pulumi-vault 6.3.0a1723010642__py3-none-any.whl → 6.3.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +560 -0
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +19 -4
  4. pulumi_vault/ad/secret_backend.py +5 -0
  5. pulumi_vault/ad/secret_library.py +5 -0
  6. pulumi_vault/ad/secret_role.py +5 -0
  7. pulumi_vault/alicloud/auth_backend_role.py +5 -0
  8. pulumi_vault/approle/auth_backend_login.py +5 -0
  9. pulumi_vault/approle/auth_backend_role.py +5 -0
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
  11. pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
  12. pulumi_vault/audit.py +5 -0
  13. pulumi_vault/audit_request_header.py +5 -0
  14. pulumi_vault/auth_backend.py +10 -5
  15. pulumi_vault/aws/auth_backend_cert.py +5 -0
  16. pulumi_vault/aws/auth_backend_client.py +5 -0
  17. pulumi_vault/aws/auth_backend_config_identity.py +5 -0
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
  19. pulumi_vault/aws/auth_backend_login.py +12 -7
  20. pulumi_vault/aws/auth_backend_role.py +5 -0
  21. pulumi_vault/aws/auth_backend_role_tag.py +5 -0
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
  23. pulumi_vault/aws/auth_backend_sts_role.py +5 -0
  24. pulumi_vault/aws/get_access_credentials.py +31 -4
  25. pulumi_vault/aws/get_static_access_credentials.py +18 -4
  26. pulumi_vault/aws/secret_backend.py +5 -0
  27. pulumi_vault/aws/secret_backend_role.py +120 -0
  28. pulumi_vault/aws/secret_backend_static_role.py +5 -0
  29. pulumi_vault/azure/_inputs.py +24 -0
  30. pulumi_vault/azure/auth_backend_config.py +5 -0
  31. pulumi_vault/azure/auth_backend_role.py +5 -0
  32. pulumi_vault/azure/backend.py +5 -0
  33. pulumi_vault/azure/backend_role.py +23 -18
  34. pulumi_vault/azure/get_access_credentials.py +36 -4
  35. pulumi_vault/azure/outputs.py +5 -0
  36. pulumi_vault/cert_auth_backend_role.py +5 -0
  37. pulumi_vault/config/__init__.pyi +5 -0
  38. pulumi_vault/config/_inputs.py +21 -0
  39. pulumi_vault/config/outputs.py +5 -0
  40. pulumi_vault/config/ui_custom_message.py +24 -19
  41. pulumi_vault/config/vars.py +5 -0
  42. pulumi_vault/consul/secret_backend.py +5 -0
  43. pulumi_vault/consul/secret_backend_role.py +5 -0
  44. pulumi_vault/database/_inputs.py +2091 -140
  45. pulumi_vault/database/outputs.py +59 -54
  46. pulumi_vault/database/secret_backend_connection.py +115 -110
  47. pulumi_vault/database/secret_backend_role.py +25 -20
  48. pulumi_vault/database/secret_backend_static_role.py +11 -6
  49. pulumi_vault/database/secrets_mount.py +139 -134
  50. pulumi_vault/egp_policy.py +5 -0
  51. pulumi_vault/gcp/_inputs.py +111 -0
  52. pulumi_vault/gcp/auth_backend.py +15 -10
  53. pulumi_vault/gcp/auth_backend_role.py +5 -0
  54. pulumi_vault/gcp/get_auth_backend_role.py +42 -4
  55. pulumi_vault/gcp/outputs.py +5 -0
  56. pulumi_vault/gcp/secret_backend.py +5 -0
  57. pulumi_vault/gcp/secret_impersonated_account.py +5 -0
  58. pulumi_vault/gcp/secret_roleset.py +18 -13
  59. pulumi_vault/gcp/secret_static_account.py +18 -13
  60. pulumi_vault/generic/endpoint.py +5 -0
  61. pulumi_vault/generic/get_secret.py +25 -5
  62. pulumi_vault/generic/secret.py +12 -7
  63. pulumi_vault/get_auth_backend.py +21 -4
  64. pulumi_vault/get_auth_backends.py +16 -4
  65. pulumi_vault/get_namespace.py +18 -5
  66. pulumi_vault/get_namespaces.py +13 -4
  67. pulumi_vault/get_nomad_access_token.py +28 -8
  68. pulumi_vault/get_policy_document.py +27 -16
  69. pulumi_vault/get_raft_autopilot_state.py +26 -7
  70. pulumi_vault/github/_inputs.py +55 -0
  71. pulumi_vault/github/auth_backend.py +10 -5
  72. pulumi_vault/github/outputs.py +5 -0
  73. pulumi_vault/github/team.py +5 -0
  74. pulumi_vault/github/user.py +5 -0
  75. pulumi_vault/identity/entity.py +5 -0
  76. pulumi_vault/identity/entity_alias.py +5 -0
  77. pulumi_vault/identity/entity_policies.py +5 -0
  78. pulumi_vault/identity/get_entity.py +37 -7
  79. pulumi_vault/identity/get_group.py +42 -6
  80. pulumi_vault/identity/get_oidc_client_creds.py +16 -4
  81. pulumi_vault/identity/get_oidc_openid_config.py +26 -4
  82. pulumi_vault/identity/get_oidc_public_keys.py +16 -5
  83. pulumi_vault/identity/group.py +5 -0
  84. pulumi_vault/identity/group_alias.py +5 -0
  85. pulumi_vault/identity/group_member_entity_ids.py +5 -0
  86. pulumi_vault/identity/group_member_group_ids.py +5 -0
  87. pulumi_vault/identity/group_policies.py +5 -0
  88. pulumi_vault/identity/mfa_duo.py +5 -0
  89. pulumi_vault/identity/mfa_login_enforcement.py +5 -0
  90. pulumi_vault/identity/mfa_okta.py +5 -0
  91. pulumi_vault/identity/mfa_pingid.py +5 -0
  92. pulumi_vault/identity/mfa_totp.py +5 -0
  93. pulumi_vault/identity/oidc.py +5 -0
  94. pulumi_vault/identity/oidc_assignment.py +5 -0
  95. pulumi_vault/identity/oidc_client.py +5 -0
  96. pulumi_vault/identity/oidc_key.py +5 -0
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
  98. pulumi_vault/identity/oidc_provider.py +5 -0
  99. pulumi_vault/identity/oidc_role.py +5 -0
  100. pulumi_vault/identity/oidc_scope.py +5 -0
  101. pulumi_vault/identity/outputs.py +8 -3
  102. pulumi_vault/jwt/_inputs.py +55 -0
  103. pulumi_vault/jwt/auth_backend.py +14 -9
  104. pulumi_vault/jwt/auth_backend_role.py +33 -28
  105. pulumi_vault/jwt/outputs.py +5 -0
  106. pulumi_vault/kmip/secret_backend.py +5 -0
  107. pulumi_vault/kmip/secret_role.py +5 -0
  108. pulumi_vault/kmip/secret_scope.py +5 -0
  109. pulumi_vault/kubernetes/auth_backend_config.py +5 -0
  110. pulumi_vault/kubernetes/auth_backend_role.py +5 -0
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
  113. pulumi_vault/kubernetes/get_service_account_token.py +28 -4
  114. pulumi_vault/kubernetes/secret_backend.py +19 -14
  115. pulumi_vault/kubernetes/secret_backend_role.py +5 -0
  116. pulumi_vault/kv/_inputs.py +36 -4
  117. pulumi_vault/kv/get_secret.py +20 -5
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +24 -5
  119. pulumi_vault/kv/get_secret_v2.py +27 -6
  120. pulumi_vault/kv/get_secrets_list.py +15 -4
  121. pulumi_vault/kv/get_secrets_list_v2.py +18 -4
  122. pulumi_vault/kv/outputs.py +8 -3
  123. pulumi_vault/kv/secret.py +12 -7
  124. pulumi_vault/kv/secret_backend_v2.py +5 -0
  125. pulumi_vault/kv/secret_v2.py +46 -41
  126. pulumi_vault/ldap/auth_backend.py +5 -0
  127. pulumi_vault/ldap/auth_backend_group.py +5 -0
  128. pulumi_vault/ldap/auth_backend_user.py +5 -0
  129. pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
  130. pulumi_vault/ldap/get_static_credentials.py +23 -4
  131. pulumi_vault/ldap/secret_backend.py +19 -14
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
  133. pulumi_vault/ldap/secret_backend_library_set.py +5 -0
  134. pulumi_vault/ldap/secret_backend_static_role.py +5 -0
  135. pulumi_vault/managed/_inputs.py +205 -0
  136. pulumi_vault/managed/keys.py +20 -15
  137. pulumi_vault/managed/outputs.py +5 -0
  138. pulumi_vault/mfa_duo.py +5 -0
  139. pulumi_vault/mfa_okta.py +5 -0
  140. pulumi_vault/mfa_pingid.py +5 -0
  141. pulumi_vault/mfa_totp.py +5 -0
  142. pulumi_vault/mongodbatlas/secret_backend.py +5 -0
  143. pulumi_vault/mongodbatlas/secret_role.py +5 -0
  144. pulumi_vault/mount.py +35 -23
  145. pulumi_vault/namespace.py +19 -14
  146. pulumi_vault/nomad_secret_backend.py +5 -0
  147. pulumi_vault/nomad_secret_role.py +5 -0
  148. pulumi_vault/okta/_inputs.py +39 -0
  149. pulumi_vault/okta/auth_backend.py +31 -26
  150. pulumi_vault/okta/auth_backend_group.py +5 -0
  151. pulumi_vault/okta/auth_backend_user.py +5 -0
  152. pulumi_vault/okta/outputs.py +5 -0
  153. pulumi_vault/outputs.py +5 -0
  154. pulumi_vault/password_policy.py +5 -0
  155. pulumi_vault/pkisecret/_inputs.py +49 -8
  156. pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
  157. pulumi_vault/pkisecret/backend_config_est.py +24 -19
  158. pulumi_vault/pkisecret/get_backend_config_est.py +23 -5
  159. pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
  160. pulumi_vault/pkisecret/get_backend_issuers.py +18 -5
  161. pulumi_vault/pkisecret/get_backend_key.py +19 -4
  162. pulumi_vault/pkisecret/get_backend_keys.py +18 -5
  163. pulumi_vault/pkisecret/outputs.py +17 -12
  164. pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
  172. pulumi_vault/pkisecret/secret_backend_key.py +5 -0
  173. pulumi_vault/pkisecret/secret_backend_role.py +10 -5
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
  176. pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
  177. pulumi_vault/plugin.py +5 -0
  178. pulumi_vault/plugin_pinned_version.py +5 -0
  179. pulumi_vault/policy.py +5 -0
  180. pulumi_vault/provider.py +47 -42
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +5 -0
  183. pulumi_vault/quota_rate_limit.py +5 -0
  184. pulumi_vault/rabbitmq/_inputs.py +61 -0
  185. pulumi_vault/rabbitmq/outputs.py +5 -0
  186. pulumi_vault/rabbitmq/secret_backend.py +5 -0
  187. pulumi_vault/rabbitmq/secret_backend_role.py +43 -38
  188. pulumi_vault/raft_autopilot.py +5 -0
  189. pulumi_vault/raft_snapshot_agent_config.py +5 -0
  190. pulumi_vault/rgp_policy.py +5 -0
  191. pulumi_vault/saml/auth_backend.py +5 -0
  192. pulumi_vault/saml/auth_backend_role.py +19 -14
  193. pulumi_vault/secrets/_inputs.py +30 -0
  194. pulumi_vault/secrets/outputs.py +5 -0
  195. pulumi_vault/secrets/sync_association.py +7 -2
  196. pulumi_vault/secrets/sync_aws_destination.py +19 -14
  197. pulumi_vault/secrets/sync_azure_destination.py +19 -14
  198. pulumi_vault/secrets/sync_config.py +5 -0
  199. pulumi_vault/secrets/sync_gcp_destination.py +19 -14
  200. pulumi_vault/secrets/sync_gh_destination.py +5 -0
  201. pulumi_vault/secrets/sync_github_apps.py +5 -0
  202. pulumi_vault/secrets/sync_vercel_destination.py +5 -0
  203. pulumi_vault/ssh/_inputs.py +22 -0
  204. pulumi_vault/ssh/outputs.py +5 -0
  205. pulumi_vault/ssh/secret_backend_ca.py +5 -0
  206. pulumi_vault/ssh/secret_backend_role.py +38 -33
  207. pulumi_vault/terraformcloud/secret_backend.py +5 -0
  208. pulumi_vault/terraformcloud/secret_creds.py +5 -0
  209. pulumi_vault/terraformcloud/secret_role.py +5 -0
  210. pulumi_vault/token.py +5 -0
  211. pulumi_vault/tokenauth/auth_backend_role.py +5 -14
  212. pulumi_vault/transform/alphabet.py +5 -0
  213. pulumi_vault/transform/get_decode.py +38 -14
  214. pulumi_vault/transform/get_encode.py +38 -14
  215. pulumi_vault/transform/role.py +5 -0
  216. pulumi_vault/transform/template.py +19 -14
  217. pulumi_vault/transform/transformation.py +5 -0
  218. pulumi_vault/transit/get_decrypt.py +21 -4
  219. pulumi_vault/transit/get_encrypt.py +23 -4
  220. pulumi_vault/transit/secret_backend_key.py +12 -7
  221. pulumi_vault/transit/secret_cache_config.py +5 -0
  222. {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/METADATA +3 -2
  223. pulumi_vault-6.3.1.dist-info/RECORD +256 -0
  224. {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/WHEEL +1 -1
  225. pulumi_vault-6.3.0a1723010642.dist-info/RECORD +0 -256
  226. {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/top_level.txt +0 -0
@@ -4,17 +4,88 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
13
18
  'KeysAwArgs',
19
+ 'KeysAwArgsDict',
14
20
  'KeysAzureArgs',
21
+ 'KeysAzureArgsDict',
15
22
  'KeysPkcArgs',
23
+ 'KeysPkcArgsDict',
16
24
  ]
17
25
 
26
+ MYPY = False
27
+
28
+ if not MYPY:
29
+ class KeysAwArgsDict(TypedDict):
30
+ access_key: pulumi.Input[str]
31
+ """
32
+ The AWS access key to use
33
+ """
34
+ key_bits: pulumi.Input[str]
35
+ """
36
+ The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
37
+ """
38
+ key_type: pulumi.Input[str]
39
+ """
40
+ The type of key to use
41
+ """
42
+ kms_key: pulumi.Input[str]
43
+ """
44
+ An identifier for the key
45
+ """
46
+ name: pulumi.Input[str]
47
+ """
48
+ A unique lowercase name that serves as identifying the key
49
+ """
50
+ secret_key: pulumi.Input[str]
51
+ """
52
+ The AWS secret key to use
53
+ """
54
+ allow_generate_key: NotRequired[pulumi.Input[bool]]
55
+ """
56
+ If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
57
+ """
58
+ allow_replace_key: NotRequired[pulumi.Input[bool]]
59
+ """
60
+ Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
61
+ """
62
+ allow_store_key: NotRequired[pulumi.Input[bool]]
63
+ """
64
+ Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
65
+ """
66
+ any_mount: NotRequired[pulumi.Input[bool]]
67
+ """
68
+ Allow usage from any mount point within the namespace if 'true'
69
+ """
70
+ curve: NotRequired[pulumi.Input[str]]
71
+ """
72
+ The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
73
+ """
74
+ endpoint: NotRequired[pulumi.Input[str]]
75
+ """
76
+ Used to specify a custom AWS endpoint
77
+ """
78
+ region: NotRequired[pulumi.Input[str]]
79
+ """
80
+ The AWS region where the keys are stored (or will be stored)
81
+ """
82
+ uuid: NotRequired[pulumi.Input[str]]
83
+ """
84
+ ID of the managed key read from Vault
85
+ """
86
+ elif False:
87
+ KeysAwArgsDict: TypeAlias = Mapping[str, Any]
88
+
18
89
  @pulumi.input_type
19
90
  class KeysAwArgs:
20
91
  def __init__(__self__, *,
@@ -240,6 +311,71 @@ class KeysAwArgs:
240
311
  pulumi.set(self, "uuid", value)
241
312
 
242
313
 
314
+ if not MYPY:
315
+ class KeysAzureArgsDict(TypedDict):
316
+ client_id: pulumi.Input[str]
317
+ """
318
+ The client id for credentials to query the Azure APIs
319
+ """
320
+ client_secret: pulumi.Input[str]
321
+ """
322
+ The client secret for credentials to query the Azure APIs
323
+ """
324
+ key_name: pulumi.Input[str]
325
+ """
326
+ The Key Vault key to use for encryption and decryption
327
+ """
328
+ key_type: pulumi.Input[str]
329
+ """
330
+ The type of key to use
331
+ """
332
+ name: pulumi.Input[str]
333
+ """
334
+ A unique lowercase name that serves as identifying the key
335
+ """
336
+ tenant_id: pulumi.Input[str]
337
+ """
338
+ The tenant id for the Azure Active Directory organization
339
+ """
340
+ vault_name: pulumi.Input[str]
341
+ """
342
+ The Key Vault vault to use the encryption keys for encryption and decryption
343
+ """
344
+ allow_generate_key: NotRequired[pulumi.Input[bool]]
345
+ """
346
+ If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
347
+ """
348
+ allow_replace_key: NotRequired[pulumi.Input[bool]]
349
+ """
350
+ Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
351
+ """
352
+ allow_store_key: NotRequired[pulumi.Input[bool]]
353
+ """
354
+ Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
355
+ """
356
+ any_mount: NotRequired[pulumi.Input[bool]]
357
+ """
358
+ Allow usage from any mount point within the namespace if 'true'
359
+ """
360
+ environment: NotRequired[pulumi.Input[str]]
361
+ """
362
+ The Azure Cloud environment API endpoints to use
363
+ """
364
+ key_bits: NotRequired[pulumi.Input[str]]
365
+ """
366
+ The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
367
+ """
368
+ resource: NotRequired[pulumi.Input[str]]
369
+ """
370
+ The Azure Key Vault resource's DNS Suffix to connect to
371
+ """
372
+ uuid: NotRequired[pulumi.Input[str]]
373
+ """
374
+ ID of the managed key read from Vault
375
+ """
376
+ elif False:
377
+ KeysAzureArgsDict: TypeAlias = Mapping[str, Any]
378
+
243
379
  @pulumi.input_type
244
380
  class KeysAzureArgs:
245
381
  def __init__(__self__, *,
@@ -480,6 +616,75 @@ class KeysAzureArgs:
480
616
  pulumi.set(self, "uuid", value)
481
617
 
482
618
 
619
+ if not MYPY:
620
+ class KeysPkcArgsDict(TypedDict):
621
+ key_id: pulumi.Input[str]
622
+ """
623
+ The id of a PKCS#11 key to use
624
+ """
625
+ key_label: pulumi.Input[str]
626
+ """
627
+ The label of the key to use
628
+ """
629
+ library: pulumi.Input[str]
630
+ """
631
+ The name of the kms_library stanza to use from Vault's config to lookup the local library path
632
+ """
633
+ mechanism: pulumi.Input[str]
634
+ """
635
+ The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
636
+ """
637
+ name: pulumi.Input[str]
638
+ """
639
+ A unique lowercase name that serves as identifying the key
640
+ """
641
+ pin: pulumi.Input[str]
642
+ """
643
+ The PIN for login
644
+ """
645
+ allow_generate_key: NotRequired[pulumi.Input[bool]]
646
+ """
647
+ If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
648
+ """
649
+ allow_replace_key: NotRequired[pulumi.Input[bool]]
650
+ """
651
+ Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
652
+ """
653
+ allow_store_key: NotRequired[pulumi.Input[bool]]
654
+ """
655
+ Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
656
+ """
657
+ any_mount: NotRequired[pulumi.Input[bool]]
658
+ """
659
+ Allow usage from any mount point within the namespace if 'true'
660
+ """
661
+ curve: NotRequired[pulumi.Input[str]]
662
+ """
663
+ Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
664
+ """
665
+ force_rw_session: NotRequired[pulumi.Input[str]]
666
+ """
667
+ Force all operations to open up a read-write session to the HSM
668
+ """
669
+ key_bits: NotRequired[pulumi.Input[str]]
670
+ """
671
+ Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
672
+ """
673
+ slot: NotRequired[pulumi.Input[str]]
674
+ """
675
+ The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
676
+ """
677
+ token_label: NotRequired[pulumi.Input[str]]
678
+ """
679
+ The slot token label to use
680
+ """
681
+ uuid: NotRequired[pulumi.Input[str]]
682
+ """
683
+ ID of the managed key read from Vault
684
+ """
685
+ elif False:
686
+ KeysPkcArgsDict: TypeAlias = Mapping[str, Any]
687
+
483
688
  @pulumi.input_type
484
689
  class KeysPkcArgs:
485
690
  def __init__(__self__, *,
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
  from . import outputs
12
17
  from ._inputs import *
@@ -162,10 +167,10 @@ class Keys(pulumi.CustomResource):
162
167
  def __init__(__self__,
163
168
  resource_name: str,
164
169
  opts: Optional[pulumi.ResourceOptions] = None,
165
- aws: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysAwArgs']]]]] = None,
166
- azures: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysAzureArgs']]]]] = None,
170
+ aws: Optional[pulumi.Input[Sequence[pulumi.Input[Union['KeysAwArgs', 'KeysAwArgsDict']]]]] = None,
171
+ azures: Optional[pulumi.Input[Sequence[pulumi.Input[Union['KeysAzureArgs', 'KeysAzureArgsDict']]]]] = None,
167
172
  namespace: Optional[pulumi.Input[str]] = None,
168
- pkcs: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysPkcArgs']]]]] = None,
173
+ pkcs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['KeysPkcArgs', 'KeysPkcArgsDict']]]]] = None,
169
174
  __props__=None):
170
175
  """
171
176
  A resource that manages the lifecycle of all [Managed Keys](https://www.vaultproject.io/docs/enterprise/managed-keys) in Vault.
@@ -182,10 +187,10 @@ class Keys(pulumi.CustomResource):
182
187
 
183
188
  :param str resource_name: The name of the resource.
184
189
  :param pulumi.ResourceOptions opts: Options for the resource.
185
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysAwArgs']]]] aws: Configuration block for AWS Managed Keys
186
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysAzureArgs']]]] azures: Configuration block for Azure Managed Keys
190
+ :param pulumi.Input[Sequence[pulumi.Input[Union['KeysAwArgs', 'KeysAwArgsDict']]]] aws: Configuration block for AWS Managed Keys
191
+ :param pulumi.Input[Sequence[pulumi.Input[Union['KeysAzureArgs', 'KeysAzureArgsDict']]]] azures: Configuration block for Azure Managed Keys
187
192
  :param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
188
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysPkcArgs']]]] pkcs: Configuration block for PKCS Managed Keys
193
+ :param pulumi.Input[Sequence[pulumi.Input[Union['KeysPkcArgs', 'KeysPkcArgsDict']]]] pkcs: Configuration block for PKCS Managed Keys
189
194
  """
190
195
  ...
191
196
  @overload
@@ -221,10 +226,10 @@ class Keys(pulumi.CustomResource):
221
226
  def _internal_init(__self__,
222
227
  resource_name: str,
223
228
  opts: Optional[pulumi.ResourceOptions] = None,
224
- aws: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysAwArgs']]]]] = None,
225
- azures: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysAzureArgs']]]]] = None,
229
+ aws: Optional[pulumi.Input[Sequence[pulumi.Input[Union['KeysAwArgs', 'KeysAwArgsDict']]]]] = None,
230
+ azures: Optional[pulumi.Input[Sequence[pulumi.Input[Union['KeysAzureArgs', 'KeysAzureArgsDict']]]]] = None,
226
231
  namespace: Optional[pulumi.Input[str]] = None,
227
- pkcs: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysPkcArgs']]]]] = None,
232
+ pkcs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['KeysPkcArgs', 'KeysPkcArgsDict']]]]] = None,
228
233
  __props__=None):
229
234
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
230
235
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -248,10 +253,10 @@ class Keys(pulumi.CustomResource):
248
253
  def get(resource_name: str,
249
254
  id: pulumi.Input[str],
250
255
  opts: Optional[pulumi.ResourceOptions] = None,
251
- aws: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysAwArgs']]]]] = None,
252
- azures: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysAzureArgs']]]]] = None,
256
+ aws: Optional[pulumi.Input[Sequence[pulumi.Input[Union['KeysAwArgs', 'KeysAwArgsDict']]]]] = None,
257
+ azures: Optional[pulumi.Input[Sequence[pulumi.Input[Union['KeysAzureArgs', 'KeysAzureArgsDict']]]]] = None,
253
258
  namespace: Optional[pulumi.Input[str]] = None,
254
- pkcs: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysPkcArgs']]]]] = None) -> 'Keys':
259
+ pkcs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['KeysPkcArgs', 'KeysPkcArgsDict']]]]] = None) -> 'Keys':
255
260
  """
256
261
  Get an existing Keys resource's state with the given name, id, and optional extra
257
262
  properties used to qualify the lookup.
@@ -259,10 +264,10 @@ class Keys(pulumi.CustomResource):
259
264
  :param str resource_name: The unique name of the resulting resource.
260
265
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
261
266
  :param pulumi.ResourceOptions opts: Options for the resource.
262
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysAwArgs']]]] aws: Configuration block for AWS Managed Keys
263
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysAzureArgs']]]] azures: Configuration block for Azure Managed Keys
267
+ :param pulumi.Input[Sequence[pulumi.Input[Union['KeysAwArgs', 'KeysAwArgsDict']]]] aws: Configuration block for AWS Managed Keys
268
+ :param pulumi.Input[Sequence[pulumi.Input[Union['KeysAzureArgs', 'KeysAzureArgsDict']]]] azures: Configuration block for Azure Managed Keys
264
269
  :param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
265
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysPkcArgs']]]] pkcs: Configuration block for PKCS Managed Keys
270
+ :param pulumi.Input[Sequence[pulumi.Input[Union['KeysPkcArgs', 'KeysPkcArgsDict']]]] pkcs: Configuration block for PKCS Managed Keys
266
271
  """
267
272
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
268
273
 
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
pulumi_vault/mfa_duo.py CHANGED
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['MfaDuoArgs', 'MfaDuo']
pulumi_vault/mfa_okta.py CHANGED
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['MfaOktaArgs', 'MfaOkta']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['MfaPingidArgs', 'MfaPingid']
pulumi_vault/mfa_totp.py CHANGED
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['MfaTotpArgs', 'MfaTotp']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendArgs', 'SecretBackend']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretRoleArgs', 'SecretRole']
pulumi_vault/mount.py CHANGED
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['MountArgs', 'Mount']
@@ -29,7 +34,7 @@ class MountArgs:
29
34
  local: Optional[pulumi.Input[bool]] = None,
30
35
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
31
36
  namespace: Optional[pulumi.Input[str]] = None,
32
- options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
37
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
33
38
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
34
39
  plugin_version: Optional[pulumi.Input[str]] = None,
35
40
  seal_wrap: Optional[pulumi.Input[bool]] = None):
@@ -49,14 +54,15 @@ class MountArgs:
49
54
  :param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
50
55
  :param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
51
56
  not provided, this will default to Vault's OIDC default key.
52
- :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
57
+ :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
58
+ listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
53
59
  :param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
54
60
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
55
61
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
56
62
  The value should not contain leading or trailing forward slashes.
57
63
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
58
64
  *Available only for Vault Enterprise*.
59
- :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
65
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
60
66
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to
61
67
  the plugin.
62
68
  :param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
@@ -240,7 +246,8 @@ class MountArgs:
240
246
  @pulumi.getter(name="listingVisibility")
241
247
  def listing_visibility(self) -> Optional[pulumi.Input[str]]:
242
248
  """
243
- Specifies whether to show this mount in the UI-specific listing endpoint
249
+ Specifies whether to show this mount in the UI-specific
250
+ listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
244
251
  """
245
252
  return pulumi.get(self, "listing_visibility")
246
253
 
@@ -289,14 +296,14 @@ class MountArgs:
289
296
 
290
297
  @property
291
298
  @pulumi.getter
292
- def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
299
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
293
300
  """
294
301
  Specifies mount type specific options that are passed to the backend
295
302
  """
296
303
  return pulumi.get(self, "options")
297
304
 
298
305
  @options.setter
299
- def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
306
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
300
307
  pulumi.set(self, "options", value)
301
308
 
302
309
  @property
@@ -356,7 +363,7 @@ class _MountState:
356
363
  local: Optional[pulumi.Input[bool]] = None,
357
364
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
358
365
  namespace: Optional[pulumi.Input[str]] = None,
359
- options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
366
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
360
367
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
361
368
  path: Optional[pulumi.Input[str]] = None,
362
369
  plugin_version: Optional[pulumi.Input[str]] = None,
@@ -377,14 +384,15 @@ class _MountState:
377
384
  :param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
378
385
  :param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
379
386
  not provided, this will default to Vault's OIDC default key.
380
- :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
387
+ :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
388
+ listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
381
389
  :param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
382
390
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
383
391
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
384
392
  The value should not contain leading or trailing forward slashes.
385
393
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
386
394
  *Available only for Vault Enterprise*.
387
- :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
395
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
388
396
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to
389
397
  the plugin.
390
398
  :param pulumi.Input[str] path: Where the secret backend will be mounted
@@ -562,7 +570,8 @@ class _MountState:
562
570
  @pulumi.getter(name="listingVisibility")
563
571
  def listing_visibility(self) -> Optional[pulumi.Input[str]]:
564
572
  """
565
- Specifies whether to show this mount in the UI-specific listing endpoint
573
+ Specifies whether to show this mount in the UI-specific
574
+ listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
566
575
  """
567
576
  return pulumi.get(self, "listing_visibility")
568
577
 
@@ -611,14 +620,14 @@ class _MountState:
611
620
 
612
621
  @property
613
622
  @pulumi.getter
614
- def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
623
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
615
624
  """
616
625
  Specifies mount type specific options that are passed to the backend
617
626
  """
618
627
  return pulumi.get(self, "options")
619
628
 
620
629
  @options.setter
621
- def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
630
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
622
631
  pulumi.set(self, "options", value)
623
632
 
624
633
  @property
@@ -703,7 +712,7 @@ class Mount(pulumi.CustomResource):
703
712
  local: Optional[pulumi.Input[bool]] = None,
704
713
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
705
714
  namespace: Optional[pulumi.Input[str]] = None,
706
- options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
715
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
707
716
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
708
717
  path: Optional[pulumi.Input[str]] = None,
709
718
  plugin_version: Optional[pulumi.Input[str]] = None,
@@ -748,7 +757,7 @@ class Mount(pulumi.CustomResource):
748
757
  type="transit",
749
758
  description="This is an example transit secret engine mount",
750
759
  options={
751
- "convergent_encryption": False,
760
+ "convergent_encryption": "false",
752
761
  })
753
762
  ```
754
763
 
@@ -786,14 +795,15 @@ class Mount(pulumi.CustomResource):
786
795
  :param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
787
796
  :param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
788
797
  not provided, this will default to Vault's OIDC default key.
789
- :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
798
+ :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
799
+ listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
790
800
  :param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
791
801
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
792
802
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
793
803
  The value should not contain leading or trailing forward slashes.
794
804
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
795
805
  *Available only for Vault Enterprise*.
796
- :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
806
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
797
807
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to
798
808
  the plugin.
799
809
  :param pulumi.Input[str] path: Where the secret backend will be mounted
@@ -847,7 +857,7 @@ class Mount(pulumi.CustomResource):
847
857
  type="transit",
848
858
  description="This is an example transit secret engine mount",
849
859
  options={
850
- "convergent_encryption": False,
860
+ "convergent_encryption": "false",
851
861
  })
852
862
  ```
853
863
 
@@ -899,7 +909,7 @@ class Mount(pulumi.CustomResource):
899
909
  local: Optional[pulumi.Input[bool]] = None,
900
910
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
901
911
  namespace: Optional[pulumi.Input[str]] = None,
902
- options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
912
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
903
913
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
904
914
  path: Optional[pulumi.Input[str]] = None,
905
915
  plugin_version: Optional[pulumi.Input[str]] = None,
@@ -962,7 +972,7 @@ class Mount(pulumi.CustomResource):
962
972
  local: Optional[pulumi.Input[bool]] = None,
963
973
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
964
974
  namespace: Optional[pulumi.Input[str]] = None,
965
- options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
975
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
966
976
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
967
977
  path: Optional[pulumi.Input[str]] = None,
968
978
  plugin_version: Optional[pulumi.Input[str]] = None,
@@ -988,14 +998,15 @@ class Mount(pulumi.CustomResource):
988
998
  :param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
989
999
  :param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
990
1000
  not provided, this will default to Vault's OIDC default key.
991
- :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1001
+ :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
1002
+ listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
992
1003
  :param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
993
1004
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
994
1005
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
995
1006
  The value should not contain leading or trailing forward slashes.
996
1007
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
997
1008
  *Available only for Vault Enterprise*.
998
- :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
1009
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
999
1010
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to
1000
1011
  the plugin.
1001
1012
  :param pulumi.Input[str] path: Where the secret backend will be mounted
@@ -1118,7 +1129,8 @@ class Mount(pulumi.CustomResource):
1118
1129
  @pulumi.getter(name="listingVisibility")
1119
1130
  def listing_visibility(self) -> pulumi.Output[Optional[str]]:
1120
1131
  """
1121
- Specifies whether to show this mount in the UI-specific listing endpoint
1132
+ Specifies whether to show this mount in the UI-specific
1133
+ listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
1122
1134
  """
1123
1135
  return pulumi.get(self, "listing_visibility")
1124
1136
 
@@ -1151,7 +1163,7 @@ class Mount(pulumi.CustomResource):
1151
1163
 
1152
1164
  @property
1153
1165
  @pulumi.getter
1154
- def options(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
1166
+ def options(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
1155
1167
  """
1156
1168
  Specifies mount type specific options that are passed to the backend
1157
1169
  """