pulumi-vault 6.4.0__py3-none-any.whl → 6.4.0a1723820369__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +0 -560
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +4 -19
  4. pulumi_vault/ad/secret_backend.py +0 -5
  5. pulumi_vault/ad/secret_library.py +0 -5
  6. pulumi_vault/ad/secret_role.py +0 -5
  7. pulumi_vault/alicloud/auth_backend_role.py +0 -5
  8. pulumi_vault/approle/auth_backend_login.py +0 -5
  9. pulumi_vault/approle/auth_backend_role.py +0 -5
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -99
  11. pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
  12. pulumi_vault/audit.py +0 -5
  13. pulumi_vault/audit_request_header.py +0 -5
  14. pulumi_vault/auth_backend.py +0 -5
  15. pulumi_vault/aws/auth_backend_cert.py +0 -5
  16. pulumi_vault/aws/auth_backend_client.py +0 -5
  17. pulumi_vault/aws/auth_backend_config_identity.py +0 -5
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
  19. pulumi_vault/aws/auth_backend_login.py +0 -5
  20. pulumi_vault/aws/auth_backend_role.py +0 -5
  21. pulumi_vault/aws/auth_backend_role_tag.py +0 -5
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
  23. pulumi_vault/aws/auth_backend_sts_role.py +0 -5
  24. pulumi_vault/aws/get_access_credentials.py +4 -31
  25. pulumi_vault/aws/get_static_access_credentials.py +4 -18
  26. pulumi_vault/aws/secret_backend.py +0 -5
  27. pulumi_vault/aws/secret_backend_role.py +0 -5
  28. pulumi_vault/aws/secret_backend_static_role.py +0 -5
  29. pulumi_vault/azure/_inputs.py +0 -24
  30. pulumi_vault/azure/auth_backend_config.py +0 -5
  31. pulumi_vault/azure/auth_backend_role.py +0 -5
  32. pulumi_vault/azure/backend.py +0 -5
  33. pulumi_vault/azure/backend_role.py +0 -5
  34. pulumi_vault/azure/get_access_credentials.py +4 -36
  35. pulumi_vault/azure/outputs.py +0 -5
  36. pulumi_vault/cert_auth_backend_role.py +0 -5
  37. pulumi_vault/config/__init__.pyi +0 -5
  38. pulumi_vault/config/_inputs.py +0 -21
  39. pulumi_vault/config/outputs.py +0 -5
  40. pulumi_vault/config/ui_custom_message.py +0 -5
  41. pulumi_vault/config/vars.py +0 -5
  42. pulumi_vault/consul/secret_backend.py +0 -5
  43. pulumi_vault/consul/secret_backend_role.py +0 -5
  44. pulumi_vault/database/_inputs.py +34 -2185
  45. pulumi_vault/database/outputs.py +0 -145
  46. pulumi_vault/database/secret_backend_connection.py +0 -5
  47. pulumi_vault/database/secret_backend_role.py +0 -5
  48. pulumi_vault/database/secret_backend_static_role.py +1 -69
  49. pulumi_vault/database/secrets_mount.py +0 -5
  50. pulumi_vault/egp_policy.py +0 -5
  51. pulumi_vault/gcp/_inputs.py +0 -111
  52. pulumi_vault/gcp/auth_backend.py +0 -5
  53. pulumi_vault/gcp/auth_backend_role.py +0 -5
  54. pulumi_vault/gcp/get_auth_backend_role.py +4 -42
  55. pulumi_vault/gcp/outputs.py +0 -5
  56. pulumi_vault/gcp/secret_backend.py +0 -5
  57. pulumi_vault/gcp/secret_impersonated_account.py +3 -62
  58. pulumi_vault/gcp/secret_roleset.py +0 -5
  59. pulumi_vault/gcp/secret_static_account.py +0 -5
  60. pulumi_vault/generic/endpoint.py +0 -5
  61. pulumi_vault/generic/get_secret.py +4 -24
  62. pulumi_vault/generic/secret.py +0 -5
  63. pulumi_vault/get_auth_backend.py +4 -21
  64. pulumi_vault/get_auth_backends.py +4 -16
  65. pulumi_vault/get_namespace.py +4 -17
  66. pulumi_vault/get_namespaces.py +4 -13
  67. pulumi_vault/get_nomad_access_token.py +4 -18
  68. pulumi_vault/get_policy_document.py +4 -15
  69. pulumi_vault/get_raft_autopilot_state.py +4 -23
  70. pulumi_vault/github/_inputs.py +0 -55
  71. pulumi_vault/github/auth_backend.py +0 -5
  72. pulumi_vault/github/outputs.py +0 -5
  73. pulumi_vault/github/team.py +0 -5
  74. pulumi_vault/github/user.py +0 -5
  75. pulumi_vault/identity/entity.py +0 -5
  76. pulumi_vault/identity/entity_alias.py +0 -5
  77. pulumi_vault/identity/entity_policies.py +0 -5
  78. pulumi_vault/identity/get_entity.py +4 -34
  79. pulumi_vault/identity/get_group.py +4 -40
  80. pulumi_vault/identity/get_oidc_client_creds.py +4 -16
  81. pulumi_vault/identity/get_oidc_openid_config.py +4 -26
  82. pulumi_vault/identity/get_oidc_public_keys.py +4 -15
  83. pulumi_vault/identity/group.py +0 -5
  84. pulumi_vault/identity/group_alias.py +0 -5
  85. pulumi_vault/identity/group_member_entity_ids.py +0 -5
  86. pulumi_vault/identity/group_member_group_ids.py +0 -5
  87. pulumi_vault/identity/group_policies.py +0 -5
  88. pulumi_vault/identity/mfa_duo.py +0 -5
  89. pulumi_vault/identity/mfa_login_enforcement.py +0 -5
  90. pulumi_vault/identity/mfa_okta.py +0 -5
  91. pulumi_vault/identity/mfa_pingid.py +0 -5
  92. pulumi_vault/identity/mfa_totp.py +0 -5
  93. pulumi_vault/identity/oidc.py +0 -5
  94. pulumi_vault/identity/oidc_assignment.py +0 -5
  95. pulumi_vault/identity/oidc_client.py +0 -5
  96. pulumi_vault/identity/oidc_key.py +0 -5
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
  98. pulumi_vault/identity/oidc_provider.py +0 -5
  99. pulumi_vault/identity/oidc_role.py +0 -5
  100. pulumi_vault/identity/oidc_scope.py +0 -5
  101. pulumi_vault/identity/outputs.py +0 -5
  102. pulumi_vault/jwt/_inputs.py +0 -55
  103. pulumi_vault/jwt/auth_backend.py +0 -5
  104. pulumi_vault/jwt/auth_backend_role.py +0 -5
  105. pulumi_vault/jwt/outputs.py +0 -5
  106. pulumi_vault/kmip/secret_backend.py +0 -5
  107. pulumi_vault/kmip/secret_role.py +0 -5
  108. pulumi_vault/kmip/secret_scope.py +0 -5
  109. pulumi_vault/kubernetes/auth_backend_config.py +3 -55
  110. pulumi_vault/kubernetes/auth_backend_role.py +0 -5
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +7 -59
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
  113. pulumi_vault/kubernetes/get_service_account_token.py +4 -28
  114. pulumi_vault/kubernetes/secret_backend.py +0 -5
  115. pulumi_vault/kubernetes/secret_backend_role.py +0 -5
  116. pulumi_vault/kv/_inputs.py +0 -32
  117. pulumi_vault/kv/get_secret.py +4 -19
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +4 -23
  119. pulumi_vault/kv/get_secret_v2.py +6 -25
  120. pulumi_vault/kv/get_secrets_list.py +4 -15
  121. pulumi_vault/kv/get_secrets_list_v2.py +4 -18
  122. pulumi_vault/kv/outputs.py +0 -5
  123. pulumi_vault/kv/secret.py +0 -5
  124. pulumi_vault/kv/secret_backend_v2.py +0 -5
  125. pulumi_vault/kv/secret_v2.py +0 -5
  126. pulumi_vault/ldap/auth_backend.py +0 -52
  127. pulumi_vault/ldap/auth_backend_group.py +0 -5
  128. pulumi_vault/ldap/auth_backend_user.py +0 -5
  129. pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
  130. pulumi_vault/ldap/get_static_credentials.py +4 -23
  131. pulumi_vault/ldap/secret_backend.py +0 -5
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
  133. pulumi_vault/ldap/secret_backend_library_set.py +0 -5
  134. pulumi_vault/ldap/secret_backend_static_role.py +0 -5
  135. pulumi_vault/managed/_inputs.py +0 -205
  136. pulumi_vault/managed/keys.py +0 -5
  137. pulumi_vault/managed/outputs.py +0 -5
  138. pulumi_vault/mfa_duo.py +0 -5
  139. pulumi_vault/mfa_okta.py +0 -5
  140. pulumi_vault/mfa_pingid.py +0 -5
  141. pulumi_vault/mfa_totp.py +0 -5
  142. pulumi_vault/mongodbatlas/secret_backend.py +0 -5
  143. pulumi_vault/mongodbatlas/secret_role.py +0 -5
  144. pulumi_vault/mount.py +0 -5
  145. pulumi_vault/namespace.py +0 -5
  146. pulumi_vault/nomad_secret_backend.py +0 -5
  147. pulumi_vault/nomad_secret_role.py +0 -5
  148. pulumi_vault/okta/_inputs.py +0 -39
  149. pulumi_vault/okta/auth_backend.py +0 -5
  150. pulumi_vault/okta/auth_backend_group.py +0 -5
  151. pulumi_vault/okta/auth_backend_user.py +0 -5
  152. pulumi_vault/okta/outputs.py +0 -5
  153. pulumi_vault/outputs.py +0 -5
  154. pulumi_vault/password_policy.py +0 -5
  155. pulumi_vault/pkisecret/_inputs.py +0 -41
  156. pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
  157. pulumi_vault/pkisecret/backend_config_est.py +0 -5
  158. pulumi_vault/pkisecret/get_backend_config_est.py +4 -22
  159. pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
  160. pulumi_vault/pkisecret/get_backend_issuers.py +4 -17
  161. pulumi_vault/pkisecret/get_backend_key.py +4 -19
  162. pulumi_vault/pkisecret/get_backend_keys.py +4 -17
  163. pulumi_vault/pkisecret/outputs.py +0 -5
  164. pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
  172. pulumi_vault/pkisecret/secret_backend_key.py +0 -5
  173. pulumi_vault/pkisecret/secret_backend_role.py +0 -5
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
  176. pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
  177. pulumi_vault/plugin.py +0 -5
  178. pulumi_vault/plugin_pinned_version.py +0 -5
  179. pulumi_vault/policy.py +0 -5
  180. pulumi_vault/provider.py +0 -5
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +0 -5
  183. pulumi_vault/quota_rate_limit.py +0 -5
  184. pulumi_vault/rabbitmq/_inputs.py +0 -61
  185. pulumi_vault/rabbitmq/outputs.py +0 -5
  186. pulumi_vault/rabbitmq/secret_backend.py +0 -5
  187. pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
  188. pulumi_vault/raft_autopilot.py +0 -5
  189. pulumi_vault/raft_snapshot_agent_config.py +0 -5
  190. pulumi_vault/rgp_policy.py +0 -5
  191. pulumi_vault/saml/auth_backend.py +0 -5
  192. pulumi_vault/saml/auth_backend_role.py +0 -5
  193. pulumi_vault/secrets/_inputs.py +0 -30
  194. pulumi_vault/secrets/outputs.py +0 -5
  195. pulumi_vault/secrets/sync_association.py +0 -5
  196. pulumi_vault/secrets/sync_aws_destination.py +0 -5
  197. pulumi_vault/secrets/sync_azure_destination.py +0 -5
  198. pulumi_vault/secrets/sync_config.py +0 -5
  199. pulumi_vault/secrets/sync_gcp_destination.py +0 -5
  200. pulumi_vault/secrets/sync_gh_destination.py +0 -5
  201. pulumi_vault/secrets/sync_github_apps.py +0 -5
  202. pulumi_vault/secrets/sync_vercel_destination.py +0 -5
  203. pulumi_vault/ssh/_inputs.py +0 -22
  204. pulumi_vault/ssh/outputs.py +0 -5
  205. pulumi_vault/ssh/secret_backend_ca.py +0 -5
  206. pulumi_vault/ssh/secret_backend_role.py +0 -39
  207. pulumi_vault/terraformcloud/secret_backend.py +0 -5
  208. pulumi_vault/terraformcloud/secret_creds.py +0 -5
  209. pulumi_vault/terraformcloud/secret_role.py +0 -5
  210. pulumi_vault/token.py +0 -5
  211. pulumi_vault/tokenauth/auth_backend_role.py +14 -5
  212. pulumi_vault/transform/alphabet.py +0 -5
  213. pulumi_vault/transform/get_decode.py +4 -28
  214. pulumi_vault/transform/get_encode.py +4 -28
  215. pulumi_vault/transform/role.py +0 -5
  216. pulumi_vault/transform/template.py +0 -5
  217. pulumi_vault/transform/transformation.py +0 -5
  218. pulumi_vault/transit/get_decrypt.py +4 -21
  219. pulumi_vault/transit/get_encrypt.py +4 -23
  220. pulumi_vault/transit/secret_backend_key.py +0 -5
  221. pulumi_vault/transit/secret_cache_config.py +0 -5
  222. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/METADATA +2 -3
  223. pulumi_vault-6.4.0a1723820369.dist-info/RECORD +256 -0
  224. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/WHEEL +1 -1
  225. pulumi_vault-6.4.0.dist-info/RECORD +0 -256
  226. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/top_level.txt +0 -0
@@ -4,37 +4,15 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
18
13
  'SecretBackendRoleAllowedUserKeyConfigArgs',
19
- 'SecretBackendRoleAllowedUserKeyConfigArgsDict',
20
14
  ]
21
15
 
22
- MYPY = False
23
-
24
- if not MYPY:
25
- class SecretBackendRoleAllowedUserKeyConfigArgsDict(TypedDict):
26
- lengths: pulumi.Input[Sequence[pulumi.Input[int]]]
27
- """
28
- List of allowed key lengths, vault-1.10 and above
29
- """
30
- type: pulumi.Input[str]
31
- """
32
- Key type, choices:
33
- rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
34
- """
35
- elif False:
36
- SecretBackendRoleAllowedUserKeyConfigArgsDict: TypeAlias = Mapping[str, Any]
37
-
38
16
  @pulumi.input_type
39
17
  class SecretBackendRoleAllowedUserKeyConfigArgs:
40
18
  def __init__(__self__, *,
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretBackendCaArgs', 'SecretBackendCa']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
  from . import outputs
17
12
  from ._inputs import *
@@ -25,7 +20,6 @@ class SecretBackendRoleArgs:
25
20
  key_type: pulumi.Input[str],
26
21
  algorithm_signer: Optional[pulumi.Input[str]] = None,
27
22
  allow_bare_domains: Optional[pulumi.Input[bool]] = None,
28
- allow_empty_principals: Optional[pulumi.Input[bool]] = None,
29
23
  allow_host_certificates: Optional[pulumi.Input[bool]] = None,
30
24
  allow_subdomains: Optional[pulumi.Input[bool]] = None,
31
25
  allow_user_certificates: Optional[pulumi.Input[bool]] = None,
@@ -89,8 +83,6 @@ class SecretBackendRoleArgs:
89
83
  pulumi.set(__self__, "algorithm_signer", algorithm_signer)
90
84
  if allow_bare_domains is not None:
91
85
  pulumi.set(__self__, "allow_bare_domains", allow_bare_domains)
92
- if allow_empty_principals is not None:
93
- pulumi.set(__self__, "allow_empty_principals", allow_empty_principals)
94
86
  if allow_host_certificates is not None:
95
87
  pulumi.set(__self__, "allow_host_certificates", allow_host_certificates)
96
88
  if allow_subdomains is not None:
@@ -184,15 +176,6 @@ class SecretBackendRoleArgs:
184
176
  def allow_bare_domains(self, value: Optional[pulumi.Input[bool]]):
185
177
  pulumi.set(self, "allow_bare_domains", value)
186
178
 
187
- @property
188
- @pulumi.getter(name="allowEmptyPrincipals")
189
- def allow_empty_principals(self) -> Optional[pulumi.Input[bool]]:
190
- return pulumi.get(self, "allow_empty_principals")
191
-
192
- @allow_empty_principals.setter
193
- def allow_empty_principals(self, value: Optional[pulumi.Input[bool]]):
194
- pulumi.set(self, "allow_empty_principals", value)
195
-
196
179
  @property
197
180
  @pulumi.getter(name="allowHostCertificates")
198
181
  def allow_host_certificates(self) -> Optional[pulumi.Input[bool]]:
@@ -469,7 +452,6 @@ class _SecretBackendRoleState:
469
452
  def __init__(__self__, *,
470
453
  algorithm_signer: Optional[pulumi.Input[str]] = None,
471
454
  allow_bare_domains: Optional[pulumi.Input[bool]] = None,
472
- allow_empty_principals: Optional[pulumi.Input[bool]] = None,
473
455
  allow_host_certificates: Optional[pulumi.Input[bool]] = None,
474
456
  allow_subdomains: Optional[pulumi.Input[bool]] = None,
475
457
  allow_user_certificates: Optional[pulumi.Input[bool]] = None,
@@ -533,8 +515,6 @@ class _SecretBackendRoleState:
533
515
  pulumi.set(__self__, "algorithm_signer", algorithm_signer)
534
516
  if allow_bare_domains is not None:
535
517
  pulumi.set(__self__, "allow_bare_domains", allow_bare_domains)
536
- if allow_empty_principals is not None:
537
- pulumi.set(__self__, "allow_empty_principals", allow_empty_principals)
538
518
  if allow_host_certificates is not None:
539
519
  pulumi.set(__self__, "allow_host_certificates", allow_host_certificates)
540
520
  if allow_subdomains is not None:
@@ -608,15 +588,6 @@ class _SecretBackendRoleState:
608
588
  def allow_bare_domains(self, value: Optional[pulumi.Input[bool]]):
609
589
  pulumi.set(self, "allow_bare_domains", value)
610
590
 
611
- @property
612
- @pulumi.getter(name="allowEmptyPrincipals")
613
- def allow_empty_principals(self) -> Optional[pulumi.Input[bool]]:
614
- return pulumi.get(self, "allow_empty_principals")
615
-
616
- @allow_empty_principals.setter
617
- def allow_empty_principals(self, value: Optional[pulumi.Input[bool]]):
618
- pulumi.set(self, "allow_empty_principals", value)
619
-
620
591
  @property
621
592
  @pulumi.getter(name="allowHostCertificates")
622
593
  def allow_host_certificates(self) -> Optional[pulumi.Input[bool]]:
@@ -919,7 +890,6 @@ class SecretBackendRole(pulumi.CustomResource):
919
890
  opts: Optional[pulumi.ResourceOptions] = None,
920
891
  algorithm_signer: Optional[pulumi.Input[str]] = None,
921
892
  allow_bare_domains: Optional[pulumi.Input[bool]] = None,
922
- allow_empty_principals: Optional[pulumi.Input[bool]] = None,
923
893
  allow_host_certificates: Optional[pulumi.Input[bool]] = None,
924
894
  allow_subdomains: Optional[pulumi.Input[bool]] = None,
925
895
  allow_user_certificates: Optional[pulumi.Input[bool]] = None,
@@ -1069,7 +1039,6 @@ class SecretBackendRole(pulumi.CustomResource):
1069
1039
  opts: Optional[pulumi.ResourceOptions] = None,
1070
1040
  algorithm_signer: Optional[pulumi.Input[str]] = None,
1071
1041
  allow_bare_domains: Optional[pulumi.Input[bool]] = None,
1072
- allow_empty_principals: Optional[pulumi.Input[bool]] = None,
1073
1042
  allow_host_certificates: Optional[pulumi.Input[bool]] = None,
1074
1043
  allow_subdomains: Optional[pulumi.Input[bool]] = None,
1075
1044
  allow_user_certificates: Optional[pulumi.Input[bool]] = None,
@@ -1105,7 +1074,6 @@ class SecretBackendRole(pulumi.CustomResource):
1105
1074
 
1106
1075
  __props__.__dict__["algorithm_signer"] = algorithm_signer
1107
1076
  __props__.__dict__["allow_bare_domains"] = allow_bare_domains
1108
- __props__.__dict__["allow_empty_principals"] = allow_empty_principals
1109
1077
  __props__.__dict__["allow_host_certificates"] = allow_host_certificates
1110
1078
  __props__.__dict__["allow_subdomains"] = allow_subdomains
1111
1079
  __props__.__dict__["allow_user_certificates"] = allow_user_certificates
@@ -1146,7 +1114,6 @@ class SecretBackendRole(pulumi.CustomResource):
1146
1114
  opts: Optional[pulumi.ResourceOptions] = None,
1147
1115
  algorithm_signer: Optional[pulumi.Input[str]] = None,
1148
1116
  allow_bare_domains: Optional[pulumi.Input[bool]] = None,
1149
- allow_empty_principals: Optional[pulumi.Input[bool]] = None,
1150
1117
  allow_host_certificates: Optional[pulumi.Input[bool]] = None,
1151
1118
  allow_subdomains: Optional[pulumi.Input[bool]] = None,
1152
1119
  allow_user_certificates: Optional[pulumi.Input[bool]] = None,
@@ -1217,7 +1184,6 @@ class SecretBackendRole(pulumi.CustomResource):
1217
1184
 
1218
1185
  __props__.__dict__["algorithm_signer"] = algorithm_signer
1219
1186
  __props__.__dict__["allow_bare_domains"] = allow_bare_domains
1220
- __props__.__dict__["allow_empty_principals"] = allow_empty_principals
1221
1187
  __props__.__dict__["allow_host_certificates"] = allow_host_certificates
1222
1188
  __props__.__dict__["allow_subdomains"] = allow_subdomains
1223
1189
  __props__.__dict__["allow_user_certificates"] = allow_user_certificates
@@ -1260,11 +1226,6 @@ class SecretBackendRole(pulumi.CustomResource):
1260
1226
  """
1261
1227
  return pulumi.get(self, "allow_bare_domains")
1262
1228
 
1263
- @property
1264
- @pulumi.getter(name="allowEmptyPrincipals")
1265
- def allow_empty_principals(self) -> pulumi.Output[Optional[bool]]:
1266
- return pulumi.get(self, "allow_empty_principals")
1267
-
1268
1229
  @property
1269
1230
  @pulumi.getter(name="allowHostCertificates")
1270
1231
  def allow_host_certificates(self) -> pulumi.Output[Optional[bool]]:
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretBackendArgs', 'SecretBackend']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretCredsArgs', 'SecretCreds']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretRoleArgs', 'SecretRole']
pulumi_vault/token.py CHANGED
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
 
17
12
  __all__ = ['TokenArgs', 'Token']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
@@ -52,6 +47,8 @@ class AuthBackendRoleArgs:
52
47
  *Available only for Vault Enterprise*.
53
48
  :param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
54
49
  :param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
50
+
51
+ > Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
55
52
  :param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
56
53
  :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
57
54
  :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
@@ -205,6 +202,8 @@ class AuthBackendRoleArgs:
205
202
  def path_suffix(self) -> Optional[pulumi.Input[str]]:
206
203
  """
207
204
  Tokens created against this role will have the given suffix as part of their path in addition to the role name.
205
+
206
+ > Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
208
207
  """
209
208
  return pulumi.get(self, "path_suffix")
210
209
 
@@ -368,6 +367,8 @@ class _AuthBackendRoleState:
368
367
  *Available only for Vault Enterprise*.
369
368
  :param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
370
369
  :param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
370
+
371
+ > Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
371
372
  :param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
372
373
  :param pulumi.Input[str] role_name: The name of the role.
373
374
  :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
@@ -511,6 +512,8 @@ class _AuthBackendRoleState:
511
512
  def path_suffix(self) -> Optional[pulumi.Input[str]]:
512
513
  """
513
514
  Tokens created against this role will have the given suffix as part of their path in addition to the role name.
515
+
516
+ > Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
514
517
  """
515
518
  return pulumi.get(self, "path_suffix")
516
519
 
@@ -723,6 +726,8 @@ class AuthBackendRole(pulumi.CustomResource):
723
726
  *Available only for Vault Enterprise*.
724
727
  :param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
725
728
  :param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
729
+
730
+ > Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
726
731
  :param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
727
732
  :param pulumi.Input[str] role_name: The name of the role.
728
733
  :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
@@ -886,6 +891,8 @@ class AuthBackendRole(pulumi.CustomResource):
886
891
  *Available only for Vault Enterprise*.
887
892
  :param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
888
893
  :param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
894
+
895
+ > Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
889
896
  :param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
890
897
  :param pulumi.Input[str] role_name: The name of the role.
891
898
  :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
@@ -987,6 +994,8 @@ class AuthBackendRole(pulumi.CustomResource):
987
994
  def path_suffix(self) -> pulumi.Output[Optional[str]]:
988
995
  """
989
996
  Tokens created against this role will have the given suffix as part of their path in addition to the role name.
997
+
998
+ > Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
990
999
  """
991
1000
  return pulumi.get(self, "path_suffix")
992
1001
 
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['AlphabetArgs', 'Alphabet']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -208,6 +203,9 @@ def get_decode(batch_inputs: Optional[Sequence[Mapping[str, str]]] = None,
208
203
  transformation=pulumi.get(__ret__, 'transformation'),
209
204
  tweak=pulumi.get(__ret__, 'tweak'),
210
205
  value=pulumi.get(__ret__, 'value'))
206
+
207
+
208
+ @_utilities.lift_output_func(get_decode)
211
209
  def get_decode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapping[str, str]]]]] = None,
212
210
  batch_results: Optional[pulumi.Input[Optional[Sequence[Mapping[str, str]]]]] = None,
213
211
  decoded_value: Optional[pulumi.Input[Optional[str]]] = None,
@@ -262,26 +260,4 @@ def get_decode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
262
260
  :param str tweak: The tweak value to use. Only applicable for FPE transformations
263
261
  :param str value: The value in which to decode.
264
262
  """
265
- __args__ = dict()
266
- __args__['batchInputs'] = batch_inputs
267
- __args__['batchResults'] = batch_results
268
- __args__['decodedValue'] = decoded_value
269
- __args__['namespace'] = namespace
270
- __args__['path'] = path
271
- __args__['roleName'] = role_name
272
- __args__['transformation'] = transformation
273
- __args__['tweak'] = tweak
274
- __args__['value'] = value
275
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
276
- __ret__ = pulumi.runtime.invoke_output('vault:transform/getDecode:getDecode', __args__, opts=opts, typ=GetDecodeResult)
277
- return __ret__.apply(lambda __response__: GetDecodeResult(
278
- batch_inputs=pulumi.get(__response__, 'batch_inputs'),
279
- batch_results=pulumi.get(__response__, 'batch_results'),
280
- decoded_value=pulumi.get(__response__, 'decoded_value'),
281
- id=pulumi.get(__response__, 'id'),
282
- namespace=pulumi.get(__response__, 'namespace'),
283
- path=pulumi.get(__response__, 'path'),
284
- role_name=pulumi.get(__response__, 'role_name'),
285
- transformation=pulumi.get(__response__, 'transformation'),
286
- tweak=pulumi.get(__response__, 'tweak'),
287
- value=pulumi.get(__response__, 'value')))
263
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -210,6 +205,9 @@ def get_encode(batch_inputs: Optional[Sequence[Mapping[str, str]]] = None,
210
205
  transformation=pulumi.get(__ret__, 'transformation'),
211
206
  tweak=pulumi.get(__ret__, 'tweak'),
212
207
  value=pulumi.get(__ret__, 'value'))
208
+
209
+
210
+ @_utilities.lift_output_func(get_encode)
213
211
  def get_encode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapping[str, str]]]]] = None,
214
212
  batch_results: Optional[pulumi.Input[Optional[Sequence[Mapping[str, str]]]]] = None,
215
213
  encoded_value: Optional[pulumi.Input[Optional[str]]] = None,
@@ -266,26 +264,4 @@ def get_encode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
266
264
  :param str tweak: The tweak value to use. Only applicable for FPE transformations
267
265
  :param str value: The value in which to encode.
268
266
  """
269
- __args__ = dict()
270
- __args__['batchInputs'] = batch_inputs
271
- __args__['batchResults'] = batch_results
272
- __args__['encodedValue'] = encoded_value
273
- __args__['namespace'] = namespace
274
- __args__['path'] = path
275
- __args__['roleName'] = role_name
276
- __args__['transformation'] = transformation
277
- __args__['tweak'] = tweak
278
- __args__['value'] = value
279
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
280
- __ret__ = pulumi.runtime.invoke_output('vault:transform/getEncode:getEncode', __args__, opts=opts, typ=GetEncodeResult)
281
- return __ret__.apply(lambda __response__: GetEncodeResult(
282
- batch_inputs=pulumi.get(__response__, 'batch_inputs'),
283
- batch_results=pulumi.get(__response__, 'batch_results'),
284
- encoded_value=pulumi.get(__response__, 'encoded_value'),
285
- id=pulumi.get(__response__, 'id'),
286
- namespace=pulumi.get(__response__, 'namespace'),
287
- path=pulumi.get(__response__, 'path'),
288
- role_name=pulumi.get(__response__, 'role_name'),
289
- transformation=pulumi.get(__response__, 'transformation'),
290
- tweak=pulumi.get(__response__, 'tweak'),
291
- value=pulumi.get(__response__, 'value')))
267
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['RoleArgs', 'Role']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['TemplateArgs', 'Template']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['TransformationArgs', 'Transformation']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -143,6 +138,9 @@ def get_decrypt(backend: Optional[str] = None,
143
138
  key=pulumi.get(__ret__, 'key'),
144
139
  namespace=pulumi.get(__ret__, 'namespace'),
145
140
  plaintext=pulumi.get(__ret__, 'plaintext'))
141
+
142
+
143
+ @_utilities.lift_output_func(get_decrypt)
146
144
  def get_decrypt_output(backend: Optional[pulumi.Input[str]] = None,
147
145
  ciphertext: Optional[pulumi.Input[str]] = None,
148
146
  context: Optional[pulumi.Input[Optional[str]]] = None,
@@ -163,19 +161,4 @@ def get_decrypt_output(backend: Optional[pulumi.Input[str]] = None,
163
161
  ciphertext="vault:v1:S3GtnJ5GUNCWV+/pdL9+g1Feu/nzAv+RlmTmE91Tu0rBkeIU8MEb2nSspC/1IQ==")
164
162
  ```
165
163
  """
166
- __args__ = dict()
167
- __args__['backend'] = backend
168
- __args__['ciphertext'] = ciphertext
169
- __args__['context'] = context
170
- __args__['key'] = key
171
- __args__['namespace'] = namespace
172
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
173
- __ret__ = pulumi.runtime.invoke_output('vault:transit/getDecrypt:getDecrypt', __args__, opts=opts, typ=GetDecryptResult)
174
- return __ret__.apply(lambda __response__: GetDecryptResult(
175
- backend=pulumi.get(__response__, 'backend'),
176
- ciphertext=pulumi.get(__response__, 'ciphertext'),
177
- context=pulumi.get(__response__, 'context'),
178
- id=pulumi.get(__response__, 'id'),
179
- key=pulumi.get(__response__, 'key'),
180
- namespace=pulumi.get(__response__, 'namespace'),
181
- plaintext=pulumi.get(__response__, 'plaintext')))
164
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -144,6 +139,9 @@ def get_encrypt(backend: Optional[str] = None,
144
139
  key_version=pulumi.get(__ret__, 'key_version'),
145
140
  namespace=pulumi.get(__ret__, 'namespace'),
146
141
  plaintext=pulumi.get(__ret__, 'plaintext'))
142
+
143
+
144
+ @_utilities.lift_output_func(get_encrypt)
147
145
  def get_encrypt_output(backend: Optional[pulumi.Input[str]] = None,
148
146
  context: Optional[pulumi.Input[Optional[str]]] = None,
149
147
  key: Optional[pulumi.Input[str]] = None,
@@ -154,21 +152,4 @@ def get_encrypt_output(backend: Optional[pulumi.Input[str]] = None,
154
152
  """
155
153
  This is a data source which can be used to encrypt plaintext using a Vault Transit key.
156
154
  """
157
- __args__ = dict()
158
- __args__['backend'] = backend
159
- __args__['context'] = context
160
- __args__['key'] = key
161
- __args__['keyVersion'] = key_version
162
- __args__['namespace'] = namespace
163
- __args__['plaintext'] = plaintext
164
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
165
- __ret__ = pulumi.runtime.invoke_output('vault:transit/getEncrypt:getEncrypt', __args__, opts=opts, typ=GetEncryptResult)
166
- return __ret__.apply(lambda __response__: GetEncryptResult(
167
- backend=pulumi.get(__response__, 'backend'),
168
- ciphertext=pulumi.get(__response__, 'ciphertext'),
169
- context=pulumi.get(__response__, 'context'),
170
- id=pulumi.get(__response__, 'id'),
171
- key=pulumi.get(__response__, 'key'),
172
- key_version=pulumi.get(__response__, 'key_version'),
173
- namespace=pulumi.get(__response__, 'namespace'),
174
- plaintext=pulumi.get(__response__, 'plaintext')))
155
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretBackendKeyArgs', 'SecretBackendKey']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretCacheConfigArgs', 'SecretCacheConfig']
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: pulumi_vault
3
- Version: 6.4.0
3
+ Version: 6.4.0a1723820369
4
4
  Summary: A Pulumi package for creating and managing HashiCorp Vault cloud resources.
5
5
  License: Apache-2.0
6
6
  Project-URL: Homepage, https://pulumi.io
@@ -9,9 +9,8 @@ Keywords: pulumi,vault
9
9
  Requires-Python: >=3.8
10
10
  Description-Content-Type: text/markdown
11
11
  Requires-Dist: parver >=0.2.1
12
- Requires-Dist: pulumi <4.0.0,>=3.136.0
12
+ Requires-Dist: pulumi <4.0.0,>=3.0.0
13
13
  Requires-Dist: semver >=2.8.1
14
- Requires-Dist: typing-extensions >=4.11 ; python_version < "3.11"
15
14
 
16
15
  [![Build Status](https://travis-ci.com/pulumi/pulumi-vault.svg?token=eHg7Zp5zdDDJfTjY8ejq&branch=master)](https://travis-ci.com/pulumi/pulumi-vault)
17
16