pulumi-vault 7.3.0a1757055208__tar.gz → 7.3.0a1757388745__tar.gz

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (275) hide show
  1. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/PKG-INFO +1 -1
  2. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/aws/auth_backend_config_identity.py +14 -7
  3. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/config/__init__.pyi +1 -2
  4. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/config/vars.py +1 -2
  5. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/database/secret_backend_static_role.py +7 -14
  6. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/ldap/secret_backend.py +47 -0
  7. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/nomad_secret_backend.py +7 -14
  8. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/oci_auth_backend.py +7 -14
  9. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/pkisecret/backend_config_auto_tidy.py +7 -14
  10. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/provider.py +3 -6
  11. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/pulumi-plugin.json +1 -1
  12. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault.egg-info/PKG-INFO +1 -1
  13. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pyproject.toml +1 -1
  14. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/README.md +0 -0
  15. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/__init__.py +0 -0
  16. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/_inputs.py +0 -0
  17. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/_utilities.py +0 -0
  18. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/ad/__init__.py +0 -0
  19. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/ad/get_access_credentials.py +0 -0
  20. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/ad/secret_backend.py +0 -0
  21. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/ad/secret_library.py +0 -0
  22. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/ad/secret_role.py +0 -0
  23. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/alicloud/__init__.py +0 -0
  24. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/alicloud/auth_backend_role.py +0 -0
  25. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/approle/__init__.py +0 -0
  26. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/approle/auth_backend_login.py +0 -0
  27. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/approle/auth_backend_role.py +0 -0
  28. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/approle/auth_backend_role_secret_id.py +0 -0
  29. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/approle/get_auth_backend_role_id.py +0 -0
  30. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/audit.py +0 -0
  31. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/audit_request_header.py +0 -0
  32. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/auth_backend.py +0 -0
  33. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/aws/__init__.py +0 -0
  34. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/aws/auth_backend_cert.py +0 -0
  35. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/aws/auth_backend_client.py +0 -0
  36. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -0
  37. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/aws/auth_backend_login.py +0 -0
  38. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/aws/auth_backend_role.py +0 -0
  39. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/aws/auth_backend_role_tag.py +0 -0
  40. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -0
  41. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/aws/auth_backend_sts_role.py +0 -0
  42. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/aws/get_access_credentials.py +0 -0
  43. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/aws/get_static_access_credentials.py +0 -0
  44. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/aws/secret_backend.py +0 -0
  45. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/aws/secret_backend_role.py +0 -0
  46. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/aws/secret_backend_static_role.py +0 -0
  47. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/azure/__init__.py +0 -0
  48. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/azure/_inputs.py +0 -0
  49. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/azure/auth_backend_config.py +0 -0
  50. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/azure/auth_backend_role.py +0 -0
  51. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/azure/backend.py +0 -0
  52. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/azure/backend_role.py +0 -0
  53. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/azure/get_access_credentials.py +0 -0
  54. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/azure/outputs.py +0 -0
  55. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/cert_auth_backend_role.py +0 -0
  56. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/config/__init__.py +0 -0
  57. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/config/_inputs.py +0 -0
  58. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/config/outputs.py +0 -0
  59. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/config/ui_custom_message.py +0 -0
  60. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/consul/__init__.py +0 -0
  61. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/consul/secret_backend.py +0 -0
  62. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/consul/secret_backend_role.py +0 -0
  63. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/database/__init__.py +0 -0
  64. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/database/_inputs.py +0 -0
  65. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/database/outputs.py +0 -0
  66. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/database/secret_backend_connection.py +0 -0
  67. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/database/secret_backend_role.py +0 -0
  68. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/database/secrets_mount.py +0 -0
  69. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/egp_policy.py +0 -0
  70. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/gcp/__init__.py +0 -0
  71. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/gcp/_inputs.py +0 -0
  72. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/gcp/auth_backend.py +0 -0
  73. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/gcp/auth_backend_role.py +0 -0
  74. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/gcp/get_auth_backend_role.py +0 -0
  75. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/gcp/outputs.py +0 -0
  76. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/gcp/secret_backend.py +0 -0
  77. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/gcp/secret_impersonated_account.py +0 -0
  78. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/gcp/secret_roleset.py +0 -0
  79. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/gcp/secret_static_account.py +0 -0
  80. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/generic/__init__.py +0 -0
  81. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/generic/endpoint.py +0 -0
  82. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/generic/get_secret.py +0 -0
  83. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/generic/secret.py +0 -0
  84. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/get_auth_backend.py +0 -0
  85. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/get_auth_backends.py +0 -0
  86. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/get_namespace.py +0 -0
  87. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/get_namespaces.py +0 -0
  88. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/get_nomad_access_token.py +0 -0
  89. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/get_policy_document.py +0 -0
  90. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/get_raft_autopilot_state.py +0 -0
  91. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/github/__init__.py +0 -0
  92. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/github/_inputs.py +0 -0
  93. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/github/auth_backend.py +0 -0
  94. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/github/outputs.py +0 -0
  95. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/github/team.py +0 -0
  96. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/github/user.py +0 -0
  97. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/identity/__init__.py +0 -0
  98. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/identity/entity.py +0 -0
  99. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/identity/entity_alias.py +0 -0
  100. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/identity/entity_policies.py +0 -0
  101. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/identity/get_entity.py +0 -0
  102. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/identity/get_group.py +0 -0
  103. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/identity/get_oidc_client_creds.py +0 -0
  104. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/identity/get_oidc_openid_config.py +0 -0
  105. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/identity/get_oidc_public_keys.py +0 -0
  106. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/identity/group.py +0 -0
  107. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/identity/group_alias.py +0 -0
  108. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/identity/group_member_entity_ids.py +0 -0
  109. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/identity/group_member_group_ids.py +0 -0
  110. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/identity/group_policies.py +0 -0
  111. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/identity/mfa_duo.py +0 -0
  112. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/identity/mfa_login_enforcement.py +0 -0
  113. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/identity/mfa_okta.py +0 -0
  114. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/identity/mfa_pingid.py +0 -0
  115. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/identity/mfa_totp.py +0 -0
  116. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/identity/oidc.py +0 -0
  117. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/identity/oidc_assignment.py +0 -0
  118. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/identity/oidc_client.py +0 -0
  119. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/identity/oidc_key.py +0 -0
  120. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -0
  121. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/identity/oidc_provider.py +0 -0
  122. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/identity/oidc_role.py +0 -0
  123. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/identity/oidc_scope.py +0 -0
  124. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/identity/outputs.py +0 -0
  125. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/jwt/__init__.py +0 -0
  126. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/jwt/_inputs.py +0 -0
  127. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/jwt/auth_backend.py +0 -0
  128. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/jwt/auth_backend_role.py +0 -0
  129. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/jwt/outputs.py +0 -0
  130. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/kmip/__init__.py +0 -0
  131. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/kmip/secret_backend.py +0 -0
  132. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/kmip/secret_role.py +0 -0
  133. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/kmip/secret_scope.py +0 -0
  134. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/kubernetes/__init__.py +0 -0
  135. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/kubernetes/auth_backend_config.py +0 -0
  136. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/kubernetes/auth_backend_role.py +0 -0
  137. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/kubernetes/get_auth_backend_config.py +0 -0
  138. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/kubernetes/get_auth_backend_role.py +0 -0
  139. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/kubernetes/get_service_account_token.py +0 -0
  140. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/kubernetes/secret_backend.py +0 -0
  141. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/kubernetes/secret_backend_role.py +0 -0
  142. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/kv/__init__.py +0 -0
  143. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/kv/_inputs.py +0 -0
  144. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/kv/get_secret.py +0 -0
  145. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/kv/get_secret_subkeys_v2.py +0 -0
  146. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/kv/get_secret_v2.py +0 -0
  147. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/kv/get_secrets_list.py +0 -0
  148. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/kv/get_secrets_list_v2.py +0 -0
  149. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/kv/outputs.py +0 -0
  150. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/kv/secret.py +0 -0
  151. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/kv/secret_backend_v2.py +0 -0
  152. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/kv/secret_v2.py +0 -0
  153. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/ldap/__init__.py +0 -0
  154. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/ldap/auth_backend.py +0 -0
  155. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/ldap/auth_backend_group.py +0 -0
  156. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/ldap/auth_backend_user.py +0 -0
  157. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/ldap/get_dynamic_credentials.py +0 -0
  158. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/ldap/get_static_credentials.py +0 -0
  159. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -0
  160. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/ldap/secret_backend_library_set.py +0 -0
  161. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/ldap/secret_backend_static_role.py +0 -0
  162. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/managed/__init__.py +0 -0
  163. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/managed/_inputs.py +0 -0
  164. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/managed/keys.py +0 -0
  165. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/managed/outputs.py +0 -0
  166. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/mfa_duo.py +0 -0
  167. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/mfa_okta.py +0 -0
  168. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/mfa_pingid.py +0 -0
  169. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/mfa_totp.py +0 -0
  170. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/mongodbatlas/__init__.py +0 -0
  171. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/mongodbatlas/secret_backend.py +0 -0
  172. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/mongodbatlas/secret_role.py +0 -0
  173. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/mount.py +0 -0
  174. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/namespace.py +0 -0
  175. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/nomad_secret_role.py +0 -0
  176. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/oci_auth_backend_role.py +0 -0
  177. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/okta/__init__.py +0 -0
  178. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/okta/_inputs.py +0 -0
  179. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/okta/auth_backend.py +0 -0
  180. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/okta/auth_backend_group.py +0 -0
  181. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/okta/auth_backend_user.py +0 -0
  182. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/okta/outputs.py +0 -0
  183. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/outputs.py +0 -0
  184. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/pkisecret/__init__.py +0 -0
  185. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/pkisecret/_inputs.py +0 -0
  186. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/pkisecret/backend_acme_eab.py +0 -0
  187. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/pkisecret/backend_config_acme.py +0 -0
  188. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/pkisecret/backend_config_cluster.py +0 -0
  189. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/pkisecret/backend_config_cmpv2.py +0 -0
  190. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/pkisecret/backend_config_est.py +0 -0
  191. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/pkisecret/backend_config_scep.py +0 -0
  192. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/pkisecret/get_backend_cert_metadata.py +0 -0
  193. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/pkisecret/get_backend_config_cmpv2.py +0 -0
  194. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/pkisecret/get_backend_config_est.py +0 -0
  195. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/pkisecret/get_backend_config_scep.py +0 -0
  196. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/pkisecret/get_backend_issuer.py +0 -0
  197. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/pkisecret/get_backend_issuers.py +0 -0
  198. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/pkisecret/get_backend_key.py +0 -0
  199. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/pkisecret/get_backend_keys.py +0 -0
  200. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/pkisecret/outputs.py +0 -0
  201. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/pkisecret/secret_backend_cert.py +0 -0
  202. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -0
  203. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -0
  204. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -0
  205. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -0
  206. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -0
  207. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -0
  208. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/pkisecret/secret_backend_issuer.py +0 -0
  209. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/pkisecret/secret_backend_key.py +0 -0
  210. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/pkisecret/secret_backend_role.py +0 -0
  211. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -0
  212. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -0
  213. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/pkisecret/secret_backend_sign.py +0 -0
  214. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/plugin.py +0 -0
  215. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/plugin_pinned_version.py +0 -0
  216. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/policy.py +0 -0
  217. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/py.typed +0 -0
  218. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/quota_lease_count.py +0 -0
  219. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/quota_rate_limit.py +0 -0
  220. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/rabbitmq/__init__.py +0 -0
  221. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/rabbitmq/_inputs.py +0 -0
  222. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/rabbitmq/outputs.py +0 -0
  223. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/rabbitmq/secret_backend.py +0 -0
  224. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/rabbitmq/secret_backend_role.py +0 -0
  225. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/raft_autopilot.py +0 -0
  226. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/raft_snapshot_agent_config.py +0 -0
  227. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/rgp_policy.py +0 -0
  228. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/saml/__init__.py +0 -0
  229. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/saml/auth_backend.py +0 -0
  230. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/saml/auth_backend_role.py +0 -0
  231. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/scep_auth_backend_role.py +0 -0
  232. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/secrets/__init__.py +0 -0
  233. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/secrets/_inputs.py +0 -0
  234. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/secrets/outputs.py +0 -0
  235. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/secrets/sync_association.py +0 -0
  236. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/secrets/sync_aws_destination.py +0 -0
  237. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/secrets/sync_azure_destination.py +0 -0
  238. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/secrets/sync_config.py +0 -0
  239. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/secrets/sync_gcp_destination.py +0 -0
  240. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/secrets/sync_gh_destination.py +0 -0
  241. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/secrets/sync_github_apps.py +0 -0
  242. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/secrets/sync_vercel_destination.py +0 -0
  243. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/ssh/__init__.py +0 -0
  244. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/ssh/_inputs.py +0 -0
  245. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/ssh/get_secret_backend_sign.py +0 -0
  246. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/ssh/outputs.py +0 -0
  247. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/ssh/secret_backend_ca.py +0 -0
  248. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/ssh/secret_backend_role.py +0 -0
  249. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/terraformcloud/__init__.py +0 -0
  250. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/terraformcloud/secret_backend.py +0 -0
  251. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/terraformcloud/secret_creds.py +0 -0
  252. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/terraformcloud/secret_role.py +0 -0
  253. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/token.py +0 -0
  254. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/tokenauth/__init__.py +0 -0
  255. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/tokenauth/auth_backend_role.py +0 -0
  256. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/transform/__init__.py +0 -0
  257. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/transform/alphabet.py +0 -0
  258. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/transform/get_decode.py +0 -0
  259. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/transform/get_encode.py +0 -0
  260. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/transform/role.py +0 -0
  261. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/transform/template.py +0 -0
  262. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/transform/transformation.py +0 -0
  263. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/transit/__init__.py +0 -0
  264. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/transit/get_cmac.py +0 -0
  265. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/transit/get_decrypt.py +0 -0
  266. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/transit/get_encrypt.py +0 -0
  267. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/transit/get_sign.py +0 -0
  268. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/transit/get_verify.py +0 -0
  269. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/transit/secret_backend_key.py +0 -0
  270. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault/transit/secret_cache_config.py +0 -0
  271. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault.egg-info/SOURCES.txt +0 -0
  272. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault.egg-info/dependency_links.txt +0 -0
  273. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault.egg-info/requires.txt +0 -0
  274. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/pulumi_vault.egg-info/top_level.txt +0 -0
  275. {pulumi_vault-7.3.0a1757055208 → pulumi_vault-7.3.0a1757388745}/setup.cfg +0 -0
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.4
2
2
  Name: pulumi_vault
3
- Version: 7.3.0a1757055208
3
+ Version: 7.3.0a1757388745
4
4
  Summary: A Pulumi package for creating and managing HashiCorp Vault cloud resources.
5
5
  License: Apache-2.0
6
6
  Project-URL: Homepage, https://pulumi.io
@@ -27,7 +27,8 @@ class AuthBackendConfigIdentityArgs:
27
27
  namespace: Optional[pulumi.Input[_builtins.str]] = None):
28
28
  """
29
29
  The set of arguments for constructing a AuthBackendConfigIdentity resource.
30
- :param pulumi.Input[_builtins.str] backend: Unique name of the auth backend to configure.
30
+ :param pulumi.Input[_builtins.str] backend: The path the AWS auth backend being configured was
31
+ mounted at. Defaults to `aws`.
31
32
  :param pulumi.Input[_builtins.str] ec2_alias: How to generate the identity alias when using the ec2 auth method. Valid choices are
32
33
  `role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
33
34
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ec2_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
@@ -58,7 +59,8 @@ class AuthBackendConfigIdentityArgs:
58
59
  @pulumi.getter
59
60
  def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
60
61
  """
61
- Unique name of the auth backend to configure.
62
+ The path the AWS auth backend being configured was
63
+ mounted at. Defaults to `aws`.
62
64
  """
63
65
  return pulumi.get(self, "backend")
64
66
 
@@ -145,7 +147,8 @@ class _AuthBackendConfigIdentityState:
145
147
  namespace: Optional[pulumi.Input[_builtins.str]] = None):
146
148
  """
147
149
  Input properties used for looking up and filtering AuthBackendConfigIdentity resources.
148
- :param pulumi.Input[_builtins.str] backend: Unique name of the auth backend to configure.
150
+ :param pulumi.Input[_builtins.str] backend: The path the AWS auth backend being configured was
151
+ mounted at. Defaults to `aws`.
149
152
  :param pulumi.Input[_builtins.str] ec2_alias: How to generate the identity alias when using the ec2 auth method. Valid choices are
150
153
  `role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
151
154
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ec2_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
@@ -176,7 +179,8 @@ class _AuthBackendConfigIdentityState:
176
179
  @pulumi.getter
177
180
  def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
178
181
  """
179
- Unique name of the auth backend to configure.
182
+ The path the AWS auth backend being configured was
183
+ mounted at. Defaults to `aws`.
180
184
  """
181
185
  return pulumi.get(self, "backend")
182
186
 
@@ -296,7 +300,8 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
296
300
 
297
301
  :param str resource_name: The name of the resource.
298
302
  :param pulumi.ResourceOptions opts: Options for the resource.
299
- :param pulumi.Input[_builtins.str] backend: Unique name of the auth backend to configure.
303
+ :param pulumi.Input[_builtins.str] backend: The path the AWS auth backend being configured was
304
+ mounted at. Defaults to `aws`.
300
305
  :param pulumi.Input[_builtins.str] ec2_alias: How to generate the identity alias when using the ec2 auth method. Valid choices are
301
306
  `role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
302
307
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ec2_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
@@ -404,7 +409,8 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
404
409
  :param str resource_name: The unique name of the resulting resource.
405
410
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
406
411
  :param pulumi.ResourceOptions opts: Options for the resource.
407
- :param pulumi.Input[_builtins.str] backend: Unique name of the auth backend to configure.
412
+ :param pulumi.Input[_builtins.str] backend: The path the AWS auth backend being configured was
413
+ mounted at. Defaults to `aws`.
408
414
  :param pulumi.Input[_builtins.str] ec2_alias: How to generate the identity alias when using the ec2 auth method. Valid choices are
409
415
  `role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
410
416
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ec2_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
@@ -434,7 +440,8 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
434
440
  @pulumi.getter
435
441
  def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
436
442
  """
437
- Unique name of the auth backend to configure.
443
+ The path the AWS auth backend being configured was
444
+ mounted at. Defaults to `aws`.
438
445
  """
439
446
  return pulumi.get(self, "backend")
440
447
 
@@ -124,8 +124,7 @@ The namespace to use. Available only for Vault Enterprise.
124
124
 
125
125
  setNamespaceFromToken: Optional[bool]
126
126
  """
127
- In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the
128
- token namespace as the root namespace for all resources.
127
+ In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the token namespace as the root namespace for all resources.
129
128
  """
130
129
 
131
130
  skipChildToken: Optional[bool]
@@ -175,8 +175,7 @@ class _ExportableConfig(types.ModuleType):
175
175
  @_builtins.property
176
176
  def set_namespace_from_token(self) -> Optional[bool]:
177
177
  """
178
- In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the
179
- token namespace as the root namespace for all resources.
178
+ In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the token namespace as the root namespace for all resources.
180
179
  """
181
180
  return __config__.get_bool('setNamespaceFromToken')
182
181
 
@@ -37,8 +37,7 @@ class SecretBackendStaticRoleArgs:
37
37
  :param pulumi.Input[_builtins.str] backend: The unique name of the Vault mount to configure.
38
38
  :param pulumi.Input[_builtins.str] db_name: The unique name of the database connection to use for the static role.
39
39
  :param pulumi.Input[_builtins.str] username: The database username that this static role corresponds to.
40
- :param pulumi.Input[_builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
41
- can be done in `credential_config`.
40
+ :param pulumi.Input[_builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration can be done in `credential_config`.
42
41
  :param pulumi.Input[_builtins.str] name: A unique name to give the static role.
43
42
  :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
44
43
  The value should not contain leading or trailing forward slashes.
@@ -133,8 +132,7 @@ class SecretBackendStaticRoleArgs:
133
132
  @pulumi.getter(name="credentialType")
134
133
  def credential_type(self) -> Optional[pulumi.Input[_builtins.str]]:
135
134
  """
136
- The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
137
- can be done in `credential_config`.
135
+ The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration can be done in `credential_config`.
138
136
  """
139
137
  return pulumi.get(self, "credential_type")
140
138
 
@@ -270,8 +268,7 @@ class _SecretBackendStaticRoleState:
270
268
  """
271
269
  Input properties used for looking up and filtering SecretBackendStaticRole resources.
272
270
  :param pulumi.Input[_builtins.str] backend: The unique name of the Vault mount to configure.
273
- :param pulumi.Input[_builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
274
- can be done in `credential_config`.
271
+ :param pulumi.Input[_builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration can be done in `credential_config`.
275
272
  :param pulumi.Input[_builtins.str] db_name: The unique name of the database connection to use for the static role.
276
273
  :param pulumi.Input[_builtins.str] name: A unique name to give the static role.
277
274
  :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
@@ -347,8 +344,7 @@ class _SecretBackendStaticRoleState:
347
344
  @pulumi.getter(name="credentialType")
348
345
  def credential_type(self) -> Optional[pulumi.Input[_builtins.str]]:
349
346
  """
350
- The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
351
- can be done in `credential_config`.
347
+ The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration can be done in `credential_config`.
352
348
  """
353
349
  return pulumi.get(self, "credential_type")
354
350
 
@@ -560,8 +556,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
560
556
  :param str resource_name: The name of the resource.
561
557
  :param pulumi.ResourceOptions opts: Options for the resource.
562
558
  :param pulumi.Input[_builtins.str] backend: The unique name of the Vault mount to configure.
563
- :param pulumi.Input[_builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
564
- can be done in `credential_config`.
559
+ :param pulumi.Input[_builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration can be done in `credential_config`.
565
560
  :param pulumi.Input[_builtins.str] db_name: The unique name of the database connection to use for the static role.
566
561
  :param pulumi.Input[_builtins.str] name: A unique name to give the static role.
567
562
  :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
@@ -728,8 +723,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
728
723
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
729
724
  :param pulumi.ResourceOptions opts: Options for the resource.
730
725
  :param pulumi.Input[_builtins.str] backend: The unique name of the Vault mount to configure.
731
- :param pulumi.Input[_builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
732
- can be done in `credential_config`.
726
+ :param pulumi.Input[_builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration can be done in `credential_config`.
733
727
  :param pulumi.Input[_builtins.str] db_name: The unique name of the database connection to use for the static role.
734
728
  :param pulumi.Input[_builtins.str] name: A unique name to give the static role.
735
729
  :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
@@ -789,8 +783,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
789
783
  @pulumi.getter(name="credentialType")
790
784
  def credential_type(self) -> pulumi.Output[_builtins.str]:
791
785
  """
792
- The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
793
- can be done in `credential_config`.
786
+ The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration can be done in `credential_config`.
794
787
  """
795
788
  return pulumi.get(self, "credential_type")
796
789
 
@@ -29,6 +29,7 @@ class SecretBackendArgs:
29
29
  client_tls_cert: Optional[pulumi.Input[_builtins.str]] = None,
30
30
  client_tls_key: Optional[pulumi.Input[_builtins.str]] = None,
31
31
  connection_timeout: Optional[pulumi.Input[_builtins.int]] = None,
32
+ credential_type: Optional[pulumi.Input[_builtins.str]] = None,
32
33
  default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
33
34
  delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
34
35
  description: Optional[pulumi.Input[_builtins.str]] = None,
@@ -73,6 +74,7 @@ class SecretBackendArgs:
73
74
  :param pulumi.Input[_builtins.str] client_tls_key: Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
74
75
  :param pulumi.Input[_builtins.int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
75
76
  the next URL in the configuration.
77
+ :param pulumi.Input[_builtins.str] credential_type: The type of credential to generate. Valid values include `password` and `phrase`. Default is `password`.
76
78
  :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
77
79
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
78
80
  :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
@@ -134,6 +136,8 @@ class SecretBackendArgs:
134
136
  pulumi.set(__self__, "client_tls_key", client_tls_key)
135
137
  if connection_timeout is not None:
136
138
  pulumi.set(__self__, "connection_timeout", connection_timeout)
139
+ if credential_type is not None:
140
+ pulumi.set(__self__, "credential_type", credential_type)
137
141
  if default_lease_ttl_seconds is not None:
138
142
  pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
139
143
  if delegated_auth_accessors is not None:
@@ -317,6 +321,18 @@ class SecretBackendArgs:
317
321
  def connection_timeout(self, value: Optional[pulumi.Input[_builtins.int]]):
318
322
  pulumi.set(self, "connection_timeout", value)
319
323
 
324
+ @_builtins.property
325
+ @pulumi.getter(name="credentialType")
326
+ def credential_type(self) -> Optional[pulumi.Input[_builtins.str]]:
327
+ """
328
+ The type of credential to generate. Valid values include `password` and `phrase`. Default is `password`.
329
+ """
330
+ return pulumi.get(self, "credential_type")
331
+
332
+ @credential_type.setter
333
+ def credential_type(self, value: Optional[pulumi.Input[_builtins.str]]):
334
+ pulumi.set(self, "credential_type", value)
335
+
320
336
  @_builtins.property
321
337
  @pulumi.getter(name="defaultLeaseTtlSeconds")
322
338
  def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
@@ -704,6 +720,7 @@ class _SecretBackendState:
704
720
  client_tls_cert: Optional[pulumi.Input[_builtins.str]] = None,
705
721
  client_tls_key: Optional[pulumi.Input[_builtins.str]] = None,
706
722
  connection_timeout: Optional[pulumi.Input[_builtins.int]] = None,
723
+ credential_type: Optional[pulumi.Input[_builtins.str]] = None,
707
724
  default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
708
725
  delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
709
726
  description: Optional[pulumi.Input[_builtins.str]] = None,
@@ -749,6 +766,7 @@ class _SecretBackendState:
749
766
  :param pulumi.Input[_builtins.str] client_tls_key: Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
750
767
  :param pulumi.Input[_builtins.int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
751
768
  the next URL in the configuration.
769
+ :param pulumi.Input[_builtins.str] credential_type: The type of credential to generate. Valid values include `password` and `phrase`. Default is `password`.
752
770
  :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
753
771
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
754
772
  :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
@@ -814,6 +832,8 @@ class _SecretBackendState:
814
832
  pulumi.set(__self__, "client_tls_key", client_tls_key)
815
833
  if connection_timeout is not None:
816
834
  pulumi.set(__self__, "connection_timeout", connection_timeout)
835
+ if credential_type is not None:
836
+ pulumi.set(__self__, "credential_type", credential_type)
817
837
  if default_lease_ttl_seconds is not None:
818
838
  pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
819
839
  if delegated_auth_accessors is not None:
@@ -1009,6 +1029,18 @@ class _SecretBackendState:
1009
1029
  def connection_timeout(self, value: Optional[pulumi.Input[_builtins.int]]):
1010
1030
  pulumi.set(self, "connection_timeout", value)
1011
1031
 
1032
+ @_builtins.property
1033
+ @pulumi.getter(name="credentialType")
1034
+ def credential_type(self) -> Optional[pulumi.Input[_builtins.str]]:
1035
+ """
1036
+ The type of credential to generate. Valid values include `password` and `phrase`. Default is `password`.
1037
+ """
1038
+ return pulumi.get(self, "credential_type")
1039
+
1040
+ @credential_type.setter
1041
+ def credential_type(self, value: Optional[pulumi.Input[_builtins.str]]):
1042
+ pulumi.set(self, "credential_type", value)
1043
+
1012
1044
  @_builtins.property
1013
1045
  @pulumi.getter(name="defaultLeaseTtlSeconds")
1014
1046
  def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
@@ -1398,6 +1430,7 @@ class SecretBackend(pulumi.CustomResource):
1398
1430
  client_tls_cert: Optional[pulumi.Input[_builtins.str]] = None,
1399
1431
  client_tls_key: Optional[pulumi.Input[_builtins.str]] = None,
1400
1432
  connection_timeout: Optional[pulumi.Input[_builtins.int]] = None,
1433
+ credential_type: Optional[pulumi.Input[_builtins.str]] = None,
1401
1434
  default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1402
1435
  delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1403
1436
  description: Optional[pulumi.Input[_builtins.str]] = None,
@@ -1469,6 +1502,7 @@ class SecretBackend(pulumi.CustomResource):
1469
1502
  :param pulumi.Input[_builtins.str] client_tls_key: Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
1470
1503
  :param pulumi.Input[_builtins.int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
1471
1504
  the next URL in the configuration.
1505
+ :param pulumi.Input[_builtins.str] credential_type: The type of credential to generate. Valid values include `password` and `phrase`. Default is `password`.
1472
1506
  :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
1473
1507
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1474
1508
  :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
@@ -1569,6 +1603,7 @@ class SecretBackend(pulumi.CustomResource):
1569
1603
  client_tls_cert: Optional[pulumi.Input[_builtins.str]] = None,
1570
1604
  client_tls_key: Optional[pulumi.Input[_builtins.str]] = None,
1571
1605
  connection_timeout: Optional[pulumi.Input[_builtins.int]] = None,
1606
+ credential_type: Optional[pulumi.Input[_builtins.str]] = None,
1572
1607
  default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1573
1608
  delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1574
1609
  description: Optional[pulumi.Input[_builtins.str]] = None,
@@ -1622,6 +1657,7 @@ class SecretBackend(pulumi.CustomResource):
1622
1657
  __props__.__dict__["client_tls_cert"] = None if client_tls_cert is None else pulumi.Output.secret(client_tls_cert)
1623
1658
  __props__.__dict__["client_tls_key"] = None if client_tls_key is None else pulumi.Output.secret(client_tls_key)
1624
1659
  __props__.__dict__["connection_timeout"] = connection_timeout
1660
+ __props__.__dict__["credential_type"] = credential_type
1625
1661
  __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1626
1662
  __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
1627
1663
  __props__.__dict__["description"] = description
@@ -1676,6 +1712,7 @@ class SecretBackend(pulumi.CustomResource):
1676
1712
  client_tls_cert: Optional[pulumi.Input[_builtins.str]] = None,
1677
1713
  client_tls_key: Optional[pulumi.Input[_builtins.str]] = None,
1678
1714
  connection_timeout: Optional[pulumi.Input[_builtins.int]] = None,
1715
+ credential_type: Optional[pulumi.Input[_builtins.str]] = None,
1679
1716
  default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1680
1717
  delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1681
1718
  description: Optional[pulumi.Input[_builtins.str]] = None,
@@ -1726,6 +1763,7 @@ class SecretBackend(pulumi.CustomResource):
1726
1763
  :param pulumi.Input[_builtins.str] client_tls_key: Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
1727
1764
  :param pulumi.Input[_builtins.int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
1728
1765
  the next URL in the configuration.
1766
+ :param pulumi.Input[_builtins.str] credential_type: The type of credential to generate. Valid values include `password` and `phrase`. Default is `password`.
1729
1767
  :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
1730
1768
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1731
1769
  :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
@@ -1784,6 +1822,7 @@ class SecretBackend(pulumi.CustomResource):
1784
1822
  __props__.__dict__["client_tls_cert"] = client_tls_cert
1785
1823
  __props__.__dict__["client_tls_key"] = client_tls_key
1786
1824
  __props__.__dict__["connection_timeout"] = connection_timeout
1825
+ __props__.__dict__["credential_type"] = credential_type
1787
1826
  __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1788
1827
  __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
1789
1828
  __props__.__dict__["description"] = description
@@ -1906,6 +1945,14 @@ class SecretBackend(pulumi.CustomResource):
1906
1945
  """
1907
1946
  return pulumi.get(self, "connection_timeout")
1908
1947
 
1948
+ @_builtins.property
1949
+ @pulumi.getter(name="credentialType")
1950
+ def credential_type(self) -> pulumi.Output[_builtins.str]:
1951
+ """
1952
+ The type of credential to generate. Valid values include `password` and `phrase`. Default is `password`.
1953
+ """
1954
+ return pulumi.get(self, "credential_type")
1955
+
1909
1956
  @_builtins.property
1910
1957
  @pulumi.getter(name="defaultLeaseTtlSeconds")
1911
1958
  def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
@@ -70,8 +70,7 @@ class NomadSecretBackendArgs:
70
70
  :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
71
71
  :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
72
72
  :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
73
- :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
74
- use when checking the last rotation time.
73
+ :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time.
75
74
  :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
76
75
  :param pulumi.Input[_builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
77
76
  generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
@@ -357,8 +356,7 @@ class NomadSecretBackendArgs:
357
356
  @pulumi.getter
358
357
  def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
359
358
  """
360
- Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
361
- use when checking the last rotation time.
359
+ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time.
362
360
  """
363
361
  return pulumi.get(self, "local")
364
362
 
@@ -548,8 +546,7 @@ class _NomadSecretBackendState:
548
546
  :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
549
547
  :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
550
548
  :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
551
- :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
552
- use when checking the last rotation time.
549
+ :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time.
553
550
  :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
554
551
  :param pulumi.Input[_builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
555
552
  generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
@@ -849,8 +846,7 @@ class _NomadSecretBackendState:
849
846
  @pulumi.getter
850
847
  def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
851
848
  """
852
- Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
853
- use when checking the last rotation time.
849
+ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time.
854
850
  """
855
851
  return pulumi.get(self, "local")
856
852
 
@@ -1068,8 +1064,7 @@ class NomadSecretBackend(pulumi.CustomResource):
1068
1064
  :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1069
1065
  :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1070
1066
  :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1071
- :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
1072
- use when checking the last rotation time.
1067
+ :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time.
1073
1068
  :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
1074
1069
  :param pulumi.Input[_builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
1075
1070
  generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
@@ -1269,8 +1264,7 @@ class NomadSecretBackend(pulumi.CustomResource):
1269
1264
  :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1270
1265
  :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1271
1266
  :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1272
- :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
1273
- use when checking the last rotation time.
1267
+ :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time.
1274
1268
  :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
1275
1269
  :param pulumi.Input[_builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
1276
1270
  generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
@@ -1474,8 +1468,7 @@ class NomadSecretBackend(pulumi.CustomResource):
1474
1468
  @pulumi.getter
1475
1469
  def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
1476
1470
  """
1477
- Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
1478
- use when checking the last rotation time.
1471
+ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time.
1479
1472
  """
1480
1473
  return pulumi.get(self, "local")
1481
1474
 
@@ -44,8 +44,7 @@ class OciAuthBackendArgs:
44
44
  :param pulumi.Input[_builtins.str] path: Unique name of the auth backend to configure.
45
45
  :param pulumi.Input[_builtins.int] rotation_period: The period of time in seconds between each rotation of the root credential. Cannot be used with rotation_schedule.
46
46
  :param pulumi.Input[_builtins.str] rotation_schedule: The cron-style schedule for the root credential to be rotated on. Cannot be used with rotation_period.
47
- :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered.
48
- Can only be used with rotation_schedule.
47
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered. Can only be used with rotation_schedule.
49
48
  :param pulumi.Input['OciAuthBackendTuneArgs'] tune: Extra configuration block. Structure is documented below.
50
49
 
51
50
  The `tune` block is used to tune the auth backend:
@@ -173,8 +172,7 @@ class OciAuthBackendArgs:
173
172
  @pulumi.getter(name="rotationWindow")
174
173
  def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
175
174
  """
176
- The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered.
177
- Can only be used with rotation_schedule.
175
+ The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered. Can only be used with rotation_schedule.
178
176
  """
179
177
  return pulumi.get(self, "rotation_window")
180
178
 
@@ -225,8 +223,7 @@ class _OciAuthBackendState:
225
223
  :param pulumi.Input[_builtins.str] path: Unique name of the auth backend to configure.
226
224
  :param pulumi.Input[_builtins.int] rotation_period: The period of time in seconds between each rotation of the root credential. Cannot be used with rotation_schedule.
227
225
  :param pulumi.Input[_builtins.str] rotation_schedule: The cron-style schedule for the root credential to be rotated on. Cannot be used with rotation_period.
228
- :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered.
229
- Can only be used with rotation_schedule.
226
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered. Can only be used with rotation_schedule.
230
227
  :param pulumi.Input['OciAuthBackendTuneArgs'] tune: Extra configuration block. Structure is documented below.
231
228
 
232
229
  The `tune` block is used to tune the auth backend:
@@ -369,8 +366,7 @@ class _OciAuthBackendState:
369
366
  @pulumi.getter(name="rotationWindow")
370
367
  def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
371
368
  """
372
- The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered.
373
- Can only be used with rotation_schedule.
369
+ The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered. Can only be used with rotation_schedule.
374
370
  """
375
371
  return pulumi.get(self, "rotation_window")
376
372
 
@@ -443,8 +439,7 @@ class OciAuthBackend(pulumi.CustomResource):
443
439
  :param pulumi.Input[_builtins.str] path: Unique name of the auth backend to configure.
444
440
  :param pulumi.Input[_builtins.int] rotation_period: The period of time in seconds between each rotation of the root credential. Cannot be used with rotation_schedule.
445
441
  :param pulumi.Input[_builtins.str] rotation_schedule: The cron-style schedule for the root credential to be rotated on. Cannot be used with rotation_period.
446
- :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered.
447
- Can only be used with rotation_schedule.
442
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered. Can only be used with rotation_schedule.
448
443
  :param pulumi.Input[Union['OciAuthBackendTuneArgs', 'OciAuthBackendTuneArgsDict']] tune: Extra configuration block. Structure is documented below.
449
444
 
450
445
  The `tune` block is used to tune the auth backend:
@@ -564,8 +559,7 @@ class OciAuthBackend(pulumi.CustomResource):
564
559
  :param pulumi.Input[_builtins.str] path: Unique name of the auth backend to configure.
565
560
  :param pulumi.Input[_builtins.int] rotation_period: The period of time in seconds between each rotation of the root credential. Cannot be used with rotation_schedule.
566
561
  :param pulumi.Input[_builtins.str] rotation_schedule: The cron-style schedule for the root credential to be rotated on. Cannot be used with rotation_period.
567
- :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered.
568
- Can only be used with rotation_schedule.
562
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered. Can only be used with rotation_schedule.
569
563
  :param pulumi.Input[Union['OciAuthBackendTuneArgs', 'OciAuthBackendTuneArgsDict']] tune: Extra configuration block. Structure is documented below.
570
564
 
571
565
  The `tune` block is used to tune the auth backend:
@@ -666,8 +660,7 @@ class OciAuthBackend(pulumi.CustomResource):
666
660
  @pulumi.getter(name="rotationWindow")
667
661
  def rotation_window(self) -> pulumi.Output[Optional[_builtins.int]]:
668
662
  """
669
- The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered.
670
- Can only be used with rotation_schedule.
663
+ The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered. Can only be used with rotation_schedule.
671
664
  """
672
665
  return pulumi.get(self, "rotation_window")
673
666
 
@@ -47,8 +47,7 @@ class BackendConfigAutoTidyArgs:
47
47
  :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
48
48
  read the configuration from, with no leading or trailing `/`s.
49
49
  :param pulumi.Input[_builtins.bool] enabled: Specifies whether automatic tidy is enabled or not.
50
- :param pulumi.Input[_builtins.str] acme_account_safety_buffer: The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of
51
- time after being marked revoked or deactivated.
50
+ :param pulumi.Input[_builtins.str] acme_account_safety_buffer: The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of time after being marked revoked or deactivated.
52
51
  :param pulumi.Input[_builtins.str] interval_duration: Interval at which to run an auto-tidy operation. This is the time
53
52
  between tidy invocations (after one finishes to the start of the next).
54
53
  :param pulumi.Input[_builtins.str] issuer_safety_buffer: The amount of extra time that must have passed beyond issuer's
@@ -164,8 +163,7 @@ class BackendConfigAutoTidyArgs:
164
163
  @pulumi.getter(name="acmeAccountSafetyBuffer")
165
164
  def acme_account_safety_buffer(self) -> Optional[pulumi.Input[_builtins.str]]:
166
165
  """
167
- The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of
168
- time after being marked revoked or deactivated.
166
+ The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of time after being marked revoked or deactivated.
169
167
  """
170
168
  return pulumi.get(self, "acme_account_safety_buffer")
171
169
 
@@ -462,8 +460,7 @@ class _BackendConfigAutoTidyState:
462
460
  tidy_revoked_certs: Optional[pulumi.Input[_builtins.bool]] = None):
463
461
  """
464
462
  Input properties used for looking up and filtering BackendConfigAutoTidy resources.
465
- :param pulumi.Input[_builtins.str] acme_account_safety_buffer: The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of
466
- time after being marked revoked or deactivated.
463
+ :param pulumi.Input[_builtins.str] acme_account_safety_buffer: The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of time after being marked revoked or deactivated.
467
464
  :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
468
465
  read the configuration from, with no leading or trailing `/`s.
469
466
  :param pulumi.Input[_builtins.bool] enabled: Specifies whether automatic tidy is enabled or not.
@@ -559,8 +556,7 @@ class _BackendConfigAutoTidyState:
559
556
  @pulumi.getter(name="acmeAccountSafetyBuffer")
560
557
  def acme_account_safety_buffer(self) -> Optional[pulumi.Input[_builtins.str]]:
561
558
  """
562
- The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of
563
- time after being marked revoked or deactivated.
559
+ The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of time after being marked revoked or deactivated.
564
560
  """
565
561
  return pulumi.get(self, "acme_account_safety_buffer")
566
562
 
@@ -907,8 +903,7 @@ class BackendConfigAutoTidy(pulumi.CustomResource):
907
903
 
908
904
  :param str resource_name: The name of the resource.
909
905
  :param pulumi.ResourceOptions opts: Options for the resource.
910
- :param pulumi.Input[_builtins.str] acme_account_safety_buffer: The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of
911
- time after being marked revoked or deactivated.
906
+ :param pulumi.Input[_builtins.str] acme_account_safety_buffer: The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of time after being marked revoked or deactivated.
912
907
  :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
913
908
  read the configuration from, with no leading or trailing `/`s.
914
909
  :param pulumi.Input[_builtins.bool] enabled: Specifies whether automatic tidy is enabled or not.
@@ -1094,8 +1089,7 @@ class BackendConfigAutoTidy(pulumi.CustomResource):
1094
1089
  :param str resource_name: The unique name of the resulting resource.
1095
1090
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
1096
1091
  :param pulumi.ResourceOptions opts: Options for the resource.
1097
- :param pulumi.Input[_builtins.str] acme_account_safety_buffer: The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of
1098
- time after being marked revoked or deactivated.
1092
+ :param pulumi.Input[_builtins.str] acme_account_safety_buffer: The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of time after being marked revoked or deactivated.
1099
1093
  :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
1100
1094
  read the configuration from, with no leading or trailing `/`s.
1101
1095
  :param pulumi.Input[_builtins.bool] enabled: Specifies whether automatic tidy is enabled or not.
@@ -1173,8 +1167,7 @@ class BackendConfigAutoTidy(pulumi.CustomResource):
1173
1167
  @pulumi.getter(name="acmeAccountSafetyBuffer")
1174
1168
  def acme_account_safety_buffer(self) -> pulumi.Output[_builtins.str]:
1175
1169
  """
1176
- The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of
1177
- time after being marked revoked or deactivated.
1170
+ The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of time after being marked revoked or deactivated.
1178
1171
  """
1179
1172
  return pulumi.get(self, "acme_account_safety_buffer")
1180
1173
 
@@ -73,8 +73,7 @@ class ProviderArgs:
73
73
  :param pulumi.Input[_builtins.int] max_retries: Maximum number of retries when a 5xx error code is encountered.
74
74
  :param pulumi.Input[_builtins.int] max_retries_ccc: Maximum number of retries for Client Controlled Consistency related operations
75
75
  :param pulumi.Input[_builtins.str] namespace: The namespace to use. Available only for Vault Enterprise.
76
- :param pulumi.Input[_builtins.bool] set_namespace_from_token: In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the
77
- token namespace as the root namespace for all resources.
76
+ :param pulumi.Input[_builtins.bool] set_namespace_from_token: In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the token namespace as the root namespace for all resources.
78
77
  :param pulumi.Input[_builtins.bool] skip_child_token: Set this to true to prevent the creation of ephemeral child token used by this provider.
79
78
  :param pulumi.Input[_builtins.bool] skip_get_vault_version: Skip the dynamic fetching of the Vault server version.
80
79
  :param pulumi.Input[_builtins.bool] skip_tls_verify: Set this to true only if the target Vault server is an insecure development instance.
@@ -415,8 +414,7 @@ class ProviderArgs:
415
414
  @pulumi.getter(name="setNamespaceFromToken")
416
415
  def set_namespace_from_token(self) -> Optional[pulumi.Input[_builtins.bool]]:
417
416
  """
418
- In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the
419
- token namespace as the root namespace for all resources.
417
+ In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the token namespace as the root namespace for all resources.
420
418
  """
421
419
  return pulumi.get(self, "set_namespace_from_token")
422
420
 
@@ -575,8 +573,7 @@ class Provider(pulumi.ProviderResource):
575
573
  :param pulumi.Input[_builtins.int] max_retries: Maximum number of retries when a 5xx error code is encountered.
576
574
  :param pulumi.Input[_builtins.int] max_retries_ccc: Maximum number of retries for Client Controlled Consistency related operations
577
575
  :param pulumi.Input[_builtins.str] namespace: The namespace to use. Available only for Vault Enterprise.
578
- :param pulumi.Input[_builtins.bool] set_namespace_from_token: In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the
579
- token namespace as the root namespace for all resources.
576
+ :param pulumi.Input[_builtins.bool] set_namespace_from_token: In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the token namespace as the root namespace for all resources.
580
577
  :param pulumi.Input[_builtins.bool] skip_child_token: Set this to true to prevent the creation of ephemeral child token used by this provider.
581
578
  :param pulumi.Input[_builtins.bool] skip_get_vault_version: Skip the dynamic fetching of the Vault server version.
582
579
  :param pulumi.Input[_builtins.bool] skip_tls_verify: Set this to true only if the target Vault server is an insecure development instance.
@@ -1,5 +1,5 @@
1
1
  {
2
2
  "resource": true,
3
3
  "name": "vault",
4
- "version": "7.3.0-alpha.1757055208"
4
+ "version": "7.3.0-alpha.1757388745"
5
5
  }
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.4
2
2
  Name: pulumi_vault
3
- Version: 7.3.0a1757055208
3
+ Version: 7.3.0a1757388745
4
4
  Summary: A Pulumi package for creating and managing HashiCorp Vault cloud resources.
5
5
  License: Apache-2.0
6
6
  Project-URL: Homepage, https://pulumi.io
@@ -5,7 +5,7 @@
5
5
  keywords = ["pulumi", "vault"]
6
6
  readme = "README.md"
7
7
  requires-python = ">=3.9"
8
- version = "7.3.0a1757055208"
8
+ version = "7.3.0a1757388745"
9
9
  [project.license]
10
10
  text = "Apache-2.0"
11
11
  [project.urls]