pulumi-vault 6.4.0__py3-none-any.whl → 6.4.0a1723820369__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +0 -560
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +4 -19
  4. pulumi_vault/ad/secret_backend.py +0 -5
  5. pulumi_vault/ad/secret_library.py +0 -5
  6. pulumi_vault/ad/secret_role.py +0 -5
  7. pulumi_vault/alicloud/auth_backend_role.py +0 -5
  8. pulumi_vault/approle/auth_backend_login.py +0 -5
  9. pulumi_vault/approle/auth_backend_role.py +0 -5
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -99
  11. pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
  12. pulumi_vault/audit.py +0 -5
  13. pulumi_vault/audit_request_header.py +0 -5
  14. pulumi_vault/auth_backend.py +0 -5
  15. pulumi_vault/aws/auth_backend_cert.py +0 -5
  16. pulumi_vault/aws/auth_backend_client.py +0 -5
  17. pulumi_vault/aws/auth_backend_config_identity.py +0 -5
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
  19. pulumi_vault/aws/auth_backend_login.py +0 -5
  20. pulumi_vault/aws/auth_backend_role.py +0 -5
  21. pulumi_vault/aws/auth_backend_role_tag.py +0 -5
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
  23. pulumi_vault/aws/auth_backend_sts_role.py +0 -5
  24. pulumi_vault/aws/get_access_credentials.py +4 -31
  25. pulumi_vault/aws/get_static_access_credentials.py +4 -18
  26. pulumi_vault/aws/secret_backend.py +0 -5
  27. pulumi_vault/aws/secret_backend_role.py +0 -5
  28. pulumi_vault/aws/secret_backend_static_role.py +0 -5
  29. pulumi_vault/azure/_inputs.py +0 -24
  30. pulumi_vault/azure/auth_backend_config.py +0 -5
  31. pulumi_vault/azure/auth_backend_role.py +0 -5
  32. pulumi_vault/azure/backend.py +0 -5
  33. pulumi_vault/azure/backend_role.py +0 -5
  34. pulumi_vault/azure/get_access_credentials.py +4 -36
  35. pulumi_vault/azure/outputs.py +0 -5
  36. pulumi_vault/cert_auth_backend_role.py +0 -5
  37. pulumi_vault/config/__init__.pyi +0 -5
  38. pulumi_vault/config/_inputs.py +0 -21
  39. pulumi_vault/config/outputs.py +0 -5
  40. pulumi_vault/config/ui_custom_message.py +0 -5
  41. pulumi_vault/config/vars.py +0 -5
  42. pulumi_vault/consul/secret_backend.py +0 -5
  43. pulumi_vault/consul/secret_backend_role.py +0 -5
  44. pulumi_vault/database/_inputs.py +34 -2185
  45. pulumi_vault/database/outputs.py +0 -145
  46. pulumi_vault/database/secret_backend_connection.py +0 -5
  47. pulumi_vault/database/secret_backend_role.py +0 -5
  48. pulumi_vault/database/secret_backend_static_role.py +1 -69
  49. pulumi_vault/database/secrets_mount.py +0 -5
  50. pulumi_vault/egp_policy.py +0 -5
  51. pulumi_vault/gcp/_inputs.py +0 -111
  52. pulumi_vault/gcp/auth_backend.py +0 -5
  53. pulumi_vault/gcp/auth_backend_role.py +0 -5
  54. pulumi_vault/gcp/get_auth_backend_role.py +4 -42
  55. pulumi_vault/gcp/outputs.py +0 -5
  56. pulumi_vault/gcp/secret_backend.py +0 -5
  57. pulumi_vault/gcp/secret_impersonated_account.py +3 -62
  58. pulumi_vault/gcp/secret_roleset.py +0 -5
  59. pulumi_vault/gcp/secret_static_account.py +0 -5
  60. pulumi_vault/generic/endpoint.py +0 -5
  61. pulumi_vault/generic/get_secret.py +4 -24
  62. pulumi_vault/generic/secret.py +0 -5
  63. pulumi_vault/get_auth_backend.py +4 -21
  64. pulumi_vault/get_auth_backends.py +4 -16
  65. pulumi_vault/get_namespace.py +4 -17
  66. pulumi_vault/get_namespaces.py +4 -13
  67. pulumi_vault/get_nomad_access_token.py +4 -18
  68. pulumi_vault/get_policy_document.py +4 -15
  69. pulumi_vault/get_raft_autopilot_state.py +4 -23
  70. pulumi_vault/github/_inputs.py +0 -55
  71. pulumi_vault/github/auth_backend.py +0 -5
  72. pulumi_vault/github/outputs.py +0 -5
  73. pulumi_vault/github/team.py +0 -5
  74. pulumi_vault/github/user.py +0 -5
  75. pulumi_vault/identity/entity.py +0 -5
  76. pulumi_vault/identity/entity_alias.py +0 -5
  77. pulumi_vault/identity/entity_policies.py +0 -5
  78. pulumi_vault/identity/get_entity.py +4 -34
  79. pulumi_vault/identity/get_group.py +4 -40
  80. pulumi_vault/identity/get_oidc_client_creds.py +4 -16
  81. pulumi_vault/identity/get_oidc_openid_config.py +4 -26
  82. pulumi_vault/identity/get_oidc_public_keys.py +4 -15
  83. pulumi_vault/identity/group.py +0 -5
  84. pulumi_vault/identity/group_alias.py +0 -5
  85. pulumi_vault/identity/group_member_entity_ids.py +0 -5
  86. pulumi_vault/identity/group_member_group_ids.py +0 -5
  87. pulumi_vault/identity/group_policies.py +0 -5
  88. pulumi_vault/identity/mfa_duo.py +0 -5
  89. pulumi_vault/identity/mfa_login_enforcement.py +0 -5
  90. pulumi_vault/identity/mfa_okta.py +0 -5
  91. pulumi_vault/identity/mfa_pingid.py +0 -5
  92. pulumi_vault/identity/mfa_totp.py +0 -5
  93. pulumi_vault/identity/oidc.py +0 -5
  94. pulumi_vault/identity/oidc_assignment.py +0 -5
  95. pulumi_vault/identity/oidc_client.py +0 -5
  96. pulumi_vault/identity/oidc_key.py +0 -5
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
  98. pulumi_vault/identity/oidc_provider.py +0 -5
  99. pulumi_vault/identity/oidc_role.py +0 -5
  100. pulumi_vault/identity/oidc_scope.py +0 -5
  101. pulumi_vault/identity/outputs.py +0 -5
  102. pulumi_vault/jwt/_inputs.py +0 -55
  103. pulumi_vault/jwt/auth_backend.py +0 -5
  104. pulumi_vault/jwt/auth_backend_role.py +0 -5
  105. pulumi_vault/jwt/outputs.py +0 -5
  106. pulumi_vault/kmip/secret_backend.py +0 -5
  107. pulumi_vault/kmip/secret_role.py +0 -5
  108. pulumi_vault/kmip/secret_scope.py +0 -5
  109. pulumi_vault/kubernetes/auth_backend_config.py +3 -55
  110. pulumi_vault/kubernetes/auth_backend_role.py +0 -5
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +7 -59
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
  113. pulumi_vault/kubernetes/get_service_account_token.py +4 -28
  114. pulumi_vault/kubernetes/secret_backend.py +0 -5
  115. pulumi_vault/kubernetes/secret_backend_role.py +0 -5
  116. pulumi_vault/kv/_inputs.py +0 -32
  117. pulumi_vault/kv/get_secret.py +4 -19
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +4 -23
  119. pulumi_vault/kv/get_secret_v2.py +6 -25
  120. pulumi_vault/kv/get_secrets_list.py +4 -15
  121. pulumi_vault/kv/get_secrets_list_v2.py +4 -18
  122. pulumi_vault/kv/outputs.py +0 -5
  123. pulumi_vault/kv/secret.py +0 -5
  124. pulumi_vault/kv/secret_backend_v2.py +0 -5
  125. pulumi_vault/kv/secret_v2.py +0 -5
  126. pulumi_vault/ldap/auth_backend.py +0 -52
  127. pulumi_vault/ldap/auth_backend_group.py +0 -5
  128. pulumi_vault/ldap/auth_backend_user.py +0 -5
  129. pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
  130. pulumi_vault/ldap/get_static_credentials.py +4 -23
  131. pulumi_vault/ldap/secret_backend.py +0 -5
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
  133. pulumi_vault/ldap/secret_backend_library_set.py +0 -5
  134. pulumi_vault/ldap/secret_backend_static_role.py +0 -5
  135. pulumi_vault/managed/_inputs.py +0 -205
  136. pulumi_vault/managed/keys.py +0 -5
  137. pulumi_vault/managed/outputs.py +0 -5
  138. pulumi_vault/mfa_duo.py +0 -5
  139. pulumi_vault/mfa_okta.py +0 -5
  140. pulumi_vault/mfa_pingid.py +0 -5
  141. pulumi_vault/mfa_totp.py +0 -5
  142. pulumi_vault/mongodbatlas/secret_backend.py +0 -5
  143. pulumi_vault/mongodbatlas/secret_role.py +0 -5
  144. pulumi_vault/mount.py +0 -5
  145. pulumi_vault/namespace.py +0 -5
  146. pulumi_vault/nomad_secret_backend.py +0 -5
  147. pulumi_vault/nomad_secret_role.py +0 -5
  148. pulumi_vault/okta/_inputs.py +0 -39
  149. pulumi_vault/okta/auth_backend.py +0 -5
  150. pulumi_vault/okta/auth_backend_group.py +0 -5
  151. pulumi_vault/okta/auth_backend_user.py +0 -5
  152. pulumi_vault/okta/outputs.py +0 -5
  153. pulumi_vault/outputs.py +0 -5
  154. pulumi_vault/password_policy.py +0 -5
  155. pulumi_vault/pkisecret/_inputs.py +0 -41
  156. pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
  157. pulumi_vault/pkisecret/backend_config_est.py +0 -5
  158. pulumi_vault/pkisecret/get_backend_config_est.py +4 -22
  159. pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
  160. pulumi_vault/pkisecret/get_backend_issuers.py +4 -17
  161. pulumi_vault/pkisecret/get_backend_key.py +4 -19
  162. pulumi_vault/pkisecret/get_backend_keys.py +4 -17
  163. pulumi_vault/pkisecret/outputs.py +0 -5
  164. pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
  172. pulumi_vault/pkisecret/secret_backend_key.py +0 -5
  173. pulumi_vault/pkisecret/secret_backend_role.py +0 -5
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
  176. pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
  177. pulumi_vault/plugin.py +0 -5
  178. pulumi_vault/plugin_pinned_version.py +0 -5
  179. pulumi_vault/policy.py +0 -5
  180. pulumi_vault/provider.py +0 -5
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +0 -5
  183. pulumi_vault/quota_rate_limit.py +0 -5
  184. pulumi_vault/rabbitmq/_inputs.py +0 -61
  185. pulumi_vault/rabbitmq/outputs.py +0 -5
  186. pulumi_vault/rabbitmq/secret_backend.py +0 -5
  187. pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
  188. pulumi_vault/raft_autopilot.py +0 -5
  189. pulumi_vault/raft_snapshot_agent_config.py +0 -5
  190. pulumi_vault/rgp_policy.py +0 -5
  191. pulumi_vault/saml/auth_backend.py +0 -5
  192. pulumi_vault/saml/auth_backend_role.py +0 -5
  193. pulumi_vault/secrets/_inputs.py +0 -30
  194. pulumi_vault/secrets/outputs.py +0 -5
  195. pulumi_vault/secrets/sync_association.py +0 -5
  196. pulumi_vault/secrets/sync_aws_destination.py +0 -5
  197. pulumi_vault/secrets/sync_azure_destination.py +0 -5
  198. pulumi_vault/secrets/sync_config.py +0 -5
  199. pulumi_vault/secrets/sync_gcp_destination.py +0 -5
  200. pulumi_vault/secrets/sync_gh_destination.py +0 -5
  201. pulumi_vault/secrets/sync_github_apps.py +0 -5
  202. pulumi_vault/secrets/sync_vercel_destination.py +0 -5
  203. pulumi_vault/ssh/_inputs.py +0 -22
  204. pulumi_vault/ssh/outputs.py +0 -5
  205. pulumi_vault/ssh/secret_backend_ca.py +0 -5
  206. pulumi_vault/ssh/secret_backend_role.py +0 -39
  207. pulumi_vault/terraformcloud/secret_backend.py +0 -5
  208. pulumi_vault/terraformcloud/secret_creds.py +0 -5
  209. pulumi_vault/terraformcloud/secret_role.py +0 -5
  210. pulumi_vault/token.py +0 -5
  211. pulumi_vault/tokenauth/auth_backend_role.py +14 -5
  212. pulumi_vault/transform/alphabet.py +0 -5
  213. pulumi_vault/transform/get_decode.py +4 -28
  214. pulumi_vault/transform/get_encode.py +4 -28
  215. pulumi_vault/transform/role.py +0 -5
  216. pulumi_vault/transform/template.py +0 -5
  217. pulumi_vault/transform/transformation.py +0 -5
  218. pulumi_vault/transit/get_decrypt.py +4 -21
  219. pulumi_vault/transit/get_encrypt.py +4 -23
  220. pulumi_vault/transit/secret_backend_key.py +0 -5
  221. pulumi_vault/transit/secret_cache_config.py +0 -5
  222. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/METADATA +2 -3
  223. pulumi_vault-6.4.0a1723820369.dist-info/RECORD +256 -0
  224. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/WHEEL +1 -1
  225. pulumi_vault-6.4.0.dist-info/RECORD +0 -256
  226. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/top_level.txt +0 -0
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['AuthBackendArgs', 'AuthBackend']
@@ -26,7 +21,6 @@ class AuthBackendArgs:
26
21
  certificate: Optional[pulumi.Input[str]] = None,
27
22
  client_tls_cert: Optional[pulumi.Input[str]] = None,
28
23
  client_tls_key: Optional[pulumi.Input[str]] = None,
29
- connection_timeout: Optional[pulumi.Input[int]] = None,
30
24
  deny_null_bind: Optional[pulumi.Input[bool]] = None,
31
25
  description: Optional[pulumi.Input[str]] = None,
32
26
  disable_remount: Optional[pulumi.Input[bool]] = None,
@@ -64,7 +58,6 @@ class AuthBackendArgs:
64
58
  :param pulumi.Input[str] bindpass: Password to use with `binddn` when performing user search
65
59
  :param pulumi.Input[bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
66
60
  :param pulumi.Input[str] certificate: Trusted CA to validate TLS certificate
67
- :param pulumi.Input[int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
68
61
  :param pulumi.Input[bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
69
62
  :param pulumi.Input[str] description: Description for the LDAP auth backend mount
70
63
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
@@ -114,8 +107,6 @@ class AuthBackendArgs:
114
107
  pulumi.set(__self__, "client_tls_cert", client_tls_cert)
115
108
  if client_tls_key is not None:
116
109
  pulumi.set(__self__, "client_tls_key", client_tls_key)
117
- if connection_timeout is not None:
118
- pulumi.set(__self__, "connection_timeout", connection_timeout)
119
110
  if deny_null_bind is not None:
120
111
  pulumi.set(__self__, "deny_null_bind", deny_null_bind)
121
112
  if description is not None:
@@ -255,18 +246,6 @@ class AuthBackendArgs:
255
246
  def client_tls_key(self, value: Optional[pulumi.Input[str]]):
256
247
  pulumi.set(self, "client_tls_key", value)
257
248
 
258
- @property
259
- @pulumi.getter(name="connectionTimeout")
260
- def connection_timeout(self) -> Optional[pulumi.Input[int]]:
261
- """
262
- Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
263
- """
264
- return pulumi.get(self, "connection_timeout")
265
-
266
- @connection_timeout.setter
267
- def connection_timeout(self, value: Optional[pulumi.Input[int]]):
268
- pulumi.set(self, "connection_timeout", value)
269
-
270
249
  @property
271
250
  @pulumi.getter(name="denyNullBind")
272
251
  def deny_null_bind(self) -> Optional[pulumi.Input[bool]]:
@@ -643,7 +622,6 @@ class _AuthBackendState:
643
622
  certificate: Optional[pulumi.Input[str]] = None,
644
623
  client_tls_cert: Optional[pulumi.Input[str]] = None,
645
624
  client_tls_key: Optional[pulumi.Input[str]] = None,
646
- connection_timeout: Optional[pulumi.Input[int]] = None,
647
625
  deny_null_bind: Optional[pulumi.Input[bool]] = None,
648
626
  description: Optional[pulumi.Input[str]] = None,
649
627
  disable_remount: Optional[pulumi.Input[bool]] = None,
@@ -682,7 +660,6 @@ class _AuthBackendState:
682
660
  :param pulumi.Input[str] bindpass: Password to use with `binddn` when performing user search
683
661
  :param pulumi.Input[bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
684
662
  :param pulumi.Input[str] certificate: Trusted CA to validate TLS certificate
685
- :param pulumi.Input[int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
686
663
  :param pulumi.Input[bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
687
664
  :param pulumi.Input[str] description: Description for the LDAP auth backend mount
688
665
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
@@ -734,8 +711,6 @@ class _AuthBackendState:
734
711
  pulumi.set(__self__, "client_tls_cert", client_tls_cert)
735
712
  if client_tls_key is not None:
736
713
  pulumi.set(__self__, "client_tls_key", client_tls_key)
737
- if connection_timeout is not None:
738
- pulumi.set(__self__, "connection_timeout", connection_timeout)
739
714
  if deny_null_bind is not None:
740
715
  pulumi.set(__self__, "deny_null_bind", deny_null_bind)
741
716
  if description is not None:
@@ -877,18 +852,6 @@ class _AuthBackendState:
877
852
  def client_tls_key(self, value: Optional[pulumi.Input[str]]):
878
853
  pulumi.set(self, "client_tls_key", value)
879
854
 
880
- @property
881
- @pulumi.getter(name="connectionTimeout")
882
- def connection_timeout(self) -> Optional[pulumi.Input[int]]:
883
- """
884
- Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
885
- """
886
- return pulumi.get(self, "connection_timeout")
887
-
888
- @connection_timeout.setter
889
- def connection_timeout(self, value: Optional[pulumi.Input[int]]):
890
- pulumi.set(self, "connection_timeout", value)
891
-
892
855
  @property
893
856
  @pulumi.getter(name="denyNullBind")
894
857
  def deny_null_bind(self) -> Optional[pulumi.Input[bool]]:
@@ -1278,7 +1241,6 @@ class AuthBackend(pulumi.CustomResource):
1278
1241
  certificate: Optional[pulumi.Input[str]] = None,
1279
1242
  client_tls_cert: Optional[pulumi.Input[str]] = None,
1280
1243
  client_tls_key: Optional[pulumi.Input[str]] = None,
1281
- connection_timeout: Optional[pulumi.Input[int]] = None,
1282
1244
  deny_null_bind: Optional[pulumi.Input[bool]] = None,
1283
1245
  description: Optional[pulumi.Input[str]] = None,
1284
1246
  disable_remount: Optional[pulumi.Input[bool]] = None,
@@ -1345,7 +1307,6 @@ class AuthBackend(pulumi.CustomResource):
1345
1307
  :param pulumi.Input[str] bindpass: Password to use with `binddn` when performing user search
1346
1308
  :param pulumi.Input[bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
1347
1309
  :param pulumi.Input[str] certificate: Trusted CA to validate TLS certificate
1348
- :param pulumi.Input[int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
1349
1310
  :param pulumi.Input[bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
1350
1311
  :param pulumi.Input[str] description: Description for the LDAP auth backend mount
1351
1312
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
@@ -1438,7 +1399,6 @@ class AuthBackend(pulumi.CustomResource):
1438
1399
  certificate: Optional[pulumi.Input[str]] = None,
1439
1400
  client_tls_cert: Optional[pulumi.Input[str]] = None,
1440
1401
  client_tls_key: Optional[pulumi.Input[str]] = None,
1441
- connection_timeout: Optional[pulumi.Input[int]] = None,
1442
1402
  deny_null_bind: Optional[pulumi.Input[bool]] = None,
1443
1403
  description: Optional[pulumi.Input[str]] = None,
1444
1404
  disable_remount: Optional[pulumi.Input[bool]] = None,
@@ -1485,7 +1445,6 @@ class AuthBackend(pulumi.CustomResource):
1485
1445
  __props__.__dict__["certificate"] = certificate
1486
1446
  __props__.__dict__["client_tls_cert"] = client_tls_cert
1487
1447
  __props__.__dict__["client_tls_key"] = None if client_tls_key is None else pulumi.Output.secret(client_tls_key)
1488
- __props__.__dict__["connection_timeout"] = connection_timeout
1489
1448
  __props__.__dict__["deny_null_bind"] = deny_null_bind
1490
1449
  __props__.__dict__["description"] = description
1491
1450
  __props__.__dict__["disable_remount"] = disable_remount
@@ -1539,7 +1498,6 @@ class AuthBackend(pulumi.CustomResource):
1539
1498
  certificate: Optional[pulumi.Input[str]] = None,
1540
1499
  client_tls_cert: Optional[pulumi.Input[str]] = None,
1541
1500
  client_tls_key: Optional[pulumi.Input[str]] = None,
1542
- connection_timeout: Optional[pulumi.Input[int]] = None,
1543
1501
  deny_null_bind: Optional[pulumi.Input[bool]] = None,
1544
1502
  description: Optional[pulumi.Input[str]] = None,
1545
1503
  disable_remount: Optional[pulumi.Input[bool]] = None,
@@ -1583,7 +1541,6 @@ class AuthBackend(pulumi.CustomResource):
1583
1541
  :param pulumi.Input[str] bindpass: Password to use with `binddn` when performing user search
1584
1542
  :param pulumi.Input[bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
1585
1543
  :param pulumi.Input[str] certificate: Trusted CA to validate TLS certificate
1586
- :param pulumi.Input[int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
1587
1544
  :param pulumi.Input[bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
1588
1545
  :param pulumi.Input[str] description: Description for the LDAP auth backend mount
1589
1546
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
@@ -1632,7 +1589,6 @@ class AuthBackend(pulumi.CustomResource):
1632
1589
  __props__.__dict__["certificate"] = certificate
1633
1590
  __props__.__dict__["client_tls_cert"] = client_tls_cert
1634
1591
  __props__.__dict__["client_tls_key"] = client_tls_key
1635
- __props__.__dict__["connection_timeout"] = connection_timeout
1636
1592
  __props__.__dict__["deny_null_bind"] = deny_null_bind
1637
1593
  __props__.__dict__["description"] = description
1638
1594
  __props__.__dict__["disable_remount"] = disable_remount
@@ -1716,14 +1672,6 @@ class AuthBackend(pulumi.CustomResource):
1716
1672
  def client_tls_key(self) -> pulumi.Output[str]:
1717
1673
  return pulumi.get(self, "client_tls_key")
1718
1674
 
1719
- @property
1720
- @pulumi.getter(name="connectionTimeout")
1721
- def connection_timeout(self) -> pulumi.Output[int]:
1722
- """
1723
- Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
1724
- """
1725
- return pulumi.get(self, "connection_timeout")
1726
-
1727
1675
  @property
1728
1676
  @pulumi.getter(name="denyNullBind")
1729
1677
  def deny_null_bind(self) -> pulumi.Output[bool]:
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['AuthBackendGroupArgs', 'AuthBackendGroup']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['AuthBackendUserArgs', 'AuthBackendUser']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -155,6 +150,9 @@ def get_dynamic_credentials(mount: Optional[str] = None,
155
150
  password=pulumi.get(__ret__, 'password'),
156
151
  role_name=pulumi.get(__ret__, 'role_name'),
157
152
  username=pulumi.get(__ret__, 'username'))
153
+
154
+
155
+ @_utilities.lift_output_func(get_dynamic_credentials)
158
156
  def get_dynamic_credentials_output(mount: Optional[pulumi.Input[str]] = None,
159
157
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
160
158
  role_name: Optional[pulumi.Input[str]] = None,
@@ -162,20 +160,4 @@ def get_dynamic_credentials_output(mount: Optional[pulumi.Input[str]] = None,
162
160
  """
163
161
  Use this data source to access information about an existing resource.
164
162
  """
165
- __args__ = dict()
166
- __args__['mount'] = mount
167
- __args__['namespace'] = namespace
168
- __args__['roleName'] = role_name
169
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
170
- __ret__ = pulumi.runtime.invoke_output('vault:ldap/getDynamicCredentials:getDynamicCredentials', __args__, opts=opts, typ=GetDynamicCredentialsResult)
171
- return __ret__.apply(lambda __response__: GetDynamicCredentialsResult(
172
- distinguished_names=pulumi.get(__response__, 'distinguished_names'),
173
- id=pulumi.get(__response__, 'id'),
174
- lease_duration=pulumi.get(__response__, 'lease_duration'),
175
- lease_id=pulumi.get(__response__, 'lease_id'),
176
- lease_renewable=pulumi.get(__response__, 'lease_renewable'),
177
- mount=pulumi.get(__response__, 'mount'),
178
- namespace=pulumi.get(__response__, 'namespace'),
179
- password=pulumi.get(__response__, 'password'),
180
- role_name=pulumi.get(__response__, 'role_name'),
181
- username=pulumi.get(__response__, 'username')))
163
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -165,6 +160,9 @@ def get_static_credentials(mount: Optional[str] = None,
165
160
  rotation_period=pulumi.get(__ret__, 'rotation_period'),
166
161
  ttl=pulumi.get(__ret__, 'ttl'),
167
162
  username=pulumi.get(__ret__, 'username'))
163
+
164
+
165
+ @_utilities.lift_output_func(get_static_credentials)
168
166
  def get_static_credentials_output(mount: Optional[pulumi.Input[str]] = None,
169
167
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
170
168
  role_name: Optional[pulumi.Input[str]] = None,
@@ -172,21 +170,4 @@ def get_static_credentials_output(mount: Optional[pulumi.Input[str]] = None,
172
170
  """
173
171
  Use this data source to access information about an existing resource.
174
172
  """
175
- __args__ = dict()
176
- __args__['mount'] = mount
177
- __args__['namespace'] = namespace
178
- __args__['roleName'] = role_name
179
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
180
- __ret__ = pulumi.runtime.invoke_output('vault:ldap/getStaticCredentials:getStaticCredentials', __args__, opts=opts, typ=GetStaticCredentialsResult)
181
- return __ret__.apply(lambda __response__: GetStaticCredentialsResult(
182
- dn=pulumi.get(__response__, 'dn'),
183
- id=pulumi.get(__response__, 'id'),
184
- last_password=pulumi.get(__response__, 'last_password'),
185
- last_vault_rotation=pulumi.get(__response__, 'last_vault_rotation'),
186
- mount=pulumi.get(__response__, 'mount'),
187
- namespace=pulumi.get(__response__, 'namespace'),
188
- password=pulumi.get(__response__, 'password'),
189
- role_name=pulumi.get(__response__, 'role_name'),
190
- rotation_period=pulumi.get(__response__, 'rotation_period'),
191
- ttl=pulumi.get(__response__, 'ttl'),
192
- username=pulumi.get(__response__, 'username')))
173
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretBackendArgs', 'SecretBackend']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretBackendDynamicRoleArgs', 'SecretBackendDynamicRole']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretBackendLibrarySetArgs', 'SecretBackendLibrarySet']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole']
@@ -4,88 +4,17 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
18
13
  'KeysAwArgs',
19
- 'KeysAwArgsDict',
20
14
  'KeysAzureArgs',
21
- 'KeysAzureArgsDict',
22
15
  'KeysPkcArgs',
23
- 'KeysPkcArgsDict',
24
16
  ]
25
17
 
26
- MYPY = False
27
-
28
- if not MYPY:
29
- class KeysAwArgsDict(TypedDict):
30
- access_key: pulumi.Input[str]
31
- """
32
- The AWS access key to use
33
- """
34
- key_bits: pulumi.Input[str]
35
- """
36
- The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
37
- """
38
- key_type: pulumi.Input[str]
39
- """
40
- The type of key to use
41
- """
42
- kms_key: pulumi.Input[str]
43
- """
44
- An identifier for the key
45
- """
46
- name: pulumi.Input[str]
47
- """
48
- A unique lowercase name that serves as identifying the key
49
- """
50
- secret_key: pulumi.Input[str]
51
- """
52
- The AWS secret key to use
53
- """
54
- allow_generate_key: NotRequired[pulumi.Input[bool]]
55
- """
56
- If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
57
- """
58
- allow_replace_key: NotRequired[pulumi.Input[bool]]
59
- """
60
- Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
61
- """
62
- allow_store_key: NotRequired[pulumi.Input[bool]]
63
- """
64
- Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
65
- """
66
- any_mount: NotRequired[pulumi.Input[bool]]
67
- """
68
- Allow usage from any mount point within the namespace if 'true'
69
- """
70
- curve: NotRequired[pulumi.Input[str]]
71
- """
72
- The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
73
- """
74
- endpoint: NotRequired[pulumi.Input[str]]
75
- """
76
- Used to specify a custom AWS endpoint
77
- """
78
- region: NotRequired[pulumi.Input[str]]
79
- """
80
- The AWS region where the keys are stored (or will be stored)
81
- """
82
- uuid: NotRequired[pulumi.Input[str]]
83
- """
84
- ID of the managed key read from Vault
85
- """
86
- elif False:
87
- KeysAwArgsDict: TypeAlias = Mapping[str, Any]
88
-
89
18
  @pulumi.input_type
90
19
  class KeysAwArgs:
91
20
  def __init__(__self__, *,
@@ -311,71 +240,6 @@ class KeysAwArgs:
311
240
  pulumi.set(self, "uuid", value)
312
241
 
313
242
 
314
- if not MYPY:
315
- class KeysAzureArgsDict(TypedDict):
316
- client_id: pulumi.Input[str]
317
- """
318
- The client id for credentials to query the Azure APIs
319
- """
320
- client_secret: pulumi.Input[str]
321
- """
322
- The client secret for credentials to query the Azure APIs
323
- """
324
- key_name: pulumi.Input[str]
325
- """
326
- The Key Vault key to use for encryption and decryption
327
- """
328
- key_type: pulumi.Input[str]
329
- """
330
- The type of key to use
331
- """
332
- name: pulumi.Input[str]
333
- """
334
- A unique lowercase name that serves as identifying the key
335
- """
336
- tenant_id: pulumi.Input[str]
337
- """
338
- The tenant id for the Azure Active Directory organization
339
- """
340
- vault_name: pulumi.Input[str]
341
- """
342
- The Key Vault vault to use the encryption keys for encryption and decryption
343
- """
344
- allow_generate_key: NotRequired[pulumi.Input[bool]]
345
- """
346
- If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
347
- """
348
- allow_replace_key: NotRequired[pulumi.Input[bool]]
349
- """
350
- Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
351
- """
352
- allow_store_key: NotRequired[pulumi.Input[bool]]
353
- """
354
- Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
355
- """
356
- any_mount: NotRequired[pulumi.Input[bool]]
357
- """
358
- Allow usage from any mount point within the namespace if 'true'
359
- """
360
- environment: NotRequired[pulumi.Input[str]]
361
- """
362
- The Azure Cloud environment API endpoints to use
363
- """
364
- key_bits: NotRequired[pulumi.Input[str]]
365
- """
366
- The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
367
- """
368
- resource: NotRequired[pulumi.Input[str]]
369
- """
370
- The Azure Key Vault resource's DNS Suffix to connect to
371
- """
372
- uuid: NotRequired[pulumi.Input[str]]
373
- """
374
- ID of the managed key read from Vault
375
- """
376
- elif False:
377
- KeysAzureArgsDict: TypeAlias = Mapping[str, Any]
378
-
379
243
  @pulumi.input_type
380
244
  class KeysAzureArgs:
381
245
  def __init__(__self__, *,
@@ -616,75 +480,6 @@ class KeysAzureArgs:
616
480
  pulumi.set(self, "uuid", value)
617
481
 
618
482
 
619
- if not MYPY:
620
- class KeysPkcArgsDict(TypedDict):
621
- key_id: pulumi.Input[str]
622
- """
623
- The id of a PKCS#11 key to use
624
- """
625
- key_label: pulumi.Input[str]
626
- """
627
- The label of the key to use
628
- """
629
- library: pulumi.Input[str]
630
- """
631
- The name of the kms_library stanza to use from Vault's config to lookup the local library path
632
- """
633
- mechanism: pulumi.Input[str]
634
- """
635
- The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
636
- """
637
- name: pulumi.Input[str]
638
- """
639
- A unique lowercase name that serves as identifying the key
640
- """
641
- pin: pulumi.Input[str]
642
- """
643
- The PIN for login
644
- """
645
- allow_generate_key: NotRequired[pulumi.Input[bool]]
646
- """
647
- If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
648
- """
649
- allow_replace_key: NotRequired[pulumi.Input[bool]]
650
- """
651
- Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
652
- """
653
- allow_store_key: NotRequired[pulumi.Input[bool]]
654
- """
655
- Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
656
- """
657
- any_mount: NotRequired[pulumi.Input[bool]]
658
- """
659
- Allow usage from any mount point within the namespace if 'true'
660
- """
661
- curve: NotRequired[pulumi.Input[str]]
662
- """
663
- Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
664
- """
665
- force_rw_session: NotRequired[pulumi.Input[str]]
666
- """
667
- Force all operations to open up a read-write session to the HSM
668
- """
669
- key_bits: NotRequired[pulumi.Input[str]]
670
- """
671
- Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
672
- """
673
- slot: NotRequired[pulumi.Input[str]]
674
- """
675
- The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
676
- """
677
- token_label: NotRequired[pulumi.Input[str]]
678
- """
679
- The slot token label to use
680
- """
681
- uuid: NotRequired[pulumi.Input[str]]
682
- """
683
- ID of the managed key read from Vault
684
- """
685
- elif False:
686
- KeysPkcArgsDict: TypeAlias = Mapping[str, Any]
687
-
688
483
  @pulumi.input_type
689
484
  class KeysPkcArgs:
690
485
  def __init__(__self__, *,
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
  from . import outputs
17
12
  from ._inputs import *
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
pulumi_vault/mfa_duo.py CHANGED
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
 
17
12
  __all__ = ['MfaDuoArgs', 'MfaDuo']
pulumi_vault/mfa_okta.py CHANGED
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
 
17
12
  __all__ = ['MfaOktaArgs', 'MfaOkta']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
 
17
12
  __all__ = ['MfaPingidArgs', 'MfaPingid']