pulumi-vault 5.21.0a1711033014__py3-none-any.whl → 6.0.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (163) hide show
  1. pulumi_vault/__init__.py +24 -0
  2. pulumi_vault/ad/get_access_credentials.py +2 -2
  3. pulumi_vault/ad/secret_backend.py +7 -138
  4. pulumi_vault/ad/secret_library.py +7 -7
  5. pulumi_vault/ad/secret_role.py +7 -7
  6. pulumi_vault/approle/auth_backend_login.py +7 -7
  7. pulumi_vault/approle/auth_backend_role.py +7 -7
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +7 -7
  9. pulumi_vault/audit.py +7 -7
  10. pulumi_vault/auth_backend.py +7 -7
  11. pulumi_vault/aws/auth_backend_cert.py +7 -7
  12. pulumi_vault/aws/auth_backend_client.py +7 -7
  13. pulumi_vault/aws/auth_backend_config_identity.py +7 -7
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +7 -7
  15. pulumi_vault/aws/auth_backend_login.py +7 -7
  16. pulumi_vault/aws/auth_backend_role.py +7 -7
  17. pulumi_vault/aws/auth_backend_role_tag.py +7 -7
  18. pulumi_vault/aws/auth_backend_roletag_blacklist.py +7 -7
  19. pulumi_vault/aws/auth_backend_sts_role.py +7 -7
  20. pulumi_vault/aws/get_access_credentials.py +2 -2
  21. pulumi_vault/aws/secret_backend.py +7 -7
  22. pulumi_vault/aws/secret_backend_role.py +7 -7
  23. pulumi_vault/aws/secret_backend_static_role.py +7 -7
  24. pulumi_vault/azure/auth_backend_config.py +7 -7
  25. pulumi_vault/azure/auth_backend_role.py +7 -7
  26. pulumi_vault/azure/backend.py +7 -7
  27. pulumi_vault/azure/backend_role.py +7 -7
  28. pulumi_vault/azure/get_access_credentials.py +2 -2
  29. pulumi_vault/cert_auth_backend_role.py +7 -63
  30. pulumi_vault/config/_inputs.py +52 -0
  31. pulumi_vault/config/outputs.py +30 -0
  32. pulumi_vault/config/ui_custom_message.py +524 -0
  33. pulumi_vault/consul/secret_backend.py +7 -7
  34. pulumi_vault/consul/secret_backend_role.py +7 -76
  35. pulumi_vault/egp_policy.py +7 -7
  36. pulumi_vault/gcp/auth_backend.py +7 -7
  37. pulumi_vault/gcp/auth_backend_role.py +7 -7
  38. pulumi_vault/gcp/secret_backend.py +7 -7
  39. pulumi_vault/gcp/secret_roleset.py +7 -7
  40. pulumi_vault/gcp/secret_static_account.py +7 -7
  41. pulumi_vault/generic/endpoint.py +7 -7
  42. pulumi_vault/generic/get_secret.py +2 -2
  43. pulumi_vault/generic/secret.py +7 -7
  44. pulumi_vault/get_auth_backend.py +2 -2
  45. pulumi_vault/get_auth_backends.py +20 -2
  46. pulumi_vault/get_nomad_access_token.py +2 -2
  47. pulumi_vault/get_raft_autopilot_state.py +2 -2
  48. pulumi_vault/github/auth_backend.py +7 -7
  49. pulumi_vault/github/team.py +7 -7
  50. pulumi_vault/github/user.py +7 -7
  51. pulumi_vault/identity/entity.py +7 -7
  52. pulumi_vault/identity/entity_alias.py +7 -7
  53. pulumi_vault/identity/entity_policies.py +7 -7
  54. pulumi_vault/identity/get_entity.py +2 -2
  55. pulumi_vault/identity/get_group.py +2 -2
  56. pulumi_vault/identity/get_oidc_client_creds.py +2 -2
  57. pulumi_vault/identity/get_oidc_openid_config.py +2 -2
  58. pulumi_vault/identity/get_oidc_public_keys.py +2 -2
  59. pulumi_vault/identity/group.py +7 -7
  60. pulumi_vault/identity/group_alias.py +7 -7
  61. pulumi_vault/identity/group_member_entity_ids.py +7 -58
  62. pulumi_vault/identity/group_member_group_ids.py +7 -7
  63. pulumi_vault/identity/group_policies.py +7 -7
  64. pulumi_vault/identity/oidc.py +7 -7
  65. pulumi_vault/identity/oidc_assignment.py +7 -7
  66. pulumi_vault/identity/oidc_client.py +19 -15
  67. pulumi_vault/identity/oidc_key.py +7 -7
  68. pulumi_vault/identity/oidc_key_allowed_client_id.py +7 -7
  69. pulumi_vault/identity/oidc_provider.py +7 -7
  70. pulumi_vault/identity/oidc_role.py +7 -7
  71. pulumi_vault/identity/oidc_scope.py +7 -7
  72. pulumi_vault/jwt/auth_backend.py +7 -7
  73. pulumi_vault/jwt/auth_backend_role.py +7 -7
  74. pulumi_vault/kmip/secret_backend.py +7 -7
  75. pulumi_vault/kmip/secret_role.py +7 -7
  76. pulumi_vault/kmip/secret_scope.py +7 -7
  77. pulumi_vault/kubernetes/auth_backend_role.py +7 -7
  78. pulumi_vault/kubernetes/get_service_account_token.py +2 -2
  79. pulumi_vault/kubernetes/secret_backend.py +7 -7
  80. pulumi_vault/kubernetes/secret_backend_role.py +7 -7
  81. pulumi_vault/kv/get_secret.py +2 -2
  82. pulumi_vault/kv/get_secret_subkeys_v2.py +2 -2
  83. pulumi_vault/kv/get_secret_v2.py +5 -2
  84. pulumi_vault/kv/get_secrets_list.py +2 -2
  85. pulumi_vault/kv/get_secrets_list_v2.py +2 -2
  86. pulumi_vault/kv/secret.py +7 -7
  87. pulumi_vault/kv/secret_backend_v2.py +7 -7
  88. pulumi_vault/kv/secret_v2.py +7 -7
  89. pulumi_vault/ldap/auth_backend.py +7 -7
  90. pulumi_vault/ldap/auth_backend_group.py +7 -7
  91. pulumi_vault/ldap/auth_backend_user.py +7 -7
  92. pulumi_vault/ldap/secret_backend.py +61 -76
  93. pulumi_vault/ldap/secret_backend_dynamic_role.py +7 -7
  94. pulumi_vault/ldap/secret_backend_library_set.py +7 -7
  95. pulumi_vault/ldap/secret_backend_static_role.py +62 -8
  96. pulumi_vault/mfa_duo.py +7 -7
  97. pulumi_vault/mfa_okta.py +7 -7
  98. pulumi_vault/mfa_pingid.py +7 -7
  99. pulumi_vault/mfa_totp.py +7 -7
  100. pulumi_vault/mongodbatlas/secret_backend.py +7 -7
  101. pulumi_vault/mongodbatlas/secret_role.py +7 -7
  102. pulumi_vault/mount.py +11 -7
  103. pulumi_vault/namespace.py +7 -7
  104. pulumi_vault/nomad_secret_backend.py +7 -7
  105. pulumi_vault/nomad_secret_role.py +7 -7
  106. pulumi_vault/okta/auth_backend.py +7 -7
  107. pulumi_vault/okta/auth_backend_group.py +7 -7
  108. pulumi_vault/okta/auth_backend_user.py +7 -7
  109. pulumi_vault/password_policy.py +7 -7
  110. pulumi_vault/pkisecret/__init__.py +1 -0
  111. pulumi_vault/pkisecret/backend_config_cluster.py +368 -0
  112. pulumi_vault/pkisecret/get_backend_issuer.py +2 -2
  113. pulumi_vault/pkisecret/get_backend_issuers.py +2 -2
  114. pulumi_vault/pkisecret/get_backend_key.py +2 -2
  115. pulumi_vault/pkisecret/get_backend_keys.py +2 -2
  116. pulumi_vault/pkisecret/secret_backend_cert.py +7 -7
  117. pulumi_vault/pkisecret/secret_backend_config_ca.py +7 -7
  118. pulumi_vault/pkisecret/secret_backend_config_issuers.py +7 -7
  119. pulumi_vault/pkisecret/secret_backend_config_urls.py +54 -7
  120. pulumi_vault/pkisecret/secret_backend_crl_config.py +7 -7
  121. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +7 -7
  122. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +7 -7
  123. pulumi_vault/pkisecret/secret_backend_issuer.py +7 -7
  124. pulumi_vault/pkisecret/secret_backend_key.py +7 -7
  125. pulumi_vault/pkisecret/secret_backend_role.py +7 -7
  126. pulumi_vault/pkisecret/secret_backend_root_cert.py +7 -44
  127. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +7 -52
  128. pulumi_vault/pkisecret/secret_backend_sign.py +7 -52
  129. pulumi_vault/policy.py +7 -7
  130. pulumi_vault/rabbitmq/secret_backend.py +7 -7
  131. pulumi_vault/rabbitmq/secret_backend_role.py +7 -7
  132. pulumi_vault/raft_autopilot.py +7 -7
  133. pulumi_vault/raft_snapshot_agent_config.py +7 -7
  134. pulumi_vault/rgp_policy.py +7 -7
  135. pulumi_vault/saml/auth_backend.py +7 -7
  136. pulumi_vault/saml/auth_backend_role.py +7 -7
  137. pulumi_vault/secrets/__init__.py +1 -0
  138. pulumi_vault/secrets/sync_association.py +7 -7
  139. pulumi_vault/secrets/sync_aws_destination.py +161 -7
  140. pulumi_vault/secrets/sync_azure_destination.py +7 -7
  141. pulumi_vault/secrets/sync_gcp_destination.py +77 -7
  142. pulumi_vault/secrets/sync_gh_destination.py +122 -7
  143. pulumi_vault/secrets/sync_github_apps.py +370 -0
  144. pulumi_vault/secrets/sync_vercel_destination.py +7 -7
  145. pulumi_vault/ssh/secret_backend_ca.py +7 -7
  146. pulumi_vault/ssh/secret_backend_role.py +7 -83
  147. pulumi_vault/terraformcloud/secret_creds.py +7 -7
  148. pulumi_vault/terraformcloud/secret_role.py +7 -7
  149. pulumi_vault/token.py +7 -7
  150. pulumi_vault/tokenauth/auth_backend_role.py +7 -7
  151. pulumi_vault/transform/alphabet.py +7 -7
  152. pulumi_vault/transform/get_decode.py +2 -2
  153. pulumi_vault/transform/get_encode.py +2 -2
  154. pulumi_vault/transform/role.py +7 -7
  155. pulumi_vault/transform/template.py +7 -7
  156. pulumi_vault/transform/transformation.py +7 -7
  157. pulumi_vault/transit/secret_backend_key.py +7 -84
  158. pulumi_vault/transit/secret_cache_config.py +7 -7
  159. {pulumi_vault-5.21.0a1711033014.dist-info → pulumi_vault-6.0.0.dist-info}/METADATA +2 -2
  160. pulumi_vault-6.0.0.dist-info/RECORD +248 -0
  161. pulumi_vault-5.21.0a1711033014.dist-info/RECORD +0 -244
  162. {pulumi_vault-5.21.0a1711033014.dist-info → pulumi_vault-6.0.0.dist-info}/WHEEL +0 -0
  163. {pulumi_vault-5.21.0a1711033014.dist-info → pulumi_vault-6.0.0.dist-info}/top_level.txt +0 -0
@@ -28,7 +28,6 @@ class SecretBackendArgs:
28
28
  disable_remount: Optional[pulumi.Input[bool]] = None,
29
29
  external_entropy_access: Optional[pulumi.Input[bool]] = None,
30
30
  insecure_tls: Optional[pulumi.Input[bool]] = None,
31
- length: Optional[pulumi.Input[int]] = None,
32
31
  local: Optional[pulumi.Input[bool]] = None,
33
32
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
34
33
  namespace: Optional[pulumi.Input[str]] = None,
@@ -38,6 +37,7 @@ class SecretBackendArgs:
38
37
  request_timeout: Optional[pulumi.Input[int]] = None,
39
38
  schema: Optional[pulumi.Input[str]] = None,
40
39
  seal_wrap: Optional[pulumi.Input[bool]] = None,
40
+ skip_static_role_import_rotation: Optional[pulumi.Input[bool]] = None,
41
41
  starttls: Optional[pulumi.Input[bool]] = None,
42
42
  upndomain: Optional[pulumi.Input[str]] = None,
43
43
  url: Optional[pulumi.Input[str]] = None,
@@ -62,14 +62,12 @@ class SecretBackendArgs:
62
62
  :param pulumi.Input[bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
63
63
  :param pulumi.Input[bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
64
64
  Defaults to `false`.
65
- :param pulumi.Input[int] length: **Deprecated** use `password_policy`. The desired length of passwords that Vault generates.
66
- *Mutually exclusive with `password_policy` on vault-1.11+*
67
65
  :param pulumi.Input[bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
68
66
  replication.Tolerance duration to use when checking the last rotation time.
69
67
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
70
68
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
71
69
  The value should not contain leading or trailing forward slashes.
72
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
70
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
73
71
  *Available only for Vault Enterprise*.
74
72
  :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
75
73
  :param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
@@ -79,6 +77,8 @@ class SecretBackendArgs:
79
77
  before returning back an error.
80
78
  :param pulumi.Input[str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
81
79
  :param pulumi.Input[bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
80
+ :param pulumi.Input[bool] skip_static_role_import_rotation: If set to true, static roles will not be rotated during import.
81
+ Defaults to false. Requires Vault 1.16 or above.
82
82
  :param pulumi.Input[bool] starttls: Issue a StartTLS command after establishing unencrypted connection.
83
83
  :param pulumi.Input[str] upndomain: Enables userPrincipalDomain login with [username]@UPNDomain.
84
84
  :param pulumi.Input[str] url: LDAP URL to connect to. Multiple URLs can be specified by concatenating
@@ -112,11 +112,6 @@ class SecretBackendArgs:
112
112
  pulumi.set(__self__, "external_entropy_access", external_entropy_access)
113
113
  if insecure_tls is not None:
114
114
  pulumi.set(__self__, "insecure_tls", insecure_tls)
115
- if length is not None:
116
- warnings.warn("""Length is deprecated and password_policy should be used with Vault >= 1.5.""", DeprecationWarning)
117
- pulumi.log.warn("""length is deprecated: Length is deprecated and password_policy should be used with Vault >= 1.5.""")
118
- if length is not None:
119
- pulumi.set(__self__, "length", length)
120
115
  if local is not None:
121
116
  pulumi.set(__self__, "local", local)
122
117
  if max_lease_ttl_seconds is not None:
@@ -135,6 +130,8 @@ class SecretBackendArgs:
135
130
  pulumi.set(__self__, "schema", schema)
136
131
  if seal_wrap is not None:
137
132
  pulumi.set(__self__, "seal_wrap", seal_wrap)
133
+ if skip_static_role_import_rotation is not None:
134
+ pulumi.set(__self__, "skip_static_role_import_rotation", skip_static_role_import_rotation)
138
135
  if starttls is not None:
139
136
  pulumi.set(__self__, "starttls", starttls)
140
137
  if upndomain is not None:
@@ -317,22 +314,6 @@ class SecretBackendArgs:
317
314
  def insecure_tls(self, value: Optional[pulumi.Input[bool]]):
318
315
  pulumi.set(self, "insecure_tls", value)
319
316
 
320
- @property
321
- @pulumi.getter
322
- def length(self) -> Optional[pulumi.Input[int]]:
323
- """
324
- **Deprecated** use `password_policy`. The desired length of passwords that Vault generates.
325
- *Mutually exclusive with `password_policy` on vault-1.11+*
326
- """
327
- warnings.warn("""Length is deprecated and password_policy should be used with Vault >= 1.5.""", DeprecationWarning)
328
- pulumi.log.warn("""length is deprecated: Length is deprecated and password_policy should be used with Vault >= 1.5.""")
329
-
330
- return pulumi.get(self, "length")
331
-
332
- @length.setter
333
- def length(self, value: Optional[pulumi.Input[int]]):
334
- pulumi.set(self, "length", value)
335
-
336
317
  @property
337
318
  @pulumi.getter
338
319
  def local(self) -> Optional[pulumi.Input[bool]]:
@@ -364,7 +345,7 @@ class SecretBackendArgs:
364
345
  """
365
346
  The namespace to provision the resource in.
366
347
  The value should not contain leading or trailing forward slashes.
367
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
348
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
368
349
  *Available only for Vault Enterprise*.
369
350
  """
370
351
  return pulumi.get(self, "namespace")
@@ -447,6 +428,19 @@ class SecretBackendArgs:
447
428
  def seal_wrap(self, value: Optional[pulumi.Input[bool]]):
448
429
  pulumi.set(self, "seal_wrap", value)
449
430
 
431
+ @property
432
+ @pulumi.getter(name="skipStaticRoleImportRotation")
433
+ def skip_static_role_import_rotation(self) -> Optional[pulumi.Input[bool]]:
434
+ """
435
+ If set to true, static roles will not be rotated during import.
436
+ Defaults to false. Requires Vault 1.16 or above.
437
+ """
438
+ return pulumi.get(self, "skip_static_role_import_rotation")
439
+
440
+ @skip_static_role_import_rotation.setter
441
+ def skip_static_role_import_rotation(self, value: Optional[pulumi.Input[bool]]):
442
+ pulumi.set(self, "skip_static_role_import_rotation", value)
443
+
450
444
  @property
451
445
  @pulumi.getter
452
446
  def starttls(self) -> Optional[pulumi.Input[bool]]:
@@ -527,7 +521,6 @@ class _SecretBackendState:
527
521
  disable_remount: Optional[pulumi.Input[bool]] = None,
528
522
  external_entropy_access: Optional[pulumi.Input[bool]] = None,
529
523
  insecure_tls: Optional[pulumi.Input[bool]] = None,
530
- length: Optional[pulumi.Input[int]] = None,
531
524
  local: Optional[pulumi.Input[bool]] = None,
532
525
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
533
526
  namespace: Optional[pulumi.Input[str]] = None,
@@ -537,6 +530,7 @@ class _SecretBackendState:
537
530
  request_timeout: Optional[pulumi.Input[int]] = None,
538
531
  schema: Optional[pulumi.Input[str]] = None,
539
532
  seal_wrap: Optional[pulumi.Input[bool]] = None,
533
+ skip_static_role_import_rotation: Optional[pulumi.Input[bool]] = None,
540
534
  starttls: Optional[pulumi.Input[bool]] = None,
541
535
  upndomain: Optional[pulumi.Input[str]] = None,
542
536
  url: Optional[pulumi.Input[str]] = None,
@@ -562,14 +556,12 @@ class _SecretBackendState:
562
556
  :param pulumi.Input[bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
563
557
  :param pulumi.Input[bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
564
558
  Defaults to `false`.
565
- :param pulumi.Input[int] length: **Deprecated** use `password_policy`. The desired length of passwords that Vault generates.
566
- *Mutually exclusive with `password_policy` on vault-1.11+*
567
559
  :param pulumi.Input[bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
568
560
  replication.Tolerance duration to use when checking the last rotation time.
569
561
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
570
562
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
571
563
  The value should not contain leading or trailing forward slashes.
572
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
564
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
573
565
  *Available only for Vault Enterprise*.
574
566
  :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
575
567
  :param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
@@ -579,6 +571,8 @@ class _SecretBackendState:
579
571
  before returning back an error.
580
572
  :param pulumi.Input[str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
581
573
  :param pulumi.Input[bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
574
+ :param pulumi.Input[bool] skip_static_role_import_rotation: If set to true, static roles will not be rotated during import.
575
+ Defaults to false. Requires Vault 1.16 or above.
582
576
  :param pulumi.Input[bool] starttls: Issue a StartTLS command after establishing unencrypted connection.
583
577
  :param pulumi.Input[str] upndomain: Enables userPrincipalDomain login with [username]@UPNDomain.
584
578
  :param pulumi.Input[str] url: LDAP URL to connect to. Multiple URLs can be specified by concatenating
@@ -616,11 +610,6 @@ class _SecretBackendState:
616
610
  pulumi.set(__self__, "external_entropy_access", external_entropy_access)
617
611
  if insecure_tls is not None:
618
612
  pulumi.set(__self__, "insecure_tls", insecure_tls)
619
- if length is not None:
620
- warnings.warn("""Length is deprecated and password_policy should be used with Vault >= 1.5.""", DeprecationWarning)
621
- pulumi.log.warn("""length is deprecated: Length is deprecated and password_policy should be used with Vault >= 1.5.""")
622
- if length is not None:
623
- pulumi.set(__self__, "length", length)
624
613
  if local is not None:
625
614
  pulumi.set(__self__, "local", local)
626
615
  if max_lease_ttl_seconds is not None:
@@ -639,6 +628,8 @@ class _SecretBackendState:
639
628
  pulumi.set(__self__, "schema", schema)
640
629
  if seal_wrap is not None:
641
630
  pulumi.set(__self__, "seal_wrap", seal_wrap)
631
+ if skip_static_role_import_rotation is not None:
632
+ pulumi.set(__self__, "skip_static_role_import_rotation", skip_static_role_import_rotation)
642
633
  if starttls is not None:
643
634
  pulumi.set(__self__, "starttls", starttls)
644
635
  if upndomain is not None:
@@ -833,22 +824,6 @@ class _SecretBackendState:
833
824
  def insecure_tls(self, value: Optional[pulumi.Input[bool]]):
834
825
  pulumi.set(self, "insecure_tls", value)
835
826
 
836
- @property
837
- @pulumi.getter
838
- def length(self) -> Optional[pulumi.Input[int]]:
839
- """
840
- **Deprecated** use `password_policy`. The desired length of passwords that Vault generates.
841
- *Mutually exclusive with `password_policy` on vault-1.11+*
842
- """
843
- warnings.warn("""Length is deprecated and password_policy should be used with Vault >= 1.5.""", DeprecationWarning)
844
- pulumi.log.warn("""length is deprecated: Length is deprecated and password_policy should be used with Vault >= 1.5.""")
845
-
846
- return pulumi.get(self, "length")
847
-
848
- @length.setter
849
- def length(self, value: Optional[pulumi.Input[int]]):
850
- pulumi.set(self, "length", value)
851
-
852
827
  @property
853
828
  @pulumi.getter
854
829
  def local(self) -> Optional[pulumi.Input[bool]]:
@@ -880,7 +855,7 @@ class _SecretBackendState:
880
855
  """
881
856
  The namespace to provision the resource in.
882
857
  The value should not contain leading or trailing forward slashes.
883
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
858
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
884
859
  *Available only for Vault Enterprise*.
885
860
  """
886
861
  return pulumi.get(self, "namespace")
@@ -963,6 +938,19 @@ class _SecretBackendState:
963
938
  def seal_wrap(self, value: Optional[pulumi.Input[bool]]):
964
939
  pulumi.set(self, "seal_wrap", value)
965
940
 
941
+ @property
942
+ @pulumi.getter(name="skipStaticRoleImportRotation")
943
+ def skip_static_role_import_rotation(self) -> Optional[pulumi.Input[bool]]:
944
+ """
945
+ If set to true, static roles will not be rotated during import.
946
+ Defaults to false. Requires Vault 1.16 or above.
947
+ """
948
+ return pulumi.get(self, "skip_static_role_import_rotation")
949
+
950
+ @skip_static_role_import_rotation.setter
951
+ def skip_static_role_import_rotation(self, value: Optional[pulumi.Input[bool]]):
952
+ pulumi.set(self, "skip_static_role_import_rotation", value)
953
+
966
954
  @property
967
955
  @pulumi.getter
968
956
  def starttls(self) -> Optional[pulumi.Input[bool]]:
@@ -1044,7 +1032,6 @@ class SecretBackend(pulumi.CustomResource):
1044
1032
  disable_remount: Optional[pulumi.Input[bool]] = None,
1045
1033
  external_entropy_access: Optional[pulumi.Input[bool]] = None,
1046
1034
  insecure_tls: Optional[pulumi.Input[bool]] = None,
1047
- length: Optional[pulumi.Input[int]] = None,
1048
1035
  local: Optional[pulumi.Input[bool]] = None,
1049
1036
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1050
1037
  namespace: Optional[pulumi.Input[str]] = None,
@@ -1054,6 +1041,7 @@ class SecretBackend(pulumi.CustomResource):
1054
1041
  request_timeout: Optional[pulumi.Input[int]] = None,
1055
1042
  schema: Optional[pulumi.Input[str]] = None,
1056
1043
  seal_wrap: Optional[pulumi.Input[bool]] = None,
1044
+ skip_static_role_import_rotation: Optional[pulumi.Input[bool]] = None,
1057
1045
  starttls: Optional[pulumi.Input[bool]] = None,
1058
1046
  upndomain: Optional[pulumi.Input[str]] = None,
1059
1047
  url: Optional[pulumi.Input[str]] = None,
@@ -1105,14 +1093,12 @@ class SecretBackend(pulumi.CustomResource):
1105
1093
  :param pulumi.Input[bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1106
1094
  :param pulumi.Input[bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
1107
1095
  Defaults to `false`.
1108
- :param pulumi.Input[int] length: **Deprecated** use `password_policy`. The desired length of passwords that Vault generates.
1109
- *Mutually exclusive with `password_policy` on vault-1.11+*
1110
1096
  :param pulumi.Input[bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
1111
1097
  replication.Tolerance duration to use when checking the last rotation time.
1112
1098
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
1113
1099
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
1114
1100
  The value should not contain leading or trailing forward slashes.
1115
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1101
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1116
1102
  *Available only for Vault Enterprise*.
1117
1103
  :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
1118
1104
  :param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
@@ -1122,6 +1108,8 @@ class SecretBackend(pulumi.CustomResource):
1122
1108
  before returning back an error.
1123
1109
  :param pulumi.Input[str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
1124
1110
  :param pulumi.Input[bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1111
+ :param pulumi.Input[bool] skip_static_role_import_rotation: If set to true, static roles will not be rotated during import.
1112
+ Defaults to false. Requires Vault 1.16 or above.
1125
1113
  :param pulumi.Input[bool] starttls: Issue a StartTLS command after establishing unencrypted connection.
1126
1114
  :param pulumi.Input[str] upndomain: Enables userPrincipalDomain login with [username]@UPNDomain.
1127
1115
  :param pulumi.Input[str] url: LDAP URL to connect to. Multiple URLs can be specified by concatenating
@@ -1190,7 +1178,6 @@ class SecretBackend(pulumi.CustomResource):
1190
1178
  disable_remount: Optional[pulumi.Input[bool]] = None,
1191
1179
  external_entropy_access: Optional[pulumi.Input[bool]] = None,
1192
1180
  insecure_tls: Optional[pulumi.Input[bool]] = None,
1193
- length: Optional[pulumi.Input[int]] = None,
1194
1181
  local: Optional[pulumi.Input[bool]] = None,
1195
1182
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1196
1183
  namespace: Optional[pulumi.Input[str]] = None,
@@ -1200,6 +1187,7 @@ class SecretBackend(pulumi.CustomResource):
1200
1187
  request_timeout: Optional[pulumi.Input[int]] = None,
1201
1188
  schema: Optional[pulumi.Input[str]] = None,
1202
1189
  seal_wrap: Optional[pulumi.Input[bool]] = None,
1190
+ skip_static_role_import_rotation: Optional[pulumi.Input[bool]] = None,
1203
1191
  starttls: Optional[pulumi.Input[bool]] = None,
1204
1192
  upndomain: Optional[pulumi.Input[str]] = None,
1205
1193
  url: Optional[pulumi.Input[str]] = None,
@@ -1232,7 +1220,6 @@ class SecretBackend(pulumi.CustomResource):
1232
1220
  __props__.__dict__["disable_remount"] = disable_remount
1233
1221
  __props__.__dict__["external_entropy_access"] = external_entropy_access
1234
1222
  __props__.__dict__["insecure_tls"] = insecure_tls
1235
- __props__.__dict__["length"] = length
1236
1223
  __props__.__dict__["local"] = local
1237
1224
  __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
1238
1225
  __props__.__dict__["namespace"] = namespace
@@ -1242,6 +1229,7 @@ class SecretBackend(pulumi.CustomResource):
1242
1229
  __props__.__dict__["request_timeout"] = request_timeout
1243
1230
  __props__.__dict__["schema"] = schema
1244
1231
  __props__.__dict__["seal_wrap"] = seal_wrap
1232
+ __props__.__dict__["skip_static_role_import_rotation"] = skip_static_role_import_rotation
1245
1233
  __props__.__dict__["starttls"] = starttls
1246
1234
  __props__.__dict__["upndomain"] = upndomain
1247
1235
  __props__.__dict__["url"] = url
@@ -1275,7 +1263,6 @@ class SecretBackend(pulumi.CustomResource):
1275
1263
  disable_remount: Optional[pulumi.Input[bool]] = None,
1276
1264
  external_entropy_access: Optional[pulumi.Input[bool]] = None,
1277
1265
  insecure_tls: Optional[pulumi.Input[bool]] = None,
1278
- length: Optional[pulumi.Input[int]] = None,
1279
1266
  local: Optional[pulumi.Input[bool]] = None,
1280
1267
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1281
1268
  namespace: Optional[pulumi.Input[str]] = None,
@@ -1285,6 +1272,7 @@ class SecretBackend(pulumi.CustomResource):
1285
1272
  request_timeout: Optional[pulumi.Input[int]] = None,
1286
1273
  schema: Optional[pulumi.Input[str]] = None,
1287
1274
  seal_wrap: Optional[pulumi.Input[bool]] = None,
1275
+ skip_static_role_import_rotation: Optional[pulumi.Input[bool]] = None,
1288
1276
  starttls: Optional[pulumi.Input[bool]] = None,
1289
1277
  upndomain: Optional[pulumi.Input[str]] = None,
1290
1278
  url: Optional[pulumi.Input[str]] = None,
@@ -1315,14 +1303,12 @@ class SecretBackend(pulumi.CustomResource):
1315
1303
  :param pulumi.Input[bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1316
1304
  :param pulumi.Input[bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
1317
1305
  Defaults to `false`.
1318
- :param pulumi.Input[int] length: **Deprecated** use `password_policy`. The desired length of passwords that Vault generates.
1319
- *Mutually exclusive with `password_policy` on vault-1.11+*
1320
1306
  :param pulumi.Input[bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
1321
1307
  replication.Tolerance duration to use when checking the last rotation time.
1322
1308
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
1323
1309
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
1324
1310
  The value should not contain leading or trailing forward slashes.
1325
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1311
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1326
1312
  *Available only for Vault Enterprise*.
1327
1313
  :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
1328
1314
  :param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
@@ -1332,6 +1318,8 @@ class SecretBackend(pulumi.CustomResource):
1332
1318
  before returning back an error.
1333
1319
  :param pulumi.Input[str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
1334
1320
  :param pulumi.Input[bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1321
+ :param pulumi.Input[bool] skip_static_role_import_rotation: If set to true, static roles will not be rotated during import.
1322
+ Defaults to false. Requires Vault 1.16 or above.
1335
1323
  :param pulumi.Input[bool] starttls: Issue a StartTLS command after establishing unencrypted connection.
1336
1324
  :param pulumi.Input[str] upndomain: Enables userPrincipalDomain login with [username]@UPNDomain.
1337
1325
  :param pulumi.Input[str] url: LDAP URL to connect to. Multiple URLs can be specified by concatenating
@@ -1358,7 +1346,6 @@ class SecretBackend(pulumi.CustomResource):
1358
1346
  __props__.__dict__["disable_remount"] = disable_remount
1359
1347
  __props__.__dict__["external_entropy_access"] = external_entropy_access
1360
1348
  __props__.__dict__["insecure_tls"] = insecure_tls
1361
- __props__.__dict__["length"] = length
1362
1349
  __props__.__dict__["local"] = local
1363
1350
  __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
1364
1351
  __props__.__dict__["namespace"] = namespace
@@ -1368,6 +1355,7 @@ class SecretBackend(pulumi.CustomResource):
1368
1355
  __props__.__dict__["request_timeout"] = request_timeout
1369
1356
  __props__.__dict__["schema"] = schema
1370
1357
  __props__.__dict__["seal_wrap"] = seal_wrap
1358
+ __props__.__dict__["skip_static_role_import_rotation"] = skip_static_role_import_rotation
1371
1359
  __props__.__dict__["starttls"] = starttls
1372
1360
  __props__.__dict__["upndomain"] = upndomain
1373
1361
  __props__.__dict__["url"] = url
@@ -1498,18 +1486,6 @@ class SecretBackend(pulumi.CustomResource):
1498
1486
  """
1499
1487
  return pulumi.get(self, "insecure_tls")
1500
1488
 
1501
- @property
1502
- @pulumi.getter
1503
- def length(self) -> pulumi.Output[int]:
1504
- """
1505
- **Deprecated** use `password_policy`. The desired length of passwords that Vault generates.
1506
- *Mutually exclusive with `password_policy` on vault-1.11+*
1507
- """
1508
- warnings.warn("""Length is deprecated and password_policy should be used with Vault >= 1.5.""", DeprecationWarning)
1509
- pulumi.log.warn("""length is deprecated: Length is deprecated and password_policy should be used with Vault >= 1.5.""")
1510
-
1511
- return pulumi.get(self, "length")
1512
-
1513
1489
  @property
1514
1490
  @pulumi.getter
1515
1491
  def local(self) -> pulumi.Output[Optional[bool]]:
@@ -1533,7 +1509,7 @@ class SecretBackend(pulumi.CustomResource):
1533
1509
  """
1534
1510
  The namespace to provision the resource in.
1535
1511
  The value should not contain leading or trailing forward slashes.
1536
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1512
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1537
1513
  *Available only for Vault Enterprise*.
1538
1514
  """
1539
1515
  return pulumi.get(self, "namespace")
@@ -1588,6 +1564,15 @@ class SecretBackend(pulumi.CustomResource):
1588
1564
  """
1589
1565
  return pulumi.get(self, "seal_wrap")
1590
1566
 
1567
+ @property
1568
+ @pulumi.getter(name="skipStaticRoleImportRotation")
1569
+ def skip_static_role_import_rotation(self) -> pulumi.Output[Optional[bool]]:
1570
+ """
1571
+ If set to true, static roles will not be rotated during import.
1572
+ Defaults to false. Requires Vault 1.16 or above.
1573
+ """
1574
+ return pulumi.get(self, "skip_static_role_import_rotation")
1575
+
1591
1576
  @property
1592
1577
  @pulumi.getter
1593
1578
  def starttls(self) -> pulumi.Output[bool]:
@@ -46,7 +46,7 @@ class SecretBackendDynamicRoleArgs:
46
46
  not begin or end with a `/`. Defaults to `ldap`.
47
47
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
48
48
  The value should not contain leading or trailing forward slashes.
49
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
49
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
50
50
  *Available only for Vault Enterprise*.
51
51
  :param pulumi.Input[str] rollback_ldif: A templatized LDIF string used to attempt to
52
52
  rollback any changes in the event that execution of the `creation_ldif` results
@@ -165,7 +165,7 @@ class SecretBackendDynamicRoleArgs:
165
165
  """
166
166
  The namespace to provision the resource in.
167
167
  The value should not contain leading or trailing forward slashes.
168
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
168
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
169
169
  *Available only for Vault Enterprise*.
170
170
  """
171
171
  return pulumi.get(self, "namespace")
@@ -240,7 +240,7 @@ class _SecretBackendDynamicRoleState:
240
240
  not begin or end with a `/`. Defaults to `ldap`.
241
241
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
242
242
  The value should not contain leading or trailing forward slashes.
243
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
243
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
244
244
  *Available only for Vault Enterprise*.
245
245
  :param pulumi.Input[str] role_name: Name of the role.
246
246
  :param pulumi.Input[str] rollback_ldif: A templatized LDIF string used to attempt to
@@ -351,7 +351,7 @@ class _SecretBackendDynamicRoleState:
351
351
  """
352
352
  The namespace to provision the resource in.
353
353
  The value should not contain leading or trailing forward slashes.
354
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
354
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
355
355
  *Available only for Vault Enterprise*.
356
356
  """
357
357
  return pulumi.get(self, "namespace")
@@ -484,7 +484,7 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
484
484
  not begin or end with a `/`. Defaults to `ldap`.
485
485
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
486
486
  The value should not contain leading or trailing forward slashes.
487
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
487
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
488
488
  *Available only for Vault Enterprise*.
489
489
  :param pulumi.Input[str] role_name: Name of the role.
490
490
  :param pulumi.Input[str] rollback_ldif: A templatized LDIF string used to attempt to
@@ -640,7 +640,7 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
640
640
  not begin or end with a `/`. Defaults to `ldap`.
641
641
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
642
642
  The value should not contain leading or trailing forward slashes.
643
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
643
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
644
644
  *Available only for Vault Enterprise*.
645
645
  :param pulumi.Input[str] role_name: Name of the role.
646
646
  :param pulumi.Input[str] rollback_ldif: A templatized LDIF string used to attempt to
@@ -727,7 +727,7 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
727
727
  """
728
728
  The namespace to provision the resource in.
729
729
  The value should not contain leading or trailing forward slashes.
730
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
730
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
731
731
  *Available only for Vault Enterprise*.
732
732
  """
733
733
  return pulumi.get(self, "namespace")
@@ -34,7 +34,7 @@ class SecretBackendLibrarySetArgs:
34
34
  Must be unique within the backend.
35
35
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
36
36
  The value should not contain leading or trailing forward slashes.
37
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
37
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
38
38
  *Available only for Vault Enterprise*.
39
39
  :param pulumi.Input[int] ttl: The password time-to-live in seconds. Defaults to the configuration
40
40
  ttl if not provided.
@@ -123,7 +123,7 @@ class SecretBackendLibrarySetArgs:
123
123
  """
124
124
  The namespace to provision the resource in.
125
125
  The value should not contain leading or trailing forward slashes.
126
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
126
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
127
127
  *Available only for Vault Enterprise*.
128
128
  """
129
129
  return pulumi.get(self, "namespace")
@@ -168,7 +168,7 @@ class _SecretBackendLibrarySetState:
168
168
  Must be unique within the backend.
169
169
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
170
170
  The value should not contain leading or trailing forward slashes.
171
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
171
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
172
172
  *Available only for Vault Enterprise*.
173
173
  :param pulumi.Input[Sequence[pulumi.Input[str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
174
174
  :param pulumi.Input[int] ttl: The password time-to-live in seconds. Defaults to the configuration
@@ -247,7 +247,7 @@ class _SecretBackendLibrarySetState:
247
247
  """
248
248
  The namespace to provision the resource in.
249
249
  The value should not contain leading or trailing forward slashes.
250
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
250
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
251
251
  *Available only for Vault Enterprise*.
252
252
  """
253
253
  return pulumi.get(self, "namespace")
@@ -342,7 +342,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
342
342
  Must be unique within the backend.
343
343
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
344
344
  The value should not contain leading or trailing forward slashes.
345
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
345
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
346
346
  *Available only for Vault Enterprise*.
347
347
  :param pulumi.Input[Sequence[pulumi.Input[str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
348
348
  :param pulumi.Input[int] ttl: The password time-to-live in seconds. Defaults to the configuration
@@ -463,7 +463,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
463
463
  Must be unique within the backend.
464
464
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
465
465
  The value should not contain leading or trailing forward slashes.
466
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
466
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
467
467
  *Available only for Vault Enterprise*.
468
468
  :param pulumi.Input[Sequence[pulumi.Input[str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
469
469
  :param pulumi.Input[int] ttl: The password time-to-live in seconds. Defaults to the configuration
@@ -524,7 +524,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
524
524
  """
525
525
  The namespace to provision the resource in.
526
526
  The value should not contain leading or trailing forward slashes.
527
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
527
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
528
528
  *Available only for Vault Enterprise*.
529
529
  """
530
530
  return pulumi.get(self, "namespace")