pulumi-vault 7.3.0a1756363984__py3-none-any.whl → 7.3.0a1757112137__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -124,8 +124,7 @@ The namespace to use. Available only for Vault Enterprise.
124
124
 
125
125
  setNamespaceFromToken: Optional[bool]
126
126
  """
127
- In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the
128
- token namespace as the root namespace for all resources.
127
+ In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the token namespace as the root namespace for all resources.
129
128
  """
130
129
 
131
130
  skipChildToken: Optional[bool]
@@ -175,8 +175,7 @@ class _ExportableConfig(types.ModuleType):
175
175
  @_builtins.property
176
176
  def set_namespace_from_token(self) -> Optional[bool]:
177
177
  """
178
- In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the
179
- token namespace as the root namespace for all resources.
178
+ In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the token namespace as the root namespace for all resources.
180
179
  """
181
180
  return __config__.get_bool('setNamespaceFromToken')
182
181
 
@@ -37,8 +37,7 @@ class SecretBackendStaticRoleArgs:
37
37
  :param pulumi.Input[_builtins.str] backend: The unique name of the Vault mount to configure.
38
38
  :param pulumi.Input[_builtins.str] db_name: The unique name of the database connection to use for the static role.
39
39
  :param pulumi.Input[_builtins.str] username: The database username that this static role corresponds to.
40
- :param pulumi.Input[_builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
41
- can be done in `credential_config`.
40
+ :param pulumi.Input[_builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration can be done in `credential_config`.
42
41
  :param pulumi.Input[_builtins.str] name: A unique name to give the static role.
43
42
  :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
44
43
  The value should not contain leading or trailing forward slashes.
@@ -133,8 +132,7 @@ class SecretBackendStaticRoleArgs:
133
132
  @pulumi.getter(name="credentialType")
134
133
  def credential_type(self) -> Optional[pulumi.Input[_builtins.str]]:
135
134
  """
136
- The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
137
- can be done in `credential_config`.
135
+ The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration can be done in `credential_config`.
138
136
  """
139
137
  return pulumi.get(self, "credential_type")
140
138
 
@@ -270,8 +268,7 @@ class _SecretBackendStaticRoleState:
270
268
  """
271
269
  Input properties used for looking up and filtering SecretBackendStaticRole resources.
272
270
  :param pulumi.Input[_builtins.str] backend: The unique name of the Vault mount to configure.
273
- :param pulumi.Input[_builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
274
- can be done in `credential_config`.
271
+ :param pulumi.Input[_builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration can be done in `credential_config`.
275
272
  :param pulumi.Input[_builtins.str] db_name: The unique name of the database connection to use for the static role.
276
273
  :param pulumi.Input[_builtins.str] name: A unique name to give the static role.
277
274
  :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
@@ -347,8 +344,7 @@ class _SecretBackendStaticRoleState:
347
344
  @pulumi.getter(name="credentialType")
348
345
  def credential_type(self) -> Optional[pulumi.Input[_builtins.str]]:
349
346
  """
350
- The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
351
- can be done in `credential_config`.
347
+ The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration can be done in `credential_config`.
352
348
  """
353
349
  return pulumi.get(self, "credential_type")
354
350
 
@@ -560,8 +556,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
560
556
  :param str resource_name: The name of the resource.
561
557
  :param pulumi.ResourceOptions opts: Options for the resource.
562
558
  :param pulumi.Input[_builtins.str] backend: The unique name of the Vault mount to configure.
563
- :param pulumi.Input[_builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
564
- can be done in `credential_config`.
559
+ :param pulumi.Input[_builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration can be done in `credential_config`.
565
560
  :param pulumi.Input[_builtins.str] db_name: The unique name of the database connection to use for the static role.
566
561
  :param pulumi.Input[_builtins.str] name: A unique name to give the static role.
567
562
  :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
@@ -728,8 +723,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
728
723
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
729
724
  :param pulumi.ResourceOptions opts: Options for the resource.
730
725
  :param pulumi.Input[_builtins.str] backend: The unique name of the Vault mount to configure.
731
- :param pulumi.Input[_builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
732
- can be done in `credential_config`.
726
+ :param pulumi.Input[_builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration can be done in `credential_config`.
733
727
  :param pulumi.Input[_builtins.str] db_name: The unique name of the database connection to use for the static role.
734
728
  :param pulumi.Input[_builtins.str] name: A unique name to give the static role.
735
729
  :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
@@ -789,8 +783,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
789
783
  @pulumi.getter(name="credentialType")
790
784
  def credential_type(self) -> pulumi.Output[_builtins.str]:
791
785
  """
792
- The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
793
- can be done in `credential_config`.
786
+ The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration can be done in `credential_config`.
794
787
  """
795
788
  return pulumi.get(self, "credential_type")
796
789
 
@@ -70,8 +70,7 @@ class NomadSecretBackendArgs:
70
70
  :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
71
71
  :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
72
72
  :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
73
- :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
74
- use when checking the last rotation time.
73
+ :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time.
75
74
  :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
76
75
  :param pulumi.Input[_builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
77
76
  generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
@@ -357,8 +356,7 @@ class NomadSecretBackendArgs:
357
356
  @pulumi.getter
358
357
  def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
359
358
  """
360
- Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
361
- use when checking the last rotation time.
359
+ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time.
362
360
  """
363
361
  return pulumi.get(self, "local")
364
362
 
@@ -548,8 +546,7 @@ class _NomadSecretBackendState:
548
546
  :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
549
547
  :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
550
548
  :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
551
- :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
552
- use when checking the last rotation time.
549
+ :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time.
553
550
  :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
554
551
  :param pulumi.Input[_builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
555
552
  generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
@@ -849,8 +846,7 @@ class _NomadSecretBackendState:
849
846
  @pulumi.getter
850
847
  def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
851
848
  """
852
- Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
853
- use when checking the last rotation time.
849
+ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time.
854
850
  """
855
851
  return pulumi.get(self, "local")
856
852
 
@@ -1068,8 +1064,7 @@ class NomadSecretBackend(pulumi.CustomResource):
1068
1064
  :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1069
1065
  :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1070
1066
  :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1071
- :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
1072
- use when checking the last rotation time.
1067
+ :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time.
1073
1068
  :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
1074
1069
  :param pulumi.Input[_builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
1075
1070
  generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
@@ -1269,8 +1264,7 @@ class NomadSecretBackend(pulumi.CustomResource):
1269
1264
  :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1270
1265
  :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1271
1266
  :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1272
- :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
1273
- use when checking the last rotation time.
1267
+ :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time.
1274
1268
  :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
1275
1269
  :param pulumi.Input[_builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
1276
1270
  generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
@@ -1474,8 +1468,7 @@ class NomadSecretBackend(pulumi.CustomResource):
1474
1468
  @pulumi.getter
1475
1469
  def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
1476
1470
  """
1477
- Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
1478
- use when checking the last rotation time.
1471
+ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time.
1479
1472
  """
1480
1473
  return pulumi.get(self, "local")
1481
1474
 
@@ -44,8 +44,7 @@ class OciAuthBackendArgs:
44
44
  :param pulumi.Input[_builtins.str] path: Unique name of the auth backend to configure.
45
45
  :param pulumi.Input[_builtins.int] rotation_period: The period of time in seconds between each rotation of the root credential. Cannot be used with rotation_schedule.
46
46
  :param pulumi.Input[_builtins.str] rotation_schedule: The cron-style schedule for the root credential to be rotated on. Cannot be used with rotation_period.
47
- :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered.
48
- Can only be used with rotation_schedule.
47
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered. Can only be used with rotation_schedule.
49
48
  :param pulumi.Input['OciAuthBackendTuneArgs'] tune: Extra configuration block. Structure is documented below.
50
49
 
51
50
  The `tune` block is used to tune the auth backend:
@@ -173,8 +172,7 @@ class OciAuthBackendArgs:
173
172
  @pulumi.getter(name="rotationWindow")
174
173
  def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
175
174
  """
176
- The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered.
177
- Can only be used with rotation_schedule.
175
+ The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered. Can only be used with rotation_schedule.
178
176
  """
179
177
  return pulumi.get(self, "rotation_window")
180
178
 
@@ -225,8 +223,7 @@ class _OciAuthBackendState:
225
223
  :param pulumi.Input[_builtins.str] path: Unique name of the auth backend to configure.
226
224
  :param pulumi.Input[_builtins.int] rotation_period: The period of time in seconds between each rotation of the root credential. Cannot be used with rotation_schedule.
227
225
  :param pulumi.Input[_builtins.str] rotation_schedule: The cron-style schedule for the root credential to be rotated on. Cannot be used with rotation_period.
228
- :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered.
229
- Can only be used with rotation_schedule.
226
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered. Can only be used with rotation_schedule.
230
227
  :param pulumi.Input['OciAuthBackendTuneArgs'] tune: Extra configuration block. Structure is documented below.
231
228
 
232
229
  The `tune` block is used to tune the auth backend:
@@ -369,8 +366,7 @@ class _OciAuthBackendState:
369
366
  @pulumi.getter(name="rotationWindow")
370
367
  def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
371
368
  """
372
- The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered.
373
- Can only be used with rotation_schedule.
369
+ The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered. Can only be used with rotation_schedule.
374
370
  """
375
371
  return pulumi.get(self, "rotation_window")
376
372
 
@@ -443,8 +439,7 @@ class OciAuthBackend(pulumi.CustomResource):
443
439
  :param pulumi.Input[_builtins.str] path: Unique name of the auth backend to configure.
444
440
  :param pulumi.Input[_builtins.int] rotation_period: The period of time in seconds between each rotation of the root credential. Cannot be used with rotation_schedule.
445
441
  :param pulumi.Input[_builtins.str] rotation_schedule: The cron-style schedule for the root credential to be rotated on. Cannot be used with rotation_period.
446
- :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered.
447
- Can only be used with rotation_schedule.
442
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered. Can only be used with rotation_schedule.
448
443
  :param pulumi.Input[Union['OciAuthBackendTuneArgs', 'OciAuthBackendTuneArgsDict']] tune: Extra configuration block. Structure is documented below.
449
444
 
450
445
  The `tune` block is used to tune the auth backend:
@@ -564,8 +559,7 @@ class OciAuthBackend(pulumi.CustomResource):
564
559
  :param pulumi.Input[_builtins.str] path: Unique name of the auth backend to configure.
565
560
  :param pulumi.Input[_builtins.int] rotation_period: The period of time in seconds between each rotation of the root credential. Cannot be used with rotation_schedule.
566
561
  :param pulumi.Input[_builtins.str] rotation_schedule: The cron-style schedule for the root credential to be rotated on. Cannot be used with rotation_period.
567
- :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered.
568
- Can only be used with rotation_schedule.
562
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered. Can only be used with rotation_schedule.
569
563
  :param pulumi.Input[Union['OciAuthBackendTuneArgs', 'OciAuthBackendTuneArgsDict']] tune: Extra configuration block. Structure is documented below.
570
564
 
571
565
  The `tune` block is used to tune the auth backend:
@@ -666,8 +660,7 @@ class OciAuthBackend(pulumi.CustomResource):
666
660
  @pulumi.getter(name="rotationWindow")
667
661
  def rotation_window(self) -> pulumi.Output[Optional[_builtins.int]]:
668
662
  """
669
- The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered.
670
- Can only be used with rotation_schedule.
663
+ The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered. Can only be used with rotation_schedule.
671
664
  """
672
665
  return pulumi.get(self, "rotation_window")
673
666
 
@@ -47,8 +47,7 @@ class BackendConfigAutoTidyArgs:
47
47
  :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
48
48
  read the configuration from, with no leading or trailing `/`s.
49
49
  :param pulumi.Input[_builtins.bool] enabled: Specifies whether automatic tidy is enabled or not.
50
- :param pulumi.Input[_builtins.str] acme_account_safety_buffer: The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of
51
- time after being marked revoked or deactivated.
50
+ :param pulumi.Input[_builtins.str] acme_account_safety_buffer: The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of time after being marked revoked or deactivated.
52
51
  :param pulumi.Input[_builtins.str] interval_duration: Interval at which to run an auto-tidy operation. This is the time
53
52
  between tidy invocations (after one finishes to the start of the next).
54
53
  :param pulumi.Input[_builtins.str] issuer_safety_buffer: The amount of extra time that must have passed beyond issuer's
@@ -164,8 +163,7 @@ class BackendConfigAutoTidyArgs:
164
163
  @pulumi.getter(name="acmeAccountSafetyBuffer")
165
164
  def acme_account_safety_buffer(self) -> Optional[pulumi.Input[_builtins.str]]:
166
165
  """
167
- The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of
168
- time after being marked revoked or deactivated.
166
+ The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of time after being marked revoked or deactivated.
169
167
  """
170
168
  return pulumi.get(self, "acme_account_safety_buffer")
171
169
 
@@ -462,8 +460,7 @@ class _BackendConfigAutoTidyState:
462
460
  tidy_revoked_certs: Optional[pulumi.Input[_builtins.bool]] = None):
463
461
  """
464
462
  Input properties used for looking up and filtering BackendConfigAutoTidy resources.
465
- :param pulumi.Input[_builtins.str] acme_account_safety_buffer: The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of
466
- time after being marked revoked or deactivated.
463
+ :param pulumi.Input[_builtins.str] acme_account_safety_buffer: The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of time after being marked revoked or deactivated.
467
464
  :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
468
465
  read the configuration from, with no leading or trailing `/`s.
469
466
  :param pulumi.Input[_builtins.bool] enabled: Specifies whether automatic tidy is enabled or not.
@@ -559,8 +556,7 @@ class _BackendConfigAutoTidyState:
559
556
  @pulumi.getter(name="acmeAccountSafetyBuffer")
560
557
  def acme_account_safety_buffer(self) -> Optional[pulumi.Input[_builtins.str]]:
561
558
  """
562
- The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of
563
- time after being marked revoked or deactivated.
559
+ The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of time after being marked revoked or deactivated.
564
560
  """
565
561
  return pulumi.get(self, "acme_account_safety_buffer")
566
562
 
@@ -907,8 +903,7 @@ class BackendConfigAutoTidy(pulumi.CustomResource):
907
903
 
908
904
  :param str resource_name: The name of the resource.
909
905
  :param pulumi.ResourceOptions opts: Options for the resource.
910
- :param pulumi.Input[_builtins.str] acme_account_safety_buffer: The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of
911
- time after being marked revoked or deactivated.
906
+ :param pulumi.Input[_builtins.str] acme_account_safety_buffer: The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of time after being marked revoked or deactivated.
912
907
  :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
913
908
  read the configuration from, with no leading or trailing `/`s.
914
909
  :param pulumi.Input[_builtins.bool] enabled: Specifies whether automatic tidy is enabled or not.
@@ -1094,8 +1089,7 @@ class BackendConfigAutoTidy(pulumi.CustomResource):
1094
1089
  :param str resource_name: The unique name of the resulting resource.
1095
1090
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
1096
1091
  :param pulumi.ResourceOptions opts: Options for the resource.
1097
- :param pulumi.Input[_builtins.str] acme_account_safety_buffer: The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of
1098
- time after being marked revoked or deactivated.
1092
+ :param pulumi.Input[_builtins.str] acme_account_safety_buffer: The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of time after being marked revoked or deactivated.
1099
1093
  :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
1100
1094
  read the configuration from, with no leading or trailing `/`s.
1101
1095
  :param pulumi.Input[_builtins.bool] enabled: Specifies whether automatic tidy is enabled or not.
@@ -1173,8 +1167,7 @@ class BackendConfigAutoTidy(pulumi.CustomResource):
1173
1167
  @pulumi.getter(name="acmeAccountSafetyBuffer")
1174
1168
  def acme_account_safety_buffer(self) -> pulumi.Output[_builtins.str]:
1175
1169
  """
1176
- The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of
1177
- time after being marked revoked or deactivated.
1170
+ The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of time after being marked revoked or deactivated.
1178
1171
  """
1179
1172
  return pulumi.get(self, "acme_account_safety_buffer")
1180
1173
 
pulumi_vault/provider.py CHANGED
@@ -73,8 +73,7 @@ class ProviderArgs:
73
73
  :param pulumi.Input[_builtins.int] max_retries: Maximum number of retries when a 5xx error code is encountered.
74
74
  :param pulumi.Input[_builtins.int] max_retries_ccc: Maximum number of retries for Client Controlled Consistency related operations
75
75
  :param pulumi.Input[_builtins.str] namespace: The namespace to use. Available only for Vault Enterprise.
76
- :param pulumi.Input[_builtins.bool] set_namespace_from_token: In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the
77
- token namespace as the root namespace for all resources.
76
+ :param pulumi.Input[_builtins.bool] set_namespace_from_token: In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the token namespace as the root namespace for all resources.
78
77
  :param pulumi.Input[_builtins.bool] skip_child_token: Set this to true to prevent the creation of ephemeral child token used by this provider.
79
78
  :param pulumi.Input[_builtins.bool] skip_get_vault_version: Skip the dynamic fetching of the Vault server version.
80
79
  :param pulumi.Input[_builtins.bool] skip_tls_verify: Set this to true only if the target Vault server is an insecure development instance.
@@ -415,8 +414,7 @@ class ProviderArgs:
415
414
  @pulumi.getter(name="setNamespaceFromToken")
416
415
  def set_namespace_from_token(self) -> Optional[pulumi.Input[_builtins.bool]]:
417
416
  """
418
- In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the
419
- token namespace as the root namespace for all resources.
417
+ In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the token namespace as the root namespace for all resources.
420
418
  """
421
419
  return pulumi.get(self, "set_namespace_from_token")
422
420
 
@@ -575,8 +573,7 @@ class Provider(pulumi.ProviderResource):
575
573
  :param pulumi.Input[_builtins.int] max_retries: Maximum number of retries when a 5xx error code is encountered.
576
574
  :param pulumi.Input[_builtins.int] max_retries_ccc: Maximum number of retries for Client Controlled Consistency related operations
577
575
  :param pulumi.Input[_builtins.str] namespace: The namespace to use. Available only for Vault Enterprise.
578
- :param pulumi.Input[_builtins.bool] set_namespace_from_token: In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the
579
- token namespace as the root namespace for all resources.
576
+ :param pulumi.Input[_builtins.bool] set_namespace_from_token: In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the token namespace as the root namespace for all resources.
580
577
  :param pulumi.Input[_builtins.bool] skip_child_token: Set this to true to prevent the creation of ephemeral child token used by this provider.
581
578
  :param pulumi.Input[_builtins.bool] skip_get_vault_version: Skip the dynamic fetching of the Vault server version.
582
579
  :param pulumi.Input[_builtins.bool] skip_tls_verify: Set this to true only if the target Vault server is an insecure development instance.
@@ -1,5 +1,5 @@
1
1
  {
2
2
  "resource": true,
3
3
  "name": "vault",
4
- "version": "7.3.0-alpha.1756363984"
4
+ "version": "7.3.0-alpha.1757112137"
5
5
  }
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.4
2
2
  Name: pulumi_vault
3
- Version: 7.3.0a1756363984
3
+ Version: 7.3.0a1757112137
4
4
  Summary: A Pulumi package for creating and managing HashiCorp Vault cloud resources.
5
5
  License: Apache-2.0
6
6
  Project-URL: Homepage, https://pulumi.io
@@ -19,16 +19,16 @@ pulumi_vault/mfa_pingid.py,sha256=qtYnZ7xA35EZZij8YsM1yZHVDNLkOciLDVui_CkSf9I,32
19
19
  pulumi_vault/mfa_totp.py,sha256=oioMOfMYIpqaj2J7tEbujskxQ6EbvBTR1-15DkCEP2c,27097
20
20
  pulumi_vault/mount.py,sha256=JtwtH9JHyMpUe-Sk2ApftSWdgCYXs4JAdgNvJhgyTLU,65745
21
21
  pulumi_vault/namespace.py,sha256=R21BCWrDoMOSFDgPbjVzP_h2J5LynnTMyGEWrgaqHAE,19256
22
- pulumi_vault/nomad_secret_backend.py,sha256=AEBgdq9IYG0xQJUfxkqgdwxiDEu5IF0ZqSBgu0BQhKE,82255
22
+ pulumi_vault/nomad_secret_backend.py,sha256=0MLjqo6m-9dqW7j54HeVM4Ohk2E4DJQr5KoHDs1CHzQ,82171
23
23
  pulumi_vault/nomad_secret_role.py,sha256=axNMl7B12t-_atT3I4vwBiqpfaWPgeqMHaJaTNjIh8w,21405
24
- pulumi_vault/oci_auth_backend.py,sha256=s8QLmunDbB_NLFFFDISKKyjc7nJTgxFVXr2BFT2jiJE,32990
24
+ pulumi_vault/oci_auth_backend.py,sha256=ckYMSV2Kj6w0UL1bNyqWb7r6IvJqRkaXKau5GHGoZiE,32906
25
25
  pulumi_vault/oci_auth_backend_role.py,sha256=sesaveRmaFy-3asJEbCoNBpm4WcFSkFyYTXm094Fyz4,38113
26
26
  pulumi_vault/outputs.py,sha256=q-HfnLHjRLbBe_T-9-kc2dE4ndKETqte_0t1TFAu-N8,22343
27
27
  pulumi_vault/plugin.py,sha256=57QZXnzP9lPAU0TbErKMCaLggsm9MehQm9hjVgy36_k,25233
28
28
  pulumi_vault/plugin_pinned_version.py,sha256=w3YbjWKRyKY_7Ufc45n7nIAhVxpuj352jqykNlzmk4Q,11340
29
29
  pulumi_vault/policy.py,sha256=eOofckCLS7K3YRGh3GElW5jpXz_oK76xny4Fk5VrsR0,11666
30
- pulumi_vault/provider.py,sha256=8VNU3RFDfN_DYbhoF3ucyTrfc-s6jGHG-ySRX5ggTDY,44982
31
- pulumi_vault/pulumi-plugin.json,sha256=oKw_gQywQ8QvTZvbJp6ZPRegZnlqp0A77SiZvCLv87o,81
30
+ pulumi_vault/provider.py,sha256=0rno_jWm-8NzVdJYUdgvtlhL5R15IjrWJxlcclfPc0c,44944
31
+ pulumi_vault/pulumi-plugin.json,sha256=fvaY9im7BsH1KB7rP2EANsi6ymlMuSlpWW-cWqzO8qI,81
32
32
  pulumi_vault/py.typed,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
33
33
  pulumi_vault/quota_lease_count.py,sha256=CoqfUnFAx956hEU4610qCLLhfzYcB5Qey0Jfy3hkVwA,26157
34
34
  pulumi_vault/quota_rate_limit.py,sha256=tI72HsW0lOMEMMHLyr3EQhW8d6F-FfgsEQyXGH5ebjU,43077
@@ -73,11 +73,11 @@ pulumi_vault/azure/backend_role.py,sha256=56fxGFa0IxqmEwlsXtNOwmF3RpHUBn9HpqVlXS
73
73
  pulumi_vault/azure/get_access_credentials.py,sha256=Fq9VD7uteM-MgM6gprkh3yTf-l1Edf9LgO-rRyTc8qg,20613
74
74
  pulumi_vault/azure/outputs.py,sha256=JqVDbYxhPOUhfiuRjkwkXo_VfaU08awc7VyGL4joI9k,3420
75
75
  pulumi_vault/config/__init__.py,sha256=XWnQfVtc2oPapjSXXCdORFJvMpXt_SMJQASWdTRoPmc,296
76
- pulumi_vault/config/__init__.pyi,sha256=nVms9D_pWMp75CUcq6O8WUdr4KeQPTVScGOYOyGhAgE,3313
76
+ pulumi_vault/config/__init__.pyi,sha256=fP-OU4bus3s58b7gkKNcgoDkf9sT8eoKfSQBEQ2vQfk,3313
77
77
  pulumi_vault/config/_inputs.py,sha256=M505VzKZpJruf45QhBirCUEPC2mw8dv740P5VBTw2dI,2023
78
78
  pulumi_vault/config/outputs.py,sha256=ViTYi4YxunYgaBHVUJJL7g9Ih6q2eWNfmJPf-hY-bN4,46804
79
79
  pulumi_vault/config/ui_custom_message.py,sha256=dB9ZRzS2LHr0f2UsOp3W0tmCOKEYnl15y9xgvFKPM_o,24394
80
- pulumi_vault/config/vars.py,sha256=1Y8tDmLIAXMnUpfpzdQ_a6TXHr5CdcLD25FGGnkCrhQ,6998
80
+ pulumi_vault/config/vars.py,sha256=54tTSG5EVJ7OCe1r-9X8ahcYM3X62Y1ssQmzR25SHFk,6990
81
81
  pulumi_vault/consul/__init__.py,sha256=rvV594Qo7hp6Ysz7aaxgrOVw1c6LlliyrD8nrCoKEdU,345
82
82
  pulumi_vault/consul/secret_backend.py,sha256=qKboTfen7iw4PB46LMe_jH_C8TxLOztDRTsE0wKZg28,79364
83
83
  pulumi_vault/consul/secret_backend_role.py,sha256=42QN0s2omlBnfwOiPV4EmNOlpOCRlf_vb_Cyk63HmCg,43973
@@ -86,7 +86,7 @@ pulumi_vault/database/_inputs.py,sha256=eValBNKKgSg16n8gbW5Oe3ALPipO_tFWWCNC2a50
86
86
  pulumi_vault/database/outputs.py,sha256=211SlAm68M0ICkYh8U_P6wy5P4XH7CXt_Rek8VK-iGo,361928
87
87
  pulumi_vault/database/secret_backend_connection.py,sha256=-lETXtUXeiz1vmwG7glaFHi7v4iR8ghIwRHM9dwYchQ,93381
88
88
  pulumi_vault/database/secret_backend_role.py,sha256=Sm4PtpIA3m0nfUtfIEAGjORXZamAQsEpMaPkNSPNr8U,39232
89
- pulumi_vault/database/secret_backend_static_role.py,sha256=jCXeO6LU-Bdd-dSV8ZbXdKxZqGHF0YudGsuP4zFSbfc,44603
89
+ pulumi_vault/database/secret_backend_static_role.py,sha256=nB2EZ39_M3Z3KOhnr4tXww92qlt2g9hjPNKbTDktz3Q,44519
90
90
  pulumi_vault/database/secrets_mount.py,sha256=WAJEOlfp0dB2SZxh1GkTGXGMImweQxS42O3bdboPlIQ,122955
91
91
  pulumi_vault/gcp/__init__.py,sha256=FEwIPfzcZ5RqQYSD27FtChXzHEMQfcnhJbDvOPlWSAE,563
92
92
  pulumi_vault/gcp/_inputs.py,sha256=OLgraky8XbCZfbPIjQF6Q7G4Gglag_AIOKKZD97VsZk,20330
@@ -191,7 +191,7 @@ pulumi_vault/pkisecret/__init__.py,sha256=Pf-8rD7OIRMbT5yWzT810ogXGSP0xG82B3sx4y
191
191
  pulumi_vault/pkisecret/_inputs.py,sha256=g6235fUvQFCwrlcZPns0xxUlvzM9Z6Neo2JPj-i5ESo,10068
192
192
  pulumi_vault/pkisecret/backend_acme_eab.py,sha256=YqPMNitUVf7f_q9IrJ5ENn32R1lFctsCXxR3Xriu62o,25451
193
193
  pulumi_vault/pkisecret/backend_config_acme.py,sha256=zEWburMpqKOcHBzRypTImNS87TP8XNTlwqFQu9nW6I8,34367
194
- pulumi_vault/pkisecret/backend_config_auto_tidy.py,sha256=rpMYICeDJmESwEp9QPZ8TQGGVEDSEIzIQ94zdrlotYw,76033
194
+ pulumi_vault/pkisecret/backend_config_auto_tidy.py,sha256=31f0dixOtSCUfU2sl6rDNHUSjpZPXGQi_a6hNpqP6f4,75949
195
195
  pulumi_vault/pkisecret/backend_config_cluster.py,sha256=BFdj9-vZjssNGuuwqOpfDhwo09r9eG0Erx2Lf8kpTl8,16860
196
196
  pulumi_vault/pkisecret/backend_config_cmpv2.py,sha256=rHtG4Uqo7tx3GEoBjrKX5_eEt3HYm0_zlqt4c-JPqUU,30119
197
197
  pulumi_vault/pkisecret/backend_config_est.py,sha256=ZiWCH7hrUXrEW9Z4E95k6r_lekbSE16fq4qwegtzJfo,34471
@@ -264,7 +264,7 @@ pulumi_vault/transit/get_sign.py,sha256=cvWAgPsSZSyhzU4Hewp7FCsQiMLH3NxgD2d8rbFb
264
264
  pulumi_vault/transit/get_verify.py,sha256=h2XhUQwJOlOOx8IzccA2YPySmhEMcHWOtuNfKV-9DQ0,17126
265
265
  pulumi_vault/transit/secret_backend_key.py,sha256=4F_MJXEBzVsNY22HzSp79mPl0SLIVPCknk-D9klcW5A,68515
266
266
  pulumi_vault/transit/secret_cache_config.py,sha256=v5enplOZynVxCUCPaav5df8d9zK2vi07C8F9SAQ73aA,13238
267
- pulumi_vault-7.3.0a1756363984.dist-info/METADATA,sha256=V-19oc5mBBXx4OIHl0JNZ-XjUndNMzbCAAXEwr6uctc,4926
268
- pulumi_vault-7.3.0a1756363984.dist-info/WHEEL,sha256=_zCd3N1l69ArxyTb8rzEoP9TpbYXkqRFSNOD5OuxnTs,91
269
- pulumi_vault-7.3.0a1756363984.dist-info/top_level.txt,sha256=J7lAGvfexHc6T1EpDBGNKF0SXWURpmUhyzi9Nr5I61w,13
270
- pulumi_vault-7.3.0a1756363984.dist-info/RECORD,,
267
+ pulumi_vault-7.3.0a1757112137.dist-info/METADATA,sha256=migJ1ToPWLfxeHEt-SG3eOYfOEazCRjmi6s-MoHlR0c,4926
268
+ pulumi_vault-7.3.0a1757112137.dist-info/WHEEL,sha256=_zCd3N1l69ArxyTb8rzEoP9TpbYXkqRFSNOD5OuxnTs,91
269
+ pulumi_vault-7.3.0a1757112137.dist-info/top_level.txt,sha256=J7lAGvfexHc6T1EpDBGNKF0SXWURpmUhyzi9Nr5I61w,13
270
+ pulumi_vault-7.3.0a1757112137.dist-info/RECORD,,