pulumi-vault 6.3.0a1723010642__py3-none-any.whl → 6.3.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +560 -0
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +19 -4
  4. pulumi_vault/ad/secret_backend.py +5 -0
  5. pulumi_vault/ad/secret_library.py +5 -0
  6. pulumi_vault/ad/secret_role.py +5 -0
  7. pulumi_vault/alicloud/auth_backend_role.py +5 -0
  8. pulumi_vault/approle/auth_backend_login.py +5 -0
  9. pulumi_vault/approle/auth_backend_role.py +5 -0
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
  11. pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
  12. pulumi_vault/audit.py +5 -0
  13. pulumi_vault/audit_request_header.py +5 -0
  14. pulumi_vault/auth_backend.py +10 -5
  15. pulumi_vault/aws/auth_backend_cert.py +5 -0
  16. pulumi_vault/aws/auth_backend_client.py +5 -0
  17. pulumi_vault/aws/auth_backend_config_identity.py +5 -0
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
  19. pulumi_vault/aws/auth_backend_login.py +12 -7
  20. pulumi_vault/aws/auth_backend_role.py +5 -0
  21. pulumi_vault/aws/auth_backend_role_tag.py +5 -0
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
  23. pulumi_vault/aws/auth_backend_sts_role.py +5 -0
  24. pulumi_vault/aws/get_access_credentials.py +31 -4
  25. pulumi_vault/aws/get_static_access_credentials.py +18 -4
  26. pulumi_vault/aws/secret_backend.py +5 -0
  27. pulumi_vault/aws/secret_backend_role.py +120 -0
  28. pulumi_vault/aws/secret_backend_static_role.py +5 -0
  29. pulumi_vault/azure/_inputs.py +24 -0
  30. pulumi_vault/azure/auth_backend_config.py +5 -0
  31. pulumi_vault/azure/auth_backend_role.py +5 -0
  32. pulumi_vault/azure/backend.py +5 -0
  33. pulumi_vault/azure/backend_role.py +23 -18
  34. pulumi_vault/azure/get_access_credentials.py +36 -4
  35. pulumi_vault/azure/outputs.py +5 -0
  36. pulumi_vault/cert_auth_backend_role.py +5 -0
  37. pulumi_vault/config/__init__.pyi +5 -0
  38. pulumi_vault/config/_inputs.py +21 -0
  39. pulumi_vault/config/outputs.py +5 -0
  40. pulumi_vault/config/ui_custom_message.py +24 -19
  41. pulumi_vault/config/vars.py +5 -0
  42. pulumi_vault/consul/secret_backend.py +5 -0
  43. pulumi_vault/consul/secret_backend_role.py +5 -0
  44. pulumi_vault/database/_inputs.py +2091 -140
  45. pulumi_vault/database/outputs.py +59 -54
  46. pulumi_vault/database/secret_backend_connection.py +115 -110
  47. pulumi_vault/database/secret_backend_role.py +25 -20
  48. pulumi_vault/database/secret_backend_static_role.py +11 -6
  49. pulumi_vault/database/secrets_mount.py +139 -134
  50. pulumi_vault/egp_policy.py +5 -0
  51. pulumi_vault/gcp/_inputs.py +111 -0
  52. pulumi_vault/gcp/auth_backend.py +15 -10
  53. pulumi_vault/gcp/auth_backend_role.py +5 -0
  54. pulumi_vault/gcp/get_auth_backend_role.py +42 -4
  55. pulumi_vault/gcp/outputs.py +5 -0
  56. pulumi_vault/gcp/secret_backend.py +5 -0
  57. pulumi_vault/gcp/secret_impersonated_account.py +5 -0
  58. pulumi_vault/gcp/secret_roleset.py +18 -13
  59. pulumi_vault/gcp/secret_static_account.py +18 -13
  60. pulumi_vault/generic/endpoint.py +5 -0
  61. pulumi_vault/generic/get_secret.py +25 -5
  62. pulumi_vault/generic/secret.py +12 -7
  63. pulumi_vault/get_auth_backend.py +21 -4
  64. pulumi_vault/get_auth_backends.py +16 -4
  65. pulumi_vault/get_namespace.py +18 -5
  66. pulumi_vault/get_namespaces.py +13 -4
  67. pulumi_vault/get_nomad_access_token.py +28 -8
  68. pulumi_vault/get_policy_document.py +27 -16
  69. pulumi_vault/get_raft_autopilot_state.py +26 -7
  70. pulumi_vault/github/_inputs.py +55 -0
  71. pulumi_vault/github/auth_backend.py +10 -5
  72. pulumi_vault/github/outputs.py +5 -0
  73. pulumi_vault/github/team.py +5 -0
  74. pulumi_vault/github/user.py +5 -0
  75. pulumi_vault/identity/entity.py +5 -0
  76. pulumi_vault/identity/entity_alias.py +5 -0
  77. pulumi_vault/identity/entity_policies.py +5 -0
  78. pulumi_vault/identity/get_entity.py +37 -7
  79. pulumi_vault/identity/get_group.py +42 -6
  80. pulumi_vault/identity/get_oidc_client_creds.py +16 -4
  81. pulumi_vault/identity/get_oidc_openid_config.py +26 -4
  82. pulumi_vault/identity/get_oidc_public_keys.py +16 -5
  83. pulumi_vault/identity/group.py +5 -0
  84. pulumi_vault/identity/group_alias.py +5 -0
  85. pulumi_vault/identity/group_member_entity_ids.py +5 -0
  86. pulumi_vault/identity/group_member_group_ids.py +5 -0
  87. pulumi_vault/identity/group_policies.py +5 -0
  88. pulumi_vault/identity/mfa_duo.py +5 -0
  89. pulumi_vault/identity/mfa_login_enforcement.py +5 -0
  90. pulumi_vault/identity/mfa_okta.py +5 -0
  91. pulumi_vault/identity/mfa_pingid.py +5 -0
  92. pulumi_vault/identity/mfa_totp.py +5 -0
  93. pulumi_vault/identity/oidc.py +5 -0
  94. pulumi_vault/identity/oidc_assignment.py +5 -0
  95. pulumi_vault/identity/oidc_client.py +5 -0
  96. pulumi_vault/identity/oidc_key.py +5 -0
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
  98. pulumi_vault/identity/oidc_provider.py +5 -0
  99. pulumi_vault/identity/oidc_role.py +5 -0
  100. pulumi_vault/identity/oidc_scope.py +5 -0
  101. pulumi_vault/identity/outputs.py +8 -3
  102. pulumi_vault/jwt/_inputs.py +55 -0
  103. pulumi_vault/jwt/auth_backend.py +14 -9
  104. pulumi_vault/jwt/auth_backend_role.py +33 -28
  105. pulumi_vault/jwt/outputs.py +5 -0
  106. pulumi_vault/kmip/secret_backend.py +5 -0
  107. pulumi_vault/kmip/secret_role.py +5 -0
  108. pulumi_vault/kmip/secret_scope.py +5 -0
  109. pulumi_vault/kubernetes/auth_backend_config.py +5 -0
  110. pulumi_vault/kubernetes/auth_backend_role.py +5 -0
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
  113. pulumi_vault/kubernetes/get_service_account_token.py +28 -4
  114. pulumi_vault/kubernetes/secret_backend.py +19 -14
  115. pulumi_vault/kubernetes/secret_backend_role.py +5 -0
  116. pulumi_vault/kv/_inputs.py +36 -4
  117. pulumi_vault/kv/get_secret.py +20 -5
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +24 -5
  119. pulumi_vault/kv/get_secret_v2.py +27 -6
  120. pulumi_vault/kv/get_secrets_list.py +15 -4
  121. pulumi_vault/kv/get_secrets_list_v2.py +18 -4
  122. pulumi_vault/kv/outputs.py +8 -3
  123. pulumi_vault/kv/secret.py +12 -7
  124. pulumi_vault/kv/secret_backend_v2.py +5 -0
  125. pulumi_vault/kv/secret_v2.py +46 -41
  126. pulumi_vault/ldap/auth_backend.py +5 -0
  127. pulumi_vault/ldap/auth_backend_group.py +5 -0
  128. pulumi_vault/ldap/auth_backend_user.py +5 -0
  129. pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
  130. pulumi_vault/ldap/get_static_credentials.py +23 -4
  131. pulumi_vault/ldap/secret_backend.py +19 -14
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
  133. pulumi_vault/ldap/secret_backend_library_set.py +5 -0
  134. pulumi_vault/ldap/secret_backend_static_role.py +5 -0
  135. pulumi_vault/managed/_inputs.py +205 -0
  136. pulumi_vault/managed/keys.py +20 -15
  137. pulumi_vault/managed/outputs.py +5 -0
  138. pulumi_vault/mfa_duo.py +5 -0
  139. pulumi_vault/mfa_okta.py +5 -0
  140. pulumi_vault/mfa_pingid.py +5 -0
  141. pulumi_vault/mfa_totp.py +5 -0
  142. pulumi_vault/mongodbatlas/secret_backend.py +5 -0
  143. pulumi_vault/mongodbatlas/secret_role.py +5 -0
  144. pulumi_vault/mount.py +35 -23
  145. pulumi_vault/namespace.py +19 -14
  146. pulumi_vault/nomad_secret_backend.py +5 -0
  147. pulumi_vault/nomad_secret_role.py +5 -0
  148. pulumi_vault/okta/_inputs.py +39 -0
  149. pulumi_vault/okta/auth_backend.py +31 -26
  150. pulumi_vault/okta/auth_backend_group.py +5 -0
  151. pulumi_vault/okta/auth_backend_user.py +5 -0
  152. pulumi_vault/okta/outputs.py +5 -0
  153. pulumi_vault/outputs.py +5 -0
  154. pulumi_vault/password_policy.py +5 -0
  155. pulumi_vault/pkisecret/_inputs.py +49 -8
  156. pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
  157. pulumi_vault/pkisecret/backend_config_est.py +24 -19
  158. pulumi_vault/pkisecret/get_backend_config_est.py +23 -5
  159. pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
  160. pulumi_vault/pkisecret/get_backend_issuers.py +18 -5
  161. pulumi_vault/pkisecret/get_backend_key.py +19 -4
  162. pulumi_vault/pkisecret/get_backend_keys.py +18 -5
  163. pulumi_vault/pkisecret/outputs.py +17 -12
  164. pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
  172. pulumi_vault/pkisecret/secret_backend_key.py +5 -0
  173. pulumi_vault/pkisecret/secret_backend_role.py +10 -5
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
  176. pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
  177. pulumi_vault/plugin.py +5 -0
  178. pulumi_vault/plugin_pinned_version.py +5 -0
  179. pulumi_vault/policy.py +5 -0
  180. pulumi_vault/provider.py +47 -42
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +5 -0
  183. pulumi_vault/quota_rate_limit.py +5 -0
  184. pulumi_vault/rabbitmq/_inputs.py +61 -0
  185. pulumi_vault/rabbitmq/outputs.py +5 -0
  186. pulumi_vault/rabbitmq/secret_backend.py +5 -0
  187. pulumi_vault/rabbitmq/secret_backend_role.py +43 -38
  188. pulumi_vault/raft_autopilot.py +5 -0
  189. pulumi_vault/raft_snapshot_agent_config.py +5 -0
  190. pulumi_vault/rgp_policy.py +5 -0
  191. pulumi_vault/saml/auth_backend.py +5 -0
  192. pulumi_vault/saml/auth_backend_role.py +19 -14
  193. pulumi_vault/secrets/_inputs.py +30 -0
  194. pulumi_vault/secrets/outputs.py +5 -0
  195. pulumi_vault/secrets/sync_association.py +7 -2
  196. pulumi_vault/secrets/sync_aws_destination.py +19 -14
  197. pulumi_vault/secrets/sync_azure_destination.py +19 -14
  198. pulumi_vault/secrets/sync_config.py +5 -0
  199. pulumi_vault/secrets/sync_gcp_destination.py +19 -14
  200. pulumi_vault/secrets/sync_gh_destination.py +5 -0
  201. pulumi_vault/secrets/sync_github_apps.py +5 -0
  202. pulumi_vault/secrets/sync_vercel_destination.py +5 -0
  203. pulumi_vault/ssh/_inputs.py +22 -0
  204. pulumi_vault/ssh/outputs.py +5 -0
  205. pulumi_vault/ssh/secret_backend_ca.py +5 -0
  206. pulumi_vault/ssh/secret_backend_role.py +38 -33
  207. pulumi_vault/terraformcloud/secret_backend.py +5 -0
  208. pulumi_vault/terraformcloud/secret_creds.py +5 -0
  209. pulumi_vault/terraformcloud/secret_role.py +5 -0
  210. pulumi_vault/token.py +5 -0
  211. pulumi_vault/tokenauth/auth_backend_role.py +5 -14
  212. pulumi_vault/transform/alphabet.py +5 -0
  213. pulumi_vault/transform/get_decode.py +38 -14
  214. pulumi_vault/transform/get_encode.py +38 -14
  215. pulumi_vault/transform/role.py +5 -0
  216. pulumi_vault/transform/template.py +19 -14
  217. pulumi_vault/transform/transformation.py +5 -0
  218. pulumi_vault/transit/get_decrypt.py +21 -4
  219. pulumi_vault/transit/get_encrypt.py +23 -4
  220. pulumi_vault/transit/secret_backend_key.py +12 -7
  221. pulumi_vault/transit/secret_cache_config.py +5 -0
  222. {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/METADATA +3 -2
  223. pulumi_vault-6.3.1.dist-info/RECORD +256 -0
  224. {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/WHEEL +1 -1
  225. pulumi_vault-6.3.0a1723010642.dist-info/RECORD +0 -256
  226. {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SyncGcpDestinationArgs', 'SyncGcpDestination']
@@ -15,7 +20,7 @@ __all__ = ['SyncGcpDestinationArgs', 'SyncGcpDestination']
15
20
  class SyncGcpDestinationArgs:
16
21
  def __init__(__self__, *,
17
22
  credentials: Optional[pulumi.Input[str]] = None,
18
- custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
23
+ custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
19
24
  granularity: Optional[pulumi.Input[str]] = None,
20
25
  name: Optional[pulumi.Input[str]] = None,
21
26
  namespace: Optional[pulumi.Input[str]] = None,
@@ -26,7 +31,7 @@ class SyncGcpDestinationArgs:
26
31
  :param pulumi.Input[str] credentials: JSON-encoded credentials to use to connect to GCP.
27
32
  Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
28
33
  variable.
29
- :param pulumi.Input[Mapping[str, Any]] custom_tags: Custom tags to set on the secret managed at the destination.
34
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
30
35
  :param pulumi.Input[str] granularity: Determines what level of information is synced as a distinct resource
31
36
  at the destination. Supports `secret-path` and `secret-key`.
32
37
  :param pulumi.Input[str] name: Unique name of the GCP destination.
@@ -71,14 +76,14 @@ class SyncGcpDestinationArgs:
71
76
 
72
77
  @property
73
78
  @pulumi.getter(name="customTags")
74
- def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
79
+ def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
75
80
  """
76
81
  Custom tags to set on the secret managed at the destination.
77
82
  """
78
83
  return pulumi.get(self, "custom_tags")
79
84
 
80
85
  @custom_tags.setter
81
- def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
86
+ def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
82
87
  pulumi.set(self, "custom_tags", value)
83
88
 
84
89
  @property
@@ -153,7 +158,7 @@ class SyncGcpDestinationArgs:
153
158
  class _SyncGcpDestinationState:
154
159
  def __init__(__self__, *,
155
160
  credentials: Optional[pulumi.Input[str]] = None,
156
- custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
161
+ custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
157
162
  granularity: Optional[pulumi.Input[str]] = None,
158
163
  name: Optional[pulumi.Input[str]] = None,
159
164
  namespace: Optional[pulumi.Input[str]] = None,
@@ -165,7 +170,7 @@ class _SyncGcpDestinationState:
165
170
  :param pulumi.Input[str] credentials: JSON-encoded credentials to use to connect to GCP.
166
171
  Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
167
172
  variable.
168
- :param pulumi.Input[Mapping[str, Any]] custom_tags: Custom tags to set on the secret managed at the destination.
173
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
169
174
  :param pulumi.Input[str] granularity: Determines what level of information is synced as a distinct resource
170
175
  at the destination. Supports `secret-path` and `secret-key`.
171
176
  :param pulumi.Input[str] name: Unique name of the GCP destination.
@@ -213,14 +218,14 @@ class _SyncGcpDestinationState:
213
218
 
214
219
  @property
215
220
  @pulumi.getter(name="customTags")
216
- def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
221
+ def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
217
222
  """
218
223
  Custom tags to set on the secret managed at the destination.
219
224
  """
220
225
  return pulumi.get(self, "custom_tags")
221
226
 
222
227
  @custom_tags.setter
223
- def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
228
+ def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
224
229
  pulumi.set(self, "custom_tags", value)
225
230
 
226
231
  @property
@@ -309,7 +314,7 @@ class SyncGcpDestination(pulumi.CustomResource):
309
314
  resource_name: str,
310
315
  opts: Optional[pulumi.ResourceOptions] = None,
311
316
  credentials: Optional[pulumi.Input[str]] = None,
312
- custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
317
+ custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
313
318
  granularity: Optional[pulumi.Input[str]] = None,
314
319
  name: Optional[pulumi.Input[str]] = None,
315
320
  namespace: Optional[pulumi.Input[str]] = None,
@@ -347,7 +352,7 @@ class SyncGcpDestination(pulumi.CustomResource):
347
352
  :param pulumi.Input[str] credentials: JSON-encoded credentials to use to connect to GCP.
348
353
  Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
349
354
  variable.
350
- :param pulumi.Input[Mapping[str, Any]] custom_tags: Custom tags to set on the secret managed at the destination.
355
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
351
356
  :param pulumi.Input[str] granularity: Determines what level of information is synced as a distinct resource
352
357
  at the destination. Supports `secret-path` and `secret-key`.
353
358
  :param pulumi.Input[str] name: Unique name of the GCP destination.
@@ -409,7 +414,7 @@ class SyncGcpDestination(pulumi.CustomResource):
409
414
  resource_name: str,
410
415
  opts: Optional[pulumi.ResourceOptions] = None,
411
416
  credentials: Optional[pulumi.Input[str]] = None,
412
- custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
417
+ custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
413
418
  granularity: Optional[pulumi.Input[str]] = None,
414
419
  name: Optional[pulumi.Input[str]] = None,
415
420
  namespace: Optional[pulumi.Input[str]] = None,
@@ -445,7 +450,7 @@ class SyncGcpDestination(pulumi.CustomResource):
445
450
  id: pulumi.Input[str],
446
451
  opts: Optional[pulumi.ResourceOptions] = None,
447
452
  credentials: Optional[pulumi.Input[str]] = None,
448
- custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
453
+ custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
449
454
  granularity: Optional[pulumi.Input[str]] = None,
450
455
  name: Optional[pulumi.Input[str]] = None,
451
456
  namespace: Optional[pulumi.Input[str]] = None,
@@ -462,7 +467,7 @@ class SyncGcpDestination(pulumi.CustomResource):
462
467
  :param pulumi.Input[str] credentials: JSON-encoded credentials to use to connect to GCP.
463
468
  Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
464
469
  variable.
465
- :param pulumi.Input[Mapping[str, Any]] custom_tags: Custom tags to set on the secret managed at the destination.
470
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
466
471
  :param pulumi.Input[str] granularity: Determines what level of information is synced as a distinct resource
467
472
  at the destination. Supports `secret-path` and `secret-key`.
468
473
  :param pulumi.Input[str] name: Unique name of the GCP destination.
@@ -503,7 +508,7 @@ class SyncGcpDestination(pulumi.CustomResource):
503
508
 
504
509
  @property
505
510
  @pulumi.getter(name="customTags")
506
- def custom_tags(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
511
+ def custom_tags(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
507
512
  """
508
513
  Custom tags to set on the secret managed at the destination.
509
514
  """
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SyncGhDestinationArgs', 'SyncGhDestination']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SyncGithubAppsArgs', 'SyncGithubApps']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SyncVercelDestinationArgs', 'SyncVercelDestination']
@@ -4,15 +4,37 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
13
18
  'SecretBackendRoleAllowedUserKeyConfigArgs',
19
+ 'SecretBackendRoleAllowedUserKeyConfigArgsDict',
14
20
  ]
15
21
 
22
+ MYPY = False
23
+
24
+ if not MYPY:
25
+ class SecretBackendRoleAllowedUserKeyConfigArgsDict(TypedDict):
26
+ lengths: pulumi.Input[Sequence[pulumi.Input[int]]]
27
+ """
28
+ List of allowed key lengths, vault-1.10 and above
29
+ """
30
+ type: pulumi.Input[str]
31
+ """
32
+ Key type, choices:
33
+ rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
34
+ """
35
+ elif False:
36
+ SecretBackendRoleAllowedUserKeyConfigArgsDict: TypeAlias = Mapping[str, Any]
37
+
16
38
  @pulumi.input_type
17
39
  class SecretBackendRoleAllowedUserKeyConfigArgs:
18
40
  def __init__(__self__, *,
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendCaArgs', 'SecretBackendCa']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
  from . import outputs
12
17
  from ._inputs import *
@@ -32,8 +37,8 @@ class SecretBackendRoleArgs:
32
37
  allowed_users: Optional[pulumi.Input[str]] = None,
33
38
  allowed_users_template: Optional[pulumi.Input[bool]] = None,
34
39
  cidr_list: Optional[pulumi.Input[str]] = None,
35
- default_critical_options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
36
- default_extensions: Optional[pulumi.Input[Mapping[str, Any]]] = None,
40
+ default_critical_options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
41
+ default_extensions: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
37
42
  default_user: Optional[pulumi.Input[str]] = None,
38
43
  default_user_template: Optional[pulumi.Input[bool]] = None,
39
44
  key_id_format: Optional[pulumi.Input[str]] = None,
@@ -63,8 +68,8 @@ class SecretBackendRoleArgs:
63
68
  :param pulumi.Input[str] allowed_users: Specifies a comma-separated list of usernames that are to be allowed, only if certain usernames are to be allowed.
64
69
  :param pulumi.Input[bool] allowed_users_template: Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
65
70
  :param pulumi.Input[str] cidr_list: The comma-separated string of CIDR blocks for which this role is applicable.
66
- :param pulumi.Input[Mapping[str, Any]] default_critical_options: Specifies a map of critical options that certificates have when signed.
67
- :param pulumi.Input[Mapping[str, Any]] default_extensions: Specifies a map of extensions that certificates have when signed.
71
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] default_critical_options: Specifies a map of critical options that certificates have when signed.
72
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] default_extensions: Specifies a map of extensions that certificates have when signed.
68
73
  :param pulumi.Input[str] default_user: Specifies the default username for which a credential will be generated.
69
74
  :param pulumi.Input[bool] default_user_template: If set, `default_users` can be specified using identity template values. A non-templated user is also permitted.
70
75
  :param pulumi.Input[str] key_id_format: Specifies a custom format for the key id of a signed certificate.
@@ -325,26 +330,26 @@ class SecretBackendRoleArgs:
325
330
 
326
331
  @property
327
332
  @pulumi.getter(name="defaultCriticalOptions")
328
- def default_critical_options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
333
+ def default_critical_options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
329
334
  """
330
335
  Specifies a map of critical options that certificates have when signed.
331
336
  """
332
337
  return pulumi.get(self, "default_critical_options")
333
338
 
334
339
  @default_critical_options.setter
335
- def default_critical_options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
340
+ def default_critical_options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
336
341
  pulumi.set(self, "default_critical_options", value)
337
342
 
338
343
  @property
339
344
  @pulumi.getter(name="defaultExtensions")
340
- def default_extensions(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
345
+ def default_extensions(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
341
346
  """
342
347
  Specifies a map of extensions that certificates have when signed.
343
348
  """
344
349
  return pulumi.get(self, "default_extensions")
345
350
 
346
351
  @default_extensions.setter
347
- def default_extensions(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
352
+ def default_extensions(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
348
353
  pulumi.set(self, "default_extensions", value)
349
354
 
350
355
  @property
@@ -465,8 +470,8 @@ class _SecretBackendRoleState:
465
470
  allowed_users_template: Optional[pulumi.Input[bool]] = None,
466
471
  backend: Optional[pulumi.Input[str]] = None,
467
472
  cidr_list: Optional[pulumi.Input[str]] = None,
468
- default_critical_options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
469
- default_extensions: Optional[pulumi.Input[Mapping[str, Any]]] = None,
473
+ default_critical_options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
474
+ default_extensions: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
470
475
  default_user: Optional[pulumi.Input[str]] = None,
471
476
  default_user_template: Optional[pulumi.Input[bool]] = None,
472
477
  key_id_format: Optional[pulumi.Input[str]] = None,
@@ -496,8 +501,8 @@ class _SecretBackendRoleState:
496
501
  :param pulumi.Input[bool] allowed_users_template: Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
497
502
  :param pulumi.Input[str] backend: The path where the SSH secret backend is mounted.
498
503
  :param pulumi.Input[str] cidr_list: The comma-separated string of CIDR blocks for which this role is applicable.
499
- :param pulumi.Input[Mapping[str, Any]] default_critical_options: Specifies a map of critical options that certificates have when signed.
500
- :param pulumi.Input[Mapping[str, Any]] default_extensions: Specifies a map of extensions that certificates have when signed.
504
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] default_critical_options: Specifies a map of critical options that certificates have when signed.
505
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] default_extensions: Specifies a map of extensions that certificates have when signed.
501
506
  :param pulumi.Input[str] default_user: Specifies the default username for which a credential will be generated.
502
507
  :param pulumi.Input[bool] default_user_template: If set, `default_users` can be specified using identity template values. A non-templated user is also permitted.
503
508
  :param pulumi.Input[str] key_id_format: Specifies a custom format for the key id of a signed certificate.
@@ -749,26 +754,26 @@ class _SecretBackendRoleState:
749
754
 
750
755
  @property
751
756
  @pulumi.getter(name="defaultCriticalOptions")
752
- def default_critical_options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
757
+ def default_critical_options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
753
758
  """
754
759
  Specifies a map of critical options that certificates have when signed.
755
760
  """
756
761
  return pulumi.get(self, "default_critical_options")
757
762
 
758
763
  @default_critical_options.setter
759
- def default_critical_options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
764
+ def default_critical_options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
760
765
  pulumi.set(self, "default_critical_options", value)
761
766
 
762
767
  @property
763
768
  @pulumi.getter(name="defaultExtensions")
764
- def default_extensions(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
769
+ def default_extensions(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
765
770
  """
766
771
  Specifies a map of extensions that certificates have when signed.
767
772
  """
768
773
  return pulumi.get(self, "default_extensions")
769
774
 
770
775
  @default_extensions.setter
771
- def default_extensions(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
776
+ def default_extensions(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
772
777
  pulumi.set(self, "default_extensions", value)
773
778
 
774
779
  @property
@@ -898,13 +903,13 @@ class SecretBackendRole(pulumi.CustomResource):
898
903
  allowed_domains: Optional[pulumi.Input[str]] = None,
899
904
  allowed_domains_template: Optional[pulumi.Input[bool]] = None,
900
905
  allowed_extensions: Optional[pulumi.Input[str]] = None,
901
- allowed_user_key_configs: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRoleAllowedUserKeyConfigArgs']]]]] = None,
906
+ allowed_user_key_configs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleAllowedUserKeyConfigArgs', 'SecretBackendRoleAllowedUserKeyConfigArgsDict']]]]] = None,
902
907
  allowed_users: Optional[pulumi.Input[str]] = None,
903
908
  allowed_users_template: Optional[pulumi.Input[bool]] = None,
904
909
  backend: Optional[pulumi.Input[str]] = None,
905
910
  cidr_list: Optional[pulumi.Input[str]] = None,
906
- default_critical_options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
907
- default_extensions: Optional[pulumi.Input[Mapping[str, Any]]] = None,
911
+ default_critical_options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
912
+ default_extensions: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
908
913
  default_user: Optional[pulumi.Input[str]] = None,
909
914
  default_user_template: Optional[pulumi.Input[bool]] = None,
910
915
  key_id_format: Optional[pulumi.Input[str]] = None,
@@ -961,15 +966,15 @@ class SecretBackendRole(pulumi.CustomResource):
961
966
  :param pulumi.Input[bool] allowed_domains_template: Specifies if `allowed_domains` can be declared using
962
967
  identity template policies. Non-templated domains are also permitted.
963
968
  :param pulumi.Input[str] allowed_extensions: Specifies a comma-separated list of extensions that certificates can have when signed.
964
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRoleAllowedUserKeyConfigArgs']]]] allowed_user_key_configs: Set of configuration blocks to define allowed
969
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleAllowedUserKeyConfigArgs', 'SecretBackendRoleAllowedUserKeyConfigArgsDict']]]] allowed_user_key_configs: Set of configuration blocks to define allowed
965
970
  user key configuration, like key type and their lengths. Can be specified multiple times.
966
971
  *See Configuration-Options for more info*
967
972
  :param pulumi.Input[str] allowed_users: Specifies a comma-separated list of usernames that are to be allowed, only if certain usernames are to be allowed.
968
973
  :param pulumi.Input[bool] allowed_users_template: Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
969
974
  :param pulumi.Input[str] backend: The path where the SSH secret backend is mounted.
970
975
  :param pulumi.Input[str] cidr_list: The comma-separated string of CIDR blocks for which this role is applicable.
971
- :param pulumi.Input[Mapping[str, Any]] default_critical_options: Specifies a map of critical options that certificates have when signed.
972
- :param pulumi.Input[Mapping[str, Any]] default_extensions: Specifies a map of extensions that certificates have when signed.
976
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] default_critical_options: Specifies a map of critical options that certificates have when signed.
977
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] default_extensions: Specifies a map of extensions that certificates have when signed.
973
978
  :param pulumi.Input[str] default_user: Specifies the default username for which a credential will be generated.
974
979
  :param pulumi.Input[bool] default_user_template: If set, `default_users` can be specified using identity template values. A non-templated user is also permitted.
975
980
  :param pulumi.Input[str] key_id_format: Specifies a custom format for the key id of a signed certificate.
@@ -1047,13 +1052,13 @@ class SecretBackendRole(pulumi.CustomResource):
1047
1052
  allowed_domains: Optional[pulumi.Input[str]] = None,
1048
1053
  allowed_domains_template: Optional[pulumi.Input[bool]] = None,
1049
1054
  allowed_extensions: Optional[pulumi.Input[str]] = None,
1050
- allowed_user_key_configs: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRoleAllowedUserKeyConfigArgs']]]]] = None,
1055
+ allowed_user_key_configs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleAllowedUserKeyConfigArgs', 'SecretBackendRoleAllowedUserKeyConfigArgsDict']]]]] = None,
1051
1056
  allowed_users: Optional[pulumi.Input[str]] = None,
1052
1057
  allowed_users_template: Optional[pulumi.Input[bool]] = None,
1053
1058
  backend: Optional[pulumi.Input[str]] = None,
1054
1059
  cidr_list: Optional[pulumi.Input[str]] = None,
1055
- default_critical_options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1056
- default_extensions: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1060
+ default_critical_options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1061
+ default_extensions: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1057
1062
  default_user: Optional[pulumi.Input[str]] = None,
1058
1063
  default_user_template: Optional[pulumi.Input[bool]] = None,
1059
1064
  key_id_format: Optional[pulumi.Input[str]] = None,
@@ -1122,13 +1127,13 @@ class SecretBackendRole(pulumi.CustomResource):
1122
1127
  allowed_domains: Optional[pulumi.Input[str]] = None,
1123
1128
  allowed_domains_template: Optional[pulumi.Input[bool]] = None,
1124
1129
  allowed_extensions: Optional[pulumi.Input[str]] = None,
1125
- allowed_user_key_configs: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRoleAllowedUserKeyConfigArgs']]]]] = None,
1130
+ allowed_user_key_configs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleAllowedUserKeyConfigArgs', 'SecretBackendRoleAllowedUserKeyConfigArgsDict']]]]] = None,
1126
1131
  allowed_users: Optional[pulumi.Input[str]] = None,
1127
1132
  allowed_users_template: Optional[pulumi.Input[bool]] = None,
1128
1133
  backend: Optional[pulumi.Input[str]] = None,
1129
1134
  cidr_list: Optional[pulumi.Input[str]] = None,
1130
- default_critical_options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1131
- default_extensions: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1135
+ default_critical_options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1136
+ default_extensions: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1132
1137
  default_user: Optional[pulumi.Input[str]] = None,
1133
1138
  default_user_template: Optional[pulumi.Input[bool]] = None,
1134
1139
  key_id_format: Optional[pulumi.Input[str]] = None,
@@ -1156,15 +1161,15 @@ class SecretBackendRole(pulumi.CustomResource):
1156
1161
  :param pulumi.Input[bool] allowed_domains_template: Specifies if `allowed_domains` can be declared using
1157
1162
  identity template policies. Non-templated domains are also permitted.
1158
1163
  :param pulumi.Input[str] allowed_extensions: Specifies a comma-separated list of extensions that certificates can have when signed.
1159
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRoleAllowedUserKeyConfigArgs']]]] allowed_user_key_configs: Set of configuration blocks to define allowed
1164
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleAllowedUserKeyConfigArgs', 'SecretBackendRoleAllowedUserKeyConfigArgsDict']]]] allowed_user_key_configs: Set of configuration blocks to define allowed
1160
1165
  user key configuration, like key type and their lengths. Can be specified multiple times.
1161
1166
  *See Configuration-Options for more info*
1162
1167
  :param pulumi.Input[str] allowed_users: Specifies a comma-separated list of usernames that are to be allowed, only if certain usernames are to be allowed.
1163
1168
  :param pulumi.Input[bool] allowed_users_template: Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
1164
1169
  :param pulumi.Input[str] backend: The path where the SSH secret backend is mounted.
1165
1170
  :param pulumi.Input[str] cidr_list: The comma-separated string of CIDR blocks for which this role is applicable.
1166
- :param pulumi.Input[Mapping[str, Any]] default_critical_options: Specifies a map of critical options that certificates have when signed.
1167
- :param pulumi.Input[Mapping[str, Any]] default_extensions: Specifies a map of extensions that certificates have when signed.
1171
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] default_critical_options: Specifies a map of critical options that certificates have when signed.
1172
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] default_extensions: Specifies a map of extensions that certificates have when signed.
1168
1173
  :param pulumi.Input[str] default_user: Specifies the default username for which a credential will be generated.
1169
1174
  :param pulumi.Input[bool] default_user_template: If set, `default_users` can be specified using identity template values. A non-templated user is also permitted.
1170
1175
  :param pulumi.Input[str] key_id_format: Specifies a custom format for the key id of a signed certificate.
@@ -1335,7 +1340,7 @@ class SecretBackendRole(pulumi.CustomResource):
1335
1340
 
1336
1341
  @property
1337
1342
  @pulumi.getter(name="defaultCriticalOptions")
1338
- def default_critical_options(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
1343
+ def default_critical_options(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
1339
1344
  """
1340
1345
  Specifies a map of critical options that certificates have when signed.
1341
1346
  """
@@ -1343,7 +1348,7 @@ class SecretBackendRole(pulumi.CustomResource):
1343
1348
 
1344
1349
  @property
1345
1350
  @pulumi.getter(name="defaultExtensions")
1346
- def default_extensions(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
1351
+ def default_extensions(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
1347
1352
  """
1348
1353
  Specifies a map of extensions that certificates have when signed.
1349
1354
  """
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendArgs', 'SecretBackend']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretCredsArgs', 'SecretCreds']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretRoleArgs', 'SecretRole']
pulumi_vault/token.py CHANGED
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['TokenArgs', 'Token']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
@@ -47,8 +52,6 @@ class AuthBackendRoleArgs:
47
52
  *Available only for Vault Enterprise*.
48
53
  :param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
49
54
  :param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
50
-
51
- > Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
52
55
  :param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
53
56
  :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
54
57
  :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
@@ -202,8 +205,6 @@ class AuthBackendRoleArgs:
202
205
  def path_suffix(self) -> Optional[pulumi.Input[str]]:
203
206
  """
204
207
  Tokens created against this role will have the given suffix as part of their path in addition to the role name.
205
-
206
- > Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
207
208
  """
208
209
  return pulumi.get(self, "path_suffix")
209
210
 
@@ -367,8 +368,6 @@ class _AuthBackendRoleState:
367
368
  *Available only for Vault Enterprise*.
368
369
  :param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
369
370
  :param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
370
-
371
- > Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
372
371
  :param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
373
372
  :param pulumi.Input[str] role_name: The name of the role.
374
373
  :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
@@ -512,8 +511,6 @@ class _AuthBackendRoleState:
512
511
  def path_suffix(self) -> Optional[pulumi.Input[str]]:
513
512
  """
514
513
  Tokens created against this role will have the given suffix as part of their path in addition to the role name.
515
-
516
- > Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
517
514
  """
518
515
  return pulumi.get(self, "path_suffix")
519
516
 
@@ -726,8 +723,6 @@ class AuthBackendRole(pulumi.CustomResource):
726
723
  *Available only for Vault Enterprise*.
727
724
  :param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
728
725
  :param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
729
-
730
- > Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
731
726
  :param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
732
727
  :param pulumi.Input[str] role_name: The name of the role.
733
728
  :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
@@ -891,8 +886,6 @@ class AuthBackendRole(pulumi.CustomResource):
891
886
  *Available only for Vault Enterprise*.
892
887
  :param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
893
888
  :param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
894
-
895
- > Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
896
889
  :param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
897
890
  :param pulumi.Input[str] role_name: The name of the role.
898
891
  :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
@@ -994,8 +987,6 @@ class AuthBackendRole(pulumi.CustomResource):
994
987
  def path_suffix(self) -> pulumi.Output[Optional[str]]:
995
988
  """
996
989
  Tokens created against this role will have the given suffix as part of their path in addition to the role name.
997
-
998
- > Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
999
990
  """
1000
991
  return pulumi.get(self, "path_suffix")
1001
992
 
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['AlphabetArgs', 'Alphabet']