pulumi-vault 6.4.0a1728108872__py3-none-any.whl → 6.4.0a1729059229__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +19 -4
- pulumi_vault/ad/secret_backend.py +5 -0
- pulumi_vault/ad/secret_library.py +5 -0
- pulumi_vault/ad/secret_role.py +5 -0
- pulumi_vault/alicloud/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_login.py +5 -0
- pulumi_vault/approle/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
- pulumi_vault/audit.py +5 -0
- pulumi_vault/audit_request_header.py +5 -0
- pulumi_vault/auth_backend.py +5 -0
- pulumi_vault/aws/auth_backend_cert.py +5 -0
- pulumi_vault/aws/auth_backend_client.py +5 -0
- pulumi_vault/aws/auth_backend_config_identity.py +5 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
- pulumi_vault/aws/auth_backend_login.py +5 -0
- pulumi_vault/aws/auth_backend_role.py +5 -0
- pulumi_vault/aws/auth_backend_role_tag.py +5 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
- pulumi_vault/aws/auth_backend_sts_role.py +5 -0
- pulumi_vault/aws/get_access_credentials.py +31 -4
- pulumi_vault/aws/get_static_access_credentials.py +18 -4
- pulumi_vault/aws/secret_backend.py +5 -0
- pulumi_vault/aws/secret_backend_role.py +5 -0
- pulumi_vault/aws/secret_backend_static_role.py +5 -0
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +5 -0
- pulumi_vault/azure/auth_backend_role.py +5 -0
- pulumi_vault/azure/backend.py +5 -0
- pulumi_vault/azure/backend_role.py +5 -0
- pulumi_vault/azure/get_access_credentials.py +36 -4
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +5 -0
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +21 -0
- pulumi_vault/config/outputs.py +5 -0
- pulumi_vault/config/ui_custom_message.py +5 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +5 -0
- pulumi_vault/consul/secret_backend_role.py +5 -0
- pulumi_vault/database/_inputs.py +2019 -68
- pulumi_vault/database/outputs.py +5 -0
- pulumi_vault/database/secret_backend_connection.py +5 -0
- pulumi_vault/database/secret_backend_role.py +5 -0
- pulumi_vault/database/secret_backend_static_role.py +5 -0
- pulumi_vault/database/secrets_mount.py +5 -0
- pulumi_vault/egp_policy.py +5 -0
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +5 -0
- pulumi_vault/gcp/auth_backend_role.py +5 -0
- pulumi_vault/gcp/get_auth_backend_role.py +42 -4
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +5 -0
- pulumi_vault/gcp/secret_impersonated_account.py +5 -0
- pulumi_vault/gcp/secret_roleset.py +5 -0
- pulumi_vault/gcp/secret_static_account.py +5 -0
- pulumi_vault/generic/endpoint.py +5 -0
- pulumi_vault/generic/get_secret.py +24 -4
- pulumi_vault/generic/secret.py +5 -0
- pulumi_vault/get_auth_backend.py +21 -4
- pulumi_vault/get_auth_backends.py +16 -4
- pulumi_vault/get_namespace.py +17 -4
- pulumi_vault/get_namespaces.py +13 -4
- pulumi_vault/get_nomad_access_token.py +18 -4
- pulumi_vault/get_policy_document.py +15 -4
- pulumi_vault/get_raft_autopilot_state.py +23 -4
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +5 -0
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +5 -0
- pulumi_vault/github/user.py +5 -0
- pulumi_vault/identity/entity.py +5 -0
- pulumi_vault/identity/entity_alias.py +5 -0
- pulumi_vault/identity/entity_policies.py +5 -0
- pulumi_vault/identity/get_entity.py +34 -4
- pulumi_vault/identity/get_group.py +40 -4
- pulumi_vault/identity/get_oidc_client_creds.py +16 -4
- pulumi_vault/identity/get_oidc_openid_config.py +26 -4
- pulumi_vault/identity/get_oidc_public_keys.py +15 -4
- pulumi_vault/identity/group.py +5 -0
- pulumi_vault/identity/group_alias.py +5 -0
- pulumi_vault/identity/group_member_entity_ids.py +5 -0
- pulumi_vault/identity/group_member_group_ids.py +5 -0
- pulumi_vault/identity/group_policies.py +5 -0
- pulumi_vault/identity/mfa_duo.py +5 -0
- pulumi_vault/identity/mfa_login_enforcement.py +5 -0
- pulumi_vault/identity/mfa_okta.py +5 -0
- pulumi_vault/identity/mfa_pingid.py +5 -0
- pulumi_vault/identity/mfa_totp.py +5 -0
- pulumi_vault/identity/oidc.py +5 -0
- pulumi_vault/identity/oidc_assignment.py +5 -0
- pulumi_vault/identity/oidc_client.py +5 -0
- pulumi_vault/identity/oidc_key.py +5 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
- pulumi_vault/identity/oidc_provider.py +5 -0
- pulumi_vault/identity/oidc_role.py +5 -0
- pulumi_vault/identity/oidc_scope.py +5 -0
- pulumi_vault/identity/outputs.py +5 -0
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +5 -0
- pulumi_vault/jwt/auth_backend_role.py +5 -0
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +5 -0
- pulumi_vault/kmip/secret_role.py +5 -0
- pulumi_vault/kmip/secret_scope.py +5 -0
- pulumi_vault/kubernetes/auth_backend_config.py +5 -0
- pulumi_vault/kubernetes/auth_backend_role.py +5 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
- pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
- pulumi_vault/kubernetes/get_service_account_token.py +28 -4
- pulumi_vault/kubernetes/secret_backend.py +5 -0
- pulumi_vault/kubernetes/secret_backend_role.py +5 -0
- pulumi_vault/kv/_inputs.py +32 -0
- pulumi_vault/kv/get_secret.py +19 -4
- pulumi_vault/kv/get_secret_subkeys_v2.py +23 -4
- pulumi_vault/kv/get_secret_v2.py +25 -4
- pulumi_vault/kv/get_secrets_list.py +15 -4
- pulumi_vault/kv/get_secrets_list_v2.py +18 -4
- pulumi_vault/kv/outputs.py +5 -0
- pulumi_vault/kv/secret.py +5 -0
- pulumi_vault/kv/secret_backend_v2.py +5 -0
- pulumi_vault/kv/secret_v2.py +5 -0
- pulumi_vault/ldap/auth_backend.py +5 -0
- pulumi_vault/ldap/auth_backend_group.py +5 -0
- pulumi_vault/ldap/auth_backend_user.py +5 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
- pulumi_vault/ldap/get_static_credentials.py +23 -4
- pulumi_vault/ldap/secret_backend.py +5 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
- pulumi_vault/ldap/secret_backend_library_set.py +5 -0
- pulumi_vault/ldap/secret_backend_static_role.py +5 -0
- pulumi_vault/managed/_inputs.py +205 -0
- pulumi_vault/managed/keys.py +5 -0
- pulumi_vault/managed/outputs.py +5 -0
- pulumi_vault/mfa_duo.py +5 -0
- pulumi_vault/mfa_okta.py +5 -0
- pulumi_vault/mfa_pingid.py +5 -0
- pulumi_vault/mfa_totp.py +5 -0
- pulumi_vault/mongodbatlas/secret_backend.py +5 -0
- pulumi_vault/mongodbatlas/secret_role.py +5 -0
- pulumi_vault/mount.py +5 -0
- pulumi_vault/namespace.py +5 -0
- pulumi_vault/nomad_secret_backend.py +5 -0
- pulumi_vault/nomad_secret_role.py +5 -0
- pulumi_vault/okta/_inputs.py +39 -0
- pulumi_vault/okta/auth_backend.py +5 -0
- pulumi_vault/okta/auth_backend_group.py +5 -0
- pulumi_vault/okta/auth_backend_user.py +5 -0
- pulumi_vault/okta/outputs.py +5 -0
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +5 -0
- pulumi_vault/pkisecret/_inputs.py +41 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
- pulumi_vault/pkisecret/backend_config_est.py +5 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +22 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
- pulumi_vault/pkisecret/get_backend_issuers.py +17 -4
- pulumi_vault/pkisecret/get_backend_key.py +19 -4
- pulumi_vault/pkisecret/get_backend_keys.py +17 -4
- pulumi_vault/pkisecret/outputs.py +5 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
- pulumi_vault/pkisecret/secret_backend_key.py +5 -0
- pulumi_vault/pkisecret/secret_backend_role.py +5 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
- pulumi_vault/plugin.py +5 -0
- pulumi_vault/plugin_pinned_version.py +5 -0
- pulumi_vault/policy.py +5 -0
- pulumi_vault/provider.py +5 -0
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +5 -0
- pulumi_vault/quota_rate_limit.py +5 -0
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +5 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +5 -0
- pulumi_vault/raft_autopilot.py +5 -0
- pulumi_vault/raft_snapshot_agent_config.py +5 -0
- pulumi_vault/rgp_policy.py +5 -0
- pulumi_vault/saml/auth_backend.py +5 -0
- pulumi_vault/saml/auth_backend_role.py +5 -0
- pulumi_vault/secrets/_inputs.py +30 -0
- pulumi_vault/secrets/outputs.py +5 -0
- pulumi_vault/secrets/sync_association.py +5 -0
- pulumi_vault/secrets/sync_aws_destination.py +5 -0
- pulumi_vault/secrets/sync_azure_destination.py +5 -0
- pulumi_vault/secrets/sync_config.py +5 -0
- pulumi_vault/secrets/sync_gcp_destination.py +5 -0
- pulumi_vault/secrets/sync_gh_destination.py +5 -0
- pulumi_vault/secrets/sync_github_apps.py +5 -0
- pulumi_vault/secrets/sync_vercel_destination.py +5 -0
- pulumi_vault/ssh/_inputs.py +22 -0
- pulumi_vault/ssh/outputs.py +5 -0
- pulumi_vault/ssh/secret_backend_ca.py +5 -0
- pulumi_vault/ssh/secret_backend_role.py +5 -0
- pulumi_vault/terraformcloud/secret_backend.py +5 -0
- pulumi_vault/terraformcloud/secret_creds.py +5 -0
- pulumi_vault/terraformcloud/secret_role.py +5 -0
- pulumi_vault/token.py +5 -0
- pulumi_vault/tokenauth/auth_backend_role.py +5 -0
- pulumi_vault/transform/alphabet.py +5 -0
- pulumi_vault/transform/get_decode.py +28 -4
- pulumi_vault/transform/get_encode.py +28 -4
- pulumi_vault/transform/role.py +5 -0
- pulumi_vault/transform/template.py +5 -0
- pulumi_vault/transform/transformation.py +5 -0
- pulumi_vault/transit/get_decrypt.py +21 -4
- pulumi_vault/transit/get_encrypt.py +23 -4
- pulumi_vault/transit/secret_backend_key.py +5 -0
- pulumi_vault/transit/secret_cache_config.py +5 -0
- {pulumi_vault-6.4.0a1728108872.dist-info → pulumi_vault-6.4.0a1729059229.dist-info}/METADATA +3 -2
- pulumi_vault-6.4.0a1729059229.dist-info/RECORD +256 -0
- pulumi_vault-6.4.0a1728108872.dist-info/RECORD +0 -256
- {pulumi_vault-6.4.0a1728108872.dist-info → pulumi_vault-6.4.0a1729059229.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.4.0a1728108872.dist-info → pulumi_vault-6.4.0a1729059229.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['MfaLoginEnforcementArgs', 'MfaLoginEnforcement']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['MfaOktaArgs', 'MfaOkta']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['MfaPingidArgs', 'MfaPingid']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['MfaTotpArgs', 'MfaTotp']
|
pulumi_vault/identity/oidc.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['OidcArgs', 'Oidc']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['OidcAssignmentArgs', 'OidcAssignment']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['OidcClientArgs', 'OidcClient']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['OidcKeyArgs', 'OidcKey']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['OidcKeyAllowedClientIDArgs', 'OidcKeyAllowedClientID']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['OidcProviderArgs', 'OidcProvider']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['OidcRoleArgs', 'OidcRole']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['OidcScopeArgs', 'OidcScope']
|
pulumi_vault/identity/outputs.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
pulumi_vault/jwt/_inputs.py
CHANGED
@@ -4,15 +4,70 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
13
18
|
'AuthBackendTuneArgs',
|
19
|
+
'AuthBackendTuneArgsDict',
|
14
20
|
]
|
15
21
|
|
22
|
+
MYPY = False
|
23
|
+
|
24
|
+
if not MYPY:
|
25
|
+
class AuthBackendTuneArgsDict(TypedDict):
|
26
|
+
allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
27
|
+
"""
|
28
|
+
List of headers to whitelist and allowing
|
29
|
+
a plugin to include them in the response.
|
30
|
+
"""
|
31
|
+
audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
32
|
+
"""
|
33
|
+
Specifies the list of keys that will
|
34
|
+
not be HMAC'd by audit devices in the request data object.
|
35
|
+
"""
|
36
|
+
audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
37
|
+
"""
|
38
|
+
Specifies the list of keys that will
|
39
|
+
not be HMAC'd by audit devices in the response data object.
|
40
|
+
"""
|
41
|
+
default_lease_ttl: NotRequired[pulumi.Input[str]]
|
42
|
+
"""
|
43
|
+
Specifies the default time-to-live.
|
44
|
+
If set, this overrides the global default.
|
45
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
46
|
+
"""
|
47
|
+
listing_visibility: NotRequired[pulumi.Input[str]]
|
48
|
+
"""
|
49
|
+
Specifies whether to show this mount in
|
50
|
+
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
51
|
+
"""
|
52
|
+
max_lease_ttl: NotRequired[pulumi.Input[str]]
|
53
|
+
"""
|
54
|
+
Specifies the maximum time-to-live.
|
55
|
+
If set, this overrides the global default.
|
56
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
57
|
+
"""
|
58
|
+
passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
59
|
+
"""
|
60
|
+
List of headers to whitelist and
|
61
|
+
pass from the request to the backend.
|
62
|
+
"""
|
63
|
+
token_type: NotRequired[pulumi.Input[str]]
|
64
|
+
"""
|
65
|
+
Specifies the type of tokens that should be returned by
|
66
|
+
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
67
|
+
"""
|
68
|
+
elif False:
|
69
|
+
AuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any]
|
70
|
+
|
16
71
|
@pulumi.input_type
|
17
72
|
class AuthBackendTuneArgs:
|
18
73
|
def __init__(__self__, *,
|
pulumi_vault/jwt/auth_backend.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
from . import outputs
|
12
17
|
from ._inputs import *
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
|
pulumi_vault/jwt/outputs.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendArgs', 'SecretBackend']
|
pulumi_vault/kmip/secret_role.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretRoleArgs', 'SecretRole']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretScopeArgs', 'SecretScope']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuthBackendConfigArgs', 'AuthBackendConfig']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -176,9 +181,6 @@ def get_auth_backend_config(backend: Optional[str] = None,
|
|
176
181
|
kubernetes_host=pulumi.get(__ret__, 'kubernetes_host'),
|
177
182
|
namespace=pulumi.get(__ret__, 'namespace'),
|
178
183
|
pem_keys=pulumi.get(__ret__, 'pem_keys'))
|
179
|
-
|
180
|
-
|
181
|
-
@_utilities.lift_output_func(get_auth_backend_config)
|
182
184
|
def get_auth_backend_config_output(backend: Optional[pulumi.Input[Optional[str]]] = None,
|
183
185
|
disable_iss_validation: Optional[pulumi.Input[Optional[bool]]] = None,
|
184
186
|
disable_local_ca_jwt: Optional[pulumi.Input[Optional[bool]]] = None,
|
@@ -205,4 +207,24 @@ def get_auth_backend_config_output(backend: Optional[pulumi.Input[Optional[str]]
|
|
205
207
|
*Available only for Vault Enterprise*.
|
206
208
|
:param Sequence[str] pem_keys: Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
|
207
209
|
"""
|
208
|
-
|
210
|
+
__args__ = dict()
|
211
|
+
__args__['backend'] = backend
|
212
|
+
__args__['disableIssValidation'] = disable_iss_validation
|
213
|
+
__args__['disableLocalCaJwt'] = disable_local_ca_jwt
|
214
|
+
__args__['issuer'] = issuer
|
215
|
+
__args__['kubernetesCaCert'] = kubernetes_ca_cert
|
216
|
+
__args__['kubernetesHost'] = kubernetes_host
|
217
|
+
__args__['namespace'] = namespace
|
218
|
+
__args__['pemKeys'] = pem_keys
|
219
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
220
|
+
__ret__ = pulumi.runtime.invoke_output('vault:kubernetes/getAuthBackendConfig:getAuthBackendConfig', __args__, opts=opts, typ=GetAuthBackendConfigResult)
|
221
|
+
return __ret__.apply(lambda __response__: GetAuthBackendConfigResult(
|
222
|
+
backend=pulumi.get(__response__, 'backend'),
|
223
|
+
disable_iss_validation=pulumi.get(__response__, 'disable_iss_validation'),
|
224
|
+
disable_local_ca_jwt=pulumi.get(__response__, 'disable_local_ca_jwt'),
|
225
|
+
id=pulumi.get(__response__, 'id'),
|
226
|
+
issuer=pulumi.get(__response__, 'issuer'),
|
227
|
+
kubernetes_ca_cert=pulumi.get(__response__, 'kubernetes_ca_cert'),
|
228
|
+
kubernetes_host=pulumi.get(__response__, 'kubernetes_host'),
|
229
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
230
|
+
pem_keys=pulumi.get(__response__, 'pem_keys')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -336,9 +341,6 @@ def get_auth_backend_role(audience: Optional[str] = None,
|
|
336
341
|
token_policies=pulumi.get(__ret__, 'token_policies'),
|
337
342
|
token_ttl=pulumi.get(__ret__, 'token_ttl'),
|
338
343
|
token_type=pulumi.get(__ret__, 'token_type'))
|
339
|
-
|
340
|
-
|
341
|
-
@_utilities.lift_output_func(get_auth_backend_role)
|
342
344
|
def get_auth_backend_role_output(audience: Optional[pulumi.Input[Optional[str]]] = None,
|
343
345
|
backend: Optional[pulumi.Input[Optional[str]]] = None,
|
344
346
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
@@ -395,4 +397,37 @@ def get_auth_backend_role_output(audience: Optional[pulumi.Input[Optional[str]]]
|
|
395
397
|
`default-service` and `default-batch` which specify the type to return unless the client
|
396
398
|
requests a different type at generation time.
|
397
399
|
"""
|
398
|
-
|
400
|
+
__args__ = dict()
|
401
|
+
__args__['audience'] = audience
|
402
|
+
__args__['backend'] = backend
|
403
|
+
__args__['namespace'] = namespace
|
404
|
+
__args__['roleName'] = role_name
|
405
|
+
__args__['tokenBoundCidrs'] = token_bound_cidrs
|
406
|
+
__args__['tokenExplicitMaxTtl'] = token_explicit_max_ttl
|
407
|
+
__args__['tokenMaxTtl'] = token_max_ttl
|
408
|
+
__args__['tokenNoDefaultPolicy'] = token_no_default_policy
|
409
|
+
__args__['tokenNumUses'] = token_num_uses
|
410
|
+
__args__['tokenPeriod'] = token_period
|
411
|
+
__args__['tokenPolicies'] = token_policies
|
412
|
+
__args__['tokenTtl'] = token_ttl
|
413
|
+
__args__['tokenType'] = token_type
|
414
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
415
|
+
__ret__ = pulumi.runtime.invoke_output('vault:kubernetes/getAuthBackendRole:getAuthBackendRole', __args__, opts=opts, typ=GetAuthBackendRoleResult)
|
416
|
+
return __ret__.apply(lambda __response__: GetAuthBackendRoleResult(
|
417
|
+
alias_name_source=pulumi.get(__response__, 'alias_name_source'),
|
418
|
+
audience=pulumi.get(__response__, 'audience'),
|
419
|
+
backend=pulumi.get(__response__, 'backend'),
|
420
|
+
bound_service_account_names=pulumi.get(__response__, 'bound_service_account_names'),
|
421
|
+
bound_service_account_namespaces=pulumi.get(__response__, 'bound_service_account_namespaces'),
|
422
|
+
id=pulumi.get(__response__, 'id'),
|
423
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
424
|
+
role_name=pulumi.get(__response__, 'role_name'),
|
425
|
+
token_bound_cidrs=pulumi.get(__response__, 'token_bound_cidrs'),
|
426
|
+
token_explicit_max_ttl=pulumi.get(__response__, 'token_explicit_max_ttl'),
|
427
|
+
token_max_ttl=pulumi.get(__response__, 'token_max_ttl'),
|
428
|
+
token_no_default_policy=pulumi.get(__response__, 'token_no_default_policy'),
|
429
|
+
token_num_uses=pulumi.get(__response__, 'token_num_uses'),
|
430
|
+
token_period=pulumi.get(__response__, 'token_period'),
|
431
|
+
token_policies=pulumi.get(__response__, 'token_policies'),
|
432
|
+
token_ttl=pulumi.get(__response__, 'token_ttl'),
|
433
|
+
token_type=pulumi.get(__response__, 'token_type')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -254,9 +259,6 @@ def get_service_account_token(backend: Optional[str] = None,
|
|
254
259
|
service_account_namespace=pulumi.get(__ret__, 'service_account_namespace'),
|
255
260
|
service_account_token=pulumi.get(__ret__, 'service_account_token'),
|
256
261
|
ttl=pulumi.get(__ret__, 'ttl'))
|
257
|
-
|
258
|
-
|
259
|
-
@_utilities.lift_output_func(get_service_account_token)
|
260
262
|
def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None,
|
261
263
|
cluster_role_binding: Optional[pulumi.Input[Optional[bool]]] = None,
|
262
264
|
kubernetes_namespace: Optional[pulumi.Input[str]] = None,
|
@@ -317,4 +319,26 @@ def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None
|
|
317
319
|
:param str ttl: The TTL of the generated Kubernetes service account token, specified in
|
318
320
|
seconds or as a Go duration format string.
|
319
321
|
"""
|
320
|
-
|
322
|
+
__args__ = dict()
|
323
|
+
__args__['backend'] = backend
|
324
|
+
__args__['clusterRoleBinding'] = cluster_role_binding
|
325
|
+
__args__['kubernetesNamespace'] = kubernetes_namespace
|
326
|
+
__args__['namespace'] = namespace
|
327
|
+
__args__['role'] = role
|
328
|
+
__args__['ttl'] = ttl
|
329
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
330
|
+
__ret__ = pulumi.runtime.invoke_output('vault:kubernetes/getServiceAccountToken:getServiceAccountToken', __args__, opts=opts, typ=GetServiceAccountTokenResult)
|
331
|
+
return __ret__.apply(lambda __response__: GetServiceAccountTokenResult(
|
332
|
+
backend=pulumi.get(__response__, 'backend'),
|
333
|
+
cluster_role_binding=pulumi.get(__response__, 'cluster_role_binding'),
|
334
|
+
id=pulumi.get(__response__, 'id'),
|
335
|
+
kubernetes_namespace=pulumi.get(__response__, 'kubernetes_namespace'),
|
336
|
+
lease_duration=pulumi.get(__response__, 'lease_duration'),
|
337
|
+
lease_id=pulumi.get(__response__, 'lease_id'),
|
338
|
+
lease_renewable=pulumi.get(__response__, 'lease_renewable'),
|
339
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
340
|
+
role=pulumi.get(__response__, 'role'),
|
341
|
+
service_account_name=pulumi.get(__response__, 'service_account_name'),
|
342
|
+
service_account_namespace=pulumi.get(__response__, 'service_account_namespace'),
|
343
|
+
service_account_token=pulumi.get(__response__, 'service_account_token'),
|
344
|
+
ttl=pulumi.get(__response__, 'ttl')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendArgs', 'SecretBackend']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
|
pulumi_vault/kv/_inputs.py
CHANGED
@@ -4,15 +4,47 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
13
18
|
'SecretV2CustomMetadataArgs',
|
19
|
+
'SecretV2CustomMetadataArgsDict',
|
14
20
|
]
|
15
21
|
|
22
|
+
MYPY = False
|
23
|
+
|
24
|
+
if not MYPY:
|
25
|
+
class SecretV2CustomMetadataArgsDict(TypedDict):
|
26
|
+
cas_required: NotRequired[pulumi.Input[bool]]
|
27
|
+
"""
|
28
|
+
If true, all keys will require the cas parameter to be set on all write requests.
|
29
|
+
"""
|
30
|
+
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
31
|
+
"""
|
32
|
+
A mapping whose keys are the top-level data keys returned from
|
33
|
+
Vault and whose values are the corresponding values. This map can only
|
34
|
+
represent string data, so any non-string values returned from Vault are
|
35
|
+
serialized as JSON.
|
36
|
+
"""
|
37
|
+
delete_version_after: NotRequired[pulumi.Input[int]]
|
38
|
+
"""
|
39
|
+
If set, specifies the length of time before a version is deleted.
|
40
|
+
"""
|
41
|
+
max_versions: NotRequired[pulumi.Input[int]]
|
42
|
+
"""
|
43
|
+
The number of versions to keep per key.
|
44
|
+
"""
|
45
|
+
elif False:
|
46
|
+
SecretV2CustomMetadataArgsDict: TypeAlias = Mapping[str, Any]
|
47
|
+
|
16
48
|
@pulumi.input_type
|
17
49
|
class SecretV2CustomMetadataArgs:
|
18
50
|
def __init__(__self__, *,
|