pulumi-vault 6.3.0a1723010642__py3-none-any.whl → 6.3.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +560 -0
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +19 -4
  4. pulumi_vault/ad/secret_backend.py +5 -0
  5. pulumi_vault/ad/secret_library.py +5 -0
  6. pulumi_vault/ad/secret_role.py +5 -0
  7. pulumi_vault/alicloud/auth_backend_role.py +5 -0
  8. pulumi_vault/approle/auth_backend_login.py +5 -0
  9. pulumi_vault/approle/auth_backend_role.py +5 -0
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
  11. pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
  12. pulumi_vault/audit.py +5 -0
  13. pulumi_vault/audit_request_header.py +5 -0
  14. pulumi_vault/auth_backend.py +10 -5
  15. pulumi_vault/aws/auth_backend_cert.py +5 -0
  16. pulumi_vault/aws/auth_backend_client.py +5 -0
  17. pulumi_vault/aws/auth_backend_config_identity.py +5 -0
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
  19. pulumi_vault/aws/auth_backend_login.py +12 -7
  20. pulumi_vault/aws/auth_backend_role.py +5 -0
  21. pulumi_vault/aws/auth_backend_role_tag.py +5 -0
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
  23. pulumi_vault/aws/auth_backend_sts_role.py +5 -0
  24. pulumi_vault/aws/get_access_credentials.py +31 -4
  25. pulumi_vault/aws/get_static_access_credentials.py +18 -4
  26. pulumi_vault/aws/secret_backend.py +5 -0
  27. pulumi_vault/aws/secret_backend_role.py +120 -0
  28. pulumi_vault/aws/secret_backend_static_role.py +5 -0
  29. pulumi_vault/azure/_inputs.py +24 -0
  30. pulumi_vault/azure/auth_backend_config.py +5 -0
  31. pulumi_vault/azure/auth_backend_role.py +5 -0
  32. pulumi_vault/azure/backend.py +5 -0
  33. pulumi_vault/azure/backend_role.py +23 -18
  34. pulumi_vault/azure/get_access_credentials.py +36 -4
  35. pulumi_vault/azure/outputs.py +5 -0
  36. pulumi_vault/cert_auth_backend_role.py +5 -0
  37. pulumi_vault/config/__init__.pyi +5 -0
  38. pulumi_vault/config/_inputs.py +21 -0
  39. pulumi_vault/config/outputs.py +5 -0
  40. pulumi_vault/config/ui_custom_message.py +24 -19
  41. pulumi_vault/config/vars.py +5 -0
  42. pulumi_vault/consul/secret_backend.py +5 -0
  43. pulumi_vault/consul/secret_backend_role.py +5 -0
  44. pulumi_vault/database/_inputs.py +2091 -140
  45. pulumi_vault/database/outputs.py +59 -54
  46. pulumi_vault/database/secret_backend_connection.py +115 -110
  47. pulumi_vault/database/secret_backend_role.py +25 -20
  48. pulumi_vault/database/secret_backend_static_role.py +11 -6
  49. pulumi_vault/database/secrets_mount.py +139 -134
  50. pulumi_vault/egp_policy.py +5 -0
  51. pulumi_vault/gcp/_inputs.py +111 -0
  52. pulumi_vault/gcp/auth_backend.py +15 -10
  53. pulumi_vault/gcp/auth_backend_role.py +5 -0
  54. pulumi_vault/gcp/get_auth_backend_role.py +42 -4
  55. pulumi_vault/gcp/outputs.py +5 -0
  56. pulumi_vault/gcp/secret_backend.py +5 -0
  57. pulumi_vault/gcp/secret_impersonated_account.py +5 -0
  58. pulumi_vault/gcp/secret_roleset.py +18 -13
  59. pulumi_vault/gcp/secret_static_account.py +18 -13
  60. pulumi_vault/generic/endpoint.py +5 -0
  61. pulumi_vault/generic/get_secret.py +25 -5
  62. pulumi_vault/generic/secret.py +12 -7
  63. pulumi_vault/get_auth_backend.py +21 -4
  64. pulumi_vault/get_auth_backends.py +16 -4
  65. pulumi_vault/get_namespace.py +18 -5
  66. pulumi_vault/get_namespaces.py +13 -4
  67. pulumi_vault/get_nomad_access_token.py +28 -8
  68. pulumi_vault/get_policy_document.py +27 -16
  69. pulumi_vault/get_raft_autopilot_state.py +26 -7
  70. pulumi_vault/github/_inputs.py +55 -0
  71. pulumi_vault/github/auth_backend.py +10 -5
  72. pulumi_vault/github/outputs.py +5 -0
  73. pulumi_vault/github/team.py +5 -0
  74. pulumi_vault/github/user.py +5 -0
  75. pulumi_vault/identity/entity.py +5 -0
  76. pulumi_vault/identity/entity_alias.py +5 -0
  77. pulumi_vault/identity/entity_policies.py +5 -0
  78. pulumi_vault/identity/get_entity.py +37 -7
  79. pulumi_vault/identity/get_group.py +42 -6
  80. pulumi_vault/identity/get_oidc_client_creds.py +16 -4
  81. pulumi_vault/identity/get_oidc_openid_config.py +26 -4
  82. pulumi_vault/identity/get_oidc_public_keys.py +16 -5
  83. pulumi_vault/identity/group.py +5 -0
  84. pulumi_vault/identity/group_alias.py +5 -0
  85. pulumi_vault/identity/group_member_entity_ids.py +5 -0
  86. pulumi_vault/identity/group_member_group_ids.py +5 -0
  87. pulumi_vault/identity/group_policies.py +5 -0
  88. pulumi_vault/identity/mfa_duo.py +5 -0
  89. pulumi_vault/identity/mfa_login_enforcement.py +5 -0
  90. pulumi_vault/identity/mfa_okta.py +5 -0
  91. pulumi_vault/identity/mfa_pingid.py +5 -0
  92. pulumi_vault/identity/mfa_totp.py +5 -0
  93. pulumi_vault/identity/oidc.py +5 -0
  94. pulumi_vault/identity/oidc_assignment.py +5 -0
  95. pulumi_vault/identity/oidc_client.py +5 -0
  96. pulumi_vault/identity/oidc_key.py +5 -0
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
  98. pulumi_vault/identity/oidc_provider.py +5 -0
  99. pulumi_vault/identity/oidc_role.py +5 -0
  100. pulumi_vault/identity/oidc_scope.py +5 -0
  101. pulumi_vault/identity/outputs.py +8 -3
  102. pulumi_vault/jwt/_inputs.py +55 -0
  103. pulumi_vault/jwt/auth_backend.py +14 -9
  104. pulumi_vault/jwt/auth_backend_role.py +33 -28
  105. pulumi_vault/jwt/outputs.py +5 -0
  106. pulumi_vault/kmip/secret_backend.py +5 -0
  107. pulumi_vault/kmip/secret_role.py +5 -0
  108. pulumi_vault/kmip/secret_scope.py +5 -0
  109. pulumi_vault/kubernetes/auth_backend_config.py +5 -0
  110. pulumi_vault/kubernetes/auth_backend_role.py +5 -0
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
  113. pulumi_vault/kubernetes/get_service_account_token.py +28 -4
  114. pulumi_vault/kubernetes/secret_backend.py +19 -14
  115. pulumi_vault/kubernetes/secret_backend_role.py +5 -0
  116. pulumi_vault/kv/_inputs.py +36 -4
  117. pulumi_vault/kv/get_secret.py +20 -5
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +24 -5
  119. pulumi_vault/kv/get_secret_v2.py +27 -6
  120. pulumi_vault/kv/get_secrets_list.py +15 -4
  121. pulumi_vault/kv/get_secrets_list_v2.py +18 -4
  122. pulumi_vault/kv/outputs.py +8 -3
  123. pulumi_vault/kv/secret.py +12 -7
  124. pulumi_vault/kv/secret_backend_v2.py +5 -0
  125. pulumi_vault/kv/secret_v2.py +46 -41
  126. pulumi_vault/ldap/auth_backend.py +5 -0
  127. pulumi_vault/ldap/auth_backend_group.py +5 -0
  128. pulumi_vault/ldap/auth_backend_user.py +5 -0
  129. pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
  130. pulumi_vault/ldap/get_static_credentials.py +23 -4
  131. pulumi_vault/ldap/secret_backend.py +19 -14
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
  133. pulumi_vault/ldap/secret_backend_library_set.py +5 -0
  134. pulumi_vault/ldap/secret_backend_static_role.py +5 -0
  135. pulumi_vault/managed/_inputs.py +205 -0
  136. pulumi_vault/managed/keys.py +20 -15
  137. pulumi_vault/managed/outputs.py +5 -0
  138. pulumi_vault/mfa_duo.py +5 -0
  139. pulumi_vault/mfa_okta.py +5 -0
  140. pulumi_vault/mfa_pingid.py +5 -0
  141. pulumi_vault/mfa_totp.py +5 -0
  142. pulumi_vault/mongodbatlas/secret_backend.py +5 -0
  143. pulumi_vault/mongodbatlas/secret_role.py +5 -0
  144. pulumi_vault/mount.py +35 -23
  145. pulumi_vault/namespace.py +19 -14
  146. pulumi_vault/nomad_secret_backend.py +5 -0
  147. pulumi_vault/nomad_secret_role.py +5 -0
  148. pulumi_vault/okta/_inputs.py +39 -0
  149. pulumi_vault/okta/auth_backend.py +31 -26
  150. pulumi_vault/okta/auth_backend_group.py +5 -0
  151. pulumi_vault/okta/auth_backend_user.py +5 -0
  152. pulumi_vault/okta/outputs.py +5 -0
  153. pulumi_vault/outputs.py +5 -0
  154. pulumi_vault/password_policy.py +5 -0
  155. pulumi_vault/pkisecret/_inputs.py +49 -8
  156. pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
  157. pulumi_vault/pkisecret/backend_config_est.py +24 -19
  158. pulumi_vault/pkisecret/get_backend_config_est.py +23 -5
  159. pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
  160. pulumi_vault/pkisecret/get_backend_issuers.py +18 -5
  161. pulumi_vault/pkisecret/get_backend_key.py +19 -4
  162. pulumi_vault/pkisecret/get_backend_keys.py +18 -5
  163. pulumi_vault/pkisecret/outputs.py +17 -12
  164. pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
  172. pulumi_vault/pkisecret/secret_backend_key.py +5 -0
  173. pulumi_vault/pkisecret/secret_backend_role.py +10 -5
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
  176. pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
  177. pulumi_vault/plugin.py +5 -0
  178. pulumi_vault/plugin_pinned_version.py +5 -0
  179. pulumi_vault/policy.py +5 -0
  180. pulumi_vault/provider.py +47 -42
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +5 -0
  183. pulumi_vault/quota_rate_limit.py +5 -0
  184. pulumi_vault/rabbitmq/_inputs.py +61 -0
  185. pulumi_vault/rabbitmq/outputs.py +5 -0
  186. pulumi_vault/rabbitmq/secret_backend.py +5 -0
  187. pulumi_vault/rabbitmq/secret_backend_role.py +43 -38
  188. pulumi_vault/raft_autopilot.py +5 -0
  189. pulumi_vault/raft_snapshot_agent_config.py +5 -0
  190. pulumi_vault/rgp_policy.py +5 -0
  191. pulumi_vault/saml/auth_backend.py +5 -0
  192. pulumi_vault/saml/auth_backend_role.py +19 -14
  193. pulumi_vault/secrets/_inputs.py +30 -0
  194. pulumi_vault/secrets/outputs.py +5 -0
  195. pulumi_vault/secrets/sync_association.py +7 -2
  196. pulumi_vault/secrets/sync_aws_destination.py +19 -14
  197. pulumi_vault/secrets/sync_azure_destination.py +19 -14
  198. pulumi_vault/secrets/sync_config.py +5 -0
  199. pulumi_vault/secrets/sync_gcp_destination.py +19 -14
  200. pulumi_vault/secrets/sync_gh_destination.py +5 -0
  201. pulumi_vault/secrets/sync_github_apps.py +5 -0
  202. pulumi_vault/secrets/sync_vercel_destination.py +5 -0
  203. pulumi_vault/ssh/_inputs.py +22 -0
  204. pulumi_vault/ssh/outputs.py +5 -0
  205. pulumi_vault/ssh/secret_backend_ca.py +5 -0
  206. pulumi_vault/ssh/secret_backend_role.py +38 -33
  207. pulumi_vault/terraformcloud/secret_backend.py +5 -0
  208. pulumi_vault/terraformcloud/secret_creds.py +5 -0
  209. pulumi_vault/terraformcloud/secret_role.py +5 -0
  210. pulumi_vault/token.py +5 -0
  211. pulumi_vault/tokenauth/auth_backend_role.py +5 -14
  212. pulumi_vault/transform/alphabet.py +5 -0
  213. pulumi_vault/transform/get_decode.py +38 -14
  214. pulumi_vault/transform/get_encode.py +38 -14
  215. pulumi_vault/transform/role.py +5 -0
  216. pulumi_vault/transform/template.py +19 -14
  217. pulumi_vault/transform/transformation.py +5 -0
  218. pulumi_vault/transit/get_decrypt.py +21 -4
  219. pulumi_vault/transit/get_encrypt.py +23 -4
  220. pulumi_vault/transit/secret_backend_key.py +12 -7
  221. pulumi_vault/transit/secret_cache_config.py +5 -0
  222. {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/METADATA +3 -2
  223. pulumi_vault-6.3.1.dist-info/RECORD +256 -0
  224. {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/WHEEL +1 -1
  225. pulumi_vault-6.3.0a1723010642.dist-info/RECORD +0 -256
  226. {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretArgs', 'Secret']
@@ -126,7 +131,7 @@ class SecretArgs:
126
131
  @pulumi.input_type
127
132
  class _SecretState:
128
133
  def __init__(__self__, *,
129
- data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
134
+ data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
130
135
  data_json: Optional[pulumi.Input[str]] = None,
131
136
  delete_all_versions: Optional[pulumi.Input[bool]] = None,
132
137
  disable_read: Optional[pulumi.Input[bool]] = None,
@@ -134,7 +139,7 @@ class _SecretState:
134
139
  path: Optional[pulumi.Input[str]] = None):
135
140
  """
136
141
  Input properties used for looking up and filtering Secret resources.
137
- :param pulumi.Input[Mapping[str, Any]] data: A mapping whose keys are the top-level data keys returned from
142
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
138
143
  Vault and whose values are the corresponding values. This map can only
139
144
  represent string data, so any non-string values returned from Vault are
140
145
  serialized as JSON.
@@ -172,7 +177,7 @@ class _SecretState:
172
177
 
173
178
  @property
174
179
  @pulumi.getter
175
- def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
180
+ def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
176
181
  """
177
182
  A mapping whose keys are the top-level data keys returned from
178
183
  Vault and whose values are the corresponding values. This map can only
@@ -182,7 +187,7 @@ class _SecretState:
182
187
  return pulumi.get(self, "data")
183
188
 
184
189
  @data.setter
185
- def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
190
+ def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
186
191
  pulumi.set(self, "data", value)
187
192
 
188
193
  @property
@@ -366,7 +371,7 @@ class Secret(pulumi.CustomResource):
366
371
  def get(resource_name: str,
367
372
  id: pulumi.Input[str],
368
373
  opts: Optional[pulumi.ResourceOptions] = None,
369
- data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
374
+ data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
370
375
  data_json: Optional[pulumi.Input[str]] = None,
371
376
  delete_all_versions: Optional[pulumi.Input[bool]] = None,
372
377
  disable_read: Optional[pulumi.Input[bool]] = None,
@@ -379,7 +384,7 @@ class Secret(pulumi.CustomResource):
379
384
  :param str resource_name: The unique name of the resulting resource.
380
385
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
381
386
  :param pulumi.ResourceOptions opts: Options for the resource.
382
- :param pulumi.Input[Mapping[str, Any]] data: A mapping whose keys are the top-level data keys returned from
387
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
383
388
  Vault and whose values are the corresponding values. This map can only
384
389
  represent string data, so any non-string values returned from Vault are
385
390
  serialized as JSON.
@@ -416,7 +421,7 @@ class Secret(pulumi.CustomResource):
416
421
 
417
422
  @property
418
423
  @pulumi.getter
419
- def data(self) -> pulumi.Output[Mapping[str, Any]]:
424
+ def data(self) -> pulumi.Output[Mapping[str, str]]:
420
425
  """
421
426
  A mapping whose keys are the top-level data keys returned from
422
427
  Vault and whose values are the corresponding values. This map can only
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = [
@@ -183,9 +188,6 @@ def get_auth_backend(namespace: Optional[str] = None,
183
188
  namespace=pulumi.get(__ret__, 'namespace'),
184
189
  path=pulumi.get(__ret__, 'path'),
185
190
  type=pulumi.get(__ret__, 'type'))
186
-
187
-
188
- @_utilities.lift_output_func(get_auth_backend)
189
191
  def get_auth_backend_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
190
192
  path: Optional[pulumi.Input[str]] = None,
191
193
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendResult]:
@@ -206,4 +208,19 @@ def get_auth_backend_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
206
208
  *Available only for Vault Enterprise*.
207
209
  :param str path: The auth backend mount point.
208
210
  """
209
- ...
211
+ __args__ = dict()
212
+ __args__['namespace'] = namespace
213
+ __args__['path'] = path
214
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
215
+ __ret__ = pulumi.runtime.invoke_output('vault:index/getAuthBackend:getAuthBackend', __args__, opts=opts, typ=GetAuthBackendResult)
216
+ return __ret__.apply(lambda __response__: GetAuthBackendResult(
217
+ accessor=pulumi.get(__response__, 'accessor'),
218
+ default_lease_ttl_seconds=pulumi.get(__response__, 'default_lease_ttl_seconds'),
219
+ description=pulumi.get(__response__, 'description'),
220
+ id=pulumi.get(__response__, 'id'),
221
+ listing_visibility=pulumi.get(__response__, 'listing_visibility'),
222
+ local=pulumi.get(__response__, 'local'),
223
+ max_lease_ttl_seconds=pulumi.get(__response__, 'max_lease_ttl_seconds'),
224
+ namespace=pulumi.get(__response__, 'namespace'),
225
+ path=pulumi.get(__response__, 'path'),
226
+ type=pulumi.get(__response__, 'type')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = [
@@ -125,9 +130,6 @@ def get_auth_backends(namespace: Optional[str] = None,
125
130
  namespace=pulumi.get(__ret__, 'namespace'),
126
131
  paths=pulumi.get(__ret__, 'paths'),
127
132
  type=pulumi.get(__ret__, 'type'))
128
-
129
-
130
- @_utilities.lift_output_func(get_auth_backends)
131
133
  def get_auth_backends_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
132
134
  type: Optional[pulumi.Input[Optional[str]]] = None,
133
135
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendsResult]:
@@ -155,4 +157,14 @@ def get_auth_backends_output(namespace: Optional[pulumi.Input[Optional[str]]] =
155
157
  *Available only for Vault Enterprise*.
156
158
  :param str type: The name of the auth method type. Allows filtering of backends returned by type.
157
159
  """
158
- ...
160
+ __args__ = dict()
161
+ __args__['namespace'] = namespace
162
+ __args__['type'] = type
163
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
164
+ __ret__ = pulumi.runtime.invoke_output('vault:index/getAuthBackends:getAuthBackends', __args__, opts=opts, typ=GetAuthBackendsResult)
165
+ return __ret__.apply(lambda __response__: GetAuthBackendsResult(
166
+ accessors=pulumi.get(__response__, 'accessors'),
167
+ id=pulumi.get(__response__, 'id'),
168
+ namespace=pulumi.get(__response__, 'namespace'),
169
+ paths=pulumi.get(__response__, 'paths'),
170
+ type=pulumi.get(__response__, 'type')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = [
@@ -43,7 +48,7 @@ class GetNamespaceResult:
43
48
 
44
49
  @property
45
50
  @pulumi.getter(name="customMetadata")
46
- def custom_metadata(self) -> Mapping[str, Any]:
51
+ def custom_metadata(self) -> Mapping[str, str]:
47
52
  """
48
53
  (Optional) A map of strings containing arbitrary metadata for the namespace.
49
54
  Only fetched if `path` is specified.
@@ -161,9 +166,6 @@ def get_namespace(namespace: Optional[str] = None,
161
166
  namespace_id=pulumi.get(__ret__, 'namespace_id'),
162
167
  path=pulumi.get(__ret__, 'path'),
163
168
  path_fq=pulumi.get(__ret__, 'path_fq'))
164
-
165
-
166
- @_utilities.lift_output_func(get_namespace)
167
169
  def get_namespace_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
168
170
  path: Optional[pulumi.Input[Optional[str]]] = None,
169
171
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNamespaceResult]:
@@ -210,4 +212,15 @@ def get_namespace_output(namespace: Optional[pulumi.Input[Optional[str]]] = None
210
212
  based on the `namespace` arguments of the provider and this data source.
211
213
  Other path related attributes will be empty in this case.
212
214
  """
213
- ...
215
+ __args__ = dict()
216
+ __args__['namespace'] = namespace
217
+ __args__['path'] = path
218
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
219
+ __ret__ = pulumi.runtime.invoke_output('vault:index/getNamespace:getNamespace', __args__, opts=opts, typ=GetNamespaceResult)
220
+ return __ret__.apply(lambda __response__: GetNamespaceResult(
221
+ custom_metadata=pulumi.get(__response__, 'custom_metadata'),
222
+ id=pulumi.get(__response__, 'id'),
223
+ namespace=pulumi.get(__response__, 'namespace'),
224
+ namespace_id=pulumi.get(__response__, 'namespace_id'),
225
+ path=pulumi.get(__response__, 'path'),
226
+ path_fq=pulumi.get(__response__, 'path_fq')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = [
@@ -106,9 +111,6 @@ def get_namespaces(namespace: Optional[str] = None,
106
111
  id=pulumi.get(__ret__, 'id'),
107
112
  namespace=pulumi.get(__ret__, 'namespace'),
108
113
  paths=pulumi.get(__ret__, 'paths'))
109
-
110
-
111
- @_utilities.lift_output_func(get_namespaces)
112
114
  def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
113
115
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNamespacesResult]:
114
116
  """
@@ -141,4 +143,11 @@ def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[str]]] = Non
141
143
  The value should not contain leading or trailing forward slashes.
142
144
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
143
145
  """
144
- ...
146
+ __args__ = dict()
147
+ __args__['namespace'] = namespace
148
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
149
+ __ret__ = pulumi.runtime.invoke_output('vault:index/getNamespaces:getNamespaces', __args__, opts=opts, typ=GetNamespacesResult)
150
+ return __ret__.apply(lambda __response__: GetNamespacesResult(
151
+ id=pulumi.get(__response__, 'id'),
152
+ namespace=pulumi.get(__response__, 'namespace'),
153
+ paths=pulumi.get(__response__, 'paths')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = [
@@ -119,8 +124,11 @@ def get_nomad_access_token(backend: Optional[str] = None,
119
124
  role="test",
120
125
  type="client",
121
126
  policies=["readonly"])
122
- token = pulumi.Output.all(config.backend, test.role).apply(lambda backend, role: vault.get_nomad_access_token_output(backend=backend,
123
- role=role))
127
+ token = pulumi.Output.all(
128
+ backend=config.backend,
129
+ role=test.role
130
+ ).apply(lambda resolved_outputs: vault.get_nomad_access_token_output(backend=resolved_outputs['backend'],
131
+ role=resolved_outputs['role']))
124
132
  ```
125
133
 
126
134
 
@@ -147,9 +155,6 @@ def get_nomad_access_token(backend: Optional[str] = None,
147
155
  namespace=pulumi.get(__ret__, 'namespace'),
148
156
  role=pulumi.get(__ret__, 'role'),
149
157
  secret_id=pulumi.get(__ret__, 'secret_id'))
150
-
151
-
152
- @_utilities.lift_output_func(get_nomad_access_token)
153
158
  def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
154
159
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
155
160
  role: Optional[pulumi.Input[str]] = None,
@@ -173,8 +178,11 @@ def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
173
178
  role="test",
174
179
  type="client",
175
180
  policies=["readonly"])
176
- token = pulumi.Output.all(config.backend, test.role).apply(lambda backend, role: vault.get_nomad_access_token_output(backend=backend,
177
- role=role))
181
+ token = pulumi.Output.all(
182
+ backend=config.backend,
183
+ role=test.role
184
+ ).apply(lambda resolved_outputs: vault.get_nomad_access_token_output(backend=resolved_outputs['backend'],
185
+ role=resolved_outputs['role']))
178
186
  ```
179
187
 
180
188
 
@@ -187,4 +195,16 @@ def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
187
195
  :param str role: The name of the Nomad secret backend role to generate
188
196
  a token for, with no leading or trailing `/`s.
189
197
  """
190
- ...
198
+ __args__ = dict()
199
+ __args__['backend'] = backend
200
+ __args__['namespace'] = namespace
201
+ __args__['role'] = role
202
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
203
+ __ret__ = pulumi.runtime.invoke_output('vault:index/getNomadAccessToken:getNomadAccessToken', __args__, opts=opts, typ=GetNomadAccessTokenResult)
204
+ return __ret__.apply(lambda __response__: GetNomadAccessTokenResult(
205
+ accessor_id=pulumi.get(__response__, 'accessor_id'),
206
+ backend=pulumi.get(__response__, 'backend'),
207
+ id=pulumi.get(__response__, 'id'),
208
+ namespace=pulumi.get(__response__, 'namespace'),
209
+ role=pulumi.get(__response__, 'role'),
210
+ secret_id=pulumi.get(__response__, 'secret_id')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
  from . import outputs
12
17
  from ._inputs import *
@@ -77,7 +82,7 @@ class AwaitableGetPolicyDocumentResult(GetPolicyDocumentResult):
77
82
 
78
83
 
79
84
  def get_policy_document(namespace: Optional[str] = None,
80
- rules: Optional[Sequence[pulumi.InputType['GetPolicyDocumentRuleArgs']]] = None,
85
+ rules: Optional[Sequence[Union['GetPolicyDocumentRuleArgs', 'GetPolicyDocumentRuleArgsDict']]] = None,
81
86
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetPolicyDocumentResult:
82
87
  """
83
88
  This is a data source which can be used to construct a HCL representation of an Vault policy document, for use with resources which expect policy documents, such as the `Policy` resource.
@@ -88,17 +93,17 @@ def get_policy_document(namespace: Optional[str] = None,
88
93
  import pulumi
89
94
  import pulumi_vault as vault
90
95
 
91
- example = vault.get_policy_document(rules=[vault.GetPolicyDocumentRuleArgs(
92
- path="secret/*",
93
- capabilities=[
96
+ example = vault.get_policy_document(rules=[{
97
+ "path": "secret/*",
98
+ "capabilities": [
94
99
  "create",
95
100
  "read",
96
101
  "update",
97
102
  "delete",
98
103
  "list",
99
104
  ],
100
- description="allow all on secrets",
101
- )])
105
+ "description": "allow all on secrets",
106
+ }])
102
107
  example_policy = vault.Policy("example",
103
108
  name="example_policy",
104
109
  policy=example.hcl)
@@ -115,11 +120,8 @@ def get_policy_document(namespace: Optional[str] = None,
115
120
  id=pulumi.get(__ret__, 'id'),
116
121
  namespace=pulumi.get(__ret__, 'namespace'),
117
122
  rules=pulumi.get(__ret__, 'rules'))
118
-
119
-
120
- @_utilities.lift_output_func(get_policy_document)
121
123
  def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
122
- rules: Optional[pulumi.Input[Optional[Sequence[pulumi.InputType['GetPolicyDocumentRuleArgs']]]]] = None,
124
+ rules: Optional[pulumi.Input[Optional[Sequence[Union['GetPolicyDocumentRuleArgs', 'GetPolicyDocumentRuleArgsDict']]]]] = None,
123
125
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetPolicyDocumentResult]:
124
126
  """
125
127
  This is a data source which can be used to construct a HCL representation of an Vault policy document, for use with resources which expect policy documents, such as the `Policy` resource.
@@ -130,20 +132,29 @@ def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]]
130
132
  import pulumi
131
133
  import pulumi_vault as vault
132
134
 
133
- example = vault.get_policy_document(rules=[vault.GetPolicyDocumentRuleArgs(
134
- path="secret/*",
135
- capabilities=[
135
+ example = vault.get_policy_document(rules=[{
136
+ "path": "secret/*",
137
+ "capabilities": [
136
138
  "create",
137
139
  "read",
138
140
  "update",
139
141
  "delete",
140
142
  "list",
141
143
  ],
142
- description="allow all on secrets",
143
- )])
144
+ "description": "allow all on secrets",
145
+ }])
144
146
  example_policy = vault.Policy("example",
145
147
  name="example_policy",
146
148
  policy=example.hcl)
147
149
  ```
148
150
  """
149
- ...
151
+ __args__ = dict()
152
+ __args__['namespace'] = namespace
153
+ __args__['rules'] = rules
154
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
155
+ __ret__ = pulumi.runtime.invoke_output('vault:index/getPolicyDocument:getPolicyDocument', __args__, opts=opts, typ=GetPolicyDocumentResult)
156
+ return __ret__.apply(lambda __response__: GetPolicyDocumentResult(
157
+ hcl=pulumi.get(__response__, 'hcl'),
158
+ id=pulumi.get(__response__, 'id'),
159
+ namespace=pulumi.get(__response__, 'namespace'),
160
+ rules=pulumi.get(__response__, 'rules')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = [
@@ -109,7 +114,7 @@ class GetRaftAutopilotStateResult:
109
114
 
110
115
  @property
111
116
  @pulumi.getter(name="redundancyZones")
112
- def redundancy_zones(self) -> Mapping[str, Any]:
117
+ def redundancy_zones(self) -> Mapping[str, str]:
113
118
  """
114
119
  Additional output related to redundancy zones stored as a serialized map of strings.
115
120
  """
@@ -125,7 +130,7 @@ class GetRaftAutopilotStateResult:
125
130
 
126
131
  @property
127
132
  @pulumi.getter
128
- def servers(self) -> Mapping[str, Any]:
133
+ def servers(self) -> Mapping[str, str]:
129
134
  """
130
135
  Additionaly output related to servers in the cluster stored as a serialized map of strings.
131
136
  """
@@ -141,7 +146,7 @@ class GetRaftAutopilotStateResult:
141
146
 
142
147
  @property
143
148
  @pulumi.getter(name="upgradeInfo")
144
- def upgrade_info(self) -> Mapping[str, Any]:
149
+ def upgrade_info(self) -> Mapping[str, str]:
145
150
  """
146
151
  Additional output related to upgrade information stored as a serialized map of strings.
147
152
  """
@@ -223,9 +228,6 @@ def get_raft_autopilot_state(namespace: Optional[str] = None,
223
228
  upgrade_info=pulumi.get(__ret__, 'upgrade_info'),
224
229
  upgrade_info_json=pulumi.get(__ret__, 'upgrade_info_json'),
225
230
  voters=pulumi.get(__ret__, 'voters'))
226
-
227
-
228
- @_utilities.lift_output_func(get_raft_autopilot_state)
229
231
  def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
230
232
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetRaftAutopilotStateResult]:
231
233
  """
@@ -245,4 +247,21 @@ def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[st
245
247
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
246
248
  *Available only for Vault Enterprise*.
247
249
  """
248
- ...
250
+ __args__ = dict()
251
+ __args__['namespace'] = namespace
252
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
253
+ __ret__ = pulumi.runtime.invoke_output('vault:index/getRaftAutopilotState:getRaftAutopilotState', __args__, opts=opts, typ=GetRaftAutopilotStateResult)
254
+ return __ret__.apply(lambda __response__: GetRaftAutopilotStateResult(
255
+ failure_tolerance=pulumi.get(__response__, 'failure_tolerance'),
256
+ healthy=pulumi.get(__response__, 'healthy'),
257
+ id=pulumi.get(__response__, 'id'),
258
+ leader=pulumi.get(__response__, 'leader'),
259
+ namespace=pulumi.get(__response__, 'namespace'),
260
+ optimistic_failure_tolerance=pulumi.get(__response__, 'optimistic_failure_tolerance'),
261
+ redundancy_zones=pulumi.get(__response__, 'redundancy_zones'),
262
+ redundancy_zones_json=pulumi.get(__response__, 'redundancy_zones_json'),
263
+ servers=pulumi.get(__response__, 'servers'),
264
+ servers_json=pulumi.get(__response__, 'servers_json'),
265
+ upgrade_info=pulumi.get(__response__, 'upgrade_info'),
266
+ upgrade_info_json=pulumi.get(__response__, 'upgrade_info_json'),
267
+ voters=pulumi.get(__response__, 'voters')))
@@ -4,15 +4,70 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
13
18
  'AuthBackendTuneArgs',
19
+ 'AuthBackendTuneArgsDict',
14
20
  ]
15
21
 
22
+ MYPY = False
23
+
24
+ if not MYPY:
25
+ class AuthBackendTuneArgsDict(TypedDict):
26
+ allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
27
+ """
28
+ List of headers to whitelist and allowing
29
+ a plugin to include them in the response.
30
+ """
31
+ audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
32
+ """
33
+ Specifies the list of keys that will
34
+ not be HMAC'd by audit devices in the request data object.
35
+ """
36
+ audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
37
+ """
38
+ Specifies the list of keys that will
39
+ not be HMAC'd by audit devices in the response data object.
40
+ """
41
+ default_lease_ttl: NotRequired[pulumi.Input[str]]
42
+ """
43
+ Specifies the default time-to-live.
44
+ If set, this overrides the global default.
45
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
46
+ """
47
+ listing_visibility: NotRequired[pulumi.Input[str]]
48
+ """
49
+ Specifies whether to show this mount in
50
+ the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
51
+ """
52
+ max_lease_ttl: NotRequired[pulumi.Input[str]]
53
+ """
54
+ Specifies the maximum time-to-live.
55
+ If set, this overrides the global default.
56
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
57
+ """
58
+ passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
59
+ """
60
+ List of headers to whitelist and
61
+ pass from the request to the backend.
62
+ """
63
+ token_type: NotRequired[pulumi.Input[str]]
64
+ """
65
+ Specifies the type of tokens that should be returned by
66
+ the mount. Valid values are "default-service", "default-batch", "service", "batch".
67
+ """
68
+ elif False:
69
+ AuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any]
70
+
16
71
  @pulumi.input_type
17
72
  class AuthBackendTuneArgs:
18
73
  def __init__(__self__, *,
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
  from . import outputs
12
17
  from ._inputs import *
@@ -705,7 +710,7 @@ class AuthBackend(pulumi.CustomResource):
705
710
  token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
706
711
  token_ttl: Optional[pulumi.Input[int]] = None,
707
712
  token_type: Optional[pulumi.Input[str]] = None,
708
- tune: Optional[pulumi.Input[pulumi.InputType['AuthBackendTuneArgs']]] = None,
713
+ tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
709
714
  __props__=None):
710
715
  """
711
716
  Manages a GitHub Auth mount in a Vault server. See the [Vault
@@ -769,7 +774,7 @@ class AuthBackend(pulumi.CustomResource):
769
774
  Its current value will be referenced at renewal time.
770
775
  :param pulumi.Input[str] token_type: Specifies the type of tokens that should be returned by
771
776
  the mount. Valid values are "default-service", "default-batch", "service", "batch".
772
- :param pulumi.Input[pulumi.InputType['AuthBackendTuneArgs']] tune: Extra configuration block. Structure is documented below.
777
+ :param pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']] tune: Extra configuration block. Structure is documented below.
773
778
 
774
779
  The `tune` block is used to tune the auth backend:
775
780
  """
@@ -832,7 +837,7 @@ class AuthBackend(pulumi.CustomResource):
832
837
  token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
833
838
  token_ttl: Optional[pulumi.Input[int]] = None,
834
839
  token_type: Optional[pulumi.Input[str]] = None,
835
- tune: Optional[pulumi.Input[pulumi.InputType['AuthBackendTuneArgs']]] = None,
840
+ tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
836
841
  __props__=None):
837
842
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
838
843
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -889,7 +894,7 @@ class AuthBackend(pulumi.CustomResource):
889
894
  token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
890
895
  token_ttl: Optional[pulumi.Input[int]] = None,
891
896
  token_type: Optional[pulumi.Input[str]] = None,
892
- tune: Optional[pulumi.Input[pulumi.InputType['AuthBackendTuneArgs']]] = None) -> 'AuthBackend':
897
+ tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None) -> 'AuthBackend':
893
898
  """
894
899
  Get an existing AuthBackend resource's state with the given name, id, and optional extra
895
900
  properties used to qualify the lookup.
@@ -936,7 +941,7 @@ class AuthBackend(pulumi.CustomResource):
936
941
  Its current value will be referenced at renewal time.
937
942
  :param pulumi.Input[str] token_type: Specifies the type of tokens that should be returned by
938
943
  the mount. Valid values are "default-service", "default-batch", "service", "batch".
939
- :param pulumi.Input[pulumi.InputType['AuthBackendTuneArgs']] tune: Extra configuration block. Structure is documented below.
944
+ :param pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']] tune: Extra configuration block. Structure is documented below.
940
945
 
941
946
  The `tune` block is used to tune the auth backend:
942
947
  """
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['TeamArgs', 'Team']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['UserArgs', 'User']