pulumi-vault 7.5.0a1763696324__tar.gz → 7.6.0__tar.gz

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (279) hide show
  1. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/PKG-INFO +1 -1
  2. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/database/_inputs.py +40 -0
  3. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/database/outputs.py +28 -0
  4. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/database/secret_backend_connection.py +66 -0
  5. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/database/secret_backend_static_role.py +157 -1
  6. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/kubernetes/auth_backend_role.py +64 -18
  7. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/kubernetes/get_auth_backend_role.py +15 -1
  8. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/pulumi-plugin.json +1 -1
  9. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault.egg-info/PKG-INFO +1 -1
  10. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pyproject.toml +1 -1
  11. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/README.md +0 -0
  12. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/__init__.py +0 -0
  13. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/_inputs.py +0 -0
  14. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/_utilities.py +0 -0
  15. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/ad/__init__.py +0 -0
  16. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/ad/get_access_credentials.py +0 -0
  17. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/ad/secret_backend.py +0 -0
  18. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/ad/secret_library.py +0 -0
  19. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/ad/secret_role.py +0 -0
  20. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/alicloud/__init__.py +0 -0
  21. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/alicloud/auth_backend_role.py +0 -0
  22. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/approle/__init__.py +0 -0
  23. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/approle/auth_backend_login.py +0 -0
  24. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/approle/auth_backend_role.py +0 -0
  25. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/approle/auth_backend_role_secret_id.py +0 -0
  26. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/approle/get_auth_backend_role_id.py +0 -0
  27. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/audit.py +0 -0
  28. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/audit_request_header.py +0 -0
  29. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/auth_backend.py +0 -0
  30. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/aws/__init__.py +0 -0
  31. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/aws/auth_backend_cert.py +0 -0
  32. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/aws/auth_backend_client.py +0 -0
  33. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/aws/auth_backend_config_identity.py +0 -0
  34. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -0
  35. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/aws/auth_backend_login.py +0 -0
  36. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/aws/auth_backend_role.py +0 -0
  37. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/aws/auth_backend_role_tag.py +0 -0
  38. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -0
  39. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/aws/auth_backend_sts_role.py +0 -0
  40. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/aws/get_access_credentials.py +0 -0
  41. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/aws/get_static_access_credentials.py +0 -0
  42. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/aws/secret_backend.py +0 -0
  43. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/aws/secret_backend_role.py +0 -0
  44. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/aws/secret_backend_static_role.py +0 -0
  45. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/azure/__init__.py +0 -0
  46. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/azure/_inputs.py +0 -0
  47. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/azure/auth_backend_config.py +0 -0
  48. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/azure/auth_backend_role.py +0 -0
  49. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/azure/backend.py +0 -0
  50. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/azure/backend_role.py +0 -0
  51. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/azure/get_access_credentials.py +0 -0
  52. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/azure/outputs.py +0 -0
  53. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/cert_auth_backend_role.py +0 -0
  54. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/config/__init__.py +0 -0
  55. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/config/__init__.pyi +0 -0
  56. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/config/_inputs.py +0 -0
  57. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/config/outputs.py +0 -0
  58. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/config/ui_custom_message.py +0 -0
  59. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/config/vars.py +0 -0
  60. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/consul/__init__.py +0 -0
  61. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/consul/secret_backend.py +0 -0
  62. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/consul/secret_backend_role.py +0 -0
  63. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/database/__init__.py +0 -0
  64. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/database/secret_backend_role.py +0 -0
  65. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/database/secrets_mount.py +0 -0
  66. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/egp_policy.py +0 -0
  67. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/gcp/__init__.py +0 -0
  68. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/gcp/_inputs.py +0 -0
  69. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/gcp/auth_backend.py +0 -0
  70. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/gcp/auth_backend_role.py +0 -0
  71. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/gcp/get_auth_backend_role.py +0 -0
  72. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/gcp/outputs.py +0 -0
  73. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/gcp/secret_backend.py +0 -0
  74. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/gcp/secret_impersonated_account.py +0 -0
  75. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/gcp/secret_roleset.py +0 -0
  76. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/gcp/secret_static_account.py +0 -0
  77. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/generic/__init__.py +0 -0
  78. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/generic/endpoint.py +0 -0
  79. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/generic/get_secret.py +0 -0
  80. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/generic/secret.py +0 -0
  81. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/get_auth_backend.py +0 -0
  82. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/get_auth_backends.py +0 -0
  83. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/get_namespace.py +0 -0
  84. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/get_namespaces.py +0 -0
  85. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/get_nomad_access_token.py +0 -0
  86. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/get_policy_document.py +0 -0
  87. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/get_raft_autopilot_state.py +0 -0
  88. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/github/__init__.py +0 -0
  89. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/github/_inputs.py +0 -0
  90. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/github/auth_backend.py +0 -0
  91. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/github/outputs.py +0 -0
  92. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/github/team.py +0 -0
  93. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/github/user.py +0 -0
  94. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/identity/__init__.py +0 -0
  95. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/identity/entity.py +0 -0
  96. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/identity/entity_alias.py +0 -0
  97. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/identity/entity_policies.py +0 -0
  98. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/identity/get_entity.py +0 -0
  99. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/identity/get_group.py +0 -0
  100. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/identity/get_oidc_client_creds.py +0 -0
  101. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/identity/get_oidc_openid_config.py +0 -0
  102. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/identity/get_oidc_public_keys.py +0 -0
  103. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/identity/group.py +0 -0
  104. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/identity/group_alias.py +0 -0
  105. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/identity/group_member_entity_ids.py +0 -0
  106. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/identity/group_member_group_ids.py +0 -0
  107. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/identity/group_policies.py +0 -0
  108. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/identity/mfa_duo.py +0 -0
  109. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/identity/mfa_login_enforcement.py +0 -0
  110. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/identity/mfa_okta.py +0 -0
  111. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/identity/mfa_pingid.py +0 -0
  112. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/identity/mfa_totp.py +0 -0
  113. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/identity/oidc.py +0 -0
  114. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/identity/oidc_assignment.py +0 -0
  115. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/identity/oidc_client.py +0 -0
  116. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/identity/oidc_key.py +0 -0
  117. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -0
  118. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/identity/oidc_provider.py +0 -0
  119. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/identity/oidc_role.py +0 -0
  120. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/identity/oidc_scope.py +0 -0
  121. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/identity/outputs.py +0 -0
  122. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/jwt/__init__.py +0 -0
  123. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/jwt/_inputs.py +0 -0
  124. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/jwt/auth_backend.py +0 -0
  125. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/jwt/auth_backend_role.py +0 -0
  126. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/jwt/outputs.py +0 -0
  127. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/kmip/__init__.py +0 -0
  128. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/kmip/secret_backend.py +0 -0
  129. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/kmip/secret_role.py +0 -0
  130. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/kmip/secret_scope.py +0 -0
  131. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/kubernetes/__init__.py +0 -0
  132. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/kubernetes/auth_backend_config.py +0 -0
  133. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/kubernetes/get_auth_backend_config.py +0 -0
  134. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/kubernetes/get_service_account_token.py +0 -0
  135. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/kubernetes/secret_backend.py +0 -0
  136. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/kubernetes/secret_backend_role.py +0 -0
  137. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/kv/__init__.py +0 -0
  138. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/kv/_inputs.py +0 -0
  139. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/kv/get_secret.py +0 -0
  140. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/kv/get_secret_subkeys_v2.py +0 -0
  141. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/kv/get_secret_v2.py +0 -0
  142. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/kv/get_secrets_list.py +0 -0
  143. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/kv/get_secrets_list_v2.py +0 -0
  144. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/kv/outputs.py +0 -0
  145. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/kv/secret.py +0 -0
  146. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/kv/secret_backend_v2.py +0 -0
  147. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/kv/secret_v2.py +0 -0
  148. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/ldap/__init__.py +0 -0
  149. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/ldap/_inputs.py +0 -0
  150. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/ldap/auth_backend.py +0 -0
  151. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/ldap/auth_backend_group.py +0 -0
  152. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/ldap/auth_backend_user.py +0 -0
  153. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/ldap/get_dynamic_credentials.py +0 -0
  154. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/ldap/get_static_credentials.py +0 -0
  155. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/ldap/outputs.py +0 -0
  156. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/ldap/secret_backend.py +0 -0
  157. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -0
  158. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/ldap/secret_backend_library_set.py +0 -0
  159. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/ldap/secret_backend_static_role.py +0 -0
  160. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/managed/__init__.py +0 -0
  161. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/managed/_inputs.py +0 -0
  162. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/managed/keys.py +0 -0
  163. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/managed/outputs.py +0 -0
  164. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/mfa_duo.py +0 -0
  165. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/mfa_okta.py +0 -0
  166. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/mfa_pingid.py +0 -0
  167. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/mfa_totp.py +0 -0
  168. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/mongodbatlas/__init__.py +0 -0
  169. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/mongodbatlas/secret_backend.py +0 -0
  170. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/mongodbatlas/secret_role.py +0 -0
  171. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/mount.py +0 -0
  172. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/namespace.py +0 -0
  173. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/nomad_secret_backend.py +0 -0
  174. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/nomad_secret_role.py +0 -0
  175. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/oci_auth_backend.py +0 -0
  176. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/oci_auth_backend_role.py +0 -0
  177. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/okta/__init__.py +0 -0
  178. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/okta/_inputs.py +0 -0
  179. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/okta/auth_backend.py +0 -0
  180. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/okta/auth_backend_group.py +0 -0
  181. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/okta/auth_backend_user.py +0 -0
  182. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/okta/outputs.py +0 -0
  183. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/outputs.py +0 -0
  184. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/pkisecret/__init__.py +0 -0
  185. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/pkisecret/_inputs.py +0 -0
  186. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/pkisecret/backend_acme_eab.py +0 -0
  187. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/pkisecret/backend_config_acme.py +0 -0
  188. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/pkisecret/backend_config_auto_tidy.py +0 -0
  189. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/pkisecret/backend_config_cluster.py +0 -0
  190. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/pkisecret/backend_config_cmpv2.py +0 -0
  191. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/pkisecret/backend_config_est.py +0 -0
  192. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/pkisecret/backend_config_scep.py +0 -0
  193. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/pkisecret/get_backend_cert_metadata.py +0 -0
  194. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/pkisecret/get_backend_config_cmpv2.py +0 -0
  195. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/pkisecret/get_backend_config_est.py +0 -0
  196. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/pkisecret/get_backend_config_scep.py +0 -0
  197. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/pkisecret/get_backend_issuer.py +0 -0
  198. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/pkisecret/get_backend_issuers.py +0 -0
  199. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/pkisecret/get_backend_key.py +0 -0
  200. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/pkisecret/get_backend_keys.py +0 -0
  201. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/pkisecret/outputs.py +0 -0
  202. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/pkisecret/secret_backend_cert.py +0 -0
  203. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -0
  204. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -0
  205. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -0
  206. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -0
  207. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -0
  208. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -0
  209. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/pkisecret/secret_backend_issuer.py +0 -0
  210. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/pkisecret/secret_backend_key.py +0 -0
  211. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/pkisecret/secret_backend_role.py +0 -0
  212. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -0
  213. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -0
  214. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/pkisecret/secret_backend_sign.py +0 -0
  215. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/plugin.py +0 -0
  216. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/plugin_pinned_version.py +0 -0
  217. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/policy.py +0 -0
  218. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/provider.py +0 -0
  219. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/py.typed +0 -0
  220. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/quota_lease_count.py +0 -0
  221. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/quota_rate_limit.py +0 -0
  222. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/rabbitmq/__init__.py +0 -0
  223. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/rabbitmq/_inputs.py +0 -0
  224. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/rabbitmq/outputs.py +0 -0
  225. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/rabbitmq/secret_backend.py +0 -0
  226. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/rabbitmq/secret_backend_role.py +0 -0
  227. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/raft_autopilot.py +0 -0
  228. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/raft_snapshot_agent_config.py +0 -0
  229. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/rgp_policy.py +0 -0
  230. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/saml/__init__.py +0 -0
  231. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/saml/_inputs.py +0 -0
  232. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/saml/auth_backend.py +0 -0
  233. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/saml/auth_backend_role.py +0 -0
  234. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/saml/outputs.py +0 -0
  235. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/scep_auth_backend_role.py +0 -0
  236. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/secrets/__init__.py +0 -0
  237. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/secrets/_inputs.py +0 -0
  238. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/secrets/outputs.py +0 -0
  239. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/secrets/sync_association.py +0 -0
  240. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/secrets/sync_aws_destination.py +0 -0
  241. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/secrets/sync_azure_destination.py +0 -0
  242. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/secrets/sync_config.py +0 -0
  243. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/secrets/sync_gcp_destination.py +0 -0
  244. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/secrets/sync_gh_destination.py +0 -0
  245. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/secrets/sync_github_apps.py +0 -0
  246. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/secrets/sync_vercel_destination.py +0 -0
  247. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/ssh/__init__.py +0 -0
  248. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/ssh/_inputs.py +0 -0
  249. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/ssh/get_secret_backend_sign.py +0 -0
  250. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/ssh/outputs.py +0 -0
  251. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/ssh/secret_backend_ca.py +0 -0
  252. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/ssh/secret_backend_role.py +0 -0
  253. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/terraformcloud/__init__.py +0 -0
  254. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/terraformcloud/secret_backend.py +0 -0
  255. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/terraformcloud/secret_creds.py +0 -0
  256. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/terraformcloud/secret_role.py +0 -0
  257. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/token.py +0 -0
  258. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/tokenauth/__init__.py +0 -0
  259. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/tokenauth/auth_backend_role.py +0 -0
  260. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/transform/__init__.py +0 -0
  261. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/transform/alphabet.py +0 -0
  262. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/transform/get_decode.py +0 -0
  263. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/transform/get_encode.py +0 -0
  264. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/transform/role.py +0 -0
  265. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/transform/template.py +0 -0
  266. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/transform/transformation.py +0 -0
  267. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/transit/__init__.py +0 -0
  268. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/transit/get_cmac.py +0 -0
  269. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/transit/get_decrypt.py +0 -0
  270. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/transit/get_encrypt.py +0 -0
  271. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/transit/get_sign.py +0 -0
  272. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/transit/get_verify.py +0 -0
  273. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/transit/secret_backend_key.py +0 -0
  274. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault/transit/secret_cache_config.py +0 -0
  275. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault.egg-info/SOURCES.txt +0 -0
  276. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault.egg-info/dependency_links.txt +0 -0
  277. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault.egg-info/requires.txt +0 -0
  278. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/pulumi_vault.egg-info/top_level.txt +0 -0
  279. {pulumi_vault-7.5.0a1763696324 → pulumi_vault-7.6.0}/setup.cfg +0 -0
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.4
2
2
  Name: pulumi_vault
3
- Version: 7.5.0a1763696324
3
+ Version: 7.6.0
4
4
  Summary: A Pulumi package for creating and managing HashiCorp Vault cloud resources.
5
5
  License: Apache-2.0
6
6
  Project-URL: Homepage, https://pulumi.io
@@ -2739,6 +2739,10 @@ if not MYPY:
2739
2739
  """
2740
2740
  Version counter for root credential password write-only field
2741
2741
  """
2742
+ self_managed: NotRequired[pulumi.Input[_builtins.bool]]
2743
+ """
2744
+ If set, allows onboarding static roles with a rootless connection configuration.
2745
+ """
2742
2746
  split_statements: NotRequired[pulumi.Input[_builtins.bool]]
2743
2747
  """
2744
2748
  Set to true in order to split statements after semi-colons.
@@ -2765,6 +2769,7 @@ class SecretBackendConnectionOracleArgs:
2765
2769
  password: Optional[pulumi.Input[_builtins.str]] = None,
2766
2770
  password_wo: Optional[pulumi.Input[_builtins.str]] = None,
2767
2771
  password_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
2772
+ self_managed: Optional[pulumi.Input[_builtins.bool]] = None,
2768
2773
  split_statements: Optional[pulumi.Input[_builtins.bool]] = None,
2769
2774
  username: Optional[pulumi.Input[_builtins.str]] = None,
2770
2775
  username_template: Optional[pulumi.Input[_builtins.str]] = None):
@@ -2778,6 +2783,7 @@ class SecretBackendConnectionOracleArgs:
2778
2783
  :param pulumi.Input[_builtins.str] password_wo: **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
2779
2784
  Write-only field for the root credential password used in the connection URL
2780
2785
  :param pulumi.Input[_builtins.int] password_wo_version: Version counter for root credential password write-only field
2786
+ :param pulumi.Input[_builtins.bool] self_managed: If set, allows onboarding static roles with a rootless connection configuration.
2781
2787
  :param pulumi.Input[_builtins.bool] split_statements: Set to true in order to split statements after semi-colons.
2782
2788
  :param pulumi.Input[_builtins.str] username: The root credential username used in the connection URL
2783
2789
  :param pulumi.Input[_builtins.str] username_template: Username generation template.
@@ -2798,6 +2804,8 @@ class SecretBackendConnectionOracleArgs:
2798
2804
  pulumi.set(__self__, "password_wo", password_wo)
2799
2805
  if password_wo_version is not None:
2800
2806
  pulumi.set(__self__, "password_wo_version", password_wo_version)
2807
+ if self_managed is not None:
2808
+ pulumi.set(__self__, "self_managed", self_managed)
2801
2809
  if split_statements is not None:
2802
2810
  pulumi.set(__self__, "split_statements", split_statements)
2803
2811
  if username is not None:
@@ -2902,6 +2910,18 @@ class SecretBackendConnectionOracleArgs:
2902
2910
  def password_wo_version(self, value: Optional[pulumi.Input[_builtins.int]]):
2903
2911
  pulumi.set(self, "password_wo_version", value)
2904
2912
 
2913
+ @_builtins.property
2914
+ @pulumi.getter(name="selfManaged")
2915
+ def self_managed(self) -> Optional[pulumi.Input[_builtins.bool]]:
2916
+ """
2917
+ If set, allows onboarding static roles with a rootless connection configuration.
2918
+ """
2919
+ return pulumi.get(self, "self_managed")
2920
+
2921
+ @self_managed.setter
2922
+ def self_managed(self, value: Optional[pulumi.Input[_builtins.bool]]):
2923
+ pulumi.set(self, "self_managed", value)
2924
+
2905
2925
  @_builtins.property
2906
2926
  @pulumi.getter(name="splitStatements")
2907
2927
  def split_statements(self) -> Optional[pulumi.Input[_builtins.bool]]:
@@ -9358,6 +9378,10 @@ if not MYPY:
9358
9378
  a rotation when a scheduled token rotation occurs. The default rotation window is
9359
9379
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
9360
9380
  """
9381
+ self_managed: NotRequired[pulumi.Input[_builtins.bool]]
9382
+ """
9383
+ If set, allows onboarding static roles with a rootless connection configuration.
9384
+ """
9361
9385
  split_statements: NotRequired[pulumi.Input[_builtins.bool]]
9362
9386
  """
9363
9387
  Set to true in order to split statements after semi-colons.
@@ -9398,6 +9422,7 @@ class SecretsMountOracleArgs:
9398
9422
  rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
9399
9423
  rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
9400
9424
  rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
9425
+ self_managed: Optional[pulumi.Input[_builtins.bool]] = None,
9401
9426
  split_statements: Optional[pulumi.Input[_builtins.bool]] = None,
9402
9427
  username: Optional[pulumi.Input[_builtins.str]] = None,
9403
9428
  username_template: Optional[pulumi.Input[_builtins.str]] = None,
@@ -9428,6 +9453,7 @@ class SecretsMountOracleArgs:
9428
9453
  :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
9429
9454
  a rotation when a scheduled token rotation occurs. The default rotation window is
9430
9455
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
9456
+ :param pulumi.Input[_builtins.bool] self_managed: If set, allows onboarding static roles with a rootless connection configuration.
9431
9457
  :param pulumi.Input[_builtins.bool] split_statements: Set to true in order to split statements after semi-colons.
9432
9458
  :param pulumi.Input[_builtins.str] username: The root credential username used in the connection URL
9433
9459
  :param pulumi.Input[_builtins.str] username_template: Username generation template.
@@ -9467,6 +9493,8 @@ class SecretsMountOracleArgs:
9467
9493
  pulumi.set(__self__, "rotation_schedule", rotation_schedule)
9468
9494
  if rotation_window is not None:
9469
9495
  pulumi.set(__self__, "rotation_window", rotation_window)
9496
+ if self_managed is not None:
9497
+ pulumi.set(__self__, "self_managed", self_managed)
9470
9498
  if split_statements is not None:
9471
9499
  pulumi.set(__self__, "split_statements", split_statements)
9472
9500
  if username is not None:
@@ -9688,6 +9716,18 @@ class SecretsMountOracleArgs:
9688
9716
  def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
9689
9717
  pulumi.set(self, "rotation_window", value)
9690
9718
 
9719
+ @_builtins.property
9720
+ @pulumi.getter(name="selfManaged")
9721
+ def self_managed(self) -> Optional[pulumi.Input[_builtins.bool]]:
9722
+ """
9723
+ If set, allows onboarding static roles with a rootless connection configuration.
9724
+ """
9725
+ return pulumi.get(self, "self_managed")
9726
+
9727
+ @self_managed.setter
9728
+ def self_managed(self, value: Optional[pulumi.Input[_builtins.bool]]):
9729
+ pulumi.set(self, "self_managed", value)
9730
+
9691
9731
  @_builtins.property
9692
9732
  @pulumi.getter(name="splitStatements")
9693
9733
  def split_statements(self) -> Optional[pulumi.Input[_builtins.bool]]:
@@ -1996,6 +1996,8 @@ class SecretBackendConnectionOracle(dict):
1996
1996
  suggest = "password_wo"
1997
1997
  elif key == "passwordWoVersion":
1998
1998
  suggest = "password_wo_version"
1999
+ elif key == "selfManaged":
2000
+ suggest = "self_managed"
1999
2001
  elif key == "splitStatements":
2000
2002
  suggest = "split_statements"
2001
2003
  elif key == "usernameTemplate":
@@ -2021,6 +2023,7 @@ class SecretBackendConnectionOracle(dict):
2021
2023
  password: Optional[_builtins.str] = None,
2022
2024
  password_wo: Optional[_builtins.str] = None,
2023
2025
  password_wo_version: Optional[_builtins.int] = None,
2026
+ self_managed: Optional[_builtins.bool] = None,
2024
2027
  split_statements: Optional[_builtins.bool] = None,
2025
2028
  username: Optional[_builtins.str] = None,
2026
2029
  username_template: Optional[_builtins.str] = None):
@@ -2034,6 +2037,7 @@ class SecretBackendConnectionOracle(dict):
2034
2037
  :param _builtins.str password_wo: **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
2035
2038
  Write-only field for the root credential password used in the connection URL
2036
2039
  :param _builtins.int password_wo_version: Version counter for root credential password write-only field
2040
+ :param _builtins.bool self_managed: If set, allows onboarding static roles with a rootless connection configuration.
2037
2041
  :param _builtins.bool split_statements: Set to true in order to split statements after semi-colons.
2038
2042
  :param _builtins.str username: The root credential username used in the connection URL
2039
2043
  :param _builtins.str username_template: Username generation template.
@@ -2054,6 +2058,8 @@ class SecretBackendConnectionOracle(dict):
2054
2058
  pulumi.set(__self__, "password_wo", password_wo)
2055
2059
  if password_wo_version is not None:
2056
2060
  pulumi.set(__self__, "password_wo_version", password_wo_version)
2061
+ if self_managed is not None:
2062
+ pulumi.set(__self__, "self_managed", self_managed)
2057
2063
  if split_statements is not None:
2058
2064
  pulumi.set(__self__, "split_statements", split_statements)
2059
2065
  if username is not None:
@@ -2126,6 +2132,14 @@ class SecretBackendConnectionOracle(dict):
2126
2132
  """
2127
2133
  return pulumi.get(self, "password_wo_version")
2128
2134
 
2135
+ @_builtins.property
2136
+ @pulumi.getter(name="selfManaged")
2137
+ def self_managed(self) -> Optional[_builtins.bool]:
2138
+ """
2139
+ If set, allows onboarding static roles with a rootless connection configuration.
2140
+ """
2141
+ return pulumi.get(self, "self_managed")
2142
+
2129
2143
  @_builtins.property
2130
2144
  @pulumi.getter(name="splitStatements")
2131
2145
  def split_statements(self) -> Optional[_builtins.bool]:
@@ -6676,6 +6690,8 @@ class SecretsMountOracle(dict):
6676
6690
  suggest = "rotation_schedule"
6677
6691
  elif key == "rotationWindow":
6678
6692
  suggest = "rotation_window"
6693
+ elif key == "selfManaged":
6694
+ suggest = "self_managed"
6679
6695
  elif key == "splitStatements":
6680
6696
  suggest = "split_statements"
6681
6697
  elif key == "usernameTemplate":
@@ -6712,6 +6728,7 @@ class SecretsMountOracle(dict):
6712
6728
  rotation_period: Optional[_builtins.int] = None,
6713
6729
  rotation_schedule: Optional[_builtins.str] = None,
6714
6730
  rotation_window: Optional[_builtins.int] = None,
6731
+ self_managed: Optional[_builtins.bool] = None,
6715
6732
  split_statements: Optional[_builtins.bool] = None,
6716
6733
  username: Optional[_builtins.str] = None,
6717
6734
  username_template: Optional[_builtins.str] = None,
@@ -6742,6 +6759,7 @@ class SecretsMountOracle(dict):
6742
6759
  :param _builtins.int rotation_window: The maximum amount of time in seconds allowed to complete
6743
6760
  a rotation when a scheduled token rotation occurs. The default rotation window is
6744
6761
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
6762
+ :param _builtins.bool self_managed: If set, allows onboarding static roles with a rootless connection configuration.
6745
6763
  :param _builtins.bool split_statements: Set to true in order to split statements after semi-colons.
6746
6764
  :param _builtins.str username: The root credential username used in the connection URL
6747
6765
  :param _builtins.str username_template: Username generation template.
@@ -6781,6 +6799,8 @@ class SecretsMountOracle(dict):
6781
6799
  pulumi.set(__self__, "rotation_schedule", rotation_schedule)
6782
6800
  if rotation_window is not None:
6783
6801
  pulumi.set(__self__, "rotation_window", rotation_window)
6802
+ if self_managed is not None:
6803
+ pulumi.set(__self__, "self_managed", self_managed)
6784
6804
  if split_statements is not None:
6785
6805
  pulumi.set(__self__, "split_statements", split_statements)
6786
6806
  if username is not None:
@@ -6934,6 +6954,14 @@ class SecretsMountOracle(dict):
6934
6954
  """
6935
6955
  return pulumi.get(self, "rotation_window")
6936
6956
 
6957
+ @_builtins.property
6958
+ @pulumi.getter(name="selfManaged")
6959
+ def self_managed(self) -> Optional[_builtins.bool]:
6960
+ """
6961
+ If set, allows onboarding static roles with a rootless connection configuration.
6962
+ """
6963
+ return pulumi.get(self, "self_managed")
6964
+
6937
6965
  @_builtins.property
6938
6966
  @pulumi.getter(name="splitStatements")
6939
6967
  def split_statements(self) -> Optional[_builtins.bool]:
@@ -1077,6 +1077,8 @@ class SecretBackendConnection(pulumi.CustomResource):
1077
1077
  """
1078
1078
  ## Example Usage
1079
1079
 
1080
+ ### PostgreSQL Connection
1081
+
1080
1082
  ```python
1081
1083
  import pulumi
1082
1084
  import pulumi_vault as vault
@@ -1098,6 +1100,37 @@ class SecretBackendConnection(pulumi.CustomResource):
1098
1100
  })
1099
1101
  ```
1100
1102
 
1103
+ ### Oracle Connection with Self-Managed Mode (Rootless)
1104
+
1105
+ For Vault 1.18+ Enterprise, you can configure Oracle connections in self-managed mode,
1106
+ which allows a static role to manage its own database credentials without requiring root access:
1107
+
1108
+ ```python
1109
+ import pulumi
1110
+ import pulumi_vault as vault
1111
+
1112
+ db = vault.Mount("db",
1113
+ path="database",
1114
+ type="database")
1115
+ oracle = vault.database.SecretBackendConnection("oracle",
1116
+ backend=db.path,
1117
+ name="oracle",
1118
+ allowed_roles=["my-role"],
1119
+ oracle={
1120
+ "connection_url": "{{username}}/{{password}}@//host:port/service",
1121
+ "self_managed": True,
1122
+ "plugin_name": "vault-plugin-database-oracle",
1123
+ })
1124
+ oracle_role = vault.database.SecretBackendStaticRole("oracle_role",
1125
+ backend=db.path,
1126
+ name="my-role",
1127
+ db_name=oracle.name,
1128
+ username="vault_user",
1129
+ password_wo="initial-password",
1130
+ password_wo_version=1,
1131
+ rotation_period=3600)
1132
+ ```
1133
+
1101
1134
  ## Ephemeral Attributes Reference
1102
1135
 
1103
1136
  The following write-only attributes are supported for all DBs that support username/password:
@@ -1171,6 +1204,8 @@ class SecretBackendConnection(pulumi.CustomResource):
1171
1204
  """
1172
1205
  ## Example Usage
1173
1206
 
1207
+ ### PostgreSQL Connection
1208
+
1174
1209
  ```python
1175
1210
  import pulumi
1176
1211
  import pulumi_vault as vault
@@ -1192,6 +1227,37 @@ class SecretBackendConnection(pulumi.CustomResource):
1192
1227
  })
1193
1228
  ```
1194
1229
 
1230
+ ### Oracle Connection with Self-Managed Mode (Rootless)
1231
+
1232
+ For Vault 1.18+ Enterprise, you can configure Oracle connections in self-managed mode,
1233
+ which allows a static role to manage its own database credentials without requiring root access:
1234
+
1235
+ ```python
1236
+ import pulumi
1237
+ import pulumi_vault as vault
1238
+
1239
+ db = vault.Mount("db",
1240
+ path="database",
1241
+ type="database")
1242
+ oracle = vault.database.SecretBackendConnection("oracle",
1243
+ backend=db.path,
1244
+ name="oracle",
1245
+ allowed_roles=["my-role"],
1246
+ oracle={
1247
+ "connection_url": "{{username}}/{{password}}@//host:port/service",
1248
+ "self_managed": True,
1249
+ "plugin_name": "vault-plugin-database-oracle",
1250
+ })
1251
+ oracle_role = vault.database.SecretBackendStaticRole("oracle_role",
1252
+ backend=db.path,
1253
+ name="my-role",
1254
+ db_name=oracle.name,
1255
+ username="vault_user",
1256
+ password_wo="initial-password",
1257
+ password_wo_version=1,
1258
+ rotation_period=3600)
1259
+ ```
1260
+
1195
1261
  ## Ephemeral Attributes Reference
1196
1262
 
1197
1263
  The following write-only attributes are supported for all DBs that support username/password:
@@ -26,6 +26,8 @@ class SecretBackendStaticRoleArgs:
26
26
  credential_type: Optional[pulumi.Input[_builtins.str]] = None,
27
27
  name: Optional[pulumi.Input[_builtins.str]] = None,
28
28
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
29
+ password_wo: Optional[pulumi.Input[_builtins.str]] = None,
30
+ password_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
29
31
  rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
30
32
  rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
31
33
  rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
@@ -43,6 +45,13 @@ class SecretBackendStaticRoleArgs:
43
45
  The value should not contain leading or trailing forward slashes.
44
46
  The `namespace` is always relative to the provider's configured namespace.
45
47
  *Available only for Vault Enterprise*.
48
+ :param pulumi.Input[_builtins.str] password_wo: **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
49
+ The password corresponding to the username in the database.
50
+ This is a write-only field. Requires Vault 1.19+. Deprecates `self_managed_password` which was introduced in Vault 1.18.
51
+ Cannot be used with `self_managed_password`.
52
+ :param pulumi.Input[_builtins.int] password_wo_version: The version of the `password_wo` field.
53
+ Used for tracking changes to the write-only password field. For more info see
54
+ updating write-only attributes.
46
55
  :param pulumi.Input[_builtins.int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
47
56
  Mutually exclusive with `rotation_schedule`.
48
57
  :param pulumi.Input[_builtins.str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
@@ -56,6 +65,7 @@ class SecretBackendStaticRoleArgs:
56
65
  :param pulumi.Input[_builtins.str] self_managed_password: The password corresponding to the username in the database.
57
66
  Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
58
67
  select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
68
+ **Deprecated**: Use `password_wo` instead. This field will be removed in a future version.
59
69
  :param pulumi.Input[_builtins.bool] skip_import_rotation: If set to true, Vault will skip the
60
70
  initial secret rotation on import. Requires Vault 1.18+ Enterprise.
61
71
  """
@@ -70,6 +80,10 @@ class SecretBackendStaticRoleArgs:
70
80
  pulumi.set(__self__, "name", name)
71
81
  if namespace is not None:
72
82
  pulumi.set(__self__, "namespace", namespace)
83
+ if password_wo is not None:
84
+ pulumi.set(__self__, "password_wo", password_wo)
85
+ if password_wo_version is not None:
86
+ pulumi.set(__self__, "password_wo_version", password_wo_version)
73
87
  if rotation_period is not None:
74
88
  pulumi.set(__self__, "rotation_period", rotation_period)
75
89
  if rotation_schedule is not None:
@@ -167,6 +181,35 @@ class SecretBackendStaticRoleArgs:
167
181
  def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
168
182
  pulumi.set(self, "namespace", value)
169
183
 
184
+ @_builtins.property
185
+ @pulumi.getter(name="passwordWo")
186
+ def password_wo(self) -> Optional[pulumi.Input[_builtins.str]]:
187
+ """
188
+ **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
189
+ The password corresponding to the username in the database.
190
+ This is a write-only field. Requires Vault 1.19+. Deprecates `self_managed_password` which was introduced in Vault 1.18.
191
+ Cannot be used with `self_managed_password`.
192
+ """
193
+ return pulumi.get(self, "password_wo")
194
+
195
+ @password_wo.setter
196
+ def password_wo(self, value: Optional[pulumi.Input[_builtins.str]]):
197
+ pulumi.set(self, "password_wo", value)
198
+
199
+ @_builtins.property
200
+ @pulumi.getter(name="passwordWoVersion")
201
+ def password_wo_version(self) -> Optional[pulumi.Input[_builtins.int]]:
202
+ """
203
+ The version of the `password_wo` field.
204
+ Used for tracking changes to the write-only password field. For more info see
205
+ updating write-only attributes.
206
+ """
207
+ return pulumi.get(self, "password_wo_version")
208
+
209
+ @password_wo_version.setter
210
+ def password_wo_version(self, value: Optional[pulumi.Input[_builtins.int]]):
211
+ pulumi.set(self, "password_wo_version", value)
212
+
170
213
  @_builtins.property
171
214
  @pulumi.getter(name="rotationPeriod")
172
215
  def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
@@ -228,6 +271,7 @@ class SecretBackendStaticRoleArgs:
228
271
  The password corresponding to the username in the database.
229
272
  Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
230
273
  select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
274
+ **Deprecated**: Use `password_wo` instead. This field will be removed in a future version.
231
275
  """
232
276
  return pulumi.get(self, "self_managed_password")
233
277
 
@@ -258,6 +302,8 @@ class _SecretBackendStaticRoleState:
258
302
  db_name: Optional[pulumi.Input[_builtins.str]] = None,
259
303
  name: Optional[pulumi.Input[_builtins.str]] = None,
260
304
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
305
+ password_wo: Optional[pulumi.Input[_builtins.str]] = None,
306
+ password_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
261
307
  rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
262
308
  rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
263
309
  rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
@@ -275,6 +321,13 @@ class _SecretBackendStaticRoleState:
275
321
  The value should not contain leading or trailing forward slashes.
276
322
  The `namespace` is always relative to the provider's configured namespace.
277
323
  *Available only for Vault Enterprise*.
324
+ :param pulumi.Input[_builtins.str] password_wo: **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
325
+ The password corresponding to the username in the database.
326
+ This is a write-only field. Requires Vault 1.19+. Deprecates `self_managed_password` which was introduced in Vault 1.18.
327
+ Cannot be used with `self_managed_password`.
328
+ :param pulumi.Input[_builtins.int] password_wo_version: The version of the `password_wo` field.
329
+ Used for tracking changes to the write-only password field. For more info see
330
+ updating write-only attributes.
278
331
  :param pulumi.Input[_builtins.int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
279
332
  Mutually exclusive with `rotation_schedule`.
280
333
  :param pulumi.Input[_builtins.str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
@@ -288,6 +341,7 @@ class _SecretBackendStaticRoleState:
288
341
  :param pulumi.Input[_builtins.str] self_managed_password: The password corresponding to the username in the database.
289
342
  Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
290
343
  select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
344
+ **Deprecated**: Use `password_wo` instead. This field will be removed in a future version.
291
345
  :param pulumi.Input[_builtins.bool] skip_import_rotation: If set to true, Vault will skip the
292
346
  initial secret rotation on import. Requires Vault 1.18+ Enterprise.
293
347
  :param pulumi.Input[_builtins.str] username: The database username that this static role corresponds to.
@@ -304,6 +358,10 @@ class _SecretBackendStaticRoleState:
304
358
  pulumi.set(__self__, "name", name)
305
359
  if namespace is not None:
306
360
  pulumi.set(__self__, "namespace", namespace)
361
+ if password_wo is not None:
362
+ pulumi.set(__self__, "password_wo", password_wo)
363
+ if password_wo_version is not None:
364
+ pulumi.set(__self__, "password_wo_version", password_wo_version)
307
365
  if rotation_period is not None:
308
366
  pulumi.set(__self__, "rotation_period", rotation_period)
309
367
  if rotation_schedule is not None:
@@ -391,6 +449,35 @@ class _SecretBackendStaticRoleState:
391
449
  def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
392
450
  pulumi.set(self, "namespace", value)
393
451
 
452
+ @_builtins.property
453
+ @pulumi.getter(name="passwordWo")
454
+ def password_wo(self) -> Optional[pulumi.Input[_builtins.str]]:
455
+ """
456
+ **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
457
+ The password corresponding to the username in the database.
458
+ This is a write-only field. Requires Vault 1.19+. Deprecates `self_managed_password` which was introduced in Vault 1.18.
459
+ Cannot be used with `self_managed_password`.
460
+ """
461
+ return pulumi.get(self, "password_wo")
462
+
463
+ @password_wo.setter
464
+ def password_wo(self, value: Optional[pulumi.Input[_builtins.str]]):
465
+ pulumi.set(self, "password_wo", value)
466
+
467
+ @_builtins.property
468
+ @pulumi.getter(name="passwordWoVersion")
469
+ def password_wo_version(self) -> Optional[pulumi.Input[_builtins.int]]:
470
+ """
471
+ The version of the `password_wo` field.
472
+ Used for tracking changes to the write-only password field. For more info see
473
+ updating write-only attributes.
474
+ """
475
+ return pulumi.get(self, "password_wo_version")
476
+
477
+ @password_wo_version.setter
478
+ def password_wo_version(self, value: Optional[pulumi.Input[_builtins.int]]):
479
+ pulumi.set(self, "password_wo_version", value)
480
+
394
481
  @_builtins.property
395
482
  @pulumi.getter(name="rotationPeriod")
396
483
  def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
@@ -452,6 +539,7 @@ class _SecretBackendStaticRoleState:
452
539
  The password corresponding to the username in the database.
453
540
  Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
454
541
  select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
542
+ **Deprecated**: Use `password_wo` instead. This field will be removed in a future version.
455
543
  """
456
544
  return pulumi.get(self, "self_managed_password")
457
545
 
@@ -497,6 +585,8 @@ class SecretBackendStaticRole(pulumi.CustomResource):
497
585
  db_name: Optional[pulumi.Input[_builtins.str]] = None,
498
586
  name: Optional[pulumi.Input[_builtins.str]] = None,
499
587
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
588
+ password_wo: Optional[pulumi.Input[_builtins.str]] = None,
589
+ password_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
500
590
  rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
501
591
  rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
502
592
  rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
@@ -543,6 +633,16 @@ class SecretBackendStaticRole(pulumi.CustomResource):
543
633
  rotation_schedule="0 0 * * SAT",
544
634
  rotation_window=172800,
545
635
  rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
636
+ # configure a static role with a password (Vault 1.19+)
637
+ password_role = vault.database.SecretBackendStaticRole("password_role",
638
+ backend=db.path,
639
+ name="my-password-role",
640
+ db_name=postgres.name,
641
+ username="example",
642
+ password_wo="my-password",
643
+ password_wo_version=1,
644
+ rotation_period=3600,
645
+ rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
546
646
  ```
547
647
 
548
648
  ## Import
@@ -563,6 +663,13 @@ class SecretBackendStaticRole(pulumi.CustomResource):
563
663
  The value should not contain leading or trailing forward slashes.
564
664
  The `namespace` is always relative to the provider's configured namespace.
565
665
  *Available only for Vault Enterprise*.
666
+ :param pulumi.Input[_builtins.str] password_wo: **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
667
+ The password corresponding to the username in the database.
668
+ This is a write-only field. Requires Vault 1.19+. Deprecates `self_managed_password` which was introduced in Vault 1.18.
669
+ Cannot be used with `self_managed_password`.
670
+ :param pulumi.Input[_builtins.int] password_wo_version: The version of the `password_wo` field.
671
+ Used for tracking changes to the write-only password field. For more info see
672
+ updating write-only attributes.
566
673
  :param pulumi.Input[_builtins.int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
567
674
  Mutually exclusive with `rotation_schedule`.
568
675
  :param pulumi.Input[_builtins.str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
@@ -576,6 +683,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
576
683
  :param pulumi.Input[_builtins.str] self_managed_password: The password corresponding to the username in the database.
577
684
  Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
578
685
  select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
686
+ **Deprecated**: Use `password_wo` instead. This field will be removed in a future version.
579
687
  :param pulumi.Input[_builtins.bool] skip_import_rotation: If set to true, Vault will skip the
580
688
  initial secret rotation on import. Requires Vault 1.18+ Enterprise.
581
689
  :param pulumi.Input[_builtins.str] username: The database username that this static role corresponds to.
@@ -624,6 +732,16 @@ class SecretBackendStaticRole(pulumi.CustomResource):
624
732
  rotation_schedule="0 0 * * SAT",
625
733
  rotation_window=172800,
626
734
  rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
735
+ # configure a static role with a password (Vault 1.19+)
736
+ password_role = vault.database.SecretBackendStaticRole("password_role",
737
+ backend=db.path,
738
+ name="my-password-role",
739
+ db_name=postgres.name,
740
+ username="example",
741
+ password_wo="my-password",
742
+ password_wo_version=1,
743
+ rotation_period=3600,
744
+ rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
627
745
  ```
628
746
 
629
747
  ## Import
@@ -655,6 +773,8 @@ class SecretBackendStaticRole(pulumi.CustomResource):
655
773
  db_name: Optional[pulumi.Input[_builtins.str]] = None,
656
774
  name: Optional[pulumi.Input[_builtins.str]] = None,
657
775
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
776
+ password_wo: Optional[pulumi.Input[_builtins.str]] = None,
777
+ password_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
658
778
  rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
659
779
  rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
660
780
  rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
@@ -681,6 +801,8 @@ class SecretBackendStaticRole(pulumi.CustomResource):
681
801
  __props__.__dict__["db_name"] = db_name
682
802
  __props__.__dict__["name"] = name
683
803
  __props__.__dict__["namespace"] = namespace
804
+ __props__.__dict__["password_wo"] = None if password_wo is None else pulumi.Output.secret(password_wo)
805
+ __props__.__dict__["password_wo_version"] = password_wo_version
684
806
  __props__.__dict__["rotation_period"] = rotation_period
685
807
  __props__.__dict__["rotation_schedule"] = rotation_schedule
686
808
  __props__.__dict__["rotation_statements"] = rotation_statements
@@ -690,7 +812,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
690
812
  if username is None and not opts.urn:
691
813
  raise TypeError("Missing required property 'username'")
692
814
  __props__.__dict__["username"] = username
693
- secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["selfManagedPassword"])
815
+ secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["passwordWo", "selfManagedPassword"])
694
816
  opts = pulumi.ResourceOptions.merge(opts, secret_opts)
695
817
  super(SecretBackendStaticRole, __self__).__init__(
696
818
  'vault:database/secretBackendStaticRole:SecretBackendStaticRole',
@@ -708,6 +830,8 @@ class SecretBackendStaticRole(pulumi.CustomResource):
708
830
  db_name: Optional[pulumi.Input[_builtins.str]] = None,
709
831
  name: Optional[pulumi.Input[_builtins.str]] = None,
710
832
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
833
+ password_wo: Optional[pulumi.Input[_builtins.str]] = None,
834
+ password_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
711
835
  rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
712
836
  rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
713
837
  rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
@@ -730,6 +854,13 @@ class SecretBackendStaticRole(pulumi.CustomResource):
730
854
  The value should not contain leading or trailing forward slashes.
731
855
  The `namespace` is always relative to the provider's configured namespace.
732
856
  *Available only for Vault Enterprise*.
857
+ :param pulumi.Input[_builtins.str] password_wo: **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
858
+ The password corresponding to the username in the database.
859
+ This is a write-only field. Requires Vault 1.19+. Deprecates `self_managed_password` which was introduced in Vault 1.18.
860
+ Cannot be used with `self_managed_password`.
861
+ :param pulumi.Input[_builtins.int] password_wo_version: The version of the `password_wo` field.
862
+ Used for tracking changes to the write-only password field. For more info see
863
+ updating write-only attributes.
733
864
  :param pulumi.Input[_builtins.int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
734
865
  Mutually exclusive with `rotation_schedule`.
735
866
  :param pulumi.Input[_builtins.str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
@@ -743,6 +874,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
743
874
  :param pulumi.Input[_builtins.str] self_managed_password: The password corresponding to the username in the database.
744
875
  Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
745
876
  select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
877
+ **Deprecated**: Use `password_wo` instead. This field will be removed in a future version.
746
878
  :param pulumi.Input[_builtins.bool] skip_import_rotation: If set to true, Vault will skip the
747
879
  initial secret rotation on import. Requires Vault 1.18+ Enterprise.
748
880
  :param pulumi.Input[_builtins.str] username: The database username that this static role corresponds to.
@@ -757,6 +889,8 @@ class SecretBackendStaticRole(pulumi.CustomResource):
757
889
  __props__.__dict__["db_name"] = db_name
758
890
  __props__.__dict__["name"] = name
759
891
  __props__.__dict__["namespace"] = namespace
892
+ __props__.__dict__["password_wo"] = password_wo
893
+ __props__.__dict__["password_wo_version"] = password_wo_version
760
894
  __props__.__dict__["rotation_period"] = rotation_period
761
895
  __props__.__dict__["rotation_schedule"] = rotation_schedule
762
896
  __props__.__dict__["rotation_statements"] = rotation_statements
@@ -814,6 +948,27 @@ class SecretBackendStaticRole(pulumi.CustomResource):
814
948
  """
815
949
  return pulumi.get(self, "namespace")
816
950
 
951
+ @_builtins.property
952
+ @pulumi.getter(name="passwordWo")
953
+ def password_wo(self) -> pulumi.Output[Optional[_builtins.str]]:
954
+ """
955
+ **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
956
+ The password corresponding to the username in the database.
957
+ This is a write-only field. Requires Vault 1.19+. Deprecates `self_managed_password` which was introduced in Vault 1.18.
958
+ Cannot be used with `self_managed_password`.
959
+ """
960
+ return pulumi.get(self, "password_wo")
961
+
962
+ @_builtins.property
963
+ @pulumi.getter(name="passwordWoVersion")
964
+ def password_wo_version(self) -> pulumi.Output[Optional[_builtins.int]]:
965
+ """
966
+ The version of the `password_wo` field.
967
+ Used for tracking changes to the write-only password field. For more info see
968
+ updating write-only attributes.
969
+ """
970
+ return pulumi.get(self, "password_wo_version")
971
+
817
972
  @_builtins.property
818
973
  @pulumi.getter(name="rotationPeriod")
819
974
  def rotation_period(self) -> pulumi.Output[Optional[_builtins.int]]:
@@ -859,6 +1014,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
859
1014
  The password corresponding to the username in the database.
860
1015
  Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
861
1016
  select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
1017
+ **Deprecated**: Use `password_wo` instead. This field will be removed in a future version.
862
1018
  """
863
1019
  return pulumi.get(self, "self_managed_password")
864
1020