pulumi-vault 6.4.0a1728108872__py3-none-any.whl → 6.4.0a1729059229__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +560 -0
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +19 -4
  4. pulumi_vault/ad/secret_backend.py +5 -0
  5. pulumi_vault/ad/secret_library.py +5 -0
  6. pulumi_vault/ad/secret_role.py +5 -0
  7. pulumi_vault/alicloud/auth_backend_role.py +5 -0
  8. pulumi_vault/approle/auth_backend_login.py +5 -0
  9. pulumi_vault/approle/auth_backend_role.py +5 -0
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
  11. pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
  12. pulumi_vault/audit.py +5 -0
  13. pulumi_vault/audit_request_header.py +5 -0
  14. pulumi_vault/auth_backend.py +5 -0
  15. pulumi_vault/aws/auth_backend_cert.py +5 -0
  16. pulumi_vault/aws/auth_backend_client.py +5 -0
  17. pulumi_vault/aws/auth_backend_config_identity.py +5 -0
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
  19. pulumi_vault/aws/auth_backend_login.py +5 -0
  20. pulumi_vault/aws/auth_backend_role.py +5 -0
  21. pulumi_vault/aws/auth_backend_role_tag.py +5 -0
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
  23. pulumi_vault/aws/auth_backend_sts_role.py +5 -0
  24. pulumi_vault/aws/get_access_credentials.py +31 -4
  25. pulumi_vault/aws/get_static_access_credentials.py +18 -4
  26. pulumi_vault/aws/secret_backend.py +5 -0
  27. pulumi_vault/aws/secret_backend_role.py +5 -0
  28. pulumi_vault/aws/secret_backend_static_role.py +5 -0
  29. pulumi_vault/azure/_inputs.py +24 -0
  30. pulumi_vault/azure/auth_backend_config.py +5 -0
  31. pulumi_vault/azure/auth_backend_role.py +5 -0
  32. pulumi_vault/azure/backend.py +5 -0
  33. pulumi_vault/azure/backend_role.py +5 -0
  34. pulumi_vault/azure/get_access_credentials.py +36 -4
  35. pulumi_vault/azure/outputs.py +5 -0
  36. pulumi_vault/cert_auth_backend_role.py +5 -0
  37. pulumi_vault/config/__init__.pyi +5 -0
  38. pulumi_vault/config/_inputs.py +21 -0
  39. pulumi_vault/config/outputs.py +5 -0
  40. pulumi_vault/config/ui_custom_message.py +5 -0
  41. pulumi_vault/config/vars.py +5 -0
  42. pulumi_vault/consul/secret_backend.py +5 -0
  43. pulumi_vault/consul/secret_backend_role.py +5 -0
  44. pulumi_vault/database/_inputs.py +2019 -68
  45. pulumi_vault/database/outputs.py +5 -0
  46. pulumi_vault/database/secret_backend_connection.py +5 -0
  47. pulumi_vault/database/secret_backend_role.py +5 -0
  48. pulumi_vault/database/secret_backend_static_role.py +5 -0
  49. pulumi_vault/database/secrets_mount.py +5 -0
  50. pulumi_vault/egp_policy.py +5 -0
  51. pulumi_vault/gcp/_inputs.py +111 -0
  52. pulumi_vault/gcp/auth_backend.py +5 -0
  53. pulumi_vault/gcp/auth_backend_role.py +5 -0
  54. pulumi_vault/gcp/get_auth_backend_role.py +42 -4
  55. pulumi_vault/gcp/outputs.py +5 -0
  56. pulumi_vault/gcp/secret_backend.py +5 -0
  57. pulumi_vault/gcp/secret_impersonated_account.py +5 -0
  58. pulumi_vault/gcp/secret_roleset.py +5 -0
  59. pulumi_vault/gcp/secret_static_account.py +5 -0
  60. pulumi_vault/generic/endpoint.py +5 -0
  61. pulumi_vault/generic/get_secret.py +24 -4
  62. pulumi_vault/generic/secret.py +5 -0
  63. pulumi_vault/get_auth_backend.py +21 -4
  64. pulumi_vault/get_auth_backends.py +16 -4
  65. pulumi_vault/get_namespace.py +17 -4
  66. pulumi_vault/get_namespaces.py +13 -4
  67. pulumi_vault/get_nomad_access_token.py +18 -4
  68. pulumi_vault/get_policy_document.py +15 -4
  69. pulumi_vault/get_raft_autopilot_state.py +23 -4
  70. pulumi_vault/github/_inputs.py +55 -0
  71. pulumi_vault/github/auth_backend.py +5 -0
  72. pulumi_vault/github/outputs.py +5 -0
  73. pulumi_vault/github/team.py +5 -0
  74. pulumi_vault/github/user.py +5 -0
  75. pulumi_vault/identity/entity.py +5 -0
  76. pulumi_vault/identity/entity_alias.py +5 -0
  77. pulumi_vault/identity/entity_policies.py +5 -0
  78. pulumi_vault/identity/get_entity.py +34 -4
  79. pulumi_vault/identity/get_group.py +40 -4
  80. pulumi_vault/identity/get_oidc_client_creds.py +16 -4
  81. pulumi_vault/identity/get_oidc_openid_config.py +26 -4
  82. pulumi_vault/identity/get_oidc_public_keys.py +15 -4
  83. pulumi_vault/identity/group.py +5 -0
  84. pulumi_vault/identity/group_alias.py +5 -0
  85. pulumi_vault/identity/group_member_entity_ids.py +5 -0
  86. pulumi_vault/identity/group_member_group_ids.py +5 -0
  87. pulumi_vault/identity/group_policies.py +5 -0
  88. pulumi_vault/identity/mfa_duo.py +5 -0
  89. pulumi_vault/identity/mfa_login_enforcement.py +5 -0
  90. pulumi_vault/identity/mfa_okta.py +5 -0
  91. pulumi_vault/identity/mfa_pingid.py +5 -0
  92. pulumi_vault/identity/mfa_totp.py +5 -0
  93. pulumi_vault/identity/oidc.py +5 -0
  94. pulumi_vault/identity/oidc_assignment.py +5 -0
  95. pulumi_vault/identity/oidc_client.py +5 -0
  96. pulumi_vault/identity/oidc_key.py +5 -0
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
  98. pulumi_vault/identity/oidc_provider.py +5 -0
  99. pulumi_vault/identity/oidc_role.py +5 -0
  100. pulumi_vault/identity/oidc_scope.py +5 -0
  101. pulumi_vault/identity/outputs.py +5 -0
  102. pulumi_vault/jwt/_inputs.py +55 -0
  103. pulumi_vault/jwt/auth_backend.py +5 -0
  104. pulumi_vault/jwt/auth_backend_role.py +5 -0
  105. pulumi_vault/jwt/outputs.py +5 -0
  106. pulumi_vault/kmip/secret_backend.py +5 -0
  107. pulumi_vault/kmip/secret_role.py +5 -0
  108. pulumi_vault/kmip/secret_scope.py +5 -0
  109. pulumi_vault/kubernetes/auth_backend_config.py +5 -0
  110. pulumi_vault/kubernetes/auth_backend_role.py +5 -0
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
  113. pulumi_vault/kubernetes/get_service_account_token.py +28 -4
  114. pulumi_vault/kubernetes/secret_backend.py +5 -0
  115. pulumi_vault/kubernetes/secret_backend_role.py +5 -0
  116. pulumi_vault/kv/_inputs.py +32 -0
  117. pulumi_vault/kv/get_secret.py +19 -4
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +23 -4
  119. pulumi_vault/kv/get_secret_v2.py +25 -4
  120. pulumi_vault/kv/get_secrets_list.py +15 -4
  121. pulumi_vault/kv/get_secrets_list_v2.py +18 -4
  122. pulumi_vault/kv/outputs.py +5 -0
  123. pulumi_vault/kv/secret.py +5 -0
  124. pulumi_vault/kv/secret_backend_v2.py +5 -0
  125. pulumi_vault/kv/secret_v2.py +5 -0
  126. pulumi_vault/ldap/auth_backend.py +5 -0
  127. pulumi_vault/ldap/auth_backend_group.py +5 -0
  128. pulumi_vault/ldap/auth_backend_user.py +5 -0
  129. pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
  130. pulumi_vault/ldap/get_static_credentials.py +23 -4
  131. pulumi_vault/ldap/secret_backend.py +5 -0
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
  133. pulumi_vault/ldap/secret_backend_library_set.py +5 -0
  134. pulumi_vault/ldap/secret_backend_static_role.py +5 -0
  135. pulumi_vault/managed/_inputs.py +205 -0
  136. pulumi_vault/managed/keys.py +5 -0
  137. pulumi_vault/managed/outputs.py +5 -0
  138. pulumi_vault/mfa_duo.py +5 -0
  139. pulumi_vault/mfa_okta.py +5 -0
  140. pulumi_vault/mfa_pingid.py +5 -0
  141. pulumi_vault/mfa_totp.py +5 -0
  142. pulumi_vault/mongodbatlas/secret_backend.py +5 -0
  143. pulumi_vault/mongodbatlas/secret_role.py +5 -0
  144. pulumi_vault/mount.py +5 -0
  145. pulumi_vault/namespace.py +5 -0
  146. pulumi_vault/nomad_secret_backend.py +5 -0
  147. pulumi_vault/nomad_secret_role.py +5 -0
  148. pulumi_vault/okta/_inputs.py +39 -0
  149. pulumi_vault/okta/auth_backend.py +5 -0
  150. pulumi_vault/okta/auth_backend_group.py +5 -0
  151. pulumi_vault/okta/auth_backend_user.py +5 -0
  152. pulumi_vault/okta/outputs.py +5 -0
  153. pulumi_vault/outputs.py +5 -0
  154. pulumi_vault/password_policy.py +5 -0
  155. pulumi_vault/pkisecret/_inputs.py +41 -0
  156. pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
  157. pulumi_vault/pkisecret/backend_config_est.py +5 -0
  158. pulumi_vault/pkisecret/get_backend_config_est.py +22 -4
  159. pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
  160. pulumi_vault/pkisecret/get_backend_issuers.py +17 -4
  161. pulumi_vault/pkisecret/get_backend_key.py +19 -4
  162. pulumi_vault/pkisecret/get_backend_keys.py +17 -4
  163. pulumi_vault/pkisecret/outputs.py +5 -0
  164. pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
  172. pulumi_vault/pkisecret/secret_backend_key.py +5 -0
  173. pulumi_vault/pkisecret/secret_backend_role.py +5 -0
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
  176. pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
  177. pulumi_vault/plugin.py +5 -0
  178. pulumi_vault/plugin_pinned_version.py +5 -0
  179. pulumi_vault/policy.py +5 -0
  180. pulumi_vault/provider.py +5 -0
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +5 -0
  183. pulumi_vault/quota_rate_limit.py +5 -0
  184. pulumi_vault/rabbitmq/_inputs.py +61 -0
  185. pulumi_vault/rabbitmq/outputs.py +5 -0
  186. pulumi_vault/rabbitmq/secret_backend.py +5 -0
  187. pulumi_vault/rabbitmq/secret_backend_role.py +5 -0
  188. pulumi_vault/raft_autopilot.py +5 -0
  189. pulumi_vault/raft_snapshot_agent_config.py +5 -0
  190. pulumi_vault/rgp_policy.py +5 -0
  191. pulumi_vault/saml/auth_backend.py +5 -0
  192. pulumi_vault/saml/auth_backend_role.py +5 -0
  193. pulumi_vault/secrets/_inputs.py +30 -0
  194. pulumi_vault/secrets/outputs.py +5 -0
  195. pulumi_vault/secrets/sync_association.py +5 -0
  196. pulumi_vault/secrets/sync_aws_destination.py +5 -0
  197. pulumi_vault/secrets/sync_azure_destination.py +5 -0
  198. pulumi_vault/secrets/sync_config.py +5 -0
  199. pulumi_vault/secrets/sync_gcp_destination.py +5 -0
  200. pulumi_vault/secrets/sync_gh_destination.py +5 -0
  201. pulumi_vault/secrets/sync_github_apps.py +5 -0
  202. pulumi_vault/secrets/sync_vercel_destination.py +5 -0
  203. pulumi_vault/ssh/_inputs.py +22 -0
  204. pulumi_vault/ssh/outputs.py +5 -0
  205. pulumi_vault/ssh/secret_backend_ca.py +5 -0
  206. pulumi_vault/ssh/secret_backend_role.py +5 -0
  207. pulumi_vault/terraformcloud/secret_backend.py +5 -0
  208. pulumi_vault/terraformcloud/secret_creds.py +5 -0
  209. pulumi_vault/terraformcloud/secret_role.py +5 -0
  210. pulumi_vault/token.py +5 -0
  211. pulumi_vault/tokenauth/auth_backend_role.py +5 -0
  212. pulumi_vault/transform/alphabet.py +5 -0
  213. pulumi_vault/transform/get_decode.py +28 -4
  214. pulumi_vault/transform/get_encode.py +28 -4
  215. pulumi_vault/transform/role.py +5 -0
  216. pulumi_vault/transform/template.py +5 -0
  217. pulumi_vault/transform/transformation.py +5 -0
  218. pulumi_vault/transit/get_decrypt.py +21 -4
  219. pulumi_vault/transit/get_encrypt.py +23 -4
  220. pulumi_vault/transit/secret_backend_key.py +5 -0
  221. pulumi_vault/transit/secret_cache_config.py +5 -0
  222. {pulumi_vault-6.4.0a1728108872.dist-info → pulumi_vault-6.4.0a1729059229.dist-info}/METADATA +3 -2
  223. pulumi_vault-6.4.0a1729059229.dist-info/RECORD +256 -0
  224. pulumi_vault-6.4.0a1728108872.dist-info/RECORD +0 -256
  225. {pulumi_vault-6.4.0a1728108872.dist-info → pulumi_vault-6.4.0a1729059229.dist-info}/WHEEL +0 -0
  226. {pulumi_vault-6.4.0a1728108872.dist-info → pulumi_vault-6.4.0a1729059229.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
  from . import outputs
12
17
  from ._inputs import *
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
  from . import outputs
12
17
  from ._inputs import *
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['EgpPolicyArgs', 'EgpPolicy']
@@ -4,18 +4,53 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
13
18
  'AuthBackendCustomEndpointArgs',
19
+ 'AuthBackendCustomEndpointArgsDict',
14
20
  'AuthBackendTuneArgs',
21
+ 'AuthBackendTuneArgsDict',
15
22
  'SecretRolesetBindingArgs',
23
+ 'SecretRolesetBindingArgsDict',
16
24
  'SecretStaticAccountBindingArgs',
25
+ 'SecretStaticAccountBindingArgsDict',
17
26
  ]
18
27
 
28
+ MYPY = False
29
+
30
+ if not MYPY:
31
+ class AuthBackendCustomEndpointArgsDict(TypedDict):
32
+ api: NotRequired[pulumi.Input[str]]
33
+ """
34
+ Replaces the service endpoint used in API requests to `https://www.googleapis.com`.
35
+ """
36
+ compute: NotRequired[pulumi.Input[str]]
37
+ """
38
+ Replaces the service endpoint used in API requests to `https://compute.googleapis.com`.
39
+
40
+ The endpoint value provided for a given key has the form of `scheme://host:port`.
41
+ The `scheme://` and `:port` portions of the endpoint value are optional.
42
+ """
43
+ crm: NotRequired[pulumi.Input[str]]
44
+ """
45
+ Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`.
46
+ """
47
+ iam: NotRequired[pulumi.Input[str]]
48
+ """
49
+ Replaces the service endpoint used in API requests to `https://iam.googleapis.com`.
50
+ """
51
+ elif False:
52
+ AuthBackendCustomEndpointArgsDict: TypeAlias = Mapping[str, Any]
53
+
19
54
  @pulumi.input_type
20
55
  class AuthBackendCustomEndpointArgs:
21
56
  def __init__(__self__, *,
@@ -93,6 +128,56 @@ class AuthBackendCustomEndpointArgs:
93
128
  pulumi.set(self, "iam", value)
94
129
 
95
130
 
131
+ if not MYPY:
132
+ class AuthBackendTuneArgsDict(TypedDict):
133
+ allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
134
+ """
135
+ List of headers to whitelist and allowing
136
+ a plugin to include them in the response.
137
+ """
138
+ audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
139
+ """
140
+ Specifies the list of keys that will
141
+ not be HMAC'd by audit devices in the request data object.
142
+ """
143
+ audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
144
+ """
145
+ Specifies the list of keys that will
146
+ not be HMAC'd by audit devices in the response data object.
147
+ """
148
+ default_lease_ttl: NotRequired[pulumi.Input[str]]
149
+ """
150
+ Specifies the default time-to-live.
151
+ If set, this overrides the global default.
152
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
153
+ """
154
+ listing_visibility: NotRequired[pulumi.Input[str]]
155
+ """
156
+ Specifies whether to show this mount in
157
+ the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
158
+ """
159
+ max_lease_ttl: NotRequired[pulumi.Input[str]]
160
+ """
161
+ Specifies the maximum time-to-live.
162
+ If set, this overrides the global default.
163
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
164
+ """
165
+ passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
166
+ """
167
+ List of headers to whitelist and
168
+ pass from the request to the backend.
169
+ """
170
+ token_type: NotRequired[pulumi.Input[str]]
171
+ """
172
+ Specifies the type of tokens that should be returned by
173
+ the mount. Valid values are "default-service", "default-batch", "service", "batch".
174
+
175
+
176
+ For more details on the usage of each argument consult the [Vault GCP API documentation](https://www.vaultproject.io/api-docs/auth/gcp#configure).
177
+ """
178
+ elif False:
179
+ AuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any]
180
+
96
181
  @pulumi.input_type
97
182
  class AuthBackendTuneArgs:
98
183
  def __init__(__self__, *,
@@ -254,6 +339,19 @@ class AuthBackendTuneArgs:
254
339
  pulumi.set(self, "token_type", value)
255
340
 
256
341
 
342
+ if not MYPY:
343
+ class SecretRolesetBindingArgsDict(TypedDict):
344
+ resource: pulumi.Input[str]
345
+ """
346
+ Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different [formats](https://www.vaultproject.io/docs/secrets/gcp/index.html#roleset-bindings).
347
+ """
348
+ roles: pulumi.Input[Sequence[pulumi.Input[str]]]
349
+ """
350
+ List of [GCP IAM roles](https://cloud.google.com/iam/docs/understanding-roles) for the resource.
351
+ """
352
+ elif False:
353
+ SecretRolesetBindingArgsDict: TypeAlias = Mapping[str, Any]
354
+
257
355
  @pulumi.input_type
258
356
  class SecretRolesetBindingArgs:
259
357
  def __init__(__self__, *,
@@ -291,6 +389,19 @@ class SecretRolesetBindingArgs:
291
389
  pulumi.set(self, "roles", value)
292
390
 
293
391
 
392
+ if not MYPY:
393
+ class SecretStaticAccountBindingArgsDict(TypedDict):
394
+ resource: pulumi.Input[str]
395
+ """
396
+ Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different [formats](https://www.vaultproject.io/docs/secrets/gcp/index.html#bindings).
397
+ """
398
+ roles: pulumi.Input[Sequence[pulumi.Input[str]]]
399
+ """
400
+ List of [GCP IAM roles](https://cloud.google.com/iam/docs/understanding-roles) for the resource.
401
+ """
402
+ elif False:
403
+ SecretStaticAccountBindingArgsDict: TypeAlias = Mapping[str, Any]
404
+
294
405
  @pulumi.input_type
295
406
  class SecretStaticAccountBindingArgs:
296
407
  def __init__(__self__, *,
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
  from . import outputs
12
17
  from ._inputs import *
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -393,9 +398,6 @@ def get_auth_backend_role(backend: Optional[str] = None,
393
398
  token_ttl=pulumi.get(__ret__, 'token_ttl'),
394
399
  token_type=pulumi.get(__ret__, 'token_type'),
395
400
  type=pulumi.get(__ret__, 'type'))
396
-
397
-
398
- @_utilities.lift_output_func(get_auth_backend_role)
399
401
  def get_auth_backend_role_output(backend: Optional[pulumi.Input[Optional[str]]] = None,
400
402
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
401
403
  role_name: Optional[pulumi.Input[str]] = None,
@@ -458,4 +460,40 @@ def get_auth_backend_role_output(backend: Optional[pulumi.Input[Optional[str]]]
458
460
  `default-service` and `default-batch` which specify the type to return unless the client
459
461
  requests a different type at generation time.
460
462
  """
461
- ...
463
+ __args__ = dict()
464
+ __args__['backend'] = backend
465
+ __args__['namespace'] = namespace
466
+ __args__['roleName'] = role_name
467
+ __args__['tokenBoundCidrs'] = token_bound_cidrs
468
+ __args__['tokenExplicitMaxTtl'] = token_explicit_max_ttl
469
+ __args__['tokenMaxTtl'] = token_max_ttl
470
+ __args__['tokenNoDefaultPolicy'] = token_no_default_policy
471
+ __args__['tokenNumUses'] = token_num_uses
472
+ __args__['tokenPeriod'] = token_period
473
+ __args__['tokenPolicies'] = token_policies
474
+ __args__['tokenTtl'] = token_ttl
475
+ __args__['tokenType'] = token_type
476
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
477
+ __ret__ = pulumi.runtime.invoke_output('vault:gcp/getAuthBackendRole:getAuthBackendRole', __args__, opts=opts, typ=GetAuthBackendRoleResult)
478
+ return __ret__.apply(lambda __response__: GetAuthBackendRoleResult(
479
+ backend=pulumi.get(__response__, 'backend'),
480
+ bound_instance_groups=pulumi.get(__response__, 'bound_instance_groups'),
481
+ bound_labels=pulumi.get(__response__, 'bound_labels'),
482
+ bound_projects=pulumi.get(__response__, 'bound_projects'),
483
+ bound_regions=pulumi.get(__response__, 'bound_regions'),
484
+ bound_service_accounts=pulumi.get(__response__, 'bound_service_accounts'),
485
+ bound_zones=pulumi.get(__response__, 'bound_zones'),
486
+ id=pulumi.get(__response__, 'id'),
487
+ namespace=pulumi.get(__response__, 'namespace'),
488
+ role_id=pulumi.get(__response__, 'role_id'),
489
+ role_name=pulumi.get(__response__, 'role_name'),
490
+ token_bound_cidrs=pulumi.get(__response__, 'token_bound_cidrs'),
491
+ token_explicit_max_ttl=pulumi.get(__response__, 'token_explicit_max_ttl'),
492
+ token_max_ttl=pulumi.get(__response__, 'token_max_ttl'),
493
+ token_no_default_policy=pulumi.get(__response__, 'token_no_default_policy'),
494
+ token_num_uses=pulumi.get(__response__, 'token_num_uses'),
495
+ token_period=pulumi.get(__response__, 'token_period'),
496
+ token_policies=pulumi.get(__response__, 'token_policies'),
497
+ token_ttl=pulumi.get(__response__, 'token_ttl'),
498
+ token_type=pulumi.get(__response__, 'token_type'),
499
+ type=pulumi.get(__response__, 'type')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendArgs', 'SecretBackend']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretImpersonatedAccountArgs', 'SecretImpersonatedAccount']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
  from . import outputs
12
17
  from ._inputs import *
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
  from . import outputs
12
17
  from ._inputs import *
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['EndpointArgs', 'Endpoint']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -226,9 +231,6 @@ def get_secret(namespace: Optional[str] = None,
226
231
  path=pulumi.get(__ret__, 'path'),
227
232
  version=pulumi.get(__ret__, 'version'),
228
233
  with_lease_start_time=pulumi.get(__ret__, 'with_lease_start_time'))
229
-
230
-
231
- @_utilities.lift_output_func(get_secret)
232
234
  def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
233
235
  path: Optional[pulumi.Input[str]] = None,
234
236
  version: Optional[pulumi.Input[Optional[int]]] = None,
@@ -283,4 +285,22 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
283
285
  Note that storing the `lease_start_time` in the TF state will cause a persistent drift
284
286
  on every `pulumi preview` and will require a `pulumi up`.
285
287
  """
286
- ...
288
+ __args__ = dict()
289
+ __args__['namespace'] = namespace
290
+ __args__['path'] = path
291
+ __args__['version'] = version
292
+ __args__['withLeaseStartTime'] = with_lease_start_time
293
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
294
+ __ret__ = pulumi.runtime.invoke_output('vault:generic/getSecret:getSecret', __args__, opts=opts, typ=GetSecretResult)
295
+ return __ret__.apply(lambda __response__: GetSecretResult(
296
+ data=pulumi.get(__response__, 'data'),
297
+ data_json=pulumi.get(__response__, 'data_json'),
298
+ id=pulumi.get(__response__, 'id'),
299
+ lease_duration=pulumi.get(__response__, 'lease_duration'),
300
+ lease_id=pulumi.get(__response__, 'lease_id'),
301
+ lease_renewable=pulumi.get(__response__, 'lease_renewable'),
302
+ lease_start_time=pulumi.get(__response__, 'lease_start_time'),
303
+ namespace=pulumi.get(__response__, 'namespace'),
304
+ path=pulumi.get(__response__, 'path'),
305
+ version=pulumi.get(__response__, 'version'),
306
+ with_lease_start_time=pulumi.get(__response__, 'with_lease_start_time')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretArgs', 'Secret']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = [
@@ -183,9 +188,6 @@ def get_auth_backend(namespace: Optional[str] = None,
183
188
  namespace=pulumi.get(__ret__, 'namespace'),
184
189
  path=pulumi.get(__ret__, 'path'),
185
190
  type=pulumi.get(__ret__, 'type'))
186
-
187
-
188
- @_utilities.lift_output_func(get_auth_backend)
189
191
  def get_auth_backend_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
190
192
  path: Optional[pulumi.Input[str]] = None,
191
193
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendResult]:
@@ -206,4 +208,19 @@ def get_auth_backend_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
206
208
  *Available only for Vault Enterprise*.
207
209
  :param str path: The auth backend mount point.
208
210
  """
209
- ...
211
+ __args__ = dict()
212
+ __args__['namespace'] = namespace
213
+ __args__['path'] = path
214
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
215
+ __ret__ = pulumi.runtime.invoke_output('vault:index/getAuthBackend:getAuthBackend', __args__, opts=opts, typ=GetAuthBackendResult)
216
+ return __ret__.apply(lambda __response__: GetAuthBackendResult(
217
+ accessor=pulumi.get(__response__, 'accessor'),
218
+ default_lease_ttl_seconds=pulumi.get(__response__, 'default_lease_ttl_seconds'),
219
+ description=pulumi.get(__response__, 'description'),
220
+ id=pulumi.get(__response__, 'id'),
221
+ listing_visibility=pulumi.get(__response__, 'listing_visibility'),
222
+ local=pulumi.get(__response__, 'local'),
223
+ max_lease_ttl_seconds=pulumi.get(__response__, 'max_lease_ttl_seconds'),
224
+ namespace=pulumi.get(__response__, 'namespace'),
225
+ path=pulumi.get(__response__, 'path'),
226
+ type=pulumi.get(__response__, 'type')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = [
@@ -125,9 +130,6 @@ def get_auth_backends(namespace: Optional[str] = None,
125
130
  namespace=pulumi.get(__ret__, 'namespace'),
126
131
  paths=pulumi.get(__ret__, 'paths'),
127
132
  type=pulumi.get(__ret__, 'type'))
128
-
129
-
130
- @_utilities.lift_output_func(get_auth_backends)
131
133
  def get_auth_backends_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
132
134
  type: Optional[pulumi.Input[Optional[str]]] = None,
133
135
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendsResult]:
@@ -155,4 +157,14 @@ def get_auth_backends_output(namespace: Optional[pulumi.Input[Optional[str]]] =
155
157
  *Available only for Vault Enterprise*.
156
158
  :param str type: The name of the auth method type. Allows filtering of backends returned by type.
157
159
  """
158
- ...
160
+ __args__ = dict()
161
+ __args__['namespace'] = namespace
162
+ __args__['type'] = type
163
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
164
+ __ret__ = pulumi.runtime.invoke_output('vault:index/getAuthBackends:getAuthBackends', __args__, opts=opts, typ=GetAuthBackendsResult)
165
+ return __ret__.apply(lambda __response__: GetAuthBackendsResult(
166
+ accessors=pulumi.get(__response__, 'accessors'),
167
+ id=pulumi.get(__response__, 'id'),
168
+ namespace=pulumi.get(__response__, 'namespace'),
169
+ paths=pulumi.get(__response__, 'paths'),
170
+ type=pulumi.get(__response__, 'type')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = [
@@ -161,9 +166,6 @@ def get_namespace(namespace: Optional[str] = None,
161
166
  namespace_id=pulumi.get(__ret__, 'namespace_id'),
162
167
  path=pulumi.get(__ret__, 'path'),
163
168
  path_fq=pulumi.get(__ret__, 'path_fq'))
164
-
165
-
166
- @_utilities.lift_output_func(get_namespace)
167
169
  def get_namespace_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
168
170
  path: Optional[pulumi.Input[Optional[str]]] = None,
169
171
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNamespaceResult]:
@@ -210,4 +212,15 @@ def get_namespace_output(namespace: Optional[pulumi.Input[Optional[str]]] = None
210
212
  based on the `namespace` arguments of the provider and this data source.
211
213
  Other path related attributes will be empty in this case.
212
214
  """
213
- ...
215
+ __args__ = dict()
216
+ __args__['namespace'] = namespace
217
+ __args__['path'] = path
218
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
219
+ __ret__ = pulumi.runtime.invoke_output('vault:index/getNamespace:getNamespace', __args__, opts=opts, typ=GetNamespaceResult)
220
+ return __ret__.apply(lambda __response__: GetNamespaceResult(
221
+ custom_metadata=pulumi.get(__response__, 'custom_metadata'),
222
+ id=pulumi.get(__response__, 'id'),
223
+ namespace=pulumi.get(__response__, 'namespace'),
224
+ namespace_id=pulumi.get(__response__, 'namespace_id'),
225
+ path=pulumi.get(__response__, 'path'),
226
+ path_fq=pulumi.get(__response__, 'path_fq')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = [
@@ -106,9 +111,6 @@ def get_namespaces(namespace: Optional[str] = None,
106
111
  id=pulumi.get(__ret__, 'id'),
107
112
  namespace=pulumi.get(__ret__, 'namespace'),
108
113
  paths=pulumi.get(__ret__, 'paths'))
109
-
110
-
111
- @_utilities.lift_output_func(get_namespaces)
112
114
  def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
113
115
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNamespacesResult]:
114
116
  """
@@ -141,4 +143,11 @@ def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[str]]] = Non
141
143
  The value should not contain leading or trailing forward slashes.
142
144
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
143
145
  """
144
- ...
146
+ __args__ = dict()
147
+ __args__['namespace'] = namespace
148
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
149
+ __ret__ = pulumi.runtime.invoke_output('vault:index/getNamespaces:getNamespaces', __args__, opts=opts, typ=GetNamespacesResult)
150
+ return __ret__.apply(lambda __response__: GetNamespacesResult(
151
+ id=pulumi.get(__response__, 'id'),
152
+ namespace=pulumi.get(__response__, 'namespace'),
153
+ paths=pulumi.get(__response__, 'paths')))