pulumi-vault 6.3.2a1729803197__py3-none-any.whl → 6.4.0a1723454543__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +0 -560
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +4 -19
  4. pulumi_vault/ad/secret_backend.py +0 -5
  5. pulumi_vault/ad/secret_library.py +0 -5
  6. pulumi_vault/ad/secret_role.py +0 -5
  7. pulumi_vault/alicloud/auth_backend_role.py +0 -5
  8. pulumi_vault/approle/auth_backend_login.py +0 -5
  9. pulumi_vault/approle/auth_backend_role.py +0 -5
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -5
  11. pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
  12. pulumi_vault/audit.py +0 -5
  13. pulumi_vault/audit_request_header.py +0 -5
  14. pulumi_vault/auth_backend.py +0 -5
  15. pulumi_vault/aws/auth_backend_cert.py +0 -5
  16. pulumi_vault/aws/auth_backend_client.py +0 -5
  17. pulumi_vault/aws/auth_backend_config_identity.py +0 -5
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
  19. pulumi_vault/aws/auth_backend_login.py +7 -12
  20. pulumi_vault/aws/auth_backend_role.py +0 -5
  21. pulumi_vault/aws/auth_backend_role_tag.py +0 -5
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
  23. pulumi_vault/aws/auth_backend_sts_role.py +0 -5
  24. pulumi_vault/aws/get_access_credentials.py +4 -31
  25. pulumi_vault/aws/get_static_access_credentials.py +4 -18
  26. pulumi_vault/aws/secret_backend.py +0 -5
  27. pulumi_vault/aws/secret_backend_role.py +0 -5
  28. pulumi_vault/aws/secret_backend_static_role.py +0 -5
  29. pulumi_vault/azure/_inputs.py +0 -24
  30. pulumi_vault/azure/auth_backend_config.py +0 -5
  31. pulumi_vault/azure/auth_backend_role.py +0 -5
  32. pulumi_vault/azure/backend.py +0 -5
  33. pulumi_vault/azure/backend_role.py +0 -5
  34. pulumi_vault/azure/get_access_credentials.py +4 -36
  35. pulumi_vault/azure/outputs.py +0 -5
  36. pulumi_vault/cert_auth_backend_role.py +0 -5
  37. pulumi_vault/config/__init__.pyi +0 -5
  38. pulumi_vault/config/_inputs.py +0 -21
  39. pulumi_vault/config/outputs.py +0 -5
  40. pulumi_vault/config/ui_custom_message.py +14 -19
  41. pulumi_vault/config/vars.py +0 -5
  42. pulumi_vault/consul/secret_backend.py +0 -5
  43. pulumi_vault/consul/secret_backend_role.py +0 -5
  44. pulumi_vault/database/_inputs.py +105 -2056
  45. pulumi_vault/database/outputs.py +54 -59
  46. pulumi_vault/database/secret_backend_connection.py +14 -19
  47. pulumi_vault/database/secret_backend_role.py +14 -19
  48. pulumi_vault/database/secret_backend_static_role.py +0 -5
  49. pulumi_vault/database/secrets_mount.py +14 -19
  50. pulumi_vault/egp_policy.py +0 -5
  51. pulumi_vault/gcp/_inputs.py +0 -111
  52. pulumi_vault/gcp/auth_backend.py +0 -5
  53. pulumi_vault/gcp/auth_backend_role.py +0 -5
  54. pulumi_vault/gcp/get_auth_backend_role.py +4 -42
  55. pulumi_vault/gcp/outputs.py +0 -5
  56. pulumi_vault/gcp/secret_backend.py +0 -5
  57. pulumi_vault/gcp/secret_impersonated_account.py +0 -5
  58. pulumi_vault/gcp/secret_roleset.py +0 -5
  59. pulumi_vault/gcp/secret_static_account.py +0 -5
  60. pulumi_vault/generic/endpoint.py +0 -5
  61. pulumi_vault/generic/get_secret.py +5 -25
  62. pulumi_vault/generic/secret.py +7 -12
  63. pulumi_vault/get_auth_backend.py +4 -21
  64. pulumi_vault/get_auth_backends.py +4 -16
  65. pulumi_vault/get_namespace.py +5 -18
  66. pulumi_vault/get_namespaces.py +4 -13
  67. pulumi_vault/get_nomad_access_token.py +8 -28
  68. pulumi_vault/get_policy_document.py +4 -15
  69. pulumi_vault/get_raft_autopilot_state.py +7 -26
  70. pulumi_vault/github/_inputs.py +0 -55
  71. pulumi_vault/github/auth_backend.py +0 -5
  72. pulumi_vault/github/outputs.py +0 -5
  73. pulumi_vault/github/team.py +0 -5
  74. pulumi_vault/github/user.py +0 -5
  75. pulumi_vault/identity/entity.py +0 -5
  76. pulumi_vault/identity/entity_alias.py +0 -5
  77. pulumi_vault/identity/entity_policies.py +0 -5
  78. pulumi_vault/identity/get_entity.py +5 -35
  79. pulumi_vault/identity/get_group.py +6 -42
  80. pulumi_vault/identity/get_oidc_client_creds.py +4 -16
  81. pulumi_vault/identity/get_oidc_openid_config.py +4 -26
  82. pulumi_vault/identity/get_oidc_public_keys.py +5 -16
  83. pulumi_vault/identity/group.py +0 -5
  84. pulumi_vault/identity/group_alias.py +0 -5
  85. pulumi_vault/identity/group_member_entity_ids.py +0 -5
  86. pulumi_vault/identity/group_member_group_ids.py +0 -5
  87. pulumi_vault/identity/group_policies.py +0 -5
  88. pulumi_vault/identity/mfa_duo.py +0 -5
  89. pulumi_vault/identity/mfa_login_enforcement.py +0 -5
  90. pulumi_vault/identity/mfa_okta.py +0 -5
  91. pulumi_vault/identity/mfa_pingid.py +0 -5
  92. pulumi_vault/identity/mfa_totp.py +0 -5
  93. pulumi_vault/identity/oidc.py +0 -5
  94. pulumi_vault/identity/oidc_assignment.py +0 -5
  95. pulumi_vault/identity/oidc_client.py +0 -5
  96. pulumi_vault/identity/oidc_key.py +0 -5
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
  98. pulumi_vault/identity/oidc_provider.py +0 -5
  99. pulumi_vault/identity/oidc_role.py +0 -5
  100. pulumi_vault/identity/oidc_scope.py +0 -5
  101. pulumi_vault/identity/outputs.py +3 -8
  102. pulumi_vault/jwt/_inputs.py +0 -55
  103. pulumi_vault/jwt/auth_backend.py +0 -5
  104. pulumi_vault/jwt/auth_backend_role.py +28 -33
  105. pulumi_vault/jwt/outputs.py +0 -5
  106. pulumi_vault/kmip/secret_backend.py +0 -5
  107. pulumi_vault/kmip/secret_role.py +0 -5
  108. pulumi_vault/kmip/secret_scope.py +0 -5
  109. pulumi_vault/kubernetes/auth_backend_config.py +0 -5
  110. pulumi_vault/kubernetes/auth_backend_role.py +0 -5
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +4 -26
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
  113. pulumi_vault/kubernetes/get_service_account_token.py +4 -28
  114. pulumi_vault/kubernetes/secret_backend.py +14 -19
  115. pulumi_vault/kubernetes/secret_backend_role.py +0 -5
  116. pulumi_vault/kv/_inputs.py +4 -36
  117. pulumi_vault/kv/get_secret.py +5 -20
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +5 -24
  119. pulumi_vault/kv/get_secret_v2.py +6 -27
  120. pulumi_vault/kv/get_secrets_list.py +4 -15
  121. pulumi_vault/kv/get_secrets_list_v2.py +4 -18
  122. pulumi_vault/kv/outputs.py +3 -8
  123. pulumi_vault/kv/secret.py +7 -12
  124. pulumi_vault/kv/secret_backend_v2.py +0 -5
  125. pulumi_vault/kv/secret_v2.py +28 -33
  126. pulumi_vault/ldap/auth_backend.py +0 -5
  127. pulumi_vault/ldap/auth_backend_group.py +0 -5
  128. pulumi_vault/ldap/auth_backend_user.py +0 -5
  129. pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
  130. pulumi_vault/ldap/get_static_credentials.py +4 -23
  131. pulumi_vault/ldap/secret_backend.py +14 -19
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
  133. pulumi_vault/ldap/secret_backend_library_set.py +0 -5
  134. pulumi_vault/ldap/secret_backend_static_role.py +0 -5
  135. pulumi_vault/managed/_inputs.py +0 -205
  136. pulumi_vault/managed/keys.py +0 -5
  137. pulumi_vault/managed/outputs.py +0 -5
  138. pulumi_vault/mfa_duo.py +0 -5
  139. pulumi_vault/mfa_okta.py +0 -5
  140. pulumi_vault/mfa_pingid.py +0 -5
  141. pulumi_vault/mfa_totp.py +0 -5
  142. pulumi_vault/mongodbatlas/secret_backend.py +0 -5
  143. pulumi_vault/mongodbatlas/secret_role.py +0 -5
  144. pulumi_vault/mount.py +16 -21
  145. pulumi_vault/namespace.py +14 -19
  146. pulumi_vault/nomad_secret_backend.py +0 -5
  147. pulumi_vault/nomad_secret_role.py +0 -5
  148. pulumi_vault/okta/_inputs.py +0 -39
  149. pulumi_vault/okta/auth_backend.py +0 -5
  150. pulumi_vault/okta/auth_backend_group.py +0 -5
  151. pulumi_vault/okta/auth_backend_user.py +0 -5
  152. pulumi_vault/okta/outputs.py +0 -5
  153. pulumi_vault/outputs.py +0 -5
  154. pulumi_vault/password_policy.py +0 -5
  155. pulumi_vault/pkisecret/_inputs.py +8 -49
  156. pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
  157. pulumi_vault/pkisecret/backend_config_est.py +14 -19
  158. pulumi_vault/pkisecret/get_backend_config_est.py +5 -23
  159. pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
  160. pulumi_vault/pkisecret/get_backend_issuers.py +5 -18
  161. pulumi_vault/pkisecret/get_backend_key.py +4 -19
  162. pulumi_vault/pkisecret/get_backend_keys.py +5 -18
  163. pulumi_vault/pkisecret/outputs.py +12 -17
  164. pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
  172. pulumi_vault/pkisecret/secret_backend_key.py +0 -5
  173. pulumi_vault/pkisecret/secret_backend_role.py +0 -5
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
  176. pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
  177. pulumi_vault/plugin.py +0 -5
  178. pulumi_vault/plugin_pinned_version.py +0 -5
  179. pulumi_vault/policy.py +0 -5
  180. pulumi_vault/provider.py +0 -5
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +0 -5
  183. pulumi_vault/quota_rate_limit.py +0 -5
  184. pulumi_vault/rabbitmq/_inputs.py +0 -61
  185. pulumi_vault/rabbitmq/outputs.py +0 -5
  186. pulumi_vault/rabbitmq/secret_backend.py +0 -5
  187. pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
  188. pulumi_vault/raft_autopilot.py +0 -5
  189. pulumi_vault/raft_snapshot_agent_config.py +0 -5
  190. pulumi_vault/rgp_policy.py +0 -5
  191. pulumi_vault/saml/auth_backend.py +0 -5
  192. pulumi_vault/saml/auth_backend_role.py +14 -19
  193. pulumi_vault/secrets/_inputs.py +0 -30
  194. pulumi_vault/secrets/outputs.py +0 -5
  195. pulumi_vault/secrets/sync_association.py +0 -5
  196. pulumi_vault/secrets/sync_aws_destination.py +14 -19
  197. pulumi_vault/secrets/sync_azure_destination.py +14 -19
  198. pulumi_vault/secrets/sync_config.py +0 -5
  199. pulumi_vault/secrets/sync_gcp_destination.py +14 -19
  200. pulumi_vault/secrets/sync_gh_destination.py +0 -5
  201. pulumi_vault/secrets/sync_github_apps.py +0 -5
  202. pulumi_vault/secrets/sync_vercel_destination.py +0 -5
  203. pulumi_vault/ssh/_inputs.py +0 -22
  204. pulumi_vault/ssh/outputs.py +0 -5
  205. pulumi_vault/ssh/secret_backend_ca.py +0 -5
  206. pulumi_vault/ssh/secret_backend_role.py +28 -33
  207. pulumi_vault/terraformcloud/secret_backend.py +0 -5
  208. pulumi_vault/terraformcloud/secret_creds.py +0 -5
  209. pulumi_vault/terraformcloud/secret_role.py +0 -5
  210. pulumi_vault/token.py +0 -5
  211. pulumi_vault/tokenauth/auth_backend_role.py +14 -5
  212. pulumi_vault/transform/alphabet.py +0 -5
  213. pulumi_vault/transform/get_decode.py +14 -38
  214. pulumi_vault/transform/get_encode.py +14 -38
  215. pulumi_vault/transform/role.py +0 -5
  216. pulumi_vault/transform/template.py +14 -19
  217. pulumi_vault/transform/transformation.py +0 -5
  218. pulumi_vault/transit/get_decrypt.py +4 -21
  219. pulumi_vault/transit/get_encrypt.py +4 -23
  220. pulumi_vault/transit/secret_backend_key.py +7 -12
  221. pulumi_vault/transit/secret_cache_config.py +0 -5
  222. {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/METADATA +2 -3
  223. pulumi_vault-6.4.0a1723454543.dist-info/RECORD +256 -0
  224. {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/WHEEL +1 -1
  225. pulumi_vault-6.3.2a1729803197.dist-info/RECORD +0 -256
  226. {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/top_level.txt +0 -0
@@ -4,70 +4,15 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
18
13
  'AuthBackendTuneArgs',
19
- 'AuthBackendTuneArgsDict',
20
14
  ]
21
15
 
22
- MYPY = False
23
-
24
- if not MYPY:
25
- class AuthBackendTuneArgsDict(TypedDict):
26
- allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
27
- """
28
- List of headers to whitelist and allowing
29
- a plugin to include them in the response.
30
- """
31
- audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
32
- """
33
- Specifies the list of keys that will
34
- not be HMAC'd by audit devices in the request data object.
35
- """
36
- audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
37
- """
38
- Specifies the list of keys that will
39
- not be HMAC'd by audit devices in the response data object.
40
- """
41
- default_lease_ttl: NotRequired[pulumi.Input[str]]
42
- """
43
- Specifies the default time-to-live.
44
- If set, this overrides the global default.
45
- Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
46
- """
47
- listing_visibility: NotRequired[pulumi.Input[str]]
48
- """
49
- Specifies whether to show this mount in
50
- the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
51
- """
52
- max_lease_ttl: NotRequired[pulumi.Input[str]]
53
- """
54
- Specifies the maximum time-to-live.
55
- If set, this overrides the global default.
56
- Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
57
- """
58
- passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
59
- """
60
- List of headers to whitelist and
61
- pass from the request to the backend.
62
- """
63
- token_type: NotRequired[pulumi.Input[str]]
64
- """
65
- Specifies the type of tokens that should be returned by
66
- the mount. Valid values are "default-service", "default-batch", "service", "batch".
67
- """
68
- elif False:
69
- AuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any]
70
-
71
16
  @pulumi.input_type
72
17
  class AuthBackendTuneArgs:
73
18
  def __init__(__self__, *,
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
  from . import outputs
17
12
  from ._inputs import *
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
@@ -24,10 +19,10 @@ class AuthBackendRoleArgs:
24
19
  allowed_redirect_uris: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
25
20
  backend: Optional[pulumi.Input[str]] = None,
26
21
  bound_audiences: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
27
- bound_claims: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
22
+ bound_claims: Optional[pulumi.Input[Mapping[str, Any]]] = None,
28
23
  bound_claims_type: Optional[pulumi.Input[str]] = None,
29
24
  bound_subject: Optional[pulumi.Input[str]] = None,
30
- claim_mappings: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
25
+ claim_mappings: Optional[pulumi.Input[Mapping[str, Any]]] = None,
31
26
  clock_skew_leeway: Optional[pulumi.Input[int]] = None,
32
27
  disable_bound_claims_parsing: Optional[pulumi.Input[bool]] = None,
33
28
  expiration_leeway: Optional[pulumi.Input[int]] = None,
@@ -60,7 +55,7 @@ class AuthBackendRoleArgs:
60
55
  Defaults to `jwt`.
61
56
  :param pulumi.Input[Sequence[pulumi.Input[str]]] bound_audiences: (Required for roles of type `jwt`, optional for roles of
62
57
  type `oidc`) List of `aud` claims to match against. Any match is sufficient.
63
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] bound_claims: If set, a map of claims to values to match against.
58
+ :param pulumi.Input[Mapping[str, Any]] bound_claims: If set, a map of claims to values to match against.
64
59
  A claim's value must be a string, which may contain one value or multiple
65
60
  comma-separated values, e.g. `"red"` or `"red,green,blue"`.
66
61
  :param pulumi.Input[str] bound_claims_type: How to interpret values in the claims/values
@@ -68,7 +63,7 @@ class AuthBackendRoleArgs:
68
63
  match). Requires Vault 1.4.0 or above.
69
64
  :param pulumi.Input[str] bound_subject: If set, requires that the `sub` claim matches
70
65
  this value.
71
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] claim_mappings: If set, a map of claims (keys) to be copied
66
+ :param pulumi.Input[Mapping[str, Any]] claim_mappings: If set, a map of claims (keys) to be copied
72
67
  to specified metadata fields (values).
73
68
  :param pulumi.Input[int] clock_skew_leeway: The amount of leeway to add to all claims to account for clock skew, in
74
69
  seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
@@ -234,7 +229,7 @@ class AuthBackendRoleArgs:
234
229
 
235
230
  @property
236
231
  @pulumi.getter(name="boundClaims")
237
- def bound_claims(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
232
+ def bound_claims(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
238
233
  """
239
234
  If set, a map of claims to values to match against.
240
235
  A claim's value must be a string, which may contain one value or multiple
@@ -243,7 +238,7 @@ class AuthBackendRoleArgs:
243
238
  return pulumi.get(self, "bound_claims")
244
239
 
245
240
  @bound_claims.setter
246
- def bound_claims(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
241
+ def bound_claims(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
247
242
  pulumi.set(self, "bound_claims", value)
248
243
 
249
244
  @property
@@ -275,7 +270,7 @@ class AuthBackendRoleArgs:
275
270
 
276
271
  @property
277
272
  @pulumi.getter(name="claimMappings")
278
- def claim_mappings(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
273
+ def claim_mappings(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
279
274
  """
280
275
  If set, a map of claims (keys) to be copied
281
276
  to specified metadata fields (values).
@@ -283,7 +278,7 @@ class AuthBackendRoleArgs:
283
278
  return pulumi.get(self, "claim_mappings")
284
279
 
285
280
  @claim_mappings.setter
286
- def claim_mappings(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
281
+ def claim_mappings(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
287
282
  pulumi.set(self, "claim_mappings", value)
288
283
 
289
284
  @property
@@ -552,10 +547,10 @@ class _AuthBackendRoleState:
552
547
  allowed_redirect_uris: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
553
548
  backend: Optional[pulumi.Input[str]] = None,
554
549
  bound_audiences: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
555
- bound_claims: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
550
+ bound_claims: Optional[pulumi.Input[Mapping[str, Any]]] = None,
556
551
  bound_claims_type: Optional[pulumi.Input[str]] = None,
557
552
  bound_subject: Optional[pulumi.Input[str]] = None,
558
- claim_mappings: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
553
+ claim_mappings: Optional[pulumi.Input[Mapping[str, Any]]] = None,
559
554
  clock_skew_leeway: Optional[pulumi.Input[int]] = None,
560
555
  disable_bound_claims_parsing: Optional[pulumi.Input[bool]] = None,
561
556
  expiration_leeway: Optional[pulumi.Input[int]] = None,
@@ -586,7 +581,7 @@ class _AuthBackendRoleState:
586
581
  Defaults to `jwt`.
587
582
  :param pulumi.Input[Sequence[pulumi.Input[str]]] bound_audiences: (Required for roles of type `jwt`, optional for roles of
588
583
  type `oidc`) List of `aud` claims to match against. Any match is sufficient.
589
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] bound_claims: If set, a map of claims to values to match against.
584
+ :param pulumi.Input[Mapping[str, Any]] bound_claims: If set, a map of claims to values to match against.
590
585
  A claim's value must be a string, which may contain one value or multiple
591
586
  comma-separated values, e.g. `"red"` or `"red,green,blue"`.
592
587
  :param pulumi.Input[str] bound_claims_type: How to interpret values in the claims/values
@@ -594,7 +589,7 @@ class _AuthBackendRoleState:
594
589
  match). Requires Vault 1.4.0 or above.
595
590
  :param pulumi.Input[str] bound_subject: If set, requires that the `sub` claim matches
596
591
  this value.
597
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] claim_mappings: If set, a map of claims (keys) to be copied
592
+ :param pulumi.Input[Mapping[str, Any]] claim_mappings: If set, a map of claims (keys) to be copied
598
593
  to specified metadata fields (values).
599
594
  :param pulumi.Input[int] clock_skew_leeway: The amount of leeway to add to all claims to account for clock skew, in
600
595
  seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
@@ -740,7 +735,7 @@ class _AuthBackendRoleState:
740
735
 
741
736
  @property
742
737
  @pulumi.getter(name="boundClaims")
743
- def bound_claims(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
738
+ def bound_claims(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
744
739
  """
745
740
  If set, a map of claims to values to match against.
746
741
  A claim's value must be a string, which may contain one value or multiple
@@ -749,7 +744,7 @@ class _AuthBackendRoleState:
749
744
  return pulumi.get(self, "bound_claims")
750
745
 
751
746
  @bound_claims.setter
752
- def bound_claims(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
747
+ def bound_claims(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
753
748
  pulumi.set(self, "bound_claims", value)
754
749
 
755
750
  @property
@@ -781,7 +776,7 @@ class _AuthBackendRoleState:
781
776
 
782
777
  @property
783
778
  @pulumi.getter(name="claimMappings")
784
- def claim_mappings(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
779
+ def claim_mappings(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
785
780
  """
786
781
  If set, a map of claims (keys) to be copied
787
782
  to specified metadata fields (values).
@@ -789,7 +784,7 @@ class _AuthBackendRoleState:
789
784
  return pulumi.get(self, "claim_mappings")
790
785
 
791
786
  @claim_mappings.setter
792
- def claim_mappings(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
787
+ def claim_mappings(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
793
788
  pulumi.set(self, "claim_mappings", value)
794
789
 
795
790
  @property
@@ -1086,10 +1081,10 @@ class AuthBackendRole(pulumi.CustomResource):
1086
1081
  allowed_redirect_uris: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1087
1082
  backend: Optional[pulumi.Input[str]] = None,
1088
1083
  bound_audiences: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1089
- bound_claims: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1084
+ bound_claims: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1090
1085
  bound_claims_type: Optional[pulumi.Input[str]] = None,
1091
1086
  bound_subject: Optional[pulumi.Input[str]] = None,
1092
- claim_mappings: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1087
+ claim_mappings: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1093
1088
  clock_skew_leeway: Optional[pulumi.Input[int]] = None,
1094
1089
  disable_bound_claims_parsing: Optional[pulumi.Input[bool]] = None,
1095
1090
  expiration_leeway: Optional[pulumi.Input[int]] = None,
@@ -1181,7 +1176,7 @@ class AuthBackendRole(pulumi.CustomResource):
1181
1176
  Defaults to `jwt`.
1182
1177
  :param pulumi.Input[Sequence[pulumi.Input[str]]] bound_audiences: (Required for roles of type `jwt`, optional for roles of
1183
1178
  type `oidc`) List of `aud` claims to match against. Any match is sufficient.
1184
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] bound_claims: If set, a map of claims to values to match against.
1179
+ :param pulumi.Input[Mapping[str, Any]] bound_claims: If set, a map of claims to values to match against.
1185
1180
  A claim's value must be a string, which may contain one value or multiple
1186
1181
  comma-separated values, e.g. `"red"` or `"red,green,blue"`.
1187
1182
  :param pulumi.Input[str] bound_claims_type: How to interpret values in the claims/values
@@ -1189,7 +1184,7 @@ class AuthBackendRole(pulumi.CustomResource):
1189
1184
  match). Requires Vault 1.4.0 or above.
1190
1185
  :param pulumi.Input[str] bound_subject: If set, requires that the `sub` claim matches
1191
1186
  this value.
1192
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] claim_mappings: If set, a map of claims (keys) to be copied
1187
+ :param pulumi.Input[Mapping[str, Any]] claim_mappings: If set, a map of claims (keys) to be copied
1193
1188
  to specified metadata fields (values).
1194
1189
  :param pulumi.Input[int] clock_skew_leeway: The amount of leeway to add to all claims to account for clock skew, in
1195
1190
  seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
@@ -1319,10 +1314,10 @@ class AuthBackendRole(pulumi.CustomResource):
1319
1314
  allowed_redirect_uris: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1320
1315
  backend: Optional[pulumi.Input[str]] = None,
1321
1316
  bound_audiences: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1322
- bound_claims: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1317
+ bound_claims: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1323
1318
  bound_claims_type: Optional[pulumi.Input[str]] = None,
1324
1319
  bound_subject: Optional[pulumi.Input[str]] = None,
1325
- claim_mappings: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1320
+ claim_mappings: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1326
1321
  clock_skew_leeway: Optional[pulumi.Input[int]] = None,
1327
1322
  disable_bound_claims_parsing: Optional[pulumi.Input[bool]] = None,
1328
1323
  expiration_leeway: Optional[pulumi.Input[int]] = None,
@@ -1400,10 +1395,10 @@ class AuthBackendRole(pulumi.CustomResource):
1400
1395
  allowed_redirect_uris: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1401
1396
  backend: Optional[pulumi.Input[str]] = None,
1402
1397
  bound_audiences: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1403
- bound_claims: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1398
+ bound_claims: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1404
1399
  bound_claims_type: Optional[pulumi.Input[str]] = None,
1405
1400
  bound_subject: Optional[pulumi.Input[str]] = None,
1406
- claim_mappings: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1401
+ claim_mappings: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1407
1402
  clock_skew_leeway: Optional[pulumi.Input[int]] = None,
1408
1403
  disable_bound_claims_parsing: Optional[pulumi.Input[bool]] = None,
1409
1404
  expiration_leeway: Optional[pulumi.Input[int]] = None,
@@ -1439,7 +1434,7 @@ class AuthBackendRole(pulumi.CustomResource):
1439
1434
  Defaults to `jwt`.
1440
1435
  :param pulumi.Input[Sequence[pulumi.Input[str]]] bound_audiences: (Required for roles of type `jwt`, optional for roles of
1441
1436
  type `oidc`) List of `aud` claims to match against. Any match is sufficient.
1442
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] bound_claims: If set, a map of claims to values to match against.
1437
+ :param pulumi.Input[Mapping[str, Any]] bound_claims: If set, a map of claims to values to match against.
1443
1438
  A claim's value must be a string, which may contain one value or multiple
1444
1439
  comma-separated values, e.g. `"red"` or `"red,green,blue"`.
1445
1440
  :param pulumi.Input[str] bound_claims_type: How to interpret values in the claims/values
@@ -1447,7 +1442,7 @@ class AuthBackendRole(pulumi.CustomResource):
1447
1442
  match). Requires Vault 1.4.0 or above.
1448
1443
  :param pulumi.Input[str] bound_subject: If set, requires that the `sub` claim matches
1449
1444
  this value.
1450
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] claim_mappings: If set, a map of claims (keys) to be copied
1445
+ :param pulumi.Input[Mapping[str, Any]] claim_mappings: If set, a map of claims (keys) to be copied
1451
1446
  to specified metadata fields (values).
1452
1447
  :param pulumi.Input[int] clock_skew_leeway: The amount of leeway to add to all claims to account for clock skew, in
1453
1448
  seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
@@ -1557,7 +1552,7 @@ class AuthBackendRole(pulumi.CustomResource):
1557
1552
 
1558
1553
  @property
1559
1554
  @pulumi.getter(name="boundClaims")
1560
- def bound_claims(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
1555
+ def bound_claims(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
1561
1556
  """
1562
1557
  If set, a map of claims to values to match against.
1563
1558
  A claim's value must be a string, which may contain one value or multiple
@@ -1586,7 +1581,7 @@ class AuthBackendRole(pulumi.CustomResource):
1586
1581
 
1587
1582
  @property
1588
1583
  @pulumi.getter(name="claimMappings")
1589
- def claim_mappings(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
1584
+ def claim_mappings(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
1590
1585
  """
1591
1586
  If set, a map of claims (keys) to be copied
1592
1587
  to specified metadata fields (values).
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretBackendArgs', 'SecretBackend']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretRoleArgs', 'SecretRole']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretScopeArgs', 'SecretScope']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['AuthBackendConfigArgs', 'AuthBackendConfig']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -181,6 +176,9 @@ def get_auth_backend_config(backend: Optional[str] = None,
181
176
  kubernetes_host=pulumi.get(__ret__, 'kubernetes_host'),
182
177
  namespace=pulumi.get(__ret__, 'namespace'),
183
178
  pem_keys=pulumi.get(__ret__, 'pem_keys'))
179
+
180
+
181
+ @_utilities.lift_output_func(get_auth_backend_config)
184
182
  def get_auth_backend_config_output(backend: Optional[pulumi.Input[Optional[str]]] = None,
185
183
  disable_iss_validation: Optional[pulumi.Input[Optional[bool]]] = None,
186
184
  disable_local_ca_jwt: Optional[pulumi.Input[Optional[bool]]] = None,
@@ -207,24 +205,4 @@ def get_auth_backend_config_output(backend: Optional[pulumi.Input[Optional[str]]
207
205
  *Available only for Vault Enterprise*.
208
206
  :param Sequence[str] pem_keys: Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
209
207
  """
210
- __args__ = dict()
211
- __args__['backend'] = backend
212
- __args__['disableIssValidation'] = disable_iss_validation
213
- __args__['disableLocalCaJwt'] = disable_local_ca_jwt
214
- __args__['issuer'] = issuer
215
- __args__['kubernetesCaCert'] = kubernetes_ca_cert
216
- __args__['kubernetesHost'] = kubernetes_host
217
- __args__['namespace'] = namespace
218
- __args__['pemKeys'] = pem_keys
219
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
220
- __ret__ = pulumi.runtime.invoke_output('vault:kubernetes/getAuthBackendConfig:getAuthBackendConfig', __args__, opts=opts, typ=GetAuthBackendConfigResult)
221
- return __ret__.apply(lambda __response__: GetAuthBackendConfigResult(
222
- backend=pulumi.get(__response__, 'backend'),
223
- disable_iss_validation=pulumi.get(__response__, 'disable_iss_validation'),
224
- disable_local_ca_jwt=pulumi.get(__response__, 'disable_local_ca_jwt'),
225
- id=pulumi.get(__response__, 'id'),
226
- issuer=pulumi.get(__response__, 'issuer'),
227
- kubernetes_ca_cert=pulumi.get(__response__, 'kubernetes_ca_cert'),
228
- kubernetes_host=pulumi.get(__response__, 'kubernetes_host'),
229
- namespace=pulumi.get(__response__, 'namespace'),
230
- pem_keys=pulumi.get(__response__, 'pem_keys')))
208
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -341,6 +336,9 @@ def get_auth_backend_role(audience: Optional[str] = None,
341
336
  token_policies=pulumi.get(__ret__, 'token_policies'),
342
337
  token_ttl=pulumi.get(__ret__, 'token_ttl'),
343
338
  token_type=pulumi.get(__ret__, 'token_type'))
339
+
340
+
341
+ @_utilities.lift_output_func(get_auth_backend_role)
344
342
  def get_auth_backend_role_output(audience: Optional[pulumi.Input[Optional[str]]] = None,
345
343
  backend: Optional[pulumi.Input[Optional[str]]] = None,
346
344
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
@@ -397,37 +395,4 @@ def get_auth_backend_role_output(audience: Optional[pulumi.Input[Optional[str]]]
397
395
  `default-service` and `default-batch` which specify the type to return unless the client
398
396
  requests a different type at generation time.
399
397
  """
400
- __args__ = dict()
401
- __args__['audience'] = audience
402
- __args__['backend'] = backend
403
- __args__['namespace'] = namespace
404
- __args__['roleName'] = role_name
405
- __args__['tokenBoundCidrs'] = token_bound_cidrs
406
- __args__['tokenExplicitMaxTtl'] = token_explicit_max_ttl
407
- __args__['tokenMaxTtl'] = token_max_ttl
408
- __args__['tokenNoDefaultPolicy'] = token_no_default_policy
409
- __args__['tokenNumUses'] = token_num_uses
410
- __args__['tokenPeriod'] = token_period
411
- __args__['tokenPolicies'] = token_policies
412
- __args__['tokenTtl'] = token_ttl
413
- __args__['tokenType'] = token_type
414
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
415
- __ret__ = pulumi.runtime.invoke_output('vault:kubernetes/getAuthBackendRole:getAuthBackendRole', __args__, opts=opts, typ=GetAuthBackendRoleResult)
416
- return __ret__.apply(lambda __response__: GetAuthBackendRoleResult(
417
- alias_name_source=pulumi.get(__response__, 'alias_name_source'),
418
- audience=pulumi.get(__response__, 'audience'),
419
- backend=pulumi.get(__response__, 'backend'),
420
- bound_service_account_names=pulumi.get(__response__, 'bound_service_account_names'),
421
- bound_service_account_namespaces=pulumi.get(__response__, 'bound_service_account_namespaces'),
422
- id=pulumi.get(__response__, 'id'),
423
- namespace=pulumi.get(__response__, 'namespace'),
424
- role_name=pulumi.get(__response__, 'role_name'),
425
- token_bound_cidrs=pulumi.get(__response__, 'token_bound_cidrs'),
426
- token_explicit_max_ttl=pulumi.get(__response__, 'token_explicit_max_ttl'),
427
- token_max_ttl=pulumi.get(__response__, 'token_max_ttl'),
428
- token_no_default_policy=pulumi.get(__response__, 'token_no_default_policy'),
429
- token_num_uses=pulumi.get(__response__, 'token_num_uses'),
430
- token_period=pulumi.get(__response__, 'token_period'),
431
- token_policies=pulumi.get(__response__, 'token_policies'),
432
- token_ttl=pulumi.get(__response__, 'token_ttl'),
433
- token_type=pulumi.get(__response__, 'token_type')))
398
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -259,6 +254,9 @@ def get_service_account_token(backend: Optional[str] = None,
259
254
  service_account_namespace=pulumi.get(__ret__, 'service_account_namespace'),
260
255
  service_account_token=pulumi.get(__ret__, 'service_account_token'),
261
256
  ttl=pulumi.get(__ret__, 'ttl'))
257
+
258
+
259
+ @_utilities.lift_output_func(get_service_account_token)
262
260
  def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None,
263
261
  cluster_role_binding: Optional[pulumi.Input[Optional[bool]]] = None,
264
262
  kubernetes_namespace: Optional[pulumi.Input[str]] = None,
@@ -319,26 +317,4 @@ def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None
319
317
  :param str ttl: The TTL of the generated Kubernetes service account token, specified in
320
318
  seconds or as a Go duration format string.
321
319
  """
322
- __args__ = dict()
323
- __args__['backend'] = backend
324
- __args__['clusterRoleBinding'] = cluster_role_binding
325
- __args__['kubernetesNamespace'] = kubernetes_namespace
326
- __args__['namespace'] = namespace
327
- __args__['role'] = role
328
- __args__['ttl'] = ttl
329
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
330
- __ret__ = pulumi.runtime.invoke_output('vault:kubernetes/getServiceAccountToken:getServiceAccountToken', __args__, opts=opts, typ=GetServiceAccountTokenResult)
331
- return __ret__.apply(lambda __response__: GetServiceAccountTokenResult(
332
- backend=pulumi.get(__response__, 'backend'),
333
- cluster_role_binding=pulumi.get(__response__, 'cluster_role_binding'),
334
- id=pulumi.get(__response__, 'id'),
335
- kubernetes_namespace=pulumi.get(__response__, 'kubernetes_namespace'),
336
- lease_duration=pulumi.get(__response__, 'lease_duration'),
337
- lease_id=pulumi.get(__response__, 'lease_id'),
338
- lease_renewable=pulumi.get(__response__, 'lease_renewable'),
339
- namespace=pulumi.get(__response__, 'namespace'),
340
- role=pulumi.get(__response__, 'role'),
341
- service_account_name=pulumi.get(__response__, 'service_account_name'),
342
- service_account_namespace=pulumi.get(__response__, 'service_account_namespace'),
343
- service_account_token=pulumi.get(__response__, 'service_account_token'),
344
- ttl=pulumi.get(__response__, 'ttl')))
320
+ ...