pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +26 -9
  5. pulumi_vault/ad/secret_backend.py +16 -142
  6. pulumi_vault/ad/secret_library.py +16 -9
  7. pulumi_vault/ad/secret_role.py +14 -9
  8. pulumi_vault/alicloud/auth_backend_role.py +76 -190
  9. pulumi_vault/approle/auth_backend_login.py +12 -7
  10. pulumi_vault/approle/auth_backend_role.py +77 -191
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
  13. pulumi_vault/audit.py +30 -21
  14. pulumi_vault/audit_request_header.py +11 -2
  15. pulumi_vault/auth_backend.py +66 -14
  16. pulumi_vault/aws/auth_backend_cert.py +18 -9
  17. pulumi_vault/aws/auth_backend_client.py +267 -22
  18. pulumi_vault/aws/auth_backend_config_identity.py +14 -9
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +77 -191
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
  24. pulumi_vault/aws/auth_backend_sts_role.py +14 -9
  25. pulumi_vault/aws/get_access_credentials.py +38 -9
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +77 -9
  28. pulumi_vault/aws/secret_backend_role.py +185 -9
  29. pulumi_vault/aws/secret_backend_static_role.py +20 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +153 -15
  32. pulumi_vault/azure/auth_backend_role.py +77 -191
  33. pulumi_vault/azure/backend.py +227 -21
  34. pulumi_vault/azure/backend_role.py +42 -37
  35. pulumi_vault/azure/get_access_credentials.py +41 -7
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -267
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +28 -19
  44. pulumi_vault/consul/secret_backend_role.py +18 -78
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +119 -112
  48. pulumi_vault/database/secret_backend_role.py +31 -22
  49. pulumi_vault/database/secret_backend_static_role.py +87 -13
  50. pulumi_vault/database/secrets_mount.py +427 -136
  51. pulumi_vault/egp_policy.py +16 -11
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +250 -33
  54. pulumi_vault/gcp/auth_backend_role.py +77 -269
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -5
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -12
  58. pulumi_vault/gcp/secret_impersonated_account.py +76 -15
  59. pulumi_vault/gcp/secret_roleset.py +31 -24
  60. pulumi_vault/gcp/secret_static_account.py +39 -32
  61. pulumi_vault/generic/endpoint.py +24 -17
  62. pulumi_vault/generic/get_secret.py +64 -8
  63. pulumi_vault/generic/secret.py +21 -16
  64. pulumi_vault/get_auth_backend.py +24 -7
  65. pulumi_vault/get_auth_backends.py +51 -9
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -11
  69. pulumi_vault/get_policy_document.py +34 -19
  70. pulumi_vault/get_raft_autopilot_state.py +29 -10
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +19 -14
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +16 -11
  75. pulumi_vault/github/user.py +16 -11
  76. pulumi_vault/identity/entity.py +20 -13
  77. pulumi_vault/identity/entity_alias.py +20 -13
  78. pulumi_vault/identity/entity_policies.py +28 -11
  79. pulumi_vault/identity/get_entity.py +42 -10
  80. pulumi_vault/identity/get_group.py +47 -9
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -7
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -9
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -10
  84. pulumi_vault/identity/group.py +58 -39
  85. pulumi_vault/identity/group_alias.py +16 -9
  86. pulumi_vault/identity/group_member_entity_ids.py +28 -66
  87. pulumi_vault/identity/group_member_group_ids.py +40 -19
  88. pulumi_vault/identity/group_policies.py +20 -7
  89. pulumi_vault/identity/mfa_duo.py +11 -6
  90. pulumi_vault/identity/mfa_login_enforcement.py +15 -6
  91. pulumi_vault/identity/mfa_okta.py +11 -6
  92. pulumi_vault/identity/mfa_pingid.py +7 -2
  93. pulumi_vault/identity/mfa_totp.py +7 -2
  94. pulumi_vault/identity/oidc.py +12 -7
  95. pulumi_vault/identity/oidc_assignment.py +24 -11
  96. pulumi_vault/identity/oidc_client.py +36 -23
  97. pulumi_vault/identity/oidc_key.py +30 -17
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
  99. pulumi_vault/identity/oidc_provider.py +36 -21
  100. pulumi_vault/identity/oidc_role.py +42 -21
  101. pulumi_vault/identity/oidc_scope.py +20 -13
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +45 -40
  105. pulumi_vault/jwt/auth_backend_role.py +133 -254
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +24 -19
  108. pulumi_vault/kmip/secret_role.py +14 -9
  109. pulumi_vault/kmip/secret_scope.py +14 -9
  110. pulumi_vault/kubernetes/auth_backend_config.py +57 -5
  111. pulumi_vault/kubernetes/auth_backend_role.py +70 -177
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -11
  115. pulumi_vault/kubernetes/secret_backend.py +316 -27
  116. pulumi_vault/kubernetes/secret_backend_role.py +137 -46
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +25 -8
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
  120. pulumi_vault/kv/get_secret_v2.py +85 -9
  121. pulumi_vault/kv/get_secrets_list.py +24 -11
  122. pulumi_vault/kv/get_secrets_list_v2.py +37 -15
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +23 -16
  125. pulumi_vault/kv/secret_backend_v2.py +20 -11
  126. pulumi_vault/kv/secret_v2.py +59 -50
  127. pulumi_vault/ldap/auth_backend.py +127 -166
  128. pulumi_vault/ldap/auth_backend_group.py +14 -9
  129. pulumi_vault/ldap/auth_backend_user.py +14 -9
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +354 -82
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +16 -9
  135. pulumi_vault/ldap/secret_backend_static_role.py +73 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +29 -57
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +18 -11
  140. pulumi_vault/mfa_okta.py +18 -11
  141. pulumi_vault/mfa_pingid.py +18 -11
  142. pulumi_vault/mfa_totp.py +24 -17
  143. pulumi_vault/mongodbatlas/secret_backend.py +20 -15
  144. pulumi_vault/mongodbatlas/secret_role.py +47 -38
  145. pulumi_vault/mount.py +391 -51
  146. pulumi_vault/namespace.py +68 -83
  147. pulumi_vault/nomad_secret_backend.py +18 -13
  148. pulumi_vault/nomad_secret_role.py +14 -9
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +485 -39
  151. pulumi_vault/okta/auth_backend_group.py +14 -9
  152. pulumi_vault/okta/auth_backend_user.py +14 -9
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +20 -13
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -9
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -8
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
  174. pulumi_vault/pkisecret/secret_backend_key.py +14 -9
  175. pulumi_vault/pkisecret/secret_backend_role.py +21 -14
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +14 -9
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +60 -6
  185. pulumi_vault/quota_rate_limit.py +56 -2
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +18 -13
  189. pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
  190. pulumi_vault/raft_autopilot.py +14 -9
  191. pulumi_vault/raft_snapshot_agent_config.py +129 -224
  192. pulumi_vault/rgp_policy.py +14 -9
  193. pulumi_vault/saml/auth_backend.py +22 -17
  194. pulumi_vault/saml/auth_backend_role.py +92 -197
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -71
  199. pulumi_vault/secrets/sync_aws_destination.py +242 -27
  200. pulumi_vault/secrets/sync_azure_destination.py +92 -31
  201. pulumi_vault/secrets/sync_config.py +9 -4
  202. pulumi_vault/secrets/sync_gcp_destination.py +158 -25
  203. pulumi_vault/secrets/sync_gh_destination.py +189 -13
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +74 -13
  206. pulumi_vault/ssh/_inputs.py +28 -28
  207. pulumi_vault/ssh/outputs.py +11 -28
  208. pulumi_vault/ssh/secret_backend_ca.py +108 -9
  209. pulumi_vault/ssh/secret_backend_role.py +85 -118
  210. pulumi_vault/terraformcloud/secret_backend.py +7 -54
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -20
  212. pulumi_vault/terraformcloud/secret_role.py +16 -74
  213. pulumi_vault/token.py +28 -23
  214. pulumi_vault/tokenauth/auth_backend_role.py +78 -199
  215. pulumi_vault/transform/alphabet.py +16 -9
  216. pulumi_vault/transform/get_decode.py +45 -17
  217. pulumi_vault/transform/get_encode.py +45 -17
  218. pulumi_vault/transform/role.py +16 -9
  219. pulumi_vault/transform/template.py +30 -21
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -21
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +27 -93
  224. pulumi_vault/transit/secret_cache_config.py +12 -7
  225. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['AuthBackendIdentityWhitelistArgs', 'AuthBackendIdentityWhitelist']
@@ -25,7 +30,7 @@ class AuthBackendIdentityWhitelistArgs:
25
30
  tidying of the identity-whitelist entries.
26
31
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
27
32
  The value should not contain leading or trailing forward slashes.
28
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
33
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
29
34
  *Available only for Vault Enterprise*.
30
35
  :param pulumi.Input[int] safety_buffer: The amount of extra time, in minutes, that must
31
36
  have passed beyond the roletag expiration, before it is removed from the
@@ -71,7 +76,7 @@ class AuthBackendIdentityWhitelistArgs:
71
76
  """
72
77
  The namespace to provision the resource in.
73
78
  The value should not contain leading or trailing forward slashes.
74
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
79
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
75
80
  *Available only for Vault Enterprise*.
76
81
  """
77
82
  return pulumi.get(self, "namespace")
@@ -109,7 +114,7 @@ class _AuthBackendIdentityWhitelistState:
109
114
  tidying of the identity-whitelist entries.
110
115
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
111
116
  The value should not contain leading or trailing forward slashes.
112
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
117
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
113
118
  *Available only for Vault Enterprise*.
114
119
  :param pulumi.Input[int] safety_buffer: The amount of extra time, in minutes, that must
115
120
  have passed beyond the roletag expiration, before it is removed from the
@@ -155,7 +160,7 @@ class _AuthBackendIdentityWhitelistState:
155
160
  """
156
161
  The namespace to provision the resource in.
157
162
  The value should not contain leading or trailing forward slashes.
158
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
163
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
159
164
  *Available only for Vault Enterprise*.
160
165
  """
161
166
  return pulumi.get(self, "namespace")
@@ -201,9 +206,9 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
201
206
  import pulumi
202
207
  import pulumi_vault as vault
203
208
 
204
- example_auth_backend = vault.AuthBackend("exampleAuthBackend", type="aws")
205
- example_auth_backend_identity_whitelist = vault.aws.AuthBackendIdentityWhitelist("exampleAuthBackendIdentityWhitelist",
206
- backend=example_auth_backend.path,
209
+ example = vault.AuthBackend("example", type="aws")
210
+ example_auth_backend_identity_whitelist = vault.aws.AuthBackendIdentityWhitelist("example",
211
+ backend=example.path,
207
212
  safety_buffer=3600)
208
213
  ```
209
214
 
@@ -212,7 +217,7 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
212
217
  AWS auth backend identity whitelists can be imported using `auth/`, the `backend` path, and `/config/tidy/identity-whitelist` e.g.
213
218
 
214
219
  ```sh
215
- $ pulumi import vault:aws/authBackendIdentityWhitelist:AuthBackendIdentityWhitelist example auth/aws/config/tidy/identity-whitelist
220
+ $ pulumi import vault:aws/authBackendIdentityWhitelist:AuthBackendIdentityWhitelist example auth/aws/config/tidy/identity-whitelist
216
221
  ```
217
222
 
218
223
  :param str resource_name: The name of the resource.
@@ -222,7 +227,7 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
222
227
  tidying of the identity-whitelist entries.
223
228
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
224
229
  The value should not contain leading or trailing forward slashes.
225
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
230
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
226
231
  *Available only for Vault Enterprise*.
227
232
  :param pulumi.Input[int] safety_buffer: The amount of extra time, in minutes, that must
228
233
  have passed beyond the roletag expiration, before it is removed from the
@@ -246,9 +251,9 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
246
251
  import pulumi
247
252
  import pulumi_vault as vault
248
253
 
249
- example_auth_backend = vault.AuthBackend("exampleAuthBackend", type="aws")
250
- example_auth_backend_identity_whitelist = vault.aws.AuthBackendIdentityWhitelist("exampleAuthBackendIdentityWhitelist",
251
- backend=example_auth_backend.path,
254
+ example = vault.AuthBackend("example", type="aws")
255
+ example_auth_backend_identity_whitelist = vault.aws.AuthBackendIdentityWhitelist("example",
256
+ backend=example.path,
252
257
  safety_buffer=3600)
253
258
  ```
254
259
 
@@ -257,7 +262,7 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
257
262
  AWS auth backend identity whitelists can be imported using `auth/`, the `backend` path, and `/config/tidy/identity-whitelist` e.g.
258
263
 
259
264
  ```sh
260
- $ pulumi import vault:aws/authBackendIdentityWhitelist:AuthBackendIdentityWhitelist example auth/aws/config/tidy/identity-whitelist
265
+ $ pulumi import vault:aws/authBackendIdentityWhitelist:AuthBackendIdentityWhitelist example auth/aws/config/tidy/identity-whitelist
261
266
  ```
262
267
 
263
268
  :param str resource_name: The name of the resource.
@@ -318,7 +323,7 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
318
323
  tidying of the identity-whitelist entries.
319
324
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
320
325
  The value should not contain leading or trailing forward slashes.
321
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
326
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
322
327
  *Available only for Vault Enterprise*.
323
328
  :param pulumi.Input[int] safety_buffer: The amount of extra time, in minutes, that must
324
329
  have passed beyond the roletag expiration, before it is removed from the
@@ -357,7 +362,7 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
357
362
  """
358
363
  The namespace to provision the resource in.
359
364
  The value should not contain leading or trailing forward slashes.
360
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
365
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
361
366
  *Available only for Vault Enterprise*.
362
367
  """
363
368
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['AuthBackendLoginArgs', 'AuthBackendLogin']
@@ -41,7 +46,7 @@ class AuthBackendLoginArgs:
41
46
  authenticate with. Can be retrieved from the EC2 metadata server.
42
47
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
43
48
  The value should not contain leading or trailing forward slashes.
44
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
49
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
45
50
  *Available only for Vault Enterprise*.
46
51
  :param pulumi.Input[str] nonce: The unique nonce to be used for login requests. Can be
47
52
  set to a user-specified value, or will contain the server-generated value
@@ -163,7 +168,7 @@ class AuthBackendLoginArgs:
163
168
  """
164
169
  The namespace to provision the resource in.
165
170
  The value should not contain leading or trailing forward slashes.
166
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
171
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
167
172
  *Available only for Vault Enterprise*.
168
173
  """
169
174
  return pulumi.get(self, "namespace")
@@ -243,7 +248,7 @@ class _AuthBackendLoginState:
243
248
  identity: Optional[pulumi.Input[str]] = None,
244
249
  lease_duration: Optional[pulumi.Input[int]] = None,
245
250
  lease_start_time: Optional[pulumi.Input[str]] = None,
246
- metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
251
+ metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
247
252
  namespace: Optional[pulumi.Input[str]] = None,
248
253
  nonce: Optional[pulumi.Input[str]] = None,
249
254
  pkcs7: Optional[pulumi.Input[str]] = None,
@@ -270,12 +275,11 @@ class _AuthBackendLoginState:
270
275
  authenticate with. Can be retrieved from the EC2 metadata server.
271
276
  :param pulumi.Input[int] lease_duration: The duration in seconds the token will be valid, relative
272
277
  to the time in `lease_start_time`.
273
- :param pulumi.Input[str] lease_start_time: Time at which the lease was read, using the clock of the system where Terraform was running
274
- :param pulumi.Input[Mapping[str, Any]] metadata: A map of information returned by the Vault server about the
278
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: A map of information returned by the Vault server about the
275
279
  authentication used to generate this token.
276
280
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
277
281
  The value should not contain leading or trailing forward slashes.
278
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
282
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
279
283
  *Available only for Vault Enterprise*.
280
284
  :param pulumi.Input[str] nonce: The unique nonce to be used for login requests. Can be
281
285
  set to a user-specified value, or will contain the server-generated value
@@ -461,9 +465,6 @@ class _AuthBackendLoginState:
461
465
  @property
462
466
  @pulumi.getter(name="leaseStartTime")
463
467
  def lease_start_time(self) -> Optional[pulumi.Input[str]]:
464
- """
465
- Time at which the lease was read, using the clock of the system where Terraform was running
466
- """
467
468
  return pulumi.get(self, "lease_start_time")
468
469
 
469
470
  @lease_start_time.setter
@@ -472,7 +473,7 @@ class _AuthBackendLoginState:
472
473
 
473
474
  @property
474
475
  @pulumi.getter
475
- def metadata(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
476
+ def metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
476
477
  """
477
478
  A map of information returned by the Vault server about the
478
479
  authentication used to generate this token.
@@ -480,7 +481,7 @@ class _AuthBackendLoginState:
480
481
  return pulumi.get(self, "metadata")
481
482
 
482
483
  @metadata.setter
483
- def metadata(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
484
+ def metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
484
485
  pulumi.set(self, "metadata", value)
485
486
 
486
487
  @property
@@ -489,7 +490,7 @@ class _AuthBackendLoginState:
489
490
  """
490
491
  The namespace to provision the resource in.
491
492
  The value should not contain leading or trailing forward slashes.
492
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
493
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
493
494
  *Available only for Vault Enterprise*.
494
495
  """
495
496
  return pulumi.get(self, "namespace")
@@ -618,7 +619,7 @@ class AuthBackendLogin(pulumi.CustomResource):
618
619
  authenticate with. Can be retrieved from the EC2 metadata server.
619
620
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
620
621
  The value should not contain leading or trailing forward slashes.
621
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
622
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
622
623
  *Available only for Vault Enterprise*.
623
624
  :param pulumi.Input[str] nonce: The unique nonce to be used for login requests. Can be
624
625
  set to a user-specified value, or will contain the server-generated value
@@ -722,7 +723,7 @@ class AuthBackendLogin(pulumi.CustomResource):
722
723
  identity: Optional[pulumi.Input[str]] = None,
723
724
  lease_duration: Optional[pulumi.Input[int]] = None,
724
725
  lease_start_time: Optional[pulumi.Input[str]] = None,
725
- metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
726
+ metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
726
727
  namespace: Optional[pulumi.Input[str]] = None,
727
728
  nonce: Optional[pulumi.Input[str]] = None,
728
729
  pkcs7: Optional[pulumi.Input[str]] = None,
@@ -754,12 +755,11 @@ class AuthBackendLogin(pulumi.CustomResource):
754
755
  authenticate with. Can be retrieved from the EC2 metadata server.
755
756
  :param pulumi.Input[int] lease_duration: The duration in seconds the token will be valid, relative
756
757
  to the time in `lease_start_time`.
757
- :param pulumi.Input[str] lease_start_time: Time at which the lease was read, using the clock of the system where Terraform was running
758
- :param pulumi.Input[Mapping[str, Any]] metadata: A map of information returned by the Vault server about the
758
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: A map of information returned by the Vault server about the
759
759
  authentication used to generate this token.
760
760
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
761
761
  The value should not contain leading or trailing forward slashes.
762
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
762
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
763
763
  *Available only for Vault Enterprise*.
764
764
  :param pulumi.Input[str] nonce: The unique nonce to be used for login requests. Can be
765
765
  set to a user-specified value, or will contain the server-generated value
@@ -891,14 +891,11 @@ class AuthBackendLogin(pulumi.CustomResource):
891
891
  @property
892
892
  @pulumi.getter(name="leaseStartTime")
893
893
  def lease_start_time(self) -> pulumi.Output[str]:
894
- """
895
- Time at which the lease was read, using the clock of the system where Terraform was running
896
- """
897
894
  return pulumi.get(self, "lease_start_time")
898
895
 
899
896
  @property
900
897
  @pulumi.getter
901
- def metadata(self) -> pulumi.Output[Mapping[str, Any]]:
898
+ def metadata(self) -> pulumi.Output[Mapping[str, str]]:
902
899
  """
903
900
  A map of information returned by the Vault server about the
904
901
  authentication used to generate this token.
@@ -911,7 +908,7 @@ class AuthBackendLogin(pulumi.CustomResource):
911
908
  """
912
909
  The namespace to provision the resource in.
913
910
  The value should not contain leading or trailing forward slashes.
914
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
911
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
915
912
  *Available only for Vault Enterprise*.
916
913
  """
917
914
  return pulumi.get(self, "namespace")