pulumi-vault 6.8.0a1750231010__py3-none-any.whl → 7.0.0a1750489873__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -28,7 +28,6 @@ class AuthBackendArgs:
28
28
  description: Optional[pulumi.Input[builtins.str]] = None,
29
29
  disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
30
30
  groups: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]]] = None,
31
- max_ttl: Optional[pulumi.Input[builtins.str]] = None,
32
31
  namespace: Optional[pulumi.Input[builtins.str]] = None,
33
32
  path: Optional[pulumi.Input[builtins.str]] = None,
34
33
  token: Optional[pulumi.Input[builtins.str]] = None,
@@ -41,7 +40,6 @@ class AuthBackendArgs:
41
40
  token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
42
41
  token_ttl: Optional[pulumi.Input[builtins.int]] = None,
43
42
  token_type: Optional[pulumi.Input[builtins.str]] = None,
44
- ttl: Optional[pulumi.Input[builtins.str]] = None,
45
43
  users: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]]] = None):
46
44
  """
47
45
  The set of arguments for constructing a AuthBackend resource.
@@ -53,8 +51,6 @@ class AuthBackendArgs:
53
51
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
54
52
  :param pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]] groups: Associate Okta groups with policies within Vault.
55
53
  See below for more details.
56
- :param pulumi.Input[builtins.str] max_ttl: Maximum duration after which authentication will be expired
57
- [See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
58
54
  :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
59
55
  The value should not contain leading or trailing forward slashes.
60
56
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -71,8 +67,6 @@ class AuthBackendArgs:
71
67
  :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
72
68
  :param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
73
69
  :param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
74
- :param pulumi.Input[builtins.str] ttl: Duration after which authentication will be expired.
75
- [See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
76
70
  :param pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]] users: Associate Okta users with groups or policies within Vault.
77
71
  See below for more details.
78
72
  """
@@ -87,11 +81,6 @@ class AuthBackendArgs:
87
81
  pulumi.set(__self__, "disable_remount", disable_remount)
88
82
  if groups is not None:
89
83
  pulumi.set(__self__, "groups", groups)
90
- if max_ttl is not None:
91
- warnings.warn("""Deprecated. Please use `token_max_ttl` instead.""", DeprecationWarning)
92
- pulumi.log.warn("""max_ttl is deprecated: Deprecated. Please use `token_max_ttl` instead.""")
93
- if max_ttl is not None:
94
- pulumi.set(__self__, "max_ttl", max_ttl)
95
84
  if namespace is not None:
96
85
  pulumi.set(__self__, "namespace", namespace)
97
86
  if path is not None:
@@ -116,11 +105,6 @@ class AuthBackendArgs:
116
105
  pulumi.set(__self__, "token_ttl", token_ttl)
117
106
  if token_type is not None:
118
107
  pulumi.set(__self__, "token_type", token_type)
119
- if ttl is not None:
120
- warnings.warn("""Deprecated. Please use `token_ttl` instead.""", DeprecationWarning)
121
- pulumi.log.warn("""ttl is deprecated: Deprecated. Please use `token_ttl` instead.""")
122
- if ttl is not None:
123
- pulumi.set(__self__, "ttl", ttl)
124
108
  if users is not None:
125
109
  pulumi.set(__self__, "users", users)
126
110
 
@@ -198,20 +182,6 @@ class AuthBackendArgs:
198
182
  def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]]]):
199
183
  pulumi.set(self, "groups", value)
200
184
 
201
- @property
202
- @pulumi.getter(name="maxTtl")
203
- @_utilities.deprecated("""Deprecated. Please use `token_max_ttl` instead.""")
204
- def max_ttl(self) -> Optional[pulumi.Input[builtins.str]]:
205
- """
206
- Maximum duration after which authentication will be expired
207
- [See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
208
- """
209
- return pulumi.get(self, "max_ttl")
210
-
211
- @max_ttl.setter
212
- def max_ttl(self, value: Optional[pulumi.Input[builtins.str]]):
213
- pulumi.set(self, "max_ttl", value)
214
-
215
185
  @property
216
186
  @pulumi.getter
217
187
  def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
@@ -360,20 +330,6 @@ class AuthBackendArgs:
360
330
  def token_type(self, value: Optional[pulumi.Input[builtins.str]]):
361
331
  pulumi.set(self, "token_type", value)
362
332
 
363
- @property
364
- @pulumi.getter
365
- @_utilities.deprecated("""Deprecated. Please use `token_ttl` instead.""")
366
- def ttl(self) -> Optional[pulumi.Input[builtins.str]]:
367
- """
368
- Duration after which authentication will be expired.
369
- [See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
370
- """
371
- return pulumi.get(self, "ttl")
372
-
373
- @ttl.setter
374
- def ttl(self, value: Optional[pulumi.Input[builtins.str]]):
375
- pulumi.set(self, "ttl", value)
376
-
377
333
  @property
378
334
  @pulumi.getter
379
335
  def users(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]]]:
@@ -397,7 +353,6 @@ class _AuthBackendState:
397
353
  description: Optional[pulumi.Input[builtins.str]] = None,
398
354
  disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
399
355
  groups: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]]] = None,
400
- max_ttl: Optional[pulumi.Input[builtins.str]] = None,
401
356
  namespace: Optional[pulumi.Input[builtins.str]] = None,
402
357
  organization: Optional[pulumi.Input[builtins.str]] = None,
403
358
  path: Optional[pulumi.Input[builtins.str]] = None,
@@ -411,7 +366,6 @@ class _AuthBackendState:
411
366
  token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
412
367
  token_ttl: Optional[pulumi.Input[builtins.int]] = None,
413
368
  token_type: Optional[pulumi.Input[builtins.str]] = None,
414
- ttl: Optional[pulumi.Input[builtins.str]] = None,
415
369
  users: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]]] = None):
416
370
  """
417
371
  Input properties used for looking up and filtering AuthBackend resources.
@@ -423,8 +377,6 @@ class _AuthBackendState:
423
377
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
424
378
  :param pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]] groups: Associate Okta groups with policies within Vault.
425
379
  See below for more details.
426
- :param pulumi.Input[builtins.str] max_ttl: Maximum duration after which authentication will be expired
427
- [See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
428
380
  :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
429
381
  The value should not contain leading or trailing forward slashes.
430
382
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -442,8 +394,6 @@ class _AuthBackendState:
442
394
  :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
443
395
  :param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
444
396
  :param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
445
- :param pulumi.Input[builtins.str] ttl: Duration after which authentication will be expired.
446
- [See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
447
397
  :param pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]] users: Associate Okta users with groups or policies within Vault.
448
398
  See below for more details.
449
399
  """
@@ -459,11 +409,6 @@ class _AuthBackendState:
459
409
  pulumi.set(__self__, "disable_remount", disable_remount)
460
410
  if groups is not None:
461
411
  pulumi.set(__self__, "groups", groups)
462
- if max_ttl is not None:
463
- warnings.warn("""Deprecated. Please use `token_max_ttl` instead.""", DeprecationWarning)
464
- pulumi.log.warn("""max_ttl is deprecated: Deprecated. Please use `token_max_ttl` instead.""")
465
- if max_ttl is not None:
466
- pulumi.set(__self__, "max_ttl", max_ttl)
467
412
  if namespace is not None:
468
413
  pulumi.set(__self__, "namespace", namespace)
469
414
  if organization is not None:
@@ -490,11 +435,6 @@ class _AuthBackendState:
490
435
  pulumi.set(__self__, "token_ttl", token_ttl)
491
436
  if token_type is not None:
492
437
  pulumi.set(__self__, "token_type", token_type)
493
- if ttl is not None:
494
- warnings.warn("""Deprecated. Please use `token_ttl` instead.""", DeprecationWarning)
495
- pulumi.log.warn("""ttl is deprecated: Deprecated. Please use `token_ttl` instead.""")
496
- if ttl is not None:
497
- pulumi.set(__self__, "ttl", ttl)
498
438
  if users is not None:
499
439
  pulumi.set(__self__, "users", users)
500
440
 
@@ -572,20 +512,6 @@ class _AuthBackendState:
572
512
  def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]]]):
573
513
  pulumi.set(self, "groups", value)
574
514
 
575
- @property
576
- @pulumi.getter(name="maxTtl")
577
- @_utilities.deprecated("""Deprecated. Please use `token_max_ttl` instead.""")
578
- def max_ttl(self) -> Optional[pulumi.Input[builtins.str]]:
579
- """
580
- Maximum duration after which authentication will be expired
581
- [See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
582
- """
583
- return pulumi.get(self, "max_ttl")
584
-
585
- @max_ttl.setter
586
- def max_ttl(self, value: Optional[pulumi.Input[builtins.str]]):
587
- pulumi.set(self, "max_ttl", value)
588
-
589
515
  @property
590
516
  @pulumi.getter
591
517
  def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
@@ -746,20 +672,6 @@ class _AuthBackendState:
746
672
  def token_type(self, value: Optional[pulumi.Input[builtins.str]]):
747
673
  pulumi.set(self, "token_type", value)
748
674
 
749
- @property
750
- @pulumi.getter
751
- @_utilities.deprecated("""Deprecated. Please use `token_ttl` instead.""")
752
- def ttl(self) -> Optional[pulumi.Input[builtins.str]]:
753
- """
754
- Duration after which authentication will be expired.
755
- [See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
756
- """
757
- return pulumi.get(self, "ttl")
758
-
759
- @ttl.setter
760
- def ttl(self, value: Optional[pulumi.Input[builtins.str]]):
761
- pulumi.set(self, "ttl", value)
762
-
763
675
  @property
764
676
  @pulumi.getter
765
677
  def users(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]]]:
@@ -785,7 +697,6 @@ class AuthBackend(pulumi.CustomResource):
785
697
  description: Optional[pulumi.Input[builtins.str]] = None,
786
698
  disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
787
699
  groups: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendGroupArgs', 'AuthBackendGroupArgsDict']]]]] = None,
788
- max_ttl: Optional[pulumi.Input[builtins.str]] = None,
789
700
  namespace: Optional[pulumi.Input[builtins.str]] = None,
790
701
  organization: Optional[pulumi.Input[builtins.str]] = None,
791
702
  path: Optional[pulumi.Input[builtins.str]] = None,
@@ -799,7 +710,6 @@ class AuthBackend(pulumi.CustomResource):
799
710
  token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
800
711
  token_ttl: Optional[pulumi.Input[builtins.int]] = None,
801
712
  token_type: Optional[pulumi.Input[builtins.str]] = None,
802
- ttl: Optional[pulumi.Input[builtins.str]] = None,
803
713
  users: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendUserArgs', 'AuthBackendUserArgsDict']]]]] = None,
804
714
  __props__=None):
805
715
  """
@@ -846,8 +756,6 @@ class AuthBackend(pulumi.CustomResource):
846
756
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
847
757
  :param pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendGroupArgs', 'AuthBackendGroupArgsDict']]]] groups: Associate Okta groups with policies within Vault.
848
758
  See below for more details.
849
- :param pulumi.Input[builtins.str] max_ttl: Maximum duration after which authentication will be expired
850
- [See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
851
759
  :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
852
760
  The value should not contain leading or trailing forward slashes.
853
761
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -865,8 +773,6 @@ class AuthBackend(pulumi.CustomResource):
865
773
  :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
866
774
  :param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
867
775
  :param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
868
- :param pulumi.Input[builtins.str] ttl: Duration after which authentication will be expired.
869
- [See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
870
776
  :param pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendUserArgs', 'AuthBackendUserArgsDict']]]] users: Associate Okta users with groups or policies within Vault.
871
777
  See below for more details.
872
778
  """
@@ -931,7 +837,6 @@ class AuthBackend(pulumi.CustomResource):
931
837
  description: Optional[pulumi.Input[builtins.str]] = None,
932
838
  disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
933
839
  groups: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendGroupArgs', 'AuthBackendGroupArgsDict']]]]] = None,
934
- max_ttl: Optional[pulumi.Input[builtins.str]] = None,
935
840
  namespace: Optional[pulumi.Input[builtins.str]] = None,
936
841
  organization: Optional[pulumi.Input[builtins.str]] = None,
937
842
  path: Optional[pulumi.Input[builtins.str]] = None,
@@ -945,7 +850,6 @@ class AuthBackend(pulumi.CustomResource):
945
850
  token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
946
851
  token_ttl: Optional[pulumi.Input[builtins.int]] = None,
947
852
  token_type: Optional[pulumi.Input[builtins.str]] = None,
948
- ttl: Optional[pulumi.Input[builtins.str]] = None,
949
853
  users: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendUserArgs', 'AuthBackendUserArgsDict']]]]] = None,
950
854
  __props__=None):
951
855
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
@@ -961,7 +865,6 @@ class AuthBackend(pulumi.CustomResource):
961
865
  __props__.__dict__["description"] = description
962
866
  __props__.__dict__["disable_remount"] = disable_remount
963
867
  __props__.__dict__["groups"] = groups
964
- __props__.__dict__["max_ttl"] = max_ttl
965
868
  __props__.__dict__["namespace"] = namespace
966
869
  if organization is None and not opts.urn:
967
870
  raise TypeError("Missing required property 'organization'")
@@ -977,7 +880,6 @@ class AuthBackend(pulumi.CustomResource):
977
880
  __props__.__dict__["token_policies"] = token_policies
978
881
  __props__.__dict__["token_ttl"] = token_ttl
979
882
  __props__.__dict__["token_type"] = token_type
980
- __props__.__dict__["ttl"] = ttl
981
883
  __props__.__dict__["users"] = users
982
884
  __props__.__dict__["accessor"] = None
983
885
  secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["token"])
@@ -998,7 +900,6 @@ class AuthBackend(pulumi.CustomResource):
998
900
  description: Optional[pulumi.Input[builtins.str]] = None,
999
901
  disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
1000
902
  groups: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendGroupArgs', 'AuthBackendGroupArgsDict']]]]] = None,
1001
- max_ttl: Optional[pulumi.Input[builtins.str]] = None,
1002
903
  namespace: Optional[pulumi.Input[builtins.str]] = None,
1003
904
  organization: Optional[pulumi.Input[builtins.str]] = None,
1004
905
  path: Optional[pulumi.Input[builtins.str]] = None,
@@ -1012,7 +913,6 @@ class AuthBackend(pulumi.CustomResource):
1012
913
  token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1013
914
  token_ttl: Optional[pulumi.Input[builtins.int]] = None,
1014
915
  token_type: Optional[pulumi.Input[builtins.str]] = None,
1015
- ttl: Optional[pulumi.Input[builtins.str]] = None,
1016
916
  users: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendUserArgs', 'AuthBackendUserArgsDict']]]]] = None) -> 'AuthBackend':
1017
917
  """
1018
918
  Get an existing AuthBackend resource's state with the given name, id, and optional extra
@@ -1029,8 +929,6 @@ class AuthBackend(pulumi.CustomResource):
1029
929
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1030
930
  :param pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendGroupArgs', 'AuthBackendGroupArgsDict']]]] groups: Associate Okta groups with policies within Vault.
1031
931
  See below for more details.
1032
- :param pulumi.Input[builtins.str] max_ttl: Maximum duration after which authentication will be expired
1033
- [See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
1034
932
  :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
1035
933
  The value should not contain leading or trailing forward slashes.
1036
934
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -1048,8 +946,6 @@ class AuthBackend(pulumi.CustomResource):
1048
946
  :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
1049
947
  :param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
1050
948
  :param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
1051
- :param pulumi.Input[builtins.str] ttl: Duration after which authentication will be expired.
1052
- [See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
1053
949
  :param pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendUserArgs', 'AuthBackendUserArgsDict']]]] users: Associate Okta users with groups or policies within Vault.
1054
950
  See below for more details.
1055
951
  """
@@ -1063,7 +959,6 @@ class AuthBackend(pulumi.CustomResource):
1063
959
  __props__.__dict__["description"] = description
1064
960
  __props__.__dict__["disable_remount"] = disable_remount
1065
961
  __props__.__dict__["groups"] = groups
1066
- __props__.__dict__["max_ttl"] = max_ttl
1067
962
  __props__.__dict__["namespace"] = namespace
1068
963
  __props__.__dict__["organization"] = organization
1069
964
  __props__.__dict__["path"] = path
@@ -1077,7 +972,6 @@ class AuthBackend(pulumi.CustomResource):
1077
972
  __props__.__dict__["token_policies"] = token_policies
1078
973
  __props__.__dict__["token_ttl"] = token_ttl
1079
974
  __props__.__dict__["token_type"] = token_type
1080
- __props__.__dict__["ttl"] = ttl
1081
975
  __props__.__dict__["users"] = users
1082
976
  return AuthBackend(resource_name, opts=opts, __props__=__props__)
1083
977
 
@@ -1131,16 +1025,6 @@ class AuthBackend(pulumi.CustomResource):
1131
1025
  """
1132
1026
  return pulumi.get(self, "groups")
1133
1027
 
1134
- @property
1135
- @pulumi.getter(name="maxTtl")
1136
- @_utilities.deprecated("""Deprecated. Please use `token_max_ttl` instead.""")
1137
- def max_ttl(self) -> pulumi.Output[Optional[builtins.str]]:
1138
- """
1139
- Maximum duration after which authentication will be expired
1140
- [See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
1141
- """
1142
- return pulumi.get(self, "max_ttl")
1143
-
1144
1028
  @property
1145
1029
  @pulumi.getter
1146
1030
  def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
@@ -1249,16 +1133,6 @@ class AuthBackend(pulumi.CustomResource):
1249
1133
  """
1250
1134
  return pulumi.get(self, "token_type")
1251
1135
 
1252
- @property
1253
- @pulumi.getter
1254
- @_utilities.deprecated("""Deprecated. Please use `token_ttl` instead.""")
1255
- def ttl(self) -> pulumi.Output[Optional[builtins.str]]:
1256
- """
1257
- Duration after which authentication will be expired.
1258
- [See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
1259
- """
1260
- return pulumi.get(self, "ttl")
1261
-
1262
1136
  @property
1263
1137
  @pulumi.getter
1264
1138
  def users(self) -> pulumi.Output[Sequence['outputs.AuthBackendUser']]:
pulumi_vault/provider.py CHANGED
@@ -116,9 +116,6 @@ class ProviderArgs:
116
116
  pulumi.set(__self__, "ca_cert_dir", ca_cert_dir)
117
117
  if ca_cert_file is not None:
118
118
  pulumi.set(__self__, "ca_cert_file", ca_cert_file)
119
- if client_auth is not None:
120
- warnings.warn("""Use auth_login_cert instead""", DeprecationWarning)
121
- pulumi.log.warn("""client_auth is deprecated: Use auth_login_cert instead""")
122
119
  if client_auth is not None:
123
120
  pulumi.set(__self__, "client_auth", client_auth)
124
121
  if headers is not None:
@@ -345,7 +342,6 @@ class ProviderArgs:
345
342
 
346
343
  @property
347
344
  @pulumi.getter(name="clientAuth")
348
- @_utilities.deprecated("""Use auth_login_cert instead""")
349
345
  def client_auth(self) -> Optional[pulumi.Input['ProviderClientAuthArgs']]:
350
346
  """
351
347
  Client authentication credentials.
@@ -673,7 +669,7 @@ class Provider(pulumi.ProviderResource):
673
669
  __props__.__dict__["ca_cert_dir"] = ca_cert_dir
674
670
  __props__.__dict__["ca_cert_file"] = ca_cert_file
675
671
  __props__.__dict__["client_auth"] = pulumi.Output.from_input(client_auth).apply(pulumi.runtime.to_json) if client_auth is not None else None
676
- __props__.__dict__["headers"] = pulumi.Output.secret(headers).apply(pulumi.runtime.to_json) if headers is not None else None
672
+ __props__.__dict__["headers"] = pulumi.Output.from_input(headers).apply(pulumi.runtime.to_json) if headers is not None else None
677
673
  if max_lease_ttl_seconds is None:
678
674
  max_lease_ttl_seconds = (_utilities.get_env_int('TERRAFORM_VAULT_MAX_TTL') or 1200)
679
675
  __props__.__dict__["max_lease_ttl_seconds"] = pulumi.Output.from_input(max_lease_ttl_seconds).apply(pulumi.runtime.to_json) if max_lease_ttl_seconds is not None else None
@@ -1,5 +1,5 @@
1
1
  {
2
2
  "resource": true,
3
3
  "name": "vault",
4
- "version": "6.8.0-alpha.1750231010"
4
+ "version": "7.0.0-alpha.1750489873"
5
5
  }
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.4
2
2
  Name: pulumi_vault
3
- Version: 6.8.0a1750231010
3
+ Version: 7.0.0a1750489873
4
4
  Summary: A Pulumi package for creating and managing HashiCorp Vault cloud resources.
5
5
  License: Apache-2.0
6
6
  Project-URL: Homepage, https://pulumi.io
@@ -1,5 +1,5 @@
1
- pulumi_vault/__init__.py,sha256=Mo0XnHRsGALhsG_7mnHmApDWdRaPYoNdFXcn07cXWHk,32401
2
- pulumi_vault/_inputs.py,sha256=dLNwyHnxKOEalNc5qTWlUzk5kT8cwGKdR8ZESKqGysk,98442
1
+ pulumi_vault/__init__.py,sha256=h0r6XmHmzzbm62VM1lQMq9o9ZJ_-VuWz71HrLrGWP7w,32203
2
+ pulumi_vault/_inputs.py,sha256=dMqtMZQoofAvjjhDn8WnRkiEPYqXhcudXhdFNglP384,98872
3
3
  pulumi_vault/_utilities.py,sha256=66uLGQDI1oMFOI3Fe5igAphtexWhcSLDyuVW50jW3ik,10789
4
4
  pulumi_vault/audit.py,sha256=zTfPwj-dxashc2_WJiRkt0nmqpKJUPAeBV_4ugehak4,21317
5
5
  pulumi_vault/audit_request_header.py,sha256=ynkvCac3a6wMmhEeKkxEjxNwZZg8GuYEQNKY0a4XEyM,10935
@@ -22,12 +22,11 @@ pulumi_vault/namespace.py,sha256=5lt7f3B6E-bXgLhMD8-2X6zpvwG7D1xnHf742Ceczjk,190
22
22
  pulumi_vault/nomad_secret_backend.py,sha256=EfqPmZUSqlNGsVM3mHVZyZuqbwfsZgp0WLX4x3E3Tz0,44152
23
23
  pulumi_vault/nomad_secret_role.py,sha256=gzp1pZKCvMdsiJp3KTkJ0sqxLrUelVZccO4mJQsDz9U,21140
24
24
  pulumi_vault/outputs.py,sha256=CO91AcXZhAKFlT3LGW6Gr8h-zTyADKD_oPjmu__GdIA,14949
25
- pulumi_vault/password_policy.py,sha256=nZiXi2E6qDT8wLcw2mc0--2ORoEBgSsKMEvK_AlgjTU,12855
26
25
  pulumi_vault/plugin.py,sha256=wl7UgUnTfB9xPl-Iee8g5ReR3UvT2-yC_Bqu74Uxxgs,24836
27
26
  pulumi_vault/plugin_pinned_version.py,sha256=vs6h8img2CawV-_hRLNAMtPLOy6TyyBVyVsmtj-R1Wo,11207
28
27
  pulumi_vault/policy.py,sha256=TqnEYkckmNBOSkOgMF0QFTS2eewNQ9kNh2X3tFIpSSE,11533
29
- pulumi_vault/provider.py,sha256=GDAc5gD_sQQmVFwjN48NWkh98mzEkMY41IU5UsfGEMY,44727
30
- pulumi_vault/pulumi-plugin.json,sha256=s41jLhJXob4apCmTIxuH9Pm3ClQsOabQkOdlDC7zHY4,81
28
+ pulumi_vault/provider.py,sha256=e4RULnU4J0vlFPScJWYv-PmZIP_6oiPQLb6AYuxDFBk,44462
29
+ pulumi_vault/pulumi-plugin.json,sha256=atUz1hVOXO6D2278EPl3vI4XEnWuse9GKJPKeblEfQE,81
31
30
  pulumi_vault/py.typed,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
32
31
  pulumi_vault/quota_lease_count.py,sha256=JzC1ZI-a07028W0hw6LPkobgNSe2M19pPBVpX9-StbQ,25892
33
32
  pulumi_vault/quota_rate_limit.py,sha256=CV1BjHJrWTlJPFrPaBmmT9dtuHDpNbiwC_JkvWEuqkU,30747
@@ -66,33 +65,33 @@ pulumi_vault/azure/__init__.py,sha256=REenr_z9-4E3nXWUO1s5qiZdDTKT9Yqr0Mp554QNg7
66
65
  pulumi_vault/azure/_inputs.py,sha256=XHWHtM3DeQIJRm5cPtTCZbh7zjXfTTEDEDDr8xsYfm4,3506
67
66
  pulumi_vault/azure/auth_backend_config.py,sha256=4LKmnUdSe1fYzC6iLW3H3FXILdQixjPOnS6JQJ5dp7I,46642
68
67
  pulumi_vault/azure/auth_backend_role.py,sha256=XJ2F6Xl5-VfZXIzrEYJuAetCy4dRNfpiE1trz7BcjnQ,57218
69
- pulumi_vault/azure/backend.py,sha256=qHusPpab0ZIBcXHOGjM7756NCSIIm6mkEmsJGHYta8M,56818
68
+ pulumi_vault/azure/backend.py,sha256=9XMDkamHizuhIkeIHcHTbk4AIZGKt26dYnEnXjY4teI,51648
70
69
  pulumi_vault/azure/backend_role.py,sha256=wlsVxA4jxgNtQwOHpIuTTxCgBgP9JdHnSkqghfqzTiA,43930
71
70
  pulumi_vault/azure/get_access_credentials.py,sha256=A25OoLqP0_Wd6KhEyKVbRWoeUf9suKckvHF0hsxdEi4,20385
72
71
  pulumi_vault/azure/outputs.py,sha256=ZgrsZTAPXgKdKzQg-cB4i8DXCDZciXorNvIGaz3dcx0,3359
73
72
  pulumi_vault/config/__init__.py,sha256=LBsoZbCKMHDFo-5RJPY0lRzMsShB1weBQPxL9RQBFtY,283
74
73
  pulumi_vault/config/__init__.pyi,sha256=D4j5oXEySKnM4Jnf6mXF2KcaD151CNt2fMp66vxG5kU,3312
75
74
  pulumi_vault/config/_inputs.py,sha256=WOYG92OMcBmcbUKaKNjN63n-L7K9jU9LozDBoev3nq8,1992
76
- pulumi_vault/config/outputs.py,sha256=OYF_Nfwu7GMeruZoLq5JJxWpA6FSAQ_-pn21cQyfUzU,45282
75
+ pulumi_vault/config/outputs.py,sha256=UVI1vk_viS4XKIg7296aw_1tYouZaHlPlVfmoJFNzXA,45597
77
76
  pulumi_vault/config/ui_custom_message.py,sha256=14gm4Pf1MSaV7WOrXlu9R70Eppad-EJHwALDBpendjs,24011
78
77
  pulumi_vault/config/vars.py,sha256=3IYXokNRsps5_83etk8gaSnG_oD9TfiJxNW4EEMy4Tw,6697
79
78
  pulumi_vault/consul/__init__.py,sha256=zhq-CCogqo7Fr2-__lboX5FUmDlXUqwK7cQINzhLhA4,332
80
79
  pulumi_vault/consul/secret_backend.py,sha256=97GHkK6curnqGlJgxrzBawVwLqaVMOyKOOP06vcveNw,41515
81
80
  pulumi_vault/consul/secret_backend_role.py,sha256=c0bfvvhIhKqYVmjcNIjvmmYWTogykLcu9K5tiV9pi-s,43400
82
81
  pulumi_vault/database/__init__.py,sha256=aoZ2W-UiiV4smvSf5q-uHk0UTUB6qOGYzfObA4-jnEo,459
83
- pulumi_vault/database/_inputs.py,sha256=P0yJ1iX0pvx40STZVCfBKZqXw28uBA2HzIa7SAxU41o,489342
84
- pulumi_vault/database/outputs.py,sha256=Ga_IzJitaSaj6Qh9HvgXT2Nv5tqryGo5X3LRZLLKK2M,338871
85
- pulumi_vault/database/secret_backend_connection.py,sha256=jSUwJB6T-mW_IzDkI5VRUXo178tz9rbGYw-LxHxBqC0,91180
82
+ pulumi_vault/database/_inputs.py,sha256=50WDBsTS_NARkcx_cuaMaOOilOx5mmo8I3yyZyg56vs,510110
83
+ pulumi_vault/database/outputs.py,sha256=HM2OJhZS7iXYYhks4ytDmt_S7ZDylb8kICjduOrMWQM,353303
84
+ pulumi_vault/database/secret_backend_connection.py,sha256=OdVfkDV9OjKNNstU_G09GEEcXb770NjlWuCUePotK20,91800
86
85
  pulumi_vault/database/secret_backend_role.py,sha256=2KkrCXkAOs8BRfXz19ps9RNR0A0GZ7WU9-1ko6zD77w,38703
87
86
  pulumi_vault/database/secret_backend_static_role.py,sha256=cryQSPRFcuMEeG9psR4zG5A3GPWM-MgTep62iFleo0w,44034
88
- pulumi_vault/database/secrets_mount.py,sha256=BzFGjfggZ3tam0qc_8euwBxmiWl267L1GAX0zurQy1M,118777
87
+ pulumi_vault/database/secrets_mount.py,sha256=no2NJI_xhW3jG7prTTFJIoEy-m4aYZcgphx9qG0MmKY,119397
89
88
  pulumi_vault/gcp/__init__.py,sha256=lHe18sSRojUWSbofTBS55MZmZWmSn8jJ_Xs_Q_r6iXA,550
90
89
  pulumi_vault/gcp/_inputs.py,sha256=bDg1_ZQU3lzaQAo7Cgot4Rve5oGGSCe5XEDJGigHVEM,20089
91
90
  pulumi_vault/gcp/auth_backend.py,sha256=VGvStkIP0I1hIq5bW0wdUDxm0g9u9UOsniR4q1Wj32s,67062
92
91
  pulumi_vault/gcp/auth_backend_role.py,sha256=hKbD-ab4nkdBo3HHB2aAGdUJjg9DMvOeLOMd-M5U4jQ,54664
93
92
  pulumi_vault/gcp/get_auth_backend_role.py,sha256=ddr5M7XtkS0nkdAHzRDvij03MeG-v20utEixNTjuU70,25781
94
93
  pulumi_vault/gcp/outputs.py,sha256=eEUoNLmhOA_QcqPNQbaVxPute9lH_ZpALyjBtoJLckI,13217
95
- pulumi_vault/gcp/secret_backend.py,sha256=wLtnhM233hfyQjCS6MRHAfiMDWLidUUGSOD-67AIuno,56364
94
+ pulumi_vault/gcp/secret_backend.py,sha256=J0lLl_x8dXcrbpD3Lo_Uc3nSIcGylreZLYgmshwxuE8,59720
96
95
  pulumi_vault/gcp/secret_impersonated_account.py,sha256=Qn9RDy5GWeNg1in5DYLz4wuHvMj9Yf966yDEciNJIgE,22685
97
96
  pulumi_vault/gcp/secret_roleset.py,sha256=e91on0EZAipTeILS8ud_9PogNUgh4PjHcSpWK-6kCMY,27067
98
97
  pulumi_vault/gcp/secret_static_account.py,sha256=KAwccUnmed9aNnu3NaqkjaJ1qdYuQAl-svE8gkj-6ng,28401
@@ -152,16 +151,16 @@ pulumi_vault/kubernetes/get_service_account_token.py,sha256=wZ0W1ca3PP1wYz3GJrgg
152
151
  pulumi_vault/kubernetes/secret_backend.py,sha256=r5scM9mtiTIo-vst7TnDXCzDCYxKtJ2S0_TDMAOTHaM,69650
153
152
  pulumi_vault/kubernetes/secret_backend_role.py,sha256=IVvFyeF4reA4oKgyZe73gaQpOxSbUXK0AP7xzfy7uvA,57720
154
153
  pulumi_vault/kv/__init__.py,sha256=1XUGX4F8g_MaH4rdbH2Rnyk38OsXKR2cE1nnXMd08hA,551
155
- pulumi_vault/kv/_inputs.py,sha256=y6qieWo5Mkzw15JUVzfLUW7pbpN1c4HT3yKVKyw95Xw,5040
154
+ pulumi_vault/kv/_inputs.py,sha256=cR6b2Z5c1Hl2OVykkbFGRiDWsK2YaM9y2tyFu25X63M,5343
156
155
  pulumi_vault/kv/get_secret.py,sha256=JtLfz4nFn1o6cjWuU8IdCaGZTPT3BAKlgiwKj4MzAOA,8922
157
156
  pulumi_vault/kv/get_secret_subkeys_v2.py,sha256=2NL3rZQujYee04kkCAWaut8Sw0edIjPQMr2R9kVOp-0,10807
158
157
  pulumi_vault/kv/get_secret_v2.py,sha256=FGcfiLHf_6lmi475u1HbdqeRSRrFqdfSD--Y3gTpnpI,12012
159
158
  pulumi_vault/kv/get_secrets_list.py,sha256=H4_92hwGSD-XKmpVvbz46ACFxWV_Mf9Qov-MmQ6uGE4,6689
160
159
  pulumi_vault/kv/get_secrets_list_v2.py,sha256=A2hDcu7_aU3HoolZFRo66w7Q8x_8uRvGLsJ_CQ4bF6Y,9004
161
- pulumi_vault/kv/outputs.py,sha256=pZLaCJILmJa70meqP2cW-JYvoux108aAcxwH-VOpW8s,3919
160
+ pulumi_vault/kv/outputs.py,sha256=XW0FC4kcYZmCMfNuEfLscShqA9Pmoq83MV6zczOKAWM,4121
162
161
  pulumi_vault/kv/secret.py,sha256=ksqjRFKIQrfv2wdHl-i3uCnMz18pmHJuzyJo7Y8MQFE,16655
163
162
  pulumi_vault/kv/secret_backend_v2.py,sha256=B0G-EQDmQ7TUZCzg7vfOV7ZIplPp-Lb52eJdMTl-7fs,19844
164
- pulumi_vault/kv/secret_v2.py,sha256=53RHy1Lj3sp1d3Rp0XADVKMyA488Kg8oH_4al37wONw,37656
163
+ pulumi_vault/kv/secret_v2.py,sha256=6Q5iM9WsWXBztTsq_7SqN1aPpb8zRHVmpVVo4W6pGjs,41657
165
164
  pulumi_vault/ldap/__init__.py,sha256=3vX5QNXFZEatvpCkk19WRvXuIc8iUC0W3raMUcNDpKA,596
166
165
  pulumi_vault/ldap/auth_backend.py,sha256=v800P1VEKz5bbIU01OqEZuQRFRBeV7ZjOshMZMXiqno,106230
167
166
  pulumi_vault/ldap/auth_backend_group.py,sha256=kLDpGJXDq-y9b8E6Xtxm5ah6xxPbRBZBYEnLjqj_hVM,17164
@@ -181,7 +180,7 @@ pulumi_vault/mongodbatlas/secret_backend.py,sha256=X5YSLk-PjugOsLe2Dj7lG3rZEXmCU
181
180
  pulumi_vault/mongodbatlas/secret_role.py,sha256=Drq34N74RKyNiR5VcLbjfoBzVSiNKNcGHCy8ILZxGB0,35236
182
181
  pulumi_vault/okta/__init__.py,sha256=i00jeeEenAIDZEZzoJmILyKvpxpguU-qV1g600l2ExY,407
183
182
  pulumi_vault/okta/_inputs.py,sha256=qkHB7CXC8KJ07V_vrQ90qdiSFvpdY5BCqZ2WAr_c6rI,4878
184
- pulumi_vault/okta/auth_backend.py,sha256=I0obqk10Hp0y_9eEtDMOzb82IZcK_0FEVwQl98repG4,62699
183
+ pulumi_vault/okta/auth_backend.py,sha256=wCkAgdSOrkMI9tZDnjjRwiyaDaTVpYm_SF5Jvc28k5s,55749
185
184
  pulumi_vault/okta/auth_backend_group.py,sha256=m4fFFDKb8O4wS0DL1sx9C9cqi3P9gM98hPyrLRrs4xc,15718
186
185
  pulumi_vault/okta/auth_backend_user.py,sha256=wVYUyRNGtMUSkweKspTt_tEEaQxd4Io5f_i4IOm72dQ,17804
187
186
  pulumi_vault/okta/outputs.py,sha256=7T-kEMcFHQ6fs7CIo2XOF8TyBGlILyDiD9DlCavsBUI,3374
@@ -259,7 +258,7 @@ pulumi_vault/transit/get_sign.py,sha256=LzjCEOxnt7khS5djaJr_VpewMjhD2JJUFm9glIL7
259
258
  pulumi_vault/transit/get_verify.py,sha256=6acxKmxPpdnCYWu21RZ3CqffJ3ZqCXY2pu-Lw5qDRUI,16130
260
259
  pulumi_vault/transit/secret_backend_key.py,sha256=5f2F-j9vj04vA6ipFlk6_MQbZEd637sYmCMrMC94iFY,64387
261
260
  pulumi_vault/transit/secret_cache_config.py,sha256=-xxdfOyhFodNGCgMGGoaJ8W4KipauYhgl6Ir4ZeA6NM,13105
262
- pulumi_vault-6.8.0a1750231010.dist-info/METADATA,sha256=4v7SoXMzP3M5IvJ_PipLxQ-ynshi-LDABSA3kORuxIM,4926
263
- pulumi_vault-6.8.0a1750231010.dist-info/WHEEL,sha256=_zCd3N1l69ArxyTb8rzEoP9TpbYXkqRFSNOD5OuxnTs,91
264
- pulumi_vault-6.8.0a1750231010.dist-info/top_level.txt,sha256=J7lAGvfexHc6T1EpDBGNKF0SXWURpmUhyzi9Nr5I61w,13
265
- pulumi_vault-6.8.0a1750231010.dist-info/RECORD,,
261
+ pulumi_vault-7.0.0a1750489873.dist-info/METADATA,sha256=JmxIf6doK0n6qe0oMJWyXk774_b6qP-REJvio02DtDc,4926
262
+ pulumi_vault-7.0.0a1750489873.dist-info/WHEEL,sha256=_zCd3N1l69ArxyTb8rzEoP9TpbYXkqRFSNOD5OuxnTs,91
263
+ pulumi_vault-7.0.0a1750489873.dist-info/top_level.txt,sha256=J7lAGvfexHc6T1EpDBGNKF0SXWURpmUhyzi9Nr5I61w,13
264
+ pulumi_vault-7.0.0a1750489873.dist-info/RECORD,,