pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +22 -7
  5. pulumi_vault/ad/secret_backend.py +14 -144
  6. pulumi_vault/ad/secret_library.py +14 -11
  7. pulumi_vault/ad/secret_role.py +12 -11
  8. pulumi_vault/alicloud/auth_backend_role.py +74 -192
  9. pulumi_vault/approle/auth_backend_login.py +12 -11
  10. pulumi_vault/approle/auth_backend_role.py +75 -193
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
  13. pulumi_vault/audit.py +24 -27
  14. pulumi_vault/audit_request_header.py +11 -6
  15. pulumi_vault/auth_backend.py +64 -12
  16. pulumi_vault/aws/auth_backend_cert.py +12 -7
  17. pulumi_vault/aws/auth_backend_client.py +265 -24
  18. pulumi_vault/aws/auth_backend_config_identity.py +12 -11
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +75 -193
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
  24. pulumi_vault/aws/auth_backend_sts_role.py +12 -11
  25. pulumi_vault/aws/get_access_credentials.py +34 -7
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +75 -7
  28. pulumi_vault/aws/secret_backend_role.py +183 -11
  29. pulumi_vault/aws/secret_backend_static_role.py +14 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +151 -17
  32. pulumi_vault/azure/auth_backend_role.py +75 -193
  33. pulumi_vault/azure/backend.py +223 -29
  34. pulumi_vault/azure/backend_role.py +42 -41
  35. pulumi_vault/azure/get_access_credentials.py +39 -11
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -271
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +22 -25
  44. pulumi_vault/consul/secret_backend_role.py +14 -80
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +117 -114
  48. pulumi_vault/database/secret_backend_role.py +29 -24
  49. pulumi_vault/database/secret_backend_static_role.py +85 -15
  50. pulumi_vault/database/secrets_mount.py +425 -138
  51. pulumi_vault/egp_policy.py +16 -15
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +248 -35
  54. pulumi_vault/gcp/auth_backend_role.py +75 -271
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -9
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -16
  58. pulumi_vault/gcp/secret_impersonated_account.py +74 -17
  59. pulumi_vault/gcp/secret_roleset.py +29 -26
  60. pulumi_vault/gcp/secret_static_account.py +37 -34
  61. pulumi_vault/generic/endpoint.py +22 -21
  62. pulumi_vault/generic/get_secret.py +68 -12
  63. pulumi_vault/generic/secret.py +19 -14
  64. pulumi_vault/get_auth_backend.py +24 -11
  65. pulumi_vault/get_auth_backends.py +33 -11
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -15
  69. pulumi_vault/get_policy_document.py +34 -23
  70. pulumi_vault/get_raft_autopilot_state.py +29 -14
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +17 -16
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +14 -13
  75. pulumi_vault/github/user.py +14 -13
  76. pulumi_vault/identity/entity.py +18 -15
  77. pulumi_vault/identity/entity_alias.py +18 -15
  78. pulumi_vault/identity/entity_policies.py +24 -19
  79. pulumi_vault/identity/get_entity.py +40 -14
  80. pulumi_vault/identity/get_group.py +45 -13
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -11
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -13
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -14
  84. pulumi_vault/identity/group.py +50 -49
  85. pulumi_vault/identity/group_alias.py +14 -11
  86. pulumi_vault/identity/group_member_entity_ids.py +24 -74
  87. pulumi_vault/identity/group_member_group_ids.py +36 -27
  88. pulumi_vault/identity/group_policies.py +16 -15
  89. pulumi_vault/identity/mfa_duo.py +9 -8
  90. pulumi_vault/identity/mfa_login_enforcement.py +13 -8
  91. pulumi_vault/identity/mfa_okta.py +9 -8
  92. pulumi_vault/identity/mfa_pingid.py +5 -4
  93. pulumi_vault/identity/mfa_totp.py +5 -4
  94. pulumi_vault/identity/oidc.py +12 -11
  95. pulumi_vault/identity/oidc_assignment.py +22 -13
  96. pulumi_vault/identity/oidc_client.py +34 -25
  97. pulumi_vault/identity/oidc_key.py +28 -19
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
  99. pulumi_vault/identity/oidc_provider.py +34 -23
  100. pulumi_vault/identity/oidc_role.py +40 -27
  101. pulumi_vault/identity/oidc_scope.py +18 -15
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +39 -46
  105. pulumi_vault/jwt/auth_backend_role.py +131 -260
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +22 -21
  108. pulumi_vault/kmip/secret_role.py +12 -11
  109. pulumi_vault/kmip/secret_scope.py +12 -11
  110. pulumi_vault/kubernetes/auth_backend_config.py +55 -7
  111. pulumi_vault/kubernetes/auth_backend_role.py +68 -179
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -15
  115. pulumi_vault/kubernetes/secret_backend.py +314 -29
  116. pulumi_vault/kubernetes/secret_backend_role.py +135 -56
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +23 -12
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
  120. pulumi_vault/kv/get_secret_v2.py +89 -9
  121. pulumi_vault/kv/get_secrets_list.py +22 -15
  122. pulumi_vault/kv/get_secrets_list_v2.py +35 -19
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +19 -18
  125. pulumi_vault/kv/secret_backend_v2.py +12 -11
  126. pulumi_vault/kv/secret_v2.py +55 -52
  127. pulumi_vault/ldap/auth_backend.py +125 -168
  128. pulumi_vault/ldap/auth_backend_group.py +12 -11
  129. pulumi_vault/ldap/auth_backend_user.py +12 -11
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +352 -84
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +14 -11
  135. pulumi_vault/ldap/secret_backend_static_role.py +67 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +27 -43
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +16 -13
  140. pulumi_vault/mfa_okta.py +16 -13
  141. pulumi_vault/mfa_pingid.py +16 -13
  142. pulumi_vault/mfa_totp.py +22 -19
  143. pulumi_vault/mongodbatlas/secret_backend.py +18 -17
  144. pulumi_vault/mongodbatlas/secret_role.py +41 -38
  145. pulumi_vault/mount.py +389 -65
  146. pulumi_vault/namespace.py +26 -21
  147. pulumi_vault/nomad_secret_backend.py +16 -15
  148. pulumi_vault/nomad_secret_role.py +12 -11
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +483 -41
  151. pulumi_vault/okta/auth_backend_group.py +12 -11
  152. pulumi_vault/okta/auth_backend_user.py +12 -11
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +18 -15
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -13
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -12
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
  174. pulumi_vault/pkisecret/secret_backend_key.py +12 -7
  175. pulumi_vault/pkisecret/secret_backend_role.py +19 -16
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +12 -7
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +58 -8
  185. pulumi_vault/quota_rate_limit.py +54 -4
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +16 -15
  189. pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
  190. pulumi_vault/raft_autopilot.py +12 -11
  191. pulumi_vault/raft_snapshot_agent_config.py +121 -311
  192. pulumi_vault/rgp_policy.py +14 -13
  193. pulumi_vault/saml/auth_backend.py +20 -19
  194. pulumi_vault/saml/auth_backend_role.py +90 -199
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -75
  199. pulumi_vault/secrets/sync_aws_destination.py +240 -29
  200. pulumi_vault/secrets/sync_azure_destination.py +90 -33
  201. pulumi_vault/secrets/sync_config.py +7 -6
  202. pulumi_vault/secrets/sync_gcp_destination.py +156 -27
  203. pulumi_vault/secrets/sync_gh_destination.py +187 -15
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +72 -15
  206. pulumi_vault/ssh/_inputs.py +28 -32
  207. pulumi_vault/ssh/outputs.py +11 -32
  208. pulumi_vault/ssh/secret_backend_ca.py +106 -11
  209. pulumi_vault/ssh/secret_backend_role.py +83 -120
  210. pulumi_vault/terraformcloud/secret_backend.py +5 -56
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -24
  212. pulumi_vault/terraformcloud/secret_role.py +14 -76
  213. pulumi_vault/token.py +26 -25
  214. pulumi_vault/tokenauth/auth_backend_role.py +76 -201
  215. pulumi_vault/transform/alphabet.py +16 -13
  216. pulumi_vault/transform/get_decode.py +45 -21
  217. pulumi_vault/transform/get_encode.py +45 -21
  218. pulumi_vault/transform/role.py +16 -13
  219. pulumi_vault/transform/template.py +30 -25
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -25
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +25 -97
  224. pulumi_vault/transit/secret_cache_config.py +12 -11
  225. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = [
@@ -109,7 +114,7 @@ class GetRaftAutopilotStateResult:
109
114
 
110
115
  @property
111
116
  @pulumi.getter(name="redundancyZones")
112
- def redundancy_zones(self) -> Mapping[str, Any]:
117
+ def redundancy_zones(self) -> Mapping[str, str]:
113
118
  """
114
119
  Additional output related to redundancy zones stored as a serialized map of strings.
115
120
  """
@@ -125,7 +130,7 @@ class GetRaftAutopilotStateResult:
125
130
 
126
131
  @property
127
132
  @pulumi.getter
128
- def servers(self) -> Mapping[str, Any]:
133
+ def servers(self) -> Mapping[str, str]:
129
134
  """
130
135
  Additionaly output related to servers in the cluster stored as a serialized map of strings.
131
136
  """
@@ -141,7 +146,7 @@ class GetRaftAutopilotStateResult:
141
146
 
142
147
  @property
143
148
  @pulumi.getter(name="upgradeInfo")
144
- def upgrade_info(self) -> Mapping[str, Any]:
149
+ def upgrade_info(self) -> Mapping[str, str]:
145
150
  """
146
151
  Additional output related to upgrade information stored as a serialized map of strings.
147
152
  """
@@ -190,7 +195,6 @@ def get_raft_autopilot_state(namespace: Optional[str] = None,
190
195
  """
191
196
  ## Example Usage
192
197
 
193
- <!--Start PulumiCodeChooser -->
194
198
  ```python
195
199
  import pulumi
196
200
  import pulumi_vault as vault
@@ -198,12 +202,11 @@ def get_raft_autopilot_state(namespace: Optional[str] = None,
198
202
  main = vault.get_raft_autopilot_state()
199
203
  pulumi.export("failure-tolerance", main.failure_tolerance)
200
204
  ```
201
- <!--End PulumiCodeChooser -->
202
205
 
203
206
 
204
207
  :param str namespace: The namespace of the target resource.
205
208
  The value should not contain leading or trailing forward slashes.
206
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
209
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
207
210
  *Available only for Vault Enterprise*.
208
211
  """
209
212
  __args__ = dict()
@@ -225,15 +228,11 @@ def get_raft_autopilot_state(namespace: Optional[str] = None,
225
228
  upgrade_info=pulumi.get(__ret__, 'upgrade_info'),
226
229
  upgrade_info_json=pulumi.get(__ret__, 'upgrade_info_json'),
227
230
  voters=pulumi.get(__ret__, 'voters'))
228
-
229
-
230
- @_utilities.lift_output_func(get_raft_autopilot_state)
231
231
  def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
232
- opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetRaftAutopilotStateResult]:
232
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetRaftAutopilotStateResult]:
233
233
  """
234
234
  ## Example Usage
235
235
 
236
- <!--Start PulumiCodeChooser -->
237
236
  ```python
238
237
  import pulumi
239
238
  import pulumi_vault as vault
@@ -241,12 +240,28 @@ def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[st
241
240
  main = vault.get_raft_autopilot_state()
242
241
  pulumi.export("failure-tolerance", main.failure_tolerance)
243
242
  ```
244
- <!--End PulumiCodeChooser -->
245
243
 
246
244
 
247
245
  :param str namespace: The namespace of the target resource.
248
246
  The value should not contain leading or trailing forward slashes.
249
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
247
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
250
248
  *Available only for Vault Enterprise*.
251
249
  """
252
- ...
250
+ __args__ = dict()
251
+ __args__['namespace'] = namespace
252
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
253
+ __ret__ = pulumi.runtime.invoke_output('vault:index/getRaftAutopilotState:getRaftAutopilotState', __args__, opts=opts, typ=GetRaftAutopilotStateResult)
254
+ return __ret__.apply(lambda __response__: GetRaftAutopilotStateResult(
255
+ failure_tolerance=pulumi.get(__response__, 'failure_tolerance'),
256
+ healthy=pulumi.get(__response__, 'healthy'),
257
+ id=pulumi.get(__response__, 'id'),
258
+ leader=pulumi.get(__response__, 'leader'),
259
+ namespace=pulumi.get(__response__, 'namespace'),
260
+ optimistic_failure_tolerance=pulumi.get(__response__, 'optimistic_failure_tolerance'),
261
+ redundancy_zones=pulumi.get(__response__, 'redundancy_zones'),
262
+ redundancy_zones_json=pulumi.get(__response__, 'redundancy_zones_json'),
263
+ servers=pulumi.get(__response__, 'servers'),
264
+ servers_json=pulumi.get(__response__, 'servers_json'),
265
+ upgrade_info=pulumi.get(__response__, 'upgrade_info'),
266
+ upgrade_info_json=pulumi.get(__response__, 'upgrade_info_json'),
267
+ voters=pulumi.get(__response__, 'voters')))
@@ -4,15 +4,70 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
13
18
  'AuthBackendTuneArgs',
19
+ 'AuthBackendTuneArgsDict',
14
20
  ]
15
21
 
22
+ MYPY = False
23
+
24
+ if not MYPY:
25
+ class AuthBackendTuneArgsDict(TypedDict):
26
+ allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
27
+ """
28
+ List of headers to whitelist and allowing
29
+ a plugin to include them in the response.
30
+ """
31
+ audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
32
+ """
33
+ Specifies the list of keys that will
34
+ not be HMAC'd by audit devices in the request data object.
35
+ """
36
+ audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
37
+ """
38
+ Specifies the list of keys that will
39
+ not be HMAC'd by audit devices in the response data object.
40
+ """
41
+ default_lease_ttl: NotRequired[pulumi.Input[str]]
42
+ """
43
+ Specifies the default time-to-live.
44
+ If set, this overrides the global default.
45
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
46
+ """
47
+ listing_visibility: NotRequired[pulumi.Input[str]]
48
+ """
49
+ Specifies whether to show this mount in
50
+ the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
51
+ """
52
+ max_lease_ttl: NotRequired[pulumi.Input[str]]
53
+ """
54
+ Specifies the maximum time-to-live.
55
+ If set, this overrides the global default.
56
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
57
+ """
58
+ passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
59
+ """
60
+ List of headers to whitelist and
61
+ pass from the request to the backend.
62
+ """
63
+ token_type: NotRequired[pulumi.Input[str]]
64
+ """
65
+ Specifies the type of tokens that should be returned by
66
+ the mount. Valid values are "default-service", "default-batch", "service", "batch".
67
+ """
68
+ elif False:
69
+ AuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any]
70
+
16
71
  @pulumi.input_type
17
72
  class AuthBackendTuneArgs:
18
73
  def __init__(__self__, *,
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
  from . import outputs
12
17
  from ._inputs import *
@@ -44,7 +49,7 @@ class AuthBackendArgs:
44
49
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
45
50
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
46
51
  The value should not contain leading or trailing forward slashes.
47
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
52
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
48
53
  *Available only for Vault Enterprise*.
49
54
  :param pulumi.Input[int] organization_id: The ID of the organization users must be part of.
50
55
  Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
@@ -168,7 +173,7 @@ class AuthBackendArgs:
168
173
  """
169
174
  The namespace to provision the resource in.
170
175
  The value should not contain leading or trailing forward slashes.
171
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
176
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
172
177
  *Available only for Vault Enterprise*.
173
178
  """
174
179
  return pulumi.get(self, "namespace")
@@ -372,7 +377,7 @@ class _AuthBackendState:
372
377
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
373
378
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
374
379
  The value should not contain leading or trailing forward slashes.
375
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
380
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
376
381
  *Available only for Vault Enterprise*.
377
382
  :param pulumi.Input[str] organization: The organization configured users must be part of.
378
383
  :param pulumi.Input[int] organization_id: The ID of the organization users must be part of.
@@ -500,7 +505,7 @@ class _AuthBackendState:
500
505
  """
501
506
  The namespace to provision the resource in.
502
507
  The value should not contain leading or trailing forward slashes.
503
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
508
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
504
509
  *Available only for Vault Enterprise*.
505
510
  """
506
511
  return pulumi.get(self, "namespace")
@@ -705,7 +710,7 @@ class AuthBackend(pulumi.CustomResource):
705
710
  token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
706
711
  token_ttl: Optional[pulumi.Input[int]] = None,
707
712
  token_type: Optional[pulumi.Input[str]] = None,
708
- tune: Optional[pulumi.Input[pulumi.InputType['AuthBackendTuneArgs']]] = None,
713
+ tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
709
714
  __props__=None):
710
715
  """
711
716
  Manages a GitHub Auth mount in a Vault server. See the [Vault
@@ -714,14 +719,12 @@ class AuthBackend(pulumi.CustomResource):
714
719
 
715
720
  ## Example Usage
716
721
 
717
- <!--Start PulumiCodeChooser -->
718
722
  ```python
719
723
  import pulumi
720
724
  import pulumi_vault as vault
721
725
 
722
726
  example = vault.github.AuthBackend("example", organization="myorg")
723
727
  ```
724
- <!--End PulumiCodeChooser -->
725
728
 
726
729
  ## Import
727
730
 
@@ -741,7 +744,7 @@ class AuthBackend(pulumi.CustomResource):
741
744
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
742
745
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
743
746
  The value should not contain leading or trailing forward slashes.
744
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
747
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
745
748
  *Available only for Vault Enterprise*.
746
749
  :param pulumi.Input[str] organization: The organization configured users must be part of.
747
750
  :param pulumi.Input[int] organization_id: The ID of the organization users must be part of.
@@ -771,7 +774,7 @@ class AuthBackend(pulumi.CustomResource):
771
774
  Its current value will be referenced at renewal time.
772
775
  :param pulumi.Input[str] token_type: Specifies the type of tokens that should be returned by
773
776
  the mount. Valid values are "default-service", "default-batch", "service", "batch".
774
- :param pulumi.Input[pulumi.InputType['AuthBackendTuneArgs']] tune: Extra configuration block. Structure is documented below.
777
+ :param pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']] tune: Extra configuration block. Structure is documented below.
775
778
 
776
779
  The `tune` block is used to tune the auth backend:
777
780
  """
@@ -788,14 +791,12 @@ class AuthBackend(pulumi.CustomResource):
788
791
 
789
792
  ## Example Usage
790
793
 
791
- <!--Start PulumiCodeChooser -->
792
794
  ```python
793
795
  import pulumi
794
796
  import pulumi_vault as vault
795
797
 
796
798
  example = vault.github.AuthBackend("example", organization="myorg")
797
799
  ```
798
- <!--End PulumiCodeChooser -->
799
800
 
800
801
  ## Import
801
802
 
@@ -836,7 +837,7 @@ class AuthBackend(pulumi.CustomResource):
836
837
  token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
837
838
  token_ttl: Optional[pulumi.Input[int]] = None,
838
839
  token_type: Optional[pulumi.Input[str]] = None,
839
- tune: Optional[pulumi.Input[pulumi.InputType['AuthBackendTuneArgs']]] = None,
840
+ tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
840
841
  __props__=None):
841
842
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
842
843
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -893,7 +894,7 @@ class AuthBackend(pulumi.CustomResource):
893
894
  token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
894
895
  token_ttl: Optional[pulumi.Input[int]] = None,
895
896
  token_type: Optional[pulumi.Input[str]] = None,
896
- tune: Optional[pulumi.Input[pulumi.InputType['AuthBackendTuneArgs']]] = None) -> 'AuthBackend':
897
+ tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None) -> 'AuthBackend':
897
898
  """
898
899
  Get an existing AuthBackend resource's state with the given name, id, and optional extra
899
900
  properties used to qualify the lookup.
@@ -910,7 +911,7 @@ class AuthBackend(pulumi.CustomResource):
910
911
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
911
912
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
912
913
  The value should not contain leading or trailing forward slashes.
913
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
914
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
914
915
  *Available only for Vault Enterprise*.
915
916
  :param pulumi.Input[str] organization: The organization configured users must be part of.
916
917
  :param pulumi.Input[int] organization_id: The ID of the organization users must be part of.
@@ -940,7 +941,7 @@ class AuthBackend(pulumi.CustomResource):
940
941
  Its current value will be referenced at renewal time.
941
942
  :param pulumi.Input[str] token_type: Specifies the type of tokens that should be returned by
942
943
  the mount. Valid values are "default-service", "default-batch", "service", "batch".
943
- :param pulumi.Input[pulumi.InputType['AuthBackendTuneArgs']] tune: Extra configuration block. Structure is documented below.
944
+ :param pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']] tune: Extra configuration block. Structure is documented below.
944
945
 
945
946
  The `tune` block is used to tune the auth backend:
946
947
  """
@@ -1009,7 +1010,7 @@ class AuthBackend(pulumi.CustomResource):
1009
1010
  """
1010
1011
  The namespace to provision the resource in.
1011
1012
  The value should not contain leading or trailing forward slashes.
1012
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1013
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1013
1014
  *Available only for Vault Enterprise*.
1014
1015
  """
1015
1016
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['TeamArgs', 'Team']
@@ -25,7 +30,7 @@ class TeamArgs:
25
30
  if not specified.
26
31
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
27
32
  The value should not contain leading or trailing forward slashes.
28
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
33
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
29
34
  *Available only for Vault Enterprise*.
30
35
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: An array of strings specifying the policies to be set on tokens
31
36
  issued using this role.
@@ -69,7 +74,7 @@ class TeamArgs:
69
74
  """
70
75
  The namespace to provision the resource in.
71
76
  The value should not contain leading or trailing forward slashes.
72
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
77
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
73
78
  *Available only for Vault Enterprise*.
74
79
  """
75
80
  return pulumi.get(self, "namespace")
@@ -105,7 +110,7 @@ class _TeamState:
105
110
  if not specified.
106
111
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
107
112
  The value should not contain leading or trailing forward slashes.
108
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
113
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
109
114
  *Available only for Vault Enterprise*.
110
115
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: An array of strings specifying the policies to be set on tokens
111
116
  issued using this role.
@@ -139,7 +144,7 @@ class _TeamState:
139
144
  """
140
145
  The namespace to provision the resource in.
141
146
  The value should not contain leading or trailing forward slashes.
142
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
147
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
143
148
  *Available only for Vault Enterprise*.
144
149
  """
145
150
  return pulumi.get(self, "namespace")
@@ -191,13 +196,12 @@ class Team(pulumi.CustomResource):
191
196
 
192
197
  ## Example Usage
193
198
 
194
- <!--Start PulumiCodeChooser -->
195
199
  ```python
196
200
  import pulumi
197
201
  import pulumi_vault as vault
198
202
 
199
203
  example = vault.github.AuthBackend("example", organization="myorg")
200
- tf_devs = vault.github.Team("tfDevs",
204
+ tf_devs = vault.github.Team("tf_devs",
201
205
  backend=example.id,
202
206
  team="terraform-developers",
203
207
  policies=[
@@ -205,7 +209,6 @@ class Team(pulumi.CustomResource):
205
209
  "read-only",
206
210
  ])
207
211
  ```
208
- <!--End PulumiCodeChooser -->
209
212
 
210
213
  ## Import
211
214
 
@@ -221,7 +224,7 @@ class Team(pulumi.CustomResource):
221
224
  if not specified.
222
225
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
223
226
  The value should not contain leading or trailing forward slashes.
224
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
227
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
225
228
  *Available only for Vault Enterprise*.
226
229
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: An array of strings specifying the policies to be set on tokens
227
230
  issued using this role.
@@ -240,13 +243,12 @@ class Team(pulumi.CustomResource):
240
243
 
241
244
  ## Example Usage
242
245
 
243
- <!--Start PulumiCodeChooser -->
244
246
  ```python
245
247
  import pulumi
246
248
  import pulumi_vault as vault
247
249
 
248
250
  example = vault.github.AuthBackend("example", organization="myorg")
249
- tf_devs = vault.github.Team("tfDevs",
251
+ tf_devs = vault.github.Team("tf_devs",
250
252
  backend=example.id,
251
253
  team="terraform-developers",
252
254
  policies=[
@@ -254,7 +256,6 @@ class Team(pulumi.CustomResource):
254
256
  "read-only",
255
257
  ])
256
258
  ```
257
- <!--End PulumiCodeChooser -->
258
259
 
259
260
  ## Import
260
261
 
@@ -323,7 +324,7 @@ class Team(pulumi.CustomResource):
323
324
  if not specified.
324
325
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
325
326
  The value should not contain leading or trailing forward slashes.
326
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
327
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
327
328
  *Available only for Vault Enterprise*.
328
329
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: An array of strings specifying the policies to be set on tokens
329
330
  issued using this role.
@@ -354,7 +355,7 @@ class Team(pulumi.CustomResource):
354
355
  """
355
356
  The namespace to provision the resource in.
356
357
  The value should not contain leading or trailing forward slashes.
357
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
358
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
358
359
  *Available only for Vault Enterprise*.
359
360
  """
360
361
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['UserArgs', 'User']
@@ -25,7 +30,7 @@ class UserArgs:
25
30
  if not specified.
26
31
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
27
32
  The value should not contain leading or trailing forward slashes.
28
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
33
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
29
34
  *Available only for Vault Enterprise*.
30
35
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: An array of strings specifying the policies to be set on tokens issued
31
36
  using this role.
@@ -69,7 +74,7 @@ class UserArgs:
69
74
  """
70
75
  The namespace to provision the resource in.
71
76
  The value should not contain leading or trailing forward slashes.
72
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
77
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
73
78
  *Available only for Vault Enterprise*.
74
79
  """
75
80
  return pulumi.get(self, "namespace")
@@ -105,7 +110,7 @@ class _UserState:
105
110
  if not specified.
106
111
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
107
112
  The value should not contain leading or trailing forward slashes.
108
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
113
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
109
114
  *Available only for Vault Enterprise*.
110
115
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: An array of strings specifying the policies to be set on tokens issued
111
116
  using this role.
@@ -139,7 +144,7 @@ class _UserState:
139
144
  """
140
145
  The namespace to provision the resource in.
141
146
  The value should not contain leading or trailing forward slashes.
142
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
147
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
143
148
  *Available only for Vault Enterprise*.
144
149
  """
145
150
  return pulumi.get(self, "namespace")
@@ -191,13 +196,12 @@ class User(pulumi.CustomResource):
191
196
 
192
197
  ## Example Usage
193
198
 
194
- <!--Start PulumiCodeChooser -->
195
199
  ```python
196
200
  import pulumi
197
201
  import pulumi_vault as vault
198
202
 
199
203
  example = vault.github.AuthBackend("example", organization="myorg")
200
- tf_user = vault.github.User("tfUser",
204
+ tf_user = vault.github.User("tf_user",
201
205
  backend=example.id,
202
206
  user="john.doe",
203
207
  policies=[
@@ -205,7 +209,6 @@ class User(pulumi.CustomResource):
205
209
  "read-only",
206
210
  ])
207
211
  ```
208
- <!--End PulumiCodeChooser -->
209
212
 
210
213
  ## Import
211
214
 
@@ -221,7 +224,7 @@ class User(pulumi.CustomResource):
221
224
  if not specified.
222
225
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
223
226
  The value should not contain leading or trailing forward slashes.
224
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
227
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
225
228
  *Available only for Vault Enterprise*.
226
229
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: An array of strings specifying the policies to be set on tokens issued
227
230
  using this role.
@@ -240,13 +243,12 @@ class User(pulumi.CustomResource):
240
243
 
241
244
  ## Example Usage
242
245
 
243
- <!--Start PulumiCodeChooser -->
244
246
  ```python
245
247
  import pulumi
246
248
  import pulumi_vault as vault
247
249
 
248
250
  example = vault.github.AuthBackend("example", organization="myorg")
249
- tf_user = vault.github.User("tfUser",
251
+ tf_user = vault.github.User("tf_user",
250
252
  backend=example.id,
251
253
  user="john.doe",
252
254
  policies=[
@@ -254,7 +256,6 @@ class User(pulumi.CustomResource):
254
256
  "read-only",
255
257
  ])
256
258
  ```
257
- <!--End PulumiCodeChooser -->
258
259
 
259
260
  ## Import
260
261
 
@@ -323,7 +324,7 @@ class User(pulumi.CustomResource):
323
324
  if not specified.
324
325
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
325
326
  The value should not contain leading or trailing forward slashes.
326
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
327
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
327
328
  *Available only for Vault Enterprise*.
328
329
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: An array of strings specifying the policies to be set on tokens issued
329
330
  using this role.
@@ -354,7 +355,7 @@ class User(pulumi.CustomResource):
354
355
  """
355
356
  The namespace to provision the resource in.
356
357
  The value should not contain leading or trailing forward slashes.
357
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
358
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
358
359
  *Available only for Vault Enterprise*.
359
360
  """
360
361
  return pulumi.get(self, "namespace")