pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +26 -9
  5. pulumi_vault/ad/secret_backend.py +16 -142
  6. pulumi_vault/ad/secret_library.py +16 -9
  7. pulumi_vault/ad/secret_role.py +14 -9
  8. pulumi_vault/alicloud/auth_backend_role.py +76 -190
  9. pulumi_vault/approle/auth_backend_login.py +12 -7
  10. pulumi_vault/approle/auth_backend_role.py +77 -191
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
  13. pulumi_vault/audit.py +30 -21
  14. pulumi_vault/audit_request_header.py +11 -2
  15. pulumi_vault/auth_backend.py +66 -14
  16. pulumi_vault/aws/auth_backend_cert.py +18 -9
  17. pulumi_vault/aws/auth_backend_client.py +267 -22
  18. pulumi_vault/aws/auth_backend_config_identity.py +14 -9
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +77 -191
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
  24. pulumi_vault/aws/auth_backend_sts_role.py +14 -9
  25. pulumi_vault/aws/get_access_credentials.py +38 -9
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +77 -9
  28. pulumi_vault/aws/secret_backend_role.py +185 -9
  29. pulumi_vault/aws/secret_backend_static_role.py +20 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +153 -15
  32. pulumi_vault/azure/auth_backend_role.py +77 -191
  33. pulumi_vault/azure/backend.py +227 -21
  34. pulumi_vault/azure/backend_role.py +42 -37
  35. pulumi_vault/azure/get_access_credentials.py +41 -7
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -267
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +28 -19
  44. pulumi_vault/consul/secret_backend_role.py +18 -78
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +119 -112
  48. pulumi_vault/database/secret_backend_role.py +31 -22
  49. pulumi_vault/database/secret_backend_static_role.py +87 -13
  50. pulumi_vault/database/secrets_mount.py +427 -136
  51. pulumi_vault/egp_policy.py +16 -11
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +250 -33
  54. pulumi_vault/gcp/auth_backend_role.py +77 -269
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -5
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -12
  58. pulumi_vault/gcp/secret_impersonated_account.py +76 -15
  59. pulumi_vault/gcp/secret_roleset.py +31 -24
  60. pulumi_vault/gcp/secret_static_account.py +39 -32
  61. pulumi_vault/generic/endpoint.py +24 -17
  62. pulumi_vault/generic/get_secret.py +64 -8
  63. pulumi_vault/generic/secret.py +21 -16
  64. pulumi_vault/get_auth_backend.py +24 -7
  65. pulumi_vault/get_auth_backends.py +51 -9
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -11
  69. pulumi_vault/get_policy_document.py +34 -19
  70. pulumi_vault/get_raft_autopilot_state.py +29 -10
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +19 -14
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +16 -11
  75. pulumi_vault/github/user.py +16 -11
  76. pulumi_vault/identity/entity.py +20 -13
  77. pulumi_vault/identity/entity_alias.py +20 -13
  78. pulumi_vault/identity/entity_policies.py +28 -11
  79. pulumi_vault/identity/get_entity.py +42 -10
  80. pulumi_vault/identity/get_group.py +47 -9
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -7
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -9
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -10
  84. pulumi_vault/identity/group.py +58 -39
  85. pulumi_vault/identity/group_alias.py +16 -9
  86. pulumi_vault/identity/group_member_entity_ids.py +28 -66
  87. pulumi_vault/identity/group_member_group_ids.py +40 -19
  88. pulumi_vault/identity/group_policies.py +20 -7
  89. pulumi_vault/identity/mfa_duo.py +11 -6
  90. pulumi_vault/identity/mfa_login_enforcement.py +15 -6
  91. pulumi_vault/identity/mfa_okta.py +11 -6
  92. pulumi_vault/identity/mfa_pingid.py +7 -2
  93. pulumi_vault/identity/mfa_totp.py +7 -2
  94. pulumi_vault/identity/oidc.py +12 -7
  95. pulumi_vault/identity/oidc_assignment.py +24 -11
  96. pulumi_vault/identity/oidc_client.py +36 -23
  97. pulumi_vault/identity/oidc_key.py +30 -17
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
  99. pulumi_vault/identity/oidc_provider.py +36 -21
  100. pulumi_vault/identity/oidc_role.py +42 -21
  101. pulumi_vault/identity/oidc_scope.py +20 -13
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +45 -40
  105. pulumi_vault/jwt/auth_backend_role.py +133 -254
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +24 -19
  108. pulumi_vault/kmip/secret_role.py +14 -9
  109. pulumi_vault/kmip/secret_scope.py +14 -9
  110. pulumi_vault/kubernetes/auth_backend_config.py +57 -5
  111. pulumi_vault/kubernetes/auth_backend_role.py +70 -177
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -11
  115. pulumi_vault/kubernetes/secret_backend.py +316 -27
  116. pulumi_vault/kubernetes/secret_backend_role.py +137 -46
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +25 -8
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
  120. pulumi_vault/kv/get_secret_v2.py +85 -9
  121. pulumi_vault/kv/get_secrets_list.py +24 -11
  122. pulumi_vault/kv/get_secrets_list_v2.py +37 -15
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +23 -16
  125. pulumi_vault/kv/secret_backend_v2.py +20 -11
  126. pulumi_vault/kv/secret_v2.py +59 -50
  127. pulumi_vault/ldap/auth_backend.py +127 -166
  128. pulumi_vault/ldap/auth_backend_group.py +14 -9
  129. pulumi_vault/ldap/auth_backend_user.py +14 -9
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +354 -82
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +16 -9
  135. pulumi_vault/ldap/secret_backend_static_role.py +73 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +29 -57
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +18 -11
  140. pulumi_vault/mfa_okta.py +18 -11
  141. pulumi_vault/mfa_pingid.py +18 -11
  142. pulumi_vault/mfa_totp.py +24 -17
  143. pulumi_vault/mongodbatlas/secret_backend.py +20 -15
  144. pulumi_vault/mongodbatlas/secret_role.py +47 -38
  145. pulumi_vault/mount.py +391 -51
  146. pulumi_vault/namespace.py +68 -83
  147. pulumi_vault/nomad_secret_backend.py +18 -13
  148. pulumi_vault/nomad_secret_role.py +14 -9
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +485 -39
  151. pulumi_vault/okta/auth_backend_group.py +14 -9
  152. pulumi_vault/okta/auth_backend_user.py +14 -9
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +20 -13
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -9
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -8
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
  174. pulumi_vault/pkisecret/secret_backend_key.py +14 -9
  175. pulumi_vault/pkisecret/secret_backend_role.py +21 -14
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +14 -9
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +60 -6
  185. pulumi_vault/quota_rate_limit.py +56 -2
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +18 -13
  189. pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
  190. pulumi_vault/raft_autopilot.py +14 -9
  191. pulumi_vault/raft_snapshot_agent_config.py +129 -224
  192. pulumi_vault/rgp_policy.py +14 -9
  193. pulumi_vault/saml/auth_backend.py +22 -17
  194. pulumi_vault/saml/auth_backend_role.py +92 -197
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -71
  199. pulumi_vault/secrets/sync_aws_destination.py +242 -27
  200. pulumi_vault/secrets/sync_azure_destination.py +92 -31
  201. pulumi_vault/secrets/sync_config.py +9 -4
  202. pulumi_vault/secrets/sync_gcp_destination.py +158 -25
  203. pulumi_vault/secrets/sync_gh_destination.py +189 -13
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +74 -13
  206. pulumi_vault/ssh/_inputs.py +28 -28
  207. pulumi_vault/ssh/outputs.py +11 -28
  208. pulumi_vault/ssh/secret_backend_ca.py +108 -9
  209. pulumi_vault/ssh/secret_backend_role.py +85 -118
  210. pulumi_vault/terraformcloud/secret_backend.py +7 -54
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -20
  212. pulumi_vault/terraformcloud/secret_role.py +16 -74
  213. pulumi_vault/token.py +28 -23
  214. pulumi_vault/tokenauth/auth_backend_role.py +78 -199
  215. pulumi_vault/transform/alphabet.py +16 -9
  216. pulumi_vault/transform/get_decode.py +45 -17
  217. pulumi_vault/transform/get_encode.py +45 -17
  218. pulumi_vault/transform/role.py +16 -9
  219. pulumi_vault/transform/template.py +30 -21
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -21
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +27 -93
  224. pulumi_vault/transit/secret_cache_config.py +12 -7
  225. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendKeyArgs', 'SecretBackendKey']
@@ -16,7 +21,6 @@ class SecretBackendKeyArgs:
16
21
  def __init__(__self__, *,
17
22
  backend: pulumi.Input[str],
18
23
  allow_plaintext_backup: Optional[pulumi.Input[bool]] = None,
19
- auto_rotate_interval: Optional[pulumi.Input[int]] = None,
20
24
  auto_rotate_period: Optional[pulumi.Input[int]] = None,
21
25
  convergent_encryption: Optional[pulumi.Input[bool]] = None,
22
26
  deletion_allowed: Optional[pulumi.Input[bool]] = None,
@@ -33,8 +37,6 @@ class SecretBackendKeyArgs:
33
37
  :param pulumi.Input[str] backend: The path the transit secret backend is mounted at, with no leading or trailing `/`s.
34
38
  :param pulumi.Input[bool] allow_plaintext_backup: Enables taking backup of entire keyring in the plaintext format. Once set, this cannot be disabled.
35
39
  * Refer to Vault API documentation on key backups for more information: [Backup Key](https://www.vaultproject.io/api-docs/secret/transit#backup-key)
36
- :param pulumi.Input[int] auto_rotate_interval: Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the
37
- key.
38
40
  :param pulumi.Input[int] auto_rotate_period: Amount of seconds the key should live before being automatically rotated.
39
41
  A value of 0 disables automatic rotation for the key.
40
42
  :param pulumi.Input[bool] convergent_encryption: Whether or not to support convergent encryption, where the same plaintext creates the same ciphertext. This requires `derived` to be set to `true`.
@@ -47,7 +49,7 @@ class SecretBackendKeyArgs:
47
49
  :param pulumi.Input[str] name: The name to identify this key within the backend. Must be unique within the backend.
48
50
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
49
51
  The value should not contain leading or trailing forward slashes.
50
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
52
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
51
53
  *Available only for Vault Enterprise*.
52
54
  :param pulumi.Input[str] type: Specifies the type of key to create. The currently-supported types are: `aes128-gcm96`, `aes256-gcm96` (default), `chacha20-poly1305`, `ed25519`, `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, `hmac`, `rsa-2048`, `rsa-3072` and `rsa-4096`.
53
55
  * Refer to the Vault documentation on transit key types for more information: [Key Types](https://www.vaultproject.io/docs/secrets/transit#key-types)
@@ -55,11 +57,6 @@ class SecretBackendKeyArgs:
55
57
  pulumi.set(__self__, "backend", backend)
56
58
  if allow_plaintext_backup is not None:
57
59
  pulumi.set(__self__, "allow_plaintext_backup", allow_plaintext_backup)
58
- if auto_rotate_interval is not None:
59
- warnings.warn("""Use auto_rotate_period instead""", DeprecationWarning)
60
- pulumi.log.warn("""auto_rotate_interval is deprecated: Use auto_rotate_period instead""")
61
- if auto_rotate_interval is not None:
62
- pulumi.set(__self__, "auto_rotate_interval", auto_rotate_interval)
63
60
  if auto_rotate_period is not None:
64
61
  pulumi.set(__self__, "auto_rotate_period", auto_rotate_period)
65
62
  if convergent_encryption is not None:
@@ -108,22 +105,6 @@ class SecretBackendKeyArgs:
108
105
  def allow_plaintext_backup(self, value: Optional[pulumi.Input[bool]]):
109
106
  pulumi.set(self, "allow_plaintext_backup", value)
110
107
 
111
- @property
112
- @pulumi.getter(name="autoRotateInterval")
113
- def auto_rotate_interval(self) -> Optional[pulumi.Input[int]]:
114
- """
115
- Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the
116
- key.
117
- """
118
- warnings.warn("""Use auto_rotate_period instead""", DeprecationWarning)
119
- pulumi.log.warn("""auto_rotate_interval is deprecated: Use auto_rotate_period instead""")
120
-
121
- return pulumi.get(self, "auto_rotate_interval")
122
-
123
- @auto_rotate_interval.setter
124
- def auto_rotate_interval(self, value: Optional[pulumi.Input[int]]):
125
- pulumi.set(self, "auto_rotate_interval", value)
126
-
127
108
  @property
128
109
  @pulumi.getter(name="autoRotatePeriod")
129
110
  def auto_rotate_period(self) -> Optional[pulumi.Input[int]]:
@@ -239,7 +220,7 @@ class SecretBackendKeyArgs:
239
220
  """
240
221
  The namespace to provision the resource in.
241
222
  The value should not contain leading or trailing forward slashes.
242
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
223
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
243
224
  *Available only for Vault Enterprise*.
244
225
  """
245
226
  return pulumi.get(self, "namespace")
@@ -266,7 +247,6 @@ class SecretBackendKeyArgs:
266
247
  class _SecretBackendKeyState:
267
248
  def __init__(__self__, *,
268
249
  allow_plaintext_backup: Optional[pulumi.Input[bool]] = None,
269
- auto_rotate_interval: Optional[pulumi.Input[int]] = None,
270
250
  auto_rotate_period: Optional[pulumi.Input[int]] = None,
271
251
  backend: Optional[pulumi.Input[str]] = None,
272
252
  convergent_encryption: Optional[pulumi.Input[bool]] = None,
@@ -274,7 +254,7 @@ class _SecretBackendKeyState:
274
254
  derived: Optional[pulumi.Input[bool]] = None,
275
255
  exportable: Optional[pulumi.Input[bool]] = None,
276
256
  key_size: Optional[pulumi.Input[int]] = None,
277
- keys: Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, Any]]]]] = None,
257
+ keys: Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[str]]]]]] = None,
278
258
  latest_version: Optional[pulumi.Input[int]] = None,
279
259
  min_available_version: Optional[pulumi.Input[int]] = None,
280
260
  min_decryption_version: Optional[pulumi.Input[int]] = None,
@@ -290,8 +270,6 @@ class _SecretBackendKeyState:
290
270
  Input properties used for looking up and filtering SecretBackendKey resources.
291
271
  :param pulumi.Input[bool] allow_plaintext_backup: Enables taking backup of entire keyring in the plaintext format. Once set, this cannot be disabled.
292
272
  * Refer to Vault API documentation on key backups for more information: [Backup Key](https://www.vaultproject.io/api-docs/secret/transit#backup-key)
293
- :param pulumi.Input[int] auto_rotate_interval: Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the
294
- key.
295
273
  :param pulumi.Input[int] auto_rotate_period: Amount of seconds the key should live before being automatically rotated.
296
274
  A value of 0 disables automatic rotation for the key.
297
275
  :param pulumi.Input[str] backend: The path the transit secret backend is mounted at, with no leading or trailing `/`s.
@@ -300,7 +278,7 @@ class _SecretBackendKeyState:
300
278
  :param pulumi.Input[bool] derived: Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation.
301
279
  :param pulumi.Input[bool] exportable: Enables keys to be exportable. This allows for all valid private keys in the keyring to be exported. Once set, this cannot be disabled.
302
280
  :param pulumi.Input[int] key_size: The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC, where it must be between 32 and 512 bytes.
303
- :param pulumi.Input[Sequence[pulumi.Input[Mapping[str, Any]]]] keys: List of key versions in the keyring. This attribute is zero-indexed and will contain a map of values depending on the `type` of the encryption key.
281
+ :param pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[str]]]]] keys: List of key versions in the keyring. This attribute is zero-indexed and will contain a map of values depending on the `type` of the encryption key.
304
282
  * for key types `aes128-gcm96`, `aes256-gcm96` and `chacha20-poly1305`, each key version will be a map of a single value `id` which is just a hash of the key's metadata.
305
283
  * for key types `ed25519`, `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, `rsa-2048`, `rsa-3072` and `rsa-4096`, each key version will be a map of the following:
306
284
  :param pulumi.Input[int] latest_version: Latest key version available. This value is 1-indexed, so if `latest_version` is `1`, then the key's information can be referenced from `keys` by selecting element `0`
@@ -310,7 +288,7 @@ class _SecretBackendKeyState:
310
288
  :param pulumi.Input[str] name: The name to identify this key within the backend. Must be unique within the backend.
311
289
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
312
290
  The value should not contain leading or trailing forward slashes.
313
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
291
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
314
292
  *Available only for Vault Enterprise*.
315
293
  :param pulumi.Input[bool] supports_decryption: Whether or not the key supports decryption, based on key type.
316
294
  :param pulumi.Input[bool] supports_derivation: Whether or not the key supports derivation, based on key type.
@@ -321,11 +299,6 @@ class _SecretBackendKeyState:
321
299
  """
322
300
  if allow_plaintext_backup is not None:
323
301
  pulumi.set(__self__, "allow_plaintext_backup", allow_plaintext_backup)
324
- if auto_rotate_interval is not None:
325
- warnings.warn("""Use auto_rotate_period instead""", DeprecationWarning)
326
- pulumi.log.warn("""auto_rotate_interval is deprecated: Use auto_rotate_period instead""")
327
- if auto_rotate_interval is not None:
328
- pulumi.set(__self__, "auto_rotate_interval", auto_rotate_interval)
329
302
  if auto_rotate_period is not None:
330
303
  pulumi.set(__self__, "auto_rotate_period", auto_rotate_period)
331
304
  if backend is not None:
@@ -378,22 +351,6 @@ class _SecretBackendKeyState:
378
351
  def allow_plaintext_backup(self, value: Optional[pulumi.Input[bool]]):
379
352
  pulumi.set(self, "allow_plaintext_backup", value)
380
353
 
381
- @property
382
- @pulumi.getter(name="autoRotateInterval")
383
- def auto_rotate_interval(self) -> Optional[pulumi.Input[int]]:
384
- """
385
- Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the
386
- key.
387
- """
388
- warnings.warn("""Use auto_rotate_period instead""", DeprecationWarning)
389
- pulumi.log.warn("""auto_rotate_interval is deprecated: Use auto_rotate_period instead""")
390
-
391
- return pulumi.get(self, "auto_rotate_interval")
392
-
393
- @auto_rotate_interval.setter
394
- def auto_rotate_interval(self, value: Optional[pulumi.Input[int]]):
395
- pulumi.set(self, "auto_rotate_interval", value)
396
-
397
354
  @property
398
355
  @pulumi.getter(name="autoRotatePeriod")
399
356
  def auto_rotate_period(self) -> Optional[pulumi.Input[int]]:
@@ -481,7 +438,7 @@ class _SecretBackendKeyState:
481
438
 
482
439
  @property
483
440
  @pulumi.getter
484
- def keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, Any]]]]]:
441
+ def keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[str]]]]]]:
485
442
  """
486
443
  List of key versions in the keyring. This attribute is zero-indexed and will contain a map of values depending on the `type` of the encryption key.
487
444
  * for key types `aes128-gcm96`, `aes256-gcm96` and `chacha20-poly1305`, each key version will be a map of a single value `id` which is just a hash of the key's metadata.
@@ -490,7 +447,7 @@ class _SecretBackendKeyState:
490
447
  return pulumi.get(self, "keys")
491
448
 
492
449
  @keys.setter
493
- def keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, Any]]]]]):
450
+ def keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[str]]]]]]):
494
451
  pulumi.set(self, "keys", value)
495
452
 
496
453
  @property
@@ -559,7 +516,7 @@ class _SecretBackendKeyState:
559
516
  """
560
517
  The namespace to provision the resource in.
561
518
  The value should not contain leading or trailing forward slashes.
562
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
519
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
563
520
  *Available only for Vault Enterprise*.
564
521
  """
565
522
  return pulumi.get(self, "namespace")
@@ -636,7 +593,6 @@ class SecretBackendKey(pulumi.CustomResource):
636
593
  resource_name: str,
637
594
  opts: Optional[pulumi.ResourceOptions] = None,
638
595
  allow_plaintext_backup: Optional[pulumi.Input[bool]] = None,
639
- auto_rotate_interval: Optional[pulumi.Input[int]] = None,
640
596
  auto_rotate_period: Optional[pulumi.Input[int]] = None,
641
597
  backend: Optional[pulumi.Input[str]] = None,
642
598
  convergent_encryption: Optional[pulumi.Input[bool]] = None,
@@ -665,26 +621,23 @@ class SecretBackendKey(pulumi.CustomResource):
665
621
  description="Example description",
666
622
  default_lease_ttl_seconds=3600,
667
623
  max_lease_ttl_seconds=86400)
668
- key = vault.transit.SecretBackendKey("key", backend=transit.path)
624
+ key = vault.transit.SecretBackendKey("key",
625
+ backend=transit.path,
626
+ name="my_key")
669
627
  ```
670
- ## Deprecations
671
-
672
- * `auto_rotate_interval` - Replaced by `auto_rotate_period`.
673
628
 
674
629
  ## Import
675
630
 
676
631
  Transit secret backend keys can be imported using the `path`, e.g.
677
632
 
678
633
  ```sh
679
- $ pulumi import vault:transit/secretBackendKey:SecretBackendKey key transit/keys/my_key
634
+ $ pulumi import vault:transit/secretBackendKey:SecretBackendKey key transit/keys/my_key
680
635
  ```
681
636
 
682
637
  :param str resource_name: The name of the resource.
683
638
  :param pulumi.ResourceOptions opts: Options for the resource.
684
639
  :param pulumi.Input[bool] allow_plaintext_backup: Enables taking backup of entire keyring in the plaintext format. Once set, this cannot be disabled.
685
640
  * Refer to Vault API documentation on key backups for more information: [Backup Key](https://www.vaultproject.io/api-docs/secret/transit#backup-key)
686
- :param pulumi.Input[int] auto_rotate_interval: Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the
687
- key.
688
641
  :param pulumi.Input[int] auto_rotate_period: Amount of seconds the key should live before being automatically rotated.
689
642
  A value of 0 disables automatic rotation for the key.
690
643
  :param pulumi.Input[str] backend: The path the transit secret backend is mounted at, with no leading or trailing `/`s.
@@ -698,7 +651,7 @@ class SecretBackendKey(pulumi.CustomResource):
698
651
  :param pulumi.Input[str] name: The name to identify this key within the backend. Must be unique within the backend.
699
652
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
700
653
  The value should not contain leading or trailing forward slashes.
701
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
654
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
702
655
  *Available only for Vault Enterprise*.
703
656
  :param pulumi.Input[str] type: Specifies the type of key to create. The currently-supported types are: `aes128-gcm96`, `aes256-gcm96` (default), `chacha20-poly1305`, `ed25519`, `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, `hmac`, `rsa-2048`, `rsa-3072` and `rsa-4096`.
704
657
  * Refer to the Vault documentation on transit key types for more information: [Key Types](https://www.vaultproject.io/docs/secrets/transit#key-types)
@@ -724,18 +677,17 @@ class SecretBackendKey(pulumi.CustomResource):
724
677
  description="Example description",
725
678
  default_lease_ttl_seconds=3600,
726
679
  max_lease_ttl_seconds=86400)
727
- key = vault.transit.SecretBackendKey("key", backend=transit.path)
680
+ key = vault.transit.SecretBackendKey("key",
681
+ backend=transit.path,
682
+ name="my_key")
728
683
  ```
729
- ## Deprecations
730
-
731
- * `auto_rotate_interval` - Replaced by `auto_rotate_period`.
732
684
 
733
685
  ## Import
734
686
 
735
687
  Transit secret backend keys can be imported using the `path`, e.g.
736
688
 
737
689
  ```sh
738
- $ pulumi import vault:transit/secretBackendKey:SecretBackendKey key transit/keys/my_key
690
+ $ pulumi import vault:transit/secretBackendKey:SecretBackendKey key transit/keys/my_key
739
691
  ```
740
692
 
741
693
  :param str resource_name: The name of the resource.
@@ -754,7 +706,6 @@ class SecretBackendKey(pulumi.CustomResource):
754
706
  resource_name: str,
755
707
  opts: Optional[pulumi.ResourceOptions] = None,
756
708
  allow_plaintext_backup: Optional[pulumi.Input[bool]] = None,
757
- auto_rotate_interval: Optional[pulumi.Input[int]] = None,
758
709
  auto_rotate_period: Optional[pulumi.Input[int]] = None,
759
710
  backend: Optional[pulumi.Input[str]] = None,
760
711
  convergent_encryption: Optional[pulumi.Input[bool]] = None,
@@ -777,7 +728,6 @@ class SecretBackendKey(pulumi.CustomResource):
777
728
  __props__ = SecretBackendKeyArgs.__new__(SecretBackendKeyArgs)
778
729
 
779
730
  __props__.__dict__["allow_plaintext_backup"] = allow_plaintext_backup
780
- __props__.__dict__["auto_rotate_interval"] = auto_rotate_interval
781
731
  __props__.__dict__["auto_rotate_period"] = auto_rotate_period
782
732
  if backend is None and not opts.urn:
783
733
  raise TypeError("Missing required property 'backend'")
@@ -810,7 +760,6 @@ class SecretBackendKey(pulumi.CustomResource):
810
760
  id: pulumi.Input[str],
811
761
  opts: Optional[pulumi.ResourceOptions] = None,
812
762
  allow_plaintext_backup: Optional[pulumi.Input[bool]] = None,
813
- auto_rotate_interval: Optional[pulumi.Input[int]] = None,
814
763
  auto_rotate_period: Optional[pulumi.Input[int]] = None,
815
764
  backend: Optional[pulumi.Input[str]] = None,
816
765
  convergent_encryption: Optional[pulumi.Input[bool]] = None,
@@ -818,7 +767,7 @@ class SecretBackendKey(pulumi.CustomResource):
818
767
  derived: Optional[pulumi.Input[bool]] = None,
819
768
  exportable: Optional[pulumi.Input[bool]] = None,
820
769
  key_size: Optional[pulumi.Input[int]] = None,
821
- keys: Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, Any]]]]] = None,
770
+ keys: Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[str]]]]]] = None,
822
771
  latest_version: Optional[pulumi.Input[int]] = None,
823
772
  min_available_version: Optional[pulumi.Input[int]] = None,
824
773
  min_decryption_version: Optional[pulumi.Input[int]] = None,
@@ -839,8 +788,6 @@ class SecretBackendKey(pulumi.CustomResource):
839
788
  :param pulumi.ResourceOptions opts: Options for the resource.
840
789
  :param pulumi.Input[bool] allow_plaintext_backup: Enables taking backup of entire keyring in the plaintext format. Once set, this cannot be disabled.
841
790
  * Refer to Vault API documentation on key backups for more information: [Backup Key](https://www.vaultproject.io/api-docs/secret/transit#backup-key)
842
- :param pulumi.Input[int] auto_rotate_interval: Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the
843
- key.
844
791
  :param pulumi.Input[int] auto_rotate_period: Amount of seconds the key should live before being automatically rotated.
845
792
  A value of 0 disables automatic rotation for the key.
846
793
  :param pulumi.Input[str] backend: The path the transit secret backend is mounted at, with no leading or trailing `/`s.
@@ -849,7 +796,7 @@ class SecretBackendKey(pulumi.CustomResource):
849
796
  :param pulumi.Input[bool] derived: Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation.
850
797
  :param pulumi.Input[bool] exportable: Enables keys to be exportable. This allows for all valid private keys in the keyring to be exported. Once set, this cannot be disabled.
851
798
  :param pulumi.Input[int] key_size: The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC, where it must be between 32 and 512 bytes.
852
- :param pulumi.Input[Sequence[pulumi.Input[Mapping[str, Any]]]] keys: List of key versions in the keyring. This attribute is zero-indexed and will contain a map of values depending on the `type` of the encryption key.
799
+ :param pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[str]]]]] keys: List of key versions in the keyring. This attribute is zero-indexed and will contain a map of values depending on the `type` of the encryption key.
853
800
  * for key types `aes128-gcm96`, `aes256-gcm96` and `chacha20-poly1305`, each key version will be a map of a single value `id` which is just a hash of the key's metadata.
854
801
  * for key types `ed25519`, `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, `rsa-2048`, `rsa-3072` and `rsa-4096`, each key version will be a map of the following:
855
802
  :param pulumi.Input[int] latest_version: Latest key version available. This value is 1-indexed, so if `latest_version` is `1`, then the key's information can be referenced from `keys` by selecting element `0`
@@ -859,7 +806,7 @@ class SecretBackendKey(pulumi.CustomResource):
859
806
  :param pulumi.Input[str] name: The name to identify this key within the backend. Must be unique within the backend.
860
807
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
861
808
  The value should not contain leading or trailing forward slashes.
862
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
809
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
863
810
  *Available only for Vault Enterprise*.
864
811
  :param pulumi.Input[bool] supports_decryption: Whether or not the key supports decryption, based on key type.
865
812
  :param pulumi.Input[bool] supports_derivation: Whether or not the key supports derivation, based on key type.
@@ -873,7 +820,6 @@ class SecretBackendKey(pulumi.CustomResource):
873
820
  __props__ = _SecretBackendKeyState.__new__(_SecretBackendKeyState)
874
821
 
875
822
  __props__.__dict__["allow_plaintext_backup"] = allow_plaintext_backup
876
- __props__.__dict__["auto_rotate_interval"] = auto_rotate_interval
877
823
  __props__.__dict__["auto_rotate_period"] = auto_rotate_period
878
824
  __props__.__dict__["backend"] = backend
879
825
  __props__.__dict__["convergent_encryption"] = convergent_encryption
@@ -904,18 +850,6 @@ class SecretBackendKey(pulumi.CustomResource):
904
850
  """
905
851
  return pulumi.get(self, "allow_plaintext_backup")
906
852
 
907
- @property
908
- @pulumi.getter(name="autoRotateInterval")
909
- def auto_rotate_interval(self) -> pulumi.Output[int]:
910
- """
911
- Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the
912
- key.
913
- """
914
- warnings.warn("""Use auto_rotate_period instead""", DeprecationWarning)
915
- pulumi.log.warn("""auto_rotate_interval is deprecated: Use auto_rotate_period instead""")
916
-
917
- return pulumi.get(self, "auto_rotate_interval")
918
-
919
853
  @property
920
854
  @pulumi.getter(name="autoRotatePeriod")
921
855
  def auto_rotate_period(self) -> pulumi.Output[int]:
@@ -975,7 +909,7 @@ class SecretBackendKey(pulumi.CustomResource):
975
909
 
976
910
  @property
977
911
  @pulumi.getter
978
- def keys(self) -> pulumi.Output[Sequence[Mapping[str, Any]]]:
912
+ def keys(self) -> pulumi.Output[Sequence[Mapping[str, str]]]:
979
913
  """
980
914
  List of key versions in the keyring. This attribute is zero-indexed and will contain a map of values depending on the `type` of the encryption key.
981
915
  * for key types `aes128-gcm96`, `aes256-gcm96` and `chacha20-poly1305`, each key version will be a map of a single value `id` which is just a hash of the key's metadata.
@@ -1029,7 +963,7 @@ class SecretBackendKey(pulumi.CustomResource):
1029
963
  """
1030
964
  The namespace to provision the resource in.
1031
965
  The value should not contain leading or trailing forward slashes.
1032
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
966
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1033
967
  *Available only for Vault Enterprise*.
1034
968
  """
1035
969
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretCacheConfigArgs', 'SecretCacheConfig']
@@ -23,7 +28,7 @@ class SecretCacheConfigArgs:
23
28
  :param pulumi.Input[int] size: The number of cache entries. 0 means unlimited.
24
29
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
25
30
  The value should not contain leading or trailing forward slashes.
26
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
31
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
27
32
  *Available only for Vault Enterprise*.
28
33
  """
29
34
  pulumi.set(__self__, "backend", backend)
@@ -61,7 +66,7 @@ class SecretCacheConfigArgs:
61
66
  """
62
67
  The namespace to provision the resource in.
63
68
  The value should not contain leading or trailing forward slashes.
64
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
69
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
65
70
  *Available only for Vault Enterprise*.
66
71
  """
67
72
  return pulumi.get(self, "namespace")
@@ -82,7 +87,7 @@ class _SecretCacheConfigState:
82
87
  :param pulumi.Input[str] backend: The path the transit secret backend is mounted at, with no leading or trailing `/`s.
83
88
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
84
89
  The value should not contain leading or trailing forward slashes.
85
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
90
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
86
91
  *Available only for Vault Enterprise*.
87
92
  :param pulumi.Input[int] size: The number of cache entries. 0 means unlimited.
88
93
  """
@@ -111,7 +116,7 @@ class _SecretCacheConfigState:
111
116
  """
112
117
  The namespace to provision the resource in.
113
118
  The value should not contain leading or trailing forward slashes.
114
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
119
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
115
120
  *Available only for Vault Enterprise*.
116
121
  """
117
122
  return pulumi.get(self, "namespace")
@@ -167,7 +172,7 @@ class SecretCacheConfig(pulumi.CustomResource):
167
172
  :param pulumi.Input[str] backend: The path the transit secret backend is mounted at, with no leading or trailing `/`s.
168
173
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
169
174
  The value should not contain leading or trailing forward slashes.
170
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
175
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
171
176
  *Available only for Vault Enterprise*.
172
177
  :param pulumi.Input[int] size: The number of cache entries. 0 means unlimited.
173
178
  """
@@ -254,7 +259,7 @@ class SecretCacheConfig(pulumi.CustomResource):
254
259
  :param pulumi.Input[str] backend: The path the transit secret backend is mounted at, with no leading or trailing `/`s.
255
260
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
256
261
  The value should not contain leading or trailing forward slashes.
257
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
262
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
258
263
  *Available only for Vault Enterprise*.
259
264
  :param pulumi.Input[int] size: The number of cache entries. 0 means unlimited.
260
265
  """
@@ -281,7 +286,7 @@ class SecretCacheConfig(pulumi.CustomResource):
281
286
  """
282
287
  The namespace to provision the resource in.
283
288
  The value should not contain leading or trailing forward slashes.
284
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
289
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
285
290
  *Available only for Vault Enterprise*.
286
291
  """
287
292
  return pulumi.get(self, "namespace")
@@ -1,16 +1,17 @@
1
- Metadata-Version: 2.1
1
+ Metadata-Version: 2.2
2
2
  Name: pulumi_vault
3
- Version: 5.21.0a1709368526
3
+ Version: 6.5.0a1736836139
4
4
  Summary: A Pulumi package for creating and managing HashiCorp Vault cloud resources.
5
5
  License: Apache-2.0
6
6
  Project-URL: Homepage, https://pulumi.io
7
7
  Project-URL: Repository, https://github.com/pulumi/pulumi-vault
8
8
  Keywords: pulumi,vault
9
- Requires-Python: >=3.8
9
+ Requires-Python: >=3.9
10
10
  Description-Content-Type: text/markdown
11
- Requires-Dist: parver >=0.2.1
12
- Requires-Dist: pulumi <4.0.0,>=3.0.0
13
- Requires-Dist: semver >=2.8.1
11
+ Requires-Dist: parver>=0.2.1
12
+ Requires-Dist: pulumi<4.0.0,>=3.142.0
13
+ Requires-Dist: semver>=2.8.1
14
+ Requires-Dist: typing-extensions>=4.11; python_version < "3.11"
14
15
 
15
16
  [![Build Status](https://travis-ci.com/pulumi/pulumi-vault.svg?token=eHg7Zp5zdDDJfTjY8ejq&branch=master)](https://travis-ci.com/pulumi/pulumi-vault)
16
17
 
@@ -43,7 +44,7 @@ To use from Python, install using `pip`:
43
44
 
44
45
  To use from Go, use `go get` to grab the latest version of the library
45
46
 
46
- $ go get github.com/pulumi/pulumi-vault/sdk/v4
47
+ $ go get github.com/pulumi/pulumi-vault/sdk/v6
47
48
 
48
49
  ### .NET
49
50