaticRoleState:
392
393
  return pulumi.get(self, "namespace")
393
394
 
394
395
  @namespace.setter
395
- def namespace(self, value: Optional[pulumi.Input[str]]):
396
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
396
397
  pulumi.set(self, "namespace", value)
397
398
 
398
399
  @property
399
400
  @pulumi.getter(name="rotationPeriod")
400
- def rotation_period(self) -> Optional[pulumi.Input[int]]:
401
+ def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
401
402
  """
402
403
  The amount of time Vault should wait before rotating the password, in seconds.
403
404
  Mutually exclusive with `rotation_schedule`.
@@ -405,12 +406,12 @@ class _SecretBackendStaticRoleState:
405
406
  return pulumi.get(self, "rotation_period")
406
407
 
407
408
  @rotation_period.setter
408
- def rotation_period(self, value: Optional[pulumi.Input[int]]):
409
+ def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
409
410
  pulumi.set(self, "rotation_period", value)
410
411
 
411
412
  @property
412
413
  @pulumi.getter(name="rotationSchedule")
413
- def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
414
+ def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
414
415
  """
415
416
  A cron-style string that will define the schedule on which rotations should occur.
416
417
  Mutually exclusive with `rotation_period`.
@@ -421,24 +422,24 @@ class _SecretBackendStaticRoleState:
421
422
  return pulumi.get(self, "rotation_schedule")
422
423
 
423
424
  @rotation_schedule.setter
424
- def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
425
+ def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
425
426
  pulumi.set(self, "rotation_schedule", value)
426
427
 
427
428
  @property
428
429
  @pulumi.getter(name="rotationStatements")
429
- def rotation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
430
+ def rotation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
430
431
  """
431
432
  Database statements to execute to rotate the password for the configured database user.
432
433
  """
433
434
  return pulumi.get(self, "rotation_statements")
434
435
 
435
436
  @rotation_statements.setter
436
- def rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
437
+ def rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
437
438
  pulumi.set(self, "rotation_statements", value)
438
439
 
439
440
  @property
440
441
  @pulumi.getter(name="rotationWindow")
441
- def rotation_window(self) -> Optional[pulumi.Input[int]]:
442
+ def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
442
443
  """
443
444
  The amount of time, in seconds, in which rotations are allowed to occur starting
444
445
  from a given `rotation_schedule`.
@@ -446,12 +447,12 @@ class _SecretBackendStaticRoleState:
446
447
  return pulumi.get(self, "rotation_window")
447
448
 
448
449
  @rotation_window.setter
449
- def rotation_window(self, value: Optional[pulumi.Input[int]]):
450
+ def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
450
451
  pulumi.set(self, "rotation_window", value)
451
452
 
452
453
  @property
453
454
  @pulumi.getter(name="selfManagedPassword")
454
- def self_managed_password(self) -> Optional[pulumi.Input[str]]:
455
+ def self_managed_password(self) -> Optional[pulumi.Input[builtins.str]]:
455
456
  """
456
457
  The password corresponding to the username in the database.
457
458
  Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
@@ -460,12 +461,12 @@ class _SecretBackendStaticRoleState:
460
461
  return pulumi.get(self, "self_managed_password")
461
462
 
462
463
  @self_managed_password.setter
463
- def self_managed_password(self, value: Optional[pulumi.Input[str]]):
464
+ def self_managed_password(self, value: Optional[pulumi.Input[builtins.str]]):
464
465
  pulumi.set(self, "self_managed_password", value)
465
466
 
466
467
  @property
467
468
  @pulumi.getter(name="skipImportRotation")
468
- def skip_import_rotation(self) -> Optional[pulumi.Input[bool]]:
469
+ def skip_import_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
469
470
  """
470
471
  If set to true, Vault will skip the
471
472
  initial secret rotation on import. Requires Vault 1.18+ Enterprise.
@@ -473,19 +474,19 @@ class _SecretBackendStaticRoleState:
473
474
  return pulumi.get(self, "skip_import_rotation")
474
475
 
475
476
  @skip_import_rotation.setter
476
- def skip_import_rotation(self, value: Optional[pulumi.Input[bool]]):
477
+ def skip_import_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
477
478
  pulumi.set(self, "skip_import_rotation", value)
478
479
 
479
480
  @property
480
481
  @pulumi.getter
481
- def username(self) -> Optional[pulumi.Input[str]]:
482
+ def username(self) -> Optional[pulumi.Input[builtins.str]]:
482
483
  """
483
484
  The database username that this static role corresponds to.
484
485
  """
485
486
  return pulumi.get(self, "username")
486
487
 
487
488
  @username.setter
488
- def username(self, value: Optional[pulumi.Input[str]]):
489
+ def username(self, value: Optional[pulumi.Input[builtins.str]]):
489
490
  pulumi.set(self, "username", value)
490
491
 
491
492
 
@@ -494,19 +495,19 @@ class SecretBackendStaticRole(pulumi.CustomResource):
494
495
  def __init__(__self__,
495
496
  resource_name: str,
496
497
  opts: Optional[pulumi.ResourceOptions] = None,
497
- backend: Optional[pulumi.Input[str]] = None,
498
- credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
499
- credential_type: Optional[pulumi.Input[str]] = None,
500
- db_name: Optional[pulumi.Input[str]] = None,
501
- name: Optional[pulumi.Input[str]] = None,
502
- namespace: Optional[pulumi.Input[str]] = None,
503
- rotation_period: Optional[pulumi.Input[int]] = None,
504
- rotation_schedule: Optional[pulumi.Input[str]] = None,
505
- rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
506
- rotation_window: Optional[pulumi.Input[int]] = None,
507
- self_managed_password: Optional[pulumi.Input[str]] = None,
508
- skip_import_rotation: Optional[pulumi.Input[bool]] = None,
509
- username: Optional[pulumi.Input[str]] = None,
498
+ backend: Optional[pulumi.Input[builtins.str]] = None,
499
+ credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
500
+ credential_type: Optional[pulumi.Input[builtins.str]] = None,
501
+ db_name: Optional[pulumi.Input[builtins.str]] = None,
502
+ name: Optional[pulumi.Input[builtins.str]] = None,
503
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
504
+ rotation_period: Optional[pulumi.Input[builtins.int]] = None,
505
+ rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
506
+ rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
507
+ rotation_window: Optional[pulumi.Input[builtins.int]] = None,
508
+ self_managed_password: Optional[pulumi.Input[builtins.str]] = None,
509
+ skip_import_rotation: Optional[pulumi.Input[builtins.bool]] = None,
510
+ username: Optional[pulumi.Input[builtins.str]] = None,
510
511
  __props__=None):
511
512
  """
512
513
  Creates a Database Secret Backend static role in Vault. Database secret backend
@@ -558,31 +559,31 @@ class SecretBackendStaticRole(pulumi.CustomResource):
558
559
 
559
560
  :param str resource_name: The name of the resource.
560
561
  :param pulumi.ResourceOptions opts: Options for the resource.
561
- :param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
562
- :param pulumi.Input[str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
562
+ :param pulumi.Input[builtins.str] backend: The unique name of the Vault mount to configure.
563
+ :param pulumi.Input[builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
563
564
  can be done in `credential_config`.
564
- :param pulumi.Input[str] db_name: The unique name of the database connection to use for the static role.
565
- :param pulumi.Input[str] name: A unique name to give the static role.
566
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
565
+ :param pulumi.Input[builtins.str] db_name: The unique name of the database connection to use for the static role.
566
+ :param pulumi.Input[builtins.str] name: A unique name to give the static role.
567
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
567
568
  The value should not contain leading or trailing forward slashes.
568
569
  The `namespace` is always relative to the provider's configured namespace.
569
570
  *Available only for Vault Enterprise*.
570
- :param pulumi.Input[int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
571
+ :param pulumi.Input[builtins.int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
571
572
  Mutually exclusive with `rotation_schedule`.
572
- :param pulumi.Input[str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
573
+ :param pulumi.Input[builtins.str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
573
574
  Mutually exclusive with `rotation_period`.
574
575
 
575
576
  **Warning**: The `rotation_period` and `rotation_schedule` fields are
576
577
  mutually exclusive. One of them must be set but not both.
577
- :param pulumi.Input[Sequence[pulumi.Input[str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
578
- :param pulumi.Input[int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
578
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
579
+ :param pulumi.Input[builtins.int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
579
580
  from a given `rotation_schedule`.
580
- :param pulumi.Input[str] self_managed_password: The password corresponding to the username in the database.
581
+ :param pulumi.Input[builtins.str] self_managed_password: The password corresponding to the username in the database.
581
582
  Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
582
583
  select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
583
- :param pulumi.Input[bool] skip_import_rotation: If set to true, Vault will skip the
584
+ :param pulumi.Input[builtins.bool] skip_import_rotation: If set to true, Vault will skip the
584
585
  initial secret rotation on import. Requires Vault 1.18+ Enterprise.
585
- :param pulumi.Input[str] username: The database username that this static role corresponds to.
586
+ :param pulumi.Input[builtins.str] username: The database username that this static role corresponds to.
586
587
  """
587
588
  ...
588
589
  @overload
@@ -653,19 +654,19 @@ class SecretBackendStaticRole(pulumi.CustomResource):
653
654
  def _internal_init(__self__,
654
655
  resource_name: str,
655
656
  opts: Optional[pulumi.ResourceOptions] = None,
656
- backend: Optional[pulumi.Input[str]] = None,
657
- credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
658
- credential_type: Optional[pulumi.Input[str]] = None,
659
- db_name: Optional[pulumi.Input[str]] = None,
660
- name: Optional[pulumi.Input[str]] = None,
661
- namespace: Optional[pulumi.Input[str]] = None,
662
- rotation_period: Optional[pulumi.Input[int]] = None,
663
- rotation_schedule: Optional[pulumi.Input[str]] = None,
664
- rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
665
- rotation_window: Optional[pulumi.Input[int]] = None,
666
- self_managed_password: Optional[pulumi.Input[str]] = None,
667
- skip_import_rotation: Optional[pulumi.Input[bool]] = None,
668
- username: Optional[pulumi.Input[str]] = None,
657
+ backend: Optional[pulumi.Input[builtins.str]] = None,
658
+ credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
659
+ credential_type: Optional[pulumi.Input[builtins.str]] = None,
660
+ db_name: Optional[pulumi.Input[builtins.str]] = None,
661
+ name: Optional[pulumi.Input[builtins.str]] = None,
662
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
663
+ rotation_period: Optional[pulumi.Input[builtins.int]] = None,
664
+ rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
665
+ rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
666
+ rotation_window: Optional[pulumi.Input[builtins.int]] = None,
667
+ self_managed_password: Optional[pulumi.Input[builtins.str]] = None,
668
+ skip_import_rotation: Optional[pulumi.Input[builtins.bool]] = None,
669
+ username: Optional[pulumi.Input[builtins.str]] = None,
669
670
  __props__=None):
670
671
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
671
672
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -706,19 +707,19 @@ class SecretBackendStaticRole(pulumi.CustomResource):
706
707
  def get(resource_name: str,
707
708
  id: pulumi.Input[str],
708
709
  opts: Optional[pulumi.ResourceOptions] = None,
709
- backend: Optional[pulumi.Input[str]] = None,
710
- credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
711
- credential_type: Optional[pulumi.Input[str]] = None,
712
- db_name: Optional[pulumi.Input[str]] = None,
713
- name: Optional[pulumi.Input[str]] = None,
714
- namespace: Optional[pulumi.Input[str]] = None,
715
- rotation_period: Optional[pulumi.Input[int]] = None,
716
- rotation_schedule: Optional[pulumi.Input[str]] = None,
717
- rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
718
- rotation_window: Optional[pulumi.Input[int]] = None,
719
- self_managed_password: Optional[pulumi.Input[str]] = None,
720
- skip_import_rotation: Optional[pulumi.Input[bool]] = None,
721
- username: Optional[pulumi.Input[str]] = None) -> 'SecretBackendStaticRole':
710
+ backend: Optional[pulumi.Input[builtins.str]] = None,
711
+ credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
712
+ credential_type: Optional[pulumi.Input[builtins.str]] = None,
713
+ db_name: Optional[pulumi.Input[builtins.str]] = None,
714
+ name: Optional[pulumi.Input[builtins.str]] = None,
715
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
716
+ rotation_period: Optional[pulumi.Input[builtins.int]] = None,
717
+ rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
718
+ rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
719
+ rotation_window: Optional[pulumi.Input[builtins.int]] = None,
720
+ self_managed_password: Optional[pulumi.Input[builtins.str]] = None,
721
+ skip_import_rotation: Optional[pulumi.Input[builtins.bool]] = None,
722
+ username: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretBackendStaticRole':
722
723
  """
723
724
  Get an existing SecretBackendStaticRole resource's state with the given name, id, and optional extra
724
725
  properties used to qualify the lookup.
@@ -726,31 +727,31 @@ class SecretBackendStaticRole(pulumi.CustomResource):
726
727
  :param str resource_name: The unique name of the resulting resource.
727
728
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
728
729
  :param pulumi.ResourceOptions opts: Options for the resource.
729
- :param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
730
- :param pulumi.Input[str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
730
+ :param pulumi.Input[builtins.str] backend: The unique name of the Vault mount to configure.
731
+ :param pulumi.Input[builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
731
732
  can be done in `credential_config`.
732
- :param pulumi.Input[str] db_name: The unique name of the database connection to use for the static role.
733
- :param pulumi.Input[str] name: A unique name to give the static role.
734
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
733
+ :param pulumi.Input[builtins.str] db_name: The unique name of the database connection to use for the static role.
734
+ :param pulumi.Input[builtins.str] name: A unique name to give the static role.
735
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
735
736
  The value should not contain leading or trailing forward slashes.
736
737
  The `namespace` is always relative to the provider's configured namespace.
737
738
  *Available only for Vault Enterprise*.
738
- :param pulumi.Input[int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
739
+ :param pulumi.Input[builtins.int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
739
740
  Mutually exclusive with `rotation_schedule`.
740
- :param pulumi.Input[str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
741
+ :param pulumi.Input[builtins.str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
741
742
  Mutually exclusive with `rotation_period`.
742
743
 
743
744
  **Warning**: The `rotation_period` and `rotation_schedule` fields are
744
745
  mutually exclusive. One of them must be set but not both.
745
- :param pulumi.Input[Sequence[pulumi.Input[str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
746
- :param pulumi.Input[int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
746
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
747
+ :param pulumi.Input[builtins.int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
747
748
  from a given `rotation_schedule`.
748
- :param pulumi.Input[str] self_managed_password: The password corresponding to the username in the database.
749
+ :param pulumi.Input[builtins.str] self_managed_password: The password corresponding to the username in the database.
749
750
  Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
750
751
  select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
751
- :param pulumi.Input[bool] skip_import_rotation: If set to true, Vault will skip the
752
+ :param pulumi.Input[builtins.bool] skip_import_rotation: If set to true, Vault will skip the
752
753
  initial secret rotation on import. Requires Vault 1.18+ Enterprise.
753
- :param pulumi.Input[str] username: The database username that this static role corresponds to.
754
+ :param pulumi.Input[builtins.str] username: The database username that this static role corresponds to.
754
755
  """
755
756
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
756
757
 
@@ -773,7 +774,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
773
774
 
774
775
  @property
775
776
  @pulumi.getter
776
- def backend(self) -> pulumi.Output[str]:
777
+ def backend(self) -> pulumi.Output[builtins.str]:
777
778
  """
778
779
  The unique name of the Vault mount to configure.
779
780
  """
@@ -781,12 +782,12 @@ class SecretBackendStaticRole(pulumi.CustomResource):
781
782
 
782
783
  @property
783
784
  @pulumi.getter(name="credentialConfig")
784
- def credential_config(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
785
+ def credential_config(self) -> pulumi.Output[Optional[Mapping[str, builtins.str]]]:
785
786
  return pulumi.get(self, "credential_config")
786
787
 
787
788
  @property
788
789
  @pulumi.getter(name="credentialType")
789
- def credential_type(self) -> pulumi.Output[str]:
790
+ def credential_type(self) -> pulumi.Output[builtins.str]:
790
791
  """
791
792
  The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
792
793
  can be done in `credential_config`.
@@ -795,7 +796,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
795
796
 
796
797
  @property
797
798
  @pulumi.getter(name="dbName")
798
- def db_name(self) -> pulumi.Output[str]:
799
+ def db_name(self) -> pulumi.Output[builtins.str]:
799
800
  """
800
801
  The unique name of the database connection to use for the static role.
801
802
  """
@@ -803,7 +804,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
803
804
 
804
805
  @property
805
806
  @pulumi.getter
806
- def name(self) -> pulumi.Output[str]:
807
+ def name(self) -> pulumi.Output[builtins.str]:
807
808
  """
808
809
  A unique name to give the static role.
809
810
  """
@@ -811,7 +812,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
811
812
 
812
813
  @property
813
814
  @pulumi.getter
814
- def namespace(self) -> pulumi.Output[Optional[str]]:
815
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
815
816
  """
816
817
  The namespace to provision the resource in.
817
818
  The value should not contain leading or trailing forward slashes.
@@ -822,7 +823,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
822
823
 
823
824
  @property
824
825
  @pulumi.getter(name="rotationPeriod")
825
- def rotation_period(self) -> pulumi.Output[Optional[int]]:
826
+ def rotation_period(self) -> pulumi.Output[Optional[builtins.int]]:
826
827
  """
827
828
  The amount of time Vault should wait before rotating the password, in seconds.
828
829
  Mutually exclusive with `rotation_schedule`.
@@ -831,7 +832,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
831
832
 
832
833
  @property
833
834
  @pulumi.getter(name="rotationSchedule")
834
- def rotation_schedule(self) -> pulumi.Output[Optional[str]]:
835
+ def rotation_schedule(self) -> pulumi.Output[Optional[builtins.str]]:
835
836
  """
836
837
  A cron-style string that will define the schedule on which rotations should occur.
837
838
  Mutually exclusive with `rotation_period`.
@@ -843,7 +844,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
843
844
 
844
845
  @property
845
846
  @pulumi.getter(name="rotationStatements")
846
- def rotation_statements(self) -> pulumi.Output[Optional[Sequence[str]]]:
847
+ def rotation_statements(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
847
848
  """
848
849
  Database statements to execute to rotate the password for the configured database user.
849
850
  """
@@ -851,7 +852,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
851
852
 
852
853
  @property
853
854
  @pulumi.getter(name="rotationWindow")
854
- def rotation_window(self) -> pulumi.Output[Optional[int]]:
855
+ def rotation_window(self) -> pulumi.Output[Optional[builtins.int]]:
855
856
  """
856
857
  The amount of time, in seconds, in which rotations are allowed to occur starting
857
858
  from a given `rotation_schedule`.
@@ -860,7 +861,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
860
861
 
861
862
  @property
862
863
  @pulumi.getter(name="selfManagedPassword")
863
- def self_managed_password(self) -> pulumi.Output[Optional[str]]:
864
+ def self_managed_password(self) -> pulumi.Output[Optional[builtins.str]]:
864
865
  """
865
866
  The password corresponding to the username in the database.
866
867
  Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
@@ -870,7 +871,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
870
871
 
871
872
  @property
872
873
  @pulumi.getter(name="skipImportRotation")
873
- def skip_import_rotation(self) -> pulumi.Output[Optional[bool]]:
874
+ def skip_import_rotation(self) -> pulumi.Output[Optional[builtins.bool]]:
874
875
  """
875
876
  If set to true, Vault will skip the
876
877
  initial secret rotation on import. Requires Vault 1.18+ Enterprise.
@@ -879,7 +880,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
879
880
 
880
881
  @property
881
882
  @pulumi.getter
882
- def username(self) -> pulumi.Output[str]:
883
+ def username(self) -> pulumi.Output[builtins.str]:
883
884
  """
884
885
  The database username that this static role corresponds to.
885
886
  """