pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (233) hide show
  1. pulumi_vault/__init__.py +76 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +26 -9
  5. pulumi_vault/ad/secret_backend.py +16 -142
  6. pulumi_vault/ad/secret_library.py +16 -9
  7. pulumi_vault/ad/secret_role.py +14 -9
  8. pulumi_vault/alicloud/auth_backend_role.py +76 -190
  9. pulumi_vault/approle/auth_backend_login.py +12 -7
  10. pulumi_vault/approle/auth_backend_role.py +77 -191
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
  13. pulumi_vault/audit.py +30 -21
  14. pulumi_vault/audit_request_header.py +11 -2
  15. pulumi_vault/auth_backend.py +66 -14
  16. pulumi_vault/aws/auth_backend_cert.py +18 -9
  17. pulumi_vault/aws/auth_backend_client.py +267 -22
  18. pulumi_vault/aws/auth_backend_config_identity.py +14 -9
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +77 -191
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
  24. pulumi_vault/aws/auth_backend_sts_role.py +61 -9
  25. pulumi_vault/aws/get_access_credentials.py +38 -9
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +218 -9
  28. pulumi_vault/aws/secret_backend_role.py +185 -9
  29. pulumi_vault/aws/secret_backend_static_role.py +20 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +153 -15
  32. pulumi_vault/azure/auth_backend_role.py +77 -191
  33. pulumi_vault/azure/backend.py +227 -21
  34. pulumi_vault/azure/backend_role.py +42 -37
  35. pulumi_vault/azure/get_access_credentials.py +41 -7
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -267
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +28 -19
  44. pulumi_vault/consul/secret_backend_role.py +18 -78
  45. pulumi_vault/database/_inputs.py +2808 -879
  46. pulumi_vault/database/outputs.py +749 -838
  47. pulumi_vault/database/secret_backend_connection.py +119 -112
  48. pulumi_vault/database/secret_backend_role.py +31 -22
  49. pulumi_vault/database/secret_backend_static_role.py +87 -13
  50. pulumi_vault/database/secrets_mount.py +427 -136
  51. pulumi_vault/egp_policy.py +16 -11
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +250 -33
  54. pulumi_vault/gcp/auth_backend_role.py +77 -269
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -5
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -12
  58. pulumi_vault/gcp/secret_impersonated_account.py +76 -15
  59. pulumi_vault/gcp/secret_roleset.py +31 -24
  60. pulumi_vault/gcp/secret_static_account.py +39 -32
  61. pulumi_vault/generic/endpoint.py +24 -17
  62. pulumi_vault/generic/get_secret.py +64 -8
  63. pulumi_vault/generic/secret.py +21 -16
  64. pulumi_vault/get_auth_backend.py +24 -7
  65. pulumi_vault/get_auth_backends.py +51 -9
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -11
  69. pulumi_vault/get_policy_document.py +34 -19
  70. pulumi_vault/get_raft_autopilot_state.py +29 -10
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +19 -14
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +16 -11
  75. pulumi_vault/github/user.py +16 -11
  76. pulumi_vault/identity/entity.py +20 -13
  77. pulumi_vault/identity/entity_alias.py +20 -13
  78. pulumi_vault/identity/entity_policies.py +28 -11
  79. pulumi_vault/identity/get_entity.py +42 -10
  80. pulumi_vault/identity/get_group.py +47 -9
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -7
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -9
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -10
  84. pulumi_vault/identity/group.py +58 -39
  85. pulumi_vault/identity/group_alias.py +16 -9
  86. pulumi_vault/identity/group_member_entity_ids.py +28 -66
  87. pulumi_vault/identity/group_member_group_ids.py +40 -19
  88. pulumi_vault/identity/group_policies.py +20 -7
  89. pulumi_vault/identity/mfa_duo.py +11 -6
  90. pulumi_vault/identity/mfa_login_enforcement.py +15 -6
  91. pulumi_vault/identity/mfa_okta.py +11 -6
  92. pulumi_vault/identity/mfa_pingid.py +7 -2
  93. pulumi_vault/identity/mfa_totp.py +7 -2
  94. pulumi_vault/identity/oidc.py +12 -7
  95. pulumi_vault/identity/oidc_assignment.py +24 -11
  96. pulumi_vault/identity/oidc_client.py +36 -23
  97. pulumi_vault/identity/oidc_key.py +30 -17
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
  99. pulumi_vault/identity/oidc_provider.py +36 -21
  100. pulumi_vault/identity/oidc_role.py +42 -21
  101. pulumi_vault/identity/oidc_scope.py +20 -13
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +45 -40
  105. pulumi_vault/jwt/auth_backend_role.py +133 -254
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +24 -19
  108. pulumi_vault/kmip/secret_role.py +14 -9
  109. pulumi_vault/kmip/secret_scope.py +14 -9
  110. pulumi_vault/kubernetes/auth_backend_config.py +57 -5
  111. pulumi_vault/kubernetes/auth_backend_role.py +70 -177
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -11
  115. pulumi_vault/kubernetes/secret_backend.py +316 -27
  116. pulumi_vault/kubernetes/secret_backend_role.py +137 -46
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +25 -8
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
  120. pulumi_vault/kv/get_secret_v2.py +85 -9
  121. pulumi_vault/kv/get_secrets_list.py +24 -11
  122. pulumi_vault/kv/get_secrets_list_v2.py +37 -15
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +23 -16
  125. pulumi_vault/kv/secret_backend_v2.py +20 -11
  126. pulumi_vault/kv/secret_v2.py +59 -50
  127. pulumi_vault/ldap/auth_backend.py +127 -166
  128. pulumi_vault/ldap/auth_backend_group.py +14 -9
  129. pulumi_vault/ldap/auth_backend_user.py +14 -9
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +354 -82
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +16 -9
  135. pulumi_vault/ldap/secret_backend_static_role.py +73 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +29 -57
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +18 -11
  140. pulumi_vault/mfa_okta.py +18 -11
  141. pulumi_vault/mfa_pingid.py +18 -11
  142. pulumi_vault/mfa_totp.py +24 -17
  143. pulumi_vault/mongodbatlas/secret_backend.py +20 -15
  144. pulumi_vault/mongodbatlas/secret_role.py +47 -38
  145. pulumi_vault/mount.py +391 -51
  146. pulumi_vault/namespace.py +68 -83
  147. pulumi_vault/nomad_secret_backend.py +18 -13
  148. pulumi_vault/nomad_secret_role.py +14 -9
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +485 -39
  151. pulumi_vault/okta/auth_backend_group.py +14 -9
  152. pulumi_vault/okta/auth_backend_user.py +14 -9
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +20 -13
  156. pulumi_vault/pkisecret/__init__.py +7 -0
  157. pulumi_vault/pkisecret/_inputs.py +115 -0
  158. pulumi_vault/pkisecret/backend_acme_eab.py +549 -0
  159. pulumi_vault/pkisecret/backend_config_acme.py +642 -0
  160. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  161. pulumi_vault/pkisecret/backend_config_cmpv2.py +525 -0
  162. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  163. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +209 -0
  164. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  165. pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
  166. pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
  167. pulumi_vault/pkisecret/get_backend_key.py +24 -9
  168. pulumi_vault/pkisecret/get_backend_keys.py +21 -8
  169. pulumi_vault/pkisecret/outputs.py +109 -0
  170. pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
  171. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
  172. pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
  173. pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
  174. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
  175. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
  176. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
  177. pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
  178. pulumi_vault/pkisecret/secret_backend_key.py +14 -9
  179. pulumi_vault/pkisecret/secret_backend_role.py +68 -14
  180. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
  181. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
  182. pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
  183. pulumi_vault/plugin.py +595 -0
  184. pulumi_vault/plugin_pinned_version.py +298 -0
  185. pulumi_vault/policy.py +14 -9
  186. pulumi_vault/provider.py +48 -53
  187. pulumi_vault/pulumi-plugin.json +2 -1
  188. pulumi_vault/quota_lease_count.py +60 -6
  189. pulumi_vault/quota_rate_limit.py +56 -2
  190. pulumi_vault/rabbitmq/_inputs.py +61 -0
  191. pulumi_vault/rabbitmq/outputs.py +5 -0
  192. pulumi_vault/rabbitmq/secret_backend.py +18 -13
  193. pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
  194. pulumi_vault/raft_autopilot.py +14 -9
  195. pulumi_vault/raft_snapshot_agent_config.py +129 -224
  196. pulumi_vault/rgp_policy.py +14 -9
  197. pulumi_vault/saml/auth_backend.py +22 -17
  198. pulumi_vault/saml/auth_backend_role.py +92 -197
  199. pulumi_vault/secrets/__init__.py +3 -0
  200. pulumi_vault/secrets/_inputs.py +110 -0
  201. pulumi_vault/secrets/outputs.py +94 -0
  202. pulumi_vault/secrets/sync_association.py +56 -71
  203. pulumi_vault/secrets/sync_aws_destination.py +242 -27
  204. pulumi_vault/secrets/sync_azure_destination.py +92 -31
  205. pulumi_vault/secrets/sync_config.py +9 -4
  206. pulumi_vault/secrets/sync_gcp_destination.py +158 -25
  207. pulumi_vault/secrets/sync_gh_destination.py +189 -13
  208. pulumi_vault/secrets/sync_github_apps.py +375 -0
  209. pulumi_vault/secrets/sync_vercel_destination.py +74 -13
  210. pulumi_vault/ssh/_inputs.py +28 -28
  211. pulumi_vault/ssh/outputs.py +11 -28
  212. pulumi_vault/ssh/secret_backend_ca.py +108 -9
  213. pulumi_vault/ssh/secret_backend_role.py +112 -118
  214. pulumi_vault/terraformcloud/secret_backend.py +7 -54
  215. pulumi_vault/terraformcloud/secret_creds.py +14 -20
  216. pulumi_vault/terraformcloud/secret_role.py +16 -74
  217. pulumi_vault/token.py +28 -23
  218. pulumi_vault/tokenauth/auth_backend_role.py +78 -199
  219. pulumi_vault/transform/alphabet.py +16 -9
  220. pulumi_vault/transform/get_decode.py +45 -17
  221. pulumi_vault/transform/get_encode.py +45 -17
  222. pulumi_vault/transform/role.py +16 -9
  223. pulumi_vault/transform/template.py +30 -21
  224. pulumi_vault/transform/transformation.py +12 -7
  225. pulumi_vault/transit/get_decrypt.py +26 -21
  226. pulumi_vault/transit/get_encrypt.py +24 -19
  227. pulumi_vault/transit/secret_backend_key.py +27 -93
  228. pulumi_vault/transit/secret_cache_config.py +12 -7
  229. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0.dist-info}/METADATA +8 -7
  230. pulumi_vault-6.5.0.dist-info/RECORD +260 -0
  231. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0.dist-info}/WHEEL +1 -1
  232. pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
  233. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0.dist-info}/top_level.txt +0 -0
@@ -4,6 +4,7 @@
4
4
 
5
5
 
6
6
  import asyncio
7
+ import functools
7
8
  import importlib.metadata
8
9
  import importlib.util
9
10
  import inspect
@@ -11,14 +12,19 @@ import json
11
12
  import os
12
13
  import sys
13
14
  import typing
15
+ import warnings
16
+ import base64
14
17
 
15
18
  import pulumi
16
19
  import pulumi.runtime
17
20
  from pulumi.runtime.sync_await import _sync_await
21
+ from pulumi.runtime.proto import resource_pb2
18
22
 
19
23
  from semver import VersionInfo as SemverVersion
20
24
  from parver import Version as PEP440Version
21
25
 
26
+ C = typing.TypeVar("C", bound=typing.Callable)
27
+
22
28
 
23
29
  def get_env(*args):
24
30
  for v in args:
@@ -96,10 +102,6 @@ def _get_semver_version():
96
102
  _version = _get_semver_version()
97
103
  _version_str = str(_version)
98
104
 
99
-
100
- def get_version():
101
- return _version_str
102
-
103
105
  def get_resource_opts_defaults() -> pulumi.ResourceOptions:
104
106
  return pulumi.ResourceOptions(
105
107
  version=get_version(),
@@ -262,7 +264,7 @@ def call_plain(
262
264
  output = pulumi.runtime.call(tok, props, res, typ)
263
265
 
264
266
  # Ingoring deps silently. They are typically non-empty, r.f() calls include r as a dependency.
265
- result, known, secret, _ = _sync_await(asyncio.ensure_future(_await_output(output)))
267
+ result, known, secret, _ = _sync_await(asyncio.create_task(_await_output(output)))
266
268
 
267
269
  problem = None
268
270
  if not known:
@@ -287,5 +289,39 @@ async def _await_output(o: pulumi.Output[typing.Any]) -> typing.Tuple[object, bo
287
289
  await o._resources,
288
290
  )
289
291
 
292
+
293
+ # This is included to provide an upgrade path for users who are using a version
294
+ # of the Pulumi SDK (<3.121.0) that does not include the `deprecated` decorator.
295
+ def deprecated(message: str) -> typing.Callable[[C], C]:
296
+ """
297
+ Decorator to indicate a function is deprecated.
298
+
299
+ As well as inserting appropriate statements to indicate that the function is
300
+ deprecated, this decorator also tags the function with a special attribute
301
+ so that Pulumi code can detect that it is deprecated and react appropriately
302
+ in certain situations.
303
+
304
+ message is the deprecation message that should be printed if the function is called.
305
+ """
306
+
307
+ def decorator(fn: C) -> C:
308
+ if not callable(fn):
309
+ raise TypeError("Expected fn to be callable")
310
+
311
+ @functools.wraps(fn)
312
+ def deprecated_fn(*args, **kwargs):
313
+ warnings.warn(message)
314
+ pulumi.warn(f"{fn.__name__} is deprecated: {message}")
315
+
316
+ return fn(*args, **kwargs)
317
+
318
+ deprecated_fn.__dict__["_pulumi_deprecated_callable"] = fn
319
+ return typing.cast(C, deprecated_fn)
320
+
321
+ return decorator
322
+
290
323
  def get_plugin_download_url():
291
324
  return None
325
+
326
+ def get_version():
327
+ return _version_str
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -112,13 +117,14 @@ def get_access_credentials(backend: Optional[str] = None,
112
117
  role: Optional[str] = None,
113
118
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetAccessCredentialsResult:
114
119
  """
115
- Use this data source to access information about an existing resource.
120
+ ## Example Usage
121
+
116
122
 
117
123
  :param str backend: The path to the AD secret backend to
118
124
  read credentials from, with no leading or trailing `/`s.
119
125
  :param str namespace: The namespace of the target resource.
120
126
  The value should not contain leading or trailing forward slashes.
121
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
127
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
122
128
  *Available only for Vault Enterprise*.
123
129
  :param str role: The name of the AD secret backend role to read
124
130
  credentials from, with no leading or trailing `/`s.
@@ -138,23 +144,34 @@ def get_access_credentials(backend: Optional[str] = None,
138
144
  namespace=pulumi.get(__ret__, 'namespace'),
139
145
  role=pulumi.get(__ret__, 'role'),
140
146
  username=pulumi.get(__ret__, 'username'))
141
-
142
-
143
- @_utilities.lift_output_func(get_access_credentials)
144
147
  def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
145
148
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
146
149
  role: Optional[pulumi.Input[str]] = None,
147
- opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAccessCredentialsResult]:
150
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAccessCredentialsResult]:
148
151
  """
149
- Use this data source to access information about an existing resource.
152
+ ## Example Usage
153
+
150
154
 
151
155
  :param str backend: The path to the AD secret backend to
152
156
  read credentials from, with no leading or trailing `/`s.
153
157
  :param str namespace: The namespace of the target resource.
154
158
  The value should not contain leading or trailing forward slashes.
155
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
159
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
156
160
  *Available only for Vault Enterprise*.
157
161
  :param str role: The name of the AD secret backend role to read
158
162
  credentials from, with no leading or trailing `/`s.
159
163
  """
160
- ...
164
+ __args__ = dict()
165
+ __args__['backend'] = backend
166
+ __args__['namespace'] = namespace
167
+ __args__['role'] = role
168
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
169
+ __ret__ = pulumi.runtime.invoke_output('vault:ad/getAccessCredentials:getAccessCredentials', __args__, opts=opts, typ=GetAccessCredentialsResult)
170
+ return __ret__.apply(lambda __response__: GetAccessCredentialsResult(
171
+ backend=pulumi.get(__response__, 'backend'),
172
+ current_password=pulumi.get(__response__, 'current_password'),
173
+ id=pulumi.get(__response__, 'id'),
174
+ last_password=pulumi.get(__response__, 'last_password'),
175
+ namespace=pulumi.get(__response__, 'namespace'),
176
+ role=pulumi.get(__response__, 'role'),
177
+ username=pulumi.get(__response__, 'username')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendArgs', 'SecretBackend']
@@ -27,13 +32,11 @@ class SecretBackendArgs:
27
32
  description: Optional[pulumi.Input[str]] = None,
28
33
  disable_remount: Optional[pulumi.Input[bool]] = None,
29
34
  discoverdn: Optional[pulumi.Input[bool]] = None,
30
- formatter: Optional[pulumi.Input[str]] = None,
31
35
  groupattr: Optional[pulumi.Input[str]] = None,
32
36
  groupdn: Optional[pulumi.Input[str]] = None,
33
37
  groupfilter: Optional[pulumi.Input[str]] = None,
34
38
  insecure_tls: Optional[pulumi.Input[bool]] = None,
35
39
  last_rotation_tolerance: Optional[pulumi.Input[int]] = None,
36
- length: Optional[pulumi.Input[int]] = None,
37
40
  local: Optional[pulumi.Input[bool]] = None,
38
41
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
39
42
  max_ttl: Optional[pulumi.Input[int]] = None,
@@ -71,7 +74,6 @@ class SecretBackendArgs:
71
74
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
72
75
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
73
76
  :param pulumi.Input[bool] discoverdn: Use anonymous bind to discover the bind Distinguished Name of a user.
74
- :param pulumi.Input[str] formatter: **Deprecated** use `password_policy`. Text to insert the password into, ex. "customPrefix{{PASSWORD}}customSuffix".
75
77
  :param pulumi.Input[str] groupattr: LDAP attribute to follow on objects returned by <groupfilter> in order to enumerate
76
78
  user group membership. Examples: `cn` or `memberOf`, etc. Defaults to `cn`.
77
79
  :param pulumi.Input[str] groupdn: LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org).
@@ -81,15 +83,13 @@ class SecretBackendArgs:
81
83
  Defaults to `false`.
82
84
  :param pulumi.Input[int] last_rotation_tolerance: The number of seconds after a Vault rotation where, if Active Directory
83
85
  shows a later rotation, it should be considered out-of-band
84
- :param pulumi.Input[int] length: **Deprecated** use `password_policy`. The desired length of passwords that Vault generates.
85
- *Mutually exclusive with `password_policy` on vault-1.11+*
86
86
  :param pulumi.Input[bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
87
87
  replication.Tolerance duration to use when checking the last rotation time.
88
88
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
89
89
  :param pulumi.Input[int] max_ttl: In seconds, the maximum password time-to-live.
90
90
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
91
91
  The value should not contain leading or trailing forward slashes.
92
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
92
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
93
93
  *Available only for Vault Enterprise*.
94
94
  :param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
95
95
  :param pulumi.Input[int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
@@ -138,11 +138,6 @@ class SecretBackendArgs:
138
138
  pulumi.set(__self__, "disable_remount", disable_remount)
139
139
  if discoverdn is not None:
140
140
  pulumi.set(__self__, "discoverdn", discoverdn)
141
- if formatter is not None:
142
- warnings.warn("""Formatter is deprecated and password_policy should be used with Vault >= 1.5.""", DeprecationWarning)
143
- pulumi.log.warn("""formatter is deprecated: Formatter is deprecated and password_policy should be used with Vault >= 1.5.""")
144
- if formatter is not None:
145
- pulumi.set(__self__, "formatter", formatter)
146
141
  if groupattr is not None:
147
142
  pulumi.set(__self__, "groupattr", groupattr)
148
143
  if groupdn is not None:
@@ -153,11 +148,6 @@ class SecretBackendArgs:
153
148
  pulumi.set(__self__, "insecure_tls", insecure_tls)
154
149
  if last_rotation_tolerance is not None:
155
150
  pulumi.set(__self__, "last_rotation_tolerance", last_rotation_tolerance)
156
- if length is not None:
157
- warnings.warn("""Length is deprecated and password_policy should be used with Vault >= 1.5.""", DeprecationWarning)
158
- pulumi.log.warn("""length is deprecated: Length is deprecated and password_policy should be used with Vault >= 1.5.""")
159
- if length is not None:
160
- pulumi.set(__self__, "length", length)
161
151
  if local is not None:
162
152
  pulumi.set(__self__, "local", local)
163
153
  if max_lease_ttl_seconds is not None:
@@ -353,21 +343,6 @@ class SecretBackendArgs:
353
343
  def discoverdn(self, value: Optional[pulumi.Input[bool]]):
354
344
  pulumi.set(self, "discoverdn", value)
355
345
 
356
- @property
357
- @pulumi.getter
358
- def formatter(self) -> Optional[pulumi.Input[str]]:
359
- """
360
- **Deprecated** use `password_policy`. Text to insert the password into, ex. "customPrefix{{PASSWORD}}customSuffix".
361
- """
362
- warnings.warn("""Formatter is deprecated and password_policy should be used with Vault >= 1.5.""", DeprecationWarning)
363
- pulumi.log.warn("""formatter is deprecated: Formatter is deprecated and password_policy should be used with Vault >= 1.5.""")
364
-
365
- return pulumi.get(self, "formatter")
366
-
367
- @formatter.setter
368
- def formatter(self, value: Optional[pulumi.Input[str]]):
369
- pulumi.set(self, "formatter", value)
370
-
371
346
  @property
372
347
  @pulumi.getter
373
348
  def groupattr(self) -> Optional[pulumi.Input[str]]:
@@ -432,22 +407,6 @@ class SecretBackendArgs:
432
407
  def last_rotation_tolerance(self, value: Optional[pulumi.Input[int]]):
433
408
  pulumi.set(self, "last_rotation_tolerance", value)
434
409
 
435
- @property
436
- @pulumi.getter
437
- def length(self) -> Optional[pulumi.Input[int]]:
438
- """
439
- **Deprecated** use `password_policy`. The desired length of passwords that Vault generates.
440
- *Mutually exclusive with `password_policy` on vault-1.11+*
441
- """
442
- warnings.warn("""Length is deprecated and password_policy should be used with Vault >= 1.5.""", DeprecationWarning)
443
- pulumi.log.warn("""length is deprecated: Length is deprecated and password_policy should be used with Vault >= 1.5.""")
444
-
445
- return pulumi.get(self, "length")
446
-
447
- @length.setter
448
- def length(self, value: Optional[pulumi.Input[int]]):
449
- pulumi.set(self, "length", value)
450
-
451
410
  @property
452
411
  @pulumi.getter
453
412
  def local(self) -> Optional[pulumi.Input[bool]]:
@@ -491,7 +450,7 @@ class SecretBackendArgs:
491
450
  """
492
451
  The namespace to provision the resource in.
493
452
  The value should not contain leading or trailing forward slashes.
494
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
453
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
495
454
  *Available only for Vault Enterprise*.
496
455
  """
497
456
  return pulumi.get(self, "namespace")
@@ -671,13 +630,11 @@ class _SecretBackendState:
671
630
  description: Optional[pulumi.Input[str]] = None,
672
631
  disable_remount: Optional[pulumi.Input[bool]] = None,
673
632
  discoverdn: Optional[pulumi.Input[bool]] = None,
674
- formatter: Optional[pulumi.Input[str]] = None,
675
633
  groupattr: Optional[pulumi.Input[str]] = None,
676
634
  groupdn: Optional[pulumi.Input[str]] = None,
677
635
  groupfilter: Optional[pulumi.Input[str]] = None,
678
636
  insecure_tls: Optional[pulumi.Input[bool]] = None,
679
637
  last_rotation_tolerance: Optional[pulumi.Input[int]] = None,
680
- length: Optional[pulumi.Input[int]] = None,
681
638
  local: Optional[pulumi.Input[bool]] = None,
682
639
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
683
640
  max_ttl: Optional[pulumi.Input[int]] = None,
@@ -715,7 +672,6 @@ class _SecretBackendState:
715
672
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
716
673
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
717
674
  :param pulumi.Input[bool] discoverdn: Use anonymous bind to discover the bind Distinguished Name of a user.
718
- :param pulumi.Input[str] formatter: **Deprecated** use `password_policy`. Text to insert the password into, ex. "customPrefix{{PASSWORD}}customSuffix".
719
675
  :param pulumi.Input[str] groupattr: LDAP attribute to follow on objects returned by <groupfilter> in order to enumerate
720
676
  user group membership. Examples: `cn` or `memberOf`, etc. Defaults to `cn`.
721
677
  :param pulumi.Input[str] groupdn: LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org).
@@ -725,15 +681,13 @@ class _SecretBackendState:
725
681
  Defaults to `false`.
726
682
  :param pulumi.Input[int] last_rotation_tolerance: The number of seconds after a Vault rotation where, if Active Directory
727
683
  shows a later rotation, it should be considered out-of-band
728
- :param pulumi.Input[int] length: **Deprecated** use `password_policy`. The desired length of passwords that Vault generates.
729
- *Mutually exclusive with `password_policy` on vault-1.11+*
730
684
  :param pulumi.Input[bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
731
685
  replication.Tolerance duration to use when checking the last rotation time.
732
686
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
733
687
  :param pulumi.Input[int] max_ttl: In seconds, the maximum password time-to-live.
734
688
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
735
689
  The value should not contain leading or trailing forward slashes.
736
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
690
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
737
691
  *Available only for Vault Enterprise*.
738
692
  :param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
739
693
  :param pulumi.Input[int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
@@ -784,11 +738,6 @@ class _SecretBackendState:
784
738
  pulumi.set(__self__, "disable_remount", disable_remount)
785
739
  if discoverdn is not None:
786
740
  pulumi.set(__self__, "discoverdn", discoverdn)
787
- if formatter is not None:
788
- warnings.warn("""Formatter is deprecated and password_policy should be used with Vault >= 1.5.""", DeprecationWarning)
789
- pulumi.log.warn("""formatter is deprecated: Formatter is deprecated and password_policy should be used with Vault >= 1.5.""")
790
- if formatter is not None:
791
- pulumi.set(__self__, "formatter", formatter)
792
741
  if groupattr is not None:
793
742
  pulumi.set(__self__, "groupattr", groupattr)
794
743
  if groupdn is not None:
@@ -799,11 +748,6 @@ class _SecretBackendState:
799
748
  pulumi.set(__self__, "insecure_tls", insecure_tls)
800
749
  if last_rotation_tolerance is not None:
801
750
  pulumi.set(__self__, "last_rotation_tolerance", last_rotation_tolerance)
802
- if length is not None:
803
- warnings.warn("""Length is deprecated and password_policy should be used with Vault >= 1.5.""", DeprecationWarning)
804
- pulumi.log.warn("""length is deprecated: Length is deprecated and password_policy should be used with Vault >= 1.5.""")
805
- if length is not None:
806
- pulumi.set(__self__, "length", length)
807
751
  if local is not None:
808
752
  pulumi.set(__self__, "local", local)
809
753
  if max_lease_ttl_seconds is not None:
@@ -999,21 +943,6 @@ class _SecretBackendState:
999
943
  def discoverdn(self, value: Optional[pulumi.Input[bool]]):
1000
944
  pulumi.set(self, "discoverdn", value)
1001
945
 
1002
- @property
1003
- @pulumi.getter
1004
- def formatter(self) -> Optional[pulumi.Input[str]]:
1005
- """
1006
- **Deprecated** use `password_policy`. Text to insert the password into, ex. "customPrefix{{PASSWORD}}customSuffix".
1007
- """
1008
- warnings.warn("""Formatter is deprecated and password_policy should be used with Vault >= 1.5.""", DeprecationWarning)
1009
- pulumi.log.warn("""formatter is deprecated: Formatter is deprecated and password_policy should be used with Vault >= 1.5.""")
1010
-
1011
- return pulumi.get(self, "formatter")
1012
-
1013
- @formatter.setter
1014
- def formatter(self, value: Optional[pulumi.Input[str]]):
1015
- pulumi.set(self, "formatter", value)
1016
-
1017
946
  @property
1018
947
  @pulumi.getter
1019
948
  def groupattr(self) -> Optional[pulumi.Input[str]]:
@@ -1078,22 +1007,6 @@ class _SecretBackendState:
1078
1007
  def last_rotation_tolerance(self, value: Optional[pulumi.Input[int]]):
1079
1008
  pulumi.set(self, "last_rotation_tolerance", value)
1080
1009
 
1081
- @property
1082
- @pulumi.getter
1083
- def length(self) -> Optional[pulumi.Input[int]]:
1084
- """
1085
- **Deprecated** use `password_policy`. The desired length of passwords that Vault generates.
1086
- *Mutually exclusive with `password_policy` on vault-1.11+*
1087
- """
1088
- warnings.warn("""Length is deprecated and password_policy should be used with Vault >= 1.5.""", DeprecationWarning)
1089
- pulumi.log.warn("""length is deprecated: Length is deprecated and password_policy should be used with Vault >= 1.5.""")
1090
-
1091
- return pulumi.get(self, "length")
1092
-
1093
- @length.setter
1094
- def length(self, value: Optional[pulumi.Input[int]]):
1095
- pulumi.set(self, "length", value)
1096
-
1097
1010
  @property
1098
1011
  @pulumi.getter
1099
1012
  def local(self) -> Optional[pulumi.Input[bool]]:
@@ -1137,7 +1050,7 @@ class _SecretBackendState:
1137
1050
  """
1138
1051
  The namespace to provision the resource in.
1139
1052
  The value should not contain leading or trailing forward slashes.
1140
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1053
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1141
1054
  *Available only for Vault Enterprise*.
1142
1055
  """
1143
1056
  return pulumi.get(self, "namespace")
@@ -1319,13 +1232,11 @@ class SecretBackend(pulumi.CustomResource):
1319
1232
  description: Optional[pulumi.Input[str]] = None,
1320
1233
  disable_remount: Optional[pulumi.Input[bool]] = None,
1321
1234
  discoverdn: Optional[pulumi.Input[bool]] = None,
1322
- formatter: Optional[pulumi.Input[str]] = None,
1323
1235
  groupattr: Optional[pulumi.Input[str]] = None,
1324
1236
  groupdn: Optional[pulumi.Input[str]] = None,
1325
1237
  groupfilter: Optional[pulumi.Input[str]] = None,
1326
1238
  insecure_tls: Optional[pulumi.Input[bool]] = None,
1327
1239
  last_rotation_tolerance: Optional[pulumi.Input[int]] = None,
1328
- length: Optional[pulumi.Input[int]] = None,
1329
1240
  local: Optional[pulumi.Input[bool]] = None,
1330
1241
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1331
1242
  max_ttl: Optional[pulumi.Input[int]] = None,
@@ -1354,8 +1265,8 @@ class SecretBackend(pulumi.CustomResource):
1354
1265
  backend="ad",
1355
1266
  binddn="CN=Administrator,CN=Users,DC=corp,DC=example,DC=net",
1356
1267
  bindpass="SuperSecretPassw0rd",
1357
- insecure_tls=True,
1358
1268
  url="ldaps://ad",
1269
+ insecure_tls=True,
1359
1270
  userdn="CN=Users,DC=corp,DC=example,DC=net")
1360
1271
  ```
1361
1272
 
@@ -1364,7 +1275,7 @@ class SecretBackend(pulumi.CustomResource):
1364
1275
  AD secret backend can be imported using the `backend`, e.g.
1365
1276
 
1366
1277
  ```sh
1367
- $ pulumi import vault:ad/secretBackend:SecretBackend ad ad
1278
+ $ pulumi import vault:ad/secretBackend:SecretBackend ad ad
1368
1279
  ```
1369
1280
 
1370
1281
  :param str resource_name: The name of the resource.
@@ -1388,7 +1299,6 @@ class SecretBackend(pulumi.CustomResource):
1388
1299
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
1389
1300
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1390
1301
  :param pulumi.Input[bool] discoverdn: Use anonymous bind to discover the bind Distinguished Name of a user.
1391
- :param pulumi.Input[str] formatter: **Deprecated** use `password_policy`. Text to insert the password into, ex. "customPrefix{{PASSWORD}}customSuffix".
1392
1302
  :param pulumi.Input[str] groupattr: LDAP attribute to follow on objects returned by <groupfilter> in order to enumerate
1393
1303
  user group membership. Examples: `cn` or `memberOf`, etc. Defaults to `cn`.
1394
1304
  :param pulumi.Input[str] groupdn: LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org).
@@ -1398,15 +1308,13 @@ class SecretBackend(pulumi.CustomResource):
1398
1308
  Defaults to `false`.
1399
1309
  :param pulumi.Input[int] last_rotation_tolerance: The number of seconds after a Vault rotation where, if Active Directory
1400
1310
  shows a later rotation, it should be considered out-of-band
1401
- :param pulumi.Input[int] length: **Deprecated** use `password_policy`. The desired length of passwords that Vault generates.
1402
- *Mutually exclusive with `password_policy` on vault-1.11+*
1403
1311
  :param pulumi.Input[bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
1404
1312
  replication.Tolerance duration to use when checking the last rotation time.
1405
1313
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
1406
1314
  :param pulumi.Input[int] max_ttl: In seconds, the maximum password time-to-live.
1407
1315
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
1408
1316
  The value should not contain leading or trailing forward slashes.
1409
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1317
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1410
1318
  *Available only for Vault Enterprise*.
1411
1319
  :param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
1412
1320
  :param pulumi.Input[int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
@@ -1448,8 +1356,8 @@ class SecretBackend(pulumi.CustomResource):
1448
1356
  backend="ad",
1449
1357
  binddn="CN=Administrator,CN=Users,DC=corp,DC=example,DC=net",
1450
1358
  bindpass="SuperSecretPassw0rd",
1451
- insecure_tls=True,
1452
1359
  url="ldaps://ad",
1360
+ insecure_tls=True,
1453
1361
  userdn="CN=Users,DC=corp,DC=example,DC=net")
1454
1362
  ```
1455
1363
 
@@ -1458,7 +1366,7 @@ class SecretBackend(pulumi.CustomResource):
1458
1366
  AD secret backend can be imported using the `backend`, e.g.
1459
1367
 
1460
1368
  ```sh
1461
- $ pulumi import vault:ad/secretBackend:SecretBackend ad ad
1369
+ $ pulumi import vault:ad/secretBackend:SecretBackend ad ad
1462
1370
  ```
1463
1371
 
1464
1372
  :param str resource_name: The name of the resource.
@@ -1489,13 +1397,11 @@ class SecretBackend(pulumi.CustomResource):
1489
1397
  description: Optional[pulumi.Input[str]] = None,
1490
1398
  disable_remount: Optional[pulumi.Input[bool]] = None,
1491
1399
  discoverdn: Optional[pulumi.Input[bool]] = None,
1492
- formatter: Optional[pulumi.Input[str]] = None,
1493
1400
  groupattr: Optional[pulumi.Input[str]] = None,
1494
1401
  groupdn: Optional[pulumi.Input[str]] = None,
1495
1402
  groupfilter: Optional[pulumi.Input[str]] = None,
1496
1403
  insecure_tls: Optional[pulumi.Input[bool]] = None,
1497
1404
  last_rotation_tolerance: Optional[pulumi.Input[int]] = None,
1498
- length: Optional[pulumi.Input[int]] = None,
1499
1405
  local: Optional[pulumi.Input[bool]] = None,
1500
1406
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1501
1407
  max_ttl: Optional[pulumi.Input[int]] = None,
@@ -1538,13 +1444,11 @@ class SecretBackend(pulumi.CustomResource):
1538
1444
  __props__.__dict__["description"] = description
1539
1445
  __props__.__dict__["disable_remount"] = disable_remount
1540
1446
  __props__.__dict__["discoverdn"] = discoverdn
1541
- __props__.__dict__["formatter"] = formatter
1542
1447
  __props__.__dict__["groupattr"] = groupattr
1543
1448
  __props__.__dict__["groupdn"] = groupdn
1544
1449
  __props__.__dict__["groupfilter"] = groupfilter
1545
1450
  __props__.__dict__["insecure_tls"] = insecure_tls
1546
1451
  __props__.__dict__["last_rotation_tolerance"] = last_rotation_tolerance
1547
- __props__.__dict__["length"] = length
1548
1452
  __props__.__dict__["local"] = local
1549
1453
  __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
1550
1454
  __props__.__dict__["max_ttl"] = max_ttl
@@ -1586,13 +1490,11 @@ class SecretBackend(pulumi.CustomResource):
1586
1490
  description: Optional[pulumi.Input[str]] = None,
1587
1491
  disable_remount: Optional[pulumi.Input[bool]] = None,
1588
1492
  discoverdn: Optional[pulumi.Input[bool]] = None,
1589
- formatter: Optional[pulumi.Input[str]] = None,
1590
1493
  groupattr: Optional[pulumi.Input[str]] = None,
1591
1494
  groupdn: Optional[pulumi.Input[str]] = None,
1592
1495
  groupfilter: Optional[pulumi.Input[str]] = None,
1593
1496
  insecure_tls: Optional[pulumi.Input[bool]] = None,
1594
1497
  last_rotation_tolerance: Optional[pulumi.Input[int]] = None,
1595
- length: Optional[pulumi.Input[int]] = None,
1596
1498
  local: Optional[pulumi.Input[bool]] = None,
1597
1499
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1598
1500
  max_ttl: Optional[pulumi.Input[int]] = None,
@@ -1635,7 +1537,6 @@ class SecretBackend(pulumi.CustomResource):
1635
1537
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
1636
1538
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1637
1539
  :param pulumi.Input[bool] discoverdn: Use anonymous bind to discover the bind Distinguished Name of a user.
1638
- :param pulumi.Input[str] formatter: **Deprecated** use `password_policy`. Text to insert the password into, ex. "customPrefix{{PASSWORD}}customSuffix".
1639
1540
  :param pulumi.Input[str] groupattr: LDAP attribute to follow on objects returned by <groupfilter> in order to enumerate
1640
1541
  user group membership. Examples: `cn` or `memberOf`, etc. Defaults to `cn`.
1641
1542
  :param pulumi.Input[str] groupdn: LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org).
@@ -1645,15 +1546,13 @@ class SecretBackend(pulumi.CustomResource):
1645
1546
  Defaults to `false`.
1646
1547
  :param pulumi.Input[int] last_rotation_tolerance: The number of seconds after a Vault rotation where, if Active Directory
1647
1548
  shows a later rotation, it should be considered out-of-band
1648
- :param pulumi.Input[int] length: **Deprecated** use `password_policy`. The desired length of passwords that Vault generates.
1649
- *Mutually exclusive with `password_policy` on vault-1.11+*
1650
1549
  :param pulumi.Input[bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
1651
1550
  replication.Tolerance duration to use when checking the last rotation time.
1652
1551
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
1653
1552
  :param pulumi.Input[int] max_ttl: In seconds, the maximum password time-to-live.
1654
1553
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
1655
1554
  The value should not contain leading or trailing forward slashes.
1656
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1555
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1657
1556
  *Available only for Vault Enterprise*.
1658
1557
  :param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
1659
1558
  :param pulumi.Input[int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
@@ -1695,13 +1594,11 @@ class SecretBackend(pulumi.CustomResource):
1695
1594
  __props__.__dict__["description"] = description
1696
1595
  __props__.__dict__["disable_remount"] = disable_remount
1697
1596
  __props__.__dict__["discoverdn"] = discoverdn
1698
- __props__.__dict__["formatter"] = formatter
1699
1597
  __props__.__dict__["groupattr"] = groupattr
1700
1598
  __props__.__dict__["groupdn"] = groupdn
1701
1599
  __props__.__dict__["groupfilter"] = groupfilter
1702
1600
  __props__.__dict__["insecure_tls"] = insecure_tls
1703
1601
  __props__.__dict__["last_rotation_tolerance"] = last_rotation_tolerance
1704
- __props__.__dict__["length"] = length
1705
1602
  __props__.__dict__["local"] = local
1706
1603
  __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
1707
1604
  __props__.__dict__["max_ttl"] = max_ttl
@@ -1830,17 +1727,6 @@ class SecretBackend(pulumi.CustomResource):
1830
1727
  """
1831
1728
  return pulumi.get(self, "discoverdn")
1832
1729
 
1833
- @property
1834
- @pulumi.getter
1835
- def formatter(self) -> pulumi.Output[str]:
1836
- """
1837
- **Deprecated** use `password_policy`. Text to insert the password into, ex. "customPrefix{{PASSWORD}}customSuffix".
1838
- """
1839
- warnings.warn("""Formatter is deprecated and password_policy should be used with Vault >= 1.5.""", DeprecationWarning)
1840
- pulumi.log.warn("""formatter is deprecated: Formatter is deprecated and password_policy should be used with Vault >= 1.5.""")
1841
-
1842
- return pulumi.get(self, "formatter")
1843
-
1844
1730
  @property
1845
1731
  @pulumi.getter
1846
1732
  def groupattr(self) -> pulumi.Output[Optional[str]]:
@@ -1885,18 +1771,6 @@ class SecretBackend(pulumi.CustomResource):
1885
1771
  """
1886
1772
  return pulumi.get(self, "last_rotation_tolerance")
1887
1773
 
1888
- @property
1889
- @pulumi.getter
1890
- def length(self) -> pulumi.Output[int]:
1891
- """
1892
- **Deprecated** use `password_policy`. The desired length of passwords that Vault generates.
1893
- *Mutually exclusive with `password_policy` on vault-1.11+*
1894
- """
1895
- warnings.warn("""Length is deprecated and password_policy should be used with Vault >= 1.5.""", DeprecationWarning)
1896
- pulumi.log.warn("""length is deprecated: Length is deprecated and password_policy should be used with Vault >= 1.5.""")
1897
-
1898
- return pulumi.get(self, "length")
1899
-
1900
1774
  @property
1901
1775
  @pulumi.getter
1902
1776
  def local(self) -> pulumi.Output[Optional[bool]]:
@@ -1928,7 +1802,7 @@ class SecretBackend(pulumi.CustomResource):
1928
1802
  """
1929
1803
  The namespace to provision the resource in.
1930
1804
  The value should not contain leading or trailing forward slashes.
1931
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1805
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1932
1806
  *Available only for Vault Enterprise*.
1933
1807
  """
1934
1808
  return pulumi.get(self, "namespace")