pulumi-vault 7.6.0__py3-none-any.whl → 7.6.0a1764138710__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -2739,10 +2739,6 @@ if not MYPY:
2739
2739
  """
2740
2740
  Version counter for root credential password write-only field
2741
2741
  """
2742
- self_managed: NotRequired[pulumi.Input[_builtins.bool]]
2743
- """
2744
- If set, allows onboarding static roles with a rootless connection configuration.
2745
- """
2746
2742
  split_statements: NotRequired[pulumi.Input[_builtins.bool]]
2747
2743
  """
2748
2744
  Set to true in order to split statements after semi-colons.
@@ -2769,7 +2765,6 @@ class SecretBackendConnectionOracleArgs:
2769
2765
  password: Optional[pulumi.Input[_builtins.str]] = None,
2770
2766
  password_wo: Optional[pulumi.Input[_builtins.str]] = None,
2771
2767
  password_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
2772
- self_managed: Optional[pulumi.Input[_builtins.bool]] = None,
2773
2768
  split_statements: Optional[pulumi.Input[_builtins.bool]] = None,
2774
2769
  username: Optional[pulumi.Input[_builtins.str]] = None,
2775
2770
  username_template: Optional[pulumi.Input[_builtins.str]] = None):
@@ -2783,7 +2778,6 @@ class SecretBackendConnectionOracleArgs:
2783
2778
  :param pulumi.Input[_builtins.str] password_wo: **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
2784
2779
  Write-only field for the root credential password used in the connection URL
2785
2780
  :param pulumi.Input[_builtins.int] password_wo_version: Version counter for root credential password write-only field
2786
- :param pulumi.Input[_builtins.bool] self_managed: If set, allows onboarding static roles with a rootless connection configuration.
2787
2781
  :param pulumi.Input[_builtins.bool] split_statements: Set to true in order to split statements after semi-colons.
2788
2782
  :param pulumi.Input[_builtins.str] username: The root credential username used in the connection URL
2789
2783
  :param pulumi.Input[_builtins.str] username_template: Username generation template.
@@ -2804,8 +2798,6 @@ class SecretBackendConnectionOracleArgs:
2804
2798
  pulumi.set(__self__, "password_wo", password_wo)
2805
2799
  if password_wo_version is not None:
2806
2800
  pulumi.set(__self__, "password_wo_version", password_wo_version)
2807
- if self_managed is not None:
2808
- pulumi.set(__self__, "self_managed", self_managed)
2809
2801
  if split_statements is not None:
2810
2802
  pulumi.set(__self__, "split_statements", split_statements)
2811
2803
  if username is not None:
@@ -2910,18 +2902,6 @@ class SecretBackendConnectionOracleArgs:
2910
2902
  def password_wo_version(self, value: Optional[pulumi.Input[_builtins.int]]):
2911
2903
  pulumi.set(self, "password_wo_version", value)
2912
2904
 
2913
- @_builtins.property
2914
- @pulumi.getter(name="selfManaged")
2915
- def self_managed(self) -> Optional[pulumi.Input[_builtins.bool]]:
2916
- """
2917
- If set, allows onboarding static roles with a rootless connection configuration.
2918
- """
2919
- return pulumi.get(self, "self_managed")
2920
-
2921
- @self_managed.setter
2922
- def self_managed(self, value: Optional[pulumi.Input[_builtins.bool]]):
2923
- pulumi.set(self, "self_managed", value)
2924
-
2925
2905
  @_builtins.property
2926
2906
  @pulumi.getter(name="splitStatements")
2927
2907
  def split_statements(self) -> Optional[pulumi.Input[_builtins.bool]]:
@@ -9378,10 +9358,6 @@ if not MYPY:
9378
9358
  a rotation when a scheduled token rotation occurs. The default rotation window is
9379
9359
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
9380
9360
  """
9381
- self_managed: NotRequired[pulumi.Input[_builtins.bool]]
9382
- """
9383
- If set, allows onboarding static roles with a rootless connection configuration.
9384
- """
9385
9361
  split_statements: NotRequired[pulumi.Input[_builtins.bool]]
9386
9362
  """
9387
9363
  Set to true in order to split statements after semi-colons.
@@ -9422,7 +9398,6 @@ class SecretsMountOracleArgs:
9422
9398
  rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
9423
9399
  rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
9424
9400
  rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
9425
- self_managed: Optional[pulumi.Input[_builtins.bool]] = None,
9426
9401
  split_statements: Optional[pulumi.Input[_builtins.bool]] = None,
9427
9402
  username: Optional[pulumi.Input[_builtins.str]] = None,
9428
9403
  username_template: Optional[pulumi.Input[_builtins.str]] = None,
@@ -9453,7 +9428,6 @@ class SecretsMountOracleArgs:
9453
9428
  :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
9454
9429
  a rotation when a scheduled token rotation occurs. The default rotation window is
9455
9430
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
9456
- :param pulumi.Input[_builtins.bool] self_managed: If set, allows onboarding static roles with a rootless connection configuration.
9457
9431
  :param pulumi.Input[_builtins.bool] split_statements: Set to true in order to split statements after semi-colons.
9458
9432
  :param pulumi.Input[_builtins.str] username: The root credential username used in the connection URL
9459
9433
  :param pulumi.Input[_builtins.str] username_template: Username generation template.
@@ -9493,8 +9467,6 @@ class SecretsMountOracleArgs:
9493
9467
  pulumi.set(__self__, "rotation_schedule", rotation_schedule)
9494
9468
  if rotation_window is not None:
9495
9469
  pulumi.set(__self__, "rotation_window", rotation_window)
9496
- if self_managed is not None:
9497
- pulumi.set(__self__, "self_managed", self_managed)
9498
9470
  if split_statements is not None:
9499
9471
  pulumi.set(__self__, "split_statements", split_statements)
9500
9472
  if username is not None:
@@ -9716,18 +9688,6 @@ class SecretsMountOracleArgs:
9716
9688
  def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
9717
9689
  pulumi.set(self, "rotation_window", value)
9718
9690
 
9719
- @_builtins.property
9720
- @pulumi.getter(name="selfManaged")
9721
- def self_managed(self) -> Optional[pulumi.Input[_builtins.bool]]:
9722
- """
9723
- If set, allows onboarding static roles with a rootless connection configuration.
9724
- """
9725
- return pulumi.get(self, "self_managed")
9726
-
9727
- @self_managed.setter
9728
- def self_managed(self, value: Optional[pulumi.Input[_builtins.bool]]):
9729
- pulumi.set(self, "self_managed", value)
9730
-
9731
9691
  @_builtins.property
9732
9692
  @pulumi.getter(name="splitStatements")
9733
9693
  def split_statements(self) -> Optional[pulumi.Input[_builtins.bool]]:
@@ -1996,8 +1996,6 @@ class SecretBackendConnectionOracle(dict):
1996
1996
  suggest = "password_wo"
1997
1997
  elif key == "passwordWoVersion":
1998
1998
  suggest = "password_wo_version"
1999
- elif key == "selfManaged":
2000
- suggest = "self_managed"
2001
1999
  elif key == "splitStatements":
2002
2000
  suggest = "split_statements"
2003
2001
  elif key == "usernameTemplate":
@@ -2023,7 +2021,6 @@ class SecretBackendConnectionOracle(dict):
2023
2021
  password: Optional[_builtins.str] = None,
2024
2022
  password_wo: Optional[_builtins.str] = None,
2025
2023
  password_wo_version: Optional[_builtins.int] = None,
2026
- self_managed: Optional[_builtins.bool] = None,
2027
2024
  split_statements: Optional[_builtins.bool] = None,
2028
2025
  username: Optional[_builtins.str] = None,
2029
2026
  username_template: Optional[_builtins.str] = None):
@@ -2037,7 +2034,6 @@ class SecretBackendConnectionOracle(dict):
2037
2034
  :param _builtins.str password_wo: **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
2038
2035
  Write-only field for the root credential password used in the connection URL
2039
2036
  :param _builtins.int password_wo_version: Version counter for root credential password write-only field
2040
- :param _builtins.bool self_managed: If set, allows onboarding static roles with a rootless connection configuration.
2041
2037
  :param _builtins.bool split_statements: Set to true in order to split statements after semi-colons.
2042
2038
  :param _builtins.str username: The root credential username used in the connection URL
2043
2039
  :param _builtins.str username_template: Username generation template.
@@ -2058,8 +2054,6 @@ class SecretBackendConnectionOracle(dict):
2058
2054
  pulumi.set(__self__, "password_wo", password_wo)
2059
2055
  if password_wo_version is not None:
2060
2056
  pulumi.set(__self__, "password_wo_version", password_wo_version)
2061
- if self_managed is not None:
2062
- pulumi.set(__self__, "self_managed", self_managed)
2063
2057
  if split_statements is not None:
2064
2058
  pulumi.set(__self__, "split_statements", split_statements)
2065
2059
  if username is not None:
@@ -2132,14 +2126,6 @@ class SecretBackendConnectionOracle(dict):
2132
2126
  """
2133
2127
  return pulumi.get(self, "password_wo_version")
2134
2128
 
2135
- @_builtins.property
2136
- @pulumi.getter(name="selfManaged")
2137
- def self_managed(self) -> Optional[_builtins.bool]:
2138
- """
2139
- If set, allows onboarding static roles with a rootless connection configuration.
2140
- """
2141
- return pulumi.get(self, "self_managed")
2142
-
2143
2129
  @_builtins.property
2144
2130
  @pulumi.getter(name="splitStatements")
2145
2131
  def split_statements(self) -> Optional[_builtins.bool]:
@@ -6690,8 +6676,6 @@ class SecretsMountOracle(dict):
6690
6676
  suggest = "rotation_schedule"
6691
6677
  elif key == "rotationWindow":
6692
6678
  suggest = "rotation_window"
6693
- elif key == "selfManaged":
6694
- suggest = "self_managed"
6695
6679
  elif key == "splitStatements":
6696
6680
  suggest = "split_statements"
6697
6681
  elif key == "usernameTemplate":
@@ -6728,7 +6712,6 @@ class SecretsMountOracle(dict):
6728
6712
  rotation_period: Optional[_builtins.int] = None,
6729
6713
  rotation_schedule: Optional[_builtins.str] = None,
6730
6714
  rotation_window: Optional[_builtins.int] = None,
6731
- self_managed: Optional[_builtins.bool] = None,
6732
6715
  split_statements: Optional[_builtins.bool] = None,
6733
6716
  username: Optional[_builtins.str] = None,
6734
6717
  username_template: Optional[_builtins.str] = None,
@@ -6759,7 +6742,6 @@ class SecretsMountOracle(dict):
6759
6742
  :param _builtins.int rotation_window: The maximum amount of time in seconds allowed to complete
6760
6743
  a rotation when a scheduled token rotation occurs. The default rotation window is
6761
6744
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
6762
- :param _builtins.bool self_managed: If set, allows onboarding static roles with a rootless connection configuration.
6763
6745
  :param _builtins.bool split_statements: Set to true in order to split statements after semi-colons.
6764
6746
  :param _builtins.str username: The root credential username used in the connection URL
6765
6747
  :param _builtins.str username_template: Username generation template.
@@ -6799,8 +6781,6 @@ class SecretsMountOracle(dict):
6799
6781
  pulumi.set(__self__, "rotation_schedule", rotation_schedule)
6800
6782
  if rotation_window is not None:
6801
6783
  pulumi.set(__self__, "rotation_window", rotation_window)
6802
- if self_managed is not None:
6803
- pulumi.set(__self__, "self_managed", self_managed)
6804
6784
  if split_statements is not None:
6805
6785
  pulumi.set(__self__, "split_statements", split_statements)
6806
6786
  if username is not None:
@@ -6954,14 +6934,6 @@ class SecretsMountOracle(dict):
6954
6934
  """
6955
6935
  return pulumi.get(self, "rotation_window")
6956
6936
 
6957
- @_builtins.property
6958
- @pulumi.getter(name="selfManaged")
6959
- def self_managed(self) -> Optional[_builtins.bool]:
6960
- """
6961
- If set, allows onboarding static roles with a rootless connection configuration.
6962
- """
6963
- return pulumi.get(self, "self_managed")
6964
-
6965
6937
  @_builtins.property
6966
6938
  @pulumi.getter(name="splitStatements")
6967
6939
  def split_statements(self) -> Optional[_builtins.bool]:
@@ -1077,8 +1077,6 @@ class SecretBackendConnection(pulumi.CustomResource):
1077
1077
  """
1078
1078
  ## Example Usage
1079
1079
 
1080
- ### PostgreSQL Connection
1081
-
1082
1080
  ```python
1083
1081
  import pulumi
1084
1082
  import pulumi_vault as vault
@@ -1100,37 +1098,6 @@ class SecretBackendConnection(pulumi.CustomResource):
1100
1098
  })
1101
1099
  ```
1102
1100
 
1103
- ### Oracle Connection with Self-Managed Mode (Rootless)
1104
-
1105
- For Vault 1.18+ Enterprise, you can configure Oracle connections in self-managed mode,
1106
- which allows a static role to manage its own database credentials without requiring root access:
1107
-
1108
- ```python
1109
- import pulumi
1110
- import pulumi_vault as vault
1111
-
1112
- db = vault.Mount("db",
1113
- path="database",
1114
- type="database")
1115
- oracle = vault.database.SecretBackendConnection("oracle",
1116
- backend=db.path,
1117
- name="oracle",
1118
- allowed_roles=["my-role"],
1119
- oracle={
1120
- "connection_url": "{{username}}/{{password}}@//host:port/service",
1121
- "self_managed": True,
1122
- "plugin_name": "vault-plugin-database-oracle",
1123
- })
1124
- oracle_role = vault.database.SecretBackendStaticRole("oracle_role",
1125
- backend=db.path,
1126
- name="my-role",
1127
- db_name=oracle.name,
1128
- username="vault_user",
1129
- password_wo="initial-password",
1130
- password_wo_version=1,
1131
- rotation_period=3600)
1132
- ```
1133
-
1134
1101
  ## Ephemeral Attributes Reference
1135
1102
 
1136
1103
  The following write-only attributes are supported for all DBs that support username/password:
@@ -1204,8 +1171,6 @@ class SecretBackendConnection(pulumi.CustomResource):
1204
1171
  """
1205
1172
  ## Example Usage
1206
1173
 
1207
- ### PostgreSQL Connection
1208
-
1209
1174
  ```python
1210
1175
  import pulumi
1211
1176
  import pulumi_vault as vault
@@ -1227,37 +1192,6 @@ class SecretBackendConnection(pulumi.CustomResource):
1227
1192
  })
1228
1193
  ```
1229
1194
 
1230
- ### Oracle Connection with Self-Managed Mode (Rootless)
1231
-
1232
- For Vault 1.18+ Enterprise, you can configure Oracle connections in self-managed mode,
1233
- which allows a static role to manage its own database credentials without requiring root access:
1234
-
1235
- ```python
1236
- import pulumi
1237
- import pulumi_vault as vault
1238
-
1239
- db = vault.Mount("db",
1240
- path="database",
1241
- type="database")
1242
- oracle = vault.database.SecretBackendConnection("oracle",
1243
- backend=db.path,
1244
- name="oracle",
1245
- allowed_roles=["my-role"],
1246
- oracle={
1247
- "connection_url": "{{username}}/{{password}}@//host:port/service",
1248
- "self_managed": True,
1249
- "plugin_name": "vault-plugin-database-oracle",
1250
- })
1251
- oracle_role = vault.database.SecretBackendStaticRole("oracle_role",
1252
- backend=db.path,
1253
- name="my-role",
1254
- db_name=oracle.name,
1255
- username="vault_user",
1256
- password_wo="initial-password",
1257
- password_wo_version=1,
1258
- rotation_period=3600)
1259
- ```
1260
-
1261
1195
  ## Ephemeral Attributes Reference
1262
1196
 
1263
1197
  The following write-only attributes are supported for all DBs that support username/password:
@@ -26,8 +26,6 @@ class SecretBackendStaticRoleArgs:
26
26
  credential_type: Optional[pulumi.Input[_builtins.str]] = None,
27
27
  name: Optional[pulumi.Input[_builtins.str]] = None,
28
28
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
29
- password_wo: Optional[pulumi.Input[_builtins.str]] = None,
30
- password_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
31
29
  rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
32
30
  rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
33
31
  rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
@@ -45,13 +43,6 @@ class SecretBackendStaticRoleArgs:
45
43
  The value should not contain leading or trailing forward slashes.
46
44
  The `namespace` is always relative to the provider's configured namespace.
47
45
  *Available only for Vault Enterprise*.
48
- :param pulumi.Input[_builtins.str] password_wo: **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
49
- The password corresponding to the username in the database.
50
- This is a write-only field. Requires Vault 1.19+. Deprecates `self_managed_password` which was introduced in Vault 1.18.
51
- Cannot be used with `self_managed_password`.
52
- :param pulumi.Input[_builtins.int] password_wo_version: The version of the `password_wo` field.
53
- Used for tracking changes to the write-only password field. For more info see
54
- updating write-only attributes.
55
46
  :param pulumi.Input[_builtins.int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
56
47
  Mutually exclusive with `rotation_schedule`.
57
48
  :param pulumi.Input[_builtins.str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
@@ -65,7 +56,6 @@ class SecretBackendStaticRoleArgs:
65
56
  :param pulumi.Input[_builtins.str] self_managed_password: The password corresponding to the username in the database.
66
57
  Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
67
58
  select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
68
- **Deprecated**: Use `password_wo` instead. This field will be removed in a future version.
69
59
  :param pulumi.Input[_builtins.bool] skip_import_rotation: If set to true, Vault will skip the
70
60
  initial secret rotation on import. Requires Vault 1.18+ Enterprise.
71
61
  """
@@ -80,10 +70,6 @@ class SecretBackendStaticRoleArgs:
80
70
  pulumi.set(__self__, "name", name)
81
71
  if namespace is not None:
82
72
  pulumi.set(__self__, "namespace", namespace)
83
- if password_wo is not None:
84
- pulumi.set(__self__, "password_wo", password_wo)
85
- if password_wo_version is not None:
86
- pulumi.set(__self__, "password_wo_version", password_wo_version)
87
73
  if rotation_period is not None:
88
74
  pulumi.set(__self__, "rotation_period", rotation_period)
89
75
  if rotation_schedule is not None:
@@ -181,35 +167,6 @@ class SecretBackendStaticRoleArgs:
181
167
  def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
182
168
  pulumi.set(self, "namespace", value)
183
169
 
184
- @_builtins.property
185
- @pulumi.getter(name="passwordWo")
186
- def password_wo(self) -> Optional[pulumi.Input[_builtins.str]]:
187
- """
188
- **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
189
- The password corresponding to the username in the database.
190
- This is a write-only field. Requires Vault 1.19+. Deprecates `self_managed_password` which was introduced in Vault 1.18.
191
- Cannot be used with `self_managed_password`.
192
- """
193
- return pulumi.get(self, "password_wo")
194
-
195
- @password_wo.setter
196
- def password_wo(self, value: Optional[pulumi.Input[_builtins.str]]):
197
- pulumi.set(self, "password_wo", value)
198
-
199
- @_builtins.property
200
- @pulumi.getter(name="passwordWoVersion")
201
- def password_wo_version(self) -> Optional[pulumi.Input[_builtins.int]]:
202
- """
203
- The version of the `password_wo` field.
204
- Used for tracking changes to the write-only password field. For more info see
205
- updating write-only attributes.
206
- """
207
- return pulumi.get(self, "password_wo_version")
208
-
209
- @password_wo_version.setter
210
- def password_wo_version(self, value: Optional[pulumi.Input[_builtins.int]]):
211
- pulumi.set(self, "password_wo_version", value)
212
-
213
170
  @_builtins.property
214
171
  @pulumi.getter(name="rotationPeriod")
215
172
  def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
@@ -271,7 +228,6 @@ class SecretBackendStaticRoleArgs:
271
228
  The password corresponding to the username in the database.
272
229
  Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
273
230
  select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
274
- **Deprecated**: Use `password_wo` instead. This field will be removed in a future version.
275
231
  """
276
232
  return pulumi.get(self, "self_managed_password")
277
233
 
@@ -302,8 +258,6 @@ class _SecretBackendStaticRoleState:
302
258
  db_name: Optional[pulumi.Input[_builtins.str]] = None,
303
259
  name: Optional[pulumi.Input[_builtins.str]] = None,
304
260
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
305
- password_wo: Optional[pulumi.Input[_builtins.str]] = None,
306
- password_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
307
261
  rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
308
262
  rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
309
263
  rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
@@ -321,13 +275,6 @@ class _SecretBackendStaticRoleState:
321
275
  The value should not contain leading or trailing forward slashes.
322
276
  The `namespace` is always relative to the provider's configured namespace.
323
277
  *Available only for Vault Enterprise*.
324
- :param pulumi.Input[_builtins.str] password_wo: **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
325
- The password corresponding to the username in the database.
326
- This is a write-only field. Requires Vault 1.19+. Deprecates `self_managed_password` which was introduced in Vault 1.18.
327
- Cannot be used with `self_managed_password`.
328
- :param pulumi.Input[_builtins.int] password_wo_version: The version of the `password_wo` field.
329
- Used for tracking changes to the write-only password field. For more info see
330
- updating write-only attributes.
331
278
  :param pulumi.Input[_builtins.int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
332
279
  Mutually exclusive with `rotation_schedule`.
333
280
  :param pulumi.Input[_builtins.str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
@@ -341,7 +288,6 @@ class _SecretBackendStaticRoleState:
341
288
  :param pulumi.Input[_builtins.str] self_managed_password: The password corresponding to the username in the database.
342
289
  Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
343
290
  select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
344
- **Deprecated**: Use `password_wo` instead. This field will be removed in a future version.
345
291
  :param pulumi.Input[_builtins.bool] skip_import_rotation: If set to true, Vault will skip the
346
292
  initial secret rotation on import. Requires Vault 1.18+ Enterprise.
347
293
  :param pulumi.Input[_builtins.str] username: The database username that this static role corresponds to.
@@ -358,10 +304,6 @@ class _SecretBackendStaticRoleState:
358
304
  pulumi.set(__self__, "name", name)
359
305
  if namespace is not None:
360
306
  pulumi.set(__self__, "namespace", namespace)
361
- if password_wo is not None:
362
- pulumi.set(__self__, "password_wo", password_wo)
363
- if password_wo_version is not None:
364
- pulumi.set(__self__, "password_wo_version", password_wo_version)
365
307
  if rotation_period is not None:
366
308
  pulumi.set(__self__, "rotation_period", rotation_period)
367
309
  if rotation_schedule is not None:
@@ -449,35 +391,6 @@ class _SecretBackendStaticRoleState:
449
391
  def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
450
392
  pulumi.set(self, "namespace", value)
451
393
 
452
- @_builtins.property
453
- @pulumi.getter(name="passwordWo")
454
- def password_wo(self) -> Optional[pulumi.Input[_builtins.str]]:
455
- """
456
- **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
457
- The password corresponding to the username in the database.
458
- This is a write-only field. Requires Vault 1.19+. Deprecates `self_managed_password` which was introduced in Vault 1.18.
459
- Cannot be used with `self_managed_password`.
460
- """
461
- return pulumi.get(self, "password_wo")
462
-
463
- @password_wo.setter
464
- def password_wo(self, value: Optional[pulumi.Input[_builtins.str]]):
465
- pulumi.set(self, "password_wo", value)
466
-
467
- @_builtins.property
468
- @pulumi.getter(name="passwordWoVersion")
469
- def password_wo_version(self) -> Optional[pulumi.Input[_builtins.int]]:
470
- """
471
- The version of the `password_wo` field.
472
- Used for tracking changes to the write-only password field. For more info see
473
- updating write-only attributes.
474
- """
475
- return pulumi.get(self, "password_wo_version")
476
-
477
- @password_wo_version.setter
478
- def password_wo_version(self, value: Optional[pulumi.Input[_builtins.int]]):
479
- pulumi.set(self, "password_wo_version", value)
480
-
481
394
  @_builtins.property
482
395
  @pulumi.getter(name="rotationPeriod")
483
396
  def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
@@ -539,7 +452,6 @@ class _SecretBackendStaticRoleState:
539
452
  The password corresponding to the username in the database.
540
453
  Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
541
454
  select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
542
- **Deprecated**: Use `password_wo` instead. This field will be removed in a future version.
543
455
  """
544
456
  return pulumi.get(self, "self_managed_password")
545
457
 
@@ -585,8 +497,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
585
497
  db_name: Optional[pulumi.Input[_builtins.str]] = None,
586
498
  name: Optional[pulumi.Input[_builtins.str]] = None,
587
499
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
588
- password_wo: Optional[pulumi.Input[_builtins.str]] = None,
589
- password_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
590
500
  rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
591
501
  rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
592
502
  rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
@@ -633,16 +543,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
633
543
  rotation_schedule="0 0 * * SAT",
634
544
  rotation_window=172800,
635
545
  rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
636
- # configure a static role with a password (Vault 1.19+)
637
- password_role = vault.database.SecretBackendStaticRole("password_role",
638
- backend=db.path,
639
- name="my-password-role",
640
- db_name=postgres.name,
641
- username="example",
642
- password_wo="my-password",
643
- password_wo_version=1,
644
- rotation_period=3600,
645
- rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
646
546
  ```
647
547
 
648
548
  ## Import
@@ -663,13 +563,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
663
563
  The value should not contain leading or trailing forward slashes.
664
564
  The `namespace` is always relative to the provider's configured namespace.
665
565
  *Available only for Vault Enterprise*.
666
- :param pulumi.Input[_builtins.str] password_wo: **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
667
- The password corresponding to the username in the database.
668
- This is a write-only field. Requires Vault 1.19+. Deprecates `self_managed_password` which was introduced in Vault 1.18.
669
- Cannot be used with `self_managed_password`.
670
- :param pulumi.Input[_builtins.int] password_wo_version: The version of the `password_wo` field.
671
- Used for tracking changes to the write-only password field. For more info see
672
- updating write-only attributes.
673
566
  :param pulumi.Input[_builtins.int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
674
567
  Mutually exclusive with `rotation_schedule`.
675
568
  :param pulumi.Input[_builtins.str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
@@ -683,7 +576,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
683
576
  :param pulumi.Input[_builtins.str] self_managed_password: The password corresponding to the username in the database.
684
577
  Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
685
578
  select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
686
- **Deprecated**: Use `password_wo` instead. This field will be removed in a future version.
687
579
  :param pulumi.Input[_builtins.bool] skip_import_rotation: If set to true, Vault will skip the
688
580
  initial secret rotation on import. Requires Vault 1.18+ Enterprise.
689
581
  :param pulumi.Input[_builtins.str] username: The database username that this static role corresponds to.
@@ -732,16 +624,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
732
624
  rotation_schedule="0 0 * * SAT",
733
625
  rotation_window=172800,
734
626
  rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
735
- # configure a static role with a password (Vault 1.19+)
736
- password_role = vault.database.SecretBackendStaticRole("password_role",
737
- backend=db.path,
738
- name="my-password-role",
739
- db_name=postgres.name,
740
- username="example",
741
- password_wo="my-password",
742
- password_wo_version=1,
743
- rotation_period=3600,
744
- rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
745
627
  ```
746
628
 
747
629
  ## Import
@@ -773,8 +655,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
773
655
  db_name: Optional[pulumi.Input[_builtins.str]] = None,
774
656
  name: Optional[pulumi.Input[_builtins.str]] = None,
775
657
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
776
- password_wo: Optional[pulumi.Input[_builtins.str]] = None,
777
- password_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
778
658
  rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
779
659
  rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
780
660
  rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
@@ -801,8 +681,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
801
681
  __props__.__dict__["db_name"] = db_name
802
682
  __props__.__dict__["name"] = name
803
683
  __props__.__dict__["namespace"] = namespace
804
- __props__.__dict__["password_wo"] = None if password_wo is None else pulumi.Output.secret(password_wo)
805
- __props__.__dict__["password_wo_version"] = password_wo_version
806
684
  __props__.__dict__["rotation_period"] = rotation_period
807
685
  __props__.__dict__["rotation_schedule"] = rotation_schedule
808
686
  __props__.__dict__["rotation_statements"] = rotation_statements
@@ -812,7 +690,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
812
690
  if username is None and not opts.urn:
813
691
  raise TypeError("Missing required property 'username'")
814
692
  __props__.__dict__["username"] = username
815
- secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["passwordWo", "selfManagedPassword"])
693
+ secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["selfManagedPassword"])
816
694
  opts = pulumi.ResourceOptions.merge(opts, secret_opts)
817
695
  super(SecretBackendStaticRole, __self__).__init__(
818
696
  'vault:database/secretBackendStaticRole:SecretBackendStaticRole',
@@ -830,8 +708,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
830
708
  db_name: Optional[pulumi.Input[_builtins.str]] = None,
831
709
  name: Optional[pulumi.Input[_builtins.str]] = None,
832
710
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
833
- password_wo: Optional[pulumi.Input[_builtins.str]] = None,
834
- password_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
835
711
  rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
836
712
  rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
837
713
  rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
@@ -854,13 +730,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
854
730
  The value should not contain leading or trailing forward slashes.
855
731
  The `namespace` is always relative to the provider's configured namespace.
856
732
  *Available only for Vault Enterprise*.
857
- :param pulumi.Input[_builtins.str] password_wo: **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
858
- The password corresponding to the username in the database.
859
- This is a write-only field. Requires Vault 1.19+. Deprecates `self_managed_password` which was introduced in Vault 1.18.
860
- Cannot be used with `self_managed_password`.
861
- :param pulumi.Input[_builtins.int] password_wo_version: The version of the `password_wo` field.
862
- Used for tracking changes to the write-only password field. For more info see
863
- updating write-only attributes.
864
733
  :param pulumi.Input[_builtins.int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
865
734
  Mutually exclusive with `rotation_schedule`.
866
735
  :param pulumi.Input[_builtins.str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
@@ -874,7 +743,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
874
743
  :param pulumi.Input[_builtins.str] self_managed_password: The password corresponding to the username in the database.
875
744
  Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
876
745
  select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
877
- **Deprecated**: Use `password_wo` instead. This field will be removed in a future version.
878
746
  :param pulumi.Input[_builtins.bool] skip_import_rotation: If set to true, Vault will skip the
879
747
  initial secret rotation on import. Requires Vault 1.18+ Enterprise.
880
748
  :param pulumi.Input[_builtins.str] username: The database username that this static role corresponds to.
@@ -889,8 +757,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
889
757
  __props__.__dict__["db_name"] = db_name
890
758
  __props__.__dict__["name"] = name
891
759
  __props__.__dict__["namespace"] = namespace
892
- __props__.__dict__["password_wo"] = password_wo
893
- __props__.__dict__["password_wo_version"] = password_wo_version
894
760
  __props__.__dict__["rotation_period"] = rotation_period
895
761
  __props__.__dict__["rotation_schedule"] = rotation_schedule
896
762
  __props__.__dict__["rotation_statements"] = rotation_statements
@@ -948,27 +814,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
948
814
  """
949
815
  return pulumi.get(self, "namespace")
950
816
 
951
- @_builtins.property
952
- @pulumi.getter(name="passwordWo")
953
- def password_wo(self) -> pulumi.Output[Optional[_builtins.str]]:
954
- """
955
- **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
956
- The password corresponding to the username in the database.
957
- This is a write-only field. Requires Vault 1.19+. Deprecates `self_managed_password` which was introduced in Vault 1.18.
958
- Cannot be used with `self_managed_password`.
959
- """
960
- return pulumi.get(self, "password_wo")
961
-
962
- @_builtins.property
963
- @pulumi.getter(name="passwordWoVersion")
964
- def password_wo_version(self) -> pulumi.Output[Optional[_builtins.int]]:
965
- """
966
- The version of the `password_wo` field.
967
- Used for tracking changes to the write-only password field. For more info see
968
- updating write-only attributes.
969
- """
970
- return pulumi.get(self, "password_wo_version")
971
-
972
817
  @_builtins.property
973
818
  @pulumi.getter(name="rotationPeriod")
974
819
  def rotation_period(self) -> pulumi.Output[Optional[_builtins.int]]:
@@ -1014,7 +859,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
1014
859
  The password corresponding to the username in the database.
1015
860
  Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
1016
861
  select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
1017
- **Deprecated**: Use `password_wo` instead. This field will be removed in a future version.
1018
862
  """
1019
863
  return pulumi.get(self, "self_managed_password")
1020
864
 
@@ -20,13 +20,12 @@ __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
20
20
  class AuthBackendRoleArgs:
21
21
  def __init__(__self__, *,
22
22
  bound_service_account_names: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]],
23
+ bound_service_account_namespaces: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]],
23
24
  role_name: pulumi.Input[_builtins.str],
24
25
  alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
25
26
  alias_name_source: Optional[pulumi.Input[_builtins.str]] = None,
26
27
  audience: Optional[pulumi.Input[_builtins.str]] = None,
27
28
  backend: Optional[pulumi.Input[_builtins.str]] = None,
28
- bound_service_account_namespace_selector: Optional[pulumi.Input[_builtins.str]] = None,
29
- bound_service_account_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
30
29
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
31
30
  token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
32
31
  token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
@@ -40,6 +39,7 @@ class AuthBackendRoleArgs:
40
39
  """
41
40
  The set of arguments for constructing a AuthBackendRole resource.
42
41
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_names: List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*".
42
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_namespaces: List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
43
43
  :param pulumi.Input[_builtins.str] role_name: Name of the role.
44
44
  :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
45
45
  This should be a list or map containing the metadata in key value pairs.
@@ -51,8 +51,6 @@ class AuthBackendRoleArgs:
51
51
  before setting this to something other its default value. There are **important** security
52
52
  implications to be aware of.
53
53
  :param pulumi.Input[_builtins.str] backend: Unique name of the kubernetes backend to configure.
54
- :param pulumi.Input[_builtins.str] bound_service_account_namespace_selector: A label selector for Kubernetes namespaces allowed to access this role. Accepts either a JSON or YAML object. The value should be of type LabelSelector. Currently, label selectors with matchExpressions are not supported. To use label selectors, Vault must have permission to read namespaces on the Kubernetes cluster. If set with bound_service_account_namespaces, the conditions are ORed. Requires Vault v1.16+.
55
- :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_namespaces: List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
56
54
  :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
57
55
  The value should not contain leading or trailing forward slashes.
58
56
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -68,6 +66,7 @@ class AuthBackendRoleArgs:
68
66
  :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
69
67
  """
70
68
  pulumi.set(__self__, "bound_service_account_names", bound_service_account_names)
69
+ pulumi.set(__self__, "bound_service_account_namespaces", bound_service_account_namespaces)
71
70
  pulumi.set(__self__, "role_name", role_name)
72
71
  if alias_metadata is not None:
73
72
  pulumi.set(__self__, "alias_metadata", alias_metadata)
@@ -77,10 +76,6 @@ class AuthBackendRoleArgs:
77
76
  pulumi.set(__self__, "audience", audience)
78
77
  if backend is not None:
79
78
  pulumi.set(__self__, "backend", backend)
80
- if bound_service_account_namespace_selector is not None:
81
- pulumi.set(__self__, "bound_service_account_namespace_selector", bound_service_account_namespace_selector)
82
- if bound_service_account_namespaces is not None:
83
- pulumi.set(__self__, "bound_service_account_namespaces", bound_service_account_namespaces)
84
79
  if namespace is not None:
85
80
  pulumi.set(__self__, "namespace", namespace)
86
81
  if token_bound_cidrs is not None:
@@ -114,6 +109,18 @@ class AuthBackendRoleArgs:
114
109
  def bound_service_account_names(self, value: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]):
115
110
  pulumi.set(self, "bound_service_account_names", value)
116
111
 
112
+ @_builtins.property
113
+ @pulumi.getter(name="boundServiceAccountNamespaces")
114
+ def bound_service_account_namespaces(self) -> pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]:
115
+ """
116
+ List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
117
+ """
118
+ return pulumi.get(self, "bound_service_account_namespaces")
119
+
120
+ @bound_service_account_namespaces.setter
121
+ def bound_service_account_namespaces(self, value: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]):
122
+ pulumi.set(self, "bound_service_account_namespaces", value)
123
+
117
124
  @_builtins.property
118
125
  @pulumi.getter(name="roleName")
119
126
  def role_name(self) -> pulumi.Input[_builtins.str]:
@@ -180,30 +187,6 @@ class AuthBackendRoleArgs:
180
187
  def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
181
188
  pulumi.set(self, "backend", value)
182
189
 
183
- @_builtins.property
184
- @pulumi.getter(name="boundServiceAccountNamespaceSelector")
185
- def bound_service_account_namespace_selector(self) -> Optional[pulumi.Input[_builtins.str]]:
186
- """
187
- A label selector for Kubernetes namespaces allowed to access this role. Accepts either a JSON or YAML object. The value should be of type LabelSelector. Currently, label selectors with matchExpressions are not supported. To use label selectors, Vault must have permission to read namespaces on the Kubernetes cluster. If set with bound_service_account_namespaces, the conditions are ORed. Requires Vault v1.16+.
188
- """
189
- return pulumi.get(self, "bound_service_account_namespace_selector")
190
-
191
- @bound_service_account_namespace_selector.setter
192
- def bound_service_account_namespace_selector(self, value: Optional[pulumi.Input[_builtins.str]]):
193
- pulumi.set(self, "bound_service_account_namespace_selector", value)
194
-
195
- @_builtins.property
196
- @pulumi.getter(name="boundServiceAccountNamespaces")
197
- def bound_service_account_namespaces(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
198
- """
199
- List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
200
- """
201
- return pulumi.get(self, "bound_service_account_namespaces")
202
-
203
- @bound_service_account_namespaces.setter
204
- def bound_service_account_namespaces(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
205
- pulumi.set(self, "bound_service_account_namespaces", value)
206
-
207
190
  @_builtins.property
208
191
  @pulumi.getter
209
192
  def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -336,7 +319,6 @@ class _AuthBackendRoleState:
336
319
  audience: Optional[pulumi.Input[_builtins.str]] = None,
337
320
  backend: Optional[pulumi.Input[_builtins.str]] = None,
338
321
  bound_service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
339
- bound_service_account_namespace_selector: Optional[pulumi.Input[_builtins.str]] = None,
340
322
  bound_service_account_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
341
323
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
342
324
  role_name: Optional[pulumi.Input[_builtins.str]] = None,
@@ -362,7 +344,6 @@ class _AuthBackendRoleState:
362
344
  implications to be aware of.
363
345
  :param pulumi.Input[_builtins.str] backend: Unique name of the kubernetes backend to configure.
364
346
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_names: List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*".
365
- :param pulumi.Input[_builtins.str] bound_service_account_namespace_selector: A label selector for Kubernetes namespaces allowed to access this role. Accepts either a JSON or YAML object. The value should be of type LabelSelector. Currently, label selectors with matchExpressions are not supported. To use label selectors, Vault must have permission to read namespaces on the Kubernetes cluster. If set with bound_service_account_namespaces, the conditions are ORed. Requires Vault v1.16+.
366
347
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_namespaces: List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
367
348
  :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
368
349
  The value should not contain leading or trailing forward slashes.
@@ -389,8 +370,6 @@ class _AuthBackendRoleState:
389
370
  pulumi.set(__self__, "backend", backend)
390
371
  if bound_service_account_names is not None:
391
372
  pulumi.set(__self__, "bound_service_account_names", bound_service_account_names)
392
- if bound_service_account_namespace_selector is not None:
393
- pulumi.set(__self__, "bound_service_account_namespace_selector", bound_service_account_namespace_selector)
394
373
  if bound_service_account_namespaces is not None:
395
374
  pulumi.set(__self__, "bound_service_account_namespaces", bound_service_account_namespaces)
396
375
  if namespace is not None:
@@ -482,18 +461,6 @@ class _AuthBackendRoleState:
482
461
  def bound_service_account_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
483
462
  pulumi.set(self, "bound_service_account_names", value)
484
463
 
485
- @_builtins.property
486
- @pulumi.getter(name="boundServiceAccountNamespaceSelector")
487
- def bound_service_account_namespace_selector(self) -> Optional[pulumi.Input[_builtins.str]]:
488
- """
489
- A label selector for Kubernetes namespaces allowed to access this role. Accepts either a JSON or YAML object. The value should be of type LabelSelector. Currently, label selectors with matchExpressions are not supported. To use label selectors, Vault must have permission to read namespaces on the Kubernetes cluster. If set with bound_service_account_namespaces, the conditions are ORed. Requires Vault v1.16+.
490
- """
491
- return pulumi.get(self, "bound_service_account_namespace_selector")
492
-
493
- @bound_service_account_namespace_selector.setter
494
- def bound_service_account_namespace_selector(self, value: Optional[pulumi.Input[_builtins.str]]):
495
- pulumi.set(self, "bound_service_account_namespace_selector", value)
496
-
497
464
  @_builtins.property
498
465
  @pulumi.getter(name="boundServiceAccountNamespaces")
499
466
  def bound_service_account_namespaces(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
@@ -653,7 +620,6 @@ class AuthBackendRole(pulumi.CustomResource):
653
620
  audience: Optional[pulumi.Input[_builtins.str]] = None,
654
621
  backend: Optional[pulumi.Input[_builtins.str]] = None,
655
622
  bound_service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
656
- bound_service_account_namespace_selector: Optional[pulumi.Input[_builtins.str]] = None,
657
623
  bound_service_account_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
658
624
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
659
625
  role_name: Optional[pulumi.Input[_builtins.str]] = None,
@@ -714,7 +680,6 @@ class AuthBackendRole(pulumi.CustomResource):
714
680
  implications to be aware of.
715
681
  :param pulumi.Input[_builtins.str] backend: Unique name of the kubernetes backend to configure.
716
682
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_names: List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*".
717
- :param pulumi.Input[_builtins.str] bound_service_account_namespace_selector: A label selector for Kubernetes namespaces allowed to access this role. Accepts either a JSON or YAML object. The value should be of type LabelSelector. Currently, label selectors with matchExpressions are not supported. To use label selectors, Vault must have permission to read namespaces on the Kubernetes cluster. If set with bound_service_account_namespaces, the conditions are ORed. Requires Vault v1.16+.
718
683
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_namespaces: List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
719
684
  :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
720
685
  The value should not contain leading or trailing forward slashes.
@@ -791,7 +756,6 @@ class AuthBackendRole(pulumi.CustomResource):
791
756
  audience: Optional[pulumi.Input[_builtins.str]] = None,
792
757
  backend: Optional[pulumi.Input[_builtins.str]] = None,
793
758
  bound_service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
794
- bound_service_account_namespace_selector: Optional[pulumi.Input[_builtins.str]] = None,
795
759
  bound_service_account_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
796
760
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
797
761
  role_name: Optional[pulumi.Input[_builtins.str]] = None,
@@ -820,7 +784,8 @@ class AuthBackendRole(pulumi.CustomResource):
820
784
  if bound_service_account_names is None and not opts.urn:
821
785
  raise TypeError("Missing required property 'bound_service_account_names'")
822
786
  __props__.__dict__["bound_service_account_names"] = bound_service_account_names
823
- __props__.__dict__["bound_service_account_namespace_selector"] = bound_service_account_namespace_selector
787
+ if bound_service_account_namespaces is None and not opts.urn:
788
+ raise TypeError("Missing required property 'bound_service_account_namespaces'")
824
789
  __props__.__dict__["bound_service_account_namespaces"] = bound_service_account_namespaces
825
790
  __props__.__dict__["namespace"] = namespace
826
791
  if role_name is None and not opts.urn:
@@ -850,7 +815,6 @@ class AuthBackendRole(pulumi.CustomResource):
850
815
  audience: Optional[pulumi.Input[_builtins.str]] = None,
851
816
  backend: Optional[pulumi.Input[_builtins.str]] = None,
852
817
  bound_service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
853
- bound_service_account_namespace_selector: Optional[pulumi.Input[_builtins.str]] = None,
854
818
  bound_service_account_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
855
819
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
856
820
  role_name: Optional[pulumi.Input[_builtins.str]] = None,
@@ -881,7 +845,6 @@ class AuthBackendRole(pulumi.CustomResource):
881
845
  implications to be aware of.
882
846
  :param pulumi.Input[_builtins.str] backend: Unique name of the kubernetes backend to configure.
883
847
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_names: List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*".
884
- :param pulumi.Input[_builtins.str] bound_service_account_namespace_selector: A label selector for Kubernetes namespaces allowed to access this role. Accepts either a JSON or YAML object. The value should be of type LabelSelector. Currently, label selectors with matchExpressions are not supported. To use label selectors, Vault must have permission to read namespaces on the Kubernetes cluster. If set with bound_service_account_namespaces, the conditions are ORed. Requires Vault v1.16+.
885
848
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_namespaces: List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
886
849
  :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
887
850
  The value should not contain leading or trailing forward slashes.
@@ -907,7 +870,6 @@ class AuthBackendRole(pulumi.CustomResource):
907
870
  __props__.__dict__["audience"] = audience
908
871
  __props__.__dict__["backend"] = backend
909
872
  __props__.__dict__["bound_service_account_names"] = bound_service_account_names
910
- __props__.__dict__["bound_service_account_namespace_selector"] = bound_service_account_namespace_selector
911
873
  __props__.__dict__["bound_service_account_namespaces"] = bound_service_account_namespaces
912
874
  __props__.__dict__["namespace"] = namespace
913
875
  __props__.__dict__["role_name"] = role_name
@@ -968,17 +930,9 @@ class AuthBackendRole(pulumi.CustomResource):
968
930
  """
969
931
  return pulumi.get(self, "bound_service_account_names")
970
932
 
971
- @_builtins.property
972
- @pulumi.getter(name="boundServiceAccountNamespaceSelector")
973
- def bound_service_account_namespace_selector(self) -> pulumi.Output[Optional[_builtins.str]]:
974
- """
975
- A label selector for Kubernetes namespaces allowed to access this role. Accepts either a JSON or YAML object. The value should be of type LabelSelector. Currently, label selectors with matchExpressions are not supported. To use label selectors, Vault must have permission to read namespaces on the Kubernetes cluster. If set with bound_service_account_namespaces, the conditions are ORed. Requires Vault v1.16+.
976
- """
977
- return pulumi.get(self, "bound_service_account_namespace_selector")
978
-
979
933
  @_builtins.property
980
934
  @pulumi.getter(name="boundServiceAccountNamespaces")
981
- def bound_service_account_namespaces(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
935
+ def bound_service_account_namespaces(self) -> pulumi.Output[Sequence[_builtins.str]]:
982
936
  """
983
937
  List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
984
938
  """
@@ -26,7 +26,7 @@ class GetAuthBackendRoleResult:
26
26
  """
27
27
  A collection of values returned by getAuthBackendRole.
28
28
  """
29
- def __init__(__self__, alias_metadata=None, alias_name_source=None, audience=None, backend=None, bound_service_account_names=None, bound_service_account_namespace_selector=None, bound_service_account_namespaces=None, id=None, namespace=None, role_name=None, token_bound_cidrs=None, token_explicit_max_ttl=None, token_max_ttl=None, token_no_default_policy=None, token_num_uses=None, token_period=None, token_policies=None, token_ttl=None, token_type=None):
29
+ def __init__(__self__, alias_metadata=None, alias_name_source=None, audience=None, backend=None, bound_service_account_names=None, bound_service_account_namespaces=None, id=None, namespace=None, role_name=None, token_bound_cidrs=None, token_explicit_max_ttl=None, token_max_ttl=None, token_no_default_policy=None, token_num_uses=None, token_period=None, token_policies=None, token_ttl=None, token_type=None):
30
30
  if alias_metadata and not isinstance(alias_metadata, dict):
31
31
  raise TypeError("Expected argument 'alias_metadata' to be a dict")
32
32
  pulumi.set(__self__, "alias_metadata", alias_metadata)
@@ -42,9 +42,6 @@ class GetAuthBackendRoleResult:
42
42
  if bound_service_account_names and not isinstance(bound_service_account_names, list):
43
43
  raise TypeError("Expected argument 'bound_service_account_names' to be a list")
44
44
  pulumi.set(__self__, "bound_service_account_names", bound_service_account_names)
45
- if bound_service_account_namespace_selector and not isinstance(bound_service_account_namespace_selector, str):
46
- raise TypeError("Expected argument 'bound_service_account_namespace_selector' to be a str")
47
- pulumi.set(__self__, "bound_service_account_namespace_selector", bound_service_account_namespace_selector)
48
45
  if bound_service_account_namespaces and not isinstance(bound_service_account_namespaces, list):
49
46
  raise TypeError("Expected argument 'bound_service_account_namespaces' to be a list")
50
47
  pulumi.set(__self__, "bound_service_account_namespaces", bound_service_account_namespaces)
@@ -119,14 +116,6 @@ class GetAuthBackendRoleResult:
119
116
  """
120
117
  return pulumi.get(self, "bound_service_account_names")
121
118
 
122
- @_builtins.property
123
- @pulumi.getter(name="boundServiceAccountNamespaceSelector")
124
- def bound_service_account_namespace_selector(self) -> _builtins.str:
125
- """
126
- A label selector for Kubernetes namespaces allowed to access this role. Accepts either a JSON or YAML object. The value should be of type LabelSelector. Currently, label selectors with matchExpressions are not supported. To use label selectors, Vault must have permission to read namespaces on the Kubernetes cluster. If set with bound_service_account_namespaces, the conditions are ORed. Requires Vault v1.16+.
127
- """
128
- return pulumi.get(self, "bound_service_account_namespace_selector")
129
-
130
119
  @_builtins.property
131
120
  @pulumi.getter(name="boundServiceAccountNamespaces")
132
121
  def bound_service_account_namespaces(self) -> Sequence[_builtins.str]:
@@ -255,7 +244,6 @@ class AwaitableGetAuthBackendRoleResult(GetAuthBackendRoleResult):
255
244
  audience=self.audience,
256
245
  backend=self.backend,
257
246
  bound_service_account_names=self.bound_service_account_names,
258
- bound_service_account_namespace_selector=self.bound_service_account_namespace_selector,
259
247
  bound_service_account_namespaces=self.bound_service_account_namespaces,
260
248
  id=self.id,
261
249
  namespace=self.namespace,
@@ -363,7 +351,6 @@ def get_auth_backend_role(alias_metadata: Optional[Mapping[str, _builtins.str]]
363
351
  audience=pulumi.get(__ret__, 'audience'),
364
352
  backend=pulumi.get(__ret__, 'backend'),
365
353
  bound_service_account_names=pulumi.get(__ret__, 'bound_service_account_names'),
366
- bound_service_account_namespace_selector=pulumi.get(__ret__, 'bound_service_account_namespace_selector'),
367
354
  bound_service_account_namespaces=pulumi.get(__ret__, 'bound_service_account_namespaces'),
368
355
  id=pulumi.get(__ret__, 'id'),
369
356
  namespace=pulumi.get(__ret__, 'namespace'),
@@ -468,7 +455,6 @@ def get_auth_backend_role_output(alias_metadata: Optional[pulumi.Input[Optional[
468
455
  audience=pulumi.get(__response__, 'audience'),
469
456
  backend=pulumi.get(__response__, 'backend'),
470
457
  bound_service_account_names=pulumi.get(__response__, 'bound_service_account_names'),
471
- bound_service_account_namespace_selector=pulumi.get(__response__, 'bound_service_account_namespace_selector'),
472
458
  bound_service_account_namespaces=pulumi.get(__response__, 'bound_service_account_namespaces'),
473
459
  id=pulumi.get(__response__, 'id'),
474
460
  namespace=pulumi.get(__response__, 'namespace'),
@@ -1,5 +1,5 @@
1
1
  {
2
2
  "resource": true,
3
3
  "name": "vault",
4
- "version": "7.6.0"
4
+ "version": "7.6.0-alpha.1764138710"
5
5
  }
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.4
2
2
  Name: pulumi_vault
3
- Version: 7.6.0
3
+ Version: 7.6.0a1764138710
4
4
  Summary: A Pulumi package for creating and managing HashiCorp Vault cloud resources.
5
5
  License: Apache-2.0
6
6
  Project-URL: Homepage, https://pulumi.io
@@ -28,7 +28,7 @@ pulumi_vault/plugin.py,sha256=57QZXnzP9lPAU0TbErKMCaLggsm9MehQm9hjVgy36_k,25233
28
28
  pulumi_vault/plugin_pinned_version.py,sha256=w3YbjWKRyKY_7Ufc45n7nIAhVxpuj352jqykNlzmk4Q,11340
29
29
  pulumi_vault/policy.py,sha256=eOofckCLS7K3YRGh3GElW5jpXz_oK76xny4Fk5VrsR0,11666
30
30
  pulumi_vault/provider.py,sha256=0rno_jWm-8NzVdJYUdgvtlhL5R15IjrWJxlcclfPc0c,44944
31
- pulumi_vault/pulumi-plugin.json,sha256=kAWcFpZuJltcbIqRfOafG0BL3bSRtSTBZlZdn6KJ5PI,64
31
+ pulumi_vault/pulumi-plugin.json,sha256=Kf6NGMP1zM1fOxJsGxA-C6Ok7jFekvuXW3fw4W1mYvg,81
32
32
  pulumi_vault/py.typed,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
33
33
  pulumi_vault/quota_lease_count.py,sha256=CoqfUnFAx956hEU4610qCLLhfzYcB5Qey0Jfy3hkVwA,26157
34
34
  pulumi_vault/quota_rate_limit.py,sha256=tI72HsW0lOMEMMHLyr3EQhW8d6F-FfgsEQyXGH5ebjU,43077
@@ -82,11 +82,11 @@ pulumi_vault/consul/__init__.py,sha256=rvV594Qo7hp6Ysz7aaxgrOVw1c6LlliyrD8nrCoKE
82
82
  pulumi_vault/consul/secret_backend.py,sha256=qKboTfen7iw4PB46LMe_jH_C8TxLOztDRTsE0wKZg28,79364
83
83
  pulumi_vault/consul/secret_backend_role.py,sha256=42QN0s2omlBnfwOiPV4EmNOlpOCRlf_vb_Cyk63HmCg,43973
84
84
  pulumi_vault/database/__init__.py,sha256=IKf2lsiEPGWbulcje7pAgpeQqZ3kElNCrP3eDced97M,472
85
- pulumi_vault/database/_inputs.py,sha256=HdRB9jqu-KtrvYdqR0xPBxrQoEkFeh-E-LYg-TrQNm8,553427
86
- pulumi_vault/database/outputs.py,sha256=Eh5Us4WpLWRX8S2smxdLD4cekUHfW10svD0H3Oa_IS4,383744
87
- pulumi_vault/database/secret_backend_connection.py,sha256=vUfjrLbghJh0YXJec0ltqsSb_8Hkp9TyfV_h5GhPQok,95733
85
+ pulumi_vault/database/_inputs.py,sha256=ysrNEE-wfw_8R0aHl9OK09NNmgC99NGWfQC8aasyMkI,551551
86
+ pulumi_vault/database/outputs.py,sha256=BA-j4K5X2FcglxtV1TcOp59wGTVtjCoNUf-b8FoDC8o,382460
87
+ pulumi_vault/database/secret_backend_connection.py,sha256=-lETXtUXeiz1vmwG7glaFHi7v4iR8ghIwRHM9dwYchQ,93381
88
88
  pulumi_vault/database/secret_backend_role.py,sha256=Sm4PtpIA3m0nfUtfIEAGjORXZamAQsEpMaPkNSPNr8U,39232
89
- pulumi_vault/database/secret_backend_static_role.py,sha256=DfDTxGN341aV3nNRTuzW9U-xfqpZvU_E4JGwLke6KkY,53995
89
+ pulumi_vault/database/secret_backend_static_role.py,sha256=nB2EZ39_M3Z3KOhnr4tXww92qlt2g9hjPNKbTDktz3Q,44519
90
90
  pulumi_vault/database/secrets_mount.py,sha256=WAJEOlfp0dB2SZxh1GkTGXGMImweQxS42O3bdboPlIQ,122955
91
91
  pulumi_vault/gcp/__init__.py,sha256=FEwIPfzcZ5RqQYSD27FtChXzHEMQfcnhJbDvOPlWSAE,563
92
92
  pulumi_vault/gcp/_inputs.py,sha256=OLgraky8XbCZfbPIjQF6Q7G4Gglag_AIOKKZD97VsZk,20330
@@ -147,9 +147,9 @@ pulumi_vault/kmip/secret_role.py,sha256=hok_eaqx_Ws4l52mYY--V5N063fyKtSmWpmktK-v
147
147
  pulumi_vault/kmip/secret_scope.py,sha256=Di7loWyXMtxuccPWb0R0Hqw7lVuegnCTVrXXdlQTj6g,15680
148
148
  pulumi_vault/kubernetes/__init__.py,sha256=60lqFtbyb-uWFYGPVvTM7wfEx5nF0Pkc58Hw0ORuusA,530
149
149
  pulumi_vault/kubernetes/auth_backend_config.py,sha256=NCjEhqwmk-_BpQKGpMxcCaz_EQGD1BoR29Tm1D8fhuI,36743
150
- pulumi_vault/kubernetes/auth_backend_role.py,sha256=Zr0WXb4egCTXNTuCK6IWixiJk1fP4tEhkfJde0Z_6oU,59288
150
+ pulumi_vault/kubernetes/auth_backend_role.py,sha256=1qv5SjaF6csyW2nmUc_bg1oIkGmDJwWQsc8yJio2MIc,53659
151
151
  pulumi_vault/kubernetes/get_auth_backend_config.py,sha256=sOR4umTGQeNeuIVPPSFe6vAaMjvqeJu47FQd1XR123c,16139
152
- pulumi_vault/kubernetes/get_auth_backend_role.py,sha256=rX64MY1AW0fuifnl2B7o0Vw-gE5DvUosDckzDydO1l0,27233
152
+ pulumi_vault/kubernetes/get_auth_backend_role.py,sha256=G0k8ovffHFAGR1IlcwffnceFiCf6llEOIftVBY9yxvE,25833
153
153
  pulumi_vault/kubernetes/get_service_account_token.py,sha256=KfOe5q2QjffFkxxqqzOVCSmINtC5bQ7gvhN9bYx2e4M,15885
154
154
  pulumi_vault/kubernetes/secret_backend.py,sha256=Hgo1KtRKKP9G_08xmqquFmIQVmdHc1LFJmkr43QyxC8,72817
155
155
  pulumi_vault/kubernetes/secret_backend_role.py,sha256=GZhUBA0uT74tOw2c79b-SoaX30hlxzgLxQKaGiQcpdk,58361
@@ -268,7 +268,7 @@ pulumi_vault/transit/get_sign.py,sha256=zE2W22UeFyoNOOOcL4IACj7Vy_2xSdMW_TXhbJR4
268
268
  pulumi_vault/transit/get_verify.py,sha256=MJyNdouCwsAfluPQ7YeGCNkj0OJUB1hVOWAmkodD6fY,17170
269
269
  pulumi_vault/transit/secret_backend_key.py,sha256=4F_MJXEBzVsNY22HzSp79mPl0SLIVPCknk-D9klcW5A,68515
270
270
  pulumi_vault/transit/secret_cache_config.py,sha256=v5enplOZynVxCUCPaav5df8d9zK2vi07C8F9SAQ73aA,13238
271
- pulumi_vault-7.6.0.dist-info/METADATA,sha256=dLWMBlPT8iV1GlEoIulAAa_S5qAeVTIN34Ft-ocJoPI,4915
272
- pulumi_vault-7.6.0.dist-info/WHEEL,sha256=_zCd3N1l69ArxyTb8rzEoP9TpbYXkqRFSNOD5OuxnTs,91
273
- pulumi_vault-7.6.0.dist-info/top_level.txt,sha256=J7lAGvfexHc6T1EpDBGNKF0SXWURpmUhyzi9Nr5I61w,13
274
- pulumi_vault-7.6.0.dist-info/RECORD,,
271
+ pulumi_vault-7.6.0a1764138710.dist-info/METADATA,sha256=Iaynup5cksvYggwsQvRYHcj16HijvKnQ8MTO3AG0rak,4926
272
+ pulumi_vault-7.6.0a1764138710.dist-info/WHEEL,sha256=_zCd3N1l69ArxyTb8rzEoP9TpbYXkqRFSNOD5OuxnTs,91
273
+ pulumi_vault-7.6.0a1764138710.dist-info/top_level.txt,sha256=J7lAGvfexHc6T1EpDBGNKF0SXWURpmUhyzi9Nr5I61w,13
274
+ pulumi_vault-7.6.0a1764138710.dist-info/RECORD,,