pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,45 +20,45 @@ __all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class SecretBackendStaticRoleArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
backend: pulumi.Input[str],
|
23
|
-
db_name: pulumi.Input[str],
|
24
|
-
username: pulumi.Input[str],
|
25
|
-
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
26
|
-
credential_type: Optional[pulumi.Input[str]] = None,
|
27
|
-
name: Optional[pulumi.Input[str]] = None,
|
28
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
29
|
-
rotation_period: Optional[pulumi.Input[int]] = None,
|
30
|
-
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
31
|
-
rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
32
|
-
rotation_window: Optional[pulumi.Input[int]] = None,
|
33
|
-
self_managed_password: Optional[pulumi.Input[str]] = None,
|
34
|
-
skip_import_rotation: Optional[pulumi.Input[bool]] = None):
|
23
|
+
backend: pulumi.Input[builtins.str],
|
24
|
+
db_name: pulumi.Input[builtins.str],
|
25
|
+
username: pulumi.Input[builtins.str],
|
26
|
+
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
|
27
|
+
credential_type: Optional[pulumi.Input[builtins.str]] = None,
|
28
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
29
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
30
|
+
rotation_period: Optional[pulumi.Input[builtins.int]] = None,
|
31
|
+
rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
|
32
|
+
rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
33
|
+
rotation_window: Optional[pulumi.Input[builtins.int]] = None,
|
34
|
+
self_managed_password: Optional[pulumi.Input[builtins.str]] = None,
|
35
|
+
skip_import_rotation: Optional[pulumi.Input[builtins.bool]] = None):
|
35
36
|
"""
|
36
37
|
The set of arguments for constructing a SecretBackendStaticRole resource.
|
37
|
-
:param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
|
38
|
-
:param pulumi.Input[str] db_name: The unique name of the database connection to use for the static role.
|
39
|
-
:param pulumi.Input[str] username: The database username that this static role corresponds to.
|
40
|
-
:param pulumi.Input[str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
|
38
|
+
:param pulumi.Input[builtins.str] backend: The unique name of the Vault mount to configure.
|
39
|
+
:param pulumi.Input[builtins.str] db_name: The unique name of the database connection to use for the static role.
|
40
|
+
:param pulumi.Input[builtins.str] username: The database username that this static role corresponds to.
|
41
|
+
:param pulumi.Input[builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
|
41
42
|
can be done in `credential_config`.
|
42
|
-
:param pulumi.Input[str] name: A unique name to give the static role.
|
43
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
43
|
+
:param pulumi.Input[builtins.str] name: A unique name to give the static role.
|
44
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
44
45
|
The value should not contain leading or trailing forward slashes.
|
45
46
|
The `namespace` is always relative to the provider's configured namespace.
|
46
47
|
*Available only for Vault Enterprise*.
|
47
|
-
:param pulumi.Input[int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
|
48
|
+
:param pulumi.Input[builtins.int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
|
48
49
|
Mutually exclusive with `rotation_schedule`.
|
49
|
-
:param pulumi.Input[str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
|
50
|
+
:param pulumi.Input[builtins.str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
|
50
51
|
Mutually exclusive with `rotation_period`.
|
51
52
|
|
52
53
|
**Warning**: The `rotation_period` and `rotation_schedule` fields are
|
53
54
|
mutually exclusive. One of them must be set but not both.
|
54
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
|
55
|
-
:param pulumi.Input[int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
|
55
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
|
56
|
+
:param pulumi.Input[builtins.int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
|
56
57
|
from a given `rotation_schedule`.
|
57
|
-
:param pulumi.Input[str] self_managed_password: The password corresponding to the username in the database.
|
58
|
+
:param pulumi.Input[builtins.str] self_managed_password: The password corresponding to the username in the database.
|
58
59
|
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
59
60
|
select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
|
60
|
-
:param pulumi.Input[bool] skip_import_rotation: If set to true, Vault will skip the
|
61
|
+
:param pulumi.Input[builtins.bool] skip_import_rotation: If set to true, Vault will skip the
|
61
62
|
initial secret rotation on import. Requires Vault 1.18+ Enterprise.
|
62
63
|
"""
|
63
64
|
pulumi.set(__self__, "backend", backend)
|
@@ -86,52 +87,52 @@ class SecretBackendStaticRoleArgs:
|
|
86
87
|
|
87
88
|
@property
|
88
89
|
@pulumi.getter
|
89
|
-
def backend(self) -> pulumi.Input[str]:
|
90
|
+
def backend(self) -> pulumi.Input[builtins.str]:
|
90
91
|
"""
|
91
92
|
The unique name of the Vault mount to configure.
|
92
93
|
"""
|
93
94
|
return pulumi.get(self, "backend")
|
94
95
|
|
95
96
|
@backend.setter
|
96
|
-
def backend(self, value: pulumi.Input[str]):
|
97
|
+
def backend(self, value: pulumi.Input[builtins.str]):
|
97
98
|
pulumi.set(self, "backend", value)
|
98
99
|
|
99
100
|
@property
|
100
101
|
@pulumi.getter(name="dbName")
|
101
|
-
def db_name(self) -> pulumi.Input[str]:
|
102
|
+
def db_name(self) -> pulumi.Input[builtins.str]:
|
102
103
|
"""
|
103
104
|
The unique name of the database connection to use for the static role.
|
104
105
|
"""
|
105
106
|
return pulumi.get(self, "db_name")
|
106
107
|
|
107
108
|
@db_name.setter
|
108
|
-
def db_name(self, value: pulumi.Input[str]):
|
109
|
+
def db_name(self, value: pulumi.Input[builtins.str]):
|
109
110
|
pulumi.set(self, "db_name", value)
|
110
111
|
|
111
112
|
@property
|
112
113
|
@pulumi.getter
|
113
|
-
def username(self) -> pulumi.Input[str]:
|
114
|
+
def username(self) -> pulumi.Input[builtins.str]:
|
114
115
|
"""
|
115
116
|
The database username that this static role corresponds to.
|
116
117
|
"""
|
117
118
|
return pulumi.get(self, "username")
|
118
119
|
|
119
120
|
@username.setter
|
120
|
-
def username(self, value: pulumi.Input[str]):
|
121
|
+
def username(self, value: pulumi.Input[builtins.str]):
|
121
122
|
pulumi.set(self, "username", value)
|
122
123
|
|
123
124
|
@property
|
124
125
|
@pulumi.getter(name="credentialConfig")
|
125
|
-
def credential_config(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
126
|
+
def credential_config(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
|
126
127
|
return pulumi.get(self, "credential_config")
|
127
128
|
|
128
129
|
@credential_config.setter
|
129
|
-
def credential_config(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
130
|
+
def credential_config(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
|
130
131
|
pulumi.set(self, "credential_config", value)
|
131
132
|
|
132
133
|
@property
|
133
134
|
@pulumi.getter(name="credentialType")
|
134
|
-
def credential_type(self) -> Optional[pulumi.Input[str]]:
|
135
|
+
def credential_type(self) -> Optional[pulumi.Input[builtins.str]]:
|
135
136
|
"""
|
136
137
|
The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
|
137
138
|
can be done in `credential_config`.
|
@@ -139,24 +140,24 @@ class SecretBackendStaticRoleArgs:
|
|
139
140
|
return pulumi.get(self, "credential_type")
|
140
141
|
|
141
142
|
@credential_type.setter
|
142
|
-
def credential_type(self, value: Optional[pulumi.Input[str]]):
|
143
|
+
def credential_type(self, value: Optional[pulumi.Input[builtins.str]]):
|
143
144
|
pulumi.set(self, "credential_type", value)
|
144
145
|
|
145
146
|
@property
|
146
147
|
@pulumi.getter
|
147
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
148
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
148
149
|
"""
|
149
150
|
A unique name to give the static role.
|
150
151
|
"""
|
151
152
|
return pulumi.get(self, "name")
|
152
153
|
|
153
154
|
@name.setter
|
154
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
155
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
155
156
|
pulumi.set(self, "name", value)
|
156
157
|
|
157
158
|
@property
|
158
159
|
@pulumi.getter
|
159
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
160
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
160
161
|
"""
|
161
162
|
The namespace to provision the resource in.
|
162
163
|
The value should not contain leading or trailing forward slashes.
|
@@ -166,12 +167,12 @@ class SecretBackendStaticRoleArgs:
|
|
166
167
|
return pulumi.get(self, "namespace")
|
167
168
|
|
168
169
|
@namespace.setter
|
169
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
170
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
170
171
|
pulumi.set(self, "namespace", value)
|
171
172
|
|
172
173
|
@property
|
173
174
|
@pulumi.getter(name="rotationPeriod")
|
174
|
-
def rotation_period(self) -> Optional[pulumi.Input[int]]:
|
175
|
+
def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
|
175
176
|
"""
|
176
177
|
The amount of time Vault should wait before rotating the password, in seconds.
|
177
178
|
Mutually exclusive with `rotation_schedule`.
|
@@ -179,12 +180,12 @@ class SecretBackendStaticRoleArgs:
|
|
179
180
|
return pulumi.get(self, "rotation_period")
|
180
181
|
|
181
182
|
@rotation_period.setter
|
182
|
-
def rotation_period(self, value: Optional[pulumi.Input[int]]):
|
183
|
+
def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
|
183
184
|
pulumi.set(self, "rotation_period", value)
|
184
185
|
|
185
186
|
@property
|
186
187
|
@pulumi.getter(name="rotationSchedule")
|
187
|
-
def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
|
188
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
|
188
189
|
"""
|
189
190
|
A cron-style string that will define the schedule on which rotations should occur.
|
190
191
|
Mutually exclusive with `rotation_period`.
|
@@ -195,24 +196,24 @@ class SecretBackendStaticRoleArgs:
|
|
195
196
|
return pulumi.get(self, "rotation_schedule")
|
196
197
|
|
197
198
|
@rotation_schedule.setter
|
198
|
-
def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
|
199
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
|
199
200
|
pulumi.set(self, "rotation_schedule", value)
|
200
201
|
|
201
202
|
@property
|
202
203
|
@pulumi.getter(name="rotationStatements")
|
203
|
-
def rotation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
204
|
+
def rotation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
204
205
|
"""
|
205
206
|
Database statements to execute to rotate the password for the configured database user.
|
206
207
|
"""
|
207
208
|
return pulumi.get(self, "rotation_statements")
|
208
209
|
|
209
210
|
@rotation_statements.setter
|
210
|
-
def rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
211
|
+
def rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
211
212
|
pulumi.set(self, "rotation_statements", value)
|
212
213
|
|
213
214
|
@property
|
214
215
|
@pulumi.getter(name="rotationWindow")
|
215
|
-
def rotation_window(self) -> Optional[pulumi.Input[int]]:
|
216
|
+
def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
|
216
217
|
"""
|
217
218
|
The amount of time, in seconds, in which rotations are allowed to occur starting
|
218
219
|
from a given `rotation_schedule`.
|
@@ -220,12 +221,12 @@ class SecretBackendStaticRoleArgs:
|
|
220
221
|
return pulumi.get(self, "rotation_window")
|
221
222
|
|
222
223
|
@rotation_window.setter
|
223
|
-
def rotation_window(self, value: Optional[pulumi.Input[int]]):
|
224
|
+
def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
|
224
225
|
pulumi.set(self, "rotation_window", value)
|
225
226
|
|
226
227
|
@property
|
227
228
|
@pulumi.getter(name="selfManagedPassword")
|
228
|
-
def self_managed_password(self) -> Optional[pulumi.Input[str]]:
|
229
|
+
def self_managed_password(self) -> Optional[pulumi.Input[builtins.str]]:
|
229
230
|
"""
|
230
231
|
The password corresponding to the username in the database.
|
231
232
|
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
@@ -234,12 +235,12 @@ class SecretBackendStaticRoleArgs:
|
|
234
235
|
return pulumi.get(self, "self_managed_password")
|
235
236
|
|
236
237
|
@self_managed_password.setter
|
237
|
-
def self_managed_password(self, value: Optional[pulumi.Input[str]]):
|
238
|
+
def self_managed_password(self, value: Optional[pulumi.Input[builtins.str]]):
|
238
239
|
pulumi.set(self, "self_managed_password", value)
|
239
240
|
|
240
241
|
@property
|
241
242
|
@pulumi.getter(name="skipImportRotation")
|
242
|
-
def skip_import_rotation(self) -> Optional[pulumi.Input[bool]]:
|
243
|
+
def skip_import_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
|
243
244
|
"""
|
244
245
|
If set to true, Vault will skip the
|
245
246
|
initial secret rotation on import. Requires Vault 1.18+ Enterprise.
|
@@ -247,53 +248,53 @@ class SecretBackendStaticRoleArgs:
|
|
247
248
|
return pulumi.get(self, "skip_import_rotation")
|
248
249
|
|
249
250
|
@skip_import_rotation.setter
|
250
|
-
def skip_import_rotation(self, value: Optional[pulumi.Input[bool]]):
|
251
|
+
def skip_import_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
|
251
252
|
pulumi.set(self, "skip_import_rotation", value)
|
252
253
|
|
253
254
|
|
254
255
|
@pulumi.input_type
|
255
256
|
class _SecretBackendStaticRoleState:
|
256
257
|
def __init__(__self__, *,
|
257
|
-
backend: Optional[pulumi.Input[str]] = None,
|
258
|
-
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
259
|
-
credential_type: Optional[pulumi.Input[str]] = None,
|
260
|
-
db_name: Optional[pulumi.Input[str]] = None,
|
261
|
-
name: Optional[pulumi.Input[str]] = None,
|
262
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
263
|
-
rotation_period: Optional[pulumi.Input[int]] = None,
|
264
|
-
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
265
|
-
rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
266
|
-
rotation_window: Optional[pulumi.Input[int]] = None,
|
267
|
-
self_managed_password: Optional[pulumi.Input[str]] = None,
|
268
|
-
skip_import_rotation: Optional[pulumi.Input[bool]] = None,
|
269
|
-
username: Optional[pulumi.Input[str]] = None):
|
258
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
259
|
+
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
|
260
|
+
credential_type: Optional[pulumi.Input[builtins.str]] = None,
|
261
|
+
db_name: Optional[pulumi.Input[builtins.str]] = None,
|
262
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
263
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
264
|
+
rotation_period: Optional[pulumi.Input[builtins.int]] = None,
|
265
|
+
rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
|
266
|
+
rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
267
|
+
rotation_window: Optional[pulumi.Input[builtins.int]] = None,
|
268
|
+
self_managed_password: Optional[pulumi.Input[builtins.str]] = None,
|
269
|
+
skip_import_rotation: Optional[pulumi.Input[builtins.bool]] = None,
|
270
|
+
username: Optional[pulumi.Input[builtins.str]] = None):
|
270
271
|
"""
|
271
272
|
Input properties used for looking up and filtering SecretBackendStaticRole resources.
|
272
|
-
:param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
|
273
|
-
:param pulumi.Input[str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
|
273
|
+
:param pulumi.Input[builtins.str] backend: The unique name of the Vault mount to configure.
|
274
|
+
:param pulumi.Input[builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
|
274
275
|
can be done in `credential_config`.
|
275
|
-
:param pulumi.Input[str] db_name: The unique name of the database connection to use for the static role.
|
276
|
-
:param pulumi.Input[str] name: A unique name to give the static role.
|
277
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
276
|
+
:param pulumi.Input[builtins.str] db_name: The unique name of the database connection to use for the static role.
|
277
|
+
:param pulumi.Input[builtins.str] name: A unique name to give the static role.
|
278
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
278
279
|
The value should not contain leading or trailing forward slashes.
|
279
280
|
The `namespace` is always relative to the provider's configured namespace.
|
280
281
|
*Available only for Vault Enterprise*.
|
281
|
-
:param pulumi.Input[int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
|
282
|
+
:param pulumi.Input[builtins.int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
|
282
283
|
Mutually exclusive with `rotation_schedule`.
|
283
|
-
:param pulumi.Input[str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
|
284
|
+
:param pulumi.Input[builtins.str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
|
284
285
|
Mutually exclusive with `rotation_period`.
|
285
286
|
|
286
287
|
**Warning**: The `rotation_period` and `rotation_schedule` fields are
|
287
288
|
mutually exclusive. One of them must be set but not both.
|
288
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
|
289
|
-
:param pulumi.Input[int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
|
289
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
|
290
|
+
:param pulumi.Input[builtins.int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
|
290
291
|
from a given `rotation_schedule`.
|
291
|
-
:param pulumi.Input[str] self_managed_password: The password corresponding to the username in the database.
|
292
|
+
:param pulumi.Input[builtins.str] self_managed_password: The password corresponding to the username in the database.
|
292
293
|
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
293
294
|
select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
|
294
|
-
:param pulumi.Input[bool] skip_import_rotation: If set to true, Vault will skip the
|
295
|
+
:param pulumi.Input[builtins.bool] skip_import_rotation: If set to true, Vault will skip the
|
295
296
|
initial secret rotation on import. Requires Vault 1.18+ Enterprise.
|
296
|
-
:param pulumi.Input[str] username: The database username that this static role corresponds to.
|
297
|
+
:param pulumi.Input[builtins.str] username: The database username that this static role corresponds to.
|
297
298
|
"""
|
298
299
|
if backend is not None:
|
299
300
|
pulumi.set(__self__, "backend", backend)
|
@@ -324,28 +325,28 @@ class _SecretBackendStaticRoleState:
|
|
324
325
|
|
325
326
|
@property
|
326
327
|
@pulumi.getter
|
327
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
328
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
328
329
|
"""
|
329
330
|
The unique name of the Vault mount to configure.
|
330
331
|
"""
|
331
332
|
return pulumi.get(self, "backend")
|
332
333
|
|
333
334
|
@backend.setter
|
334
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
335
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
335
336
|
pulumi.set(self, "backend", value)
|
336
337
|
|
337
338
|
@property
|
338
339
|
@pulumi.getter(name="credentialConfig")
|
339
|
-
def credential_config(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
340
|
+
def credential_config(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
|
340
341
|
return pulumi.get(self, "credential_config")
|
341
342
|
|
342
343
|
@credential_config.setter
|
343
|
-
def credential_config(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
344
|
+
def credential_config(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
|
344
345
|
pulumi.set(self, "credential_config", value)
|
345
346
|
|
346
347
|
@property
|
347
348
|
@pulumi.getter(name="credentialType")
|
348
|
-
def credential_type(self) -> Optional[pulumi.Input[str]]:
|
349
|
+
def credential_type(self) -> Optional[pulumi.Input[builtins.str]]:
|
349
350
|
"""
|
350
351
|
The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
|
351
352
|
can be done in `credential_config`.
|
@@ -353,36 +354,36 @@ class _SecretBackendStaticRoleState:
|
|
353
354
|
return pulumi.get(self, "credential_type")
|
354
355
|
|
355
356
|
@credential_type.setter
|
356
|
-
def credential_type(self, value: Optional[pulumi.Input[str]]):
|
357
|
+
def credential_type(self, value: Optional[pulumi.Input[builtins.str]]):
|
357
358
|
pulumi.set(self, "credential_type", value)
|
358
359
|
|
359
360
|
@property
|
360
361
|
@pulumi.getter(name="dbName")
|
361
|
-
def db_name(self) -> Optional[pulumi.Input[str]]:
|
362
|
+
def db_name(self) -> Optional[pulumi.Input[builtins.str]]:
|
362
363
|
"""
|
363
364
|
The unique name of the database connection to use for the static role.
|
364
365
|
"""
|
365
366
|
return pulumi.get(self, "db_name")
|
366
367
|
|
367
368
|
@db_name.setter
|
368
|
-
def db_name(self, value: Optional[pulumi.Input[str]]):
|
369
|
+
def db_name(self, value: Optional[pulumi.Input[builtins.str]]):
|
369
370
|
pulumi.set(self, "db_name", value)
|
370
371
|
|
371
372
|
@property
|
372
373
|
@pulumi.getter
|
373
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
374
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
374
375
|
"""
|
375
376
|
A unique name to give the static role.
|
376
377
|
"""
|
377
378
|
return pulumi.get(self, "name")
|
378
379
|
|
379
380
|
@name.setter
|
380
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
381
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
381
382
|
pulumi.set(self, "name", value)
|
382
383
|
|
383
384
|
@property
|
384
385
|
@pulumi.getter
|
385
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
386
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
386
387
|
"""
|
387
388
|
The namespace to provision the resource in.
|
388
389
|
The value should not contain leading or trailing forward slashes.
|
@@ -392,12 +393,12 @@ class _SecretBackendStaticRoleState:
|
|
392
393
|
return pulumi.get(self, "namespace")
|
393
394
|
|
394
395
|
@namespace.setter
|
395
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
396
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
396
397
|
pulumi.set(self, "namespace", value)
|
397
398
|
|
398
399
|
@property
|
399
400
|
@pulumi.getter(name="rotationPeriod")
|
400
|
-
def rotation_period(self) -> Optional[pulumi.Input[int]]:
|
401
|
+
def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
|
401
402
|
"""
|
402
403
|
The amount of time Vault should wait before rotating the password, in seconds.
|
403
404
|
Mutually exclusive with `rotation_schedule`.
|
@@ -405,12 +406,12 @@ class _SecretBackendStaticRoleState:
|
|
405
406
|
return pulumi.get(self, "rotation_period")
|
406
407
|
|
407
408
|
@rotation_period.setter
|
408
|
-
def rotation_period(self, value: Optional[pulumi.Input[int]]):
|
409
|
+
def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
|
409
410
|
pulumi.set(self, "rotation_period", value)
|
410
411
|
|
411
412
|
@property
|
412
413
|
@pulumi.getter(name="rotationSchedule")
|
413
|
-
def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
|
414
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
|
414
415
|
"""
|
415
416
|
A cron-style string that will define the schedule on which rotations should occur.
|
416
417
|
Mutually exclusive with `rotation_period`.
|
@@ -421,24 +422,24 @@ class _SecretBackendStaticRoleState:
|
|
421
422
|
return pulumi.get(self, "rotation_schedule")
|
422
423
|
|
423
424
|
@rotation_schedule.setter
|
424
|
-
def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
|
425
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
|
425
426
|
pulumi.set(self, "rotation_schedule", value)
|
426
427
|
|
427
428
|
@property
|
428
429
|
@pulumi.getter(name="rotationStatements")
|
429
|
-
def rotation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
430
|
+
def rotation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
430
431
|
"""
|
431
432
|
Database statements to execute to rotate the password for the configured database user.
|
432
433
|
"""
|
433
434
|
return pulumi.get(self, "rotation_statements")
|
434
435
|
|
435
436
|
@rotation_statements.setter
|
436
|
-
def rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
437
|
+
def rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
437
438
|
pulumi.set(self, "rotation_statements", value)
|
438
439
|
|
439
440
|
@property
|
440
441
|
@pulumi.getter(name="rotationWindow")
|
441
|
-
def rotation_window(self) -> Optional[pulumi.Input[int]]:
|
442
|
+
def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
|
442
443
|
"""
|
443
444
|
The amount of time, in seconds, in which rotations are allowed to occur starting
|
444
445
|
from a given `rotation_schedule`.
|
@@ -446,12 +447,12 @@ class _SecretBackendStaticRoleState:
|
|
446
447
|
return pulumi.get(self, "rotation_window")
|
447
448
|
|
448
449
|
@rotation_window.setter
|
449
|
-
def rotation_window(self, value: Optional[pulumi.Input[int]]):
|
450
|
+
def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
|
450
451
|
pulumi.set(self, "rotation_window", value)
|
451
452
|
|
452
453
|
@property
|
453
454
|
@pulumi.getter(name="selfManagedPassword")
|
454
|
-
def self_managed_password(self) -> Optional[pulumi.Input[str]]:
|
455
|
+
def self_managed_password(self) -> Optional[pulumi.Input[builtins.str]]:
|
455
456
|
"""
|
456
457
|
The password corresponding to the username in the database.
|
457
458
|
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
@@ -460,12 +461,12 @@ class _SecretBackendStaticRoleState:
|
|
460
461
|
return pulumi.get(self, "self_managed_password")
|
461
462
|
|
462
463
|
@self_managed_password.setter
|
463
|
-
def self_managed_password(self, value: Optional[pulumi.Input[str]]):
|
464
|
+
def self_managed_password(self, value: Optional[pulumi.Input[builtins.str]]):
|
464
465
|
pulumi.set(self, "self_managed_password", value)
|
465
466
|
|
466
467
|
@property
|
467
468
|
@pulumi.getter(name="skipImportRotation")
|
468
|
-
def skip_import_rotation(self) -> Optional[pulumi.Input[bool]]:
|
469
|
+
def skip_import_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
|
469
470
|
"""
|
470
471
|
If set to true, Vault will skip the
|
471
472
|
initial secret rotation on import. Requires Vault 1.18+ Enterprise.
|
@@ -473,19 +474,19 @@ class _SecretBackendStaticRoleState:
|
|
473
474
|
return pulumi.get(self, "skip_import_rotation")
|
474
475
|
|
475
476
|
@skip_import_rotation.setter
|
476
|
-
def skip_import_rotation(self, value: Optional[pulumi.Input[bool]]):
|
477
|
+
def skip_import_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
|
477
478
|
pulumi.set(self, "skip_import_rotation", value)
|
478
479
|
|
479
480
|
@property
|
480
481
|
@pulumi.getter
|
481
|
-
def username(self) -> Optional[pulumi.Input[str]]:
|
482
|
+
def username(self) -> Optional[pulumi.Input[builtins.str]]:
|
482
483
|
"""
|
483
484
|
The database username that this static role corresponds to.
|
484
485
|
"""
|
485
486
|
return pulumi.get(self, "username")
|
486
487
|
|
487
488
|
@username.setter
|
488
|
-
def username(self, value: Optional[pulumi.Input[str]]):
|
489
|
+
def username(self, value: Optional[pulumi.Input[builtins.str]]):
|
489
490
|
pulumi.set(self, "username", value)
|
490
491
|
|
491
492
|
|
@@ -494,19 +495,19 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
494
495
|
def __init__(__self__,
|
495
496
|
resource_name: str,
|
496
497
|
opts: Optional[pulumi.ResourceOptions] = None,
|
497
|
-
backend: Optional[pulumi.Input[str]] = None,
|
498
|
-
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
499
|
-
credential_type: Optional[pulumi.Input[str]] = None,
|
500
|
-
db_name: Optional[pulumi.Input[str]] = None,
|
501
|
-
name: Optional[pulumi.Input[str]] = None,
|
502
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
503
|
-
rotation_period: Optional[pulumi.Input[int]] = None,
|
504
|
-
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
505
|
-
rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
506
|
-
rotation_window: Optional[pulumi.Input[int]] = None,
|
507
|
-
self_managed_password: Optional[pulumi.Input[str]] = None,
|
508
|
-
skip_import_rotation: Optional[pulumi.Input[bool]] = None,
|
509
|
-
username: Optional[pulumi.Input[str]] = None,
|
498
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
499
|
+
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
|
500
|
+
credential_type: Optional[pulumi.Input[builtins.str]] = None,
|
501
|
+
db_name: Optional[pulumi.Input[builtins.str]] = None,
|
502
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
503
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
504
|
+
rotation_period: Optional[pulumi.Input[builtins.int]] = None,
|
505
|
+
rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
|
506
|
+
rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
507
|
+
rotation_window: Optional[pulumi.Input[builtins.int]] = None,
|
508
|
+
self_managed_password: Optional[pulumi.Input[builtins.str]] = None,
|
509
|
+
skip_import_rotation: Optional[pulumi.Input[builtins.bool]] = None,
|
510
|
+
username: Optional[pulumi.Input[builtins.str]] = None,
|
510
511
|
__props__=None):
|
511
512
|
"""
|
512
513
|
Creates a Database Secret Backend static role in Vault. Database secret backend
|
@@ -558,31 +559,31 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
558
559
|
|
559
560
|
:param str resource_name: The name of the resource.
|
560
561
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
561
|
-
:param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
|
562
|
-
:param pulumi.Input[str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
|
562
|
+
:param pulumi.Input[builtins.str] backend: The unique name of the Vault mount to configure.
|
563
|
+
:param pulumi.Input[builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
|
563
564
|
can be done in `credential_config`.
|
564
|
-
:param pulumi.Input[str] db_name: The unique name of the database connection to use for the static role.
|
565
|
-
:param pulumi.Input[str] name: A unique name to give the static role.
|
566
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
565
|
+
:param pulumi.Input[builtins.str] db_name: The unique name of the database connection to use for the static role.
|
566
|
+
:param pulumi.Input[builtins.str] name: A unique name to give the static role.
|
567
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
567
568
|
The value should not contain leading or trailing forward slashes.
|
568
569
|
The `namespace` is always relative to the provider's configured namespace.
|
569
570
|
*Available only for Vault Enterprise*.
|
570
|
-
:param pulumi.Input[int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
|
571
|
+
:param pulumi.Input[builtins.int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
|
571
572
|
Mutually exclusive with `rotation_schedule`.
|
572
|
-
:param pulumi.Input[str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
|
573
|
+
:param pulumi.Input[builtins.str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
|
573
574
|
Mutually exclusive with `rotation_period`.
|
574
575
|
|
575
576
|
**Warning**: The `rotation_period` and `rotation_schedule` fields are
|
576
577
|
mutually exclusive. One of them must be set but not both.
|
577
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
|
578
|
-
:param pulumi.Input[int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
|
578
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
|
579
|
+
:param pulumi.Input[builtins.int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
|
579
580
|
from a given `rotation_schedule`.
|
580
|
-
:param pulumi.Input[str] self_managed_password: The password corresponding to the username in the database.
|
581
|
+
:param pulumi.Input[builtins.str] self_managed_password: The password corresponding to the username in the database.
|
581
582
|
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
582
583
|
select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
|
583
|
-
:param pulumi.Input[bool] skip_import_rotation: If set to true, Vault will skip the
|
584
|
+
:param pulumi.Input[builtins.bool] skip_import_rotation: If set to true, Vault will skip the
|
584
585
|
initial secret rotation on import. Requires Vault 1.18+ Enterprise.
|
585
|
-
:param pulumi.Input[str] username: The database username that this static role corresponds to.
|
586
|
+
:param pulumi.Input[builtins.str] username: The database username that this static role corresponds to.
|
586
587
|
"""
|
587
588
|
...
|
588
589
|
@overload
|
@@ -653,19 +654,19 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
653
654
|
def _internal_init(__self__,
|
654
655
|
resource_name: str,
|
655
656
|
opts: Optional[pulumi.ResourceOptions] = None,
|
656
|
-
backend: Optional[pulumi.Input[str]] = None,
|
657
|
-
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
658
|
-
credential_type: Optional[pulumi.Input[str]] = None,
|
659
|
-
db_name: Optional[pulumi.Input[str]] = None,
|
660
|
-
name: Optional[pulumi.Input[str]] = None,
|
661
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
662
|
-
rotation_period: Optional[pulumi.Input[int]] = None,
|
663
|
-
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
664
|
-
rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
665
|
-
rotation_window: Optional[pulumi.Input[int]] = None,
|
666
|
-
self_managed_password: Optional[pulumi.Input[str]] = None,
|
667
|
-
skip_import_rotation: Optional[pulumi.Input[bool]] = None,
|
668
|
-
username: Optional[pulumi.Input[str]] = None,
|
657
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
658
|
+
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
|
659
|
+
credential_type: Optional[pulumi.Input[builtins.str]] = None,
|
660
|
+
db_name: Optional[pulumi.Input[builtins.str]] = None,
|
661
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
662
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
663
|
+
rotation_period: Optional[pulumi.Input[builtins.int]] = None,
|
664
|
+
rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
|
665
|
+
rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
666
|
+
rotation_window: Optional[pulumi.Input[builtins.int]] = None,
|
667
|
+
self_managed_password: Optional[pulumi.Input[builtins.str]] = None,
|
668
|
+
skip_import_rotation: Optional[pulumi.Input[builtins.bool]] = None,
|
669
|
+
username: Optional[pulumi.Input[builtins.str]] = None,
|
669
670
|
__props__=None):
|
670
671
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
671
672
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -706,19 +707,19 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
706
707
|
def get(resource_name: str,
|
707
708
|
id: pulumi.Input[str],
|
708
709
|
opts: Optional[pulumi.ResourceOptions] = None,
|
709
|
-
backend: Optional[pulumi.Input[str]] = None,
|
710
|
-
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
711
|
-
credential_type: Optional[pulumi.Input[str]] = None,
|
712
|
-
db_name: Optional[pulumi.Input[str]] = None,
|
713
|
-
name: Optional[pulumi.Input[str]] = None,
|
714
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
715
|
-
rotation_period: Optional[pulumi.Input[int]] = None,
|
716
|
-
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
717
|
-
rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
718
|
-
rotation_window: Optional[pulumi.Input[int]] = None,
|
719
|
-
self_managed_password: Optional[pulumi.Input[str]] = None,
|
720
|
-
skip_import_rotation: Optional[pulumi.Input[bool]] = None,
|
721
|
-
username: Optional[pulumi.Input[str]] = None) -> 'SecretBackendStaticRole':
|
710
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
711
|
+
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
|
712
|
+
credential_type: Optional[pulumi.Input[builtins.str]] = None,
|
713
|
+
db_name: Optional[pulumi.Input[builtins.str]] = None,
|
714
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
715
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
716
|
+
rotation_period: Optional[pulumi.Input[builtins.int]] = None,
|
717
|
+
rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
|
718
|
+
rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
719
|
+
rotation_window: Optional[pulumi.Input[builtins.int]] = None,
|
720
|
+
self_managed_password: Optional[pulumi.Input[builtins.str]] = None,
|
721
|
+
skip_import_rotation: Optional[pulumi.Input[builtins.bool]] = None,
|
722
|
+
username: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretBackendStaticRole':
|
722
723
|
"""
|
723
724
|
Get an existing SecretBackendStaticRole resource's state with the given name, id, and optional extra
|
724
725
|
properties used to qualify the lookup.
|
@@ -726,31 +727,31 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
726
727
|
:param str resource_name: The unique name of the resulting resource.
|
727
728
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
728
729
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
729
|
-
:param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
|
730
|
-
:param pulumi.Input[str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
|
730
|
+
:param pulumi.Input[builtins.str] backend: The unique name of the Vault mount to configure.
|
731
|
+
:param pulumi.Input[builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
|
731
732
|
can be done in `credential_config`.
|
732
|
-
:param pulumi.Input[str] db_name: The unique name of the database connection to use for the static role.
|
733
|
-
:param pulumi.Input[str] name: A unique name to give the static role.
|
734
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
733
|
+
:param pulumi.Input[builtins.str] db_name: The unique name of the database connection to use for the static role.
|
734
|
+
:param pulumi.Input[builtins.str] name: A unique name to give the static role.
|
735
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
735
736
|
The value should not contain leading or trailing forward slashes.
|
736
737
|
The `namespace` is always relative to the provider's configured namespace.
|
737
738
|
*Available only for Vault Enterprise*.
|
738
|
-
:param pulumi.Input[int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
|
739
|
+
:param pulumi.Input[builtins.int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
|
739
740
|
Mutually exclusive with `rotation_schedule`.
|
740
|
-
:param pulumi.Input[str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
|
741
|
+
:param pulumi.Input[builtins.str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
|
741
742
|
Mutually exclusive with `rotation_period`.
|
742
743
|
|
743
744
|
**Warning**: The `rotation_period` and `rotation_schedule` fields are
|
744
745
|
mutually exclusive. One of them must be set but not both.
|
745
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
|
746
|
-
:param pulumi.Input[int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
|
746
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
|
747
|
+
:param pulumi.Input[builtins.int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
|
747
748
|
from a given `rotation_schedule`.
|
748
|
-
:param pulumi.Input[str] self_managed_password: The password corresponding to the username in the database.
|
749
|
+
:param pulumi.Input[builtins.str] self_managed_password: The password corresponding to the username in the database.
|
749
750
|
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
750
751
|
select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
|
751
|
-
:param pulumi.Input[bool] skip_import_rotation: If set to true, Vault will skip the
|
752
|
+
:param pulumi.Input[builtins.bool] skip_import_rotation: If set to true, Vault will skip the
|
752
753
|
initial secret rotation on import. Requires Vault 1.18+ Enterprise.
|
753
|
-
:param pulumi.Input[str] username: The database username that this static role corresponds to.
|
754
|
+
:param pulumi.Input[builtins.str] username: The database username that this static role corresponds to.
|
754
755
|
"""
|
755
756
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
756
757
|
|
@@ -773,7 +774,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
773
774
|
|
774
775
|
@property
|
775
776
|
@pulumi.getter
|
776
|
-
def backend(self) -> pulumi.Output[str]:
|
777
|
+
def backend(self) -> pulumi.Output[builtins.str]:
|
777
778
|
"""
|
778
779
|
The unique name of the Vault mount to configure.
|
779
780
|
"""
|
@@ -781,12 +782,12 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
781
782
|
|
782
783
|
@property
|
783
784
|
@pulumi.getter(name="credentialConfig")
|
784
|
-
def credential_config(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
|
785
|
+
def credential_config(self) -> pulumi.Output[Optional[Mapping[str, builtins.str]]]:
|
785
786
|
return pulumi.get(self, "credential_config")
|
786
787
|
|
787
788
|
@property
|
788
789
|
@pulumi.getter(name="credentialType")
|
789
|
-
def credential_type(self) -> pulumi.Output[str]:
|
790
|
+
def credential_type(self) -> pulumi.Output[builtins.str]:
|
790
791
|
"""
|
791
792
|
The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
|
792
793
|
can be done in `credential_config`.
|
@@ -795,7 +796,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
795
796
|
|
796
797
|
@property
|
797
798
|
@pulumi.getter(name="dbName")
|
798
|
-
def db_name(self) -> pulumi.Output[str]:
|
799
|
+
def db_name(self) -> pulumi.Output[builtins.str]:
|
799
800
|
"""
|
800
801
|
The unique name of the database connection to use for the static role.
|
801
802
|
"""
|
@@ -803,7 +804,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
803
804
|
|
804
805
|
@property
|
805
806
|
@pulumi.getter
|
806
|
-
def name(self) -> pulumi.Output[str]:
|
807
|
+
def name(self) -> pulumi.Output[builtins.str]:
|
807
808
|
"""
|
808
809
|
A unique name to give the static role.
|
809
810
|
"""
|
@@ -811,7 +812,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
811
812
|
|
812
813
|
@property
|
813
814
|
@pulumi.getter
|
814
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
815
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
815
816
|
"""
|
816
817
|
The namespace to provision the resource in.
|
817
818
|
The value should not contain leading or trailing forward slashes.
|
@@ -822,7 +823,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
822
823
|
|
823
824
|
@property
|
824
825
|
@pulumi.getter(name="rotationPeriod")
|
825
|
-
def rotation_period(self) -> pulumi.Output[Optional[int]]:
|
826
|
+
def rotation_period(self) -> pulumi.Output[Optional[builtins.int]]:
|
826
827
|
"""
|
827
828
|
The amount of time Vault should wait before rotating the password, in seconds.
|
828
829
|
Mutually exclusive with `rotation_schedule`.
|
@@ -831,7 +832,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
831
832
|
|
832
833
|
@property
|
833
834
|
@pulumi.getter(name="rotationSchedule")
|
834
|
-
def rotation_schedule(self) -> pulumi.Output[Optional[str]]:
|
835
|
+
def rotation_schedule(self) -> pulumi.Output[Optional[builtins.str]]:
|
835
836
|
"""
|
836
837
|
A cron-style string that will define the schedule on which rotations should occur.
|
837
838
|
Mutually exclusive with `rotation_period`.
|
@@ -843,7 +844,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
843
844
|
|
844
845
|
@property
|
845
846
|
@pulumi.getter(name="rotationStatements")
|
846
|
-
def rotation_statements(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
847
|
+
def rotation_statements(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
847
848
|
"""
|
848
849
|
Database statements to execute to rotate the password for the configured database user.
|
849
850
|
"""
|
@@ -851,7 +852,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
851
852
|
|
852
853
|
@property
|
853
854
|
@pulumi.getter(name="rotationWindow")
|
854
|
-
def rotation_window(self) -> pulumi.Output[Optional[int]]:
|
855
|
+
def rotation_window(self) -> pulumi.Output[Optional[builtins.int]]:
|
855
856
|
"""
|
856
857
|
The amount of time, in seconds, in which rotations are allowed to occur starting
|
857
858
|
from a given `rotation_schedule`.
|
@@ -860,7 +861,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
860
861
|
|
861
862
|
@property
|
862
863
|
@pulumi.getter(name="selfManagedPassword")
|
863
|
-
def self_managed_password(self) -> pulumi.Output[Optional[str]]:
|
864
|
+
def self_managed_password(self) -> pulumi.Output[Optional[builtins.str]]:
|
864
865
|
"""
|
865
866
|
The password corresponding to the username in the database.
|
866
867
|
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
@@ -870,7 +871,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
870
871
|
|
871
872
|
@property
|
872
873
|
@pulumi.getter(name="skipImportRotation")
|
873
|
-
def skip_import_rotation(self) -> pulumi.Output[Optional[bool]]:
|
874
|
+
def skip_import_rotation(self) -> pulumi.Output[Optional[builtins.bool]]:
|
874
875
|
"""
|
875
876
|
If set to true, Vault will skip the
|
876
877
|
initial secret rotation on import. Requires Vault 1.18+ Enterprise.
|
@@ -879,7 +880,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
879
880
|
|
880
881
|
@property
|
881
882
|
@pulumi.getter
|
882
|
-
def username(self) -> pulumi.Output[str]:
|
883
|
+
def username(self) -> pulumi.Output[builtins.str]:
|
883
884
|
"""
|
884
885
|
The database username that this static role corresponds to.
|
885
886
|
"""
|