pulumi-vault 5.15.0a1693982937__tar.gz → 5.16.0a1694757730__tar.gz

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (227) hide show
  1. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/PKG-INFO +1 -1
  2. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/aws/auth_backend_client.py +78 -3
  3. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/aws/auth_backend_role.py +7 -7
  4. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/azure/backend_role.py +61 -7
  5. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/gcp/auth_backend.py +28 -0
  6. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/mount.py +8 -0
  7. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/pkisecret/secret_backend_role.py +7 -7
  8. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault.egg-info/PKG-INFO +1 -1
  9. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/setup.py +2 -2
  10. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/README.md +0 -0
  11. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/__init__.py +0 -0
  12. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/_inputs.py +0 -0
  13. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/_utilities.py +0 -0
  14. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/ad/__init__.py +0 -0
  15. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/ad/get_access_credentials.py +0 -0
  16. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/ad/secret_backend.py +0 -0
  17. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/ad/secret_library.py +0 -0
  18. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/ad/secret_role.py +0 -0
  19. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/alicloud/__init__.py +0 -0
  20. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/alicloud/auth_backend_role.py +0 -0
  21. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/approle/__init__.py +0 -0
  22. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/approle/auth_backend_login.py +0 -0
  23. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/approle/auth_backend_role.py +0 -0
  24. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/approle/auth_backend_role_secret_id.py +0 -0
  25. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/approle/get_auth_backend_role_id.py +0 -0
  26. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/audit.py +0 -0
  27. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/audit_request_header.py +0 -0
  28. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/auth_backend.py +0 -0
  29. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/aws/__init__.py +0 -0
  30. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/aws/auth_backend_cert.py +0 -0
  31. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/aws/auth_backend_config_identity.py +0 -0
  32. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -0
  33. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/aws/auth_backend_login.py +0 -0
  34. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/aws/auth_backend_role_tag.py +0 -0
  35. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -0
  36. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/aws/auth_backend_sts_role.py +0 -0
  37. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/aws/get_access_credentials.py +0 -0
  38. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/aws/secret_backend.py +0 -0
  39. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/aws/secret_backend_role.py +0 -0
  40. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/aws/secret_backend_static_role.py +0 -0
  41. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/azure/__init__.py +0 -0
  42. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/azure/_inputs.py +0 -0
  43. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/azure/auth_backend_config.py +0 -0
  44. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/azure/auth_backend_role.py +0 -0
  45. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/azure/backend.py +0 -0
  46. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/azure/get_access_credentials.py +0 -0
  47. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/azure/outputs.py +0 -0
  48. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/cert_auth_backend_role.py +0 -0
  49. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/config/__init__.py +0 -0
  50. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/config/outputs.py +0 -0
  51. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/config/vars.py +0 -0
  52. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/consul/__init__.py +0 -0
  53. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/consul/secret_backend.py +0 -0
  54. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/consul/secret_backend_role.py +0 -0
  55. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/database/__init__.py +0 -0
  56. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/database/_inputs.py +0 -0
  57. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/database/outputs.py +0 -0
  58. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/database/secret_backend_connection.py +0 -0
  59. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/database/secret_backend_role.py +0 -0
  60. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/database/secret_backend_static_role.py +0 -0
  61. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/database/secrets_mount.py +0 -0
  62. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/egp_policy.py +0 -0
  63. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/gcp/__init__.py +0 -0
  64. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/gcp/_inputs.py +0 -0
  65. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/gcp/auth_backend_role.py +0 -0
  66. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/gcp/get_auth_backend_role.py +0 -0
  67. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/gcp/outputs.py +0 -0
  68. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/gcp/secret_backend.py +0 -0
  69. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/gcp/secret_impersonated_account.py +0 -0
  70. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/gcp/secret_roleset.py +0 -0
  71. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/gcp/secret_static_account.py +0 -0
  72. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/generic/__init__.py +0 -0
  73. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/generic/endpoint.py +0 -0
  74. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/generic/get_secret.py +0 -0
  75. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/generic/secret.py +0 -0
  76. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/get_auth_backend.py +0 -0
  77. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/get_nomad_access_token.py +0 -0
  78. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/get_policy_document.py +0 -0
  79. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/github/__init__.py +0 -0
  80. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/github/_inputs.py +0 -0
  81. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/github/auth_backend.py +0 -0
  82. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/github/outputs.py +0 -0
  83. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/github/team.py +0 -0
  84. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/github/user.py +0 -0
  85. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/__init__.py +0 -0
  86. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/entity.py +0 -0
  87. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/entity_alias.py +0 -0
  88. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/entity_policies.py +0 -0
  89. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/get_entity.py +0 -0
  90. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/get_group.py +0 -0
  91. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/get_oidc_client_creds.py +0 -0
  92. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/get_oidc_openid_config.py +0 -0
  93. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/get_oidc_public_keys.py +0 -0
  94. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/group.py +0 -0
  95. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/group_alias.py +0 -0
  96. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/group_member_entity_ids.py +0 -0
  97. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/group_member_group_ids.py +0 -0
  98. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/group_policies.py +0 -0
  99. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/mfa_duo.py +0 -0
  100. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/mfa_login_enforcement.py +0 -0
  101. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/mfa_okta.py +0 -0
  102. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/mfa_pingid.py +0 -0
  103. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/mfa_totp.py +0 -0
  104. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/oidc.py +0 -0
  105. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/oidc_assignment.py +0 -0
  106. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/oidc_client.py +0 -0
  107. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/oidc_key.py +0 -0
  108. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -0
  109. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/oidc_provider.py +0 -0
  110. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/oidc_role.py +0 -0
  111. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/oidc_scope.py +0 -0
  112. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/outputs.py +0 -0
  113. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/jwt/__init__.py +0 -0
  114. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/jwt/_inputs.py +0 -0
  115. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/jwt/auth_backend.py +0 -0
  116. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/jwt/auth_backend_role.py +0 -0
  117. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/jwt/outputs.py +0 -0
  118. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kmip/__init__.py +0 -0
  119. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kmip/secret_backend.py +0 -0
  120. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kmip/secret_role.py +0 -0
  121. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kmip/secret_scope.py +0 -0
  122. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kubernetes/__init__.py +0 -0
  123. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kubernetes/auth_backend_config.py +0 -0
  124. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kubernetes/auth_backend_role.py +0 -0
  125. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kubernetes/get_auth_backend_config.py +0 -0
  126. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kubernetes/get_auth_backend_role.py +0 -0
  127. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kubernetes/get_service_account_token.py +0 -0
  128. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kubernetes/secret_backend.py +0 -0
  129. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kubernetes/secret_backend_role.py +0 -0
  130. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kv/__init__.py +0 -0
  131. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kv/_inputs.py +0 -0
  132. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kv/get_secret.py +0 -0
  133. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kv/get_secret_subkeys_v2.py +0 -0
  134. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kv/get_secret_v2.py +0 -0
  135. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kv/get_secrets_list.py +0 -0
  136. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kv/get_secrets_list_v2.py +0 -0
  137. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kv/outputs.py +0 -0
  138. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kv/secret.py +0 -0
  139. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kv/secret_backend_v2.py +0 -0
  140. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kv/secret_v2.py +0 -0
  141. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/ldap/__init__.py +0 -0
  142. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/ldap/auth_backend.py +0 -0
  143. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/ldap/auth_backend_group.py +0 -0
  144. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/ldap/auth_backend_user.py +0 -0
  145. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/ldap/secret_backend.py +0 -0
  146. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -0
  147. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/ldap/secret_backend_library_set.py +0 -0
  148. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/ldap/secret_backend_static_role.py +0 -0
  149. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/managed/__init__.py +0 -0
  150. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/managed/_inputs.py +0 -0
  151. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/managed/keys.py +0 -0
  152. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/managed/outputs.py +0 -0
  153. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/mfa_duo.py +0 -0
  154. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/mfa_okta.py +0 -0
  155. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/mfa_pingid.py +0 -0
  156. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/mfa_totp.py +0 -0
  157. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/mongodbatlas/__init__.py +0 -0
  158. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/mongodbatlas/secret_backend.py +0 -0
  159. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/mongodbatlas/secret_role.py +0 -0
  160. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/namespace.py +0 -0
  161. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/nomad_secret_backend.py +0 -0
  162. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/nomad_secret_role.py +0 -0
  163. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/okta/__init__.py +0 -0
  164. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/okta/_inputs.py +0 -0
  165. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/okta/auth_backend.py +0 -0
  166. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/okta/auth_backend_group.py +0 -0
  167. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/okta/auth_backend_user.py +0 -0
  168. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/okta/outputs.py +0 -0
  169. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/outputs.py +0 -0
  170. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/password_policy.py +0 -0
  171. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/pkisecret/__init__.py +0 -0
  172. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/pkisecret/secret_backend_cert.py +0 -0
  173. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -0
  174. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -0
  175. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -0
  176. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -0
  177. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -0
  178. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -0
  179. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/pkisecret/secret_backend_issuer.py +0 -0
  180. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/pkisecret/secret_backend_key.py +0 -0
  181. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -0
  182. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -0
  183. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/pkisecret/secret_backend_sign.py +0 -0
  184. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/policy.py +0 -0
  185. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/provider.py +0 -0
  186. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/pulumi-plugin.json +0 -0
  187. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/py.typed +0 -0
  188. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/quota_lease_count.py +0 -0
  189. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/quota_rate_limit.py +0 -0
  190. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/rabbitmq/__init__.py +0 -0
  191. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/rabbitmq/_inputs.py +0 -0
  192. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/rabbitmq/outputs.py +0 -0
  193. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/rabbitmq/secret_backend.py +0 -0
  194. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/rabbitmq/secret_backend_role.py +0 -0
  195. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/raft_autopilot.py +0 -0
  196. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/raft_snapshot_agent_config.py +0 -0
  197. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/rgp_policy.py +0 -0
  198. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/ssh/__init__.py +0 -0
  199. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/ssh/_inputs.py +0 -0
  200. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/ssh/outputs.py +0 -0
  201. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/ssh/secret_backend_ca.py +0 -0
  202. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/ssh/secret_backend_role.py +0 -0
  203. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/terraformcloud/__init__.py +0 -0
  204. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/terraformcloud/secret_backend.py +0 -0
  205. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/terraformcloud/secret_creds.py +0 -0
  206. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/terraformcloud/secret_role.py +0 -0
  207. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/token.py +0 -0
  208. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/tokenauth/__init__.py +0 -0
  209. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/tokenauth/auth_backend_role.py +0 -0
  210. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/transform/__init__.py +0 -0
  211. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/transform/alphabet.py +0 -0
  212. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/transform/get_decode.py +0 -0
  213. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/transform/get_encode.py +0 -0
  214. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/transform/role.py +0 -0
  215. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/transform/template.py +0 -0
  216. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/transform/transformation.py +0 -0
  217. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/transit/__init__.py +0 -0
  218. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/transit/get_decrypt.py +0 -0
  219. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/transit/get_encrypt.py +0 -0
  220. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/transit/secret_backend_key.py +0 -0
  221. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/transit/secret_cache_config.py +0 -0
  222. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault.egg-info/SOURCES.txt +0 -0
  223. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault.egg-info/dependency_links.txt +0 -0
  224. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault.egg-info/not-zip-safe +0 -0
  225. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault.egg-info/requires.txt +0 -0
  226. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault.egg-info/top_level.txt +0 -0
  227. {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/setup.cfg +0 -0
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: pulumi_vault
3
- Version: 5.15.0a1693982937
3
+ Version: 5.16.0a1694757730
4
4
  Summary: A Pulumi package for creating and managing HashiCorp Vault cloud resources.
5
5
  Home-page: https://pulumi.io
6
6
  License: Apache-2.0
@@ -22,7 +22,8 @@ class AuthBackendClientArgs:
22
22
  namespace: Optional[pulumi.Input[str]] = None,
23
23
  secret_key: Optional[pulumi.Input[str]] = None,
24
24
  sts_endpoint: Optional[pulumi.Input[str]] = None,
25
- sts_region: Optional[pulumi.Input[str]] = None):
25
+ sts_region: Optional[pulumi.Input[str]] = None,
26
+ use_sts_region_from_client: Optional[pulumi.Input[bool]] = None):
26
27
  """
27
28
  The set of arguments for constructing a AuthBackendClient resource.
28
29
  :param pulumi.Input[str] access_key: The AWS access key that Vault should use for the
@@ -46,6 +47,11 @@ class AuthBackendClientArgs:
46
47
  calls.
47
48
  :param pulumi.Input[str] sts_region: Override the default region when making STS API
48
49
  calls. The `sts_endpoint` argument must be set when using `sts_region`.
50
+ :param pulumi.Input[bool] use_sts_region_from_client: Available in Vault v1.15+. If set,
51
+ overrides both `sts_endpoint` and `sts_region` to instead use the region
52
+ specified in the client request headers for IAM-based authentication.
53
+ This can be useful when you have client requests coming from different
54
+ regions and want flexibility in which regional STS API is used.
49
55
  """
50
56
  if access_key is not None:
51
57
  pulumi.set(__self__, "access_key", access_key)
@@ -65,6 +71,8 @@ class AuthBackendClientArgs:
65
71
  pulumi.set(__self__, "sts_endpoint", sts_endpoint)
66
72
  if sts_region is not None:
67
73
  pulumi.set(__self__, "sts_region", sts_region)
74
+ if use_sts_region_from_client is not None:
75
+ pulumi.set(__self__, "use_sts_region_from_client", use_sts_region_from_client)
68
76
 
69
77
  @property
70
78
  @pulumi.getter(name="accessKey")
@@ -186,6 +194,22 @@ class AuthBackendClientArgs:
186
194
  def sts_region(self, value: Optional[pulumi.Input[str]]):
187
195
  pulumi.set(self, "sts_region", value)
188
196
 
197
+ @property
198
+ @pulumi.getter(name="useStsRegionFromClient")
199
+ def use_sts_region_from_client(self) -> Optional[pulumi.Input[bool]]:
200
+ """
201
+ Available in Vault v1.15+. If set,
202
+ overrides both `sts_endpoint` and `sts_region` to instead use the region
203
+ specified in the client request headers for IAM-based authentication.
204
+ This can be useful when you have client requests coming from different
205
+ regions and want flexibility in which regional STS API is used.
206
+ """
207
+ return pulumi.get(self, "use_sts_region_from_client")
208
+
209
+ @use_sts_region_from_client.setter
210
+ def use_sts_region_from_client(self, value: Optional[pulumi.Input[bool]]):
211
+ pulumi.set(self, "use_sts_region_from_client", value)
212
+
189
213
 
190
214
  @pulumi.input_type
191
215
  class _AuthBackendClientState:
@@ -198,7 +222,8 @@ class _AuthBackendClientState:
198
222
  namespace: Optional[pulumi.Input[str]] = None,
199
223
  secret_key: Optional[pulumi.Input[str]] = None,
200
224
  sts_endpoint: Optional[pulumi.Input[str]] = None,
201
- sts_region: Optional[pulumi.Input[str]] = None):
225
+ sts_region: Optional[pulumi.Input[str]] = None,
226
+ use_sts_region_from_client: Optional[pulumi.Input[bool]] = None):
202
227
  """
203
228
  Input properties used for looking up and filtering AuthBackendClient resources.
204
229
  :param pulumi.Input[str] access_key: The AWS access key that Vault should use for the
@@ -222,6 +247,11 @@ class _AuthBackendClientState:
222
247
  calls.
223
248
  :param pulumi.Input[str] sts_region: Override the default region when making STS API
224
249
  calls. The `sts_endpoint` argument must be set when using `sts_region`.
250
+ :param pulumi.Input[bool] use_sts_region_from_client: Available in Vault v1.15+. If set,
251
+ overrides both `sts_endpoint` and `sts_region` to instead use the region
252
+ specified in the client request headers for IAM-based authentication.
253
+ This can be useful when you have client requests coming from different
254
+ regions and want flexibility in which regional STS API is used.
225
255
  """
226
256
  if access_key is not None:
227
257
  pulumi.set(__self__, "access_key", access_key)
@@ -241,6 +271,8 @@ class _AuthBackendClientState:
241
271
  pulumi.set(__self__, "sts_endpoint", sts_endpoint)
242
272
  if sts_region is not None:
243
273
  pulumi.set(__self__, "sts_region", sts_region)
274
+ if use_sts_region_from_client is not None:
275
+ pulumi.set(__self__, "use_sts_region_from_client", use_sts_region_from_client)
244
276
 
245
277
  @property
246
278
  @pulumi.getter(name="accessKey")
@@ -362,6 +394,22 @@ class _AuthBackendClientState:
362
394
  def sts_region(self, value: Optional[pulumi.Input[str]]):
363
395
  pulumi.set(self, "sts_region", value)
364
396
 
397
+ @property
398
+ @pulumi.getter(name="useStsRegionFromClient")
399
+ def use_sts_region_from_client(self) -> Optional[pulumi.Input[bool]]:
400
+ """
401
+ Available in Vault v1.15+. If set,
402
+ overrides both `sts_endpoint` and `sts_region` to instead use the region
403
+ specified in the client request headers for IAM-based authentication.
404
+ This can be useful when you have client requests coming from different
405
+ regions and want flexibility in which regional STS API is used.
406
+ """
407
+ return pulumi.get(self, "use_sts_region_from_client")
408
+
409
+ @use_sts_region_from_client.setter
410
+ def use_sts_region_from_client(self, value: Optional[pulumi.Input[bool]]):
411
+ pulumi.set(self, "use_sts_region_from_client", value)
412
+
365
413
 
366
414
  class AuthBackendClient(pulumi.CustomResource):
367
415
  @overload
@@ -377,6 +425,7 @@ class AuthBackendClient(pulumi.CustomResource):
377
425
  secret_key: Optional[pulumi.Input[str]] = None,
378
426
  sts_endpoint: Optional[pulumi.Input[str]] = None,
379
427
  sts_region: Optional[pulumi.Input[str]] = None,
428
+ use_sts_region_from_client: Optional[pulumi.Input[bool]] = None,
380
429
  __props__=None):
381
430
  """
382
431
  ## Example Usage
@@ -423,6 +472,11 @@ class AuthBackendClient(pulumi.CustomResource):
423
472
  calls.
424
473
  :param pulumi.Input[str] sts_region: Override the default region when making STS API
425
474
  calls. The `sts_endpoint` argument must be set when using `sts_region`.
475
+ :param pulumi.Input[bool] use_sts_region_from_client: Available in Vault v1.15+. If set,
476
+ overrides both `sts_endpoint` and `sts_region` to instead use the region
477
+ specified in the client request headers for IAM-based authentication.
478
+ This can be useful when you have client requests coming from different
479
+ regions and want flexibility in which regional STS API is used.
426
480
  """
427
481
  ...
428
482
  @overload
@@ -476,6 +530,7 @@ class AuthBackendClient(pulumi.CustomResource):
476
530
  secret_key: Optional[pulumi.Input[str]] = None,
477
531
  sts_endpoint: Optional[pulumi.Input[str]] = None,
478
532
  sts_region: Optional[pulumi.Input[str]] = None,
533
+ use_sts_region_from_client: Optional[pulumi.Input[bool]] = None,
479
534
  __props__=None):
480
535
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
481
536
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -494,6 +549,7 @@ class AuthBackendClient(pulumi.CustomResource):
494
549
  __props__.__dict__["secret_key"] = None if secret_key is None else pulumi.Output.secret(secret_key)
495
550
  __props__.__dict__["sts_endpoint"] = sts_endpoint
496
551
  __props__.__dict__["sts_region"] = sts_region
552
+ __props__.__dict__["use_sts_region_from_client"] = use_sts_region_from_client
497
553
  secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["accessKey", "secretKey"])
498
554
  opts = pulumi.ResourceOptions.merge(opts, secret_opts)
499
555
  super(AuthBackendClient, __self__).__init__(
@@ -514,7 +570,8 @@ class AuthBackendClient(pulumi.CustomResource):
514
570
  namespace: Optional[pulumi.Input[str]] = None,
515
571
  secret_key: Optional[pulumi.Input[str]] = None,
516
572
  sts_endpoint: Optional[pulumi.Input[str]] = None,
517
- sts_region: Optional[pulumi.Input[str]] = None) -> 'AuthBackendClient':
573
+ sts_region: Optional[pulumi.Input[str]] = None,
574
+ use_sts_region_from_client: Optional[pulumi.Input[bool]] = None) -> 'AuthBackendClient':
518
575
  """
519
576
  Get an existing AuthBackendClient resource's state with the given name, id, and optional extra
520
577
  properties used to qualify the lookup.
@@ -543,6 +600,11 @@ class AuthBackendClient(pulumi.CustomResource):
543
600
  calls.
544
601
  :param pulumi.Input[str] sts_region: Override the default region when making STS API
545
602
  calls. The `sts_endpoint` argument must be set when using `sts_region`.
603
+ :param pulumi.Input[bool] use_sts_region_from_client: Available in Vault v1.15+. If set,
604
+ overrides both `sts_endpoint` and `sts_region` to instead use the region
605
+ specified in the client request headers for IAM-based authentication.
606
+ This can be useful when you have client requests coming from different
607
+ regions and want flexibility in which regional STS API is used.
546
608
  """
547
609
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
548
610
 
@@ -557,6 +619,7 @@ class AuthBackendClient(pulumi.CustomResource):
557
619
  __props__.__dict__["secret_key"] = secret_key
558
620
  __props__.__dict__["sts_endpoint"] = sts_endpoint
559
621
  __props__.__dict__["sts_region"] = sts_region
622
+ __props__.__dict__["use_sts_region_from_client"] = use_sts_region_from_client
560
623
  return AuthBackendClient(resource_name, opts=opts, __props__=__props__)
561
624
 
562
625
  @property
@@ -643,3 +706,15 @@ class AuthBackendClient(pulumi.CustomResource):
643
706
  """
644
707
  return pulumi.get(self, "sts_region")
645
708
 
709
+ @property
710
+ @pulumi.getter(name="useStsRegionFromClient")
711
+ def use_sts_region_from_client(self) -> pulumi.Output[bool]:
712
+ """
713
+ Available in Vault v1.15+. If set,
714
+ overrides both `sts_endpoint` and `sts_region` to instead use the region
715
+ specified in the client request headers for IAM-based authentication.
716
+ This can be useful when you have client requests coming from different
717
+ regions and want flexibility in which regional STS API is used.
718
+ """
719
+ return pulumi.get(self, "use_sts_region_from_client")
720
+
@@ -49,7 +49,7 @@ class AuthBackendRoleArgs:
49
49
  the underlying instance where the client resides.
50
50
  :param pulumi.Input[str] auth_type: The auth type permitted for this role. Valid choices
51
51
  are `ec2` and `iam`. Defaults to `iam`.
52
- :param pulumi.Input[str] backend: Unique name of the auth backend to configure.
52
+ :param pulumi.Input[str] backend: Path to the mounted aws auth backend.
53
53
  :param pulumi.Input[Sequence[pulumi.Input[str]]] bound_account_ids: If set, defines a constraint on the EC2
54
54
  instances that can perform the login operation that they should be using the
55
55
  account ID specified by this field. `auth_type` must be set to `ec2` or
@@ -242,7 +242,7 @@ class AuthBackendRoleArgs:
242
242
  @pulumi.getter
243
243
  def backend(self) -> Optional[pulumi.Input[str]]:
244
244
  """
245
- Unique name of the auth backend to configure.
245
+ Path to the mounted aws auth backend.
246
246
  """
247
247
  return pulumi.get(self, "backend")
248
248
 
@@ -646,7 +646,7 @@ class _AuthBackendRoleState:
646
646
  the underlying instance where the client resides.
647
647
  :param pulumi.Input[str] auth_type: The auth type permitted for this role. Valid choices
648
648
  are `ec2` and `iam`. Defaults to `iam`.
649
- :param pulumi.Input[str] backend: Unique name of the auth backend to configure.
649
+ :param pulumi.Input[str] backend: Path to the mounted aws auth backend.
650
650
  :param pulumi.Input[Sequence[pulumi.Input[str]]] bound_account_ids: If set, defines a constraint on the EC2
651
651
  instances that can perform the login operation that they should be using the
652
652
  account ID specified by this field. `auth_type` must be set to `ec2` or
@@ -832,7 +832,7 @@ class _AuthBackendRoleState:
832
832
  @pulumi.getter
833
833
  def backend(self) -> Optional[pulumi.Input[str]]:
834
834
  """
835
- Unique name of the auth backend to configure.
835
+ Path to the mounted aws auth backend.
836
836
  """
837
837
  return pulumi.get(self, "backend")
838
838
 
@@ -1305,7 +1305,7 @@ class AuthBackendRole(pulumi.CustomResource):
1305
1305
  the underlying instance where the client resides.
1306
1306
  :param pulumi.Input[str] auth_type: The auth type permitted for this role. Valid choices
1307
1307
  are `ec2` and `iam`. Defaults to `iam`.
1308
- :param pulumi.Input[str] backend: Unique name of the auth backend to configure.
1308
+ :param pulumi.Input[str] backend: Path to the mounted aws auth backend.
1309
1309
  :param pulumi.Input[Sequence[pulumi.Input[str]]] bound_account_ids: If set, defines a constraint on the EC2
1310
1310
  instances that can perform the login operation that they should be using the
1311
1311
  account ID specified by this field. `auth_type` must be set to `ec2` or
@@ -1583,7 +1583,7 @@ class AuthBackendRole(pulumi.CustomResource):
1583
1583
  the underlying instance where the client resides.
1584
1584
  :param pulumi.Input[str] auth_type: The auth type permitted for this role. Valid choices
1585
1585
  are `ec2` and `iam`. Defaults to `iam`.
1586
- :param pulumi.Input[str] backend: Unique name of the auth backend to configure.
1586
+ :param pulumi.Input[str] backend: Path to the mounted aws auth backend.
1587
1587
  :param pulumi.Input[Sequence[pulumi.Input[str]]] bound_account_ids: If set, defines a constraint on the EC2
1588
1588
  instances that can perform the login operation that they should be using the
1589
1589
  account ID specified by this field. `auth_type` must be set to `ec2` or
@@ -1737,7 +1737,7 @@ class AuthBackendRole(pulumi.CustomResource):
1737
1737
  @pulumi.getter
1738
1738
  def backend(self) -> pulumi.Output[Optional[str]]:
1739
1739
  """
1740
- Unique name of the auth backend to configure.
1740
+ Path to the mounted aws auth backend.
1741
1741
  """
1742
1742
  return pulumi.get(self, "backend")
1743
1743
 
@@ -24,12 +24,13 @@ class BackendRoleArgs:
24
24
  description: Optional[pulumi.Input[str]] = None,
25
25
  max_ttl: Optional[pulumi.Input[str]] = None,
26
26
  namespace: Optional[pulumi.Input[str]] = None,
27
+ permanently_delete: Optional[pulumi.Input[bool]] = None,
27
28
  ttl: Optional[pulumi.Input[str]] = None):
28
29
  """
29
30
  The set of arguments for constructing a BackendRole resource.
30
31
  :param pulumi.Input[str] role: Name of the Azure role
31
32
  :param pulumi.Input[str] application_object_id: Application Object ID for an existing service principal that will
32
- be used instead of creating dynamic service principals. If present, `azure_roles` will be ignored.
33
+ be used instead of creating dynamic service principals. If present, `azure_roles` and `permanently_delete` will be ignored.
33
34
  :param pulumi.Input[Sequence[pulumi.Input['BackendRoleAzureGroupArgs']]] azure_groups: List of Azure groups to be assigned to the generated service principal.
34
35
  :param pulumi.Input[Sequence[pulumi.Input['BackendRoleAzureRoleArgs']]] azure_roles: List of Azure roles to be assigned to the generated service principal.
35
36
  :param pulumi.Input[str] backend: Path to the mounted Azure auth backend
@@ -40,6 +41,8 @@ class BackendRoleArgs:
40
41
  The value should not contain leading or trailing forward slashes.
41
42
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
42
43
  *Available only for Vault Enterprise*.
44
+ :param pulumi.Input[bool] permanently_delete: Indicates whether the applications and service principals created by Vault will be permanently
45
+ deleted when the corresponding leases expire. Defaults to `false`. For Vault v1.12+.
43
46
  :param pulumi.Input[str] ttl: Specifies the default TTL for service principals generated using this role.
44
47
  Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
45
48
  """
@@ -58,6 +61,8 @@ class BackendRoleArgs:
58
61
  pulumi.set(__self__, "max_ttl", max_ttl)
59
62
  if namespace is not None:
60
63
  pulumi.set(__self__, "namespace", namespace)
64
+ if permanently_delete is not None:
65
+ pulumi.set(__self__, "permanently_delete", permanently_delete)
61
66
  if ttl is not None:
62
67
  pulumi.set(__self__, "ttl", ttl)
63
68
 
@@ -78,7 +83,7 @@ class BackendRoleArgs:
78
83
  def application_object_id(self) -> Optional[pulumi.Input[str]]:
79
84
  """
80
85
  Application Object ID for an existing service principal that will
81
- be used instead of creating dynamic service principals. If present, `azure_roles` will be ignored.
86
+ be used instead of creating dynamic service principals. If present, `azure_roles` and `permanently_delete` will be ignored.
82
87
  """
83
88
  return pulumi.get(self, "application_object_id")
84
89
 
@@ -162,6 +167,19 @@ class BackendRoleArgs:
162
167
  def namespace(self, value: Optional[pulumi.Input[str]]):
163
168
  pulumi.set(self, "namespace", value)
164
169
 
170
+ @property
171
+ @pulumi.getter(name="permanentlyDelete")
172
+ def permanently_delete(self) -> Optional[pulumi.Input[bool]]:
173
+ """
174
+ Indicates whether the applications and service principals created by Vault will be permanently
175
+ deleted when the corresponding leases expire. Defaults to `false`. For Vault v1.12+.
176
+ """
177
+ return pulumi.get(self, "permanently_delete")
178
+
179
+ @permanently_delete.setter
180
+ def permanently_delete(self, value: Optional[pulumi.Input[bool]]):
181
+ pulumi.set(self, "permanently_delete", value)
182
+
165
183
  @property
166
184
  @pulumi.getter
167
185
  def ttl(self) -> Optional[pulumi.Input[str]]:
@@ -186,12 +204,13 @@ class _BackendRoleState:
186
204
  description: Optional[pulumi.Input[str]] = None,
187
205
  max_ttl: Optional[pulumi.Input[str]] = None,
188
206
  namespace: Optional[pulumi.Input[str]] = None,
207
+ permanently_delete: Optional[pulumi.Input[bool]] = None,
189
208
  role: Optional[pulumi.Input[str]] = None,
190
209
  ttl: Optional[pulumi.Input[str]] = None):
191
210
  """
192
211
  Input properties used for looking up and filtering BackendRole resources.
193
212
  :param pulumi.Input[str] application_object_id: Application Object ID for an existing service principal that will
194
- be used instead of creating dynamic service principals. If present, `azure_roles` will be ignored.
213
+ be used instead of creating dynamic service principals. If present, `azure_roles` and `permanently_delete` will be ignored.
195
214
  :param pulumi.Input[Sequence[pulumi.Input['BackendRoleAzureGroupArgs']]] azure_groups: List of Azure groups to be assigned to the generated service principal.
196
215
  :param pulumi.Input[Sequence[pulumi.Input['BackendRoleAzureRoleArgs']]] azure_roles: List of Azure roles to be assigned to the generated service principal.
197
216
  :param pulumi.Input[str] backend: Path to the mounted Azure auth backend
@@ -202,6 +221,8 @@ class _BackendRoleState:
202
221
  The value should not contain leading or trailing forward slashes.
203
222
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
204
223
  *Available only for Vault Enterprise*.
224
+ :param pulumi.Input[bool] permanently_delete: Indicates whether the applications and service principals created by Vault will be permanently
225
+ deleted when the corresponding leases expire. Defaults to `false`. For Vault v1.12+.
205
226
  :param pulumi.Input[str] role: Name of the Azure role
206
227
  :param pulumi.Input[str] ttl: Specifies the default TTL for service principals generated using this role.
207
228
  Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
@@ -220,6 +241,8 @@ class _BackendRoleState:
220
241
  pulumi.set(__self__, "max_ttl", max_ttl)
221
242
  if namespace is not None:
222
243
  pulumi.set(__self__, "namespace", namespace)
244
+ if permanently_delete is not None:
245
+ pulumi.set(__self__, "permanently_delete", permanently_delete)
223
246
  if role is not None:
224
247
  pulumi.set(__self__, "role", role)
225
248
  if ttl is not None:
@@ -230,7 +253,7 @@ class _BackendRoleState:
230
253
  def application_object_id(self) -> Optional[pulumi.Input[str]]:
231
254
  """
232
255
  Application Object ID for an existing service principal that will
233
- be used instead of creating dynamic service principals. If present, `azure_roles` will be ignored.
256
+ be used instead of creating dynamic service principals. If present, `azure_roles` and `permanently_delete` will be ignored.
234
257
  """
235
258
  return pulumi.get(self, "application_object_id")
236
259
 
@@ -314,6 +337,19 @@ class _BackendRoleState:
314
337
  def namespace(self, value: Optional[pulumi.Input[str]]):
315
338
  pulumi.set(self, "namespace", value)
316
339
 
340
+ @property
341
+ @pulumi.getter(name="permanentlyDelete")
342
+ def permanently_delete(self) -> Optional[pulumi.Input[bool]]:
343
+ """
344
+ Indicates whether the applications and service principals created by Vault will be permanently
345
+ deleted when the corresponding leases expire. Defaults to `false`. For Vault v1.12+.
346
+ """
347
+ return pulumi.get(self, "permanently_delete")
348
+
349
+ @permanently_delete.setter
350
+ def permanently_delete(self, value: Optional[pulumi.Input[bool]]):
351
+ pulumi.set(self, "permanently_delete", value)
352
+
317
353
  @property
318
354
  @pulumi.getter
319
355
  def role(self) -> Optional[pulumi.Input[str]]:
@@ -352,6 +388,7 @@ class BackendRole(pulumi.CustomResource):
352
388
  description: Optional[pulumi.Input[str]] = None,
353
389
  max_ttl: Optional[pulumi.Input[str]] = None,
354
390
  namespace: Optional[pulumi.Input[str]] = None,
391
+ permanently_delete: Optional[pulumi.Input[bool]] = None,
355
392
  role: Optional[pulumi.Input[str]] = None,
356
393
  ttl: Optional[pulumi.Input[str]] = None,
357
394
  __props__=None):
@@ -387,7 +424,7 @@ class BackendRole(pulumi.CustomResource):
387
424
  :param str resource_name: The name of the resource.
388
425
  :param pulumi.ResourceOptions opts: Options for the resource.
389
426
  :param pulumi.Input[str] application_object_id: Application Object ID for an existing service principal that will
390
- be used instead of creating dynamic service principals. If present, `azure_roles` will be ignored.
427
+ be used instead of creating dynamic service principals. If present, `azure_roles` and `permanently_delete` will be ignored.
391
428
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['BackendRoleAzureGroupArgs']]]] azure_groups: List of Azure groups to be assigned to the generated service principal.
392
429
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['BackendRoleAzureRoleArgs']]]] azure_roles: List of Azure roles to be assigned to the generated service principal.
393
430
  :param pulumi.Input[str] backend: Path to the mounted Azure auth backend
@@ -398,6 +435,8 @@ class BackendRole(pulumi.CustomResource):
398
435
  The value should not contain leading or trailing forward slashes.
399
436
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
400
437
  *Available only for Vault Enterprise*.
438
+ :param pulumi.Input[bool] permanently_delete: Indicates whether the applications and service principals created by Vault will be permanently
439
+ deleted when the corresponding leases expire. Defaults to `false`. For Vault v1.12+.
401
440
  :param pulumi.Input[str] role: Name of the Azure role
402
441
  :param pulumi.Input[str] ttl: Specifies the default TTL for service principals generated using this role.
403
442
  Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
@@ -459,6 +498,7 @@ class BackendRole(pulumi.CustomResource):
459
498
  description: Optional[pulumi.Input[str]] = None,
460
499
  max_ttl: Optional[pulumi.Input[str]] = None,
461
500
  namespace: Optional[pulumi.Input[str]] = None,
501
+ permanently_delete: Optional[pulumi.Input[bool]] = None,
462
502
  role: Optional[pulumi.Input[str]] = None,
463
503
  ttl: Optional[pulumi.Input[str]] = None,
464
504
  __props__=None):
@@ -477,6 +517,7 @@ class BackendRole(pulumi.CustomResource):
477
517
  __props__.__dict__["description"] = description
478
518
  __props__.__dict__["max_ttl"] = max_ttl
479
519
  __props__.__dict__["namespace"] = namespace
520
+ __props__.__dict__["permanently_delete"] = permanently_delete
480
521
  if role is None and not opts.urn:
481
522
  raise TypeError("Missing required property 'role'")
482
523
  __props__.__dict__["role"] = role
@@ -498,6 +539,7 @@ class BackendRole(pulumi.CustomResource):
498
539
  description: Optional[pulumi.Input[str]] = None,
499
540
  max_ttl: Optional[pulumi.Input[str]] = None,
500
541
  namespace: Optional[pulumi.Input[str]] = None,
542
+ permanently_delete: Optional[pulumi.Input[bool]] = None,
501
543
  role: Optional[pulumi.Input[str]] = None,
502
544
  ttl: Optional[pulumi.Input[str]] = None) -> 'BackendRole':
503
545
  """
@@ -508,7 +550,7 @@ class BackendRole(pulumi.CustomResource):
508
550
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
509
551
  :param pulumi.ResourceOptions opts: Options for the resource.
510
552
  :param pulumi.Input[str] application_object_id: Application Object ID for an existing service principal that will
511
- be used instead of creating dynamic service principals. If present, `azure_roles` will be ignored.
553
+ be used instead of creating dynamic service principals. If present, `azure_roles` and `permanently_delete` will be ignored.
512
554
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['BackendRoleAzureGroupArgs']]]] azure_groups: List of Azure groups to be assigned to the generated service principal.
513
555
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['BackendRoleAzureRoleArgs']]]] azure_roles: List of Azure roles to be assigned to the generated service principal.
514
556
  :param pulumi.Input[str] backend: Path to the mounted Azure auth backend
@@ -519,6 +561,8 @@ class BackendRole(pulumi.CustomResource):
519
561
  The value should not contain leading or trailing forward slashes.
520
562
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
521
563
  *Available only for Vault Enterprise*.
564
+ :param pulumi.Input[bool] permanently_delete: Indicates whether the applications and service principals created by Vault will be permanently
565
+ deleted when the corresponding leases expire. Defaults to `false`. For Vault v1.12+.
522
566
  :param pulumi.Input[str] role: Name of the Azure role
523
567
  :param pulumi.Input[str] ttl: Specifies the default TTL for service principals generated using this role.
524
568
  Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
@@ -534,6 +578,7 @@ class BackendRole(pulumi.CustomResource):
534
578
  __props__.__dict__["description"] = description
535
579
  __props__.__dict__["max_ttl"] = max_ttl
536
580
  __props__.__dict__["namespace"] = namespace
581
+ __props__.__dict__["permanently_delete"] = permanently_delete
537
582
  __props__.__dict__["role"] = role
538
583
  __props__.__dict__["ttl"] = ttl
539
584
  return BackendRole(resource_name, opts=opts, __props__=__props__)
@@ -543,7 +588,7 @@ class BackendRole(pulumi.CustomResource):
543
588
  def application_object_id(self) -> pulumi.Output[Optional[str]]:
544
589
  """
545
590
  Application Object ID for an existing service principal that will
546
- be used instead of creating dynamic service principals. If present, `azure_roles` will be ignored.
591
+ be used instead of creating dynamic service principals. If present, `azure_roles` and `permanently_delete` will be ignored.
547
592
  """
548
593
  return pulumi.get(self, "application_object_id")
549
594
 
@@ -599,6 +644,15 @@ class BackendRole(pulumi.CustomResource):
599
644
  """
600
645
  return pulumi.get(self, "namespace")
601
646
 
647
+ @property
648
+ @pulumi.getter(name="permanentlyDelete")
649
+ def permanently_delete(self) -> pulumi.Output[bool]:
650
+ """
651
+ Indicates whether the applications and service principals created by Vault will be permanently
652
+ deleted when the corresponding leases expire. Defaults to `false`. For Vault v1.12+.
653
+ """
654
+ return pulumi.get(self, "permanently_delete")
655
+
602
656
  @property
603
657
  @pulumi.getter
604
658
  def role(self) -> pulumi.Output[str]:
@@ -216,6 +216,7 @@ class AuthBackendArgs:
216
216
  @pulumi.input_type
217
217
  class _AuthBackendState:
218
218
  def __init__(__self__, *,
219
+ accessor: Optional[pulumi.Input[str]] = None,
219
220
  client_email: Optional[pulumi.Input[str]] = None,
220
221
  client_id: Optional[pulumi.Input[str]] = None,
221
222
  credentials: Optional[pulumi.Input[str]] = None,
@@ -229,6 +230,7 @@ class _AuthBackendState:
229
230
  project_id: Optional[pulumi.Input[str]] = None):
230
231
  """
231
232
  Input properties used for looking up and filtering AuthBackend resources.
233
+ :param pulumi.Input[str] accessor: The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
232
234
  :param pulumi.Input[str] client_email: The clients email associated with the credentials
233
235
  :param pulumi.Input[str] client_id: The Client ID of the credentials
234
236
  :param pulumi.Input[str] credentials: A JSON string containing the contents of a GCP credentials file. If this value is empty, Vault will try to use Application Default Credentials from the machine on which the Vault server is running.
@@ -249,6 +251,8 @@ class _AuthBackendState:
249
251
  :param pulumi.Input[str] private_key_id: The ID of the private key from the credentials
250
252
  :param pulumi.Input[str] project_id: The GCP Project ID
251
253
  """
254
+ if accessor is not None:
255
+ pulumi.set(__self__, "accessor", accessor)
252
256
  if client_email is not None:
253
257
  pulumi.set(__self__, "client_email", client_email)
254
258
  if client_id is not None:
@@ -272,6 +276,18 @@ class _AuthBackendState:
272
276
  if project_id is not None:
273
277
  pulumi.set(__self__, "project_id", project_id)
274
278
 
279
+ @property
280
+ @pulumi.getter
281
+ def accessor(self) -> Optional[pulumi.Input[str]]:
282
+ """
283
+ The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
284
+ """
285
+ return pulumi.get(self, "accessor")
286
+
287
+ @accessor.setter
288
+ def accessor(self, value: Optional[pulumi.Input[str]]):
289
+ pulumi.set(self, "accessor", value)
290
+
275
291
  @property
276
292
  @pulumi.getter(name="clientEmail")
277
293
  def client_email(self) -> Optional[pulumi.Input[str]]:
@@ -558,6 +574,7 @@ class AuthBackend(pulumi.CustomResource):
558
574
  __props__.__dict__["path"] = path
559
575
  __props__.__dict__["private_key_id"] = private_key_id
560
576
  __props__.__dict__["project_id"] = project_id
577
+ __props__.__dict__["accessor"] = None
561
578
  secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["credentials"])
562
579
  opts = pulumi.ResourceOptions.merge(opts, secret_opts)
563
580
  super(AuthBackend, __self__).__init__(
@@ -570,6 +587,7 @@ class AuthBackend(pulumi.CustomResource):
570
587
  def get(resource_name: str,
571
588
  id: pulumi.Input[str],
572
589
  opts: Optional[pulumi.ResourceOptions] = None,
590
+ accessor: Optional[pulumi.Input[str]] = None,
573
591
  client_email: Optional[pulumi.Input[str]] = None,
574
592
  client_id: Optional[pulumi.Input[str]] = None,
575
593
  credentials: Optional[pulumi.Input[str]] = None,
@@ -588,6 +606,7 @@ class AuthBackend(pulumi.CustomResource):
588
606
  :param str resource_name: The unique name of the resulting resource.
589
607
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
590
608
  :param pulumi.ResourceOptions opts: Options for the resource.
609
+ :param pulumi.Input[str] accessor: The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
591
610
  :param pulumi.Input[str] client_email: The clients email associated with the credentials
592
611
  :param pulumi.Input[str] client_id: The Client ID of the credentials
593
612
  :param pulumi.Input[str] credentials: A JSON string containing the contents of a GCP credentials file. If this value is empty, Vault will try to use Application Default Credentials from the machine on which the Vault server is running.
@@ -612,6 +631,7 @@ class AuthBackend(pulumi.CustomResource):
612
631
 
613
632
  __props__ = _AuthBackendState.__new__(_AuthBackendState)
614
633
 
634
+ __props__.__dict__["accessor"] = accessor
615
635
  __props__.__dict__["client_email"] = client_email
616
636
  __props__.__dict__["client_id"] = client_id
617
637
  __props__.__dict__["credentials"] = credentials
@@ -625,6 +645,14 @@ class AuthBackend(pulumi.CustomResource):
625
645
  __props__.__dict__["project_id"] = project_id
626
646
  return AuthBackend(resource_name, opts=opts, __props__=__props__)
627
647
 
648
+ @property
649
+ @pulumi.getter
650
+ def accessor(self) -> pulumi.Output[str]:
651
+ """
652
+ The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
653
+ """
654
+ return pulumi.get(self, "accessor")
655
+
628
656
  @property
629
657
  @pulumi.getter(name="clientEmail")
630
658
  def client_email(self) -> pulumi.Output[str]:
@@ -507,6 +507,10 @@ class Mount(pulumi.CustomResource):
507
507
 
508
508
  kvv2_example = vault.Mount("kvv2-example",
509
509
  description="This is an example KV Version 2 secret engine mount",
510
+ options={
511
+ "type": "kv-v2",
512
+ "version": "2",
513
+ },
510
514
  path="version2-example",
511
515
  type="kv-v2")
512
516
  ```
@@ -588,6 +592,10 @@ class Mount(pulumi.CustomResource):
588
592
 
589
593
  kvv2_example = vault.Mount("kvv2-example",
590
594
  description="This is an example KV Version 2 secret engine mount",
595
+ options={
596
+ "type": "kv-v2",
597
+ "version": "2",
598
+ },
591
599
  path="version2-example",
592
600
  type="kv-v2")
593
601
  ```
@@ -99,7 +99,7 @@ class SecretBackendRoleArgs:
99
99
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
100
100
  *Available only for Vault Enterprise*.
101
101
  :param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
102
- :param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
102
+ :param pulumi.Input[str] not_before_duration: Specifies the [duration](https://developer.hashicorp.com/vault/docs/concepts/duration-format) by which to backdate the NotBefore property.
103
103
  :param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
104
104
  :param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
105
105
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policy_identifiers: Specify the list of allowed policies OIDs. Use with Vault 1.10 or before. For Vault 1.11+, use `policy_identifier` blocks instead
@@ -595,7 +595,7 @@ class SecretBackendRoleArgs:
595
595
  @pulumi.getter(name="notBeforeDuration")
596
596
  def not_before_duration(self) -> Optional[pulumi.Input[str]]:
597
597
  """
598
- Specifies the duration by which to backdate the NotBefore property.
598
+ Specifies the [duration](https://developer.hashicorp.com/vault/docs/concepts/duration-format) by which to backdate the NotBefore property.
599
599
  """
600
600
  return pulumi.get(self, "not_before_duration")
601
601
 
@@ -824,7 +824,7 @@ class _SecretBackendRoleState:
824
824
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
825
825
  *Available only for Vault Enterprise*.
826
826
  :param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
827
- :param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
827
+ :param pulumi.Input[str] not_before_duration: Specifies the [duration](https://developer.hashicorp.com/vault/docs/concepts/duration-format) by which to backdate the NotBefore property.
828
828
  :param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
829
829
  :param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
830
830
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policy_identifiers: Specify the list of allowed policies OIDs. Use with Vault 1.10 or before. For Vault 1.11+, use `policy_identifier` blocks instead
@@ -1321,7 +1321,7 @@ class _SecretBackendRoleState:
1321
1321
  @pulumi.getter(name="notBeforeDuration")
1322
1322
  def not_before_duration(self) -> Optional[pulumi.Input[str]]:
1323
1323
  """
1324
- Specifies the duration by which to backdate the NotBefore property.
1324
+ Specifies the [duration](https://developer.hashicorp.com/vault/docs/concepts/duration-format) by which to backdate the NotBefore property.
1325
1325
  """
1326
1326
  return pulumi.get(self, "not_before_duration")
1327
1327
 
@@ -1588,7 +1588,7 @@ class SecretBackendRole(pulumi.CustomResource):
1588
1588
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1589
1589
  *Available only for Vault Enterprise*.
1590
1590
  :param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
1591
- :param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
1591
+ :param pulumi.Input[str] not_before_duration: Specifies the [duration](https://developer.hashicorp.com/vault/docs/concepts/duration-format) by which to backdate the NotBefore property.
1592
1592
  :param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
1593
1593
  :param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
1594
1594
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policy_identifiers: Specify the list of allowed policies OIDs. Use with Vault 1.10 or before. For Vault 1.11+, use `policy_identifier` blocks instead
@@ -1856,7 +1856,7 @@ class SecretBackendRole(pulumi.CustomResource):
1856
1856
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1857
1857
  *Available only for Vault Enterprise*.
1858
1858
  :param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
1859
- :param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
1859
+ :param pulumi.Input[str] not_before_duration: Specifies the [duration](https://developer.hashicorp.com/vault/docs/concepts/duration-format) by which to backdate the NotBefore property.
1860
1860
  :param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
1861
1861
  :param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
1862
1862
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policy_identifiers: Specify the list of allowed policies OIDs. Use with Vault 1.10 or before. For Vault 1.11+, use `policy_identifier` blocks instead
@@ -2186,7 +2186,7 @@ class SecretBackendRole(pulumi.CustomResource):
2186
2186
  @pulumi.getter(name="notBeforeDuration")
2187
2187
  def not_before_duration(self) -> pulumi.Output[str]:
2188
2188
  """
2189
- Specifies the duration by which to backdate the NotBefore property.
2189
+ Specifies the [duration](https://developer.hashicorp.com/vault/docs/concepts/duration-format) by which to backdate the NotBefore property.
2190
2190
  """
2191
2191
  return pulumi.get(self, "not_before_duration")
2192
2192