pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736850018__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +22 -7
  5. pulumi_vault/ad/secret_backend.py +14 -144
  6. pulumi_vault/ad/secret_library.py +14 -11
  7. pulumi_vault/ad/secret_role.py +12 -11
  8. pulumi_vault/alicloud/auth_backend_role.py +74 -192
  9. pulumi_vault/approle/auth_backend_login.py +12 -11
  10. pulumi_vault/approle/auth_backend_role.py +75 -193
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
  13. pulumi_vault/audit.py +24 -27
  14. pulumi_vault/audit_request_header.py +11 -6
  15. pulumi_vault/auth_backend.py +64 -12
  16. pulumi_vault/aws/auth_backend_cert.py +12 -7
  17. pulumi_vault/aws/auth_backend_client.py +265 -24
  18. pulumi_vault/aws/auth_backend_config_identity.py +12 -11
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +75 -193
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
  24. pulumi_vault/aws/auth_backend_sts_role.py +12 -11
  25. pulumi_vault/aws/get_access_credentials.py +34 -7
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +75 -7
  28. pulumi_vault/aws/secret_backend_role.py +183 -11
  29. pulumi_vault/aws/secret_backend_static_role.py +14 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +151 -17
  32. pulumi_vault/azure/auth_backend_role.py +75 -193
  33. pulumi_vault/azure/backend.py +223 -29
  34. pulumi_vault/azure/backend_role.py +42 -41
  35. pulumi_vault/azure/get_access_credentials.py +39 -11
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -271
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +22 -25
  44. pulumi_vault/consul/secret_backend_role.py +14 -80
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +117 -114
  48. pulumi_vault/database/secret_backend_role.py +29 -24
  49. pulumi_vault/database/secret_backend_static_role.py +85 -15
  50. pulumi_vault/database/secrets_mount.py +425 -138
  51. pulumi_vault/egp_policy.py +16 -15
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +248 -35
  54. pulumi_vault/gcp/auth_backend_role.py +75 -271
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -9
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -16
  58. pulumi_vault/gcp/secret_impersonated_account.py +74 -17
  59. pulumi_vault/gcp/secret_roleset.py +29 -26
  60. pulumi_vault/gcp/secret_static_account.py +37 -34
  61. pulumi_vault/generic/endpoint.py +22 -21
  62. pulumi_vault/generic/get_secret.py +68 -12
  63. pulumi_vault/generic/secret.py +19 -14
  64. pulumi_vault/get_auth_backend.py +24 -11
  65. pulumi_vault/get_auth_backends.py +33 -11
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -15
  69. pulumi_vault/get_policy_document.py +34 -23
  70. pulumi_vault/get_raft_autopilot_state.py +29 -14
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +17 -16
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +14 -13
  75. pulumi_vault/github/user.py +14 -13
  76. pulumi_vault/identity/entity.py +18 -15
  77. pulumi_vault/identity/entity_alias.py +18 -15
  78. pulumi_vault/identity/entity_policies.py +24 -19
  79. pulumi_vault/identity/get_entity.py +40 -14
  80. pulumi_vault/identity/get_group.py +45 -13
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -11
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -13
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -14
  84. pulumi_vault/identity/group.py +50 -49
  85. pulumi_vault/identity/group_alias.py +14 -11
  86. pulumi_vault/identity/group_member_entity_ids.py +24 -74
  87. pulumi_vault/identity/group_member_group_ids.py +36 -27
  88. pulumi_vault/identity/group_policies.py +16 -15
  89. pulumi_vault/identity/mfa_duo.py +9 -8
  90. pulumi_vault/identity/mfa_login_enforcement.py +13 -8
  91. pulumi_vault/identity/mfa_okta.py +9 -8
  92. pulumi_vault/identity/mfa_pingid.py +5 -4
  93. pulumi_vault/identity/mfa_totp.py +5 -4
  94. pulumi_vault/identity/oidc.py +12 -11
  95. pulumi_vault/identity/oidc_assignment.py +22 -13
  96. pulumi_vault/identity/oidc_client.py +34 -25
  97. pulumi_vault/identity/oidc_key.py +28 -19
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
  99. pulumi_vault/identity/oidc_provider.py +34 -23
  100. pulumi_vault/identity/oidc_role.py +40 -27
  101. pulumi_vault/identity/oidc_scope.py +18 -15
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +39 -46
  105. pulumi_vault/jwt/auth_backend_role.py +131 -260
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +22 -21
  108. pulumi_vault/kmip/secret_role.py +12 -11
  109. pulumi_vault/kmip/secret_scope.py +12 -11
  110. pulumi_vault/kubernetes/auth_backend_config.py +55 -7
  111. pulumi_vault/kubernetes/auth_backend_role.py +68 -179
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -15
  115. pulumi_vault/kubernetes/secret_backend.py +314 -29
  116. pulumi_vault/kubernetes/secret_backend_role.py +135 -56
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +23 -12
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
  120. pulumi_vault/kv/get_secret_v2.py +89 -9
  121. pulumi_vault/kv/get_secrets_list.py +22 -15
  122. pulumi_vault/kv/get_secrets_list_v2.py +35 -19
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +19 -18
  125. pulumi_vault/kv/secret_backend_v2.py +12 -11
  126. pulumi_vault/kv/secret_v2.py +55 -52
  127. pulumi_vault/ldap/auth_backend.py +125 -168
  128. pulumi_vault/ldap/auth_backend_group.py +12 -11
  129. pulumi_vault/ldap/auth_backend_user.py +12 -11
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +352 -84
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +14 -11
  135. pulumi_vault/ldap/secret_backend_static_role.py +67 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +27 -43
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +16 -13
  140. pulumi_vault/mfa_okta.py +16 -13
  141. pulumi_vault/mfa_pingid.py +16 -13
  142. pulumi_vault/mfa_totp.py +22 -19
  143. pulumi_vault/mongodbatlas/secret_backend.py +18 -17
  144. pulumi_vault/mongodbatlas/secret_role.py +41 -38
  145. pulumi_vault/mount.py +389 -65
  146. pulumi_vault/namespace.py +26 -21
  147. pulumi_vault/nomad_secret_backend.py +16 -15
  148. pulumi_vault/nomad_secret_role.py +12 -11
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +483 -41
  151. pulumi_vault/okta/auth_backend_group.py +12 -11
  152. pulumi_vault/okta/auth_backend_user.py +12 -11
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +18 -15
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -13
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -12
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
  174. pulumi_vault/pkisecret/secret_backend_key.py +12 -7
  175. pulumi_vault/pkisecret/secret_backend_role.py +19 -16
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +12 -7
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +58 -8
  185. pulumi_vault/quota_rate_limit.py +54 -4
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +16 -15
  189. pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
  190. pulumi_vault/raft_autopilot.py +12 -11
  191. pulumi_vault/raft_snapshot_agent_config.py +121 -311
  192. pulumi_vault/rgp_policy.py +14 -13
  193. pulumi_vault/saml/auth_backend.py +20 -19
  194. pulumi_vault/saml/auth_backend_role.py +90 -199
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -75
  199. pulumi_vault/secrets/sync_aws_destination.py +240 -29
  200. pulumi_vault/secrets/sync_azure_destination.py +90 -33
  201. pulumi_vault/secrets/sync_config.py +7 -6
  202. pulumi_vault/secrets/sync_gcp_destination.py +156 -27
  203. pulumi_vault/secrets/sync_gh_destination.py +187 -15
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +72 -15
  206. pulumi_vault/ssh/_inputs.py +28 -32
  207. pulumi_vault/ssh/outputs.py +11 -32
  208. pulumi_vault/ssh/secret_backend_ca.py +106 -11
  209. pulumi_vault/ssh/secret_backend_role.py +83 -120
  210. pulumi_vault/terraformcloud/secret_backend.py +5 -56
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -24
  212. pulumi_vault/terraformcloud/secret_role.py +14 -76
  213. pulumi_vault/token.py +26 -25
  214. pulumi_vault/tokenauth/auth_backend_role.py +76 -201
  215. pulumi_vault/transform/alphabet.py +16 -13
  216. pulumi_vault/transform/get_decode.py +45 -21
  217. pulumi_vault/transform/get_encode.py +45 -21
  218. pulumi_vault/transform/role.py +16 -13
  219. pulumi_vault/transform/template.py +30 -25
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -25
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +25 -97
  224. pulumi_vault/transit/secret_cache_config.py +12 -11
  225. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736850018.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendKeyArgs', 'SecretBackendKey']
@@ -16,7 +21,6 @@ class SecretBackendKeyArgs:
16
21
  def __init__(__self__, *,
17
22
  backend: pulumi.Input[str],
18
23
  allow_plaintext_backup: Optional[pulumi.Input[bool]] = None,
19
- auto_rotate_interval: Optional[pulumi.Input[int]] = None,
20
24
  auto_rotate_period: Optional[pulumi.Input[int]] = None,
21
25
  convergent_encryption: Optional[pulumi.Input[bool]] = None,
22
26
  deletion_allowed: Optional[pulumi.Input[bool]] = None,
@@ -33,8 +37,6 @@ class SecretBackendKeyArgs:
33
37
  :param pulumi.Input[str] backend: The path the transit secret backend is mounted at, with no leading or trailing `/`s.
34
38
  :param pulumi.Input[bool] allow_plaintext_backup: Enables taking backup of entire keyring in the plaintext format. Once set, this cannot be disabled.
35
39
  * Refer to Vault API documentation on key backups for more information: [Backup Key](https://www.vaultproject.io/api-docs/secret/transit#backup-key)
36
- :param pulumi.Input[int] auto_rotate_interval: Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the
37
- key.
38
40
  :param pulumi.Input[int] auto_rotate_period: Amount of seconds the key should live before being automatically rotated.
39
41
  A value of 0 disables automatic rotation for the key.
40
42
  :param pulumi.Input[bool] convergent_encryption: Whether or not to support convergent encryption, where the same plaintext creates the same ciphertext. This requires `derived` to be set to `true`.
@@ -47,7 +49,7 @@ class SecretBackendKeyArgs:
47
49
  :param pulumi.Input[str] name: The name to identify this key within the backend. Must be unique within the backend.
48
50
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
49
51
  The value should not contain leading or trailing forward slashes.
50
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
52
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
51
53
  *Available only for Vault Enterprise*.
52
54
  :param pulumi.Input[str] type: Specifies the type of key to create. The currently-supported types are: `aes128-gcm96`, `aes256-gcm96` (default), `chacha20-poly1305`, `ed25519`, `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, `hmac`, `rsa-2048`, `rsa-3072` and `rsa-4096`.
53
55
  * Refer to the Vault documentation on transit key types for more information: [Key Types](https://www.vaultproject.io/docs/secrets/transit#key-types)
@@ -55,11 +57,6 @@ class SecretBackendKeyArgs:
55
57
  pulumi.set(__self__, "backend", backend)
56
58
  if allow_plaintext_backup is not None:
57
59
  pulumi.set(__self__, "allow_plaintext_backup", allow_plaintext_backup)
58
- if auto_rotate_interval is not None:
59
- warnings.warn("""Use auto_rotate_period instead""", DeprecationWarning)
60
- pulumi.log.warn("""auto_rotate_interval is deprecated: Use auto_rotate_period instead""")
61
- if auto_rotate_interval is not None:
62
- pulumi.set(__self__, "auto_rotate_interval", auto_rotate_interval)
63
60
  if auto_rotate_period is not None:
64
61
  pulumi.set(__self__, "auto_rotate_period", auto_rotate_period)
65
62
  if convergent_encryption is not None:
@@ -108,22 +105,6 @@ class SecretBackendKeyArgs:
108
105
  def allow_plaintext_backup(self, value: Optional[pulumi.Input[bool]]):
109
106
  pulumi.set(self, "allow_plaintext_backup", value)
110
107
 
111
- @property
112
- @pulumi.getter(name="autoRotateInterval")
113
- def auto_rotate_interval(self) -> Optional[pulumi.Input[int]]:
114
- """
115
- Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the
116
- key.
117
- """
118
- warnings.warn("""Use auto_rotate_period instead""", DeprecationWarning)
119
- pulumi.log.warn("""auto_rotate_interval is deprecated: Use auto_rotate_period instead""")
120
-
121
- return pulumi.get(self, "auto_rotate_interval")
122
-
123
- @auto_rotate_interval.setter
124
- def auto_rotate_interval(self, value: Optional[pulumi.Input[int]]):
125
- pulumi.set(self, "auto_rotate_interval", value)
126
-
127
108
  @property
128
109
  @pulumi.getter(name="autoRotatePeriod")
129
110
  def auto_rotate_period(self) -> Optional[pulumi.Input[int]]:
@@ -239,7 +220,7 @@ class SecretBackendKeyArgs:
239
220
  """
240
221
  The namespace to provision the resource in.
241
222
  The value should not contain leading or trailing forward slashes.
242
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
223
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
243
224
  *Available only for Vault Enterprise*.
244
225
  """
245
226
  return pulumi.get(self, "namespace")
@@ -266,7 +247,6 @@ class SecretBackendKeyArgs:
266
247
  class _SecretBackendKeyState:
267
248
  def __init__(__self__, *,
268
249
  allow_plaintext_backup: Optional[pulumi.Input[bool]] = None,
269
- auto_rotate_interval: Optional[pulumi.Input[int]] = None,
270
250
  auto_rotate_period: Optional[pulumi.Input[int]] = None,
271
251
  backend: Optional[pulumi.Input[str]] = None,
272
252
  convergent_encryption: Optional[pulumi.Input[bool]] = None,
@@ -274,7 +254,7 @@ class _SecretBackendKeyState:
274
254
  derived: Optional[pulumi.Input[bool]] = None,
275
255
  exportable: Optional[pulumi.Input[bool]] = None,
276
256
  key_size: Optional[pulumi.Input[int]] = None,
277
- keys: Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, Any]]]]] = None,
257
+ keys: Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[str]]]]]] = None,
278
258
  latest_version: Optional[pulumi.Input[int]] = None,
279
259
  min_available_version: Optional[pulumi.Input[int]] = None,
280
260
  min_decryption_version: Optional[pulumi.Input[int]] = None,
@@ -290,8 +270,6 @@ class _SecretBackendKeyState:
290
270
  Input properties used for looking up and filtering SecretBackendKey resources.
291
271
  :param pulumi.Input[bool] allow_plaintext_backup: Enables taking backup of entire keyring in the plaintext format. Once set, this cannot be disabled.
292
272
  * Refer to Vault API documentation on key backups for more information: [Backup Key](https://www.vaultproject.io/api-docs/secret/transit#backup-key)
293
- :param pulumi.Input[int] auto_rotate_interval: Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the
294
- key.
295
273
  :param pulumi.Input[int] auto_rotate_period: Amount of seconds the key should live before being automatically rotated.
296
274
  A value of 0 disables automatic rotation for the key.
297
275
  :param pulumi.Input[str] backend: The path the transit secret backend is mounted at, with no leading or trailing `/`s.
@@ -300,7 +278,7 @@ class _SecretBackendKeyState:
300
278
  :param pulumi.Input[bool] derived: Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation.
301
279
  :param pulumi.Input[bool] exportable: Enables keys to be exportable. This allows for all valid private keys in the keyring to be exported. Once set, this cannot be disabled.
302
280
  :param pulumi.Input[int] key_size: The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC, where it must be between 32 and 512 bytes.
303
- :param pulumi.Input[Sequence[pulumi.Input[Mapping[str, Any]]]] keys: List of key versions in the keyring. This attribute is zero-indexed and will contain a map of values depending on the `type` of the encryption key.
281
+ :param pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[str]]]]] keys: List of key versions in the keyring. This attribute is zero-indexed and will contain a map of values depending on the `type` of the encryption key.
304
282
  * for key types `aes128-gcm96`, `aes256-gcm96` and `chacha20-poly1305`, each key version will be a map of a single value `id` which is just a hash of the key's metadata.
305
283
  * for key types `ed25519`, `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, `rsa-2048`, `rsa-3072` and `rsa-4096`, each key version will be a map of the following:
306
284
  :param pulumi.Input[int] latest_version: Latest key version available. This value is 1-indexed, so if `latest_version` is `1`, then the key's information can be referenced from `keys` by selecting element `0`
@@ -310,7 +288,7 @@ class _SecretBackendKeyState:
310
288
  :param pulumi.Input[str] name: The name to identify this key within the backend. Must be unique within the backend.
311
289
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
312
290
  The value should not contain leading or trailing forward slashes.
313
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
291
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
314
292
  *Available only for Vault Enterprise*.
315
293
  :param pulumi.Input[bool] supports_decryption: Whether or not the key supports decryption, based on key type.
316
294
  :param pulumi.Input[bool] supports_derivation: Whether or not the key supports derivation, based on key type.
@@ -321,11 +299,6 @@ class _SecretBackendKeyState:
321
299
  """
322
300
  if allow_plaintext_backup is not None:
323
301
  pulumi.set(__self__, "allow_plaintext_backup", allow_plaintext_backup)
324
- if auto_rotate_interval is not None:
325
- warnings.warn("""Use auto_rotate_period instead""", DeprecationWarning)
326
- pulumi.log.warn("""auto_rotate_interval is deprecated: Use auto_rotate_period instead""")
327
- if auto_rotate_interval is not None:
328
- pulumi.set(__self__, "auto_rotate_interval", auto_rotate_interval)
329
302
  if auto_rotate_period is not None:
330
303
  pulumi.set(__self__, "auto_rotate_period", auto_rotate_period)
331
304
  if backend is not None:
@@ -378,22 +351,6 @@ class _SecretBackendKeyState:
378
351
  def allow_plaintext_backup(self, value: Optional[pulumi.Input[bool]]):
379
352
  pulumi.set(self, "allow_plaintext_backup", value)
380
353
 
381
- @property
382
- @pulumi.getter(name="autoRotateInterval")
383
- def auto_rotate_interval(self) -> Optional[pulumi.Input[int]]:
384
- """
385
- Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the
386
- key.
387
- """
388
- warnings.warn("""Use auto_rotate_period instead""", DeprecationWarning)
389
- pulumi.log.warn("""auto_rotate_interval is deprecated: Use auto_rotate_period instead""")
390
-
391
- return pulumi.get(self, "auto_rotate_interval")
392
-
393
- @auto_rotate_interval.setter
394
- def auto_rotate_interval(self, value: Optional[pulumi.Input[int]]):
395
- pulumi.set(self, "auto_rotate_interval", value)
396
-
397
354
  @property
398
355
  @pulumi.getter(name="autoRotatePeriod")
399
356
  def auto_rotate_period(self) -> Optional[pulumi.Input[int]]:
@@ -481,7 +438,7 @@ class _SecretBackendKeyState:
481
438
 
482
439
  @property
483
440
  @pulumi.getter
484
- def keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, Any]]]]]:
441
+ def keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[str]]]]]]:
485
442
  """
486
443
  List of key versions in the keyring. This attribute is zero-indexed and will contain a map of values depending on the `type` of the encryption key.
487
444
  * for key types `aes128-gcm96`, `aes256-gcm96` and `chacha20-poly1305`, each key version will be a map of a single value `id` which is just a hash of the key's metadata.
@@ -490,7 +447,7 @@ class _SecretBackendKeyState:
490
447
  return pulumi.get(self, "keys")
491
448
 
492
449
  @keys.setter
493
- def keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, Any]]]]]):
450
+ def keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[str]]]]]]):
494
451
  pulumi.set(self, "keys", value)
495
452
 
496
453
  @property
@@ -559,7 +516,7 @@ class _SecretBackendKeyState:
559
516
  """
560
517
  The namespace to provision the resource in.
561
518
  The value should not contain leading or trailing forward slashes.
562
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
519
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
563
520
  *Available only for Vault Enterprise*.
564
521
  """
565
522
  return pulumi.get(self, "namespace")
@@ -636,7 +593,6 @@ class SecretBackendKey(pulumi.CustomResource):
636
593
  resource_name: str,
637
594
  opts: Optional[pulumi.ResourceOptions] = None,
638
595
  allow_plaintext_backup: Optional[pulumi.Input[bool]] = None,
639
- auto_rotate_interval: Optional[pulumi.Input[int]] = None,
640
596
  auto_rotate_period: Optional[pulumi.Input[int]] = None,
641
597
  backend: Optional[pulumi.Input[str]] = None,
642
598
  convergent_encryption: Optional[pulumi.Input[bool]] = None,
@@ -655,7 +611,6 @@ class SecretBackendKey(pulumi.CustomResource):
655
611
 
656
612
  ## Example Usage
657
613
 
658
- <!--Start PulumiCodeChooser -->
659
614
  ```python
660
615
  import pulumi
661
616
  import pulumi_vault as vault
@@ -666,13 +621,10 @@ class SecretBackendKey(pulumi.CustomResource):
666
621
  description="Example description",
667
622
  default_lease_ttl_seconds=3600,
668
623
  max_lease_ttl_seconds=86400)
669
- key = vault.transit.SecretBackendKey("key", backend=transit.path)
624
+ key = vault.transit.SecretBackendKey("key",
625
+ backend=transit.path,
626
+ name="my_key")
670
627
  ```
671
- <!--End PulumiCodeChooser -->
672
-
673
- ## Deprecations
674
-
675
- * `auto_rotate_interval` - Replaced by `auto_rotate_period`.
676
628
 
677
629
  ## Import
678
630
 
@@ -686,8 +638,6 @@ class SecretBackendKey(pulumi.CustomResource):
686
638
  :param pulumi.ResourceOptions opts: Options for the resource.
687
639
  :param pulumi.Input[bool] allow_plaintext_backup: Enables taking backup of entire keyring in the plaintext format. Once set, this cannot be disabled.
688
640
  * Refer to Vault API documentation on key backups for more information: [Backup Key](https://www.vaultproject.io/api-docs/secret/transit#backup-key)
689
- :param pulumi.Input[int] auto_rotate_interval: Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the
690
- key.
691
641
  :param pulumi.Input[int] auto_rotate_period: Amount of seconds the key should live before being automatically rotated.
692
642
  A value of 0 disables automatic rotation for the key.
693
643
  :param pulumi.Input[str] backend: The path the transit secret backend is mounted at, with no leading or trailing `/`s.
@@ -701,7 +651,7 @@ class SecretBackendKey(pulumi.CustomResource):
701
651
  :param pulumi.Input[str] name: The name to identify this key within the backend. Must be unique within the backend.
702
652
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
703
653
  The value should not contain leading or trailing forward slashes.
704
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
654
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
705
655
  *Available only for Vault Enterprise*.
706
656
  :param pulumi.Input[str] type: Specifies the type of key to create. The currently-supported types are: `aes128-gcm96`, `aes256-gcm96` (default), `chacha20-poly1305`, `ed25519`, `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, `hmac`, `rsa-2048`, `rsa-3072` and `rsa-4096`.
707
657
  * Refer to the Vault documentation on transit key types for more information: [Key Types](https://www.vaultproject.io/docs/secrets/transit#key-types)
@@ -717,7 +667,6 @@ class SecretBackendKey(pulumi.CustomResource):
717
667
 
718
668
  ## Example Usage
719
669
 
720
- <!--Start PulumiCodeChooser -->
721
670
  ```python
722
671
  import pulumi
723
672
  import pulumi_vault as vault
@@ -728,13 +677,10 @@ class SecretBackendKey(pulumi.CustomResource):
728
677
  description="Example description",
729
678
  default_lease_ttl_seconds=3600,
730
679
  max_lease_ttl_seconds=86400)
731
- key = vault.transit.SecretBackendKey("key", backend=transit.path)
680
+ key = vault.transit.SecretBackendKey("key",
681
+ backend=transit.path,
682
+ name="my_key")
732
683
  ```
733
- <!--End PulumiCodeChooser -->
734
-
735
- ## Deprecations
736
-
737
- * `auto_rotate_interval` - Replaced by `auto_rotate_period`.
738
684
 
739
685
  ## Import
740
686
 
@@ -760,7 +706,6 @@ class SecretBackendKey(pulumi.CustomResource):
760
706
  resource_name: str,
761
707
  opts: Optional[pulumi.ResourceOptions] = None,
762
708
  allow_plaintext_backup: Optional[pulumi.Input[bool]] = None,
763
- auto_rotate_interval: Optional[pulumi.Input[int]] = None,
764
709
  auto_rotate_period: Optional[pulumi.Input[int]] = None,
765
710
  backend: Optional[pulumi.Input[str]] = None,
766
711
  convergent_encryption: Optional[pulumi.Input[bool]] = None,
@@ -783,7 +728,6 @@ class SecretBackendKey(pulumi.CustomResource):
783
728
  __props__ = SecretBackendKeyArgs.__new__(SecretBackendKeyArgs)
784
729
 
785
730
  __props__.__dict__["allow_plaintext_backup"] = allow_plaintext_backup
786
- __props__.__dict__["auto_rotate_interval"] = auto_rotate_interval
787
731
  __props__.__dict__["auto_rotate_period"] = auto_rotate_period
788
732
  if backend is None and not opts.urn:
789
733
  raise TypeError("Missing required property 'backend'")
@@ -816,7 +760,6 @@ class SecretBackendKey(pulumi.CustomResource):
816
760
  id: pulumi.Input[str],
817
761
  opts: Optional[pulumi.ResourceOptions] = None,
818
762
  allow_plaintext_backup: Optional[pulumi.Input[bool]] = None,
819
- auto_rotate_interval: Optional[pulumi.Input[int]] = None,
820
763
  auto_rotate_period: Optional[pulumi.Input[int]] = None,
821
764
  backend: Optional[pulumi.Input[str]] = None,
822
765
  convergent_encryption: Optional[pulumi.Input[bool]] = None,
@@ -824,7 +767,7 @@ class SecretBackendKey(pulumi.CustomResource):
824
767
  derived: Optional[pulumi.Input[bool]] = None,
825
768
  exportable: Optional[pulumi.Input[bool]] = None,
826
769
  key_size: Optional[pulumi.Input[int]] = None,
827
- keys: Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, Any]]]]] = None,
770
+ keys: Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[str]]]]]] = None,
828
771
  latest_version: Optional[pulumi.Input[int]] = None,
829
772
  min_available_version: Optional[pulumi.Input[int]] = None,
830
773
  min_decryption_version: Optional[pulumi.Input[int]] = None,
@@ -845,8 +788,6 @@ class SecretBackendKey(pulumi.CustomResource):
845
788
  :param pulumi.ResourceOptions opts: Options for the resource.
846
789
  :param pulumi.Input[bool] allow_plaintext_backup: Enables taking backup of entire keyring in the plaintext format. Once set, this cannot be disabled.
847
790
  * Refer to Vault API documentation on key backups for more information: [Backup Key](https://www.vaultproject.io/api-docs/secret/transit#backup-key)
848
- :param pulumi.Input[int] auto_rotate_interval: Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the
849
- key.
850
791
  :param pulumi.Input[int] auto_rotate_period: Amount of seconds the key should live before being automatically rotated.
851
792
  A value of 0 disables automatic rotation for the key.
852
793
  :param pulumi.Input[str] backend: The path the transit secret backend is mounted at, with no leading or trailing `/`s.
@@ -855,7 +796,7 @@ class SecretBackendKey(pulumi.CustomResource):
855
796
  :param pulumi.Input[bool] derived: Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation.
856
797
  :param pulumi.Input[bool] exportable: Enables keys to be exportable. This allows for all valid private keys in the keyring to be exported. Once set, this cannot be disabled.
857
798
  :param pulumi.Input[int] key_size: The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC, where it must be between 32 and 512 bytes.
858
- :param pulumi.Input[Sequence[pulumi.Input[Mapping[str, Any]]]] keys: List of key versions in the keyring. This attribute is zero-indexed and will contain a map of values depending on the `type` of the encryption key.
799
+ :param pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[str]]]]] keys: List of key versions in the keyring. This attribute is zero-indexed and will contain a map of values depending on the `type` of the encryption key.
859
800
  * for key types `aes128-gcm96`, `aes256-gcm96` and `chacha20-poly1305`, each key version will be a map of a single value `id` which is just a hash of the key's metadata.
860
801
  * for key types `ed25519`, `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, `rsa-2048`, `rsa-3072` and `rsa-4096`, each key version will be a map of the following:
861
802
  :param pulumi.Input[int] latest_version: Latest key version available. This value is 1-indexed, so if `latest_version` is `1`, then the key's information can be referenced from `keys` by selecting element `0`
@@ -865,7 +806,7 @@ class SecretBackendKey(pulumi.CustomResource):
865
806
  :param pulumi.Input[str] name: The name to identify this key within the backend. Must be unique within the backend.
866
807
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
867
808
  The value should not contain leading or trailing forward slashes.
868
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
809
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
869
810
  *Available only for Vault Enterprise*.
870
811
  :param pulumi.Input[bool] supports_decryption: Whether or not the key supports decryption, based on key type.
871
812
  :param pulumi.Input[bool] supports_derivation: Whether or not the key supports derivation, based on key type.
@@ -879,7 +820,6 @@ class SecretBackendKey(pulumi.CustomResource):
879
820
  __props__ = _SecretBackendKeyState.__new__(_SecretBackendKeyState)
880
821
 
881
822
  __props__.__dict__["allow_plaintext_backup"] = allow_plaintext_backup
882
- __props__.__dict__["auto_rotate_interval"] = auto_rotate_interval
883
823
  __props__.__dict__["auto_rotate_period"] = auto_rotate_period
884
824
  __props__.__dict__["backend"] = backend
885
825
  __props__.__dict__["convergent_encryption"] = convergent_encryption
@@ -910,18 +850,6 @@ class SecretBackendKey(pulumi.CustomResource):
910
850
  """
911
851
  return pulumi.get(self, "allow_plaintext_backup")
912
852
 
913
- @property
914
- @pulumi.getter(name="autoRotateInterval")
915
- def auto_rotate_interval(self) -> pulumi.Output[int]:
916
- """
917
- Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the
918
- key.
919
- """
920
- warnings.warn("""Use auto_rotate_period instead""", DeprecationWarning)
921
- pulumi.log.warn("""auto_rotate_interval is deprecated: Use auto_rotate_period instead""")
922
-
923
- return pulumi.get(self, "auto_rotate_interval")
924
-
925
853
  @property
926
854
  @pulumi.getter(name="autoRotatePeriod")
927
855
  def auto_rotate_period(self) -> pulumi.Output[int]:
@@ -981,7 +909,7 @@ class SecretBackendKey(pulumi.CustomResource):
981
909
 
982
910
  @property
983
911
  @pulumi.getter
984
- def keys(self) -> pulumi.Output[Sequence[Mapping[str, Any]]]:
912
+ def keys(self) -> pulumi.Output[Sequence[Mapping[str, str]]]:
985
913
  """
986
914
  List of key versions in the keyring. This attribute is zero-indexed and will contain a map of values depending on the `type` of the encryption key.
987
915
  * for key types `aes128-gcm96`, `aes256-gcm96` and `chacha20-poly1305`, each key version will be a map of a single value `id` which is just a hash of the key's metadata.
@@ -1035,7 +963,7 @@ class SecretBackendKey(pulumi.CustomResource):
1035
963
  """
1036
964
  The namespace to provision the resource in.
1037
965
  The value should not contain leading or trailing forward slashes.
1038
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
966
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1039
967
  *Available only for Vault Enterprise*.
1040
968
  """
1041
969
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretCacheConfigArgs', 'SecretCacheConfig']
@@ -23,7 +28,7 @@ class SecretCacheConfigArgs:
23
28
  :param pulumi.Input[int] size: The number of cache entries. 0 means unlimited.
24
29
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
25
30
  The value should not contain leading or trailing forward slashes.
26
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
31
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
27
32
  *Available only for Vault Enterprise*.
28
33
  """
29
34
  pulumi.set(__self__, "backend", backend)
@@ -61,7 +66,7 @@ class SecretCacheConfigArgs:
61
66
  """
62
67
  The namespace to provision the resource in.
63
68
  The value should not contain leading or trailing forward slashes.
64
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
69
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
65
70
  *Available only for Vault Enterprise*.
66
71
  """
67
72
  return pulumi.get(self, "namespace")
@@ -82,7 +87,7 @@ class _SecretCacheConfigState:
82
87
  :param pulumi.Input[str] backend: The path the transit secret backend is mounted at, with no leading or trailing `/`s.
83
88
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
84
89
  The value should not contain leading or trailing forward slashes.
85
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
90
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
86
91
  *Available only for Vault Enterprise*.
87
92
  :param pulumi.Input[int] size: The number of cache entries. 0 means unlimited.
88
93
  """
@@ -111,7 +116,7 @@ class _SecretCacheConfigState:
111
116
  """
112
117
  The namespace to provision the resource in.
113
118
  The value should not contain leading or trailing forward slashes.
114
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
119
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
115
120
  *Available only for Vault Enterprise*.
116
121
  """
117
122
  return pulumi.get(self, "namespace")
@@ -147,7 +152,6 @@ class SecretCacheConfig(pulumi.CustomResource):
147
152
 
148
153
  ## Example Usage
149
154
 
150
- <!--Start PulumiCodeChooser -->
151
155
  ```python
152
156
  import pulumi
153
157
  import pulumi_vault as vault
@@ -162,14 +166,13 @@ class SecretCacheConfig(pulumi.CustomResource):
162
166
  backend=transit.path,
163
167
  size=500)
164
168
  ```
165
- <!--End PulumiCodeChooser -->
166
169
 
167
170
  :param str resource_name: The name of the resource.
168
171
  :param pulumi.ResourceOptions opts: Options for the resource.
169
172
  :param pulumi.Input[str] backend: The path the transit secret backend is mounted at, with no leading or trailing `/`s.
170
173
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
171
174
  The value should not contain leading or trailing forward slashes.
172
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
175
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
173
176
  *Available only for Vault Enterprise*.
174
177
  :param pulumi.Input[int] size: The number of cache entries. 0 means unlimited.
175
178
  """
@@ -184,7 +187,6 @@ class SecretCacheConfig(pulumi.CustomResource):
184
187
 
185
188
  ## Example Usage
186
189
 
187
- <!--Start PulumiCodeChooser -->
188
190
  ```python
189
191
  import pulumi
190
192
  import pulumi_vault as vault
@@ -199,7 +201,6 @@ class SecretCacheConfig(pulumi.CustomResource):
199
201
  backend=transit.path,
200
202
  size=500)
201
203
  ```
202
- <!--End PulumiCodeChooser -->
203
204
 
204
205
  :param str resource_name: The name of the resource.
205
206
  :param SecretCacheConfigArgs args: The arguments to use to populate this resource's properties.
@@ -258,7 +259,7 @@ class SecretCacheConfig(pulumi.CustomResource):
258
259
  :param pulumi.Input[str] backend: The path the transit secret backend is mounted at, with no leading or trailing `/`s.
259
260
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
260
261
  The value should not contain leading or trailing forward slashes.
261
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
262
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
262
263
  *Available only for Vault Enterprise*.
263
264
  :param pulumi.Input[int] size: The number of cache entries. 0 means unlimited.
264
265
  """
@@ -285,7 +286,7 @@ class SecretCacheConfig(pulumi.CustomResource):
285
286
  """
286
287
  The namespace to provision the resource in.
287
288
  The value should not contain leading or trailing forward slashes.
288
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
289
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
289
290
  *Available only for Vault Enterprise*.
290
291
  """
291
292
  return pulumi.get(self, "namespace")
@@ -1,16 +1,17 @@
1
- Metadata-Version: 2.1
1
+ Metadata-Version: 2.2
2
2
  Name: pulumi_vault
3
- Version: 5.21.0a1710160723
3
+ Version: 6.5.0a1736850018
4
4
  Summary: A Pulumi package for creating and managing HashiCorp Vault cloud resources.
5
5
  License: Apache-2.0
6
6
  Project-URL: Homepage, https://pulumi.io
7
7
  Project-URL: Repository, https://github.com/pulumi/pulumi-vault
8
8
  Keywords: pulumi,vault
9
- Requires-Python: >=3.8
9
+ Requires-Python: >=3.9
10
10
  Description-Content-Type: text/markdown
11
- Requires-Dist: parver >=0.2.1
12
- Requires-Dist: pulumi <4.0.0,>=3.0.0
13
- Requires-Dist: semver >=2.8.1
11
+ Requires-Dist: parver>=0.2.1
12
+ Requires-Dist: pulumi<4.0.0,>=3.142.0
13
+ Requires-Dist: semver>=2.8.1
14
+ Requires-Dist: typing-extensions>=4.11; python_version < "3.11"
14
15
 
15
16
  [![Build Status](https://travis-ci.com/pulumi/pulumi-vault.svg?token=eHg7Zp5zdDDJfTjY8ejq&branch=master)](https://travis-ci.com/pulumi/pulumi-vault)
16
17
 
@@ -43,7 +44,7 @@ To use from Python, install using `pip`:
43
44
 
44
45
  To use from Go, use `go get` to grab the latest version of the library
45
46
 
46
- $ go get github.com/pulumi/pulumi-vault/sdk/v4
47
+ $ go get github.com/pulumi/pulumi-vault/sdk/v6
47
48
 
48
49
  ### .NET
49
50