pulumi-vault 6.4.0__py3-none-any.whl → 6.4.0a1723454543__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +0 -560
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +4 -19
  4. pulumi_vault/ad/secret_backend.py +0 -5
  5. pulumi_vault/ad/secret_library.py +0 -5
  6. pulumi_vault/ad/secret_role.py +0 -5
  7. pulumi_vault/alicloud/auth_backend_role.py +0 -5
  8. pulumi_vault/approle/auth_backend_login.py +0 -5
  9. pulumi_vault/approle/auth_backend_role.py +0 -5
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -99
  11. pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
  12. pulumi_vault/audit.py +0 -5
  13. pulumi_vault/audit_request_header.py +0 -5
  14. pulumi_vault/auth_backend.py +0 -5
  15. pulumi_vault/aws/auth_backend_cert.py +0 -5
  16. pulumi_vault/aws/auth_backend_client.py +0 -5
  17. pulumi_vault/aws/auth_backend_config_identity.py +0 -5
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
  19. pulumi_vault/aws/auth_backend_login.py +7 -12
  20. pulumi_vault/aws/auth_backend_role.py +0 -5
  21. pulumi_vault/aws/auth_backend_role_tag.py +0 -5
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
  23. pulumi_vault/aws/auth_backend_sts_role.py +0 -5
  24. pulumi_vault/aws/get_access_credentials.py +4 -31
  25. pulumi_vault/aws/get_static_access_credentials.py +4 -18
  26. pulumi_vault/aws/secret_backend.py +0 -5
  27. pulumi_vault/aws/secret_backend_role.py +0 -5
  28. pulumi_vault/aws/secret_backend_static_role.py +0 -5
  29. pulumi_vault/azure/_inputs.py +0 -24
  30. pulumi_vault/azure/auth_backend_config.py +0 -5
  31. pulumi_vault/azure/auth_backend_role.py +0 -5
  32. pulumi_vault/azure/backend.py +0 -5
  33. pulumi_vault/azure/backend_role.py +0 -5
  34. pulumi_vault/azure/get_access_credentials.py +4 -36
  35. pulumi_vault/azure/outputs.py +0 -5
  36. pulumi_vault/cert_auth_backend_role.py +0 -5
  37. pulumi_vault/config/__init__.pyi +0 -5
  38. pulumi_vault/config/_inputs.py +0 -21
  39. pulumi_vault/config/outputs.py +0 -5
  40. pulumi_vault/config/ui_custom_message.py +14 -19
  41. pulumi_vault/config/vars.py +0 -5
  42. pulumi_vault/consul/secret_backend.py +0 -5
  43. pulumi_vault/consul/secret_backend_role.py +0 -5
  44. pulumi_vault/database/_inputs.py +105 -2256
  45. pulumi_vault/database/outputs.py +54 -199
  46. pulumi_vault/database/secret_backend_connection.py +14 -19
  47. pulumi_vault/database/secret_backend_role.py +14 -19
  48. pulumi_vault/database/secret_backend_static_role.py +1 -69
  49. pulumi_vault/database/secrets_mount.py +14 -19
  50. pulumi_vault/egp_policy.py +0 -5
  51. pulumi_vault/gcp/_inputs.py +0 -111
  52. pulumi_vault/gcp/auth_backend.py +0 -5
  53. pulumi_vault/gcp/auth_backend_role.py +0 -5
  54. pulumi_vault/gcp/get_auth_backend_role.py +4 -42
  55. pulumi_vault/gcp/outputs.py +0 -5
  56. pulumi_vault/gcp/secret_backend.py +0 -5
  57. pulumi_vault/gcp/secret_impersonated_account.py +3 -62
  58. pulumi_vault/gcp/secret_roleset.py +0 -5
  59. pulumi_vault/gcp/secret_static_account.py +0 -5
  60. pulumi_vault/generic/endpoint.py +0 -5
  61. pulumi_vault/generic/get_secret.py +5 -25
  62. pulumi_vault/generic/secret.py +7 -12
  63. pulumi_vault/get_auth_backend.py +4 -21
  64. pulumi_vault/get_auth_backends.py +4 -16
  65. pulumi_vault/get_namespace.py +5 -18
  66. pulumi_vault/get_namespaces.py +4 -13
  67. pulumi_vault/get_nomad_access_token.py +8 -28
  68. pulumi_vault/get_policy_document.py +4 -15
  69. pulumi_vault/get_raft_autopilot_state.py +7 -26
  70. pulumi_vault/github/_inputs.py +0 -55
  71. pulumi_vault/github/auth_backend.py +0 -5
  72. pulumi_vault/github/outputs.py +0 -5
  73. pulumi_vault/github/team.py +0 -5
  74. pulumi_vault/github/user.py +0 -5
  75. pulumi_vault/identity/entity.py +0 -5
  76. pulumi_vault/identity/entity_alias.py +0 -5
  77. pulumi_vault/identity/entity_policies.py +0 -5
  78. pulumi_vault/identity/get_entity.py +5 -35
  79. pulumi_vault/identity/get_group.py +6 -42
  80. pulumi_vault/identity/get_oidc_client_creds.py +4 -16
  81. pulumi_vault/identity/get_oidc_openid_config.py +4 -26
  82. pulumi_vault/identity/get_oidc_public_keys.py +5 -16
  83. pulumi_vault/identity/group.py +0 -5
  84. pulumi_vault/identity/group_alias.py +0 -5
  85. pulumi_vault/identity/group_member_entity_ids.py +0 -5
  86. pulumi_vault/identity/group_member_group_ids.py +0 -5
  87. pulumi_vault/identity/group_policies.py +0 -5
  88. pulumi_vault/identity/mfa_duo.py +0 -5
  89. pulumi_vault/identity/mfa_login_enforcement.py +0 -5
  90. pulumi_vault/identity/mfa_okta.py +0 -5
  91. pulumi_vault/identity/mfa_pingid.py +0 -5
  92. pulumi_vault/identity/mfa_totp.py +0 -5
  93. pulumi_vault/identity/oidc.py +0 -5
  94. pulumi_vault/identity/oidc_assignment.py +0 -5
  95. pulumi_vault/identity/oidc_client.py +0 -5
  96. pulumi_vault/identity/oidc_key.py +0 -5
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
  98. pulumi_vault/identity/oidc_provider.py +0 -5
  99. pulumi_vault/identity/oidc_role.py +0 -5
  100. pulumi_vault/identity/oidc_scope.py +0 -5
  101. pulumi_vault/identity/outputs.py +3 -8
  102. pulumi_vault/jwt/_inputs.py +0 -55
  103. pulumi_vault/jwt/auth_backend.py +0 -5
  104. pulumi_vault/jwt/auth_backend_role.py +28 -33
  105. pulumi_vault/jwt/outputs.py +0 -5
  106. pulumi_vault/kmip/secret_backend.py +0 -5
  107. pulumi_vault/kmip/secret_role.py +0 -5
  108. pulumi_vault/kmip/secret_scope.py +0 -5
  109. pulumi_vault/kubernetes/auth_backend_config.py +3 -55
  110. pulumi_vault/kubernetes/auth_backend_role.py +0 -5
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +7 -59
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
  113. pulumi_vault/kubernetes/get_service_account_token.py +4 -28
  114. pulumi_vault/kubernetes/secret_backend.py +14 -19
  115. pulumi_vault/kubernetes/secret_backend_role.py +0 -5
  116. pulumi_vault/kv/_inputs.py +4 -36
  117. pulumi_vault/kv/get_secret.py +5 -20
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +5 -24
  119. pulumi_vault/kv/get_secret_v2.py +8 -27
  120. pulumi_vault/kv/get_secrets_list.py +4 -15
  121. pulumi_vault/kv/get_secrets_list_v2.py +4 -18
  122. pulumi_vault/kv/outputs.py +3 -8
  123. pulumi_vault/kv/secret.py +7 -12
  124. pulumi_vault/kv/secret_backend_v2.py +0 -5
  125. pulumi_vault/kv/secret_v2.py +28 -33
  126. pulumi_vault/ldap/auth_backend.py +0 -52
  127. pulumi_vault/ldap/auth_backend_group.py +0 -5
  128. pulumi_vault/ldap/auth_backend_user.py +0 -5
  129. pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
  130. pulumi_vault/ldap/get_static_credentials.py +4 -23
  131. pulumi_vault/ldap/secret_backend.py +14 -19
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
  133. pulumi_vault/ldap/secret_backend_library_set.py +0 -5
  134. pulumi_vault/ldap/secret_backend_static_role.py +0 -5
  135. pulumi_vault/managed/_inputs.py +0 -205
  136. pulumi_vault/managed/keys.py +0 -5
  137. pulumi_vault/managed/outputs.py +0 -5
  138. pulumi_vault/mfa_duo.py +0 -5
  139. pulumi_vault/mfa_okta.py +0 -5
  140. pulumi_vault/mfa_pingid.py +0 -5
  141. pulumi_vault/mfa_totp.py +0 -5
  142. pulumi_vault/mongodbatlas/secret_backend.py +0 -5
  143. pulumi_vault/mongodbatlas/secret_role.py +0 -5
  144. pulumi_vault/mount.py +16 -21
  145. pulumi_vault/namespace.py +14 -19
  146. pulumi_vault/nomad_secret_backend.py +0 -5
  147. pulumi_vault/nomad_secret_role.py +0 -5
  148. pulumi_vault/okta/_inputs.py +0 -39
  149. pulumi_vault/okta/auth_backend.py +0 -5
  150. pulumi_vault/okta/auth_backend_group.py +0 -5
  151. pulumi_vault/okta/auth_backend_user.py +0 -5
  152. pulumi_vault/okta/outputs.py +0 -5
  153. pulumi_vault/outputs.py +0 -5
  154. pulumi_vault/password_policy.py +0 -5
  155. pulumi_vault/pkisecret/_inputs.py +8 -49
  156. pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
  157. pulumi_vault/pkisecret/backend_config_est.py +14 -19
  158. pulumi_vault/pkisecret/get_backend_config_est.py +5 -23
  159. pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
  160. pulumi_vault/pkisecret/get_backend_issuers.py +5 -18
  161. pulumi_vault/pkisecret/get_backend_key.py +4 -19
  162. pulumi_vault/pkisecret/get_backend_keys.py +5 -18
  163. pulumi_vault/pkisecret/outputs.py +12 -17
  164. pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
  172. pulumi_vault/pkisecret/secret_backend_key.py +0 -5
  173. pulumi_vault/pkisecret/secret_backend_role.py +0 -5
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
  176. pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
  177. pulumi_vault/plugin.py +0 -5
  178. pulumi_vault/plugin_pinned_version.py +0 -5
  179. pulumi_vault/policy.py +0 -5
  180. pulumi_vault/provider.py +0 -5
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +0 -5
  183. pulumi_vault/quota_rate_limit.py +0 -5
  184. pulumi_vault/rabbitmq/_inputs.py +0 -61
  185. pulumi_vault/rabbitmq/outputs.py +0 -5
  186. pulumi_vault/rabbitmq/secret_backend.py +0 -5
  187. pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
  188. pulumi_vault/raft_autopilot.py +0 -5
  189. pulumi_vault/raft_snapshot_agent_config.py +0 -5
  190. pulumi_vault/rgp_policy.py +0 -5
  191. pulumi_vault/saml/auth_backend.py +0 -5
  192. pulumi_vault/saml/auth_backend_role.py +14 -19
  193. pulumi_vault/secrets/_inputs.py +0 -30
  194. pulumi_vault/secrets/outputs.py +0 -5
  195. pulumi_vault/secrets/sync_association.py +0 -5
  196. pulumi_vault/secrets/sync_aws_destination.py +14 -19
  197. pulumi_vault/secrets/sync_azure_destination.py +14 -19
  198. pulumi_vault/secrets/sync_config.py +0 -5
  199. pulumi_vault/secrets/sync_gcp_destination.py +14 -19
  200. pulumi_vault/secrets/sync_gh_destination.py +0 -5
  201. pulumi_vault/secrets/sync_github_apps.py +0 -5
  202. pulumi_vault/secrets/sync_vercel_destination.py +0 -5
  203. pulumi_vault/ssh/_inputs.py +0 -22
  204. pulumi_vault/ssh/outputs.py +0 -5
  205. pulumi_vault/ssh/secret_backend_ca.py +0 -5
  206. pulumi_vault/ssh/secret_backend_role.py +28 -67
  207. pulumi_vault/terraformcloud/secret_backend.py +0 -5
  208. pulumi_vault/terraformcloud/secret_creds.py +0 -5
  209. pulumi_vault/terraformcloud/secret_role.py +0 -5
  210. pulumi_vault/token.py +0 -5
  211. pulumi_vault/tokenauth/auth_backend_role.py +14 -5
  212. pulumi_vault/transform/alphabet.py +0 -5
  213. pulumi_vault/transform/get_decode.py +14 -38
  214. pulumi_vault/transform/get_encode.py +14 -38
  215. pulumi_vault/transform/role.py +0 -5
  216. pulumi_vault/transform/template.py +14 -19
  217. pulumi_vault/transform/transformation.py +0 -5
  218. pulumi_vault/transit/get_decrypt.py +4 -21
  219. pulumi_vault/transit/get_encrypt.py +4 -23
  220. pulumi_vault/transit/secret_backend_key.py +7 -12
  221. pulumi_vault/transit/secret_cache_config.py +0 -5
  222. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/METADATA +2 -3
  223. pulumi_vault-6.4.0a1723454543.dist-info/RECORD +256 -0
  224. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/WHEEL +1 -1
  225. pulumi_vault-6.4.0.dist-info/RECORD +0 -256
  226. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/top_level.txt +0 -0
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SyncGithubAppsArgs', 'SyncGithubApps']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SyncVercelDestinationArgs', 'SyncVercelDestination']
@@ -4,37 +4,15 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
18
13
  'SecretBackendRoleAllowedUserKeyConfigArgs',
19
- 'SecretBackendRoleAllowedUserKeyConfigArgsDict',
20
14
  ]
21
15
 
22
- MYPY = False
23
-
24
- if not MYPY:
25
- class SecretBackendRoleAllowedUserKeyConfigArgsDict(TypedDict):
26
- lengths: pulumi.Input[Sequence[pulumi.Input[int]]]
27
- """
28
- List of allowed key lengths, vault-1.10 and above
29
- """
30
- type: pulumi.Input[str]
31
- """
32
- Key type, choices:
33
- rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
34
- """
35
- elif False:
36
- SecretBackendRoleAllowedUserKeyConfigArgsDict: TypeAlias = Mapping[str, Any]
37
-
38
16
  @pulumi.input_type
39
17
  class SecretBackendRoleAllowedUserKeyConfigArgs:
40
18
  def __init__(__self__, *,
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretBackendCaArgs', 'SecretBackendCa']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
  from . import outputs
17
12
  from ._inputs import *
@@ -25,7 +20,6 @@ class SecretBackendRoleArgs:
25
20
  key_type: pulumi.Input[str],
26
21
  algorithm_signer: Optional[pulumi.Input[str]] = None,
27
22
  allow_bare_domains: Optional[pulumi.Input[bool]] = None,
28
- allow_empty_principals: Optional[pulumi.Input[bool]] = None,
29
23
  allow_host_certificates: Optional[pulumi.Input[bool]] = None,
30
24
  allow_subdomains: Optional[pulumi.Input[bool]] = None,
31
25
  allow_user_certificates: Optional[pulumi.Input[bool]] = None,
@@ -38,8 +32,8 @@ class SecretBackendRoleArgs:
38
32
  allowed_users: Optional[pulumi.Input[str]] = None,
39
33
  allowed_users_template: Optional[pulumi.Input[bool]] = None,
40
34
  cidr_list: Optional[pulumi.Input[str]] = None,
41
- default_critical_options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
42
- default_extensions: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
35
+ default_critical_options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
36
+ default_extensions: Optional[pulumi.Input[Mapping[str, Any]]] = None,
43
37
  default_user: Optional[pulumi.Input[str]] = None,
44
38
  default_user_template: Optional[pulumi.Input[bool]] = None,
45
39
  key_id_format: Optional[pulumi.Input[str]] = None,
@@ -69,8 +63,8 @@ class SecretBackendRoleArgs:
69
63
  :param pulumi.Input[str] allowed_users: Specifies a comma-separated list of usernames that are to be allowed, only if certain usernames are to be allowed.
70
64
  :param pulumi.Input[bool] allowed_users_template: Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
71
65
  :param pulumi.Input[str] cidr_list: The comma-separated string of CIDR blocks for which this role is applicable.
72
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] default_critical_options: Specifies a map of critical options that certificates have when signed.
73
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] default_extensions: Specifies a map of extensions that certificates have when signed.
66
+ :param pulumi.Input[Mapping[str, Any]] default_critical_options: Specifies a map of critical options that certificates have when signed.
67
+ :param pulumi.Input[Mapping[str, Any]] default_extensions: Specifies a map of extensions that certificates have when signed.
74
68
  :param pulumi.Input[str] default_user: Specifies the default username for which a credential will be generated.
75
69
  :param pulumi.Input[bool] default_user_template: If set, `default_users` can be specified using identity template values. A non-templated user is also permitted.
76
70
  :param pulumi.Input[str] key_id_format: Specifies a custom format for the key id of a signed certificate.
@@ -89,8 +83,6 @@ class SecretBackendRoleArgs:
89
83
  pulumi.set(__self__, "algorithm_signer", algorithm_signer)
90
84
  if allow_bare_domains is not None:
91
85
  pulumi.set(__self__, "allow_bare_domains", allow_bare_domains)
92
- if allow_empty_principals is not None:
93
- pulumi.set(__self__, "allow_empty_principals", allow_empty_principals)
94
86
  if allow_host_certificates is not None:
95
87
  pulumi.set(__self__, "allow_host_certificates", allow_host_certificates)
96
88
  if allow_subdomains is not None:
@@ -184,15 +176,6 @@ class SecretBackendRoleArgs:
184
176
  def allow_bare_domains(self, value: Optional[pulumi.Input[bool]]):
185
177
  pulumi.set(self, "allow_bare_domains", value)
186
178
 
187
- @property
188
- @pulumi.getter(name="allowEmptyPrincipals")
189
- def allow_empty_principals(self) -> Optional[pulumi.Input[bool]]:
190
- return pulumi.get(self, "allow_empty_principals")
191
-
192
- @allow_empty_principals.setter
193
- def allow_empty_principals(self, value: Optional[pulumi.Input[bool]]):
194
- pulumi.set(self, "allow_empty_principals", value)
195
-
196
179
  @property
197
180
  @pulumi.getter(name="allowHostCertificates")
198
181
  def allow_host_certificates(self) -> Optional[pulumi.Input[bool]]:
@@ -342,26 +325,26 @@ class SecretBackendRoleArgs:
342
325
 
343
326
  @property
344
327
  @pulumi.getter(name="defaultCriticalOptions")
345
- def default_critical_options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
328
+ def default_critical_options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
346
329
  """
347
330
  Specifies a map of critical options that certificates have when signed.
348
331
  """
349
332
  return pulumi.get(self, "default_critical_options")
350
333
 
351
334
  @default_critical_options.setter
352
- def default_critical_options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
335
+ def default_critical_options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
353
336
  pulumi.set(self, "default_critical_options", value)
354
337
 
355
338
  @property
356
339
  @pulumi.getter(name="defaultExtensions")
357
- def default_extensions(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
340
+ def default_extensions(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
358
341
  """
359
342
  Specifies a map of extensions that certificates have when signed.
360
343
  """
361
344
  return pulumi.get(self, "default_extensions")
362
345
 
363
346
  @default_extensions.setter
364
- def default_extensions(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
347
+ def default_extensions(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
365
348
  pulumi.set(self, "default_extensions", value)
366
349
 
367
350
  @property
@@ -469,7 +452,6 @@ class _SecretBackendRoleState:
469
452
  def __init__(__self__, *,
470
453
  algorithm_signer: Optional[pulumi.Input[str]] = None,
471
454
  allow_bare_domains: Optional[pulumi.Input[bool]] = None,
472
- allow_empty_principals: Optional[pulumi.Input[bool]] = None,
473
455
  allow_host_certificates: Optional[pulumi.Input[bool]] = None,
474
456
  allow_subdomains: Optional[pulumi.Input[bool]] = None,
475
457
  allow_user_certificates: Optional[pulumi.Input[bool]] = None,
@@ -483,8 +465,8 @@ class _SecretBackendRoleState:
483
465
  allowed_users_template: Optional[pulumi.Input[bool]] = None,
484
466
  backend: Optional[pulumi.Input[str]] = None,
485
467
  cidr_list: Optional[pulumi.Input[str]] = None,
486
- default_critical_options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
487
- default_extensions: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
468
+ default_critical_options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
469
+ default_extensions: Optional[pulumi.Input[Mapping[str, Any]]] = None,
488
470
  default_user: Optional[pulumi.Input[str]] = None,
489
471
  default_user_template: Optional[pulumi.Input[bool]] = None,
490
472
  key_id_format: Optional[pulumi.Input[str]] = None,
@@ -514,8 +496,8 @@ class _SecretBackendRoleState:
514
496
  :param pulumi.Input[bool] allowed_users_template: Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
515
497
  :param pulumi.Input[str] backend: The path where the SSH secret backend is mounted.
516
498
  :param pulumi.Input[str] cidr_list: The comma-separated string of CIDR blocks for which this role is applicable.
517
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] default_critical_options: Specifies a map of critical options that certificates have when signed.
518
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] default_extensions: Specifies a map of extensions that certificates have when signed.
499
+ :param pulumi.Input[Mapping[str, Any]] default_critical_options: Specifies a map of critical options that certificates have when signed.
500
+ :param pulumi.Input[Mapping[str, Any]] default_extensions: Specifies a map of extensions that certificates have when signed.
519
501
  :param pulumi.Input[str] default_user: Specifies the default username for which a credential will be generated.
520
502
  :param pulumi.Input[bool] default_user_template: If set, `default_users` can be specified using identity template values. A non-templated user is also permitted.
521
503
  :param pulumi.Input[str] key_id_format: Specifies a custom format for the key id of a signed certificate.
@@ -533,8 +515,6 @@ class _SecretBackendRoleState:
533
515
  pulumi.set(__self__, "algorithm_signer", algorithm_signer)
534
516
  if allow_bare_domains is not None:
535
517
  pulumi.set(__self__, "allow_bare_domains", allow_bare_domains)
536
- if allow_empty_principals is not None:
537
- pulumi.set(__self__, "allow_empty_principals", allow_empty_principals)
538
518
  if allow_host_certificates is not None:
539
519
  pulumi.set(__self__, "allow_host_certificates", allow_host_certificates)
540
520
  if allow_subdomains is not None:
@@ -608,15 +588,6 @@ class _SecretBackendRoleState:
608
588
  def allow_bare_domains(self, value: Optional[pulumi.Input[bool]]):
609
589
  pulumi.set(self, "allow_bare_domains", value)
610
590
 
611
- @property
612
- @pulumi.getter(name="allowEmptyPrincipals")
613
- def allow_empty_principals(self) -> Optional[pulumi.Input[bool]]:
614
- return pulumi.get(self, "allow_empty_principals")
615
-
616
- @allow_empty_principals.setter
617
- def allow_empty_principals(self, value: Optional[pulumi.Input[bool]]):
618
- pulumi.set(self, "allow_empty_principals", value)
619
-
620
591
  @property
621
592
  @pulumi.getter(name="allowHostCertificates")
622
593
  def allow_host_certificates(self) -> Optional[pulumi.Input[bool]]:
@@ -778,26 +749,26 @@ class _SecretBackendRoleState:
778
749
 
779
750
  @property
780
751
  @pulumi.getter(name="defaultCriticalOptions")
781
- def default_critical_options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
752
+ def default_critical_options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
782
753
  """
783
754
  Specifies a map of critical options that certificates have when signed.
784
755
  """
785
756
  return pulumi.get(self, "default_critical_options")
786
757
 
787
758
  @default_critical_options.setter
788
- def default_critical_options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
759
+ def default_critical_options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
789
760
  pulumi.set(self, "default_critical_options", value)
790
761
 
791
762
  @property
792
763
  @pulumi.getter(name="defaultExtensions")
793
- def default_extensions(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
764
+ def default_extensions(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
794
765
  """
795
766
  Specifies a map of extensions that certificates have when signed.
796
767
  """
797
768
  return pulumi.get(self, "default_extensions")
798
769
 
799
770
  @default_extensions.setter
800
- def default_extensions(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
771
+ def default_extensions(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
801
772
  pulumi.set(self, "default_extensions", value)
802
773
 
803
774
  @property
@@ -919,7 +890,6 @@ class SecretBackendRole(pulumi.CustomResource):
919
890
  opts: Optional[pulumi.ResourceOptions] = None,
920
891
  algorithm_signer: Optional[pulumi.Input[str]] = None,
921
892
  allow_bare_domains: Optional[pulumi.Input[bool]] = None,
922
- allow_empty_principals: Optional[pulumi.Input[bool]] = None,
923
893
  allow_host_certificates: Optional[pulumi.Input[bool]] = None,
924
894
  allow_subdomains: Optional[pulumi.Input[bool]] = None,
925
895
  allow_user_certificates: Optional[pulumi.Input[bool]] = None,
@@ -933,8 +903,8 @@ class SecretBackendRole(pulumi.CustomResource):
933
903
  allowed_users_template: Optional[pulumi.Input[bool]] = None,
934
904
  backend: Optional[pulumi.Input[str]] = None,
935
905
  cidr_list: Optional[pulumi.Input[str]] = None,
936
- default_critical_options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
937
- default_extensions: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
906
+ default_critical_options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
907
+ default_extensions: Optional[pulumi.Input[Mapping[str, Any]]] = None,
938
908
  default_user: Optional[pulumi.Input[str]] = None,
939
909
  default_user_template: Optional[pulumi.Input[bool]] = None,
940
910
  key_id_format: Optional[pulumi.Input[str]] = None,
@@ -998,8 +968,8 @@ class SecretBackendRole(pulumi.CustomResource):
998
968
  :param pulumi.Input[bool] allowed_users_template: Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
999
969
  :param pulumi.Input[str] backend: The path where the SSH secret backend is mounted.
1000
970
  :param pulumi.Input[str] cidr_list: The comma-separated string of CIDR blocks for which this role is applicable.
1001
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] default_critical_options: Specifies a map of critical options that certificates have when signed.
1002
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] default_extensions: Specifies a map of extensions that certificates have when signed.
971
+ :param pulumi.Input[Mapping[str, Any]] default_critical_options: Specifies a map of critical options that certificates have when signed.
972
+ :param pulumi.Input[Mapping[str, Any]] default_extensions: Specifies a map of extensions that certificates have when signed.
1003
973
  :param pulumi.Input[str] default_user: Specifies the default username for which a credential will be generated.
1004
974
  :param pulumi.Input[bool] default_user_template: If set, `default_users` can be specified using identity template values. A non-templated user is also permitted.
1005
975
  :param pulumi.Input[str] key_id_format: Specifies a custom format for the key id of a signed certificate.
@@ -1069,7 +1039,6 @@ class SecretBackendRole(pulumi.CustomResource):
1069
1039
  opts: Optional[pulumi.ResourceOptions] = None,
1070
1040
  algorithm_signer: Optional[pulumi.Input[str]] = None,
1071
1041
  allow_bare_domains: Optional[pulumi.Input[bool]] = None,
1072
- allow_empty_principals: Optional[pulumi.Input[bool]] = None,
1073
1042
  allow_host_certificates: Optional[pulumi.Input[bool]] = None,
1074
1043
  allow_subdomains: Optional[pulumi.Input[bool]] = None,
1075
1044
  allow_user_certificates: Optional[pulumi.Input[bool]] = None,
@@ -1083,8 +1052,8 @@ class SecretBackendRole(pulumi.CustomResource):
1083
1052
  allowed_users_template: Optional[pulumi.Input[bool]] = None,
1084
1053
  backend: Optional[pulumi.Input[str]] = None,
1085
1054
  cidr_list: Optional[pulumi.Input[str]] = None,
1086
- default_critical_options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1087
- default_extensions: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1055
+ default_critical_options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1056
+ default_extensions: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1088
1057
  default_user: Optional[pulumi.Input[str]] = None,
1089
1058
  default_user_template: Optional[pulumi.Input[bool]] = None,
1090
1059
  key_id_format: Optional[pulumi.Input[str]] = None,
@@ -1105,7 +1074,6 @@ class SecretBackendRole(pulumi.CustomResource):
1105
1074
 
1106
1075
  __props__.__dict__["algorithm_signer"] = algorithm_signer
1107
1076
  __props__.__dict__["allow_bare_domains"] = allow_bare_domains
1108
- __props__.__dict__["allow_empty_principals"] = allow_empty_principals
1109
1077
  __props__.__dict__["allow_host_certificates"] = allow_host_certificates
1110
1078
  __props__.__dict__["allow_subdomains"] = allow_subdomains
1111
1079
  __props__.__dict__["allow_user_certificates"] = allow_user_certificates
@@ -1146,7 +1114,6 @@ class SecretBackendRole(pulumi.CustomResource):
1146
1114
  opts: Optional[pulumi.ResourceOptions] = None,
1147
1115
  algorithm_signer: Optional[pulumi.Input[str]] = None,
1148
1116
  allow_bare_domains: Optional[pulumi.Input[bool]] = None,
1149
- allow_empty_principals: Optional[pulumi.Input[bool]] = None,
1150
1117
  allow_host_certificates: Optional[pulumi.Input[bool]] = None,
1151
1118
  allow_subdomains: Optional[pulumi.Input[bool]] = None,
1152
1119
  allow_user_certificates: Optional[pulumi.Input[bool]] = None,
@@ -1160,8 +1127,8 @@ class SecretBackendRole(pulumi.CustomResource):
1160
1127
  allowed_users_template: Optional[pulumi.Input[bool]] = None,
1161
1128
  backend: Optional[pulumi.Input[str]] = None,
1162
1129
  cidr_list: Optional[pulumi.Input[str]] = None,
1163
- default_critical_options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1164
- default_extensions: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1130
+ default_critical_options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1131
+ default_extensions: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1165
1132
  default_user: Optional[pulumi.Input[str]] = None,
1166
1133
  default_user_template: Optional[pulumi.Input[bool]] = None,
1167
1134
  key_id_format: Optional[pulumi.Input[str]] = None,
@@ -1196,8 +1163,8 @@ class SecretBackendRole(pulumi.CustomResource):
1196
1163
  :param pulumi.Input[bool] allowed_users_template: Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
1197
1164
  :param pulumi.Input[str] backend: The path where the SSH secret backend is mounted.
1198
1165
  :param pulumi.Input[str] cidr_list: The comma-separated string of CIDR blocks for which this role is applicable.
1199
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] default_critical_options: Specifies a map of critical options that certificates have when signed.
1200
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] default_extensions: Specifies a map of extensions that certificates have when signed.
1166
+ :param pulumi.Input[Mapping[str, Any]] default_critical_options: Specifies a map of critical options that certificates have when signed.
1167
+ :param pulumi.Input[Mapping[str, Any]] default_extensions: Specifies a map of extensions that certificates have when signed.
1201
1168
  :param pulumi.Input[str] default_user: Specifies the default username for which a credential will be generated.
1202
1169
  :param pulumi.Input[bool] default_user_template: If set, `default_users` can be specified using identity template values. A non-templated user is also permitted.
1203
1170
  :param pulumi.Input[str] key_id_format: Specifies a custom format for the key id of a signed certificate.
@@ -1217,7 +1184,6 @@ class SecretBackendRole(pulumi.CustomResource):
1217
1184
 
1218
1185
  __props__.__dict__["algorithm_signer"] = algorithm_signer
1219
1186
  __props__.__dict__["allow_bare_domains"] = allow_bare_domains
1220
- __props__.__dict__["allow_empty_principals"] = allow_empty_principals
1221
1187
  __props__.__dict__["allow_host_certificates"] = allow_host_certificates
1222
1188
  __props__.__dict__["allow_subdomains"] = allow_subdomains
1223
1189
  __props__.__dict__["allow_user_certificates"] = allow_user_certificates
@@ -1260,11 +1226,6 @@ class SecretBackendRole(pulumi.CustomResource):
1260
1226
  """
1261
1227
  return pulumi.get(self, "allow_bare_domains")
1262
1228
 
1263
- @property
1264
- @pulumi.getter(name="allowEmptyPrincipals")
1265
- def allow_empty_principals(self) -> pulumi.Output[Optional[bool]]:
1266
- return pulumi.get(self, "allow_empty_principals")
1267
-
1268
1229
  @property
1269
1230
  @pulumi.getter(name="allowHostCertificates")
1270
1231
  def allow_host_certificates(self) -> pulumi.Output[Optional[bool]]:
@@ -1374,7 +1335,7 @@ class SecretBackendRole(pulumi.CustomResource):
1374
1335
 
1375
1336
  @property
1376
1337
  @pulumi.getter(name="defaultCriticalOptions")
1377
- def default_critical_options(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
1338
+ def default_critical_options(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
1378
1339
  """
1379
1340
  Specifies a map of critical options that certificates have when signed.
1380
1341
  """
@@ -1382,7 +1343,7 @@ class SecretBackendRole(pulumi.CustomResource):
1382
1343
 
1383
1344
  @property
1384
1345
  @pulumi.getter(name="defaultExtensions")
1385
- def default_extensions(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
1346
+ def default_extensions(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
1386
1347
  """
1387
1348
  Specifies a map of extensions that certificates have when signed.
1388
1349
  """
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretBackendArgs', 'SecretBackend']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretCredsArgs', 'SecretCreds']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretRoleArgs', 'SecretRole']
pulumi_vault/token.py CHANGED
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
 
17
12
  __all__ = ['TokenArgs', 'Token']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
@@ -52,6 +47,8 @@ class AuthBackendRoleArgs:
52
47
  *Available only for Vault Enterprise*.
53
48
  :param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
54
49
  :param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
50
+
51
+ > Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
55
52
  :param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
56
53
  :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
57
54
  :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
@@ -205,6 +202,8 @@ class AuthBackendRoleArgs:
205
202
  def path_suffix(self) -> Optional[pulumi.Input[str]]:
206
203
  """
207
204
  Tokens created against this role will have the given suffix as part of their path in addition to the role name.
205
+
206
+ > Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
208
207
  """
209
208
  return pulumi.get(self, "path_suffix")
210
209
 
@@ -368,6 +367,8 @@ class _AuthBackendRoleState:
368
367
  *Available only for Vault Enterprise*.
369
368
  :param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
370
369
  :param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
370
+
371
+ > Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
371
372
  :param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
372
373
  :param pulumi.Input[str] role_name: The name of the role.
373
374
  :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
@@ -511,6 +512,8 @@ class _AuthBackendRoleState:
511
512
  def path_suffix(self) -> Optional[pulumi.Input[str]]:
512
513
  """
513
514
  Tokens created against this role will have the given suffix as part of their path in addition to the role name.
515
+
516
+ > Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
514
517
  """
515
518
  return pulumi.get(self, "path_suffix")
516
519
 
@@ -723,6 +726,8 @@ class AuthBackendRole(pulumi.CustomResource):
723
726
  *Available only for Vault Enterprise*.
724
727
  :param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
725
728
  :param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
729
+
730
+ > Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
726
731
  :param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
727
732
  :param pulumi.Input[str] role_name: The name of the role.
728
733
  :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
@@ -886,6 +891,8 @@ class AuthBackendRole(pulumi.CustomResource):
886
891
  *Available only for Vault Enterprise*.
887
892
  :param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
888
893
  :param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
894
+
895
+ > Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
889
896
  :param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
890
897
  :param pulumi.Input[str] role_name: The name of the role.
891
898
  :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
@@ -987,6 +994,8 @@ class AuthBackendRole(pulumi.CustomResource):
987
994
  def path_suffix(self) -> pulumi.Output[Optional[str]]:
988
995
  """
989
996
  Tokens created against this role will have the given suffix as part of their path in addition to the role name.
997
+
998
+ > Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
990
999
  """
991
1000
  return pulumi.get(self, "path_suffix")
992
1001
 
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['AlphabetArgs', 'Alphabet']