pulumi-vault 7.6.0__tar.gz → 7.6.0a1764138710__tar.gz
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/PKG-INFO +1 -1
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/database/_inputs.py +0 -40
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/database/outputs.py +0 -28
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/database/secret_backend_connection.py +0 -66
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/database/secret_backend_static_role.py +1 -157
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kubernetes/auth_backend_role.py +18 -64
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kubernetes/get_auth_backend_role.py +1 -15
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pulumi-plugin.json +1 -1
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault.egg-info/PKG-INFO +1 -1
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pyproject.toml +1 -1
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/README.md +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/__init__.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/_inputs.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/_utilities.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ad/__init__.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ad/get_access_credentials.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ad/secret_backend.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ad/secret_library.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ad/secret_role.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/alicloud/__init__.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/alicloud/auth_backend_role.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/approle/__init__.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/approle/auth_backend_login.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/approle/auth_backend_role.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/approle/auth_backend_role_secret_id.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/approle/get_auth_backend_role_id.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/audit.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/audit_request_header.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/auth_backend.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/aws/__init__.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/aws/auth_backend_cert.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/aws/auth_backend_client.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/aws/auth_backend_config_identity.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/aws/auth_backend_login.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/aws/auth_backend_role.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/aws/auth_backend_role_tag.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/aws/auth_backend_sts_role.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/aws/get_access_credentials.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/aws/get_static_access_credentials.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/aws/secret_backend.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/aws/secret_backend_role.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/aws/secret_backend_static_role.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/azure/__init__.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/azure/_inputs.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/azure/auth_backend_config.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/azure/auth_backend_role.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/azure/backend.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/azure/backend_role.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/azure/get_access_credentials.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/azure/outputs.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/cert_auth_backend_role.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/config/__init__.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/config/__init__.pyi +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/config/_inputs.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/config/outputs.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/config/ui_custom_message.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/config/vars.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/consul/__init__.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/consul/secret_backend.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/consul/secret_backend_role.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/database/__init__.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/database/secret_backend_role.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/database/secrets_mount.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/egp_policy.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/gcp/__init__.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/gcp/_inputs.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/gcp/auth_backend.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/gcp/auth_backend_role.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/gcp/get_auth_backend_role.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/gcp/outputs.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/gcp/secret_backend.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/gcp/secret_impersonated_account.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/gcp/secret_roleset.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/gcp/secret_static_account.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/generic/__init__.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/generic/endpoint.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/generic/get_secret.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/generic/secret.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/get_auth_backend.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/get_auth_backends.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/get_namespace.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/get_namespaces.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/get_nomad_access_token.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/get_policy_document.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/get_raft_autopilot_state.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/github/__init__.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/github/_inputs.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/github/auth_backend.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/github/outputs.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/github/team.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/github/user.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/__init__.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/entity.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/entity_alias.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/entity_policies.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/get_entity.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/get_group.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/get_oidc_client_creds.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/get_oidc_openid_config.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/get_oidc_public_keys.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/group.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/group_alias.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/group_member_entity_ids.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/group_member_group_ids.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/group_policies.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/mfa_duo.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/mfa_login_enforcement.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/mfa_okta.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/mfa_pingid.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/mfa_totp.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/oidc.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/oidc_assignment.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/oidc_client.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/oidc_key.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/oidc_provider.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/oidc_role.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/oidc_scope.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/identity/outputs.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/jwt/__init__.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/jwt/_inputs.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/jwt/auth_backend.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/jwt/auth_backend_role.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/jwt/outputs.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kmip/__init__.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kmip/secret_backend.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kmip/secret_role.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kmip/secret_scope.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kubernetes/__init__.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kubernetes/auth_backend_config.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kubernetes/get_auth_backend_config.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kubernetes/get_service_account_token.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kubernetes/secret_backend.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kubernetes/secret_backend_role.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kv/__init__.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kv/_inputs.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kv/get_secret.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kv/get_secret_subkeys_v2.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kv/get_secret_v2.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kv/get_secrets_list.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kv/get_secrets_list_v2.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kv/outputs.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kv/secret.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kv/secret_backend_v2.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/kv/secret_v2.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ldap/__init__.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ldap/_inputs.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ldap/auth_backend.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ldap/auth_backend_group.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ldap/auth_backend_user.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ldap/get_dynamic_credentials.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ldap/get_static_credentials.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ldap/outputs.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ldap/secret_backend.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ldap/secret_backend_library_set.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ldap/secret_backend_static_role.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/managed/__init__.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/managed/_inputs.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/managed/keys.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/managed/outputs.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/mfa_duo.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/mfa_okta.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/mfa_pingid.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/mfa_totp.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/mongodbatlas/__init__.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/mongodbatlas/secret_backend.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/mongodbatlas/secret_role.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/mount.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/namespace.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/nomad_secret_backend.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/nomad_secret_role.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/oci_auth_backend.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/oci_auth_backend_role.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/okta/__init__.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/okta/_inputs.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/okta/auth_backend.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/okta/auth_backend_group.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/okta/auth_backend_user.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/okta/outputs.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/outputs.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/__init__.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/_inputs.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/backend_acme_eab.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/backend_config_acme.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/backend_config_auto_tidy.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/backend_config_cluster.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/backend_config_cmpv2.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/backend_config_est.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/backend_config_scep.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/get_backend_cert_metadata.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/get_backend_config_cmpv2.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/get_backend_config_est.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/get_backend_config_scep.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/get_backend_issuer.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/get_backend_issuers.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/get_backend_key.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/get_backend_keys.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/outputs.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/secret_backend_cert.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/secret_backend_issuer.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/secret_backend_key.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/secret_backend_role.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/pkisecret/secret_backend_sign.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/plugin.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/plugin_pinned_version.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/policy.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/provider.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/py.typed +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/quota_lease_count.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/quota_rate_limit.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/rabbitmq/__init__.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/rabbitmq/_inputs.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/rabbitmq/outputs.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/rabbitmq/secret_backend.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/rabbitmq/secret_backend_role.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/raft_autopilot.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/raft_snapshot_agent_config.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/rgp_policy.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/saml/__init__.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/saml/_inputs.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/saml/auth_backend.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/saml/auth_backend_role.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/saml/outputs.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/scep_auth_backend_role.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/secrets/__init__.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/secrets/_inputs.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/secrets/outputs.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/secrets/sync_association.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/secrets/sync_aws_destination.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/secrets/sync_azure_destination.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/secrets/sync_config.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/secrets/sync_gcp_destination.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/secrets/sync_gh_destination.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/secrets/sync_github_apps.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/secrets/sync_vercel_destination.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ssh/__init__.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ssh/_inputs.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ssh/get_secret_backend_sign.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ssh/outputs.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ssh/secret_backend_ca.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/ssh/secret_backend_role.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/terraformcloud/__init__.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/terraformcloud/secret_backend.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/terraformcloud/secret_creds.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/terraformcloud/secret_role.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/token.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/tokenauth/__init__.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/tokenauth/auth_backend_role.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/transform/__init__.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/transform/alphabet.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/transform/get_decode.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/transform/get_encode.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/transform/role.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/transform/template.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/transform/transformation.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/transit/__init__.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/transit/get_cmac.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/transit/get_decrypt.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/transit/get_encrypt.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/transit/get_sign.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/transit/get_verify.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/transit/secret_backend_key.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault/transit/secret_cache_config.py +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault.egg-info/SOURCES.txt +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault.egg-info/dependency_links.txt +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault.egg-info/requires.txt +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/pulumi_vault.egg-info/top_level.txt +0 -0
- {pulumi_vault-7.6.0 → pulumi_vault-7.6.0a1764138710}/setup.cfg +0 -0
|
@@ -2739,10 +2739,6 @@ if not MYPY:
|
|
|
2739
2739
|
"""
|
|
2740
2740
|
Version counter for root credential password write-only field
|
|
2741
2741
|
"""
|
|
2742
|
-
self_managed: NotRequired[pulumi.Input[_builtins.bool]]
|
|
2743
|
-
"""
|
|
2744
|
-
If set, allows onboarding static roles with a rootless connection configuration.
|
|
2745
|
-
"""
|
|
2746
2742
|
split_statements: NotRequired[pulumi.Input[_builtins.bool]]
|
|
2747
2743
|
"""
|
|
2748
2744
|
Set to true in order to split statements after semi-colons.
|
|
@@ -2769,7 +2765,6 @@ class SecretBackendConnectionOracleArgs:
|
|
|
2769
2765
|
password: Optional[pulumi.Input[_builtins.str]] = None,
|
|
2770
2766
|
password_wo: Optional[pulumi.Input[_builtins.str]] = None,
|
|
2771
2767
|
password_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
|
|
2772
|
-
self_managed: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
2773
2768
|
split_statements: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
2774
2769
|
username: Optional[pulumi.Input[_builtins.str]] = None,
|
|
2775
2770
|
username_template: Optional[pulumi.Input[_builtins.str]] = None):
|
|
@@ -2783,7 +2778,6 @@ class SecretBackendConnectionOracleArgs:
|
|
|
2783
2778
|
:param pulumi.Input[_builtins.str] password_wo: **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
|
|
2784
2779
|
Write-only field for the root credential password used in the connection URL
|
|
2785
2780
|
:param pulumi.Input[_builtins.int] password_wo_version: Version counter for root credential password write-only field
|
|
2786
|
-
:param pulumi.Input[_builtins.bool] self_managed: If set, allows onboarding static roles with a rootless connection configuration.
|
|
2787
2781
|
:param pulumi.Input[_builtins.bool] split_statements: Set to true in order to split statements after semi-colons.
|
|
2788
2782
|
:param pulumi.Input[_builtins.str] username: The root credential username used in the connection URL
|
|
2789
2783
|
:param pulumi.Input[_builtins.str] username_template: Username generation template.
|
|
@@ -2804,8 +2798,6 @@ class SecretBackendConnectionOracleArgs:
|
|
|
2804
2798
|
pulumi.set(__self__, "password_wo", password_wo)
|
|
2805
2799
|
if password_wo_version is not None:
|
|
2806
2800
|
pulumi.set(__self__, "password_wo_version", password_wo_version)
|
|
2807
|
-
if self_managed is not None:
|
|
2808
|
-
pulumi.set(__self__, "self_managed", self_managed)
|
|
2809
2801
|
if split_statements is not None:
|
|
2810
2802
|
pulumi.set(__self__, "split_statements", split_statements)
|
|
2811
2803
|
if username is not None:
|
|
@@ -2910,18 +2902,6 @@ class SecretBackendConnectionOracleArgs:
|
|
|
2910
2902
|
def password_wo_version(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
2911
2903
|
pulumi.set(self, "password_wo_version", value)
|
|
2912
2904
|
|
|
2913
|
-
@_builtins.property
|
|
2914
|
-
@pulumi.getter(name="selfManaged")
|
|
2915
|
-
def self_managed(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
2916
|
-
"""
|
|
2917
|
-
If set, allows onboarding static roles with a rootless connection configuration.
|
|
2918
|
-
"""
|
|
2919
|
-
return pulumi.get(self, "self_managed")
|
|
2920
|
-
|
|
2921
|
-
@self_managed.setter
|
|
2922
|
-
def self_managed(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
2923
|
-
pulumi.set(self, "self_managed", value)
|
|
2924
|
-
|
|
2925
2905
|
@_builtins.property
|
|
2926
2906
|
@pulumi.getter(name="splitStatements")
|
|
2927
2907
|
def split_statements(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
@@ -9378,10 +9358,6 @@ if not MYPY:
|
|
|
9378
9358
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
|
9379
9359
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
|
9380
9360
|
"""
|
|
9381
|
-
self_managed: NotRequired[pulumi.Input[_builtins.bool]]
|
|
9382
|
-
"""
|
|
9383
|
-
If set, allows onboarding static roles with a rootless connection configuration.
|
|
9384
|
-
"""
|
|
9385
9361
|
split_statements: NotRequired[pulumi.Input[_builtins.bool]]
|
|
9386
9362
|
"""
|
|
9387
9363
|
Set to true in order to split statements after semi-colons.
|
|
@@ -9422,7 +9398,6 @@ class SecretsMountOracleArgs:
|
|
|
9422
9398
|
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
9423
9399
|
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
|
9424
9400
|
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
|
9425
|
-
self_managed: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
9426
9401
|
split_statements: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
9427
9402
|
username: Optional[pulumi.Input[_builtins.str]] = None,
|
|
9428
9403
|
username_template: Optional[pulumi.Input[_builtins.str]] = None,
|
|
@@ -9453,7 +9428,6 @@ class SecretsMountOracleArgs:
|
|
|
9453
9428
|
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
|
9454
9429
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
|
9455
9430
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
|
9456
|
-
:param pulumi.Input[_builtins.bool] self_managed: If set, allows onboarding static roles with a rootless connection configuration.
|
|
9457
9431
|
:param pulumi.Input[_builtins.bool] split_statements: Set to true in order to split statements after semi-colons.
|
|
9458
9432
|
:param pulumi.Input[_builtins.str] username: The root credential username used in the connection URL
|
|
9459
9433
|
:param pulumi.Input[_builtins.str] username_template: Username generation template.
|
|
@@ -9493,8 +9467,6 @@ class SecretsMountOracleArgs:
|
|
|
9493
9467
|
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
|
9494
9468
|
if rotation_window is not None:
|
|
9495
9469
|
pulumi.set(__self__, "rotation_window", rotation_window)
|
|
9496
|
-
if self_managed is not None:
|
|
9497
|
-
pulumi.set(__self__, "self_managed", self_managed)
|
|
9498
9470
|
if split_statements is not None:
|
|
9499
9471
|
pulumi.set(__self__, "split_statements", split_statements)
|
|
9500
9472
|
if username is not None:
|
|
@@ -9716,18 +9688,6 @@ class SecretsMountOracleArgs:
|
|
|
9716
9688
|
def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
9717
9689
|
pulumi.set(self, "rotation_window", value)
|
|
9718
9690
|
|
|
9719
|
-
@_builtins.property
|
|
9720
|
-
@pulumi.getter(name="selfManaged")
|
|
9721
|
-
def self_managed(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
9722
|
-
"""
|
|
9723
|
-
If set, allows onboarding static roles with a rootless connection configuration.
|
|
9724
|
-
"""
|
|
9725
|
-
return pulumi.get(self, "self_managed")
|
|
9726
|
-
|
|
9727
|
-
@self_managed.setter
|
|
9728
|
-
def self_managed(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
9729
|
-
pulumi.set(self, "self_managed", value)
|
|
9730
|
-
|
|
9731
9691
|
@_builtins.property
|
|
9732
9692
|
@pulumi.getter(name="splitStatements")
|
|
9733
9693
|
def split_statements(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
@@ -1996,8 +1996,6 @@ class SecretBackendConnectionOracle(dict):
|
|
|
1996
1996
|
suggest = "password_wo"
|
|
1997
1997
|
elif key == "passwordWoVersion":
|
|
1998
1998
|
suggest = "password_wo_version"
|
|
1999
|
-
elif key == "selfManaged":
|
|
2000
|
-
suggest = "self_managed"
|
|
2001
1999
|
elif key == "splitStatements":
|
|
2002
2000
|
suggest = "split_statements"
|
|
2003
2001
|
elif key == "usernameTemplate":
|
|
@@ -2023,7 +2021,6 @@ class SecretBackendConnectionOracle(dict):
|
|
|
2023
2021
|
password: Optional[_builtins.str] = None,
|
|
2024
2022
|
password_wo: Optional[_builtins.str] = None,
|
|
2025
2023
|
password_wo_version: Optional[_builtins.int] = None,
|
|
2026
|
-
self_managed: Optional[_builtins.bool] = None,
|
|
2027
2024
|
split_statements: Optional[_builtins.bool] = None,
|
|
2028
2025
|
username: Optional[_builtins.str] = None,
|
|
2029
2026
|
username_template: Optional[_builtins.str] = None):
|
|
@@ -2037,7 +2034,6 @@ class SecretBackendConnectionOracle(dict):
|
|
|
2037
2034
|
:param _builtins.str password_wo: **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
|
|
2038
2035
|
Write-only field for the root credential password used in the connection URL
|
|
2039
2036
|
:param _builtins.int password_wo_version: Version counter for root credential password write-only field
|
|
2040
|
-
:param _builtins.bool self_managed: If set, allows onboarding static roles with a rootless connection configuration.
|
|
2041
2037
|
:param _builtins.bool split_statements: Set to true in order to split statements after semi-colons.
|
|
2042
2038
|
:param _builtins.str username: The root credential username used in the connection URL
|
|
2043
2039
|
:param _builtins.str username_template: Username generation template.
|
|
@@ -2058,8 +2054,6 @@ class SecretBackendConnectionOracle(dict):
|
|
|
2058
2054
|
pulumi.set(__self__, "password_wo", password_wo)
|
|
2059
2055
|
if password_wo_version is not None:
|
|
2060
2056
|
pulumi.set(__self__, "password_wo_version", password_wo_version)
|
|
2061
|
-
if self_managed is not None:
|
|
2062
|
-
pulumi.set(__self__, "self_managed", self_managed)
|
|
2063
2057
|
if split_statements is not None:
|
|
2064
2058
|
pulumi.set(__self__, "split_statements", split_statements)
|
|
2065
2059
|
if username is not None:
|
|
@@ -2132,14 +2126,6 @@ class SecretBackendConnectionOracle(dict):
|
|
|
2132
2126
|
"""
|
|
2133
2127
|
return pulumi.get(self, "password_wo_version")
|
|
2134
2128
|
|
|
2135
|
-
@_builtins.property
|
|
2136
|
-
@pulumi.getter(name="selfManaged")
|
|
2137
|
-
def self_managed(self) -> Optional[_builtins.bool]:
|
|
2138
|
-
"""
|
|
2139
|
-
If set, allows onboarding static roles with a rootless connection configuration.
|
|
2140
|
-
"""
|
|
2141
|
-
return pulumi.get(self, "self_managed")
|
|
2142
|
-
|
|
2143
2129
|
@_builtins.property
|
|
2144
2130
|
@pulumi.getter(name="splitStatements")
|
|
2145
2131
|
def split_statements(self) -> Optional[_builtins.bool]:
|
|
@@ -6690,8 +6676,6 @@ class SecretsMountOracle(dict):
|
|
|
6690
6676
|
suggest = "rotation_schedule"
|
|
6691
6677
|
elif key == "rotationWindow":
|
|
6692
6678
|
suggest = "rotation_window"
|
|
6693
|
-
elif key == "selfManaged":
|
|
6694
|
-
suggest = "self_managed"
|
|
6695
6679
|
elif key == "splitStatements":
|
|
6696
6680
|
suggest = "split_statements"
|
|
6697
6681
|
elif key == "usernameTemplate":
|
|
@@ -6728,7 +6712,6 @@ class SecretsMountOracle(dict):
|
|
|
6728
6712
|
rotation_period: Optional[_builtins.int] = None,
|
|
6729
6713
|
rotation_schedule: Optional[_builtins.str] = None,
|
|
6730
6714
|
rotation_window: Optional[_builtins.int] = None,
|
|
6731
|
-
self_managed: Optional[_builtins.bool] = None,
|
|
6732
6715
|
split_statements: Optional[_builtins.bool] = None,
|
|
6733
6716
|
username: Optional[_builtins.str] = None,
|
|
6734
6717
|
username_template: Optional[_builtins.str] = None,
|
|
@@ -6759,7 +6742,6 @@ class SecretsMountOracle(dict):
|
|
|
6759
6742
|
:param _builtins.int rotation_window: The maximum amount of time in seconds allowed to complete
|
|
6760
6743
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
|
6761
6744
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
|
6762
|
-
:param _builtins.bool self_managed: If set, allows onboarding static roles with a rootless connection configuration.
|
|
6763
6745
|
:param _builtins.bool split_statements: Set to true in order to split statements after semi-colons.
|
|
6764
6746
|
:param _builtins.str username: The root credential username used in the connection URL
|
|
6765
6747
|
:param _builtins.str username_template: Username generation template.
|
|
@@ -6799,8 +6781,6 @@ class SecretsMountOracle(dict):
|
|
|
6799
6781
|
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
|
6800
6782
|
if rotation_window is not None:
|
|
6801
6783
|
pulumi.set(__self__, "rotation_window", rotation_window)
|
|
6802
|
-
if self_managed is not None:
|
|
6803
|
-
pulumi.set(__self__, "self_managed", self_managed)
|
|
6804
6784
|
if split_statements is not None:
|
|
6805
6785
|
pulumi.set(__self__, "split_statements", split_statements)
|
|
6806
6786
|
if username is not None:
|
|
@@ -6954,14 +6934,6 @@ class SecretsMountOracle(dict):
|
|
|
6954
6934
|
"""
|
|
6955
6935
|
return pulumi.get(self, "rotation_window")
|
|
6956
6936
|
|
|
6957
|
-
@_builtins.property
|
|
6958
|
-
@pulumi.getter(name="selfManaged")
|
|
6959
|
-
def self_managed(self) -> Optional[_builtins.bool]:
|
|
6960
|
-
"""
|
|
6961
|
-
If set, allows onboarding static roles with a rootless connection configuration.
|
|
6962
|
-
"""
|
|
6963
|
-
return pulumi.get(self, "self_managed")
|
|
6964
|
-
|
|
6965
6937
|
@_builtins.property
|
|
6966
6938
|
@pulumi.getter(name="splitStatements")
|
|
6967
6939
|
def split_statements(self) -> Optional[_builtins.bool]:
|
|
@@ -1077,8 +1077,6 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
|
1077
1077
|
"""
|
|
1078
1078
|
## Example Usage
|
|
1079
1079
|
|
|
1080
|
-
### PostgreSQL Connection
|
|
1081
|
-
|
|
1082
1080
|
```python
|
|
1083
1081
|
import pulumi
|
|
1084
1082
|
import pulumi_vault as vault
|
|
@@ -1100,37 +1098,6 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
|
1100
1098
|
})
|
|
1101
1099
|
```
|
|
1102
1100
|
|
|
1103
|
-
### Oracle Connection with Self-Managed Mode (Rootless)
|
|
1104
|
-
|
|
1105
|
-
For Vault 1.18+ Enterprise, you can configure Oracle connections in self-managed mode,
|
|
1106
|
-
which allows a static role to manage its own database credentials without requiring root access:
|
|
1107
|
-
|
|
1108
|
-
```python
|
|
1109
|
-
import pulumi
|
|
1110
|
-
import pulumi_vault as vault
|
|
1111
|
-
|
|
1112
|
-
db = vault.Mount("db",
|
|
1113
|
-
path="database",
|
|
1114
|
-
type="database")
|
|
1115
|
-
oracle = vault.database.SecretBackendConnection("oracle",
|
|
1116
|
-
backend=db.path,
|
|
1117
|
-
name="oracle",
|
|
1118
|
-
allowed_roles=["my-role"],
|
|
1119
|
-
oracle={
|
|
1120
|
-
"connection_url": "{{username}}/{{password}}@//host:port/service",
|
|
1121
|
-
"self_managed": True,
|
|
1122
|
-
"plugin_name": "vault-plugin-database-oracle",
|
|
1123
|
-
})
|
|
1124
|
-
oracle_role = vault.database.SecretBackendStaticRole("oracle_role",
|
|
1125
|
-
backend=db.path,
|
|
1126
|
-
name="my-role",
|
|
1127
|
-
db_name=oracle.name,
|
|
1128
|
-
username="vault_user",
|
|
1129
|
-
password_wo="initial-password",
|
|
1130
|
-
password_wo_version=1,
|
|
1131
|
-
rotation_period=3600)
|
|
1132
|
-
```
|
|
1133
|
-
|
|
1134
1101
|
## Ephemeral Attributes Reference
|
|
1135
1102
|
|
|
1136
1103
|
The following write-only attributes are supported for all DBs that support username/password:
|
|
@@ -1204,8 +1171,6 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
|
1204
1171
|
"""
|
|
1205
1172
|
## Example Usage
|
|
1206
1173
|
|
|
1207
|
-
### PostgreSQL Connection
|
|
1208
|
-
|
|
1209
1174
|
```python
|
|
1210
1175
|
import pulumi
|
|
1211
1176
|
import pulumi_vault as vault
|
|
@@ -1227,37 +1192,6 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
|
1227
1192
|
})
|
|
1228
1193
|
```
|
|
1229
1194
|
|
|
1230
|
-
### Oracle Connection with Self-Managed Mode (Rootless)
|
|
1231
|
-
|
|
1232
|
-
For Vault 1.18+ Enterprise, you can configure Oracle connections in self-managed mode,
|
|
1233
|
-
which allows a static role to manage its own database credentials without requiring root access:
|
|
1234
|
-
|
|
1235
|
-
```python
|
|
1236
|
-
import pulumi
|
|
1237
|
-
import pulumi_vault as vault
|
|
1238
|
-
|
|
1239
|
-
db = vault.Mount("db",
|
|
1240
|
-
path="database",
|
|
1241
|
-
type="database")
|
|
1242
|
-
oracle = vault.database.SecretBackendConnection("oracle",
|
|
1243
|
-
backend=db.path,
|
|
1244
|
-
name="oracle",
|
|
1245
|
-
allowed_roles=["my-role"],
|
|
1246
|
-
oracle={
|
|
1247
|
-
"connection_url": "{{username}}/{{password}}@//host:port/service",
|
|
1248
|
-
"self_managed": True,
|
|
1249
|
-
"plugin_name": "vault-plugin-database-oracle",
|
|
1250
|
-
})
|
|
1251
|
-
oracle_role = vault.database.SecretBackendStaticRole("oracle_role",
|
|
1252
|
-
backend=db.path,
|
|
1253
|
-
name="my-role",
|
|
1254
|
-
db_name=oracle.name,
|
|
1255
|
-
username="vault_user",
|
|
1256
|
-
password_wo="initial-password",
|
|
1257
|
-
password_wo_version=1,
|
|
1258
|
-
rotation_period=3600)
|
|
1259
|
-
```
|
|
1260
|
-
|
|
1261
1195
|
## Ephemeral Attributes Reference
|
|
1262
1196
|
|
|
1263
1197
|
The following write-only attributes are supported for all DBs that support username/password:
|
|
@@ -26,8 +26,6 @@ class SecretBackendStaticRoleArgs:
|
|
|
26
26
|
credential_type: Optional[pulumi.Input[_builtins.str]] = None,
|
|
27
27
|
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
28
28
|
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
29
|
-
password_wo: Optional[pulumi.Input[_builtins.str]] = None,
|
|
30
|
-
password_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
|
|
31
29
|
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
32
30
|
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
|
33
31
|
rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
@@ -45,13 +43,6 @@ class SecretBackendStaticRoleArgs:
|
|
|
45
43
|
The value should not contain leading or trailing forward slashes.
|
|
46
44
|
The `namespace` is always relative to the provider's configured namespace.
|
|
47
45
|
*Available only for Vault Enterprise*.
|
|
48
|
-
:param pulumi.Input[_builtins.str] password_wo: **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
|
|
49
|
-
The password corresponding to the username in the database.
|
|
50
|
-
This is a write-only field. Requires Vault 1.19+. Deprecates `self_managed_password` which was introduced in Vault 1.18.
|
|
51
|
-
Cannot be used with `self_managed_password`.
|
|
52
|
-
:param pulumi.Input[_builtins.int] password_wo_version: The version of the `password_wo` field.
|
|
53
|
-
Used for tracking changes to the write-only password field. For more info see
|
|
54
|
-
updating write-only attributes.
|
|
55
46
|
:param pulumi.Input[_builtins.int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
|
|
56
47
|
Mutually exclusive with `rotation_schedule`.
|
|
57
48
|
:param pulumi.Input[_builtins.str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
|
|
@@ -65,7 +56,6 @@ class SecretBackendStaticRoleArgs:
|
|
|
65
56
|
:param pulumi.Input[_builtins.str] self_managed_password: The password corresponding to the username in the database.
|
|
66
57
|
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
|
67
58
|
select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
|
|
68
|
-
**Deprecated**: Use `password_wo` instead. This field will be removed in a future version.
|
|
69
59
|
:param pulumi.Input[_builtins.bool] skip_import_rotation: If set to true, Vault will skip the
|
|
70
60
|
initial secret rotation on import. Requires Vault 1.18+ Enterprise.
|
|
71
61
|
"""
|
|
@@ -80,10 +70,6 @@ class SecretBackendStaticRoleArgs:
|
|
|
80
70
|
pulumi.set(__self__, "name", name)
|
|
81
71
|
if namespace is not None:
|
|
82
72
|
pulumi.set(__self__, "namespace", namespace)
|
|
83
|
-
if password_wo is not None:
|
|
84
|
-
pulumi.set(__self__, "password_wo", password_wo)
|
|
85
|
-
if password_wo_version is not None:
|
|
86
|
-
pulumi.set(__self__, "password_wo_version", password_wo_version)
|
|
87
73
|
if rotation_period is not None:
|
|
88
74
|
pulumi.set(__self__, "rotation_period", rotation_period)
|
|
89
75
|
if rotation_schedule is not None:
|
|
@@ -181,35 +167,6 @@ class SecretBackendStaticRoleArgs:
|
|
|
181
167
|
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
182
168
|
pulumi.set(self, "namespace", value)
|
|
183
169
|
|
|
184
|
-
@_builtins.property
|
|
185
|
-
@pulumi.getter(name="passwordWo")
|
|
186
|
-
def password_wo(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
187
|
-
"""
|
|
188
|
-
**NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
|
|
189
|
-
The password corresponding to the username in the database.
|
|
190
|
-
This is a write-only field. Requires Vault 1.19+. Deprecates `self_managed_password` which was introduced in Vault 1.18.
|
|
191
|
-
Cannot be used with `self_managed_password`.
|
|
192
|
-
"""
|
|
193
|
-
return pulumi.get(self, "password_wo")
|
|
194
|
-
|
|
195
|
-
@password_wo.setter
|
|
196
|
-
def password_wo(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
197
|
-
pulumi.set(self, "password_wo", value)
|
|
198
|
-
|
|
199
|
-
@_builtins.property
|
|
200
|
-
@pulumi.getter(name="passwordWoVersion")
|
|
201
|
-
def password_wo_version(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
202
|
-
"""
|
|
203
|
-
The version of the `password_wo` field.
|
|
204
|
-
Used for tracking changes to the write-only password field. For more info see
|
|
205
|
-
updating write-only attributes.
|
|
206
|
-
"""
|
|
207
|
-
return pulumi.get(self, "password_wo_version")
|
|
208
|
-
|
|
209
|
-
@password_wo_version.setter
|
|
210
|
-
def password_wo_version(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
211
|
-
pulumi.set(self, "password_wo_version", value)
|
|
212
|
-
|
|
213
170
|
@_builtins.property
|
|
214
171
|
@pulumi.getter(name="rotationPeriod")
|
|
215
172
|
def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
@@ -271,7 +228,6 @@ class SecretBackendStaticRoleArgs:
|
|
|
271
228
|
The password corresponding to the username in the database.
|
|
272
229
|
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
|
273
230
|
select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
|
|
274
|
-
**Deprecated**: Use `password_wo` instead. This field will be removed in a future version.
|
|
275
231
|
"""
|
|
276
232
|
return pulumi.get(self, "self_managed_password")
|
|
277
233
|
|
|
@@ -302,8 +258,6 @@ class _SecretBackendStaticRoleState:
|
|
|
302
258
|
db_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
303
259
|
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
304
260
|
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
305
|
-
password_wo: Optional[pulumi.Input[_builtins.str]] = None,
|
|
306
|
-
password_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
|
|
307
261
|
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
308
262
|
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
|
309
263
|
rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
@@ -321,13 +275,6 @@ class _SecretBackendStaticRoleState:
|
|
|
321
275
|
The value should not contain leading or trailing forward slashes.
|
|
322
276
|
The `namespace` is always relative to the provider's configured namespace.
|
|
323
277
|
*Available only for Vault Enterprise*.
|
|
324
|
-
:param pulumi.Input[_builtins.str] password_wo: **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
|
|
325
|
-
The password corresponding to the username in the database.
|
|
326
|
-
This is a write-only field. Requires Vault 1.19+. Deprecates `self_managed_password` which was introduced in Vault 1.18.
|
|
327
|
-
Cannot be used with `self_managed_password`.
|
|
328
|
-
:param pulumi.Input[_builtins.int] password_wo_version: The version of the `password_wo` field.
|
|
329
|
-
Used for tracking changes to the write-only password field. For more info see
|
|
330
|
-
updating write-only attributes.
|
|
331
278
|
:param pulumi.Input[_builtins.int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
|
|
332
279
|
Mutually exclusive with `rotation_schedule`.
|
|
333
280
|
:param pulumi.Input[_builtins.str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
|
|
@@ -341,7 +288,6 @@ class _SecretBackendStaticRoleState:
|
|
|
341
288
|
:param pulumi.Input[_builtins.str] self_managed_password: The password corresponding to the username in the database.
|
|
342
289
|
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
|
343
290
|
select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
|
|
344
|
-
**Deprecated**: Use `password_wo` instead. This field will be removed in a future version.
|
|
345
291
|
:param pulumi.Input[_builtins.bool] skip_import_rotation: If set to true, Vault will skip the
|
|
346
292
|
initial secret rotation on import. Requires Vault 1.18+ Enterprise.
|
|
347
293
|
:param pulumi.Input[_builtins.str] username: The database username that this static role corresponds to.
|
|
@@ -358,10 +304,6 @@ class _SecretBackendStaticRoleState:
|
|
|
358
304
|
pulumi.set(__self__, "name", name)
|
|
359
305
|
if namespace is not None:
|
|
360
306
|
pulumi.set(__self__, "namespace", namespace)
|
|
361
|
-
if password_wo is not None:
|
|
362
|
-
pulumi.set(__self__, "password_wo", password_wo)
|
|
363
|
-
if password_wo_version is not None:
|
|
364
|
-
pulumi.set(__self__, "password_wo_version", password_wo_version)
|
|
365
307
|
if rotation_period is not None:
|
|
366
308
|
pulumi.set(__self__, "rotation_period", rotation_period)
|
|
367
309
|
if rotation_schedule is not None:
|
|
@@ -449,35 +391,6 @@ class _SecretBackendStaticRoleState:
|
|
|
449
391
|
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
450
392
|
pulumi.set(self, "namespace", value)
|
|
451
393
|
|
|
452
|
-
@_builtins.property
|
|
453
|
-
@pulumi.getter(name="passwordWo")
|
|
454
|
-
def password_wo(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
455
|
-
"""
|
|
456
|
-
**NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
|
|
457
|
-
The password corresponding to the username in the database.
|
|
458
|
-
This is a write-only field. Requires Vault 1.19+. Deprecates `self_managed_password` which was introduced in Vault 1.18.
|
|
459
|
-
Cannot be used with `self_managed_password`.
|
|
460
|
-
"""
|
|
461
|
-
return pulumi.get(self, "password_wo")
|
|
462
|
-
|
|
463
|
-
@password_wo.setter
|
|
464
|
-
def password_wo(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
465
|
-
pulumi.set(self, "password_wo", value)
|
|
466
|
-
|
|
467
|
-
@_builtins.property
|
|
468
|
-
@pulumi.getter(name="passwordWoVersion")
|
|
469
|
-
def password_wo_version(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
470
|
-
"""
|
|
471
|
-
The version of the `password_wo` field.
|
|
472
|
-
Used for tracking changes to the write-only password field. For more info see
|
|
473
|
-
updating write-only attributes.
|
|
474
|
-
"""
|
|
475
|
-
return pulumi.get(self, "password_wo_version")
|
|
476
|
-
|
|
477
|
-
@password_wo_version.setter
|
|
478
|
-
def password_wo_version(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
479
|
-
pulumi.set(self, "password_wo_version", value)
|
|
480
|
-
|
|
481
394
|
@_builtins.property
|
|
482
395
|
@pulumi.getter(name="rotationPeriod")
|
|
483
396
|
def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
@@ -539,7 +452,6 @@ class _SecretBackendStaticRoleState:
|
|
|
539
452
|
The password corresponding to the username in the database.
|
|
540
453
|
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
|
541
454
|
select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
|
|
542
|
-
**Deprecated**: Use `password_wo` instead. This field will be removed in a future version.
|
|
543
455
|
"""
|
|
544
456
|
return pulumi.get(self, "self_managed_password")
|
|
545
457
|
|
|
@@ -585,8 +497,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
|
585
497
|
db_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
586
498
|
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
587
499
|
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
588
|
-
password_wo: Optional[pulumi.Input[_builtins.str]] = None,
|
|
589
|
-
password_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
|
|
590
500
|
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
591
501
|
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
|
592
502
|
rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
@@ -633,16 +543,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
|
633
543
|
rotation_schedule="0 0 * * SAT",
|
|
634
544
|
rotation_window=172800,
|
|
635
545
|
rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
|
|
636
|
-
# configure a static role with a password (Vault 1.19+)
|
|
637
|
-
password_role = vault.database.SecretBackendStaticRole("password_role",
|
|
638
|
-
backend=db.path,
|
|
639
|
-
name="my-password-role",
|
|
640
|
-
db_name=postgres.name,
|
|
641
|
-
username="example",
|
|
642
|
-
password_wo="my-password",
|
|
643
|
-
password_wo_version=1,
|
|
644
|
-
rotation_period=3600,
|
|
645
|
-
rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
|
|
646
546
|
```
|
|
647
547
|
|
|
648
548
|
## Import
|
|
@@ -663,13 +563,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
|
663
563
|
The value should not contain leading or trailing forward slashes.
|
|
664
564
|
The `namespace` is always relative to the provider's configured namespace.
|
|
665
565
|
*Available only for Vault Enterprise*.
|
|
666
|
-
:param pulumi.Input[_builtins.str] password_wo: **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
|
|
667
|
-
The password corresponding to the username in the database.
|
|
668
|
-
This is a write-only field. Requires Vault 1.19+. Deprecates `self_managed_password` which was introduced in Vault 1.18.
|
|
669
|
-
Cannot be used with `self_managed_password`.
|
|
670
|
-
:param pulumi.Input[_builtins.int] password_wo_version: The version of the `password_wo` field.
|
|
671
|
-
Used for tracking changes to the write-only password field. For more info see
|
|
672
|
-
updating write-only attributes.
|
|
673
566
|
:param pulumi.Input[_builtins.int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
|
|
674
567
|
Mutually exclusive with `rotation_schedule`.
|
|
675
568
|
:param pulumi.Input[_builtins.str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
|
|
@@ -683,7 +576,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
|
683
576
|
:param pulumi.Input[_builtins.str] self_managed_password: The password corresponding to the username in the database.
|
|
684
577
|
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
|
685
578
|
select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
|
|
686
|
-
**Deprecated**: Use `password_wo` instead. This field will be removed in a future version.
|
|
687
579
|
:param pulumi.Input[_builtins.bool] skip_import_rotation: If set to true, Vault will skip the
|
|
688
580
|
initial secret rotation on import. Requires Vault 1.18+ Enterprise.
|
|
689
581
|
:param pulumi.Input[_builtins.str] username: The database username that this static role corresponds to.
|
|
@@ -732,16 +624,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
|
732
624
|
rotation_schedule="0 0 * * SAT",
|
|
733
625
|
rotation_window=172800,
|
|
734
626
|
rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
|
|
735
|
-
# configure a static role with a password (Vault 1.19+)
|
|
736
|
-
password_role = vault.database.SecretBackendStaticRole("password_role",
|
|
737
|
-
backend=db.path,
|
|
738
|
-
name="my-password-role",
|
|
739
|
-
db_name=postgres.name,
|
|
740
|
-
username="example",
|
|
741
|
-
password_wo="my-password",
|
|
742
|
-
password_wo_version=1,
|
|
743
|
-
rotation_period=3600,
|
|
744
|
-
rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
|
|
745
627
|
```
|
|
746
628
|
|
|
747
629
|
## Import
|
|
@@ -773,8 +655,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
|
773
655
|
db_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
774
656
|
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
775
657
|
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
776
|
-
password_wo: Optional[pulumi.Input[_builtins.str]] = None,
|
|
777
|
-
password_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
|
|
778
658
|
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
779
659
|
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
|
780
660
|
rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
@@ -801,8 +681,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
|
801
681
|
__props__.__dict__["db_name"] = db_name
|
|
802
682
|
__props__.__dict__["name"] = name
|
|
803
683
|
__props__.__dict__["namespace"] = namespace
|
|
804
|
-
__props__.__dict__["password_wo"] = None if password_wo is None else pulumi.Output.secret(password_wo)
|
|
805
|
-
__props__.__dict__["password_wo_version"] = password_wo_version
|
|
806
684
|
__props__.__dict__["rotation_period"] = rotation_period
|
|
807
685
|
__props__.__dict__["rotation_schedule"] = rotation_schedule
|
|
808
686
|
__props__.__dict__["rotation_statements"] = rotation_statements
|
|
@@ -812,7 +690,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
|
812
690
|
if username is None and not opts.urn:
|
|
813
691
|
raise TypeError("Missing required property 'username'")
|
|
814
692
|
__props__.__dict__["username"] = username
|
|
815
|
-
secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["
|
|
693
|
+
secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["selfManagedPassword"])
|
|
816
694
|
opts = pulumi.ResourceOptions.merge(opts, secret_opts)
|
|
817
695
|
super(SecretBackendStaticRole, __self__).__init__(
|
|
818
696
|
'vault:database/secretBackendStaticRole:SecretBackendStaticRole',
|
|
@@ -830,8 +708,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
|
830
708
|
db_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
831
709
|
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
832
710
|
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
833
|
-
password_wo: Optional[pulumi.Input[_builtins.str]] = None,
|
|
834
|
-
password_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
|
|
835
711
|
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
836
712
|
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
|
837
713
|
rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
@@ -854,13 +730,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
|
854
730
|
The value should not contain leading or trailing forward slashes.
|
|
855
731
|
The `namespace` is always relative to the provider's configured namespace.
|
|
856
732
|
*Available only for Vault Enterprise*.
|
|
857
|
-
:param pulumi.Input[_builtins.str] password_wo: **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
|
|
858
|
-
The password corresponding to the username in the database.
|
|
859
|
-
This is a write-only field. Requires Vault 1.19+. Deprecates `self_managed_password` which was introduced in Vault 1.18.
|
|
860
|
-
Cannot be used with `self_managed_password`.
|
|
861
|
-
:param pulumi.Input[_builtins.int] password_wo_version: The version of the `password_wo` field.
|
|
862
|
-
Used for tracking changes to the write-only password field. For more info see
|
|
863
|
-
updating write-only attributes.
|
|
864
733
|
:param pulumi.Input[_builtins.int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
|
|
865
734
|
Mutually exclusive with `rotation_schedule`.
|
|
866
735
|
:param pulumi.Input[_builtins.str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
|
|
@@ -874,7 +743,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
|
874
743
|
:param pulumi.Input[_builtins.str] self_managed_password: The password corresponding to the username in the database.
|
|
875
744
|
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
|
876
745
|
select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
|
|
877
|
-
**Deprecated**: Use `password_wo` instead. This field will be removed in a future version.
|
|
878
746
|
:param pulumi.Input[_builtins.bool] skip_import_rotation: If set to true, Vault will skip the
|
|
879
747
|
initial secret rotation on import. Requires Vault 1.18+ Enterprise.
|
|
880
748
|
:param pulumi.Input[_builtins.str] username: The database username that this static role corresponds to.
|
|
@@ -889,8 +757,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
|
889
757
|
__props__.__dict__["db_name"] = db_name
|
|
890
758
|
__props__.__dict__["name"] = name
|
|
891
759
|
__props__.__dict__["namespace"] = namespace
|
|
892
|
-
__props__.__dict__["password_wo"] = password_wo
|
|
893
|
-
__props__.__dict__["password_wo_version"] = password_wo_version
|
|
894
760
|
__props__.__dict__["rotation_period"] = rotation_period
|
|
895
761
|
__props__.__dict__["rotation_schedule"] = rotation_schedule
|
|
896
762
|
__props__.__dict__["rotation_statements"] = rotation_statements
|
|
@@ -948,27 +814,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
|
948
814
|
"""
|
|
949
815
|
return pulumi.get(self, "namespace")
|
|
950
816
|
|
|
951
|
-
@_builtins.property
|
|
952
|
-
@pulumi.getter(name="passwordWo")
|
|
953
|
-
def password_wo(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
954
|
-
"""
|
|
955
|
-
**NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
|
|
956
|
-
The password corresponding to the username in the database.
|
|
957
|
-
This is a write-only field. Requires Vault 1.19+. Deprecates `self_managed_password` which was introduced in Vault 1.18.
|
|
958
|
-
Cannot be used with `self_managed_password`.
|
|
959
|
-
"""
|
|
960
|
-
return pulumi.get(self, "password_wo")
|
|
961
|
-
|
|
962
|
-
@_builtins.property
|
|
963
|
-
@pulumi.getter(name="passwordWoVersion")
|
|
964
|
-
def password_wo_version(self) -> pulumi.Output[Optional[_builtins.int]]:
|
|
965
|
-
"""
|
|
966
|
-
The version of the `password_wo` field.
|
|
967
|
-
Used for tracking changes to the write-only password field. For more info see
|
|
968
|
-
updating write-only attributes.
|
|
969
|
-
"""
|
|
970
|
-
return pulumi.get(self, "password_wo_version")
|
|
971
|
-
|
|
972
817
|
@_builtins.property
|
|
973
818
|
@pulumi.getter(name="rotationPeriod")
|
|
974
819
|
def rotation_period(self) -> pulumi.Output[Optional[_builtins.int]]:
|
|
@@ -1014,7 +859,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
|
1014
859
|
The password corresponding to the username in the database.
|
|
1015
860
|
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
|
1016
861
|
select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
|
|
1017
|
-
**Deprecated**: Use `password_wo` instead. This field will be removed in a future version.
|
|
1018
862
|
"""
|
|
1019
863
|
return pulumi.get(self, "self_managed_password")
|
|
1020
864
|
|