pulumi-vault 7.6.0__tar.gz → 7.6.0a1764138710__tar.gz

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (279) hide show
  1. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/PKG-INFO +1 -1
  2. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/database/_inputs.py +0 -40
  3. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/database/outputs.py +0 -28
  4. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/database/secret_backend_connection.py +0 -66
  5. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/database/secret_backend_static_role.py +1 -157
  6. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kubernetes/auth_backend_role.py +18 -64
  7. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kubernetes/get_auth_backend_role.py +1 -15
  8. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pulumi-plugin.json +1 -1
  9. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault.egg-info/PKG-INFO +1 -1
  10. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pyproject.toml +1 -1
  11. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/README.md +0 -0
  12. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/__init__.py +0 -0
  13. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/_inputs.py +0 -0
  14. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/_utilities.py +0 -0
  15. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ad/__init__.py +0 -0
  16. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ad/get_access_credentials.py +0 -0
  17. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ad/secret_backend.py +0 -0
  18. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ad/secret_library.py +0 -0
  19. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ad/secret_role.py +0 -0
  20. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/alicloud/__init__.py +0 -0
  21. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/alicloud/auth_backend_role.py +0 -0
  22. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/approle/__init__.py +0 -0
  23. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/approle/auth_backend_login.py +0 -0
  24. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/approle/auth_backend_role.py +0 -0
  25. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/approle/auth_backend_role_secret_id.py +0 -0
  26. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/approle/get_auth_backend_role_id.py +0 -0
  27. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/audit.py +0 -0
  28. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/audit_request_header.py +0 -0
  29. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/auth_backend.py +0 -0
  30. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/aws/__init__.py +0 -0
  31. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/aws/auth_backend_cert.py +0 -0
  32. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/aws/auth_backend_client.py +0 -0
  33. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/aws/auth_backend_config_identity.py +0 -0
  34. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -0
  35. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/aws/auth_backend_login.py +0 -0
  36. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/aws/auth_backend_role.py +0 -0
  37. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/aws/auth_backend_role_tag.py +0 -0
  38. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -0
  39. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/aws/auth_backend_sts_role.py +0 -0
  40. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/aws/get_access_credentials.py +0 -0
  41. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/aws/get_static_access_credentials.py +0 -0
  42. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/aws/secret_backend.py +0 -0
  43. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/aws/secret_backend_role.py +0 -0
  44. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/aws/secret_backend_static_role.py +0 -0
  45. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/azure/__init__.py +0 -0
  46. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/azure/_inputs.py +0 -0
  47. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/azure/auth_backend_config.py +0 -0
  48. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/azure/auth_backend_role.py +0 -0
  49. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/azure/backend.py +0 -0
  50. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/azure/backend_role.py +0 -0
  51. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/azure/get_access_credentials.py +0 -0
  52. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/azure/outputs.py +0 -0
  53. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/cert_auth_backend_role.py +0 -0
  54. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/config/__init__.py +0 -0
  55. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/config/__init__.pyi +0 -0
  56. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/config/_inputs.py +0 -0
  57. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/config/outputs.py +0 -0
  58. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/config/ui_custom_message.py +0 -0
  59. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/config/vars.py +0 -0
  60. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/consul/__init__.py +0 -0
  61. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/consul/secret_backend.py +0 -0
  62. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/consul/secret_backend_role.py +0 -0
  63. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/database/__init__.py +0 -0
  64. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/database/secret_backend_role.py +0 -0
  65. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/database/secrets_mount.py +0 -0
  66. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/egp_policy.py +0 -0
  67. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/gcp/__init__.py +0 -0
  68. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/gcp/_inputs.py +0 -0
  69. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/gcp/auth_backend.py +0 -0
  70. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/gcp/auth_backend_role.py +0 -0
  71. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/gcp/get_auth_backend_role.py +0 -0
  72. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/gcp/outputs.py +0 -0
  73. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/gcp/secret_backend.py +0 -0
  74. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/gcp/secret_impersonated_account.py +0 -0
  75. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/gcp/secret_roleset.py +0 -0
  76. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/gcp/secret_static_account.py +0 -0
  77. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/generic/__init__.py +0 -0
  78. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/generic/endpoint.py +0 -0
  79. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/generic/get_secret.py +0 -0
  80. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/generic/secret.py +0 -0
  81. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/get_auth_backend.py +0 -0
  82. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/get_auth_backends.py +0 -0
  83. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/get_namespace.py +0 -0
  84. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/get_namespaces.py +0 -0
  85. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/get_nomad_access_token.py +0 -0
  86. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/get_policy_document.py +0 -0
  87. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/get_raft_autopilot_state.py +0 -0
  88. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/github/__init__.py +0 -0
  89. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/github/_inputs.py +0 -0
  90. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/github/auth_backend.py +0 -0
  91. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/github/outputs.py +0 -0
  92. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/github/team.py +0 -0
  93. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/github/user.py +0 -0
  94. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/__init__.py +0 -0
  95. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/entity.py +0 -0
  96. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/entity_alias.py +0 -0
  97. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/entity_policies.py +0 -0
  98. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/get_entity.py +0 -0
  99. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/get_group.py +0 -0
  100. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/get_oidc_client_creds.py +0 -0
  101. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/get_oidc_openid_config.py +0 -0
  102. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/get_oidc_public_keys.py +0 -0
  103. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/group.py +0 -0
  104. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/group_alias.py +0 -0
  105. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/group_member_entity_ids.py +0 -0
  106. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/group_member_group_ids.py +0 -0
  107. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/group_policies.py +0 -0
  108. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/mfa_duo.py +0 -0
  109. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/mfa_login_enforcement.py +0 -0
  110. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/mfa_okta.py +0 -0
  111. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/mfa_pingid.py +0 -0
  112. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/mfa_totp.py +0 -0
  113. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/oidc.py +0 -0
  114. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/oidc_assignment.py +0 -0
  115. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/oidc_client.py +0 -0
  116. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/oidc_key.py +0 -0
  117. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -0
  118. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/oidc_provider.py +0 -0
  119. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/oidc_role.py +0 -0
  120. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/oidc_scope.py +0 -0
  121. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/outputs.py +0 -0
  122. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/jwt/__init__.py +0 -0
  123. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/jwt/_inputs.py +0 -0
  124. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/jwt/auth_backend.py +0 -0
  125. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/jwt/auth_backend_role.py +0 -0
  126. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/jwt/outputs.py +0 -0
  127. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kmip/__init__.py +0 -0
  128. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kmip/secret_backend.py +0 -0
  129. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kmip/secret_role.py +0 -0
  130. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kmip/secret_scope.py +0 -0
  131. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kubernetes/__init__.py +0 -0
  132. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kubernetes/auth_backend_config.py +0 -0
  133. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kubernetes/get_auth_backend_config.py +0 -0
  134. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kubernetes/get_service_account_token.py +0 -0
  135. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kubernetes/secret_backend.py +0 -0
  136. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kubernetes/secret_backend_role.py +0 -0
  137. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kv/__init__.py +0 -0
  138. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kv/_inputs.py +0 -0
  139. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kv/get_secret.py +0 -0
  140. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kv/get_secret_subkeys_v2.py +0 -0
  141. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kv/get_secret_v2.py +0 -0
  142. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kv/get_secrets_list.py +0 -0
  143. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kv/get_secrets_list_v2.py +0 -0
  144. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kv/outputs.py +0 -0
  145. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kv/secret.py +0 -0
  146. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kv/secret_backend_v2.py +0 -0
  147. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kv/secret_v2.py +0 -0
  148. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ldap/__init__.py +0 -0
  149. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ldap/_inputs.py +0 -0
  150. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ldap/auth_backend.py +0 -0
  151. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ldap/auth_backend_group.py +0 -0
  152. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ldap/auth_backend_user.py +0 -0
  153. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ldap/get_dynamic_credentials.py +0 -0
  154. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ldap/get_static_credentials.py +0 -0
  155. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ldap/outputs.py +0 -0
  156. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ldap/secret_backend.py +0 -0
  157. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -0
  158. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ldap/secret_backend_library_set.py +0 -0
  159. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ldap/secret_backend_static_role.py +0 -0
  160. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/managed/__init__.py +0 -0
  161. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/managed/_inputs.py +0 -0
  162. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/managed/keys.py +0 -0
  163. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/managed/outputs.py +0 -0
  164. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/mfa_duo.py +0 -0
  165. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/mfa_okta.py +0 -0
  166. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/mfa_pingid.py +0 -0
  167. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/mfa_totp.py +0 -0
  168. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/mongodbatlas/__init__.py +0 -0
  169. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/mongodbatlas/secret_backend.py +0 -0
  170. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/mongodbatlas/secret_role.py +0 -0
  171. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/mount.py +0 -0
  172. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/namespace.py +0 -0
  173. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/nomad_secret_backend.py +0 -0
  174. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/nomad_secret_role.py +0 -0
  175. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/oci_auth_backend.py +0 -0
  176. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/oci_auth_backend_role.py +0 -0
  177. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/okta/__init__.py +0 -0
  178. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/okta/_inputs.py +0 -0
  179. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/okta/auth_backend.py +0 -0
  180. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/okta/auth_backend_group.py +0 -0
  181. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/okta/auth_backend_user.py +0 -0
  182. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/okta/outputs.py +0 -0
  183. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/outputs.py +0 -0
  184. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/__init__.py +0 -0
  185. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/_inputs.py +0 -0
  186. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/backend_acme_eab.py +0 -0
  187. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/backend_config_acme.py +0 -0
  188. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/backend_config_auto_tidy.py +0 -0
  189. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/backend_config_cluster.py +0 -0
  190. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/backend_config_cmpv2.py +0 -0
  191. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/backend_config_est.py +0 -0
  192. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/backend_config_scep.py +0 -0
  193. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/get_backend_cert_metadata.py +0 -0
  194. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/get_backend_config_cmpv2.py +0 -0
  195. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/get_backend_config_est.py +0 -0
  196. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/get_backend_config_scep.py +0 -0
  197. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/get_backend_issuer.py +0 -0
  198. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/get_backend_issuers.py +0 -0
  199. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/get_backend_key.py +0 -0
  200. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/get_backend_keys.py +0 -0
  201. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/outputs.py +0 -0
  202. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/secret_backend_cert.py +0 -0
  203. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -0
  204. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -0
  205. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -0
  206. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -0
  207. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -0
  208. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -0
  209. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/secret_backend_issuer.py +0 -0
  210. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/secret_backend_key.py +0 -0
  211. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/secret_backend_role.py +0 -0
  212. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -0
  213. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -0
  214. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/secret_backend_sign.py +0 -0
  215. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/plugin.py +0 -0
  216. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/plugin_pinned_version.py +0 -0
  217. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/policy.py +0 -0
  218. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/provider.py +0 -0
  219. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/py.typed +0 -0
  220. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/quota_lease_count.py +0 -0
  221. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/quota_rate_limit.py +0 -0
  222. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/rabbitmq/__init__.py +0 -0
  223. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/rabbitmq/_inputs.py +0 -0
  224. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/rabbitmq/outputs.py +0 -0
  225. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/rabbitmq/secret_backend.py +0 -0
  226. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/rabbitmq/secret_backend_role.py +0 -0
  227. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/raft_autopilot.py +0 -0
  228. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/raft_snapshot_agent_config.py +0 -0
  229. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/rgp_policy.py +0 -0
  230. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/saml/__init__.py +0 -0
  231. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/saml/_inputs.py +0 -0
  232. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/saml/auth_backend.py +0 -0
  233. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/saml/auth_backend_role.py +0 -0
  234. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/saml/outputs.py +0 -0
  235. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/scep_auth_backend_role.py +0 -0
  236. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/secrets/__init__.py +0 -0
  237. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/secrets/_inputs.py +0 -0
  238. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/secrets/outputs.py +0 -0
  239. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/secrets/sync_association.py +0 -0
  240. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/secrets/sync_aws_destination.py +0 -0
  241. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/secrets/sync_azure_destination.py +0 -0
  242. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/secrets/sync_config.py +0 -0
  243. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/secrets/sync_gcp_destination.py +0 -0
  244. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/secrets/sync_gh_destination.py +0 -0
  245. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/secrets/sync_github_apps.py +0 -0
  246. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/secrets/sync_vercel_destination.py +0 -0
  247. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ssh/__init__.py +0 -0
  248. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ssh/_inputs.py +0 -0
  249. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ssh/get_secret_backend_sign.py +0 -0
  250. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ssh/outputs.py +0 -0
  251. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ssh/secret_backend_ca.py +0 -0
  252. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ssh/secret_backend_role.py +0 -0
  253. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/terraformcloud/__init__.py +0 -0
  254. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/terraformcloud/secret_backend.py +0 -0
  255. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/terraformcloud/secret_creds.py +0 -0
  256. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/terraformcloud/secret_role.py +0 -0
  257. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/token.py +0 -0
  258. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/tokenauth/__init__.py +0 -0
  259. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/tokenauth/auth_backend_role.py +0 -0
  260. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/transform/__init__.py +0 -0
  261. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/transform/alphabet.py +0 -0
  262. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/transform/get_decode.py +0 -0
  263. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/transform/get_encode.py +0 -0
  264. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/transform/role.py +0 -0
  265. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/transform/template.py +0 -0
  266. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/transform/transformation.py +0 -0
  267. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/transit/__init__.py +0 -0
  268. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/transit/get_cmac.py +0 -0
  269. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/transit/get_decrypt.py +0 -0
  270. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/transit/get_encrypt.py +0 -0
  271. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/transit/get_sign.py +0 -0
  272. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/transit/get_verify.py +0 -0
  273. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/transit/secret_backend_key.py +0 -0
  274. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/transit/secret_cache_config.py +0 -0
  275. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault.egg-info/SOURCES.txt +0 -0
  276. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault.egg-info/dependency_links.txt +0 -0
  277. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault.egg-info/requires.txt +0 -0
  278. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault.egg-info/top_level.txt +0 -0
  279. {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/setup.cfg +0 -0
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.4
2
2
  Name: pulumi_vault
3
- Version: 7.6.0
3
+ Version: 7.6.0a1764138710
4
4
  Summary: A Pulumi package for creating and managing HashiCorp Vault cloud resources.
5
5
  License: Apache-2.0
6
6
  Project-URL: Homepage, https://pulumi.io
@@ -2739,10 +2739,6 @@ if not MYPY:
2739
2739
  """
2740
2740
  Version counter for root credential password write-only field
2741
2741
  """
2742
- self_managed: NotRequired[pulumi.Input[_builtins.bool]]
2743
- """
2744
- If set, allows onboarding static roles with a rootless connection configuration.
2745
- """
2746
2742
  split_statements: NotRequired[pulumi.Input[_builtins.bool]]
2747
2743
  """
2748
2744
  Set to true in order to split statements after semi-colons.
@@ -2769,7 +2765,6 @@ class SecretBackendConnectionOracleArgs:
2769
2765
  password: Optional[pulumi.Input[_builtins.str]] = None,
2770
2766
  password_wo: Optional[pulumi.Input[_builtins.str]] = None,
2771
2767
  password_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
2772
- self_managed: Optional[pulumi.Input[_builtins.bool]] = None,
2773
2768
  split_statements: Optional[pulumi.Input[_builtins.bool]] = None,
2774
2769
  username: Optional[pulumi.Input[_builtins.str]] = None,
2775
2770
  username_template: Optional[pulumi.Input[_builtins.str]] = None):
@@ -2783,7 +2778,6 @@ class SecretBackendConnectionOracleArgs:
2783
2778
  :param pulumi.Input[_builtins.str] password_wo: **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
2784
2779
  Write-only field for the root credential password used in the connection URL
2785
2780
  :param pulumi.Input[_builtins.int] password_wo_version: Version counter for root credential password write-only field
2786
- :param pulumi.Input[_builtins.bool] self_managed: If set, allows onboarding static roles with a rootless connection configuration.
2787
2781
  :param pulumi.Input[_builtins.bool] split_statements: Set to true in order to split statements after semi-colons.
2788
2782
  :param pulumi.Input[_builtins.str] username: The root credential username used in the connection URL
2789
2783
  :param pulumi.Input[_builtins.str] username_template: Username generation template.
@@ -2804,8 +2798,6 @@ class SecretBackendConnectionOracleArgs:
2804
2798
  pulumi.set(__self__, "password_wo", password_wo)
2805
2799
  if password_wo_version is not None:
2806
2800
  pulumi.set(__self__, "password_wo_version", password_wo_version)
2807
- if self_managed is not None:
2808
- pulumi.set(__self__, "self_managed", self_managed)
2809
2801
  if split_statements is not None:
2810
2802
  pulumi.set(__self__, "split_statements", split_statements)
2811
2803
  if username is not None:
@@ -2910,18 +2902,6 @@ class SecretBackendConnectionOracleArgs:
2910
2902
  def password_wo_version(self, value: Optional[pulumi.Input[_builtins.int]]):
2911
2903
  pulumi.set(self, "password_wo_version", value)
2912
2904
 
2913
- @_builtins.property
2914
- @pulumi.getter(name="selfManaged")
2915
- def self_managed(self) -> Optional[pulumi.Input[_builtins.bool]]:
2916
- """
2917
- If set, allows onboarding static roles with a rootless connection configuration.
2918
- """
2919
- return pulumi.get(self, "self_managed")
2920
-
2921
- @self_managed.setter
2922
- def self_managed(self, value: Optional[pulumi.Input[_builtins.bool]]):
2923
- pulumi.set(self, "self_managed", value)
2924
-
2925
2905
  @_builtins.property
2926
2906
  @pulumi.getter(name="splitStatements")
2927
2907
  def split_statements(self) -> Optional[pulumi.Input[_builtins.bool]]:
@@ -9378,10 +9358,6 @@ if not MYPY:
9378
9358
  a rotation when a scheduled token rotation occurs. The default rotation window is
9379
9359
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
9380
9360
  """
9381
- self_managed: NotRequired[pulumi.Input[_builtins.bool]]
9382
- """
9383
- If set, allows onboarding static roles with a rootless connection configuration.
9384
- """
9385
9361
  split_statements: NotRequired[pulumi.Input[_builtins.bool]]
9386
9362
  """
9387
9363
  Set to true in order to split statements after semi-colons.
@@ -9422,7 +9398,6 @@ class SecretsMountOracleArgs:
9422
9398
  rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
9423
9399
  rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
9424
9400
  rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
9425
- self_managed: Optional[pulumi.Input[_builtins.bool]] = None,
9426
9401
  split_statements: Optional[pulumi.Input[_builtins.bool]] = None,
9427
9402
  username: Optional[pulumi.Input[_builtins.str]] = None,
9428
9403
  username_template: Optional[pulumi.Input[_builtins.str]] = None,
@@ -9453,7 +9428,6 @@ class SecretsMountOracleArgs:
9453
9428
  :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
9454
9429
  a rotation when a scheduled token rotation occurs. The default rotation window is
9455
9430
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
9456
- :param pulumi.Input[_builtins.bool] self_managed: If set, allows onboarding static roles with a rootless connection configuration.
9457
9431
  :param pulumi.Input[_builtins.bool] split_statements: Set to true in order to split statements after semi-colons.
9458
9432
  :param pulumi.Input[_builtins.str] username: The root credential username used in the connection URL
9459
9433
  :param pulumi.Input[_builtins.str] username_template: Username generation template.
@@ -9493,8 +9467,6 @@ class SecretsMountOracleArgs:
9493
9467
  pulumi.set(__self__, "rotation_schedule", rotation_schedule)
9494
9468
  if rotation_window is not None:
9495
9469
  pulumi.set(__self__, "rotation_window", rotation_window)
9496
- if self_managed is not None:
9497
- pulumi.set(__self__, "self_managed", self_managed)
9498
9470
  if split_statements is not None:
9499
9471
  pulumi.set(__self__, "split_statements", split_statements)
9500
9472
  if username is not None:
@@ -9716,18 +9688,6 @@ class SecretsMountOracleArgs:
9716
9688
  def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
9717
9689
  pulumi.set(self, "rotation_window", value)
9718
9690
 
9719
- @_builtins.property
9720
- @pulumi.getter(name="selfManaged")
9721
- def self_managed(self) -> Optional[pulumi.Input[_builtins.bool]]:
9722
- """
9723
- If set, allows onboarding static roles with a rootless connection configuration.
9724
- """
9725
- return pulumi.get(self, "self_managed")
9726
-
9727
- @self_managed.setter
9728
- def self_managed(self, value: Optional[pulumi.Input[_builtins.bool]]):
9729
- pulumi.set(self, "self_managed", value)
9730
-
9731
9691
  @_builtins.property
9732
9692
  @pulumi.getter(name="splitStatements")
9733
9693
  def split_statements(self) -> Optional[pulumi.Input[_builtins.bool]]:
@@ -1996,8 +1996,6 @@ class SecretBackendConnectionOracle(dict):
1996
1996
  suggest = "password_wo"
1997
1997
  elif key == "passwordWoVersion":
1998
1998
  suggest = "password_wo_version"
1999
- elif key == "selfManaged":
2000
- suggest = "self_managed"
2001
1999
  elif key == "splitStatements":
2002
2000
  suggest = "split_statements"
2003
2001
  elif key == "usernameTemplate":
@@ -2023,7 +2021,6 @@ class SecretBackendConnectionOracle(dict):
2023
2021
  password: Optional[_builtins.str] = None,
2024
2022
  password_wo: Optional[_builtins.str] = None,
2025
2023
  password_wo_version: Optional[_builtins.int] = None,
2026
- self_managed: Optional[_builtins.bool] = None,
2027
2024
  split_statements: Optional[_builtins.bool] = None,
2028
2025
  username: Optional[_builtins.str] = None,
2029
2026
  username_template: Optional[_builtins.str] = None):
@@ -2037,7 +2034,6 @@ class SecretBackendConnectionOracle(dict):
2037
2034
  :param _builtins.str password_wo: **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
2038
2035
  Write-only field for the root credential password used in the connection URL
2039
2036
  :param _builtins.int password_wo_version: Version counter for root credential password write-only field
2040
- :param _builtins.bool self_managed: If set, allows onboarding static roles with a rootless connection configuration.
2041
2037
  :param _builtins.bool split_statements: Set to true in order to split statements after semi-colons.
2042
2038
  :param _builtins.str username: The root credential username used in the connection URL
2043
2039
  :param _builtins.str username_template: Username generation template.
@@ -2058,8 +2054,6 @@ class SecretBackendConnectionOracle(dict):
2058
2054
  pulumi.set(__self__, "password_wo", password_wo)
2059
2055
  if password_wo_version is not None:
2060
2056
  pulumi.set(__self__, "password_wo_version", password_wo_version)
2061
- if self_managed is not None:
2062
- pulumi.set(__self__, "self_managed", self_managed)
2063
2057
  if split_statements is not None:
2064
2058
  pulumi.set(__self__, "split_statements", split_statements)
2065
2059
  if username is not None:
@@ -2132,14 +2126,6 @@ class SecretBackendConnectionOracle(dict):
2132
2126
  """
2133
2127
  return pulumi.get(self, "password_wo_version")
2134
2128
 
2135
- @_builtins.property
2136
- @pulumi.getter(name="selfManaged")
2137
- def self_managed(self) -> Optional[_builtins.bool]:
2138
- """
2139
- If set, allows onboarding static roles with a rootless connection configuration.
2140
- """
2141
- return pulumi.get(self, "self_managed")
2142
-
2143
2129
  @_builtins.property
2144
2130
  @pulumi.getter(name="splitStatements")
2145
2131
  def split_statements(self) -> Optional[_builtins.bool]:
@@ -6690,8 +6676,6 @@ class SecretsMountOracle(dict):
6690
6676
  suggest = "rotation_schedule"
6691
6677
  elif key == "rotationWindow":
6692
6678
  suggest = "rotation_window"
6693
- elif key == "selfManaged":
6694
- suggest = "self_managed"
6695
6679
  elif key == "splitStatements":
6696
6680
  suggest = "split_statements"
6697
6681
  elif key == "usernameTemplate":
@@ -6728,7 +6712,6 @@ class SecretsMountOracle(dict):
6728
6712
  rotation_period: Optional[_builtins.int] = None,
6729
6713
  rotation_schedule: Optional[_builtins.str] = None,
6730
6714
  rotation_window: Optional[_builtins.int] = None,
6731
- self_managed: Optional[_builtins.bool] = None,
6732
6715
  split_statements: Optional[_builtins.bool] = None,
6733
6716
  username: Optional[_builtins.str] = None,
6734
6717
  username_template: Optional[_builtins.str] = None,
@@ -6759,7 +6742,6 @@ class SecretsMountOracle(dict):
6759
6742
  :param _builtins.int rotation_window: The maximum amount of time in seconds allowed to complete
6760
6743
  a rotation when a scheduled token rotation occurs. The default rotation window is
6761
6744
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
6762
- :param _builtins.bool self_managed: If set, allows onboarding static roles with a rootless connection configuration.
6763
6745
  :param _builtins.bool split_statements: Set to true in order to split statements after semi-colons.
6764
6746
  :param _builtins.str username: The root credential username used in the connection URL
6765
6747
  :param _builtins.str username_template: Username generation template.
@@ -6799,8 +6781,6 @@ class SecretsMountOracle(dict):
6799
6781
  pulumi.set(__self__, "rotation_schedule", rotation_schedule)
6800
6782
  if rotation_window is not None:
6801
6783
  pulumi.set(__self__, "rotation_window", rotation_window)
6802
- if self_managed is not None:
6803
- pulumi.set(__self__, "self_managed", self_managed)
6804
6784
  if split_statements is not None:
6805
6785
  pulumi.set(__self__, "split_statements", split_statements)
6806
6786
  if username is not None:
@@ -6954,14 +6934,6 @@ class SecretsMountOracle(dict):
6954
6934
  """
6955
6935
  return pulumi.get(self, "rotation_window")
6956
6936
 
6957
- @_builtins.property
6958
- @pulumi.getter(name="selfManaged")
6959
- def self_managed(self) -> Optional[_builtins.bool]:
6960
- """
6961
- If set, allows onboarding static roles with a rootless connection configuration.
6962
- """
6963
- return pulumi.get(self, "self_managed")
6964
-
6965
6937
  @_builtins.property
6966
6938
  @pulumi.getter(name="splitStatements")
6967
6939
  def split_statements(self) -> Optional[_builtins.bool]:
@@ -1077,8 +1077,6 @@ class SecretBackendConnection(pulumi.CustomResource):
1077
1077
  """
1078
1078
  ## Example Usage
1079
1079
 
1080
- ### PostgreSQL Connection
1081
-
1082
1080
  ```python
1083
1081
  import pulumi
1084
1082
  import pulumi_vault as vault
@@ -1100,37 +1098,6 @@ class SecretBackendConnection(pulumi.CustomResource):
1100
1098
  })
1101
1099
  ```
1102
1100
 
1103
- ### Oracle Connection with Self-Managed Mode (Rootless)
1104
-
1105
- For Vault 1.18+ Enterprise, you can configure Oracle connections in self-managed mode,
1106
- which allows a static role to manage its own database credentials without requiring root access:
1107
-
1108
- ```python
1109
- import pulumi
1110
- import pulumi_vault as vault
1111
-
1112
- db = vault.Mount("db",
1113
- path="database",
1114
- type="database")
1115
- oracle = vault.database.SecretBackendConnection("oracle",
1116
- backend=db.path,
1117
- name="oracle",
1118
- allowed_roles=["my-role"],
1119
- oracle={
1120
- "connection_url": "{{username}}/{{password}}@//host:port/service",
1121
- "self_managed": True,
1122
- "plugin_name": "vault-plugin-database-oracle",
1123
- })
1124
- oracle_role = vault.database.SecretBackendStaticRole("oracle_role",
1125
- backend=db.path,
1126
- name="my-role",
1127
- db_name=oracle.name,
1128
- username="vault_user",
1129
- password_wo="initial-password",
1130
- password_wo_version=1,
1131
- rotation_period=3600)
1132
- ```
1133
-
1134
1101
  ## Ephemeral Attributes Reference
1135
1102
 
1136
1103
  The following write-only attributes are supported for all DBs that support username/password:
@@ -1204,8 +1171,6 @@ class SecretBackendConnection(pulumi.CustomResource):
1204
1171
  """
1205
1172
  ## Example Usage
1206
1173
 
1207
- ### PostgreSQL Connection
1208
-
1209
1174
  ```python
1210
1175
  import pulumi
1211
1176
  import pulumi_vault as vault
@@ -1227,37 +1192,6 @@ class SecretBackendConnection(pulumi.CustomResource):
1227
1192
  })
1228
1193
  ```
1229
1194
 
1230
- ### Oracle Connection with Self-Managed Mode (Rootless)
1231
-
1232
- For Vault 1.18+ Enterprise, you can configure Oracle connections in self-managed mode,
1233
- which allows a static role to manage its own database credentials without requiring root access:
1234
-
1235
- ```python
1236
- import pulumi
1237
- import pulumi_vault as vault
1238
-
1239
- db = vault.Mount("db",
1240
- path="database",
1241
- type="database")
1242
- oracle = vault.database.SecretBackendConnection("oracle",
1243
- backend=db.path,
1244
- name="oracle",
1245
- allowed_roles=["my-role"],
1246
- oracle={
1247
- "connection_url": "{{username}}/{{password}}@//host:port/service",
1248
- "self_managed": True,
1249
- "plugin_name": "vault-plugin-database-oracle",
1250
- })
1251
- oracle_role = vault.database.SecretBackendStaticRole("oracle_role",
1252
- backend=db.path,
1253
- name="my-role",
1254
- db_name=oracle.name,
1255
- username="vault_user",
1256
- password_wo="initial-password",
1257
- password_wo_version=1,
1258
- rotation_period=3600)
1259
- ```
1260
-
1261
1195
  ## Ephemeral Attributes Reference
1262
1196
 
1263
1197
  The following write-only attributes are supported for all DBs that support username/password:
@@ -26,8 +26,6 @@ class SecretBackendStaticRoleArgs:
26
26
  credential_type: Optional[pulumi.Input[_builtins.str]] = None,
27
27
  name: Optional[pulumi.Input[_builtins.str]] = None,
28
28
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
29
- password_wo: Optional[pulumi.Input[_builtins.str]] = None,
30
- password_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
31
29
  rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
32
30
  rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
33
31
  rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
@@ -45,13 +43,6 @@ class SecretBackendStaticRoleArgs:
45
43
  The value should not contain leading or trailing forward slashes.
46
44
  The `namespace` is always relative to the provider's configured namespace.
47
45
  *Available only for Vault Enterprise*.
48
- :param pulumi.Input[_builtins.str] password_wo: **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
49
- The password corresponding to the username in the database.
50
- This is a write-only field. Requires Vault 1.19+. Deprecates `self_managed_password` which was introduced in Vault 1.18.
51
- Cannot be used with `self_managed_password`.
52
- :param pulumi.Input[_builtins.int] password_wo_version: The version of the `password_wo` field.
53
- Used for tracking changes to the write-only password field. For more info see
54
- updating write-only attributes.
55
46
  :param pulumi.Input[_builtins.int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
56
47
  Mutually exclusive with `rotation_schedule`.
57
48
  :param pulumi.Input[_builtins.str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
@@ -65,7 +56,6 @@ class SecretBackendStaticRoleArgs:
65
56
  :param pulumi.Input[_builtins.str] self_managed_password: The password corresponding to the username in the database.
66
57
  Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
67
58
  select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
68
- **Deprecated**: Use `password_wo` instead. This field will be removed in a future version.
69
59
  :param pulumi.Input[_builtins.bool] skip_import_rotation: If set to true, Vault will skip the
70
60
  initial secret rotation on import. Requires Vault 1.18+ Enterprise.
71
61
  """
@@ -80,10 +70,6 @@ class SecretBackendStaticRoleArgs:
80
70
  pulumi.set(__self__, "name", name)
81
71
  if namespace is not None:
82
72
  pulumi.set(__self__, "namespace", namespace)
83
- if password_wo is not None:
84
- pulumi.set(__self__, "password_wo", password_wo)
85
- if password_wo_version is not None:
86
- pulumi.set(__self__, "password_wo_version", password_wo_version)
87
73
  if rotation_period is not None:
88
74
  pulumi.set(__self__, "rotation_period", rotation_period)
89
75
  if rotation_schedule is not None:
@@ -181,35 +167,6 @@ class SecretBackendStaticRoleArgs:
181
167
  def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
182
168
  pulumi.set(self, "namespace", value)
183
169
 
184
- @_builtins.property
185
- @pulumi.getter(name="passwordWo")
186
- def password_wo(self) -> Optional[pulumi.Input[_builtins.str]]:
187
- """
188
- **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
189
- The password corresponding to the username in the database.
190
- This is a write-only field. Requires Vault 1.19+. Deprecates `self_managed_password` which was introduced in Vault 1.18.
191
- Cannot be used with `self_managed_password`.
192
- """
193
- return pulumi.get(self, "password_wo")
194
-
195
- @password_wo.setter
196
- def password_wo(self, value: Optional[pulumi.Input[_builtins.str]]):
197
- pulumi.set(self, "password_wo", value)
198
-
199
- @_builtins.property
200
- @pulumi.getter(name="passwordWoVersion")
201
- def password_wo_version(self) -> Optional[pulumi.Input[_builtins.int]]:
202
- """
203
- The version of the `password_wo` field.
204
- Used for tracking changes to the write-only password field. For more info see
205
- updating write-only attributes.
206
- """
207
- return pulumi.get(self, "password_wo_version")
208
-
209
- @password_wo_version.setter
210
- def password_wo_version(self, value: Optional[pulumi.Input[_builtins.int]]):
211
- pulumi.set(self, "password_wo_version", value)
212
-
213
170
  @_builtins.property
214
171
  @pulumi.getter(name="rotationPeriod")
215
172
  def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
@@ -271,7 +228,6 @@ class SecretBackendStaticRoleArgs:
271
228
  The password corresponding to the username in the database.
272
229
  Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
273
230
  select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
274
- **Deprecated**: Use `password_wo` instead. This field will be removed in a future version.
275
231
  """
276
232
  return pulumi.get(self, "self_managed_password")
277
233
 
@@ -302,8 +258,6 @@ class _SecretBackendStaticRoleState:
302
258
  db_name: Optional[pulumi.Input[_builtins.str]] = None,
303
259
  name: Optional[pulumi.Input[_builtins.str]] = None,
304
260
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
305
- password_wo: Optional[pulumi.Input[_builtins.str]] = None,
306
- password_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
307
261
  rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
308
262
  rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
309
263
  rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
@@ -321,13 +275,6 @@ class _SecretBackendStaticRoleState:
321
275
  The value should not contain leading or trailing forward slashes.
322
276
  The `namespace` is always relative to the provider's configured namespace.
323
277
  *Available only for Vault Enterprise*.
324
- :param pulumi.Input[_builtins.str] password_wo: **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
325
- The password corresponding to the username in the database.
326
- This is a write-only field. Requires Vault 1.19+. Deprecates `self_managed_password` which was introduced in Vault 1.18.
327
- Cannot be used with `self_managed_password`.
328
- :param pulumi.Input[_builtins.int] password_wo_version: The version of the `password_wo` field.
329
- Used for tracking changes to the write-only password field. For more info see
330
- updating write-only attributes.
331
278
  :param pulumi.Input[_builtins.int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
332
279
  Mutually exclusive with `rotation_schedule`.
333
280
  :param pulumi.Input[_builtins.str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
@@ -341,7 +288,6 @@ class _SecretBackendStaticRoleState:
341
288
  :param pulumi.Input[_builtins.str] self_managed_password: The password corresponding to the username in the database.
342
289
  Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
343
290
  select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
344
- **Deprecated**: Use `password_wo` instead. This field will be removed in a future version.
345
291
  :param pulumi.Input[_builtins.bool] skip_import_rotation: If set to true, Vault will skip the
346
292
  initial secret rotation on import. Requires Vault 1.18+ Enterprise.
347
293
  :param pulumi.Input[_builtins.str] username: The database username that this static role corresponds to.
@@ -358,10 +304,6 @@ class _SecretBackendStaticRoleState:
358
304
  pulumi.set(__self__, "name", name)
359
305
  if namespace is not None:
360
306
  pulumi.set(__self__, "namespace", namespace)
361
- if password_wo is not None:
362
- pulumi.set(__self__, "password_wo", password_wo)
363
- if password_wo_version is not None:
364
- pulumi.set(__self__, "password_wo_version", password_wo_version)
365
307
  if rotation_period is not None:
366
308
  pulumi.set(__self__, "rotation_period", rotation_period)
367
309
  if rotation_schedule is not None:
@@ -449,35 +391,6 @@ class _SecretBackendStaticRoleState:
449
391
  def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
450
392
  pulumi.set(self, "namespace", value)
451
393
 
452
- @_builtins.property
453
- @pulumi.getter(name="passwordWo")
454
- def password_wo(self) -> Optional[pulumi.Input[_builtins.str]]:
455
- """
456
- **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
457
- The password corresponding to the username in the database.
458
- This is a write-only field. Requires Vault 1.19+. Deprecates `self_managed_password` which was introduced in Vault 1.18.
459
- Cannot be used with `self_managed_password`.
460
- """
461
- return pulumi.get(self, "password_wo")
462
-
463
- @password_wo.setter
464
- def password_wo(self, value: Optional[pulumi.Input[_builtins.str]]):
465
- pulumi.set(self, "password_wo", value)
466
-
467
- @_builtins.property
468
- @pulumi.getter(name="passwordWoVersion")
469
- def password_wo_version(self) -> Optional[pulumi.Input[_builtins.int]]:
470
- """
471
- The version of the `password_wo` field.
472
- Used for tracking changes to the write-only password field. For more info see
473
- updating write-only attributes.
474
- """
475
- return pulumi.get(self, "password_wo_version")
476
-
477
- @password_wo_version.setter
478
- def password_wo_version(self, value: Optional[pulumi.Input[_builtins.int]]):
479
- pulumi.set(self, "password_wo_version", value)
480
-
481
394
  @_builtins.property
482
395
  @pulumi.getter(name="rotationPeriod")
483
396
  def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
@@ -539,7 +452,6 @@ class _SecretBackendStaticRoleState:
539
452
  The password corresponding to the username in the database.
540
453
  Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
541
454
  select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
542
- **Deprecated**: Use `password_wo` instead. This field will be removed in a future version.
543
455
  """
544
456
  return pulumi.get(self, "self_managed_password")
545
457
 
@@ -585,8 +497,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
585
497
  db_name: Optional[pulumi.Input[_builtins.str]] = None,
586
498
  name: Optional[pulumi.Input[_builtins.str]] = None,
587
499
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
588
- password_wo: Optional[pulumi.Input[_builtins.str]] = None,
589
- password_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
590
500
  rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
591
501
  rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
592
502
  rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
@@ -633,16 +543,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
633
543
  rotation_schedule="0 0 * * SAT",
634
544
  rotation_window=172800,
635
545
  rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
636
- # configure a static role with a password (Vault 1.19+)
637
- password_role = vault.database.SecretBackendStaticRole("password_role",
638
- backend=db.path,
639
- name="my-password-role",
640
- db_name=postgres.name,
641
- username="example",
642
- password_wo="my-password",
643
- password_wo_version=1,
644
- rotation_period=3600,
645
- rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
646
546
  ```
647
547
 
648
548
  ## Import
@@ -663,13 +563,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
663
563
  The value should not contain leading or trailing forward slashes.
664
564
  The `namespace` is always relative to the provider's configured namespace.
665
565
  *Available only for Vault Enterprise*.
666
- :param pulumi.Input[_builtins.str] password_wo: **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
667
- The password corresponding to the username in the database.
668
- This is a write-only field. Requires Vault 1.19+. Deprecates `self_managed_password` which was introduced in Vault 1.18.
669
- Cannot be used with `self_managed_password`.
670
- :param pulumi.Input[_builtins.int] password_wo_version: The version of the `password_wo` field.
671
- Used for tracking changes to the write-only password field. For more info see
672
- updating write-only attributes.
673
566
  :param pulumi.Input[_builtins.int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
674
567
  Mutually exclusive with `rotation_schedule`.
675
568
  :param pulumi.Input[_builtins.str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
@@ -683,7 +576,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
683
576
  :param pulumi.Input[_builtins.str] self_managed_password: The password corresponding to the username in the database.
684
577
  Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
685
578
  select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
686
- **Deprecated**: Use `password_wo` instead. This field will be removed in a future version.
687
579
  :param pulumi.Input[_builtins.bool] skip_import_rotation: If set to true, Vault will skip the
688
580
  initial secret rotation on import. Requires Vault 1.18+ Enterprise.
689
581
  :param pulumi.Input[_builtins.str] username: The database username that this static role corresponds to.
@@ -732,16 +624,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
732
624
  rotation_schedule="0 0 * * SAT",
733
625
  rotation_window=172800,
734
626
  rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
735
- # configure a static role with a password (Vault 1.19+)
736
- password_role = vault.database.SecretBackendStaticRole("password_role",
737
- backend=db.path,
738
- name="my-password-role",
739
- db_name=postgres.name,
740
- username="example",
741
- password_wo="my-password",
742
- password_wo_version=1,
743
- rotation_period=3600,
744
- rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
745
627
  ```
746
628
 
747
629
  ## Import
@@ -773,8 +655,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
773
655
  db_name: Optional[pulumi.Input[_builtins.str]] = None,
774
656
  name: Optional[pulumi.Input[_builtins.str]] = None,
775
657
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
776
- password_wo: Optional[pulumi.Input[_builtins.str]] = None,
777
- password_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
778
658
  rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
779
659
  rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
780
660
  rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
@@ -801,8 +681,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
801
681
  __props__.__dict__["db_name"] = db_name
802
682
  __props__.__dict__["name"] = name
803
683
  __props__.__dict__["namespace"] = namespace
804
- __props__.__dict__["password_wo"] = None if password_wo is None else pulumi.Output.secret(password_wo)
805
- __props__.__dict__["password_wo_version"] = password_wo_version
806
684
  __props__.__dict__["rotation_period"] = rotation_period
807
685
  __props__.__dict__["rotation_schedule"] = rotation_schedule
808
686
  __props__.__dict__["rotation_statements"] = rotation_statements
@@ -812,7 +690,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
812
690
  if username is None and not opts.urn:
813
691
  raise TypeError("Missing required property 'username'")
814
692
  __props__.__dict__["username"] = username
815
- secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["passwordWo", "selfManagedPassword"])
693
+ secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["selfManagedPassword"])
816
694
  opts = pulumi.ResourceOptions.merge(opts, secret_opts)
817
695
  super(SecretBackendStaticRole, __self__).__init__(
818
696
  'vault:database/secretBackendStaticRole:SecretBackendStaticRole',
@@ -830,8 +708,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
830
708
  db_name: Optional[pulumi.Input[_builtins.str]] = None,
831
709
  name: Optional[pulumi.Input[_builtins.str]] = None,
832
710
  namespace: Optional[pulumi.Input[_builtins.str]] = None,
833
- password_wo: Optional[pulumi.Input[_builtins.str]] = None,
834
- password_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
835
711
  rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
836
712
  rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
837
713
  rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
@@ -854,13 +730,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
854
730
  The value should not contain leading or trailing forward slashes.
855
731
  The `namespace` is always relative to the provider's configured namespace.
856
732
  *Available only for Vault Enterprise*.
857
- :param pulumi.Input[_builtins.str] password_wo: **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
858
- The password corresponding to the username in the database.
859
- This is a write-only field. Requires Vault 1.19+. Deprecates `self_managed_password` which was introduced in Vault 1.18.
860
- Cannot be used with `self_managed_password`.
861
- :param pulumi.Input[_builtins.int] password_wo_version: The version of the `password_wo` field.
862
- Used for tracking changes to the write-only password field. For more info see
863
- updating write-only attributes.
864
733
  :param pulumi.Input[_builtins.int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
865
734
  Mutually exclusive with `rotation_schedule`.
866
735
  :param pulumi.Input[_builtins.str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
@@ -874,7 +743,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
874
743
  :param pulumi.Input[_builtins.str] self_managed_password: The password corresponding to the username in the database.
875
744
  Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
876
745
  select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
877
- **Deprecated**: Use `password_wo` instead. This field will be removed in a future version.
878
746
  :param pulumi.Input[_builtins.bool] skip_import_rotation: If set to true, Vault will skip the
879
747
  initial secret rotation on import. Requires Vault 1.18+ Enterprise.
880
748
  :param pulumi.Input[_builtins.str] username: The database username that this static role corresponds to.
@@ -889,8 +757,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
889
757
  __props__.__dict__["db_name"] = db_name
890
758
  __props__.__dict__["name"] = name
891
759
  __props__.__dict__["namespace"] = namespace
892
- __props__.__dict__["password_wo"] = password_wo
893
- __props__.__dict__["password_wo_version"] = password_wo_version
894
760
  __props__.__dict__["rotation_period"] = rotation_period
895
761
  __props__.__dict__["rotation_schedule"] = rotation_schedule
896
762
  __props__.__dict__["rotation_statements"] = rotation_statements
@@ -948,27 +814,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
948
814
  """
949
815
  return pulumi.get(self, "namespace")
950
816
 
951
- @_builtins.property
952
- @pulumi.getter(name="passwordWo")
953
- def password_wo(self) -> pulumi.Output[Optional[_builtins.str]]:
954
- """
955
- **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
956
- The password corresponding to the username in the database.
957
- This is a write-only field. Requires Vault 1.19+. Deprecates `self_managed_password` which was introduced in Vault 1.18.
958
- Cannot be used with `self_managed_password`.
959
- """
960
- return pulumi.get(self, "password_wo")
961
-
962
- @_builtins.property
963
- @pulumi.getter(name="passwordWoVersion")
964
- def password_wo_version(self) -> pulumi.Output[Optional[_builtins.int]]:
965
- """
966
- The version of the `password_wo` field.
967
- Used for tracking changes to the write-only password field. For more info see
968
- updating write-only attributes.
969
- """
970
- return pulumi.get(self, "password_wo_version")
971
-
972
817
  @_builtins.property
973
818
  @pulumi.getter(name="rotationPeriod")
974
819
  def rotation_period(self) -> pulumi.Output[Optional[_builtins.int]]:
@@ -1014,7 +859,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
1014
859
  The password corresponding to the username in the database.
1015
860
  Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
1016
861
  select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
1017
- **Deprecated**: Use `password_wo` instead. This field will be removed in a future version.
1018
862
  """
1019
863
  return pulumi.get(self, "self_managed_password")
1020
864