pulumi-vault 6.4.0__py3-none-any.whl → 6.4.0a1723820369__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -560
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +4 -19
- pulumi_vault/ad/secret_backend.py +0 -5
- pulumi_vault/ad/secret_library.py +0 -5
- pulumi_vault/ad/secret_role.py +0 -5
- pulumi_vault/alicloud/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_login.py +0 -5
- pulumi_vault/approle/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -99
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
- pulumi_vault/audit.py +0 -5
- pulumi_vault/audit_request_header.py +0 -5
- pulumi_vault/auth_backend.py +0 -5
- pulumi_vault/aws/auth_backend_cert.py +0 -5
- pulumi_vault/aws/auth_backend_client.py +0 -5
- pulumi_vault/aws/auth_backend_config_identity.py +0 -5
- pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
- pulumi_vault/aws/auth_backend_login.py +0 -5
- pulumi_vault/aws/auth_backend_role.py +0 -5
- pulumi_vault/aws/auth_backend_role_tag.py +0 -5
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
- pulumi_vault/aws/auth_backend_sts_role.py +0 -5
- pulumi_vault/aws/get_access_credentials.py +4 -31
- pulumi_vault/aws/get_static_access_credentials.py +4 -18
- pulumi_vault/aws/secret_backend.py +0 -5
- pulumi_vault/aws/secret_backend_role.py +0 -5
- pulumi_vault/aws/secret_backend_static_role.py +0 -5
- pulumi_vault/azure/_inputs.py +0 -24
- pulumi_vault/azure/auth_backend_config.py +0 -5
- pulumi_vault/azure/auth_backend_role.py +0 -5
- pulumi_vault/azure/backend.py +0 -5
- pulumi_vault/azure/backend_role.py +0 -5
- pulumi_vault/azure/get_access_credentials.py +4 -36
- pulumi_vault/azure/outputs.py +0 -5
- pulumi_vault/cert_auth_backend_role.py +0 -5
- pulumi_vault/config/__init__.pyi +0 -5
- pulumi_vault/config/_inputs.py +0 -21
- pulumi_vault/config/outputs.py +0 -5
- pulumi_vault/config/ui_custom_message.py +0 -5
- pulumi_vault/config/vars.py +0 -5
- pulumi_vault/consul/secret_backend.py +0 -5
- pulumi_vault/consul/secret_backend_role.py +0 -5
- pulumi_vault/database/_inputs.py +34 -2185
- pulumi_vault/database/outputs.py +0 -145
- pulumi_vault/database/secret_backend_connection.py +0 -5
- pulumi_vault/database/secret_backend_role.py +0 -5
- pulumi_vault/database/secret_backend_static_role.py +1 -69
- pulumi_vault/database/secrets_mount.py +0 -5
- pulumi_vault/egp_policy.py +0 -5
- pulumi_vault/gcp/_inputs.py +0 -111
- pulumi_vault/gcp/auth_backend.py +0 -5
- pulumi_vault/gcp/auth_backend_role.py +0 -5
- pulumi_vault/gcp/get_auth_backend_role.py +4 -42
- pulumi_vault/gcp/outputs.py +0 -5
- pulumi_vault/gcp/secret_backend.py +0 -5
- pulumi_vault/gcp/secret_impersonated_account.py +3 -62
- pulumi_vault/gcp/secret_roleset.py +0 -5
- pulumi_vault/gcp/secret_static_account.py +0 -5
- pulumi_vault/generic/endpoint.py +0 -5
- pulumi_vault/generic/get_secret.py +4 -24
- pulumi_vault/generic/secret.py +0 -5
- pulumi_vault/get_auth_backend.py +4 -21
- pulumi_vault/get_auth_backends.py +4 -16
- pulumi_vault/get_namespace.py +4 -17
- pulumi_vault/get_namespaces.py +4 -13
- pulumi_vault/get_nomad_access_token.py +4 -18
- pulumi_vault/get_policy_document.py +4 -15
- pulumi_vault/get_raft_autopilot_state.py +4 -23
- pulumi_vault/github/_inputs.py +0 -55
- pulumi_vault/github/auth_backend.py +0 -5
- pulumi_vault/github/outputs.py +0 -5
- pulumi_vault/github/team.py +0 -5
- pulumi_vault/github/user.py +0 -5
- pulumi_vault/identity/entity.py +0 -5
- pulumi_vault/identity/entity_alias.py +0 -5
- pulumi_vault/identity/entity_policies.py +0 -5
- pulumi_vault/identity/get_entity.py +4 -34
- pulumi_vault/identity/get_group.py +4 -40
- pulumi_vault/identity/get_oidc_client_creds.py +4 -16
- pulumi_vault/identity/get_oidc_openid_config.py +4 -26
- pulumi_vault/identity/get_oidc_public_keys.py +4 -15
- pulumi_vault/identity/group.py +0 -5
- pulumi_vault/identity/group_alias.py +0 -5
- pulumi_vault/identity/group_member_entity_ids.py +0 -5
- pulumi_vault/identity/group_member_group_ids.py +0 -5
- pulumi_vault/identity/group_policies.py +0 -5
- pulumi_vault/identity/mfa_duo.py +0 -5
- pulumi_vault/identity/mfa_login_enforcement.py +0 -5
- pulumi_vault/identity/mfa_okta.py +0 -5
- pulumi_vault/identity/mfa_pingid.py +0 -5
- pulumi_vault/identity/mfa_totp.py +0 -5
- pulumi_vault/identity/oidc.py +0 -5
- pulumi_vault/identity/oidc_assignment.py +0 -5
- pulumi_vault/identity/oidc_client.py +0 -5
- pulumi_vault/identity/oidc_key.py +0 -5
- pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
- pulumi_vault/identity/oidc_provider.py +0 -5
- pulumi_vault/identity/oidc_role.py +0 -5
- pulumi_vault/identity/oidc_scope.py +0 -5
- pulumi_vault/identity/outputs.py +0 -5
- pulumi_vault/jwt/_inputs.py +0 -55
- pulumi_vault/jwt/auth_backend.py +0 -5
- pulumi_vault/jwt/auth_backend_role.py +0 -5
- pulumi_vault/jwt/outputs.py +0 -5
- pulumi_vault/kmip/secret_backend.py +0 -5
- pulumi_vault/kmip/secret_role.py +0 -5
- pulumi_vault/kmip/secret_scope.py +0 -5
- pulumi_vault/kubernetes/auth_backend_config.py +3 -55
- pulumi_vault/kubernetes/auth_backend_role.py +0 -5
- pulumi_vault/kubernetes/get_auth_backend_config.py +7 -59
- pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
- pulumi_vault/kubernetes/get_service_account_token.py +4 -28
- pulumi_vault/kubernetes/secret_backend.py +0 -5
- pulumi_vault/kubernetes/secret_backend_role.py +0 -5
- pulumi_vault/kv/_inputs.py +0 -32
- pulumi_vault/kv/get_secret.py +4 -19
- pulumi_vault/kv/get_secret_subkeys_v2.py +4 -23
- pulumi_vault/kv/get_secret_v2.py +6 -25
- pulumi_vault/kv/get_secrets_list.py +4 -15
- pulumi_vault/kv/get_secrets_list_v2.py +4 -18
- pulumi_vault/kv/outputs.py +0 -5
- pulumi_vault/kv/secret.py +0 -5
- pulumi_vault/kv/secret_backend_v2.py +0 -5
- pulumi_vault/kv/secret_v2.py +0 -5
- pulumi_vault/ldap/auth_backend.py +0 -52
- pulumi_vault/ldap/auth_backend_group.py +0 -5
- pulumi_vault/ldap/auth_backend_user.py +0 -5
- pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
- pulumi_vault/ldap/get_static_credentials.py +4 -23
- pulumi_vault/ldap/secret_backend.py +0 -5
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
- pulumi_vault/ldap/secret_backend_library_set.py +0 -5
- pulumi_vault/ldap/secret_backend_static_role.py +0 -5
- pulumi_vault/managed/_inputs.py +0 -205
- pulumi_vault/managed/keys.py +0 -5
- pulumi_vault/managed/outputs.py +0 -5
- pulumi_vault/mfa_duo.py +0 -5
- pulumi_vault/mfa_okta.py +0 -5
- pulumi_vault/mfa_pingid.py +0 -5
- pulumi_vault/mfa_totp.py +0 -5
- pulumi_vault/mongodbatlas/secret_backend.py +0 -5
- pulumi_vault/mongodbatlas/secret_role.py +0 -5
- pulumi_vault/mount.py +0 -5
- pulumi_vault/namespace.py +0 -5
- pulumi_vault/nomad_secret_backend.py +0 -5
- pulumi_vault/nomad_secret_role.py +0 -5
- pulumi_vault/okta/_inputs.py +0 -39
- pulumi_vault/okta/auth_backend.py +0 -5
- pulumi_vault/okta/auth_backend_group.py +0 -5
- pulumi_vault/okta/auth_backend_user.py +0 -5
- pulumi_vault/okta/outputs.py +0 -5
- pulumi_vault/outputs.py +0 -5
- pulumi_vault/password_policy.py +0 -5
- pulumi_vault/pkisecret/_inputs.py +0 -41
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
- pulumi_vault/pkisecret/backend_config_est.py +0 -5
- pulumi_vault/pkisecret/get_backend_config_est.py +4 -22
- pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -17
- pulumi_vault/pkisecret/get_backend_key.py +4 -19
- pulumi_vault/pkisecret/get_backend_keys.py +4 -17
- pulumi_vault/pkisecret/outputs.py +0 -5
- pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
- pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
- pulumi_vault/pkisecret/secret_backend_key.py +0 -5
- pulumi_vault/pkisecret/secret_backend_role.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
- pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
- pulumi_vault/plugin.py +0 -5
- pulumi_vault/plugin_pinned_version.py +0 -5
- pulumi_vault/policy.py +0 -5
- pulumi_vault/provider.py +0 -5
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +0 -5
- pulumi_vault/quota_rate_limit.py +0 -5
- pulumi_vault/rabbitmq/_inputs.py +0 -61
- pulumi_vault/rabbitmq/outputs.py +0 -5
- pulumi_vault/rabbitmq/secret_backend.py +0 -5
- pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
- pulumi_vault/raft_autopilot.py +0 -5
- pulumi_vault/raft_snapshot_agent_config.py +0 -5
- pulumi_vault/rgp_policy.py +0 -5
- pulumi_vault/saml/auth_backend.py +0 -5
- pulumi_vault/saml/auth_backend_role.py +0 -5
- pulumi_vault/secrets/_inputs.py +0 -30
- pulumi_vault/secrets/outputs.py +0 -5
- pulumi_vault/secrets/sync_association.py +0 -5
- pulumi_vault/secrets/sync_aws_destination.py +0 -5
- pulumi_vault/secrets/sync_azure_destination.py +0 -5
- pulumi_vault/secrets/sync_config.py +0 -5
- pulumi_vault/secrets/sync_gcp_destination.py +0 -5
- pulumi_vault/secrets/sync_gh_destination.py +0 -5
- pulumi_vault/secrets/sync_github_apps.py +0 -5
- pulumi_vault/secrets/sync_vercel_destination.py +0 -5
- pulumi_vault/ssh/_inputs.py +0 -22
- pulumi_vault/ssh/outputs.py +0 -5
- pulumi_vault/ssh/secret_backend_ca.py +0 -5
- pulumi_vault/ssh/secret_backend_role.py +0 -39
- pulumi_vault/terraformcloud/secret_backend.py +0 -5
- pulumi_vault/terraformcloud/secret_creds.py +0 -5
- pulumi_vault/terraformcloud/secret_role.py +0 -5
- pulumi_vault/token.py +0 -5
- pulumi_vault/tokenauth/auth_backend_role.py +14 -5
- pulumi_vault/transform/alphabet.py +0 -5
- pulumi_vault/transform/get_decode.py +4 -28
- pulumi_vault/transform/get_encode.py +4 -28
- pulumi_vault/transform/role.py +0 -5
- pulumi_vault/transform/template.py +0 -5
- pulumi_vault/transform/transformation.py +0 -5
- pulumi_vault/transit/get_decrypt.py +4 -21
- pulumi_vault/transit/get_encrypt.py +4 -23
- pulumi_vault/transit/secret_backend_key.py +0 -5
- pulumi_vault/transit/secret_cache_config.py +0 -5
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/METADATA +2 -3
- pulumi_vault-6.4.0a1723820369.dist-info/RECORD +256 -0
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/WHEEL +1 -1
- pulumi_vault-6.4.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/top_level.txt +0 -0
pulumi_vault/mfa_totp.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = ['MfaTotpArgs', 'MfaTotp']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendArgs', 'SecretBackend']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretRoleArgs', 'SecretRole']
|
pulumi_vault/mount.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = ['MountArgs', 'Mount']
|
pulumi_vault/namespace.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = ['NamespaceArgs', 'Namespace']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = ['NomadSecretBackendArgs', 'NomadSecretBackend']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = ['NomadSecretRoleArgs', 'NomadSecretRole']
|
pulumi_vault/okta/_inputs.py
CHANGED
@@ -4,38 +4,16 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
18
13
|
'AuthBackendGroupArgs',
|
19
|
-
'AuthBackendGroupArgsDict',
|
20
14
|
'AuthBackendUserArgs',
|
21
|
-
'AuthBackendUserArgsDict',
|
22
15
|
]
|
23
16
|
|
24
|
-
MYPY = False
|
25
|
-
|
26
|
-
if not MYPY:
|
27
|
-
class AuthBackendGroupArgsDict(TypedDict):
|
28
|
-
group_name: pulumi.Input[str]
|
29
|
-
"""
|
30
|
-
Name of the Okta group
|
31
|
-
"""
|
32
|
-
policies: pulumi.Input[Sequence[pulumi.Input[str]]]
|
33
|
-
"""
|
34
|
-
Policies to associate with this group
|
35
|
-
"""
|
36
|
-
elif False:
|
37
|
-
AuthBackendGroupArgsDict: TypeAlias = Mapping[str, Any]
|
38
|
-
|
39
17
|
@pulumi.input_type
|
40
18
|
class AuthBackendGroupArgs:
|
41
19
|
def __init__(__self__, *,
|
@@ -73,23 +51,6 @@ class AuthBackendGroupArgs:
|
|
73
51
|
pulumi.set(self, "policies", value)
|
74
52
|
|
75
53
|
|
76
|
-
if not MYPY:
|
77
|
-
class AuthBackendUserArgsDict(TypedDict):
|
78
|
-
username: pulumi.Input[str]
|
79
|
-
"""
|
80
|
-
Name of the user within Okta
|
81
|
-
"""
|
82
|
-
groups: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
83
|
-
"""
|
84
|
-
Groups within the Okta auth backend to associate with this user
|
85
|
-
"""
|
86
|
-
policies: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
87
|
-
"""
|
88
|
-
Policies to associate with this user
|
89
|
-
"""
|
90
|
-
elif False:
|
91
|
-
AuthBackendUserArgsDict: TypeAlias = Mapping[str, Any]
|
92
|
-
|
93
54
|
@pulumi.input_type
|
94
55
|
class AuthBackendUserArgs:
|
95
56
|
def __init__(__self__, *,
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
from . import outputs
|
17
12
|
from ._inputs import *
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendGroupInitArgs', 'AuthBackendGroup']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendUserInitArgs', 'AuthBackendUser']
|
pulumi_vault/okta/outputs.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
pulumi_vault/outputs.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
from . import outputs
|
17
12
|
|
pulumi_vault/password_policy.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = ['PasswordPolicyArgs', 'PasswordPolicy']
|
@@ -4,38 +4,16 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
18
13
|
'BackendConfigEstAuthenticatorsArgs',
|
19
|
-
'BackendConfigEstAuthenticatorsArgsDict',
|
20
14
|
'SecretBackendRolePolicyIdentifierArgs',
|
21
|
-
'SecretBackendRolePolicyIdentifierArgsDict',
|
22
15
|
]
|
23
16
|
|
24
|
-
MYPY = False
|
25
|
-
|
26
|
-
if not MYPY:
|
27
|
-
class BackendConfigEstAuthenticatorsArgsDict(TypedDict):
|
28
|
-
cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
29
|
-
"""
|
30
|
-
"The accessor (required) and cert_role (optional) properties for cert auth backends".
|
31
|
-
"""
|
32
|
-
userpass: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
33
|
-
"""
|
34
|
-
"The accessor (required) property for user pass auth backends".
|
35
|
-
"""
|
36
|
-
elif False:
|
37
|
-
BackendConfigEstAuthenticatorsArgsDict: TypeAlias = Mapping[str, Any]
|
38
|
-
|
39
17
|
@pulumi.input_type
|
40
18
|
class BackendConfigEstAuthenticatorsArgs:
|
41
19
|
def __init__(__self__, *,
|
@@ -75,25 +53,6 @@ class BackendConfigEstAuthenticatorsArgs:
|
|
75
53
|
pulumi.set(self, "userpass", value)
|
76
54
|
|
77
55
|
|
78
|
-
if not MYPY:
|
79
|
-
class SecretBackendRolePolicyIdentifierArgsDict(TypedDict):
|
80
|
-
oid: pulumi.Input[str]
|
81
|
-
"""
|
82
|
-
The OID for the policy identifier
|
83
|
-
"""
|
84
|
-
cps: NotRequired[pulumi.Input[str]]
|
85
|
-
"""
|
86
|
-
The URL of the CPS for the policy identifier
|
87
|
-
|
88
|
-
Example usage:
|
89
|
-
"""
|
90
|
-
notice: NotRequired[pulumi.Input[str]]
|
91
|
-
"""
|
92
|
-
A notice for the policy identifier
|
93
|
-
"""
|
94
|
-
elif False:
|
95
|
-
SecretBackendRolePolicyIdentifierArgsDict: TypeAlias = Mapping[str, Any]
|
96
|
-
|
97
56
|
@pulumi.input_type
|
98
57
|
class SecretBackendRolePolicyIdentifierArgs:
|
99
58
|
def __init__(__self__, *,
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['BackendConfigClusterArgs', 'BackendConfigCluster']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
from . import outputs
|
17
12
|
from ._inputs import *
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
from . import outputs
|
17
12
|
|
@@ -207,6 +202,9 @@ def get_backend_config_est(backend: Optional[str] = None,
|
|
207
202
|
label_to_path_policy=pulumi.get(__ret__, 'label_to_path_policy'),
|
208
203
|
last_updated=pulumi.get(__ret__, 'last_updated'),
|
209
204
|
namespace=pulumi.get(__ret__, 'namespace'))
|
205
|
+
|
206
|
+
|
207
|
+
@_utilities.lift_output_func(get_backend_config_est)
|
210
208
|
def get_backend_config_est_output(backend: Optional[pulumi.Input[str]] = None,
|
211
209
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
212
210
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendConfigEstResult]:
|
@@ -232,20 +230,4 @@ def get_backend_config_est_output(backend: Optional[pulumi.Input[str]] = None,
|
|
232
230
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
233
231
|
*Available only for Vault Enterprise*.
|
234
232
|
"""
|
235
|
-
|
236
|
-
__args__['backend'] = backend
|
237
|
-
__args__['namespace'] = namespace
|
238
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
239
|
-
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendConfigEst:getBackendConfigEst', __args__, opts=opts, typ=GetBackendConfigEstResult)
|
240
|
-
return __ret__.apply(lambda __response__: GetBackendConfigEstResult(
|
241
|
-
audit_fields=pulumi.get(__response__, 'audit_fields'),
|
242
|
-
authenticators=pulumi.get(__response__, 'authenticators'),
|
243
|
-
backend=pulumi.get(__response__, 'backend'),
|
244
|
-
default_mount=pulumi.get(__response__, 'default_mount'),
|
245
|
-
default_path_policy=pulumi.get(__response__, 'default_path_policy'),
|
246
|
-
enable_sentinel_parsing=pulumi.get(__response__, 'enable_sentinel_parsing'),
|
247
|
-
enabled=pulumi.get(__response__, 'enabled'),
|
248
|
-
id=pulumi.get(__response__, 'id'),
|
249
|
-
label_to_path_policy=pulumi.get(__response__, 'label_to_path_policy'),
|
250
|
-
last_updated=pulumi.get(__response__, 'last_updated'),
|
251
|
-
namespace=pulumi.get(__response__, 'namespace')))
|
233
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -227,6 +222,9 @@ def get_backend_issuer(backend: Optional[str] = None,
|
|
227
222
|
manual_chains=pulumi.get(__ret__, 'manual_chains'),
|
228
223
|
namespace=pulumi.get(__ret__, 'namespace'),
|
229
224
|
usage=pulumi.get(__ret__, 'usage'))
|
225
|
+
|
226
|
+
|
227
|
+
@_utilities.lift_output_func(get_backend_issuer)
|
230
228
|
def get_backend_issuer_output(backend: Optional[pulumi.Input[str]] = None,
|
231
229
|
issuer_ref: Optional[pulumi.Input[str]] = None,
|
232
230
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
@@ -261,22 +259,4 @@ def get_backend_issuer_output(backend: Optional[pulumi.Input[str]] = None,
|
|
261
259
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
262
260
|
*Available only for Vault Enterprise*.
|
263
261
|
"""
|
264
|
-
|
265
|
-
__args__['backend'] = backend
|
266
|
-
__args__['issuerRef'] = issuer_ref
|
267
|
-
__args__['namespace'] = namespace
|
268
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
269
|
-
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendIssuer:getBackendIssuer', __args__, opts=opts, typ=GetBackendIssuerResult)
|
270
|
-
return __ret__.apply(lambda __response__: GetBackendIssuerResult(
|
271
|
-
backend=pulumi.get(__response__, 'backend'),
|
272
|
-
ca_chains=pulumi.get(__response__, 'ca_chains'),
|
273
|
-
certificate=pulumi.get(__response__, 'certificate'),
|
274
|
-
id=pulumi.get(__response__, 'id'),
|
275
|
-
issuer_id=pulumi.get(__response__, 'issuer_id'),
|
276
|
-
issuer_name=pulumi.get(__response__, 'issuer_name'),
|
277
|
-
issuer_ref=pulumi.get(__response__, 'issuer_ref'),
|
278
|
-
key_id=pulumi.get(__response__, 'key_id'),
|
279
|
-
leaf_not_after_behavior=pulumi.get(__response__, 'leaf_not_after_behavior'),
|
280
|
-
manual_chains=pulumi.get(__response__, 'manual_chains'),
|
281
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
282
|
-
usage=pulumi.get(__response__, 'usage')))
|
262
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -147,6 +142,9 @@ def get_backend_issuers(backend: Optional[str] = None,
|
|
147
142
|
key_info_json=pulumi.get(__ret__, 'key_info_json'),
|
148
143
|
keys=pulumi.get(__ret__, 'keys'),
|
149
144
|
namespace=pulumi.get(__ret__, 'namespace'))
|
145
|
+
|
146
|
+
|
147
|
+
@_utilities.lift_output_func(get_backend_issuers)
|
150
148
|
def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None,
|
151
149
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
152
150
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendIssuersResult]:
|
@@ -178,15 +176,4 @@ def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None,
|
|
178
176
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
179
177
|
*Available only for Vault Enterprise*.
|
180
178
|
"""
|
181
|
-
|
182
|
-
__args__['backend'] = backend
|
183
|
-
__args__['namespace'] = namespace
|
184
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
185
|
-
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendIssuers:getBackendIssuers', __args__, opts=opts, typ=GetBackendIssuersResult)
|
186
|
-
return __ret__.apply(lambda __response__: GetBackendIssuersResult(
|
187
|
-
backend=pulumi.get(__response__, 'backend'),
|
188
|
-
id=pulumi.get(__response__, 'id'),
|
189
|
-
key_info=pulumi.get(__response__, 'key_info'),
|
190
|
-
key_info_json=pulumi.get(__response__, 'key_info_json'),
|
191
|
-
keys=pulumi.get(__response__, 'keys'),
|
192
|
-
namespace=pulumi.get(__response__, 'namespace')))
|
179
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -161,6 +156,9 @@ def get_backend_key(backend: Optional[str] = None,
|
|
161
156
|
key_ref=pulumi.get(__ret__, 'key_ref'),
|
162
157
|
key_type=pulumi.get(__ret__, 'key_type'),
|
163
158
|
namespace=pulumi.get(__ret__, 'namespace'))
|
159
|
+
|
160
|
+
|
161
|
+
@_utilities.lift_output_func(get_backend_key)
|
164
162
|
def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
|
165
163
|
key_ref: Optional[pulumi.Input[str]] = None,
|
166
164
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
@@ -195,17 +193,4 @@ def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
|
|
195
193
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
196
194
|
*Available only for Vault Enterprise*.
|
197
195
|
"""
|
198
|
-
|
199
|
-
__args__['backend'] = backend
|
200
|
-
__args__['keyRef'] = key_ref
|
201
|
-
__args__['namespace'] = namespace
|
202
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
203
|
-
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendKey:getBackendKey', __args__, opts=opts, typ=GetBackendKeyResult)
|
204
|
-
return __ret__.apply(lambda __response__: GetBackendKeyResult(
|
205
|
-
backend=pulumi.get(__response__, 'backend'),
|
206
|
-
id=pulumi.get(__response__, 'id'),
|
207
|
-
key_id=pulumi.get(__response__, 'key_id'),
|
208
|
-
key_name=pulumi.get(__response__, 'key_name'),
|
209
|
-
key_ref=pulumi.get(__response__, 'key_ref'),
|
210
|
-
key_type=pulumi.get(__response__, 'key_type'),
|
211
|
-
namespace=pulumi.get(__response__, 'namespace')))
|
196
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -147,6 +142,9 @@ def get_backend_keys(backend: Optional[str] = None,
|
|
147
142
|
key_info_json=pulumi.get(__ret__, 'key_info_json'),
|
148
143
|
keys=pulumi.get(__ret__, 'keys'),
|
149
144
|
namespace=pulumi.get(__ret__, 'namespace'))
|
145
|
+
|
146
|
+
|
147
|
+
@_utilities.lift_output_func(get_backend_keys)
|
150
148
|
def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None,
|
151
149
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
152
150
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendKeysResult]:
|
@@ -178,15 +176,4 @@ def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None,
|
|
178
176
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
179
177
|
*Available only for Vault Enterprise*.
|
180
178
|
"""
|
181
|
-
|
182
|
-
__args__['backend'] = backend
|
183
|
-
__args__['namespace'] = namespace
|
184
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
185
|
-
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendKeys:getBackendKeys', __args__, opts=opts, typ=GetBackendKeysResult)
|
186
|
-
return __ret__.apply(lambda __response__: GetBackendKeysResult(
|
187
|
-
backend=pulumi.get(__response__, 'backend'),
|
188
|
-
id=pulumi.get(__response__, 'id'),
|
189
|
-
key_info=pulumi.get(__response__, 'key_info'),
|
190
|
-
key_info_json=pulumi.get(__response__, 'key_info_json'),
|
191
|
-
keys=pulumi.get(__response__, 'keys'),
|
192
|
-
namespace=pulumi.get(__response__, 'namespace')))
|
179
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendCertArgs', 'SecretBackendCert']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendConfigCaArgs', 'SecretBackendConfigCa']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendConfigIssuersArgs', 'SecretBackendConfigIssuers']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendConfigUrlsArgs', 'SecretBackendConfigUrls']
|