pulumi-vault 6.3.2a1729803197__py3-none-any.whl → 6.4.0a1723454543__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -560
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +4 -19
- pulumi_vault/ad/secret_backend.py +0 -5
- pulumi_vault/ad/secret_library.py +0 -5
- pulumi_vault/ad/secret_role.py +0 -5
- pulumi_vault/alicloud/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_login.py +0 -5
- pulumi_vault/approle/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -5
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
- pulumi_vault/audit.py +0 -5
- pulumi_vault/audit_request_header.py +0 -5
- pulumi_vault/auth_backend.py +0 -5
- pulumi_vault/aws/auth_backend_cert.py +0 -5
- pulumi_vault/aws/auth_backend_client.py +0 -5
- pulumi_vault/aws/auth_backend_config_identity.py +0 -5
- pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
- pulumi_vault/aws/auth_backend_login.py +7 -12
- pulumi_vault/aws/auth_backend_role.py +0 -5
- pulumi_vault/aws/auth_backend_role_tag.py +0 -5
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
- pulumi_vault/aws/auth_backend_sts_role.py +0 -5
- pulumi_vault/aws/get_access_credentials.py +4 -31
- pulumi_vault/aws/get_static_access_credentials.py +4 -18
- pulumi_vault/aws/secret_backend.py +0 -5
- pulumi_vault/aws/secret_backend_role.py +0 -5
- pulumi_vault/aws/secret_backend_static_role.py +0 -5
- pulumi_vault/azure/_inputs.py +0 -24
- pulumi_vault/azure/auth_backend_config.py +0 -5
- pulumi_vault/azure/auth_backend_role.py +0 -5
- pulumi_vault/azure/backend.py +0 -5
- pulumi_vault/azure/backend_role.py +0 -5
- pulumi_vault/azure/get_access_credentials.py +4 -36
- pulumi_vault/azure/outputs.py +0 -5
- pulumi_vault/cert_auth_backend_role.py +0 -5
- pulumi_vault/config/__init__.pyi +0 -5
- pulumi_vault/config/_inputs.py +0 -21
- pulumi_vault/config/outputs.py +0 -5
- pulumi_vault/config/ui_custom_message.py +14 -19
- pulumi_vault/config/vars.py +0 -5
- pulumi_vault/consul/secret_backend.py +0 -5
- pulumi_vault/consul/secret_backend_role.py +0 -5
- pulumi_vault/database/_inputs.py +105 -2056
- pulumi_vault/database/outputs.py +54 -59
- pulumi_vault/database/secret_backend_connection.py +14 -19
- pulumi_vault/database/secret_backend_role.py +14 -19
- pulumi_vault/database/secret_backend_static_role.py +0 -5
- pulumi_vault/database/secrets_mount.py +14 -19
- pulumi_vault/egp_policy.py +0 -5
- pulumi_vault/gcp/_inputs.py +0 -111
- pulumi_vault/gcp/auth_backend.py +0 -5
- pulumi_vault/gcp/auth_backend_role.py +0 -5
- pulumi_vault/gcp/get_auth_backend_role.py +4 -42
- pulumi_vault/gcp/outputs.py +0 -5
- pulumi_vault/gcp/secret_backend.py +0 -5
- pulumi_vault/gcp/secret_impersonated_account.py +0 -5
- pulumi_vault/gcp/secret_roleset.py +0 -5
- pulumi_vault/gcp/secret_static_account.py +0 -5
- pulumi_vault/generic/endpoint.py +0 -5
- pulumi_vault/generic/get_secret.py +5 -25
- pulumi_vault/generic/secret.py +7 -12
- pulumi_vault/get_auth_backend.py +4 -21
- pulumi_vault/get_auth_backends.py +4 -16
- pulumi_vault/get_namespace.py +5 -18
- pulumi_vault/get_namespaces.py +4 -13
- pulumi_vault/get_nomad_access_token.py +8 -28
- pulumi_vault/get_policy_document.py +4 -15
- pulumi_vault/get_raft_autopilot_state.py +7 -26
- pulumi_vault/github/_inputs.py +0 -55
- pulumi_vault/github/auth_backend.py +0 -5
- pulumi_vault/github/outputs.py +0 -5
- pulumi_vault/github/team.py +0 -5
- pulumi_vault/github/user.py +0 -5
- pulumi_vault/identity/entity.py +0 -5
- pulumi_vault/identity/entity_alias.py +0 -5
- pulumi_vault/identity/entity_policies.py +0 -5
- pulumi_vault/identity/get_entity.py +5 -35
- pulumi_vault/identity/get_group.py +6 -42
- pulumi_vault/identity/get_oidc_client_creds.py +4 -16
- pulumi_vault/identity/get_oidc_openid_config.py +4 -26
- pulumi_vault/identity/get_oidc_public_keys.py +5 -16
- pulumi_vault/identity/group.py +0 -5
- pulumi_vault/identity/group_alias.py +0 -5
- pulumi_vault/identity/group_member_entity_ids.py +0 -5
- pulumi_vault/identity/group_member_group_ids.py +0 -5
- pulumi_vault/identity/group_policies.py +0 -5
- pulumi_vault/identity/mfa_duo.py +0 -5
- pulumi_vault/identity/mfa_login_enforcement.py +0 -5
- pulumi_vault/identity/mfa_okta.py +0 -5
- pulumi_vault/identity/mfa_pingid.py +0 -5
- pulumi_vault/identity/mfa_totp.py +0 -5
- pulumi_vault/identity/oidc.py +0 -5
- pulumi_vault/identity/oidc_assignment.py +0 -5
- pulumi_vault/identity/oidc_client.py +0 -5
- pulumi_vault/identity/oidc_key.py +0 -5
- pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
- pulumi_vault/identity/oidc_provider.py +0 -5
- pulumi_vault/identity/oidc_role.py +0 -5
- pulumi_vault/identity/oidc_scope.py +0 -5
- pulumi_vault/identity/outputs.py +3 -8
- pulumi_vault/jwt/_inputs.py +0 -55
- pulumi_vault/jwt/auth_backend.py +0 -5
- pulumi_vault/jwt/auth_backend_role.py +28 -33
- pulumi_vault/jwt/outputs.py +0 -5
- pulumi_vault/kmip/secret_backend.py +0 -5
- pulumi_vault/kmip/secret_role.py +0 -5
- pulumi_vault/kmip/secret_scope.py +0 -5
- pulumi_vault/kubernetes/auth_backend_config.py +0 -5
- pulumi_vault/kubernetes/auth_backend_role.py +0 -5
- pulumi_vault/kubernetes/get_auth_backend_config.py +4 -26
- pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
- pulumi_vault/kubernetes/get_service_account_token.py +4 -28
- pulumi_vault/kubernetes/secret_backend.py +14 -19
- pulumi_vault/kubernetes/secret_backend_role.py +0 -5
- pulumi_vault/kv/_inputs.py +4 -36
- pulumi_vault/kv/get_secret.py +5 -20
- pulumi_vault/kv/get_secret_subkeys_v2.py +5 -24
- pulumi_vault/kv/get_secret_v2.py +6 -27
- pulumi_vault/kv/get_secrets_list.py +4 -15
- pulumi_vault/kv/get_secrets_list_v2.py +4 -18
- pulumi_vault/kv/outputs.py +3 -8
- pulumi_vault/kv/secret.py +7 -12
- pulumi_vault/kv/secret_backend_v2.py +0 -5
- pulumi_vault/kv/secret_v2.py +28 -33
- pulumi_vault/ldap/auth_backend.py +0 -5
- pulumi_vault/ldap/auth_backend_group.py +0 -5
- pulumi_vault/ldap/auth_backend_user.py +0 -5
- pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
- pulumi_vault/ldap/get_static_credentials.py +4 -23
- pulumi_vault/ldap/secret_backend.py +14 -19
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
- pulumi_vault/ldap/secret_backend_library_set.py +0 -5
- pulumi_vault/ldap/secret_backend_static_role.py +0 -5
- pulumi_vault/managed/_inputs.py +0 -205
- pulumi_vault/managed/keys.py +0 -5
- pulumi_vault/managed/outputs.py +0 -5
- pulumi_vault/mfa_duo.py +0 -5
- pulumi_vault/mfa_okta.py +0 -5
- pulumi_vault/mfa_pingid.py +0 -5
- pulumi_vault/mfa_totp.py +0 -5
- pulumi_vault/mongodbatlas/secret_backend.py +0 -5
- pulumi_vault/mongodbatlas/secret_role.py +0 -5
- pulumi_vault/mount.py +16 -21
- pulumi_vault/namespace.py +14 -19
- pulumi_vault/nomad_secret_backend.py +0 -5
- pulumi_vault/nomad_secret_role.py +0 -5
- pulumi_vault/okta/_inputs.py +0 -39
- pulumi_vault/okta/auth_backend.py +0 -5
- pulumi_vault/okta/auth_backend_group.py +0 -5
- pulumi_vault/okta/auth_backend_user.py +0 -5
- pulumi_vault/okta/outputs.py +0 -5
- pulumi_vault/outputs.py +0 -5
- pulumi_vault/password_policy.py +0 -5
- pulumi_vault/pkisecret/_inputs.py +8 -49
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
- pulumi_vault/pkisecret/backend_config_est.py +14 -19
- pulumi_vault/pkisecret/get_backend_config_est.py +5 -23
- pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
- pulumi_vault/pkisecret/get_backend_issuers.py +5 -18
- pulumi_vault/pkisecret/get_backend_key.py +4 -19
- pulumi_vault/pkisecret/get_backend_keys.py +5 -18
- pulumi_vault/pkisecret/outputs.py +12 -17
- pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
- pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
- pulumi_vault/pkisecret/secret_backend_key.py +0 -5
- pulumi_vault/pkisecret/secret_backend_role.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
- pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
- pulumi_vault/plugin.py +0 -5
- pulumi_vault/plugin_pinned_version.py +0 -5
- pulumi_vault/policy.py +0 -5
- pulumi_vault/provider.py +0 -5
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +0 -5
- pulumi_vault/quota_rate_limit.py +0 -5
- pulumi_vault/rabbitmq/_inputs.py +0 -61
- pulumi_vault/rabbitmq/outputs.py +0 -5
- pulumi_vault/rabbitmq/secret_backend.py +0 -5
- pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
- pulumi_vault/raft_autopilot.py +0 -5
- pulumi_vault/raft_snapshot_agent_config.py +0 -5
- pulumi_vault/rgp_policy.py +0 -5
- pulumi_vault/saml/auth_backend.py +0 -5
- pulumi_vault/saml/auth_backend_role.py +14 -19
- pulumi_vault/secrets/_inputs.py +0 -30
- pulumi_vault/secrets/outputs.py +0 -5
- pulumi_vault/secrets/sync_association.py +0 -5
- pulumi_vault/secrets/sync_aws_destination.py +14 -19
- pulumi_vault/secrets/sync_azure_destination.py +14 -19
- pulumi_vault/secrets/sync_config.py +0 -5
- pulumi_vault/secrets/sync_gcp_destination.py +14 -19
- pulumi_vault/secrets/sync_gh_destination.py +0 -5
- pulumi_vault/secrets/sync_github_apps.py +0 -5
- pulumi_vault/secrets/sync_vercel_destination.py +0 -5
- pulumi_vault/ssh/_inputs.py +0 -22
- pulumi_vault/ssh/outputs.py +0 -5
- pulumi_vault/ssh/secret_backend_ca.py +0 -5
- pulumi_vault/ssh/secret_backend_role.py +28 -33
- pulumi_vault/terraformcloud/secret_backend.py +0 -5
- pulumi_vault/terraformcloud/secret_creds.py +0 -5
- pulumi_vault/terraformcloud/secret_role.py +0 -5
- pulumi_vault/token.py +0 -5
- pulumi_vault/tokenauth/auth_backend_role.py +14 -5
- pulumi_vault/transform/alphabet.py +0 -5
- pulumi_vault/transform/get_decode.py +14 -38
- pulumi_vault/transform/get_encode.py +14 -38
- pulumi_vault/transform/role.py +0 -5
- pulumi_vault/transform/template.py +14 -19
- pulumi_vault/transform/transformation.py +0 -5
- pulumi_vault/transit/get_decrypt.py +4 -21
- pulumi_vault/transit/get_encrypt.py +4 -23
- pulumi_vault/transit/secret_backend_key.py +7 -12
- pulumi_vault/transit/secret_cache_config.py +0 -5
- {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/METADATA +2 -3
- pulumi_vault-6.4.0a1723454543.dist-info/RECORD +256 -0
- {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/WHEEL +1 -1
- pulumi_vault-6.3.2a1729803197.dist-info/RECORD +0 -256
- {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/top_level.txt +0 -0
pulumi_vault/_utilities.py
CHANGED
@@ -264,7 +264,7 @@ def call_plain(
|
|
264
264
|
output = pulumi.runtime.call(tok, props, res, typ)
|
265
265
|
|
266
266
|
# Ingoring deps silently. They are typically non-empty, r.f() calls include r as a dependency.
|
267
|
-
result, known, secret, _ = _sync_await(asyncio.
|
267
|
+
result, known, secret, _ = _sync_await(asyncio.ensure_future(_await_output(output)))
|
268
268
|
|
269
269
|
problem = None
|
270
270
|
if not known:
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -144,6 +139,9 @@ def get_access_credentials(backend: Optional[str] = None,
|
|
144
139
|
namespace=pulumi.get(__ret__, 'namespace'),
|
145
140
|
role=pulumi.get(__ret__, 'role'),
|
146
141
|
username=pulumi.get(__ret__, 'username'))
|
142
|
+
|
143
|
+
|
144
|
+
@_utilities.lift_output_func(get_access_credentials)
|
147
145
|
def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
|
148
146
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
149
147
|
role: Optional[pulumi.Input[str]] = None,
|
@@ -161,17 +159,4 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
|
|
161
159
|
:param str role: The name of the AD secret backend role to read
|
162
160
|
credentials from, with no leading or trailing `/`s.
|
163
161
|
"""
|
164
|
-
|
165
|
-
__args__['backend'] = backend
|
166
|
-
__args__['namespace'] = namespace
|
167
|
-
__args__['role'] = role
|
168
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
169
|
-
__ret__ = pulumi.runtime.invoke_output('vault:ad/getAccessCredentials:getAccessCredentials', __args__, opts=opts, typ=GetAccessCredentialsResult)
|
170
|
-
return __ret__.apply(lambda __response__: GetAccessCredentialsResult(
|
171
|
-
backend=pulumi.get(__response__, 'backend'),
|
172
|
-
current_password=pulumi.get(__response__, 'current_password'),
|
173
|
-
id=pulumi.get(__response__, 'id'),
|
174
|
-
last_password=pulumi.get(__response__, 'last_password'),
|
175
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
176
|
-
role=pulumi.get(__response__, 'role'),
|
177
|
-
username=pulumi.get(__response__, 'username')))
|
162
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendArgs', 'SecretBackend']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretLibraryArgs', 'SecretLibrary']
|
pulumi_vault/ad/secret_role.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretRoleArgs', 'SecretRole']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendLoginArgs', 'AuthBackendLogin']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendRoleSecretIdArgs', 'AuthBackendRoleSecretId']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -128,6 +123,9 @@ def get_auth_backend_role_id(backend: Optional[str] = None,
|
|
128
123
|
namespace=pulumi.get(__ret__, 'namespace'),
|
129
124
|
role_id=pulumi.get(__ret__, 'role_id'),
|
130
125
|
role_name=pulumi.get(__ret__, 'role_name'))
|
126
|
+
|
127
|
+
|
128
|
+
@_utilities.lift_output_func(get_auth_backend_role_id)
|
131
129
|
def get_auth_backend_role_id_output(backend: Optional[pulumi.Input[Optional[str]]] = None,
|
132
130
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
133
131
|
role_name: Optional[pulumi.Input[str]] = None,
|
@@ -155,15 +153,4 @@ def get_auth_backend_role_id_output(backend: Optional[pulumi.Input[Optional[str]
|
|
155
153
|
*Available only for Vault Enterprise*.
|
156
154
|
:param str role_name: The name of the role to retrieve the Role ID for.
|
157
155
|
"""
|
158
|
-
|
159
|
-
__args__['backend'] = backend
|
160
|
-
__args__['namespace'] = namespace
|
161
|
-
__args__['roleName'] = role_name
|
162
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
163
|
-
__ret__ = pulumi.runtime.invoke_output('vault:appRole/getAuthBackendRoleId:getAuthBackendRoleId', __args__, opts=opts, typ=GetAuthBackendRoleIdResult)
|
164
|
-
return __ret__.apply(lambda __response__: GetAuthBackendRoleIdResult(
|
165
|
-
backend=pulumi.get(__response__, 'backend'),
|
166
|
-
id=pulumi.get(__response__, 'id'),
|
167
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
168
|
-
role_id=pulumi.get(__response__, 'role_id'),
|
169
|
-
role_name=pulumi.get(__response__, 'role_name')))
|
156
|
+
...
|
pulumi_vault/audit.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuditArgs', 'Audit']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuditRequestHeaderArgs', 'AuditRequestHeader']
|
pulumi_vault/auth_backend.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
from . import outputs
|
17
12
|
from ._inputs import *
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendCertArgs', 'AuthBackendCert']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendClientArgs', 'AuthBackendClient']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendConfigIdentityArgs', 'AuthBackendConfigIdentity']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendIdentityWhitelistArgs', 'AuthBackendIdentityWhitelist']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendLoginArgs', 'AuthBackendLogin']
|
@@ -248,7 +243,7 @@ class _AuthBackendLoginState:
|
|
248
243
|
identity: Optional[pulumi.Input[str]] = None,
|
249
244
|
lease_duration: Optional[pulumi.Input[int]] = None,
|
250
245
|
lease_start_time: Optional[pulumi.Input[str]] = None,
|
251
|
-
metadata: Optional[pulumi.Input[Mapping[str,
|
246
|
+
metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
252
247
|
namespace: Optional[pulumi.Input[str]] = None,
|
253
248
|
nonce: Optional[pulumi.Input[str]] = None,
|
254
249
|
pkcs7: Optional[pulumi.Input[str]] = None,
|
@@ -275,7 +270,7 @@ class _AuthBackendLoginState:
|
|
275
270
|
authenticate with. Can be retrieved from the EC2 metadata server.
|
276
271
|
:param pulumi.Input[int] lease_duration: The duration in seconds the token will be valid, relative
|
277
272
|
to the time in `lease_start_time`.
|
278
|
-
:param pulumi.Input[Mapping[str,
|
273
|
+
:param pulumi.Input[Mapping[str, Any]] metadata: A map of information returned by the Vault server about the
|
279
274
|
authentication used to generate this token.
|
280
275
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
281
276
|
The value should not contain leading or trailing forward slashes.
|
@@ -473,7 +468,7 @@ class _AuthBackendLoginState:
|
|
473
468
|
|
474
469
|
@property
|
475
470
|
@pulumi.getter
|
476
|
-
def metadata(self) -> Optional[pulumi.Input[Mapping[str,
|
471
|
+
def metadata(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
477
472
|
"""
|
478
473
|
A map of information returned by the Vault server about the
|
479
474
|
authentication used to generate this token.
|
@@ -481,7 +476,7 @@ class _AuthBackendLoginState:
|
|
481
476
|
return pulumi.get(self, "metadata")
|
482
477
|
|
483
478
|
@metadata.setter
|
484
|
-
def metadata(self, value: Optional[pulumi.Input[Mapping[str,
|
479
|
+
def metadata(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
485
480
|
pulumi.set(self, "metadata", value)
|
486
481
|
|
487
482
|
@property
|
@@ -723,7 +718,7 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
723
718
|
identity: Optional[pulumi.Input[str]] = None,
|
724
719
|
lease_duration: Optional[pulumi.Input[int]] = None,
|
725
720
|
lease_start_time: Optional[pulumi.Input[str]] = None,
|
726
|
-
metadata: Optional[pulumi.Input[Mapping[str,
|
721
|
+
metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
727
722
|
namespace: Optional[pulumi.Input[str]] = None,
|
728
723
|
nonce: Optional[pulumi.Input[str]] = None,
|
729
724
|
pkcs7: Optional[pulumi.Input[str]] = None,
|
@@ -755,7 +750,7 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
755
750
|
authenticate with. Can be retrieved from the EC2 metadata server.
|
756
751
|
:param pulumi.Input[int] lease_duration: The duration in seconds the token will be valid, relative
|
757
752
|
to the time in `lease_start_time`.
|
758
|
-
:param pulumi.Input[Mapping[str,
|
753
|
+
:param pulumi.Input[Mapping[str, Any]] metadata: A map of information returned by the Vault server about the
|
759
754
|
authentication used to generate this token.
|
760
755
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
761
756
|
The value should not contain leading or trailing forward slashes.
|
@@ -895,7 +890,7 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
895
890
|
|
896
891
|
@property
|
897
892
|
@pulumi.getter
|
898
|
-
def metadata(self) -> pulumi.Output[Mapping[str,
|
893
|
+
def metadata(self) -> pulumi.Output[Mapping[str, Any]]:
|
899
894
|
"""
|
900
895
|
A map of information returned by the Vault server about the
|
901
896
|
authentication used to generate this token.
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendRoleTagArgs', 'AuthBackendRoleTag']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendRoletagBlacklistArgs', 'AuthBackendRoletagBlacklist']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendStsRoleArgs', 'AuthBackendStsRole']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -251,6 +246,9 @@ def get_access_credentials(backend: Optional[str] = None,
|
|
251
246
|
security_token=pulumi.get(__ret__, 'security_token'),
|
252
247
|
ttl=pulumi.get(__ret__, 'ttl'),
|
253
248
|
type=pulumi.get(__ret__, 'type'))
|
249
|
+
|
250
|
+
|
251
|
+
@_utilities.lift_output_func(get_access_credentials)
|
254
252
|
def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
|
255
253
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
256
254
|
region: Optional[pulumi.Input[Optional[str]]] = None,
|
@@ -283,29 +281,4 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
|
|
283
281
|
Key. Can also be set to `"sts"`, which will return a security token
|
284
282
|
in addition to the keys.
|
285
283
|
"""
|
286
|
-
|
287
|
-
__args__['backend'] = backend
|
288
|
-
__args__['namespace'] = namespace
|
289
|
-
__args__['region'] = region
|
290
|
-
__args__['role'] = role
|
291
|
-
__args__['roleArn'] = role_arn
|
292
|
-
__args__['ttl'] = ttl
|
293
|
-
__args__['type'] = type
|
294
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
295
|
-
__ret__ = pulumi.runtime.invoke_output('vault:aws/getAccessCredentials:getAccessCredentials', __args__, opts=opts, typ=GetAccessCredentialsResult)
|
296
|
-
return __ret__.apply(lambda __response__: GetAccessCredentialsResult(
|
297
|
-
access_key=pulumi.get(__response__, 'access_key'),
|
298
|
-
backend=pulumi.get(__response__, 'backend'),
|
299
|
-
id=pulumi.get(__response__, 'id'),
|
300
|
-
lease_duration=pulumi.get(__response__, 'lease_duration'),
|
301
|
-
lease_id=pulumi.get(__response__, 'lease_id'),
|
302
|
-
lease_renewable=pulumi.get(__response__, 'lease_renewable'),
|
303
|
-
lease_start_time=pulumi.get(__response__, 'lease_start_time'),
|
304
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
305
|
-
region=pulumi.get(__response__, 'region'),
|
306
|
-
role=pulumi.get(__response__, 'role'),
|
307
|
-
role_arn=pulumi.get(__response__, 'role_arn'),
|
308
|
-
secret_key=pulumi.get(__response__, 'secret_key'),
|
309
|
-
security_token=pulumi.get(__response__, 'security_token'),
|
310
|
-
ttl=pulumi.get(__response__, 'ttl'),
|
311
|
-
type=pulumi.get(__response__, 'type')))
|
284
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -115,6 +110,9 @@ def get_static_access_credentials(backend: Optional[str] = None,
|
|
115
110
|
name=pulumi.get(__ret__, 'name'),
|
116
111
|
namespace=pulumi.get(__ret__, 'namespace'),
|
117
112
|
secret_key=pulumi.get(__ret__, 'secret_key'))
|
113
|
+
|
114
|
+
|
115
|
+
@_utilities.lift_output_func(get_static_access_credentials)
|
118
116
|
def get_static_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
|
119
117
|
name: Optional[pulumi.Input[str]] = None,
|
120
118
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
@@ -122,16 +120,4 @@ def get_static_access_credentials_output(backend: Optional[pulumi.Input[str]] =
|
|
122
120
|
"""
|
123
121
|
Use this data source to access information about an existing resource.
|
124
122
|
"""
|
125
|
-
|
126
|
-
__args__['backend'] = backend
|
127
|
-
__args__['name'] = name
|
128
|
-
__args__['namespace'] = namespace
|
129
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
130
|
-
__ret__ = pulumi.runtime.invoke_output('vault:aws/getStaticAccessCredentials:getStaticAccessCredentials', __args__, opts=opts, typ=GetStaticAccessCredentialsResult)
|
131
|
-
return __ret__.apply(lambda __response__: GetStaticAccessCredentialsResult(
|
132
|
-
access_key=pulumi.get(__response__, 'access_key'),
|
133
|
-
backend=pulumi.get(__response__, 'backend'),
|
134
|
-
id=pulumi.get(__response__, 'id'),
|
135
|
-
name=pulumi.get(__response__, 'name'),
|
136
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
137
|
-
secret_key=pulumi.get(__response__, 'secret_key')))
|
123
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendArgs', 'SecretBackend']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole']
|
pulumi_vault/azure/_inputs.py
CHANGED
@@ -4,32 +4,16 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
18
13
|
'BackendRoleAzureGroupArgs',
|
19
|
-
'BackendRoleAzureGroupArgsDict',
|
20
14
|
'BackendRoleAzureRoleArgs',
|
21
|
-
'BackendRoleAzureRoleArgsDict',
|
22
15
|
]
|
23
16
|
|
24
|
-
MYPY = False
|
25
|
-
|
26
|
-
if not MYPY:
|
27
|
-
class BackendRoleAzureGroupArgsDict(TypedDict):
|
28
|
-
group_name: pulumi.Input[str]
|
29
|
-
object_id: NotRequired[pulumi.Input[str]]
|
30
|
-
elif False:
|
31
|
-
BackendRoleAzureGroupArgsDict: TypeAlias = Mapping[str, Any]
|
32
|
-
|
33
17
|
@pulumi.input_type
|
34
18
|
class BackendRoleAzureGroupArgs:
|
35
19
|
def __init__(__self__, *,
|
@@ -58,14 +42,6 @@ class BackendRoleAzureGroupArgs:
|
|
58
42
|
pulumi.set(self, "object_id", value)
|
59
43
|
|
60
44
|
|
61
|
-
if not MYPY:
|
62
|
-
class BackendRoleAzureRoleArgsDict(TypedDict):
|
63
|
-
scope: pulumi.Input[str]
|
64
|
-
role_id: NotRequired[pulumi.Input[str]]
|
65
|
-
role_name: NotRequired[pulumi.Input[str]]
|
66
|
-
elif False:
|
67
|
-
BackendRoleAzureRoleArgsDict: TypeAlias = Mapping[str, Any]
|
68
|
-
|
69
45
|
@pulumi.input_type
|
70
46
|
class BackendRoleAzureRoleArgs:
|
71
47
|
def __init__(__self__, *,
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendConfigArgs', 'AuthBackendConfig']
|