pulumi-vault 5.16.0a1694757730__tar.gz → 5.16.0a1697145324__tar.gz

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (227) hide show
  1. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/PKG-INFO +1 -1
  2. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/cert_auth_backend_role.py +7 -7
  3. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/ldap/secret_backend.py +7 -7
  4. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/quota_lease_count.py +50 -3
  5. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/quota_rate_limit.py +50 -3
  6. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault.egg-info/PKG-INFO +1 -1
  7. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/setup.py +2 -2
  8. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/README.md +0 -0
  9. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/__init__.py +0 -0
  10. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/_inputs.py +0 -0
  11. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/_utilities.py +0 -0
  12. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/ad/__init__.py +0 -0
  13. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/ad/get_access_credentials.py +0 -0
  14. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/ad/secret_backend.py +0 -0
  15. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/ad/secret_library.py +0 -0
  16. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/ad/secret_role.py +0 -0
  17. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/alicloud/__init__.py +0 -0
  18. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/alicloud/auth_backend_role.py +0 -0
  19. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/approle/__init__.py +0 -0
  20. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/approle/auth_backend_login.py +0 -0
  21. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/approle/auth_backend_role.py +0 -0
  22. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/approle/auth_backend_role_secret_id.py +0 -0
  23. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/approle/get_auth_backend_role_id.py +0 -0
  24. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/audit.py +0 -0
  25. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/audit_request_header.py +0 -0
  26. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/auth_backend.py +0 -0
  27. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/aws/__init__.py +0 -0
  28. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/aws/auth_backend_cert.py +0 -0
  29. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/aws/auth_backend_client.py +0 -0
  30. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/aws/auth_backend_config_identity.py +0 -0
  31. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -0
  32. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/aws/auth_backend_login.py +0 -0
  33. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/aws/auth_backend_role.py +0 -0
  34. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/aws/auth_backend_role_tag.py +0 -0
  35. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -0
  36. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/aws/auth_backend_sts_role.py +0 -0
  37. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/aws/get_access_credentials.py +0 -0
  38. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/aws/secret_backend.py +0 -0
  39. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/aws/secret_backend_role.py +0 -0
  40. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/aws/secret_backend_static_role.py +0 -0
  41. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/azure/__init__.py +0 -0
  42. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/azure/_inputs.py +0 -0
  43. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/azure/auth_backend_config.py +0 -0
  44. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/azure/auth_backend_role.py +0 -0
  45. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/azure/backend.py +0 -0
  46. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/azure/backend_role.py +0 -0
  47. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/azure/get_access_credentials.py +0 -0
  48. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/azure/outputs.py +0 -0
  49. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/config/__init__.py +0 -0
  50. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/config/outputs.py +0 -0
  51. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/config/vars.py +0 -0
  52. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/consul/__init__.py +0 -0
  53. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/consul/secret_backend.py +0 -0
  54. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/consul/secret_backend_role.py +0 -0
  55. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/database/__init__.py +0 -0
  56. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/database/_inputs.py +0 -0
  57. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/database/outputs.py +0 -0
  58. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/database/secret_backend_connection.py +0 -0
  59. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/database/secret_backend_role.py +0 -0
  60. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/database/secret_backend_static_role.py +0 -0
  61. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/database/secrets_mount.py +0 -0
  62. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/egp_policy.py +0 -0
  63. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/gcp/__init__.py +0 -0
  64. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/gcp/_inputs.py +0 -0
  65. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/gcp/auth_backend.py +0 -0
  66. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/gcp/auth_backend_role.py +0 -0
  67. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/gcp/get_auth_backend_role.py +0 -0
  68. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/gcp/outputs.py +0 -0
  69. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/gcp/secret_backend.py +0 -0
  70. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/gcp/secret_impersonated_account.py +0 -0
  71. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/gcp/secret_roleset.py +0 -0
  72. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/gcp/secret_static_account.py +0 -0
  73. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/generic/__init__.py +0 -0
  74. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/generic/endpoint.py +0 -0
  75. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/generic/get_secret.py +0 -0
  76. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/generic/secret.py +0 -0
  77. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/get_auth_backend.py +0 -0
  78. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/get_nomad_access_token.py +0 -0
  79. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/get_policy_document.py +0 -0
  80. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/github/__init__.py +0 -0
  81. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/github/_inputs.py +0 -0
  82. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/github/auth_backend.py +0 -0
  83. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/github/outputs.py +0 -0
  84. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/github/team.py +0 -0
  85. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/github/user.py +0 -0
  86. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/__init__.py +0 -0
  87. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/entity.py +0 -0
  88. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/entity_alias.py +0 -0
  89. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/entity_policies.py +0 -0
  90. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/get_entity.py +0 -0
  91. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/get_group.py +0 -0
  92. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/get_oidc_client_creds.py +0 -0
  93. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/get_oidc_openid_config.py +0 -0
  94. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/get_oidc_public_keys.py +0 -0
  95. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/group.py +0 -0
  96. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/group_alias.py +0 -0
  97. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/group_member_entity_ids.py +0 -0
  98. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/group_member_group_ids.py +0 -0
  99. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/group_policies.py +0 -0
  100. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/mfa_duo.py +0 -0
  101. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/mfa_login_enforcement.py +0 -0
  102. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/mfa_okta.py +0 -0
  103. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/mfa_pingid.py +0 -0
  104. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/mfa_totp.py +0 -0
  105. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/oidc.py +0 -0
  106. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/oidc_assignment.py +0 -0
  107. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/oidc_client.py +0 -0
  108. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/oidc_key.py +0 -0
  109. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -0
  110. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/oidc_provider.py +0 -0
  111. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/oidc_role.py +0 -0
  112. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/oidc_scope.py +0 -0
  113. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/outputs.py +0 -0
  114. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/jwt/__init__.py +0 -0
  115. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/jwt/_inputs.py +0 -0
  116. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/jwt/auth_backend.py +0 -0
  117. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/jwt/auth_backend_role.py +0 -0
  118. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/jwt/outputs.py +0 -0
  119. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kmip/__init__.py +0 -0
  120. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kmip/secret_backend.py +0 -0
  121. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kmip/secret_role.py +0 -0
  122. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kmip/secret_scope.py +0 -0
  123. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kubernetes/__init__.py +0 -0
  124. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kubernetes/auth_backend_config.py +0 -0
  125. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kubernetes/auth_backend_role.py +0 -0
  126. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kubernetes/get_auth_backend_config.py +0 -0
  127. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kubernetes/get_auth_backend_role.py +0 -0
  128. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kubernetes/get_service_account_token.py +0 -0
  129. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kubernetes/secret_backend.py +0 -0
  130. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kubernetes/secret_backend_role.py +0 -0
  131. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kv/__init__.py +0 -0
  132. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kv/_inputs.py +0 -0
  133. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kv/get_secret.py +0 -0
  134. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kv/get_secret_subkeys_v2.py +0 -0
  135. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kv/get_secret_v2.py +0 -0
  136. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kv/get_secrets_list.py +0 -0
  137. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kv/get_secrets_list_v2.py +0 -0
  138. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kv/outputs.py +0 -0
  139. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kv/secret.py +0 -0
  140. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kv/secret_backend_v2.py +0 -0
  141. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kv/secret_v2.py +0 -0
  142. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/ldap/__init__.py +0 -0
  143. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/ldap/auth_backend.py +0 -0
  144. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/ldap/auth_backend_group.py +0 -0
  145. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/ldap/auth_backend_user.py +0 -0
  146. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -0
  147. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/ldap/secret_backend_library_set.py +0 -0
  148. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/ldap/secret_backend_static_role.py +0 -0
  149. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/managed/__init__.py +0 -0
  150. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/managed/_inputs.py +0 -0
  151. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/managed/keys.py +0 -0
  152. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/managed/outputs.py +0 -0
  153. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/mfa_duo.py +0 -0
  154. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/mfa_okta.py +0 -0
  155. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/mfa_pingid.py +0 -0
  156. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/mfa_totp.py +0 -0
  157. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/mongodbatlas/__init__.py +0 -0
  158. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/mongodbatlas/secret_backend.py +0 -0
  159. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/mongodbatlas/secret_role.py +0 -0
  160. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/mount.py +0 -0
  161. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/namespace.py +0 -0
  162. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/nomad_secret_backend.py +0 -0
  163. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/nomad_secret_role.py +0 -0
  164. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/okta/__init__.py +0 -0
  165. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/okta/_inputs.py +0 -0
  166. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/okta/auth_backend.py +0 -0
  167. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/okta/auth_backend_group.py +0 -0
  168. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/okta/auth_backend_user.py +0 -0
  169. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/okta/outputs.py +0 -0
  170. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/outputs.py +0 -0
  171. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/password_policy.py +0 -0
  172. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/pkisecret/__init__.py +0 -0
  173. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/pkisecret/secret_backend_cert.py +0 -0
  174. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -0
  175. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -0
  176. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -0
  177. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -0
  178. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -0
  179. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -0
  180. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/pkisecret/secret_backend_issuer.py +0 -0
  181. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/pkisecret/secret_backend_key.py +0 -0
  182. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/pkisecret/secret_backend_role.py +0 -0
  183. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -0
  184. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -0
  185. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/pkisecret/secret_backend_sign.py +0 -0
  186. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/policy.py +0 -0
  187. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/provider.py +0 -0
  188. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/pulumi-plugin.json +0 -0
  189. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/py.typed +0 -0
  190. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/rabbitmq/__init__.py +0 -0
  191. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/rabbitmq/_inputs.py +0 -0
  192. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/rabbitmq/outputs.py +0 -0
  193. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/rabbitmq/secret_backend.py +0 -0
  194. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/rabbitmq/secret_backend_role.py +0 -0
  195. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/raft_autopilot.py +0 -0
  196. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/raft_snapshot_agent_config.py +0 -0
  197. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/rgp_policy.py +0 -0
  198. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/ssh/__init__.py +0 -0
  199. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/ssh/_inputs.py +0 -0
  200. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/ssh/outputs.py +0 -0
  201. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/ssh/secret_backend_ca.py +0 -0
  202. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/ssh/secret_backend_role.py +0 -0
  203. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/terraformcloud/__init__.py +0 -0
  204. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/terraformcloud/secret_backend.py +0 -0
  205. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/terraformcloud/secret_creds.py +0 -0
  206. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/terraformcloud/secret_role.py +0 -0
  207. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/token.py +0 -0
  208. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/tokenauth/__init__.py +0 -0
  209. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/tokenauth/auth_backend_role.py +0 -0
  210. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/transform/__init__.py +0 -0
  211. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/transform/alphabet.py +0 -0
  212. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/transform/get_decode.py +0 -0
  213. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/transform/get_encode.py +0 -0
  214. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/transform/role.py +0 -0
  215. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/transform/template.py +0 -0
  216. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/transform/transformation.py +0 -0
  217. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/transit/__init__.py +0 -0
  218. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/transit/get_decrypt.py +0 -0
  219. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/transit/get_encrypt.py +0 -0
  220. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/transit/secret_backend_key.py +0 -0
  221. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/transit/secret_cache_config.py +0 -0
  222. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault.egg-info/SOURCES.txt +0 -0
  223. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault.egg-info/dependency_links.txt +0 -0
  224. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault.egg-info/not-zip-safe +0 -0
  225. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault.egg-info/requires.txt +0 -0
  226. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault.egg-info/top_level.txt +0 -0
  227. {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/setup.cfg +0 -0
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: pulumi_vault
3
- Version: 5.16.0a1694757730
3
+ Version: 5.16.0a1697145324
4
4
  Summary: A Pulumi package for creating and managing HashiCorp Vault cloud resources.
5
5
  Home-page: https://pulumi.io
6
6
  License: Apache-2.0
@@ -42,7 +42,7 @@ class CertAuthBackendRoleArgs:
42
42
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_common_names: Allowed the common names for authenticated client certificates
43
43
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_dns_sans: Allowed alternative dns names for authenticated client certificates
44
44
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_email_sans: Allowed emails for authenticated client certificates
45
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_names: Allowed subject names for authenticated client certificates
45
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_names: DEPRECATED: Please use the individual `allowed_X_sans` parameters instead. Allowed subject names for authenticated client certificates
46
46
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_organizational_units: Allowed organization units for authenticated client certificates.
47
47
  *In previous provider releases this field was incorrectly named `allowed_organization_units`, please update accordingly*
48
48
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_uri_sans: Allowed URIs for authenticated client certificates
@@ -180,7 +180,7 @@ class CertAuthBackendRoleArgs:
180
180
  @pulumi.getter(name="allowedNames")
181
181
  def allowed_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
182
182
  """
183
- Allowed subject names for authenticated client certificates
183
+ DEPRECATED: Please use the individual `allowed_X_sans` parameters instead. Allowed subject names for authenticated client certificates
184
184
  """
185
185
  return pulumi.get(self, "allowed_names")
186
186
 
@@ -441,7 +441,7 @@ class _CertAuthBackendRoleState:
441
441
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_common_names: Allowed the common names for authenticated client certificates
442
442
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_dns_sans: Allowed alternative dns names for authenticated client certificates
443
443
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_email_sans: Allowed emails for authenticated client certificates
444
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_names: Allowed subject names for authenticated client certificates
444
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_names: DEPRECATED: Please use the individual `allowed_X_sans` parameters instead. Allowed subject names for authenticated client certificates
445
445
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_organizational_units: Allowed organization units for authenticated client certificates.
446
446
  *In previous provider releases this field was incorrectly named `allowed_organization_units`, please update accordingly*
447
447
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_uri_sans: Allowed URIs for authenticated client certificates
@@ -569,7 +569,7 @@ class _CertAuthBackendRoleState:
569
569
  @pulumi.getter(name="allowedNames")
570
570
  def allowed_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
571
571
  """
572
- Allowed subject names for authenticated client certificates
572
+ DEPRECATED: Please use the individual `allowed_X_sans` parameters instead. Allowed subject names for authenticated client certificates
573
573
  """
574
574
  return pulumi.get(self, "allowed_names")
575
575
 
@@ -869,7 +869,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
869
869
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_common_names: Allowed the common names for authenticated client certificates
870
870
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_dns_sans: Allowed alternative dns names for authenticated client certificates
871
871
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_email_sans: Allowed emails for authenticated client certificates
872
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_names: Allowed subject names for authenticated client certificates
872
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_names: DEPRECATED: Please use the individual `allowed_X_sans` parameters instead. Allowed subject names for authenticated client certificates
873
873
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_organizational_units: Allowed organization units for authenticated client certificates.
874
874
  *In previous provider releases this field was incorrectly named `allowed_organization_units`, please update accordingly*
875
875
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_uri_sans: Allowed URIs for authenticated client certificates
@@ -1054,7 +1054,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
1054
1054
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_common_names: Allowed the common names for authenticated client certificates
1055
1055
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_dns_sans: Allowed alternative dns names for authenticated client certificates
1056
1056
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_email_sans: Allowed emails for authenticated client certificates
1057
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_names: Allowed subject names for authenticated client certificates
1057
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_names: DEPRECATED: Please use the individual `allowed_X_sans` parameters instead. Allowed subject names for authenticated client certificates
1058
1058
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_organizational_units: Allowed organization units for authenticated client certificates.
1059
1059
  *In previous provider releases this field was incorrectly named `allowed_organization_units`, please update accordingly*
1060
1060
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_uri_sans: Allowed URIs for authenticated client certificates
@@ -1150,7 +1150,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
1150
1150
  @pulumi.getter(name="allowedNames")
1151
1151
  def allowed_names(self) -> pulumi.Output[Sequence[str]]:
1152
1152
  """
1153
- Allowed subject names for authenticated client certificates
1153
+ DEPRECATED: Please use the individual `allowed_X_sans` parameters instead. Allowed subject names for authenticated client certificates
1154
1154
  """
1155
1155
  return pulumi.get(self, "allowed_names")
1156
1156
 
@@ -77,7 +77,7 @@ class SecretBackendArgs:
77
77
  not begin or end with a `/`. Defaults to `ldap`.
78
78
  :param pulumi.Input[int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
79
79
  before returning back an error.
80
- :param pulumi.Input[str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include openldap, ad, and racf.
80
+ :param pulumi.Input[str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
81
81
  :param pulumi.Input[bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
82
82
  :param pulumi.Input[bool] starttls: Issue a StartTLS command after establishing unencrypted connection.
83
83
  :param pulumi.Input[str] upndomain: Enables userPrincipalDomain login with [username]@UPNDomain.
@@ -424,7 +424,7 @@ class SecretBackendArgs:
424
424
  @pulumi.getter
425
425
  def schema(self) -> Optional[pulumi.Input[str]]:
426
426
  """
427
- The LDAP schema to use when storing entry passwords. Valid schemas include openldap, ad, and racf.
427
+ The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
428
428
  """
429
429
  return pulumi.get(self, "schema")
430
430
 
@@ -574,7 +574,7 @@ class _SecretBackendState:
574
574
  not begin or end with a `/`. Defaults to `ldap`.
575
575
  :param pulumi.Input[int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
576
576
  before returning back an error.
577
- :param pulumi.Input[str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include openldap, ad, and racf.
577
+ :param pulumi.Input[str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
578
578
  :param pulumi.Input[bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
579
579
  :param pulumi.Input[bool] starttls: Issue a StartTLS command after establishing unencrypted connection.
580
580
  :param pulumi.Input[str] upndomain: Enables userPrincipalDomain login with [username]@UPNDomain.
@@ -937,7 +937,7 @@ class _SecretBackendState:
937
937
  @pulumi.getter
938
938
  def schema(self) -> Optional[pulumi.Input[str]]:
939
939
  """
940
- The LDAP schema to use when storing entry passwords. Valid schemas include openldap, ad, and racf.
940
+ The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
941
941
  """
942
942
  return pulumi.get(self, "schema")
943
943
 
@@ -1112,7 +1112,7 @@ class SecretBackend(pulumi.CustomResource):
1112
1112
  not begin or end with a `/`. Defaults to `ldap`.
1113
1113
  :param pulumi.Input[int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
1114
1114
  before returning back an error.
1115
- :param pulumi.Input[str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include openldap, ad, and racf.
1115
+ :param pulumi.Input[str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
1116
1116
  :param pulumi.Input[bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1117
1117
  :param pulumi.Input[bool] starttls: Issue a StartTLS command after establishing unencrypted connection.
1118
1118
  :param pulumi.Input[str] upndomain: Enables userPrincipalDomain login with [username]@UPNDomain.
@@ -1323,7 +1323,7 @@ class SecretBackend(pulumi.CustomResource):
1323
1323
  not begin or end with a `/`. Defaults to `ldap`.
1324
1324
  :param pulumi.Input[int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
1325
1325
  before returning back an error.
1326
- :param pulumi.Input[str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include openldap, ad, and racf.
1326
+ :param pulumi.Input[str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
1327
1327
  :param pulumi.Input[bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1328
1328
  :param pulumi.Input[bool] starttls: Issue a StartTLS command after establishing unencrypted connection.
1329
1329
  :param pulumi.Input[str] upndomain: Enables userPrincipalDomain login with [username]@UPNDomain.
@@ -1566,7 +1566,7 @@ class SecretBackend(pulumi.CustomResource):
1566
1566
  @pulumi.getter
1567
1567
  def schema(self) -> pulumi.Output[str]:
1568
1568
  """
1569
- The LDAP schema to use when storing entry passwords. Valid schemas include openldap, ad, and racf.
1569
+ The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
1570
1570
  """
1571
1571
  return pulumi.get(self, "schema")
1572
1572
 
@@ -17,7 +17,8 @@ class QuotaLeaseCountArgs:
17
17
  max_leases: pulumi.Input[int],
18
18
  name: Optional[pulumi.Input[str]] = None,
19
19
  namespace: Optional[pulumi.Input[str]] = None,
20
- path: Optional[pulumi.Input[str]] = None):
20
+ path: Optional[pulumi.Input[str]] = None,
21
+ role: Optional[pulumi.Input[str]] = None):
21
22
  """
22
23
  The set of arguments for constructing a QuotaLeaseCount resource.
23
24
  :param pulumi.Input[int] max_leases: The maximum number of leases to be allowed by the quota
@@ -33,6 +34,7 @@ class QuotaLeaseCountArgs:
33
34
  Updating this field on an existing quota can have "moving" effects. For example, updating
34
35
  `auth/userpass` to `namespace1/auth/userpass` moves this quota from being a global mount quota to
35
36
  a namespace specific mount quota. **Note, namespaces are supported in Enterprise only.**
37
+ :param pulumi.Input[str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
36
38
  """
37
39
  pulumi.set(__self__, "max_leases", max_leases)
38
40
  if name is not None:
@@ -41,6 +43,8 @@ class QuotaLeaseCountArgs:
41
43
  pulumi.set(__self__, "namespace", namespace)
42
44
  if path is not None:
43
45
  pulumi.set(__self__, "path", path)
46
+ if role is not None:
47
+ pulumi.set(__self__, "role", role)
44
48
 
45
49
  @property
46
50
  @pulumi.getter(name="maxLeases")
@@ -99,6 +103,18 @@ class QuotaLeaseCountArgs:
99
103
  def path(self, value: Optional[pulumi.Input[str]]):
100
104
  pulumi.set(self, "path", value)
101
105
 
106
+ @property
107
+ @pulumi.getter
108
+ def role(self) -> Optional[pulumi.Input[str]]:
109
+ """
110
+ If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
111
+ """
112
+ return pulumi.get(self, "role")
113
+
114
+ @role.setter
115
+ def role(self, value: Optional[pulumi.Input[str]]):
116
+ pulumi.set(self, "role", value)
117
+
102
118
 
103
119
  @pulumi.input_type
104
120
  class _QuotaLeaseCountState:
@@ -106,7 +122,8 @@ class _QuotaLeaseCountState:
106
122
  max_leases: Optional[pulumi.Input[int]] = None,
107
123
  name: Optional[pulumi.Input[str]] = None,
108
124
  namespace: Optional[pulumi.Input[str]] = None,
109
- path: Optional[pulumi.Input[str]] = None):
125
+ path: Optional[pulumi.Input[str]] = None,
126
+ role: Optional[pulumi.Input[str]] = None):
110
127
  """
111
128
  Input properties used for looking up and filtering QuotaLeaseCount resources.
112
129
  :param pulumi.Input[int] max_leases: The maximum number of leases to be allowed by the quota
@@ -122,6 +139,7 @@ class _QuotaLeaseCountState:
122
139
  Updating this field on an existing quota can have "moving" effects. For example, updating
123
140
  `auth/userpass` to `namespace1/auth/userpass` moves this quota from being a global mount quota to
124
141
  a namespace specific mount quota. **Note, namespaces are supported in Enterprise only.**
142
+ :param pulumi.Input[str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
125
143
  """
126
144
  if max_leases is not None:
127
145
  pulumi.set(__self__, "max_leases", max_leases)
@@ -131,6 +149,8 @@ class _QuotaLeaseCountState:
131
149
  pulumi.set(__self__, "namespace", namespace)
132
150
  if path is not None:
133
151
  pulumi.set(__self__, "path", path)
152
+ if role is not None:
153
+ pulumi.set(__self__, "role", role)
134
154
 
135
155
  @property
136
156
  @pulumi.getter(name="maxLeases")
@@ -189,6 +209,18 @@ class _QuotaLeaseCountState:
189
209
  def path(self, value: Optional[pulumi.Input[str]]):
190
210
  pulumi.set(self, "path", value)
191
211
 
212
+ @property
213
+ @pulumi.getter
214
+ def role(self) -> Optional[pulumi.Input[str]]:
215
+ """
216
+ If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
217
+ """
218
+ return pulumi.get(self, "role")
219
+
220
+ @role.setter
221
+ def role(self, value: Optional[pulumi.Input[str]]):
222
+ pulumi.set(self, "role", value)
223
+
192
224
 
193
225
  class QuotaLeaseCount(pulumi.CustomResource):
194
226
  @overload
@@ -199,6 +231,7 @@ class QuotaLeaseCount(pulumi.CustomResource):
199
231
  name: Optional[pulumi.Input[str]] = None,
200
232
  namespace: Optional[pulumi.Input[str]] = None,
201
233
  path: Optional[pulumi.Input[str]] = None,
234
+ role: Optional[pulumi.Input[str]] = None,
202
235
  __props__=None):
203
236
  """
204
237
  Manage lease count quotas which enforce the number of leases that can be created.
@@ -244,6 +277,7 @@ class QuotaLeaseCount(pulumi.CustomResource):
244
277
  Updating this field on an existing quota can have "moving" effects. For example, updating
245
278
  `auth/userpass` to `namespace1/auth/userpass` moves this quota from being a global mount quota to
246
279
  a namespace specific mount quota. **Note, namespaces are supported in Enterprise only.**
280
+ :param pulumi.Input[str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
247
281
  """
248
282
  ...
249
283
  @overload
@@ -299,6 +333,7 @@ class QuotaLeaseCount(pulumi.CustomResource):
299
333
  name: Optional[pulumi.Input[str]] = None,
300
334
  namespace: Optional[pulumi.Input[str]] = None,
301
335
  path: Optional[pulumi.Input[str]] = None,
336
+ role: Optional[pulumi.Input[str]] = None,
302
337
  __props__=None):
303
338
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
304
339
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -314,6 +349,7 @@ class QuotaLeaseCount(pulumi.CustomResource):
314
349
  __props__.__dict__["name"] = name
315
350
  __props__.__dict__["namespace"] = namespace
316
351
  __props__.__dict__["path"] = path
352
+ __props__.__dict__["role"] = role
317
353
  super(QuotaLeaseCount, __self__).__init__(
318
354
  'vault:index/quotaLeaseCount:QuotaLeaseCount',
319
355
  resource_name,
@@ -327,7 +363,8 @@ class QuotaLeaseCount(pulumi.CustomResource):
327
363
  max_leases: Optional[pulumi.Input[int]] = None,
328
364
  name: Optional[pulumi.Input[str]] = None,
329
365
  namespace: Optional[pulumi.Input[str]] = None,
330
- path: Optional[pulumi.Input[str]] = None) -> 'QuotaLeaseCount':
366
+ path: Optional[pulumi.Input[str]] = None,
367
+ role: Optional[pulumi.Input[str]] = None) -> 'QuotaLeaseCount':
331
368
  """
332
369
  Get an existing QuotaLeaseCount resource's state with the given name, id, and optional extra
333
370
  properties used to qualify the lookup.
@@ -348,6 +385,7 @@ class QuotaLeaseCount(pulumi.CustomResource):
348
385
  Updating this field on an existing quota can have "moving" effects. For example, updating
349
386
  `auth/userpass` to `namespace1/auth/userpass` moves this quota from being a global mount quota to
350
387
  a namespace specific mount quota. **Note, namespaces are supported in Enterprise only.**
388
+ :param pulumi.Input[str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
351
389
  """
352
390
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
353
391
 
@@ -357,6 +395,7 @@ class QuotaLeaseCount(pulumi.CustomResource):
357
395
  __props__.__dict__["name"] = name
358
396
  __props__.__dict__["namespace"] = namespace
359
397
  __props__.__dict__["path"] = path
398
+ __props__.__dict__["role"] = role
360
399
  return QuotaLeaseCount(resource_name, opts=opts, __props__=__props__)
361
400
 
362
401
  @property
@@ -400,3 +439,11 @@ class QuotaLeaseCount(pulumi.CustomResource):
400
439
  """
401
440
  return pulumi.get(self, "path")
402
441
 
442
+ @property
443
+ @pulumi.getter
444
+ def role(self) -> pulumi.Output[Optional[str]]:
445
+ """
446
+ If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
447
+ """
448
+ return pulumi.get(self, "role")
449
+
@@ -19,7 +19,8 @@ class QuotaRateLimitArgs:
19
19
  interval: Optional[pulumi.Input[int]] = None,
20
20
  name: Optional[pulumi.Input[str]] = None,
21
21
  namespace: Optional[pulumi.Input[str]] = None,
22
- path: Optional[pulumi.Input[str]] = None):
22
+ path: Optional[pulumi.Input[str]] = None,
23
+ role: Optional[pulumi.Input[str]] = None):
23
24
  """
24
25
  The set of arguments for constructing a QuotaRateLimit resource.
25
26
  :param pulumi.Input[float] rate: The maximum number of requests at any given second to be allowed by the quota
@@ -38,6 +39,7 @@ class QuotaRateLimitArgs:
38
39
  Updating this field on an existing quota can have "moving" effects. For example, updating
39
40
  `auth/userpass` to `namespace1/auth/userpass` moves this quota from being a global mount quota to
40
41
  a namespace specific mount quota. **Note, namespaces are supported in Enterprise only.**
42
+ :param pulumi.Input[str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
41
43
  """
42
44
  pulumi.set(__self__, "rate", rate)
43
45
  if block_interval is not None:
@@ -50,6 +52,8 @@ class QuotaRateLimitArgs:
50
52
  pulumi.set(__self__, "namespace", namespace)
51
53
  if path is not None:
52
54
  pulumi.set(__self__, "path", path)
55
+ if role is not None:
56
+ pulumi.set(__self__, "role", role)
53
57
 
54
58
  @property
55
59
  @pulumi.getter
@@ -133,6 +137,18 @@ class QuotaRateLimitArgs:
133
137
  def path(self, value: Optional[pulumi.Input[str]]):
134
138
  pulumi.set(self, "path", value)
135
139
 
140
+ @property
141
+ @pulumi.getter
142
+ def role(self) -> Optional[pulumi.Input[str]]:
143
+ """
144
+ If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
145
+ """
146
+ return pulumi.get(self, "role")
147
+
148
+ @role.setter
149
+ def role(self, value: Optional[pulumi.Input[str]]):
150
+ pulumi.set(self, "role", value)
151
+
136
152
 
137
153
  @pulumi.input_type
138
154
  class _QuotaRateLimitState:
@@ -142,7 +158,8 @@ class _QuotaRateLimitState:
142
158
  name: Optional[pulumi.Input[str]] = None,
143
159
  namespace: Optional[pulumi.Input[str]] = None,
144
160
  path: Optional[pulumi.Input[str]] = None,
145
- rate: Optional[pulumi.Input[float]] = None):
161
+ rate: Optional[pulumi.Input[float]] = None,
162
+ role: Optional[pulumi.Input[str]] = None):
146
163
  """
147
164
  Input properties used for looking up and filtering QuotaRateLimit resources.
148
165
  :param pulumi.Input[int] block_interval: If set, when a client reaches a rate limit threshold, the client will
@@ -161,6 +178,7 @@ class _QuotaRateLimitState:
161
178
  a namespace specific mount quota. **Note, namespaces are supported in Enterprise only.**
162
179
  :param pulumi.Input[float] rate: The maximum number of requests at any given second to be allowed by the quota
163
180
  rule. The `rate` must be positive.
181
+ :param pulumi.Input[str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
164
182
  """
165
183
  if block_interval is not None:
166
184
  pulumi.set(__self__, "block_interval", block_interval)
@@ -174,6 +192,8 @@ class _QuotaRateLimitState:
174
192
  pulumi.set(__self__, "path", path)
175
193
  if rate is not None:
176
194
  pulumi.set(__self__, "rate", rate)
195
+ if role is not None:
196
+ pulumi.set(__self__, "role", role)
177
197
 
178
198
  @property
179
199
  @pulumi.getter(name="blockInterval")
@@ -257,6 +277,18 @@ class _QuotaRateLimitState:
257
277
  def rate(self, value: Optional[pulumi.Input[float]]):
258
278
  pulumi.set(self, "rate", value)
259
279
 
280
+ @property
281
+ @pulumi.getter
282
+ def role(self) -> Optional[pulumi.Input[str]]:
283
+ """
284
+ If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
285
+ """
286
+ return pulumi.get(self, "role")
287
+
288
+ @role.setter
289
+ def role(self, value: Optional[pulumi.Input[str]]):
290
+ pulumi.set(self, "role", value)
291
+
260
292
 
261
293
  class QuotaRateLimit(pulumi.CustomResource):
262
294
  @overload
@@ -269,6 +301,7 @@ class QuotaRateLimit(pulumi.CustomResource):
269
301
  namespace: Optional[pulumi.Input[str]] = None,
270
302
  path: Optional[pulumi.Input[str]] = None,
271
303
  rate: Optional[pulumi.Input[float]] = None,
304
+ role: Optional[pulumi.Input[str]] = None,
272
305
  __props__=None):
273
306
  """
274
307
  Manage rate limit quotas which enforce API rate limiting using a token bucket algorithm.
@@ -315,6 +348,7 @@ class QuotaRateLimit(pulumi.CustomResource):
315
348
  a namespace specific mount quota. **Note, namespaces are supported in Enterprise only.**
316
349
  :param pulumi.Input[float] rate: The maximum number of requests at any given second to be allowed by the quota
317
350
  rule. The `rate` must be positive.
351
+ :param pulumi.Input[str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
318
352
  """
319
353
  ...
320
354
  @overload
@@ -370,6 +404,7 @@ class QuotaRateLimit(pulumi.CustomResource):
370
404
  namespace: Optional[pulumi.Input[str]] = None,
371
405
  path: Optional[pulumi.Input[str]] = None,
372
406
  rate: Optional[pulumi.Input[float]] = None,
407
+ role: Optional[pulumi.Input[str]] = None,
373
408
  __props__=None):
374
409
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
375
410
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -387,6 +422,7 @@ class QuotaRateLimit(pulumi.CustomResource):
387
422
  if rate is None and not opts.urn:
388
423
  raise TypeError("Missing required property 'rate'")
389
424
  __props__.__dict__["rate"] = rate
425
+ __props__.__dict__["role"] = role
390
426
  super(QuotaRateLimit, __self__).__init__(
391
427
  'vault:index/quotaRateLimit:QuotaRateLimit',
392
428
  resource_name,
@@ -402,7 +438,8 @@ class QuotaRateLimit(pulumi.CustomResource):
402
438
  name: Optional[pulumi.Input[str]] = None,
403
439
  namespace: Optional[pulumi.Input[str]] = None,
404
440
  path: Optional[pulumi.Input[str]] = None,
405
- rate: Optional[pulumi.Input[float]] = None) -> 'QuotaRateLimit':
441
+ rate: Optional[pulumi.Input[float]] = None,
442
+ role: Optional[pulumi.Input[str]] = None) -> 'QuotaRateLimit':
406
443
  """
407
444
  Get an existing QuotaRateLimit resource's state with the given name, id, and optional extra
408
445
  properties used to qualify the lookup.
@@ -426,6 +463,7 @@ class QuotaRateLimit(pulumi.CustomResource):
426
463
  a namespace specific mount quota. **Note, namespaces are supported in Enterprise only.**
427
464
  :param pulumi.Input[float] rate: The maximum number of requests at any given second to be allowed by the quota
428
465
  rule. The `rate` must be positive.
466
+ :param pulumi.Input[str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
429
467
  """
430
468
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
431
469
 
@@ -437,6 +475,7 @@ class QuotaRateLimit(pulumi.CustomResource):
437
475
  __props__.__dict__["namespace"] = namespace
438
476
  __props__.__dict__["path"] = path
439
477
  __props__.__dict__["rate"] = rate
478
+ __props__.__dict__["role"] = role
440
479
  return QuotaRateLimit(resource_name, opts=opts, __props__=__props__)
441
480
 
442
481
  @property
@@ -497,3 +536,11 @@ class QuotaRateLimit(pulumi.CustomResource):
497
536
  """
498
537
  return pulumi.get(self, "rate")
499
538
 
539
+ @property
540
+ @pulumi.getter
541
+ def role(self) -> pulumi.Output[Optional[str]]:
542
+ """
543
+ If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
544
+ """
545
+ return pulumi.get(self, "role")
546
+
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: pulumi-vault
3
- Version: 5.16.0a1694757730
3
+ Version: 5.16.0a1697145324
4
4
  Summary: A Pulumi package for creating and managing HashiCorp Vault cloud resources.
5
5
  Home-page: https://pulumi.io
6
6
  License: Apache-2.0
@@ -8,8 +8,8 @@ from setuptools.command.install import install
8
8
  from subprocess import check_call
9
9
 
10
10
 
11
- VERSION = "5.16.0a1694757730"
12
- PLUGIN_VERSION = "5.16.0-alpha.1694757730+2d9fcea1"
11
+ VERSION = "5.16.0a1697145324"
12
+ PLUGIN_VERSION = "5.16.0-alpha.1697145324+c8f36fe1"
13
13
 
14
14
  class InstallPluginCommand(install):
15
15
  def run(self):