pulumi-vault 6.4.0__py3-none-any.whl → 6.4.0a1723820369__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -560
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +4 -19
- pulumi_vault/ad/secret_backend.py +0 -5
- pulumi_vault/ad/secret_library.py +0 -5
- pulumi_vault/ad/secret_role.py +0 -5
- pulumi_vault/alicloud/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_login.py +0 -5
- pulumi_vault/approle/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -99
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
- pulumi_vault/audit.py +0 -5
- pulumi_vault/audit_request_header.py +0 -5
- pulumi_vault/auth_backend.py +0 -5
- pulumi_vault/aws/auth_backend_cert.py +0 -5
- pulumi_vault/aws/auth_backend_client.py +0 -5
- pulumi_vault/aws/auth_backend_config_identity.py +0 -5
- pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
- pulumi_vault/aws/auth_backend_login.py +0 -5
- pulumi_vault/aws/auth_backend_role.py +0 -5
- pulumi_vault/aws/auth_backend_role_tag.py +0 -5
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
- pulumi_vault/aws/auth_backend_sts_role.py +0 -5
- pulumi_vault/aws/get_access_credentials.py +4 -31
- pulumi_vault/aws/get_static_access_credentials.py +4 -18
- pulumi_vault/aws/secret_backend.py +0 -5
- pulumi_vault/aws/secret_backend_role.py +0 -5
- pulumi_vault/aws/secret_backend_static_role.py +0 -5
- pulumi_vault/azure/_inputs.py +0 -24
- pulumi_vault/azure/auth_backend_config.py +0 -5
- pulumi_vault/azure/auth_backend_role.py +0 -5
- pulumi_vault/azure/backend.py +0 -5
- pulumi_vault/azure/backend_role.py +0 -5
- pulumi_vault/azure/get_access_credentials.py +4 -36
- pulumi_vault/azure/outputs.py +0 -5
- pulumi_vault/cert_auth_backend_role.py +0 -5
- pulumi_vault/config/__init__.pyi +0 -5
- pulumi_vault/config/_inputs.py +0 -21
- pulumi_vault/config/outputs.py +0 -5
- pulumi_vault/config/ui_custom_message.py +0 -5
- pulumi_vault/config/vars.py +0 -5
- pulumi_vault/consul/secret_backend.py +0 -5
- pulumi_vault/consul/secret_backend_role.py +0 -5
- pulumi_vault/database/_inputs.py +34 -2185
- pulumi_vault/database/outputs.py +0 -145
- pulumi_vault/database/secret_backend_connection.py +0 -5
- pulumi_vault/database/secret_backend_role.py +0 -5
- pulumi_vault/database/secret_backend_static_role.py +1 -69
- pulumi_vault/database/secrets_mount.py +0 -5
- pulumi_vault/egp_policy.py +0 -5
- pulumi_vault/gcp/_inputs.py +0 -111
- pulumi_vault/gcp/auth_backend.py +0 -5
- pulumi_vault/gcp/auth_backend_role.py +0 -5
- pulumi_vault/gcp/get_auth_backend_role.py +4 -42
- pulumi_vault/gcp/outputs.py +0 -5
- pulumi_vault/gcp/secret_backend.py +0 -5
- pulumi_vault/gcp/secret_impersonated_account.py +3 -62
- pulumi_vault/gcp/secret_roleset.py +0 -5
- pulumi_vault/gcp/secret_static_account.py +0 -5
- pulumi_vault/generic/endpoint.py +0 -5
- pulumi_vault/generic/get_secret.py +4 -24
- pulumi_vault/generic/secret.py +0 -5
- pulumi_vault/get_auth_backend.py +4 -21
- pulumi_vault/get_auth_backends.py +4 -16
- pulumi_vault/get_namespace.py +4 -17
- pulumi_vault/get_namespaces.py +4 -13
- pulumi_vault/get_nomad_access_token.py +4 -18
- pulumi_vault/get_policy_document.py +4 -15
- pulumi_vault/get_raft_autopilot_state.py +4 -23
- pulumi_vault/github/_inputs.py +0 -55
- pulumi_vault/github/auth_backend.py +0 -5
- pulumi_vault/github/outputs.py +0 -5
- pulumi_vault/github/team.py +0 -5
- pulumi_vault/github/user.py +0 -5
- pulumi_vault/identity/entity.py +0 -5
- pulumi_vault/identity/entity_alias.py +0 -5
- pulumi_vault/identity/entity_policies.py +0 -5
- pulumi_vault/identity/get_entity.py +4 -34
- pulumi_vault/identity/get_group.py +4 -40
- pulumi_vault/identity/get_oidc_client_creds.py +4 -16
- pulumi_vault/identity/get_oidc_openid_config.py +4 -26
- pulumi_vault/identity/get_oidc_public_keys.py +4 -15
- pulumi_vault/identity/group.py +0 -5
- pulumi_vault/identity/group_alias.py +0 -5
- pulumi_vault/identity/group_member_entity_ids.py +0 -5
- pulumi_vault/identity/group_member_group_ids.py +0 -5
- pulumi_vault/identity/group_policies.py +0 -5
- pulumi_vault/identity/mfa_duo.py +0 -5
- pulumi_vault/identity/mfa_login_enforcement.py +0 -5
- pulumi_vault/identity/mfa_okta.py +0 -5
- pulumi_vault/identity/mfa_pingid.py +0 -5
- pulumi_vault/identity/mfa_totp.py +0 -5
- pulumi_vault/identity/oidc.py +0 -5
- pulumi_vault/identity/oidc_assignment.py +0 -5
- pulumi_vault/identity/oidc_client.py +0 -5
- pulumi_vault/identity/oidc_key.py +0 -5
- pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
- pulumi_vault/identity/oidc_provider.py +0 -5
- pulumi_vault/identity/oidc_role.py +0 -5
- pulumi_vault/identity/oidc_scope.py +0 -5
- pulumi_vault/identity/outputs.py +0 -5
- pulumi_vault/jwt/_inputs.py +0 -55
- pulumi_vault/jwt/auth_backend.py +0 -5
- pulumi_vault/jwt/auth_backend_role.py +0 -5
- pulumi_vault/jwt/outputs.py +0 -5
- pulumi_vault/kmip/secret_backend.py +0 -5
- pulumi_vault/kmip/secret_role.py +0 -5
- pulumi_vault/kmip/secret_scope.py +0 -5
- pulumi_vault/kubernetes/auth_backend_config.py +3 -55
- pulumi_vault/kubernetes/auth_backend_role.py +0 -5
- pulumi_vault/kubernetes/get_auth_backend_config.py +7 -59
- pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
- pulumi_vault/kubernetes/get_service_account_token.py +4 -28
- pulumi_vault/kubernetes/secret_backend.py +0 -5
- pulumi_vault/kubernetes/secret_backend_role.py +0 -5
- pulumi_vault/kv/_inputs.py +0 -32
- pulumi_vault/kv/get_secret.py +4 -19
- pulumi_vault/kv/get_secret_subkeys_v2.py +4 -23
- pulumi_vault/kv/get_secret_v2.py +6 -25
- pulumi_vault/kv/get_secrets_list.py +4 -15
- pulumi_vault/kv/get_secrets_list_v2.py +4 -18
- pulumi_vault/kv/outputs.py +0 -5
- pulumi_vault/kv/secret.py +0 -5
- pulumi_vault/kv/secret_backend_v2.py +0 -5
- pulumi_vault/kv/secret_v2.py +0 -5
- pulumi_vault/ldap/auth_backend.py +0 -52
- pulumi_vault/ldap/auth_backend_group.py +0 -5
- pulumi_vault/ldap/auth_backend_user.py +0 -5
- pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
- pulumi_vault/ldap/get_static_credentials.py +4 -23
- pulumi_vault/ldap/secret_backend.py +0 -5
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
- pulumi_vault/ldap/secret_backend_library_set.py +0 -5
- pulumi_vault/ldap/secret_backend_static_role.py +0 -5
- pulumi_vault/managed/_inputs.py +0 -205
- pulumi_vault/managed/keys.py +0 -5
- pulumi_vault/managed/outputs.py +0 -5
- pulumi_vault/mfa_duo.py +0 -5
- pulumi_vault/mfa_okta.py +0 -5
- pulumi_vault/mfa_pingid.py +0 -5
- pulumi_vault/mfa_totp.py +0 -5
- pulumi_vault/mongodbatlas/secret_backend.py +0 -5
- pulumi_vault/mongodbatlas/secret_role.py +0 -5
- pulumi_vault/mount.py +0 -5
- pulumi_vault/namespace.py +0 -5
- pulumi_vault/nomad_secret_backend.py +0 -5
- pulumi_vault/nomad_secret_role.py +0 -5
- pulumi_vault/okta/_inputs.py +0 -39
- pulumi_vault/okta/auth_backend.py +0 -5
- pulumi_vault/okta/auth_backend_group.py +0 -5
- pulumi_vault/okta/auth_backend_user.py +0 -5
- pulumi_vault/okta/outputs.py +0 -5
- pulumi_vault/outputs.py +0 -5
- pulumi_vault/password_policy.py +0 -5
- pulumi_vault/pkisecret/_inputs.py +0 -41
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
- pulumi_vault/pkisecret/backend_config_est.py +0 -5
- pulumi_vault/pkisecret/get_backend_config_est.py +4 -22
- pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -17
- pulumi_vault/pkisecret/get_backend_key.py +4 -19
- pulumi_vault/pkisecret/get_backend_keys.py +4 -17
- pulumi_vault/pkisecret/outputs.py +0 -5
- pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
- pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
- pulumi_vault/pkisecret/secret_backend_key.py +0 -5
- pulumi_vault/pkisecret/secret_backend_role.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
- pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
- pulumi_vault/plugin.py +0 -5
- pulumi_vault/plugin_pinned_version.py +0 -5
- pulumi_vault/policy.py +0 -5
- pulumi_vault/provider.py +0 -5
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +0 -5
- pulumi_vault/quota_rate_limit.py +0 -5
- pulumi_vault/rabbitmq/_inputs.py +0 -61
- pulumi_vault/rabbitmq/outputs.py +0 -5
- pulumi_vault/rabbitmq/secret_backend.py +0 -5
- pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
- pulumi_vault/raft_autopilot.py +0 -5
- pulumi_vault/raft_snapshot_agent_config.py +0 -5
- pulumi_vault/rgp_policy.py +0 -5
- pulumi_vault/saml/auth_backend.py +0 -5
- pulumi_vault/saml/auth_backend_role.py +0 -5
- pulumi_vault/secrets/_inputs.py +0 -30
- pulumi_vault/secrets/outputs.py +0 -5
- pulumi_vault/secrets/sync_association.py +0 -5
- pulumi_vault/secrets/sync_aws_destination.py +0 -5
- pulumi_vault/secrets/sync_azure_destination.py +0 -5
- pulumi_vault/secrets/sync_config.py +0 -5
- pulumi_vault/secrets/sync_gcp_destination.py +0 -5
- pulumi_vault/secrets/sync_gh_destination.py +0 -5
- pulumi_vault/secrets/sync_github_apps.py +0 -5
- pulumi_vault/secrets/sync_vercel_destination.py +0 -5
- pulumi_vault/ssh/_inputs.py +0 -22
- pulumi_vault/ssh/outputs.py +0 -5
- pulumi_vault/ssh/secret_backend_ca.py +0 -5
- pulumi_vault/ssh/secret_backend_role.py +0 -39
- pulumi_vault/terraformcloud/secret_backend.py +0 -5
- pulumi_vault/terraformcloud/secret_creds.py +0 -5
- pulumi_vault/terraformcloud/secret_role.py +0 -5
- pulumi_vault/token.py +0 -5
- pulumi_vault/tokenauth/auth_backend_role.py +14 -5
- pulumi_vault/transform/alphabet.py +0 -5
- pulumi_vault/transform/get_decode.py +4 -28
- pulumi_vault/transform/get_encode.py +4 -28
- pulumi_vault/transform/role.py +0 -5
- pulumi_vault/transform/template.py +0 -5
- pulumi_vault/transform/transformation.py +0 -5
- pulumi_vault/transit/get_decrypt.py +4 -21
- pulumi_vault/transit/get_encrypt.py +4 -23
- pulumi_vault/transit/secret_backend_key.py +0 -5
- pulumi_vault/transit/secret_cache_config.py +0 -5
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/METADATA +2 -3
- pulumi_vault-6.4.0a1723820369.dist-info/RECORD +256 -0
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/WHEEL +1 -1
- pulumi_vault-6.4.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/top_level.txt +0 -0
pulumi_vault/_utilities.py
CHANGED
@@ -264,7 +264,7 @@ def call_plain(
|
|
264
264
|
output = pulumi.runtime.call(tok, props, res, typ)
|
265
265
|
|
266
266
|
# Ingoring deps silently. They are typically non-empty, r.f() calls include r as a dependency.
|
267
|
-
result, known, secret, _ = _sync_await(asyncio.
|
267
|
+
result, known, secret, _ = _sync_await(asyncio.ensure_future(_await_output(output)))
|
268
268
|
|
269
269
|
problem = None
|
270
270
|
if not known:
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -144,6 +139,9 @@ def get_access_credentials(backend: Optional[str] = None,
|
|
144
139
|
namespace=pulumi.get(__ret__, 'namespace'),
|
145
140
|
role=pulumi.get(__ret__, 'role'),
|
146
141
|
username=pulumi.get(__ret__, 'username'))
|
142
|
+
|
143
|
+
|
144
|
+
@_utilities.lift_output_func(get_access_credentials)
|
147
145
|
def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
|
148
146
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
149
147
|
role: Optional[pulumi.Input[str]] = None,
|
@@ -161,17 +159,4 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
|
|
161
159
|
:param str role: The name of the AD secret backend role to read
|
162
160
|
credentials from, with no leading or trailing `/`s.
|
163
161
|
"""
|
164
|
-
|
165
|
-
__args__['backend'] = backend
|
166
|
-
__args__['namespace'] = namespace
|
167
|
-
__args__['role'] = role
|
168
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
169
|
-
__ret__ = pulumi.runtime.invoke_output('vault:ad/getAccessCredentials:getAccessCredentials', __args__, opts=opts, typ=GetAccessCredentialsResult)
|
170
|
-
return __ret__.apply(lambda __response__: GetAccessCredentialsResult(
|
171
|
-
backend=pulumi.get(__response__, 'backend'),
|
172
|
-
current_password=pulumi.get(__response__, 'current_password'),
|
173
|
-
id=pulumi.get(__response__, 'id'),
|
174
|
-
last_password=pulumi.get(__response__, 'last_password'),
|
175
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
176
|
-
role=pulumi.get(__response__, 'role'),
|
177
|
-
username=pulumi.get(__response__, 'username')))
|
162
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendArgs', 'SecretBackend']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretLibraryArgs', 'SecretLibrary']
|
pulumi_vault/ad/secret_role.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretRoleArgs', 'SecretRole']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendLoginArgs', 'AuthBackendLogin']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendRoleSecretIdArgs', 'AuthBackendRoleSecretId']
|
@@ -24,9 +19,7 @@ class AuthBackendRoleSecretIdArgs:
|
|
24
19
|
cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
25
20
|
metadata: Optional[pulumi.Input[str]] = None,
|
26
21
|
namespace: Optional[pulumi.Input[str]] = None,
|
27
|
-
num_uses: Optional[pulumi.Input[int]] = None,
|
28
22
|
secret_id: Optional[pulumi.Input[str]] = None,
|
29
|
-
ttl: Optional[pulumi.Input[int]] = None,
|
30
23
|
with_wrapped_accessor: Optional[pulumi.Input[bool]] = None,
|
31
24
|
wrapping_ttl: Optional[pulumi.Input[str]] = None):
|
32
25
|
"""
|
@@ -41,10 +34,8 @@ class AuthBackendRoleSecretIdArgs:
|
|
41
34
|
The value should not contain leading or trailing forward slashes.
|
42
35
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
43
36
|
*Available only for Vault Enterprise*.
|
44
|
-
:param pulumi.Input[int] num_uses: The number of uses for the secret-id.
|
45
37
|
:param pulumi.Input[str] secret_id: The SecretID to be created. If set, uses "Push"
|
46
38
|
mode. Defaults to Vault auto-generating SecretIDs.
|
47
|
-
:param pulumi.Input[int] ttl: The TTL duration of the SecretID.
|
48
39
|
:param pulumi.Input[bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
|
49
40
|
If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
|
50
41
|
invalidated through unwrapping.
|
@@ -62,12 +53,8 @@ class AuthBackendRoleSecretIdArgs:
|
|
62
53
|
pulumi.set(__self__, "metadata", metadata)
|
63
54
|
if namespace is not None:
|
64
55
|
pulumi.set(__self__, "namespace", namespace)
|
65
|
-
if num_uses is not None:
|
66
|
-
pulumi.set(__self__, "num_uses", num_uses)
|
67
56
|
if secret_id is not None:
|
68
57
|
pulumi.set(__self__, "secret_id", secret_id)
|
69
|
-
if ttl is not None:
|
70
|
-
pulumi.set(__self__, "ttl", ttl)
|
71
58
|
if with_wrapped_accessor is not None:
|
72
59
|
pulumi.set(__self__, "with_wrapped_accessor", with_wrapped_accessor)
|
73
60
|
if wrapping_ttl is not None:
|
@@ -138,18 +125,6 @@ class AuthBackendRoleSecretIdArgs:
|
|
138
125
|
def namespace(self, value: Optional[pulumi.Input[str]]):
|
139
126
|
pulumi.set(self, "namespace", value)
|
140
127
|
|
141
|
-
@property
|
142
|
-
@pulumi.getter(name="numUses")
|
143
|
-
def num_uses(self) -> Optional[pulumi.Input[int]]:
|
144
|
-
"""
|
145
|
-
The number of uses for the secret-id.
|
146
|
-
"""
|
147
|
-
return pulumi.get(self, "num_uses")
|
148
|
-
|
149
|
-
@num_uses.setter
|
150
|
-
def num_uses(self, value: Optional[pulumi.Input[int]]):
|
151
|
-
pulumi.set(self, "num_uses", value)
|
152
|
-
|
153
128
|
@property
|
154
129
|
@pulumi.getter(name="secretId")
|
155
130
|
def secret_id(self) -> Optional[pulumi.Input[str]]:
|
@@ -163,18 +138,6 @@ class AuthBackendRoleSecretIdArgs:
|
|
163
138
|
def secret_id(self, value: Optional[pulumi.Input[str]]):
|
164
139
|
pulumi.set(self, "secret_id", value)
|
165
140
|
|
166
|
-
@property
|
167
|
-
@pulumi.getter
|
168
|
-
def ttl(self) -> Optional[pulumi.Input[int]]:
|
169
|
-
"""
|
170
|
-
The TTL duration of the SecretID.
|
171
|
-
"""
|
172
|
-
return pulumi.get(self, "ttl")
|
173
|
-
|
174
|
-
@ttl.setter
|
175
|
-
def ttl(self, value: Optional[pulumi.Input[int]]):
|
176
|
-
pulumi.set(self, "ttl", value)
|
177
|
-
|
178
141
|
@property
|
179
142
|
@pulumi.getter(name="withWrappedAccessor")
|
180
143
|
def with_wrapped_accessor(self) -> Optional[pulumi.Input[bool]]:
|
@@ -213,10 +176,8 @@ class _AuthBackendRoleSecretIdState:
|
|
213
176
|
cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
214
177
|
metadata: Optional[pulumi.Input[str]] = None,
|
215
178
|
namespace: Optional[pulumi.Input[str]] = None,
|
216
|
-
num_uses: Optional[pulumi.Input[int]] = None,
|
217
179
|
role_name: Optional[pulumi.Input[str]] = None,
|
218
180
|
secret_id: Optional[pulumi.Input[str]] = None,
|
219
|
-
ttl: Optional[pulumi.Input[int]] = None,
|
220
181
|
with_wrapped_accessor: Optional[pulumi.Input[bool]] = None,
|
221
182
|
wrapping_accessor: Optional[pulumi.Input[str]] = None,
|
222
183
|
wrapping_token: Optional[pulumi.Input[str]] = None,
|
@@ -233,11 +194,9 @@ class _AuthBackendRoleSecretIdState:
|
|
233
194
|
The value should not contain leading or trailing forward slashes.
|
234
195
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
235
196
|
*Available only for Vault Enterprise*.
|
236
|
-
:param pulumi.Input[int] num_uses: The number of uses for the secret-id.
|
237
197
|
:param pulumi.Input[str] role_name: The name of the role to create the SecretID for.
|
238
198
|
:param pulumi.Input[str] secret_id: The SecretID to be created. If set, uses "Push"
|
239
199
|
mode. Defaults to Vault auto-generating SecretIDs.
|
240
|
-
:param pulumi.Input[int] ttl: The TTL duration of the SecretID.
|
241
200
|
:param pulumi.Input[bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
|
242
201
|
If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
|
243
202
|
invalidated through unwrapping.
|
@@ -259,14 +218,10 @@ class _AuthBackendRoleSecretIdState:
|
|
259
218
|
pulumi.set(__self__, "metadata", metadata)
|
260
219
|
if namespace is not None:
|
261
220
|
pulumi.set(__self__, "namespace", namespace)
|
262
|
-
if num_uses is not None:
|
263
|
-
pulumi.set(__self__, "num_uses", num_uses)
|
264
221
|
if role_name is not None:
|
265
222
|
pulumi.set(__self__, "role_name", role_name)
|
266
223
|
if secret_id is not None:
|
267
224
|
pulumi.set(__self__, "secret_id", secret_id)
|
268
|
-
if ttl is not None:
|
269
|
-
pulumi.set(__self__, "ttl", ttl)
|
270
225
|
if with_wrapped_accessor is not None:
|
271
226
|
pulumi.set(__self__, "with_wrapped_accessor", with_wrapped_accessor)
|
272
227
|
if wrapping_accessor is not None:
|
@@ -341,18 +296,6 @@ class _AuthBackendRoleSecretIdState:
|
|
341
296
|
def namespace(self, value: Optional[pulumi.Input[str]]):
|
342
297
|
pulumi.set(self, "namespace", value)
|
343
298
|
|
344
|
-
@property
|
345
|
-
@pulumi.getter(name="numUses")
|
346
|
-
def num_uses(self) -> Optional[pulumi.Input[int]]:
|
347
|
-
"""
|
348
|
-
The number of uses for the secret-id.
|
349
|
-
"""
|
350
|
-
return pulumi.get(self, "num_uses")
|
351
|
-
|
352
|
-
@num_uses.setter
|
353
|
-
def num_uses(self, value: Optional[pulumi.Input[int]]):
|
354
|
-
pulumi.set(self, "num_uses", value)
|
355
|
-
|
356
299
|
@property
|
357
300
|
@pulumi.getter(name="roleName")
|
358
301
|
def role_name(self) -> Optional[pulumi.Input[str]]:
|
@@ -378,18 +321,6 @@ class _AuthBackendRoleSecretIdState:
|
|
378
321
|
def secret_id(self, value: Optional[pulumi.Input[str]]):
|
379
322
|
pulumi.set(self, "secret_id", value)
|
380
323
|
|
381
|
-
@property
|
382
|
-
@pulumi.getter
|
383
|
-
def ttl(self) -> Optional[pulumi.Input[int]]:
|
384
|
-
"""
|
385
|
-
The TTL duration of the SecretID.
|
386
|
-
"""
|
387
|
-
return pulumi.get(self, "ttl")
|
388
|
-
|
389
|
-
@ttl.setter
|
390
|
-
def ttl(self, value: Optional[pulumi.Input[int]]):
|
391
|
-
pulumi.set(self, "ttl", value)
|
392
|
-
|
393
324
|
@property
|
394
325
|
@pulumi.getter(name="withWrappedAccessor")
|
395
326
|
def with_wrapped_accessor(self) -> Optional[pulumi.Input[bool]]:
|
@@ -454,10 +385,8 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
454
385
|
cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
455
386
|
metadata: Optional[pulumi.Input[str]] = None,
|
456
387
|
namespace: Optional[pulumi.Input[str]] = None,
|
457
|
-
num_uses: Optional[pulumi.Input[int]] = None,
|
458
388
|
role_name: Optional[pulumi.Input[str]] = None,
|
459
389
|
secret_id: Optional[pulumi.Input[str]] = None,
|
460
|
-
ttl: Optional[pulumi.Input[int]] = None,
|
461
390
|
with_wrapped_accessor: Optional[pulumi.Input[bool]] = None,
|
462
391
|
wrapping_ttl: Optional[pulumi.Input[str]] = None,
|
463
392
|
__props__=None):
|
@@ -501,11 +430,9 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
501
430
|
The value should not contain leading or trailing forward slashes.
|
502
431
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
503
432
|
*Available only for Vault Enterprise*.
|
504
|
-
:param pulumi.Input[int] num_uses: The number of uses for the secret-id.
|
505
433
|
:param pulumi.Input[str] role_name: The name of the role to create the SecretID for.
|
506
434
|
:param pulumi.Input[str] secret_id: The SecretID to be created. If set, uses "Push"
|
507
435
|
mode. Defaults to Vault auto-generating SecretIDs.
|
508
|
-
:param pulumi.Input[int] ttl: The TTL duration of the SecretID.
|
509
436
|
:param pulumi.Input[bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
|
510
437
|
If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
|
511
438
|
invalidated through unwrapping.
|
@@ -568,10 +495,8 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
568
495
|
cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
569
496
|
metadata: Optional[pulumi.Input[str]] = None,
|
570
497
|
namespace: Optional[pulumi.Input[str]] = None,
|
571
|
-
num_uses: Optional[pulumi.Input[int]] = None,
|
572
498
|
role_name: Optional[pulumi.Input[str]] = None,
|
573
499
|
secret_id: Optional[pulumi.Input[str]] = None,
|
574
|
-
ttl: Optional[pulumi.Input[int]] = None,
|
575
500
|
with_wrapped_accessor: Optional[pulumi.Input[bool]] = None,
|
576
501
|
wrapping_ttl: Optional[pulumi.Input[str]] = None,
|
577
502
|
__props__=None):
|
@@ -587,12 +512,10 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
587
512
|
__props__.__dict__["cidr_lists"] = cidr_lists
|
588
513
|
__props__.__dict__["metadata"] = metadata
|
589
514
|
__props__.__dict__["namespace"] = namespace
|
590
|
-
__props__.__dict__["num_uses"] = num_uses
|
591
515
|
if role_name is None and not opts.urn:
|
592
516
|
raise TypeError("Missing required property 'role_name'")
|
593
517
|
__props__.__dict__["role_name"] = role_name
|
594
518
|
__props__.__dict__["secret_id"] = None if secret_id is None else pulumi.Output.secret(secret_id)
|
595
|
-
__props__.__dict__["ttl"] = ttl
|
596
519
|
__props__.__dict__["with_wrapped_accessor"] = with_wrapped_accessor
|
597
520
|
__props__.__dict__["wrapping_ttl"] = wrapping_ttl
|
598
521
|
__props__.__dict__["accessor"] = None
|
@@ -617,10 +540,8 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
617
540
|
cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
618
541
|
metadata: Optional[pulumi.Input[str]] = None,
|
619
542
|
namespace: Optional[pulumi.Input[str]] = None,
|
620
|
-
num_uses: Optional[pulumi.Input[int]] = None,
|
621
543
|
role_name: Optional[pulumi.Input[str]] = None,
|
622
544
|
secret_id: Optional[pulumi.Input[str]] = None,
|
623
|
-
ttl: Optional[pulumi.Input[int]] = None,
|
624
545
|
with_wrapped_accessor: Optional[pulumi.Input[bool]] = None,
|
625
546
|
wrapping_accessor: Optional[pulumi.Input[str]] = None,
|
626
547
|
wrapping_token: Optional[pulumi.Input[str]] = None,
|
@@ -642,11 +563,9 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
642
563
|
The value should not contain leading or trailing forward slashes.
|
643
564
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
644
565
|
*Available only for Vault Enterprise*.
|
645
|
-
:param pulumi.Input[int] num_uses: The number of uses for the secret-id.
|
646
566
|
:param pulumi.Input[str] role_name: The name of the role to create the SecretID for.
|
647
567
|
:param pulumi.Input[str] secret_id: The SecretID to be created. If set, uses "Push"
|
648
568
|
mode. Defaults to Vault auto-generating SecretIDs.
|
649
|
-
:param pulumi.Input[int] ttl: The TTL duration of the SecretID.
|
650
569
|
:param pulumi.Input[bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
|
651
570
|
If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
|
652
571
|
invalidated through unwrapping.
|
@@ -667,10 +586,8 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
667
586
|
__props__.__dict__["cidr_lists"] = cidr_lists
|
668
587
|
__props__.__dict__["metadata"] = metadata
|
669
588
|
__props__.__dict__["namespace"] = namespace
|
670
|
-
__props__.__dict__["num_uses"] = num_uses
|
671
589
|
__props__.__dict__["role_name"] = role_name
|
672
590
|
__props__.__dict__["secret_id"] = secret_id
|
673
|
-
__props__.__dict__["ttl"] = ttl
|
674
591
|
__props__.__dict__["with_wrapped_accessor"] = with_wrapped_accessor
|
675
592
|
__props__.__dict__["wrapping_accessor"] = wrapping_accessor
|
676
593
|
__props__.__dict__["wrapping_token"] = wrapping_token
|
@@ -722,14 +639,6 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
722
639
|
"""
|
723
640
|
return pulumi.get(self, "namespace")
|
724
641
|
|
725
|
-
@property
|
726
|
-
@pulumi.getter(name="numUses")
|
727
|
-
def num_uses(self) -> pulumi.Output[Optional[int]]:
|
728
|
-
"""
|
729
|
-
The number of uses for the secret-id.
|
730
|
-
"""
|
731
|
-
return pulumi.get(self, "num_uses")
|
732
|
-
|
733
642
|
@property
|
734
643
|
@pulumi.getter(name="roleName")
|
735
644
|
def role_name(self) -> pulumi.Output[str]:
|
@@ -747,14 +656,6 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
747
656
|
"""
|
748
657
|
return pulumi.get(self, "secret_id")
|
749
658
|
|
750
|
-
@property
|
751
|
-
@pulumi.getter
|
752
|
-
def ttl(self) -> pulumi.Output[Optional[int]]:
|
753
|
-
"""
|
754
|
-
The TTL duration of the SecretID.
|
755
|
-
"""
|
756
|
-
return pulumi.get(self, "ttl")
|
757
|
-
|
758
659
|
@property
|
759
660
|
@pulumi.getter(name="withWrappedAccessor")
|
760
661
|
def with_wrapped_accessor(self) -> pulumi.Output[Optional[bool]]:
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -128,6 +123,9 @@ def get_auth_backend_role_id(backend: Optional[str] = None,
|
|
128
123
|
namespace=pulumi.get(__ret__, 'namespace'),
|
129
124
|
role_id=pulumi.get(__ret__, 'role_id'),
|
130
125
|
role_name=pulumi.get(__ret__, 'role_name'))
|
126
|
+
|
127
|
+
|
128
|
+
@_utilities.lift_output_func(get_auth_backend_role_id)
|
131
129
|
def get_auth_backend_role_id_output(backend: Optional[pulumi.Input[Optional[str]]] = None,
|
132
130
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
133
131
|
role_name: Optional[pulumi.Input[str]] = None,
|
@@ -155,15 +153,4 @@ def get_auth_backend_role_id_output(backend: Optional[pulumi.Input[Optional[str]
|
|
155
153
|
*Available only for Vault Enterprise*.
|
156
154
|
:param str role_name: The name of the role to retrieve the Role ID for.
|
157
155
|
"""
|
158
|
-
|
159
|
-
__args__['backend'] = backend
|
160
|
-
__args__['namespace'] = namespace
|
161
|
-
__args__['roleName'] = role_name
|
162
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
163
|
-
__ret__ = pulumi.runtime.invoke_output('vault:appRole/getAuthBackendRoleId:getAuthBackendRoleId', __args__, opts=opts, typ=GetAuthBackendRoleIdResult)
|
164
|
-
return __ret__.apply(lambda __response__: GetAuthBackendRoleIdResult(
|
165
|
-
backend=pulumi.get(__response__, 'backend'),
|
166
|
-
id=pulumi.get(__response__, 'id'),
|
167
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
168
|
-
role_id=pulumi.get(__response__, 'role_id'),
|
169
|
-
role_name=pulumi.get(__response__, 'role_name')))
|
156
|
+
...
|
pulumi_vault/audit.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuditArgs', 'Audit']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuditRequestHeaderArgs', 'AuditRequestHeader']
|
pulumi_vault/auth_backend.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
from . import outputs
|
17
12
|
from ._inputs import *
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendCertArgs', 'AuthBackendCert']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendClientArgs', 'AuthBackendClient']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendConfigIdentityArgs', 'AuthBackendConfigIdentity']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendIdentityWhitelistArgs', 'AuthBackendIdentityWhitelist']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendLoginArgs', 'AuthBackendLogin']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendRoleTagArgs', 'AuthBackendRoleTag']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendRoletagBlacklistArgs', 'AuthBackendRoletagBlacklist']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendStsRoleArgs', 'AuthBackendStsRole']
|