pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736850018__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +22 -7
  5. pulumi_vault/ad/secret_backend.py +14 -144
  6. pulumi_vault/ad/secret_library.py +14 -11
  7. pulumi_vault/ad/secret_role.py +12 -11
  8. pulumi_vault/alicloud/auth_backend_role.py +74 -192
  9. pulumi_vault/approle/auth_backend_login.py +12 -11
  10. pulumi_vault/approle/auth_backend_role.py +75 -193
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
  13. pulumi_vault/audit.py +24 -27
  14. pulumi_vault/audit_request_header.py +11 -6
  15. pulumi_vault/auth_backend.py +64 -12
  16. pulumi_vault/aws/auth_backend_cert.py +12 -7
  17. pulumi_vault/aws/auth_backend_client.py +265 -24
  18. pulumi_vault/aws/auth_backend_config_identity.py +12 -11
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +75 -193
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
  24. pulumi_vault/aws/auth_backend_sts_role.py +12 -11
  25. pulumi_vault/aws/get_access_credentials.py +34 -7
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +75 -7
  28. pulumi_vault/aws/secret_backend_role.py +183 -11
  29. pulumi_vault/aws/secret_backend_static_role.py +14 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +151 -17
  32. pulumi_vault/azure/auth_backend_role.py +75 -193
  33. pulumi_vault/azure/backend.py +223 -29
  34. pulumi_vault/azure/backend_role.py +42 -41
  35. pulumi_vault/azure/get_access_credentials.py +39 -11
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -271
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +22 -25
  44. pulumi_vault/consul/secret_backend_role.py +14 -80
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +117 -114
  48. pulumi_vault/database/secret_backend_role.py +29 -24
  49. pulumi_vault/database/secret_backend_static_role.py +85 -15
  50. pulumi_vault/database/secrets_mount.py +425 -138
  51. pulumi_vault/egp_policy.py +16 -15
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +248 -35
  54. pulumi_vault/gcp/auth_backend_role.py +75 -271
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -9
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -16
  58. pulumi_vault/gcp/secret_impersonated_account.py +74 -17
  59. pulumi_vault/gcp/secret_roleset.py +29 -26
  60. pulumi_vault/gcp/secret_static_account.py +37 -34
  61. pulumi_vault/generic/endpoint.py +22 -21
  62. pulumi_vault/generic/get_secret.py +68 -12
  63. pulumi_vault/generic/secret.py +19 -14
  64. pulumi_vault/get_auth_backend.py +24 -11
  65. pulumi_vault/get_auth_backends.py +33 -11
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -15
  69. pulumi_vault/get_policy_document.py +34 -23
  70. pulumi_vault/get_raft_autopilot_state.py +29 -14
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +17 -16
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +14 -13
  75. pulumi_vault/github/user.py +14 -13
  76. pulumi_vault/identity/entity.py +18 -15
  77. pulumi_vault/identity/entity_alias.py +18 -15
  78. pulumi_vault/identity/entity_policies.py +24 -19
  79. pulumi_vault/identity/get_entity.py +40 -14
  80. pulumi_vault/identity/get_group.py +45 -13
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -11
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -13
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -14
  84. pulumi_vault/identity/group.py +50 -49
  85. pulumi_vault/identity/group_alias.py +14 -11
  86. pulumi_vault/identity/group_member_entity_ids.py +24 -74
  87. pulumi_vault/identity/group_member_group_ids.py +36 -27
  88. pulumi_vault/identity/group_policies.py +16 -15
  89. pulumi_vault/identity/mfa_duo.py +9 -8
  90. pulumi_vault/identity/mfa_login_enforcement.py +13 -8
  91. pulumi_vault/identity/mfa_okta.py +9 -8
  92. pulumi_vault/identity/mfa_pingid.py +5 -4
  93. pulumi_vault/identity/mfa_totp.py +5 -4
  94. pulumi_vault/identity/oidc.py +12 -11
  95. pulumi_vault/identity/oidc_assignment.py +22 -13
  96. pulumi_vault/identity/oidc_client.py +34 -25
  97. pulumi_vault/identity/oidc_key.py +28 -19
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
  99. pulumi_vault/identity/oidc_provider.py +34 -23
  100. pulumi_vault/identity/oidc_role.py +40 -27
  101. pulumi_vault/identity/oidc_scope.py +18 -15
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +39 -46
  105. pulumi_vault/jwt/auth_backend_role.py +131 -260
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +22 -21
  108. pulumi_vault/kmip/secret_role.py +12 -11
  109. pulumi_vault/kmip/secret_scope.py +12 -11
  110. pulumi_vault/kubernetes/auth_backend_config.py +55 -7
  111. pulumi_vault/kubernetes/auth_backend_role.py +68 -179
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -15
  115. pulumi_vault/kubernetes/secret_backend.py +314 -29
  116. pulumi_vault/kubernetes/secret_backend_role.py +135 -56
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +23 -12
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
  120. pulumi_vault/kv/get_secret_v2.py +89 -9
  121. pulumi_vault/kv/get_secrets_list.py +22 -15
  122. pulumi_vault/kv/get_secrets_list_v2.py +35 -19
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +19 -18
  125. pulumi_vault/kv/secret_backend_v2.py +12 -11
  126. pulumi_vault/kv/secret_v2.py +55 -52
  127. pulumi_vault/ldap/auth_backend.py +125 -168
  128. pulumi_vault/ldap/auth_backend_group.py +12 -11
  129. pulumi_vault/ldap/auth_backend_user.py +12 -11
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +352 -84
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +14 -11
  135. pulumi_vault/ldap/secret_backend_static_role.py +67 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +27 -43
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +16 -13
  140. pulumi_vault/mfa_okta.py +16 -13
  141. pulumi_vault/mfa_pingid.py +16 -13
  142. pulumi_vault/mfa_totp.py +22 -19
  143. pulumi_vault/mongodbatlas/secret_backend.py +18 -17
  144. pulumi_vault/mongodbatlas/secret_role.py +41 -38
  145. pulumi_vault/mount.py +389 -65
  146. pulumi_vault/namespace.py +26 -21
  147. pulumi_vault/nomad_secret_backend.py +16 -15
  148. pulumi_vault/nomad_secret_role.py +12 -11
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +483 -41
  151. pulumi_vault/okta/auth_backend_group.py +12 -11
  152. pulumi_vault/okta/auth_backend_user.py +12 -11
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +18 -15
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -13
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -12
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
  174. pulumi_vault/pkisecret/secret_backend_key.py +12 -7
  175. pulumi_vault/pkisecret/secret_backend_role.py +19 -16
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +12 -7
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +58 -8
  185. pulumi_vault/quota_rate_limit.py +54 -4
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +16 -15
  189. pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
  190. pulumi_vault/raft_autopilot.py +12 -11
  191. pulumi_vault/raft_snapshot_agent_config.py +121 -311
  192. pulumi_vault/rgp_policy.py +14 -13
  193. pulumi_vault/saml/auth_backend.py +20 -19
  194. pulumi_vault/saml/auth_backend_role.py +90 -199
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -75
  199. pulumi_vault/secrets/sync_aws_destination.py +240 -29
  200. pulumi_vault/secrets/sync_azure_destination.py +90 -33
  201. pulumi_vault/secrets/sync_config.py +7 -6
  202. pulumi_vault/secrets/sync_gcp_destination.py +156 -27
  203. pulumi_vault/secrets/sync_gh_destination.py +187 -15
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +72 -15
  206. pulumi_vault/ssh/_inputs.py +28 -32
  207. pulumi_vault/ssh/outputs.py +11 -32
  208. pulumi_vault/ssh/secret_backend_ca.py +106 -11
  209. pulumi_vault/ssh/secret_backend_role.py +83 -120
  210. pulumi_vault/terraformcloud/secret_backend.py +5 -56
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -24
  212. pulumi_vault/terraformcloud/secret_role.py +14 -76
  213. pulumi_vault/token.py +26 -25
  214. pulumi_vault/tokenauth/auth_backend_role.py +76 -201
  215. pulumi_vault/transform/alphabet.py +16 -13
  216. pulumi_vault/transform/get_decode.py +45 -21
  217. pulumi_vault/transform/get_encode.py +45 -21
  218. pulumi_vault/transform/role.py +16 -13
  219. pulumi_vault/transform/template.py +30 -25
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -25
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +25 -97
  224. pulumi_vault/transit/secret_cache_config.py +12 -11
  225. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736850018.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
  from . import outputs
12
17
  from ._inputs import *
@@ -30,7 +35,7 @@ class SecretBackendRoleArgs:
30
35
  Must be unique within the backend.
31
36
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
32
37
  The value should not contain leading or trailing forward slashes.
33
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
38
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
34
39
  *Available only for Vault Enterprise*.
35
40
  :param pulumi.Input[str] tags: Specifies a comma-separated RabbitMQ management tags.
36
41
  :param pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicArgs']]] vhost_topics: Specifies a map of virtual hosts and exchanges to topic permissions. This option requires RabbitMQ 3.7.0 or later.
@@ -80,7 +85,7 @@ class SecretBackendRoleArgs:
80
85
  """
81
86
  The namespace to provision the resource in.
82
87
  The value should not contain leading or trailing forward slashes.
83
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
88
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
84
89
  *Available only for Vault Enterprise*.
85
90
  """
86
91
  return pulumi.get(self, "namespace")
@@ -143,7 +148,7 @@ class _SecretBackendRoleState:
143
148
  Must be unique within the backend.
144
149
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
145
150
  The value should not contain leading or trailing forward slashes.
146
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
151
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
147
152
  *Available only for Vault Enterprise*.
148
153
  :param pulumi.Input[str] tags: Specifies a comma-separated RabbitMQ management tags.
149
154
  :param pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicArgs']]] vhost_topics: Specifies a map of virtual hosts and exchanges to topic permissions. This option requires RabbitMQ 3.7.0 or later.
@@ -194,7 +199,7 @@ class _SecretBackendRoleState:
194
199
  """
195
200
  The namespace to provision the resource in.
196
201
  The value should not contain leading or trailing forward slashes.
197
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
202
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
198
203
  *Available only for Vault Enterprise*.
199
204
  """
200
205
  return pulumi.get(self, "namespace")
@@ -249,13 +254,12 @@ class SecretBackendRole(pulumi.CustomResource):
249
254
  name: Optional[pulumi.Input[str]] = None,
250
255
  namespace: Optional[pulumi.Input[str]] = None,
251
256
  tags: Optional[pulumi.Input[str]] = None,
252
- vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRoleVhostTopicArgs']]]]] = None,
253
- vhosts: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRoleVhostArgs']]]]] = None,
257
+ vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]]] = None,
258
+ vhosts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]]] = None,
254
259
  __props__=None):
255
260
  """
256
261
  ## Example Usage
257
262
 
258
- <!--Start PulumiCodeChooser -->
259
263
  ```python
260
264
  import pulumi
261
265
  import pulumi_vault as vault
@@ -266,23 +270,23 @@ class SecretBackendRole(pulumi.CustomResource):
266
270
  password="password")
267
271
  role = vault.rabbit_mq.SecretBackendRole("role",
268
272
  backend=rabbitmq.path,
273
+ name="deploy",
269
274
  tags="tag1,tag2",
270
- vhosts=[vault.rabbit_mq.SecretBackendRoleVhostArgs(
271
- host="/",
272
- configure="",
273
- read=".*",
274
- write="",
275
- )],
276
- vhost_topics=[vault.rabbit_mq.SecretBackendRoleVhostTopicArgs(
277
- vhosts=[vault.rabbit_mq.SecretBackendRoleVhostTopicVhostArgs(
278
- topic="amq.topic",
279
- read=".*",
280
- write="",
281
- )],
282
- host="/",
283
- )])
275
+ vhosts=[{
276
+ "host": "/",
277
+ "configure": "",
278
+ "read": ".*",
279
+ "write": "",
280
+ }],
281
+ vhost_topics=[{
282
+ "vhosts": [{
283
+ "topic": "amq.topic",
284
+ "read": ".*",
285
+ "write": "",
286
+ }],
287
+ "host": "/",
288
+ }])
284
289
  ```
285
- <!--End PulumiCodeChooser -->
286
290
 
287
291
  ## Import
288
292
 
@@ -300,11 +304,11 @@ class SecretBackendRole(pulumi.CustomResource):
300
304
  Must be unique within the backend.
301
305
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
302
306
  The value should not contain leading or trailing forward slashes.
303
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
307
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
304
308
  *Available only for Vault Enterprise*.
305
309
  :param pulumi.Input[str] tags: Specifies a comma-separated RabbitMQ management tags.
306
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRoleVhostTopicArgs']]]] vhost_topics: Specifies a map of virtual hosts and exchanges to topic permissions. This option requires RabbitMQ 3.7.0 or later.
307
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRoleVhostArgs']]]] vhosts: Specifies a map of virtual hosts to permissions.
310
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]] vhost_topics: Specifies a map of virtual hosts and exchanges to topic permissions. This option requires RabbitMQ 3.7.0 or later.
311
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]] vhosts: Specifies a map of virtual hosts to permissions.
308
312
  """
309
313
  ...
310
314
  @overload
@@ -315,7 +319,6 @@ class SecretBackendRole(pulumi.CustomResource):
315
319
  """
316
320
  ## Example Usage
317
321
 
318
- <!--Start PulumiCodeChooser -->
319
322
  ```python
320
323
  import pulumi
321
324
  import pulumi_vault as vault
@@ -326,23 +329,23 @@ class SecretBackendRole(pulumi.CustomResource):
326
329
  password="password")
327
330
  role = vault.rabbit_mq.SecretBackendRole("role",
328
331
  backend=rabbitmq.path,
332
+ name="deploy",
329
333
  tags="tag1,tag2",
330
- vhosts=[vault.rabbit_mq.SecretBackendRoleVhostArgs(
331
- host="/",
332
- configure="",
333
- read=".*",
334
- write="",
335
- )],
336
- vhost_topics=[vault.rabbit_mq.SecretBackendRoleVhostTopicArgs(
337
- vhosts=[vault.rabbit_mq.SecretBackendRoleVhostTopicVhostArgs(
338
- topic="amq.topic",
339
- read=".*",
340
- write="",
341
- )],
342
- host="/",
343
- )])
334
+ vhosts=[{
335
+ "host": "/",
336
+ "configure": "",
337
+ "read": ".*",
338
+ "write": "",
339
+ }],
340
+ vhost_topics=[{
341
+ "vhosts": [{
342
+ "topic": "amq.topic",
343
+ "read": ".*",
344
+ "write": "",
345
+ }],
346
+ "host": "/",
347
+ }])
344
348
  ```
345
- <!--End PulumiCodeChooser -->
346
349
 
347
350
  ## Import
348
351
 
@@ -371,8 +374,8 @@ class SecretBackendRole(pulumi.CustomResource):
371
374
  name: Optional[pulumi.Input[str]] = None,
372
375
  namespace: Optional[pulumi.Input[str]] = None,
373
376
  tags: Optional[pulumi.Input[str]] = None,
374
- vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRoleVhostTopicArgs']]]]] = None,
375
- vhosts: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRoleVhostArgs']]]]] = None,
377
+ vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]]] = None,
378
+ vhosts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]]] = None,
376
379
  __props__=None):
377
380
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
378
381
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -404,8 +407,8 @@ class SecretBackendRole(pulumi.CustomResource):
404
407
  name: Optional[pulumi.Input[str]] = None,
405
408
  namespace: Optional[pulumi.Input[str]] = None,
406
409
  tags: Optional[pulumi.Input[str]] = None,
407
- vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRoleVhostTopicArgs']]]]] = None,
408
- vhosts: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRoleVhostArgs']]]]] = None) -> 'SecretBackendRole':
410
+ vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]]] = None,
411
+ vhosts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]]] = None) -> 'SecretBackendRole':
409
412
  """
410
413
  Get an existing SecretBackendRole resource's state with the given name, id, and optional extra
411
414
  properties used to qualify the lookup.
@@ -419,11 +422,11 @@ class SecretBackendRole(pulumi.CustomResource):
419
422
  Must be unique within the backend.
420
423
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
421
424
  The value should not contain leading or trailing forward slashes.
422
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
425
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
423
426
  *Available only for Vault Enterprise*.
424
427
  :param pulumi.Input[str] tags: Specifies a comma-separated RabbitMQ management tags.
425
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRoleVhostTopicArgs']]]] vhost_topics: Specifies a map of virtual hosts and exchanges to topic permissions. This option requires RabbitMQ 3.7.0 or later.
426
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRoleVhostArgs']]]] vhosts: Specifies a map of virtual hosts to permissions.
428
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]] vhost_topics: Specifies a map of virtual hosts and exchanges to topic permissions. This option requires RabbitMQ 3.7.0 or later.
429
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]] vhosts: Specifies a map of virtual hosts to permissions.
427
430
  """
428
431
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
429
432
 
@@ -461,7 +464,7 @@ class SecretBackendRole(pulumi.CustomResource):
461
464
  """
462
465
  The namespace to provision the resource in.
463
466
  The value should not contain leading or trailing forward slashes.
464
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
467
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
465
468
  *Available only for Vault Enterprise*.
466
469
  """
467
470
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['RaftAutopilotArgs', 'RaftAutopilot']
@@ -39,7 +44,7 @@ class RaftAutopilotArgs:
39
44
  voting nodes.
40
45
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
41
46
  The value should not contain leading or trailing forward slashes.
42
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
47
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
43
48
  *Available only for Vault Enterprise*.
44
49
  :param pulumi.Input[str] server_stabilization_time: Minimum amount of time a server must be
45
50
  stable in the 'healthy' state before being added to the cluster.
@@ -146,7 +151,7 @@ class RaftAutopilotArgs:
146
151
  """
147
152
  The namespace to provision the resource in.
148
153
  The value should not contain leading or trailing forward slashes.
149
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
154
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
150
155
  *Available only for Vault Enterprise*.
151
156
  """
152
157
  return pulumi.get(self, "namespace")
@@ -197,7 +202,7 @@ class _RaftAutopilotState:
197
202
  voting nodes.
198
203
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
199
204
  The value should not contain leading or trailing forward slashes.
200
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
205
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
201
206
  *Available only for Vault Enterprise*.
202
207
  :param pulumi.Input[str] server_stabilization_time: Minimum amount of time a server must be
203
208
  stable in the 'healthy' state before being added to the cluster.
@@ -304,7 +309,7 @@ class _RaftAutopilotState:
304
309
  """
305
310
  The namespace to provision the resource in.
306
311
  The value should not contain leading or trailing forward slashes.
307
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
312
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
308
313
  *Available only for Vault Enterprise*.
309
314
  """
310
315
  return pulumi.get(self, "namespace")
@@ -349,7 +354,6 @@ class RaftAutopilot(pulumi.CustomResource):
349
354
 
350
355
  ## Example Usage
351
356
 
352
- <!--Start PulumiCodeChooser -->
353
357
  ```python
354
358
  import pulumi
355
359
  import pulumi_vault as vault
@@ -362,7 +366,6 @@ class RaftAutopilot(pulumi.CustomResource):
362
366
  min_quorum=3,
363
367
  server_stabilization_time="10s")
364
368
  ```
365
- <!--End PulumiCodeChooser -->
366
369
 
367
370
  ## Import
368
371
 
@@ -389,7 +392,7 @@ class RaftAutopilot(pulumi.CustomResource):
389
392
  voting nodes.
390
393
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
391
394
  The value should not contain leading or trailing forward slashes.
392
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
395
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
393
396
  *Available only for Vault Enterprise*.
394
397
  :param pulumi.Input[str] server_stabilization_time: Minimum amount of time a server must be
395
398
  stable in the 'healthy' state before being added to the cluster.
@@ -408,7 +411,6 @@ class RaftAutopilot(pulumi.CustomResource):
408
411
 
409
412
  ## Example Usage
410
413
 
411
- <!--Start PulumiCodeChooser -->
412
414
  ```python
413
415
  import pulumi
414
416
  import pulumi_vault as vault
@@ -421,7 +423,6 @@ class RaftAutopilot(pulumi.CustomResource):
421
423
  min_quorum=3,
422
424
  server_stabilization_time="10s")
423
425
  ```
424
- <!--End PulumiCodeChooser -->
425
426
 
426
427
  ## Import
427
428
 
@@ -511,7 +512,7 @@ class RaftAutopilot(pulumi.CustomResource):
511
512
  voting nodes.
512
513
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
513
514
  The value should not contain leading or trailing forward slashes.
514
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
515
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
515
516
  *Available only for Vault Enterprise*.
516
517
  :param pulumi.Input[str] server_stabilization_time: Minimum amount of time a server must be
517
518
  stable in the 'healthy' state before being added to the cluster.
@@ -591,7 +592,7 @@ class RaftAutopilot(pulumi.CustomResource):
591
592
  """
592
593
  The namespace to provision the resource in.
593
594
  The value should not contain leading or trailing forward slashes.
594
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
595
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
595
596
  *Available only for Vault Enterprise*.
596
597
  """
597
598
  return pulumi.get(self, "namespace")