pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736850018__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +22 -7
  5. pulumi_vault/ad/secret_backend.py +14 -144
  6. pulumi_vault/ad/secret_library.py +14 -11
  7. pulumi_vault/ad/secret_role.py +12 -11
  8. pulumi_vault/alicloud/auth_backend_role.py +74 -192
  9. pulumi_vault/approle/auth_backend_login.py +12 -11
  10. pulumi_vault/approle/auth_backend_role.py +75 -193
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
  13. pulumi_vault/audit.py +24 -27
  14. pulumi_vault/audit_request_header.py +11 -6
  15. pulumi_vault/auth_backend.py +64 -12
  16. pulumi_vault/aws/auth_backend_cert.py +12 -7
  17. pulumi_vault/aws/auth_backend_client.py +265 -24
  18. pulumi_vault/aws/auth_backend_config_identity.py +12 -11
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +75 -193
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
  24. pulumi_vault/aws/auth_backend_sts_role.py +12 -11
  25. pulumi_vault/aws/get_access_credentials.py +34 -7
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +75 -7
  28. pulumi_vault/aws/secret_backend_role.py +183 -11
  29. pulumi_vault/aws/secret_backend_static_role.py +14 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +151 -17
  32. pulumi_vault/azure/auth_backend_role.py +75 -193
  33. pulumi_vault/azure/backend.py +223 -29
  34. pulumi_vault/azure/backend_role.py +42 -41
  35. pulumi_vault/azure/get_access_credentials.py +39 -11
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -271
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +22 -25
  44. pulumi_vault/consul/secret_backend_role.py +14 -80
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +117 -114
  48. pulumi_vault/database/secret_backend_role.py +29 -24
  49. pulumi_vault/database/secret_backend_static_role.py +85 -15
  50. pulumi_vault/database/secrets_mount.py +425 -138
  51. pulumi_vault/egp_policy.py +16 -15
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +248 -35
  54. pulumi_vault/gcp/auth_backend_role.py +75 -271
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -9
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -16
  58. pulumi_vault/gcp/secret_impersonated_account.py +74 -17
  59. pulumi_vault/gcp/secret_roleset.py +29 -26
  60. pulumi_vault/gcp/secret_static_account.py +37 -34
  61. pulumi_vault/generic/endpoint.py +22 -21
  62. pulumi_vault/generic/get_secret.py +68 -12
  63. pulumi_vault/generic/secret.py +19 -14
  64. pulumi_vault/get_auth_backend.py +24 -11
  65. pulumi_vault/get_auth_backends.py +33 -11
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -15
  69. pulumi_vault/get_policy_document.py +34 -23
  70. pulumi_vault/get_raft_autopilot_state.py +29 -14
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +17 -16
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +14 -13
  75. pulumi_vault/github/user.py +14 -13
  76. pulumi_vault/identity/entity.py +18 -15
  77. pulumi_vault/identity/entity_alias.py +18 -15
  78. pulumi_vault/identity/entity_policies.py +24 -19
  79. pulumi_vault/identity/get_entity.py +40 -14
  80. pulumi_vault/identity/get_group.py +45 -13
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -11
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -13
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -14
  84. pulumi_vault/identity/group.py +50 -49
  85. pulumi_vault/identity/group_alias.py +14 -11
  86. pulumi_vault/identity/group_member_entity_ids.py +24 -74
  87. pulumi_vault/identity/group_member_group_ids.py +36 -27
  88. pulumi_vault/identity/group_policies.py +16 -15
  89. pulumi_vault/identity/mfa_duo.py +9 -8
  90. pulumi_vault/identity/mfa_login_enforcement.py +13 -8
  91. pulumi_vault/identity/mfa_okta.py +9 -8
  92. pulumi_vault/identity/mfa_pingid.py +5 -4
  93. pulumi_vault/identity/mfa_totp.py +5 -4
  94. pulumi_vault/identity/oidc.py +12 -11
  95. pulumi_vault/identity/oidc_assignment.py +22 -13
  96. pulumi_vault/identity/oidc_client.py +34 -25
  97. pulumi_vault/identity/oidc_key.py +28 -19
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
  99. pulumi_vault/identity/oidc_provider.py +34 -23
  100. pulumi_vault/identity/oidc_role.py +40 -27
  101. pulumi_vault/identity/oidc_scope.py +18 -15
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +39 -46
  105. pulumi_vault/jwt/auth_backend_role.py +131 -260
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +22 -21
  108. pulumi_vault/kmip/secret_role.py +12 -11
  109. pulumi_vault/kmip/secret_scope.py +12 -11
  110. pulumi_vault/kubernetes/auth_backend_config.py +55 -7
  111. pulumi_vault/kubernetes/auth_backend_role.py +68 -179
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -15
  115. pulumi_vault/kubernetes/secret_backend.py +314 -29
  116. pulumi_vault/kubernetes/secret_backend_role.py +135 -56
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +23 -12
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
  120. pulumi_vault/kv/get_secret_v2.py +89 -9
  121. pulumi_vault/kv/get_secrets_list.py +22 -15
  122. pulumi_vault/kv/get_secrets_list_v2.py +35 -19
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +19 -18
  125. pulumi_vault/kv/secret_backend_v2.py +12 -11
  126. pulumi_vault/kv/secret_v2.py +55 -52
  127. pulumi_vault/ldap/auth_backend.py +125 -168
  128. pulumi_vault/ldap/auth_backend_group.py +12 -11
  129. pulumi_vault/ldap/auth_backend_user.py +12 -11
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +352 -84
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +14 -11
  135. pulumi_vault/ldap/secret_backend_static_role.py +67 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +27 -43
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +16 -13
  140. pulumi_vault/mfa_okta.py +16 -13
  141. pulumi_vault/mfa_pingid.py +16 -13
  142. pulumi_vault/mfa_totp.py +22 -19
  143. pulumi_vault/mongodbatlas/secret_backend.py +18 -17
  144. pulumi_vault/mongodbatlas/secret_role.py +41 -38
  145. pulumi_vault/mount.py +389 -65
  146. pulumi_vault/namespace.py +26 -21
  147. pulumi_vault/nomad_secret_backend.py +16 -15
  148. pulumi_vault/nomad_secret_role.py +12 -11
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +483 -41
  151. pulumi_vault/okta/auth_backend_group.py +12 -11
  152. pulumi_vault/okta/auth_backend_user.py +12 -11
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +18 -15
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -13
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -12
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
  174. pulumi_vault/pkisecret/secret_backend_key.py +12 -7
  175. pulumi_vault/pkisecret/secret_backend_role.py +19 -16
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +12 -7
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +58 -8
  185. pulumi_vault/quota_rate_limit.py +54 -4
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +16 -15
  189. pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
  190. pulumi_vault/raft_autopilot.py +12 -11
  191. pulumi_vault/raft_snapshot_agent_config.py +121 -311
  192. pulumi_vault/rgp_policy.py +14 -13
  193. pulumi_vault/saml/auth_backend.py +20 -19
  194. pulumi_vault/saml/auth_backend_role.py +90 -199
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -75
  199. pulumi_vault/secrets/sync_aws_destination.py +240 -29
  200. pulumi_vault/secrets/sync_azure_destination.py +90 -33
  201. pulumi_vault/secrets/sync_config.py +7 -6
  202. pulumi_vault/secrets/sync_gcp_destination.py +156 -27
  203. pulumi_vault/secrets/sync_gh_destination.py +187 -15
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +72 -15
  206. pulumi_vault/ssh/_inputs.py +28 -32
  207. pulumi_vault/ssh/outputs.py +11 -32
  208. pulumi_vault/ssh/secret_backend_ca.py +106 -11
  209. pulumi_vault/ssh/secret_backend_role.py +83 -120
  210. pulumi_vault/terraformcloud/secret_backend.py +5 -56
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -24
  212. pulumi_vault/terraformcloud/secret_role.py +14 -76
  213. pulumi_vault/token.py +26 -25
  214. pulumi_vault/tokenauth/auth_backend_role.py +76 -201
  215. pulumi_vault/transform/alphabet.py +16 -13
  216. pulumi_vault/transform/get_decode.py +45 -21
  217. pulumi_vault/transform/get_encode.py +45 -21
  218. pulumi_vault/transform/role.py +16 -13
  219. pulumi_vault/transform/template.py +30 -25
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -25
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +25 -97
  224. pulumi_vault/transit/secret_cache_config.py +12 -11
  225. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736850018.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['AuthBackendIdentityWhitelistArgs', 'AuthBackendIdentityWhitelist']
@@ -25,7 +30,7 @@ class AuthBackendIdentityWhitelistArgs:
25
30
  tidying of the identity-whitelist entries.
26
31
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
27
32
  The value should not contain leading or trailing forward slashes.
28
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
33
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
29
34
  *Available only for Vault Enterprise*.
30
35
  :param pulumi.Input[int] safety_buffer: The amount of extra time, in minutes, that must
31
36
  have passed beyond the roletag expiration, before it is removed from the
@@ -71,7 +76,7 @@ class AuthBackendIdentityWhitelistArgs:
71
76
  """
72
77
  The namespace to provision the resource in.
73
78
  The value should not contain leading or trailing forward slashes.
74
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
79
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
75
80
  *Available only for Vault Enterprise*.
76
81
  """
77
82
  return pulumi.get(self, "namespace")
@@ -109,7 +114,7 @@ class _AuthBackendIdentityWhitelistState:
109
114
  tidying of the identity-whitelist entries.
110
115
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
111
116
  The value should not contain leading or trailing forward slashes.
112
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
117
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
113
118
  *Available only for Vault Enterprise*.
114
119
  :param pulumi.Input[int] safety_buffer: The amount of extra time, in minutes, that must
115
120
  have passed beyond the roletag expiration, before it is removed from the
@@ -155,7 +160,7 @@ class _AuthBackendIdentityWhitelistState:
155
160
  """
156
161
  The namespace to provision the resource in.
157
162
  The value should not contain leading or trailing forward slashes.
158
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
163
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
159
164
  *Available only for Vault Enterprise*.
160
165
  """
161
166
  return pulumi.get(self, "namespace")
@@ -197,17 +202,15 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
197
202
 
198
203
  ## Example Usage
199
204
 
200
- <!--Start PulumiCodeChooser -->
201
205
  ```python
202
206
  import pulumi
203
207
  import pulumi_vault as vault
204
208
 
205
- example_auth_backend = vault.AuthBackend("exampleAuthBackend", type="aws")
206
- example_auth_backend_identity_whitelist = vault.aws.AuthBackendIdentityWhitelist("exampleAuthBackendIdentityWhitelist",
207
- backend=example_auth_backend.path,
209
+ example = vault.AuthBackend("example", type="aws")
210
+ example_auth_backend_identity_whitelist = vault.aws.AuthBackendIdentityWhitelist("example",
211
+ backend=example.path,
208
212
  safety_buffer=3600)
209
213
  ```
210
- <!--End PulumiCodeChooser -->
211
214
 
212
215
  ## Import
213
216
 
@@ -224,7 +227,7 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
224
227
  tidying of the identity-whitelist entries.
225
228
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
226
229
  The value should not contain leading or trailing forward slashes.
227
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
230
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
228
231
  *Available only for Vault Enterprise*.
229
232
  :param pulumi.Input[int] safety_buffer: The amount of extra time, in minutes, that must
230
233
  have passed beyond the roletag expiration, before it is removed from the
@@ -244,17 +247,15 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
244
247
 
245
248
  ## Example Usage
246
249
 
247
- <!--Start PulumiCodeChooser -->
248
250
  ```python
249
251
  import pulumi
250
252
  import pulumi_vault as vault
251
253
 
252
- example_auth_backend = vault.AuthBackend("exampleAuthBackend", type="aws")
253
- example_auth_backend_identity_whitelist = vault.aws.AuthBackendIdentityWhitelist("exampleAuthBackendIdentityWhitelist",
254
- backend=example_auth_backend.path,
254
+ example = vault.AuthBackend("example", type="aws")
255
+ example_auth_backend_identity_whitelist = vault.aws.AuthBackendIdentityWhitelist("example",
256
+ backend=example.path,
255
257
  safety_buffer=3600)
256
258
  ```
257
- <!--End PulumiCodeChooser -->
258
259
 
259
260
  ## Import
260
261
 
@@ -322,7 +323,7 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
322
323
  tidying of the identity-whitelist entries.
323
324
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
324
325
  The value should not contain leading or trailing forward slashes.
325
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
326
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
326
327
  *Available only for Vault Enterprise*.
327
328
  :param pulumi.Input[int] safety_buffer: The amount of extra time, in minutes, that must
328
329
  have passed beyond the roletag expiration, before it is removed from the
@@ -361,7 +362,7 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
361
362
  """
362
363
  The namespace to provision the resource in.
363
364
  The value should not contain leading or trailing forward slashes.
364
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
365
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
365
366
  *Available only for Vault Enterprise*.
366
367
  """
367
368
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['AuthBackendLoginArgs', 'AuthBackendLogin']
@@ -41,7 +46,7 @@ class AuthBackendLoginArgs:
41
46
  authenticate with. Can be retrieved from the EC2 metadata server.
42
47
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
43
48
  The value should not contain leading or trailing forward slashes.
44
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
49
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
45
50
  *Available only for Vault Enterprise*.
46
51
  :param pulumi.Input[str] nonce: The unique nonce to be used for login requests. Can be
47
52
  set to a user-specified value, or will contain the server-generated value
@@ -163,7 +168,7 @@ class AuthBackendLoginArgs:
163
168
  """
164
169
  The namespace to provision the resource in.
165
170
  The value should not contain leading or trailing forward slashes.
166
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
171
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
167
172
  *Available only for Vault Enterprise*.
168
173
  """
169
174
  return pulumi.get(self, "namespace")
@@ -243,7 +248,7 @@ class _AuthBackendLoginState:
243
248
  identity: Optional[pulumi.Input[str]] = None,
244
249
  lease_duration: Optional[pulumi.Input[int]] = None,
245
250
  lease_start_time: Optional[pulumi.Input[str]] = None,
246
- metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
251
+ metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
247
252
  namespace: Optional[pulumi.Input[str]] = None,
248
253
  nonce: Optional[pulumi.Input[str]] = None,
249
254
  pkcs7: Optional[pulumi.Input[str]] = None,
@@ -270,12 +275,11 @@ class _AuthBackendLoginState:
270
275
  authenticate with. Can be retrieved from the EC2 metadata server.
271
276
  :param pulumi.Input[int] lease_duration: The duration in seconds the token will be valid, relative
272
277
  to the time in `lease_start_time`.
273
- :param pulumi.Input[str] lease_start_time: Time at which the lease was read, using the clock of the system where Terraform was running
274
- :param pulumi.Input[Mapping[str, Any]] metadata: A map of information returned by the Vault server about the
278
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: A map of information returned by the Vault server about the
275
279
  authentication used to generate this token.
276
280
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
277
281
  The value should not contain leading or trailing forward slashes.
278
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
282
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
279
283
  *Available only for Vault Enterprise*.
280
284
  :param pulumi.Input[str] nonce: The unique nonce to be used for login requests. Can be
281
285
  set to a user-specified value, or will contain the server-generated value
@@ -461,9 +465,6 @@ class _AuthBackendLoginState:
461
465
  @property
462
466
  @pulumi.getter(name="leaseStartTime")
463
467
  def lease_start_time(self) -> Optional[pulumi.Input[str]]:
464
- """
465
- Time at which the lease was read, using the clock of the system where Terraform was running
466
- """
467
468
  return pulumi.get(self, "lease_start_time")
468
469
 
469
470
  @lease_start_time.setter
@@ -472,7 +473,7 @@ class _AuthBackendLoginState:
472
473
 
473
474
  @property
474
475
  @pulumi.getter
475
- def metadata(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
476
+ def metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
476
477
  """
477
478
  A map of information returned by the Vault server about the
478
479
  authentication used to generate this token.
@@ -480,7 +481,7 @@ class _AuthBackendLoginState:
480
481
  return pulumi.get(self, "metadata")
481
482
 
482
483
  @metadata.setter
483
- def metadata(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
484
+ def metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
484
485
  pulumi.set(self, "metadata", value)
485
486
 
486
487
  @property
@@ -489,7 +490,7 @@ class _AuthBackendLoginState:
489
490
  """
490
491
  The namespace to provision the resource in.
491
492
  The value should not contain leading or trailing forward slashes.
492
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
493
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
493
494
  *Available only for Vault Enterprise*.
494
495
  """
495
496
  return pulumi.get(self, "namespace")
@@ -618,7 +619,7 @@ class AuthBackendLogin(pulumi.CustomResource):
618
619
  authenticate with. Can be retrieved from the EC2 metadata server.
619
620
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
620
621
  The value should not contain leading or trailing forward slashes.
621
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
622
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
622
623
  *Available only for Vault Enterprise*.
623
624
  :param pulumi.Input[str] nonce: The unique nonce to be used for login requests. Can be
624
625
  set to a user-specified value, or will contain the server-generated value
@@ -722,7 +723,7 @@ class AuthBackendLogin(pulumi.CustomResource):
722
723
  identity: Optional[pulumi.Input[str]] = None,
723
724
  lease_duration: Optional[pulumi.Input[int]] = None,
724
725
  lease_start_time: Optional[pulumi.Input[str]] = None,
725
- metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
726
+ metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
726
727
  namespace: Optional[pulumi.Input[str]] = None,
727
728
  nonce: Optional[pulumi.Input[str]] = None,
728
729
  pkcs7: Optional[pulumi.Input[str]] = None,
@@ -754,12 +755,11 @@ class AuthBackendLogin(pulumi.CustomResource):
754
755
  authenticate with. Can be retrieved from the EC2 metadata server.
755
756
  :param pulumi.Input[int] lease_duration: The duration in seconds the token will be valid, relative
756
757
  to the time in `lease_start_time`.
757
- :param pulumi.Input[str] lease_start_time: Time at which the lease was read, using the clock of the system where Terraform was running
758
- :param pulumi.Input[Mapping[str, Any]] metadata: A map of information returned by the Vault server about the
758
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: A map of information returned by the Vault server about the
759
759
  authentication used to generate this token.
760
760
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
761
761
  The value should not contain leading or trailing forward slashes.
762
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
762
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
763
763
  *Available only for Vault Enterprise*.
764
764
  :param pulumi.Input[str] nonce: The unique nonce to be used for login requests. Can be
765
765
  set to a user-specified value, or will contain the server-generated value
@@ -891,14 +891,11 @@ class AuthBackendLogin(pulumi.CustomResource):
891
891
  @property
892
892
  @pulumi.getter(name="leaseStartTime")
893
893
  def lease_start_time(self) -> pulumi.Output[str]:
894
- """
895
- Time at which the lease was read, using the clock of the system where Terraform was running
896
- """
897
894
  return pulumi.get(self, "lease_start_time")
898
895
 
899
896
  @property
900
897
  @pulumi.getter
901
- def metadata(self) -> pulumi.Output[Mapping[str, Any]]:
898
+ def metadata(self) -> pulumi.Output[Mapping[str, str]]:
902
899
  """
903
900
  A map of information returned by the Vault server about the
904
901
  authentication used to generate this token.
@@ -911,7 +908,7 @@ class AuthBackendLogin(pulumi.CustomResource):
911
908
  """
912
909
  The namespace to provision the resource in.
913
910
  The value should not contain leading or trailing forward slashes.
914
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
911
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
915
912
  *Available only for Vault Enterprise*.
916
913
  """
917
914
  return pulumi.get(self, "namespace")