pulumi-vault 6.5.0__py3-none-any.whl → 6.5.0a1732603022__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (57) hide show
  1. pulumi_vault/__init__.py +0 -24
  2. pulumi_vault/ad/get_access_credentials.py +2 -2
  3. pulumi_vault/approle/get_auth_backend_role_id.py +2 -2
  4. pulumi_vault/aws/auth_backend_sts_role.py +0 -47
  5. pulumi_vault/aws/get_access_credentials.py +2 -2
  6. pulumi_vault/aws/get_static_access_credentials.py +2 -2
  7. pulumi_vault/aws/secret_backend.py +0 -141
  8. pulumi_vault/azure/get_access_credentials.py +2 -2
  9. pulumi_vault/database/_inputs.py +0 -40
  10. pulumi_vault/database/outputs.py +0 -28
  11. pulumi_vault/gcp/get_auth_backend_role.py +2 -2
  12. pulumi_vault/generic/get_secret.py +2 -2
  13. pulumi_vault/get_auth_backend.py +2 -2
  14. pulumi_vault/get_auth_backends.py +2 -2
  15. pulumi_vault/get_namespace.py +2 -2
  16. pulumi_vault/get_namespaces.py +2 -2
  17. pulumi_vault/get_nomad_access_token.py +2 -2
  18. pulumi_vault/get_policy_document.py +2 -2
  19. pulumi_vault/get_raft_autopilot_state.py +2 -2
  20. pulumi_vault/identity/get_entity.py +2 -2
  21. pulumi_vault/identity/get_group.py +2 -2
  22. pulumi_vault/identity/get_oidc_client_creds.py +2 -2
  23. pulumi_vault/identity/get_oidc_openid_config.py +2 -2
  24. pulumi_vault/identity/get_oidc_public_keys.py +2 -2
  25. pulumi_vault/kubernetes/get_auth_backend_config.py +2 -2
  26. pulumi_vault/kubernetes/get_auth_backend_role.py +2 -2
  27. pulumi_vault/kubernetes/get_service_account_token.py +2 -2
  28. pulumi_vault/kv/get_secret.py +2 -2
  29. pulumi_vault/kv/get_secret_subkeys_v2.py +2 -2
  30. pulumi_vault/kv/get_secret_v2.py +2 -2
  31. pulumi_vault/kv/get_secrets_list.py +2 -2
  32. pulumi_vault/kv/get_secrets_list_v2.py +2 -2
  33. pulumi_vault/ldap/get_dynamic_credentials.py +2 -2
  34. pulumi_vault/ldap/get_static_credentials.py +2 -2
  35. pulumi_vault/pkisecret/__init__.py +0 -4
  36. pulumi_vault/pkisecret/_inputs.py +0 -34
  37. pulumi_vault/pkisecret/get_backend_config_est.py +2 -2
  38. pulumi_vault/pkisecret/get_backend_issuer.py +2 -2
  39. pulumi_vault/pkisecret/get_backend_issuers.py +2 -2
  40. pulumi_vault/pkisecret/get_backend_key.py +2 -2
  41. pulumi_vault/pkisecret/get_backend_keys.py +2 -2
  42. pulumi_vault/pkisecret/outputs.py +0 -40
  43. pulumi_vault/pkisecret/secret_backend_role.py +0 -47
  44. pulumi_vault/pulumi-plugin.json +1 -1
  45. pulumi_vault/ssh/secret_backend_role.py +0 -27
  46. pulumi_vault/transform/get_decode.py +2 -2
  47. pulumi_vault/transform/get_encode.py +2 -2
  48. pulumi_vault/transit/get_decrypt.py +2 -2
  49. pulumi_vault/transit/get_encrypt.py +2 -2
  50. {pulumi_vault-6.5.0.dist-info → pulumi_vault-6.5.0a1732603022.dist-info}/METADATA +4 -4
  51. {pulumi_vault-6.5.0.dist-info → pulumi_vault-6.5.0a1732603022.dist-info}/RECORD +53 -57
  52. {pulumi_vault-6.5.0.dist-info → pulumi_vault-6.5.0a1732603022.dist-info}/WHEEL +1 -1
  53. pulumi_vault/pkisecret/backend_acme_eab.py +0 -549
  54. pulumi_vault/pkisecret/backend_config_acme.py +0 -642
  55. pulumi_vault/pkisecret/backend_config_cmpv2.py +0 -525
  56. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +0 -209
  57. {pulumi_vault-6.5.0.dist-info → pulumi_vault-6.5.0a1732603022.dist-info}/top_level.txt +0 -0
@@ -209,7 +209,7 @@ def get_backend_config_est(backend: Optional[str] = None,
209
209
  namespace=pulumi.get(__ret__, 'namespace'))
210
210
  def get_backend_config_est_output(backend: Optional[pulumi.Input[str]] = None,
211
211
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
212
- opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendConfigEstResult]:
212
+ opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendConfigEstResult]:
213
213
  """
214
214
  ## Example Usage
215
215
 
@@ -235,7 +235,7 @@ def get_backend_config_est_output(backend: Optional[pulumi.Input[str]] = None,
235
235
  __args__ = dict()
236
236
  __args__['backend'] = backend
237
237
  __args__['namespace'] = namespace
238
- opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
238
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
239
239
  __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendConfigEst:getBackendConfigEst', __args__, opts=opts, typ=GetBackendConfigEstResult)
240
240
  return __ret__.apply(lambda __response__: GetBackendConfigEstResult(
241
241
  audit_fields=pulumi.get(__response__, 'audit_fields'),
@@ -230,7 +230,7 @@ def get_backend_issuer(backend: Optional[str] = None,
230
230
  def get_backend_issuer_output(backend: Optional[pulumi.Input[str]] = None,
231
231
  issuer_ref: Optional[pulumi.Input[str]] = None,
232
232
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
233
- opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendIssuerResult]:
233
+ opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendIssuerResult]:
234
234
  """
235
235
  ## Example Usage
236
236
 
@@ -265,7 +265,7 @@ def get_backend_issuer_output(backend: Optional[pulumi.Input[str]] = None,
265
265
  __args__['backend'] = backend
266
266
  __args__['issuerRef'] = issuer_ref
267
267
  __args__['namespace'] = namespace
268
- opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
268
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
269
269
  __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendIssuer:getBackendIssuer', __args__, opts=opts, typ=GetBackendIssuerResult)
270
270
  return __ret__.apply(lambda __response__: GetBackendIssuerResult(
271
271
  backend=pulumi.get(__response__, 'backend'),
@@ -149,7 +149,7 @@ def get_backend_issuers(backend: Optional[str] = None,
149
149
  namespace=pulumi.get(__ret__, 'namespace'))
150
150
  def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None,
151
151
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
152
- opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendIssuersResult]:
152
+ opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendIssuersResult]:
153
153
  """
154
154
  ## Example Usage
155
155
 
@@ -181,7 +181,7 @@ def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None,
181
181
  __args__ = dict()
182
182
  __args__['backend'] = backend
183
183
  __args__['namespace'] = namespace
184
- opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
184
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
185
185
  __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendIssuers:getBackendIssuers', __args__, opts=opts, typ=GetBackendIssuersResult)
186
186
  return __ret__.apply(lambda __response__: GetBackendIssuersResult(
187
187
  backend=pulumi.get(__response__, 'backend'),
@@ -164,7 +164,7 @@ def get_backend_key(backend: Optional[str] = None,
164
164
  def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
165
165
  key_ref: Optional[pulumi.Input[str]] = None,
166
166
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
167
- opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendKeyResult]:
167
+ opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendKeyResult]:
168
168
  """
169
169
  ## Example Usage
170
170
 
@@ -199,7 +199,7 @@ def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
199
199
  __args__['backend'] = backend
200
200
  __args__['keyRef'] = key_ref
201
201
  __args__['namespace'] = namespace
202
- opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
202
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
203
203
  __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendKey:getBackendKey', __args__, opts=opts, typ=GetBackendKeyResult)
204
204
  return __ret__.apply(lambda __response__: GetBackendKeyResult(
205
205
  backend=pulumi.get(__response__, 'backend'),
@@ -149,7 +149,7 @@ def get_backend_keys(backend: Optional[str] = None,
149
149
  namespace=pulumi.get(__ret__, 'namespace'))
150
150
  def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None,
151
151
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
152
- opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendKeysResult]:
152
+ opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendKeysResult]:
153
153
  """
154
154
  ## Example Usage
155
155
 
@@ -181,7 +181,7 @@ def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None,
181
181
  __args__ = dict()
182
182
  __args__['backend'] = backend
183
183
  __args__['namespace'] = namespace
184
- opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
184
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
185
185
  __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendKeys:getBackendKeys', __args__, opts=opts, typ=GetBackendKeysResult)
186
186
  return __ret__.apply(lambda __response__: GetBackendKeysResult(
187
187
  backend=pulumi.get(__response__, 'backend'),
@@ -15,32 +15,11 @@ else:
15
15
  from .. import _utilities
16
16
 
17
17
  __all__ = [
18
- 'BackendConfigCmpv2Authenticators',
19
18
  'BackendConfigEstAuthenticators',
20
19
  'SecretBackendRolePolicyIdentifier',
21
- 'GetBackendConfigCmpv2AuthenticatorResult',
22
20
  'GetBackendConfigEstAuthenticatorResult',
23
21
  ]
24
22
 
25
- @pulumi.output_type
26
- class BackendConfigCmpv2Authenticators(dict):
27
- def __init__(__self__, *,
28
- cert: Optional[Mapping[str, str]] = None):
29
- """
30
- :param Mapping[str, str] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
31
- """
32
- if cert is not None:
33
- pulumi.set(__self__, "cert", cert)
34
-
35
- @property
36
- @pulumi.getter
37
- def cert(self) -> Optional[Mapping[str, str]]:
38
- """
39
- "The accessor (required) and cert_role (optional) properties for cert auth backends".
40
- """
41
- return pulumi.get(self, "cert")
42
-
43
-
44
23
  @pulumi.output_type
45
24
  class BackendConfigEstAuthenticators(dict):
46
25
  def __init__(__self__, *,
@@ -118,25 +97,6 @@ class SecretBackendRolePolicyIdentifier(dict):
118
97
  return pulumi.get(self, "notice")
119
98
 
120
99
 
121
- @pulumi.output_type
122
- class GetBackendConfigCmpv2AuthenticatorResult(dict):
123
- def __init__(__self__, *,
124
- cert: Optional[Mapping[str, str]] = None):
125
- """
126
- :param Mapping[str, str] cert: The accessor and cert_role properties for cert auth backends
127
- """
128
- if cert is not None:
129
- pulumi.set(__self__, "cert", cert)
130
-
131
- @property
132
- @pulumi.getter
133
- def cert(self) -> Optional[Mapping[str, str]]:
134
- """
135
- The accessor and cert_role properties for cert auth backends
136
- """
137
- return pulumi.get(self, "cert")
138
-
139
-
140
100
  @pulumi.output_type
141
101
  class GetBackendConfigEstAuthenticatorResult(dict):
142
102
  def __init__(__self__, *,
@@ -38,7 +38,6 @@ class SecretBackendRoleArgs:
38
38
  allowed_user_ids: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
39
39
  basic_constraints_valid_for_non_ca: Optional[pulumi.Input[bool]] = None,
40
40
  client_flag: Optional[pulumi.Input[bool]] = None,
41
- cn_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
42
41
  code_signing_flag: Optional[pulumi.Input[bool]] = None,
43
42
  countries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
44
43
  email_protection_flag: Optional[pulumi.Input[bool]] = None,
@@ -87,7 +86,6 @@ class SecretBackendRoleArgs:
87
86
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_user_ids: Defines allowed User IDs
88
87
  :param pulumi.Input[bool] basic_constraints_valid_for_non_ca: Flag to mark basic constraints valid when issuing non-CA certificates
89
88
  :param pulumi.Input[bool] client_flag: Flag to specify certificates for client use
90
- :param pulumi.Input[Sequence[pulumi.Input[str]]] cn_validations: Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
91
89
  :param pulumi.Input[bool] code_signing_flag: Flag to specify certificates for code signing use
92
90
  :param pulumi.Input[Sequence[pulumi.Input[str]]] countries: The country of generated certificates
93
91
  :param pulumi.Input[bool] email_protection_flag: Flag to specify certificates for email protection use
@@ -160,8 +158,6 @@ class SecretBackendRoleArgs:
160
158
  pulumi.set(__self__, "basic_constraints_valid_for_non_ca", basic_constraints_valid_for_non_ca)
161
159
  if client_flag is not None:
162
160
  pulumi.set(__self__, "client_flag", client_flag)
163
- if cn_validations is not None:
164
- pulumi.set(__self__, "cn_validations", cn_validations)
165
161
  if code_signing_flag is not None:
166
162
  pulumi.set(__self__, "code_signing_flag", code_signing_flag)
167
163
  if countries is not None:
@@ -425,18 +421,6 @@ class SecretBackendRoleArgs:
425
421
  def client_flag(self, value: Optional[pulumi.Input[bool]]):
426
422
  pulumi.set(self, "client_flag", value)
427
423
 
428
- @property
429
- @pulumi.getter(name="cnValidations")
430
- def cn_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
431
- """
432
- Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
433
- """
434
- return pulumi.get(self, "cn_validations")
435
-
436
- @cn_validations.setter
437
- def cn_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
438
- pulumi.set(self, "cn_validations", value)
439
-
440
424
  @property
441
425
  @pulumi.getter(name="codeSigningFlag")
442
426
  def code_signing_flag(self) -> Optional[pulumi.Input[bool]]:
@@ -815,7 +799,6 @@ class _SecretBackendRoleState:
815
799
  backend: Optional[pulumi.Input[str]] = None,
816
800
  basic_constraints_valid_for_non_ca: Optional[pulumi.Input[bool]] = None,
817
801
  client_flag: Optional[pulumi.Input[bool]] = None,
818
- cn_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
819
802
  code_signing_flag: Optional[pulumi.Input[bool]] = None,
820
803
  countries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
821
804
  email_protection_flag: Optional[pulumi.Input[bool]] = None,
@@ -864,7 +847,6 @@ class _SecretBackendRoleState:
864
847
  :param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
865
848
  :param pulumi.Input[bool] basic_constraints_valid_for_non_ca: Flag to mark basic constraints valid when issuing non-CA certificates
866
849
  :param pulumi.Input[bool] client_flag: Flag to specify certificates for client use
867
- :param pulumi.Input[Sequence[pulumi.Input[str]]] cn_validations: Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
868
850
  :param pulumi.Input[bool] code_signing_flag: Flag to specify certificates for code signing use
869
851
  :param pulumi.Input[Sequence[pulumi.Input[str]]] countries: The country of generated certificates
870
852
  :param pulumi.Input[bool] email_protection_flag: Flag to specify certificates for email protection use
@@ -938,8 +920,6 @@ class _SecretBackendRoleState:
938
920
  pulumi.set(__self__, "basic_constraints_valid_for_non_ca", basic_constraints_valid_for_non_ca)
939
921
  if client_flag is not None:
940
922
  pulumi.set(__self__, "client_flag", client_flag)
941
- if cn_validations is not None:
942
- pulumi.set(__self__, "cn_validations", cn_validations)
943
923
  if code_signing_flag is not None:
944
924
  pulumi.set(__self__, "code_signing_flag", code_signing_flag)
945
925
  if countries is not None:
@@ -1203,18 +1183,6 @@ class _SecretBackendRoleState:
1203
1183
  def client_flag(self, value: Optional[pulumi.Input[bool]]):
1204
1184
  pulumi.set(self, "client_flag", value)
1205
1185
 
1206
- @property
1207
- @pulumi.getter(name="cnValidations")
1208
- def cn_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
1209
- """
1210
- Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
1211
- """
1212
- return pulumi.get(self, "cn_validations")
1213
-
1214
- @cn_validations.setter
1215
- def cn_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
1216
- pulumi.set(self, "cn_validations", value)
1217
-
1218
1186
  @property
1219
1187
  @pulumi.getter(name="codeSigningFlag")
1220
1188
  def code_signing_flag(self) -> Optional[pulumi.Input[bool]]:
@@ -1595,7 +1563,6 @@ class SecretBackendRole(pulumi.CustomResource):
1595
1563
  backend: Optional[pulumi.Input[str]] = None,
1596
1564
  basic_constraints_valid_for_non_ca: Optional[pulumi.Input[bool]] = None,
1597
1565
  client_flag: Optional[pulumi.Input[bool]] = None,
1598
- cn_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1599
1566
  code_signing_flag: Optional[pulumi.Input[bool]] = None,
1600
1567
  countries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1601
1568
  email_protection_flag: Optional[pulumi.Input[bool]] = None,
@@ -1681,7 +1648,6 @@ class SecretBackendRole(pulumi.CustomResource):
1681
1648
  :param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
1682
1649
  :param pulumi.Input[bool] basic_constraints_valid_for_non_ca: Flag to mark basic constraints valid when issuing non-CA certificates
1683
1650
  :param pulumi.Input[bool] client_flag: Flag to specify certificates for client use
1684
- :param pulumi.Input[Sequence[pulumi.Input[str]]] cn_validations: Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
1685
1651
  :param pulumi.Input[bool] code_signing_flag: Flag to specify certificates for code signing use
1686
1652
  :param pulumi.Input[Sequence[pulumi.Input[str]]] countries: The country of generated certificates
1687
1653
  :param pulumi.Input[bool] email_protection_flag: Flag to specify certificates for email protection use
@@ -1795,7 +1761,6 @@ class SecretBackendRole(pulumi.CustomResource):
1795
1761
  backend: Optional[pulumi.Input[str]] = None,
1796
1762
  basic_constraints_valid_for_non_ca: Optional[pulumi.Input[bool]] = None,
1797
1763
  client_flag: Optional[pulumi.Input[bool]] = None,
1798
- cn_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1799
1764
  code_signing_flag: Optional[pulumi.Input[bool]] = None,
1800
1765
  countries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1801
1766
  email_protection_flag: Optional[pulumi.Input[bool]] = None,
@@ -1853,7 +1818,6 @@ class SecretBackendRole(pulumi.CustomResource):
1853
1818
  __props__.__dict__["backend"] = backend
1854
1819
  __props__.__dict__["basic_constraints_valid_for_non_ca"] = basic_constraints_valid_for_non_ca
1855
1820
  __props__.__dict__["client_flag"] = client_flag
1856
- __props__.__dict__["cn_validations"] = cn_validations
1857
1821
  __props__.__dict__["code_signing_flag"] = code_signing_flag
1858
1822
  __props__.__dict__["countries"] = countries
1859
1823
  __props__.__dict__["email_protection_flag"] = email_protection_flag
@@ -1910,7 +1874,6 @@ class SecretBackendRole(pulumi.CustomResource):
1910
1874
  backend: Optional[pulumi.Input[str]] = None,
1911
1875
  basic_constraints_valid_for_non_ca: Optional[pulumi.Input[bool]] = None,
1912
1876
  client_flag: Optional[pulumi.Input[bool]] = None,
1913
- cn_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1914
1877
  code_signing_flag: Optional[pulumi.Input[bool]] = None,
1915
1878
  countries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1916
1879
  email_protection_flag: Optional[pulumi.Input[bool]] = None,
@@ -1964,7 +1927,6 @@ class SecretBackendRole(pulumi.CustomResource):
1964
1927
  :param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
1965
1928
  :param pulumi.Input[bool] basic_constraints_valid_for_non_ca: Flag to mark basic constraints valid when issuing non-CA certificates
1966
1929
  :param pulumi.Input[bool] client_flag: Flag to specify certificates for client use
1967
- :param pulumi.Input[Sequence[pulumi.Input[str]]] cn_validations: Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
1968
1930
  :param pulumi.Input[bool] code_signing_flag: Flag to specify certificates for code signing use
1969
1931
  :param pulumi.Input[Sequence[pulumi.Input[str]]] countries: The country of generated certificates
1970
1932
  :param pulumi.Input[bool] email_protection_flag: Flag to specify certificates for email protection use
@@ -2025,7 +1987,6 @@ class SecretBackendRole(pulumi.CustomResource):
2025
1987
  __props__.__dict__["backend"] = backend
2026
1988
  __props__.__dict__["basic_constraints_valid_for_non_ca"] = basic_constraints_valid_for_non_ca
2027
1989
  __props__.__dict__["client_flag"] = client_flag
2028
- __props__.__dict__["cn_validations"] = cn_validations
2029
1990
  __props__.__dict__["code_signing_flag"] = code_signing_flag
2030
1991
  __props__.__dict__["countries"] = countries
2031
1992
  __props__.__dict__["email_protection_flag"] = email_protection_flag
@@ -2193,14 +2154,6 @@ class SecretBackendRole(pulumi.CustomResource):
2193
2154
  """
2194
2155
  return pulumi.get(self, "client_flag")
2195
2156
 
2196
- @property
2197
- @pulumi.getter(name="cnValidations")
2198
- def cn_validations(self) -> pulumi.Output[Sequence[str]]:
2199
- """
2200
- Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
2201
- """
2202
- return pulumi.get(self, "cn_validations")
2203
-
2204
2157
  @property
2205
2158
  @pulumi.getter(name="codeSigningFlag")
2206
2159
  def code_signing_flag(self) -> pulumi.Output[Optional[bool]]:
@@ -1,5 +1,5 @@
1
1
  {
2
2
  "resource": true,
3
3
  "name": "vault",
4
- "version": "6.5.0"
4
+ "version": "6.5.0-alpha.1732603022"
5
5
  }
@@ -54,9 +54,6 @@ class SecretBackendRoleArgs:
54
54
  :param pulumi.Input[str] key_type: Specifies the type of credentials generated by this role. This can be either `otp`, `dynamic` or `ca`.
55
55
  :param pulumi.Input[str] algorithm_signer: When supplied, this value specifies a signing algorithm for the key. Possible values: ssh-rsa, rsa-sha2-256, rsa-sha2-512.
56
56
  :param pulumi.Input[bool] allow_bare_domains: Specifies if host certificates that are requested are allowed to use the base domains listed in `allowed_domains`.
57
- :param pulumi.Input[bool] allow_empty_principals: Allow signing certificates with no
58
- valid principals (e.g. any valid principal). For backwards compatibility
59
- only. The default of false is highly recommended.
60
57
  :param pulumi.Input[bool] allow_host_certificates: Specifies if certificates are allowed to be signed for use as a 'host'.
61
58
  :param pulumi.Input[bool] allow_subdomains: Specifies if host certificates that are requested are allowed to be subdomains of those listed in `allowed_domains`.
62
59
  :param pulumi.Input[bool] allow_user_certificates: Specifies if certificates are allowed to be signed for use as a 'user'.
@@ -190,11 +187,6 @@ class SecretBackendRoleArgs:
190
187
  @property
191
188
  @pulumi.getter(name="allowEmptyPrincipals")
192
189
  def allow_empty_principals(self) -> Optional[pulumi.Input[bool]]:
193
- """
194
- Allow signing certificates with no
195
- valid principals (e.g. any valid principal). For backwards compatibility
196
- only. The default of false is highly recommended.
197
- """
198
190
  return pulumi.get(self, "allow_empty_principals")
199
191
 
200
192
  @allow_empty_principals.setter
@@ -506,9 +498,6 @@ class _SecretBackendRoleState:
506
498
  Input properties used for looking up and filtering SecretBackendRole resources.
507
499
  :param pulumi.Input[str] algorithm_signer: When supplied, this value specifies a signing algorithm for the key. Possible values: ssh-rsa, rsa-sha2-256, rsa-sha2-512.
508
500
  :param pulumi.Input[bool] allow_bare_domains: Specifies if host certificates that are requested are allowed to use the base domains listed in `allowed_domains`.
509
- :param pulumi.Input[bool] allow_empty_principals: Allow signing certificates with no
510
- valid principals (e.g. any valid principal). For backwards compatibility
511
- only. The default of false is highly recommended.
512
501
  :param pulumi.Input[bool] allow_host_certificates: Specifies if certificates are allowed to be signed for use as a 'host'.
513
502
  :param pulumi.Input[bool] allow_subdomains: Specifies if host certificates that are requested are allowed to be subdomains of those listed in `allowed_domains`.
514
503
  :param pulumi.Input[bool] allow_user_certificates: Specifies if certificates are allowed to be signed for use as a 'user'.
@@ -622,11 +611,6 @@ class _SecretBackendRoleState:
622
611
  @property
623
612
  @pulumi.getter(name="allowEmptyPrincipals")
624
613
  def allow_empty_principals(self) -> Optional[pulumi.Input[bool]]:
625
- """
626
- Allow signing certificates with no
627
- valid principals (e.g. any valid principal). For backwards compatibility
628
- only. The default of false is highly recommended.
629
- """
630
614
  return pulumi.get(self, "allow_empty_principals")
631
615
 
632
616
  @allow_empty_principals.setter
@@ -998,9 +982,6 @@ class SecretBackendRole(pulumi.CustomResource):
998
982
  :param pulumi.ResourceOptions opts: Options for the resource.
999
983
  :param pulumi.Input[str] algorithm_signer: When supplied, this value specifies a signing algorithm for the key. Possible values: ssh-rsa, rsa-sha2-256, rsa-sha2-512.
1000
984
  :param pulumi.Input[bool] allow_bare_domains: Specifies if host certificates that are requested are allowed to use the base domains listed in `allowed_domains`.
1001
- :param pulumi.Input[bool] allow_empty_principals: Allow signing certificates with no
1002
- valid principals (e.g. any valid principal). For backwards compatibility
1003
- only. The default of false is highly recommended.
1004
985
  :param pulumi.Input[bool] allow_host_certificates: Specifies if certificates are allowed to be signed for use as a 'host'.
1005
986
  :param pulumi.Input[bool] allow_subdomains: Specifies if host certificates that are requested are allowed to be subdomains of those listed in `allowed_domains`.
1006
987
  :param pulumi.Input[bool] allow_user_certificates: Specifies if certificates are allowed to be signed for use as a 'user'.
@@ -1199,9 +1180,6 @@ class SecretBackendRole(pulumi.CustomResource):
1199
1180
  :param pulumi.ResourceOptions opts: Options for the resource.
1200
1181
  :param pulumi.Input[str] algorithm_signer: When supplied, this value specifies a signing algorithm for the key. Possible values: ssh-rsa, rsa-sha2-256, rsa-sha2-512.
1201
1182
  :param pulumi.Input[bool] allow_bare_domains: Specifies if host certificates that are requested are allowed to use the base domains listed in `allowed_domains`.
1202
- :param pulumi.Input[bool] allow_empty_principals: Allow signing certificates with no
1203
- valid principals (e.g. any valid principal). For backwards compatibility
1204
- only. The default of false is highly recommended.
1205
1183
  :param pulumi.Input[bool] allow_host_certificates: Specifies if certificates are allowed to be signed for use as a 'host'.
1206
1184
  :param pulumi.Input[bool] allow_subdomains: Specifies if host certificates that are requested are allowed to be subdomains of those listed in `allowed_domains`.
1207
1185
  :param pulumi.Input[bool] allow_user_certificates: Specifies if certificates are allowed to be signed for use as a 'user'.
@@ -1285,11 +1263,6 @@ class SecretBackendRole(pulumi.CustomResource):
1285
1263
  @property
1286
1264
  @pulumi.getter(name="allowEmptyPrincipals")
1287
1265
  def allow_empty_principals(self) -> pulumi.Output[Optional[bool]]:
1288
- """
1289
- Allow signing certificates with no
1290
- valid principals (e.g. any valid principal). For backwards compatibility
1291
- only. The default of false is highly recommended.
1292
- """
1293
1266
  return pulumi.get(self, "allow_empty_principals")
1294
1267
 
1295
1268
  @property
@@ -217,7 +217,7 @@ def get_decode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
217
217
  transformation: Optional[pulumi.Input[Optional[str]]] = None,
218
218
  tweak: Optional[pulumi.Input[Optional[str]]] = None,
219
219
  value: Optional[pulumi.Input[Optional[str]]] = None,
220
- opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetDecodeResult]:
220
+ opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetDecodeResult]:
221
221
  """
222
222
  This data source supports the "/transform/decode/{role_name}" Vault endpoint.
223
223
 
@@ -272,7 +272,7 @@ def get_decode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
272
272
  __args__['transformation'] = transformation
273
273
  __args__['tweak'] = tweak
274
274
  __args__['value'] = value
275
- opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
275
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
276
276
  __ret__ = pulumi.runtime.invoke_output('vault:transform/getDecode:getDecode', __args__, opts=opts, typ=GetDecodeResult)
277
277
  return __ret__.apply(lambda __response__: GetDecodeResult(
278
278
  batch_inputs=pulumi.get(__response__, 'batch_inputs'),
@@ -219,7 +219,7 @@ def get_encode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
219
219
  transformation: Optional[pulumi.Input[Optional[str]]] = None,
220
220
  tweak: Optional[pulumi.Input[Optional[str]]] = None,
221
221
  value: Optional[pulumi.Input[Optional[str]]] = None,
222
- opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetEncodeResult]:
222
+ opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetEncodeResult]:
223
223
  """
224
224
  This data source supports the "/transform/encode/{role_name}" Vault endpoint.
225
225
 
@@ -276,7 +276,7 @@ def get_encode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
276
276
  __args__['transformation'] = transformation
277
277
  __args__['tweak'] = tweak
278
278
  __args__['value'] = value
279
- opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
279
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
280
280
  __ret__ = pulumi.runtime.invoke_output('vault:transform/getEncode:getEncode', __args__, opts=opts, typ=GetEncodeResult)
281
281
  return __ret__.apply(lambda __response__: GetEncodeResult(
282
282
  batch_inputs=pulumi.get(__response__, 'batch_inputs'),
@@ -148,7 +148,7 @@ def get_decrypt_output(backend: Optional[pulumi.Input[str]] = None,
148
148
  context: Optional[pulumi.Input[Optional[str]]] = None,
149
149
  key: Optional[pulumi.Input[str]] = None,
150
150
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
151
- opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetDecryptResult]:
151
+ opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetDecryptResult]:
152
152
  """
153
153
  This is a data source which can be used to decrypt ciphertext using a Vault Transit key.
154
154
 
@@ -169,7 +169,7 @@ def get_decrypt_output(backend: Optional[pulumi.Input[str]] = None,
169
169
  __args__['context'] = context
170
170
  __args__['key'] = key
171
171
  __args__['namespace'] = namespace
172
- opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
172
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
173
173
  __ret__ = pulumi.runtime.invoke_output('vault:transit/getDecrypt:getDecrypt', __args__, opts=opts, typ=GetDecryptResult)
174
174
  return __ret__.apply(lambda __response__: GetDecryptResult(
175
175
  backend=pulumi.get(__response__, 'backend'),
@@ -150,7 +150,7 @@ def get_encrypt_output(backend: Optional[pulumi.Input[str]] = None,
150
150
  key_version: Optional[pulumi.Input[Optional[int]]] = None,
151
151
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
152
152
  plaintext: Optional[pulumi.Input[str]] = None,
153
- opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetEncryptResult]:
153
+ opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetEncryptResult]:
154
154
  """
155
155
  This is a data source which can be used to encrypt plaintext using a Vault Transit key.
156
156
  """
@@ -161,7 +161,7 @@ def get_encrypt_output(backend: Optional[pulumi.Input[str]] = None,
161
161
  __args__['keyVersion'] = key_version
162
162
  __args__['namespace'] = namespace
163
163
  __args__['plaintext'] = plaintext
164
- opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
164
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
165
165
  __ret__ = pulumi.runtime.invoke_output('vault:transit/getEncrypt:getEncrypt', __args__, opts=opts, typ=GetEncryptResult)
166
166
  return __ret__.apply(lambda __response__: GetEncryptResult(
167
167
  backend=pulumi.get(__response__, 'backend'),
@@ -1,15 +1,15 @@
1
- Metadata-Version: 2.2
1
+ Metadata-Version: 2.1
2
2
  Name: pulumi_vault
3
- Version: 6.5.0
3
+ Version: 6.5.0a1732603022
4
4
  Summary: A Pulumi package for creating and managing HashiCorp Vault cloud resources.
5
5
  License: Apache-2.0
6
6
  Project-URL: Homepage, https://pulumi.io
7
7
  Project-URL: Repository, https://github.com/pulumi/pulumi-vault
8
8
  Keywords: pulumi,vault
9
- Requires-Python: >=3.9
9
+ Requires-Python: >=3.8
10
10
  Description-Content-Type: text/markdown
11
11
  Requires-Dist: parver>=0.2.1
12
- Requires-Dist: pulumi<4.0.0,>=3.142.0
12
+ Requires-Dist: pulumi<4.0.0,>=3.136.0
13
13
  Requires-Dist: semver>=2.8.1
14
14
  Requires-Dist: typing-extensions>=4.11; python_version < "3.11"
15
15