pulumi-vault 6.3.0a1723109142__py3-none-any.whl → 6.3.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +560 -0
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +19 -4
  4. pulumi_vault/ad/secret_backend.py +5 -0
  5. pulumi_vault/ad/secret_library.py +5 -0
  6. pulumi_vault/ad/secret_role.py +5 -0
  7. pulumi_vault/alicloud/auth_backend_role.py +5 -0
  8. pulumi_vault/approle/auth_backend_login.py +5 -0
  9. pulumi_vault/approle/auth_backend_role.py +5 -0
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
  11. pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
  12. pulumi_vault/audit.py +5 -0
  13. pulumi_vault/audit_request_header.py +5 -0
  14. pulumi_vault/auth_backend.py +10 -5
  15. pulumi_vault/aws/auth_backend_cert.py +5 -0
  16. pulumi_vault/aws/auth_backend_client.py +5 -0
  17. pulumi_vault/aws/auth_backend_config_identity.py +5 -0
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
  19. pulumi_vault/aws/auth_backend_login.py +12 -7
  20. pulumi_vault/aws/auth_backend_role.py +5 -0
  21. pulumi_vault/aws/auth_backend_role_tag.py +5 -0
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
  23. pulumi_vault/aws/auth_backend_sts_role.py +5 -0
  24. pulumi_vault/aws/get_access_credentials.py +31 -4
  25. pulumi_vault/aws/get_static_access_credentials.py +18 -4
  26. pulumi_vault/aws/secret_backend.py +5 -0
  27. pulumi_vault/aws/secret_backend_role.py +5 -0
  28. pulumi_vault/aws/secret_backend_static_role.py +5 -0
  29. pulumi_vault/azure/_inputs.py +24 -0
  30. pulumi_vault/azure/auth_backend_config.py +5 -0
  31. pulumi_vault/azure/auth_backend_role.py +5 -0
  32. pulumi_vault/azure/backend.py +5 -0
  33. pulumi_vault/azure/backend_role.py +23 -18
  34. pulumi_vault/azure/get_access_credentials.py +36 -4
  35. pulumi_vault/azure/outputs.py +5 -0
  36. pulumi_vault/cert_auth_backend_role.py +5 -0
  37. pulumi_vault/config/__init__.pyi +5 -0
  38. pulumi_vault/config/_inputs.py +21 -0
  39. pulumi_vault/config/outputs.py +5 -0
  40. pulumi_vault/config/ui_custom_message.py +24 -19
  41. pulumi_vault/config/vars.py +5 -0
  42. pulumi_vault/consul/secret_backend.py +5 -0
  43. pulumi_vault/consul/secret_backend_role.py +5 -0
  44. pulumi_vault/database/_inputs.py +2091 -140
  45. pulumi_vault/database/outputs.py +59 -54
  46. pulumi_vault/database/secret_backend_connection.py +115 -110
  47. pulumi_vault/database/secret_backend_role.py +25 -20
  48. pulumi_vault/database/secret_backend_static_role.py +11 -6
  49. pulumi_vault/database/secrets_mount.py +139 -134
  50. pulumi_vault/egp_policy.py +5 -0
  51. pulumi_vault/gcp/_inputs.py +111 -0
  52. pulumi_vault/gcp/auth_backend.py +15 -10
  53. pulumi_vault/gcp/auth_backend_role.py +5 -0
  54. pulumi_vault/gcp/get_auth_backend_role.py +42 -4
  55. pulumi_vault/gcp/outputs.py +5 -0
  56. pulumi_vault/gcp/secret_backend.py +5 -0
  57. pulumi_vault/gcp/secret_impersonated_account.py +5 -0
  58. pulumi_vault/gcp/secret_roleset.py +18 -13
  59. pulumi_vault/gcp/secret_static_account.py +18 -13
  60. pulumi_vault/generic/endpoint.py +5 -0
  61. pulumi_vault/generic/get_secret.py +25 -5
  62. pulumi_vault/generic/secret.py +12 -7
  63. pulumi_vault/get_auth_backend.py +21 -4
  64. pulumi_vault/get_auth_backends.py +16 -4
  65. pulumi_vault/get_namespace.py +18 -5
  66. pulumi_vault/get_namespaces.py +13 -4
  67. pulumi_vault/get_nomad_access_token.py +28 -8
  68. pulumi_vault/get_policy_document.py +27 -16
  69. pulumi_vault/get_raft_autopilot_state.py +26 -7
  70. pulumi_vault/github/_inputs.py +55 -0
  71. pulumi_vault/github/auth_backend.py +10 -5
  72. pulumi_vault/github/outputs.py +5 -0
  73. pulumi_vault/github/team.py +5 -0
  74. pulumi_vault/github/user.py +5 -0
  75. pulumi_vault/identity/entity.py +5 -0
  76. pulumi_vault/identity/entity_alias.py +5 -0
  77. pulumi_vault/identity/entity_policies.py +5 -0
  78. pulumi_vault/identity/get_entity.py +35 -5
  79. pulumi_vault/identity/get_group.py +42 -6
  80. pulumi_vault/identity/get_oidc_client_creds.py +16 -4
  81. pulumi_vault/identity/get_oidc_openid_config.py +26 -4
  82. pulumi_vault/identity/get_oidc_public_keys.py +16 -5
  83. pulumi_vault/identity/group.py +5 -0
  84. pulumi_vault/identity/group_alias.py +5 -0
  85. pulumi_vault/identity/group_member_entity_ids.py +5 -0
  86. pulumi_vault/identity/group_member_group_ids.py +5 -0
  87. pulumi_vault/identity/group_policies.py +5 -0
  88. pulumi_vault/identity/mfa_duo.py +5 -0
  89. pulumi_vault/identity/mfa_login_enforcement.py +5 -0
  90. pulumi_vault/identity/mfa_okta.py +5 -0
  91. pulumi_vault/identity/mfa_pingid.py +5 -0
  92. pulumi_vault/identity/mfa_totp.py +5 -0
  93. pulumi_vault/identity/oidc.py +5 -0
  94. pulumi_vault/identity/oidc_assignment.py +5 -0
  95. pulumi_vault/identity/oidc_client.py +5 -0
  96. pulumi_vault/identity/oidc_key.py +5 -0
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
  98. pulumi_vault/identity/oidc_provider.py +5 -0
  99. pulumi_vault/identity/oidc_role.py +5 -0
  100. pulumi_vault/identity/oidc_scope.py +5 -0
  101. pulumi_vault/identity/outputs.py +8 -3
  102. pulumi_vault/jwt/_inputs.py +55 -0
  103. pulumi_vault/jwt/auth_backend.py +14 -9
  104. pulumi_vault/jwt/auth_backend_role.py +33 -28
  105. pulumi_vault/jwt/outputs.py +5 -0
  106. pulumi_vault/kmip/secret_backend.py +5 -0
  107. pulumi_vault/kmip/secret_role.py +5 -0
  108. pulumi_vault/kmip/secret_scope.py +5 -0
  109. pulumi_vault/kubernetes/auth_backend_config.py +5 -0
  110. pulumi_vault/kubernetes/auth_backend_role.py +5 -0
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
  113. pulumi_vault/kubernetes/get_service_account_token.py +28 -4
  114. pulumi_vault/kubernetes/secret_backend.py +19 -14
  115. pulumi_vault/kubernetes/secret_backend_role.py +5 -0
  116. pulumi_vault/kv/_inputs.py +36 -4
  117. pulumi_vault/kv/get_secret.py +20 -5
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +24 -5
  119. pulumi_vault/kv/get_secret_v2.py +27 -6
  120. pulumi_vault/kv/get_secrets_list.py +15 -4
  121. pulumi_vault/kv/get_secrets_list_v2.py +18 -4
  122. pulumi_vault/kv/outputs.py +8 -3
  123. pulumi_vault/kv/secret.py +12 -7
  124. pulumi_vault/kv/secret_backend_v2.py +5 -0
  125. pulumi_vault/kv/secret_v2.py +46 -41
  126. pulumi_vault/ldap/auth_backend.py +5 -0
  127. pulumi_vault/ldap/auth_backend_group.py +5 -0
  128. pulumi_vault/ldap/auth_backend_user.py +5 -0
  129. pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
  130. pulumi_vault/ldap/get_static_credentials.py +23 -4
  131. pulumi_vault/ldap/secret_backend.py +19 -14
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
  133. pulumi_vault/ldap/secret_backend_library_set.py +5 -0
  134. pulumi_vault/ldap/secret_backend_static_role.py +5 -0
  135. pulumi_vault/managed/_inputs.py +205 -0
  136. pulumi_vault/managed/keys.py +20 -15
  137. pulumi_vault/managed/outputs.py +5 -0
  138. pulumi_vault/mfa_duo.py +5 -0
  139. pulumi_vault/mfa_okta.py +5 -0
  140. pulumi_vault/mfa_pingid.py +5 -0
  141. pulumi_vault/mfa_totp.py +5 -0
  142. pulumi_vault/mongodbatlas/secret_backend.py +5 -0
  143. pulumi_vault/mongodbatlas/secret_role.py +5 -0
  144. pulumi_vault/mount.py +21 -16
  145. pulumi_vault/namespace.py +19 -14
  146. pulumi_vault/nomad_secret_backend.py +5 -0
  147. pulumi_vault/nomad_secret_role.py +5 -0
  148. pulumi_vault/okta/_inputs.py +39 -0
  149. pulumi_vault/okta/auth_backend.py +31 -26
  150. pulumi_vault/okta/auth_backend_group.py +5 -0
  151. pulumi_vault/okta/auth_backend_user.py +5 -0
  152. pulumi_vault/okta/outputs.py +5 -0
  153. pulumi_vault/outputs.py +5 -0
  154. pulumi_vault/password_policy.py +5 -0
  155. pulumi_vault/pkisecret/_inputs.py +49 -8
  156. pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
  157. pulumi_vault/pkisecret/backend_config_est.py +24 -19
  158. pulumi_vault/pkisecret/get_backend_config_est.py +23 -5
  159. pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
  160. pulumi_vault/pkisecret/get_backend_issuers.py +18 -5
  161. pulumi_vault/pkisecret/get_backend_key.py +19 -4
  162. pulumi_vault/pkisecret/get_backend_keys.py +18 -5
  163. pulumi_vault/pkisecret/outputs.py +17 -12
  164. pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
  172. pulumi_vault/pkisecret/secret_backend_key.py +5 -0
  173. pulumi_vault/pkisecret/secret_backend_role.py +10 -5
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
  176. pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
  177. pulumi_vault/plugin.py +5 -0
  178. pulumi_vault/plugin_pinned_version.py +5 -0
  179. pulumi_vault/policy.py +5 -0
  180. pulumi_vault/provider.py +47 -42
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +5 -0
  183. pulumi_vault/quota_rate_limit.py +5 -0
  184. pulumi_vault/rabbitmq/_inputs.py +61 -0
  185. pulumi_vault/rabbitmq/outputs.py +5 -0
  186. pulumi_vault/rabbitmq/secret_backend.py +5 -0
  187. pulumi_vault/rabbitmq/secret_backend_role.py +43 -38
  188. pulumi_vault/raft_autopilot.py +5 -0
  189. pulumi_vault/raft_snapshot_agent_config.py +5 -0
  190. pulumi_vault/rgp_policy.py +5 -0
  191. pulumi_vault/saml/auth_backend.py +5 -0
  192. pulumi_vault/saml/auth_backend_role.py +19 -14
  193. pulumi_vault/secrets/_inputs.py +30 -0
  194. pulumi_vault/secrets/outputs.py +5 -0
  195. pulumi_vault/secrets/sync_association.py +7 -2
  196. pulumi_vault/secrets/sync_aws_destination.py +19 -14
  197. pulumi_vault/secrets/sync_azure_destination.py +19 -14
  198. pulumi_vault/secrets/sync_config.py +5 -0
  199. pulumi_vault/secrets/sync_gcp_destination.py +19 -14
  200. pulumi_vault/secrets/sync_gh_destination.py +5 -0
  201. pulumi_vault/secrets/sync_github_apps.py +5 -0
  202. pulumi_vault/secrets/sync_vercel_destination.py +5 -0
  203. pulumi_vault/ssh/_inputs.py +22 -0
  204. pulumi_vault/ssh/outputs.py +5 -0
  205. pulumi_vault/ssh/secret_backend_ca.py +5 -0
  206. pulumi_vault/ssh/secret_backend_role.py +38 -33
  207. pulumi_vault/terraformcloud/secret_backend.py +5 -0
  208. pulumi_vault/terraformcloud/secret_creds.py +5 -0
  209. pulumi_vault/terraformcloud/secret_role.py +5 -0
  210. pulumi_vault/token.py +5 -0
  211. pulumi_vault/tokenauth/auth_backend_role.py +5 -14
  212. pulumi_vault/transform/alphabet.py +5 -0
  213. pulumi_vault/transform/get_decode.py +38 -14
  214. pulumi_vault/transform/get_encode.py +38 -14
  215. pulumi_vault/transform/role.py +5 -0
  216. pulumi_vault/transform/template.py +19 -14
  217. pulumi_vault/transform/transformation.py +5 -0
  218. pulumi_vault/transit/get_decrypt.py +21 -4
  219. pulumi_vault/transit/get_encrypt.py +23 -4
  220. pulumi_vault/transit/secret_backend_key.py +12 -7
  221. pulumi_vault/transit/secret_cache_config.py +5 -0
  222. {pulumi_vault-6.3.0a1723109142.dist-info → pulumi_vault-6.3.1.dist-info}/METADATA +3 -2
  223. pulumi_vault-6.3.1.dist-info/RECORD +256 -0
  224. {pulumi_vault-6.3.0a1723109142.dist-info → pulumi_vault-6.3.1.dist-info}/WHEEL +1 -1
  225. pulumi_vault-6.3.0a1723109142.dist-info/RECORD +0 -256
  226. {pulumi_vault-6.3.0a1723109142.dist-info → pulumi_vault-6.3.1.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
  from . import outputs
12
17
  from ._inputs import *
@@ -23,7 +28,7 @@ class BackendConfigEstArgs:
23
28
  default_path_policy: Optional[pulumi.Input[str]] = None,
24
29
  enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
25
30
  enabled: Optional[pulumi.Input[bool]] = None,
26
- label_to_path_policy: Optional[pulumi.Input[Mapping[str, Any]]] = None,
31
+ label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
27
32
  namespace: Optional[pulumi.Input[str]] = None):
28
33
  """
29
34
  The set of arguments for constructing a BackendConfigEst resource.
@@ -37,7 +42,7 @@ class BackendConfigEstArgs:
37
42
  :param pulumi.Input[str] default_path_policy: Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
38
43
  :param pulumi.Input[bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
39
44
  :param pulumi.Input[bool] enabled: Specifies whether EST is enabled.
40
- :param pulumi.Input[Mapping[str, Any]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
45
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
41
46
  :param pulumi.Input[str] namespace: The namespace of the target resource.
42
47
  The value should not contain leading or trailing forward slashes.
43
48
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -150,14 +155,14 @@ class BackendConfigEstArgs:
150
155
 
151
156
  @property
152
157
  @pulumi.getter(name="labelToPathPolicy")
153
- def label_to_path_policy(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
158
+ def label_to_path_policy(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
154
159
  """
155
160
  Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
156
161
  """
157
162
  return pulumi.get(self, "label_to_path_policy")
158
163
 
159
164
  @label_to_path_policy.setter
160
- def label_to_path_policy(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
165
+ def label_to_path_policy(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
161
166
  pulumi.set(self, "label_to_path_policy", value)
162
167
 
163
168
  @property
@@ -186,7 +191,7 @@ class _BackendConfigEstState:
186
191
  default_path_policy: Optional[pulumi.Input[str]] = None,
187
192
  enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
188
193
  enabled: Optional[pulumi.Input[bool]] = None,
189
- label_to_path_policy: Optional[pulumi.Input[Mapping[str, Any]]] = None,
194
+ label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
190
195
  last_updated: Optional[pulumi.Input[str]] = None,
191
196
  namespace: Optional[pulumi.Input[str]] = None):
192
197
  """
@@ -201,7 +206,7 @@ class _BackendConfigEstState:
201
206
  :param pulumi.Input[str] default_path_policy: Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
202
207
  :param pulumi.Input[bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
203
208
  :param pulumi.Input[bool] enabled: Specifies whether EST is enabled.
204
- :param pulumi.Input[Mapping[str, Any]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
209
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
205
210
  :param pulumi.Input[str] last_updated: A read-only timestamp representing the last time the configuration was updated.
206
211
  :param pulumi.Input[str] namespace: The namespace of the target resource.
207
212
  The value should not contain leading or trailing forward slashes.
@@ -318,14 +323,14 @@ class _BackendConfigEstState:
318
323
 
319
324
  @property
320
325
  @pulumi.getter(name="labelToPathPolicy")
321
- def label_to_path_policy(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
326
+ def label_to_path_policy(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
322
327
  """
323
328
  Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
324
329
  """
325
330
  return pulumi.get(self, "label_to_path_policy")
326
331
 
327
332
  @label_to_path_policy.setter
328
- def label_to_path_policy(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
333
+ def label_to_path_policy(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
329
334
  pulumi.set(self, "label_to_path_policy", value)
330
335
 
331
336
  @property
@@ -362,13 +367,13 @@ class BackendConfigEst(pulumi.CustomResource):
362
367
  resource_name: str,
363
368
  opts: Optional[pulumi.ResourceOptions] = None,
364
369
  audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
365
- authenticators: Optional[pulumi.Input[pulumi.InputType['BackendConfigEstAuthenticatorsArgs']]] = None,
370
+ authenticators: Optional[pulumi.Input[Union['BackendConfigEstAuthenticatorsArgs', 'BackendConfigEstAuthenticatorsArgsDict']]] = None,
366
371
  backend: Optional[pulumi.Input[str]] = None,
367
372
  default_mount: Optional[pulumi.Input[bool]] = None,
368
373
  default_path_policy: Optional[pulumi.Input[str]] = None,
369
374
  enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
370
375
  enabled: Optional[pulumi.Input[bool]] = None,
371
- label_to_path_policy: Optional[pulumi.Input[Mapping[str, Any]]] = None,
376
+ label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
372
377
  namespace: Optional[pulumi.Input[str]] = None,
373
378
  __props__=None):
374
379
  """
@@ -389,14 +394,14 @@ class BackendConfigEst(pulumi.CustomResource):
389
394
  :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
390
395
 
391
396
  <a id="nestedatt--authenticators"></a>
392
- :param pulumi.Input[pulumi.InputType['BackendConfigEstAuthenticatorsArgs']] authenticators: Lists the mount accessors EST should delegate authentication requests towards (see below for nested schema).
397
+ :param pulumi.Input[Union['BackendConfigEstAuthenticatorsArgs', 'BackendConfigEstAuthenticatorsArgsDict']] authenticators: Lists the mount accessors EST should delegate authentication requests towards (see below for nested schema).
393
398
  :param pulumi.Input[str] backend: The path to the PKI secret backend to
394
399
  read the EST configuration from, with no leading or trailing `/`s.
395
400
  :param pulumi.Input[bool] default_mount: If set, this mount will register the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster.
396
401
  :param pulumi.Input[str] default_path_policy: Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
397
402
  :param pulumi.Input[bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
398
403
  :param pulumi.Input[bool] enabled: Specifies whether EST is enabled.
399
- :param pulumi.Input[Mapping[str, Any]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
404
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
400
405
  :param pulumi.Input[str] namespace: The namespace of the target resource.
401
406
  The value should not contain leading or trailing forward slashes.
402
407
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -437,13 +442,13 @@ class BackendConfigEst(pulumi.CustomResource):
437
442
  resource_name: str,
438
443
  opts: Optional[pulumi.ResourceOptions] = None,
439
444
  audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
440
- authenticators: Optional[pulumi.Input[pulumi.InputType['BackendConfigEstAuthenticatorsArgs']]] = None,
445
+ authenticators: Optional[pulumi.Input[Union['BackendConfigEstAuthenticatorsArgs', 'BackendConfigEstAuthenticatorsArgsDict']]] = None,
441
446
  backend: Optional[pulumi.Input[str]] = None,
442
447
  default_mount: Optional[pulumi.Input[bool]] = None,
443
448
  default_path_policy: Optional[pulumi.Input[str]] = None,
444
449
  enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
445
450
  enabled: Optional[pulumi.Input[bool]] = None,
446
- label_to_path_policy: Optional[pulumi.Input[Mapping[str, Any]]] = None,
451
+ label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
447
452
  namespace: Optional[pulumi.Input[str]] = None,
448
453
  __props__=None):
449
454
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
@@ -477,13 +482,13 @@ class BackendConfigEst(pulumi.CustomResource):
477
482
  id: pulumi.Input[str],
478
483
  opts: Optional[pulumi.ResourceOptions] = None,
479
484
  audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
480
- authenticators: Optional[pulumi.Input[pulumi.InputType['BackendConfigEstAuthenticatorsArgs']]] = None,
485
+ authenticators: Optional[pulumi.Input[Union['BackendConfigEstAuthenticatorsArgs', 'BackendConfigEstAuthenticatorsArgsDict']]] = None,
481
486
  backend: Optional[pulumi.Input[str]] = None,
482
487
  default_mount: Optional[pulumi.Input[bool]] = None,
483
488
  default_path_policy: Optional[pulumi.Input[str]] = None,
484
489
  enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
485
490
  enabled: Optional[pulumi.Input[bool]] = None,
486
- label_to_path_policy: Optional[pulumi.Input[Mapping[str, Any]]] = None,
491
+ label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
487
492
  last_updated: Optional[pulumi.Input[str]] = None,
488
493
  namespace: Optional[pulumi.Input[str]] = None) -> 'BackendConfigEst':
489
494
  """
@@ -496,14 +501,14 @@ class BackendConfigEst(pulumi.CustomResource):
496
501
  :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
497
502
 
498
503
  <a id="nestedatt--authenticators"></a>
499
- :param pulumi.Input[pulumi.InputType['BackendConfigEstAuthenticatorsArgs']] authenticators: Lists the mount accessors EST should delegate authentication requests towards (see below for nested schema).
504
+ :param pulumi.Input[Union['BackendConfigEstAuthenticatorsArgs', 'BackendConfigEstAuthenticatorsArgsDict']] authenticators: Lists the mount accessors EST should delegate authentication requests towards (see below for nested schema).
500
505
  :param pulumi.Input[str] backend: The path to the PKI secret backend to
501
506
  read the EST configuration from, with no leading or trailing `/`s.
502
507
  :param pulumi.Input[bool] default_mount: If set, this mount will register the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster.
503
508
  :param pulumi.Input[str] default_path_policy: Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
504
509
  :param pulumi.Input[bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
505
510
  :param pulumi.Input[bool] enabled: Specifies whether EST is enabled.
506
- :param pulumi.Input[Mapping[str, Any]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
511
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
507
512
  :param pulumi.Input[str] last_updated: A read-only timestamp representing the last time the configuration was updated.
508
513
  :param pulumi.Input[str] namespace: The namespace of the target resource.
509
514
  The value should not contain leading or trailing forward slashes.
@@ -587,7 +592,7 @@ class BackendConfigEst(pulumi.CustomResource):
587
592
 
588
593
  @property
589
594
  @pulumi.getter(name="labelToPathPolicy")
590
- def label_to_path_policy(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
595
+ def label_to_path_policy(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
591
596
  """
592
597
  Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
593
598
  """
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
  from . import outputs
12
17
 
@@ -120,7 +125,7 @@ class GetBackendConfigEstResult:
120
125
 
121
126
  @property
122
127
  @pulumi.getter(name="labelToPathPolicy")
123
- def label_to_path_policy(self) -> Mapping[str, Any]:
128
+ def label_to_path_policy(self) -> Mapping[str, str]:
124
129
  """
125
130
  A pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
126
131
  """
@@ -202,9 +207,6 @@ def get_backend_config_est(backend: Optional[str] = None,
202
207
  label_to_path_policy=pulumi.get(__ret__, 'label_to_path_policy'),
203
208
  last_updated=pulumi.get(__ret__, 'last_updated'),
204
209
  namespace=pulumi.get(__ret__, 'namespace'))
205
-
206
-
207
- @_utilities.lift_output_func(get_backend_config_est)
208
210
  def get_backend_config_est_output(backend: Optional[pulumi.Input[str]] = None,
209
211
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
210
212
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendConfigEstResult]:
@@ -230,4 +232,20 @@ def get_backend_config_est_output(backend: Optional[pulumi.Input[str]] = None,
230
232
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
231
233
  *Available only for Vault Enterprise*.
232
234
  """
233
- ...
235
+ __args__ = dict()
236
+ __args__['backend'] = backend
237
+ __args__['namespace'] = namespace
238
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
239
+ __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendConfigEst:getBackendConfigEst', __args__, opts=opts, typ=GetBackendConfigEstResult)
240
+ return __ret__.apply(lambda __response__: GetBackendConfigEstResult(
241
+ audit_fields=pulumi.get(__response__, 'audit_fields'),
242
+ authenticators=pulumi.get(__response__, 'authenticators'),
243
+ backend=pulumi.get(__response__, 'backend'),
244
+ default_mount=pulumi.get(__response__, 'default_mount'),
245
+ default_path_policy=pulumi.get(__response__, 'default_path_policy'),
246
+ enable_sentinel_parsing=pulumi.get(__response__, 'enable_sentinel_parsing'),
247
+ enabled=pulumi.get(__response__, 'enabled'),
248
+ id=pulumi.get(__response__, 'id'),
249
+ label_to_path_policy=pulumi.get(__response__, 'label_to_path_policy'),
250
+ last_updated=pulumi.get(__response__, 'last_updated'),
251
+ namespace=pulumi.get(__response__, 'namespace')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -222,9 +227,6 @@ def get_backend_issuer(backend: Optional[str] = None,
222
227
  manual_chains=pulumi.get(__ret__, 'manual_chains'),
223
228
  namespace=pulumi.get(__ret__, 'namespace'),
224
229
  usage=pulumi.get(__ret__, 'usage'))
225
-
226
-
227
- @_utilities.lift_output_func(get_backend_issuer)
228
230
  def get_backend_issuer_output(backend: Optional[pulumi.Input[str]] = None,
229
231
  issuer_ref: Optional[pulumi.Input[str]] = None,
230
232
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
@@ -259,4 +261,22 @@ def get_backend_issuer_output(backend: Optional[pulumi.Input[str]] = None,
259
261
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
260
262
  *Available only for Vault Enterprise*.
261
263
  """
262
- ...
264
+ __args__ = dict()
265
+ __args__['backend'] = backend
266
+ __args__['issuerRef'] = issuer_ref
267
+ __args__['namespace'] = namespace
268
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
269
+ __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendIssuer:getBackendIssuer', __args__, opts=opts, typ=GetBackendIssuerResult)
270
+ return __ret__.apply(lambda __response__: GetBackendIssuerResult(
271
+ backend=pulumi.get(__response__, 'backend'),
272
+ ca_chains=pulumi.get(__response__, 'ca_chains'),
273
+ certificate=pulumi.get(__response__, 'certificate'),
274
+ id=pulumi.get(__response__, 'id'),
275
+ issuer_id=pulumi.get(__response__, 'issuer_id'),
276
+ issuer_name=pulumi.get(__response__, 'issuer_name'),
277
+ issuer_ref=pulumi.get(__response__, 'issuer_ref'),
278
+ key_id=pulumi.get(__response__, 'key_id'),
279
+ leaf_not_after_behavior=pulumi.get(__response__, 'leaf_not_after_behavior'),
280
+ manual_chains=pulumi.get(__response__, 'manual_chains'),
281
+ namespace=pulumi.get(__response__, 'namespace'),
282
+ usage=pulumi.get(__response__, 'usage')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -56,7 +61,7 @@ class GetBackendIssuersResult:
56
61
 
57
62
  @property
58
63
  @pulumi.getter(name="keyInfo")
59
- def key_info(self) -> Mapping[str, Any]:
64
+ def key_info(self) -> Mapping[str, str]:
60
65
  """
61
66
  Map of issuer strings read from Vault.
62
67
  """
@@ -142,9 +147,6 @@ def get_backend_issuers(backend: Optional[str] = None,
142
147
  key_info_json=pulumi.get(__ret__, 'key_info_json'),
143
148
  keys=pulumi.get(__ret__, 'keys'),
144
149
  namespace=pulumi.get(__ret__, 'namespace'))
145
-
146
-
147
- @_utilities.lift_output_func(get_backend_issuers)
148
150
  def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None,
149
151
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
150
152
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendIssuersResult]:
@@ -176,4 +178,15 @@ def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None,
176
178
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
177
179
  *Available only for Vault Enterprise*.
178
180
  """
179
- ...
181
+ __args__ = dict()
182
+ __args__['backend'] = backend
183
+ __args__['namespace'] = namespace
184
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
185
+ __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendIssuers:getBackendIssuers', __args__, opts=opts, typ=GetBackendIssuersResult)
186
+ return __ret__.apply(lambda __response__: GetBackendIssuersResult(
187
+ backend=pulumi.get(__response__, 'backend'),
188
+ id=pulumi.get(__response__, 'id'),
189
+ key_info=pulumi.get(__response__, 'key_info'),
190
+ key_info_json=pulumi.get(__response__, 'key_info_json'),
191
+ keys=pulumi.get(__response__, 'keys'),
192
+ namespace=pulumi.get(__response__, 'namespace')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -156,9 +161,6 @@ def get_backend_key(backend: Optional[str] = None,
156
161
  key_ref=pulumi.get(__ret__, 'key_ref'),
157
162
  key_type=pulumi.get(__ret__, 'key_type'),
158
163
  namespace=pulumi.get(__ret__, 'namespace'))
159
-
160
-
161
- @_utilities.lift_output_func(get_backend_key)
162
164
  def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
163
165
  key_ref: Optional[pulumi.Input[str]] = None,
164
166
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
@@ -193,4 +195,17 @@ def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
193
195
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
194
196
  *Available only for Vault Enterprise*.
195
197
  """
196
- ...
198
+ __args__ = dict()
199
+ __args__['backend'] = backend
200
+ __args__['keyRef'] = key_ref
201
+ __args__['namespace'] = namespace
202
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
203
+ __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendKey:getBackendKey', __args__, opts=opts, typ=GetBackendKeyResult)
204
+ return __ret__.apply(lambda __response__: GetBackendKeyResult(
205
+ backend=pulumi.get(__response__, 'backend'),
206
+ id=pulumi.get(__response__, 'id'),
207
+ key_id=pulumi.get(__response__, 'key_id'),
208
+ key_name=pulumi.get(__response__, 'key_name'),
209
+ key_ref=pulumi.get(__response__, 'key_ref'),
210
+ key_type=pulumi.get(__response__, 'key_type'),
211
+ namespace=pulumi.get(__response__, 'namespace')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -56,7 +61,7 @@ class GetBackendKeysResult:
56
61
 
57
62
  @property
58
63
  @pulumi.getter(name="keyInfo")
59
- def key_info(self) -> Mapping[str, Any]:
64
+ def key_info(self) -> Mapping[str, str]:
60
65
  """
61
66
  Map of key strings read from Vault.
62
67
  """
@@ -142,9 +147,6 @@ def get_backend_keys(backend: Optional[str] = None,
142
147
  key_info_json=pulumi.get(__ret__, 'key_info_json'),
143
148
  keys=pulumi.get(__ret__, 'keys'),
144
149
  namespace=pulumi.get(__ret__, 'namespace'))
145
-
146
-
147
- @_utilities.lift_output_func(get_backend_keys)
148
150
  def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None,
149
151
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
150
152
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendKeysResult]:
@@ -176,4 +178,15 @@ def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None,
176
178
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
177
179
  *Available only for Vault Enterprise*.
178
180
  """
179
- ...
181
+ __args__ = dict()
182
+ __args__['backend'] = backend
183
+ __args__['namespace'] = namespace
184
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
185
+ __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendKeys:getBackendKeys', __args__, opts=opts, typ=GetBackendKeysResult)
186
+ return __ret__.apply(lambda __response__: GetBackendKeysResult(
187
+ backend=pulumi.get(__response__, 'backend'),
188
+ id=pulumi.get(__response__, 'id'),
189
+ key_info=pulumi.get(__response__, 'key_info'),
190
+ key_info_json=pulumi.get(__response__, 'key_info_json'),
191
+ keys=pulumi.get(__response__, 'keys'),
192
+ namespace=pulumi.get(__response__, 'namespace')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -18,11 +23,11 @@ __all__ = [
18
23
  @pulumi.output_type
19
24
  class BackendConfigEstAuthenticators(dict):
20
25
  def __init__(__self__, *,
21
- cert: Optional[Mapping[str, Any]] = None,
22
- userpass: Optional[Mapping[str, Any]] = None):
26
+ cert: Optional[Mapping[str, str]] = None,
27
+ userpass: Optional[Mapping[str, str]] = None):
23
28
  """
24
- :param Mapping[str, Any] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
25
- :param Mapping[str, Any] userpass: "The accessor (required) property for user pass auth backends".
29
+ :param Mapping[str, str] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
30
+ :param Mapping[str, str] userpass: "The accessor (required) property for user pass auth backends".
26
31
  """
27
32
  if cert is not None:
28
33
  pulumi.set(__self__, "cert", cert)
@@ -31,7 +36,7 @@ class BackendConfigEstAuthenticators(dict):
31
36
 
32
37
  @property
33
38
  @pulumi.getter
34
- def cert(self) -> Optional[Mapping[str, Any]]:
39
+ def cert(self) -> Optional[Mapping[str, str]]:
35
40
  """
36
41
  "The accessor (required) and cert_role (optional) properties for cert auth backends".
37
42
  """
@@ -39,7 +44,7 @@ class BackendConfigEstAuthenticators(dict):
39
44
 
40
45
  @property
41
46
  @pulumi.getter
42
- def userpass(self) -> Optional[Mapping[str, Any]]:
47
+ def userpass(self) -> Optional[Mapping[str, str]]:
43
48
  """
44
49
  "The accessor (required) property for user pass auth backends".
45
50
  """
@@ -95,11 +100,11 @@ class SecretBackendRolePolicyIdentifier(dict):
95
100
  @pulumi.output_type
96
101
  class GetBackendConfigEstAuthenticatorResult(dict):
97
102
  def __init__(__self__, *,
98
- cert: Optional[Mapping[str, Any]] = None,
99
- userpass: Optional[Mapping[str, Any]] = None):
103
+ cert: Optional[Mapping[str, str]] = None,
104
+ userpass: Optional[Mapping[str, str]] = None):
100
105
  """
101
- :param Mapping[str, Any] cert: "The accessor and cert_role properties for cert auth backends".
102
- :param Mapping[str, Any] userpass: "The accessor property for user pass auth backends".
106
+ :param Mapping[str, str] cert: "The accessor and cert_role properties for cert auth backends".
107
+ :param Mapping[str, str] userpass: "The accessor property for user pass auth backends".
103
108
  """
104
109
  if cert is not None:
105
110
  pulumi.set(__self__, "cert", cert)
@@ -108,7 +113,7 @@ class GetBackendConfigEstAuthenticatorResult(dict):
108
113
 
109
114
  @property
110
115
  @pulumi.getter
111
- def cert(self) -> Optional[Mapping[str, Any]]:
116
+ def cert(self) -> Optional[Mapping[str, str]]:
112
117
  """
113
118
  "The accessor and cert_role properties for cert auth backends".
114
119
  """
@@ -116,7 +121,7 @@ class GetBackendConfigEstAuthenticatorResult(dict):
116
121
 
117
122
  @property
118
123
  @pulumi.getter
119
- def userpass(self) -> Optional[Mapping[str, Any]]:
124
+ def userpass(self) -> Optional[Mapping[str, str]]:
120
125
  """
121
126
  "The accessor property for user pass auth backends".
122
127
  """
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendCertArgs', 'SecretBackendCert']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendConfigCaArgs', 'SecretBackendConfigCa']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendConfigIssuersArgs', 'SecretBackendConfigIssuers']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendConfigUrlsArgs', 'SecretBackendConfigUrls']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendCrlConfigArgs', 'SecretBackendCrlConfig']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendIntermediateCertRequestArgs', 'SecretBackendIntermediateCertRequest']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendIntermediateSetSignedArgs', 'SecretBackendIntermediateSetSigned']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendIssuerArgs', 'SecretBackendIssuer']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendKeyArgs', 'SecretBackendKey']