pulumi-vault 5.21.0a1711033014__py3-none-any.whl → 6.0.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (163) hide show
  1. pulumi_vault/__init__.py +24 -0
  2. pulumi_vault/ad/get_access_credentials.py +2 -2
  3. pulumi_vault/ad/secret_backend.py +7 -138
  4. pulumi_vault/ad/secret_library.py +7 -7
  5. pulumi_vault/ad/secret_role.py +7 -7
  6. pulumi_vault/approle/auth_backend_login.py +7 -7
  7. pulumi_vault/approle/auth_backend_role.py +7 -7
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +7 -7
  9. pulumi_vault/audit.py +7 -7
  10. pulumi_vault/auth_backend.py +7 -7
  11. pulumi_vault/aws/auth_backend_cert.py +7 -7
  12. pulumi_vault/aws/auth_backend_client.py +7 -7
  13. pulumi_vault/aws/auth_backend_config_identity.py +7 -7
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +7 -7
  15. pulumi_vault/aws/auth_backend_login.py +7 -7
  16. pulumi_vault/aws/auth_backend_role.py +7 -7
  17. pulumi_vault/aws/auth_backend_role_tag.py +7 -7
  18. pulumi_vault/aws/auth_backend_roletag_blacklist.py +7 -7
  19. pulumi_vault/aws/auth_backend_sts_role.py +7 -7
  20. pulumi_vault/aws/get_access_credentials.py +2 -2
  21. pulumi_vault/aws/secret_backend.py +7 -7
  22. pulumi_vault/aws/secret_backend_role.py +7 -7
  23. pulumi_vault/aws/secret_backend_static_role.py +7 -7
  24. pulumi_vault/azure/auth_backend_config.py +7 -7
  25. pulumi_vault/azure/auth_backend_role.py +7 -7
  26. pulumi_vault/azure/backend.py +7 -7
  27. pulumi_vault/azure/backend_role.py +7 -7
  28. pulumi_vault/azure/get_access_credentials.py +2 -2
  29. pulumi_vault/cert_auth_backend_role.py +7 -63
  30. pulumi_vault/config/_inputs.py +52 -0
  31. pulumi_vault/config/outputs.py +30 -0
  32. pulumi_vault/config/ui_custom_message.py +524 -0
  33. pulumi_vault/consul/secret_backend.py +7 -7
  34. pulumi_vault/consul/secret_backend_role.py +7 -76
  35. pulumi_vault/egp_policy.py +7 -7
  36. pulumi_vault/gcp/auth_backend.py +7 -7
  37. pulumi_vault/gcp/auth_backend_role.py +7 -7
  38. pulumi_vault/gcp/secret_backend.py +7 -7
  39. pulumi_vault/gcp/secret_roleset.py +7 -7
  40. pulumi_vault/gcp/secret_static_account.py +7 -7
  41. pulumi_vault/generic/endpoint.py +7 -7
  42. pulumi_vault/generic/get_secret.py +2 -2
  43. pulumi_vault/generic/secret.py +7 -7
  44. pulumi_vault/get_auth_backend.py +2 -2
  45. pulumi_vault/get_auth_backends.py +20 -2
  46. pulumi_vault/get_nomad_access_token.py +2 -2
  47. pulumi_vault/get_raft_autopilot_state.py +2 -2
  48. pulumi_vault/github/auth_backend.py +7 -7
  49. pulumi_vault/github/team.py +7 -7
  50. pulumi_vault/github/user.py +7 -7
  51. pulumi_vault/identity/entity.py +7 -7
  52. pulumi_vault/identity/entity_alias.py +7 -7
  53. pulumi_vault/identity/entity_policies.py +7 -7
  54. pulumi_vault/identity/get_entity.py +2 -2
  55. pulumi_vault/identity/get_group.py +2 -2
  56. pulumi_vault/identity/get_oidc_client_creds.py +2 -2
  57. pulumi_vault/identity/get_oidc_openid_config.py +2 -2
  58. pulumi_vault/identity/get_oidc_public_keys.py +2 -2
  59. pulumi_vault/identity/group.py +7 -7
  60. pulumi_vault/identity/group_alias.py +7 -7
  61. pulumi_vault/identity/group_member_entity_ids.py +7 -58
  62. pulumi_vault/identity/group_member_group_ids.py +7 -7
  63. pulumi_vault/identity/group_policies.py +7 -7
  64. pulumi_vault/identity/oidc.py +7 -7
  65. pulumi_vault/identity/oidc_assignment.py +7 -7
  66. pulumi_vault/identity/oidc_client.py +19 -15
  67. pulumi_vault/identity/oidc_key.py +7 -7
  68. pulumi_vault/identity/oidc_key_allowed_client_id.py +7 -7
  69. pulumi_vault/identity/oidc_provider.py +7 -7
  70. pulumi_vault/identity/oidc_role.py +7 -7
  71. pulumi_vault/identity/oidc_scope.py +7 -7
  72. pulumi_vault/jwt/auth_backend.py +7 -7
  73. pulumi_vault/jwt/auth_backend_role.py +7 -7
  74. pulumi_vault/kmip/secret_backend.py +7 -7
  75. pulumi_vault/kmip/secret_role.py +7 -7
  76. pulumi_vault/kmip/secret_scope.py +7 -7
  77. pulumi_vault/kubernetes/auth_backend_role.py +7 -7
  78. pulumi_vault/kubernetes/get_service_account_token.py +2 -2
  79. pulumi_vault/kubernetes/secret_backend.py +7 -7
  80. pulumi_vault/kubernetes/secret_backend_role.py +7 -7
  81. pulumi_vault/kv/get_secret.py +2 -2
  82. pulumi_vault/kv/get_secret_subkeys_v2.py +2 -2
  83. pulumi_vault/kv/get_secret_v2.py +5 -2
  84. pulumi_vault/kv/get_secrets_list.py +2 -2
  85. pulumi_vault/kv/get_secrets_list_v2.py +2 -2
  86. pulumi_vault/kv/secret.py +7 -7
  87. pulumi_vault/kv/secret_backend_v2.py +7 -7
  88. pulumi_vault/kv/secret_v2.py +7 -7
  89. pulumi_vault/ldap/auth_backend.py +7 -7
  90. pulumi_vault/ldap/auth_backend_group.py +7 -7
  91. pulumi_vault/ldap/auth_backend_user.py +7 -7
  92. pulumi_vault/ldap/secret_backend.py +61 -76
  93. pulumi_vault/ldap/secret_backend_dynamic_role.py +7 -7
  94. pulumi_vault/ldap/secret_backend_library_set.py +7 -7
  95. pulumi_vault/ldap/secret_backend_static_role.py +62 -8
  96. pulumi_vault/mfa_duo.py +7 -7
  97. pulumi_vault/mfa_okta.py +7 -7
  98. pulumi_vault/mfa_pingid.py +7 -7
  99. pulumi_vault/mfa_totp.py +7 -7
  100. pulumi_vault/mongodbatlas/secret_backend.py +7 -7
  101. pulumi_vault/mongodbatlas/secret_role.py +7 -7
  102. pulumi_vault/mount.py +11 -7
  103. pulumi_vault/namespace.py +7 -7
  104. pulumi_vault/nomad_secret_backend.py +7 -7
  105. pulumi_vault/nomad_secret_role.py +7 -7
  106. pulumi_vault/okta/auth_backend.py +7 -7
  107. pulumi_vault/okta/auth_backend_group.py +7 -7
  108. pulumi_vault/okta/auth_backend_user.py +7 -7
  109. pulumi_vault/password_policy.py +7 -7
  110. pulumi_vault/pkisecret/__init__.py +1 -0
  111. pulumi_vault/pkisecret/backend_config_cluster.py +368 -0
  112. pulumi_vault/pkisecret/get_backend_issuer.py +2 -2
  113. pulumi_vault/pkisecret/get_backend_issuers.py +2 -2
  114. pulumi_vault/pkisecret/get_backend_key.py +2 -2
  115. pulumi_vault/pkisecret/get_backend_keys.py +2 -2
  116. pulumi_vault/pkisecret/secret_backend_cert.py +7 -7
  117. pulumi_vault/pkisecret/secret_backend_config_ca.py +7 -7
  118. pulumi_vault/pkisecret/secret_backend_config_issuers.py +7 -7
  119. pulumi_vault/pkisecret/secret_backend_config_urls.py +54 -7
  120. pulumi_vault/pkisecret/secret_backend_crl_config.py +7 -7
  121. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +7 -7
  122. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +7 -7
  123. pulumi_vault/pkisecret/secret_backend_issuer.py +7 -7
  124. pulumi_vault/pkisecret/secret_backend_key.py +7 -7
  125. pulumi_vault/pkisecret/secret_backend_role.py +7 -7
  126. pulumi_vault/pkisecret/secret_backend_root_cert.py +7 -44
  127. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +7 -52
  128. pulumi_vault/pkisecret/secret_backend_sign.py +7 -52
  129. pulumi_vault/policy.py +7 -7
  130. pulumi_vault/rabbitmq/secret_backend.py +7 -7
  131. pulumi_vault/rabbitmq/secret_backend_role.py +7 -7
  132. pulumi_vault/raft_autopilot.py +7 -7
  133. pulumi_vault/raft_snapshot_agent_config.py +7 -7
  134. pulumi_vault/rgp_policy.py +7 -7
  135. pulumi_vault/saml/auth_backend.py +7 -7
  136. pulumi_vault/saml/auth_backend_role.py +7 -7
  137. pulumi_vault/secrets/__init__.py +1 -0
  138. pulumi_vault/secrets/sync_association.py +7 -7
  139. pulumi_vault/secrets/sync_aws_destination.py +161 -7
  140. pulumi_vault/secrets/sync_azure_destination.py +7 -7
  141. pulumi_vault/secrets/sync_gcp_destination.py +77 -7
  142. pulumi_vault/secrets/sync_gh_destination.py +122 -7
  143. pulumi_vault/secrets/sync_github_apps.py +370 -0
  144. pulumi_vault/secrets/sync_vercel_destination.py +7 -7
  145. pulumi_vault/ssh/secret_backend_ca.py +7 -7
  146. pulumi_vault/ssh/secret_backend_role.py +7 -83
  147. pulumi_vault/terraformcloud/secret_creds.py +7 -7
  148. pulumi_vault/terraformcloud/secret_role.py +7 -7
  149. pulumi_vault/token.py +7 -7
  150. pulumi_vault/tokenauth/auth_backend_role.py +7 -7
  151. pulumi_vault/transform/alphabet.py +7 -7
  152. pulumi_vault/transform/get_decode.py +2 -2
  153. pulumi_vault/transform/get_encode.py +2 -2
  154. pulumi_vault/transform/role.py +7 -7
  155. pulumi_vault/transform/template.py +7 -7
  156. pulumi_vault/transform/transformation.py +7 -7
  157. pulumi_vault/transit/secret_backend_key.py +7 -84
  158. pulumi_vault/transit/secret_cache_config.py +7 -7
  159. {pulumi_vault-5.21.0a1711033014.dist-info → pulumi_vault-6.0.0.dist-info}/METADATA +2 -2
  160. pulumi_vault-6.0.0.dist-info/RECORD +248 -0
  161. pulumi_vault-5.21.0a1711033014.dist-info/RECORD +0 -244
  162. {pulumi_vault-5.21.0a1711033014.dist-info → pulumi_vault-6.0.0.dist-info}/WHEEL +0 -0
  163. {pulumi_vault-5.21.0a1711033014.dist-info → pulumi_vault-6.0.0.dist-info}/top_level.txt +0 -0
@@ -29,7 +29,6 @@ class SecretBackendRoleArgs:
29
29
  allowed_domains_template: Optional[pulumi.Input[bool]] = None,
30
30
  allowed_extensions: Optional[pulumi.Input[str]] = None,
31
31
  allowed_user_key_configs: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleAllowedUserKeyConfigArgs']]]] = None,
32
- allowed_user_key_lengths: Optional[pulumi.Input[Mapping[str, pulumi.Input[int]]]] = None,
33
32
  allowed_users: Optional[pulumi.Input[str]] = None,
34
33
  allowed_users_template: Optional[pulumi.Input[bool]] = None,
35
34
  cidr_list: Optional[pulumi.Input[str]] = None,
@@ -61,9 +60,6 @@ class SecretBackendRoleArgs:
61
60
  :param pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleAllowedUserKeyConfigArgs']]] allowed_user_key_configs: Set of configuration blocks to define allowed
62
61
  user key configuration, like key type and their lengths. Can be specified multiple times.
63
62
  *See Configuration-Options for more info*
64
- :param pulumi.Input[Mapping[str, pulumi.Input[int]]] allowed_user_key_lengths: Specifies a map of ssh key types and their expected sizes which
65
- are allowed to be signed by the CA type.
66
- *Deprecated: use* allowed_user_key_config *instead*
67
63
  :param pulumi.Input[str] allowed_users: Specifies a comma-separated list of usernames that are to be allowed, only if certain usernames are to be allowed.
68
64
  :param pulumi.Input[bool] allowed_users_template: Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
69
65
  :param pulumi.Input[str] cidr_list: The comma-separated string of CIDR blocks for which this role is applicable.
@@ -76,7 +72,7 @@ class SecretBackendRoleArgs:
76
72
  :param pulumi.Input[str] name: Specifies the name of the role to create.
77
73
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
78
74
  The value should not contain leading or trailing forward slashes.
79
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
75
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
80
76
  *Available only for Vault Enterprise*.
81
77
  :param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the ValidAfter property. Uses duration format strings.
82
78
  :param pulumi.Input[str] ttl: Specifies the Time To Live value.
@@ -105,11 +101,6 @@ class SecretBackendRoleArgs:
105
101
  pulumi.set(__self__, "allowed_extensions", allowed_extensions)
106
102
  if allowed_user_key_configs is not None:
107
103
  pulumi.set(__self__, "allowed_user_key_configs", allowed_user_key_configs)
108
- if allowed_user_key_lengths is not None:
109
- warnings.warn("""Set in allowed_user_key_config""", DeprecationWarning)
110
- pulumi.log.warn("""allowed_user_key_lengths is deprecated: Set in allowed_user_key_config""")
111
- if allowed_user_key_lengths is not None:
112
- pulumi.set(__self__, "allowed_user_key_lengths", allowed_user_key_lengths)
113
104
  if allowed_users is not None:
114
105
  pulumi.set(__self__, "allowed_users", allowed_users)
115
106
  if allowed_users_template is not None:
@@ -296,23 +287,6 @@ class SecretBackendRoleArgs:
296
287
  def allowed_user_key_configs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleAllowedUserKeyConfigArgs']]]]):
297
288
  pulumi.set(self, "allowed_user_key_configs", value)
298
289
 
299
- @property
300
- @pulumi.getter(name="allowedUserKeyLengths")
301
- def allowed_user_key_lengths(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[int]]]]:
302
- """
303
- Specifies a map of ssh key types and their expected sizes which
304
- are allowed to be signed by the CA type.
305
- *Deprecated: use* allowed_user_key_config *instead*
306
- """
307
- warnings.warn("""Set in allowed_user_key_config""", DeprecationWarning)
308
- pulumi.log.warn("""allowed_user_key_lengths is deprecated: Set in allowed_user_key_config""")
309
-
310
- return pulumi.get(self, "allowed_user_key_lengths")
311
-
312
- @allowed_user_key_lengths.setter
313
- def allowed_user_key_lengths(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[int]]]]):
314
- pulumi.set(self, "allowed_user_key_lengths", value)
315
-
316
290
  @property
317
291
  @pulumi.getter(name="allowedUsers")
318
292
  def allowed_users(self) -> Optional[pulumi.Input[str]]:
@@ -439,7 +413,7 @@ class SecretBackendRoleArgs:
439
413
  """
440
414
  The namespace to provision the resource in.
441
415
  The value should not contain leading or trailing forward slashes.
442
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
416
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
443
417
  *Available only for Vault Enterprise*.
444
418
  """
445
419
  return pulumi.get(self, "namespace")
@@ -487,7 +461,6 @@ class _SecretBackendRoleState:
487
461
  allowed_domains_template: Optional[pulumi.Input[bool]] = None,
488
462
  allowed_extensions: Optional[pulumi.Input[str]] = None,
489
463
  allowed_user_key_configs: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleAllowedUserKeyConfigArgs']]]] = None,
490
- allowed_user_key_lengths: Optional[pulumi.Input[Mapping[str, pulumi.Input[int]]]] = None,
491
464
  allowed_users: Optional[pulumi.Input[str]] = None,
492
465
  allowed_users_template: Optional[pulumi.Input[bool]] = None,
493
466
  backend: Optional[pulumi.Input[str]] = None,
@@ -519,9 +492,6 @@ class _SecretBackendRoleState:
519
492
  :param pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleAllowedUserKeyConfigArgs']]] allowed_user_key_configs: Set of configuration blocks to define allowed
520
493
  user key configuration, like key type and their lengths. Can be specified multiple times.
521
494
  *See Configuration-Options for more info*
522
- :param pulumi.Input[Mapping[str, pulumi.Input[int]]] allowed_user_key_lengths: Specifies a map of ssh key types and their expected sizes which
523
- are allowed to be signed by the CA type.
524
- *Deprecated: use* allowed_user_key_config *instead*
525
495
  :param pulumi.Input[str] allowed_users: Specifies a comma-separated list of usernames that are to be allowed, only if certain usernames are to be allowed.
526
496
  :param pulumi.Input[bool] allowed_users_template: Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
527
497
  :param pulumi.Input[str] backend: The path where the SSH secret backend is mounted.
@@ -536,7 +506,7 @@ class _SecretBackendRoleState:
536
506
  :param pulumi.Input[str] name: Specifies the name of the role to create.
537
507
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
538
508
  The value should not contain leading or trailing forward slashes.
539
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
509
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
540
510
  *Available only for Vault Enterprise*.
541
511
  :param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the ValidAfter property. Uses duration format strings.
542
512
  :param pulumi.Input[str] ttl: Specifies the Time To Live value.
@@ -563,11 +533,6 @@ class _SecretBackendRoleState:
563
533
  pulumi.set(__self__, "allowed_extensions", allowed_extensions)
564
534
  if allowed_user_key_configs is not None:
565
535
  pulumi.set(__self__, "allowed_user_key_configs", allowed_user_key_configs)
566
- if allowed_user_key_lengths is not None:
567
- warnings.warn("""Set in allowed_user_key_config""", DeprecationWarning)
568
- pulumi.log.warn("""allowed_user_key_lengths is deprecated: Set in allowed_user_key_config""")
569
- if allowed_user_key_lengths is not None:
570
- pulumi.set(__self__, "allowed_user_key_lengths", allowed_user_key_lengths)
571
536
  if allowed_users is not None:
572
537
  pulumi.set(__self__, "allowed_users", allowed_users)
573
538
  if allowed_users_template is not None:
@@ -734,23 +699,6 @@ class _SecretBackendRoleState:
734
699
  def allowed_user_key_configs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleAllowedUserKeyConfigArgs']]]]):
735
700
  pulumi.set(self, "allowed_user_key_configs", value)
736
701
 
737
- @property
738
- @pulumi.getter(name="allowedUserKeyLengths")
739
- def allowed_user_key_lengths(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[int]]]]:
740
- """
741
- Specifies a map of ssh key types and their expected sizes which
742
- are allowed to be signed by the CA type.
743
- *Deprecated: use* allowed_user_key_config *instead*
744
- """
745
- warnings.warn("""Set in allowed_user_key_config""", DeprecationWarning)
746
- pulumi.log.warn("""allowed_user_key_lengths is deprecated: Set in allowed_user_key_config""")
747
-
748
- return pulumi.get(self, "allowed_user_key_lengths")
749
-
750
- @allowed_user_key_lengths.setter
751
- def allowed_user_key_lengths(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[int]]]]):
752
- pulumi.set(self, "allowed_user_key_lengths", value)
753
-
754
702
  @property
755
703
  @pulumi.getter(name="allowedUsers")
756
704
  def allowed_users(self) -> Optional[pulumi.Input[str]]:
@@ -901,7 +849,7 @@ class _SecretBackendRoleState:
901
849
  """
902
850
  The namespace to provision the resource in.
903
851
  The value should not contain leading or trailing forward slashes.
904
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
852
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
905
853
  *Available only for Vault Enterprise*.
906
854
  """
907
855
  return pulumi.get(self, "namespace")
@@ -951,7 +899,6 @@ class SecretBackendRole(pulumi.CustomResource):
951
899
  allowed_domains_template: Optional[pulumi.Input[bool]] = None,
952
900
  allowed_extensions: Optional[pulumi.Input[str]] = None,
953
901
  allowed_user_key_configs: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRoleAllowedUserKeyConfigArgs']]]]] = None,
954
- allowed_user_key_lengths: Optional[pulumi.Input[Mapping[str, pulumi.Input[int]]]] = None,
955
902
  allowed_users: Optional[pulumi.Input[str]] = None,
956
903
  allowed_users_template: Optional[pulumi.Input[bool]] = None,
957
904
  backend: Optional[pulumi.Input[str]] = None,
@@ -1017,9 +964,6 @@ class SecretBackendRole(pulumi.CustomResource):
1017
964
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRoleAllowedUserKeyConfigArgs']]]] allowed_user_key_configs: Set of configuration blocks to define allowed
1018
965
  user key configuration, like key type and their lengths. Can be specified multiple times.
1019
966
  *See Configuration-Options for more info*
1020
- :param pulumi.Input[Mapping[str, pulumi.Input[int]]] allowed_user_key_lengths: Specifies a map of ssh key types and their expected sizes which
1021
- are allowed to be signed by the CA type.
1022
- *Deprecated: use* allowed_user_key_config *instead*
1023
967
  :param pulumi.Input[str] allowed_users: Specifies a comma-separated list of usernames that are to be allowed, only if certain usernames are to be allowed.
1024
968
  :param pulumi.Input[bool] allowed_users_template: Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
1025
969
  :param pulumi.Input[str] backend: The path where the SSH secret backend is mounted.
@@ -1034,7 +978,7 @@ class SecretBackendRole(pulumi.CustomResource):
1034
978
  :param pulumi.Input[str] name: Specifies the name of the role to create.
1035
979
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
1036
980
  The value should not contain leading or trailing forward slashes.
1037
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
981
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1038
982
  *Available only for Vault Enterprise*.
1039
983
  :param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the ValidAfter property. Uses duration format strings.
1040
984
  :param pulumi.Input[str] ttl: Specifies the Time To Live value.
@@ -1104,7 +1048,6 @@ class SecretBackendRole(pulumi.CustomResource):
1104
1048
  allowed_domains_template: Optional[pulumi.Input[bool]] = None,
1105
1049
  allowed_extensions: Optional[pulumi.Input[str]] = None,
1106
1050
  allowed_user_key_configs: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRoleAllowedUserKeyConfigArgs']]]]] = None,
1107
- allowed_user_key_lengths: Optional[pulumi.Input[Mapping[str, pulumi.Input[int]]]] = None,
1108
1051
  allowed_users: Optional[pulumi.Input[str]] = None,
1109
1052
  allowed_users_template: Optional[pulumi.Input[bool]] = None,
1110
1053
  backend: Optional[pulumi.Input[str]] = None,
@@ -1140,7 +1083,6 @@ class SecretBackendRole(pulumi.CustomResource):
1140
1083
  __props__.__dict__["allowed_domains_template"] = allowed_domains_template
1141
1084
  __props__.__dict__["allowed_extensions"] = allowed_extensions
1142
1085
  __props__.__dict__["allowed_user_key_configs"] = allowed_user_key_configs
1143
- __props__.__dict__["allowed_user_key_lengths"] = allowed_user_key_lengths
1144
1086
  __props__.__dict__["allowed_users"] = allowed_users
1145
1087
  __props__.__dict__["allowed_users_template"] = allowed_users_template
1146
1088
  if backend is None and not opts.urn:
@@ -1181,7 +1123,6 @@ class SecretBackendRole(pulumi.CustomResource):
1181
1123
  allowed_domains_template: Optional[pulumi.Input[bool]] = None,
1182
1124
  allowed_extensions: Optional[pulumi.Input[str]] = None,
1183
1125
  allowed_user_key_configs: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRoleAllowedUserKeyConfigArgs']]]]] = None,
1184
- allowed_user_key_lengths: Optional[pulumi.Input[Mapping[str, pulumi.Input[int]]]] = None,
1185
1126
  allowed_users: Optional[pulumi.Input[str]] = None,
1186
1127
  allowed_users_template: Optional[pulumi.Input[bool]] = None,
1187
1128
  backend: Optional[pulumi.Input[str]] = None,
@@ -1218,9 +1159,6 @@ class SecretBackendRole(pulumi.CustomResource):
1218
1159
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRoleAllowedUserKeyConfigArgs']]]] allowed_user_key_configs: Set of configuration blocks to define allowed
1219
1160
  user key configuration, like key type and their lengths. Can be specified multiple times.
1220
1161
  *See Configuration-Options for more info*
1221
- :param pulumi.Input[Mapping[str, pulumi.Input[int]]] allowed_user_key_lengths: Specifies a map of ssh key types and their expected sizes which
1222
- are allowed to be signed by the CA type.
1223
- *Deprecated: use* allowed_user_key_config *instead*
1224
1162
  :param pulumi.Input[str] allowed_users: Specifies a comma-separated list of usernames that are to be allowed, only if certain usernames are to be allowed.
1225
1163
  :param pulumi.Input[bool] allowed_users_template: Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
1226
1164
  :param pulumi.Input[str] backend: The path where the SSH secret backend is mounted.
@@ -1235,7 +1173,7 @@ class SecretBackendRole(pulumi.CustomResource):
1235
1173
  :param pulumi.Input[str] name: Specifies the name of the role to create.
1236
1174
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
1237
1175
  The value should not contain leading or trailing forward slashes.
1238
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1176
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1239
1177
  *Available only for Vault Enterprise*.
1240
1178
  :param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the ValidAfter property. Uses duration format strings.
1241
1179
  :param pulumi.Input[str] ttl: Specifies the Time To Live value.
@@ -1255,7 +1193,6 @@ class SecretBackendRole(pulumi.CustomResource):
1255
1193
  __props__.__dict__["allowed_domains_template"] = allowed_domains_template
1256
1194
  __props__.__dict__["allowed_extensions"] = allowed_extensions
1257
1195
  __props__.__dict__["allowed_user_key_configs"] = allowed_user_key_configs
1258
- __props__.__dict__["allowed_user_key_lengths"] = allowed_user_key_lengths
1259
1196
  __props__.__dict__["allowed_users"] = allowed_users
1260
1197
  __props__.__dict__["allowed_users_template"] = allowed_users_template
1261
1198
  __props__.__dict__["backend"] = backend
@@ -1364,19 +1301,6 @@ class SecretBackendRole(pulumi.CustomResource):
1364
1301
  """
1365
1302
  return pulumi.get(self, "allowed_user_key_configs")
1366
1303
 
1367
- @property
1368
- @pulumi.getter(name="allowedUserKeyLengths")
1369
- def allowed_user_key_lengths(self) -> pulumi.Output[Optional[Mapping[str, int]]]:
1370
- """
1371
- Specifies a map of ssh key types and their expected sizes which
1372
- are allowed to be signed by the CA type.
1373
- *Deprecated: use* allowed_user_key_config *instead*
1374
- """
1375
- warnings.warn("""Set in allowed_user_key_config""", DeprecationWarning)
1376
- pulumi.log.warn("""allowed_user_key_lengths is deprecated: Set in allowed_user_key_config""")
1377
-
1378
- return pulumi.get(self, "allowed_user_key_lengths")
1379
-
1380
1304
  @property
1381
1305
  @pulumi.getter(name="allowedUsers")
1382
1306
  def allowed_users(self) -> pulumi.Output[Optional[str]]:
@@ -1479,7 +1403,7 @@ class SecretBackendRole(pulumi.CustomResource):
1479
1403
  """
1480
1404
  The namespace to provision the resource in.
1481
1405
  The value should not contain leading or trailing forward slashes.
1482
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1406
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1483
1407
  *Available only for Vault Enterprise*.
1484
1408
  """
1485
1409
  return pulumi.get(self, "namespace")
@@ -23,7 +23,7 @@ class SecretCredsArgs:
23
23
  :param pulumi.Input[str] role: Name of the role.
24
24
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
25
25
  The value should not contain leading or trailing forward slashes.
26
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
26
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
27
27
  *Available only for Vault Enterprise*.
28
28
  """
29
29
  pulumi.set(__self__, "backend", backend)
@@ -61,7 +61,7 @@ class SecretCredsArgs:
61
61
  """
62
62
  The namespace to provision the resource in.
63
63
  The value should not contain leading or trailing forward slashes.
64
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
64
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
65
65
  *Available only for Vault Enterprise*.
66
66
  """
67
67
  return pulumi.get(self, "namespace")
@@ -89,7 +89,7 @@ class _SecretCredsState:
89
89
  Vault lease associated with them.
90
90
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
91
91
  The value should not contain leading or trailing forward slashes.
92
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
92
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
93
93
  *Available only for Vault Enterprise*.
94
94
  :param pulumi.Input[str] organization: The organization associated with the token provided.
95
95
  :param pulumi.Input[str] role: Name of the role.
@@ -147,7 +147,7 @@ class _SecretCredsState:
147
147
  """
148
148
  The namespace to provision the resource in.
149
149
  The value should not contain leading or trailing forward slashes.
150
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
150
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
151
151
  *Available only for Vault Enterprise*.
152
152
  """
153
153
  return pulumi.get(self, "namespace")
@@ -255,7 +255,7 @@ class SecretCreds(pulumi.CustomResource):
255
255
  :param pulumi.Input[str] backend: Terraform Cloud secret backend to generate tokens from
256
256
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
257
257
  The value should not contain leading or trailing forward slashes.
258
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
258
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
259
259
  *Available only for Vault Enterprise*.
260
260
  :param pulumi.Input[str] role: Name of the role.
261
261
  """
@@ -358,7 +358,7 @@ class SecretCreds(pulumi.CustomResource):
358
358
  Vault lease associated with them.
359
359
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
360
360
  The value should not contain leading or trailing forward slashes.
361
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
361
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
362
362
  *Available only for Vault Enterprise*.
363
363
  :param pulumi.Input[str] organization: The organization associated with the token provided.
364
364
  :param pulumi.Input[str] role: Name of the role.
@@ -405,7 +405,7 @@ class SecretCreds(pulumi.CustomResource):
405
405
  """
406
406
  The namespace to provision the resource in.
407
407
  The value should not contain leading or trailing forward slashes.
408
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
408
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
409
409
  *Available only for Vault Enterprise*.
410
410
  """
411
411
  return pulumi.get(self, "namespace")
@@ -29,7 +29,7 @@ class SecretRoleArgs:
29
29
  :param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
30
30
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
31
31
  The value should not contain leading or trailing forward slashes.
32
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
32
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
33
33
  *Available only for Vault Enterprise*.
34
34
  :param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
35
35
  :param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
@@ -95,7 +95,7 @@ class SecretRoleArgs:
95
95
  """
96
96
  The namespace to provision the resource in.
97
97
  The value should not contain leading or trailing forward slashes.
98
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
98
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
99
99
  *Available only for Vault Enterprise*.
100
100
  """
101
101
  return pulumi.get(self, "namespace")
@@ -171,7 +171,7 @@ class _SecretRoleState:
171
171
  :param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
172
172
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
173
173
  The value should not contain leading or trailing forward slashes.
174
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
174
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
175
175
  *Available only for Vault Enterprise*.
176
176
  :param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
177
177
  :param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
@@ -237,7 +237,7 @@ class _SecretRoleState:
237
237
  """
238
238
  The namespace to provision the resource in.
239
239
  The value should not contain leading or trailing forward slashes.
240
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
240
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
241
241
  *Available only for Vault Enterprise*.
242
242
  """
243
243
  return pulumi.get(self, "namespace")
@@ -343,7 +343,7 @@ class SecretRole(pulumi.CustomResource):
343
343
  :param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
344
344
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
345
345
  The value should not contain leading or trailing forward slashes.
346
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
346
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
347
347
  *Available only for Vault Enterprise*.
348
348
  :param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
349
349
  :param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
@@ -453,7 +453,7 @@ class SecretRole(pulumi.CustomResource):
453
453
  :param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
454
454
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
455
455
  The value should not contain leading or trailing forward slashes.
456
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
456
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
457
457
  *Available only for Vault Enterprise*.
458
458
  :param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
459
459
  :param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
@@ -504,7 +504,7 @@ class SecretRole(pulumi.CustomResource):
504
504
  """
505
505
  The namespace to provision the resource in.
506
506
  The value should not contain leading or trailing forward slashes.
507
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
507
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
508
508
  *Available only for Vault Enterprise*.
509
509
  """
510
510
  return pulumi.get(self, "namespace")
pulumi_vault/token.py CHANGED
@@ -36,7 +36,7 @@ class TokenArgs:
36
36
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: Metadata to be set on this token
37
37
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
38
38
  The value should not contain leading or trailing forward slashes.
39
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
39
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
40
40
  *Available only for Vault Enterprise*.
41
41
  :param pulumi.Input[bool] no_default_policy: Flag to not attach the default policy to this token
42
42
  :param pulumi.Input[bool] no_parent: Flag to create a token without parent
@@ -123,7 +123,7 @@ class TokenArgs:
123
123
  """
124
124
  The namespace to provision the resource in.
125
125
  The value should not contain leading or trailing forward slashes.
126
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
126
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
127
127
  *Available only for Vault Enterprise*.
128
128
  """
129
129
  return pulumi.get(self, "namespace")
@@ -298,7 +298,7 @@ class _TokenState:
298
298
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: Metadata to be set on this token
299
299
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
300
300
  The value should not contain leading or trailing forward slashes.
301
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
301
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
302
302
  *Available only for Vault Enterprise*.
303
303
  :param pulumi.Input[bool] no_default_policy: Flag to not attach the default policy to this token
304
304
  :param pulumi.Input[bool] no_parent: Flag to create a token without parent
@@ -433,7 +433,7 @@ class _TokenState:
433
433
  """
434
434
  The namespace to provision the resource in.
435
435
  The value should not contain leading or trailing forward slashes.
436
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
436
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
437
437
  *Available only for Vault Enterprise*.
438
438
  """
439
439
  return pulumi.get(self, "namespace")
@@ -659,7 +659,7 @@ class Token(pulumi.CustomResource):
659
659
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: Metadata to be set on this token
660
660
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
661
661
  The value should not contain leading or trailing forward slashes.
662
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
662
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
663
663
  *Available only for Vault Enterprise*.
664
664
  :param pulumi.Input[bool] no_default_policy: Flag to not attach the default policy to this token
665
665
  :param pulumi.Input[bool] no_parent: Flag to create a token without parent
@@ -817,7 +817,7 @@ class Token(pulumi.CustomResource):
817
817
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: Metadata to be set on this token
818
818
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
819
819
  The value should not contain leading or trailing forward slashes.
820
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
820
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
821
821
  *Available only for Vault Enterprise*.
822
822
  :param pulumi.Input[bool] no_default_policy: Flag to not attach the default policy to this token
823
823
  :param pulumi.Input[bool] no_parent: Flag to create a token without parent
@@ -913,7 +913,7 @@ class Token(pulumi.CustomResource):
913
913
  """
914
914
  The namespace to provision the resource in.
915
915
  The value should not contain leading or trailing forward slashes.
916
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
916
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
917
917
  *Available only for Vault Enterprise*.
918
918
  """
919
919
  return pulumi.get(self, "namespace")
@@ -43,7 +43,7 @@ class AuthBackendRoleArgs:
43
43
  :param pulumi.Input[Sequence[pulumi.Input[str]]] disallowed_policies_globs: Set of disallowed policies with glob match for given role.
44
44
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
45
45
  The value should not contain leading or trailing forward slashes.
46
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
46
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
47
47
  *Available only for Vault Enterprise*.
48
48
  :param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
49
49
  :param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
@@ -192,7 +192,7 @@ class AuthBackendRoleArgs:
192
192
  """
193
193
  The namespace to provision the resource in.
194
194
  The value should not contain leading or trailing forward slashes.
195
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
195
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
196
196
  *Available only for Vault Enterprise*.
197
197
  """
198
198
  return pulumi.get(self, "namespace")
@@ -395,7 +395,7 @@ class _AuthBackendRoleState:
395
395
  :param pulumi.Input[Sequence[pulumi.Input[str]]] disallowed_policies_globs: Set of disallowed policies with glob match for given role.
396
396
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
397
397
  The value should not contain leading or trailing forward slashes.
398
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
398
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
399
399
  *Available only for Vault Enterprise*.
400
400
  :param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
401
401
  :param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
@@ -534,7 +534,7 @@ class _AuthBackendRoleState:
534
534
  """
535
535
  The namespace to provision the resource in.
536
536
  The value should not contain leading or trailing forward slashes.
537
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
537
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
538
538
  *Available only for Vault Enterprise*.
539
539
  """
540
540
  return pulumi.get(self, "namespace")
@@ -788,7 +788,7 @@ class AuthBackendRole(pulumi.CustomResource):
788
788
  :param pulumi.Input[Sequence[pulumi.Input[str]]] disallowed_policies_globs: Set of disallowed policies with glob match for given role.
789
789
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
790
790
  The value should not contain leading or trailing forward slashes.
791
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
791
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
792
792
  *Available only for Vault Enterprise*.
793
793
  :param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
794
794
  :param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
@@ -971,7 +971,7 @@ class AuthBackendRole(pulumi.CustomResource):
971
971
  :param pulumi.Input[Sequence[pulumi.Input[str]]] disallowed_policies_globs: Set of disallowed policies with glob match for given role.
972
972
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
973
973
  The value should not contain leading or trailing forward slashes.
974
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
974
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
975
975
  *Available only for Vault Enterprise*.
976
976
  :param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
977
977
  :param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
@@ -1076,7 +1076,7 @@ class AuthBackendRole(pulumi.CustomResource):
1076
1076
  """
1077
1077
  The namespace to provision the resource in.
1078
1078
  The value should not contain leading or trailing forward slashes.
1079
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1079
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1080
1080
  *Available only for Vault Enterprise*.
1081
1081
  """
1082
1082
  return pulumi.get(self, "namespace")
@@ -25,7 +25,7 @@ class AlphabetArgs:
25
25
  :param pulumi.Input[str] name: The name of the alphabet.
26
26
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
27
27
  The value should not contain leading or trailing forward slashes.
28
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
28
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
29
29
  *Available only for Vault Enterprise*.
30
30
  """
31
31
  pulumi.set(__self__, "path", path)
@@ -78,7 +78,7 @@ class AlphabetArgs:
78
78
  """
79
79
  The namespace to provision the resource in.
80
80
  The value should not contain leading or trailing forward slashes.
81
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
81
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
82
82
  *Available only for Vault Enterprise*.
83
83
  """
84
84
  return pulumi.get(self, "namespace")
@@ -101,7 +101,7 @@ class _AlphabetState:
101
101
  :param pulumi.Input[str] name: The name of the alphabet.
102
102
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
103
103
  The value should not contain leading or trailing forward slashes.
104
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
104
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
105
105
  *Available only for Vault Enterprise*.
106
106
  :param pulumi.Input[str] path: Path to where the back-end is mounted within Vault.
107
107
  """
@@ -144,7 +144,7 @@ class _AlphabetState:
144
144
  """
145
145
  The namespace to provision the resource in.
146
146
  The value should not contain leading or trailing forward slashes.
147
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
147
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
148
148
  *Available only for Vault Enterprise*.
149
149
  """
150
150
  return pulumi.get(self, "namespace")
@@ -203,7 +203,7 @@ class Alphabet(pulumi.CustomResource):
203
203
  :param pulumi.Input[str] name: The name of the alphabet.
204
204
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
205
205
  The value should not contain leading or trailing forward slashes.
206
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
206
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
207
207
  *Available only for Vault Enterprise*.
208
208
  :param pulumi.Input[str] path: Path to where the back-end is mounted within Vault.
209
209
  """
@@ -293,7 +293,7 @@ class Alphabet(pulumi.CustomResource):
293
293
  :param pulumi.Input[str] name: The name of the alphabet.
294
294
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
295
295
  The value should not contain leading or trailing forward slashes.
296
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
296
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
297
297
  *Available only for Vault Enterprise*.
298
298
  :param pulumi.Input[str] path: Path to where the back-end is mounted within Vault.
299
299
  """
@@ -329,7 +329,7 @@ class Alphabet(pulumi.CustomResource):
329
329
  """
330
330
  The namespace to provision the resource in.
331
331
  The value should not contain leading or trailing forward slashes.
332
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
332
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
333
333
  *Available only for Vault Enterprise*.
334
334
  """
335
335
  return pulumi.get(self, "namespace")
@@ -171,7 +171,7 @@ def get_decode(batch_inputs: Optional[Sequence[Mapping[str, Any]]] = None,
171
171
  :param str decoded_value: The result of decoding a value.
172
172
  :param str namespace: The namespace of the target resource.
173
173
  The value should not contain leading or trailing forward slashes.
174
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
174
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
175
175
  *Available only for Vault Enterprise*.
176
176
  :param str path: Path to where the back-end is mounted within Vault.
177
177
  :param str role_name: The name of the role.
@@ -252,7 +252,7 @@ def get_decode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
252
252
  :param str decoded_value: The result of decoding a value.
253
253
  :param str namespace: The namespace of the target resource.
254
254
  The value should not contain leading or trailing forward slashes.
255
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
255
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
256
256
  *Available only for Vault Enterprise*.
257
257
  :param str path: Path to where the back-end is mounted within Vault.
258
258
  :param str role_name: The name of the role.
@@ -173,7 +173,7 @@ def get_encode(batch_inputs: Optional[Sequence[Mapping[str, Any]]] = None,
173
173
  :param str encoded_value: The result of encoding a value.
174
174
  :param str namespace: The namespace of the target resource.
175
175
  The value should not contain leading or trailing forward slashes.
176
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
176
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
177
177
  *Available only for Vault Enterprise*.
178
178
  :param str path: Path to where the back-end is mounted within Vault.
179
179
  :param str role_name: The name of the role.
@@ -256,7 +256,7 @@ def get_encode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
256
256
  :param str encoded_value: The result of encoding a value.
257
257
  :param str namespace: The namespace of the target resource.
258
258
  The value should not contain leading or trailing forward slashes.
259
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
259
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
260
260
  *Available only for Vault Enterprise*.
261
261
  :param str path: Path to where the back-end is mounted within Vault.
262
262
  :param str role_name: The name of the role.