pulumi-vault 6.4.0__py3-none-any.whl → 6.4.0a1723454543__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +0 -560
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +4 -19
  4. pulumi_vault/ad/secret_backend.py +0 -5
  5. pulumi_vault/ad/secret_library.py +0 -5
  6. pulumi_vault/ad/secret_role.py +0 -5
  7. pulumi_vault/alicloud/auth_backend_role.py +0 -5
  8. pulumi_vault/approle/auth_backend_login.py +0 -5
  9. pulumi_vault/approle/auth_backend_role.py +0 -5
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -99
  11. pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
  12. pulumi_vault/audit.py +0 -5
  13. pulumi_vault/audit_request_header.py +0 -5
  14. pulumi_vault/auth_backend.py +0 -5
  15. pulumi_vault/aws/auth_backend_cert.py +0 -5
  16. pulumi_vault/aws/auth_backend_client.py +0 -5
  17. pulumi_vault/aws/auth_backend_config_identity.py +0 -5
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
  19. pulumi_vault/aws/auth_backend_login.py +7 -12
  20. pulumi_vault/aws/auth_backend_role.py +0 -5
  21. pulumi_vault/aws/auth_backend_role_tag.py +0 -5
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
  23. pulumi_vault/aws/auth_backend_sts_role.py +0 -5
  24. pulumi_vault/aws/get_access_credentials.py +4 -31
  25. pulumi_vault/aws/get_static_access_credentials.py +4 -18
  26. pulumi_vault/aws/secret_backend.py +0 -5
  27. pulumi_vault/aws/secret_backend_role.py +0 -5
  28. pulumi_vault/aws/secret_backend_static_role.py +0 -5
  29. pulumi_vault/azure/_inputs.py +0 -24
  30. pulumi_vault/azure/auth_backend_config.py +0 -5
  31. pulumi_vault/azure/auth_backend_role.py +0 -5
  32. pulumi_vault/azure/backend.py +0 -5
  33. pulumi_vault/azure/backend_role.py +0 -5
  34. pulumi_vault/azure/get_access_credentials.py +4 -36
  35. pulumi_vault/azure/outputs.py +0 -5
  36. pulumi_vault/cert_auth_backend_role.py +0 -5
  37. pulumi_vault/config/__init__.pyi +0 -5
  38. pulumi_vault/config/_inputs.py +0 -21
  39. pulumi_vault/config/outputs.py +0 -5
  40. pulumi_vault/config/ui_custom_message.py +14 -19
  41. pulumi_vault/config/vars.py +0 -5
  42. pulumi_vault/consul/secret_backend.py +0 -5
  43. pulumi_vault/consul/secret_backend_role.py +0 -5
  44. pulumi_vault/database/_inputs.py +105 -2256
  45. pulumi_vault/database/outputs.py +54 -199
  46. pulumi_vault/database/secret_backend_connection.py +14 -19
  47. pulumi_vault/database/secret_backend_role.py +14 -19
  48. pulumi_vault/database/secret_backend_static_role.py +1 -69
  49. pulumi_vault/database/secrets_mount.py +14 -19
  50. pulumi_vault/egp_policy.py +0 -5
  51. pulumi_vault/gcp/_inputs.py +0 -111
  52. pulumi_vault/gcp/auth_backend.py +0 -5
  53. pulumi_vault/gcp/auth_backend_role.py +0 -5
  54. pulumi_vault/gcp/get_auth_backend_role.py +4 -42
  55. pulumi_vault/gcp/outputs.py +0 -5
  56. pulumi_vault/gcp/secret_backend.py +0 -5
  57. pulumi_vault/gcp/secret_impersonated_account.py +3 -62
  58. pulumi_vault/gcp/secret_roleset.py +0 -5
  59. pulumi_vault/gcp/secret_static_account.py +0 -5
  60. pulumi_vault/generic/endpoint.py +0 -5
  61. pulumi_vault/generic/get_secret.py +5 -25
  62. pulumi_vault/generic/secret.py +7 -12
  63. pulumi_vault/get_auth_backend.py +4 -21
  64. pulumi_vault/get_auth_backends.py +4 -16
  65. pulumi_vault/get_namespace.py +5 -18
  66. pulumi_vault/get_namespaces.py +4 -13
  67. pulumi_vault/get_nomad_access_token.py +8 -28
  68. pulumi_vault/get_policy_document.py +4 -15
  69. pulumi_vault/get_raft_autopilot_state.py +7 -26
  70. pulumi_vault/github/_inputs.py +0 -55
  71. pulumi_vault/github/auth_backend.py +0 -5
  72. pulumi_vault/github/outputs.py +0 -5
  73. pulumi_vault/github/team.py +0 -5
  74. pulumi_vault/github/user.py +0 -5
  75. pulumi_vault/identity/entity.py +0 -5
  76. pulumi_vault/identity/entity_alias.py +0 -5
  77. pulumi_vault/identity/entity_policies.py +0 -5
  78. pulumi_vault/identity/get_entity.py +5 -35
  79. pulumi_vault/identity/get_group.py +6 -42
  80. pulumi_vault/identity/get_oidc_client_creds.py +4 -16
  81. pulumi_vault/identity/get_oidc_openid_config.py +4 -26
  82. pulumi_vault/identity/get_oidc_public_keys.py +5 -16
  83. pulumi_vault/identity/group.py +0 -5
  84. pulumi_vault/identity/group_alias.py +0 -5
  85. pulumi_vault/identity/group_member_entity_ids.py +0 -5
  86. pulumi_vault/identity/group_member_group_ids.py +0 -5
  87. pulumi_vault/identity/group_policies.py +0 -5
  88. pulumi_vault/identity/mfa_duo.py +0 -5
  89. pulumi_vault/identity/mfa_login_enforcement.py +0 -5
  90. pulumi_vault/identity/mfa_okta.py +0 -5
  91. pulumi_vault/identity/mfa_pingid.py +0 -5
  92. pulumi_vault/identity/mfa_totp.py +0 -5
  93. pulumi_vault/identity/oidc.py +0 -5
  94. pulumi_vault/identity/oidc_assignment.py +0 -5
  95. pulumi_vault/identity/oidc_client.py +0 -5
  96. pulumi_vault/identity/oidc_key.py +0 -5
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
  98. pulumi_vault/identity/oidc_provider.py +0 -5
  99. pulumi_vault/identity/oidc_role.py +0 -5
  100. pulumi_vault/identity/oidc_scope.py +0 -5
  101. pulumi_vault/identity/outputs.py +3 -8
  102. pulumi_vault/jwt/_inputs.py +0 -55
  103. pulumi_vault/jwt/auth_backend.py +0 -5
  104. pulumi_vault/jwt/auth_backend_role.py +28 -33
  105. pulumi_vault/jwt/outputs.py +0 -5
  106. pulumi_vault/kmip/secret_backend.py +0 -5
  107. pulumi_vault/kmip/secret_role.py +0 -5
  108. pulumi_vault/kmip/secret_scope.py +0 -5
  109. pulumi_vault/kubernetes/auth_backend_config.py +3 -55
  110. pulumi_vault/kubernetes/auth_backend_role.py +0 -5
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +7 -59
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
  113. pulumi_vault/kubernetes/get_service_account_token.py +4 -28
  114. pulumi_vault/kubernetes/secret_backend.py +14 -19
  115. pulumi_vault/kubernetes/secret_backend_role.py +0 -5
  116. pulumi_vault/kv/_inputs.py +4 -36
  117. pulumi_vault/kv/get_secret.py +5 -20
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +5 -24
  119. pulumi_vault/kv/get_secret_v2.py +8 -27
  120. pulumi_vault/kv/get_secrets_list.py +4 -15
  121. pulumi_vault/kv/get_secrets_list_v2.py +4 -18
  122. pulumi_vault/kv/outputs.py +3 -8
  123. pulumi_vault/kv/secret.py +7 -12
  124. pulumi_vault/kv/secret_backend_v2.py +0 -5
  125. pulumi_vault/kv/secret_v2.py +28 -33
  126. pulumi_vault/ldap/auth_backend.py +0 -52
  127. pulumi_vault/ldap/auth_backend_group.py +0 -5
  128. pulumi_vault/ldap/auth_backend_user.py +0 -5
  129. pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
  130. pulumi_vault/ldap/get_static_credentials.py +4 -23
  131. pulumi_vault/ldap/secret_backend.py +14 -19
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
  133. pulumi_vault/ldap/secret_backend_library_set.py +0 -5
  134. pulumi_vault/ldap/secret_backend_static_role.py +0 -5
  135. pulumi_vault/managed/_inputs.py +0 -205
  136. pulumi_vault/managed/keys.py +0 -5
  137. pulumi_vault/managed/outputs.py +0 -5
  138. pulumi_vault/mfa_duo.py +0 -5
  139. pulumi_vault/mfa_okta.py +0 -5
  140. pulumi_vault/mfa_pingid.py +0 -5
  141. pulumi_vault/mfa_totp.py +0 -5
  142. pulumi_vault/mongodbatlas/secret_backend.py +0 -5
  143. pulumi_vault/mongodbatlas/secret_role.py +0 -5
  144. pulumi_vault/mount.py +16 -21
  145. pulumi_vault/namespace.py +14 -19
  146. pulumi_vault/nomad_secret_backend.py +0 -5
  147. pulumi_vault/nomad_secret_role.py +0 -5
  148. pulumi_vault/okta/_inputs.py +0 -39
  149. pulumi_vault/okta/auth_backend.py +0 -5
  150. pulumi_vault/okta/auth_backend_group.py +0 -5
  151. pulumi_vault/okta/auth_backend_user.py +0 -5
  152. pulumi_vault/okta/outputs.py +0 -5
  153. pulumi_vault/outputs.py +0 -5
  154. pulumi_vault/password_policy.py +0 -5
  155. pulumi_vault/pkisecret/_inputs.py +8 -49
  156. pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
  157. pulumi_vault/pkisecret/backend_config_est.py +14 -19
  158. pulumi_vault/pkisecret/get_backend_config_est.py +5 -23
  159. pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
  160. pulumi_vault/pkisecret/get_backend_issuers.py +5 -18
  161. pulumi_vault/pkisecret/get_backend_key.py +4 -19
  162. pulumi_vault/pkisecret/get_backend_keys.py +5 -18
  163. pulumi_vault/pkisecret/outputs.py +12 -17
  164. pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
  172. pulumi_vault/pkisecret/secret_backend_key.py +0 -5
  173. pulumi_vault/pkisecret/secret_backend_role.py +0 -5
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
  176. pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
  177. pulumi_vault/plugin.py +0 -5
  178. pulumi_vault/plugin_pinned_version.py +0 -5
  179. pulumi_vault/policy.py +0 -5
  180. pulumi_vault/provider.py +0 -5
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +0 -5
  183. pulumi_vault/quota_rate_limit.py +0 -5
  184. pulumi_vault/rabbitmq/_inputs.py +0 -61
  185. pulumi_vault/rabbitmq/outputs.py +0 -5
  186. pulumi_vault/rabbitmq/secret_backend.py +0 -5
  187. pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
  188. pulumi_vault/raft_autopilot.py +0 -5
  189. pulumi_vault/raft_snapshot_agent_config.py +0 -5
  190. pulumi_vault/rgp_policy.py +0 -5
  191. pulumi_vault/saml/auth_backend.py +0 -5
  192. pulumi_vault/saml/auth_backend_role.py +14 -19
  193. pulumi_vault/secrets/_inputs.py +0 -30
  194. pulumi_vault/secrets/outputs.py +0 -5
  195. pulumi_vault/secrets/sync_association.py +0 -5
  196. pulumi_vault/secrets/sync_aws_destination.py +14 -19
  197. pulumi_vault/secrets/sync_azure_destination.py +14 -19
  198. pulumi_vault/secrets/sync_config.py +0 -5
  199. pulumi_vault/secrets/sync_gcp_destination.py +14 -19
  200. pulumi_vault/secrets/sync_gh_destination.py +0 -5
  201. pulumi_vault/secrets/sync_github_apps.py +0 -5
  202. pulumi_vault/secrets/sync_vercel_destination.py +0 -5
  203. pulumi_vault/ssh/_inputs.py +0 -22
  204. pulumi_vault/ssh/outputs.py +0 -5
  205. pulumi_vault/ssh/secret_backend_ca.py +0 -5
  206. pulumi_vault/ssh/secret_backend_role.py +28 -67
  207. pulumi_vault/terraformcloud/secret_backend.py +0 -5
  208. pulumi_vault/terraformcloud/secret_creds.py +0 -5
  209. pulumi_vault/terraformcloud/secret_role.py +0 -5
  210. pulumi_vault/token.py +0 -5
  211. pulumi_vault/tokenauth/auth_backend_role.py +14 -5
  212. pulumi_vault/transform/alphabet.py +0 -5
  213. pulumi_vault/transform/get_decode.py +14 -38
  214. pulumi_vault/transform/get_encode.py +14 -38
  215. pulumi_vault/transform/role.py +0 -5
  216. pulumi_vault/transform/template.py +14 -19
  217. pulumi_vault/transform/transformation.py +0 -5
  218. pulumi_vault/transit/get_decrypt.py +4 -21
  219. pulumi_vault/transit/get_encrypt.py +4 -23
  220. pulumi_vault/transit/secret_backend_key.py +7 -12
  221. pulumi_vault/transit/secret_cache_config.py +0 -5
  222. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/METADATA +2 -3
  223. pulumi_vault-6.4.0a1723454543.dist-info/RECORD +256 -0
  224. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/WHEEL +1 -1
  225. pulumi_vault-6.4.0.dist-info/RECORD +0 -256
  226. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/top_level.txt +0 -0
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['AuthBackendArgs', 'AuthBackend']
@@ -26,7 +21,6 @@ class AuthBackendArgs:
26
21
  certificate: Optional[pulumi.Input[str]] = None,
27
22
  client_tls_cert: Optional[pulumi.Input[str]] = None,
28
23
  client_tls_key: Optional[pulumi.Input[str]] = None,
29
- connection_timeout: Optional[pulumi.Input[int]] = None,
30
24
  deny_null_bind: Optional[pulumi.Input[bool]] = None,
31
25
  description: Optional[pulumi.Input[str]] = None,
32
26
  disable_remount: Optional[pulumi.Input[bool]] = None,
@@ -64,7 +58,6 @@ class AuthBackendArgs:
64
58
  :param pulumi.Input[str] bindpass: Password to use with `binddn` when performing user search
65
59
  :param pulumi.Input[bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
66
60
  :param pulumi.Input[str] certificate: Trusted CA to validate TLS certificate
67
- :param pulumi.Input[int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
68
61
  :param pulumi.Input[bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
69
62
  :param pulumi.Input[str] description: Description for the LDAP auth backend mount
70
63
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
@@ -114,8 +107,6 @@ class AuthBackendArgs:
114
107
  pulumi.set(__self__, "client_tls_cert", client_tls_cert)
115
108
  if client_tls_key is not None:
116
109
  pulumi.set(__self__, "client_tls_key", client_tls_key)
117
- if connection_timeout is not None:
118
- pulumi.set(__self__, "connection_timeout", connection_timeout)
119
110
  if deny_null_bind is not None:
120
111
  pulumi.set(__self__, "deny_null_bind", deny_null_bind)
121
112
  if description is not None:
@@ -255,18 +246,6 @@ class AuthBackendArgs:
255
246
  def client_tls_key(self, value: Optional[pulumi.Input[str]]):
256
247
  pulumi.set(self, "client_tls_key", value)
257
248
 
258
- @property
259
- @pulumi.getter(name="connectionTimeout")
260
- def connection_timeout(self) -> Optional[pulumi.Input[int]]:
261
- """
262
- Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
263
- """
264
- return pulumi.get(self, "connection_timeout")
265
-
266
- @connection_timeout.setter
267
- def connection_timeout(self, value: Optional[pulumi.Input[int]]):
268
- pulumi.set(self, "connection_timeout", value)
269
-
270
249
  @property
271
250
  @pulumi.getter(name="denyNullBind")
272
251
  def deny_null_bind(self) -> Optional[pulumi.Input[bool]]:
@@ -643,7 +622,6 @@ class _AuthBackendState:
643
622
  certificate: Optional[pulumi.Input[str]] = None,
644
623
  client_tls_cert: Optional[pulumi.Input[str]] = None,
645
624
  client_tls_key: Optional[pulumi.Input[str]] = None,
646
- connection_timeout: Optional[pulumi.Input[int]] = None,
647
625
  deny_null_bind: Optional[pulumi.Input[bool]] = None,
648
626
  description: Optional[pulumi.Input[str]] = None,
649
627
  disable_remount: Optional[pulumi.Input[bool]] = None,
@@ -682,7 +660,6 @@ class _AuthBackendState:
682
660
  :param pulumi.Input[str] bindpass: Password to use with `binddn` when performing user search
683
661
  :param pulumi.Input[bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
684
662
  :param pulumi.Input[str] certificate: Trusted CA to validate TLS certificate
685
- :param pulumi.Input[int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
686
663
  :param pulumi.Input[bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
687
664
  :param pulumi.Input[str] description: Description for the LDAP auth backend mount
688
665
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
@@ -734,8 +711,6 @@ class _AuthBackendState:
734
711
  pulumi.set(__self__, "client_tls_cert", client_tls_cert)
735
712
  if client_tls_key is not None:
736
713
  pulumi.set(__self__, "client_tls_key", client_tls_key)
737
- if connection_timeout is not None:
738
- pulumi.set(__self__, "connection_timeout", connection_timeout)
739
714
  if deny_null_bind is not None:
740
715
  pulumi.set(__self__, "deny_null_bind", deny_null_bind)
741
716
  if description is not None:
@@ -877,18 +852,6 @@ class _AuthBackendState:
877
852
  def client_tls_key(self, value: Optional[pulumi.Input[str]]):
878
853
  pulumi.set(self, "client_tls_key", value)
879
854
 
880
- @property
881
- @pulumi.getter(name="connectionTimeout")
882
- def connection_timeout(self) -> Optional[pulumi.Input[int]]:
883
- """
884
- Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
885
- """
886
- return pulumi.get(self, "connection_timeout")
887
-
888
- @connection_timeout.setter
889
- def connection_timeout(self, value: Optional[pulumi.Input[int]]):
890
- pulumi.set(self, "connection_timeout", value)
891
-
892
855
  @property
893
856
  @pulumi.getter(name="denyNullBind")
894
857
  def deny_null_bind(self) -> Optional[pulumi.Input[bool]]:
@@ -1278,7 +1241,6 @@ class AuthBackend(pulumi.CustomResource):
1278
1241
  certificate: Optional[pulumi.Input[str]] = None,
1279
1242
  client_tls_cert: Optional[pulumi.Input[str]] = None,
1280
1243
  client_tls_key: Optional[pulumi.Input[str]] = None,
1281
- connection_timeout: Optional[pulumi.Input[int]] = None,
1282
1244
  deny_null_bind: Optional[pulumi.Input[bool]] = None,
1283
1245
  description: Optional[pulumi.Input[str]] = None,
1284
1246
  disable_remount: Optional[pulumi.Input[bool]] = None,
@@ -1345,7 +1307,6 @@ class AuthBackend(pulumi.CustomResource):
1345
1307
  :param pulumi.Input[str] bindpass: Password to use with `binddn` when performing user search
1346
1308
  :param pulumi.Input[bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
1347
1309
  :param pulumi.Input[str] certificate: Trusted CA to validate TLS certificate
1348
- :param pulumi.Input[int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
1349
1310
  :param pulumi.Input[bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
1350
1311
  :param pulumi.Input[str] description: Description for the LDAP auth backend mount
1351
1312
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
@@ -1438,7 +1399,6 @@ class AuthBackend(pulumi.CustomResource):
1438
1399
  certificate: Optional[pulumi.Input[str]] = None,
1439
1400
  client_tls_cert: Optional[pulumi.Input[str]] = None,
1440
1401
  client_tls_key: Optional[pulumi.Input[str]] = None,
1441
- connection_timeout: Optional[pulumi.Input[int]] = None,
1442
1402
  deny_null_bind: Optional[pulumi.Input[bool]] = None,
1443
1403
  description: Optional[pulumi.Input[str]] = None,
1444
1404
  disable_remount: Optional[pulumi.Input[bool]] = None,
@@ -1485,7 +1445,6 @@ class AuthBackend(pulumi.CustomResource):
1485
1445
  __props__.__dict__["certificate"] = certificate
1486
1446
  __props__.__dict__["client_tls_cert"] = client_tls_cert
1487
1447
  __props__.__dict__["client_tls_key"] = None if client_tls_key is None else pulumi.Output.secret(client_tls_key)
1488
- __props__.__dict__["connection_timeout"] = connection_timeout
1489
1448
  __props__.__dict__["deny_null_bind"] = deny_null_bind
1490
1449
  __props__.__dict__["description"] = description
1491
1450
  __props__.__dict__["disable_remount"] = disable_remount
@@ -1539,7 +1498,6 @@ class AuthBackend(pulumi.CustomResource):
1539
1498
  certificate: Optional[pulumi.Input[str]] = None,
1540
1499
  client_tls_cert: Optional[pulumi.Input[str]] = None,
1541
1500
  client_tls_key: Optional[pulumi.Input[str]] = None,
1542
- connection_timeout: Optional[pulumi.Input[int]] = None,
1543
1501
  deny_null_bind: Optional[pulumi.Input[bool]] = None,
1544
1502
  description: Optional[pulumi.Input[str]] = None,
1545
1503
  disable_remount: Optional[pulumi.Input[bool]] = None,
@@ -1583,7 +1541,6 @@ class AuthBackend(pulumi.CustomResource):
1583
1541
  :param pulumi.Input[str] bindpass: Password to use with `binddn` when performing user search
1584
1542
  :param pulumi.Input[bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
1585
1543
  :param pulumi.Input[str] certificate: Trusted CA to validate TLS certificate
1586
- :param pulumi.Input[int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
1587
1544
  :param pulumi.Input[bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
1588
1545
  :param pulumi.Input[str] description: Description for the LDAP auth backend mount
1589
1546
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
@@ -1632,7 +1589,6 @@ class AuthBackend(pulumi.CustomResource):
1632
1589
  __props__.__dict__["certificate"] = certificate
1633
1590
  __props__.__dict__["client_tls_cert"] = client_tls_cert
1634
1591
  __props__.__dict__["client_tls_key"] = client_tls_key
1635
- __props__.__dict__["connection_timeout"] = connection_timeout
1636
1592
  __props__.__dict__["deny_null_bind"] = deny_null_bind
1637
1593
  __props__.__dict__["description"] = description
1638
1594
  __props__.__dict__["disable_remount"] = disable_remount
@@ -1716,14 +1672,6 @@ class AuthBackend(pulumi.CustomResource):
1716
1672
  def client_tls_key(self) -> pulumi.Output[str]:
1717
1673
  return pulumi.get(self, "client_tls_key")
1718
1674
 
1719
- @property
1720
- @pulumi.getter(name="connectionTimeout")
1721
- def connection_timeout(self) -> pulumi.Output[int]:
1722
- """
1723
- Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
1724
- """
1725
- return pulumi.get(self, "connection_timeout")
1726
-
1727
1675
  @property
1728
1676
  @pulumi.getter(name="denyNullBind")
1729
1677
  def deny_null_bind(self) -> pulumi.Output[bool]:
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['AuthBackendGroupArgs', 'AuthBackendGroup']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['AuthBackendUserArgs', 'AuthBackendUser']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -155,6 +150,9 @@ def get_dynamic_credentials(mount: Optional[str] = None,
155
150
  password=pulumi.get(__ret__, 'password'),
156
151
  role_name=pulumi.get(__ret__, 'role_name'),
157
152
  username=pulumi.get(__ret__, 'username'))
153
+
154
+
155
+ @_utilities.lift_output_func(get_dynamic_credentials)
158
156
  def get_dynamic_credentials_output(mount: Optional[pulumi.Input[str]] = None,
159
157
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
160
158
  role_name: Optional[pulumi.Input[str]] = None,
@@ -162,20 +160,4 @@ def get_dynamic_credentials_output(mount: Optional[pulumi.Input[str]] = None,
162
160
  """
163
161
  Use this data source to access information about an existing resource.
164
162
  """
165
- __args__ = dict()
166
- __args__['mount'] = mount
167
- __args__['namespace'] = namespace
168
- __args__['roleName'] = role_name
169
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
170
- __ret__ = pulumi.runtime.invoke_output('vault:ldap/getDynamicCredentials:getDynamicCredentials', __args__, opts=opts, typ=GetDynamicCredentialsResult)
171
- return __ret__.apply(lambda __response__: GetDynamicCredentialsResult(
172
- distinguished_names=pulumi.get(__response__, 'distinguished_names'),
173
- id=pulumi.get(__response__, 'id'),
174
- lease_duration=pulumi.get(__response__, 'lease_duration'),
175
- lease_id=pulumi.get(__response__, 'lease_id'),
176
- lease_renewable=pulumi.get(__response__, 'lease_renewable'),
177
- mount=pulumi.get(__response__, 'mount'),
178
- namespace=pulumi.get(__response__, 'namespace'),
179
- password=pulumi.get(__response__, 'password'),
180
- role_name=pulumi.get(__response__, 'role_name'),
181
- username=pulumi.get(__response__, 'username')))
163
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -165,6 +160,9 @@ def get_static_credentials(mount: Optional[str] = None,
165
160
  rotation_period=pulumi.get(__ret__, 'rotation_period'),
166
161
  ttl=pulumi.get(__ret__, 'ttl'),
167
162
  username=pulumi.get(__ret__, 'username'))
163
+
164
+
165
+ @_utilities.lift_output_func(get_static_credentials)
168
166
  def get_static_credentials_output(mount: Optional[pulumi.Input[str]] = None,
169
167
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
170
168
  role_name: Optional[pulumi.Input[str]] = None,
@@ -172,21 +170,4 @@ def get_static_credentials_output(mount: Optional[pulumi.Input[str]] = None,
172
170
  """
173
171
  Use this data source to access information about an existing resource.
174
172
  """
175
- __args__ = dict()
176
- __args__['mount'] = mount
177
- __args__['namespace'] = namespace
178
- __args__['roleName'] = role_name
179
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
180
- __ret__ = pulumi.runtime.invoke_output('vault:ldap/getStaticCredentials:getStaticCredentials', __args__, opts=opts, typ=GetStaticCredentialsResult)
181
- return __ret__.apply(lambda __response__: GetStaticCredentialsResult(
182
- dn=pulumi.get(__response__, 'dn'),
183
- id=pulumi.get(__response__, 'id'),
184
- last_password=pulumi.get(__response__, 'last_password'),
185
- last_vault_rotation=pulumi.get(__response__, 'last_vault_rotation'),
186
- mount=pulumi.get(__response__, 'mount'),
187
- namespace=pulumi.get(__response__, 'namespace'),
188
- password=pulumi.get(__response__, 'password'),
189
- role_name=pulumi.get(__response__, 'role_name'),
190
- rotation_period=pulumi.get(__response__, 'rotation_period'),
191
- ttl=pulumi.get(__response__, 'ttl'),
192
- username=pulumi.get(__response__, 'username')))
173
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretBackendArgs', 'SecretBackend']
@@ -40,7 +35,7 @@ class SecretBackendArgs:
40
35
  local: Optional[pulumi.Input[bool]] = None,
41
36
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
42
37
  namespace: Optional[pulumi.Input[str]] = None,
43
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
38
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
44
39
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
45
40
  password_policy: Optional[pulumi.Input[str]] = None,
46
41
  path: Optional[pulumi.Input[str]] = None,
@@ -84,7 +79,7 @@ class SecretBackendArgs:
84
79
  The value should not contain leading or trailing forward slashes.
85
80
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
86
81
  *Available only for Vault Enterprise*.
87
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
82
+ :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
88
83
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
89
84
  :param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
90
85
  :param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
@@ -433,14 +428,14 @@ class SecretBackendArgs:
433
428
 
434
429
  @property
435
430
  @pulumi.getter
436
- def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
431
+ def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
437
432
  """
438
433
  Specifies mount type specific options that are passed to the backend
439
434
  """
440
435
  return pulumi.get(self, "options")
441
436
 
442
437
  @options.setter
443
- def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
438
+ def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
444
439
  pulumi.set(self, "options", value)
445
440
 
446
441
  @property
@@ -629,7 +624,7 @@ class _SecretBackendState:
629
624
  local: Optional[pulumi.Input[bool]] = None,
630
625
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
631
626
  namespace: Optional[pulumi.Input[str]] = None,
632
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
627
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
633
628
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
634
629
  password_policy: Optional[pulumi.Input[str]] = None,
635
630
  path: Optional[pulumi.Input[str]] = None,
@@ -674,7 +669,7 @@ class _SecretBackendState:
674
669
  The value should not contain leading or trailing forward slashes.
675
670
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
676
671
  *Available only for Vault Enterprise*.
677
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
672
+ :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
678
673
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
679
674
  :param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
680
675
  :param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
@@ -1039,14 +1034,14 @@ class _SecretBackendState:
1039
1034
 
1040
1035
  @property
1041
1036
  @pulumi.getter
1042
- def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
1037
+ def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
1043
1038
  """
1044
1039
  Specifies mount type specific options that are passed to the backend
1045
1040
  """
1046
1041
  return pulumi.get(self, "options")
1047
1042
 
1048
1043
  @options.setter
1049
- def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
1044
+ def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
1050
1045
  pulumi.set(self, "options", value)
1051
1046
 
1052
1047
  @property
@@ -1236,7 +1231,7 @@ class SecretBackend(pulumi.CustomResource):
1236
1231
  local: Optional[pulumi.Input[bool]] = None,
1237
1232
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1238
1233
  namespace: Optional[pulumi.Input[str]] = None,
1239
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1234
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1240
1235
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1241
1236
  password_policy: Optional[pulumi.Input[str]] = None,
1242
1237
  path: Optional[pulumi.Input[str]] = None,
@@ -1305,7 +1300,7 @@ class SecretBackend(pulumi.CustomResource):
1305
1300
  The value should not contain leading or trailing forward slashes.
1306
1301
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1307
1302
  *Available only for Vault Enterprise*.
1308
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
1303
+ :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
1309
1304
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1310
1305
  :param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
1311
1306
  :param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
@@ -1390,7 +1385,7 @@ class SecretBackend(pulumi.CustomResource):
1390
1385
  local: Optional[pulumi.Input[bool]] = None,
1391
1386
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1392
1387
  namespace: Optional[pulumi.Input[str]] = None,
1393
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1388
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1394
1389
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1395
1390
  password_policy: Optional[pulumi.Input[str]] = None,
1396
1391
  path: Optional[pulumi.Input[str]] = None,
@@ -1487,7 +1482,7 @@ class SecretBackend(pulumi.CustomResource):
1487
1482
  local: Optional[pulumi.Input[bool]] = None,
1488
1483
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1489
1484
  namespace: Optional[pulumi.Input[str]] = None,
1490
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1485
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1491
1486
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1492
1487
  password_policy: Optional[pulumi.Input[str]] = None,
1493
1488
  path: Optional[pulumi.Input[str]] = None,
@@ -1537,7 +1532,7 @@ class SecretBackend(pulumi.CustomResource):
1537
1532
  The value should not contain leading or trailing forward slashes.
1538
1533
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1539
1534
  *Available only for Vault Enterprise*.
1540
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
1535
+ :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
1541
1536
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1542
1537
  :param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
1543
1538
  :param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
@@ -1783,7 +1778,7 @@ class SecretBackend(pulumi.CustomResource):
1783
1778
 
1784
1779
  @property
1785
1780
  @pulumi.getter
1786
- def options(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
1781
+ def options(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
1787
1782
  """
1788
1783
  Specifies mount type specific options that are passed to the backend
1789
1784
  """
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretBackendDynamicRoleArgs', 'SecretBackendDynamicRole']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretBackendLibrarySetArgs', 'SecretBackendLibrarySet']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole']