pulumi-vault 6.3.2a1729803197__py3-none-any.whl → 6.4.0a1723454543__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +0 -560
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +4 -19
  4. pulumi_vault/ad/secret_backend.py +0 -5
  5. pulumi_vault/ad/secret_library.py +0 -5
  6. pulumi_vault/ad/secret_role.py +0 -5
  7. pulumi_vault/alicloud/auth_backend_role.py +0 -5
  8. pulumi_vault/approle/auth_backend_login.py +0 -5
  9. pulumi_vault/approle/auth_backend_role.py +0 -5
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -5
  11. pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
  12. pulumi_vault/audit.py +0 -5
  13. pulumi_vault/audit_request_header.py +0 -5
  14. pulumi_vault/auth_backend.py +0 -5
  15. pulumi_vault/aws/auth_backend_cert.py +0 -5
  16. pulumi_vault/aws/auth_backend_client.py +0 -5
  17. pulumi_vault/aws/auth_backend_config_identity.py +0 -5
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
  19. pulumi_vault/aws/auth_backend_login.py +7 -12
  20. pulumi_vault/aws/auth_backend_role.py +0 -5
  21. pulumi_vault/aws/auth_backend_role_tag.py +0 -5
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
  23. pulumi_vault/aws/auth_backend_sts_role.py +0 -5
  24. pulumi_vault/aws/get_access_credentials.py +4 -31
  25. pulumi_vault/aws/get_static_access_credentials.py +4 -18
  26. pulumi_vault/aws/secret_backend.py +0 -5
  27. pulumi_vault/aws/secret_backend_role.py +0 -5
  28. pulumi_vault/aws/secret_backend_static_role.py +0 -5
  29. pulumi_vault/azure/_inputs.py +0 -24
  30. pulumi_vault/azure/auth_backend_config.py +0 -5
  31. pulumi_vault/azure/auth_backend_role.py +0 -5
  32. pulumi_vault/azure/backend.py +0 -5
  33. pulumi_vault/azure/backend_role.py +0 -5
  34. pulumi_vault/azure/get_access_credentials.py +4 -36
  35. pulumi_vault/azure/outputs.py +0 -5
  36. pulumi_vault/cert_auth_backend_role.py +0 -5
  37. pulumi_vault/config/__init__.pyi +0 -5
  38. pulumi_vault/config/_inputs.py +0 -21
  39. pulumi_vault/config/outputs.py +0 -5
  40. pulumi_vault/config/ui_custom_message.py +14 -19
  41. pulumi_vault/config/vars.py +0 -5
  42. pulumi_vault/consul/secret_backend.py +0 -5
  43. pulumi_vault/consul/secret_backend_role.py +0 -5
  44. pulumi_vault/database/_inputs.py +105 -2056
  45. pulumi_vault/database/outputs.py +54 -59
  46. pulumi_vault/database/secret_backend_connection.py +14 -19
  47. pulumi_vault/database/secret_backend_role.py +14 -19
  48. pulumi_vault/database/secret_backend_static_role.py +0 -5
  49. pulumi_vault/database/secrets_mount.py +14 -19
  50. pulumi_vault/egp_policy.py +0 -5
  51. pulumi_vault/gcp/_inputs.py +0 -111
  52. pulumi_vault/gcp/auth_backend.py +0 -5
  53. pulumi_vault/gcp/auth_backend_role.py +0 -5
  54. pulumi_vault/gcp/get_auth_backend_role.py +4 -42
  55. pulumi_vault/gcp/outputs.py +0 -5
  56. pulumi_vault/gcp/secret_backend.py +0 -5
  57. pulumi_vault/gcp/secret_impersonated_account.py +0 -5
  58. pulumi_vault/gcp/secret_roleset.py +0 -5
  59. pulumi_vault/gcp/secret_static_account.py +0 -5
  60. pulumi_vault/generic/endpoint.py +0 -5
  61. pulumi_vault/generic/get_secret.py +5 -25
  62. pulumi_vault/generic/secret.py +7 -12
  63. pulumi_vault/get_auth_backend.py +4 -21
  64. pulumi_vault/get_auth_backends.py +4 -16
  65. pulumi_vault/get_namespace.py +5 -18
  66. pulumi_vault/get_namespaces.py +4 -13
  67. pulumi_vault/get_nomad_access_token.py +8 -28
  68. pulumi_vault/get_policy_document.py +4 -15
  69. pulumi_vault/get_raft_autopilot_state.py +7 -26
  70. pulumi_vault/github/_inputs.py +0 -55
  71. pulumi_vault/github/auth_backend.py +0 -5
  72. pulumi_vault/github/outputs.py +0 -5
  73. pulumi_vault/github/team.py +0 -5
  74. pulumi_vault/github/user.py +0 -5
  75. pulumi_vault/identity/entity.py +0 -5
  76. pulumi_vault/identity/entity_alias.py +0 -5
  77. pulumi_vault/identity/entity_policies.py +0 -5
  78. pulumi_vault/identity/get_entity.py +5 -35
  79. pulumi_vault/identity/get_group.py +6 -42
  80. pulumi_vault/identity/get_oidc_client_creds.py +4 -16
  81. pulumi_vault/identity/get_oidc_openid_config.py +4 -26
  82. pulumi_vault/identity/get_oidc_public_keys.py +5 -16
  83. pulumi_vault/identity/group.py +0 -5
  84. pulumi_vault/identity/group_alias.py +0 -5
  85. pulumi_vault/identity/group_member_entity_ids.py +0 -5
  86. pulumi_vault/identity/group_member_group_ids.py +0 -5
  87. pulumi_vault/identity/group_policies.py +0 -5
  88. pulumi_vault/identity/mfa_duo.py +0 -5
  89. pulumi_vault/identity/mfa_login_enforcement.py +0 -5
  90. pulumi_vault/identity/mfa_okta.py +0 -5
  91. pulumi_vault/identity/mfa_pingid.py +0 -5
  92. pulumi_vault/identity/mfa_totp.py +0 -5
  93. pulumi_vault/identity/oidc.py +0 -5
  94. pulumi_vault/identity/oidc_assignment.py +0 -5
  95. pulumi_vault/identity/oidc_client.py +0 -5
  96. pulumi_vault/identity/oidc_key.py +0 -5
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
  98. pulumi_vault/identity/oidc_provider.py +0 -5
  99. pulumi_vault/identity/oidc_role.py +0 -5
  100. pulumi_vault/identity/oidc_scope.py +0 -5
  101. pulumi_vault/identity/outputs.py +3 -8
  102. pulumi_vault/jwt/_inputs.py +0 -55
  103. pulumi_vault/jwt/auth_backend.py +0 -5
  104. pulumi_vault/jwt/auth_backend_role.py +28 -33
  105. pulumi_vault/jwt/outputs.py +0 -5
  106. pulumi_vault/kmip/secret_backend.py +0 -5
  107. pulumi_vault/kmip/secret_role.py +0 -5
  108. pulumi_vault/kmip/secret_scope.py +0 -5
  109. pulumi_vault/kubernetes/auth_backend_config.py +0 -5
  110. pulumi_vault/kubernetes/auth_backend_role.py +0 -5
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +4 -26
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
  113. pulumi_vault/kubernetes/get_service_account_token.py +4 -28
  114. pulumi_vault/kubernetes/secret_backend.py +14 -19
  115. pulumi_vault/kubernetes/secret_backend_role.py +0 -5
  116. pulumi_vault/kv/_inputs.py +4 -36
  117. pulumi_vault/kv/get_secret.py +5 -20
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +5 -24
  119. pulumi_vault/kv/get_secret_v2.py +6 -27
  120. pulumi_vault/kv/get_secrets_list.py +4 -15
  121. pulumi_vault/kv/get_secrets_list_v2.py +4 -18
  122. pulumi_vault/kv/outputs.py +3 -8
  123. pulumi_vault/kv/secret.py +7 -12
  124. pulumi_vault/kv/secret_backend_v2.py +0 -5
  125. pulumi_vault/kv/secret_v2.py +28 -33
  126. pulumi_vault/ldap/auth_backend.py +0 -5
  127. pulumi_vault/ldap/auth_backend_group.py +0 -5
  128. pulumi_vault/ldap/auth_backend_user.py +0 -5
  129. pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
  130. pulumi_vault/ldap/get_static_credentials.py +4 -23
  131. pulumi_vault/ldap/secret_backend.py +14 -19
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
  133. pulumi_vault/ldap/secret_backend_library_set.py +0 -5
  134. pulumi_vault/ldap/secret_backend_static_role.py +0 -5
  135. pulumi_vault/managed/_inputs.py +0 -205
  136. pulumi_vault/managed/keys.py +0 -5
  137. pulumi_vault/managed/outputs.py +0 -5
  138. pulumi_vault/mfa_duo.py +0 -5
  139. pulumi_vault/mfa_okta.py +0 -5
  140. pulumi_vault/mfa_pingid.py +0 -5
  141. pulumi_vault/mfa_totp.py +0 -5
  142. pulumi_vault/mongodbatlas/secret_backend.py +0 -5
  143. pulumi_vault/mongodbatlas/secret_role.py +0 -5
  144. pulumi_vault/mount.py +16 -21
  145. pulumi_vault/namespace.py +14 -19
  146. pulumi_vault/nomad_secret_backend.py +0 -5
  147. pulumi_vault/nomad_secret_role.py +0 -5
  148. pulumi_vault/okta/_inputs.py +0 -39
  149. pulumi_vault/okta/auth_backend.py +0 -5
  150. pulumi_vault/okta/auth_backend_group.py +0 -5
  151. pulumi_vault/okta/auth_backend_user.py +0 -5
  152. pulumi_vault/okta/outputs.py +0 -5
  153. pulumi_vault/outputs.py +0 -5
  154. pulumi_vault/password_policy.py +0 -5
  155. pulumi_vault/pkisecret/_inputs.py +8 -49
  156. pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
  157. pulumi_vault/pkisecret/backend_config_est.py +14 -19
  158. pulumi_vault/pkisecret/get_backend_config_est.py +5 -23
  159. pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
  160. pulumi_vault/pkisecret/get_backend_issuers.py +5 -18
  161. pulumi_vault/pkisecret/get_backend_key.py +4 -19
  162. pulumi_vault/pkisecret/get_backend_keys.py +5 -18
  163. pulumi_vault/pkisecret/outputs.py +12 -17
  164. pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
  172. pulumi_vault/pkisecret/secret_backend_key.py +0 -5
  173. pulumi_vault/pkisecret/secret_backend_role.py +0 -5
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
  176. pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
  177. pulumi_vault/plugin.py +0 -5
  178. pulumi_vault/plugin_pinned_version.py +0 -5
  179. pulumi_vault/policy.py +0 -5
  180. pulumi_vault/provider.py +0 -5
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +0 -5
  183. pulumi_vault/quota_rate_limit.py +0 -5
  184. pulumi_vault/rabbitmq/_inputs.py +0 -61
  185. pulumi_vault/rabbitmq/outputs.py +0 -5
  186. pulumi_vault/rabbitmq/secret_backend.py +0 -5
  187. pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
  188. pulumi_vault/raft_autopilot.py +0 -5
  189. pulumi_vault/raft_snapshot_agent_config.py +0 -5
  190. pulumi_vault/rgp_policy.py +0 -5
  191. pulumi_vault/saml/auth_backend.py +0 -5
  192. pulumi_vault/saml/auth_backend_role.py +14 -19
  193. pulumi_vault/secrets/_inputs.py +0 -30
  194. pulumi_vault/secrets/outputs.py +0 -5
  195. pulumi_vault/secrets/sync_association.py +0 -5
  196. pulumi_vault/secrets/sync_aws_destination.py +14 -19
  197. pulumi_vault/secrets/sync_azure_destination.py +14 -19
  198. pulumi_vault/secrets/sync_config.py +0 -5
  199. pulumi_vault/secrets/sync_gcp_destination.py +14 -19
  200. pulumi_vault/secrets/sync_gh_destination.py +0 -5
  201. pulumi_vault/secrets/sync_github_apps.py +0 -5
  202. pulumi_vault/secrets/sync_vercel_destination.py +0 -5
  203. pulumi_vault/ssh/_inputs.py +0 -22
  204. pulumi_vault/ssh/outputs.py +0 -5
  205. pulumi_vault/ssh/secret_backend_ca.py +0 -5
  206. pulumi_vault/ssh/secret_backend_role.py +28 -33
  207. pulumi_vault/terraformcloud/secret_backend.py +0 -5
  208. pulumi_vault/terraformcloud/secret_creds.py +0 -5
  209. pulumi_vault/terraformcloud/secret_role.py +0 -5
  210. pulumi_vault/token.py +0 -5
  211. pulumi_vault/tokenauth/auth_backend_role.py +14 -5
  212. pulumi_vault/transform/alphabet.py +0 -5
  213. pulumi_vault/transform/get_decode.py +14 -38
  214. pulumi_vault/transform/get_encode.py +14 -38
  215. pulumi_vault/transform/role.py +0 -5
  216. pulumi_vault/transform/template.py +14 -19
  217. pulumi_vault/transform/transformation.py +0 -5
  218. pulumi_vault/transit/get_decrypt.py +4 -21
  219. pulumi_vault/transit/get_encrypt.py +4 -23
  220. pulumi_vault/transit/secret_backend_key.py +7 -12
  221. pulumi_vault/transit/secret_cache_config.py +0 -5
  222. {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/METADATA +2 -3
  223. pulumi_vault-6.4.0a1723454543.dist-info/RECORD +256 -0
  224. {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/WHEEL +1 -1
  225. pulumi_vault-6.3.2a1729803197.dist-info/RECORD +0 -256
  226. {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/top_level.txt +0 -0
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
@@ -22,7 +17,7 @@ class SecretBackendRoleArgs:
22
17
  backend: pulumi.Input[str],
23
18
  creation_statements: pulumi.Input[Sequence[pulumi.Input[str]]],
24
19
  db_name: pulumi.Input[str],
25
- credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
20
+ credential_config: Optional[pulumi.Input[Mapping[str, Any]]] = None,
26
21
  credential_type: Optional[pulumi.Input[str]] = None,
27
22
  default_ttl: Optional[pulumi.Input[int]] = None,
28
23
  max_ttl: Optional[pulumi.Input[int]] = None,
@@ -38,7 +33,7 @@ class SecretBackendRoleArgs:
38
33
  creating a user.
39
34
  :param pulumi.Input[str] db_name: The unique name of the database connection to use for
40
35
  the role.
41
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] credential_config: Specifies the configuration
36
+ :param pulumi.Input[Mapping[str, Any]] credential_config: Specifies the configuration
42
37
  for the given `credential_type`.
43
38
 
44
39
  The following options are available for each `credential_type` value:
@@ -123,7 +118,7 @@ class SecretBackendRoleArgs:
123
118
 
124
119
  @property
125
120
  @pulumi.getter(name="credentialConfig")
126
- def credential_config(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
121
+ def credential_config(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
127
122
  """
128
123
  Specifies the configuration
129
124
  for the given `credential_type`.
@@ -133,7 +128,7 @@ class SecretBackendRoleArgs:
133
128
  return pulumi.get(self, "credential_config")
134
129
 
135
130
  @credential_config.setter
136
- def credential_config(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
131
+ def credential_config(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
137
132
  pulumi.set(self, "credential_config", value)
138
133
 
139
134
  @property
@@ -248,7 +243,7 @@ class _SecretBackendRoleState:
248
243
  def __init__(__self__, *,
249
244
  backend: Optional[pulumi.Input[str]] = None,
250
245
  creation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
251
- credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
246
+ credential_config: Optional[pulumi.Input[Mapping[str, Any]]] = None,
252
247
  credential_type: Optional[pulumi.Input[str]] = None,
253
248
  db_name: Optional[pulumi.Input[str]] = None,
254
249
  default_ttl: Optional[pulumi.Input[int]] = None,
@@ -263,7 +258,7 @@ class _SecretBackendRoleState:
263
258
  :param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
264
259
  :param pulumi.Input[Sequence[pulumi.Input[str]]] creation_statements: The database statements to execute when
265
260
  creating a user.
266
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] credential_config: Specifies the configuration
261
+ :param pulumi.Input[Mapping[str, Any]] credential_config: Specifies the configuration
267
262
  for the given `credential_type`.
268
263
 
269
264
  The following options are available for each `credential_type` value:
@@ -340,7 +335,7 @@ class _SecretBackendRoleState:
340
335
 
341
336
  @property
342
337
  @pulumi.getter(name="credentialConfig")
343
- def credential_config(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
338
+ def credential_config(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
344
339
  """
345
340
  Specifies the configuration
346
341
  for the given `credential_type`.
@@ -350,7 +345,7 @@ class _SecretBackendRoleState:
350
345
  return pulumi.get(self, "credential_config")
351
346
 
352
347
  @credential_config.setter
353
- def credential_config(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
348
+ def credential_config(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
354
349
  pulumi.set(self, "credential_config", value)
355
350
 
356
351
  @property
@@ -480,7 +475,7 @@ class SecretBackendRole(pulumi.CustomResource):
480
475
  opts: Optional[pulumi.ResourceOptions] = None,
481
476
  backend: Optional[pulumi.Input[str]] = None,
482
477
  creation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
483
- credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
478
+ credential_config: Optional[pulumi.Input[Mapping[str, Any]]] = None,
484
479
  credential_type: Optional[pulumi.Input[str]] = None,
485
480
  db_name: Optional[pulumi.Input[str]] = None,
486
481
  default_ttl: Optional[pulumi.Input[int]] = None,
@@ -531,7 +526,7 @@ class SecretBackendRole(pulumi.CustomResource):
531
526
  :param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
532
527
  :param pulumi.Input[Sequence[pulumi.Input[str]]] creation_statements: The database statements to execute when
533
528
  creating a user.
534
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] credential_config: Specifies the configuration
529
+ :param pulumi.Input[Mapping[str, Any]] credential_config: Specifies the configuration
535
530
  for the given `credential_type`.
536
531
 
537
532
  The following options are available for each `credential_type` value:
@@ -614,7 +609,7 @@ class SecretBackendRole(pulumi.CustomResource):
614
609
  opts: Optional[pulumi.ResourceOptions] = None,
615
610
  backend: Optional[pulumi.Input[str]] = None,
616
611
  creation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
617
- credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
612
+ credential_config: Optional[pulumi.Input[Mapping[str, Any]]] = None,
618
613
  credential_type: Optional[pulumi.Input[str]] = None,
619
614
  db_name: Optional[pulumi.Input[str]] = None,
620
615
  default_ttl: Optional[pulumi.Input[int]] = None,
@@ -663,7 +658,7 @@ class SecretBackendRole(pulumi.CustomResource):
663
658
  opts: Optional[pulumi.ResourceOptions] = None,
664
659
  backend: Optional[pulumi.Input[str]] = None,
665
660
  creation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
666
- credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
661
+ credential_config: Optional[pulumi.Input[Mapping[str, Any]]] = None,
667
662
  credential_type: Optional[pulumi.Input[str]] = None,
668
663
  db_name: Optional[pulumi.Input[str]] = None,
669
664
  default_ttl: Optional[pulumi.Input[int]] = None,
@@ -683,7 +678,7 @@ class SecretBackendRole(pulumi.CustomResource):
683
678
  :param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
684
679
  :param pulumi.Input[Sequence[pulumi.Input[str]]] creation_statements: The database statements to execute when
685
680
  creating a user.
686
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] credential_config: Specifies the configuration
681
+ :param pulumi.Input[Mapping[str, Any]] credential_config: Specifies the configuration
687
682
  for the given `credential_type`.
688
683
 
689
684
  The following options are available for each `credential_type` value:
@@ -745,7 +740,7 @@ class SecretBackendRole(pulumi.CustomResource):
745
740
 
746
741
  @property
747
742
  @pulumi.getter(name="credentialConfig")
748
- def credential_config(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
743
+ def credential_config(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
749
744
  """
750
745
  Specifies the configuration
751
746
  for the given `credential_type`.
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
  from . import outputs
17
12
  from ._inputs import *
@@ -47,7 +42,7 @@ class SecretsMountArgs:
47
42
  mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]] = None,
48
43
  mysqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]] = None,
49
44
  namespace: Optional[pulumi.Input[str]] = None,
50
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
45
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
51
46
  oracles: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]] = None,
52
47
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
53
48
  plugin_version: Optional[pulumi.Input[str]] = None,
@@ -99,7 +94,7 @@ class SecretsMountArgs:
99
94
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]] mysqls: A nested block containing configuration options for MySQL connections.
100
95
  *See Configuration Options for more info*
101
96
  :param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
102
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
97
+ :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
103
98
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]] oracles: A nested block containing configuration options for Oracle connections.
104
99
  *See Configuration Options for more info*
105
100
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
@@ -516,14 +511,14 @@ class SecretsMountArgs:
516
511
 
517
512
  @property
518
513
  @pulumi.getter
519
- def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
514
+ def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
520
515
  """
521
516
  Specifies mount type specific options that are passed to the backend
522
517
  """
523
518
  return pulumi.get(self, "options")
524
519
 
525
520
  @options.setter
526
- def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
521
+ def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
527
522
  pulumi.set(self, "options", value)
528
523
 
529
524
  @property
@@ -671,7 +666,7 @@ class _SecretsMountState:
671
666
  mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]] = None,
672
667
  mysqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]] = None,
673
668
  namespace: Optional[pulumi.Input[str]] = None,
674
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
669
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
675
670
  oracles: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]] = None,
676
671
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
677
672
  path: Optional[pulumi.Input[str]] = None,
@@ -725,7 +720,7 @@ class _SecretsMountState:
725
720
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]] mysqls: A nested block containing configuration options for MySQL connections.
726
721
  *See Configuration Options for more info*
727
722
  :param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
728
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
723
+ :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
729
724
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]] oracles: A nested block containing configuration options for Oracle connections.
730
725
  *See Configuration Options for more info*
731
726
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
@@ -1160,14 +1155,14 @@ class _SecretsMountState:
1160
1155
 
1161
1156
  @property
1162
1157
  @pulumi.getter
1163
- def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
1158
+ def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
1164
1159
  """
1165
1160
  Specifies mount type specific options that are passed to the backend
1166
1161
  """
1167
1162
  return pulumi.get(self, "options")
1168
1163
 
1169
1164
  @options.setter
1170
- def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
1165
+ def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
1171
1166
  pulumi.set(self, "options", value)
1172
1167
 
1173
1168
  @property
@@ -1327,7 +1322,7 @@ class SecretsMount(pulumi.CustomResource):
1327
1322
  mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]]] = None,
1328
1323
  mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]]] = None,
1329
1324
  namespace: Optional[pulumi.Input[str]] = None,
1330
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1325
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1331
1326
  oracles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]]] = None,
1332
1327
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1333
1328
  path: Optional[pulumi.Input[str]] = None,
@@ -1431,7 +1426,7 @@ class SecretsMount(pulumi.CustomResource):
1431
1426
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]] mysqls: A nested block containing configuration options for MySQL connections.
1432
1427
  *See Configuration Options for more info*
1433
1428
  :param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
1434
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
1429
+ :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
1435
1430
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]] oracles: A nested block containing configuration options for Oracle connections.
1436
1431
  *See Configuration Options for more info*
1437
1432
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
@@ -1546,7 +1541,7 @@ class SecretsMount(pulumi.CustomResource):
1546
1541
  mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]]] = None,
1547
1542
  mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]]] = None,
1548
1543
  namespace: Optional[pulumi.Input[str]] = None,
1549
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1544
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1550
1545
  oracles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]]] = None,
1551
1546
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1552
1547
  path: Optional[pulumi.Input[str]] = None,
@@ -1643,7 +1638,7 @@ class SecretsMount(pulumi.CustomResource):
1643
1638
  mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]]] = None,
1644
1639
  mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]]] = None,
1645
1640
  namespace: Optional[pulumi.Input[str]] = None,
1646
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1641
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1647
1642
  oracles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]]] = None,
1648
1643
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1649
1644
  path: Optional[pulumi.Input[str]] = None,
@@ -1702,7 +1697,7 @@ class SecretsMount(pulumi.CustomResource):
1702
1697
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]] mysqls: A nested block containing configuration options for MySQL connections.
1703
1698
  *See Configuration Options for more info*
1704
1699
  :param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
1705
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
1700
+ :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
1706
1701
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]] oracles: A nested block containing configuration options for Oracle connections.
1707
1702
  *See Configuration Options for more info*
1708
1703
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
@@ -1996,7 +1991,7 @@ class SecretsMount(pulumi.CustomResource):
1996
1991
 
1997
1992
  @property
1998
1993
  @pulumi.getter
1999
- def options(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
1994
+ def options(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
2000
1995
  """
2001
1996
  Specifies mount type specific options that are passed to the backend
2002
1997
  """
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
 
17
12
  __all__ = ['EgpPolicyArgs', 'EgpPolicy']
@@ -4,53 +4,18 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
18
13
  'AuthBackendCustomEndpointArgs',
19
- 'AuthBackendCustomEndpointArgsDict',
20
14
  'AuthBackendTuneArgs',
21
- 'AuthBackendTuneArgsDict',
22
15
  'SecretRolesetBindingArgs',
23
- 'SecretRolesetBindingArgsDict',
24
16
  'SecretStaticAccountBindingArgs',
25
- 'SecretStaticAccountBindingArgsDict',
26
17
  ]
27
18
 
28
- MYPY = False
29
-
30
- if not MYPY:
31
- class AuthBackendCustomEndpointArgsDict(TypedDict):
32
- api: NotRequired[pulumi.Input[str]]
33
- """
34
- Replaces the service endpoint used in API requests to `https://www.googleapis.com`.
35
- """
36
- compute: NotRequired[pulumi.Input[str]]
37
- """
38
- Replaces the service endpoint used in API requests to `https://compute.googleapis.com`.
39
-
40
- The endpoint value provided for a given key has the form of `scheme://host:port`.
41
- The `scheme://` and `:port` portions of the endpoint value are optional.
42
- """
43
- crm: NotRequired[pulumi.Input[str]]
44
- """
45
- Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`.
46
- """
47
- iam: NotRequired[pulumi.Input[str]]
48
- """
49
- Replaces the service endpoint used in API requests to `https://iam.googleapis.com`.
50
- """
51
- elif False:
52
- AuthBackendCustomEndpointArgsDict: TypeAlias = Mapping[str, Any]
53
-
54
19
  @pulumi.input_type
55
20
  class AuthBackendCustomEndpointArgs:
56
21
  def __init__(__self__, *,
@@ -128,56 +93,6 @@ class AuthBackendCustomEndpointArgs:
128
93
  pulumi.set(self, "iam", value)
129
94
 
130
95
 
131
- if not MYPY:
132
- class AuthBackendTuneArgsDict(TypedDict):
133
- allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
134
- """
135
- List of headers to whitelist and allowing
136
- a plugin to include them in the response.
137
- """
138
- audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
139
- """
140
- Specifies the list of keys that will
141
- not be HMAC'd by audit devices in the request data object.
142
- """
143
- audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
144
- """
145
- Specifies the list of keys that will
146
- not be HMAC'd by audit devices in the response data object.
147
- """
148
- default_lease_ttl: NotRequired[pulumi.Input[str]]
149
- """
150
- Specifies the default time-to-live.
151
- If set, this overrides the global default.
152
- Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
153
- """
154
- listing_visibility: NotRequired[pulumi.Input[str]]
155
- """
156
- Specifies whether to show this mount in
157
- the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
158
- """
159
- max_lease_ttl: NotRequired[pulumi.Input[str]]
160
- """
161
- Specifies the maximum time-to-live.
162
- If set, this overrides the global default.
163
- Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
164
- """
165
- passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
166
- """
167
- List of headers to whitelist and
168
- pass from the request to the backend.
169
- """
170
- token_type: NotRequired[pulumi.Input[str]]
171
- """
172
- Specifies the type of tokens that should be returned by
173
- the mount. Valid values are "default-service", "default-batch", "service", "batch".
174
-
175
-
176
- For more details on the usage of each argument consult the [Vault GCP API documentation](https://www.vaultproject.io/api-docs/auth/gcp#configure).
177
- """
178
- elif False:
179
- AuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any]
180
-
181
96
  @pulumi.input_type
182
97
  class AuthBackendTuneArgs:
183
98
  def __init__(__self__, *,
@@ -339,19 +254,6 @@ class AuthBackendTuneArgs:
339
254
  pulumi.set(self, "token_type", value)
340
255
 
341
256
 
342
- if not MYPY:
343
- class SecretRolesetBindingArgsDict(TypedDict):
344
- resource: pulumi.Input[str]
345
- """
346
- Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different [formats](https://www.vaultproject.io/docs/secrets/gcp/index.html#roleset-bindings).
347
- """
348
- roles: pulumi.Input[Sequence[pulumi.Input[str]]]
349
- """
350
- List of [GCP IAM roles](https://cloud.google.com/iam/docs/understanding-roles) for the resource.
351
- """
352
- elif False:
353
- SecretRolesetBindingArgsDict: TypeAlias = Mapping[str, Any]
354
-
355
257
  @pulumi.input_type
356
258
  class SecretRolesetBindingArgs:
357
259
  def __init__(__self__, *,
@@ -389,19 +291,6 @@ class SecretRolesetBindingArgs:
389
291
  pulumi.set(self, "roles", value)
390
292
 
391
293
 
392
- if not MYPY:
393
- class SecretStaticAccountBindingArgsDict(TypedDict):
394
- resource: pulumi.Input[str]
395
- """
396
- Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different [formats](https://www.vaultproject.io/docs/secrets/gcp/index.html#bindings).
397
- """
398
- roles: pulumi.Input[Sequence[pulumi.Input[str]]]
399
- """
400
- List of [GCP IAM roles](https://cloud.google.com/iam/docs/understanding-roles) for the resource.
401
- """
402
- elif False:
403
- SecretStaticAccountBindingArgsDict: TypeAlias = Mapping[str, Any]
404
-
405
294
  @pulumi.input_type
406
295
  class SecretStaticAccountBindingArgs:
407
296
  def __init__(__self__, *,
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
  from . import outputs
17
12
  from ._inputs import *
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -398,6 +393,9 @@ def get_auth_backend_role(backend: Optional[str] = None,
398
393
  token_ttl=pulumi.get(__ret__, 'token_ttl'),
399
394
  token_type=pulumi.get(__ret__, 'token_type'),
400
395
  type=pulumi.get(__ret__, 'type'))
396
+
397
+
398
+ @_utilities.lift_output_func(get_auth_backend_role)
401
399
  def get_auth_backend_role_output(backend: Optional[pulumi.Input[Optional[str]]] = None,
402
400
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
403
401
  role_name: Optional[pulumi.Input[str]] = None,
@@ -460,40 +458,4 @@ def get_auth_backend_role_output(backend: Optional[pulumi.Input[Optional[str]]]
460
458
  `default-service` and `default-batch` which specify the type to return unless the client
461
459
  requests a different type at generation time.
462
460
  """
463
- __args__ = dict()
464
- __args__['backend'] = backend
465
- __args__['namespace'] = namespace
466
- __args__['roleName'] = role_name
467
- __args__['tokenBoundCidrs'] = token_bound_cidrs
468
- __args__['tokenExplicitMaxTtl'] = token_explicit_max_ttl
469
- __args__['tokenMaxTtl'] = token_max_ttl
470
- __args__['tokenNoDefaultPolicy'] = token_no_default_policy
471
- __args__['tokenNumUses'] = token_num_uses
472
- __args__['tokenPeriod'] = token_period
473
- __args__['tokenPolicies'] = token_policies
474
- __args__['tokenTtl'] = token_ttl
475
- __args__['tokenType'] = token_type
476
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
477
- __ret__ = pulumi.runtime.invoke_output('vault:gcp/getAuthBackendRole:getAuthBackendRole', __args__, opts=opts, typ=GetAuthBackendRoleResult)
478
- return __ret__.apply(lambda __response__: GetAuthBackendRoleResult(
479
- backend=pulumi.get(__response__, 'backend'),
480
- bound_instance_groups=pulumi.get(__response__, 'bound_instance_groups'),
481
- bound_labels=pulumi.get(__response__, 'bound_labels'),
482
- bound_projects=pulumi.get(__response__, 'bound_projects'),
483
- bound_regions=pulumi.get(__response__, 'bound_regions'),
484
- bound_service_accounts=pulumi.get(__response__, 'bound_service_accounts'),
485
- bound_zones=pulumi.get(__response__, 'bound_zones'),
486
- id=pulumi.get(__response__, 'id'),
487
- namespace=pulumi.get(__response__, 'namespace'),
488
- role_id=pulumi.get(__response__, 'role_id'),
489
- role_name=pulumi.get(__response__, 'role_name'),
490
- token_bound_cidrs=pulumi.get(__response__, 'token_bound_cidrs'),
491
- token_explicit_max_ttl=pulumi.get(__response__, 'token_explicit_max_ttl'),
492
- token_max_ttl=pulumi.get(__response__, 'token_max_ttl'),
493
- token_no_default_policy=pulumi.get(__response__, 'token_no_default_policy'),
494
- token_num_uses=pulumi.get(__response__, 'token_num_uses'),
495
- token_period=pulumi.get(__response__, 'token_period'),
496
- token_policies=pulumi.get(__response__, 'token_policies'),
497
- token_ttl=pulumi.get(__response__, 'token_ttl'),
498
- token_type=pulumi.get(__response__, 'token_type'),
499
- type=pulumi.get(__response__, 'type')))
461
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretBackendArgs', 'SecretBackend']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretImpersonatedAccountArgs', 'SecretImpersonatedAccount']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
  from . import outputs
17
12
  from ._inputs import *
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
  from . import outputs
17
12
  from ._inputs import *
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['EndpointArgs', 'Endpoint']