pulumi-vault 6.3.0a1723010642__py3-none-any.whl → 6.3.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +560 -0
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +19 -4
  4. pulumi_vault/ad/secret_backend.py +5 -0
  5. pulumi_vault/ad/secret_library.py +5 -0
  6. pulumi_vault/ad/secret_role.py +5 -0
  7. pulumi_vault/alicloud/auth_backend_role.py +5 -0
  8. pulumi_vault/approle/auth_backend_login.py +5 -0
  9. pulumi_vault/approle/auth_backend_role.py +5 -0
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
  11. pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
  12. pulumi_vault/audit.py +5 -0
  13. pulumi_vault/audit_request_header.py +5 -0
  14. pulumi_vault/auth_backend.py +10 -5
  15. pulumi_vault/aws/auth_backend_cert.py +5 -0
  16. pulumi_vault/aws/auth_backend_client.py +5 -0
  17. pulumi_vault/aws/auth_backend_config_identity.py +5 -0
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
  19. pulumi_vault/aws/auth_backend_login.py +12 -7
  20. pulumi_vault/aws/auth_backend_role.py +5 -0
  21. pulumi_vault/aws/auth_backend_role_tag.py +5 -0
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
  23. pulumi_vault/aws/auth_backend_sts_role.py +5 -0
  24. pulumi_vault/aws/get_access_credentials.py +31 -4
  25. pulumi_vault/aws/get_static_access_credentials.py +18 -4
  26. pulumi_vault/aws/secret_backend.py +5 -0
  27. pulumi_vault/aws/secret_backend_role.py +120 -0
  28. pulumi_vault/aws/secret_backend_static_role.py +5 -0
  29. pulumi_vault/azure/_inputs.py +24 -0
  30. pulumi_vault/azure/auth_backend_config.py +5 -0
  31. pulumi_vault/azure/auth_backend_role.py +5 -0
  32. pulumi_vault/azure/backend.py +5 -0
  33. pulumi_vault/azure/backend_role.py +23 -18
  34. pulumi_vault/azure/get_access_credentials.py +36 -4
  35. pulumi_vault/azure/outputs.py +5 -0
  36. pulumi_vault/cert_auth_backend_role.py +5 -0
  37. pulumi_vault/config/__init__.pyi +5 -0
  38. pulumi_vault/config/_inputs.py +21 -0
  39. pulumi_vault/config/outputs.py +5 -0
  40. pulumi_vault/config/ui_custom_message.py +24 -19
  41. pulumi_vault/config/vars.py +5 -0
  42. pulumi_vault/consul/secret_backend.py +5 -0
  43. pulumi_vault/consul/secret_backend_role.py +5 -0
  44. pulumi_vault/database/_inputs.py +2091 -140
  45. pulumi_vault/database/outputs.py +59 -54
  46. pulumi_vault/database/secret_backend_connection.py +115 -110
  47. pulumi_vault/database/secret_backend_role.py +25 -20
  48. pulumi_vault/database/secret_backend_static_role.py +11 -6
  49. pulumi_vault/database/secrets_mount.py +139 -134
  50. pulumi_vault/egp_policy.py +5 -0
  51. pulumi_vault/gcp/_inputs.py +111 -0
  52. pulumi_vault/gcp/auth_backend.py +15 -10
  53. pulumi_vault/gcp/auth_backend_role.py +5 -0
  54. pulumi_vault/gcp/get_auth_backend_role.py +42 -4
  55. pulumi_vault/gcp/outputs.py +5 -0
  56. pulumi_vault/gcp/secret_backend.py +5 -0
  57. pulumi_vault/gcp/secret_impersonated_account.py +5 -0
  58. pulumi_vault/gcp/secret_roleset.py +18 -13
  59. pulumi_vault/gcp/secret_static_account.py +18 -13
  60. pulumi_vault/generic/endpoint.py +5 -0
  61. pulumi_vault/generic/get_secret.py +25 -5
  62. pulumi_vault/generic/secret.py +12 -7
  63. pulumi_vault/get_auth_backend.py +21 -4
  64. pulumi_vault/get_auth_backends.py +16 -4
  65. pulumi_vault/get_namespace.py +18 -5
  66. pulumi_vault/get_namespaces.py +13 -4
  67. pulumi_vault/get_nomad_access_token.py +28 -8
  68. pulumi_vault/get_policy_document.py +27 -16
  69. pulumi_vault/get_raft_autopilot_state.py +26 -7
  70. pulumi_vault/github/_inputs.py +55 -0
  71. pulumi_vault/github/auth_backend.py +10 -5
  72. pulumi_vault/github/outputs.py +5 -0
  73. pulumi_vault/github/team.py +5 -0
  74. pulumi_vault/github/user.py +5 -0
  75. pulumi_vault/identity/entity.py +5 -0
  76. pulumi_vault/identity/entity_alias.py +5 -0
  77. pulumi_vault/identity/entity_policies.py +5 -0
  78. pulumi_vault/identity/get_entity.py +37 -7
  79. pulumi_vault/identity/get_group.py +42 -6
  80. pulumi_vault/identity/get_oidc_client_creds.py +16 -4
  81. pulumi_vault/identity/get_oidc_openid_config.py +26 -4
  82. pulumi_vault/identity/get_oidc_public_keys.py +16 -5
  83. pulumi_vault/identity/group.py +5 -0
  84. pulumi_vault/identity/group_alias.py +5 -0
  85. pulumi_vault/identity/group_member_entity_ids.py +5 -0
  86. pulumi_vault/identity/group_member_group_ids.py +5 -0
  87. pulumi_vault/identity/group_policies.py +5 -0
  88. pulumi_vault/identity/mfa_duo.py +5 -0
  89. pulumi_vault/identity/mfa_login_enforcement.py +5 -0
  90. pulumi_vault/identity/mfa_okta.py +5 -0
  91. pulumi_vault/identity/mfa_pingid.py +5 -0
  92. pulumi_vault/identity/mfa_totp.py +5 -0
  93. pulumi_vault/identity/oidc.py +5 -0
  94. pulumi_vault/identity/oidc_assignment.py +5 -0
  95. pulumi_vault/identity/oidc_client.py +5 -0
  96. pulumi_vault/identity/oidc_key.py +5 -0
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
  98. pulumi_vault/identity/oidc_provider.py +5 -0
  99. pulumi_vault/identity/oidc_role.py +5 -0
  100. pulumi_vault/identity/oidc_scope.py +5 -0
  101. pulumi_vault/identity/outputs.py +8 -3
  102. pulumi_vault/jwt/_inputs.py +55 -0
  103. pulumi_vault/jwt/auth_backend.py +14 -9
  104. pulumi_vault/jwt/auth_backend_role.py +33 -28
  105. pulumi_vault/jwt/outputs.py +5 -0
  106. pulumi_vault/kmip/secret_backend.py +5 -0
  107. pulumi_vault/kmip/secret_role.py +5 -0
  108. pulumi_vault/kmip/secret_scope.py +5 -0
  109. pulumi_vault/kubernetes/auth_backend_config.py +5 -0
  110. pulumi_vault/kubernetes/auth_backend_role.py +5 -0
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
  113. pulumi_vault/kubernetes/get_service_account_token.py +28 -4
  114. pulumi_vault/kubernetes/secret_backend.py +19 -14
  115. pulumi_vault/kubernetes/secret_backend_role.py +5 -0
  116. pulumi_vault/kv/_inputs.py +36 -4
  117. pulumi_vault/kv/get_secret.py +20 -5
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +24 -5
  119. pulumi_vault/kv/get_secret_v2.py +27 -6
  120. pulumi_vault/kv/get_secrets_list.py +15 -4
  121. pulumi_vault/kv/get_secrets_list_v2.py +18 -4
  122. pulumi_vault/kv/outputs.py +8 -3
  123. pulumi_vault/kv/secret.py +12 -7
  124. pulumi_vault/kv/secret_backend_v2.py +5 -0
  125. pulumi_vault/kv/secret_v2.py +46 -41
  126. pulumi_vault/ldap/auth_backend.py +5 -0
  127. pulumi_vault/ldap/auth_backend_group.py +5 -0
  128. pulumi_vault/ldap/auth_backend_user.py +5 -0
  129. pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
  130. pulumi_vault/ldap/get_static_credentials.py +23 -4
  131. pulumi_vault/ldap/secret_backend.py +19 -14
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
  133. pulumi_vault/ldap/secret_backend_library_set.py +5 -0
  134. pulumi_vault/ldap/secret_backend_static_role.py +5 -0
  135. pulumi_vault/managed/_inputs.py +205 -0
  136. pulumi_vault/managed/keys.py +20 -15
  137. pulumi_vault/managed/outputs.py +5 -0
  138. pulumi_vault/mfa_duo.py +5 -0
  139. pulumi_vault/mfa_okta.py +5 -0
  140. pulumi_vault/mfa_pingid.py +5 -0
  141. pulumi_vault/mfa_totp.py +5 -0
  142. pulumi_vault/mongodbatlas/secret_backend.py +5 -0
  143. pulumi_vault/mongodbatlas/secret_role.py +5 -0
  144. pulumi_vault/mount.py +35 -23
  145. pulumi_vault/namespace.py +19 -14
  146. pulumi_vault/nomad_secret_backend.py +5 -0
  147. pulumi_vault/nomad_secret_role.py +5 -0
  148. pulumi_vault/okta/_inputs.py +39 -0
  149. pulumi_vault/okta/auth_backend.py +31 -26
  150. pulumi_vault/okta/auth_backend_group.py +5 -0
  151. pulumi_vault/okta/auth_backend_user.py +5 -0
  152. pulumi_vault/okta/outputs.py +5 -0
  153. pulumi_vault/outputs.py +5 -0
  154. pulumi_vault/password_policy.py +5 -0
  155. pulumi_vault/pkisecret/_inputs.py +49 -8
  156. pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
  157. pulumi_vault/pkisecret/backend_config_est.py +24 -19
  158. pulumi_vault/pkisecret/get_backend_config_est.py +23 -5
  159. pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
  160. pulumi_vault/pkisecret/get_backend_issuers.py +18 -5
  161. pulumi_vault/pkisecret/get_backend_key.py +19 -4
  162. pulumi_vault/pkisecret/get_backend_keys.py +18 -5
  163. pulumi_vault/pkisecret/outputs.py +17 -12
  164. pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
  172. pulumi_vault/pkisecret/secret_backend_key.py +5 -0
  173. pulumi_vault/pkisecret/secret_backend_role.py +10 -5
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
  176. pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
  177. pulumi_vault/plugin.py +5 -0
  178. pulumi_vault/plugin_pinned_version.py +5 -0
  179. pulumi_vault/policy.py +5 -0
  180. pulumi_vault/provider.py +47 -42
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +5 -0
  183. pulumi_vault/quota_rate_limit.py +5 -0
  184. pulumi_vault/rabbitmq/_inputs.py +61 -0
  185. pulumi_vault/rabbitmq/outputs.py +5 -0
  186. pulumi_vault/rabbitmq/secret_backend.py +5 -0
  187. pulumi_vault/rabbitmq/secret_backend_role.py +43 -38
  188. pulumi_vault/raft_autopilot.py +5 -0
  189. pulumi_vault/raft_snapshot_agent_config.py +5 -0
  190. pulumi_vault/rgp_policy.py +5 -0
  191. pulumi_vault/saml/auth_backend.py +5 -0
  192. pulumi_vault/saml/auth_backend_role.py +19 -14
  193. pulumi_vault/secrets/_inputs.py +30 -0
  194. pulumi_vault/secrets/outputs.py +5 -0
  195. pulumi_vault/secrets/sync_association.py +7 -2
  196. pulumi_vault/secrets/sync_aws_destination.py +19 -14
  197. pulumi_vault/secrets/sync_azure_destination.py +19 -14
  198. pulumi_vault/secrets/sync_config.py +5 -0
  199. pulumi_vault/secrets/sync_gcp_destination.py +19 -14
  200. pulumi_vault/secrets/sync_gh_destination.py +5 -0
  201. pulumi_vault/secrets/sync_github_apps.py +5 -0
  202. pulumi_vault/secrets/sync_vercel_destination.py +5 -0
  203. pulumi_vault/ssh/_inputs.py +22 -0
  204. pulumi_vault/ssh/outputs.py +5 -0
  205. pulumi_vault/ssh/secret_backend_ca.py +5 -0
  206. pulumi_vault/ssh/secret_backend_role.py +38 -33
  207. pulumi_vault/terraformcloud/secret_backend.py +5 -0
  208. pulumi_vault/terraformcloud/secret_creds.py +5 -0
  209. pulumi_vault/terraformcloud/secret_role.py +5 -0
  210. pulumi_vault/token.py +5 -0
  211. pulumi_vault/tokenauth/auth_backend_role.py +5 -14
  212. pulumi_vault/transform/alphabet.py +5 -0
  213. pulumi_vault/transform/get_decode.py +38 -14
  214. pulumi_vault/transform/get_encode.py +38 -14
  215. pulumi_vault/transform/role.py +5 -0
  216. pulumi_vault/transform/template.py +19 -14
  217. pulumi_vault/transform/transformation.py +5 -0
  218. pulumi_vault/transit/get_decrypt.py +21 -4
  219. pulumi_vault/transit/get_encrypt.py +23 -4
  220. pulumi_vault/transit/secret_backend_key.py +12 -7
  221. pulumi_vault/transit/secret_cache_config.py +5 -0
  222. {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/METADATA +3 -2
  223. pulumi_vault-6.3.1.dist-info/RECORD +256 -0
  224. {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/WHEEL +1 -1
  225. pulumi_vault-6.3.0a1723010642.dist-info/RECORD +0 -256
  226. {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/top_level.txt +0 -0
pulumi_vault/namespace.py CHANGED
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['NamespaceArgs', 'Namespace']
@@ -15,13 +20,13 @@ __all__ = ['NamespaceArgs', 'Namespace']
15
20
  class NamespaceArgs:
16
21
  def __init__(__self__, *,
17
22
  path: pulumi.Input[str],
18
- custom_metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
23
+ custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
19
24
  namespace: Optional[pulumi.Input[str]] = None,
20
25
  path_fq: Optional[pulumi.Input[str]] = None):
21
26
  """
22
27
  The set of arguments for constructing a Namespace resource.
23
28
  :param pulumi.Input[str] path: The path of the namespace. Must not have a trailing `/`.
24
- :param pulumi.Input[Mapping[str, Any]] custom_metadata: Custom metadata describing this namespace. Value type
29
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_metadata: Custom metadata describing this namespace. Value type
25
30
  is `map[string]string`. Requires Vault version 1.12+.
26
31
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
27
32
  The value should not contain leading or trailing forward slashes.
@@ -52,7 +57,7 @@ class NamespaceArgs:
52
57
 
53
58
  @property
54
59
  @pulumi.getter(name="customMetadata")
55
- def custom_metadata(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
60
+ def custom_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
56
61
  """
57
62
  Custom metadata describing this namespace. Value type
58
63
  is `map[string]string`. Requires Vault version 1.12+.
@@ -60,7 +65,7 @@ class NamespaceArgs:
60
65
  return pulumi.get(self, "custom_metadata")
61
66
 
62
67
  @custom_metadata.setter
63
- def custom_metadata(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
68
+ def custom_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
64
69
  pulumi.set(self, "custom_metadata", value)
65
70
 
66
71
  @property
@@ -95,14 +100,14 @@ class NamespaceArgs:
95
100
  @pulumi.input_type
96
101
  class _NamespaceState:
97
102
  def __init__(__self__, *,
98
- custom_metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
103
+ custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
99
104
  namespace: Optional[pulumi.Input[str]] = None,
100
105
  namespace_id: Optional[pulumi.Input[str]] = None,
101
106
  path: Optional[pulumi.Input[str]] = None,
102
107
  path_fq: Optional[pulumi.Input[str]] = None):
103
108
  """
104
109
  Input properties used for looking up and filtering Namespace resources.
105
- :param pulumi.Input[Mapping[str, Any]] custom_metadata: Custom metadata describing this namespace. Value type
110
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_metadata: Custom metadata describing this namespace. Value type
106
111
  is `map[string]string`. Requires Vault version 1.12+.
107
112
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
108
113
  The value should not contain leading or trailing forward slashes.
@@ -126,7 +131,7 @@ class _NamespaceState:
126
131
 
127
132
  @property
128
133
  @pulumi.getter(name="customMetadata")
129
- def custom_metadata(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
134
+ def custom_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
130
135
  """
131
136
  Custom metadata describing this namespace. Value type
132
137
  is `map[string]string`. Requires Vault version 1.12+.
@@ -134,7 +139,7 @@ class _NamespaceState:
134
139
  return pulumi.get(self, "custom_metadata")
135
140
 
136
141
  @custom_metadata.setter
137
- def custom_metadata(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
142
+ def custom_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
138
143
  pulumi.set(self, "custom_metadata", value)
139
144
 
140
145
  @property
@@ -195,7 +200,7 @@ class Namespace(pulumi.CustomResource):
195
200
  def __init__(__self__,
196
201
  resource_name: str,
197
202
  opts: Optional[pulumi.ResourceOptions] = None,
198
- custom_metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
203
+ custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
199
204
  namespace: Optional[pulumi.Input[str]] = None,
200
205
  path: Optional[pulumi.Input[str]] = None,
201
206
  path_fq: Optional[pulumi.Input[str]] = None,
@@ -253,7 +258,7 @@ class Namespace(pulumi.CustomResource):
253
258
 
254
259
  :param str resource_name: The name of the resource.
255
260
  :param pulumi.ResourceOptions opts: Options for the resource.
256
- :param pulumi.Input[Mapping[str, Any]] custom_metadata: Custom metadata describing this namespace. Value type
261
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_metadata: Custom metadata describing this namespace. Value type
257
262
  is `map[string]string`. Requires Vault version 1.12+.
258
263
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
259
264
  The value should not contain leading or trailing forward slashes.
@@ -335,7 +340,7 @@ class Namespace(pulumi.CustomResource):
335
340
  def _internal_init(__self__,
336
341
  resource_name: str,
337
342
  opts: Optional[pulumi.ResourceOptions] = None,
338
- custom_metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
343
+ custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
339
344
  namespace: Optional[pulumi.Input[str]] = None,
340
345
  path: Optional[pulumi.Input[str]] = None,
341
346
  path_fq: Optional[pulumi.Input[str]] = None,
@@ -365,7 +370,7 @@ class Namespace(pulumi.CustomResource):
365
370
  def get(resource_name: str,
366
371
  id: pulumi.Input[str],
367
372
  opts: Optional[pulumi.ResourceOptions] = None,
368
- custom_metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
373
+ custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
369
374
  namespace: Optional[pulumi.Input[str]] = None,
370
375
  namespace_id: Optional[pulumi.Input[str]] = None,
371
376
  path: Optional[pulumi.Input[str]] = None,
@@ -377,7 +382,7 @@ class Namespace(pulumi.CustomResource):
377
382
  :param str resource_name: The unique name of the resulting resource.
378
383
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
379
384
  :param pulumi.ResourceOptions opts: Options for the resource.
380
- :param pulumi.Input[Mapping[str, Any]] custom_metadata: Custom metadata describing this namespace. Value type
385
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_metadata: Custom metadata describing this namespace. Value type
381
386
  is `map[string]string`. Requires Vault version 1.12+.
382
387
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
383
388
  The value should not contain leading or trailing forward slashes.
@@ -401,7 +406,7 @@ class Namespace(pulumi.CustomResource):
401
406
 
402
407
  @property
403
408
  @pulumi.getter(name="customMetadata")
404
- def custom_metadata(self) -> pulumi.Output[Mapping[str, Any]]:
409
+ def custom_metadata(self) -> pulumi.Output[Mapping[str, str]]:
405
410
  """
406
411
  Custom metadata describing this namespace. Value type
407
412
  is `map[string]string`. Requires Vault version 1.12+.
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['NomadSecretBackendArgs', 'NomadSecretBackend']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['NomadSecretRoleArgs', 'NomadSecretRole']
@@ -4,16 +4,38 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
13
18
  'AuthBackendGroupArgs',
19
+ 'AuthBackendGroupArgsDict',
14
20
  'AuthBackendUserArgs',
21
+ 'AuthBackendUserArgsDict',
15
22
  ]
16
23
 
24
+ MYPY = False
25
+
26
+ if not MYPY:
27
+ class AuthBackendGroupArgsDict(TypedDict):
28
+ group_name: pulumi.Input[str]
29
+ """
30
+ Name of the Okta group
31
+ """
32
+ policies: pulumi.Input[Sequence[pulumi.Input[str]]]
33
+ """
34
+ Policies to associate with this group
35
+ """
36
+ elif False:
37
+ AuthBackendGroupArgsDict: TypeAlias = Mapping[str, Any]
38
+
17
39
  @pulumi.input_type
18
40
  class AuthBackendGroupArgs:
19
41
  def __init__(__self__, *,
@@ -51,6 +73,23 @@ class AuthBackendGroupArgs:
51
73
  pulumi.set(self, "policies", value)
52
74
 
53
75
 
76
+ if not MYPY:
77
+ class AuthBackendUserArgsDict(TypedDict):
78
+ username: pulumi.Input[str]
79
+ """
80
+ Name of the user within Okta
81
+ """
82
+ groups: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
83
+ """
84
+ Groups within the Okta auth backend to associate with this user
85
+ """
86
+ policies: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
87
+ """
88
+ Policies to associate with this user
89
+ """
90
+ elif False:
91
+ AuthBackendUserArgsDict: TypeAlias = Mapping[str, Any]
92
+
54
93
  @pulumi.input_type
55
94
  class AuthBackendUserArgs:
56
95
  def __init__(__self__, *,
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
  from . import outputs
12
17
  from ._inputs import *
@@ -777,7 +782,7 @@ class AuthBackend(pulumi.CustomResource):
777
782
  bypass_okta_mfa: Optional[pulumi.Input[bool]] = None,
778
783
  description: Optional[pulumi.Input[str]] = None,
779
784
  disable_remount: Optional[pulumi.Input[bool]] = None,
780
- groups: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['AuthBackendGroupArgs']]]]] = None,
785
+ groups: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendGroupArgs', 'AuthBackendGroupArgsDict']]]]] = None,
781
786
  max_ttl: Optional[pulumi.Input[str]] = None,
782
787
  namespace: Optional[pulumi.Input[str]] = None,
783
788
  organization: Optional[pulumi.Input[str]] = None,
@@ -793,7 +798,7 @@ class AuthBackend(pulumi.CustomResource):
793
798
  token_ttl: Optional[pulumi.Input[int]] = None,
794
799
  token_type: Optional[pulumi.Input[str]] = None,
795
800
  ttl: Optional[pulumi.Input[str]] = None,
796
- users: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['AuthBackendUserArgs']]]]] = None,
801
+ users: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendUserArgs', 'AuthBackendUserArgsDict']]]]] = None,
797
802
  __props__=None):
798
803
  """
799
804
  Provides a resource for managing an
@@ -809,17 +814,17 @@ class AuthBackend(pulumi.CustomResource):
809
814
  description="Demonstration of the Terraform Okta auth backend",
810
815
  organization="example",
811
816
  token="something that should be kept secret",
812
- groups=[vault.okta.AuthBackendGroupArgs(
813
- group_name="foo",
814
- policies=[
817
+ groups=[{
818
+ "group_name": "foo",
819
+ "policies": [
815
820
  "one",
816
821
  "two",
817
822
  ],
818
- )],
819
- users=[vault.okta.AuthBackendUserArgs(
820
- username="bar",
821
- groups=["foo"],
822
- )])
823
+ }],
824
+ users=[{
825
+ "username": "bar",
826
+ "groups": ["foo"],
827
+ }])
823
828
  ```
824
829
 
825
830
  ## Import
@@ -837,7 +842,7 @@ class AuthBackend(pulumi.CustomResource):
837
842
  :param pulumi.Input[str] description: The description of the auth backend
838
843
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
839
844
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
840
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['AuthBackendGroupArgs']]]] groups: Associate Okta groups with policies within Vault.
845
+ :param pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendGroupArgs', 'AuthBackendGroupArgsDict']]]] groups: Associate Okta groups with policies within Vault.
841
846
  See below for more details.
842
847
  :param pulumi.Input[str] max_ttl: Maximum duration after which authentication will be expired
843
848
  [See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
@@ -860,7 +865,7 @@ class AuthBackend(pulumi.CustomResource):
860
865
  :param pulumi.Input[str] token_type: The type of token to generate, service or batch
861
866
  :param pulumi.Input[str] ttl: Duration after which authentication will be expired.
862
867
  [See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
863
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['AuthBackendUserArgs']]]] users: Associate Okta users with groups or policies within Vault.
868
+ :param pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendUserArgs', 'AuthBackendUserArgsDict']]]] users: Associate Okta users with groups or policies within Vault.
864
869
  See below for more details.
865
870
  """
866
871
  ...
@@ -883,17 +888,17 @@ class AuthBackend(pulumi.CustomResource):
883
888
  description="Demonstration of the Terraform Okta auth backend",
884
889
  organization="example",
885
890
  token="something that should be kept secret",
886
- groups=[vault.okta.AuthBackendGroupArgs(
887
- group_name="foo",
888
- policies=[
891
+ groups=[{
892
+ "group_name": "foo",
893
+ "policies": [
889
894
  "one",
890
895
  "two",
891
896
  ],
892
- )],
893
- users=[vault.okta.AuthBackendUserArgs(
894
- username="bar",
895
- groups=["foo"],
896
- )])
897
+ }],
898
+ users=[{
899
+ "username": "bar",
900
+ "groups": ["foo"],
901
+ }])
897
902
  ```
898
903
 
899
904
  ## Import
@@ -923,7 +928,7 @@ class AuthBackend(pulumi.CustomResource):
923
928
  bypass_okta_mfa: Optional[pulumi.Input[bool]] = None,
924
929
  description: Optional[pulumi.Input[str]] = None,
925
930
  disable_remount: Optional[pulumi.Input[bool]] = None,
926
- groups: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['AuthBackendGroupArgs']]]]] = None,
931
+ groups: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendGroupArgs', 'AuthBackendGroupArgsDict']]]]] = None,
927
932
  max_ttl: Optional[pulumi.Input[str]] = None,
928
933
  namespace: Optional[pulumi.Input[str]] = None,
929
934
  organization: Optional[pulumi.Input[str]] = None,
@@ -939,7 +944,7 @@ class AuthBackend(pulumi.CustomResource):
939
944
  token_ttl: Optional[pulumi.Input[int]] = None,
940
945
  token_type: Optional[pulumi.Input[str]] = None,
941
946
  ttl: Optional[pulumi.Input[str]] = None,
942
- users: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['AuthBackendUserArgs']]]]] = None,
947
+ users: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendUserArgs', 'AuthBackendUserArgsDict']]]]] = None,
943
948
  __props__=None):
944
949
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
945
950
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -990,7 +995,7 @@ class AuthBackend(pulumi.CustomResource):
990
995
  bypass_okta_mfa: Optional[pulumi.Input[bool]] = None,
991
996
  description: Optional[pulumi.Input[str]] = None,
992
997
  disable_remount: Optional[pulumi.Input[bool]] = None,
993
- groups: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['AuthBackendGroupArgs']]]]] = None,
998
+ groups: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendGroupArgs', 'AuthBackendGroupArgsDict']]]]] = None,
994
999
  max_ttl: Optional[pulumi.Input[str]] = None,
995
1000
  namespace: Optional[pulumi.Input[str]] = None,
996
1001
  organization: Optional[pulumi.Input[str]] = None,
@@ -1006,7 +1011,7 @@ class AuthBackend(pulumi.CustomResource):
1006
1011
  token_ttl: Optional[pulumi.Input[int]] = None,
1007
1012
  token_type: Optional[pulumi.Input[str]] = None,
1008
1013
  ttl: Optional[pulumi.Input[str]] = None,
1009
- users: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['AuthBackendUserArgs']]]]] = None) -> 'AuthBackend':
1014
+ users: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendUserArgs', 'AuthBackendUserArgsDict']]]]] = None) -> 'AuthBackend':
1010
1015
  """
1011
1016
  Get an existing AuthBackend resource's state with the given name, id, and optional extra
1012
1017
  properties used to qualify the lookup.
@@ -1020,7 +1025,7 @@ class AuthBackend(pulumi.CustomResource):
1020
1025
  :param pulumi.Input[str] description: The description of the auth backend
1021
1026
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
1022
1027
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1023
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['AuthBackendGroupArgs']]]] groups: Associate Okta groups with policies within Vault.
1028
+ :param pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendGroupArgs', 'AuthBackendGroupArgsDict']]]] groups: Associate Okta groups with policies within Vault.
1024
1029
  See below for more details.
1025
1030
  :param pulumi.Input[str] max_ttl: Maximum duration after which authentication will be expired
1026
1031
  [See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
@@ -1043,7 +1048,7 @@ class AuthBackend(pulumi.CustomResource):
1043
1048
  :param pulumi.Input[str] token_type: The type of token to generate, service or batch
1044
1049
  :param pulumi.Input[str] ttl: Duration after which authentication will be expired.
1045
1050
  [See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
1046
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['AuthBackendUserArgs']]]] users: Associate Okta users with groups or policies within Vault.
1051
+ :param pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendUserArgs', 'AuthBackendUserArgsDict']]]] users: Associate Okta users with groups or policies within Vault.
1047
1052
  See below for more details.
1048
1053
  """
1049
1054
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['AuthBackendGroupInitArgs', 'AuthBackendGroup']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['AuthBackendUserInitArgs', 'AuthBackendUser']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
pulumi_vault/outputs.py CHANGED
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
  from . import outputs
12
17
 
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['PasswordPolicyArgs', 'PasswordPolicy']
@@ -4,24 +4,46 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
13
18
  'BackendConfigEstAuthenticatorsArgs',
19
+ 'BackendConfigEstAuthenticatorsArgsDict',
14
20
  'SecretBackendRolePolicyIdentifierArgs',
21
+ 'SecretBackendRolePolicyIdentifierArgsDict',
15
22
  ]
16
23
 
24
+ MYPY = False
25
+
26
+ if not MYPY:
27
+ class BackendConfigEstAuthenticatorsArgsDict(TypedDict):
28
+ cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
29
+ """
30
+ "The accessor (required) and cert_role (optional) properties for cert auth backends".
31
+ """
32
+ userpass: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
33
+ """
34
+ "The accessor (required) property for user pass auth backends".
35
+ """
36
+ elif False:
37
+ BackendConfigEstAuthenticatorsArgsDict: TypeAlias = Mapping[str, Any]
38
+
17
39
  @pulumi.input_type
18
40
  class BackendConfigEstAuthenticatorsArgs:
19
41
  def __init__(__self__, *,
20
- cert: Optional[pulumi.Input[Mapping[str, Any]]] = None,
21
- userpass: Optional[pulumi.Input[Mapping[str, Any]]] = None):
42
+ cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
43
+ userpass: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None):
22
44
  """
23
- :param pulumi.Input[Mapping[str, Any]] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
24
- :param pulumi.Input[Mapping[str, Any]] userpass: "The accessor (required) property for user pass auth backends".
45
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
46
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] userpass: "The accessor (required) property for user pass auth backends".
25
47
  """
26
48
  if cert is not None:
27
49
  pulumi.set(__self__, "cert", cert)
@@ -30,29 +52,48 @@ class BackendConfigEstAuthenticatorsArgs:
30
52
 
31
53
  @property
32
54
  @pulumi.getter
33
- def cert(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
55
+ def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
34
56
  """
35
57
  "The accessor (required) and cert_role (optional) properties for cert auth backends".
36
58
  """
37
59
  return pulumi.get(self, "cert")
38
60
 
39
61
  @cert.setter
40
- def cert(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
62
+ def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
41
63
  pulumi.set(self, "cert", value)
42
64
 
43
65
  @property
44
66
  @pulumi.getter
45
- def userpass(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
67
+ def userpass(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
46
68
  """
47
69
  "The accessor (required) property for user pass auth backends".
48
70
  """
49
71
  return pulumi.get(self, "userpass")
50
72
 
51
73
  @userpass.setter
52
- def userpass(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
74
+ def userpass(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
53
75
  pulumi.set(self, "userpass", value)
54
76
 
55
77
 
78
+ if not MYPY:
79
+ class SecretBackendRolePolicyIdentifierArgsDict(TypedDict):
80
+ oid: pulumi.Input[str]
81
+ """
82
+ The OID for the policy identifier
83
+ """
84
+ cps: NotRequired[pulumi.Input[str]]
85
+ """
86
+ The URL of the CPS for the policy identifier
87
+
88
+ Example usage:
89
+ """
90
+ notice: NotRequired[pulumi.Input[str]]
91
+ """
92
+ A notice for the policy identifier
93
+ """
94
+ elif False:
95
+ SecretBackendRolePolicyIdentifierArgsDict: TypeAlias = Mapping[str, Any]
96
+
56
97
  @pulumi.input_type
57
98
  class SecretBackendRolePolicyIdentifierArgs:
58
99
  def __init__(__self__, *,
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['BackendConfigClusterArgs', 'BackendConfigCluster']