pulumi-vault 5.21.0a1711033014__py3-none-any.whl → 6.0.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (163) hide show
  1. pulumi_vault/__init__.py +24 -0
  2. pulumi_vault/ad/get_access_credentials.py +2 -2
  3. pulumi_vault/ad/secret_backend.py +7 -138
  4. pulumi_vault/ad/secret_library.py +7 -7
  5. pulumi_vault/ad/secret_role.py +7 -7
  6. pulumi_vault/approle/auth_backend_login.py +7 -7
  7. pulumi_vault/approle/auth_backend_role.py +7 -7
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +7 -7
  9. pulumi_vault/audit.py +7 -7
  10. pulumi_vault/auth_backend.py +7 -7
  11. pulumi_vault/aws/auth_backend_cert.py +7 -7
  12. pulumi_vault/aws/auth_backend_client.py +7 -7
  13. pulumi_vault/aws/auth_backend_config_identity.py +7 -7
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +7 -7
  15. pulumi_vault/aws/auth_backend_login.py +7 -7
  16. pulumi_vault/aws/auth_backend_role.py +7 -7
  17. pulumi_vault/aws/auth_backend_role_tag.py +7 -7
  18. pulumi_vault/aws/auth_backend_roletag_blacklist.py +7 -7
  19. pulumi_vault/aws/auth_backend_sts_role.py +7 -7
  20. pulumi_vault/aws/get_access_credentials.py +2 -2
  21. pulumi_vault/aws/secret_backend.py +7 -7
  22. pulumi_vault/aws/secret_backend_role.py +7 -7
  23. pulumi_vault/aws/secret_backend_static_role.py +7 -7
  24. pulumi_vault/azure/auth_backend_config.py +7 -7
  25. pulumi_vault/azure/auth_backend_role.py +7 -7
  26. pulumi_vault/azure/backend.py +7 -7
  27. pulumi_vault/azure/backend_role.py +7 -7
  28. pulumi_vault/azure/get_access_credentials.py +2 -2
  29. pulumi_vault/cert_auth_backend_role.py +7 -63
  30. pulumi_vault/config/_inputs.py +52 -0
  31. pulumi_vault/config/outputs.py +30 -0
  32. pulumi_vault/config/ui_custom_message.py +524 -0
  33. pulumi_vault/consul/secret_backend.py +7 -7
  34. pulumi_vault/consul/secret_backend_role.py +7 -76
  35. pulumi_vault/egp_policy.py +7 -7
  36. pulumi_vault/gcp/auth_backend.py +7 -7
  37. pulumi_vault/gcp/auth_backend_role.py +7 -7
  38. pulumi_vault/gcp/secret_backend.py +7 -7
  39. pulumi_vault/gcp/secret_roleset.py +7 -7
  40. pulumi_vault/gcp/secret_static_account.py +7 -7
  41. pulumi_vault/generic/endpoint.py +7 -7
  42. pulumi_vault/generic/get_secret.py +2 -2
  43. pulumi_vault/generic/secret.py +7 -7
  44. pulumi_vault/get_auth_backend.py +2 -2
  45. pulumi_vault/get_auth_backends.py +20 -2
  46. pulumi_vault/get_nomad_access_token.py +2 -2
  47. pulumi_vault/get_raft_autopilot_state.py +2 -2
  48. pulumi_vault/github/auth_backend.py +7 -7
  49. pulumi_vault/github/team.py +7 -7
  50. pulumi_vault/github/user.py +7 -7
  51. pulumi_vault/identity/entity.py +7 -7
  52. pulumi_vault/identity/entity_alias.py +7 -7
  53. pulumi_vault/identity/entity_policies.py +7 -7
  54. pulumi_vault/identity/get_entity.py +2 -2
  55. pulumi_vault/identity/get_group.py +2 -2
  56. pulumi_vault/identity/get_oidc_client_creds.py +2 -2
  57. pulumi_vault/identity/get_oidc_openid_config.py +2 -2
  58. pulumi_vault/identity/get_oidc_public_keys.py +2 -2
  59. pulumi_vault/identity/group.py +7 -7
  60. pulumi_vault/identity/group_alias.py +7 -7
  61. pulumi_vault/identity/group_member_entity_ids.py +7 -58
  62. pulumi_vault/identity/group_member_group_ids.py +7 -7
  63. pulumi_vault/identity/group_policies.py +7 -7
  64. pulumi_vault/identity/oidc.py +7 -7
  65. pulumi_vault/identity/oidc_assignment.py +7 -7
  66. pulumi_vault/identity/oidc_client.py +19 -15
  67. pulumi_vault/identity/oidc_key.py +7 -7
  68. pulumi_vault/identity/oidc_key_allowed_client_id.py +7 -7
  69. pulumi_vault/identity/oidc_provider.py +7 -7
  70. pulumi_vault/identity/oidc_role.py +7 -7
  71. pulumi_vault/identity/oidc_scope.py +7 -7
  72. pulumi_vault/jwt/auth_backend.py +7 -7
  73. pulumi_vault/jwt/auth_backend_role.py +7 -7
  74. pulumi_vault/kmip/secret_backend.py +7 -7
  75. pulumi_vault/kmip/secret_role.py +7 -7
  76. pulumi_vault/kmip/secret_scope.py +7 -7
  77. pulumi_vault/kubernetes/auth_backend_role.py +7 -7
  78. pulumi_vault/kubernetes/get_service_account_token.py +2 -2
  79. pulumi_vault/kubernetes/secret_backend.py +7 -7
  80. pulumi_vault/kubernetes/secret_backend_role.py +7 -7
  81. pulumi_vault/kv/get_secret.py +2 -2
  82. pulumi_vault/kv/get_secret_subkeys_v2.py +2 -2
  83. pulumi_vault/kv/get_secret_v2.py +5 -2
  84. pulumi_vault/kv/get_secrets_list.py +2 -2
  85. pulumi_vault/kv/get_secrets_list_v2.py +2 -2
  86. pulumi_vault/kv/secret.py +7 -7
  87. pulumi_vault/kv/secret_backend_v2.py +7 -7
  88. pulumi_vault/kv/secret_v2.py +7 -7
  89. pulumi_vault/ldap/auth_backend.py +7 -7
  90. pulumi_vault/ldap/auth_backend_group.py +7 -7
  91. pulumi_vault/ldap/auth_backend_user.py +7 -7
  92. pulumi_vault/ldap/secret_backend.py +61 -76
  93. pulumi_vault/ldap/secret_backend_dynamic_role.py +7 -7
  94. pulumi_vault/ldap/secret_backend_library_set.py +7 -7
  95. pulumi_vault/ldap/secret_backend_static_role.py +62 -8
  96. pulumi_vault/mfa_duo.py +7 -7
  97. pulumi_vault/mfa_okta.py +7 -7
  98. pulumi_vault/mfa_pingid.py +7 -7
  99. pulumi_vault/mfa_totp.py +7 -7
  100. pulumi_vault/mongodbatlas/secret_backend.py +7 -7
  101. pulumi_vault/mongodbatlas/secret_role.py +7 -7
  102. pulumi_vault/mount.py +11 -7
  103. pulumi_vault/namespace.py +7 -7
  104. pulumi_vault/nomad_secret_backend.py +7 -7
  105. pulumi_vault/nomad_secret_role.py +7 -7
  106. pulumi_vault/okta/auth_backend.py +7 -7
  107. pulumi_vault/okta/auth_backend_group.py +7 -7
  108. pulumi_vault/okta/auth_backend_user.py +7 -7
  109. pulumi_vault/password_policy.py +7 -7
  110. pulumi_vault/pkisecret/__init__.py +1 -0
  111. pulumi_vault/pkisecret/backend_config_cluster.py +368 -0
  112. pulumi_vault/pkisecret/get_backend_issuer.py +2 -2
  113. pulumi_vault/pkisecret/get_backend_issuers.py +2 -2
  114. pulumi_vault/pkisecret/get_backend_key.py +2 -2
  115. pulumi_vault/pkisecret/get_backend_keys.py +2 -2
  116. pulumi_vault/pkisecret/secret_backend_cert.py +7 -7
  117. pulumi_vault/pkisecret/secret_backend_config_ca.py +7 -7
  118. pulumi_vault/pkisecret/secret_backend_config_issuers.py +7 -7
  119. pulumi_vault/pkisecret/secret_backend_config_urls.py +54 -7
  120. pulumi_vault/pkisecret/secret_backend_crl_config.py +7 -7
  121. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +7 -7
  122. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +7 -7
  123. pulumi_vault/pkisecret/secret_backend_issuer.py +7 -7
  124. pulumi_vault/pkisecret/secret_backend_key.py +7 -7
  125. pulumi_vault/pkisecret/secret_backend_role.py +7 -7
  126. pulumi_vault/pkisecret/secret_backend_root_cert.py +7 -44
  127. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +7 -52
  128. pulumi_vault/pkisecret/secret_backend_sign.py +7 -52
  129. pulumi_vault/policy.py +7 -7
  130. pulumi_vault/rabbitmq/secret_backend.py +7 -7
  131. pulumi_vault/rabbitmq/secret_backend_role.py +7 -7
  132. pulumi_vault/raft_autopilot.py +7 -7
  133. pulumi_vault/raft_snapshot_agent_config.py +7 -7
  134. pulumi_vault/rgp_policy.py +7 -7
  135. pulumi_vault/saml/auth_backend.py +7 -7
  136. pulumi_vault/saml/auth_backend_role.py +7 -7
  137. pulumi_vault/secrets/__init__.py +1 -0
  138. pulumi_vault/secrets/sync_association.py +7 -7
  139. pulumi_vault/secrets/sync_aws_destination.py +161 -7
  140. pulumi_vault/secrets/sync_azure_destination.py +7 -7
  141. pulumi_vault/secrets/sync_gcp_destination.py +77 -7
  142. pulumi_vault/secrets/sync_gh_destination.py +122 -7
  143. pulumi_vault/secrets/sync_github_apps.py +370 -0
  144. pulumi_vault/secrets/sync_vercel_destination.py +7 -7
  145. pulumi_vault/ssh/secret_backend_ca.py +7 -7
  146. pulumi_vault/ssh/secret_backend_role.py +7 -83
  147. pulumi_vault/terraformcloud/secret_creds.py +7 -7
  148. pulumi_vault/terraformcloud/secret_role.py +7 -7
  149. pulumi_vault/token.py +7 -7
  150. pulumi_vault/tokenauth/auth_backend_role.py +7 -7
  151. pulumi_vault/transform/alphabet.py +7 -7
  152. pulumi_vault/transform/get_decode.py +2 -2
  153. pulumi_vault/transform/get_encode.py +2 -2
  154. pulumi_vault/transform/role.py +7 -7
  155. pulumi_vault/transform/template.py +7 -7
  156. pulumi_vault/transform/transformation.py +7 -7
  157. pulumi_vault/transit/secret_backend_key.py +7 -84
  158. pulumi_vault/transit/secret_cache_config.py +7 -7
  159. {pulumi_vault-5.21.0a1711033014.dist-info → pulumi_vault-6.0.0.dist-info}/METADATA +2 -2
  160. pulumi_vault-6.0.0.dist-info/RECORD +248 -0
  161. pulumi_vault-5.21.0a1711033014.dist-info/RECORD +0 -244
  162. {pulumi_vault-5.21.0a1711033014.dist-info → pulumi_vault-6.0.0.dist-info}/WHEEL +0 -0
  163. {pulumi_vault-5.21.0a1711033014.dist-info → pulumi_vault-6.0.0.dist-info}/top_level.txt +0 -0
@@ -26,7 +26,6 @@ class SecretBackendRoleArgs:
26
26
  partition: Optional[pulumi.Input[str]] = None,
27
27
  policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
28
28
  service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
29
- token_type: Optional[pulumi.Input[str]] = None,
30
29
  ttl: Optional[pulumi.Input[int]] = None):
31
30
  """
32
31
  The set of arguments for constructing a SecretBackendRole resource.
@@ -41,7 +40,7 @@ class SecretBackendRoleArgs:
41
40
  :param pulumi.Input[str] name: The name of the Consul secrets engine role to create.
42
41
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
43
42
  The value should not contain leading or trailing forward slashes.
44
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
43
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
45
44
  *Available only for Vault Enterprise*.
46
45
  :param pulumi.Input[Sequence[pulumi.Input[str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
47
46
  identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
@@ -52,8 +51,6 @@ class SecretBackendRoleArgs:
52
51
  `policies`, remains supported for legacy users, but Vault has deprecated this field.
53
52
  :param pulumi.Input[Sequence[pulumi.Input[str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
54
53
  service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
55
- :param pulumi.Input[str] token_type: Specifies the type of token to create when using this role. Valid values are "client" or "management".
56
- *Deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.*
57
54
  :param pulumi.Input[int] ttl: Specifies the TTL for this role.
58
55
  """
59
56
  if backend is not None:
@@ -80,11 +77,6 @@ class SecretBackendRoleArgs:
80
77
  pulumi.set(__self__, "policies", policies)
81
78
  if service_identities is not None:
82
79
  pulumi.set(__self__, "service_identities", service_identities)
83
- if token_type is not None:
84
- warnings.warn("""Consul 1.11 and later removed the legacy ACL system which supported this field.""", DeprecationWarning)
85
- pulumi.log.warn("""token_type is deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.""")
86
- if token_type is not None:
87
- pulumi.set(__self__, "token_type", token_type)
88
80
  if ttl is not None:
89
81
  pulumi.set(__self__, "ttl", ttl)
90
82
 
@@ -180,7 +172,7 @@ class SecretBackendRoleArgs:
180
172
  """
181
173
  The namespace to provision the resource in.
182
174
  The value should not contain leading or trailing forward slashes.
183
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
175
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
184
176
  *Available only for Vault Enterprise*.
185
177
  """
186
178
  return pulumi.get(self, "namespace")
@@ -242,22 +234,6 @@ class SecretBackendRoleArgs:
242
234
  def service_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
243
235
  pulumi.set(self, "service_identities", value)
244
236
 
245
- @property
246
- @pulumi.getter(name="tokenType")
247
- def token_type(self) -> Optional[pulumi.Input[str]]:
248
- """
249
- Specifies the type of token to create when using this role. Valid values are "client" or "management".
250
- *Deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.*
251
- """
252
- warnings.warn("""Consul 1.11 and later removed the legacy ACL system which supported this field.""", DeprecationWarning)
253
- pulumi.log.warn("""token_type is deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.""")
254
-
255
- return pulumi.get(self, "token_type")
256
-
257
- @token_type.setter
258
- def token_type(self, value: Optional[pulumi.Input[str]]):
259
- pulumi.set(self, "token_type", value)
260
-
261
237
  @property
262
238
  @pulumi.getter
263
239
  def ttl(self) -> Optional[pulumi.Input[int]]:
@@ -286,7 +262,6 @@ class _SecretBackendRoleState:
286
262
  partition: Optional[pulumi.Input[str]] = None,
287
263
  policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
288
264
  service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
289
- token_type: Optional[pulumi.Input[str]] = None,
290
265
  ttl: Optional[pulumi.Input[int]] = None):
291
266
  """
292
267
  Input properties used for looking up and filtering SecretBackendRole resources.
@@ -301,7 +276,7 @@ class _SecretBackendRoleState:
301
276
  :param pulumi.Input[str] name: The name of the Consul secrets engine role to create.
302
277
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
303
278
  The value should not contain leading or trailing forward slashes.
304
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
279
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
305
280
  *Available only for Vault Enterprise*.
306
281
  :param pulumi.Input[Sequence[pulumi.Input[str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
307
282
  identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
@@ -312,8 +287,6 @@ class _SecretBackendRoleState:
312
287
  `policies`, remains supported for legacy users, but Vault has deprecated this field.
313
288
  :param pulumi.Input[Sequence[pulumi.Input[str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
314
289
  service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
315
- :param pulumi.Input[str] token_type: Specifies the type of token to create when using this role. Valid values are "client" or "management".
316
- *Deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.*
317
290
  :param pulumi.Input[int] ttl: Specifies the TTL for this role.
318
291
  """
319
292
  if backend is not None:
@@ -340,11 +313,6 @@ class _SecretBackendRoleState:
340
313
  pulumi.set(__self__, "policies", policies)
341
314
  if service_identities is not None:
342
315
  pulumi.set(__self__, "service_identities", service_identities)
343
- if token_type is not None:
344
- warnings.warn("""Consul 1.11 and later removed the legacy ACL system which supported this field.""", DeprecationWarning)
345
- pulumi.log.warn("""token_type is deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.""")
346
- if token_type is not None:
347
- pulumi.set(__self__, "token_type", token_type)
348
316
  if ttl is not None:
349
317
  pulumi.set(__self__, "ttl", ttl)
350
318
 
@@ -440,7 +408,7 @@ class _SecretBackendRoleState:
440
408
  """
441
409
  The namespace to provision the resource in.
442
410
  The value should not contain leading or trailing forward slashes.
443
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
411
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
444
412
  *Available only for Vault Enterprise*.
445
413
  """
446
414
  return pulumi.get(self, "namespace")
@@ -502,22 +470,6 @@ class _SecretBackendRoleState:
502
470
  def service_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
503
471
  pulumi.set(self, "service_identities", value)
504
472
 
505
- @property
506
- @pulumi.getter(name="tokenType")
507
- def token_type(self) -> Optional[pulumi.Input[str]]:
508
- """
509
- Specifies the type of token to create when using this role. Valid values are "client" or "management".
510
- *Deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.*
511
- """
512
- warnings.warn("""Consul 1.11 and later removed the legacy ACL system which supported this field.""", DeprecationWarning)
513
- pulumi.log.warn("""token_type is deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.""")
514
-
515
- return pulumi.get(self, "token_type")
516
-
517
- @token_type.setter
518
- def token_type(self, value: Optional[pulumi.Input[str]]):
519
- pulumi.set(self, "token_type", value)
520
-
521
473
  @property
522
474
  @pulumi.getter
523
475
  def ttl(self) -> Optional[pulumi.Input[int]]:
@@ -548,7 +500,6 @@ class SecretBackendRole(pulumi.CustomResource):
548
500
  partition: Optional[pulumi.Input[str]] = None,
549
501
  policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
550
502
  service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
551
- token_type: Optional[pulumi.Input[str]] = None,
552
503
  ttl: Optional[pulumi.Input[int]] = None,
553
504
  __props__=None):
554
505
  """
@@ -599,7 +550,7 @@ class SecretBackendRole(pulumi.CustomResource):
599
550
  :param pulumi.Input[str] name: The name of the Consul secrets engine role to create.
600
551
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
601
552
  The value should not contain leading or trailing forward slashes.
602
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
553
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
603
554
  *Available only for Vault Enterprise*.
604
555
  :param pulumi.Input[Sequence[pulumi.Input[str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
605
556
  identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
@@ -610,8 +561,6 @@ class SecretBackendRole(pulumi.CustomResource):
610
561
  `policies`, remains supported for legacy users, but Vault has deprecated this field.
611
562
  :param pulumi.Input[Sequence[pulumi.Input[str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
612
563
  service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
613
- :param pulumi.Input[str] token_type: Specifies the type of token to create when using this role. Valid values are "client" or "management".
614
- *Deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.*
615
564
  :param pulumi.Input[int] ttl: Specifies the TTL for this role.
616
565
  """
617
566
  ...
@@ -682,7 +631,6 @@ class SecretBackendRole(pulumi.CustomResource):
682
631
  partition: Optional[pulumi.Input[str]] = None,
683
632
  policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
684
633
  service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
685
- token_type: Optional[pulumi.Input[str]] = None,
686
634
  ttl: Optional[pulumi.Input[int]] = None,
687
635
  __props__=None):
688
636
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
@@ -705,7 +653,6 @@ class SecretBackendRole(pulumi.CustomResource):
705
653
  __props__.__dict__["partition"] = partition
706
654
  __props__.__dict__["policies"] = policies
707
655
  __props__.__dict__["service_identities"] = service_identities
708
- __props__.__dict__["token_type"] = token_type
709
656
  __props__.__dict__["ttl"] = ttl
710
657
  super(SecretBackendRole, __self__).__init__(
711
658
  'vault:consul/secretBackendRole:SecretBackendRole',
@@ -729,7 +676,6 @@ class SecretBackendRole(pulumi.CustomResource):
729
676
  partition: Optional[pulumi.Input[str]] = None,
730
677
  policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
731
678
  service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
732
- token_type: Optional[pulumi.Input[str]] = None,
733
679
  ttl: Optional[pulumi.Input[int]] = None) -> 'SecretBackendRole':
734
680
  """
735
681
  Get an existing SecretBackendRole resource's state with the given name, id, and optional extra
@@ -749,7 +695,7 @@ class SecretBackendRole(pulumi.CustomResource):
749
695
  :param pulumi.Input[str] name: The name of the Consul secrets engine role to create.
750
696
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
751
697
  The value should not contain leading or trailing forward slashes.
752
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
698
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
753
699
  *Available only for Vault Enterprise*.
754
700
  :param pulumi.Input[Sequence[pulumi.Input[str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
755
701
  identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
@@ -760,8 +706,6 @@ class SecretBackendRole(pulumi.CustomResource):
760
706
  `policies`, remains supported for legacy users, but Vault has deprecated this field.
761
707
  :param pulumi.Input[Sequence[pulumi.Input[str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
762
708
  service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
763
- :param pulumi.Input[str] token_type: Specifies the type of token to create when using this role. Valid values are "client" or "management".
764
- *Deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.*
765
709
  :param pulumi.Input[int] ttl: Specifies the TTL for this role.
766
710
  """
767
711
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -780,7 +724,6 @@ class SecretBackendRole(pulumi.CustomResource):
780
724
  __props__.__dict__["partition"] = partition
781
725
  __props__.__dict__["policies"] = policies
782
726
  __props__.__dict__["service_identities"] = service_identities
783
- __props__.__dict__["token_type"] = token_type
784
727
  __props__.__dict__["ttl"] = ttl
785
728
  return SecretBackendRole(resource_name, opts=opts, __props__=__props__)
786
729
 
@@ -848,7 +791,7 @@ class SecretBackendRole(pulumi.CustomResource):
848
791
  """
849
792
  The namespace to provision the resource in.
850
793
  The value should not contain leading or trailing forward slashes.
851
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
794
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
852
795
  *Available only for Vault Enterprise*.
853
796
  """
854
797
  return pulumi.get(self, "namespace")
@@ -890,18 +833,6 @@ class SecretBackendRole(pulumi.CustomResource):
890
833
  """
891
834
  return pulumi.get(self, "service_identities")
892
835
 
893
- @property
894
- @pulumi.getter(name="tokenType")
895
- def token_type(self) -> pulumi.Output[Optional[str]]:
896
- """
897
- Specifies the type of token to create when using this role. Valid values are "client" or "management".
898
- *Deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.*
899
- """
900
- warnings.warn("""Consul 1.11 and later removed the legacy ACL system which supported this field.""", DeprecationWarning)
901
- pulumi.log.warn("""token_type is deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.""")
902
-
903
- return pulumi.get(self, "token_type")
904
-
905
836
  @property
906
837
  @pulumi.getter
907
838
  def ttl(self) -> pulumi.Output[Optional[int]]:
@@ -27,7 +27,7 @@ class EgpPolicyArgs:
27
27
  :param pulumi.Input[str] name: The name of the policy
28
28
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
29
29
  The value should not contain leading or trailing forward slashes.
30
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
30
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
31
31
  *Available only for Vault Enterprise*.
32
32
  """
33
33
  pulumi.set(__self__, "enforcement_level", enforcement_level)
@@ -92,7 +92,7 @@ class EgpPolicyArgs:
92
92
  """
93
93
  The namespace to provision the resource in.
94
94
  The value should not contain leading or trailing forward slashes.
95
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
95
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
96
96
  *Available only for Vault Enterprise*.
97
97
  """
98
98
  return pulumi.get(self, "namespace")
@@ -116,7 +116,7 @@ class _EgpPolicyState:
116
116
  :param pulumi.Input[str] name: The name of the policy
117
117
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
118
118
  The value should not contain leading or trailing forward slashes.
119
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
119
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
120
120
  *Available only for Vault Enterprise*.
121
121
  :param pulumi.Input[Sequence[pulumi.Input[str]]] paths: List of paths to which the policy will be applied to
122
122
  :param pulumi.Input[str] policy: String containing a Sentinel policy
@@ -162,7 +162,7 @@ class _EgpPolicyState:
162
162
  """
163
163
  The namespace to provision the resource in.
164
164
  The value should not contain leading or trailing forward slashes.
165
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
165
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
166
166
  *Available only for Vault Enterprise*.
167
167
  """
168
168
  return pulumi.get(self, "namespace")
@@ -236,7 +236,7 @@ class EgpPolicy(pulumi.CustomResource):
236
236
  :param pulumi.Input[str] name: The name of the policy
237
237
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
238
238
  The value should not contain leading or trailing forward slashes.
239
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
239
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
240
240
  *Available only for Vault Enterprise*.
241
241
  :param pulumi.Input[Sequence[pulumi.Input[str]]] paths: List of paths to which the policy will be applied to
242
242
  :param pulumi.Input[str] policy: String containing a Sentinel policy
@@ -336,7 +336,7 @@ class EgpPolicy(pulumi.CustomResource):
336
336
  :param pulumi.Input[str] name: The name of the policy
337
337
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
338
338
  The value should not contain leading or trailing forward slashes.
339
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
339
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
340
340
  *Available only for Vault Enterprise*.
341
341
  :param pulumi.Input[Sequence[pulumi.Input[str]]] paths: List of paths to which the policy will be applied to
342
342
  :param pulumi.Input[str] policy: String containing a Sentinel policy
@@ -374,7 +374,7 @@ class EgpPolicy(pulumi.CustomResource):
374
374
  """
375
375
  The namespace to provision the resource in.
376
376
  The value should not contain leading or trailing forward slashes.
377
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
377
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
378
378
  *Available only for Vault Enterprise*.
379
379
  """
380
380
  return pulumi.get(self, "namespace")
@@ -46,7 +46,7 @@ class AuthBackendArgs:
46
46
  :param pulumi.Input[bool] local: Specifies if the auth method is local only.
47
47
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
48
48
  The value should not contain leading or trailing forward slashes.
49
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
49
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
50
50
  *Available only for Vault Enterprise*.
51
51
  :param pulumi.Input[str] path: The path to mount the auth method — this defaults to 'gcp'.
52
52
  :param pulumi.Input[str] private_key_id: The ID of the private key from the credentials
@@ -177,7 +177,7 @@ class AuthBackendArgs:
177
177
  """
178
178
  The namespace to provision the resource in.
179
179
  The value should not contain leading or trailing forward slashes.
180
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
180
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
181
181
  *Available only for Vault Enterprise*.
182
182
  """
183
183
  return pulumi.get(self, "namespace")
@@ -272,7 +272,7 @@ class _AuthBackendState:
272
272
  :param pulumi.Input[bool] local: Specifies if the auth method is local only.
273
273
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
274
274
  The value should not contain leading or trailing forward slashes.
275
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
275
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
276
276
  *Available only for Vault Enterprise*.
277
277
  :param pulumi.Input[str] path: The path to mount the auth method — this defaults to 'gcp'.
278
278
  :param pulumi.Input[str] private_key_id: The ID of the private key from the credentials
@@ -417,7 +417,7 @@ class _AuthBackendState:
417
417
  """
418
418
  The namespace to provision the resource in.
419
419
  The value should not contain leading or trailing forward slashes.
420
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
420
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
421
421
  *Available only for Vault Enterprise*.
422
422
  """
423
423
  return pulumi.get(self, "namespace")
@@ -542,7 +542,7 @@ class AuthBackend(pulumi.CustomResource):
542
542
  :param pulumi.Input[bool] local: Specifies if the auth method is local only.
543
543
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
544
544
  The value should not contain leading or trailing forward slashes.
545
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
545
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
546
546
  *Available only for Vault Enterprise*.
547
547
  :param pulumi.Input[str] path: The path to mount the auth method — this defaults to 'gcp'.
548
548
  :param pulumi.Input[str] private_key_id: The ID of the private key from the credentials
@@ -684,7 +684,7 @@ class AuthBackend(pulumi.CustomResource):
684
684
  :param pulumi.Input[bool] local: Specifies if the auth method is local only.
685
685
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
686
686
  The value should not contain leading or trailing forward slashes.
687
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
687
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
688
688
  *Available only for Vault Enterprise*.
689
689
  :param pulumi.Input[str] path: The path to mount the auth method — this defaults to 'gcp'.
690
690
  :param pulumi.Input[str] private_key_id: The ID of the private key from the credentials
@@ -789,7 +789,7 @@ class AuthBackend(pulumi.CustomResource):
789
789
  """
790
790
  The namespace to provision the resource in.
791
791
  The value should not contain leading or trailing forward slashes.
792
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
792
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
793
793
  *Available only for Vault Enterprise*.
794
794
  """
795
795
  return pulumi.get(self, "namespace")
@@ -51,7 +51,7 @@ class AuthBackendRoleArgs:
51
51
  :param pulumi.Input[str] max_jwt_exp: The number of seconds past the time of authentication that the login param JWT must expire within. For example, if a user attempts to login with a token that expires within an hour and this is set to 15 minutes, Vault will return an error prompting the user to create a new signed JWT with a shorter `exp`. The GCE metadata tokens currently do not allow the `exp` claim to be customized.
52
52
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
53
53
  The value should not contain leading or trailing forward slashes.
54
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
54
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
55
55
  *Available only for Vault Enterprise*.
56
56
  :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
57
57
  addresses which can authenticate successfully, and ties the resulting token to these blocks
@@ -270,7 +270,7 @@ class AuthBackendRoleArgs:
270
270
  """
271
271
  The namespace to provision the resource in.
272
272
  The value should not contain leading or trailing forward slashes.
273
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
273
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
274
274
  *Available only for Vault Enterprise*.
275
275
  """
276
276
  return pulumi.get(self, "namespace")
@@ -443,7 +443,7 @@ class _AuthBackendRoleState:
443
443
  :param pulumi.Input[str] max_jwt_exp: The number of seconds past the time of authentication that the login param JWT must expire within. For example, if a user attempts to login with a token that expires within an hour and this is set to 15 minutes, Vault will return an error prompting the user to create a new signed JWT with a shorter `exp`. The GCE metadata tokens currently do not allow the `exp` claim to be customized.
444
444
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
445
445
  The value should not contain leading or trailing forward slashes.
446
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
446
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
447
447
  *Available only for Vault Enterprise*.
448
448
  :param pulumi.Input[str] role: Name of the GCP role
449
449
  :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
@@ -642,7 +642,7 @@ class _AuthBackendRoleState:
642
642
  """
643
643
  The namespace to provision the resource in.
644
644
  The value should not contain leading or trailing forward slashes.
645
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
645
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
646
646
  *Available only for Vault Enterprise*.
647
647
  """
648
648
  return pulumi.get(self, "namespace")
@@ -879,7 +879,7 @@ class AuthBackendRole(pulumi.CustomResource):
879
879
  :param pulumi.Input[str] max_jwt_exp: The number of seconds past the time of authentication that the login param JWT must expire within. For example, if a user attempts to login with a token that expires within an hour and this is set to 15 minutes, Vault will return an error prompting the user to create a new signed JWT with a shorter `exp`. The GCE metadata tokens currently do not allow the `exp` claim to be customized.
880
880
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
881
881
  The value should not contain leading or trailing forward slashes.
882
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
882
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
883
883
  *Available only for Vault Enterprise*.
884
884
  :param pulumi.Input[str] role: Name of the GCP role
885
885
  :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
@@ -1075,7 +1075,7 @@ class AuthBackendRole(pulumi.CustomResource):
1075
1075
  :param pulumi.Input[str] max_jwt_exp: The number of seconds past the time of authentication that the login param JWT must expire within. For example, if a user attempts to login with a token that expires within an hour and this is set to 15 minutes, Vault will return an error prompting the user to create a new signed JWT with a shorter `exp`. The GCE metadata tokens currently do not allow the `exp` claim to be customized.
1076
1076
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
1077
1077
  The value should not contain leading or trailing forward slashes.
1078
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1078
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1079
1079
  *Available only for Vault Enterprise*.
1080
1080
  :param pulumi.Input[str] role: Name of the GCP role
1081
1081
  :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
@@ -1217,7 +1217,7 @@ class AuthBackendRole(pulumi.CustomResource):
1217
1217
  """
1218
1218
  The namespace to provision the resource in.
1219
1219
  The value should not contain leading or trailing forward slashes.
1220
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1220
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1221
1221
  *Available only for Vault Enterprise*.
1222
1222
  """
1223
1223
  return pulumi.get(self, "namespace")
@@ -35,7 +35,7 @@ class SecretBackendArgs:
35
35
  for credentials issued by this backend. Defaults to '0'.
36
36
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
37
37
  The value should not contain leading or trailing forward slashes.
38
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
38
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
39
39
  *Available only for Vault Enterprise*.
40
40
  :param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
41
41
  not begin or end with a `/`. Defaults to `gcp`.
@@ -138,7 +138,7 @@ class SecretBackendArgs:
138
138
  """
139
139
  The namespace to provision the resource in.
140
140
  The value should not contain leading or trailing forward slashes.
141
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
141
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
142
142
  *Available only for Vault Enterprise*.
143
143
  """
144
144
  return pulumi.get(self, "namespace")
@@ -185,7 +185,7 @@ class _SecretBackendState:
185
185
  for credentials issued by this backend. Defaults to '0'.
186
186
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
187
187
  The value should not contain leading or trailing forward slashes.
188
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
188
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
189
189
  *Available only for Vault Enterprise*.
190
190
  :param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
191
191
  not begin or end with a `/`. Defaults to `gcp`.
@@ -288,7 +288,7 @@ class _SecretBackendState:
288
288
  """
289
289
  The namespace to provision the resource in.
290
290
  The value should not contain leading or trailing forward slashes.
291
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
291
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
292
292
  *Available only for Vault Enterprise*.
293
293
  """
294
294
  return pulumi.get(self, "namespace")
@@ -350,7 +350,7 @@ class SecretBackend(pulumi.CustomResource):
350
350
  for credentials issued by this backend. Defaults to '0'.
351
351
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
352
352
  The value should not contain leading or trailing forward slashes.
353
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
353
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
354
354
  *Available only for Vault Enterprise*.
355
355
  :param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
356
356
  not begin or end with a `/`. Defaults to `gcp`.
@@ -451,7 +451,7 @@ class SecretBackend(pulumi.CustomResource):
451
451
  for credentials issued by this backend. Defaults to '0'.
452
452
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
453
453
  The value should not contain leading or trailing forward slashes.
454
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
454
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
455
455
  *Available only for Vault Enterprise*.
456
456
  :param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
457
457
  not begin or end with a `/`. Defaults to `gcp`.
@@ -527,7 +527,7 @@ class SecretBackend(pulumi.CustomResource):
527
527
  """
528
528
  The namespace to provision the resource in.
529
529
  The value should not contain leading or trailing forward slashes.
530
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
530
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
531
531
  *Available only for Vault Enterprise*.
532
532
  """
533
533
  return pulumi.get(self, "namespace")
@@ -31,7 +31,7 @@ class SecretRolesetArgs:
31
31
  :param pulumi.Input[str] roleset: Name of the Roleset to create
32
32
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
33
33
  The value should not contain leading or trailing forward slashes.
34
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
34
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
35
35
  *Available only for Vault Enterprise*.
36
36
  :param pulumi.Input[str] secret_type: Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
37
37
  :param pulumi.Input[Sequence[pulumi.Input[str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
@@ -101,7 +101,7 @@ class SecretRolesetArgs:
101
101
  """
102
102
  The namespace to provision the resource in.
103
103
  The value should not contain leading or trailing forward slashes.
104
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
104
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
105
105
  *Available only for Vault Enterprise*.
106
106
  """
107
107
  return pulumi.get(self, "namespace")
@@ -152,7 +152,7 @@ class _SecretRolesetState:
152
152
  :param pulumi.Input[Sequence[pulumi.Input['SecretRolesetBindingArgs']]] bindings: Bindings to create for this roleset. This can be specified multiple times for multiple bindings. Structure is documented below.
153
153
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
154
154
  The value should not contain leading or trailing forward slashes.
155
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
155
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
156
156
  *Available only for Vault Enterprise*.
157
157
  :param pulumi.Input[str] project: Name of the GCP project that this roleset's service account will belong to.
158
158
  :param pulumi.Input[str] roleset: Name of the Roleset to create
@@ -207,7 +207,7 @@ class _SecretRolesetState:
207
207
  """
208
208
  The namespace to provision the resource in.
209
209
  The value should not contain leading or trailing forward slashes.
210
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
210
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
211
211
  *Available only for Vault Enterprise*.
212
212
  """
213
213
  return pulumi.get(self, "namespace")
@@ -333,7 +333,7 @@ class SecretRoleset(pulumi.CustomResource):
333
333
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretRolesetBindingArgs']]]] bindings: Bindings to create for this roleset. This can be specified multiple times for multiple bindings. Structure is documented below.
334
334
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
335
335
  The value should not contain leading or trailing forward slashes.
336
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
336
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
337
337
  *Available only for Vault Enterprise*.
338
338
  :param pulumi.Input[str] project: Name of the GCP project that this roleset's service account will belong to.
339
339
  :param pulumi.Input[str] roleset: Name of the Roleset to create
@@ -459,7 +459,7 @@ class SecretRoleset(pulumi.CustomResource):
459
459
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretRolesetBindingArgs']]]] bindings: Bindings to create for this roleset. This can be specified multiple times for multiple bindings. Structure is documented below.
460
460
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
461
461
  The value should not contain leading or trailing forward slashes.
462
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
462
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
463
463
  *Available only for Vault Enterprise*.
464
464
  :param pulumi.Input[str] project: Name of the GCP project that this roleset's service account will belong to.
465
465
  :param pulumi.Input[str] roleset: Name of the Roleset to create
@@ -503,7 +503,7 @@ class SecretRoleset(pulumi.CustomResource):
503
503
  """
504
504
  The namespace to provision the resource in.
505
505
  The value should not contain leading or trailing forward slashes.
506
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
506
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
507
507
  *Available only for Vault Enterprise*.
508
508
  """
509
509
  return pulumi.get(self, "namespace")
@@ -31,7 +31,7 @@ class SecretStaticAccountArgs:
31
31
  :param pulumi.Input[Sequence[pulumi.Input['SecretStaticAccountBindingArgs']]] bindings: Bindings to create for this static account. This can be specified multiple times for multiple bindings. Structure is documented below.
32
32
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
33
33
  The value should not contain leading or trailing forward slashes.
34
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
34
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
35
35
  *Available only for Vault Enterprise*.
36
36
  :param pulumi.Input[str] secret_type: Type of secret generated for this static account. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
37
37
  :param pulumi.Input[Sequence[pulumi.Input[str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only).
@@ -102,7 +102,7 @@ class SecretStaticAccountArgs:
102
102
  """
103
103
  The namespace to provision the resource in.
104
104
  The value should not contain leading or trailing forward slashes.
105
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
105
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
106
106
  *Available only for Vault Enterprise*.
107
107
  """
108
108
  return pulumi.get(self, "namespace")
@@ -153,7 +153,7 @@ class _SecretStaticAccountState:
153
153
  :param pulumi.Input[Sequence[pulumi.Input['SecretStaticAccountBindingArgs']]] bindings: Bindings to create for this static account. This can be specified multiple times for multiple bindings. Structure is documented below.
154
154
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
155
155
  The value should not contain leading or trailing forward slashes.
156
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
156
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
157
157
  *Available only for Vault Enterprise*.
158
158
  :param pulumi.Input[str] secret_type: Type of secret generated for this static account. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
159
159
  :param pulumi.Input[str] service_account_email: Email of the GCP service account to manage.
@@ -208,7 +208,7 @@ class _SecretStaticAccountState:
208
208
  """
209
209
  The namespace to provision the resource in.
210
210
  The value should not contain leading or trailing forward slashes.
211
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
211
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
212
212
  *Available only for Vault Enterprise*.
213
213
  """
214
214
  return pulumi.get(self, "namespace")
@@ -336,7 +336,7 @@ class SecretStaticAccount(pulumi.CustomResource):
336
336
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretStaticAccountBindingArgs']]]] bindings: Bindings to create for this static account. This can be specified multiple times for multiple bindings. Structure is documented below.
337
337
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
338
338
  The value should not contain leading or trailing forward slashes.
339
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
339
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
340
340
  *Available only for Vault Enterprise*.
341
341
  :param pulumi.Input[str] secret_type: Type of secret generated for this static account. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
342
342
  :param pulumi.Input[str] service_account_email: Email of the GCP service account to manage.
@@ -462,7 +462,7 @@ class SecretStaticAccount(pulumi.CustomResource):
462
462
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretStaticAccountBindingArgs']]]] bindings: Bindings to create for this static account. This can be specified multiple times for multiple bindings. Structure is documented below.
463
463
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
464
464
  The value should not contain leading or trailing forward slashes.
465
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
465
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
466
466
  *Available only for Vault Enterprise*.
467
467
  :param pulumi.Input[str] secret_type: Type of secret generated for this static account. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
468
468
  :param pulumi.Input[str] service_account_email: Email of the GCP service account to manage.
@@ -506,7 +506,7 @@ class SecretStaticAccount(pulumi.CustomResource):
506
506
  """
507
507
  The namespace to provision the resource in.
508
508
  The value should not contain leading or trailing forward slashes.
509
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
509
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
510
510
  *Available only for Vault Enterprise*.
511
511
  """
512
512
  return pulumi.get(self, "namespace")