pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,45 +19,45 @@ __all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole']
20
19
  @pulumi.input_type
21
20
  class SecretBackendStaticRoleArgs:
22
21
  def __init__(__self__, *,
23
- backend: pulumi.Input[builtins.str],
24
- db_name: pulumi.Input[builtins.str],
25
- username: pulumi.Input[builtins.str],
26
- credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
27
- credential_type: Optional[pulumi.Input[builtins.str]] = None,
28
- name: Optional[pulumi.Input[builtins.str]] = None,
29
- namespace: Optional[pulumi.Input[builtins.str]] = None,
30
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
31
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
32
- rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
33
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
34
- self_managed_password: Optional[pulumi.Input[builtins.str]] = None,
35
- skip_import_rotation: Optional[pulumi.Input[builtins.bool]] = None):
22
+ backend: pulumi.Input[_builtins.str],
23
+ db_name: pulumi.Input[_builtins.str],
24
+ username: pulumi.Input[_builtins.str],
25
+ credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
26
+ credential_type: Optional[pulumi.Input[_builtins.str]] = None,
27
+ name: Optional[pulumi.Input[_builtins.str]] = None,
28
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
29
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
30
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
31
+ rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
32
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
33
+ self_managed_password: Optional[pulumi.Input[_builtins.str]] = None,
34
+ skip_import_rotation: Optional[pulumi.Input[_builtins.bool]] = None):
36
35
  """
37
36
  The set of arguments for constructing a SecretBackendStaticRole resource.
38
- :param pulumi.Input[builtins.str] backend: The unique name of the Vault mount to configure.
39
- :param pulumi.Input[builtins.str] db_name: The unique name of the database connection to use for the static role.
40
- :param pulumi.Input[builtins.str] username: The database username that this static role corresponds to.
41
- :param pulumi.Input[builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
37
+ :param pulumi.Input[_builtins.str] backend: The unique name of the Vault mount to configure.
38
+ :param pulumi.Input[_builtins.str] db_name: The unique name of the database connection to use for the static role.
39
+ :param pulumi.Input[_builtins.str] username: The database username that this static role corresponds to.
40
+ :param pulumi.Input[_builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
42
41
  can be done in `credential_config`.
43
- :param pulumi.Input[builtins.str] name: A unique name to give the static role.
44
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
42
+ :param pulumi.Input[_builtins.str] name: A unique name to give the static role.
43
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
45
44
  The value should not contain leading or trailing forward slashes.
46
45
  The `namespace` is always relative to the provider's configured namespace.
47
46
  *Available only for Vault Enterprise*.
48
- :param pulumi.Input[builtins.int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
47
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
49
48
  Mutually exclusive with `rotation_schedule`.
50
- :param pulumi.Input[builtins.str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
49
+ :param pulumi.Input[_builtins.str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
51
50
  Mutually exclusive with `rotation_period`.
52
51
 
53
52
  **Warning**: The `rotation_period` and `rotation_schedule` fields are
54
53
  mutually exclusive. One of them must be set but not both.
55
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
56
- :param pulumi.Input[builtins.int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
54
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
55
+ :param pulumi.Input[_builtins.int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
57
56
  from a given `rotation_schedule`.
58
- :param pulumi.Input[builtins.str] self_managed_password: The password corresponding to the username in the database.
57
+ :param pulumi.Input[_builtins.str] self_managed_password: The password corresponding to the username in the database.
59
58
  Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
60
59
  select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
61
- :param pulumi.Input[builtins.bool] skip_import_rotation: If set to true, Vault will skip the
60
+ :param pulumi.Input[_builtins.bool] skip_import_rotation: If set to true, Vault will skip the
62
61
  initial secret rotation on import. Requires Vault 1.18+ Enterprise.
63
62
  """
64
63
  pulumi.set(__self__, "backend", backend)
@@ -85,54 +84,54 @@ class SecretBackendStaticRoleArgs:
85
84
  if skip_import_rotation is not None:
86
85
  pulumi.set(__self__, "skip_import_rotation", skip_import_rotation)
87
86
 
88
- @property
87
+ @_builtins.property
89
88
  @pulumi.getter
90
- def backend(self) -> pulumi.Input[builtins.str]:
89
+ def backend(self) -> pulumi.Input[_builtins.str]:
91
90
  """
92
91
  The unique name of the Vault mount to configure.
93
92
  """
94
93
  return pulumi.get(self, "backend")
95
94
 
96
95
  @backend.setter
97
- def backend(self, value: pulumi.Input[builtins.str]):
96
+ def backend(self, value: pulumi.Input[_builtins.str]):
98
97
  pulumi.set(self, "backend", value)
99
98
 
100
- @property
99
+ @_builtins.property
101
100
  @pulumi.getter(name="dbName")
102
- def db_name(self) -> pulumi.Input[builtins.str]:
101
+ def db_name(self) -> pulumi.Input[_builtins.str]:
103
102
  """
104
103
  The unique name of the database connection to use for the static role.
105
104
  """
106
105
  return pulumi.get(self, "db_name")
107
106
 
108
107
  @db_name.setter
109
- def db_name(self, value: pulumi.Input[builtins.str]):
108
+ def db_name(self, value: pulumi.Input[_builtins.str]):
110
109
  pulumi.set(self, "db_name", value)
111
110
 
112
- @property
111
+ @_builtins.property
113
112
  @pulumi.getter
114
- def username(self) -> pulumi.Input[builtins.str]:
113
+ def username(self) -> pulumi.Input[_builtins.str]:
115
114
  """
116
115
  The database username that this static role corresponds to.
117
116
  """
118
117
  return pulumi.get(self, "username")
119
118
 
120
119
  @username.setter
121
- def username(self, value: pulumi.Input[builtins.str]):
120
+ def username(self, value: pulumi.Input[_builtins.str]):
122
121
  pulumi.set(self, "username", value)
123
122
 
124
- @property
123
+ @_builtins.property
125
124
  @pulumi.getter(name="credentialConfig")
126
- def credential_config(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
125
+ def credential_config(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
127
126
  return pulumi.get(self, "credential_config")
128
127
 
129
128
  @credential_config.setter
130
- def credential_config(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
129
+ def credential_config(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
131
130
  pulumi.set(self, "credential_config", value)
132
131
 
133
- @property
132
+ @_builtins.property
134
133
  @pulumi.getter(name="credentialType")
135
- def credential_type(self) -> Optional[pulumi.Input[builtins.str]]:
134
+ def credential_type(self) -> Optional[pulumi.Input[_builtins.str]]:
136
135
  """
137
136
  The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
138
137
  can be done in `credential_config`.
@@ -140,24 +139,24 @@ class SecretBackendStaticRoleArgs:
140
139
  return pulumi.get(self, "credential_type")
141
140
 
142
141
  @credential_type.setter
143
- def credential_type(self, value: Optional[pulumi.Input[builtins.str]]):
142
+ def credential_type(self, value: Optional[pulumi.Input[_builtins.str]]):
144
143
  pulumi.set(self, "credential_type", value)
145
144
 
146
- @property
145
+ @_builtins.property
147
146
  @pulumi.getter
148
- def name(self) -> Optional[pulumi.Input[builtins.str]]:
147
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
149
148
  """
150
149
  A unique name to give the static role.
151
150
  """
152
151
  return pulumi.get(self, "name")
153
152
 
154
153
  @name.setter
155
- def name(self, value: Optional[pulumi.Input[builtins.str]]):
154
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
156
155
  pulumi.set(self, "name", value)
157
156
 
158
- @property
157
+ @_builtins.property
159
158
  @pulumi.getter
160
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
159
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
161
160
  """
162
161
  The namespace to provision the resource in.
163
162
  The value should not contain leading or trailing forward slashes.
@@ -167,12 +166,12 @@ class SecretBackendStaticRoleArgs:
167
166
  return pulumi.get(self, "namespace")
168
167
 
169
168
  @namespace.setter
170
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
169
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
171
170
  pulumi.set(self, "namespace", value)
172
171
 
173
- @property
172
+ @_builtins.property
174
173
  @pulumi.getter(name="rotationPeriod")
175
- def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
174
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
176
175
  """
177
176
  The amount of time Vault should wait before rotating the password, in seconds.
178
177
  Mutually exclusive with `rotation_schedule`.
@@ -180,12 +179,12 @@ class SecretBackendStaticRoleArgs:
180
179
  return pulumi.get(self, "rotation_period")
181
180
 
182
181
  @rotation_period.setter
183
- def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
182
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
184
183
  pulumi.set(self, "rotation_period", value)
185
184
 
186
- @property
185
+ @_builtins.property
187
186
  @pulumi.getter(name="rotationSchedule")
188
- def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
187
+ def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
189
188
  """
190
189
  A cron-style string that will define the schedule on which rotations should occur.
191
190
  Mutually exclusive with `rotation_period`.
@@ -196,24 +195,24 @@ class SecretBackendStaticRoleArgs:
196
195
  return pulumi.get(self, "rotation_schedule")
197
196
 
198
197
  @rotation_schedule.setter
199
- def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
198
+ def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
200
199
  pulumi.set(self, "rotation_schedule", value)
201
200
 
202
- @property
201
+ @_builtins.property
203
202
  @pulumi.getter(name="rotationStatements")
204
- def rotation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
203
+ def rotation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
205
204
  """
206
205
  Database statements to execute to rotate the password for the configured database user.
207
206
  """
208
207
  return pulumi.get(self, "rotation_statements")
209
208
 
210
209
  @rotation_statements.setter
211
- def rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
210
+ def rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
212
211
  pulumi.set(self, "rotation_statements", value)
213
212
 
214
- @property
213
+ @_builtins.property
215
214
  @pulumi.getter(name="rotationWindow")
216
- def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
215
+ def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
217
216
  """
218
217
  The amount of time, in seconds, in which rotations are allowed to occur starting
219
218
  from a given `rotation_schedule`.
@@ -221,12 +220,12 @@ class SecretBackendStaticRoleArgs:
221
220
  return pulumi.get(self, "rotation_window")
222
221
 
223
222
  @rotation_window.setter
224
- def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
223
+ def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
225
224
  pulumi.set(self, "rotation_window", value)
226
225
 
227
- @property
226
+ @_builtins.property
228
227
  @pulumi.getter(name="selfManagedPassword")
229
- def self_managed_password(self) -> Optional[pulumi.Input[builtins.str]]:
228
+ def self_managed_password(self) -> Optional[pulumi.Input[_builtins.str]]:
230
229
  """
231
230
  The password corresponding to the username in the database.
232
231
  Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
@@ -235,12 +234,12 @@ class SecretBackendStaticRoleArgs:
235
234
  return pulumi.get(self, "self_managed_password")
236
235
 
237
236
  @self_managed_password.setter
238
- def self_managed_password(self, value: Optional[pulumi.Input[builtins.str]]):
237
+ def self_managed_password(self, value: Optional[pulumi.Input[_builtins.str]]):
239
238
  pulumi.set(self, "self_managed_password", value)
240
239
 
241
- @property
240
+ @_builtins.property
242
241
  @pulumi.getter(name="skipImportRotation")
243
- def skip_import_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
242
+ def skip_import_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
244
243
  """
245
244
  If set to true, Vault will skip the
246
245
  initial secret rotation on import. Requires Vault 1.18+ Enterprise.
@@ -248,53 +247,53 @@ class SecretBackendStaticRoleArgs:
248
247
  return pulumi.get(self, "skip_import_rotation")
249
248
 
250
249
  @skip_import_rotation.setter
251
- def skip_import_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
250
+ def skip_import_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
252
251
  pulumi.set(self, "skip_import_rotation", value)
253
252
 
254
253
 
255
254
  @pulumi.input_type
256
255
  class _SecretBackendStaticRoleState:
257
256
  def __init__(__self__, *,
258
- backend: Optional[pulumi.Input[builtins.str]] = None,
259
- credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
260
- credential_type: Optional[pulumi.Input[builtins.str]] = None,
261
- db_name: Optional[pulumi.Input[builtins.str]] = None,
262
- name: Optional[pulumi.Input[builtins.str]] = None,
263
- namespace: Optional[pulumi.Input[builtins.str]] = None,
264
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
265
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
266
- rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
267
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
268
- self_managed_password: Optional[pulumi.Input[builtins.str]] = None,
269
- skip_import_rotation: Optional[pulumi.Input[builtins.bool]] = None,
270
- username: Optional[pulumi.Input[builtins.str]] = None):
257
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
258
+ credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
259
+ credential_type: Optional[pulumi.Input[_builtins.str]] = None,
260
+ db_name: Optional[pulumi.Input[_builtins.str]] = None,
261
+ name: Optional[pulumi.Input[_builtins.str]] = None,
262
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
263
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
264
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
265
+ rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
266
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
267
+ self_managed_password: Optional[pulumi.Input[_builtins.str]] = None,
268
+ skip_import_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
269
+ username: Optional[pulumi.Input[_builtins.str]] = None):
271
270
  """
272
271
  Input properties used for looking up and filtering SecretBackendStaticRole resources.
273
- :param pulumi.Input[builtins.str] backend: The unique name of the Vault mount to configure.
274
- :param pulumi.Input[builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
272
+ :param pulumi.Input[_builtins.str] backend: The unique name of the Vault mount to configure.
273
+ :param pulumi.Input[_builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
275
274
  can be done in `credential_config`.
276
- :param pulumi.Input[builtins.str] db_name: The unique name of the database connection to use for the static role.
277
- :param pulumi.Input[builtins.str] name: A unique name to give the static role.
278
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
275
+ :param pulumi.Input[_builtins.str] db_name: The unique name of the database connection to use for the static role.
276
+ :param pulumi.Input[_builtins.str] name: A unique name to give the static role.
277
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
279
278
  The value should not contain leading or trailing forward slashes.
280
279
  The `namespace` is always relative to the provider's configured namespace.
281
280
  *Available only for Vault Enterprise*.
282
- :param pulumi.Input[builtins.int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
281
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
283
282
  Mutually exclusive with `rotation_schedule`.
284
- :param pulumi.Input[builtins.str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
283
+ :param pulumi.Input[_builtins.str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
285
284
  Mutually exclusive with `rotation_period`.
286
285
 
287
286
  **Warning**: The `rotation_period` and `rotation_schedule` fields are
288
287
  mutually exclusive. One of them must be set but not both.
289
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
290
- :param pulumi.Input[builtins.int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
288
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
289
+ :param pulumi.Input[_builtins.int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
291
290
  from a given `rotation_schedule`.
292
- :param pulumi.Input[builtins.str] self_managed_password: The password corresponding to the username in the database.
291
+ :param pulumi.Input[_builtins.str] self_managed_password: The password corresponding to the username in the database.
293
292
  Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
294
293
  select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
295
- :param pulumi.Input[builtins.bool] skip_import_rotation: If set to true, Vault will skip the
294
+ :param pulumi.Input[_builtins.bool] skip_import_rotation: If set to true, Vault will skip the
296
295
  initial secret rotation on import. Requires Vault 1.18+ Enterprise.
297
- :param pulumi.Input[builtins.str] username: The database username that this static role corresponds to.
296
+ :param pulumi.Input[_builtins.str] username: The database username that this static role corresponds to.
298
297
  """
299
298
  if backend is not None:
300
299
  pulumi.set(__self__, "backend", backend)
@@ -323,30 +322,30 @@ class _SecretBackendStaticRoleState:
323
322
  if username is not None:
324
323
  pulumi.set(__self__, "username", username)
325
324
 
326
- @property
325
+ @_builtins.property
327
326
  @pulumi.getter
328
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
327
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
329
328
  """
330
329
  The unique name of the Vault mount to configure.
331
330
  """
332
331
  return pulumi.get(self, "backend")
333
332
 
334
333
  @backend.setter
335
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
334
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
336
335
  pulumi.set(self, "backend", value)
337
336
 
338
- @property
337
+ @_builtins.property
339
338
  @pulumi.getter(name="credentialConfig")
340
- def credential_config(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
339
+ def credential_config(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
341
340
  return pulumi.get(self, "credential_config")
342
341
 
343
342
  @credential_config.setter
344
- def credential_config(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
343
+ def credential_config(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
345
344
  pulumi.set(self, "credential_config", value)
346
345
 
347
- @property
346
+ @_builtins.property
348
347
  @pulumi.getter(name="credentialType")
349
- def credential_type(self) -> Optional[pulumi.Input[builtins.str]]:
348
+ def credential_type(self) -> Optional[pulumi.Input[_builtins.str]]:
350
349
  """
351
350
  The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
352
351
  can be done in `credential_config`.
@@ -354,36 +353,36 @@ class _SecretBackendStaticRoleState:
354
353
  return pulumi.get(self, "credential_type")
355
354
 
356
355
  @credential_type.setter
357
- def credential_type(self, value: Optional[pulumi.Input[builtins.str]]):
356
+ def credential_type(self, value: Optional[pulumi.Input[_builtins.str]]):
358
357
  pulumi.set(self, "credential_type", value)
359
358
 
360
- @property
359
+ @_builtins.property
361
360
  @pulumi.getter(name="dbName")
362
- def db_name(self) -> Optional[pulumi.Input[builtins.str]]:
361
+ def db_name(self) -> Optional[pulumi.Input[_builtins.str]]:
363
362
  """
364
363
  The unique name of the database connection to use for the static role.
365
364
  """
366
365
  return pulumi.get(self, "db_name")
367
366
 
368
367
  @db_name.setter
369
- def db_name(self, value: Optional[pulumi.Input[builtins.str]]):
368
+ def db_name(self, value: Optional[pulumi.Input[_builtins.str]]):
370
369
  pulumi.set(self, "db_name", value)
371
370
 
372
- @property
371
+ @_builtins.property
373
372
  @pulumi.getter
374
- def name(self) -> Optional[pulumi.Input[builtins.str]]:
373
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
375
374
  """
376
375
  A unique name to give the static role.
377
376
  """
378
377
  return pulumi.get(self, "name")
379
378
 
380
379
  @name.setter
381
- def name(self, value: Optional[pulumi.Input[builtins.str]]):
380
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
382
381
  pulumi.set(self, "name", value)
383
382
 
384
- @property
383
+ @_builtins.property
385
384
  @pulumi.getter
386
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
385
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
387
386
  """
388
387
  The namespace to provision the resource in.
389
388
  The value should not contain leading or trailing forward slashes.
@@ -393,12 +392,12 @@ class _SecretBackendStaticRoleState:
393
392
  return pulumi.get(self, "namespace")
394
393
 
395
394
  @namespace.setter
396
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
395
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
397
396
  pulumi.set(self, "namespace", value)
398
397
 
399
- @property
398
+ @_builtins.property
400
399
  @pulumi.getter(name="rotationPeriod")
401
- def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
400
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
402
401
  """
403
402
  The amount of time Vault should wait before rotating the password, in seconds.
404
403
  Mutually exclusive with `rotation_schedule`.
@@ -406,12 +405,12 @@ class _SecretBackendStaticRoleState:
406
405
  return pulumi.get(self, "rotation_period")
407
406
 
408
407
  @rotation_period.setter
409
- def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
408
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
410
409
  pulumi.set(self, "rotation_period", value)
411
410
 
412
- @property
411
+ @_builtins.property
413
412
  @pulumi.getter(name="rotationSchedule")
414
- def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
413
+ def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
415
414
  """
416
415
  A cron-style string that will define the schedule on which rotations should occur.
417
416
  Mutually exclusive with `rotation_period`.
@@ -422,24 +421,24 @@ class _SecretBackendStaticRoleState:
422
421
  return pulumi.get(self, "rotation_schedule")
423
422
 
424
423
  @rotation_schedule.setter
425
- def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
424
+ def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
426
425
  pulumi.set(self, "rotation_schedule", value)
427
426
 
428
- @property
427
+ @_builtins.property
429
428
  @pulumi.getter(name="rotationStatements")
430
- def rotation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
429
+ def rotation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
431
430
  """
432
431
  Database statements to execute to rotate the password for the configured database user.
433
432
  """
434
433
  return pulumi.get(self, "rotation_statements")
435
434
 
436
435
  @rotation_statements.setter
437
- def rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
436
+ def rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
438
437
  pulumi.set(self, "rotation_statements", value)
439
438
 
440
- @property
439
+ @_builtins.property
441
440
  @pulumi.getter(name="rotationWindow")
442
- def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
441
+ def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
443
442
  """
444
443
  The amount of time, in seconds, in which rotations are allowed to occur starting
445
444
  from a given `rotation_schedule`.
@@ -447,12 +446,12 @@ class _SecretBackendStaticRoleState:
447
446
  return pulumi.get(self, "rotation_window")
448
447
 
449
448
  @rotation_window.setter
450
- def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
449
+ def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
451
450
  pulumi.set(self, "rotation_window", value)
452
451
 
453
- @property
452
+ @_builtins.property
454
453
  @pulumi.getter(name="selfManagedPassword")
455
- def self_managed_password(self) -> Optional[pulumi.Input[builtins.str]]:
454
+ def self_managed_password(self) -> Optional[pulumi.Input[_builtins.str]]:
456
455
  """
457
456
  The password corresponding to the username in the database.
458
457
  Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
@@ -461,12 +460,12 @@ class _SecretBackendStaticRoleState:
461
460
  return pulumi.get(self, "self_managed_password")
462
461
 
463
462
  @self_managed_password.setter
464
- def self_managed_password(self, value: Optional[pulumi.Input[builtins.str]]):
463
+ def self_managed_password(self, value: Optional[pulumi.Input[_builtins.str]]):
465
464
  pulumi.set(self, "self_managed_password", value)
466
465
 
467
- @property
466
+ @_builtins.property
468
467
  @pulumi.getter(name="skipImportRotation")
469
- def skip_import_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
468
+ def skip_import_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
470
469
  """
471
470
  If set to true, Vault will skip the
472
471
  initial secret rotation on import. Requires Vault 1.18+ Enterprise.
@@ -474,19 +473,19 @@ class _SecretBackendStaticRoleState:
474
473
  return pulumi.get(self, "skip_import_rotation")
475
474
 
476
475
  @skip_import_rotation.setter
477
- def skip_import_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
476
+ def skip_import_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
478
477
  pulumi.set(self, "skip_import_rotation", value)
479
478
 
480
- @property
479
+ @_builtins.property
481
480
  @pulumi.getter
482
- def username(self) -> Optional[pulumi.Input[builtins.str]]:
481
+ def username(self) -> Optional[pulumi.Input[_builtins.str]]:
483
482
  """
484
483
  The database username that this static role corresponds to.
485
484
  """
486
485
  return pulumi.get(self, "username")
487
486
 
488
487
  @username.setter
489
- def username(self, value: Optional[pulumi.Input[builtins.str]]):
488
+ def username(self, value: Optional[pulumi.Input[_builtins.str]]):
490
489
  pulumi.set(self, "username", value)
491
490
 
492
491
 
@@ -496,19 +495,19 @@ class SecretBackendStaticRole(pulumi.CustomResource):
496
495
  def __init__(__self__,
497
496
  resource_name: str,
498
497
  opts: Optional[pulumi.ResourceOptions] = None,
499
- backend: Optional[pulumi.Input[builtins.str]] = None,
500
- credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
501
- credential_type: Optional[pulumi.Input[builtins.str]] = None,
502
- db_name: Optional[pulumi.Input[builtins.str]] = None,
503
- name: Optional[pulumi.Input[builtins.str]] = None,
504
- namespace: Optional[pulumi.Input[builtins.str]] = None,
505
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
506
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
507
- rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
508
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
509
- self_managed_password: Optional[pulumi.Input[builtins.str]] = None,
510
- skip_import_rotation: Optional[pulumi.Input[builtins.bool]] = None,
511
- username: Optional[pulumi.Input[builtins.str]] = None,
498
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
499
+ credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
500
+ credential_type: Optional[pulumi.Input[_builtins.str]] = None,
501
+ db_name: Optional[pulumi.Input[_builtins.str]] = None,
502
+ name: Optional[pulumi.Input[_builtins.str]] = None,
503
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
504
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
505
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
506
+ rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
507
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
508
+ self_managed_password: Optional[pulumi.Input[_builtins.str]] = None,
509
+ skip_import_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
510
+ username: Optional[pulumi.Input[_builtins.str]] = None,
512
511
  __props__=None):
513
512
  """
514
513
  Creates a Database Secret Backend static role in Vault. Database secret backend
@@ -560,31 +559,31 @@ class SecretBackendStaticRole(pulumi.CustomResource):
560
559
 
561
560
  :param str resource_name: The name of the resource.
562
561
  :param pulumi.ResourceOptions opts: Options for the resource.
563
- :param pulumi.Input[builtins.str] backend: The unique name of the Vault mount to configure.
564
- :param pulumi.Input[builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
562
+ :param pulumi.Input[_builtins.str] backend: The unique name of the Vault mount to configure.
563
+ :param pulumi.Input[_builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
565
564
  can be done in `credential_config`.
566
- :param pulumi.Input[builtins.str] db_name: The unique name of the database connection to use for the static role.
567
- :param pulumi.Input[builtins.str] name: A unique name to give the static role.
568
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
565
+ :param pulumi.Input[_builtins.str] db_name: The unique name of the database connection to use for the static role.
566
+ :param pulumi.Input[_builtins.str] name: A unique name to give the static role.
567
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
569
568
  The value should not contain leading or trailing forward slashes.
570
569
  The `namespace` is always relative to the provider's configured namespace.
571
570
  *Available only for Vault Enterprise*.
572
- :param pulumi.Input[builtins.int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
571
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
573
572
  Mutually exclusive with `rotation_schedule`.
574
- :param pulumi.Input[builtins.str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
573
+ :param pulumi.Input[_builtins.str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
575
574
  Mutually exclusive with `rotation_period`.
576
575
 
577
576
  **Warning**: The `rotation_period` and `rotation_schedule` fields are
578
577
  mutually exclusive. One of them must be set but not both.
579
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
580
- :param pulumi.Input[builtins.int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
578
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
579
+ :param pulumi.Input[_builtins.int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
581
580
  from a given `rotation_schedule`.
582
- :param pulumi.Input[builtins.str] self_managed_password: The password corresponding to the username in the database.
581
+ :param pulumi.Input[_builtins.str] self_managed_password: The password corresponding to the username in the database.
583
582
  Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
584
583
  select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
585
- :param pulumi.Input[builtins.bool] skip_import_rotation: If set to true, Vault will skip the
584
+ :param pulumi.Input[_builtins.bool] skip_import_rotation: If set to true, Vault will skip the
586
585
  initial secret rotation on import. Requires Vault 1.18+ Enterprise.
587
- :param pulumi.Input[builtins.str] username: The database username that this static role corresponds to.
586
+ :param pulumi.Input[_builtins.str] username: The database username that this static role corresponds to.
588
587
  """
589
588
  ...
590
589
  @overload
@@ -655,19 +654,19 @@ class SecretBackendStaticRole(pulumi.CustomResource):
655
654
  def _internal_init(__self__,
656
655
  resource_name: str,
657
656
  opts: Optional[pulumi.ResourceOptions] = None,
658
- backend: Optional[pulumi.Input[builtins.str]] = None,
659
- credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
660
- credential_type: Optional[pulumi.Input[builtins.str]] = None,
661
- db_name: Optional[pulumi.Input[builtins.str]] = None,
662
- name: Optional[pulumi.Input[builtins.str]] = None,
663
- namespace: Optional[pulumi.Input[builtins.str]] = None,
664
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
665
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
666
- rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
667
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
668
- self_managed_password: Optional[pulumi.Input[builtins.str]] = None,
669
- skip_import_rotation: Optional[pulumi.Input[builtins.bool]] = None,
670
- username: Optional[pulumi.Input[builtins.str]] = None,
657
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
658
+ credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
659
+ credential_type: Optional[pulumi.Input[_builtins.str]] = None,
660
+ db_name: Optional[pulumi.Input[_builtins.str]] = None,
661
+ name: Optional[pulumi.Input[_builtins.str]] = None,
662
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
663
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
664
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
665
+ rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
666
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
667
+ self_managed_password: Optional[pulumi.Input[_builtins.str]] = None,
668
+ skip_import_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
669
+ username: Optional[pulumi.Input[_builtins.str]] = None,
671
670
  __props__=None):
672
671
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
673
672
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -708,19 +707,19 @@ class SecretBackendStaticRole(pulumi.CustomResource):
708
707
  def get(resource_name: str,
709
708
  id: pulumi.Input[str],
710
709
  opts: Optional[pulumi.ResourceOptions] = None,
711
- backend: Optional[pulumi.Input[builtins.str]] = None,
712
- credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
713
- credential_type: Optional[pulumi.Input[builtins.str]] = None,
714
- db_name: Optional[pulumi.Input[builtins.str]] = None,
715
- name: Optional[pulumi.Input[builtins.str]] = None,
716
- namespace: Optional[pulumi.Input[builtins.str]] = None,
717
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
718
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
719
- rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
720
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
721
- self_managed_password: Optional[pulumi.Input[builtins.str]] = None,
722
- skip_import_rotation: Optional[pulumi.Input[builtins.bool]] = None,
723
- username: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretBackendStaticRole':
710
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
711
+ credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
712
+ credential_type: Optional[pulumi.Input[_builtins.str]] = None,
713
+ db_name: Optional[pulumi.Input[_builtins.str]] = None,
714
+ name: Optional[pulumi.Input[_builtins.str]] = None,
715
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
716
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
717
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
718
+ rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
719
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
720
+ self_managed_password: Optional[pulumi.Input[_builtins.str]] = None,
721
+ skip_import_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
722
+ username: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackendStaticRole':
724
723
  """
725
724
  Get an existing SecretBackendStaticRole resource's state with the given name, id, and optional extra
726
725
  properties used to qualify the lookup.
@@ -728,31 +727,31 @@ class SecretBackendStaticRole(pulumi.CustomResource):
728
727
  :param str resource_name: The unique name of the resulting resource.
729
728
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
730
729
  :param pulumi.ResourceOptions opts: Options for the resource.
731
- :param pulumi.Input[builtins.str] backend: The unique name of the Vault mount to configure.
732
- :param pulumi.Input[builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
730
+ :param pulumi.Input[_builtins.str] backend: The unique name of the Vault mount to configure.
731
+ :param pulumi.Input[_builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
733
732
  can be done in `credential_config`.
734
- :param pulumi.Input[builtins.str] db_name: The unique name of the database connection to use for the static role.
735
- :param pulumi.Input[builtins.str] name: A unique name to give the static role.
736
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
733
+ :param pulumi.Input[_builtins.str] db_name: The unique name of the database connection to use for the static role.
734
+ :param pulumi.Input[_builtins.str] name: A unique name to give the static role.
735
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
737
736
  The value should not contain leading or trailing forward slashes.
738
737
  The `namespace` is always relative to the provider's configured namespace.
739
738
  *Available only for Vault Enterprise*.
740
- :param pulumi.Input[builtins.int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
739
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
741
740
  Mutually exclusive with `rotation_schedule`.
742
- :param pulumi.Input[builtins.str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
741
+ :param pulumi.Input[_builtins.str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
743
742
  Mutually exclusive with `rotation_period`.
744
743
 
745
744
  **Warning**: The `rotation_period` and `rotation_schedule` fields are
746
745
  mutually exclusive. One of them must be set but not both.
747
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
748
- :param pulumi.Input[builtins.int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
746
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] rotation_statements: Database statements to execute to rotate the password for the configured database user.
747
+ :param pulumi.Input[_builtins.int] rotation_window: The amount of time, in seconds, in which rotations are allowed to occur starting
749
748
  from a given `rotation_schedule`.
750
- :param pulumi.Input[builtins.str] self_managed_password: The password corresponding to the username in the database.
749
+ :param pulumi.Input[_builtins.str] self_managed_password: The password corresponding to the username in the database.
751
750
  Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
752
751
  select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
753
- :param pulumi.Input[builtins.bool] skip_import_rotation: If set to true, Vault will skip the
752
+ :param pulumi.Input[_builtins.bool] skip_import_rotation: If set to true, Vault will skip the
754
753
  initial secret rotation on import. Requires Vault 1.18+ Enterprise.
755
- :param pulumi.Input[builtins.str] username: The database username that this static role corresponds to.
754
+ :param pulumi.Input[_builtins.str] username: The database username that this static role corresponds to.
756
755
  """
757
756
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
758
757
 
@@ -773,47 +772,47 @@ class SecretBackendStaticRole(pulumi.CustomResource):
773
772
  __props__.__dict__["username"] = username
774
773
  return SecretBackendStaticRole(resource_name, opts=opts, __props__=__props__)
775
774
 
776
- @property
775
+ @_builtins.property
777
776
  @pulumi.getter
778
- def backend(self) -> pulumi.Output[builtins.str]:
777
+ def backend(self) -> pulumi.Output[_builtins.str]:
779
778
  """
780
779
  The unique name of the Vault mount to configure.
781
780
  """
782
781
  return pulumi.get(self, "backend")
783
782
 
784
- @property
783
+ @_builtins.property
785
784
  @pulumi.getter(name="credentialConfig")
786
- def credential_config(self) -> pulumi.Output[Optional[Mapping[str, builtins.str]]]:
785
+ def credential_config(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
787
786
  return pulumi.get(self, "credential_config")
788
787
 
789
- @property
788
+ @_builtins.property
790
789
  @pulumi.getter(name="credentialType")
791
- def credential_type(self) -> pulumi.Output[builtins.str]:
790
+ def credential_type(self) -> pulumi.Output[_builtins.str]:
792
791
  """
793
792
  The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
794
793
  can be done in `credential_config`.
795
794
  """
796
795
  return pulumi.get(self, "credential_type")
797
796
 
798
- @property
797
+ @_builtins.property
799
798
  @pulumi.getter(name="dbName")
800
- def db_name(self) -> pulumi.Output[builtins.str]:
799
+ def db_name(self) -> pulumi.Output[_builtins.str]:
801
800
  """
802
801
  The unique name of the database connection to use for the static role.
803
802
  """
804
803
  return pulumi.get(self, "db_name")
805
804
 
806
- @property
805
+ @_builtins.property
807
806
  @pulumi.getter
808
- def name(self) -> pulumi.Output[builtins.str]:
807
+ def name(self) -> pulumi.Output[_builtins.str]:
809
808
  """
810
809
  A unique name to give the static role.
811
810
  """
812
811
  return pulumi.get(self, "name")
813
812
 
814
- @property
813
+ @_builtins.property
815
814
  @pulumi.getter
816
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
815
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
817
816
  """
818
817
  The namespace to provision the resource in.
819
818
  The value should not contain leading or trailing forward slashes.
@@ -822,18 +821,18 @@ class SecretBackendStaticRole(pulumi.CustomResource):
822
821
  """
823
822
  return pulumi.get(self, "namespace")
824
823
 
825
- @property
824
+ @_builtins.property
826
825
  @pulumi.getter(name="rotationPeriod")
827
- def rotation_period(self) -> pulumi.Output[Optional[builtins.int]]:
826
+ def rotation_period(self) -> pulumi.Output[Optional[_builtins.int]]:
828
827
  """
829
828
  The amount of time Vault should wait before rotating the password, in seconds.
830
829
  Mutually exclusive with `rotation_schedule`.
831
830
  """
832
831
  return pulumi.get(self, "rotation_period")
833
832
 
834
- @property
833
+ @_builtins.property
835
834
  @pulumi.getter(name="rotationSchedule")
836
- def rotation_schedule(self) -> pulumi.Output[Optional[builtins.str]]:
835
+ def rotation_schedule(self) -> pulumi.Output[Optional[_builtins.str]]:
837
836
  """
838
837
  A cron-style string that will define the schedule on which rotations should occur.
839
838
  Mutually exclusive with `rotation_period`.
@@ -843,26 +842,26 @@ class SecretBackendStaticRole(pulumi.CustomResource):
843
842
  """
844
843
  return pulumi.get(self, "rotation_schedule")
845
844
 
846
- @property
845
+ @_builtins.property
847
846
  @pulumi.getter(name="rotationStatements")
848
- def rotation_statements(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
847
+ def rotation_statements(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
849
848
  """
850
849
  Database statements to execute to rotate the password for the configured database user.
851
850
  """
852
851
  return pulumi.get(self, "rotation_statements")
853
852
 
854
- @property
853
+ @_builtins.property
855
854
  @pulumi.getter(name="rotationWindow")
856
- def rotation_window(self) -> pulumi.Output[Optional[builtins.int]]:
855
+ def rotation_window(self) -> pulumi.Output[Optional[_builtins.int]]:
857
856
  """
858
857
  The amount of time, in seconds, in which rotations are allowed to occur starting
859
858
  from a given `rotation_schedule`.
860
859
  """
861
860
  return pulumi.get(self, "rotation_window")
862
861
 
863
- @property
862
+ @_builtins.property
864
863
  @pulumi.getter(name="selfManagedPassword")
865
- def self_managed_password(self) -> pulumi.Output[Optional[builtins.str]]:
864
+ def self_managed_password(self) -> pulumi.Output[Optional[_builtins.str]]:
866
865
  """
867
866
  The password corresponding to the username in the database.
868
867
  Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
@@ -870,18 +869,18 @@ class SecretBackendStaticRole(pulumi.CustomResource):
870
869
  """
871
870
  return pulumi.get(self, "self_managed_password")
872
871
 
873
- @property
872
+ @_builtins.property
874
873
  @pulumi.getter(name="skipImportRotation")
875
- def skip_import_rotation(self) -> pulumi.Output[Optional[builtins.bool]]:
874
+ def skip_import_rotation(self) -> pulumi.Output[Optional[_builtins.bool]]:
876
875
  """
877
876
  If set to true, Vault will skip the
878
877
  initial secret rotation on import. Requires Vault 1.18+ Enterprise.
879
878
  """
880
879
  return pulumi.get(self, "skip_import_rotation")
881
880
 
882
- @property
881
+ @_builtins.property
883
882
  @pulumi.getter
884
- def username(self) -> pulumi.Output[builtins.str]:
883
+ def username(self) -> pulumi.Output[_builtins.str]:
885
884
  """
886
885
  The database username that this static role corresponds to.
887
886
  """