pulumi-vault 6.3.0a1723010642__py3-none-any.whl → 6.3.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +560 -0
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +19 -4
  4. pulumi_vault/ad/secret_backend.py +5 -0
  5. pulumi_vault/ad/secret_library.py +5 -0
  6. pulumi_vault/ad/secret_role.py +5 -0
  7. pulumi_vault/alicloud/auth_backend_role.py +5 -0
  8. pulumi_vault/approle/auth_backend_login.py +5 -0
  9. pulumi_vault/approle/auth_backend_role.py +5 -0
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
  11. pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
  12. pulumi_vault/audit.py +5 -0
  13. pulumi_vault/audit_request_header.py +5 -0
  14. pulumi_vault/auth_backend.py +10 -5
  15. pulumi_vault/aws/auth_backend_cert.py +5 -0
  16. pulumi_vault/aws/auth_backend_client.py +5 -0
  17. pulumi_vault/aws/auth_backend_config_identity.py +5 -0
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
  19. pulumi_vault/aws/auth_backend_login.py +12 -7
  20. pulumi_vault/aws/auth_backend_role.py +5 -0
  21. pulumi_vault/aws/auth_backend_role_tag.py +5 -0
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
  23. pulumi_vault/aws/auth_backend_sts_role.py +5 -0
  24. pulumi_vault/aws/get_access_credentials.py +31 -4
  25. pulumi_vault/aws/get_static_access_credentials.py +18 -4
  26. pulumi_vault/aws/secret_backend.py +5 -0
  27. pulumi_vault/aws/secret_backend_role.py +120 -0
  28. pulumi_vault/aws/secret_backend_static_role.py +5 -0
  29. pulumi_vault/azure/_inputs.py +24 -0
  30. pulumi_vault/azure/auth_backend_config.py +5 -0
  31. pulumi_vault/azure/auth_backend_role.py +5 -0
  32. pulumi_vault/azure/backend.py +5 -0
  33. pulumi_vault/azure/backend_role.py +23 -18
  34. pulumi_vault/azure/get_access_credentials.py +36 -4
  35. pulumi_vault/azure/outputs.py +5 -0
  36. pulumi_vault/cert_auth_backend_role.py +5 -0
  37. pulumi_vault/config/__init__.pyi +5 -0
  38. pulumi_vault/config/_inputs.py +21 -0
  39. pulumi_vault/config/outputs.py +5 -0
  40. pulumi_vault/config/ui_custom_message.py +24 -19
  41. pulumi_vault/config/vars.py +5 -0
  42. pulumi_vault/consul/secret_backend.py +5 -0
  43. pulumi_vault/consul/secret_backend_role.py +5 -0
  44. pulumi_vault/database/_inputs.py +2091 -140
  45. pulumi_vault/database/outputs.py +59 -54
  46. pulumi_vault/database/secret_backend_connection.py +115 -110
  47. pulumi_vault/database/secret_backend_role.py +25 -20
  48. pulumi_vault/database/secret_backend_static_role.py +11 -6
  49. pulumi_vault/database/secrets_mount.py +139 -134
  50. pulumi_vault/egp_policy.py +5 -0
  51. pulumi_vault/gcp/_inputs.py +111 -0
  52. pulumi_vault/gcp/auth_backend.py +15 -10
  53. pulumi_vault/gcp/auth_backend_role.py +5 -0
  54. pulumi_vault/gcp/get_auth_backend_role.py +42 -4
  55. pulumi_vault/gcp/outputs.py +5 -0
  56. pulumi_vault/gcp/secret_backend.py +5 -0
  57. pulumi_vault/gcp/secret_impersonated_account.py +5 -0
  58. pulumi_vault/gcp/secret_roleset.py +18 -13
  59. pulumi_vault/gcp/secret_static_account.py +18 -13
  60. pulumi_vault/generic/endpoint.py +5 -0
  61. pulumi_vault/generic/get_secret.py +25 -5
  62. pulumi_vault/generic/secret.py +12 -7
  63. pulumi_vault/get_auth_backend.py +21 -4
  64. pulumi_vault/get_auth_backends.py +16 -4
  65. pulumi_vault/get_namespace.py +18 -5
  66. pulumi_vault/get_namespaces.py +13 -4
  67. pulumi_vault/get_nomad_access_token.py +28 -8
  68. pulumi_vault/get_policy_document.py +27 -16
  69. pulumi_vault/get_raft_autopilot_state.py +26 -7
  70. pulumi_vault/github/_inputs.py +55 -0
  71. pulumi_vault/github/auth_backend.py +10 -5
  72. pulumi_vault/github/outputs.py +5 -0
  73. pulumi_vault/github/team.py +5 -0
  74. pulumi_vault/github/user.py +5 -0
  75. pulumi_vault/identity/entity.py +5 -0
  76. pulumi_vault/identity/entity_alias.py +5 -0
  77. pulumi_vault/identity/entity_policies.py +5 -0
  78. pulumi_vault/identity/get_entity.py +37 -7
  79. pulumi_vault/identity/get_group.py +42 -6
  80. pulumi_vault/identity/get_oidc_client_creds.py +16 -4
  81. pulumi_vault/identity/get_oidc_openid_config.py +26 -4
  82. pulumi_vault/identity/get_oidc_public_keys.py +16 -5
  83. pulumi_vault/identity/group.py +5 -0
  84. pulumi_vault/identity/group_alias.py +5 -0
  85. pulumi_vault/identity/group_member_entity_ids.py +5 -0
  86. pulumi_vault/identity/group_member_group_ids.py +5 -0
  87. pulumi_vault/identity/group_policies.py +5 -0
  88. pulumi_vault/identity/mfa_duo.py +5 -0
  89. pulumi_vault/identity/mfa_login_enforcement.py +5 -0
  90. pulumi_vault/identity/mfa_okta.py +5 -0
  91. pulumi_vault/identity/mfa_pingid.py +5 -0
  92. pulumi_vault/identity/mfa_totp.py +5 -0
  93. pulumi_vault/identity/oidc.py +5 -0
  94. pulumi_vault/identity/oidc_assignment.py +5 -0
  95. pulumi_vault/identity/oidc_client.py +5 -0
  96. pulumi_vault/identity/oidc_key.py +5 -0
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
  98. pulumi_vault/identity/oidc_provider.py +5 -0
  99. pulumi_vault/identity/oidc_role.py +5 -0
  100. pulumi_vault/identity/oidc_scope.py +5 -0
  101. pulumi_vault/identity/outputs.py +8 -3
  102. pulumi_vault/jwt/_inputs.py +55 -0
  103. pulumi_vault/jwt/auth_backend.py +14 -9
  104. pulumi_vault/jwt/auth_backend_role.py +33 -28
  105. pulumi_vault/jwt/outputs.py +5 -0
  106. pulumi_vault/kmip/secret_backend.py +5 -0
  107. pulumi_vault/kmip/secret_role.py +5 -0
  108. pulumi_vault/kmip/secret_scope.py +5 -0
  109. pulumi_vault/kubernetes/auth_backend_config.py +5 -0
  110. pulumi_vault/kubernetes/auth_backend_role.py +5 -0
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
  113. pulumi_vault/kubernetes/get_service_account_token.py +28 -4
  114. pulumi_vault/kubernetes/secret_backend.py +19 -14
  115. pulumi_vault/kubernetes/secret_backend_role.py +5 -0
  116. pulumi_vault/kv/_inputs.py +36 -4
  117. pulumi_vault/kv/get_secret.py +20 -5
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +24 -5
  119. pulumi_vault/kv/get_secret_v2.py +27 -6
  120. pulumi_vault/kv/get_secrets_list.py +15 -4
  121. pulumi_vault/kv/get_secrets_list_v2.py +18 -4
  122. pulumi_vault/kv/outputs.py +8 -3
  123. pulumi_vault/kv/secret.py +12 -7
  124. pulumi_vault/kv/secret_backend_v2.py +5 -0
  125. pulumi_vault/kv/secret_v2.py +46 -41
  126. pulumi_vault/ldap/auth_backend.py +5 -0
  127. pulumi_vault/ldap/auth_backend_group.py +5 -0
  128. pulumi_vault/ldap/auth_backend_user.py +5 -0
  129. pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
  130. pulumi_vault/ldap/get_static_credentials.py +23 -4
  131. pulumi_vault/ldap/secret_backend.py +19 -14
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
  133. pulumi_vault/ldap/secret_backend_library_set.py +5 -0
  134. pulumi_vault/ldap/secret_backend_static_role.py +5 -0
  135. pulumi_vault/managed/_inputs.py +205 -0
  136. pulumi_vault/managed/keys.py +20 -15
  137. pulumi_vault/managed/outputs.py +5 -0
  138. pulumi_vault/mfa_duo.py +5 -0
  139. pulumi_vault/mfa_okta.py +5 -0
  140. pulumi_vault/mfa_pingid.py +5 -0
  141. pulumi_vault/mfa_totp.py +5 -0
  142. pulumi_vault/mongodbatlas/secret_backend.py +5 -0
  143. pulumi_vault/mongodbatlas/secret_role.py +5 -0
  144. pulumi_vault/mount.py +35 -23
  145. pulumi_vault/namespace.py +19 -14
  146. pulumi_vault/nomad_secret_backend.py +5 -0
  147. pulumi_vault/nomad_secret_role.py +5 -0
  148. pulumi_vault/okta/_inputs.py +39 -0
  149. pulumi_vault/okta/auth_backend.py +31 -26
  150. pulumi_vault/okta/auth_backend_group.py +5 -0
  151. pulumi_vault/okta/auth_backend_user.py +5 -0
  152. pulumi_vault/okta/outputs.py +5 -0
  153. pulumi_vault/outputs.py +5 -0
  154. pulumi_vault/password_policy.py +5 -0
  155. pulumi_vault/pkisecret/_inputs.py +49 -8
  156. pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
  157. pulumi_vault/pkisecret/backend_config_est.py +24 -19
  158. pulumi_vault/pkisecret/get_backend_config_est.py +23 -5
  159. pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
  160. pulumi_vault/pkisecret/get_backend_issuers.py +18 -5
  161. pulumi_vault/pkisecret/get_backend_key.py +19 -4
  162. pulumi_vault/pkisecret/get_backend_keys.py +18 -5
  163. pulumi_vault/pkisecret/outputs.py +17 -12
  164. pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
  172. pulumi_vault/pkisecret/secret_backend_key.py +5 -0
  173. pulumi_vault/pkisecret/secret_backend_role.py +10 -5
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
  176. pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
  177. pulumi_vault/plugin.py +5 -0
  178. pulumi_vault/plugin_pinned_version.py +5 -0
  179. pulumi_vault/policy.py +5 -0
  180. pulumi_vault/provider.py +47 -42
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +5 -0
  183. pulumi_vault/quota_rate_limit.py +5 -0
  184. pulumi_vault/rabbitmq/_inputs.py +61 -0
  185. pulumi_vault/rabbitmq/outputs.py +5 -0
  186. pulumi_vault/rabbitmq/secret_backend.py +5 -0
  187. pulumi_vault/rabbitmq/secret_backend_role.py +43 -38
  188. pulumi_vault/raft_autopilot.py +5 -0
  189. pulumi_vault/raft_snapshot_agent_config.py +5 -0
  190. pulumi_vault/rgp_policy.py +5 -0
  191. pulumi_vault/saml/auth_backend.py +5 -0
  192. pulumi_vault/saml/auth_backend_role.py +19 -14
  193. pulumi_vault/secrets/_inputs.py +30 -0
  194. pulumi_vault/secrets/outputs.py +5 -0
  195. pulumi_vault/secrets/sync_association.py +7 -2
  196. pulumi_vault/secrets/sync_aws_destination.py +19 -14
  197. pulumi_vault/secrets/sync_azure_destination.py +19 -14
  198. pulumi_vault/secrets/sync_config.py +5 -0
  199. pulumi_vault/secrets/sync_gcp_destination.py +19 -14
  200. pulumi_vault/secrets/sync_gh_destination.py +5 -0
  201. pulumi_vault/secrets/sync_github_apps.py +5 -0
  202. pulumi_vault/secrets/sync_vercel_destination.py +5 -0
  203. pulumi_vault/ssh/_inputs.py +22 -0
  204. pulumi_vault/ssh/outputs.py +5 -0
  205. pulumi_vault/ssh/secret_backend_ca.py +5 -0
  206. pulumi_vault/ssh/secret_backend_role.py +38 -33
  207. pulumi_vault/terraformcloud/secret_backend.py +5 -0
  208. pulumi_vault/terraformcloud/secret_creds.py +5 -0
  209. pulumi_vault/terraformcloud/secret_role.py +5 -0
  210. pulumi_vault/token.py +5 -0
  211. pulumi_vault/tokenauth/auth_backend_role.py +5 -14
  212. pulumi_vault/transform/alphabet.py +5 -0
  213. pulumi_vault/transform/get_decode.py +38 -14
  214. pulumi_vault/transform/get_encode.py +38 -14
  215. pulumi_vault/transform/role.py +5 -0
  216. pulumi_vault/transform/template.py +19 -14
  217. pulumi_vault/transform/transformation.py +5 -0
  218. pulumi_vault/transit/get_decrypt.py +21 -4
  219. pulumi_vault/transit/get_encrypt.py +23 -4
  220. pulumi_vault/transit/secret_backend_key.py +12 -7
  221. pulumi_vault/transit/secret_cache_config.py +5 -0
  222. {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/METADATA +3 -2
  223. pulumi_vault-6.3.1.dist-info/RECORD +256 -0
  224. {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/WHEEL +1 -1
  225. pulumi_vault-6.3.0a1723010642.dist-info/RECORD +0 -256
  226. {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -21,7 +26,7 @@ class GetEntityAliasResult(dict):
21
26
  id: str,
22
27
  last_update_time: str,
23
28
  merged_from_canonical_ids: Sequence[str],
24
- metadata: Mapping[str, Any],
29
+ metadata: Mapping[str, str],
25
30
  mount_accessor: str,
26
31
  mount_path: str,
27
32
  mount_type: str,
@@ -32,7 +37,7 @@ class GetEntityAliasResult(dict):
32
37
  :param str id: ID of the alias
33
38
  :param str last_update_time: Last update time of the alias
34
39
  :param Sequence[str] merged_from_canonical_ids: List of canonical IDs merged with this alias
35
- :param Mapping[str, Any] metadata: Arbitrary metadata
40
+ :param Mapping[str, str] metadata: Arbitrary metadata
36
41
  :param str mount_accessor: Authentication mount acccessor which this alias belongs to
37
42
  :param str mount_path: Authentication mount path which this alias belongs to
38
43
  :param str mount_type: Authentication mount type which this alias belongs to
@@ -91,7 +96,7 @@ class GetEntityAliasResult(dict):
91
96
 
92
97
  @property
93
98
  @pulumi.getter
94
- def metadata(self) -> Mapping[str, Any]:
99
+ def metadata(self) -> Mapping[str, str]:
95
100
  """
96
101
  Arbitrary metadata
97
102
  """
@@ -4,15 +4,70 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
13
18
  'AuthBackendTuneArgs',
19
+ 'AuthBackendTuneArgsDict',
14
20
  ]
15
21
 
22
+ MYPY = False
23
+
24
+ if not MYPY:
25
+ class AuthBackendTuneArgsDict(TypedDict):
26
+ allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
27
+ """
28
+ List of headers to whitelist and allowing
29
+ a plugin to include them in the response.
30
+ """
31
+ audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
32
+ """
33
+ Specifies the list of keys that will
34
+ not be HMAC'd by audit devices in the request data object.
35
+ """
36
+ audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
37
+ """
38
+ Specifies the list of keys that will
39
+ not be HMAC'd by audit devices in the response data object.
40
+ """
41
+ default_lease_ttl: NotRequired[pulumi.Input[str]]
42
+ """
43
+ Specifies the default time-to-live.
44
+ If set, this overrides the global default.
45
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
46
+ """
47
+ listing_visibility: NotRequired[pulumi.Input[str]]
48
+ """
49
+ Specifies whether to show this mount in
50
+ the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
51
+ """
52
+ max_lease_ttl: NotRequired[pulumi.Input[str]]
53
+ """
54
+ Specifies the maximum time-to-live.
55
+ If set, this overrides the global default.
56
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
57
+ """
58
+ passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
59
+ """
60
+ List of headers to whitelist and
61
+ pass from the request to the backend.
62
+ """
63
+ token_type: NotRequired[pulumi.Input[str]]
64
+ """
65
+ Specifies the type of tokens that should be returned by
66
+ the mount. Valid values are "default-service", "default-batch", "service", "batch".
67
+ """
68
+ elif False:
69
+ AuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any]
70
+
16
71
  @pulumi.input_type
17
72
  class AuthBackendTuneArgs:
18
73
  def __init__(__self__, *,
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
  from . import outputs
12
17
  from ._inputs import *
@@ -765,7 +770,7 @@ class AuthBackend(pulumi.CustomResource):
765
770
  oidc_response_types: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
766
771
  path: Optional[pulumi.Input[str]] = None,
767
772
  provider_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
768
- tune: Optional[pulumi.Input[pulumi.InputType['AuthBackendTuneArgs']]] = None,
773
+ tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
769
774
  type: Optional[pulumi.Input[str]] = None,
770
775
  __props__=None):
771
776
  """
@@ -801,9 +806,9 @@ class AuthBackend(pulumi.CustomResource):
801
806
  oidc_client_id="1234567890",
802
807
  oidc_client_secret="secret123456",
803
808
  bound_issuer="https://myco.auth0.com/",
804
- tune=vault.jwt.AuthBackendTuneArgs(
805
- listing_visibility="unauth",
806
- ))
809
+ tune={
810
+ "listing_visibility": "unauth",
811
+ })
807
812
  ```
808
813
 
809
814
  Configuring the auth backend with a `provider_config:
@@ -908,9 +913,9 @@ class AuthBackend(pulumi.CustomResource):
908
913
  oidc_client_id="1234567890",
909
914
  oidc_client_secret="secret123456",
910
915
  bound_issuer="https://myco.auth0.com/",
911
- tune=vault.jwt.AuthBackendTuneArgs(
912
- listing_visibility="unauth",
913
- ))
916
+ tune={
917
+ "listing_visibility": "unauth",
918
+ })
914
919
  ```
915
920
 
916
921
  Configuring the auth backend with a `provider_config:
@@ -979,7 +984,7 @@ class AuthBackend(pulumi.CustomResource):
979
984
  oidc_response_types: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
980
985
  path: Optional[pulumi.Input[str]] = None,
981
986
  provider_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
982
- tune: Optional[pulumi.Input[pulumi.InputType['AuthBackendTuneArgs']]] = None,
987
+ tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
983
988
  type: Optional[pulumi.Input[str]] = None,
984
989
  __props__=None):
985
990
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
@@ -1044,7 +1049,7 @@ class AuthBackend(pulumi.CustomResource):
1044
1049
  oidc_response_types: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1045
1050
  path: Optional[pulumi.Input[str]] = None,
1046
1051
  provider_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1047
- tune: Optional[pulumi.Input[pulumi.InputType['AuthBackendTuneArgs']]] = None,
1052
+ tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
1048
1053
  type: Optional[pulumi.Input[str]] = None) -> 'AuthBackend':
1049
1054
  """
1050
1055
  Get an existing AuthBackend resource's state with the given name, id, and optional extra
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
@@ -19,10 +24,10 @@ class AuthBackendRoleArgs:
19
24
  allowed_redirect_uris: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
20
25
  backend: Optional[pulumi.Input[str]] = None,
21
26
  bound_audiences: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
22
- bound_claims: Optional[pulumi.Input[Mapping[str, Any]]] = None,
27
+ bound_claims: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
23
28
  bound_claims_type: Optional[pulumi.Input[str]] = None,
24
29
  bound_subject: Optional[pulumi.Input[str]] = None,
25
- claim_mappings: Optional[pulumi.Input[Mapping[str, Any]]] = None,
30
+ claim_mappings: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
26
31
  clock_skew_leeway: Optional[pulumi.Input[int]] = None,
27
32
  disable_bound_claims_parsing: Optional[pulumi.Input[bool]] = None,
28
33
  expiration_leeway: Optional[pulumi.Input[int]] = None,
@@ -55,7 +60,7 @@ class AuthBackendRoleArgs:
55
60
  Defaults to `jwt`.
56
61
  :param pulumi.Input[Sequence[pulumi.Input[str]]] bound_audiences: (Required for roles of type `jwt`, optional for roles of
57
62
  type `oidc`) List of `aud` claims to match against. Any match is sufficient.
58
- :param pulumi.Input[Mapping[str, Any]] bound_claims: If set, a map of claims to values to match against.
63
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] bound_claims: If set, a map of claims to values to match against.
59
64
  A claim's value must be a string, which may contain one value or multiple
60
65
  comma-separated values, e.g. `"red"` or `"red,green,blue"`.
61
66
  :param pulumi.Input[str] bound_claims_type: How to interpret values in the claims/values
@@ -63,7 +68,7 @@ class AuthBackendRoleArgs:
63
68
  match). Requires Vault 1.4.0 or above.
64
69
  :param pulumi.Input[str] bound_subject: If set, requires that the `sub` claim matches
65
70
  this value.
66
- :param pulumi.Input[Mapping[str, Any]] claim_mappings: If set, a map of claims (keys) to be copied
71
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] claim_mappings: If set, a map of claims (keys) to be copied
67
72
  to specified metadata fields (values).
68
73
  :param pulumi.Input[int] clock_skew_leeway: The amount of leeway to add to all claims to account for clock skew, in
69
74
  seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
@@ -229,7 +234,7 @@ class AuthBackendRoleArgs:
229
234
 
230
235
  @property
231
236
  @pulumi.getter(name="boundClaims")
232
- def bound_claims(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
237
+ def bound_claims(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
233
238
  """
234
239
  If set, a map of claims to values to match against.
235
240
  A claim's value must be a string, which may contain one value or multiple
@@ -238,7 +243,7 @@ class AuthBackendRoleArgs:
238
243
  return pulumi.get(self, "bound_claims")
239
244
 
240
245
  @bound_claims.setter
241
- def bound_claims(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
246
+ def bound_claims(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
242
247
  pulumi.set(self, "bound_claims", value)
243
248
 
244
249
  @property
@@ -270,7 +275,7 @@ class AuthBackendRoleArgs:
270
275
 
271
276
  @property
272
277
  @pulumi.getter(name="claimMappings")
273
- def claim_mappings(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
278
+ def claim_mappings(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
274
279
  """
275
280
  If set, a map of claims (keys) to be copied
276
281
  to specified metadata fields (values).
@@ -278,7 +283,7 @@ class AuthBackendRoleArgs:
278
283
  return pulumi.get(self, "claim_mappings")
279
284
 
280
285
  @claim_mappings.setter
281
- def claim_mappings(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
286
+ def claim_mappings(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
282
287
  pulumi.set(self, "claim_mappings", value)
283
288
 
284
289
  @property
@@ -547,10 +552,10 @@ class _AuthBackendRoleState:
547
552
  allowed_redirect_uris: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
548
553
  backend: Optional[pulumi.Input[str]] = None,
549
554
  bound_audiences: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
550
- bound_claims: Optional[pulumi.Input[Mapping[str, Any]]] = None,
555
+ bound_claims: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
551
556
  bound_claims_type: Optional[pulumi.Input[str]] = None,
552
557
  bound_subject: Optional[pulumi.Input[str]] = None,
553
- claim_mappings: Optional[pulumi.Input[Mapping[str, Any]]] = None,
558
+ claim_mappings: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
554
559
  clock_skew_leeway: Optional[pulumi.Input[int]] = None,
555
560
  disable_bound_claims_parsing: Optional[pulumi.Input[bool]] = None,
556
561
  expiration_leeway: Optional[pulumi.Input[int]] = None,
@@ -581,7 +586,7 @@ class _AuthBackendRoleState:
581
586
  Defaults to `jwt`.
582
587
  :param pulumi.Input[Sequence[pulumi.Input[str]]] bound_audiences: (Required for roles of type `jwt`, optional for roles of
583
588
  type `oidc`) List of `aud` claims to match against. Any match is sufficient.
584
- :param pulumi.Input[Mapping[str, Any]] bound_claims: If set, a map of claims to values to match against.
589
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] bound_claims: If set, a map of claims to values to match against.
585
590
  A claim's value must be a string, which may contain one value or multiple
586
591
  comma-separated values, e.g. `"red"` or `"red,green,blue"`.
587
592
  :param pulumi.Input[str] bound_claims_type: How to interpret values in the claims/values
@@ -589,7 +594,7 @@ class _AuthBackendRoleState:
589
594
  match). Requires Vault 1.4.0 or above.
590
595
  :param pulumi.Input[str] bound_subject: If set, requires that the `sub` claim matches
591
596
  this value.
592
- :param pulumi.Input[Mapping[str, Any]] claim_mappings: If set, a map of claims (keys) to be copied
597
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] claim_mappings: If set, a map of claims (keys) to be copied
593
598
  to specified metadata fields (values).
594
599
  :param pulumi.Input[int] clock_skew_leeway: The amount of leeway to add to all claims to account for clock skew, in
595
600
  seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
@@ -735,7 +740,7 @@ class _AuthBackendRoleState:
735
740
 
736
741
  @property
737
742
  @pulumi.getter(name="boundClaims")
738
- def bound_claims(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
743
+ def bound_claims(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
739
744
  """
740
745
  If set, a map of claims to values to match against.
741
746
  A claim's value must be a string, which may contain one value or multiple
@@ -744,7 +749,7 @@ class _AuthBackendRoleState:
744
749
  return pulumi.get(self, "bound_claims")
745
750
 
746
751
  @bound_claims.setter
747
- def bound_claims(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
752
+ def bound_claims(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
748
753
  pulumi.set(self, "bound_claims", value)
749
754
 
750
755
  @property
@@ -776,7 +781,7 @@ class _AuthBackendRoleState:
776
781
 
777
782
  @property
778
783
  @pulumi.getter(name="claimMappings")
779
- def claim_mappings(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
784
+ def claim_mappings(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
780
785
  """
781
786
  If set, a map of claims (keys) to be copied
782
787
  to specified metadata fields (values).
@@ -784,7 +789,7 @@ class _AuthBackendRoleState:
784
789
  return pulumi.get(self, "claim_mappings")
785
790
 
786
791
  @claim_mappings.setter
787
- def claim_mappings(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
792
+ def claim_mappings(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
788
793
  pulumi.set(self, "claim_mappings", value)
789
794
 
790
795
  @property
@@ -1081,10 +1086,10 @@ class AuthBackendRole(pulumi.CustomResource):
1081
1086
  allowed_redirect_uris: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1082
1087
  backend: Optional[pulumi.Input[str]] = None,
1083
1088
  bound_audiences: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1084
- bound_claims: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1089
+ bound_claims: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1085
1090
  bound_claims_type: Optional[pulumi.Input[str]] = None,
1086
1091
  bound_subject: Optional[pulumi.Input[str]] = None,
1087
- claim_mappings: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1092
+ claim_mappings: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1088
1093
  clock_skew_leeway: Optional[pulumi.Input[int]] = None,
1089
1094
  disable_bound_claims_parsing: Optional[pulumi.Input[bool]] = None,
1090
1095
  expiration_leeway: Optional[pulumi.Input[int]] = None,
@@ -1176,7 +1181,7 @@ class AuthBackendRole(pulumi.CustomResource):
1176
1181
  Defaults to `jwt`.
1177
1182
  :param pulumi.Input[Sequence[pulumi.Input[str]]] bound_audiences: (Required for roles of type `jwt`, optional for roles of
1178
1183
  type `oidc`) List of `aud` claims to match against. Any match is sufficient.
1179
- :param pulumi.Input[Mapping[str, Any]] bound_claims: If set, a map of claims to values to match against.
1184
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] bound_claims: If set, a map of claims to values to match against.
1180
1185
  A claim's value must be a string, which may contain one value or multiple
1181
1186
  comma-separated values, e.g. `"red"` or `"red,green,blue"`.
1182
1187
  :param pulumi.Input[str] bound_claims_type: How to interpret values in the claims/values
@@ -1184,7 +1189,7 @@ class AuthBackendRole(pulumi.CustomResource):
1184
1189
  match). Requires Vault 1.4.0 or above.
1185
1190
  :param pulumi.Input[str] bound_subject: If set, requires that the `sub` claim matches
1186
1191
  this value.
1187
- :param pulumi.Input[Mapping[str, Any]] claim_mappings: If set, a map of claims (keys) to be copied
1192
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] claim_mappings: If set, a map of claims (keys) to be copied
1188
1193
  to specified metadata fields (values).
1189
1194
  :param pulumi.Input[int] clock_skew_leeway: The amount of leeway to add to all claims to account for clock skew, in
1190
1195
  seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
@@ -1314,10 +1319,10 @@ class AuthBackendRole(pulumi.CustomResource):
1314
1319
  allowed_redirect_uris: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1315
1320
  backend: Optional[pulumi.Input[str]] = None,
1316
1321
  bound_audiences: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1317
- bound_claims: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1322
+ bound_claims: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1318
1323
  bound_claims_type: Optional[pulumi.Input[str]] = None,
1319
1324
  bound_subject: Optional[pulumi.Input[str]] = None,
1320
- claim_mappings: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1325
+ claim_mappings: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1321
1326
  clock_skew_leeway: Optional[pulumi.Input[int]] = None,
1322
1327
  disable_bound_claims_parsing: Optional[pulumi.Input[bool]] = None,
1323
1328
  expiration_leeway: Optional[pulumi.Input[int]] = None,
@@ -1395,10 +1400,10 @@ class AuthBackendRole(pulumi.CustomResource):
1395
1400
  allowed_redirect_uris: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1396
1401
  backend: Optional[pulumi.Input[str]] = None,
1397
1402
  bound_audiences: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1398
- bound_claims: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1403
+ bound_claims: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1399
1404
  bound_claims_type: Optional[pulumi.Input[str]] = None,
1400
1405
  bound_subject: Optional[pulumi.Input[str]] = None,
1401
- claim_mappings: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1406
+ claim_mappings: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1402
1407
  clock_skew_leeway: Optional[pulumi.Input[int]] = None,
1403
1408
  disable_bound_claims_parsing: Optional[pulumi.Input[bool]] = None,
1404
1409
  expiration_leeway: Optional[pulumi.Input[int]] = None,
@@ -1434,7 +1439,7 @@ class AuthBackendRole(pulumi.CustomResource):
1434
1439
  Defaults to `jwt`.
1435
1440
  :param pulumi.Input[Sequence[pulumi.Input[str]]] bound_audiences: (Required for roles of type `jwt`, optional for roles of
1436
1441
  type `oidc`) List of `aud` claims to match against. Any match is sufficient.
1437
- :param pulumi.Input[Mapping[str, Any]] bound_claims: If set, a map of claims to values to match against.
1442
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] bound_claims: If set, a map of claims to values to match against.
1438
1443
  A claim's value must be a string, which may contain one value or multiple
1439
1444
  comma-separated values, e.g. `"red"` or `"red,green,blue"`.
1440
1445
  :param pulumi.Input[str] bound_claims_type: How to interpret values in the claims/values
@@ -1442,7 +1447,7 @@ class AuthBackendRole(pulumi.CustomResource):
1442
1447
  match). Requires Vault 1.4.0 or above.
1443
1448
  :param pulumi.Input[str] bound_subject: If set, requires that the `sub` claim matches
1444
1449
  this value.
1445
- :param pulumi.Input[Mapping[str, Any]] claim_mappings: If set, a map of claims (keys) to be copied
1450
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] claim_mappings: If set, a map of claims (keys) to be copied
1446
1451
  to specified metadata fields (values).
1447
1452
  :param pulumi.Input[int] clock_skew_leeway: The amount of leeway to add to all claims to account for clock skew, in
1448
1453
  seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
@@ -1552,7 +1557,7 @@ class AuthBackendRole(pulumi.CustomResource):
1552
1557
 
1553
1558
  @property
1554
1559
  @pulumi.getter(name="boundClaims")
1555
- def bound_claims(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
1560
+ def bound_claims(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
1556
1561
  """
1557
1562
  If set, a map of claims to values to match against.
1558
1563
  A claim's value must be a string, which may contain one value or multiple
@@ -1581,7 +1586,7 @@ class AuthBackendRole(pulumi.CustomResource):
1581
1586
 
1582
1587
  @property
1583
1588
  @pulumi.getter(name="claimMappings")
1584
- def claim_mappings(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
1589
+ def claim_mappings(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
1585
1590
  """
1586
1591
  If set, a map of claims (keys) to be copied
1587
1592
  to specified metadata fields (values).
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendArgs', 'SecretBackend']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretRoleArgs', 'SecretRole']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretScopeArgs', 'SecretScope']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['AuthBackendConfigArgs', 'AuthBackendConfig']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -176,9 +181,6 @@ def get_auth_backend_config(backend: Optional[str] = None,
176
181
  kubernetes_host=pulumi.get(__ret__, 'kubernetes_host'),
177
182
  namespace=pulumi.get(__ret__, 'namespace'),
178
183
  pem_keys=pulumi.get(__ret__, 'pem_keys'))
179
-
180
-
181
- @_utilities.lift_output_func(get_auth_backend_config)
182
184
  def get_auth_backend_config_output(backend: Optional[pulumi.Input[Optional[str]]] = None,
183
185
  disable_iss_validation: Optional[pulumi.Input[Optional[bool]]] = None,
184
186
  disable_local_ca_jwt: Optional[pulumi.Input[Optional[bool]]] = None,
@@ -205,4 +207,24 @@ def get_auth_backend_config_output(backend: Optional[pulumi.Input[Optional[str]]
205
207
  *Available only for Vault Enterprise*.
206
208
  :param Sequence[str] pem_keys: Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
207
209
  """
208
- ...
210
+ __args__ = dict()
211
+ __args__['backend'] = backend
212
+ __args__['disableIssValidation'] = disable_iss_validation
213
+ __args__['disableLocalCaJwt'] = disable_local_ca_jwt
214
+ __args__['issuer'] = issuer
215
+ __args__['kubernetesCaCert'] = kubernetes_ca_cert
216
+ __args__['kubernetesHost'] = kubernetes_host
217
+ __args__['namespace'] = namespace
218
+ __args__['pemKeys'] = pem_keys
219
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
220
+ __ret__ = pulumi.runtime.invoke_output('vault:kubernetes/getAuthBackendConfig:getAuthBackendConfig', __args__, opts=opts, typ=GetAuthBackendConfigResult)
221
+ return __ret__.apply(lambda __response__: GetAuthBackendConfigResult(
222
+ backend=pulumi.get(__response__, 'backend'),
223
+ disable_iss_validation=pulumi.get(__response__, 'disable_iss_validation'),
224
+ disable_local_ca_jwt=pulumi.get(__response__, 'disable_local_ca_jwt'),
225
+ id=pulumi.get(__response__, 'id'),
226
+ issuer=pulumi.get(__response__, 'issuer'),
227
+ kubernetes_ca_cert=pulumi.get(__response__, 'kubernetes_ca_cert'),
228
+ kubernetes_host=pulumi.get(__response__, 'kubernetes_host'),
229
+ namespace=pulumi.get(__response__, 'namespace'),
230
+ pem_keys=pulumi.get(__response__, 'pem_keys')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -336,9 +341,6 @@ def get_auth_backend_role(audience: Optional[str] = None,
336
341
  token_policies=pulumi.get(__ret__, 'token_policies'),
337
342
  token_ttl=pulumi.get(__ret__, 'token_ttl'),
338
343
  token_type=pulumi.get(__ret__, 'token_type'))
339
-
340
-
341
- @_utilities.lift_output_func(get_auth_backend_role)
342
344
  def get_auth_backend_role_output(audience: Optional[pulumi.Input[Optional[str]]] = None,
343
345
  backend: Optional[pulumi.Input[Optional[str]]] = None,
344
346
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
@@ -395,4 +397,37 @@ def get_auth_backend_role_output(audience: Optional[pulumi.Input[Optional[str]]]
395
397
  `default-service` and `default-batch` which specify the type to return unless the client
396
398
  requests a different type at generation time.
397
399
  """
398
- ...
400
+ __args__ = dict()
401
+ __args__['audience'] = audience
402
+ __args__['backend'] = backend
403
+ __args__['namespace'] = namespace
404
+ __args__['roleName'] = role_name
405
+ __args__['tokenBoundCidrs'] = token_bound_cidrs
406
+ __args__['tokenExplicitMaxTtl'] = token_explicit_max_ttl
407
+ __args__['tokenMaxTtl'] = token_max_ttl
408
+ __args__['tokenNoDefaultPolicy'] = token_no_default_policy
409
+ __args__['tokenNumUses'] = token_num_uses
410
+ __args__['tokenPeriod'] = token_period
411
+ __args__['tokenPolicies'] = token_policies
412
+ __args__['tokenTtl'] = token_ttl
413
+ __args__['tokenType'] = token_type
414
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
415
+ __ret__ = pulumi.runtime.invoke_output('vault:kubernetes/getAuthBackendRole:getAuthBackendRole', __args__, opts=opts, typ=GetAuthBackendRoleResult)
416
+ return __ret__.apply(lambda __response__: GetAuthBackendRoleResult(
417
+ alias_name_source=pulumi.get(__response__, 'alias_name_source'),
418
+ audience=pulumi.get(__response__, 'audience'),
419
+ backend=pulumi.get(__response__, 'backend'),
420
+ bound_service_account_names=pulumi.get(__response__, 'bound_service_account_names'),
421
+ bound_service_account_namespaces=pulumi.get(__response__, 'bound_service_account_namespaces'),
422
+ id=pulumi.get(__response__, 'id'),
423
+ namespace=pulumi.get(__response__, 'namespace'),
424
+ role_name=pulumi.get(__response__, 'role_name'),
425
+ token_bound_cidrs=pulumi.get(__response__, 'token_bound_cidrs'),
426
+ token_explicit_max_ttl=pulumi.get(__response__, 'token_explicit_max_ttl'),
427
+ token_max_ttl=pulumi.get(__response__, 'token_max_ttl'),
428
+ token_no_default_policy=pulumi.get(__response__, 'token_no_default_policy'),
429
+ token_num_uses=pulumi.get(__response__, 'token_num_uses'),
430
+ token_period=pulumi.get(__response__, 'token_period'),
431
+ token_policies=pulumi.get(__response__, 'token_policies'),
432
+ token_ttl=pulumi.get(__response__, 'token_ttl'),
433
+ token_type=pulumi.get(__response__, 'token_type')))