pulumi-vault 6.3.0a1723109142__py3-none-any.whl → 6.3.1a1728636480__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +560 -0
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +19 -4
  4. pulumi_vault/ad/secret_backend.py +5 -0
  5. pulumi_vault/ad/secret_library.py +5 -0
  6. pulumi_vault/ad/secret_role.py +5 -0
  7. pulumi_vault/alicloud/auth_backend_role.py +5 -0
  8. pulumi_vault/approle/auth_backend_login.py +5 -0
  9. pulumi_vault/approle/auth_backend_role.py +5 -0
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
  11. pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
  12. pulumi_vault/audit.py +5 -0
  13. pulumi_vault/audit_request_header.py +5 -0
  14. pulumi_vault/auth_backend.py +10 -5
  15. pulumi_vault/aws/auth_backend_cert.py +5 -0
  16. pulumi_vault/aws/auth_backend_client.py +5 -0
  17. pulumi_vault/aws/auth_backend_config_identity.py +5 -0
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
  19. pulumi_vault/aws/auth_backend_login.py +12 -7
  20. pulumi_vault/aws/auth_backend_role.py +5 -0
  21. pulumi_vault/aws/auth_backend_role_tag.py +5 -0
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
  23. pulumi_vault/aws/auth_backend_sts_role.py +5 -0
  24. pulumi_vault/aws/get_access_credentials.py +31 -4
  25. pulumi_vault/aws/get_static_access_credentials.py +18 -4
  26. pulumi_vault/aws/secret_backend.py +5 -0
  27. pulumi_vault/aws/secret_backend_role.py +5 -0
  28. pulumi_vault/aws/secret_backend_static_role.py +5 -0
  29. pulumi_vault/azure/_inputs.py +24 -0
  30. pulumi_vault/azure/auth_backend_config.py +5 -0
  31. pulumi_vault/azure/auth_backend_role.py +5 -0
  32. pulumi_vault/azure/backend.py +5 -0
  33. pulumi_vault/azure/backend_role.py +23 -18
  34. pulumi_vault/azure/get_access_credentials.py +36 -4
  35. pulumi_vault/azure/outputs.py +5 -0
  36. pulumi_vault/cert_auth_backend_role.py +5 -0
  37. pulumi_vault/config/__init__.pyi +5 -0
  38. pulumi_vault/config/_inputs.py +21 -0
  39. pulumi_vault/config/outputs.py +5 -0
  40. pulumi_vault/config/ui_custom_message.py +24 -19
  41. pulumi_vault/config/vars.py +5 -0
  42. pulumi_vault/consul/secret_backend.py +5 -0
  43. pulumi_vault/consul/secret_backend_role.py +5 -0
  44. pulumi_vault/database/_inputs.py +2091 -140
  45. pulumi_vault/database/outputs.py +59 -54
  46. pulumi_vault/database/secret_backend_connection.py +115 -110
  47. pulumi_vault/database/secret_backend_role.py +25 -20
  48. pulumi_vault/database/secret_backend_static_role.py +11 -6
  49. pulumi_vault/database/secrets_mount.py +139 -134
  50. pulumi_vault/egp_policy.py +5 -0
  51. pulumi_vault/gcp/_inputs.py +111 -0
  52. pulumi_vault/gcp/auth_backend.py +15 -10
  53. pulumi_vault/gcp/auth_backend_role.py +5 -0
  54. pulumi_vault/gcp/get_auth_backend_role.py +42 -4
  55. pulumi_vault/gcp/outputs.py +5 -0
  56. pulumi_vault/gcp/secret_backend.py +5 -0
  57. pulumi_vault/gcp/secret_impersonated_account.py +5 -0
  58. pulumi_vault/gcp/secret_roleset.py +18 -13
  59. pulumi_vault/gcp/secret_static_account.py +18 -13
  60. pulumi_vault/generic/endpoint.py +5 -0
  61. pulumi_vault/generic/get_secret.py +25 -5
  62. pulumi_vault/generic/secret.py +12 -7
  63. pulumi_vault/get_auth_backend.py +21 -4
  64. pulumi_vault/get_auth_backends.py +16 -4
  65. pulumi_vault/get_namespace.py +18 -5
  66. pulumi_vault/get_namespaces.py +13 -4
  67. pulumi_vault/get_nomad_access_token.py +28 -8
  68. pulumi_vault/get_policy_document.py +27 -16
  69. pulumi_vault/get_raft_autopilot_state.py +26 -7
  70. pulumi_vault/github/_inputs.py +55 -0
  71. pulumi_vault/github/auth_backend.py +10 -5
  72. pulumi_vault/github/outputs.py +5 -0
  73. pulumi_vault/github/team.py +5 -0
  74. pulumi_vault/github/user.py +5 -0
  75. pulumi_vault/identity/entity.py +5 -0
  76. pulumi_vault/identity/entity_alias.py +5 -0
  77. pulumi_vault/identity/entity_policies.py +5 -0
  78. pulumi_vault/identity/get_entity.py +35 -5
  79. pulumi_vault/identity/get_group.py +42 -6
  80. pulumi_vault/identity/get_oidc_client_creds.py +16 -4
  81. pulumi_vault/identity/get_oidc_openid_config.py +26 -4
  82. pulumi_vault/identity/get_oidc_public_keys.py +16 -5
  83. pulumi_vault/identity/group.py +5 -0
  84. pulumi_vault/identity/group_alias.py +5 -0
  85. pulumi_vault/identity/group_member_entity_ids.py +5 -0
  86. pulumi_vault/identity/group_member_group_ids.py +5 -0
  87. pulumi_vault/identity/group_policies.py +5 -0
  88. pulumi_vault/identity/mfa_duo.py +5 -0
  89. pulumi_vault/identity/mfa_login_enforcement.py +5 -0
  90. pulumi_vault/identity/mfa_okta.py +5 -0
  91. pulumi_vault/identity/mfa_pingid.py +5 -0
  92. pulumi_vault/identity/mfa_totp.py +5 -0
  93. pulumi_vault/identity/oidc.py +5 -0
  94. pulumi_vault/identity/oidc_assignment.py +5 -0
  95. pulumi_vault/identity/oidc_client.py +5 -0
  96. pulumi_vault/identity/oidc_key.py +5 -0
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
  98. pulumi_vault/identity/oidc_provider.py +5 -0
  99. pulumi_vault/identity/oidc_role.py +5 -0
  100. pulumi_vault/identity/oidc_scope.py +5 -0
  101. pulumi_vault/identity/outputs.py +8 -3
  102. pulumi_vault/jwt/_inputs.py +55 -0
  103. pulumi_vault/jwt/auth_backend.py +14 -9
  104. pulumi_vault/jwt/auth_backend_role.py +33 -28
  105. pulumi_vault/jwt/outputs.py +5 -0
  106. pulumi_vault/kmip/secret_backend.py +5 -0
  107. pulumi_vault/kmip/secret_role.py +5 -0
  108. pulumi_vault/kmip/secret_scope.py +5 -0
  109. pulumi_vault/kubernetes/auth_backend_config.py +5 -0
  110. pulumi_vault/kubernetes/auth_backend_role.py +5 -0
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
  113. pulumi_vault/kubernetes/get_service_account_token.py +28 -4
  114. pulumi_vault/kubernetes/secret_backend.py +19 -14
  115. pulumi_vault/kubernetes/secret_backend_role.py +5 -0
  116. pulumi_vault/kv/_inputs.py +36 -4
  117. pulumi_vault/kv/get_secret.py +20 -5
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +24 -5
  119. pulumi_vault/kv/get_secret_v2.py +27 -6
  120. pulumi_vault/kv/get_secrets_list.py +15 -4
  121. pulumi_vault/kv/get_secrets_list_v2.py +18 -4
  122. pulumi_vault/kv/outputs.py +8 -3
  123. pulumi_vault/kv/secret.py +12 -7
  124. pulumi_vault/kv/secret_backend_v2.py +5 -0
  125. pulumi_vault/kv/secret_v2.py +46 -41
  126. pulumi_vault/ldap/auth_backend.py +5 -0
  127. pulumi_vault/ldap/auth_backend_group.py +5 -0
  128. pulumi_vault/ldap/auth_backend_user.py +5 -0
  129. pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
  130. pulumi_vault/ldap/get_static_credentials.py +23 -4
  131. pulumi_vault/ldap/secret_backend.py +19 -14
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
  133. pulumi_vault/ldap/secret_backend_library_set.py +5 -0
  134. pulumi_vault/ldap/secret_backend_static_role.py +5 -0
  135. pulumi_vault/managed/_inputs.py +205 -0
  136. pulumi_vault/managed/keys.py +20 -15
  137. pulumi_vault/managed/outputs.py +5 -0
  138. pulumi_vault/mfa_duo.py +5 -0
  139. pulumi_vault/mfa_okta.py +5 -0
  140. pulumi_vault/mfa_pingid.py +5 -0
  141. pulumi_vault/mfa_totp.py +5 -0
  142. pulumi_vault/mongodbatlas/secret_backend.py +5 -0
  143. pulumi_vault/mongodbatlas/secret_role.py +5 -0
  144. pulumi_vault/mount.py +21 -16
  145. pulumi_vault/namespace.py +19 -14
  146. pulumi_vault/nomad_secret_backend.py +5 -0
  147. pulumi_vault/nomad_secret_role.py +5 -0
  148. pulumi_vault/okta/_inputs.py +39 -0
  149. pulumi_vault/okta/auth_backend.py +31 -26
  150. pulumi_vault/okta/auth_backend_group.py +5 -0
  151. pulumi_vault/okta/auth_backend_user.py +5 -0
  152. pulumi_vault/okta/outputs.py +5 -0
  153. pulumi_vault/outputs.py +5 -0
  154. pulumi_vault/password_policy.py +5 -0
  155. pulumi_vault/pkisecret/_inputs.py +49 -8
  156. pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
  157. pulumi_vault/pkisecret/backend_config_est.py +24 -19
  158. pulumi_vault/pkisecret/get_backend_config_est.py +23 -5
  159. pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
  160. pulumi_vault/pkisecret/get_backend_issuers.py +18 -5
  161. pulumi_vault/pkisecret/get_backend_key.py +19 -4
  162. pulumi_vault/pkisecret/get_backend_keys.py +18 -5
  163. pulumi_vault/pkisecret/outputs.py +17 -12
  164. pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
  172. pulumi_vault/pkisecret/secret_backend_key.py +5 -0
  173. pulumi_vault/pkisecret/secret_backend_role.py +10 -5
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
  176. pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
  177. pulumi_vault/plugin.py +5 -0
  178. pulumi_vault/plugin_pinned_version.py +5 -0
  179. pulumi_vault/policy.py +5 -0
  180. pulumi_vault/provider.py +47 -42
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +5 -0
  183. pulumi_vault/quota_rate_limit.py +5 -0
  184. pulumi_vault/rabbitmq/_inputs.py +61 -0
  185. pulumi_vault/rabbitmq/outputs.py +5 -0
  186. pulumi_vault/rabbitmq/secret_backend.py +5 -0
  187. pulumi_vault/rabbitmq/secret_backend_role.py +43 -38
  188. pulumi_vault/raft_autopilot.py +5 -0
  189. pulumi_vault/raft_snapshot_agent_config.py +5 -0
  190. pulumi_vault/rgp_policy.py +5 -0
  191. pulumi_vault/saml/auth_backend.py +5 -0
  192. pulumi_vault/saml/auth_backend_role.py +19 -14
  193. pulumi_vault/secrets/_inputs.py +30 -0
  194. pulumi_vault/secrets/outputs.py +5 -0
  195. pulumi_vault/secrets/sync_association.py +7 -2
  196. pulumi_vault/secrets/sync_aws_destination.py +19 -14
  197. pulumi_vault/secrets/sync_azure_destination.py +19 -14
  198. pulumi_vault/secrets/sync_config.py +5 -0
  199. pulumi_vault/secrets/sync_gcp_destination.py +19 -14
  200. pulumi_vault/secrets/sync_gh_destination.py +5 -0
  201. pulumi_vault/secrets/sync_github_apps.py +5 -0
  202. pulumi_vault/secrets/sync_vercel_destination.py +5 -0
  203. pulumi_vault/ssh/_inputs.py +22 -0
  204. pulumi_vault/ssh/outputs.py +5 -0
  205. pulumi_vault/ssh/secret_backend_ca.py +5 -0
  206. pulumi_vault/ssh/secret_backend_role.py +38 -33
  207. pulumi_vault/terraformcloud/secret_backend.py +5 -0
  208. pulumi_vault/terraformcloud/secret_creds.py +5 -0
  209. pulumi_vault/terraformcloud/secret_role.py +5 -0
  210. pulumi_vault/token.py +5 -0
  211. pulumi_vault/tokenauth/auth_backend_role.py +5 -14
  212. pulumi_vault/transform/alphabet.py +5 -0
  213. pulumi_vault/transform/get_decode.py +38 -14
  214. pulumi_vault/transform/get_encode.py +38 -14
  215. pulumi_vault/transform/role.py +5 -0
  216. pulumi_vault/transform/template.py +19 -14
  217. pulumi_vault/transform/transformation.py +5 -0
  218. pulumi_vault/transit/get_decrypt.py +21 -4
  219. pulumi_vault/transit/get_encrypt.py +23 -4
  220. pulumi_vault/transit/secret_backend_key.py +12 -7
  221. pulumi_vault/transit/secret_cache_config.py +5 -0
  222. {pulumi_vault-6.3.0a1723109142.dist-info → pulumi_vault-6.3.1a1728636480.dist-info}/METADATA +3 -2
  223. pulumi_vault-6.3.1a1728636480.dist-info/RECORD +256 -0
  224. {pulumi_vault-6.3.0a1723109142.dist-info → pulumi_vault-6.3.1a1728636480.dist-info}/WHEEL +1 -1
  225. pulumi_vault-6.3.0a1723109142.dist-info/RECORD +0 -256
  226. {pulumi_vault-6.3.0a1723109142.dist-info → pulumi_vault-6.3.1a1728636480.dist-info}/top_level.txt +0 -0
@@ -4,17 +4,88 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
13
18
  'KeysAwArgs',
19
+ 'KeysAwArgsDict',
14
20
  'KeysAzureArgs',
21
+ 'KeysAzureArgsDict',
15
22
  'KeysPkcArgs',
23
+ 'KeysPkcArgsDict',
16
24
  ]
17
25
 
26
+ MYPY = False
27
+
28
+ if not MYPY:
29
+ class KeysAwArgsDict(TypedDict):
30
+ access_key: pulumi.Input[str]
31
+ """
32
+ The AWS access key to use
33
+ """
34
+ key_bits: pulumi.Input[str]
35
+ """
36
+ The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
37
+ """
38
+ key_type: pulumi.Input[str]
39
+ """
40
+ The type of key to use
41
+ """
42
+ kms_key: pulumi.Input[str]
43
+ """
44
+ An identifier for the key
45
+ """
46
+ name: pulumi.Input[str]
47
+ """
48
+ A unique lowercase name that serves as identifying the key
49
+ """
50
+ secret_key: pulumi.Input[str]
51
+ """
52
+ The AWS secret key to use
53
+ """
54
+ allow_generate_key: NotRequired[pulumi.Input[bool]]
55
+ """
56
+ If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
57
+ """
58
+ allow_replace_key: NotRequired[pulumi.Input[bool]]
59
+ """
60
+ Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
61
+ """
62
+ allow_store_key: NotRequired[pulumi.Input[bool]]
63
+ """
64
+ Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
65
+ """
66
+ any_mount: NotRequired[pulumi.Input[bool]]
67
+ """
68
+ Allow usage from any mount point within the namespace if 'true'
69
+ """
70
+ curve: NotRequired[pulumi.Input[str]]
71
+ """
72
+ The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
73
+ """
74
+ endpoint: NotRequired[pulumi.Input[str]]
75
+ """
76
+ Used to specify a custom AWS endpoint
77
+ """
78
+ region: NotRequired[pulumi.Input[str]]
79
+ """
80
+ The AWS region where the keys are stored (or will be stored)
81
+ """
82
+ uuid: NotRequired[pulumi.Input[str]]
83
+ """
84
+ ID of the managed key read from Vault
85
+ """
86
+ elif False:
87
+ KeysAwArgsDict: TypeAlias = Mapping[str, Any]
88
+
18
89
  @pulumi.input_type
19
90
  class KeysAwArgs:
20
91
  def __init__(__self__, *,
@@ -240,6 +311,71 @@ class KeysAwArgs:
240
311
  pulumi.set(self, "uuid", value)
241
312
 
242
313
 
314
+ if not MYPY:
315
+ class KeysAzureArgsDict(TypedDict):
316
+ client_id: pulumi.Input[str]
317
+ """
318
+ The client id for credentials to query the Azure APIs
319
+ """
320
+ client_secret: pulumi.Input[str]
321
+ """
322
+ The client secret for credentials to query the Azure APIs
323
+ """
324
+ key_name: pulumi.Input[str]
325
+ """
326
+ The Key Vault key to use for encryption and decryption
327
+ """
328
+ key_type: pulumi.Input[str]
329
+ """
330
+ The type of key to use
331
+ """
332
+ name: pulumi.Input[str]
333
+ """
334
+ A unique lowercase name that serves as identifying the key
335
+ """
336
+ tenant_id: pulumi.Input[str]
337
+ """
338
+ The tenant id for the Azure Active Directory organization
339
+ """
340
+ vault_name: pulumi.Input[str]
341
+ """
342
+ The Key Vault vault to use the encryption keys for encryption and decryption
343
+ """
344
+ allow_generate_key: NotRequired[pulumi.Input[bool]]
345
+ """
346
+ If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
347
+ """
348
+ allow_replace_key: NotRequired[pulumi.Input[bool]]
349
+ """
350
+ Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
351
+ """
352
+ allow_store_key: NotRequired[pulumi.Input[bool]]
353
+ """
354
+ Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
355
+ """
356
+ any_mount: NotRequired[pulumi.Input[bool]]
357
+ """
358
+ Allow usage from any mount point within the namespace if 'true'
359
+ """
360
+ environment: NotRequired[pulumi.Input[str]]
361
+ """
362
+ The Azure Cloud environment API endpoints to use
363
+ """
364
+ key_bits: NotRequired[pulumi.Input[str]]
365
+ """
366
+ The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
367
+ """
368
+ resource: NotRequired[pulumi.Input[str]]
369
+ """
370
+ The Azure Key Vault resource's DNS Suffix to connect to
371
+ """
372
+ uuid: NotRequired[pulumi.Input[str]]
373
+ """
374
+ ID of the managed key read from Vault
375
+ """
376
+ elif False:
377
+ KeysAzureArgsDict: TypeAlias = Mapping[str, Any]
378
+
243
379
  @pulumi.input_type
244
380
  class KeysAzureArgs:
245
381
  def __init__(__self__, *,
@@ -480,6 +616,75 @@ class KeysAzureArgs:
480
616
  pulumi.set(self, "uuid", value)
481
617
 
482
618
 
619
+ if not MYPY:
620
+ class KeysPkcArgsDict(TypedDict):
621
+ key_id: pulumi.Input[str]
622
+ """
623
+ The id of a PKCS#11 key to use
624
+ """
625
+ key_label: pulumi.Input[str]
626
+ """
627
+ The label of the key to use
628
+ """
629
+ library: pulumi.Input[str]
630
+ """
631
+ The name of the kms_library stanza to use from Vault's config to lookup the local library path
632
+ """
633
+ mechanism: pulumi.Input[str]
634
+ """
635
+ The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
636
+ """
637
+ name: pulumi.Input[str]
638
+ """
639
+ A unique lowercase name that serves as identifying the key
640
+ """
641
+ pin: pulumi.Input[str]
642
+ """
643
+ The PIN for login
644
+ """
645
+ allow_generate_key: NotRequired[pulumi.Input[bool]]
646
+ """
647
+ If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
648
+ """
649
+ allow_replace_key: NotRequired[pulumi.Input[bool]]
650
+ """
651
+ Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
652
+ """
653
+ allow_store_key: NotRequired[pulumi.Input[bool]]
654
+ """
655
+ Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
656
+ """
657
+ any_mount: NotRequired[pulumi.Input[bool]]
658
+ """
659
+ Allow usage from any mount point within the namespace if 'true'
660
+ """
661
+ curve: NotRequired[pulumi.Input[str]]
662
+ """
663
+ Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
664
+ """
665
+ force_rw_session: NotRequired[pulumi.Input[str]]
666
+ """
667
+ Force all operations to open up a read-write session to the HSM
668
+ """
669
+ key_bits: NotRequired[pulumi.Input[str]]
670
+ """
671
+ Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
672
+ """
673
+ slot: NotRequired[pulumi.Input[str]]
674
+ """
675
+ The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
676
+ """
677
+ token_label: NotRequired[pulumi.Input[str]]
678
+ """
679
+ The slot token label to use
680
+ """
681
+ uuid: NotRequired[pulumi.Input[str]]
682
+ """
683
+ ID of the managed key read from Vault
684
+ """
685
+ elif False:
686
+ KeysPkcArgsDict: TypeAlias = Mapping[str, Any]
687
+
483
688
  @pulumi.input_type
484
689
  class KeysPkcArgs:
485
690
  def __init__(__self__, *,
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
  from . import outputs
12
17
  from ._inputs import *
@@ -162,10 +167,10 @@ class Keys(pulumi.CustomResource):
162
167
  def __init__(__self__,
163
168
  resource_name: str,
164
169
  opts: Optional[pulumi.ResourceOptions] = None,
165
- aws: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysAwArgs']]]]] = None,
166
- azures: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysAzureArgs']]]]] = None,
170
+ aws: Optional[pulumi.Input[Sequence[pulumi.Input[Union['KeysAwArgs', 'KeysAwArgsDict']]]]] = None,
171
+ azures: Optional[pulumi.Input[Sequence[pulumi.Input[Union['KeysAzureArgs', 'KeysAzureArgsDict']]]]] = None,
167
172
  namespace: Optional[pulumi.Input[str]] = None,
168
- pkcs: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysPkcArgs']]]]] = None,
173
+ pkcs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['KeysPkcArgs', 'KeysPkcArgsDict']]]]] = None,
169
174
  __props__=None):
170
175
  """
171
176
  A resource that manages the lifecycle of all [Managed Keys](https://www.vaultproject.io/docs/enterprise/managed-keys) in Vault.
@@ -182,10 +187,10 @@ class Keys(pulumi.CustomResource):
182
187
 
183
188
  :param str resource_name: The name of the resource.
184
189
  :param pulumi.ResourceOptions opts: Options for the resource.
185
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysAwArgs']]]] aws: Configuration block for AWS Managed Keys
186
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysAzureArgs']]]] azures: Configuration block for Azure Managed Keys
190
+ :param pulumi.Input[Sequence[pulumi.Input[Union['KeysAwArgs', 'KeysAwArgsDict']]]] aws: Configuration block for AWS Managed Keys
191
+ :param pulumi.Input[Sequence[pulumi.Input[Union['KeysAzureArgs', 'KeysAzureArgsDict']]]] azures: Configuration block for Azure Managed Keys
187
192
  :param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
188
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysPkcArgs']]]] pkcs: Configuration block for PKCS Managed Keys
193
+ :param pulumi.Input[Sequence[pulumi.Input[Union['KeysPkcArgs', 'KeysPkcArgsDict']]]] pkcs: Configuration block for PKCS Managed Keys
189
194
  """
190
195
  ...
191
196
  @overload
@@ -221,10 +226,10 @@ class Keys(pulumi.CustomResource):
221
226
  def _internal_init(__self__,
222
227
  resource_name: str,
223
228
  opts: Optional[pulumi.ResourceOptions] = None,
224
- aws: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysAwArgs']]]]] = None,
225
- azures: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysAzureArgs']]]]] = None,
229
+ aws: Optional[pulumi.Input[Sequence[pulumi.Input[Union['KeysAwArgs', 'KeysAwArgsDict']]]]] = None,
230
+ azures: Optional[pulumi.Input[Sequence[pulumi.Input[Union['KeysAzureArgs', 'KeysAzureArgsDict']]]]] = None,
226
231
  namespace: Optional[pulumi.Input[str]] = None,
227
- pkcs: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysPkcArgs']]]]] = None,
232
+ pkcs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['KeysPkcArgs', 'KeysPkcArgsDict']]]]] = None,
228
233
  __props__=None):
229
234
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
230
235
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -248,10 +253,10 @@ class Keys(pulumi.CustomResource):
248
253
  def get(resource_name: str,
249
254
  id: pulumi.Input[str],
250
255
  opts: Optional[pulumi.ResourceOptions] = None,
251
- aws: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysAwArgs']]]]] = None,
252
- azures: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysAzureArgs']]]]] = None,
256
+ aws: Optional[pulumi.Input[Sequence[pulumi.Input[Union['KeysAwArgs', 'KeysAwArgsDict']]]]] = None,
257
+ azures: Optional[pulumi.Input[Sequence[pulumi.Input[Union['KeysAzureArgs', 'KeysAzureArgsDict']]]]] = None,
253
258
  namespace: Optional[pulumi.Input[str]] = None,
254
- pkcs: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysPkcArgs']]]]] = None) -> 'Keys':
259
+ pkcs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['KeysPkcArgs', 'KeysPkcArgsDict']]]]] = None) -> 'Keys':
255
260
  """
256
261
  Get an existing Keys resource's state with the given name, id, and optional extra
257
262
  properties used to qualify the lookup.
@@ -259,10 +264,10 @@ class Keys(pulumi.CustomResource):
259
264
  :param str resource_name: The unique name of the resulting resource.
260
265
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
261
266
  :param pulumi.ResourceOptions opts: Options for the resource.
262
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysAwArgs']]]] aws: Configuration block for AWS Managed Keys
263
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysAzureArgs']]]] azures: Configuration block for Azure Managed Keys
267
+ :param pulumi.Input[Sequence[pulumi.Input[Union['KeysAwArgs', 'KeysAwArgsDict']]]] aws: Configuration block for AWS Managed Keys
268
+ :param pulumi.Input[Sequence[pulumi.Input[Union['KeysAzureArgs', 'KeysAzureArgsDict']]]] azures: Configuration block for Azure Managed Keys
264
269
  :param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
265
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysPkcArgs']]]] pkcs: Configuration block for PKCS Managed Keys
270
+ :param pulumi.Input[Sequence[pulumi.Input[Union['KeysPkcArgs', 'KeysPkcArgsDict']]]] pkcs: Configuration block for PKCS Managed Keys
266
271
  """
267
272
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
268
273
 
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
pulumi_vault/mfa_duo.py CHANGED
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['MfaDuoArgs', 'MfaDuo']
pulumi_vault/mfa_okta.py CHANGED
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['MfaOktaArgs', 'MfaOkta']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['MfaPingidArgs', 'MfaPingid']
pulumi_vault/mfa_totp.py CHANGED
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['MfaTotpArgs', 'MfaTotp']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendArgs', 'SecretBackend']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretRoleArgs', 'SecretRole']
pulumi_vault/mount.py CHANGED
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['MountArgs', 'Mount']
@@ -29,7 +34,7 @@ class MountArgs:
29
34
  local: Optional[pulumi.Input[bool]] = None,
30
35
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
31
36
  namespace: Optional[pulumi.Input[str]] = None,
32
- options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
37
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
33
38
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
34
39
  plugin_version: Optional[pulumi.Input[str]] = None,
35
40
  seal_wrap: Optional[pulumi.Input[bool]] = None):
@@ -57,7 +62,7 @@ class MountArgs:
57
62
  The value should not contain leading or trailing forward slashes.
58
63
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
59
64
  *Available only for Vault Enterprise*.
60
- :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
65
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
61
66
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to
62
67
  the plugin.
63
68
  :param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
@@ -291,14 +296,14 @@ class MountArgs:
291
296
 
292
297
  @property
293
298
  @pulumi.getter
294
- def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
299
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
295
300
  """
296
301
  Specifies mount type specific options that are passed to the backend
297
302
  """
298
303
  return pulumi.get(self, "options")
299
304
 
300
305
  @options.setter
301
- def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
306
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
302
307
  pulumi.set(self, "options", value)
303
308
 
304
309
  @property
@@ -358,7 +363,7 @@ class _MountState:
358
363
  local: Optional[pulumi.Input[bool]] = None,
359
364
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
360
365
  namespace: Optional[pulumi.Input[str]] = None,
361
- options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
366
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
362
367
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
363
368
  path: Optional[pulumi.Input[str]] = None,
364
369
  plugin_version: Optional[pulumi.Input[str]] = None,
@@ -387,7 +392,7 @@ class _MountState:
387
392
  The value should not contain leading or trailing forward slashes.
388
393
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
389
394
  *Available only for Vault Enterprise*.
390
- :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
395
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
391
396
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to
392
397
  the plugin.
393
398
  :param pulumi.Input[str] path: Where the secret backend will be mounted
@@ -615,14 +620,14 @@ class _MountState:
615
620
 
616
621
  @property
617
622
  @pulumi.getter
618
- def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
623
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
619
624
  """
620
625
  Specifies mount type specific options that are passed to the backend
621
626
  """
622
627
  return pulumi.get(self, "options")
623
628
 
624
629
  @options.setter
625
- def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
630
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
626
631
  pulumi.set(self, "options", value)
627
632
 
628
633
  @property
@@ -707,7 +712,7 @@ class Mount(pulumi.CustomResource):
707
712
  local: Optional[pulumi.Input[bool]] = None,
708
713
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
709
714
  namespace: Optional[pulumi.Input[str]] = None,
710
- options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
715
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
711
716
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
712
717
  path: Optional[pulumi.Input[str]] = None,
713
718
  plugin_version: Optional[pulumi.Input[str]] = None,
@@ -752,7 +757,7 @@ class Mount(pulumi.CustomResource):
752
757
  type="transit",
753
758
  description="This is an example transit secret engine mount",
754
759
  options={
755
- "convergent_encryption": False,
760
+ "convergent_encryption": "false",
756
761
  })
757
762
  ```
758
763
 
@@ -798,7 +803,7 @@ class Mount(pulumi.CustomResource):
798
803
  The value should not contain leading or trailing forward slashes.
799
804
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
800
805
  *Available only for Vault Enterprise*.
801
- :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
806
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
802
807
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to
803
808
  the plugin.
804
809
  :param pulumi.Input[str] path: Where the secret backend will be mounted
@@ -852,7 +857,7 @@ class Mount(pulumi.CustomResource):
852
857
  type="transit",
853
858
  description="This is an example transit secret engine mount",
854
859
  options={
855
- "convergent_encryption": False,
860
+ "convergent_encryption": "false",
856
861
  })
857
862
  ```
858
863
 
@@ -904,7 +909,7 @@ class Mount(pulumi.CustomResource):
904
909
  local: Optional[pulumi.Input[bool]] = None,
905
910
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
906
911
  namespace: Optional[pulumi.Input[str]] = None,
907
- options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
912
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
908
913
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
909
914
  path: Optional[pulumi.Input[str]] = None,
910
915
  plugin_version: Optional[pulumi.Input[str]] = None,
@@ -967,7 +972,7 @@ class Mount(pulumi.CustomResource):
967
972
  local: Optional[pulumi.Input[bool]] = None,
968
973
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
969
974
  namespace: Optional[pulumi.Input[str]] = None,
970
- options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
975
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
971
976
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
972
977
  path: Optional[pulumi.Input[str]] = None,
973
978
  plugin_version: Optional[pulumi.Input[str]] = None,
@@ -1001,7 +1006,7 @@ class Mount(pulumi.CustomResource):
1001
1006
  The value should not contain leading or trailing forward slashes.
1002
1007
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1003
1008
  *Available only for Vault Enterprise*.
1004
- :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
1009
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
1005
1010
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to
1006
1011
  the plugin.
1007
1012
  :param pulumi.Input[str] path: Where the secret backend will be mounted
@@ -1158,7 +1163,7 @@ class Mount(pulumi.CustomResource):
1158
1163
 
1159
1164
  @property
1160
1165
  @pulumi.getter
1161
- def options(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
1166
+ def options(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
1162
1167
  """
1163
1168
  Specifies mount type specific options that are passed to the backend
1164
1169
  """