pulumi-vault 6.4.0a1728108872__py3-none-any.whl → 6.4.0a1729059229__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +560 -0
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +19 -4
  4. pulumi_vault/ad/secret_backend.py +5 -0
  5. pulumi_vault/ad/secret_library.py +5 -0
  6. pulumi_vault/ad/secret_role.py +5 -0
  7. pulumi_vault/alicloud/auth_backend_role.py +5 -0
  8. pulumi_vault/approle/auth_backend_login.py +5 -0
  9. pulumi_vault/approle/auth_backend_role.py +5 -0
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
  11. pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
  12. pulumi_vault/audit.py +5 -0
  13. pulumi_vault/audit_request_header.py +5 -0
  14. pulumi_vault/auth_backend.py +5 -0
  15. pulumi_vault/aws/auth_backend_cert.py +5 -0
  16. pulumi_vault/aws/auth_backend_client.py +5 -0
  17. pulumi_vault/aws/auth_backend_config_identity.py +5 -0
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
  19. pulumi_vault/aws/auth_backend_login.py +5 -0
  20. pulumi_vault/aws/auth_backend_role.py +5 -0
  21. pulumi_vault/aws/auth_backend_role_tag.py +5 -0
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
  23. pulumi_vault/aws/auth_backend_sts_role.py +5 -0
  24. pulumi_vault/aws/get_access_credentials.py +31 -4
  25. pulumi_vault/aws/get_static_access_credentials.py +18 -4
  26. pulumi_vault/aws/secret_backend.py +5 -0
  27. pulumi_vault/aws/secret_backend_role.py +5 -0
  28. pulumi_vault/aws/secret_backend_static_role.py +5 -0
  29. pulumi_vault/azure/_inputs.py +24 -0
  30. pulumi_vault/azure/auth_backend_config.py +5 -0
  31. pulumi_vault/azure/auth_backend_role.py +5 -0
  32. pulumi_vault/azure/backend.py +5 -0
  33. pulumi_vault/azure/backend_role.py +5 -0
  34. pulumi_vault/azure/get_access_credentials.py +36 -4
  35. pulumi_vault/azure/outputs.py +5 -0
  36. pulumi_vault/cert_auth_backend_role.py +5 -0
  37. pulumi_vault/config/__init__.pyi +5 -0
  38. pulumi_vault/config/_inputs.py +21 -0
  39. pulumi_vault/config/outputs.py +5 -0
  40. pulumi_vault/config/ui_custom_message.py +5 -0
  41. pulumi_vault/config/vars.py +5 -0
  42. pulumi_vault/consul/secret_backend.py +5 -0
  43. pulumi_vault/consul/secret_backend_role.py +5 -0
  44. pulumi_vault/database/_inputs.py +2019 -68
  45. pulumi_vault/database/outputs.py +5 -0
  46. pulumi_vault/database/secret_backend_connection.py +5 -0
  47. pulumi_vault/database/secret_backend_role.py +5 -0
  48. pulumi_vault/database/secret_backend_static_role.py +5 -0
  49. pulumi_vault/database/secrets_mount.py +5 -0
  50. pulumi_vault/egp_policy.py +5 -0
  51. pulumi_vault/gcp/_inputs.py +111 -0
  52. pulumi_vault/gcp/auth_backend.py +5 -0
  53. pulumi_vault/gcp/auth_backend_role.py +5 -0
  54. pulumi_vault/gcp/get_auth_backend_role.py +42 -4
  55. pulumi_vault/gcp/outputs.py +5 -0
  56. pulumi_vault/gcp/secret_backend.py +5 -0
  57. pulumi_vault/gcp/secret_impersonated_account.py +5 -0
  58. pulumi_vault/gcp/secret_roleset.py +5 -0
  59. pulumi_vault/gcp/secret_static_account.py +5 -0
  60. pulumi_vault/generic/endpoint.py +5 -0
  61. pulumi_vault/generic/get_secret.py +24 -4
  62. pulumi_vault/generic/secret.py +5 -0
  63. pulumi_vault/get_auth_backend.py +21 -4
  64. pulumi_vault/get_auth_backends.py +16 -4
  65. pulumi_vault/get_namespace.py +17 -4
  66. pulumi_vault/get_namespaces.py +13 -4
  67. pulumi_vault/get_nomad_access_token.py +18 -4
  68. pulumi_vault/get_policy_document.py +15 -4
  69. pulumi_vault/get_raft_autopilot_state.py +23 -4
  70. pulumi_vault/github/_inputs.py +55 -0
  71. pulumi_vault/github/auth_backend.py +5 -0
  72. pulumi_vault/github/outputs.py +5 -0
  73. pulumi_vault/github/team.py +5 -0
  74. pulumi_vault/github/user.py +5 -0
  75. pulumi_vault/identity/entity.py +5 -0
  76. pulumi_vault/identity/entity_alias.py +5 -0
  77. pulumi_vault/identity/entity_policies.py +5 -0
  78. pulumi_vault/identity/get_entity.py +34 -4
  79. pulumi_vault/identity/get_group.py +40 -4
  80. pulumi_vault/identity/get_oidc_client_creds.py +16 -4
  81. pulumi_vault/identity/get_oidc_openid_config.py +26 -4
  82. pulumi_vault/identity/get_oidc_public_keys.py +15 -4
  83. pulumi_vault/identity/group.py +5 -0
  84. pulumi_vault/identity/group_alias.py +5 -0
  85. pulumi_vault/identity/group_member_entity_ids.py +5 -0
  86. pulumi_vault/identity/group_member_group_ids.py +5 -0
  87. pulumi_vault/identity/group_policies.py +5 -0
  88. pulumi_vault/identity/mfa_duo.py +5 -0
  89. pulumi_vault/identity/mfa_login_enforcement.py +5 -0
  90. pulumi_vault/identity/mfa_okta.py +5 -0
  91. pulumi_vault/identity/mfa_pingid.py +5 -0
  92. pulumi_vault/identity/mfa_totp.py +5 -0
  93. pulumi_vault/identity/oidc.py +5 -0
  94. pulumi_vault/identity/oidc_assignment.py +5 -0
  95. pulumi_vault/identity/oidc_client.py +5 -0
  96. pulumi_vault/identity/oidc_key.py +5 -0
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
  98. pulumi_vault/identity/oidc_provider.py +5 -0
  99. pulumi_vault/identity/oidc_role.py +5 -0
  100. pulumi_vault/identity/oidc_scope.py +5 -0
  101. pulumi_vault/identity/outputs.py +5 -0
  102. pulumi_vault/jwt/_inputs.py +55 -0
  103. pulumi_vault/jwt/auth_backend.py +5 -0
  104. pulumi_vault/jwt/auth_backend_role.py +5 -0
  105. pulumi_vault/jwt/outputs.py +5 -0
  106. pulumi_vault/kmip/secret_backend.py +5 -0
  107. pulumi_vault/kmip/secret_role.py +5 -0
  108. pulumi_vault/kmip/secret_scope.py +5 -0
  109. pulumi_vault/kubernetes/auth_backend_config.py +5 -0
  110. pulumi_vault/kubernetes/auth_backend_role.py +5 -0
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
  113. pulumi_vault/kubernetes/get_service_account_token.py +28 -4
  114. pulumi_vault/kubernetes/secret_backend.py +5 -0
  115. pulumi_vault/kubernetes/secret_backend_role.py +5 -0
  116. pulumi_vault/kv/_inputs.py +32 -0
  117. pulumi_vault/kv/get_secret.py +19 -4
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +23 -4
  119. pulumi_vault/kv/get_secret_v2.py +25 -4
  120. pulumi_vault/kv/get_secrets_list.py +15 -4
  121. pulumi_vault/kv/get_secrets_list_v2.py +18 -4
  122. pulumi_vault/kv/outputs.py +5 -0
  123. pulumi_vault/kv/secret.py +5 -0
  124. pulumi_vault/kv/secret_backend_v2.py +5 -0
  125. pulumi_vault/kv/secret_v2.py +5 -0
  126. pulumi_vault/ldap/auth_backend.py +5 -0
  127. pulumi_vault/ldap/auth_backend_group.py +5 -0
  128. pulumi_vault/ldap/auth_backend_user.py +5 -0
  129. pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
  130. pulumi_vault/ldap/get_static_credentials.py +23 -4
  131. pulumi_vault/ldap/secret_backend.py +5 -0
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
  133. pulumi_vault/ldap/secret_backend_library_set.py +5 -0
  134. pulumi_vault/ldap/secret_backend_static_role.py +5 -0
  135. pulumi_vault/managed/_inputs.py +205 -0
  136. pulumi_vault/managed/keys.py +5 -0
  137. pulumi_vault/managed/outputs.py +5 -0
  138. pulumi_vault/mfa_duo.py +5 -0
  139. pulumi_vault/mfa_okta.py +5 -0
  140. pulumi_vault/mfa_pingid.py +5 -0
  141. pulumi_vault/mfa_totp.py +5 -0
  142. pulumi_vault/mongodbatlas/secret_backend.py +5 -0
  143. pulumi_vault/mongodbatlas/secret_role.py +5 -0
  144. pulumi_vault/mount.py +5 -0
  145. pulumi_vault/namespace.py +5 -0
  146. pulumi_vault/nomad_secret_backend.py +5 -0
  147. pulumi_vault/nomad_secret_role.py +5 -0
  148. pulumi_vault/okta/_inputs.py +39 -0
  149. pulumi_vault/okta/auth_backend.py +5 -0
  150. pulumi_vault/okta/auth_backend_group.py +5 -0
  151. pulumi_vault/okta/auth_backend_user.py +5 -0
  152. pulumi_vault/okta/outputs.py +5 -0
  153. pulumi_vault/outputs.py +5 -0
  154. pulumi_vault/password_policy.py +5 -0
  155. pulumi_vault/pkisecret/_inputs.py +41 -0
  156. pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
  157. pulumi_vault/pkisecret/backend_config_est.py +5 -0
  158. pulumi_vault/pkisecret/get_backend_config_est.py +22 -4
  159. pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
  160. pulumi_vault/pkisecret/get_backend_issuers.py +17 -4
  161. pulumi_vault/pkisecret/get_backend_key.py +19 -4
  162. pulumi_vault/pkisecret/get_backend_keys.py +17 -4
  163. pulumi_vault/pkisecret/outputs.py +5 -0
  164. pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
  172. pulumi_vault/pkisecret/secret_backend_key.py +5 -0
  173. pulumi_vault/pkisecret/secret_backend_role.py +5 -0
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
  176. pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
  177. pulumi_vault/plugin.py +5 -0
  178. pulumi_vault/plugin_pinned_version.py +5 -0
  179. pulumi_vault/policy.py +5 -0
  180. pulumi_vault/provider.py +5 -0
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +5 -0
  183. pulumi_vault/quota_rate_limit.py +5 -0
  184. pulumi_vault/rabbitmq/_inputs.py +61 -0
  185. pulumi_vault/rabbitmq/outputs.py +5 -0
  186. pulumi_vault/rabbitmq/secret_backend.py +5 -0
  187. pulumi_vault/rabbitmq/secret_backend_role.py +5 -0
  188. pulumi_vault/raft_autopilot.py +5 -0
  189. pulumi_vault/raft_snapshot_agent_config.py +5 -0
  190. pulumi_vault/rgp_policy.py +5 -0
  191. pulumi_vault/saml/auth_backend.py +5 -0
  192. pulumi_vault/saml/auth_backend_role.py +5 -0
  193. pulumi_vault/secrets/_inputs.py +30 -0
  194. pulumi_vault/secrets/outputs.py +5 -0
  195. pulumi_vault/secrets/sync_association.py +5 -0
  196. pulumi_vault/secrets/sync_aws_destination.py +5 -0
  197. pulumi_vault/secrets/sync_azure_destination.py +5 -0
  198. pulumi_vault/secrets/sync_config.py +5 -0
  199. pulumi_vault/secrets/sync_gcp_destination.py +5 -0
  200. pulumi_vault/secrets/sync_gh_destination.py +5 -0
  201. pulumi_vault/secrets/sync_github_apps.py +5 -0
  202. pulumi_vault/secrets/sync_vercel_destination.py +5 -0
  203. pulumi_vault/ssh/_inputs.py +22 -0
  204. pulumi_vault/ssh/outputs.py +5 -0
  205. pulumi_vault/ssh/secret_backend_ca.py +5 -0
  206. pulumi_vault/ssh/secret_backend_role.py +5 -0
  207. pulumi_vault/terraformcloud/secret_backend.py +5 -0
  208. pulumi_vault/terraformcloud/secret_creds.py +5 -0
  209. pulumi_vault/terraformcloud/secret_role.py +5 -0
  210. pulumi_vault/token.py +5 -0
  211. pulumi_vault/tokenauth/auth_backend_role.py +5 -0
  212. pulumi_vault/transform/alphabet.py +5 -0
  213. pulumi_vault/transform/get_decode.py +28 -4
  214. pulumi_vault/transform/get_encode.py +28 -4
  215. pulumi_vault/transform/role.py +5 -0
  216. pulumi_vault/transform/template.py +5 -0
  217. pulumi_vault/transform/transformation.py +5 -0
  218. pulumi_vault/transit/get_decrypt.py +21 -4
  219. pulumi_vault/transit/get_encrypt.py +23 -4
  220. pulumi_vault/transit/secret_backend_key.py +5 -0
  221. pulumi_vault/transit/secret_cache_config.py +5 -0
  222. {pulumi_vault-6.4.0a1728108872.dist-info → pulumi_vault-6.4.0a1729059229.dist-info}/METADATA +3 -2
  223. pulumi_vault-6.4.0a1729059229.dist-info/RECORD +256 -0
  224. pulumi_vault-6.4.0a1728108872.dist-info/RECORD +0 -256
  225. {pulumi_vault-6.4.0a1728108872.dist-info → pulumi_vault-6.4.0a1729059229.dist-info}/WHEEL +0 -0
  226. {pulumi_vault-6.4.0a1728108872.dist-info → pulumi_vault-6.4.0a1729059229.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['MfaLoginEnforcementArgs', 'MfaLoginEnforcement']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['MfaOktaArgs', 'MfaOkta']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['MfaPingidArgs', 'MfaPingid']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['MfaTotpArgs', 'MfaTotp']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['OidcArgs', 'Oidc']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['OidcAssignmentArgs', 'OidcAssignment']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['OidcClientArgs', 'OidcClient']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['OidcKeyArgs', 'OidcKey']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['OidcKeyAllowedClientIDArgs', 'OidcKeyAllowedClientID']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['OidcProviderArgs', 'OidcProvider']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['OidcRoleArgs', 'OidcRole']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['OidcScopeArgs', 'OidcScope']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -4,15 +4,70 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
13
18
  'AuthBackendTuneArgs',
19
+ 'AuthBackendTuneArgsDict',
14
20
  ]
15
21
 
22
+ MYPY = False
23
+
24
+ if not MYPY:
25
+ class AuthBackendTuneArgsDict(TypedDict):
26
+ allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
27
+ """
28
+ List of headers to whitelist and allowing
29
+ a plugin to include them in the response.
30
+ """
31
+ audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
32
+ """
33
+ Specifies the list of keys that will
34
+ not be HMAC'd by audit devices in the request data object.
35
+ """
36
+ audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
37
+ """
38
+ Specifies the list of keys that will
39
+ not be HMAC'd by audit devices in the response data object.
40
+ """
41
+ default_lease_ttl: NotRequired[pulumi.Input[str]]
42
+ """
43
+ Specifies the default time-to-live.
44
+ If set, this overrides the global default.
45
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
46
+ """
47
+ listing_visibility: NotRequired[pulumi.Input[str]]
48
+ """
49
+ Specifies whether to show this mount in
50
+ the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
51
+ """
52
+ max_lease_ttl: NotRequired[pulumi.Input[str]]
53
+ """
54
+ Specifies the maximum time-to-live.
55
+ If set, this overrides the global default.
56
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
57
+ """
58
+ passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
59
+ """
60
+ List of headers to whitelist and
61
+ pass from the request to the backend.
62
+ """
63
+ token_type: NotRequired[pulumi.Input[str]]
64
+ """
65
+ Specifies the type of tokens that should be returned by
66
+ the mount. Valid values are "default-service", "default-batch", "service", "batch".
67
+ """
68
+ elif False:
69
+ AuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any]
70
+
16
71
  @pulumi.input_type
17
72
  class AuthBackendTuneArgs:
18
73
  def __init__(__self__, *,
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
  from . import outputs
12
17
  from ._inputs import *
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendArgs', 'SecretBackend']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretRoleArgs', 'SecretRole']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretScopeArgs', 'SecretScope']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['AuthBackendConfigArgs', 'AuthBackendConfig']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -176,9 +181,6 @@ def get_auth_backend_config(backend: Optional[str] = None,
176
181
  kubernetes_host=pulumi.get(__ret__, 'kubernetes_host'),
177
182
  namespace=pulumi.get(__ret__, 'namespace'),
178
183
  pem_keys=pulumi.get(__ret__, 'pem_keys'))
179
-
180
-
181
- @_utilities.lift_output_func(get_auth_backend_config)
182
184
  def get_auth_backend_config_output(backend: Optional[pulumi.Input[Optional[str]]] = None,
183
185
  disable_iss_validation: Optional[pulumi.Input[Optional[bool]]] = None,
184
186
  disable_local_ca_jwt: Optional[pulumi.Input[Optional[bool]]] = None,
@@ -205,4 +207,24 @@ def get_auth_backend_config_output(backend: Optional[pulumi.Input[Optional[str]]
205
207
  *Available only for Vault Enterprise*.
206
208
  :param Sequence[str] pem_keys: Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
207
209
  """
208
- ...
210
+ __args__ = dict()
211
+ __args__['backend'] = backend
212
+ __args__['disableIssValidation'] = disable_iss_validation
213
+ __args__['disableLocalCaJwt'] = disable_local_ca_jwt
214
+ __args__['issuer'] = issuer
215
+ __args__['kubernetesCaCert'] = kubernetes_ca_cert
216
+ __args__['kubernetesHost'] = kubernetes_host
217
+ __args__['namespace'] = namespace
218
+ __args__['pemKeys'] = pem_keys
219
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
220
+ __ret__ = pulumi.runtime.invoke_output('vault:kubernetes/getAuthBackendConfig:getAuthBackendConfig', __args__, opts=opts, typ=GetAuthBackendConfigResult)
221
+ return __ret__.apply(lambda __response__: GetAuthBackendConfigResult(
222
+ backend=pulumi.get(__response__, 'backend'),
223
+ disable_iss_validation=pulumi.get(__response__, 'disable_iss_validation'),
224
+ disable_local_ca_jwt=pulumi.get(__response__, 'disable_local_ca_jwt'),
225
+ id=pulumi.get(__response__, 'id'),
226
+ issuer=pulumi.get(__response__, 'issuer'),
227
+ kubernetes_ca_cert=pulumi.get(__response__, 'kubernetes_ca_cert'),
228
+ kubernetes_host=pulumi.get(__response__, 'kubernetes_host'),
229
+ namespace=pulumi.get(__response__, 'namespace'),
230
+ pem_keys=pulumi.get(__response__, 'pem_keys')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -336,9 +341,6 @@ def get_auth_backend_role(audience: Optional[str] = None,
336
341
  token_policies=pulumi.get(__ret__, 'token_policies'),
337
342
  token_ttl=pulumi.get(__ret__, 'token_ttl'),
338
343
  token_type=pulumi.get(__ret__, 'token_type'))
339
-
340
-
341
- @_utilities.lift_output_func(get_auth_backend_role)
342
344
  def get_auth_backend_role_output(audience: Optional[pulumi.Input[Optional[str]]] = None,
343
345
  backend: Optional[pulumi.Input[Optional[str]]] = None,
344
346
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
@@ -395,4 +397,37 @@ def get_auth_backend_role_output(audience: Optional[pulumi.Input[Optional[str]]]
395
397
  `default-service` and `default-batch` which specify the type to return unless the client
396
398
  requests a different type at generation time.
397
399
  """
398
- ...
400
+ __args__ = dict()
401
+ __args__['audience'] = audience
402
+ __args__['backend'] = backend
403
+ __args__['namespace'] = namespace
404
+ __args__['roleName'] = role_name
405
+ __args__['tokenBoundCidrs'] = token_bound_cidrs
406
+ __args__['tokenExplicitMaxTtl'] = token_explicit_max_ttl
407
+ __args__['tokenMaxTtl'] = token_max_ttl
408
+ __args__['tokenNoDefaultPolicy'] = token_no_default_policy
409
+ __args__['tokenNumUses'] = token_num_uses
410
+ __args__['tokenPeriod'] = token_period
411
+ __args__['tokenPolicies'] = token_policies
412
+ __args__['tokenTtl'] = token_ttl
413
+ __args__['tokenType'] = token_type
414
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
415
+ __ret__ = pulumi.runtime.invoke_output('vault:kubernetes/getAuthBackendRole:getAuthBackendRole', __args__, opts=opts, typ=GetAuthBackendRoleResult)
416
+ return __ret__.apply(lambda __response__: GetAuthBackendRoleResult(
417
+ alias_name_source=pulumi.get(__response__, 'alias_name_source'),
418
+ audience=pulumi.get(__response__, 'audience'),
419
+ backend=pulumi.get(__response__, 'backend'),
420
+ bound_service_account_names=pulumi.get(__response__, 'bound_service_account_names'),
421
+ bound_service_account_namespaces=pulumi.get(__response__, 'bound_service_account_namespaces'),
422
+ id=pulumi.get(__response__, 'id'),
423
+ namespace=pulumi.get(__response__, 'namespace'),
424
+ role_name=pulumi.get(__response__, 'role_name'),
425
+ token_bound_cidrs=pulumi.get(__response__, 'token_bound_cidrs'),
426
+ token_explicit_max_ttl=pulumi.get(__response__, 'token_explicit_max_ttl'),
427
+ token_max_ttl=pulumi.get(__response__, 'token_max_ttl'),
428
+ token_no_default_policy=pulumi.get(__response__, 'token_no_default_policy'),
429
+ token_num_uses=pulumi.get(__response__, 'token_num_uses'),
430
+ token_period=pulumi.get(__response__, 'token_period'),
431
+ token_policies=pulumi.get(__response__, 'token_policies'),
432
+ token_ttl=pulumi.get(__response__, 'token_ttl'),
433
+ token_type=pulumi.get(__response__, 'token_type')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -254,9 +259,6 @@ def get_service_account_token(backend: Optional[str] = None,
254
259
  service_account_namespace=pulumi.get(__ret__, 'service_account_namespace'),
255
260
  service_account_token=pulumi.get(__ret__, 'service_account_token'),
256
261
  ttl=pulumi.get(__ret__, 'ttl'))
257
-
258
-
259
- @_utilities.lift_output_func(get_service_account_token)
260
262
  def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None,
261
263
  cluster_role_binding: Optional[pulumi.Input[Optional[bool]]] = None,
262
264
  kubernetes_namespace: Optional[pulumi.Input[str]] = None,
@@ -317,4 +319,26 @@ def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None
317
319
  :param str ttl: The TTL of the generated Kubernetes service account token, specified in
318
320
  seconds or as a Go duration format string.
319
321
  """
320
- ...
322
+ __args__ = dict()
323
+ __args__['backend'] = backend
324
+ __args__['clusterRoleBinding'] = cluster_role_binding
325
+ __args__['kubernetesNamespace'] = kubernetes_namespace
326
+ __args__['namespace'] = namespace
327
+ __args__['role'] = role
328
+ __args__['ttl'] = ttl
329
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
330
+ __ret__ = pulumi.runtime.invoke_output('vault:kubernetes/getServiceAccountToken:getServiceAccountToken', __args__, opts=opts, typ=GetServiceAccountTokenResult)
331
+ return __ret__.apply(lambda __response__: GetServiceAccountTokenResult(
332
+ backend=pulumi.get(__response__, 'backend'),
333
+ cluster_role_binding=pulumi.get(__response__, 'cluster_role_binding'),
334
+ id=pulumi.get(__response__, 'id'),
335
+ kubernetes_namespace=pulumi.get(__response__, 'kubernetes_namespace'),
336
+ lease_duration=pulumi.get(__response__, 'lease_duration'),
337
+ lease_id=pulumi.get(__response__, 'lease_id'),
338
+ lease_renewable=pulumi.get(__response__, 'lease_renewable'),
339
+ namespace=pulumi.get(__response__, 'namespace'),
340
+ role=pulumi.get(__response__, 'role'),
341
+ service_account_name=pulumi.get(__response__, 'service_account_name'),
342
+ service_account_namespace=pulumi.get(__response__, 'service_account_namespace'),
343
+ service_account_token=pulumi.get(__response__, 'service_account_token'),
344
+ ttl=pulumi.get(__response__, 'ttl')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendArgs', 'SecretBackend']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
@@ -4,15 +4,47 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
13
18
  'SecretV2CustomMetadataArgs',
19
+ 'SecretV2CustomMetadataArgsDict',
14
20
  ]
15
21
 
22
+ MYPY = False
23
+
24
+ if not MYPY:
25
+ class SecretV2CustomMetadataArgsDict(TypedDict):
26
+ cas_required: NotRequired[pulumi.Input[bool]]
27
+ """
28
+ If true, all keys will require the cas parameter to be set on all write requests.
29
+ """
30
+ data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
31
+ """
32
+ A mapping whose keys are the top-level data keys returned from
33
+ Vault and whose values are the corresponding values. This map can only
34
+ represent string data, so any non-string values returned from Vault are
35
+ serialized as JSON.
36
+ """
37
+ delete_version_after: NotRequired[pulumi.Input[int]]
38
+ """
39
+ If set, specifies the length of time before a version is deleted.
40
+ """
41
+ max_versions: NotRequired[pulumi.Input[int]]
42
+ """
43
+ The number of versions to keep per key.
44
+ """
45
+ elif False:
46
+ SecretV2CustomMetadataArgsDict: TypeAlias = Mapping[str, Any]
47
+
16
48
  @pulumi.input_type
17
49
  class SecretV2CustomMetadataArgs:
18
50
  def __init__(__self__, *,