pulumi-vault 6.4.0a1728108872__py3-none-any.whl → 6.4.0a1729059229__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +560 -0
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +19 -4
  4. pulumi_vault/ad/secret_backend.py +5 -0
  5. pulumi_vault/ad/secret_library.py +5 -0
  6. pulumi_vault/ad/secret_role.py +5 -0
  7. pulumi_vault/alicloud/auth_backend_role.py +5 -0
  8. pulumi_vault/approle/auth_backend_login.py +5 -0
  9. pulumi_vault/approle/auth_backend_role.py +5 -0
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
  11. pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
  12. pulumi_vault/audit.py +5 -0
  13. pulumi_vault/audit_request_header.py +5 -0
  14. pulumi_vault/auth_backend.py +5 -0
  15. pulumi_vault/aws/auth_backend_cert.py +5 -0
  16. pulumi_vault/aws/auth_backend_client.py +5 -0
  17. pulumi_vault/aws/auth_backend_config_identity.py +5 -0
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
  19. pulumi_vault/aws/auth_backend_login.py +5 -0
  20. pulumi_vault/aws/auth_backend_role.py +5 -0
  21. pulumi_vault/aws/auth_backend_role_tag.py +5 -0
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
  23. pulumi_vault/aws/auth_backend_sts_role.py +5 -0
  24. pulumi_vault/aws/get_access_credentials.py +31 -4
  25. pulumi_vault/aws/get_static_access_credentials.py +18 -4
  26. pulumi_vault/aws/secret_backend.py +5 -0
  27. pulumi_vault/aws/secret_backend_role.py +5 -0
  28. pulumi_vault/aws/secret_backend_static_role.py +5 -0
  29. pulumi_vault/azure/_inputs.py +24 -0
  30. pulumi_vault/azure/auth_backend_config.py +5 -0
  31. pulumi_vault/azure/auth_backend_role.py +5 -0
  32. pulumi_vault/azure/backend.py +5 -0
  33. pulumi_vault/azure/backend_role.py +5 -0
  34. pulumi_vault/azure/get_access_credentials.py +36 -4
  35. pulumi_vault/azure/outputs.py +5 -0
  36. pulumi_vault/cert_auth_backend_role.py +5 -0
  37. pulumi_vault/config/__init__.pyi +5 -0
  38. pulumi_vault/config/_inputs.py +21 -0
  39. pulumi_vault/config/outputs.py +5 -0
  40. pulumi_vault/config/ui_custom_message.py +5 -0
  41. pulumi_vault/config/vars.py +5 -0
  42. pulumi_vault/consul/secret_backend.py +5 -0
  43. pulumi_vault/consul/secret_backend_role.py +5 -0
  44. pulumi_vault/database/_inputs.py +2019 -68
  45. pulumi_vault/database/outputs.py +5 -0
  46. pulumi_vault/database/secret_backend_connection.py +5 -0
  47. pulumi_vault/database/secret_backend_role.py +5 -0
  48. pulumi_vault/database/secret_backend_static_role.py +5 -0
  49. pulumi_vault/database/secrets_mount.py +5 -0
  50. pulumi_vault/egp_policy.py +5 -0
  51. pulumi_vault/gcp/_inputs.py +111 -0
  52. pulumi_vault/gcp/auth_backend.py +5 -0
  53. pulumi_vault/gcp/auth_backend_role.py +5 -0
  54. pulumi_vault/gcp/get_auth_backend_role.py +42 -4
  55. pulumi_vault/gcp/outputs.py +5 -0
  56. pulumi_vault/gcp/secret_backend.py +5 -0
  57. pulumi_vault/gcp/secret_impersonated_account.py +5 -0
  58. pulumi_vault/gcp/secret_roleset.py +5 -0
  59. pulumi_vault/gcp/secret_static_account.py +5 -0
  60. pulumi_vault/generic/endpoint.py +5 -0
  61. pulumi_vault/generic/get_secret.py +24 -4
  62. pulumi_vault/generic/secret.py +5 -0
  63. pulumi_vault/get_auth_backend.py +21 -4
  64. pulumi_vault/get_auth_backends.py +16 -4
  65. pulumi_vault/get_namespace.py +17 -4
  66. pulumi_vault/get_namespaces.py +13 -4
  67. pulumi_vault/get_nomad_access_token.py +18 -4
  68. pulumi_vault/get_policy_document.py +15 -4
  69. pulumi_vault/get_raft_autopilot_state.py +23 -4
  70. pulumi_vault/github/_inputs.py +55 -0
  71. pulumi_vault/github/auth_backend.py +5 -0
  72. pulumi_vault/github/outputs.py +5 -0
  73. pulumi_vault/github/team.py +5 -0
  74. pulumi_vault/github/user.py +5 -0
  75. pulumi_vault/identity/entity.py +5 -0
  76. pulumi_vault/identity/entity_alias.py +5 -0
  77. pulumi_vault/identity/entity_policies.py +5 -0
  78. pulumi_vault/identity/get_entity.py +34 -4
  79. pulumi_vault/identity/get_group.py +40 -4
  80. pulumi_vault/identity/get_oidc_client_creds.py +16 -4
  81. pulumi_vault/identity/get_oidc_openid_config.py +26 -4
  82. pulumi_vault/identity/get_oidc_public_keys.py +15 -4
  83. pulumi_vault/identity/group.py +5 -0
  84. pulumi_vault/identity/group_alias.py +5 -0
  85. pulumi_vault/identity/group_member_entity_ids.py +5 -0
  86. pulumi_vault/identity/group_member_group_ids.py +5 -0
  87. pulumi_vault/identity/group_policies.py +5 -0
  88. pulumi_vault/identity/mfa_duo.py +5 -0
  89. pulumi_vault/identity/mfa_login_enforcement.py +5 -0
  90. pulumi_vault/identity/mfa_okta.py +5 -0
  91. pulumi_vault/identity/mfa_pingid.py +5 -0
  92. pulumi_vault/identity/mfa_totp.py +5 -0
  93. pulumi_vault/identity/oidc.py +5 -0
  94. pulumi_vault/identity/oidc_assignment.py +5 -0
  95. pulumi_vault/identity/oidc_client.py +5 -0
  96. pulumi_vault/identity/oidc_key.py +5 -0
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
  98. pulumi_vault/identity/oidc_provider.py +5 -0
  99. pulumi_vault/identity/oidc_role.py +5 -0
  100. pulumi_vault/identity/oidc_scope.py +5 -0
  101. pulumi_vault/identity/outputs.py +5 -0
  102. pulumi_vault/jwt/_inputs.py +55 -0
  103. pulumi_vault/jwt/auth_backend.py +5 -0
  104. pulumi_vault/jwt/auth_backend_role.py +5 -0
  105. pulumi_vault/jwt/outputs.py +5 -0
  106. pulumi_vault/kmip/secret_backend.py +5 -0
  107. pulumi_vault/kmip/secret_role.py +5 -0
  108. pulumi_vault/kmip/secret_scope.py +5 -0
  109. pulumi_vault/kubernetes/auth_backend_config.py +5 -0
  110. pulumi_vault/kubernetes/auth_backend_role.py +5 -0
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
  113. pulumi_vault/kubernetes/get_service_account_token.py +28 -4
  114. pulumi_vault/kubernetes/secret_backend.py +5 -0
  115. pulumi_vault/kubernetes/secret_backend_role.py +5 -0
  116. pulumi_vault/kv/_inputs.py +32 -0
  117. pulumi_vault/kv/get_secret.py +19 -4
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +23 -4
  119. pulumi_vault/kv/get_secret_v2.py +25 -4
  120. pulumi_vault/kv/get_secrets_list.py +15 -4
  121. pulumi_vault/kv/get_secrets_list_v2.py +18 -4
  122. pulumi_vault/kv/outputs.py +5 -0
  123. pulumi_vault/kv/secret.py +5 -0
  124. pulumi_vault/kv/secret_backend_v2.py +5 -0
  125. pulumi_vault/kv/secret_v2.py +5 -0
  126. pulumi_vault/ldap/auth_backend.py +5 -0
  127. pulumi_vault/ldap/auth_backend_group.py +5 -0
  128. pulumi_vault/ldap/auth_backend_user.py +5 -0
  129. pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
  130. pulumi_vault/ldap/get_static_credentials.py +23 -4
  131. pulumi_vault/ldap/secret_backend.py +5 -0
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
  133. pulumi_vault/ldap/secret_backend_library_set.py +5 -0
  134. pulumi_vault/ldap/secret_backend_static_role.py +5 -0
  135. pulumi_vault/managed/_inputs.py +205 -0
  136. pulumi_vault/managed/keys.py +5 -0
  137. pulumi_vault/managed/outputs.py +5 -0
  138. pulumi_vault/mfa_duo.py +5 -0
  139. pulumi_vault/mfa_okta.py +5 -0
  140. pulumi_vault/mfa_pingid.py +5 -0
  141. pulumi_vault/mfa_totp.py +5 -0
  142. pulumi_vault/mongodbatlas/secret_backend.py +5 -0
  143. pulumi_vault/mongodbatlas/secret_role.py +5 -0
  144. pulumi_vault/mount.py +5 -0
  145. pulumi_vault/namespace.py +5 -0
  146. pulumi_vault/nomad_secret_backend.py +5 -0
  147. pulumi_vault/nomad_secret_role.py +5 -0
  148. pulumi_vault/okta/_inputs.py +39 -0
  149. pulumi_vault/okta/auth_backend.py +5 -0
  150. pulumi_vault/okta/auth_backend_group.py +5 -0
  151. pulumi_vault/okta/auth_backend_user.py +5 -0
  152. pulumi_vault/okta/outputs.py +5 -0
  153. pulumi_vault/outputs.py +5 -0
  154. pulumi_vault/password_policy.py +5 -0
  155. pulumi_vault/pkisecret/_inputs.py +41 -0
  156. pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
  157. pulumi_vault/pkisecret/backend_config_est.py +5 -0
  158. pulumi_vault/pkisecret/get_backend_config_est.py +22 -4
  159. pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
  160. pulumi_vault/pkisecret/get_backend_issuers.py +17 -4
  161. pulumi_vault/pkisecret/get_backend_key.py +19 -4
  162. pulumi_vault/pkisecret/get_backend_keys.py +17 -4
  163. pulumi_vault/pkisecret/outputs.py +5 -0
  164. pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
  172. pulumi_vault/pkisecret/secret_backend_key.py +5 -0
  173. pulumi_vault/pkisecret/secret_backend_role.py +5 -0
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
  176. pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
  177. pulumi_vault/plugin.py +5 -0
  178. pulumi_vault/plugin_pinned_version.py +5 -0
  179. pulumi_vault/policy.py +5 -0
  180. pulumi_vault/provider.py +5 -0
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +5 -0
  183. pulumi_vault/quota_rate_limit.py +5 -0
  184. pulumi_vault/rabbitmq/_inputs.py +61 -0
  185. pulumi_vault/rabbitmq/outputs.py +5 -0
  186. pulumi_vault/rabbitmq/secret_backend.py +5 -0
  187. pulumi_vault/rabbitmq/secret_backend_role.py +5 -0
  188. pulumi_vault/raft_autopilot.py +5 -0
  189. pulumi_vault/raft_snapshot_agent_config.py +5 -0
  190. pulumi_vault/rgp_policy.py +5 -0
  191. pulumi_vault/saml/auth_backend.py +5 -0
  192. pulumi_vault/saml/auth_backend_role.py +5 -0
  193. pulumi_vault/secrets/_inputs.py +30 -0
  194. pulumi_vault/secrets/outputs.py +5 -0
  195. pulumi_vault/secrets/sync_association.py +5 -0
  196. pulumi_vault/secrets/sync_aws_destination.py +5 -0
  197. pulumi_vault/secrets/sync_azure_destination.py +5 -0
  198. pulumi_vault/secrets/sync_config.py +5 -0
  199. pulumi_vault/secrets/sync_gcp_destination.py +5 -0
  200. pulumi_vault/secrets/sync_gh_destination.py +5 -0
  201. pulumi_vault/secrets/sync_github_apps.py +5 -0
  202. pulumi_vault/secrets/sync_vercel_destination.py +5 -0
  203. pulumi_vault/ssh/_inputs.py +22 -0
  204. pulumi_vault/ssh/outputs.py +5 -0
  205. pulumi_vault/ssh/secret_backend_ca.py +5 -0
  206. pulumi_vault/ssh/secret_backend_role.py +5 -0
  207. pulumi_vault/terraformcloud/secret_backend.py +5 -0
  208. pulumi_vault/terraformcloud/secret_creds.py +5 -0
  209. pulumi_vault/terraformcloud/secret_role.py +5 -0
  210. pulumi_vault/token.py +5 -0
  211. pulumi_vault/tokenauth/auth_backend_role.py +5 -0
  212. pulumi_vault/transform/alphabet.py +5 -0
  213. pulumi_vault/transform/get_decode.py +28 -4
  214. pulumi_vault/transform/get_encode.py +28 -4
  215. pulumi_vault/transform/role.py +5 -0
  216. pulumi_vault/transform/template.py +5 -0
  217. pulumi_vault/transform/transformation.py +5 -0
  218. pulumi_vault/transit/get_decrypt.py +21 -4
  219. pulumi_vault/transit/get_encrypt.py +23 -4
  220. pulumi_vault/transit/secret_backend_key.py +5 -0
  221. pulumi_vault/transit/secret_cache_config.py +5 -0
  222. {pulumi_vault-6.4.0a1728108872.dist-info → pulumi_vault-6.4.0a1729059229.dist-info}/METADATA +3 -2
  223. pulumi_vault-6.4.0a1729059229.dist-info/RECORD +256 -0
  224. pulumi_vault-6.4.0a1728108872.dist-info/RECORD +0 -256
  225. {pulumi_vault-6.4.0a1728108872.dist-info → pulumi_vault-6.4.0a1729059229.dist-info}/WHEEL +0 -0
  226. {pulumi_vault-6.4.0a1728108872.dist-info → pulumi_vault-6.4.0a1729059229.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
  from . import outputs
12
17
 
@@ -202,9 +207,6 @@ def get_backend_config_est(backend: Optional[str] = None,
202
207
  label_to_path_policy=pulumi.get(__ret__, 'label_to_path_policy'),
203
208
  last_updated=pulumi.get(__ret__, 'last_updated'),
204
209
  namespace=pulumi.get(__ret__, 'namespace'))
205
-
206
-
207
- @_utilities.lift_output_func(get_backend_config_est)
208
210
  def get_backend_config_est_output(backend: Optional[pulumi.Input[str]] = None,
209
211
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
210
212
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendConfigEstResult]:
@@ -230,4 +232,20 @@ def get_backend_config_est_output(backend: Optional[pulumi.Input[str]] = None,
230
232
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
231
233
  *Available only for Vault Enterprise*.
232
234
  """
233
- ...
235
+ __args__ = dict()
236
+ __args__['backend'] = backend
237
+ __args__['namespace'] = namespace
238
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
239
+ __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendConfigEst:getBackendConfigEst', __args__, opts=opts, typ=GetBackendConfigEstResult)
240
+ return __ret__.apply(lambda __response__: GetBackendConfigEstResult(
241
+ audit_fields=pulumi.get(__response__, 'audit_fields'),
242
+ authenticators=pulumi.get(__response__, 'authenticators'),
243
+ backend=pulumi.get(__response__, 'backend'),
244
+ default_mount=pulumi.get(__response__, 'default_mount'),
245
+ default_path_policy=pulumi.get(__response__, 'default_path_policy'),
246
+ enable_sentinel_parsing=pulumi.get(__response__, 'enable_sentinel_parsing'),
247
+ enabled=pulumi.get(__response__, 'enabled'),
248
+ id=pulumi.get(__response__, 'id'),
249
+ label_to_path_policy=pulumi.get(__response__, 'label_to_path_policy'),
250
+ last_updated=pulumi.get(__response__, 'last_updated'),
251
+ namespace=pulumi.get(__response__, 'namespace')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -222,9 +227,6 @@ def get_backend_issuer(backend: Optional[str] = None,
222
227
  manual_chains=pulumi.get(__ret__, 'manual_chains'),
223
228
  namespace=pulumi.get(__ret__, 'namespace'),
224
229
  usage=pulumi.get(__ret__, 'usage'))
225
-
226
-
227
- @_utilities.lift_output_func(get_backend_issuer)
228
230
  def get_backend_issuer_output(backend: Optional[pulumi.Input[str]] = None,
229
231
  issuer_ref: Optional[pulumi.Input[str]] = None,
230
232
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
@@ -259,4 +261,22 @@ def get_backend_issuer_output(backend: Optional[pulumi.Input[str]] = None,
259
261
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
260
262
  *Available only for Vault Enterprise*.
261
263
  """
262
- ...
264
+ __args__ = dict()
265
+ __args__['backend'] = backend
266
+ __args__['issuerRef'] = issuer_ref
267
+ __args__['namespace'] = namespace
268
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
269
+ __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendIssuer:getBackendIssuer', __args__, opts=opts, typ=GetBackendIssuerResult)
270
+ return __ret__.apply(lambda __response__: GetBackendIssuerResult(
271
+ backend=pulumi.get(__response__, 'backend'),
272
+ ca_chains=pulumi.get(__response__, 'ca_chains'),
273
+ certificate=pulumi.get(__response__, 'certificate'),
274
+ id=pulumi.get(__response__, 'id'),
275
+ issuer_id=pulumi.get(__response__, 'issuer_id'),
276
+ issuer_name=pulumi.get(__response__, 'issuer_name'),
277
+ issuer_ref=pulumi.get(__response__, 'issuer_ref'),
278
+ key_id=pulumi.get(__response__, 'key_id'),
279
+ leaf_not_after_behavior=pulumi.get(__response__, 'leaf_not_after_behavior'),
280
+ manual_chains=pulumi.get(__response__, 'manual_chains'),
281
+ namespace=pulumi.get(__response__, 'namespace'),
282
+ usage=pulumi.get(__response__, 'usage')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -142,9 +147,6 @@ def get_backend_issuers(backend: Optional[str] = None,
142
147
  key_info_json=pulumi.get(__ret__, 'key_info_json'),
143
148
  keys=pulumi.get(__ret__, 'keys'),
144
149
  namespace=pulumi.get(__ret__, 'namespace'))
145
-
146
-
147
- @_utilities.lift_output_func(get_backend_issuers)
148
150
  def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None,
149
151
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
150
152
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendIssuersResult]:
@@ -176,4 +178,15 @@ def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None,
176
178
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
177
179
  *Available only for Vault Enterprise*.
178
180
  """
179
- ...
181
+ __args__ = dict()
182
+ __args__['backend'] = backend
183
+ __args__['namespace'] = namespace
184
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
185
+ __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendIssuers:getBackendIssuers', __args__, opts=opts, typ=GetBackendIssuersResult)
186
+ return __ret__.apply(lambda __response__: GetBackendIssuersResult(
187
+ backend=pulumi.get(__response__, 'backend'),
188
+ id=pulumi.get(__response__, 'id'),
189
+ key_info=pulumi.get(__response__, 'key_info'),
190
+ key_info_json=pulumi.get(__response__, 'key_info_json'),
191
+ keys=pulumi.get(__response__, 'keys'),
192
+ namespace=pulumi.get(__response__, 'namespace')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -156,9 +161,6 @@ def get_backend_key(backend: Optional[str] = None,
156
161
  key_ref=pulumi.get(__ret__, 'key_ref'),
157
162
  key_type=pulumi.get(__ret__, 'key_type'),
158
163
  namespace=pulumi.get(__ret__, 'namespace'))
159
-
160
-
161
- @_utilities.lift_output_func(get_backend_key)
162
164
  def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
163
165
  key_ref: Optional[pulumi.Input[str]] = None,
164
166
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
@@ -193,4 +195,17 @@ def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
193
195
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
194
196
  *Available only for Vault Enterprise*.
195
197
  """
196
- ...
198
+ __args__ = dict()
199
+ __args__['backend'] = backend
200
+ __args__['keyRef'] = key_ref
201
+ __args__['namespace'] = namespace
202
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
203
+ __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendKey:getBackendKey', __args__, opts=opts, typ=GetBackendKeyResult)
204
+ return __ret__.apply(lambda __response__: GetBackendKeyResult(
205
+ backend=pulumi.get(__response__, 'backend'),
206
+ id=pulumi.get(__response__, 'id'),
207
+ key_id=pulumi.get(__response__, 'key_id'),
208
+ key_name=pulumi.get(__response__, 'key_name'),
209
+ key_ref=pulumi.get(__response__, 'key_ref'),
210
+ key_type=pulumi.get(__response__, 'key_type'),
211
+ namespace=pulumi.get(__response__, 'namespace')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -142,9 +147,6 @@ def get_backend_keys(backend: Optional[str] = None,
142
147
  key_info_json=pulumi.get(__ret__, 'key_info_json'),
143
148
  keys=pulumi.get(__ret__, 'keys'),
144
149
  namespace=pulumi.get(__ret__, 'namespace'))
145
-
146
-
147
- @_utilities.lift_output_func(get_backend_keys)
148
150
  def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None,
149
151
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
150
152
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendKeysResult]:
@@ -176,4 +178,15 @@ def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None,
176
178
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
177
179
  *Available only for Vault Enterprise*.
178
180
  """
179
- ...
181
+ __args__ = dict()
182
+ __args__['backend'] = backend
183
+ __args__['namespace'] = namespace
184
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
185
+ __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendKeys:getBackendKeys', __args__, opts=opts, typ=GetBackendKeysResult)
186
+ return __ret__.apply(lambda __response__: GetBackendKeysResult(
187
+ backend=pulumi.get(__response__, 'backend'),
188
+ id=pulumi.get(__response__, 'id'),
189
+ key_info=pulumi.get(__response__, 'key_info'),
190
+ key_info_json=pulumi.get(__response__, 'key_info_json'),
191
+ keys=pulumi.get(__response__, 'keys'),
192
+ namespace=pulumi.get(__response__, 'namespace')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendCertArgs', 'SecretBackendCert']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendConfigCaArgs', 'SecretBackendConfigCa']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendConfigIssuersArgs', 'SecretBackendConfigIssuers']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendConfigUrlsArgs', 'SecretBackendConfigUrls']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendCrlConfigArgs', 'SecretBackendCrlConfig']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendIntermediateCertRequestArgs', 'SecretBackendIntermediateCertRequest']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendIntermediateSetSignedArgs', 'SecretBackendIntermediateSetSigned']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendIssuerArgs', 'SecretBackendIssuer']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendKeyArgs', 'SecretBackendKey']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
  from . import outputs
12
17
  from ._inputs import *
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendRootCertArgs', 'SecretBackendRootCert']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendRootSignIntermediateArgs', 'SecretBackendRootSignIntermediate']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendSignArgs', 'SecretBackendSign']
pulumi_vault/plugin.py CHANGED
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['PluginArgs', 'Plugin']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['PluginPinnedVersionArgs', 'PluginPinnedVersion']
pulumi_vault/policy.py CHANGED
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['PolicyArgs', 'Policy']
pulumi_vault/provider.py CHANGED
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
  from ._inputs import *
12
17
 
@@ -1,5 +1,5 @@
1
1
  {
2
2
  "resource": true,
3
3
  "name": "vault",
4
- "version": "6.4.0-alpha.1728108872"
4
+ "version": "6.4.0-alpha.1729059229"
5
5
  }
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['QuotaLeaseCountArgs', 'QuotaLeaseCount']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['QuotaRateLimitArgs', 'QuotaRateLimit']
@@ -4,17 +4,48 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
13
18
  'SecretBackendRoleVhostArgs',
19
+ 'SecretBackendRoleVhostArgsDict',
14
20
  'SecretBackendRoleVhostTopicArgs',
21
+ 'SecretBackendRoleVhostTopicArgsDict',
15
22
  'SecretBackendRoleVhostTopicVhostArgs',
23
+ 'SecretBackendRoleVhostTopicVhostArgsDict',
16
24
  ]
17
25
 
26
+ MYPY = False
27
+
28
+ if not MYPY:
29
+ class SecretBackendRoleVhostArgsDict(TypedDict):
30
+ configure: pulumi.Input[str]
31
+ """
32
+ The configure permissions for this vhost.
33
+ """
34
+ host: pulumi.Input[str]
35
+ """
36
+ The vhost to set permissions for.
37
+ """
38
+ read: pulumi.Input[str]
39
+ """
40
+ The read permissions for this vhost.
41
+ """
42
+ write: pulumi.Input[str]
43
+ """
44
+ The write permissions for this vhost.
45
+ """
46
+ elif False:
47
+ SecretBackendRoleVhostArgsDict: TypeAlias = Mapping[str, Any]
48
+
18
49
  @pulumi.input_type
19
50
  class SecretBackendRoleVhostArgs:
20
51
  def __init__(__self__, *,
@@ -82,6 +113,19 @@ class SecretBackendRoleVhostArgs:
82
113
  pulumi.set(self, "write", value)
83
114
 
84
115
 
116
+ if not MYPY:
117
+ class SecretBackendRoleVhostTopicArgsDict(TypedDict):
118
+ host: pulumi.Input[str]
119
+ """
120
+ The vhost to set permissions for.
121
+ """
122
+ vhosts: NotRequired[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicVhostArgsDict']]]]
123
+ """
124
+ Specifies a map of virtual hosts to permissions.
125
+ """
126
+ elif False:
127
+ SecretBackendRoleVhostTopicArgsDict: TypeAlias = Mapping[str, Any]
128
+
85
129
  @pulumi.input_type
86
130
  class SecretBackendRoleVhostTopicArgs:
87
131
  def __init__(__self__, *,
@@ -120,6 +164,23 @@ class SecretBackendRoleVhostTopicArgs:
120
164
  pulumi.set(self, "vhosts", value)
121
165
 
122
166
 
167
+ if not MYPY:
168
+ class SecretBackendRoleVhostTopicVhostArgsDict(TypedDict):
169
+ read: pulumi.Input[str]
170
+ """
171
+ The read permissions for this vhost.
172
+ """
173
+ topic: pulumi.Input[str]
174
+ """
175
+ The vhost to set permissions for.
176
+ """
177
+ write: pulumi.Input[str]
178
+ """
179
+ The write permissions for this vhost.
180
+ """
181
+ elif False:
182
+ SecretBackendRoleVhostTopicVhostArgsDict: TypeAlias = Mapping[str, Any]
183
+
123
184
  @pulumi.input_type
124
185
  class SecretBackendRoleVhostTopicVhostArgs:
125
186
  def __init__(__self__, *,
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
  from . import outputs
12
17