pulumi-vault 6.3.0a1723109142__py3-none-any.whl → 6.3.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +19 -4
- pulumi_vault/ad/secret_backend.py +5 -0
- pulumi_vault/ad/secret_library.py +5 -0
- pulumi_vault/ad/secret_role.py +5 -0
- pulumi_vault/alicloud/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_login.py +5 -0
- pulumi_vault/approle/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
- pulumi_vault/audit.py +5 -0
- pulumi_vault/audit_request_header.py +5 -0
- pulumi_vault/auth_backend.py +10 -5
- pulumi_vault/aws/auth_backend_cert.py +5 -0
- pulumi_vault/aws/auth_backend_client.py +5 -0
- pulumi_vault/aws/auth_backend_config_identity.py +5 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
- pulumi_vault/aws/auth_backend_login.py +12 -7
- pulumi_vault/aws/auth_backend_role.py +5 -0
- pulumi_vault/aws/auth_backend_role_tag.py +5 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
- pulumi_vault/aws/auth_backend_sts_role.py +5 -0
- pulumi_vault/aws/get_access_credentials.py +31 -4
- pulumi_vault/aws/get_static_access_credentials.py +18 -4
- pulumi_vault/aws/secret_backend.py +5 -0
- pulumi_vault/aws/secret_backend_role.py +5 -0
- pulumi_vault/aws/secret_backend_static_role.py +5 -0
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +5 -0
- pulumi_vault/azure/auth_backend_role.py +5 -0
- pulumi_vault/azure/backend.py +5 -0
- pulumi_vault/azure/backend_role.py +23 -18
- pulumi_vault/azure/get_access_credentials.py +36 -4
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +5 -0
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +21 -0
- pulumi_vault/config/outputs.py +5 -0
- pulumi_vault/config/ui_custom_message.py +24 -19
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +5 -0
- pulumi_vault/consul/secret_backend_role.py +5 -0
- pulumi_vault/database/_inputs.py +2091 -140
- pulumi_vault/database/outputs.py +59 -54
- pulumi_vault/database/secret_backend_connection.py +115 -110
- pulumi_vault/database/secret_backend_role.py +25 -20
- pulumi_vault/database/secret_backend_static_role.py +11 -6
- pulumi_vault/database/secrets_mount.py +139 -134
- pulumi_vault/egp_policy.py +5 -0
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +15 -10
- pulumi_vault/gcp/auth_backend_role.py +5 -0
- pulumi_vault/gcp/get_auth_backend_role.py +42 -4
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +5 -0
- pulumi_vault/gcp/secret_impersonated_account.py +5 -0
- pulumi_vault/gcp/secret_roleset.py +18 -13
- pulumi_vault/gcp/secret_static_account.py +18 -13
- pulumi_vault/generic/endpoint.py +5 -0
- pulumi_vault/generic/get_secret.py +25 -5
- pulumi_vault/generic/secret.py +12 -7
- pulumi_vault/get_auth_backend.py +21 -4
- pulumi_vault/get_auth_backends.py +16 -4
- pulumi_vault/get_namespace.py +18 -5
- pulumi_vault/get_namespaces.py +13 -4
- pulumi_vault/get_nomad_access_token.py +28 -8
- pulumi_vault/get_policy_document.py +27 -16
- pulumi_vault/get_raft_autopilot_state.py +26 -7
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +10 -5
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +5 -0
- pulumi_vault/github/user.py +5 -0
- pulumi_vault/identity/entity.py +5 -0
- pulumi_vault/identity/entity_alias.py +5 -0
- pulumi_vault/identity/entity_policies.py +5 -0
- pulumi_vault/identity/get_entity.py +35 -5
- pulumi_vault/identity/get_group.py +42 -6
- pulumi_vault/identity/get_oidc_client_creds.py +16 -4
- pulumi_vault/identity/get_oidc_openid_config.py +26 -4
- pulumi_vault/identity/get_oidc_public_keys.py +16 -5
- pulumi_vault/identity/group.py +5 -0
- pulumi_vault/identity/group_alias.py +5 -0
- pulumi_vault/identity/group_member_entity_ids.py +5 -0
- pulumi_vault/identity/group_member_group_ids.py +5 -0
- pulumi_vault/identity/group_policies.py +5 -0
- pulumi_vault/identity/mfa_duo.py +5 -0
- pulumi_vault/identity/mfa_login_enforcement.py +5 -0
- pulumi_vault/identity/mfa_okta.py +5 -0
- pulumi_vault/identity/mfa_pingid.py +5 -0
- pulumi_vault/identity/mfa_totp.py +5 -0
- pulumi_vault/identity/oidc.py +5 -0
- pulumi_vault/identity/oidc_assignment.py +5 -0
- pulumi_vault/identity/oidc_client.py +5 -0
- pulumi_vault/identity/oidc_key.py +5 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
- pulumi_vault/identity/oidc_provider.py +5 -0
- pulumi_vault/identity/oidc_role.py +5 -0
- pulumi_vault/identity/oidc_scope.py +5 -0
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +14 -9
- pulumi_vault/jwt/auth_backend_role.py +33 -28
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +5 -0
- pulumi_vault/kmip/secret_role.py +5 -0
- pulumi_vault/kmip/secret_scope.py +5 -0
- pulumi_vault/kubernetes/auth_backend_config.py +5 -0
- pulumi_vault/kubernetes/auth_backend_role.py +5 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
- pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
- pulumi_vault/kubernetes/get_service_account_token.py +28 -4
- pulumi_vault/kubernetes/secret_backend.py +19 -14
- pulumi_vault/kubernetes/secret_backend_role.py +5 -0
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +20 -5
- pulumi_vault/kv/get_secret_subkeys_v2.py +24 -5
- pulumi_vault/kv/get_secret_v2.py +27 -6
- pulumi_vault/kv/get_secrets_list.py +15 -4
- pulumi_vault/kv/get_secrets_list_v2.py +18 -4
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +12 -7
- pulumi_vault/kv/secret_backend_v2.py +5 -0
- pulumi_vault/kv/secret_v2.py +46 -41
- pulumi_vault/ldap/auth_backend.py +5 -0
- pulumi_vault/ldap/auth_backend_group.py +5 -0
- pulumi_vault/ldap/auth_backend_user.py +5 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
- pulumi_vault/ldap/get_static_credentials.py +23 -4
- pulumi_vault/ldap/secret_backend.py +19 -14
- pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
- pulumi_vault/ldap/secret_backend_library_set.py +5 -0
- pulumi_vault/ldap/secret_backend_static_role.py +5 -0
- pulumi_vault/managed/_inputs.py +205 -0
- pulumi_vault/managed/keys.py +20 -15
- pulumi_vault/managed/outputs.py +5 -0
- pulumi_vault/mfa_duo.py +5 -0
- pulumi_vault/mfa_okta.py +5 -0
- pulumi_vault/mfa_pingid.py +5 -0
- pulumi_vault/mfa_totp.py +5 -0
- pulumi_vault/mongodbatlas/secret_backend.py +5 -0
- pulumi_vault/mongodbatlas/secret_role.py +5 -0
- pulumi_vault/mount.py +21 -16
- pulumi_vault/namespace.py +19 -14
- pulumi_vault/nomad_secret_backend.py +5 -0
- pulumi_vault/nomad_secret_role.py +5 -0
- pulumi_vault/okta/_inputs.py +39 -0
- pulumi_vault/okta/auth_backend.py +31 -26
- pulumi_vault/okta/auth_backend_group.py +5 -0
- pulumi_vault/okta/auth_backend_user.py +5 -0
- pulumi_vault/okta/outputs.py +5 -0
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +5 -0
- pulumi_vault/pkisecret/_inputs.py +49 -8
- pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
- pulumi_vault/pkisecret/backend_config_est.py +24 -19
- pulumi_vault/pkisecret/get_backend_config_est.py +23 -5
- pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
- pulumi_vault/pkisecret/get_backend_issuers.py +18 -5
- pulumi_vault/pkisecret/get_backend_key.py +19 -4
- pulumi_vault/pkisecret/get_backend_keys.py +18 -5
- pulumi_vault/pkisecret/outputs.py +17 -12
- pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
- pulumi_vault/pkisecret/secret_backend_key.py +5 -0
- pulumi_vault/pkisecret/secret_backend_role.py +10 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
- pulumi_vault/plugin.py +5 -0
- pulumi_vault/plugin_pinned_version.py +5 -0
- pulumi_vault/policy.py +5 -0
- pulumi_vault/provider.py +47 -42
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +5 -0
- pulumi_vault/quota_rate_limit.py +5 -0
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +5 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +43 -38
- pulumi_vault/raft_autopilot.py +5 -0
- pulumi_vault/raft_snapshot_agent_config.py +5 -0
- pulumi_vault/rgp_policy.py +5 -0
- pulumi_vault/saml/auth_backend.py +5 -0
- pulumi_vault/saml/auth_backend_role.py +19 -14
- pulumi_vault/secrets/_inputs.py +30 -0
- pulumi_vault/secrets/outputs.py +5 -0
- pulumi_vault/secrets/sync_association.py +7 -2
- pulumi_vault/secrets/sync_aws_destination.py +19 -14
- pulumi_vault/secrets/sync_azure_destination.py +19 -14
- pulumi_vault/secrets/sync_config.py +5 -0
- pulumi_vault/secrets/sync_gcp_destination.py +19 -14
- pulumi_vault/secrets/sync_gh_destination.py +5 -0
- pulumi_vault/secrets/sync_github_apps.py +5 -0
- pulumi_vault/secrets/sync_vercel_destination.py +5 -0
- pulumi_vault/ssh/_inputs.py +22 -0
- pulumi_vault/ssh/outputs.py +5 -0
- pulumi_vault/ssh/secret_backend_ca.py +5 -0
- pulumi_vault/ssh/secret_backend_role.py +38 -33
- pulumi_vault/terraformcloud/secret_backend.py +5 -0
- pulumi_vault/terraformcloud/secret_creds.py +5 -0
- pulumi_vault/terraformcloud/secret_role.py +5 -0
- pulumi_vault/token.py +5 -0
- pulumi_vault/tokenauth/auth_backend_role.py +5 -14
- pulumi_vault/transform/alphabet.py +5 -0
- pulumi_vault/transform/get_decode.py +38 -14
- pulumi_vault/transform/get_encode.py +38 -14
- pulumi_vault/transform/role.py +5 -0
- pulumi_vault/transform/template.py +19 -14
- pulumi_vault/transform/transformation.py +5 -0
- pulumi_vault/transit/get_decrypt.py +21 -4
- pulumi_vault/transit/get_encrypt.py +23 -4
- pulumi_vault/transit/secret_backend_key.py +12 -7
- pulumi_vault/transit/secret_cache_config.py +5 -0
- {pulumi_vault-6.3.0a1723109142.dist-info → pulumi_vault-6.3.1.dist-info}/METADATA +3 -2
- pulumi_vault-6.3.1.dist-info/RECORD +256 -0
- {pulumi_vault-6.3.0a1723109142.dist-info → pulumi_vault-6.3.1.dist-info}/WHEEL +1 -1
- pulumi_vault-6.3.0a1723109142.dist-info/RECORD +0 -256
- {pulumi_vault-6.3.0a1723109142.dist-info → pulumi_vault-6.3.1.dist-info}/top_level.txt +0 -0
pulumi_vault/namespace.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['NamespaceArgs', 'Namespace']
|
@@ -15,13 +20,13 @@ __all__ = ['NamespaceArgs', 'Namespace']
|
|
15
20
|
class NamespaceArgs:
|
16
21
|
def __init__(__self__, *,
|
17
22
|
path: pulumi.Input[str],
|
18
|
-
custom_metadata: Optional[pulumi.Input[Mapping[str,
|
23
|
+
custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
19
24
|
namespace: Optional[pulumi.Input[str]] = None,
|
20
25
|
path_fq: Optional[pulumi.Input[str]] = None):
|
21
26
|
"""
|
22
27
|
The set of arguments for constructing a Namespace resource.
|
23
28
|
:param pulumi.Input[str] path: The path of the namespace. Must not have a trailing `/`.
|
24
|
-
:param pulumi.Input[Mapping[str,
|
29
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_metadata: Custom metadata describing this namespace. Value type
|
25
30
|
is `map[string]string`. Requires Vault version 1.12+.
|
26
31
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
27
32
|
The value should not contain leading or trailing forward slashes.
|
@@ -52,7 +57,7 @@ class NamespaceArgs:
|
|
52
57
|
|
53
58
|
@property
|
54
59
|
@pulumi.getter(name="customMetadata")
|
55
|
-
def custom_metadata(self) -> Optional[pulumi.Input[Mapping[str,
|
60
|
+
def custom_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
56
61
|
"""
|
57
62
|
Custom metadata describing this namespace. Value type
|
58
63
|
is `map[string]string`. Requires Vault version 1.12+.
|
@@ -60,7 +65,7 @@ class NamespaceArgs:
|
|
60
65
|
return pulumi.get(self, "custom_metadata")
|
61
66
|
|
62
67
|
@custom_metadata.setter
|
63
|
-
def custom_metadata(self, value: Optional[pulumi.Input[Mapping[str,
|
68
|
+
def custom_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
64
69
|
pulumi.set(self, "custom_metadata", value)
|
65
70
|
|
66
71
|
@property
|
@@ -95,14 +100,14 @@ class NamespaceArgs:
|
|
95
100
|
@pulumi.input_type
|
96
101
|
class _NamespaceState:
|
97
102
|
def __init__(__self__, *,
|
98
|
-
custom_metadata: Optional[pulumi.Input[Mapping[str,
|
103
|
+
custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
99
104
|
namespace: Optional[pulumi.Input[str]] = None,
|
100
105
|
namespace_id: Optional[pulumi.Input[str]] = None,
|
101
106
|
path: Optional[pulumi.Input[str]] = None,
|
102
107
|
path_fq: Optional[pulumi.Input[str]] = None):
|
103
108
|
"""
|
104
109
|
Input properties used for looking up and filtering Namespace resources.
|
105
|
-
:param pulumi.Input[Mapping[str,
|
110
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_metadata: Custom metadata describing this namespace. Value type
|
106
111
|
is `map[string]string`. Requires Vault version 1.12+.
|
107
112
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
108
113
|
The value should not contain leading or trailing forward slashes.
|
@@ -126,7 +131,7 @@ class _NamespaceState:
|
|
126
131
|
|
127
132
|
@property
|
128
133
|
@pulumi.getter(name="customMetadata")
|
129
|
-
def custom_metadata(self) -> Optional[pulumi.Input[Mapping[str,
|
134
|
+
def custom_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
130
135
|
"""
|
131
136
|
Custom metadata describing this namespace. Value type
|
132
137
|
is `map[string]string`. Requires Vault version 1.12+.
|
@@ -134,7 +139,7 @@ class _NamespaceState:
|
|
134
139
|
return pulumi.get(self, "custom_metadata")
|
135
140
|
|
136
141
|
@custom_metadata.setter
|
137
|
-
def custom_metadata(self, value: Optional[pulumi.Input[Mapping[str,
|
142
|
+
def custom_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
138
143
|
pulumi.set(self, "custom_metadata", value)
|
139
144
|
|
140
145
|
@property
|
@@ -195,7 +200,7 @@ class Namespace(pulumi.CustomResource):
|
|
195
200
|
def __init__(__self__,
|
196
201
|
resource_name: str,
|
197
202
|
opts: Optional[pulumi.ResourceOptions] = None,
|
198
|
-
custom_metadata: Optional[pulumi.Input[Mapping[str,
|
203
|
+
custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
199
204
|
namespace: Optional[pulumi.Input[str]] = None,
|
200
205
|
path: Optional[pulumi.Input[str]] = None,
|
201
206
|
path_fq: Optional[pulumi.Input[str]] = None,
|
@@ -253,7 +258,7 @@ class Namespace(pulumi.CustomResource):
|
|
253
258
|
|
254
259
|
:param str resource_name: The name of the resource.
|
255
260
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
256
|
-
:param pulumi.Input[Mapping[str,
|
261
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_metadata: Custom metadata describing this namespace. Value type
|
257
262
|
is `map[string]string`. Requires Vault version 1.12+.
|
258
263
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
259
264
|
The value should not contain leading or trailing forward slashes.
|
@@ -335,7 +340,7 @@ class Namespace(pulumi.CustomResource):
|
|
335
340
|
def _internal_init(__self__,
|
336
341
|
resource_name: str,
|
337
342
|
opts: Optional[pulumi.ResourceOptions] = None,
|
338
|
-
custom_metadata: Optional[pulumi.Input[Mapping[str,
|
343
|
+
custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
339
344
|
namespace: Optional[pulumi.Input[str]] = None,
|
340
345
|
path: Optional[pulumi.Input[str]] = None,
|
341
346
|
path_fq: Optional[pulumi.Input[str]] = None,
|
@@ -365,7 +370,7 @@ class Namespace(pulumi.CustomResource):
|
|
365
370
|
def get(resource_name: str,
|
366
371
|
id: pulumi.Input[str],
|
367
372
|
opts: Optional[pulumi.ResourceOptions] = None,
|
368
|
-
custom_metadata: Optional[pulumi.Input[Mapping[str,
|
373
|
+
custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
369
374
|
namespace: Optional[pulumi.Input[str]] = None,
|
370
375
|
namespace_id: Optional[pulumi.Input[str]] = None,
|
371
376
|
path: Optional[pulumi.Input[str]] = None,
|
@@ -377,7 +382,7 @@ class Namespace(pulumi.CustomResource):
|
|
377
382
|
:param str resource_name: The unique name of the resulting resource.
|
378
383
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
379
384
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
380
|
-
:param pulumi.Input[Mapping[str,
|
385
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_metadata: Custom metadata describing this namespace. Value type
|
381
386
|
is `map[string]string`. Requires Vault version 1.12+.
|
382
387
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
383
388
|
The value should not contain leading or trailing forward slashes.
|
@@ -401,7 +406,7 @@ class Namespace(pulumi.CustomResource):
|
|
401
406
|
|
402
407
|
@property
|
403
408
|
@pulumi.getter(name="customMetadata")
|
404
|
-
def custom_metadata(self) -> pulumi.Output[Mapping[str,
|
409
|
+
def custom_metadata(self) -> pulumi.Output[Mapping[str, str]]:
|
405
410
|
"""
|
406
411
|
Custom metadata describing this namespace. Value type
|
407
412
|
is `map[string]string`. Requires Vault version 1.12+.
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['NomadSecretBackendArgs', 'NomadSecretBackend']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['NomadSecretRoleArgs', 'NomadSecretRole']
|
pulumi_vault/okta/_inputs.py
CHANGED
@@ -4,16 +4,38 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
13
18
|
'AuthBackendGroupArgs',
|
19
|
+
'AuthBackendGroupArgsDict',
|
14
20
|
'AuthBackendUserArgs',
|
21
|
+
'AuthBackendUserArgsDict',
|
15
22
|
]
|
16
23
|
|
24
|
+
MYPY = False
|
25
|
+
|
26
|
+
if not MYPY:
|
27
|
+
class AuthBackendGroupArgsDict(TypedDict):
|
28
|
+
group_name: pulumi.Input[str]
|
29
|
+
"""
|
30
|
+
Name of the Okta group
|
31
|
+
"""
|
32
|
+
policies: pulumi.Input[Sequence[pulumi.Input[str]]]
|
33
|
+
"""
|
34
|
+
Policies to associate with this group
|
35
|
+
"""
|
36
|
+
elif False:
|
37
|
+
AuthBackendGroupArgsDict: TypeAlias = Mapping[str, Any]
|
38
|
+
|
17
39
|
@pulumi.input_type
|
18
40
|
class AuthBackendGroupArgs:
|
19
41
|
def __init__(__self__, *,
|
@@ -51,6 +73,23 @@ class AuthBackendGroupArgs:
|
|
51
73
|
pulumi.set(self, "policies", value)
|
52
74
|
|
53
75
|
|
76
|
+
if not MYPY:
|
77
|
+
class AuthBackendUserArgsDict(TypedDict):
|
78
|
+
username: pulumi.Input[str]
|
79
|
+
"""
|
80
|
+
Name of the user within Okta
|
81
|
+
"""
|
82
|
+
groups: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
83
|
+
"""
|
84
|
+
Groups within the Okta auth backend to associate with this user
|
85
|
+
"""
|
86
|
+
policies: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
87
|
+
"""
|
88
|
+
Policies to associate with this user
|
89
|
+
"""
|
90
|
+
elif False:
|
91
|
+
AuthBackendUserArgsDict: TypeAlias = Mapping[str, Any]
|
92
|
+
|
54
93
|
@pulumi.input_type
|
55
94
|
class AuthBackendUserArgs:
|
56
95
|
def __init__(__self__, *,
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
from . import outputs
|
12
17
|
from ._inputs import *
|
@@ -777,7 +782,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
777
782
|
bypass_okta_mfa: Optional[pulumi.Input[bool]] = None,
|
778
783
|
description: Optional[pulumi.Input[str]] = None,
|
779
784
|
disable_remount: Optional[pulumi.Input[bool]] = None,
|
780
|
-
groups: Optional[pulumi.Input[Sequence[pulumi.Input[
|
785
|
+
groups: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendGroupArgs', 'AuthBackendGroupArgsDict']]]]] = None,
|
781
786
|
max_ttl: Optional[pulumi.Input[str]] = None,
|
782
787
|
namespace: Optional[pulumi.Input[str]] = None,
|
783
788
|
organization: Optional[pulumi.Input[str]] = None,
|
@@ -793,7 +798,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
793
798
|
token_ttl: Optional[pulumi.Input[int]] = None,
|
794
799
|
token_type: Optional[pulumi.Input[str]] = None,
|
795
800
|
ttl: Optional[pulumi.Input[str]] = None,
|
796
|
-
users: Optional[pulumi.Input[Sequence[pulumi.Input[
|
801
|
+
users: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendUserArgs', 'AuthBackendUserArgsDict']]]]] = None,
|
797
802
|
__props__=None):
|
798
803
|
"""
|
799
804
|
Provides a resource for managing an
|
@@ -809,17 +814,17 @@ class AuthBackend(pulumi.CustomResource):
|
|
809
814
|
description="Demonstration of the Terraform Okta auth backend",
|
810
815
|
organization="example",
|
811
816
|
token="something that should be kept secret",
|
812
|
-
groups=[
|
813
|
-
group_name
|
814
|
-
policies
|
817
|
+
groups=[{
|
818
|
+
"group_name": "foo",
|
819
|
+
"policies": [
|
815
820
|
"one",
|
816
821
|
"two",
|
817
822
|
],
|
818
|
-
|
819
|
-
users=[
|
820
|
-
username
|
821
|
-
groups
|
822
|
-
|
823
|
+
}],
|
824
|
+
users=[{
|
825
|
+
"username": "bar",
|
826
|
+
"groups": ["foo"],
|
827
|
+
}])
|
823
828
|
```
|
824
829
|
|
825
830
|
## Import
|
@@ -837,7 +842,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
837
842
|
:param pulumi.Input[str] description: The description of the auth backend
|
838
843
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
839
844
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
840
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
845
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendGroupArgs', 'AuthBackendGroupArgsDict']]]] groups: Associate Okta groups with policies within Vault.
|
841
846
|
See below for more details.
|
842
847
|
:param pulumi.Input[str] max_ttl: Maximum duration after which authentication will be expired
|
843
848
|
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
@@ -860,7 +865,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
860
865
|
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
861
866
|
:param pulumi.Input[str] ttl: Duration after which authentication will be expired.
|
862
867
|
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
863
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
868
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendUserArgs', 'AuthBackendUserArgsDict']]]] users: Associate Okta users with groups or policies within Vault.
|
864
869
|
See below for more details.
|
865
870
|
"""
|
866
871
|
...
|
@@ -883,17 +888,17 @@ class AuthBackend(pulumi.CustomResource):
|
|
883
888
|
description="Demonstration of the Terraform Okta auth backend",
|
884
889
|
organization="example",
|
885
890
|
token="something that should be kept secret",
|
886
|
-
groups=[
|
887
|
-
group_name
|
888
|
-
policies
|
891
|
+
groups=[{
|
892
|
+
"group_name": "foo",
|
893
|
+
"policies": [
|
889
894
|
"one",
|
890
895
|
"two",
|
891
896
|
],
|
892
|
-
|
893
|
-
users=[
|
894
|
-
username
|
895
|
-
groups
|
896
|
-
|
897
|
+
}],
|
898
|
+
users=[{
|
899
|
+
"username": "bar",
|
900
|
+
"groups": ["foo"],
|
901
|
+
}])
|
897
902
|
```
|
898
903
|
|
899
904
|
## Import
|
@@ -923,7 +928,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
923
928
|
bypass_okta_mfa: Optional[pulumi.Input[bool]] = None,
|
924
929
|
description: Optional[pulumi.Input[str]] = None,
|
925
930
|
disable_remount: Optional[pulumi.Input[bool]] = None,
|
926
|
-
groups: Optional[pulumi.Input[Sequence[pulumi.Input[
|
931
|
+
groups: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendGroupArgs', 'AuthBackendGroupArgsDict']]]]] = None,
|
927
932
|
max_ttl: Optional[pulumi.Input[str]] = None,
|
928
933
|
namespace: Optional[pulumi.Input[str]] = None,
|
929
934
|
organization: Optional[pulumi.Input[str]] = None,
|
@@ -939,7 +944,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
939
944
|
token_ttl: Optional[pulumi.Input[int]] = None,
|
940
945
|
token_type: Optional[pulumi.Input[str]] = None,
|
941
946
|
ttl: Optional[pulumi.Input[str]] = None,
|
942
|
-
users: Optional[pulumi.Input[Sequence[pulumi.Input[
|
947
|
+
users: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendUserArgs', 'AuthBackendUserArgsDict']]]]] = None,
|
943
948
|
__props__=None):
|
944
949
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
945
950
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -990,7 +995,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
990
995
|
bypass_okta_mfa: Optional[pulumi.Input[bool]] = None,
|
991
996
|
description: Optional[pulumi.Input[str]] = None,
|
992
997
|
disable_remount: Optional[pulumi.Input[bool]] = None,
|
993
|
-
groups: Optional[pulumi.Input[Sequence[pulumi.Input[
|
998
|
+
groups: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendGroupArgs', 'AuthBackendGroupArgsDict']]]]] = None,
|
994
999
|
max_ttl: Optional[pulumi.Input[str]] = None,
|
995
1000
|
namespace: Optional[pulumi.Input[str]] = None,
|
996
1001
|
organization: Optional[pulumi.Input[str]] = None,
|
@@ -1006,7 +1011,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1006
1011
|
token_ttl: Optional[pulumi.Input[int]] = None,
|
1007
1012
|
token_type: Optional[pulumi.Input[str]] = None,
|
1008
1013
|
ttl: Optional[pulumi.Input[str]] = None,
|
1009
|
-
users: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1014
|
+
users: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendUserArgs', 'AuthBackendUserArgsDict']]]]] = None) -> 'AuthBackend':
|
1010
1015
|
"""
|
1011
1016
|
Get an existing AuthBackend resource's state with the given name, id, and optional extra
|
1012
1017
|
properties used to qualify the lookup.
|
@@ -1020,7 +1025,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1020
1025
|
:param pulumi.Input[str] description: The description of the auth backend
|
1021
1026
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
1022
1027
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
1023
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1028
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendGroupArgs', 'AuthBackendGroupArgsDict']]]] groups: Associate Okta groups with policies within Vault.
|
1024
1029
|
See below for more details.
|
1025
1030
|
:param pulumi.Input[str] max_ttl: Maximum duration after which authentication will be expired
|
1026
1031
|
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
@@ -1043,7 +1048,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1043
1048
|
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
1044
1049
|
:param pulumi.Input[str] ttl: Duration after which authentication will be expired.
|
1045
1050
|
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
1046
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1051
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendUserArgs', 'AuthBackendUserArgsDict']]]] users: Associate Okta users with groups or policies within Vault.
|
1047
1052
|
See below for more details.
|
1048
1053
|
"""
|
1049
1054
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuthBackendGroupInitArgs', 'AuthBackendGroup']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuthBackendUserInitArgs', 'AuthBackendUser']
|
pulumi_vault/okta/outputs.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
pulumi_vault/outputs.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
from . import outputs
|
12
17
|
|
pulumi_vault/password_policy.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['PasswordPolicyArgs', 'PasswordPolicy']
|
@@ -4,24 +4,46 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
13
18
|
'BackendConfigEstAuthenticatorsArgs',
|
19
|
+
'BackendConfigEstAuthenticatorsArgsDict',
|
14
20
|
'SecretBackendRolePolicyIdentifierArgs',
|
21
|
+
'SecretBackendRolePolicyIdentifierArgsDict',
|
15
22
|
]
|
16
23
|
|
24
|
+
MYPY = False
|
25
|
+
|
26
|
+
if not MYPY:
|
27
|
+
class BackendConfigEstAuthenticatorsArgsDict(TypedDict):
|
28
|
+
cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
29
|
+
"""
|
30
|
+
"The accessor (required) and cert_role (optional) properties for cert auth backends".
|
31
|
+
"""
|
32
|
+
userpass: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
33
|
+
"""
|
34
|
+
"The accessor (required) property for user pass auth backends".
|
35
|
+
"""
|
36
|
+
elif False:
|
37
|
+
BackendConfigEstAuthenticatorsArgsDict: TypeAlias = Mapping[str, Any]
|
38
|
+
|
17
39
|
@pulumi.input_type
|
18
40
|
class BackendConfigEstAuthenticatorsArgs:
|
19
41
|
def __init__(__self__, *,
|
20
|
-
cert: Optional[pulumi.Input[Mapping[str,
|
21
|
-
userpass: Optional[pulumi.Input[Mapping[str,
|
42
|
+
cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
43
|
+
userpass: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None):
|
22
44
|
"""
|
23
|
-
:param pulumi.Input[Mapping[str,
|
24
|
-
:param pulumi.Input[Mapping[str,
|
45
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
|
46
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] userpass: "The accessor (required) property for user pass auth backends".
|
25
47
|
"""
|
26
48
|
if cert is not None:
|
27
49
|
pulumi.set(__self__, "cert", cert)
|
@@ -30,29 +52,48 @@ class BackendConfigEstAuthenticatorsArgs:
|
|
30
52
|
|
31
53
|
@property
|
32
54
|
@pulumi.getter
|
33
|
-
def cert(self) -> Optional[pulumi.Input[Mapping[str,
|
55
|
+
def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
34
56
|
"""
|
35
57
|
"The accessor (required) and cert_role (optional) properties for cert auth backends".
|
36
58
|
"""
|
37
59
|
return pulumi.get(self, "cert")
|
38
60
|
|
39
61
|
@cert.setter
|
40
|
-
def cert(self, value: Optional[pulumi.Input[Mapping[str,
|
62
|
+
def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
41
63
|
pulumi.set(self, "cert", value)
|
42
64
|
|
43
65
|
@property
|
44
66
|
@pulumi.getter
|
45
|
-
def userpass(self) -> Optional[pulumi.Input[Mapping[str,
|
67
|
+
def userpass(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
46
68
|
"""
|
47
69
|
"The accessor (required) property for user pass auth backends".
|
48
70
|
"""
|
49
71
|
return pulumi.get(self, "userpass")
|
50
72
|
|
51
73
|
@userpass.setter
|
52
|
-
def userpass(self, value: Optional[pulumi.Input[Mapping[str,
|
74
|
+
def userpass(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
53
75
|
pulumi.set(self, "userpass", value)
|
54
76
|
|
55
77
|
|
78
|
+
if not MYPY:
|
79
|
+
class SecretBackendRolePolicyIdentifierArgsDict(TypedDict):
|
80
|
+
oid: pulumi.Input[str]
|
81
|
+
"""
|
82
|
+
The OID for the policy identifier
|
83
|
+
"""
|
84
|
+
cps: NotRequired[pulumi.Input[str]]
|
85
|
+
"""
|
86
|
+
The URL of the CPS for the policy identifier
|
87
|
+
|
88
|
+
Example usage:
|
89
|
+
"""
|
90
|
+
notice: NotRequired[pulumi.Input[str]]
|
91
|
+
"""
|
92
|
+
A notice for the policy identifier
|
93
|
+
"""
|
94
|
+
elif False:
|
95
|
+
SecretBackendRolePolicyIdentifierArgsDict: TypeAlias = Mapping[str, Any]
|
96
|
+
|
56
97
|
@pulumi.input_type
|
57
98
|
class SecretBackendRolePolicyIdentifierArgs:
|
58
99
|
def __init__(__self__, *,
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['BackendConfigClusterArgs', 'BackendConfigCluster']
|