pulumi-vault 6.3.2a1729803197__py3-none-any.whl → 6.4.0a1723454543__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +0 -560
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +4 -19
  4. pulumi_vault/ad/secret_backend.py +0 -5
  5. pulumi_vault/ad/secret_library.py +0 -5
  6. pulumi_vault/ad/secret_role.py +0 -5
  7. pulumi_vault/alicloud/auth_backend_role.py +0 -5
  8. pulumi_vault/approle/auth_backend_login.py +0 -5
  9. pulumi_vault/approle/auth_backend_role.py +0 -5
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -5
  11. pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
  12. pulumi_vault/audit.py +0 -5
  13. pulumi_vault/audit_request_header.py +0 -5
  14. pulumi_vault/auth_backend.py +0 -5
  15. pulumi_vault/aws/auth_backend_cert.py +0 -5
  16. pulumi_vault/aws/auth_backend_client.py +0 -5
  17. pulumi_vault/aws/auth_backend_config_identity.py +0 -5
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
  19. pulumi_vault/aws/auth_backend_login.py +7 -12
  20. pulumi_vault/aws/auth_backend_role.py +0 -5
  21. pulumi_vault/aws/auth_backend_role_tag.py +0 -5
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
  23. pulumi_vault/aws/auth_backend_sts_role.py +0 -5
  24. pulumi_vault/aws/get_access_credentials.py +4 -31
  25. pulumi_vault/aws/get_static_access_credentials.py +4 -18
  26. pulumi_vault/aws/secret_backend.py +0 -5
  27. pulumi_vault/aws/secret_backend_role.py +0 -5
  28. pulumi_vault/aws/secret_backend_static_role.py +0 -5
  29. pulumi_vault/azure/_inputs.py +0 -24
  30. pulumi_vault/azure/auth_backend_config.py +0 -5
  31. pulumi_vault/azure/auth_backend_role.py +0 -5
  32. pulumi_vault/azure/backend.py +0 -5
  33. pulumi_vault/azure/backend_role.py +0 -5
  34. pulumi_vault/azure/get_access_credentials.py +4 -36
  35. pulumi_vault/azure/outputs.py +0 -5
  36. pulumi_vault/cert_auth_backend_role.py +0 -5
  37. pulumi_vault/config/__init__.pyi +0 -5
  38. pulumi_vault/config/_inputs.py +0 -21
  39. pulumi_vault/config/outputs.py +0 -5
  40. pulumi_vault/config/ui_custom_message.py +14 -19
  41. pulumi_vault/config/vars.py +0 -5
  42. pulumi_vault/consul/secret_backend.py +0 -5
  43. pulumi_vault/consul/secret_backend_role.py +0 -5
  44. pulumi_vault/database/_inputs.py +105 -2056
  45. pulumi_vault/database/outputs.py +54 -59
  46. pulumi_vault/database/secret_backend_connection.py +14 -19
  47. pulumi_vault/database/secret_backend_role.py +14 -19
  48. pulumi_vault/database/secret_backend_static_role.py +0 -5
  49. pulumi_vault/database/secrets_mount.py +14 -19
  50. pulumi_vault/egp_policy.py +0 -5
  51. pulumi_vault/gcp/_inputs.py +0 -111
  52. pulumi_vault/gcp/auth_backend.py +0 -5
  53. pulumi_vault/gcp/auth_backend_role.py +0 -5
  54. pulumi_vault/gcp/get_auth_backend_role.py +4 -42
  55. pulumi_vault/gcp/outputs.py +0 -5
  56. pulumi_vault/gcp/secret_backend.py +0 -5
  57. pulumi_vault/gcp/secret_impersonated_account.py +0 -5
  58. pulumi_vault/gcp/secret_roleset.py +0 -5
  59. pulumi_vault/gcp/secret_static_account.py +0 -5
  60. pulumi_vault/generic/endpoint.py +0 -5
  61. pulumi_vault/generic/get_secret.py +5 -25
  62. pulumi_vault/generic/secret.py +7 -12
  63. pulumi_vault/get_auth_backend.py +4 -21
  64. pulumi_vault/get_auth_backends.py +4 -16
  65. pulumi_vault/get_namespace.py +5 -18
  66. pulumi_vault/get_namespaces.py +4 -13
  67. pulumi_vault/get_nomad_access_token.py +8 -28
  68. pulumi_vault/get_policy_document.py +4 -15
  69. pulumi_vault/get_raft_autopilot_state.py +7 -26
  70. pulumi_vault/github/_inputs.py +0 -55
  71. pulumi_vault/github/auth_backend.py +0 -5
  72. pulumi_vault/github/outputs.py +0 -5
  73. pulumi_vault/github/team.py +0 -5
  74. pulumi_vault/github/user.py +0 -5
  75. pulumi_vault/identity/entity.py +0 -5
  76. pulumi_vault/identity/entity_alias.py +0 -5
  77. pulumi_vault/identity/entity_policies.py +0 -5
  78. pulumi_vault/identity/get_entity.py +5 -35
  79. pulumi_vault/identity/get_group.py +6 -42
  80. pulumi_vault/identity/get_oidc_client_creds.py +4 -16
  81. pulumi_vault/identity/get_oidc_openid_config.py +4 -26
  82. pulumi_vault/identity/get_oidc_public_keys.py +5 -16
  83. pulumi_vault/identity/group.py +0 -5
  84. pulumi_vault/identity/group_alias.py +0 -5
  85. pulumi_vault/identity/group_member_entity_ids.py +0 -5
  86. pulumi_vault/identity/group_member_group_ids.py +0 -5
  87. pulumi_vault/identity/group_policies.py +0 -5
  88. pulumi_vault/identity/mfa_duo.py +0 -5
  89. pulumi_vault/identity/mfa_login_enforcement.py +0 -5
  90. pulumi_vault/identity/mfa_okta.py +0 -5
  91. pulumi_vault/identity/mfa_pingid.py +0 -5
  92. pulumi_vault/identity/mfa_totp.py +0 -5
  93. pulumi_vault/identity/oidc.py +0 -5
  94. pulumi_vault/identity/oidc_assignment.py +0 -5
  95. pulumi_vault/identity/oidc_client.py +0 -5
  96. pulumi_vault/identity/oidc_key.py +0 -5
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
  98. pulumi_vault/identity/oidc_provider.py +0 -5
  99. pulumi_vault/identity/oidc_role.py +0 -5
  100. pulumi_vault/identity/oidc_scope.py +0 -5
  101. pulumi_vault/identity/outputs.py +3 -8
  102. pulumi_vault/jwt/_inputs.py +0 -55
  103. pulumi_vault/jwt/auth_backend.py +0 -5
  104. pulumi_vault/jwt/auth_backend_role.py +28 -33
  105. pulumi_vault/jwt/outputs.py +0 -5
  106. pulumi_vault/kmip/secret_backend.py +0 -5
  107. pulumi_vault/kmip/secret_role.py +0 -5
  108. pulumi_vault/kmip/secret_scope.py +0 -5
  109. pulumi_vault/kubernetes/auth_backend_config.py +0 -5
  110. pulumi_vault/kubernetes/auth_backend_role.py +0 -5
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +4 -26
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
  113. pulumi_vault/kubernetes/get_service_account_token.py +4 -28
  114. pulumi_vault/kubernetes/secret_backend.py +14 -19
  115. pulumi_vault/kubernetes/secret_backend_role.py +0 -5
  116. pulumi_vault/kv/_inputs.py +4 -36
  117. pulumi_vault/kv/get_secret.py +5 -20
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +5 -24
  119. pulumi_vault/kv/get_secret_v2.py +6 -27
  120. pulumi_vault/kv/get_secrets_list.py +4 -15
  121. pulumi_vault/kv/get_secrets_list_v2.py +4 -18
  122. pulumi_vault/kv/outputs.py +3 -8
  123. pulumi_vault/kv/secret.py +7 -12
  124. pulumi_vault/kv/secret_backend_v2.py +0 -5
  125. pulumi_vault/kv/secret_v2.py +28 -33
  126. pulumi_vault/ldap/auth_backend.py +0 -5
  127. pulumi_vault/ldap/auth_backend_group.py +0 -5
  128. pulumi_vault/ldap/auth_backend_user.py +0 -5
  129. pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
  130. pulumi_vault/ldap/get_static_credentials.py +4 -23
  131. pulumi_vault/ldap/secret_backend.py +14 -19
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
  133. pulumi_vault/ldap/secret_backend_library_set.py +0 -5
  134. pulumi_vault/ldap/secret_backend_static_role.py +0 -5
  135. pulumi_vault/managed/_inputs.py +0 -205
  136. pulumi_vault/managed/keys.py +0 -5
  137. pulumi_vault/managed/outputs.py +0 -5
  138. pulumi_vault/mfa_duo.py +0 -5
  139. pulumi_vault/mfa_okta.py +0 -5
  140. pulumi_vault/mfa_pingid.py +0 -5
  141. pulumi_vault/mfa_totp.py +0 -5
  142. pulumi_vault/mongodbatlas/secret_backend.py +0 -5
  143. pulumi_vault/mongodbatlas/secret_role.py +0 -5
  144. pulumi_vault/mount.py +16 -21
  145. pulumi_vault/namespace.py +14 -19
  146. pulumi_vault/nomad_secret_backend.py +0 -5
  147. pulumi_vault/nomad_secret_role.py +0 -5
  148. pulumi_vault/okta/_inputs.py +0 -39
  149. pulumi_vault/okta/auth_backend.py +0 -5
  150. pulumi_vault/okta/auth_backend_group.py +0 -5
  151. pulumi_vault/okta/auth_backend_user.py +0 -5
  152. pulumi_vault/okta/outputs.py +0 -5
  153. pulumi_vault/outputs.py +0 -5
  154. pulumi_vault/password_policy.py +0 -5
  155. pulumi_vault/pkisecret/_inputs.py +8 -49
  156. pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
  157. pulumi_vault/pkisecret/backend_config_est.py +14 -19
  158. pulumi_vault/pkisecret/get_backend_config_est.py +5 -23
  159. pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
  160. pulumi_vault/pkisecret/get_backend_issuers.py +5 -18
  161. pulumi_vault/pkisecret/get_backend_key.py +4 -19
  162. pulumi_vault/pkisecret/get_backend_keys.py +5 -18
  163. pulumi_vault/pkisecret/outputs.py +12 -17
  164. pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
  172. pulumi_vault/pkisecret/secret_backend_key.py +0 -5
  173. pulumi_vault/pkisecret/secret_backend_role.py +0 -5
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
  176. pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
  177. pulumi_vault/plugin.py +0 -5
  178. pulumi_vault/plugin_pinned_version.py +0 -5
  179. pulumi_vault/policy.py +0 -5
  180. pulumi_vault/provider.py +0 -5
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +0 -5
  183. pulumi_vault/quota_rate_limit.py +0 -5
  184. pulumi_vault/rabbitmq/_inputs.py +0 -61
  185. pulumi_vault/rabbitmq/outputs.py +0 -5
  186. pulumi_vault/rabbitmq/secret_backend.py +0 -5
  187. pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
  188. pulumi_vault/raft_autopilot.py +0 -5
  189. pulumi_vault/raft_snapshot_agent_config.py +0 -5
  190. pulumi_vault/rgp_policy.py +0 -5
  191. pulumi_vault/saml/auth_backend.py +0 -5
  192. pulumi_vault/saml/auth_backend_role.py +14 -19
  193. pulumi_vault/secrets/_inputs.py +0 -30
  194. pulumi_vault/secrets/outputs.py +0 -5
  195. pulumi_vault/secrets/sync_association.py +0 -5
  196. pulumi_vault/secrets/sync_aws_destination.py +14 -19
  197. pulumi_vault/secrets/sync_azure_destination.py +14 -19
  198. pulumi_vault/secrets/sync_config.py +0 -5
  199. pulumi_vault/secrets/sync_gcp_destination.py +14 -19
  200. pulumi_vault/secrets/sync_gh_destination.py +0 -5
  201. pulumi_vault/secrets/sync_github_apps.py +0 -5
  202. pulumi_vault/secrets/sync_vercel_destination.py +0 -5
  203. pulumi_vault/ssh/_inputs.py +0 -22
  204. pulumi_vault/ssh/outputs.py +0 -5
  205. pulumi_vault/ssh/secret_backend_ca.py +0 -5
  206. pulumi_vault/ssh/secret_backend_role.py +28 -33
  207. pulumi_vault/terraformcloud/secret_backend.py +0 -5
  208. pulumi_vault/terraformcloud/secret_creds.py +0 -5
  209. pulumi_vault/terraformcloud/secret_role.py +0 -5
  210. pulumi_vault/token.py +0 -5
  211. pulumi_vault/tokenauth/auth_backend_role.py +14 -5
  212. pulumi_vault/transform/alphabet.py +0 -5
  213. pulumi_vault/transform/get_decode.py +14 -38
  214. pulumi_vault/transform/get_encode.py +14 -38
  215. pulumi_vault/transform/role.py +0 -5
  216. pulumi_vault/transform/template.py +14 -19
  217. pulumi_vault/transform/transformation.py +0 -5
  218. pulumi_vault/transit/get_decrypt.py +4 -21
  219. pulumi_vault/transit/get_encrypt.py +4 -23
  220. pulumi_vault/transit/secret_backend_key.py +7 -12
  221. pulumi_vault/transit/secret_cache_config.py +0 -5
  222. {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/METADATA +2 -3
  223. pulumi_vault-6.4.0a1723454543.dist-info/RECORD +256 -0
  224. {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/WHEEL +1 -1
  225. pulumi_vault-6.3.2a1729803197.dist-info/RECORD +0 -256
  226. {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/top_level.txt +0 -0
pulumi_vault/_inputs.py CHANGED
@@ -4,104 +4,32 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
 
17
12
  __all__ = [
18
13
  'AuthBackendTuneArgs',
19
- 'AuthBackendTuneArgsDict',
20
14
  'ProviderAuthLoginArgs',
21
- 'ProviderAuthLoginArgsDict',
22
15
  'ProviderAuthLoginAwsArgs',
23
- 'ProviderAuthLoginAwsArgsDict',
24
16
  'ProviderAuthLoginAzureArgs',
25
- 'ProviderAuthLoginAzureArgsDict',
26
17
  'ProviderAuthLoginCertArgs',
27
- 'ProviderAuthLoginCertArgsDict',
28
18
  'ProviderAuthLoginGcpArgs',
29
- 'ProviderAuthLoginGcpArgsDict',
30
19
  'ProviderAuthLoginJwtArgs',
31
- 'ProviderAuthLoginJwtArgsDict',
32
20
  'ProviderAuthLoginKerberosArgs',
33
- 'ProviderAuthLoginKerberosArgsDict',
34
21
  'ProviderAuthLoginOciArgs',
35
- 'ProviderAuthLoginOciArgsDict',
36
22
  'ProviderAuthLoginOidcArgs',
37
- 'ProviderAuthLoginOidcArgsDict',
38
23
  'ProviderAuthLoginRadiusArgs',
39
- 'ProviderAuthLoginRadiusArgsDict',
40
24
  'ProviderAuthLoginTokenFileArgs',
41
- 'ProviderAuthLoginTokenFileArgsDict',
42
25
  'ProviderAuthLoginUserpassArgs',
43
- 'ProviderAuthLoginUserpassArgsDict',
44
26
  'ProviderClientAuthArgs',
45
- 'ProviderClientAuthArgsDict',
46
27
  'ProviderHeaderArgs',
47
- 'ProviderHeaderArgsDict',
48
28
  'GetPolicyDocumentRuleArgs',
49
- 'GetPolicyDocumentRuleArgsDict',
50
29
  'GetPolicyDocumentRuleAllowedParameterArgs',
51
- 'GetPolicyDocumentRuleAllowedParameterArgsDict',
52
30
  'GetPolicyDocumentRuleDeniedParameterArgs',
53
- 'GetPolicyDocumentRuleDeniedParameterArgsDict',
54
31
  ]
55
32
 
56
- MYPY = False
57
-
58
- if not MYPY:
59
- class AuthBackendTuneArgsDict(TypedDict):
60
- allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
61
- """
62
- List of headers to whitelist and allowing
63
- a plugin to include them in the response.
64
- """
65
- audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
66
- """
67
- Specifies the list of keys that will
68
- not be HMAC'd by audit devices in the request data object.
69
- """
70
- audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
71
- """
72
- Specifies the list of keys that will
73
- not be HMAC'd by audit devices in the response data object.
74
- """
75
- default_lease_ttl: NotRequired[pulumi.Input[str]]
76
- """
77
- Specifies the default time-to-live.
78
- If set, this overrides the global default.
79
- Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
80
- """
81
- listing_visibility: NotRequired[pulumi.Input[str]]
82
- """
83
- Specifies whether to show this mount in
84
- the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
85
- """
86
- max_lease_ttl: NotRequired[pulumi.Input[str]]
87
- """
88
- Specifies the maximum time-to-live.
89
- If set, this overrides the global default.
90
- Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
91
- """
92
- passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
93
- """
94
- List of headers to whitelist and
95
- pass from the request to the backend.
96
- """
97
- token_type: NotRequired[pulumi.Input[str]]
98
- """
99
- Specifies the type of tokens that should be returned by
100
- the mount. Valid values are "default-service", "default-batch", "service", "batch".
101
- """
102
- elif False:
103
- AuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any]
104
-
105
33
  @pulumi.input_type
106
34
  class AuthBackendTuneArgs:
107
35
  def __init__(__self__, *,
@@ -257,22 +185,6 @@ class AuthBackendTuneArgs:
257
185
  pulumi.set(self, "token_type", value)
258
186
 
259
187
 
260
- if not MYPY:
261
- class ProviderAuthLoginArgsDict(TypedDict):
262
- path: pulumi.Input[str]
263
- method: NotRequired[pulumi.Input[str]]
264
- namespace: NotRequired[pulumi.Input[str]]
265
- """
266
- The authentication engine's namespace. Conflicts with use_root_namespace
267
- """
268
- parameters: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
269
- use_root_namespace: NotRequired[pulumi.Input[bool]]
270
- """
271
- Authenticate to the root Vault namespace. Conflicts with namespace
272
- """
273
- elif False:
274
- ProviderAuthLoginArgsDict: TypeAlias = Mapping[str, Any]
275
-
276
188
  @pulumi.input_type
277
189
  class ProviderAuthLoginArgs:
278
190
  def __init__(__self__, *,
@@ -347,75 +259,6 @@ class ProviderAuthLoginArgs:
347
259
  pulumi.set(self, "use_root_namespace", value)
348
260
 
349
261
 
350
- if not MYPY:
351
- class ProviderAuthLoginAwsArgsDict(TypedDict):
352
- role: pulumi.Input[str]
353
- """
354
- The Vault role to use when logging into Vault.
355
- """
356
- aws_access_key_id: NotRequired[pulumi.Input[str]]
357
- """
358
- The AWS access key ID.
359
- """
360
- aws_iam_endpoint: NotRequired[pulumi.Input[str]]
361
- """
362
- The IAM endpoint URL.
363
- """
364
- aws_profile: NotRequired[pulumi.Input[str]]
365
- """
366
- The name of the AWS profile.
367
- """
368
- aws_region: NotRequired[pulumi.Input[str]]
369
- """
370
- The AWS region.
371
- """
372
- aws_role_arn: NotRequired[pulumi.Input[str]]
373
- """
374
- The ARN of the AWS Role to assume.Used during STS AssumeRole
375
- """
376
- aws_role_session_name: NotRequired[pulumi.Input[str]]
377
- """
378
- Specifies the name to attach to the AWS role session. Used during STS AssumeRole
379
- """
380
- aws_secret_access_key: NotRequired[pulumi.Input[str]]
381
- """
382
- The AWS secret access key.
383
- """
384
- aws_session_token: NotRequired[pulumi.Input[str]]
385
- """
386
- The AWS session token.
387
- """
388
- aws_shared_credentials_file: NotRequired[pulumi.Input[str]]
389
- """
390
- Path to the AWS shared credentials file.
391
- """
392
- aws_sts_endpoint: NotRequired[pulumi.Input[str]]
393
- """
394
- The STS endpoint URL.
395
- """
396
- aws_web_identity_token_file: NotRequired[pulumi.Input[str]]
397
- """
398
- Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token.
399
- """
400
- header_value: NotRequired[pulumi.Input[str]]
401
- """
402
- The Vault header value to include in the STS signing request.
403
- """
404
- mount: NotRequired[pulumi.Input[str]]
405
- """
406
- The path where the authentication engine is mounted.
407
- """
408
- namespace: NotRequired[pulumi.Input[str]]
409
- """
410
- The authentication engine's namespace. Conflicts with use_root_namespace
411
- """
412
- use_root_namespace: NotRequired[pulumi.Input[bool]]
413
- """
414
- Authenticate to the root Vault namespace. Conflicts with namespace
415
- """
416
- elif False:
417
- ProviderAuthLoginAwsArgsDict: TypeAlias = Mapping[str, Any]
418
-
419
262
  @pulumi.input_type
420
263
  class ProviderAuthLoginAwsArgs:
421
264
  def __init__(__self__, *,
@@ -678,59 +521,6 @@ class ProviderAuthLoginAwsArgs:
678
521
  pulumi.set(self, "use_root_namespace", value)
679
522
 
680
523
 
681
- if not MYPY:
682
- class ProviderAuthLoginAzureArgsDict(TypedDict):
683
- resource_group_name: pulumi.Input[str]
684
- """
685
- The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata.
686
- """
687
- role: pulumi.Input[str]
688
- """
689
- Name of the login role.
690
- """
691
- subscription_id: pulumi.Input[str]
692
- """
693
- The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata.
694
- """
695
- client_id: NotRequired[pulumi.Input[str]]
696
- """
697
- The identity's client ID.
698
- """
699
- jwt: NotRequired[pulumi.Input[str]]
700
- """
701
- A signed JSON Web Token. If not specified on will be created automatically
702
- """
703
- mount: NotRequired[pulumi.Input[str]]
704
- """
705
- The path where the authentication engine is mounted.
706
- """
707
- namespace: NotRequired[pulumi.Input[str]]
708
- """
709
- The authentication engine's namespace. Conflicts with use_root_namespace
710
- """
711
- scope: NotRequired[pulumi.Input[str]]
712
- """
713
- The scopes to include in the token request.
714
- """
715
- tenant_id: NotRequired[pulumi.Input[str]]
716
- """
717
- Provides the tenant ID to use in a multi-tenant authentication scenario.
718
- """
719
- use_root_namespace: NotRequired[pulumi.Input[bool]]
720
- """
721
- Authenticate to the root Vault namespace. Conflicts with namespace
722
- """
723
- vm_name: NotRequired[pulumi.Input[str]]
724
- """
725
- The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata.
726
- """
727
- vmss_name: NotRequired[pulumi.Input[str]]
728
- """
729
- The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata.
730
- """
731
- elif False:
732
- ProviderAuthLoginAzureArgsDict: TypeAlias = Mapping[str, Any]
733
-
734
524
  @pulumi.input_type
735
525
  class ProviderAuthLoginAzureArgs:
736
526
  def __init__(__self__, *,
@@ -927,35 +717,6 @@ class ProviderAuthLoginAzureArgs:
927
717
  pulumi.set(self, "vmss_name", value)
928
718
 
929
719
 
930
- if not MYPY:
931
- class ProviderAuthLoginCertArgsDict(TypedDict):
932
- cert_file: pulumi.Input[str]
933
- """
934
- Path to a file containing the client certificate.
935
- """
936
- key_file: pulumi.Input[str]
937
- """
938
- Path to a file containing the private key that the certificate was issued for.
939
- """
940
- mount: NotRequired[pulumi.Input[str]]
941
- """
942
- The path where the authentication engine is mounted.
943
- """
944
- name: NotRequired[pulumi.Input[str]]
945
- """
946
- Name of the certificate's role
947
- """
948
- namespace: NotRequired[pulumi.Input[str]]
949
- """
950
- The authentication engine's namespace. Conflicts with use_root_namespace
951
- """
952
- use_root_namespace: NotRequired[pulumi.Input[bool]]
953
- """
954
- Authenticate to the root Vault namespace. Conflicts with namespace
955
- """
956
- elif False:
957
- ProviderAuthLoginCertArgsDict: TypeAlias = Mapping[str, Any]
958
-
959
720
  @pulumi.input_type
960
721
  class ProviderAuthLoginCertArgs:
961
722
  def __init__(__self__, *,
@@ -1057,39 +818,6 @@ class ProviderAuthLoginCertArgs:
1057
818
  pulumi.set(self, "use_root_namespace", value)
1058
819
 
1059
820
 
1060
- if not MYPY:
1061
- class ProviderAuthLoginGcpArgsDict(TypedDict):
1062
- role: pulumi.Input[str]
1063
- """
1064
- Name of the login role.
1065
- """
1066
- credentials: NotRequired[pulumi.Input[str]]
1067
- """
1068
- Path to the Google Cloud credentials file.
1069
- """
1070
- jwt: NotRequired[pulumi.Input[str]]
1071
- """
1072
- A signed JSON Web Token.
1073
- """
1074
- mount: NotRequired[pulumi.Input[str]]
1075
- """
1076
- The path where the authentication engine is mounted.
1077
- """
1078
- namespace: NotRequired[pulumi.Input[str]]
1079
- """
1080
- The authentication engine's namespace. Conflicts with use_root_namespace
1081
- """
1082
- service_account: NotRequired[pulumi.Input[str]]
1083
- """
1084
- IAM service account.
1085
- """
1086
- use_root_namespace: NotRequired[pulumi.Input[bool]]
1087
- """
1088
- Authenticate to the root Vault namespace. Conflicts with namespace
1089
- """
1090
- elif False:
1091
- ProviderAuthLoginGcpArgsDict: TypeAlias = Mapping[str, Any]
1092
-
1093
821
  @pulumi.input_type
1094
822
  class ProviderAuthLoginGcpArgs:
1095
823
  def __init__(__self__, *,
@@ -1208,31 +936,6 @@ class ProviderAuthLoginGcpArgs:
1208
936
  pulumi.set(self, "use_root_namespace", value)
1209
937
 
1210
938
 
1211
- if not MYPY:
1212
- class ProviderAuthLoginJwtArgsDict(TypedDict):
1213
- jwt: pulumi.Input[str]
1214
- """
1215
- A signed JSON Web Token.
1216
- """
1217
- role: pulumi.Input[str]
1218
- """
1219
- Name of the login role.
1220
- """
1221
- mount: NotRequired[pulumi.Input[str]]
1222
- """
1223
- The path where the authentication engine is mounted.
1224
- """
1225
- namespace: NotRequired[pulumi.Input[str]]
1226
- """
1227
- The authentication engine's namespace. Conflicts with use_root_namespace
1228
- """
1229
- use_root_namespace: NotRequired[pulumi.Input[bool]]
1230
- """
1231
- Authenticate to the root Vault namespace. Conflicts with namespace
1232
- """
1233
- elif False:
1234
- ProviderAuthLoginJwtArgsDict: TypeAlias = Mapping[str, Any]
1235
-
1236
939
  @pulumi.input_type
1237
940
  class ProviderAuthLoginJwtArgs:
1238
941
  def __init__(__self__, *,
@@ -1318,55 +1021,6 @@ class ProviderAuthLoginJwtArgs:
1318
1021
  pulumi.set(self, "use_root_namespace", value)
1319
1022
 
1320
1023
 
1321
- if not MYPY:
1322
- class ProviderAuthLoginKerberosArgsDict(TypedDict):
1323
- disable_fast_negotiation: NotRequired[pulumi.Input[bool]]
1324
- """
1325
- Disable the Kerberos FAST negotiation.
1326
- """
1327
- keytab_path: NotRequired[pulumi.Input[str]]
1328
- """
1329
- The Kerberos keytab file containing the entry of the login entity.
1330
- """
1331
- krb5conf_path: NotRequired[pulumi.Input[str]]
1332
- """
1333
- A valid Kerberos configuration file e.g. /etc/krb5.conf.
1334
- """
1335
- mount: NotRequired[pulumi.Input[str]]
1336
- """
1337
- The path where the authentication engine is mounted.
1338
- """
1339
- namespace: NotRequired[pulumi.Input[str]]
1340
- """
1341
- The authentication engine's namespace. Conflicts with use_root_namespace
1342
- """
1343
- realm: NotRequired[pulumi.Input[str]]
1344
- """
1345
- The Kerberos server's authoritative authentication domain
1346
- """
1347
- remove_instance_name: NotRequired[pulumi.Input[bool]]
1348
- """
1349
- Strip the host from the username found in the keytab.
1350
- """
1351
- service: NotRequired[pulumi.Input[str]]
1352
- """
1353
- The service principle name.
1354
- """
1355
- token: NotRequired[pulumi.Input[str]]
1356
- """
1357
- Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token
1358
- """
1359
- use_root_namespace: NotRequired[pulumi.Input[bool]]
1360
- """
1361
- Authenticate to the root Vault namespace. Conflicts with namespace
1362
- """
1363
- username: NotRequired[pulumi.Input[str]]
1364
- """
1365
- The username to login into Kerberos with.
1366
- """
1367
- elif False:
1368
- ProviderAuthLoginKerberosArgsDict: TypeAlias = Mapping[str, Any]
1369
-
1370
1024
  @pulumi.input_type
1371
1025
  class ProviderAuthLoginKerberosArgs:
1372
1026
  def __init__(__self__, *,
@@ -1550,31 +1204,6 @@ class ProviderAuthLoginKerberosArgs:
1550
1204
  pulumi.set(self, "username", value)
1551
1205
 
1552
1206
 
1553
- if not MYPY:
1554
- class ProviderAuthLoginOciArgsDict(TypedDict):
1555
- auth_type: pulumi.Input[str]
1556
- """
1557
- Authentication type to use when getting OCI credentials.
1558
- """
1559
- role: pulumi.Input[str]
1560
- """
1561
- Name of the login role.
1562
- """
1563
- mount: NotRequired[pulumi.Input[str]]
1564
- """
1565
- The path where the authentication engine is mounted.
1566
- """
1567
- namespace: NotRequired[pulumi.Input[str]]
1568
- """
1569
- The authentication engine's namespace. Conflicts with use_root_namespace
1570
- """
1571
- use_root_namespace: NotRequired[pulumi.Input[bool]]
1572
- """
1573
- Authenticate to the root Vault namespace. Conflicts with namespace
1574
- """
1575
- elif False:
1576
- ProviderAuthLoginOciArgsDict: TypeAlias = Mapping[str, Any]
1577
-
1578
1207
  @pulumi.input_type
1579
1208
  class ProviderAuthLoginOciArgs:
1580
1209
  def __init__(__self__, *,
@@ -1660,35 +1289,6 @@ class ProviderAuthLoginOciArgs:
1660
1289
  pulumi.set(self, "use_root_namespace", value)
1661
1290
 
1662
1291
 
1663
- if not MYPY:
1664
- class ProviderAuthLoginOidcArgsDict(TypedDict):
1665
- role: pulumi.Input[str]
1666
- """
1667
- Name of the login role.
1668
- """
1669
- callback_address: NotRequired[pulumi.Input[str]]
1670
- """
1671
- The callback address. Must be a valid URI without the path.
1672
- """
1673
- callback_listener_address: NotRequired[pulumi.Input[str]]
1674
- """
1675
- The callback listener's address. Must be a valid URI without the path.
1676
- """
1677
- mount: NotRequired[pulumi.Input[str]]
1678
- """
1679
- The path where the authentication engine is mounted.
1680
- """
1681
- namespace: NotRequired[pulumi.Input[str]]
1682
- """
1683
- The authentication engine's namespace. Conflicts with use_root_namespace
1684
- """
1685
- use_root_namespace: NotRequired[pulumi.Input[bool]]
1686
- """
1687
- Authenticate to the root Vault namespace. Conflicts with namespace
1688
- """
1689
- elif False:
1690
- ProviderAuthLoginOidcArgsDict: TypeAlias = Mapping[str, Any]
1691
-
1692
1292
  @pulumi.input_type
1693
1293
  class ProviderAuthLoginOidcArgs:
1694
1294
  def __init__(__self__, *,
@@ -1791,31 +1391,6 @@ class ProviderAuthLoginOidcArgs:
1791
1391
  pulumi.set(self, "use_root_namespace", value)
1792
1392
 
1793
1393
 
1794
- if not MYPY:
1795
- class ProviderAuthLoginRadiusArgsDict(TypedDict):
1796
- password: pulumi.Input[str]
1797
- """
1798
- The Radius password for username.
1799
- """
1800
- username: pulumi.Input[str]
1801
- """
1802
- The Radius username.
1803
- """
1804
- mount: NotRequired[pulumi.Input[str]]
1805
- """
1806
- The path where the authentication engine is mounted.
1807
- """
1808
- namespace: NotRequired[pulumi.Input[str]]
1809
- """
1810
- The authentication engine's namespace. Conflicts with use_root_namespace
1811
- """
1812
- use_root_namespace: NotRequired[pulumi.Input[bool]]
1813
- """
1814
- Authenticate to the root Vault namespace. Conflicts with namespace
1815
- """
1816
- elif False:
1817
- ProviderAuthLoginRadiusArgsDict: TypeAlias = Mapping[str, Any]
1818
-
1819
1394
  @pulumi.input_type
1820
1395
  class ProviderAuthLoginRadiusArgs:
1821
1396
  def __init__(__self__, *,
@@ -1901,23 +1476,6 @@ class ProviderAuthLoginRadiusArgs:
1901
1476
  pulumi.set(self, "use_root_namespace", value)
1902
1477
 
1903
1478
 
1904
- if not MYPY:
1905
- class ProviderAuthLoginTokenFileArgsDict(TypedDict):
1906
- filename: pulumi.Input[str]
1907
- """
1908
- The name of a file containing a single line that is a valid Vault token
1909
- """
1910
- namespace: NotRequired[pulumi.Input[str]]
1911
- """
1912
- The authentication engine's namespace. Conflicts with use_root_namespace
1913
- """
1914
- use_root_namespace: NotRequired[pulumi.Input[bool]]
1915
- """
1916
- Authenticate to the root Vault namespace. Conflicts with namespace
1917
- """
1918
- elif False:
1919
- ProviderAuthLoginTokenFileArgsDict: TypeAlias = Mapping[str, Any]
1920
-
1921
1479
  @pulumi.input_type
1922
1480
  class ProviderAuthLoginTokenFileArgs:
1923
1481
  def __init__(__self__, *,
@@ -1972,35 +1530,6 @@ class ProviderAuthLoginTokenFileArgs:
1972
1530
  pulumi.set(self, "use_root_namespace", value)
1973
1531
 
1974
1532
 
1975
- if not MYPY:
1976
- class ProviderAuthLoginUserpassArgsDict(TypedDict):
1977
- username: pulumi.Input[str]
1978
- """
1979
- Login with username
1980
- """
1981
- mount: NotRequired[pulumi.Input[str]]
1982
- """
1983
- The path where the authentication engine is mounted.
1984
- """
1985
- namespace: NotRequired[pulumi.Input[str]]
1986
- """
1987
- The authentication engine's namespace. Conflicts with use_root_namespace
1988
- """
1989
- password: NotRequired[pulumi.Input[str]]
1990
- """
1991
- Login with password
1992
- """
1993
- password_file: NotRequired[pulumi.Input[str]]
1994
- """
1995
- Login with password from a file
1996
- """
1997
- use_root_namespace: NotRequired[pulumi.Input[bool]]
1998
- """
1999
- Authenticate to the root Vault namespace. Conflicts with namespace
2000
- """
2001
- elif False:
2002
- ProviderAuthLoginUserpassArgsDict: TypeAlias = Mapping[str, Any]
2003
-
2004
1533
  @pulumi.input_type
2005
1534
  class ProviderAuthLoginUserpassArgs:
2006
1535
  def __init__(__self__, *,
@@ -2103,19 +1632,6 @@ class ProviderAuthLoginUserpassArgs:
2103
1632
  pulumi.set(self, "use_root_namespace", value)
2104
1633
 
2105
1634
 
2106
- if not MYPY:
2107
- class ProviderClientAuthArgsDict(TypedDict):
2108
- cert_file: pulumi.Input[str]
2109
- """
2110
- Path to a file containing the client certificate.
2111
- """
2112
- key_file: pulumi.Input[str]
2113
- """
2114
- Path to a file containing the private key that the certificate was issued for.
2115
- """
2116
- elif False:
2117
- ProviderClientAuthArgsDict: TypeAlias = Mapping[str, Any]
2118
-
2119
1635
  @pulumi.input_type
2120
1636
  class ProviderClientAuthArgs:
2121
1637
  def __init__(__self__, *,
@@ -2153,19 +1669,6 @@ class ProviderClientAuthArgs:
2153
1669
  pulumi.set(self, "key_file", value)
2154
1670
 
2155
1671
 
2156
- if not MYPY:
2157
- class ProviderHeaderArgsDict(TypedDict):
2158
- name: pulumi.Input[str]
2159
- """
2160
- The header name
2161
- """
2162
- value: pulumi.Input[str]
2163
- """
2164
- The header value
2165
- """
2166
- elif False:
2167
- ProviderHeaderArgsDict: TypeAlias = Mapping[str, Any]
2168
-
2169
1672
  @pulumi.input_type
2170
1673
  class ProviderHeaderArgs:
2171
1674
  def __init__(__self__, *,
@@ -2203,43 +1706,6 @@ class ProviderHeaderArgs:
2203
1706
  pulumi.set(self, "value", value)
2204
1707
 
2205
1708
 
2206
- if not MYPY:
2207
- class GetPolicyDocumentRuleArgsDict(TypedDict):
2208
- capabilities: Sequence[str]
2209
- """
2210
- A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
2211
- """
2212
- path: str
2213
- """
2214
- A path in Vault that this rule applies to.
2215
- """
2216
- allowed_parameters: NotRequired[Sequence['GetPolicyDocumentRuleAllowedParameterArgsDict']]
2217
- """
2218
- Whitelists a list of keys and values that are permitted on the given path. See Parameters below.
2219
- """
2220
- denied_parameters: NotRequired[Sequence['GetPolicyDocumentRuleDeniedParameterArgsDict']]
2221
- """
2222
- Blacklists a list of parameter and values. Any values specified here take precedence over `allowed_parameter`. See Parameters below.
2223
- """
2224
- description: NotRequired[str]
2225
- """
2226
- Description of the rule. Will be added as a comment to rendered rule.
2227
- """
2228
- max_wrapping_ttl: NotRequired[str]
2229
- """
2230
- The maximum allowed TTL that clients can specify for a wrapped response.
2231
- """
2232
- min_wrapping_ttl: NotRequired[str]
2233
- """
2234
- The minimum allowed TTL that clients can specify for a wrapped response.
2235
- """
2236
- required_parameters: NotRequired[Sequence[str]]
2237
- """
2238
- A list of parameters that must be specified.
2239
- """
2240
- elif False:
2241
- GetPolicyDocumentRuleArgsDict: TypeAlias = Mapping[str, Any]
2242
-
2243
1709
  @pulumi.input_type
2244
1710
  class GetPolicyDocumentRuleArgs:
2245
1711
  def __init__(__self__, *,
@@ -2373,19 +1839,6 @@ class GetPolicyDocumentRuleArgs:
2373
1839
  pulumi.set(self, "required_parameters", value)
2374
1840
 
2375
1841
 
2376
- if not MYPY:
2377
- class GetPolicyDocumentRuleAllowedParameterArgsDict(TypedDict):
2378
- key: str
2379
- """
2380
- name of permitted or denied parameter.
2381
- """
2382
- values: Sequence[str]
2383
- """
2384
- list of values what are permitted or denied by policy rule.
2385
- """
2386
- elif False:
2387
- GetPolicyDocumentRuleAllowedParameterArgsDict: TypeAlias = Mapping[str, Any]
2388
-
2389
1842
  @pulumi.input_type
2390
1843
  class GetPolicyDocumentRuleAllowedParameterArgs:
2391
1844
  def __init__(__self__, *,
@@ -2423,19 +1876,6 @@ class GetPolicyDocumentRuleAllowedParameterArgs:
2423
1876
  pulumi.set(self, "values", value)
2424
1877
 
2425
1878
 
2426
- if not MYPY:
2427
- class GetPolicyDocumentRuleDeniedParameterArgsDict(TypedDict):
2428
- key: str
2429
- """
2430
- name of permitted or denied parameter.
2431
- """
2432
- values: Sequence[str]
2433
- """
2434
- list of values what are permitted or denied by policy rule.
2435
- """
2436
- elif False:
2437
- GetPolicyDocumentRuleDeniedParameterArgsDict: TypeAlias = Mapping[str, Any]
2438
-
2439
1879
  @pulumi.input_type
2440
1880
  class GetPolicyDocumentRuleDeniedParameterArgs:
2441
1881
  def __init__(__self__, *,