pulumi-vault 6.4.0__py3-none-any.whl → 6.4.0a1723454543__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +0 -560
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +4 -19
  4. pulumi_vault/ad/secret_backend.py +0 -5
  5. pulumi_vault/ad/secret_library.py +0 -5
  6. pulumi_vault/ad/secret_role.py +0 -5
  7. pulumi_vault/alicloud/auth_backend_role.py +0 -5
  8. pulumi_vault/approle/auth_backend_login.py +0 -5
  9. pulumi_vault/approle/auth_backend_role.py +0 -5
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -99
  11. pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
  12. pulumi_vault/audit.py +0 -5
  13. pulumi_vault/audit_request_header.py +0 -5
  14. pulumi_vault/auth_backend.py +0 -5
  15. pulumi_vault/aws/auth_backend_cert.py +0 -5
  16. pulumi_vault/aws/auth_backend_client.py +0 -5
  17. pulumi_vault/aws/auth_backend_config_identity.py +0 -5
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
  19. pulumi_vault/aws/auth_backend_login.py +7 -12
  20. pulumi_vault/aws/auth_backend_role.py +0 -5
  21. pulumi_vault/aws/auth_backend_role_tag.py +0 -5
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
  23. pulumi_vault/aws/auth_backend_sts_role.py +0 -5
  24. pulumi_vault/aws/get_access_credentials.py +4 -31
  25. pulumi_vault/aws/get_static_access_credentials.py +4 -18
  26. pulumi_vault/aws/secret_backend.py +0 -5
  27. pulumi_vault/aws/secret_backend_role.py +0 -5
  28. pulumi_vault/aws/secret_backend_static_role.py +0 -5
  29. pulumi_vault/azure/_inputs.py +0 -24
  30. pulumi_vault/azure/auth_backend_config.py +0 -5
  31. pulumi_vault/azure/auth_backend_role.py +0 -5
  32. pulumi_vault/azure/backend.py +0 -5
  33. pulumi_vault/azure/backend_role.py +0 -5
  34. pulumi_vault/azure/get_access_credentials.py +4 -36
  35. pulumi_vault/azure/outputs.py +0 -5
  36. pulumi_vault/cert_auth_backend_role.py +0 -5
  37. pulumi_vault/config/__init__.pyi +0 -5
  38. pulumi_vault/config/_inputs.py +0 -21
  39. pulumi_vault/config/outputs.py +0 -5
  40. pulumi_vault/config/ui_custom_message.py +14 -19
  41. pulumi_vault/config/vars.py +0 -5
  42. pulumi_vault/consul/secret_backend.py +0 -5
  43. pulumi_vault/consul/secret_backend_role.py +0 -5
  44. pulumi_vault/database/_inputs.py +105 -2256
  45. pulumi_vault/database/outputs.py +54 -199
  46. pulumi_vault/database/secret_backend_connection.py +14 -19
  47. pulumi_vault/database/secret_backend_role.py +14 -19
  48. pulumi_vault/database/secret_backend_static_role.py +1 -69
  49. pulumi_vault/database/secrets_mount.py +14 -19
  50. pulumi_vault/egp_policy.py +0 -5
  51. pulumi_vault/gcp/_inputs.py +0 -111
  52. pulumi_vault/gcp/auth_backend.py +0 -5
  53. pulumi_vault/gcp/auth_backend_role.py +0 -5
  54. pulumi_vault/gcp/get_auth_backend_role.py +4 -42
  55. pulumi_vault/gcp/outputs.py +0 -5
  56. pulumi_vault/gcp/secret_backend.py +0 -5
  57. pulumi_vault/gcp/secret_impersonated_account.py +3 -62
  58. pulumi_vault/gcp/secret_roleset.py +0 -5
  59. pulumi_vault/gcp/secret_static_account.py +0 -5
  60. pulumi_vault/generic/endpoint.py +0 -5
  61. pulumi_vault/generic/get_secret.py +5 -25
  62. pulumi_vault/generic/secret.py +7 -12
  63. pulumi_vault/get_auth_backend.py +4 -21
  64. pulumi_vault/get_auth_backends.py +4 -16
  65. pulumi_vault/get_namespace.py +5 -18
  66. pulumi_vault/get_namespaces.py +4 -13
  67. pulumi_vault/get_nomad_access_token.py +8 -28
  68. pulumi_vault/get_policy_document.py +4 -15
  69. pulumi_vault/get_raft_autopilot_state.py +7 -26
  70. pulumi_vault/github/_inputs.py +0 -55
  71. pulumi_vault/github/auth_backend.py +0 -5
  72. pulumi_vault/github/outputs.py +0 -5
  73. pulumi_vault/github/team.py +0 -5
  74. pulumi_vault/github/user.py +0 -5
  75. pulumi_vault/identity/entity.py +0 -5
  76. pulumi_vault/identity/entity_alias.py +0 -5
  77. pulumi_vault/identity/entity_policies.py +0 -5
  78. pulumi_vault/identity/get_entity.py +5 -35
  79. pulumi_vault/identity/get_group.py +6 -42
  80. pulumi_vault/identity/get_oidc_client_creds.py +4 -16
  81. pulumi_vault/identity/get_oidc_openid_config.py +4 -26
  82. pulumi_vault/identity/get_oidc_public_keys.py +5 -16
  83. pulumi_vault/identity/group.py +0 -5
  84. pulumi_vault/identity/group_alias.py +0 -5
  85. pulumi_vault/identity/group_member_entity_ids.py +0 -5
  86. pulumi_vault/identity/group_member_group_ids.py +0 -5
  87. pulumi_vault/identity/group_policies.py +0 -5
  88. pulumi_vault/identity/mfa_duo.py +0 -5
  89. pulumi_vault/identity/mfa_login_enforcement.py +0 -5
  90. pulumi_vault/identity/mfa_okta.py +0 -5
  91. pulumi_vault/identity/mfa_pingid.py +0 -5
  92. pulumi_vault/identity/mfa_totp.py +0 -5
  93. pulumi_vault/identity/oidc.py +0 -5
  94. pulumi_vault/identity/oidc_assignment.py +0 -5
  95. pulumi_vault/identity/oidc_client.py +0 -5
  96. pulumi_vault/identity/oidc_key.py +0 -5
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
  98. pulumi_vault/identity/oidc_provider.py +0 -5
  99. pulumi_vault/identity/oidc_role.py +0 -5
  100. pulumi_vault/identity/oidc_scope.py +0 -5
  101. pulumi_vault/identity/outputs.py +3 -8
  102. pulumi_vault/jwt/_inputs.py +0 -55
  103. pulumi_vault/jwt/auth_backend.py +0 -5
  104. pulumi_vault/jwt/auth_backend_role.py +28 -33
  105. pulumi_vault/jwt/outputs.py +0 -5
  106. pulumi_vault/kmip/secret_backend.py +0 -5
  107. pulumi_vault/kmip/secret_role.py +0 -5
  108. pulumi_vault/kmip/secret_scope.py +0 -5
  109. pulumi_vault/kubernetes/auth_backend_config.py +3 -55
  110. pulumi_vault/kubernetes/auth_backend_role.py +0 -5
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +7 -59
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
  113. pulumi_vault/kubernetes/get_service_account_token.py +4 -28
  114. pulumi_vault/kubernetes/secret_backend.py +14 -19
  115. pulumi_vault/kubernetes/secret_backend_role.py +0 -5
  116. pulumi_vault/kv/_inputs.py +4 -36
  117. pulumi_vault/kv/get_secret.py +5 -20
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +5 -24
  119. pulumi_vault/kv/get_secret_v2.py +8 -27
  120. pulumi_vault/kv/get_secrets_list.py +4 -15
  121. pulumi_vault/kv/get_secrets_list_v2.py +4 -18
  122. pulumi_vault/kv/outputs.py +3 -8
  123. pulumi_vault/kv/secret.py +7 -12
  124. pulumi_vault/kv/secret_backend_v2.py +0 -5
  125. pulumi_vault/kv/secret_v2.py +28 -33
  126. pulumi_vault/ldap/auth_backend.py +0 -52
  127. pulumi_vault/ldap/auth_backend_group.py +0 -5
  128. pulumi_vault/ldap/auth_backend_user.py +0 -5
  129. pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
  130. pulumi_vault/ldap/get_static_credentials.py +4 -23
  131. pulumi_vault/ldap/secret_backend.py +14 -19
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
  133. pulumi_vault/ldap/secret_backend_library_set.py +0 -5
  134. pulumi_vault/ldap/secret_backend_static_role.py +0 -5
  135. pulumi_vault/managed/_inputs.py +0 -205
  136. pulumi_vault/managed/keys.py +0 -5
  137. pulumi_vault/managed/outputs.py +0 -5
  138. pulumi_vault/mfa_duo.py +0 -5
  139. pulumi_vault/mfa_okta.py +0 -5
  140. pulumi_vault/mfa_pingid.py +0 -5
  141. pulumi_vault/mfa_totp.py +0 -5
  142. pulumi_vault/mongodbatlas/secret_backend.py +0 -5
  143. pulumi_vault/mongodbatlas/secret_role.py +0 -5
  144. pulumi_vault/mount.py +16 -21
  145. pulumi_vault/namespace.py +14 -19
  146. pulumi_vault/nomad_secret_backend.py +0 -5
  147. pulumi_vault/nomad_secret_role.py +0 -5
  148. pulumi_vault/okta/_inputs.py +0 -39
  149. pulumi_vault/okta/auth_backend.py +0 -5
  150. pulumi_vault/okta/auth_backend_group.py +0 -5
  151. pulumi_vault/okta/auth_backend_user.py +0 -5
  152. pulumi_vault/okta/outputs.py +0 -5
  153. pulumi_vault/outputs.py +0 -5
  154. pulumi_vault/password_policy.py +0 -5
  155. pulumi_vault/pkisecret/_inputs.py +8 -49
  156. pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
  157. pulumi_vault/pkisecret/backend_config_est.py +14 -19
  158. pulumi_vault/pkisecret/get_backend_config_est.py +5 -23
  159. pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
  160. pulumi_vault/pkisecret/get_backend_issuers.py +5 -18
  161. pulumi_vault/pkisecret/get_backend_key.py +4 -19
  162. pulumi_vault/pkisecret/get_backend_keys.py +5 -18
  163. pulumi_vault/pkisecret/outputs.py +12 -17
  164. pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
  172. pulumi_vault/pkisecret/secret_backend_key.py +0 -5
  173. pulumi_vault/pkisecret/secret_backend_role.py +0 -5
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
  176. pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
  177. pulumi_vault/plugin.py +0 -5
  178. pulumi_vault/plugin_pinned_version.py +0 -5
  179. pulumi_vault/policy.py +0 -5
  180. pulumi_vault/provider.py +0 -5
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +0 -5
  183. pulumi_vault/quota_rate_limit.py +0 -5
  184. pulumi_vault/rabbitmq/_inputs.py +0 -61
  185. pulumi_vault/rabbitmq/outputs.py +0 -5
  186. pulumi_vault/rabbitmq/secret_backend.py +0 -5
  187. pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
  188. pulumi_vault/raft_autopilot.py +0 -5
  189. pulumi_vault/raft_snapshot_agent_config.py +0 -5
  190. pulumi_vault/rgp_policy.py +0 -5
  191. pulumi_vault/saml/auth_backend.py +0 -5
  192. pulumi_vault/saml/auth_backend_role.py +14 -19
  193. pulumi_vault/secrets/_inputs.py +0 -30
  194. pulumi_vault/secrets/outputs.py +0 -5
  195. pulumi_vault/secrets/sync_association.py +0 -5
  196. pulumi_vault/secrets/sync_aws_destination.py +14 -19
  197. pulumi_vault/secrets/sync_azure_destination.py +14 -19
  198. pulumi_vault/secrets/sync_config.py +0 -5
  199. pulumi_vault/secrets/sync_gcp_destination.py +14 -19
  200. pulumi_vault/secrets/sync_gh_destination.py +0 -5
  201. pulumi_vault/secrets/sync_github_apps.py +0 -5
  202. pulumi_vault/secrets/sync_vercel_destination.py +0 -5
  203. pulumi_vault/ssh/_inputs.py +0 -22
  204. pulumi_vault/ssh/outputs.py +0 -5
  205. pulumi_vault/ssh/secret_backend_ca.py +0 -5
  206. pulumi_vault/ssh/secret_backend_role.py +28 -67
  207. pulumi_vault/terraformcloud/secret_backend.py +0 -5
  208. pulumi_vault/terraformcloud/secret_creds.py +0 -5
  209. pulumi_vault/terraformcloud/secret_role.py +0 -5
  210. pulumi_vault/token.py +0 -5
  211. pulumi_vault/tokenauth/auth_backend_role.py +14 -5
  212. pulumi_vault/transform/alphabet.py +0 -5
  213. pulumi_vault/transform/get_decode.py +14 -38
  214. pulumi_vault/transform/get_encode.py +14 -38
  215. pulumi_vault/transform/role.py +0 -5
  216. pulumi_vault/transform/template.py +14 -19
  217. pulumi_vault/transform/transformation.py +0 -5
  218. pulumi_vault/transit/get_decrypt.py +4 -21
  219. pulumi_vault/transit/get_encrypt.py +4 -23
  220. pulumi_vault/transit/secret_backend_key.py +7 -12
  221. pulumi_vault/transit/secret_cache_config.py +0 -5
  222. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/METADATA +2 -3
  223. pulumi_vault-6.4.0a1723454543.dist-info/RECORD +256 -0
  224. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/WHEEL +1 -1
  225. pulumi_vault-6.4.0.dist-info/RECORD +0 -256
  226. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/top_level.txt +0 -0
@@ -4,88 +4,17 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
18
13
  'KeysAwArgs',
19
- 'KeysAwArgsDict',
20
14
  'KeysAzureArgs',
21
- 'KeysAzureArgsDict',
22
15
  'KeysPkcArgs',
23
- 'KeysPkcArgsDict',
24
16
  ]
25
17
 
26
- MYPY = False
27
-
28
- if not MYPY:
29
- class KeysAwArgsDict(TypedDict):
30
- access_key: pulumi.Input[str]
31
- """
32
- The AWS access key to use
33
- """
34
- key_bits: pulumi.Input[str]
35
- """
36
- The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
37
- """
38
- key_type: pulumi.Input[str]
39
- """
40
- The type of key to use
41
- """
42
- kms_key: pulumi.Input[str]
43
- """
44
- An identifier for the key
45
- """
46
- name: pulumi.Input[str]
47
- """
48
- A unique lowercase name that serves as identifying the key
49
- """
50
- secret_key: pulumi.Input[str]
51
- """
52
- The AWS secret key to use
53
- """
54
- allow_generate_key: NotRequired[pulumi.Input[bool]]
55
- """
56
- If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
57
- """
58
- allow_replace_key: NotRequired[pulumi.Input[bool]]
59
- """
60
- Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
61
- """
62
- allow_store_key: NotRequired[pulumi.Input[bool]]
63
- """
64
- Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
65
- """
66
- any_mount: NotRequired[pulumi.Input[bool]]
67
- """
68
- Allow usage from any mount point within the namespace if 'true'
69
- """
70
- curve: NotRequired[pulumi.Input[str]]
71
- """
72
- The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
73
- """
74
- endpoint: NotRequired[pulumi.Input[str]]
75
- """
76
- Used to specify a custom AWS endpoint
77
- """
78
- region: NotRequired[pulumi.Input[str]]
79
- """
80
- The AWS region where the keys are stored (or will be stored)
81
- """
82
- uuid: NotRequired[pulumi.Input[str]]
83
- """
84
- ID of the managed key read from Vault
85
- """
86
- elif False:
87
- KeysAwArgsDict: TypeAlias = Mapping[str, Any]
88
-
89
18
  @pulumi.input_type
90
19
  class KeysAwArgs:
91
20
  def __init__(__self__, *,
@@ -311,71 +240,6 @@ class KeysAwArgs:
311
240
  pulumi.set(self, "uuid", value)
312
241
 
313
242
 
314
- if not MYPY:
315
- class KeysAzureArgsDict(TypedDict):
316
- client_id: pulumi.Input[str]
317
- """
318
- The client id for credentials to query the Azure APIs
319
- """
320
- client_secret: pulumi.Input[str]
321
- """
322
- The client secret for credentials to query the Azure APIs
323
- """
324
- key_name: pulumi.Input[str]
325
- """
326
- The Key Vault key to use for encryption and decryption
327
- """
328
- key_type: pulumi.Input[str]
329
- """
330
- The type of key to use
331
- """
332
- name: pulumi.Input[str]
333
- """
334
- A unique lowercase name that serves as identifying the key
335
- """
336
- tenant_id: pulumi.Input[str]
337
- """
338
- The tenant id for the Azure Active Directory organization
339
- """
340
- vault_name: pulumi.Input[str]
341
- """
342
- The Key Vault vault to use the encryption keys for encryption and decryption
343
- """
344
- allow_generate_key: NotRequired[pulumi.Input[bool]]
345
- """
346
- If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
347
- """
348
- allow_replace_key: NotRequired[pulumi.Input[bool]]
349
- """
350
- Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
351
- """
352
- allow_store_key: NotRequired[pulumi.Input[bool]]
353
- """
354
- Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
355
- """
356
- any_mount: NotRequired[pulumi.Input[bool]]
357
- """
358
- Allow usage from any mount point within the namespace if 'true'
359
- """
360
- environment: NotRequired[pulumi.Input[str]]
361
- """
362
- The Azure Cloud environment API endpoints to use
363
- """
364
- key_bits: NotRequired[pulumi.Input[str]]
365
- """
366
- The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
367
- """
368
- resource: NotRequired[pulumi.Input[str]]
369
- """
370
- The Azure Key Vault resource's DNS Suffix to connect to
371
- """
372
- uuid: NotRequired[pulumi.Input[str]]
373
- """
374
- ID of the managed key read from Vault
375
- """
376
- elif False:
377
- KeysAzureArgsDict: TypeAlias = Mapping[str, Any]
378
-
379
243
  @pulumi.input_type
380
244
  class KeysAzureArgs:
381
245
  def __init__(__self__, *,
@@ -616,75 +480,6 @@ class KeysAzureArgs:
616
480
  pulumi.set(self, "uuid", value)
617
481
 
618
482
 
619
- if not MYPY:
620
- class KeysPkcArgsDict(TypedDict):
621
- key_id: pulumi.Input[str]
622
- """
623
- The id of a PKCS#11 key to use
624
- """
625
- key_label: pulumi.Input[str]
626
- """
627
- The label of the key to use
628
- """
629
- library: pulumi.Input[str]
630
- """
631
- The name of the kms_library stanza to use from Vault's config to lookup the local library path
632
- """
633
- mechanism: pulumi.Input[str]
634
- """
635
- The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
636
- """
637
- name: pulumi.Input[str]
638
- """
639
- A unique lowercase name that serves as identifying the key
640
- """
641
- pin: pulumi.Input[str]
642
- """
643
- The PIN for login
644
- """
645
- allow_generate_key: NotRequired[pulumi.Input[bool]]
646
- """
647
- If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
648
- """
649
- allow_replace_key: NotRequired[pulumi.Input[bool]]
650
- """
651
- Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
652
- """
653
- allow_store_key: NotRequired[pulumi.Input[bool]]
654
- """
655
- Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
656
- """
657
- any_mount: NotRequired[pulumi.Input[bool]]
658
- """
659
- Allow usage from any mount point within the namespace if 'true'
660
- """
661
- curve: NotRequired[pulumi.Input[str]]
662
- """
663
- Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
664
- """
665
- force_rw_session: NotRequired[pulumi.Input[str]]
666
- """
667
- Force all operations to open up a read-write session to the HSM
668
- """
669
- key_bits: NotRequired[pulumi.Input[str]]
670
- """
671
- Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
672
- """
673
- slot: NotRequired[pulumi.Input[str]]
674
- """
675
- The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
676
- """
677
- token_label: NotRequired[pulumi.Input[str]]
678
- """
679
- The slot token label to use
680
- """
681
- uuid: NotRequired[pulumi.Input[str]]
682
- """
683
- ID of the managed key read from Vault
684
- """
685
- elif False:
686
- KeysPkcArgsDict: TypeAlias = Mapping[str, Any]
687
-
688
483
  @pulumi.input_type
689
484
  class KeysPkcArgs:
690
485
  def __init__(__self__, *,
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
  from . import outputs
17
12
  from ._inputs import *
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
pulumi_vault/mfa_duo.py CHANGED
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
 
17
12
  __all__ = ['MfaDuoArgs', 'MfaDuo']
pulumi_vault/mfa_okta.py CHANGED
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
 
17
12
  __all__ = ['MfaOktaArgs', 'MfaOkta']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
 
17
12
  __all__ = ['MfaPingidArgs', 'MfaPingid']
pulumi_vault/mfa_totp.py CHANGED
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
 
17
12
  __all__ = ['MfaTotpArgs', 'MfaTotp']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretBackendArgs', 'SecretBackend']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretRoleArgs', 'SecretRole']
pulumi_vault/mount.py CHANGED
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
 
17
12
  __all__ = ['MountArgs', 'Mount']
@@ -34,7 +29,7 @@ class MountArgs:
34
29
  local: Optional[pulumi.Input[bool]] = None,
35
30
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
36
31
  namespace: Optional[pulumi.Input[str]] = None,
37
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
32
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
38
33
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
39
34
  plugin_version: Optional[pulumi.Input[str]] = None,
40
35
  seal_wrap: Optional[pulumi.Input[bool]] = None):
@@ -62,7 +57,7 @@ class MountArgs:
62
57
  The value should not contain leading or trailing forward slashes.
63
58
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
64
59
  *Available only for Vault Enterprise*.
65
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
60
+ :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
66
61
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to
67
62
  the plugin.
68
63
  :param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
@@ -296,14 +291,14 @@ class MountArgs:
296
291
 
297
292
  @property
298
293
  @pulumi.getter
299
- def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
294
+ def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
300
295
  """
301
296
  Specifies mount type specific options that are passed to the backend
302
297
  """
303
298
  return pulumi.get(self, "options")
304
299
 
305
300
  @options.setter
306
- def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
301
+ def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
307
302
  pulumi.set(self, "options", value)
308
303
 
309
304
  @property
@@ -363,7 +358,7 @@ class _MountState:
363
358
  local: Optional[pulumi.Input[bool]] = None,
364
359
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
365
360
  namespace: Optional[pulumi.Input[str]] = None,
366
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
361
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
367
362
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
368
363
  path: Optional[pulumi.Input[str]] = None,
369
364
  plugin_version: Optional[pulumi.Input[str]] = None,
@@ -392,7 +387,7 @@ class _MountState:
392
387
  The value should not contain leading or trailing forward slashes.
393
388
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
394
389
  *Available only for Vault Enterprise*.
395
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
390
+ :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
396
391
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to
397
392
  the plugin.
398
393
  :param pulumi.Input[str] path: Where the secret backend will be mounted
@@ -620,14 +615,14 @@ class _MountState:
620
615
 
621
616
  @property
622
617
  @pulumi.getter
623
- def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
618
+ def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
624
619
  """
625
620
  Specifies mount type specific options that are passed to the backend
626
621
  """
627
622
  return pulumi.get(self, "options")
628
623
 
629
624
  @options.setter
630
- def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
625
+ def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
631
626
  pulumi.set(self, "options", value)
632
627
 
633
628
  @property
@@ -712,7 +707,7 @@ class Mount(pulumi.CustomResource):
712
707
  local: Optional[pulumi.Input[bool]] = None,
713
708
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
714
709
  namespace: Optional[pulumi.Input[str]] = None,
715
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
710
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
716
711
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
717
712
  path: Optional[pulumi.Input[str]] = None,
718
713
  plugin_version: Optional[pulumi.Input[str]] = None,
@@ -757,7 +752,7 @@ class Mount(pulumi.CustomResource):
757
752
  type="transit",
758
753
  description="This is an example transit secret engine mount",
759
754
  options={
760
- "convergent_encryption": "false",
755
+ "convergent_encryption": False,
761
756
  })
762
757
  ```
763
758
 
@@ -803,7 +798,7 @@ class Mount(pulumi.CustomResource):
803
798
  The value should not contain leading or trailing forward slashes.
804
799
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
805
800
  *Available only for Vault Enterprise*.
806
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
801
+ :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
807
802
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to
808
803
  the plugin.
809
804
  :param pulumi.Input[str] path: Where the secret backend will be mounted
@@ -857,7 +852,7 @@ class Mount(pulumi.CustomResource):
857
852
  type="transit",
858
853
  description="This is an example transit secret engine mount",
859
854
  options={
860
- "convergent_encryption": "false",
855
+ "convergent_encryption": False,
861
856
  })
862
857
  ```
863
858
 
@@ -909,7 +904,7 @@ class Mount(pulumi.CustomResource):
909
904
  local: Optional[pulumi.Input[bool]] = None,
910
905
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
911
906
  namespace: Optional[pulumi.Input[str]] = None,
912
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
907
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
913
908
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
914
909
  path: Optional[pulumi.Input[str]] = None,
915
910
  plugin_version: Optional[pulumi.Input[str]] = None,
@@ -972,7 +967,7 @@ class Mount(pulumi.CustomResource):
972
967
  local: Optional[pulumi.Input[bool]] = None,
973
968
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
974
969
  namespace: Optional[pulumi.Input[str]] = None,
975
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
970
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
976
971
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
977
972
  path: Optional[pulumi.Input[str]] = None,
978
973
  plugin_version: Optional[pulumi.Input[str]] = None,
@@ -1006,7 +1001,7 @@ class Mount(pulumi.CustomResource):
1006
1001
  The value should not contain leading or trailing forward slashes.
1007
1002
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1008
1003
  *Available only for Vault Enterprise*.
1009
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
1004
+ :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
1010
1005
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to
1011
1006
  the plugin.
1012
1007
  :param pulumi.Input[str] path: Where the secret backend will be mounted
@@ -1163,7 +1158,7 @@ class Mount(pulumi.CustomResource):
1163
1158
 
1164
1159
  @property
1165
1160
  @pulumi.getter
1166
- def options(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
1161
+ def options(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
1167
1162
  """
1168
1163
  Specifies mount type specific options that are passed to the backend
1169
1164
  """
pulumi_vault/namespace.py CHANGED
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
 
17
12
  __all__ = ['NamespaceArgs', 'Namespace']
@@ -20,13 +15,13 @@ __all__ = ['NamespaceArgs', 'Namespace']
20
15
  class NamespaceArgs:
21
16
  def __init__(__self__, *,
22
17
  path: pulumi.Input[str],
23
- custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
18
+ custom_metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
24
19
  namespace: Optional[pulumi.Input[str]] = None,
25
20
  path_fq: Optional[pulumi.Input[str]] = None):
26
21
  """
27
22
  The set of arguments for constructing a Namespace resource.
28
23
  :param pulumi.Input[str] path: The path of the namespace. Must not have a trailing `/`.
29
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_metadata: Custom metadata describing this namespace. Value type
24
+ :param pulumi.Input[Mapping[str, Any]] custom_metadata: Custom metadata describing this namespace. Value type
30
25
  is `map[string]string`. Requires Vault version 1.12+.
31
26
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
32
27
  The value should not contain leading or trailing forward slashes.
@@ -57,7 +52,7 @@ class NamespaceArgs:
57
52
 
58
53
  @property
59
54
  @pulumi.getter(name="customMetadata")
60
- def custom_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
55
+ def custom_metadata(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
61
56
  """
62
57
  Custom metadata describing this namespace. Value type
63
58
  is `map[string]string`. Requires Vault version 1.12+.
@@ -65,7 +60,7 @@ class NamespaceArgs:
65
60
  return pulumi.get(self, "custom_metadata")
66
61
 
67
62
  @custom_metadata.setter
68
- def custom_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
63
+ def custom_metadata(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
69
64
  pulumi.set(self, "custom_metadata", value)
70
65
 
71
66
  @property
@@ -100,14 +95,14 @@ class NamespaceArgs:
100
95
  @pulumi.input_type
101
96
  class _NamespaceState:
102
97
  def __init__(__self__, *,
103
- custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
98
+ custom_metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
104
99
  namespace: Optional[pulumi.Input[str]] = None,
105
100
  namespace_id: Optional[pulumi.Input[str]] = None,
106
101
  path: Optional[pulumi.Input[str]] = None,
107
102
  path_fq: Optional[pulumi.Input[str]] = None):
108
103
  """
109
104
  Input properties used for looking up and filtering Namespace resources.
110
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_metadata: Custom metadata describing this namespace. Value type
105
+ :param pulumi.Input[Mapping[str, Any]] custom_metadata: Custom metadata describing this namespace. Value type
111
106
  is `map[string]string`. Requires Vault version 1.12+.
112
107
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
113
108
  The value should not contain leading or trailing forward slashes.
@@ -131,7 +126,7 @@ class _NamespaceState:
131
126
 
132
127
  @property
133
128
  @pulumi.getter(name="customMetadata")
134
- def custom_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
129
+ def custom_metadata(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
135
130
  """
136
131
  Custom metadata describing this namespace. Value type
137
132
  is `map[string]string`. Requires Vault version 1.12+.
@@ -139,7 +134,7 @@ class _NamespaceState:
139
134
  return pulumi.get(self, "custom_metadata")
140
135
 
141
136
  @custom_metadata.setter
142
- def custom_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
137
+ def custom_metadata(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
143
138
  pulumi.set(self, "custom_metadata", value)
144
139
 
145
140
  @property
@@ -200,7 +195,7 @@ class Namespace(pulumi.CustomResource):
200
195
  def __init__(__self__,
201
196
  resource_name: str,
202
197
  opts: Optional[pulumi.ResourceOptions] = None,
203
- custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
198
+ custom_metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
204
199
  namespace: Optional[pulumi.Input[str]] = None,
205
200
  path: Optional[pulumi.Input[str]] = None,
206
201
  path_fq: Optional[pulumi.Input[str]] = None,
@@ -258,7 +253,7 @@ class Namespace(pulumi.CustomResource):
258
253
 
259
254
  :param str resource_name: The name of the resource.
260
255
  :param pulumi.ResourceOptions opts: Options for the resource.
261
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_metadata: Custom metadata describing this namespace. Value type
256
+ :param pulumi.Input[Mapping[str, Any]] custom_metadata: Custom metadata describing this namespace. Value type
262
257
  is `map[string]string`. Requires Vault version 1.12+.
263
258
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
264
259
  The value should not contain leading or trailing forward slashes.
@@ -340,7 +335,7 @@ class Namespace(pulumi.CustomResource):
340
335
  def _internal_init(__self__,
341
336
  resource_name: str,
342
337
  opts: Optional[pulumi.ResourceOptions] = None,
343
- custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
338
+ custom_metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
344
339
  namespace: Optional[pulumi.Input[str]] = None,
345
340
  path: Optional[pulumi.Input[str]] = None,
346
341
  path_fq: Optional[pulumi.Input[str]] = None,
@@ -370,7 +365,7 @@ class Namespace(pulumi.CustomResource):
370
365
  def get(resource_name: str,
371
366
  id: pulumi.Input[str],
372
367
  opts: Optional[pulumi.ResourceOptions] = None,
373
- custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
368
+ custom_metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
374
369
  namespace: Optional[pulumi.Input[str]] = None,
375
370
  namespace_id: Optional[pulumi.Input[str]] = None,
376
371
  path: Optional[pulumi.Input[str]] = None,
@@ -382,7 +377,7 @@ class Namespace(pulumi.CustomResource):
382
377
  :param str resource_name: The unique name of the resulting resource.
383
378
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
384
379
  :param pulumi.ResourceOptions opts: Options for the resource.
385
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_metadata: Custom metadata describing this namespace. Value type
380
+ :param pulumi.Input[Mapping[str, Any]] custom_metadata: Custom metadata describing this namespace. Value type
386
381
  is `map[string]string`. Requires Vault version 1.12+.
387
382
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
388
383
  The value should not contain leading or trailing forward slashes.
@@ -406,7 +401,7 @@ class Namespace(pulumi.CustomResource):
406
401
 
407
402
  @property
408
403
  @pulumi.getter(name="customMetadata")
409
- def custom_metadata(self) -> pulumi.Output[Mapping[str, str]]:
404
+ def custom_metadata(self) -> pulumi.Output[Mapping[str, Any]]:
410
405
  """
411
406
  Custom metadata describing this namespace. Value type
412
407
  is `map[string]string`. Requires Vault version 1.12+.
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
 
17
12
  __all__ = ['NomadSecretBackendArgs', 'NomadSecretBackend']