pulumi-vault 6.3.2a1729803197__py3-none-any.whl → 6.4.0a1723454543__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +0 -560
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +4 -19
  4. pulumi_vault/ad/secret_backend.py +0 -5
  5. pulumi_vault/ad/secret_library.py +0 -5
  6. pulumi_vault/ad/secret_role.py +0 -5
  7. pulumi_vault/alicloud/auth_backend_role.py +0 -5
  8. pulumi_vault/approle/auth_backend_login.py +0 -5
  9. pulumi_vault/approle/auth_backend_role.py +0 -5
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -5
  11. pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
  12. pulumi_vault/audit.py +0 -5
  13. pulumi_vault/audit_request_header.py +0 -5
  14. pulumi_vault/auth_backend.py +0 -5
  15. pulumi_vault/aws/auth_backend_cert.py +0 -5
  16. pulumi_vault/aws/auth_backend_client.py +0 -5
  17. pulumi_vault/aws/auth_backend_config_identity.py +0 -5
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
  19. pulumi_vault/aws/auth_backend_login.py +7 -12
  20. pulumi_vault/aws/auth_backend_role.py +0 -5
  21. pulumi_vault/aws/auth_backend_role_tag.py +0 -5
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
  23. pulumi_vault/aws/auth_backend_sts_role.py +0 -5
  24. pulumi_vault/aws/get_access_credentials.py +4 -31
  25. pulumi_vault/aws/get_static_access_credentials.py +4 -18
  26. pulumi_vault/aws/secret_backend.py +0 -5
  27. pulumi_vault/aws/secret_backend_role.py +0 -5
  28. pulumi_vault/aws/secret_backend_static_role.py +0 -5
  29. pulumi_vault/azure/_inputs.py +0 -24
  30. pulumi_vault/azure/auth_backend_config.py +0 -5
  31. pulumi_vault/azure/auth_backend_role.py +0 -5
  32. pulumi_vault/azure/backend.py +0 -5
  33. pulumi_vault/azure/backend_role.py +0 -5
  34. pulumi_vault/azure/get_access_credentials.py +4 -36
  35. pulumi_vault/azure/outputs.py +0 -5
  36. pulumi_vault/cert_auth_backend_role.py +0 -5
  37. pulumi_vault/config/__init__.pyi +0 -5
  38. pulumi_vault/config/_inputs.py +0 -21
  39. pulumi_vault/config/outputs.py +0 -5
  40. pulumi_vault/config/ui_custom_message.py +14 -19
  41. pulumi_vault/config/vars.py +0 -5
  42. pulumi_vault/consul/secret_backend.py +0 -5
  43. pulumi_vault/consul/secret_backend_role.py +0 -5
  44. pulumi_vault/database/_inputs.py +105 -2056
  45. pulumi_vault/database/outputs.py +54 -59
  46. pulumi_vault/database/secret_backend_connection.py +14 -19
  47. pulumi_vault/database/secret_backend_role.py +14 -19
  48. pulumi_vault/database/secret_backend_static_role.py +0 -5
  49. pulumi_vault/database/secrets_mount.py +14 -19
  50. pulumi_vault/egp_policy.py +0 -5
  51. pulumi_vault/gcp/_inputs.py +0 -111
  52. pulumi_vault/gcp/auth_backend.py +0 -5
  53. pulumi_vault/gcp/auth_backend_role.py +0 -5
  54. pulumi_vault/gcp/get_auth_backend_role.py +4 -42
  55. pulumi_vault/gcp/outputs.py +0 -5
  56. pulumi_vault/gcp/secret_backend.py +0 -5
  57. pulumi_vault/gcp/secret_impersonated_account.py +0 -5
  58. pulumi_vault/gcp/secret_roleset.py +0 -5
  59. pulumi_vault/gcp/secret_static_account.py +0 -5
  60. pulumi_vault/generic/endpoint.py +0 -5
  61. pulumi_vault/generic/get_secret.py +5 -25
  62. pulumi_vault/generic/secret.py +7 -12
  63. pulumi_vault/get_auth_backend.py +4 -21
  64. pulumi_vault/get_auth_backends.py +4 -16
  65. pulumi_vault/get_namespace.py +5 -18
  66. pulumi_vault/get_namespaces.py +4 -13
  67. pulumi_vault/get_nomad_access_token.py +8 -28
  68. pulumi_vault/get_policy_document.py +4 -15
  69. pulumi_vault/get_raft_autopilot_state.py +7 -26
  70. pulumi_vault/github/_inputs.py +0 -55
  71. pulumi_vault/github/auth_backend.py +0 -5
  72. pulumi_vault/github/outputs.py +0 -5
  73. pulumi_vault/github/team.py +0 -5
  74. pulumi_vault/github/user.py +0 -5
  75. pulumi_vault/identity/entity.py +0 -5
  76. pulumi_vault/identity/entity_alias.py +0 -5
  77. pulumi_vault/identity/entity_policies.py +0 -5
  78. pulumi_vault/identity/get_entity.py +5 -35
  79. pulumi_vault/identity/get_group.py +6 -42
  80. pulumi_vault/identity/get_oidc_client_creds.py +4 -16
  81. pulumi_vault/identity/get_oidc_openid_config.py +4 -26
  82. pulumi_vault/identity/get_oidc_public_keys.py +5 -16
  83. pulumi_vault/identity/group.py +0 -5
  84. pulumi_vault/identity/group_alias.py +0 -5
  85. pulumi_vault/identity/group_member_entity_ids.py +0 -5
  86. pulumi_vault/identity/group_member_group_ids.py +0 -5
  87. pulumi_vault/identity/group_policies.py +0 -5
  88. pulumi_vault/identity/mfa_duo.py +0 -5
  89. pulumi_vault/identity/mfa_login_enforcement.py +0 -5
  90. pulumi_vault/identity/mfa_okta.py +0 -5
  91. pulumi_vault/identity/mfa_pingid.py +0 -5
  92. pulumi_vault/identity/mfa_totp.py +0 -5
  93. pulumi_vault/identity/oidc.py +0 -5
  94. pulumi_vault/identity/oidc_assignment.py +0 -5
  95. pulumi_vault/identity/oidc_client.py +0 -5
  96. pulumi_vault/identity/oidc_key.py +0 -5
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
  98. pulumi_vault/identity/oidc_provider.py +0 -5
  99. pulumi_vault/identity/oidc_role.py +0 -5
  100. pulumi_vault/identity/oidc_scope.py +0 -5
  101. pulumi_vault/identity/outputs.py +3 -8
  102. pulumi_vault/jwt/_inputs.py +0 -55
  103. pulumi_vault/jwt/auth_backend.py +0 -5
  104. pulumi_vault/jwt/auth_backend_role.py +28 -33
  105. pulumi_vault/jwt/outputs.py +0 -5
  106. pulumi_vault/kmip/secret_backend.py +0 -5
  107. pulumi_vault/kmip/secret_role.py +0 -5
  108. pulumi_vault/kmip/secret_scope.py +0 -5
  109. pulumi_vault/kubernetes/auth_backend_config.py +0 -5
  110. pulumi_vault/kubernetes/auth_backend_role.py +0 -5
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +4 -26
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
  113. pulumi_vault/kubernetes/get_service_account_token.py +4 -28
  114. pulumi_vault/kubernetes/secret_backend.py +14 -19
  115. pulumi_vault/kubernetes/secret_backend_role.py +0 -5
  116. pulumi_vault/kv/_inputs.py +4 -36
  117. pulumi_vault/kv/get_secret.py +5 -20
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +5 -24
  119. pulumi_vault/kv/get_secret_v2.py +6 -27
  120. pulumi_vault/kv/get_secrets_list.py +4 -15
  121. pulumi_vault/kv/get_secrets_list_v2.py +4 -18
  122. pulumi_vault/kv/outputs.py +3 -8
  123. pulumi_vault/kv/secret.py +7 -12
  124. pulumi_vault/kv/secret_backend_v2.py +0 -5
  125. pulumi_vault/kv/secret_v2.py +28 -33
  126. pulumi_vault/ldap/auth_backend.py +0 -5
  127. pulumi_vault/ldap/auth_backend_group.py +0 -5
  128. pulumi_vault/ldap/auth_backend_user.py +0 -5
  129. pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
  130. pulumi_vault/ldap/get_static_credentials.py +4 -23
  131. pulumi_vault/ldap/secret_backend.py +14 -19
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
  133. pulumi_vault/ldap/secret_backend_library_set.py +0 -5
  134. pulumi_vault/ldap/secret_backend_static_role.py +0 -5
  135. pulumi_vault/managed/_inputs.py +0 -205
  136. pulumi_vault/managed/keys.py +0 -5
  137. pulumi_vault/managed/outputs.py +0 -5
  138. pulumi_vault/mfa_duo.py +0 -5
  139. pulumi_vault/mfa_okta.py +0 -5
  140. pulumi_vault/mfa_pingid.py +0 -5
  141. pulumi_vault/mfa_totp.py +0 -5
  142. pulumi_vault/mongodbatlas/secret_backend.py +0 -5
  143. pulumi_vault/mongodbatlas/secret_role.py +0 -5
  144. pulumi_vault/mount.py +16 -21
  145. pulumi_vault/namespace.py +14 -19
  146. pulumi_vault/nomad_secret_backend.py +0 -5
  147. pulumi_vault/nomad_secret_role.py +0 -5
  148. pulumi_vault/okta/_inputs.py +0 -39
  149. pulumi_vault/okta/auth_backend.py +0 -5
  150. pulumi_vault/okta/auth_backend_group.py +0 -5
  151. pulumi_vault/okta/auth_backend_user.py +0 -5
  152. pulumi_vault/okta/outputs.py +0 -5
  153. pulumi_vault/outputs.py +0 -5
  154. pulumi_vault/password_policy.py +0 -5
  155. pulumi_vault/pkisecret/_inputs.py +8 -49
  156. pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
  157. pulumi_vault/pkisecret/backend_config_est.py +14 -19
  158. pulumi_vault/pkisecret/get_backend_config_est.py +5 -23
  159. pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
  160. pulumi_vault/pkisecret/get_backend_issuers.py +5 -18
  161. pulumi_vault/pkisecret/get_backend_key.py +4 -19
  162. pulumi_vault/pkisecret/get_backend_keys.py +5 -18
  163. pulumi_vault/pkisecret/outputs.py +12 -17
  164. pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
  172. pulumi_vault/pkisecret/secret_backend_key.py +0 -5
  173. pulumi_vault/pkisecret/secret_backend_role.py +0 -5
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
  176. pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
  177. pulumi_vault/plugin.py +0 -5
  178. pulumi_vault/plugin_pinned_version.py +0 -5
  179. pulumi_vault/policy.py +0 -5
  180. pulumi_vault/provider.py +0 -5
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +0 -5
  183. pulumi_vault/quota_rate_limit.py +0 -5
  184. pulumi_vault/rabbitmq/_inputs.py +0 -61
  185. pulumi_vault/rabbitmq/outputs.py +0 -5
  186. pulumi_vault/rabbitmq/secret_backend.py +0 -5
  187. pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
  188. pulumi_vault/raft_autopilot.py +0 -5
  189. pulumi_vault/raft_snapshot_agent_config.py +0 -5
  190. pulumi_vault/rgp_policy.py +0 -5
  191. pulumi_vault/saml/auth_backend.py +0 -5
  192. pulumi_vault/saml/auth_backend_role.py +14 -19
  193. pulumi_vault/secrets/_inputs.py +0 -30
  194. pulumi_vault/secrets/outputs.py +0 -5
  195. pulumi_vault/secrets/sync_association.py +0 -5
  196. pulumi_vault/secrets/sync_aws_destination.py +14 -19
  197. pulumi_vault/secrets/sync_azure_destination.py +14 -19
  198. pulumi_vault/secrets/sync_config.py +0 -5
  199. pulumi_vault/secrets/sync_gcp_destination.py +14 -19
  200. pulumi_vault/secrets/sync_gh_destination.py +0 -5
  201. pulumi_vault/secrets/sync_github_apps.py +0 -5
  202. pulumi_vault/secrets/sync_vercel_destination.py +0 -5
  203. pulumi_vault/ssh/_inputs.py +0 -22
  204. pulumi_vault/ssh/outputs.py +0 -5
  205. pulumi_vault/ssh/secret_backend_ca.py +0 -5
  206. pulumi_vault/ssh/secret_backend_role.py +28 -33
  207. pulumi_vault/terraformcloud/secret_backend.py +0 -5
  208. pulumi_vault/terraformcloud/secret_creds.py +0 -5
  209. pulumi_vault/terraformcloud/secret_role.py +0 -5
  210. pulumi_vault/token.py +0 -5
  211. pulumi_vault/tokenauth/auth_backend_role.py +14 -5
  212. pulumi_vault/transform/alphabet.py +0 -5
  213. pulumi_vault/transform/get_decode.py +14 -38
  214. pulumi_vault/transform/get_encode.py +14 -38
  215. pulumi_vault/transform/role.py +0 -5
  216. pulumi_vault/transform/template.py +14 -19
  217. pulumi_vault/transform/transformation.py +0 -5
  218. pulumi_vault/transit/get_decrypt.py +4 -21
  219. pulumi_vault/transit/get_encrypt.py +4 -23
  220. pulumi_vault/transit/secret_backend_key.py +7 -12
  221. pulumi_vault/transit/secret_cache_config.py +0 -5
  222. {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/METADATA +2 -3
  223. pulumi_vault-6.4.0a1723454543.dist-info/RECORD +256 -0
  224. {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/WHEEL +1 -1
  225. pulumi_vault-6.3.2a1729803197.dist-info/RECORD +0 -256
  226. {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/top_level.txt +0 -0
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
  from . import outputs
17
12
  from ._inputs import *
@@ -29,7 +24,7 @@ class SecretV2Args:
29
24
  disable_read: Optional[pulumi.Input[bool]] = None,
30
25
  name: Optional[pulumi.Input[str]] = None,
31
26
  namespace: Optional[pulumi.Input[str]] = None,
32
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None):
27
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None):
33
28
  """
34
29
  The set of arguments for constructing a SecretV2 resource.
35
30
  :param pulumi.Input[str] data_json: JSON-encoded string that will be
@@ -54,7 +49,7 @@ class SecretV2Args:
54
49
  The value should not contain leading or trailing forward slashes.
55
50
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
56
51
  *Available only for Vault Enterprise*.
57
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: An object that holds option settings.
52
+ :param pulumi.Input[Mapping[str, Any]] options: An object that holds option settings.
58
53
  """
59
54
  pulumi.set(__self__, "data_json", data_json)
60
55
  pulumi.set(__self__, "mount", mount)
@@ -185,14 +180,14 @@ class SecretV2Args:
185
180
 
186
181
  @property
187
182
  @pulumi.getter
188
- def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
183
+ def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
189
184
  """
190
185
  An object that holds option settings.
191
186
  """
192
187
  return pulumi.get(self, "options")
193
188
 
194
189
  @options.setter
195
- def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
190
+ def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
196
191
  pulumi.set(self, "options", value)
197
192
 
198
193
 
@@ -201,15 +196,15 @@ class _SecretV2State:
201
196
  def __init__(__self__, *,
202
197
  cas: Optional[pulumi.Input[int]] = None,
203
198
  custom_metadata: Optional[pulumi.Input['SecretV2CustomMetadataArgs']] = None,
204
- data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
199
+ data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
205
200
  data_json: Optional[pulumi.Input[str]] = None,
206
201
  delete_all_versions: Optional[pulumi.Input[bool]] = None,
207
202
  disable_read: Optional[pulumi.Input[bool]] = None,
208
- metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
203
+ metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
209
204
  mount: Optional[pulumi.Input[str]] = None,
210
205
  name: Optional[pulumi.Input[str]] = None,
211
206
  namespace: Optional[pulumi.Input[str]] = None,
212
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
207
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
213
208
  path: Optional[pulumi.Input[str]] = None):
214
209
  """
215
210
  Input properties used for looking up and filtering SecretV2 resources.
@@ -220,7 +215,7 @@ class _SecretV2State:
220
215
  :param pulumi.Input['SecretV2CustomMetadataArgs'] custom_metadata: A nested block that allows configuring metadata for the
221
216
  KV secret. Refer to the
222
217
  Configuration Options for more info.
223
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
218
+ :param pulumi.Input[Mapping[str, Any]] data: A mapping whose keys are the top-level data keys returned from
224
219
  Vault and whose values are the corresponding values. This map can only
225
220
  represent string data, so any non-string values returned from Vault are
226
221
  serialized as JSON.
@@ -230,7 +225,7 @@ class _SecretV2State:
230
225
  versions for the specified key.
231
226
  :param pulumi.Input[bool] disable_read: If set to true, disables reading secret from Vault;
232
227
  note: drift won't be detected.
233
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: Metadata associated with this secret read from Vault.
228
+ :param pulumi.Input[Mapping[str, Any]] metadata: Metadata associated with this secret read from Vault.
234
229
  :param pulumi.Input[str] mount: Path where KV-V2 engine is mounted.
235
230
  :param pulumi.Input[str] name: Full name of the secret. For a nested secret
236
231
  the name is the nested path excluding the mount and data
@@ -240,7 +235,7 @@ class _SecretV2State:
240
235
  The value should not contain leading or trailing forward slashes.
241
236
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
242
237
  *Available only for Vault Enterprise*.
243
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: An object that holds option settings.
238
+ :param pulumi.Input[Mapping[str, Any]] options: An object that holds option settings.
244
239
  :param pulumi.Input[str] path: Full path where the KV-V2 secret will be written.
245
240
  """
246
241
  if cas is not None:
@@ -299,7 +294,7 @@ class _SecretV2State:
299
294
 
300
295
  @property
301
296
  @pulumi.getter
302
- def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
297
+ def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
303
298
  """
304
299
  A mapping whose keys are the top-level data keys returned from
305
300
  Vault and whose values are the corresponding values. This map can only
@@ -309,7 +304,7 @@ class _SecretV2State:
309
304
  return pulumi.get(self, "data")
310
305
 
311
306
  @data.setter
312
- def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
307
+ def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
313
308
  pulumi.set(self, "data", value)
314
309
 
315
310
  @property
@@ -353,14 +348,14 @@ class _SecretV2State:
353
348
 
354
349
  @property
355
350
  @pulumi.getter
356
- def metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
351
+ def metadata(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
357
352
  """
358
353
  Metadata associated with this secret read from Vault.
359
354
  """
360
355
  return pulumi.get(self, "metadata")
361
356
 
362
357
  @metadata.setter
363
- def metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
358
+ def metadata(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
364
359
  pulumi.set(self, "metadata", value)
365
360
 
366
361
  @property
@@ -407,14 +402,14 @@ class _SecretV2State:
407
402
 
408
403
  @property
409
404
  @pulumi.getter
410
- def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
405
+ def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
411
406
  """
412
407
  An object that holds option settings.
413
408
  """
414
409
  return pulumi.get(self, "options")
415
410
 
416
411
  @options.setter
417
- def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
412
+ def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
418
413
  pulumi.set(self, "options", value)
419
414
 
420
415
  @property
@@ -443,7 +438,7 @@ class SecretV2(pulumi.CustomResource):
443
438
  mount: Optional[pulumi.Input[str]] = None,
444
439
  name: Optional[pulumi.Input[str]] = None,
445
440
  namespace: Optional[pulumi.Input[str]] = None,
446
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
441
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
447
442
  __props__=None):
448
443
  """
449
444
  Writes a KV-V2 secret to a given path in Vault.
@@ -534,7 +529,7 @@ class SecretV2(pulumi.CustomResource):
534
529
  The value should not contain leading or trailing forward slashes.
535
530
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
536
531
  *Available only for Vault Enterprise*.
537
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: An object that holds option settings.
532
+ :param pulumi.Input[Mapping[str, Any]] options: An object that holds option settings.
538
533
  """
539
534
  ...
540
535
  @overload
@@ -630,7 +625,7 @@ class SecretV2(pulumi.CustomResource):
630
625
  mount: Optional[pulumi.Input[str]] = None,
631
626
  name: Optional[pulumi.Input[str]] = None,
632
627
  namespace: Optional[pulumi.Input[str]] = None,
633
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
628
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
634
629
  __props__=None):
635
630
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
636
631
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -670,15 +665,15 @@ class SecretV2(pulumi.CustomResource):
670
665
  opts: Optional[pulumi.ResourceOptions] = None,
671
666
  cas: Optional[pulumi.Input[int]] = None,
672
667
  custom_metadata: Optional[pulumi.Input[Union['SecretV2CustomMetadataArgs', 'SecretV2CustomMetadataArgsDict']]] = None,
673
- data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
668
+ data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
674
669
  data_json: Optional[pulumi.Input[str]] = None,
675
670
  delete_all_versions: Optional[pulumi.Input[bool]] = None,
676
671
  disable_read: Optional[pulumi.Input[bool]] = None,
677
- metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
672
+ metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
678
673
  mount: Optional[pulumi.Input[str]] = None,
679
674
  name: Optional[pulumi.Input[str]] = None,
680
675
  namespace: Optional[pulumi.Input[str]] = None,
681
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
676
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
682
677
  path: Optional[pulumi.Input[str]] = None) -> 'SecretV2':
683
678
  """
684
679
  Get an existing SecretV2 resource's state with the given name, id, and optional extra
@@ -694,7 +689,7 @@ class SecretV2(pulumi.CustomResource):
694
689
  :param pulumi.Input[Union['SecretV2CustomMetadataArgs', 'SecretV2CustomMetadataArgsDict']] custom_metadata: A nested block that allows configuring metadata for the
695
690
  KV secret. Refer to the
696
691
  Configuration Options for more info.
697
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
692
+ :param pulumi.Input[Mapping[str, Any]] data: A mapping whose keys are the top-level data keys returned from
698
693
  Vault and whose values are the corresponding values. This map can only
699
694
  represent string data, so any non-string values returned from Vault are
700
695
  serialized as JSON.
@@ -704,7 +699,7 @@ class SecretV2(pulumi.CustomResource):
704
699
  versions for the specified key.
705
700
  :param pulumi.Input[bool] disable_read: If set to true, disables reading secret from Vault;
706
701
  note: drift won't be detected.
707
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: Metadata associated with this secret read from Vault.
702
+ :param pulumi.Input[Mapping[str, Any]] metadata: Metadata associated with this secret read from Vault.
708
703
  :param pulumi.Input[str] mount: Path where KV-V2 engine is mounted.
709
704
  :param pulumi.Input[str] name: Full name of the secret. For a nested secret
710
705
  the name is the nested path excluding the mount and data
@@ -714,7 +709,7 @@ class SecretV2(pulumi.CustomResource):
714
709
  The value should not contain leading or trailing forward slashes.
715
710
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
716
711
  *Available only for Vault Enterprise*.
717
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: An object that holds option settings.
712
+ :param pulumi.Input[Mapping[str, Any]] options: An object that holds option settings.
718
713
  :param pulumi.Input[str] path: Full path where the KV-V2 secret will be written.
719
714
  """
720
715
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -758,7 +753,7 @@ class SecretV2(pulumi.CustomResource):
758
753
 
759
754
  @property
760
755
  @pulumi.getter
761
- def data(self) -> pulumi.Output[Mapping[str, str]]:
756
+ def data(self) -> pulumi.Output[Mapping[str, Any]]:
762
757
  """
763
758
  A mapping whose keys are the top-level data keys returned from
764
759
  Vault and whose values are the corresponding values. This map can only
@@ -796,7 +791,7 @@ class SecretV2(pulumi.CustomResource):
796
791
 
797
792
  @property
798
793
  @pulumi.getter
799
- def metadata(self) -> pulumi.Output[Mapping[str, str]]:
794
+ def metadata(self) -> pulumi.Output[Mapping[str, Any]]:
800
795
  """
801
796
  Metadata associated with this secret read from Vault.
802
797
  """
@@ -834,7 +829,7 @@ class SecretV2(pulumi.CustomResource):
834
829
 
835
830
  @property
836
831
  @pulumi.getter
837
- def options(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
832
+ def options(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
838
833
  """
839
834
  An object that holds option settings.
840
835
  """
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['AuthBackendArgs', 'AuthBackend']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['AuthBackendGroupArgs', 'AuthBackendGroup']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['AuthBackendUserArgs', 'AuthBackendUser']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -155,6 +150,9 @@ def get_dynamic_credentials(mount: Optional[str] = None,
155
150
  password=pulumi.get(__ret__, 'password'),
156
151
  role_name=pulumi.get(__ret__, 'role_name'),
157
152
  username=pulumi.get(__ret__, 'username'))
153
+
154
+
155
+ @_utilities.lift_output_func(get_dynamic_credentials)
158
156
  def get_dynamic_credentials_output(mount: Optional[pulumi.Input[str]] = None,
159
157
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
160
158
  role_name: Optional[pulumi.Input[str]] = None,
@@ -162,20 +160,4 @@ def get_dynamic_credentials_output(mount: Optional[pulumi.Input[str]] = None,
162
160
  """
163
161
  Use this data source to access information about an existing resource.
164
162
  """
165
- __args__ = dict()
166
- __args__['mount'] = mount
167
- __args__['namespace'] = namespace
168
- __args__['roleName'] = role_name
169
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
170
- __ret__ = pulumi.runtime.invoke_output('vault:ldap/getDynamicCredentials:getDynamicCredentials', __args__, opts=opts, typ=GetDynamicCredentialsResult)
171
- return __ret__.apply(lambda __response__: GetDynamicCredentialsResult(
172
- distinguished_names=pulumi.get(__response__, 'distinguished_names'),
173
- id=pulumi.get(__response__, 'id'),
174
- lease_duration=pulumi.get(__response__, 'lease_duration'),
175
- lease_id=pulumi.get(__response__, 'lease_id'),
176
- lease_renewable=pulumi.get(__response__, 'lease_renewable'),
177
- mount=pulumi.get(__response__, 'mount'),
178
- namespace=pulumi.get(__response__, 'namespace'),
179
- password=pulumi.get(__response__, 'password'),
180
- role_name=pulumi.get(__response__, 'role_name'),
181
- username=pulumi.get(__response__, 'username')))
163
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -165,6 +160,9 @@ def get_static_credentials(mount: Optional[str] = None,
165
160
  rotation_period=pulumi.get(__ret__, 'rotation_period'),
166
161
  ttl=pulumi.get(__ret__, 'ttl'),
167
162
  username=pulumi.get(__ret__, 'username'))
163
+
164
+
165
+ @_utilities.lift_output_func(get_static_credentials)
168
166
  def get_static_credentials_output(mount: Optional[pulumi.Input[str]] = None,
169
167
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
170
168
  role_name: Optional[pulumi.Input[str]] = None,
@@ -172,21 +170,4 @@ def get_static_credentials_output(mount: Optional[pulumi.Input[str]] = None,
172
170
  """
173
171
  Use this data source to access information about an existing resource.
174
172
  """
175
- __args__ = dict()
176
- __args__['mount'] = mount
177
- __args__['namespace'] = namespace
178
- __args__['roleName'] = role_name
179
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
180
- __ret__ = pulumi.runtime.invoke_output('vault:ldap/getStaticCredentials:getStaticCredentials', __args__, opts=opts, typ=GetStaticCredentialsResult)
181
- return __ret__.apply(lambda __response__: GetStaticCredentialsResult(
182
- dn=pulumi.get(__response__, 'dn'),
183
- id=pulumi.get(__response__, 'id'),
184
- last_password=pulumi.get(__response__, 'last_password'),
185
- last_vault_rotation=pulumi.get(__response__, 'last_vault_rotation'),
186
- mount=pulumi.get(__response__, 'mount'),
187
- namespace=pulumi.get(__response__, 'namespace'),
188
- password=pulumi.get(__response__, 'password'),
189
- role_name=pulumi.get(__response__, 'role_name'),
190
- rotation_period=pulumi.get(__response__, 'rotation_period'),
191
- ttl=pulumi.get(__response__, 'ttl'),
192
- username=pulumi.get(__response__, 'username')))
173
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretBackendArgs', 'SecretBackend']
@@ -40,7 +35,7 @@ class SecretBackendArgs:
40
35
  local: Optional[pulumi.Input[bool]] = None,
41
36
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
42
37
  namespace: Optional[pulumi.Input[str]] = None,
43
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
38
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
44
39
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
45
40
  password_policy: Optional[pulumi.Input[str]] = None,
46
41
  path: Optional[pulumi.Input[str]] = None,
@@ -84,7 +79,7 @@ class SecretBackendArgs:
84
79
  The value should not contain leading or trailing forward slashes.
85
80
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
86
81
  *Available only for Vault Enterprise*.
87
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
82
+ :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
88
83
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
89
84
  :param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
90
85
  :param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
@@ -433,14 +428,14 @@ class SecretBackendArgs:
433
428
 
434
429
  @property
435
430
  @pulumi.getter
436
- def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
431
+ def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
437
432
  """
438
433
  Specifies mount type specific options that are passed to the backend
439
434
  """
440
435
  return pulumi.get(self, "options")
441
436
 
442
437
  @options.setter
443
- def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
438
+ def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
444
439
  pulumi.set(self, "options", value)
445
440
 
446
441
  @property
@@ -629,7 +624,7 @@ class _SecretBackendState:
629
624
  local: Optional[pulumi.Input[bool]] = None,
630
625
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
631
626
  namespace: Optional[pulumi.Input[str]] = None,
632
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
627
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
633
628
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
634
629
  password_policy: Optional[pulumi.Input[str]] = None,
635
630
  path: Optional[pulumi.Input[str]] = None,
@@ -674,7 +669,7 @@ class _SecretBackendState:
674
669
  The value should not contain leading or trailing forward slashes.
675
670
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
676
671
  *Available only for Vault Enterprise*.
677
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
672
+ :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
678
673
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
679
674
  :param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
680
675
  :param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
@@ -1039,14 +1034,14 @@ class _SecretBackendState:
1039
1034
 
1040
1035
  @property
1041
1036
  @pulumi.getter
1042
- def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
1037
+ def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
1043
1038
  """
1044
1039
  Specifies mount type specific options that are passed to the backend
1045
1040
  """
1046
1041
  return pulumi.get(self, "options")
1047
1042
 
1048
1043
  @options.setter
1049
- def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
1044
+ def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
1050
1045
  pulumi.set(self, "options", value)
1051
1046
 
1052
1047
  @property
@@ -1236,7 +1231,7 @@ class SecretBackend(pulumi.CustomResource):
1236
1231
  local: Optional[pulumi.Input[bool]] = None,
1237
1232
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1238
1233
  namespace: Optional[pulumi.Input[str]] = None,
1239
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1234
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1240
1235
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1241
1236
  password_policy: Optional[pulumi.Input[str]] = None,
1242
1237
  path: Optional[pulumi.Input[str]] = None,
@@ -1305,7 +1300,7 @@ class SecretBackend(pulumi.CustomResource):
1305
1300
  The value should not contain leading or trailing forward slashes.
1306
1301
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1307
1302
  *Available only for Vault Enterprise*.
1308
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
1303
+ :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
1309
1304
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1310
1305
  :param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
1311
1306
  :param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
@@ -1390,7 +1385,7 @@ class SecretBackend(pulumi.CustomResource):
1390
1385
  local: Optional[pulumi.Input[bool]] = None,
1391
1386
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1392
1387
  namespace: Optional[pulumi.Input[str]] = None,
1393
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1388
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1394
1389
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1395
1390
  password_policy: Optional[pulumi.Input[str]] = None,
1396
1391
  path: Optional[pulumi.Input[str]] = None,
@@ -1487,7 +1482,7 @@ class SecretBackend(pulumi.CustomResource):
1487
1482
  local: Optional[pulumi.Input[bool]] = None,
1488
1483
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1489
1484
  namespace: Optional[pulumi.Input[str]] = None,
1490
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1485
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1491
1486
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1492
1487
  password_policy: Optional[pulumi.Input[str]] = None,
1493
1488
  path: Optional[pulumi.Input[str]] = None,
@@ -1537,7 +1532,7 @@ class SecretBackend(pulumi.CustomResource):
1537
1532
  The value should not contain leading or trailing forward slashes.
1538
1533
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1539
1534
  *Available only for Vault Enterprise*.
1540
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
1535
+ :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
1541
1536
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1542
1537
  :param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
1543
1538
  :param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
@@ -1783,7 +1778,7 @@ class SecretBackend(pulumi.CustomResource):
1783
1778
 
1784
1779
  @property
1785
1780
  @pulumi.getter
1786
- def options(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
1781
+ def options(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
1787
1782
  """
1788
1783
  Specifies mount type specific options that are passed to the backend
1789
1784
  """
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretBackendDynamicRoleArgs', 'SecretBackendDynamicRole']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretBackendLibrarySetArgs', 'SecretBackendLibrarySet']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole']