pulumi-vault 6.5.0__tar.gz → 6.5.0a1732603022__tar.gz

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (265) hide show
  1. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/PKG-INFO +4 -4
  2. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/__init__.py +0 -24
  3. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ad/get_access_credentials.py +2 -2
  4. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/approle/get_auth_backend_role_id.py +2 -2
  5. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/aws/auth_backend_sts_role.py +0 -47
  6. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/aws/get_access_credentials.py +2 -2
  7. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/aws/get_static_access_credentials.py +2 -2
  8. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/aws/secret_backend.py +0 -141
  9. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/azure/get_access_credentials.py +2 -2
  10. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/database/_inputs.py +0 -40
  11. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/database/outputs.py +0 -28
  12. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/gcp/get_auth_backend_role.py +2 -2
  13. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/generic/get_secret.py +2 -2
  14. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/get_auth_backend.py +2 -2
  15. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/get_auth_backends.py +2 -2
  16. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/get_namespace.py +2 -2
  17. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/get_namespaces.py +2 -2
  18. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/get_nomad_access_token.py +2 -2
  19. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/get_policy_document.py +2 -2
  20. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/get_raft_autopilot_state.py +2 -2
  21. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/get_entity.py +2 -2
  22. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/get_group.py +2 -2
  23. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/get_oidc_client_creds.py +2 -2
  24. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/get_oidc_openid_config.py +2 -2
  25. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/get_oidc_public_keys.py +2 -2
  26. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kubernetes/get_auth_backend_config.py +2 -2
  27. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kubernetes/get_auth_backend_role.py +2 -2
  28. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kubernetes/get_service_account_token.py +2 -2
  29. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kv/get_secret.py +2 -2
  30. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kv/get_secret_subkeys_v2.py +2 -2
  31. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kv/get_secret_v2.py +2 -2
  32. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kv/get_secrets_list.py +2 -2
  33. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kv/get_secrets_list_v2.py +2 -2
  34. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ldap/get_dynamic_credentials.py +2 -2
  35. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ldap/get_static_credentials.py +2 -2
  36. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/__init__.py +0 -4
  37. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/_inputs.py +0 -34
  38. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/get_backend_config_est.py +2 -2
  39. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/get_backend_issuer.py +2 -2
  40. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/get_backend_issuers.py +2 -2
  41. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/get_backend_key.py +2 -2
  42. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/get_backend_keys.py +2 -2
  43. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/outputs.py +0 -40
  44. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/secret_backend_role.py +0 -47
  45. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pulumi-plugin.json +1 -1
  46. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ssh/secret_backend_role.py +0 -27
  47. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/transform/get_decode.py +2 -2
  48. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/transform/get_encode.py +2 -2
  49. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/transit/get_decrypt.py +2 -2
  50. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/transit/get_encrypt.py +2 -2
  51. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault.egg-info/PKG-INFO +4 -4
  52. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault.egg-info/SOURCES.txt +0 -4
  53. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault.egg-info/requires.txt +1 -1
  54. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pyproject.toml +3 -3
  55. pulumi_vault-6.5.0/pulumi_vault/pkisecret/backend_acme_eab.py +0 -549
  56. pulumi_vault-6.5.0/pulumi_vault/pkisecret/backend_config_acme.py +0 -642
  57. pulumi_vault-6.5.0/pulumi_vault/pkisecret/backend_config_cmpv2.py +0 -525
  58. pulumi_vault-6.5.0/pulumi_vault/pkisecret/get_backend_config_cmpv2.py +0 -209
  59. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/README.md +0 -0
  60. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/_inputs.py +0 -0
  61. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/_utilities.py +0 -0
  62. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ad/__init__.py +0 -0
  63. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ad/secret_backend.py +0 -0
  64. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ad/secret_library.py +0 -0
  65. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ad/secret_role.py +0 -0
  66. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/alicloud/__init__.py +0 -0
  67. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/alicloud/auth_backend_role.py +0 -0
  68. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/approle/__init__.py +0 -0
  69. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/approle/auth_backend_login.py +0 -0
  70. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/approle/auth_backend_role.py +0 -0
  71. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/approle/auth_backend_role_secret_id.py +0 -0
  72. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/audit.py +0 -0
  73. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/audit_request_header.py +0 -0
  74. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/auth_backend.py +0 -0
  75. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/aws/__init__.py +0 -0
  76. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/aws/auth_backend_cert.py +0 -0
  77. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/aws/auth_backend_client.py +0 -0
  78. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/aws/auth_backend_config_identity.py +0 -0
  79. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -0
  80. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/aws/auth_backend_login.py +0 -0
  81. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/aws/auth_backend_role.py +0 -0
  82. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/aws/auth_backend_role_tag.py +0 -0
  83. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -0
  84. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/aws/secret_backend_role.py +0 -0
  85. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/aws/secret_backend_static_role.py +0 -0
  86. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/azure/__init__.py +0 -0
  87. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/azure/_inputs.py +0 -0
  88. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/azure/auth_backend_config.py +0 -0
  89. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/azure/auth_backend_role.py +0 -0
  90. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/azure/backend.py +0 -0
  91. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/azure/backend_role.py +0 -0
  92. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/azure/outputs.py +0 -0
  93. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/cert_auth_backend_role.py +0 -0
  94. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/config/__init__.py +0 -0
  95. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/config/__init__.pyi +0 -0
  96. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/config/_inputs.py +0 -0
  97. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/config/outputs.py +0 -0
  98. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/config/ui_custom_message.py +0 -0
  99. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/config/vars.py +0 -0
  100. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/consul/__init__.py +0 -0
  101. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/consul/secret_backend.py +0 -0
  102. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/consul/secret_backend_role.py +0 -0
  103. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/database/__init__.py +0 -0
  104. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/database/secret_backend_connection.py +0 -0
  105. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/database/secret_backend_role.py +0 -0
  106. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/database/secret_backend_static_role.py +0 -0
  107. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/database/secrets_mount.py +0 -0
  108. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/egp_policy.py +0 -0
  109. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/gcp/__init__.py +0 -0
  110. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/gcp/_inputs.py +0 -0
  111. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/gcp/auth_backend.py +0 -0
  112. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/gcp/auth_backend_role.py +0 -0
  113. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/gcp/outputs.py +0 -0
  114. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/gcp/secret_backend.py +0 -0
  115. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/gcp/secret_impersonated_account.py +0 -0
  116. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/gcp/secret_roleset.py +0 -0
  117. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/gcp/secret_static_account.py +0 -0
  118. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/generic/__init__.py +0 -0
  119. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/generic/endpoint.py +0 -0
  120. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/generic/secret.py +0 -0
  121. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/github/__init__.py +0 -0
  122. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/github/_inputs.py +0 -0
  123. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/github/auth_backend.py +0 -0
  124. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/github/outputs.py +0 -0
  125. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/github/team.py +0 -0
  126. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/github/user.py +0 -0
  127. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/__init__.py +0 -0
  128. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/entity.py +0 -0
  129. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/entity_alias.py +0 -0
  130. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/entity_policies.py +0 -0
  131. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/group.py +0 -0
  132. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/group_alias.py +0 -0
  133. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/group_member_entity_ids.py +0 -0
  134. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/group_member_group_ids.py +0 -0
  135. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/group_policies.py +0 -0
  136. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/mfa_duo.py +0 -0
  137. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/mfa_login_enforcement.py +0 -0
  138. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/mfa_okta.py +0 -0
  139. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/mfa_pingid.py +0 -0
  140. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/mfa_totp.py +0 -0
  141. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/oidc.py +0 -0
  142. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/oidc_assignment.py +0 -0
  143. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/oidc_client.py +0 -0
  144. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/oidc_key.py +0 -0
  145. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -0
  146. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/oidc_provider.py +0 -0
  147. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/oidc_role.py +0 -0
  148. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/oidc_scope.py +0 -0
  149. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/outputs.py +0 -0
  150. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/jwt/__init__.py +0 -0
  151. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/jwt/_inputs.py +0 -0
  152. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/jwt/auth_backend.py +0 -0
  153. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/jwt/auth_backend_role.py +0 -0
  154. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/jwt/outputs.py +0 -0
  155. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kmip/__init__.py +0 -0
  156. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kmip/secret_backend.py +0 -0
  157. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kmip/secret_role.py +0 -0
  158. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kmip/secret_scope.py +0 -0
  159. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kubernetes/__init__.py +0 -0
  160. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kubernetes/auth_backend_config.py +0 -0
  161. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kubernetes/auth_backend_role.py +0 -0
  162. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kubernetes/secret_backend.py +0 -0
  163. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kubernetes/secret_backend_role.py +0 -0
  164. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kv/__init__.py +0 -0
  165. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kv/_inputs.py +0 -0
  166. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kv/outputs.py +0 -0
  167. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kv/secret.py +0 -0
  168. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kv/secret_backend_v2.py +0 -0
  169. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kv/secret_v2.py +0 -0
  170. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ldap/__init__.py +0 -0
  171. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ldap/auth_backend.py +0 -0
  172. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ldap/auth_backend_group.py +0 -0
  173. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ldap/auth_backend_user.py +0 -0
  174. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ldap/secret_backend.py +0 -0
  175. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -0
  176. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ldap/secret_backend_library_set.py +0 -0
  177. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ldap/secret_backend_static_role.py +0 -0
  178. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/managed/__init__.py +0 -0
  179. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/managed/_inputs.py +0 -0
  180. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/managed/keys.py +0 -0
  181. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/managed/outputs.py +0 -0
  182. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/mfa_duo.py +0 -0
  183. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/mfa_okta.py +0 -0
  184. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/mfa_pingid.py +0 -0
  185. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/mfa_totp.py +0 -0
  186. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/mongodbatlas/__init__.py +0 -0
  187. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/mongodbatlas/secret_backend.py +0 -0
  188. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/mongodbatlas/secret_role.py +0 -0
  189. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/mount.py +0 -0
  190. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/namespace.py +0 -0
  191. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/nomad_secret_backend.py +0 -0
  192. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/nomad_secret_role.py +0 -0
  193. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/okta/__init__.py +0 -0
  194. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/okta/_inputs.py +0 -0
  195. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/okta/auth_backend.py +0 -0
  196. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/okta/auth_backend_group.py +0 -0
  197. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/okta/auth_backend_user.py +0 -0
  198. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/okta/outputs.py +0 -0
  199. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/outputs.py +0 -0
  200. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/password_policy.py +0 -0
  201. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/backend_config_cluster.py +0 -0
  202. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/backend_config_est.py +0 -0
  203. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/secret_backend_cert.py +0 -0
  204. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -0
  205. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -0
  206. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -0
  207. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -0
  208. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -0
  209. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -0
  210. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/secret_backend_issuer.py +0 -0
  211. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/secret_backend_key.py +0 -0
  212. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -0
  213. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -0
  214. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/secret_backend_sign.py +0 -0
  215. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/plugin.py +0 -0
  216. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/plugin_pinned_version.py +0 -0
  217. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/policy.py +0 -0
  218. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/provider.py +0 -0
  219. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/py.typed +0 -0
  220. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/quota_lease_count.py +0 -0
  221. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/quota_rate_limit.py +0 -0
  222. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/rabbitmq/__init__.py +0 -0
  223. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/rabbitmq/_inputs.py +0 -0
  224. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/rabbitmq/outputs.py +0 -0
  225. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/rabbitmq/secret_backend.py +0 -0
  226. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/rabbitmq/secret_backend_role.py +0 -0
  227. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/raft_autopilot.py +0 -0
  228. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/raft_snapshot_agent_config.py +0 -0
  229. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/rgp_policy.py +0 -0
  230. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/saml/__init__.py +0 -0
  231. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/saml/auth_backend.py +0 -0
  232. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/saml/auth_backend_role.py +0 -0
  233. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/secrets/__init__.py +0 -0
  234. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/secrets/_inputs.py +0 -0
  235. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/secrets/outputs.py +0 -0
  236. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/secrets/sync_association.py +0 -0
  237. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/secrets/sync_aws_destination.py +0 -0
  238. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/secrets/sync_azure_destination.py +0 -0
  239. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/secrets/sync_config.py +0 -0
  240. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/secrets/sync_gcp_destination.py +0 -0
  241. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/secrets/sync_gh_destination.py +0 -0
  242. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/secrets/sync_github_apps.py +0 -0
  243. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/secrets/sync_vercel_destination.py +0 -0
  244. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ssh/__init__.py +0 -0
  245. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ssh/_inputs.py +0 -0
  246. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ssh/outputs.py +0 -0
  247. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ssh/secret_backend_ca.py +0 -0
  248. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/terraformcloud/__init__.py +0 -0
  249. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/terraformcloud/secret_backend.py +0 -0
  250. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/terraformcloud/secret_creds.py +0 -0
  251. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/terraformcloud/secret_role.py +0 -0
  252. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/token.py +0 -0
  253. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/tokenauth/__init__.py +0 -0
  254. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/tokenauth/auth_backend_role.py +0 -0
  255. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/transform/__init__.py +0 -0
  256. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/transform/alphabet.py +0 -0
  257. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/transform/role.py +0 -0
  258. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/transform/template.py +0 -0
  259. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/transform/transformation.py +0 -0
  260. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/transit/__init__.py +0 -0
  261. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/transit/secret_backend_key.py +0 -0
  262. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/transit/secret_cache_config.py +0 -0
  263. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault.egg-info/dependency_links.txt +0 -0
  264. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault.egg-info/top_level.txt +0 -0
  265. {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/setup.cfg +0 -0
@@ -1,15 +1,15 @@
1
- Metadata-Version: 2.2
1
+ Metadata-Version: 2.1
2
2
  Name: pulumi_vault
3
- Version: 6.5.0
3
+ Version: 6.5.0a1732603022
4
4
  Summary: A Pulumi package for creating and managing HashiCorp Vault cloud resources.
5
5
  License: Apache-2.0
6
6
  Project-URL: Homepage, https://pulumi.io
7
7
  Project-URL: Repository, https://github.com/pulumi/pulumi-vault
8
8
  Keywords: pulumi,vault
9
- Requires-Python: >=3.9
9
+ Requires-Python: >=3.8
10
10
  Description-Content-Type: text/markdown
11
11
  Requires-Dist: parver>=0.2.1
12
- Requires-Dist: pulumi<4.0.0,>=3.142.0
12
+ Requires-Dist: pulumi<4.0.0,>=3.136.0
13
13
  Requires-Dist: semver>=2.8.1
14
14
  Requires-Dist: typing-extensions>=4.11; python_version < "3.11"
15
15
 
@@ -1013,22 +1013,6 @@ _utilities.register(
1013
1013
  "vault:okta/authBackendUser:AuthBackendUser": "AuthBackendUser"
1014
1014
  }
1015
1015
  },
1016
- {
1017
- "pkg": "vault",
1018
- "mod": "pkiSecret/backendAcmeEab",
1019
- "fqn": "pulumi_vault.pkisecret",
1020
- "classes": {
1021
- "vault:pkiSecret/backendAcmeEab:BackendAcmeEab": "BackendAcmeEab"
1022
- }
1023
- },
1024
- {
1025
- "pkg": "vault",
1026
- "mod": "pkiSecret/backendConfigAcme",
1027
- "fqn": "pulumi_vault.pkisecret",
1028
- "classes": {
1029
- "vault:pkiSecret/backendConfigAcme:BackendConfigAcme": "BackendConfigAcme"
1030
- }
1031
- },
1032
1016
  {
1033
1017
  "pkg": "vault",
1034
1018
  "mod": "pkiSecret/backendConfigCluster",
@@ -1037,14 +1021,6 @@ _utilities.register(
1037
1021
  "vault:pkiSecret/backendConfigCluster:BackendConfigCluster": "BackendConfigCluster"
1038
1022
  }
1039
1023
  },
1040
- {
1041
- "pkg": "vault",
1042
- "mod": "pkiSecret/backendConfigCmpv2",
1043
- "fqn": "pulumi_vault.pkisecret",
1044
- "classes": {
1045
- "vault:pkiSecret/backendConfigCmpv2:BackendConfigCmpv2": "BackendConfigCmpv2"
1046
- }
1047
- },
1048
1024
  {
1049
1025
  "pkg": "vault",
1050
1026
  "mod": "pkiSecret/backendConfigEst",
@@ -147,7 +147,7 @@ def get_access_credentials(backend: Optional[str] = None,
147
147
  def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
148
148
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
149
149
  role: Optional[pulumi.Input[str]] = None,
150
- opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAccessCredentialsResult]:
150
+ opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAccessCredentialsResult]:
151
151
  """
152
152
  ## Example Usage
153
153
 
@@ -165,7 +165,7 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
165
165
  __args__['backend'] = backend
166
166
  __args__['namespace'] = namespace
167
167
  __args__['role'] = role
168
- opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
168
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
169
169
  __ret__ = pulumi.runtime.invoke_output('vault:ad/getAccessCredentials:getAccessCredentials', __args__, opts=opts, typ=GetAccessCredentialsResult)
170
170
  return __ret__.apply(lambda __response__: GetAccessCredentialsResult(
171
171
  backend=pulumi.get(__response__, 'backend'),
@@ -131,7 +131,7 @@ def get_auth_backend_role_id(backend: Optional[str] = None,
131
131
  def get_auth_backend_role_id_output(backend: Optional[pulumi.Input[Optional[str]]] = None,
132
132
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
133
133
  role_name: Optional[pulumi.Input[str]] = None,
134
- opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAuthBackendRoleIdResult]:
134
+ opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendRoleIdResult]:
135
135
  """
136
136
  Reads the Role ID of an AppRole from a Vault server.
137
137
 
@@ -159,7 +159,7 @@ def get_auth_backend_role_id_output(backend: Optional[pulumi.Input[Optional[str]
159
159
  __args__['backend'] = backend
160
160
  __args__['namespace'] = namespace
161
161
  __args__['roleName'] = role_name
162
- opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
162
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
163
163
  __ret__ = pulumi.runtime.invoke_output('vault:appRole/getAuthBackendRoleId:getAuthBackendRoleId', __args__, opts=opts, typ=GetAuthBackendRoleIdResult)
164
164
  return __ret__.apply(lambda __response__: GetAuthBackendRoleIdResult(
165
165
  backend=pulumi.get(__response__, 'backend'),
@@ -22,7 +22,6 @@ class AuthBackendStsRoleArgs:
22
22
  account_id: pulumi.Input[str],
23
23
  sts_role: pulumi.Input[str],
24
24
  backend: Optional[pulumi.Input[str]] = None,
25
- external_id: Optional[pulumi.Input[str]] = None,
26
25
  namespace: Optional[pulumi.Input[str]] = None):
27
26
  """
28
27
  The set of arguments for constructing a AuthBackendStsRole resource.
@@ -31,7 +30,6 @@ class AuthBackendStsRoleArgs:
31
30
  by EC2 instances in the account specified by `account_id`.
32
31
  :param pulumi.Input[str] backend: The path the AWS auth backend being configured was
33
32
  mounted at. Defaults to `aws`.
34
- :param pulumi.Input[str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
35
33
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
36
34
  The value should not contain leading or trailing forward slashes.
37
35
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -41,8 +39,6 @@ class AuthBackendStsRoleArgs:
41
39
  pulumi.set(__self__, "sts_role", sts_role)
42
40
  if backend is not None:
43
41
  pulumi.set(__self__, "backend", backend)
44
- if external_id is not None:
45
- pulumi.set(__self__, "external_id", external_id)
46
42
  if namespace is not None:
47
43
  pulumi.set(__self__, "namespace", namespace)
48
44
 
@@ -84,18 +80,6 @@ class AuthBackendStsRoleArgs:
84
80
  def backend(self, value: Optional[pulumi.Input[str]]):
85
81
  pulumi.set(self, "backend", value)
86
82
 
87
- @property
88
- @pulumi.getter(name="externalId")
89
- def external_id(self) -> Optional[pulumi.Input[str]]:
90
- """
91
- External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
92
- """
93
- return pulumi.get(self, "external_id")
94
-
95
- @external_id.setter
96
- def external_id(self, value: Optional[pulumi.Input[str]]):
97
- pulumi.set(self, "external_id", value)
98
-
99
83
  @property
100
84
  @pulumi.getter
101
85
  def namespace(self) -> Optional[pulumi.Input[str]]:
@@ -117,7 +101,6 @@ class _AuthBackendStsRoleState:
117
101
  def __init__(__self__, *,
118
102
  account_id: Optional[pulumi.Input[str]] = None,
119
103
  backend: Optional[pulumi.Input[str]] = None,
120
- external_id: Optional[pulumi.Input[str]] = None,
121
104
  namespace: Optional[pulumi.Input[str]] = None,
122
105
  sts_role: Optional[pulumi.Input[str]] = None):
123
106
  """
@@ -125,7 +108,6 @@ class _AuthBackendStsRoleState:
125
108
  :param pulumi.Input[str] account_id: The AWS account ID to configure the STS role for.
126
109
  :param pulumi.Input[str] backend: The path the AWS auth backend being configured was
127
110
  mounted at. Defaults to `aws`.
128
- :param pulumi.Input[str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
129
111
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
130
112
  The value should not contain leading or trailing forward slashes.
131
113
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -137,8 +119,6 @@ class _AuthBackendStsRoleState:
137
119
  pulumi.set(__self__, "account_id", account_id)
138
120
  if backend is not None:
139
121
  pulumi.set(__self__, "backend", backend)
140
- if external_id is not None:
141
- pulumi.set(__self__, "external_id", external_id)
142
122
  if namespace is not None:
143
123
  pulumi.set(__self__, "namespace", namespace)
144
124
  if sts_role is not None:
@@ -169,18 +149,6 @@ class _AuthBackendStsRoleState:
169
149
  def backend(self, value: Optional[pulumi.Input[str]]):
170
150
  pulumi.set(self, "backend", value)
171
151
 
172
- @property
173
- @pulumi.getter(name="externalId")
174
- def external_id(self) -> Optional[pulumi.Input[str]]:
175
- """
176
- External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
177
- """
178
- return pulumi.get(self, "external_id")
179
-
180
- @external_id.setter
181
- def external_id(self, value: Optional[pulumi.Input[str]]):
182
- pulumi.set(self, "external_id", value)
183
-
184
152
  @property
185
153
  @pulumi.getter
186
154
  def namespace(self) -> Optional[pulumi.Input[str]]:
@@ -217,7 +185,6 @@ class AuthBackendStsRole(pulumi.CustomResource):
217
185
  opts: Optional[pulumi.ResourceOptions] = None,
218
186
  account_id: Optional[pulumi.Input[str]] = None,
219
187
  backend: Optional[pulumi.Input[str]] = None,
220
- external_id: Optional[pulumi.Input[str]] = None,
221
188
  namespace: Optional[pulumi.Input[str]] = None,
222
189
  sts_role: Optional[pulumi.Input[str]] = None,
223
190
  __props__=None):
@@ -248,7 +215,6 @@ class AuthBackendStsRole(pulumi.CustomResource):
248
215
  :param pulumi.Input[str] account_id: The AWS account ID to configure the STS role for.
249
216
  :param pulumi.Input[str] backend: The path the AWS auth backend being configured was
250
217
  mounted at. Defaults to `aws`.
251
- :param pulumi.Input[str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
252
218
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
253
219
  The value should not contain leading or trailing forward slashes.
254
220
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -301,7 +267,6 @@ class AuthBackendStsRole(pulumi.CustomResource):
301
267
  opts: Optional[pulumi.ResourceOptions] = None,
302
268
  account_id: Optional[pulumi.Input[str]] = None,
303
269
  backend: Optional[pulumi.Input[str]] = None,
304
- external_id: Optional[pulumi.Input[str]] = None,
305
270
  namespace: Optional[pulumi.Input[str]] = None,
306
271
  sts_role: Optional[pulumi.Input[str]] = None,
307
272
  __props__=None):
@@ -317,7 +282,6 @@ class AuthBackendStsRole(pulumi.CustomResource):
317
282
  raise TypeError("Missing required property 'account_id'")
318
283
  __props__.__dict__["account_id"] = account_id
319
284
  __props__.__dict__["backend"] = backend
320
- __props__.__dict__["external_id"] = external_id
321
285
  __props__.__dict__["namespace"] = namespace
322
286
  if sts_role is None and not opts.urn:
323
287
  raise TypeError("Missing required property 'sts_role'")
@@ -334,7 +298,6 @@ class AuthBackendStsRole(pulumi.CustomResource):
334
298
  opts: Optional[pulumi.ResourceOptions] = None,
335
299
  account_id: Optional[pulumi.Input[str]] = None,
336
300
  backend: Optional[pulumi.Input[str]] = None,
337
- external_id: Optional[pulumi.Input[str]] = None,
338
301
  namespace: Optional[pulumi.Input[str]] = None,
339
302
  sts_role: Optional[pulumi.Input[str]] = None) -> 'AuthBackendStsRole':
340
303
  """
@@ -347,7 +310,6 @@ class AuthBackendStsRole(pulumi.CustomResource):
347
310
  :param pulumi.Input[str] account_id: The AWS account ID to configure the STS role for.
348
311
  :param pulumi.Input[str] backend: The path the AWS auth backend being configured was
349
312
  mounted at. Defaults to `aws`.
350
- :param pulumi.Input[str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
351
313
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
352
314
  The value should not contain leading or trailing forward slashes.
353
315
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -361,7 +323,6 @@ class AuthBackendStsRole(pulumi.CustomResource):
361
323
 
362
324
  __props__.__dict__["account_id"] = account_id
363
325
  __props__.__dict__["backend"] = backend
364
- __props__.__dict__["external_id"] = external_id
365
326
  __props__.__dict__["namespace"] = namespace
366
327
  __props__.__dict__["sts_role"] = sts_role
367
328
  return AuthBackendStsRole(resource_name, opts=opts, __props__=__props__)
@@ -383,14 +344,6 @@ class AuthBackendStsRole(pulumi.CustomResource):
383
344
  """
384
345
  return pulumi.get(self, "backend")
385
346
 
386
- @property
387
- @pulumi.getter(name="externalId")
388
- def external_id(self) -> pulumi.Output[Optional[str]]:
389
- """
390
- External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
391
- """
392
- return pulumi.get(self, "external_id")
393
-
394
347
  @property
395
348
  @pulumi.getter
396
349
  def namespace(self) -> pulumi.Output[Optional[str]]:
@@ -258,7 +258,7 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
258
258
  role_arn: Optional[pulumi.Input[Optional[str]]] = None,
259
259
  ttl: Optional[pulumi.Input[Optional[str]]] = None,
260
260
  type: Optional[pulumi.Input[Optional[str]]] = None,
261
- opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAccessCredentialsResult]:
261
+ opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAccessCredentialsResult]:
262
262
  """
263
263
  ## Example Usage
264
264
 
@@ -291,7 +291,7 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
291
291
  __args__['roleArn'] = role_arn
292
292
  __args__['ttl'] = ttl
293
293
  __args__['type'] = type
294
- opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
294
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
295
295
  __ret__ = pulumi.runtime.invoke_output('vault:aws/getAccessCredentials:getAccessCredentials', __args__, opts=opts, typ=GetAccessCredentialsResult)
296
296
  return __ret__.apply(lambda __response__: GetAccessCredentialsResult(
297
297
  access_key=pulumi.get(__response__, 'access_key'),
@@ -118,7 +118,7 @@ def get_static_access_credentials(backend: Optional[str] = None,
118
118
  def get_static_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
119
119
  name: Optional[pulumi.Input[str]] = None,
120
120
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
121
- opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetStaticAccessCredentialsResult]:
121
+ opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetStaticAccessCredentialsResult]:
122
122
  """
123
123
  Use this data source to access information about an existing resource.
124
124
  """
@@ -126,7 +126,7 @@ def get_static_access_credentials_output(backend: Optional[pulumi.Input[str]] =
126
126
  __args__['backend'] = backend
127
127
  __args__['name'] = name
128
128
  __args__['namespace'] = namespace
129
- opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
129
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
130
130
  __ret__ = pulumi.runtime.invoke_output('vault:aws/getStaticAccessCredentials:getStaticAccessCredentials', __args__, opts=opts, typ=GetStaticAccessCredentialsResult)
131
131
  return __ret__.apply(lambda __response__: GetStaticAccessCredentialsResult(
132
132
  access_key=pulumi.get(__response__, 'access_key'),
@@ -35,9 +35,6 @@ class SecretBackendArgs:
35
35
  role_arn: Optional[pulumi.Input[str]] = None,
36
36
  secret_key: Optional[pulumi.Input[str]] = None,
37
37
  sts_endpoint: Optional[pulumi.Input[str]] = None,
38
- sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
39
- sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
40
- sts_region: Optional[pulumi.Input[str]] = None,
41
38
  username_template: Optional[pulumi.Input[str]] = None):
42
39
  """
43
40
  The set of arguments for constructing a SecretBackend resource.
@@ -74,9 +71,6 @@ class SecretBackendArgs:
74
71
  ```
75
72
  :param pulumi.Input[str] secret_key: The AWS Secret Access Key to use when generating new credentials.
76
73
  :param pulumi.Input[str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
77
- :param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_endpoints: Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
78
- :param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_regions: Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
79
- :param pulumi.Input[str] sts_region: Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
80
74
  :param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
81
75
  """
82
76
  if access_key is not None:
@@ -111,12 +105,6 @@ class SecretBackendArgs:
111
105
  pulumi.set(__self__, "secret_key", secret_key)
112
106
  if sts_endpoint is not None:
113
107
  pulumi.set(__self__, "sts_endpoint", sts_endpoint)
114
- if sts_fallback_endpoints is not None:
115
- pulumi.set(__self__, "sts_fallback_endpoints", sts_fallback_endpoints)
116
- if sts_fallback_regions is not None:
117
- pulumi.set(__self__, "sts_fallback_regions", sts_fallback_regions)
118
- if sts_region is not None:
119
- pulumi.set(__self__, "sts_region", sts_region)
120
108
  if username_template is not None:
121
109
  pulumi.set(__self__, "username_template", username_template)
122
110
 
@@ -329,42 +317,6 @@ class SecretBackendArgs:
329
317
  def sts_endpoint(self, value: Optional[pulumi.Input[str]]):
330
318
  pulumi.set(self, "sts_endpoint", value)
331
319
 
332
- @property
333
- @pulumi.getter(name="stsFallbackEndpoints")
334
- def sts_fallback_endpoints(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
335
- """
336
- Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
337
- """
338
- return pulumi.get(self, "sts_fallback_endpoints")
339
-
340
- @sts_fallback_endpoints.setter
341
- def sts_fallback_endpoints(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
342
- pulumi.set(self, "sts_fallback_endpoints", value)
343
-
344
- @property
345
- @pulumi.getter(name="stsFallbackRegions")
346
- def sts_fallback_regions(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
347
- """
348
- Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
349
- """
350
- return pulumi.get(self, "sts_fallback_regions")
351
-
352
- @sts_fallback_regions.setter
353
- def sts_fallback_regions(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
354
- pulumi.set(self, "sts_fallback_regions", value)
355
-
356
- @property
357
- @pulumi.getter(name="stsRegion")
358
- def sts_region(self) -> Optional[pulumi.Input[str]]:
359
- """
360
- Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
361
- """
362
- return pulumi.get(self, "sts_region")
363
-
364
- @sts_region.setter
365
- def sts_region(self, value: Optional[pulumi.Input[str]]):
366
- pulumi.set(self, "sts_region", value)
367
-
368
320
  @property
369
321
  @pulumi.getter(name="usernameTemplate")
370
322
  def username_template(self) -> Optional[pulumi.Input[str]]:
@@ -397,9 +349,6 @@ class _SecretBackendState:
397
349
  role_arn: Optional[pulumi.Input[str]] = None,
398
350
  secret_key: Optional[pulumi.Input[str]] = None,
399
351
  sts_endpoint: Optional[pulumi.Input[str]] = None,
400
- sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
401
- sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
402
- sts_region: Optional[pulumi.Input[str]] = None,
403
352
  username_template: Optional[pulumi.Input[str]] = None):
404
353
  """
405
354
  Input properties used for looking up and filtering SecretBackend resources.
@@ -436,9 +385,6 @@ class _SecretBackendState:
436
385
  ```
437
386
  :param pulumi.Input[str] secret_key: The AWS Secret Access Key to use when generating new credentials.
438
387
  :param pulumi.Input[str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
439
- :param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_endpoints: Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
440
- :param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_regions: Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
441
- :param pulumi.Input[str] sts_region: Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
442
388
  :param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
443
389
  """
444
390
  if access_key is not None:
@@ -473,12 +419,6 @@ class _SecretBackendState:
473
419
  pulumi.set(__self__, "secret_key", secret_key)
474
420
  if sts_endpoint is not None:
475
421
  pulumi.set(__self__, "sts_endpoint", sts_endpoint)
476
- if sts_fallback_endpoints is not None:
477
- pulumi.set(__self__, "sts_fallback_endpoints", sts_fallback_endpoints)
478
- if sts_fallback_regions is not None:
479
- pulumi.set(__self__, "sts_fallback_regions", sts_fallback_regions)
480
- if sts_region is not None:
481
- pulumi.set(__self__, "sts_region", sts_region)
482
422
  if username_template is not None:
483
423
  pulumi.set(__self__, "username_template", username_template)
484
424
 
@@ -691,42 +631,6 @@ class _SecretBackendState:
691
631
  def sts_endpoint(self, value: Optional[pulumi.Input[str]]):
692
632
  pulumi.set(self, "sts_endpoint", value)
693
633
 
694
- @property
695
- @pulumi.getter(name="stsFallbackEndpoints")
696
- def sts_fallback_endpoints(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
697
- """
698
- Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
699
- """
700
- return pulumi.get(self, "sts_fallback_endpoints")
701
-
702
- @sts_fallback_endpoints.setter
703
- def sts_fallback_endpoints(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
704
- pulumi.set(self, "sts_fallback_endpoints", value)
705
-
706
- @property
707
- @pulumi.getter(name="stsFallbackRegions")
708
- def sts_fallback_regions(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
709
- """
710
- Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
711
- """
712
- return pulumi.get(self, "sts_fallback_regions")
713
-
714
- @sts_fallback_regions.setter
715
- def sts_fallback_regions(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
716
- pulumi.set(self, "sts_fallback_regions", value)
717
-
718
- @property
719
- @pulumi.getter(name="stsRegion")
720
- def sts_region(self) -> Optional[pulumi.Input[str]]:
721
- """
722
- Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
723
- """
724
- return pulumi.get(self, "sts_region")
725
-
726
- @sts_region.setter
727
- def sts_region(self, value: Optional[pulumi.Input[str]]):
728
- pulumi.set(self, "sts_region", value)
729
-
730
634
  @property
731
635
  @pulumi.getter(name="usernameTemplate")
732
636
  def username_template(self) -> Optional[pulumi.Input[str]]:
@@ -761,9 +665,6 @@ class SecretBackend(pulumi.CustomResource):
761
665
  role_arn: Optional[pulumi.Input[str]] = None,
762
666
  secret_key: Optional[pulumi.Input[str]] = None,
763
667
  sts_endpoint: Optional[pulumi.Input[str]] = None,
764
- sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
765
- sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
766
- sts_region: Optional[pulumi.Input[str]] = None,
767
668
  username_template: Optional[pulumi.Input[str]] = None,
768
669
  __props__=None):
769
670
  """
@@ -810,9 +711,6 @@ class SecretBackend(pulumi.CustomResource):
810
711
  ```
811
712
  :param pulumi.Input[str] secret_key: The AWS Secret Access Key to use when generating new credentials.
812
713
  :param pulumi.Input[str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
813
- :param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_endpoints: Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
814
- :param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_regions: Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
815
- :param pulumi.Input[str] sts_region: Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
816
714
  :param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
817
715
  """
818
716
  ...
@@ -861,9 +759,6 @@ class SecretBackend(pulumi.CustomResource):
861
759
  role_arn: Optional[pulumi.Input[str]] = None,
862
760
  secret_key: Optional[pulumi.Input[str]] = None,
863
761
  sts_endpoint: Optional[pulumi.Input[str]] = None,
864
- sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
865
- sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
866
- sts_region: Optional[pulumi.Input[str]] = None,
867
762
  username_template: Optional[pulumi.Input[str]] = None,
868
763
  __props__=None):
869
764
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
@@ -890,9 +785,6 @@ class SecretBackend(pulumi.CustomResource):
890
785
  __props__.__dict__["role_arn"] = role_arn
891
786
  __props__.__dict__["secret_key"] = None if secret_key is None else pulumi.Output.secret(secret_key)
892
787
  __props__.__dict__["sts_endpoint"] = sts_endpoint
893
- __props__.__dict__["sts_fallback_endpoints"] = sts_fallback_endpoints
894
- __props__.__dict__["sts_fallback_regions"] = sts_fallback_regions
895
- __props__.__dict__["sts_region"] = sts_region
896
788
  __props__.__dict__["username_template"] = username_template
897
789
  secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["accessKey", "secretKey"])
898
790
  opts = pulumi.ResourceOptions.merge(opts, secret_opts)
@@ -922,9 +814,6 @@ class SecretBackend(pulumi.CustomResource):
922
814
  role_arn: Optional[pulumi.Input[str]] = None,
923
815
  secret_key: Optional[pulumi.Input[str]] = None,
924
816
  sts_endpoint: Optional[pulumi.Input[str]] = None,
925
- sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
926
- sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
927
- sts_region: Optional[pulumi.Input[str]] = None,
928
817
  username_template: Optional[pulumi.Input[str]] = None) -> 'SecretBackend':
929
818
  """
930
819
  Get an existing SecretBackend resource's state with the given name, id, and optional extra
@@ -966,9 +855,6 @@ class SecretBackend(pulumi.CustomResource):
966
855
  ```
967
856
  :param pulumi.Input[str] secret_key: The AWS Secret Access Key to use when generating new credentials.
968
857
  :param pulumi.Input[str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
969
- :param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_endpoints: Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
970
- :param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_regions: Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
971
- :param pulumi.Input[str] sts_region: Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
972
858
  :param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
973
859
  """
974
860
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -991,9 +877,6 @@ class SecretBackend(pulumi.CustomResource):
991
877
  __props__.__dict__["role_arn"] = role_arn
992
878
  __props__.__dict__["secret_key"] = secret_key
993
879
  __props__.__dict__["sts_endpoint"] = sts_endpoint
994
- __props__.__dict__["sts_fallback_endpoints"] = sts_fallback_endpoints
995
- __props__.__dict__["sts_fallback_regions"] = sts_fallback_regions
996
- __props__.__dict__["sts_region"] = sts_region
997
880
  __props__.__dict__["username_template"] = username_template
998
881
  return SecretBackend(resource_name, opts=opts, __props__=__props__)
999
882
 
@@ -1142,30 +1025,6 @@ class SecretBackend(pulumi.CustomResource):
1142
1025
  """
1143
1026
  return pulumi.get(self, "sts_endpoint")
1144
1027
 
1145
- @property
1146
- @pulumi.getter(name="stsFallbackEndpoints")
1147
- def sts_fallback_endpoints(self) -> pulumi.Output[Optional[Sequence[str]]]:
1148
- """
1149
- Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
1150
- """
1151
- return pulumi.get(self, "sts_fallback_endpoints")
1152
-
1153
- @property
1154
- @pulumi.getter(name="stsFallbackRegions")
1155
- def sts_fallback_regions(self) -> pulumi.Output[Optional[Sequence[str]]]:
1156
- """
1157
- Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
1158
- """
1159
- return pulumi.get(self, "sts_fallback_regions")
1160
-
1161
- @property
1162
- @pulumi.getter(name="stsRegion")
1163
- def sts_region(self) -> pulumi.Output[Optional[str]]:
1164
- """
1165
- Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
1166
- """
1167
- return pulumi.get(self, "sts_region")
1168
-
1169
1028
  @property
1170
1029
  @pulumi.getter(name="usernameTemplate")
1171
1030
  def username_template(self) -> pulumi.Output[str]:
@@ -313,7 +313,7 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
313
313
  subscription_id: Optional[pulumi.Input[Optional[str]]] = None,
314
314
  tenant_id: Optional[pulumi.Input[Optional[str]]] = None,
315
315
  validate_creds: Optional[pulumi.Input[Optional[bool]]] = None,
316
- opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAccessCredentialsResult]:
316
+ opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAccessCredentialsResult]:
317
317
  """
318
318
  ## Example Usage
319
319
 
@@ -378,7 +378,7 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
378
378
  __args__['subscriptionId'] = subscription_id
379
379
  __args__['tenantId'] = tenant_id
380
380
  __args__['validateCreds'] = validate_creds
381
- opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
381
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
382
382
  __ret__ = pulumi.runtime.invoke_output('vault:azure/getAccessCredentials:getAccessCredentials', __args__, opts=opts, typ=GetAccessCredentialsResult)
383
383
  return __ret__.apply(lambda __response__: GetAccessCredentialsResult(
384
384
  backend=pulumi.get(__response__, 'backend'),