pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +19 -1
- pulumi_vault/_inputs.py +873 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +1016 -439
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +1057 -285
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +887 -256
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +426 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +878 -336
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +400 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +1006 -227
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +431 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +732 -693
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +380 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +909 -271
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +234 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +205 -159
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +902 -231
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +217 -124
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +833 -155
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +377 -350
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0.dist-info/RECORD +270 -0
- pulumi_vault-7.1.0.dist-info/RECORD +0 -268
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,45 +19,45 @@ __all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class SecretBackendStaticRoleArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
backend: pulumi.Input[
|
24
|
-
db_name: pulumi.Input[
|
25
|
-
username: pulumi.Input[
|
26
|
-
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
27
|
-
credential_type: Optional[pulumi.Input[
|
28
|
-
name: Optional[pulumi.Input[
|
29
|
-
namespace: Optional[pulumi.Input[
|
30
|
-
rotation_period: Optional[pulumi.Input[
|
31
|
-
rotation_schedule: Optional[pulumi.Input[
|
32
|
-
rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[
|
33
|
-
rotation_window: Optional[pulumi.Input[
|
34
|
-
self_managed_password: Optional[pulumi.Input[
|
35
|
-
skip_import_rotation: Optional[pulumi.Input[
|
22
|
+
backend: pulumi.Input[_builtins.str],
|
23
|
+
db_name: pulumi.Input[_builtins.str],
|
24
|
+
username: pulumi.Input[_builtins.str],
|
25
|
+
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
26
|
+
credential_type: Optional[pulumi.Input[_builtins.str]] = None,
|
27
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
28
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
29
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
30
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
31
|
+
rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
32
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
33
|
+
self_managed_password: Optional[pulumi.Input[_builtins.str]] = None,
|
34
|
+
skip_import_rotation: Optional[pulumi.Input[_builtins.bool]] = None):
|
36
35
|
"""
|
37
36
|
The set of arguments for constructing a SecretBackendStaticRole resource.
|
38
|
-
:param pulumi.Input[
|
39
|
-
:param pulumi.Input[
|
40
|
-
:param pulumi.Input[
|
41
|
-
:param pulumi.Input[
|
37
|
+
:param pulumi.Input[_builtins.str] backend: The unique name of the Vault mount to configure.
|
38
|
+
:param pulumi.Input[_builtins.str] db_name: The unique name of the database connection to use for the static role.
|
39
|
+
:param pulumi.Input[_builtins.str] username: The database username that this static role corresponds to.
|
40
|
+
:param pulumi.Input[_builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
|
42
41
|
can be done in `credential_config`.
|
43
|
-
:param pulumi.Input[
|
44
|
-
:param pulumi.Input[
|
42
|
+
:param pulumi.Input[_builtins.str] name: A unique name to give the static role.
|
43
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
45
44
|
The value should not contain leading or trailing forward slashes.
|
46
45
|
The `namespace` is always relative to the provider's configured namespace.
|
47
46
|
*Available only for Vault Enterprise*.
|
48
|
-
:param pulumi.Input[
|
47
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
|
49
48
|
Mutually exclusive with `rotation_schedule`.
|
50
|
-
:param pulumi.Input[
|
49
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
|
51
50
|
Mutually exclusive with `rotation_period`.
|
52
51
|
|
53
52
|
**Warning**: The `rotation_period` and `rotation_schedule` fields are
|
54
53
|
mutually exclusive. One of them must be set but not both.
|
55
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
56
|
-
:param pulumi.Input[
|
54
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
|
55
|
+
:param pulumi.Input[_builtins.int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
|
57
56
|
from a given `rotation_schedule`.
|
58
|
-
:param pulumi.Input[
|
57
|
+
:param pulumi.Input[_builtins.str] self_managed_password: The password corresponding to the username in the database.
|
59
58
|
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
60
59
|
select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
|
61
|
-
:param pulumi.Input[
|
60
|
+
:param pulumi.Input[_builtins.bool] skip_import_rotation: If set to true, Vault will skip the
|
62
61
|
initial secret rotation on import. Requires Vault 1.18+ Enterprise.
|
63
62
|
"""
|
64
63
|
pulumi.set(__self__, "backend", backend)
|
@@ -85,54 +84,54 @@ class SecretBackendStaticRoleArgs:
|
|
85
84
|
if skip_import_rotation is not None:
|
86
85
|
pulumi.set(__self__, "skip_import_rotation", skip_import_rotation)
|
87
86
|
|
88
|
-
@property
|
87
|
+
@_builtins.property
|
89
88
|
@pulumi.getter
|
90
|
-
def backend(self) -> pulumi.Input[
|
89
|
+
def backend(self) -> pulumi.Input[_builtins.str]:
|
91
90
|
"""
|
92
91
|
The unique name of the Vault mount to configure.
|
93
92
|
"""
|
94
93
|
return pulumi.get(self, "backend")
|
95
94
|
|
96
95
|
@backend.setter
|
97
|
-
def backend(self, value: pulumi.Input[
|
96
|
+
def backend(self, value: pulumi.Input[_builtins.str]):
|
98
97
|
pulumi.set(self, "backend", value)
|
99
98
|
|
100
|
-
@property
|
99
|
+
@_builtins.property
|
101
100
|
@pulumi.getter(name="dbName")
|
102
|
-
def db_name(self) -> pulumi.Input[
|
101
|
+
def db_name(self) -> pulumi.Input[_builtins.str]:
|
103
102
|
"""
|
104
103
|
The unique name of the database connection to use for the static role.
|
105
104
|
"""
|
106
105
|
return pulumi.get(self, "db_name")
|
107
106
|
|
108
107
|
@db_name.setter
|
109
|
-
def db_name(self, value: pulumi.Input[
|
108
|
+
def db_name(self, value: pulumi.Input[_builtins.str]):
|
110
109
|
pulumi.set(self, "db_name", value)
|
111
110
|
|
112
|
-
@property
|
111
|
+
@_builtins.property
|
113
112
|
@pulumi.getter
|
114
|
-
def username(self) -> pulumi.Input[
|
113
|
+
def username(self) -> pulumi.Input[_builtins.str]:
|
115
114
|
"""
|
116
115
|
The database username that this static role corresponds to.
|
117
116
|
"""
|
118
117
|
return pulumi.get(self, "username")
|
119
118
|
|
120
119
|
@username.setter
|
121
|
-
def username(self, value: pulumi.Input[
|
120
|
+
def username(self, value: pulumi.Input[_builtins.str]):
|
122
121
|
pulumi.set(self, "username", value)
|
123
122
|
|
124
|
-
@property
|
123
|
+
@_builtins.property
|
125
124
|
@pulumi.getter(name="credentialConfig")
|
126
|
-
def credential_config(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
125
|
+
def credential_config(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
127
126
|
return pulumi.get(self, "credential_config")
|
128
127
|
|
129
128
|
@credential_config.setter
|
130
|
-
def credential_config(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
129
|
+
def credential_config(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
131
130
|
pulumi.set(self, "credential_config", value)
|
132
131
|
|
133
|
-
@property
|
132
|
+
@_builtins.property
|
134
133
|
@pulumi.getter(name="credentialType")
|
135
|
-
def credential_type(self) -> Optional[pulumi.Input[
|
134
|
+
def credential_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
136
135
|
"""
|
137
136
|
The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
|
138
137
|
can be done in `credential_config`.
|
@@ -140,24 +139,24 @@ class SecretBackendStaticRoleArgs:
|
|
140
139
|
return pulumi.get(self, "credential_type")
|
141
140
|
|
142
141
|
@credential_type.setter
|
143
|
-
def credential_type(self, value: Optional[pulumi.Input[
|
142
|
+
def credential_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
144
143
|
pulumi.set(self, "credential_type", value)
|
145
144
|
|
146
|
-
@property
|
145
|
+
@_builtins.property
|
147
146
|
@pulumi.getter
|
148
|
-
def name(self) -> Optional[pulumi.Input[
|
147
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
149
148
|
"""
|
150
149
|
A unique name to give the static role.
|
151
150
|
"""
|
152
151
|
return pulumi.get(self, "name")
|
153
152
|
|
154
153
|
@name.setter
|
155
|
-
def name(self, value: Optional[pulumi.Input[
|
154
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
156
155
|
pulumi.set(self, "name", value)
|
157
156
|
|
158
|
-
@property
|
157
|
+
@_builtins.property
|
159
158
|
@pulumi.getter
|
160
|
-
def namespace(self) -> Optional[pulumi.Input[
|
159
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
161
160
|
"""
|
162
161
|
The namespace to provision the resource in.
|
163
162
|
The value should not contain leading or trailing forward slashes.
|
@@ -167,12 +166,12 @@ class SecretBackendStaticRoleArgs:
|
|
167
166
|
return pulumi.get(self, "namespace")
|
168
167
|
|
169
168
|
@namespace.setter
|
170
|
-
def namespace(self, value: Optional[pulumi.Input[
|
169
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
171
170
|
pulumi.set(self, "namespace", value)
|
172
171
|
|
173
|
-
@property
|
172
|
+
@_builtins.property
|
174
173
|
@pulumi.getter(name="rotationPeriod")
|
175
|
-
def rotation_period(self) -> Optional[pulumi.Input[
|
174
|
+
def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
176
175
|
"""
|
177
176
|
The amount of time Vault should wait before rotating the password, in seconds.
|
178
177
|
Mutually exclusive with `rotation_schedule`.
|
@@ -180,12 +179,12 @@ class SecretBackendStaticRoleArgs:
|
|
180
179
|
return pulumi.get(self, "rotation_period")
|
181
180
|
|
182
181
|
@rotation_period.setter
|
183
|
-
def rotation_period(self, value: Optional[pulumi.Input[
|
182
|
+
def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
184
183
|
pulumi.set(self, "rotation_period", value)
|
185
184
|
|
186
|
-
@property
|
185
|
+
@_builtins.property
|
187
186
|
@pulumi.getter(name="rotationSchedule")
|
188
|
-
def rotation_schedule(self) -> Optional[pulumi.Input[
|
187
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
|
189
188
|
"""
|
190
189
|
A cron-style string that will define the schedule on which rotations should occur.
|
191
190
|
Mutually exclusive with `rotation_period`.
|
@@ -196,24 +195,24 @@ class SecretBackendStaticRoleArgs:
|
|
196
195
|
return pulumi.get(self, "rotation_schedule")
|
197
196
|
|
198
197
|
@rotation_schedule.setter
|
199
|
-
def rotation_schedule(self, value: Optional[pulumi.Input[
|
198
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
|
200
199
|
pulumi.set(self, "rotation_schedule", value)
|
201
200
|
|
202
|
-
@property
|
201
|
+
@_builtins.property
|
203
202
|
@pulumi.getter(name="rotationStatements")
|
204
|
-
def rotation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
203
|
+
def rotation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
205
204
|
"""
|
206
205
|
Database statements to execute to rotate the password for the configured database user.
|
207
206
|
"""
|
208
207
|
return pulumi.get(self, "rotation_statements")
|
209
208
|
|
210
209
|
@rotation_statements.setter
|
211
|
-
def rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
210
|
+
def rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
212
211
|
pulumi.set(self, "rotation_statements", value)
|
213
212
|
|
214
|
-
@property
|
213
|
+
@_builtins.property
|
215
214
|
@pulumi.getter(name="rotationWindow")
|
216
|
-
def rotation_window(self) -> Optional[pulumi.Input[
|
215
|
+
def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
|
217
216
|
"""
|
218
217
|
The amount of time, in seconds, in which rotations are allowed to occur starting
|
219
218
|
from a given `rotation_schedule`.
|
@@ -221,12 +220,12 @@ class SecretBackendStaticRoleArgs:
|
|
221
220
|
return pulumi.get(self, "rotation_window")
|
222
221
|
|
223
222
|
@rotation_window.setter
|
224
|
-
def rotation_window(self, value: Optional[pulumi.Input[
|
223
|
+
def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
|
225
224
|
pulumi.set(self, "rotation_window", value)
|
226
225
|
|
227
|
-
@property
|
226
|
+
@_builtins.property
|
228
227
|
@pulumi.getter(name="selfManagedPassword")
|
229
|
-
def self_managed_password(self) -> Optional[pulumi.Input[
|
228
|
+
def self_managed_password(self) -> Optional[pulumi.Input[_builtins.str]]:
|
230
229
|
"""
|
231
230
|
The password corresponding to the username in the database.
|
232
231
|
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
@@ -235,12 +234,12 @@ class SecretBackendStaticRoleArgs:
|
|
235
234
|
return pulumi.get(self, "self_managed_password")
|
236
235
|
|
237
236
|
@self_managed_password.setter
|
238
|
-
def self_managed_password(self, value: Optional[pulumi.Input[
|
237
|
+
def self_managed_password(self, value: Optional[pulumi.Input[_builtins.str]]):
|
239
238
|
pulumi.set(self, "self_managed_password", value)
|
240
239
|
|
241
|
-
@property
|
240
|
+
@_builtins.property
|
242
241
|
@pulumi.getter(name="skipImportRotation")
|
243
|
-
def skip_import_rotation(self) -> Optional[pulumi.Input[
|
242
|
+
def skip_import_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
244
243
|
"""
|
245
244
|
If set to true, Vault will skip the
|
246
245
|
initial secret rotation on import. Requires Vault 1.18+ Enterprise.
|
@@ -248,53 +247,53 @@ class SecretBackendStaticRoleArgs:
|
|
248
247
|
return pulumi.get(self, "skip_import_rotation")
|
249
248
|
|
250
249
|
@skip_import_rotation.setter
|
251
|
-
def skip_import_rotation(self, value: Optional[pulumi.Input[
|
250
|
+
def skip_import_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
252
251
|
pulumi.set(self, "skip_import_rotation", value)
|
253
252
|
|
254
253
|
|
255
254
|
@pulumi.input_type
|
256
255
|
class _SecretBackendStaticRoleState:
|
257
256
|
def __init__(__self__, *,
|
258
|
-
backend: Optional[pulumi.Input[
|
259
|
-
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
260
|
-
credential_type: Optional[pulumi.Input[
|
261
|
-
db_name: Optional[pulumi.Input[
|
262
|
-
name: Optional[pulumi.Input[
|
263
|
-
namespace: Optional[pulumi.Input[
|
264
|
-
rotation_period: Optional[pulumi.Input[
|
265
|
-
rotation_schedule: Optional[pulumi.Input[
|
266
|
-
rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[
|
267
|
-
rotation_window: Optional[pulumi.Input[
|
268
|
-
self_managed_password: Optional[pulumi.Input[
|
269
|
-
skip_import_rotation: Optional[pulumi.Input[
|
270
|
-
username: Optional[pulumi.Input[
|
257
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
258
|
+
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
259
|
+
credential_type: Optional[pulumi.Input[_builtins.str]] = None,
|
260
|
+
db_name: Optional[pulumi.Input[_builtins.str]] = None,
|
261
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
262
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
263
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
264
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
265
|
+
rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
266
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
267
|
+
self_managed_password: Optional[pulumi.Input[_builtins.str]] = None,
|
268
|
+
skip_import_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
269
|
+
username: Optional[pulumi.Input[_builtins.str]] = None):
|
271
270
|
"""
|
272
271
|
Input properties used for looking up and filtering SecretBackendStaticRole resources.
|
273
|
-
:param pulumi.Input[
|
274
|
-
:param pulumi.Input[
|
272
|
+
:param pulumi.Input[_builtins.str] backend: The unique name of the Vault mount to configure.
|
273
|
+
:param pulumi.Input[_builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
|
275
274
|
can be done in `credential_config`.
|
276
|
-
:param pulumi.Input[
|
277
|
-
:param pulumi.Input[
|
278
|
-
:param pulumi.Input[
|
275
|
+
:param pulumi.Input[_builtins.str] db_name: The unique name of the database connection to use for the static role.
|
276
|
+
:param pulumi.Input[_builtins.str] name: A unique name to give the static role.
|
277
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
279
278
|
The value should not contain leading or trailing forward slashes.
|
280
279
|
The `namespace` is always relative to the provider's configured namespace.
|
281
280
|
*Available only for Vault Enterprise*.
|
282
|
-
:param pulumi.Input[
|
281
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
|
283
282
|
Mutually exclusive with `rotation_schedule`.
|
284
|
-
:param pulumi.Input[
|
283
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
|
285
284
|
Mutually exclusive with `rotation_period`.
|
286
285
|
|
287
286
|
**Warning**: The `rotation_period` and `rotation_schedule` fields are
|
288
287
|
mutually exclusive. One of them must be set but not both.
|
289
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
290
|
-
:param pulumi.Input[
|
288
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
|
289
|
+
:param pulumi.Input[_builtins.int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
|
291
290
|
from a given `rotation_schedule`.
|
292
|
-
:param pulumi.Input[
|
291
|
+
:param pulumi.Input[_builtins.str] self_managed_password: The password corresponding to the username in the database.
|
293
292
|
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
294
293
|
select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
|
295
|
-
:param pulumi.Input[
|
294
|
+
:param pulumi.Input[_builtins.bool] skip_import_rotation: If set to true, Vault will skip the
|
296
295
|
initial secret rotation on import. Requires Vault 1.18+ Enterprise.
|
297
|
-
:param pulumi.Input[
|
296
|
+
:param pulumi.Input[_builtins.str] username: The database username that this static role corresponds to.
|
298
297
|
"""
|
299
298
|
if backend is not None:
|
300
299
|
pulumi.set(__self__, "backend", backend)
|
@@ -323,30 +322,30 @@ class _SecretBackendStaticRoleState:
|
|
323
322
|
if username is not None:
|
324
323
|
pulumi.set(__self__, "username", username)
|
325
324
|
|
326
|
-
@property
|
325
|
+
@_builtins.property
|
327
326
|
@pulumi.getter
|
328
|
-
def backend(self) -> Optional[pulumi.Input[
|
327
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
329
328
|
"""
|
330
329
|
The unique name of the Vault mount to configure.
|
331
330
|
"""
|
332
331
|
return pulumi.get(self, "backend")
|
333
332
|
|
334
333
|
@backend.setter
|
335
|
-
def backend(self, value: Optional[pulumi.Input[
|
334
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
336
335
|
pulumi.set(self, "backend", value)
|
337
336
|
|
338
|
-
@property
|
337
|
+
@_builtins.property
|
339
338
|
@pulumi.getter(name="credentialConfig")
|
340
|
-
def credential_config(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
339
|
+
def credential_config(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
341
340
|
return pulumi.get(self, "credential_config")
|
342
341
|
|
343
342
|
@credential_config.setter
|
344
|
-
def credential_config(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
343
|
+
def credential_config(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
345
344
|
pulumi.set(self, "credential_config", value)
|
346
345
|
|
347
|
-
@property
|
346
|
+
@_builtins.property
|
348
347
|
@pulumi.getter(name="credentialType")
|
349
|
-
def credential_type(self) -> Optional[pulumi.Input[
|
348
|
+
def credential_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
350
349
|
"""
|
351
350
|
The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
|
352
351
|
can be done in `credential_config`.
|
@@ -354,36 +353,36 @@ class _SecretBackendStaticRoleState:
|
|
354
353
|
return pulumi.get(self, "credential_type")
|
355
354
|
|
356
355
|
@credential_type.setter
|
357
|
-
def credential_type(self, value: Optional[pulumi.Input[
|
356
|
+
def credential_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
358
357
|
pulumi.set(self, "credential_type", value)
|
359
358
|
|
360
|
-
@property
|
359
|
+
@_builtins.property
|
361
360
|
@pulumi.getter(name="dbName")
|
362
|
-
def db_name(self) -> Optional[pulumi.Input[
|
361
|
+
def db_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
363
362
|
"""
|
364
363
|
The unique name of the database connection to use for the static role.
|
365
364
|
"""
|
366
365
|
return pulumi.get(self, "db_name")
|
367
366
|
|
368
367
|
@db_name.setter
|
369
|
-
def db_name(self, value: Optional[pulumi.Input[
|
368
|
+
def db_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
370
369
|
pulumi.set(self, "db_name", value)
|
371
370
|
|
372
|
-
@property
|
371
|
+
@_builtins.property
|
373
372
|
@pulumi.getter
|
374
|
-
def name(self) -> Optional[pulumi.Input[
|
373
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
375
374
|
"""
|
376
375
|
A unique name to give the static role.
|
377
376
|
"""
|
378
377
|
return pulumi.get(self, "name")
|
379
378
|
|
380
379
|
@name.setter
|
381
|
-
def name(self, value: Optional[pulumi.Input[
|
380
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
382
381
|
pulumi.set(self, "name", value)
|
383
382
|
|
384
|
-
@property
|
383
|
+
@_builtins.property
|
385
384
|
@pulumi.getter
|
386
|
-
def namespace(self) -> Optional[pulumi.Input[
|
385
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
387
386
|
"""
|
388
387
|
The namespace to provision the resource in.
|
389
388
|
The value should not contain leading or trailing forward slashes.
|
@@ -393,12 +392,12 @@ class _SecretBackendStaticRoleState:
|
|
393
392
|
return pulumi.get(self, "namespace")
|
394
393
|
|
395
394
|
@namespace.setter
|
396
|
-
def namespace(self, value: Optional[pulumi.Input[
|
395
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
397
396
|
pulumi.set(self, "namespace", value)
|
398
397
|
|
399
|
-
@property
|
398
|
+
@_builtins.property
|
400
399
|
@pulumi.getter(name="rotationPeriod")
|
401
|
-
def rotation_period(self) -> Optional[pulumi.Input[
|
400
|
+
def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
402
401
|
"""
|
403
402
|
The amount of time Vault should wait before rotating the password, in seconds.
|
404
403
|
Mutually exclusive with `rotation_schedule`.
|
@@ -406,12 +405,12 @@ class _SecretBackendStaticRoleState:
|
|
406
405
|
return pulumi.get(self, "rotation_period")
|
407
406
|
|
408
407
|
@rotation_period.setter
|
409
|
-
def rotation_period(self, value: Optional[pulumi.Input[
|
408
|
+
def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
410
409
|
pulumi.set(self, "rotation_period", value)
|
411
410
|
|
412
|
-
@property
|
411
|
+
@_builtins.property
|
413
412
|
@pulumi.getter(name="rotationSchedule")
|
414
|
-
def rotation_schedule(self) -> Optional[pulumi.Input[
|
413
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
|
415
414
|
"""
|
416
415
|
A cron-style string that will define the schedule on which rotations should occur.
|
417
416
|
Mutually exclusive with `rotation_period`.
|
@@ -422,24 +421,24 @@ class _SecretBackendStaticRoleState:
|
|
422
421
|
return pulumi.get(self, "rotation_schedule")
|
423
422
|
|
424
423
|
@rotation_schedule.setter
|
425
|
-
def rotation_schedule(self, value: Optional[pulumi.Input[
|
424
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
|
426
425
|
pulumi.set(self, "rotation_schedule", value)
|
427
426
|
|
428
|
-
@property
|
427
|
+
@_builtins.property
|
429
428
|
@pulumi.getter(name="rotationStatements")
|
430
|
-
def rotation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
429
|
+
def rotation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
431
430
|
"""
|
432
431
|
Database statements to execute to rotate the password for the configured database user.
|
433
432
|
"""
|
434
433
|
return pulumi.get(self, "rotation_statements")
|
435
434
|
|
436
435
|
@rotation_statements.setter
|
437
|
-
def rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
436
|
+
def rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
438
437
|
pulumi.set(self, "rotation_statements", value)
|
439
438
|
|
440
|
-
@property
|
439
|
+
@_builtins.property
|
441
440
|
@pulumi.getter(name="rotationWindow")
|
442
|
-
def rotation_window(self) -> Optional[pulumi.Input[
|
441
|
+
def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
|
443
442
|
"""
|
444
443
|
The amount of time, in seconds, in which rotations are allowed to occur starting
|
445
444
|
from a given `rotation_schedule`.
|
@@ -447,12 +446,12 @@ class _SecretBackendStaticRoleState:
|
|
447
446
|
return pulumi.get(self, "rotation_window")
|
448
447
|
|
449
448
|
@rotation_window.setter
|
450
|
-
def rotation_window(self, value: Optional[pulumi.Input[
|
449
|
+
def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
|
451
450
|
pulumi.set(self, "rotation_window", value)
|
452
451
|
|
453
|
-
@property
|
452
|
+
@_builtins.property
|
454
453
|
@pulumi.getter(name="selfManagedPassword")
|
455
|
-
def self_managed_password(self) -> Optional[pulumi.Input[
|
454
|
+
def self_managed_password(self) -> Optional[pulumi.Input[_builtins.str]]:
|
456
455
|
"""
|
457
456
|
The password corresponding to the username in the database.
|
458
457
|
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
@@ -461,12 +460,12 @@ class _SecretBackendStaticRoleState:
|
|
461
460
|
return pulumi.get(self, "self_managed_password")
|
462
461
|
|
463
462
|
@self_managed_password.setter
|
464
|
-
def self_managed_password(self, value: Optional[pulumi.Input[
|
463
|
+
def self_managed_password(self, value: Optional[pulumi.Input[_builtins.str]]):
|
465
464
|
pulumi.set(self, "self_managed_password", value)
|
466
465
|
|
467
|
-
@property
|
466
|
+
@_builtins.property
|
468
467
|
@pulumi.getter(name="skipImportRotation")
|
469
|
-
def skip_import_rotation(self) -> Optional[pulumi.Input[
|
468
|
+
def skip_import_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
470
469
|
"""
|
471
470
|
If set to true, Vault will skip the
|
472
471
|
initial secret rotation on import. Requires Vault 1.18+ Enterprise.
|
@@ -474,19 +473,19 @@ class _SecretBackendStaticRoleState:
|
|
474
473
|
return pulumi.get(self, "skip_import_rotation")
|
475
474
|
|
476
475
|
@skip_import_rotation.setter
|
477
|
-
def skip_import_rotation(self, value: Optional[pulumi.Input[
|
476
|
+
def skip_import_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
478
477
|
pulumi.set(self, "skip_import_rotation", value)
|
479
478
|
|
480
|
-
@property
|
479
|
+
@_builtins.property
|
481
480
|
@pulumi.getter
|
482
|
-
def username(self) -> Optional[pulumi.Input[
|
481
|
+
def username(self) -> Optional[pulumi.Input[_builtins.str]]:
|
483
482
|
"""
|
484
483
|
The database username that this static role corresponds to.
|
485
484
|
"""
|
486
485
|
return pulumi.get(self, "username")
|
487
486
|
|
488
487
|
@username.setter
|
489
|
-
def username(self, value: Optional[pulumi.Input[
|
488
|
+
def username(self, value: Optional[pulumi.Input[_builtins.str]]):
|
490
489
|
pulumi.set(self, "username", value)
|
491
490
|
|
492
491
|
|
@@ -496,19 +495,19 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
496
495
|
def __init__(__self__,
|
497
496
|
resource_name: str,
|
498
497
|
opts: Optional[pulumi.ResourceOptions] = None,
|
499
|
-
backend: Optional[pulumi.Input[
|
500
|
-
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
501
|
-
credential_type: Optional[pulumi.Input[
|
502
|
-
db_name: Optional[pulumi.Input[
|
503
|
-
name: Optional[pulumi.Input[
|
504
|
-
namespace: Optional[pulumi.Input[
|
505
|
-
rotation_period: Optional[pulumi.Input[
|
506
|
-
rotation_schedule: Optional[pulumi.Input[
|
507
|
-
rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[
|
508
|
-
rotation_window: Optional[pulumi.Input[
|
509
|
-
self_managed_password: Optional[pulumi.Input[
|
510
|
-
skip_import_rotation: Optional[pulumi.Input[
|
511
|
-
username: Optional[pulumi.Input[
|
498
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
499
|
+
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
500
|
+
credential_type: Optional[pulumi.Input[_builtins.str]] = None,
|
501
|
+
db_name: Optional[pulumi.Input[_builtins.str]] = None,
|
502
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
503
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
504
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
505
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
506
|
+
rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
507
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
508
|
+
self_managed_password: Optional[pulumi.Input[_builtins.str]] = None,
|
509
|
+
skip_import_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
510
|
+
username: Optional[pulumi.Input[_builtins.str]] = None,
|
512
511
|
__props__=None):
|
513
512
|
"""
|
514
513
|
Creates a Database Secret Backend static role in Vault. Database secret backend
|
@@ -560,31 +559,31 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
560
559
|
|
561
560
|
:param str resource_name: The name of the resource.
|
562
561
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
563
|
-
:param pulumi.Input[
|
564
|
-
:param pulumi.Input[
|
562
|
+
:param pulumi.Input[_builtins.str] backend: The unique name of the Vault mount to configure.
|
563
|
+
:param pulumi.Input[_builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
|
565
564
|
can be done in `credential_config`.
|
566
|
-
:param pulumi.Input[
|
567
|
-
:param pulumi.Input[
|
568
|
-
:param pulumi.Input[
|
565
|
+
:param pulumi.Input[_builtins.str] db_name: The unique name of the database connection to use for the static role.
|
566
|
+
:param pulumi.Input[_builtins.str] name: A unique name to give the static role.
|
567
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
569
568
|
The value should not contain leading or trailing forward slashes.
|
570
569
|
The `namespace` is always relative to the provider's configured namespace.
|
571
570
|
*Available only for Vault Enterprise*.
|
572
|
-
:param pulumi.Input[
|
571
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
|
573
572
|
Mutually exclusive with `rotation_schedule`.
|
574
|
-
:param pulumi.Input[
|
573
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
|
575
574
|
Mutually exclusive with `rotation_period`.
|
576
575
|
|
577
576
|
**Warning**: The `rotation_period` and `rotation_schedule` fields are
|
578
577
|
mutually exclusive. One of them must be set but not both.
|
579
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
580
|
-
:param pulumi.Input[
|
578
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
|
579
|
+
:param pulumi.Input[_builtins.int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
|
581
580
|
from a given `rotation_schedule`.
|
582
|
-
:param pulumi.Input[
|
581
|
+
:param pulumi.Input[_builtins.str] self_managed_password: The password corresponding to the username in the database.
|
583
582
|
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
584
583
|
select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
|
585
|
-
:param pulumi.Input[
|
584
|
+
:param pulumi.Input[_builtins.bool] skip_import_rotation: If set to true, Vault will skip the
|
586
585
|
initial secret rotation on import. Requires Vault 1.18+ Enterprise.
|
587
|
-
:param pulumi.Input[
|
586
|
+
:param pulumi.Input[_builtins.str] username: The database username that this static role corresponds to.
|
588
587
|
"""
|
589
588
|
...
|
590
589
|
@overload
|
@@ -655,19 +654,19 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
655
654
|
def _internal_init(__self__,
|
656
655
|
resource_name: str,
|
657
656
|
opts: Optional[pulumi.ResourceOptions] = None,
|
658
|
-
backend: Optional[pulumi.Input[
|
659
|
-
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
660
|
-
credential_type: Optional[pulumi.Input[
|
661
|
-
db_name: Optional[pulumi.Input[
|
662
|
-
name: Optional[pulumi.Input[
|
663
|
-
namespace: Optional[pulumi.Input[
|
664
|
-
rotation_period: Optional[pulumi.Input[
|
665
|
-
rotation_schedule: Optional[pulumi.Input[
|
666
|
-
rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[
|
667
|
-
rotation_window: Optional[pulumi.Input[
|
668
|
-
self_managed_password: Optional[pulumi.Input[
|
669
|
-
skip_import_rotation: Optional[pulumi.Input[
|
670
|
-
username: Optional[pulumi.Input[
|
657
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
658
|
+
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
659
|
+
credential_type: Optional[pulumi.Input[_builtins.str]] = None,
|
660
|
+
db_name: Optional[pulumi.Input[_builtins.str]] = None,
|
661
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
662
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
663
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
664
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
665
|
+
rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
666
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
667
|
+
self_managed_password: Optional[pulumi.Input[_builtins.str]] = None,
|
668
|
+
skip_import_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
669
|
+
username: Optional[pulumi.Input[_builtins.str]] = None,
|
671
670
|
__props__=None):
|
672
671
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
673
672
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -708,19 +707,19 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
708
707
|
def get(resource_name: str,
|
709
708
|
id: pulumi.Input[str],
|
710
709
|
opts: Optional[pulumi.ResourceOptions] = None,
|
711
|
-
backend: Optional[pulumi.Input[
|
712
|
-
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
713
|
-
credential_type: Optional[pulumi.Input[
|
714
|
-
db_name: Optional[pulumi.Input[
|
715
|
-
name: Optional[pulumi.Input[
|
716
|
-
namespace: Optional[pulumi.Input[
|
717
|
-
rotation_period: Optional[pulumi.Input[
|
718
|
-
rotation_schedule: Optional[pulumi.Input[
|
719
|
-
rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[
|
720
|
-
rotation_window: Optional[pulumi.Input[
|
721
|
-
self_managed_password: Optional[pulumi.Input[
|
722
|
-
skip_import_rotation: Optional[pulumi.Input[
|
723
|
-
username: Optional[pulumi.Input[
|
710
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
711
|
+
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
712
|
+
credential_type: Optional[pulumi.Input[_builtins.str]] = None,
|
713
|
+
db_name: Optional[pulumi.Input[_builtins.str]] = None,
|
714
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
715
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
716
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
717
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
718
|
+
rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
719
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
720
|
+
self_managed_password: Optional[pulumi.Input[_builtins.str]] = None,
|
721
|
+
skip_import_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
722
|
+
username: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackendStaticRole':
|
724
723
|
"""
|
725
724
|
Get an existing SecretBackendStaticRole resource's state with the given name, id, and optional extra
|
726
725
|
properties used to qualify the lookup.
|
@@ -728,31 +727,31 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
728
727
|
:param str resource_name: The unique name of the resulting resource.
|
729
728
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
730
729
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
731
|
-
:param pulumi.Input[
|
732
|
-
:param pulumi.Input[
|
730
|
+
:param pulumi.Input[_builtins.str] backend: The unique name of the Vault mount to configure.
|
731
|
+
:param pulumi.Input[_builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
|
733
732
|
can be done in `credential_config`.
|
734
|
-
:param pulumi.Input[
|
735
|
-
:param pulumi.Input[
|
736
|
-
:param pulumi.Input[
|
733
|
+
:param pulumi.Input[_builtins.str] db_name: The unique name of the database connection to use for the static role.
|
734
|
+
:param pulumi.Input[_builtins.str] name: A unique name to give the static role.
|
735
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
737
736
|
The value should not contain leading or trailing forward slashes.
|
738
737
|
The `namespace` is always relative to the provider's configured namespace.
|
739
738
|
*Available only for Vault Enterprise*.
|
740
|
-
:param pulumi.Input[
|
739
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
|
741
740
|
Mutually exclusive with `rotation_schedule`.
|
742
|
-
:param pulumi.Input[
|
741
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
|
743
742
|
Mutually exclusive with `rotation_period`.
|
744
743
|
|
745
744
|
**Warning**: The `rotation_period` and `rotation_schedule` fields are
|
746
745
|
mutually exclusive. One of them must be set but not both.
|
747
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
748
|
-
:param pulumi.Input[
|
746
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
|
747
|
+
:param pulumi.Input[_builtins.int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
|
749
748
|
from a given `rotation_schedule`.
|
750
|
-
:param pulumi.Input[
|
749
|
+
:param pulumi.Input[_builtins.str] self_managed_password: The password corresponding to the username in the database.
|
751
750
|
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
752
751
|
select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
|
753
|
-
:param pulumi.Input[
|
752
|
+
:param pulumi.Input[_builtins.bool] skip_import_rotation: If set to true, Vault will skip the
|
754
753
|
initial secret rotation on import. Requires Vault 1.18+ Enterprise.
|
755
|
-
:param pulumi.Input[
|
754
|
+
:param pulumi.Input[_builtins.str] username: The database username that this static role corresponds to.
|
756
755
|
"""
|
757
756
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
758
757
|
|
@@ -773,47 +772,47 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
773
772
|
__props__.__dict__["username"] = username
|
774
773
|
return SecretBackendStaticRole(resource_name, opts=opts, __props__=__props__)
|
775
774
|
|
776
|
-
@property
|
775
|
+
@_builtins.property
|
777
776
|
@pulumi.getter
|
778
|
-
def backend(self) -> pulumi.Output[
|
777
|
+
def backend(self) -> pulumi.Output[_builtins.str]:
|
779
778
|
"""
|
780
779
|
The unique name of the Vault mount to configure.
|
781
780
|
"""
|
782
781
|
return pulumi.get(self, "backend")
|
783
782
|
|
784
|
-
@property
|
783
|
+
@_builtins.property
|
785
784
|
@pulumi.getter(name="credentialConfig")
|
786
|
-
def credential_config(self) -> pulumi.Output[Optional[Mapping[str,
|
785
|
+
def credential_config(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
|
787
786
|
return pulumi.get(self, "credential_config")
|
788
787
|
|
789
|
-
@property
|
788
|
+
@_builtins.property
|
790
789
|
@pulumi.getter(name="credentialType")
|
791
|
-
def credential_type(self) -> pulumi.Output[
|
790
|
+
def credential_type(self) -> pulumi.Output[_builtins.str]:
|
792
791
|
"""
|
793
792
|
The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
|
794
793
|
can be done in `credential_config`.
|
795
794
|
"""
|
796
795
|
return pulumi.get(self, "credential_type")
|
797
796
|
|
798
|
-
@property
|
797
|
+
@_builtins.property
|
799
798
|
@pulumi.getter(name="dbName")
|
800
|
-
def db_name(self) -> pulumi.Output[
|
799
|
+
def db_name(self) -> pulumi.Output[_builtins.str]:
|
801
800
|
"""
|
802
801
|
The unique name of the database connection to use for the static role.
|
803
802
|
"""
|
804
803
|
return pulumi.get(self, "db_name")
|
805
804
|
|
806
|
-
@property
|
805
|
+
@_builtins.property
|
807
806
|
@pulumi.getter
|
808
|
-
def name(self) -> pulumi.Output[
|
807
|
+
def name(self) -> pulumi.Output[_builtins.str]:
|
809
808
|
"""
|
810
809
|
A unique name to give the static role.
|
811
810
|
"""
|
812
811
|
return pulumi.get(self, "name")
|
813
812
|
|
814
|
-
@property
|
813
|
+
@_builtins.property
|
815
814
|
@pulumi.getter
|
816
|
-
def namespace(self) -> pulumi.Output[Optional[
|
815
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
817
816
|
"""
|
818
817
|
The namespace to provision the resource in.
|
819
818
|
The value should not contain leading or trailing forward slashes.
|
@@ -822,18 +821,18 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
822
821
|
"""
|
823
822
|
return pulumi.get(self, "namespace")
|
824
823
|
|
825
|
-
@property
|
824
|
+
@_builtins.property
|
826
825
|
@pulumi.getter(name="rotationPeriod")
|
827
|
-
def rotation_period(self) -> pulumi.Output[Optional[
|
826
|
+
def rotation_period(self) -> pulumi.Output[Optional[_builtins.int]]:
|
828
827
|
"""
|
829
828
|
The amount of time Vault should wait before rotating the password, in seconds.
|
830
829
|
Mutually exclusive with `rotation_schedule`.
|
831
830
|
"""
|
832
831
|
return pulumi.get(self, "rotation_period")
|
833
832
|
|
834
|
-
@property
|
833
|
+
@_builtins.property
|
835
834
|
@pulumi.getter(name="rotationSchedule")
|
836
|
-
def rotation_schedule(self) -> pulumi.Output[Optional[
|
835
|
+
def rotation_schedule(self) -> pulumi.Output[Optional[_builtins.str]]:
|
837
836
|
"""
|
838
837
|
A cron-style string that will define the schedule on which rotations should occur.
|
839
838
|
Mutually exclusive with `rotation_period`.
|
@@ -843,26 +842,26 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
843
842
|
"""
|
844
843
|
return pulumi.get(self, "rotation_schedule")
|
845
844
|
|
846
|
-
@property
|
845
|
+
@_builtins.property
|
847
846
|
@pulumi.getter(name="rotationStatements")
|
848
|
-
def rotation_statements(self) -> pulumi.Output[Optional[Sequence[
|
847
|
+
def rotation_statements(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
849
848
|
"""
|
850
849
|
Database statements to execute to rotate the password for the configured database user.
|
851
850
|
"""
|
852
851
|
return pulumi.get(self, "rotation_statements")
|
853
852
|
|
854
|
-
@property
|
853
|
+
@_builtins.property
|
855
854
|
@pulumi.getter(name="rotationWindow")
|
856
|
-
def rotation_window(self) -> pulumi.Output[Optional[
|
855
|
+
def rotation_window(self) -> pulumi.Output[Optional[_builtins.int]]:
|
857
856
|
"""
|
858
857
|
The amount of time, in seconds, in which rotations are allowed to occur starting
|
859
858
|
from a given `rotation_schedule`.
|
860
859
|
"""
|
861
860
|
return pulumi.get(self, "rotation_window")
|
862
861
|
|
863
|
-
@property
|
862
|
+
@_builtins.property
|
864
863
|
@pulumi.getter(name="selfManagedPassword")
|
865
|
-
def self_managed_password(self) -> pulumi.Output[Optional[
|
864
|
+
def self_managed_password(self) -> pulumi.Output[Optional[_builtins.str]]:
|
866
865
|
"""
|
867
866
|
The password corresponding to the username in the database.
|
868
867
|
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
@@ -870,18 +869,18 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
870
869
|
"""
|
871
870
|
return pulumi.get(self, "self_managed_password")
|
872
871
|
|
873
|
-
@property
|
872
|
+
@_builtins.property
|
874
873
|
@pulumi.getter(name="skipImportRotation")
|
875
|
-
def skip_import_rotation(self) -> pulumi.Output[Optional[
|
874
|
+
def skip_import_rotation(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
876
875
|
"""
|
877
876
|
If set to true, Vault will skip the
|
878
877
|
initial secret rotation on import. Requires Vault 1.18+ Enterprise.
|
879
878
|
"""
|
880
879
|
return pulumi.get(self, "skip_import_rotation")
|
881
880
|
|
882
|
-
@property
|
881
|
+
@_builtins.property
|
883
882
|
@pulumi.getter
|
884
|
-
def username(self) -> pulumi.Output[
|
883
|
+
def username(self) -> pulumi.Output[_builtins.str]:
|
885
884
|
"""
|
886
885
|
The database username that this static role corresponds to.
|
887
886
|
"""
|