pulumi-vault 6.3.0a1723010642__py3-none-any.whl → 6.3.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +560 -0
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +19 -4
  4. pulumi_vault/ad/secret_backend.py +5 -0
  5. pulumi_vault/ad/secret_library.py +5 -0
  6. pulumi_vault/ad/secret_role.py +5 -0
  7. pulumi_vault/alicloud/auth_backend_role.py +5 -0
  8. pulumi_vault/approle/auth_backend_login.py +5 -0
  9. pulumi_vault/approle/auth_backend_role.py +5 -0
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
  11. pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
  12. pulumi_vault/audit.py +5 -0
  13. pulumi_vault/audit_request_header.py +5 -0
  14. pulumi_vault/auth_backend.py +10 -5
  15. pulumi_vault/aws/auth_backend_cert.py +5 -0
  16. pulumi_vault/aws/auth_backend_client.py +5 -0
  17. pulumi_vault/aws/auth_backend_config_identity.py +5 -0
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
  19. pulumi_vault/aws/auth_backend_login.py +12 -7
  20. pulumi_vault/aws/auth_backend_role.py +5 -0
  21. pulumi_vault/aws/auth_backend_role_tag.py +5 -0
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
  23. pulumi_vault/aws/auth_backend_sts_role.py +5 -0
  24. pulumi_vault/aws/get_access_credentials.py +31 -4
  25. pulumi_vault/aws/get_static_access_credentials.py +18 -4
  26. pulumi_vault/aws/secret_backend.py +5 -0
  27. pulumi_vault/aws/secret_backend_role.py +120 -0
  28. pulumi_vault/aws/secret_backend_static_role.py +5 -0
  29. pulumi_vault/azure/_inputs.py +24 -0
  30. pulumi_vault/azure/auth_backend_config.py +5 -0
  31. pulumi_vault/azure/auth_backend_role.py +5 -0
  32. pulumi_vault/azure/backend.py +5 -0
  33. pulumi_vault/azure/backend_role.py +23 -18
  34. pulumi_vault/azure/get_access_credentials.py +36 -4
  35. pulumi_vault/azure/outputs.py +5 -0
  36. pulumi_vault/cert_auth_backend_role.py +5 -0
  37. pulumi_vault/config/__init__.pyi +5 -0
  38. pulumi_vault/config/_inputs.py +21 -0
  39. pulumi_vault/config/outputs.py +5 -0
  40. pulumi_vault/config/ui_custom_message.py +24 -19
  41. pulumi_vault/config/vars.py +5 -0
  42. pulumi_vault/consul/secret_backend.py +5 -0
  43. pulumi_vault/consul/secret_backend_role.py +5 -0
  44. pulumi_vault/database/_inputs.py +2091 -140
  45. pulumi_vault/database/outputs.py +59 -54
  46. pulumi_vault/database/secret_backend_connection.py +115 -110
  47. pulumi_vault/database/secret_backend_role.py +25 -20
  48. pulumi_vault/database/secret_backend_static_role.py +11 -6
  49. pulumi_vault/database/secrets_mount.py +139 -134
  50. pulumi_vault/egp_policy.py +5 -0
  51. pulumi_vault/gcp/_inputs.py +111 -0
  52. pulumi_vault/gcp/auth_backend.py +15 -10
  53. pulumi_vault/gcp/auth_backend_role.py +5 -0
  54. pulumi_vault/gcp/get_auth_backend_role.py +42 -4
  55. pulumi_vault/gcp/outputs.py +5 -0
  56. pulumi_vault/gcp/secret_backend.py +5 -0
  57. pulumi_vault/gcp/secret_impersonated_account.py +5 -0
  58. pulumi_vault/gcp/secret_roleset.py +18 -13
  59. pulumi_vault/gcp/secret_static_account.py +18 -13
  60. pulumi_vault/generic/endpoint.py +5 -0
  61. pulumi_vault/generic/get_secret.py +25 -5
  62. pulumi_vault/generic/secret.py +12 -7
  63. pulumi_vault/get_auth_backend.py +21 -4
  64. pulumi_vault/get_auth_backends.py +16 -4
  65. pulumi_vault/get_namespace.py +18 -5
  66. pulumi_vault/get_namespaces.py +13 -4
  67. pulumi_vault/get_nomad_access_token.py +28 -8
  68. pulumi_vault/get_policy_document.py +27 -16
  69. pulumi_vault/get_raft_autopilot_state.py +26 -7
  70. pulumi_vault/github/_inputs.py +55 -0
  71. pulumi_vault/github/auth_backend.py +10 -5
  72. pulumi_vault/github/outputs.py +5 -0
  73. pulumi_vault/github/team.py +5 -0
  74. pulumi_vault/github/user.py +5 -0
  75. pulumi_vault/identity/entity.py +5 -0
  76. pulumi_vault/identity/entity_alias.py +5 -0
  77. pulumi_vault/identity/entity_policies.py +5 -0
  78. pulumi_vault/identity/get_entity.py +37 -7
  79. pulumi_vault/identity/get_group.py +42 -6
  80. pulumi_vault/identity/get_oidc_client_creds.py +16 -4
  81. pulumi_vault/identity/get_oidc_openid_config.py +26 -4
  82. pulumi_vault/identity/get_oidc_public_keys.py +16 -5
  83. pulumi_vault/identity/group.py +5 -0
  84. pulumi_vault/identity/group_alias.py +5 -0
  85. pulumi_vault/identity/group_member_entity_ids.py +5 -0
  86. pulumi_vault/identity/group_member_group_ids.py +5 -0
  87. pulumi_vault/identity/group_policies.py +5 -0
  88. pulumi_vault/identity/mfa_duo.py +5 -0
  89. pulumi_vault/identity/mfa_login_enforcement.py +5 -0
  90. pulumi_vault/identity/mfa_okta.py +5 -0
  91. pulumi_vault/identity/mfa_pingid.py +5 -0
  92. pulumi_vault/identity/mfa_totp.py +5 -0
  93. pulumi_vault/identity/oidc.py +5 -0
  94. pulumi_vault/identity/oidc_assignment.py +5 -0
  95. pulumi_vault/identity/oidc_client.py +5 -0
  96. pulumi_vault/identity/oidc_key.py +5 -0
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
  98. pulumi_vault/identity/oidc_provider.py +5 -0
  99. pulumi_vault/identity/oidc_role.py +5 -0
  100. pulumi_vault/identity/oidc_scope.py +5 -0
  101. pulumi_vault/identity/outputs.py +8 -3
  102. pulumi_vault/jwt/_inputs.py +55 -0
  103. pulumi_vault/jwt/auth_backend.py +14 -9
  104. pulumi_vault/jwt/auth_backend_role.py +33 -28
  105. pulumi_vault/jwt/outputs.py +5 -0
  106. pulumi_vault/kmip/secret_backend.py +5 -0
  107. pulumi_vault/kmip/secret_role.py +5 -0
  108. pulumi_vault/kmip/secret_scope.py +5 -0
  109. pulumi_vault/kubernetes/auth_backend_config.py +5 -0
  110. pulumi_vault/kubernetes/auth_backend_role.py +5 -0
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
  113. pulumi_vault/kubernetes/get_service_account_token.py +28 -4
  114. pulumi_vault/kubernetes/secret_backend.py +19 -14
  115. pulumi_vault/kubernetes/secret_backend_role.py +5 -0
  116. pulumi_vault/kv/_inputs.py +36 -4
  117. pulumi_vault/kv/get_secret.py +20 -5
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +24 -5
  119. pulumi_vault/kv/get_secret_v2.py +27 -6
  120. pulumi_vault/kv/get_secrets_list.py +15 -4
  121. pulumi_vault/kv/get_secrets_list_v2.py +18 -4
  122. pulumi_vault/kv/outputs.py +8 -3
  123. pulumi_vault/kv/secret.py +12 -7
  124. pulumi_vault/kv/secret_backend_v2.py +5 -0
  125. pulumi_vault/kv/secret_v2.py +46 -41
  126. pulumi_vault/ldap/auth_backend.py +5 -0
  127. pulumi_vault/ldap/auth_backend_group.py +5 -0
  128. pulumi_vault/ldap/auth_backend_user.py +5 -0
  129. pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
  130. pulumi_vault/ldap/get_static_credentials.py +23 -4
  131. pulumi_vault/ldap/secret_backend.py +19 -14
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
  133. pulumi_vault/ldap/secret_backend_library_set.py +5 -0
  134. pulumi_vault/ldap/secret_backend_static_role.py +5 -0
  135. pulumi_vault/managed/_inputs.py +205 -0
  136. pulumi_vault/managed/keys.py +20 -15
  137. pulumi_vault/managed/outputs.py +5 -0
  138. pulumi_vault/mfa_duo.py +5 -0
  139. pulumi_vault/mfa_okta.py +5 -0
  140. pulumi_vault/mfa_pingid.py +5 -0
  141. pulumi_vault/mfa_totp.py +5 -0
  142. pulumi_vault/mongodbatlas/secret_backend.py +5 -0
  143. pulumi_vault/mongodbatlas/secret_role.py +5 -0
  144. pulumi_vault/mount.py +35 -23
  145. pulumi_vault/namespace.py +19 -14
  146. pulumi_vault/nomad_secret_backend.py +5 -0
  147. pulumi_vault/nomad_secret_role.py +5 -0
  148. pulumi_vault/okta/_inputs.py +39 -0
  149. pulumi_vault/okta/auth_backend.py +31 -26
  150. pulumi_vault/okta/auth_backend_group.py +5 -0
  151. pulumi_vault/okta/auth_backend_user.py +5 -0
  152. pulumi_vault/okta/outputs.py +5 -0
  153. pulumi_vault/outputs.py +5 -0
  154. pulumi_vault/password_policy.py +5 -0
  155. pulumi_vault/pkisecret/_inputs.py +49 -8
  156. pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
  157. pulumi_vault/pkisecret/backend_config_est.py +24 -19
  158. pulumi_vault/pkisecret/get_backend_config_est.py +23 -5
  159. pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
  160. pulumi_vault/pkisecret/get_backend_issuers.py +18 -5
  161. pulumi_vault/pkisecret/get_backend_key.py +19 -4
  162. pulumi_vault/pkisecret/get_backend_keys.py +18 -5
  163. pulumi_vault/pkisecret/outputs.py +17 -12
  164. pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
  172. pulumi_vault/pkisecret/secret_backend_key.py +5 -0
  173. pulumi_vault/pkisecret/secret_backend_role.py +10 -5
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
  176. pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
  177. pulumi_vault/plugin.py +5 -0
  178. pulumi_vault/plugin_pinned_version.py +5 -0
  179. pulumi_vault/policy.py +5 -0
  180. pulumi_vault/provider.py +47 -42
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +5 -0
  183. pulumi_vault/quota_rate_limit.py +5 -0
  184. pulumi_vault/rabbitmq/_inputs.py +61 -0
  185. pulumi_vault/rabbitmq/outputs.py +5 -0
  186. pulumi_vault/rabbitmq/secret_backend.py +5 -0
  187. pulumi_vault/rabbitmq/secret_backend_role.py +43 -38
  188. pulumi_vault/raft_autopilot.py +5 -0
  189. pulumi_vault/raft_snapshot_agent_config.py +5 -0
  190. pulumi_vault/rgp_policy.py +5 -0
  191. pulumi_vault/saml/auth_backend.py +5 -0
  192. pulumi_vault/saml/auth_backend_role.py +19 -14
  193. pulumi_vault/secrets/_inputs.py +30 -0
  194. pulumi_vault/secrets/outputs.py +5 -0
  195. pulumi_vault/secrets/sync_association.py +7 -2
  196. pulumi_vault/secrets/sync_aws_destination.py +19 -14
  197. pulumi_vault/secrets/sync_azure_destination.py +19 -14
  198. pulumi_vault/secrets/sync_config.py +5 -0
  199. pulumi_vault/secrets/sync_gcp_destination.py +19 -14
  200. pulumi_vault/secrets/sync_gh_destination.py +5 -0
  201. pulumi_vault/secrets/sync_github_apps.py +5 -0
  202. pulumi_vault/secrets/sync_vercel_destination.py +5 -0
  203. pulumi_vault/ssh/_inputs.py +22 -0
  204. pulumi_vault/ssh/outputs.py +5 -0
  205. pulumi_vault/ssh/secret_backend_ca.py +5 -0
  206. pulumi_vault/ssh/secret_backend_role.py +38 -33
  207. pulumi_vault/terraformcloud/secret_backend.py +5 -0
  208. pulumi_vault/terraformcloud/secret_creds.py +5 -0
  209. pulumi_vault/terraformcloud/secret_role.py +5 -0
  210. pulumi_vault/token.py +5 -0
  211. pulumi_vault/tokenauth/auth_backend_role.py +5 -14
  212. pulumi_vault/transform/alphabet.py +5 -0
  213. pulumi_vault/transform/get_decode.py +38 -14
  214. pulumi_vault/transform/get_encode.py +38 -14
  215. pulumi_vault/transform/role.py +5 -0
  216. pulumi_vault/transform/template.py +19 -14
  217. pulumi_vault/transform/transformation.py +5 -0
  218. pulumi_vault/transit/get_decrypt.py +21 -4
  219. pulumi_vault/transit/get_encrypt.py +23 -4
  220. pulumi_vault/transit/secret_backend_key.py +12 -7
  221. pulumi_vault/transit/secret_cache_config.py +5 -0
  222. {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/METADATA +3 -2
  223. pulumi_vault-6.3.1.dist-info/RECORD +256 -0
  224. {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/WHEEL +1 -1
  225. pulumi_vault-6.3.0a1723010642.dist-info/RECORD +0 -256
  226. {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
@@ -17,6 +22,7 @@ class SecretBackendRoleArgs:
17
22
  backend: pulumi.Input[str],
18
23
  credential_type: pulumi.Input[str],
19
24
  default_sts_ttl: Optional[pulumi.Input[int]] = None,
25
+ external_id: Optional[pulumi.Input[str]] = None,
20
26
  iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
21
27
  iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
22
28
  max_sts_ttl: Optional[pulumi.Input[int]] = None,
@@ -26,6 +32,7 @@ class SecretBackendRoleArgs:
26
32
  policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
27
33
  policy_document: Optional[pulumi.Input[str]] = None,
28
34
  role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
35
+ session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
29
36
  user_path: Optional[pulumi.Input[str]] = None):
30
37
  """
31
38
  The set of arguments for constructing a SecretBackendRole resource.
@@ -39,6 +46,8 @@ class SecretBackendRoleArgs:
39
46
  and a default TTL is specified on the role,
40
47
  then this default TTL will be used. Valid only when `credential_type` is one of
41
48
  `assumed_role` or `federation_token`.
49
+ :param pulumi.Input[str] external_id: External ID to set for assume role creds.
50
+ Valid only when `credential_type` is set to `assumed_role`.
42
51
  :param pulumi.Input[Sequence[pulumi.Input[str]]] iam_groups: A list of IAM group names. IAM users generated
43
52
  against this vault role will be added to these IAM Groups. For a credential
44
53
  type of `assumed_role` or `federation_token`, the policies sent to the
@@ -75,6 +84,9 @@ class SecretBackendRoleArgs:
75
84
  :param pulumi.Input[Sequence[pulumi.Input[str]]] role_arns: Specifies the ARNs of the AWS roles this Vault role
76
85
  is allowed to assume. Required when `credential_type` is `assumed_role` and
77
86
  prohibited otherwise.
87
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] session_tags: A map of strings representing key/value pairs to be set
88
+ during assume role creds creation. Valid only when `credential_type` is set to
89
+ `assumed_role`.
78
90
  :param pulumi.Input[str] user_path: The path for the user name. Valid only when
79
91
  `credential_type` is `iam_user`. Default is `/`.
80
92
  """
@@ -82,6 +94,8 @@ class SecretBackendRoleArgs:
82
94
  pulumi.set(__self__, "credential_type", credential_type)
83
95
  if default_sts_ttl is not None:
84
96
  pulumi.set(__self__, "default_sts_ttl", default_sts_ttl)
97
+ if external_id is not None:
98
+ pulumi.set(__self__, "external_id", external_id)
85
99
  if iam_groups is not None:
86
100
  pulumi.set(__self__, "iam_groups", iam_groups)
87
101
  if iam_tags is not None:
@@ -100,6 +114,8 @@ class SecretBackendRoleArgs:
100
114
  pulumi.set(__self__, "policy_document", policy_document)
101
115
  if role_arns is not None:
102
116
  pulumi.set(__self__, "role_arns", role_arns)
117
+ if session_tags is not None:
118
+ pulumi.set(__self__, "session_tags", session_tags)
103
119
  if user_path is not None:
104
120
  pulumi.set(__self__, "user_path", user_path)
105
121
 
@@ -146,6 +162,19 @@ class SecretBackendRoleArgs:
146
162
  def default_sts_ttl(self, value: Optional[pulumi.Input[int]]):
147
163
  pulumi.set(self, "default_sts_ttl", value)
148
164
 
165
+ @property
166
+ @pulumi.getter(name="externalId")
167
+ def external_id(self) -> Optional[pulumi.Input[str]]:
168
+ """
169
+ External ID to set for assume role creds.
170
+ Valid only when `credential_type` is set to `assumed_role`.
171
+ """
172
+ return pulumi.get(self, "external_id")
173
+
174
+ @external_id.setter
175
+ def external_id(self, value: Optional[pulumi.Input[str]]):
176
+ pulumi.set(self, "external_id", value)
177
+
149
178
  @property
150
179
  @pulumi.getter(name="iamGroups")
151
180
  def iam_groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
@@ -281,6 +310,20 @@ class SecretBackendRoleArgs:
281
310
  def role_arns(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
282
311
  pulumi.set(self, "role_arns", value)
283
312
 
313
+ @property
314
+ @pulumi.getter(name="sessionTags")
315
+ def session_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
316
+ """
317
+ A map of strings representing key/value pairs to be set
318
+ during assume role creds creation. Valid only when `credential_type` is set to
319
+ `assumed_role`.
320
+ """
321
+ return pulumi.get(self, "session_tags")
322
+
323
+ @session_tags.setter
324
+ def session_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
325
+ pulumi.set(self, "session_tags", value)
326
+
284
327
  @property
285
328
  @pulumi.getter(name="userPath")
286
329
  def user_path(self) -> Optional[pulumi.Input[str]]:
@@ -301,6 +344,7 @@ class _SecretBackendRoleState:
301
344
  backend: Optional[pulumi.Input[str]] = None,
302
345
  credential_type: Optional[pulumi.Input[str]] = None,
303
346
  default_sts_ttl: Optional[pulumi.Input[int]] = None,
347
+ external_id: Optional[pulumi.Input[str]] = None,
304
348
  iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
305
349
  iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
306
350
  max_sts_ttl: Optional[pulumi.Input[int]] = None,
@@ -310,6 +354,7 @@ class _SecretBackendRoleState:
310
354
  policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
311
355
  policy_document: Optional[pulumi.Input[str]] = None,
312
356
  role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
357
+ session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
313
358
  user_path: Optional[pulumi.Input[str]] = None):
314
359
  """
315
360
  Input properties used for looking up and filtering SecretBackendRole resources.
@@ -323,6 +368,8 @@ class _SecretBackendRoleState:
323
368
  and a default TTL is specified on the role,
324
369
  then this default TTL will be used. Valid only when `credential_type` is one of
325
370
  `assumed_role` or `federation_token`.
371
+ :param pulumi.Input[str] external_id: External ID to set for assume role creds.
372
+ Valid only when `credential_type` is set to `assumed_role`.
326
373
  :param pulumi.Input[Sequence[pulumi.Input[str]]] iam_groups: A list of IAM group names. IAM users generated
327
374
  against this vault role will be added to these IAM Groups. For a credential
328
375
  type of `assumed_role` or `federation_token`, the policies sent to the
@@ -359,6 +406,9 @@ class _SecretBackendRoleState:
359
406
  :param pulumi.Input[Sequence[pulumi.Input[str]]] role_arns: Specifies the ARNs of the AWS roles this Vault role
360
407
  is allowed to assume. Required when `credential_type` is `assumed_role` and
361
408
  prohibited otherwise.
409
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] session_tags: A map of strings representing key/value pairs to be set
410
+ during assume role creds creation. Valid only when `credential_type` is set to
411
+ `assumed_role`.
362
412
  :param pulumi.Input[str] user_path: The path for the user name. Valid only when
363
413
  `credential_type` is `iam_user`. Default is `/`.
364
414
  """
@@ -368,6 +418,8 @@ class _SecretBackendRoleState:
368
418
  pulumi.set(__self__, "credential_type", credential_type)
369
419
  if default_sts_ttl is not None:
370
420
  pulumi.set(__self__, "default_sts_ttl", default_sts_ttl)
421
+ if external_id is not None:
422
+ pulumi.set(__self__, "external_id", external_id)
371
423
  if iam_groups is not None:
372
424
  pulumi.set(__self__, "iam_groups", iam_groups)
373
425
  if iam_tags is not None:
@@ -386,6 +438,8 @@ class _SecretBackendRoleState:
386
438
  pulumi.set(__self__, "policy_document", policy_document)
387
439
  if role_arns is not None:
388
440
  pulumi.set(__self__, "role_arns", role_arns)
441
+ if session_tags is not None:
442
+ pulumi.set(__self__, "session_tags", session_tags)
389
443
  if user_path is not None:
390
444
  pulumi.set(__self__, "user_path", user_path)
391
445
 
@@ -432,6 +486,19 @@ class _SecretBackendRoleState:
432
486
  def default_sts_ttl(self, value: Optional[pulumi.Input[int]]):
433
487
  pulumi.set(self, "default_sts_ttl", value)
434
488
 
489
+ @property
490
+ @pulumi.getter(name="externalId")
491
+ def external_id(self) -> Optional[pulumi.Input[str]]:
492
+ """
493
+ External ID to set for assume role creds.
494
+ Valid only when `credential_type` is set to `assumed_role`.
495
+ """
496
+ return pulumi.get(self, "external_id")
497
+
498
+ @external_id.setter
499
+ def external_id(self, value: Optional[pulumi.Input[str]]):
500
+ pulumi.set(self, "external_id", value)
501
+
435
502
  @property
436
503
  @pulumi.getter(name="iamGroups")
437
504
  def iam_groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
@@ -567,6 +634,20 @@ class _SecretBackendRoleState:
567
634
  def role_arns(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
568
635
  pulumi.set(self, "role_arns", value)
569
636
 
637
+ @property
638
+ @pulumi.getter(name="sessionTags")
639
+ def session_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
640
+ """
641
+ A map of strings representing key/value pairs to be set
642
+ during assume role creds creation. Valid only when `credential_type` is set to
643
+ `assumed_role`.
644
+ """
645
+ return pulumi.get(self, "session_tags")
646
+
647
+ @session_tags.setter
648
+ def session_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
649
+ pulumi.set(self, "session_tags", value)
650
+
570
651
  @property
571
652
  @pulumi.getter(name="userPath")
572
653
  def user_path(self) -> Optional[pulumi.Input[str]]:
@@ -589,6 +670,7 @@ class SecretBackendRole(pulumi.CustomResource):
589
670
  backend: Optional[pulumi.Input[str]] = None,
590
671
  credential_type: Optional[pulumi.Input[str]] = None,
591
672
  default_sts_ttl: Optional[pulumi.Input[int]] = None,
673
+ external_id: Optional[pulumi.Input[str]] = None,
592
674
  iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
593
675
  iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
594
676
  max_sts_ttl: Optional[pulumi.Input[int]] = None,
@@ -598,6 +680,7 @@ class SecretBackendRole(pulumi.CustomResource):
598
680
  policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
599
681
  policy_document: Optional[pulumi.Input[str]] = None,
600
682
  role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
683
+ session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
601
684
  user_path: Optional[pulumi.Input[str]] = None,
602
685
  __props__=None):
603
686
  """
@@ -647,6 +730,8 @@ class SecretBackendRole(pulumi.CustomResource):
647
730
  and a default TTL is specified on the role,
648
731
  then this default TTL will be used. Valid only when `credential_type` is one of
649
732
  `assumed_role` or `federation_token`.
733
+ :param pulumi.Input[str] external_id: External ID to set for assume role creds.
734
+ Valid only when `credential_type` is set to `assumed_role`.
650
735
  :param pulumi.Input[Sequence[pulumi.Input[str]]] iam_groups: A list of IAM group names. IAM users generated
651
736
  against this vault role will be added to these IAM Groups. For a credential
652
737
  type of `assumed_role` or `federation_token`, the policies sent to the
@@ -683,6 +768,9 @@ class SecretBackendRole(pulumi.CustomResource):
683
768
  :param pulumi.Input[Sequence[pulumi.Input[str]]] role_arns: Specifies the ARNs of the AWS roles this Vault role
684
769
  is allowed to assume. Required when `credential_type` is `assumed_role` and
685
770
  prohibited otherwise.
771
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] session_tags: A map of strings representing key/value pairs to be set
772
+ during assume role creds creation. Valid only when `credential_type` is set to
773
+ `assumed_role`.
686
774
  :param pulumi.Input[str] user_path: The path for the user name. Valid only when
687
775
  `credential_type` is `iam_user`. Default is `/`.
688
776
  """
@@ -745,6 +833,7 @@ class SecretBackendRole(pulumi.CustomResource):
745
833
  backend: Optional[pulumi.Input[str]] = None,
746
834
  credential_type: Optional[pulumi.Input[str]] = None,
747
835
  default_sts_ttl: Optional[pulumi.Input[int]] = None,
836
+ external_id: Optional[pulumi.Input[str]] = None,
748
837
  iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
749
838
  iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
750
839
  max_sts_ttl: Optional[pulumi.Input[int]] = None,
@@ -754,6 +843,7 @@ class SecretBackendRole(pulumi.CustomResource):
754
843
  policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
755
844
  policy_document: Optional[pulumi.Input[str]] = None,
756
845
  role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
846
+ session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
757
847
  user_path: Optional[pulumi.Input[str]] = None,
758
848
  __props__=None):
759
849
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
@@ -771,6 +861,7 @@ class SecretBackendRole(pulumi.CustomResource):
771
861
  raise TypeError("Missing required property 'credential_type'")
772
862
  __props__.__dict__["credential_type"] = credential_type
773
863
  __props__.__dict__["default_sts_ttl"] = default_sts_ttl
864
+ __props__.__dict__["external_id"] = external_id
774
865
  __props__.__dict__["iam_groups"] = iam_groups
775
866
  __props__.__dict__["iam_tags"] = iam_tags
776
867
  __props__.__dict__["max_sts_ttl"] = max_sts_ttl
@@ -780,6 +871,7 @@ class SecretBackendRole(pulumi.CustomResource):
780
871
  __props__.__dict__["policy_arns"] = policy_arns
781
872
  __props__.__dict__["policy_document"] = policy_document
782
873
  __props__.__dict__["role_arns"] = role_arns
874
+ __props__.__dict__["session_tags"] = session_tags
783
875
  __props__.__dict__["user_path"] = user_path
784
876
  super(SecretBackendRole, __self__).__init__(
785
877
  'vault:aws/secretBackendRole:SecretBackendRole',
@@ -794,6 +886,7 @@ class SecretBackendRole(pulumi.CustomResource):
794
886
  backend: Optional[pulumi.Input[str]] = None,
795
887
  credential_type: Optional[pulumi.Input[str]] = None,
796
888
  default_sts_ttl: Optional[pulumi.Input[int]] = None,
889
+ external_id: Optional[pulumi.Input[str]] = None,
797
890
  iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
798
891
  iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
799
892
  max_sts_ttl: Optional[pulumi.Input[int]] = None,
@@ -803,6 +896,7 @@ class SecretBackendRole(pulumi.CustomResource):
803
896
  policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
804
897
  policy_document: Optional[pulumi.Input[str]] = None,
805
898
  role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
899
+ session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
806
900
  user_path: Optional[pulumi.Input[str]] = None) -> 'SecretBackendRole':
807
901
  """
808
902
  Get an existing SecretBackendRole resource's state with the given name, id, and optional extra
@@ -821,6 +915,8 @@ class SecretBackendRole(pulumi.CustomResource):
821
915
  and a default TTL is specified on the role,
822
916
  then this default TTL will be used. Valid only when `credential_type` is one of
823
917
  `assumed_role` or `federation_token`.
918
+ :param pulumi.Input[str] external_id: External ID to set for assume role creds.
919
+ Valid only when `credential_type` is set to `assumed_role`.
824
920
  :param pulumi.Input[Sequence[pulumi.Input[str]]] iam_groups: A list of IAM group names. IAM users generated
825
921
  against this vault role will be added to these IAM Groups. For a credential
826
922
  type of `assumed_role` or `federation_token`, the policies sent to the
@@ -857,6 +953,9 @@ class SecretBackendRole(pulumi.CustomResource):
857
953
  :param pulumi.Input[Sequence[pulumi.Input[str]]] role_arns: Specifies the ARNs of the AWS roles this Vault role
858
954
  is allowed to assume. Required when `credential_type` is `assumed_role` and
859
955
  prohibited otherwise.
956
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] session_tags: A map of strings representing key/value pairs to be set
957
+ during assume role creds creation. Valid only when `credential_type` is set to
958
+ `assumed_role`.
860
959
  :param pulumi.Input[str] user_path: The path for the user name. Valid only when
861
960
  `credential_type` is `iam_user`. Default is `/`.
862
961
  """
@@ -867,6 +966,7 @@ class SecretBackendRole(pulumi.CustomResource):
867
966
  __props__.__dict__["backend"] = backend
868
967
  __props__.__dict__["credential_type"] = credential_type
869
968
  __props__.__dict__["default_sts_ttl"] = default_sts_ttl
969
+ __props__.__dict__["external_id"] = external_id
870
970
  __props__.__dict__["iam_groups"] = iam_groups
871
971
  __props__.__dict__["iam_tags"] = iam_tags
872
972
  __props__.__dict__["max_sts_ttl"] = max_sts_ttl
@@ -876,6 +976,7 @@ class SecretBackendRole(pulumi.CustomResource):
876
976
  __props__.__dict__["policy_arns"] = policy_arns
877
977
  __props__.__dict__["policy_document"] = policy_document
878
978
  __props__.__dict__["role_arns"] = role_arns
979
+ __props__.__dict__["session_tags"] = session_tags
879
980
  __props__.__dict__["user_path"] = user_path
880
981
  return SecretBackendRole(resource_name, opts=opts, __props__=__props__)
881
982
 
@@ -910,6 +1011,15 @@ class SecretBackendRole(pulumi.CustomResource):
910
1011
  """
911
1012
  return pulumi.get(self, "default_sts_ttl")
912
1013
 
1014
+ @property
1015
+ @pulumi.getter(name="externalId")
1016
+ def external_id(self) -> pulumi.Output[Optional[str]]:
1017
+ """
1018
+ External ID to set for assume role creds.
1019
+ Valid only when `credential_type` is set to `assumed_role`.
1020
+ """
1021
+ return pulumi.get(self, "external_id")
1022
+
913
1023
  @property
914
1024
  @pulumi.getter(name="iamGroups")
915
1025
  def iam_groups(self) -> pulumi.Output[Optional[Sequence[str]]]:
@@ -1009,6 +1119,16 @@ class SecretBackendRole(pulumi.CustomResource):
1009
1119
  """
1010
1120
  return pulumi.get(self, "role_arns")
1011
1121
 
1122
+ @property
1123
+ @pulumi.getter(name="sessionTags")
1124
+ def session_tags(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
1125
+ """
1126
+ A map of strings representing key/value pairs to be set
1127
+ during assume role creds creation. Valid only when `credential_type` is set to
1128
+ `assumed_role`.
1129
+ """
1130
+ return pulumi.get(self, "session_tags")
1131
+
1012
1132
  @property
1013
1133
  @pulumi.getter(name="userPath")
1014
1134
  def user_path(self) -> pulumi.Output[Optional[str]]:
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole']
@@ -4,16 +4,32 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
13
18
  'BackendRoleAzureGroupArgs',
19
+ 'BackendRoleAzureGroupArgsDict',
14
20
  'BackendRoleAzureRoleArgs',
21
+ 'BackendRoleAzureRoleArgsDict',
15
22
  ]
16
23
 
24
+ MYPY = False
25
+
26
+ if not MYPY:
27
+ class BackendRoleAzureGroupArgsDict(TypedDict):
28
+ group_name: pulumi.Input[str]
29
+ object_id: NotRequired[pulumi.Input[str]]
30
+ elif False:
31
+ BackendRoleAzureGroupArgsDict: TypeAlias = Mapping[str, Any]
32
+
17
33
  @pulumi.input_type
18
34
  class BackendRoleAzureGroupArgs:
19
35
  def __init__(__self__, *,
@@ -42,6 +58,14 @@ class BackendRoleAzureGroupArgs:
42
58
  pulumi.set(self, "object_id", value)
43
59
 
44
60
 
61
+ if not MYPY:
62
+ class BackendRoleAzureRoleArgsDict(TypedDict):
63
+ scope: pulumi.Input[str]
64
+ role_id: NotRequired[pulumi.Input[str]]
65
+ role_name: NotRequired[pulumi.Input[str]]
66
+ elif False:
67
+ BackendRoleAzureRoleArgsDict: TypeAlias = Mapping[str, Any]
68
+
45
69
  @pulumi.input_type
46
70
  class BackendRoleAzureRoleArgs:
47
71
  def __init__(__self__, *,
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['AuthBackendConfigArgs', 'AuthBackendConfig']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['BackendArgs', 'Backend']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
  from . import outputs
12
17
  from ._inputs import *
@@ -450,8 +455,8 @@ class BackendRole(pulumi.CustomResource):
450
455
  resource_name: str,
451
456
  opts: Optional[pulumi.ResourceOptions] = None,
452
457
  application_object_id: Optional[pulumi.Input[str]] = None,
453
- azure_groups: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['BackendRoleAzureGroupArgs']]]]] = None,
454
- azure_roles: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['BackendRoleAzureRoleArgs']]]]] = None,
458
+ azure_groups: Optional[pulumi.Input[Sequence[pulumi.Input[Union['BackendRoleAzureGroupArgs', 'BackendRoleAzureGroupArgsDict']]]]] = None,
459
+ azure_roles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['BackendRoleAzureRoleArgs', 'BackendRoleAzureRoleArgsDict']]]]] = None,
455
460
  backend: Optional[pulumi.Input[str]] = None,
456
461
  description: Optional[pulumi.Input[str]] = None,
457
462
  max_ttl: Optional[pulumi.Input[str]] = None,
@@ -484,10 +489,10 @@ class BackendRole(pulumi.CustomResource):
484
489
  ],
485
490
  ttl="300",
486
491
  max_ttl="600",
487
- azure_roles=[vault.azure.BackendRoleAzureRoleArgs(
488
- role_name="Reader",
489
- scope=f"/subscriptions/{subscription_id}/resourceGroups/azure-vault-group",
490
- )])
492
+ azure_roles=[{
493
+ "role_name": "Reader",
494
+ "scope": f"/subscriptions/{subscription_id}/resourceGroups/azure-vault-group",
495
+ }])
491
496
  existing_object_id = vault.azure.BackendRole("existing_object_id",
492
497
  backend=azure.path,
493
498
  role="existing_object_id",
@@ -500,8 +505,8 @@ class BackendRole(pulumi.CustomResource):
500
505
  :param pulumi.ResourceOptions opts: Options for the resource.
501
506
  :param pulumi.Input[str] application_object_id: Application Object ID for an existing service principal that will
502
507
  be used instead of creating dynamic service principals. If present, `azure_roles` and `permanently_delete` will be ignored.
503
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['BackendRoleAzureGroupArgs']]]] azure_groups: List of Azure groups to be assigned to the generated service principal.
504
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['BackendRoleAzureRoleArgs']]]] azure_roles: List of Azure roles to be assigned to the generated service principal.
508
+ :param pulumi.Input[Sequence[pulumi.Input[Union['BackendRoleAzureGroupArgs', 'BackendRoleAzureGroupArgsDict']]]] azure_groups: List of Azure groups to be assigned to the generated service principal.
509
+ :param pulumi.Input[Sequence[pulumi.Input[Union['BackendRoleAzureRoleArgs', 'BackendRoleAzureRoleArgsDict']]]] azure_roles: List of Azure roles to be assigned to the generated service principal.
505
510
  :param pulumi.Input[str] backend: Path to the mounted Azure auth backend
506
511
  :param pulumi.Input[str] description: Human-friendly description of the mount for the backend.
507
512
  :param pulumi.Input[str] max_ttl: Specifies the maximum TTL for service principals generated using this role. Accepts time
@@ -547,10 +552,10 @@ class BackendRole(pulumi.CustomResource):
547
552
  ],
548
553
  ttl="300",
549
554
  max_ttl="600",
550
- azure_roles=[vault.azure.BackendRoleAzureRoleArgs(
551
- role_name="Reader",
552
- scope=f"/subscriptions/{subscription_id}/resourceGroups/azure-vault-group",
553
- )])
555
+ azure_roles=[{
556
+ "role_name": "Reader",
557
+ "scope": f"/subscriptions/{subscription_id}/resourceGroups/azure-vault-group",
558
+ }])
554
559
  existing_object_id = vault.azure.BackendRole("existing_object_id",
555
560
  backend=azure.path,
556
561
  role="existing_object_id",
@@ -575,8 +580,8 @@ class BackendRole(pulumi.CustomResource):
575
580
  resource_name: str,
576
581
  opts: Optional[pulumi.ResourceOptions] = None,
577
582
  application_object_id: Optional[pulumi.Input[str]] = None,
578
- azure_groups: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['BackendRoleAzureGroupArgs']]]]] = None,
579
- azure_roles: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['BackendRoleAzureRoleArgs']]]]] = None,
583
+ azure_groups: Optional[pulumi.Input[Sequence[pulumi.Input[Union['BackendRoleAzureGroupArgs', 'BackendRoleAzureGroupArgsDict']]]]] = None,
584
+ azure_roles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['BackendRoleAzureRoleArgs', 'BackendRoleAzureRoleArgsDict']]]]] = None,
580
585
  backend: Optional[pulumi.Input[str]] = None,
581
586
  description: Optional[pulumi.Input[str]] = None,
582
587
  max_ttl: Optional[pulumi.Input[str]] = None,
@@ -620,8 +625,8 @@ class BackendRole(pulumi.CustomResource):
620
625
  id: pulumi.Input[str],
621
626
  opts: Optional[pulumi.ResourceOptions] = None,
622
627
  application_object_id: Optional[pulumi.Input[str]] = None,
623
- azure_groups: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['BackendRoleAzureGroupArgs']]]]] = None,
624
- azure_roles: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['BackendRoleAzureRoleArgs']]]]] = None,
628
+ azure_groups: Optional[pulumi.Input[Sequence[pulumi.Input[Union['BackendRoleAzureGroupArgs', 'BackendRoleAzureGroupArgsDict']]]]] = None,
629
+ azure_roles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['BackendRoleAzureRoleArgs', 'BackendRoleAzureRoleArgsDict']]]]] = None,
625
630
  backend: Optional[pulumi.Input[str]] = None,
626
631
  description: Optional[pulumi.Input[str]] = None,
627
632
  max_ttl: Optional[pulumi.Input[str]] = None,
@@ -640,8 +645,8 @@ class BackendRole(pulumi.CustomResource):
640
645
  :param pulumi.ResourceOptions opts: Options for the resource.
641
646
  :param pulumi.Input[str] application_object_id: Application Object ID for an existing service principal that will
642
647
  be used instead of creating dynamic service principals. If present, `azure_roles` and `permanently_delete` will be ignored.
643
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['BackendRoleAzureGroupArgs']]]] azure_groups: List of Azure groups to be assigned to the generated service principal.
644
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['BackendRoleAzureRoleArgs']]]] azure_roles: List of Azure roles to be assigned to the generated service principal.
648
+ :param pulumi.Input[Sequence[pulumi.Input[Union['BackendRoleAzureGroupArgs', 'BackendRoleAzureGroupArgsDict']]]] azure_groups: List of Azure groups to be assigned to the generated service principal.
649
+ :param pulumi.Input[Sequence[pulumi.Input[Union['BackendRoleAzureRoleArgs', 'BackendRoleAzureRoleArgsDict']]]] azure_roles: List of Azure roles to be assigned to the generated service principal.
645
650
  :param pulumi.Input[str] backend: Path to the mounted Azure auth backend
646
651
  :param pulumi.Input[str] description: Human-friendly description of the mount for the backend.
647
652
  :param pulumi.Input[str] max_ttl: Specifies the maximum TTL for service principals generated using this role. Accepts time
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -298,9 +303,6 @@ def get_access_credentials(backend: Optional[str] = None,
298
303
  subscription_id=pulumi.get(__ret__, 'subscription_id'),
299
304
  tenant_id=pulumi.get(__ret__, 'tenant_id'),
300
305
  validate_creds=pulumi.get(__ret__, 'validate_creds'))
301
-
302
-
303
- @_utilities.lift_output_func(get_access_credentials)
304
306
  def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
305
307
  environment: Optional[pulumi.Input[Optional[str]]] = None,
306
308
  max_cred_validation_seconds: Optional[pulumi.Input[Optional[int]]] = None,
@@ -365,4 +367,34 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
365
367
  credentials without checking whether they have fully propagated throughout
366
368
  Azure Active Directory. Designating `true` activates testing.
367
369
  """
368
- ...
370
+ __args__ = dict()
371
+ __args__['backend'] = backend
372
+ __args__['environment'] = environment
373
+ __args__['maxCredValidationSeconds'] = max_cred_validation_seconds
374
+ __args__['namespace'] = namespace
375
+ __args__['numSecondsBetweenTests'] = num_seconds_between_tests
376
+ __args__['numSequentialSuccesses'] = num_sequential_successes
377
+ __args__['role'] = role
378
+ __args__['subscriptionId'] = subscription_id
379
+ __args__['tenantId'] = tenant_id
380
+ __args__['validateCreds'] = validate_creds
381
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
382
+ __ret__ = pulumi.runtime.invoke_output('vault:azure/getAccessCredentials:getAccessCredentials', __args__, opts=opts, typ=GetAccessCredentialsResult)
383
+ return __ret__.apply(lambda __response__: GetAccessCredentialsResult(
384
+ backend=pulumi.get(__response__, 'backend'),
385
+ client_id=pulumi.get(__response__, 'client_id'),
386
+ client_secret=pulumi.get(__response__, 'client_secret'),
387
+ environment=pulumi.get(__response__, 'environment'),
388
+ id=pulumi.get(__response__, 'id'),
389
+ lease_duration=pulumi.get(__response__, 'lease_duration'),
390
+ lease_id=pulumi.get(__response__, 'lease_id'),
391
+ lease_renewable=pulumi.get(__response__, 'lease_renewable'),
392
+ lease_start_time=pulumi.get(__response__, 'lease_start_time'),
393
+ max_cred_validation_seconds=pulumi.get(__response__, 'max_cred_validation_seconds'),
394
+ namespace=pulumi.get(__response__, 'namespace'),
395
+ num_seconds_between_tests=pulumi.get(__response__, 'num_seconds_between_tests'),
396
+ num_sequential_successes=pulumi.get(__response__, 'num_sequential_successes'),
397
+ role=pulumi.get(__response__, 'role'),
398
+ subscription_id=pulumi.get(__response__, 'subscription_id'),
399
+ tenant_id=pulumi.get(__response__, 'tenant_id'),
400
+ validate_creds=pulumi.get(__response__, 'validate_creds')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['CertAuthBackendRoleArgs', 'CertAuthBackendRole']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
  from . import outputs
12
17