pulumi-vault 6.4.0a1728368050__py3-none-any.whl → 6.4.0a1729059229__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +560 -0
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +19 -4
  4. pulumi_vault/ad/secret_backend.py +5 -0
  5. pulumi_vault/ad/secret_library.py +5 -0
  6. pulumi_vault/ad/secret_role.py +5 -0
  7. pulumi_vault/alicloud/auth_backend_role.py +5 -0
  8. pulumi_vault/approle/auth_backend_login.py +5 -0
  9. pulumi_vault/approle/auth_backend_role.py +5 -0
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
  11. pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
  12. pulumi_vault/audit.py +5 -0
  13. pulumi_vault/audit_request_header.py +5 -0
  14. pulumi_vault/auth_backend.py +5 -0
  15. pulumi_vault/aws/auth_backend_cert.py +5 -0
  16. pulumi_vault/aws/auth_backend_client.py +5 -0
  17. pulumi_vault/aws/auth_backend_config_identity.py +5 -0
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
  19. pulumi_vault/aws/auth_backend_login.py +5 -0
  20. pulumi_vault/aws/auth_backend_role.py +5 -0
  21. pulumi_vault/aws/auth_backend_role_tag.py +5 -0
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
  23. pulumi_vault/aws/auth_backend_sts_role.py +5 -0
  24. pulumi_vault/aws/get_access_credentials.py +31 -4
  25. pulumi_vault/aws/get_static_access_credentials.py +18 -4
  26. pulumi_vault/aws/secret_backend.py +5 -0
  27. pulumi_vault/aws/secret_backend_role.py +5 -0
  28. pulumi_vault/aws/secret_backend_static_role.py +5 -0
  29. pulumi_vault/azure/_inputs.py +24 -0
  30. pulumi_vault/azure/auth_backend_config.py +5 -0
  31. pulumi_vault/azure/auth_backend_role.py +5 -0
  32. pulumi_vault/azure/backend.py +5 -0
  33. pulumi_vault/azure/backend_role.py +5 -0
  34. pulumi_vault/azure/get_access_credentials.py +36 -4
  35. pulumi_vault/azure/outputs.py +5 -0
  36. pulumi_vault/cert_auth_backend_role.py +5 -0
  37. pulumi_vault/config/__init__.pyi +5 -0
  38. pulumi_vault/config/_inputs.py +21 -0
  39. pulumi_vault/config/outputs.py +5 -0
  40. pulumi_vault/config/ui_custom_message.py +5 -0
  41. pulumi_vault/config/vars.py +5 -0
  42. pulumi_vault/consul/secret_backend.py +5 -0
  43. pulumi_vault/consul/secret_backend_role.py +5 -0
  44. pulumi_vault/database/_inputs.py +2019 -68
  45. pulumi_vault/database/outputs.py +5 -0
  46. pulumi_vault/database/secret_backend_connection.py +5 -0
  47. pulumi_vault/database/secret_backend_role.py +5 -0
  48. pulumi_vault/database/secret_backend_static_role.py +5 -0
  49. pulumi_vault/database/secrets_mount.py +5 -0
  50. pulumi_vault/egp_policy.py +5 -0
  51. pulumi_vault/gcp/_inputs.py +111 -0
  52. pulumi_vault/gcp/auth_backend.py +5 -0
  53. pulumi_vault/gcp/auth_backend_role.py +5 -0
  54. pulumi_vault/gcp/get_auth_backend_role.py +42 -4
  55. pulumi_vault/gcp/outputs.py +5 -0
  56. pulumi_vault/gcp/secret_backend.py +5 -0
  57. pulumi_vault/gcp/secret_impersonated_account.py +5 -0
  58. pulumi_vault/gcp/secret_roleset.py +5 -0
  59. pulumi_vault/gcp/secret_static_account.py +5 -0
  60. pulumi_vault/generic/endpoint.py +5 -0
  61. pulumi_vault/generic/get_secret.py +24 -4
  62. pulumi_vault/generic/secret.py +5 -0
  63. pulumi_vault/get_auth_backend.py +21 -4
  64. pulumi_vault/get_auth_backends.py +16 -4
  65. pulumi_vault/get_namespace.py +17 -4
  66. pulumi_vault/get_namespaces.py +13 -4
  67. pulumi_vault/get_nomad_access_token.py +18 -4
  68. pulumi_vault/get_policy_document.py +15 -4
  69. pulumi_vault/get_raft_autopilot_state.py +23 -4
  70. pulumi_vault/github/_inputs.py +55 -0
  71. pulumi_vault/github/auth_backend.py +5 -0
  72. pulumi_vault/github/outputs.py +5 -0
  73. pulumi_vault/github/team.py +5 -0
  74. pulumi_vault/github/user.py +5 -0
  75. pulumi_vault/identity/entity.py +5 -0
  76. pulumi_vault/identity/entity_alias.py +5 -0
  77. pulumi_vault/identity/entity_policies.py +5 -0
  78. pulumi_vault/identity/get_entity.py +34 -4
  79. pulumi_vault/identity/get_group.py +40 -4
  80. pulumi_vault/identity/get_oidc_client_creds.py +16 -4
  81. pulumi_vault/identity/get_oidc_openid_config.py +26 -4
  82. pulumi_vault/identity/get_oidc_public_keys.py +15 -4
  83. pulumi_vault/identity/group.py +5 -0
  84. pulumi_vault/identity/group_alias.py +5 -0
  85. pulumi_vault/identity/group_member_entity_ids.py +5 -0
  86. pulumi_vault/identity/group_member_group_ids.py +5 -0
  87. pulumi_vault/identity/group_policies.py +5 -0
  88. pulumi_vault/identity/mfa_duo.py +5 -0
  89. pulumi_vault/identity/mfa_login_enforcement.py +5 -0
  90. pulumi_vault/identity/mfa_okta.py +5 -0
  91. pulumi_vault/identity/mfa_pingid.py +5 -0
  92. pulumi_vault/identity/mfa_totp.py +5 -0
  93. pulumi_vault/identity/oidc.py +5 -0
  94. pulumi_vault/identity/oidc_assignment.py +5 -0
  95. pulumi_vault/identity/oidc_client.py +5 -0
  96. pulumi_vault/identity/oidc_key.py +5 -0
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
  98. pulumi_vault/identity/oidc_provider.py +5 -0
  99. pulumi_vault/identity/oidc_role.py +5 -0
  100. pulumi_vault/identity/oidc_scope.py +5 -0
  101. pulumi_vault/identity/outputs.py +5 -0
  102. pulumi_vault/jwt/_inputs.py +55 -0
  103. pulumi_vault/jwt/auth_backend.py +5 -0
  104. pulumi_vault/jwt/auth_backend_role.py +5 -0
  105. pulumi_vault/jwt/outputs.py +5 -0
  106. pulumi_vault/kmip/secret_backend.py +5 -0
  107. pulumi_vault/kmip/secret_role.py +5 -0
  108. pulumi_vault/kmip/secret_scope.py +5 -0
  109. pulumi_vault/kubernetes/auth_backend_config.py +5 -0
  110. pulumi_vault/kubernetes/auth_backend_role.py +5 -0
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
  113. pulumi_vault/kubernetes/get_service_account_token.py +28 -4
  114. pulumi_vault/kubernetes/secret_backend.py +5 -0
  115. pulumi_vault/kubernetes/secret_backend_role.py +5 -0
  116. pulumi_vault/kv/_inputs.py +32 -0
  117. pulumi_vault/kv/get_secret.py +19 -4
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +23 -4
  119. pulumi_vault/kv/get_secret_v2.py +25 -4
  120. pulumi_vault/kv/get_secrets_list.py +15 -4
  121. pulumi_vault/kv/get_secrets_list_v2.py +18 -4
  122. pulumi_vault/kv/outputs.py +5 -0
  123. pulumi_vault/kv/secret.py +5 -0
  124. pulumi_vault/kv/secret_backend_v2.py +5 -0
  125. pulumi_vault/kv/secret_v2.py +5 -0
  126. pulumi_vault/ldap/auth_backend.py +5 -0
  127. pulumi_vault/ldap/auth_backend_group.py +5 -0
  128. pulumi_vault/ldap/auth_backend_user.py +5 -0
  129. pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
  130. pulumi_vault/ldap/get_static_credentials.py +23 -4
  131. pulumi_vault/ldap/secret_backend.py +5 -0
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
  133. pulumi_vault/ldap/secret_backend_library_set.py +5 -0
  134. pulumi_vault/ldap/secret_backend_static_role.py +5 -0
  135. pulumi_vault/managed/_inputs.py +205 -0
  136. pulumi_vault/managed/keys.py +5 -0
  137. pulumi_vault/managed/outputs.py +5 -0
  138. pulumi_vault/mfa_duo.py +5 -0
  139. pulumi_vault/mfa_okta.py +5 -0
  140. pulumi_vault/mfa_pingid.py +5 -0
  141. pulumi_vault/mfa_totp.py +5 -0
  142. pulumi_vault/mongodbatlas/secret_backend.py +5 -0
  143. pulumi_vault/mongodbatlas/secret_role.py +5 -0
  144. pulumi_vault/mount.py +5 -0
  145. pulumi_vault/namespace.py +5 -0
  146. pulumi_vault/nomad_secret_backend.py +5 -0
  147. pulumi_vault/nomad_secret_role.py +5 -0
  148. pulumi_vault/okta/_inputs.py +39 -0
  149. pulumi_vault/okta/auth_backend.py +5 -0
  150. pulumi_vault/okta/auth_backend_group.py +5 -0
  151. pulumi_vault/okta/auth_backend_user.py +5 -0
  152. pulumi_vault/okta/outputs.py +5 -0
  153. pulumi_vault/outputs.py +5 -0
  154. pulumi_vault/password_policy.py +5 -0
  155. pulumi_vault/pkisecret/_inputs.py +41 -0
  156. pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
  157. pulumi_vault/pkisecret/backend_config_est.py +5 -0
  158. pulumi_vault/pkisecret/get_backend_config_est.py +22 -4
  159. pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
  160. pulumi_vault/pkisecret/get_backend_issuers.py +17 -4
  161. pulumi_vault/pkisecret/get_backend_key.py +19 -4
  162. pulumi_vault/pkisecret/get_backend_keys.py +17 -4
  163. pulumi_vault/pkisecret/outputs.py +5 -0
  164. pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
  172. pulumi_vault/pkisecret/secret_backend_key.py +5 -0
  173. pulumi_vault/pkisecret/secret_backend_role.py +5 -0
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
  176. pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
  177. pulumi_vault/plugin.py +5 -0
  178. pulumi_vault/plugin_pinned_version.py +5 -0
  179. pulumi_vault/policy.py +5 -0
  180. pulumi_vault/provider.py +5 -0
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +5 -0
  183. pulumi_vault/quota_rate_limit.py +5 -0
  184. pulumi_vault/rabbitmq/_inputs.py +61 -0
  185. pulumi_vault/rabbitmq/outputs.py +5 -0
  186. pulumi_vault/rabbitmq/secret_backend.py +5 -0
  187. pulumi_vault/rabbitmq/secret_backend_role.py +5 -0
  188. pulumi_vault/raft_autopilot.py +5 -0
  189. pulumi_vault/raft_snapshot_agent_config.py +5 -0
  190. pulumi_vault/rgp_policy.py +5 -0
  191. pulumi_vault/saml/auth_backend.py +5 -0
  192. pulumi_vault/saml/auth_backend_role.py +5 -0
  193. pulumi_vault/secrets/_inputs.py +30 -0
  194. pulumi_vault/secrets/outputs.py +5 -0
  195. pulumi_vault/secrets/sync_association.py +5 -0
  196. pulumi_vault/secrets/sync_aws_destination.py +5 -0
  197. pulumi_vault/secrets/sync_azure_destination.py +5 -0
  198. pulumi_vault/secrets/sync_config.py +5 -0
  199. pulumi_vault/secrets/sync_gcp_destination.py +5 -0
  200. pulumi_vault/secrets/sync_gh_destination.py +5 -0
  201. pulumi_vault/secrets/sync_github_apps.py +5 -0
  202. pulumi_vault/secrets/sync_vercel_destination.py +5 -0
  203. pulumi_vault/ssh/_inputs.py +22 -0
  204. pulumi_vault/ssh/outputs.py +5 -0
  205. pulumi_vault/ssh/secret_backend_ca.py +5 -0
  206. pulumi_vault/ssh/secret_backend_role.py +5 -0
  207. pulumi_vault/terraformcloud/secret_backend.py +5 -0
  208. pulumi_vault/terraformcloud/secret_creds.py +5 -0
  209. pulumi_vault/terraformcloud/secret_role.py +5 -0
  210. pulumi_vault/token.py +5 -0
  211. pulumi_vault/tokenauth/auth_backend_role.py +5 -0
  212. pulumi_vault/transform/alphabet.py +5 -0
  213. pulumi_vault/transform/get_decode.py +28 -4
  214. pulumi_vault/transform/get_encode.py +28 -4
  215. pulumi_vault/transform/role.py +5 -0
  216. pulumi_vault/transform/template.py +5 -0
  217. pulumi_vault/transform/transformation.py +5 -0
  218. pulumi_vault/transit/get_decrypt.py +21 -4
  219. pulumi_vault/transit/get_encrypt.py +23 -4
  220. pulumi_vault/transit/secret_backend_key.py +5 -0
  221. pulumi_vault/transit/secret_cache_config.py +5 -0
  222. {pulumi_vault-6.4.0a1728368050.dist-info → pulumi_vault-6.4.0a1729059229.dist-info}/METADATA +3 -2
  223. pulumi_vault-6.4.0a1729059229.dist-info/RECORD +256 -0
  224. pulumi_vault-6.4.0a1728368050.dist-info/RECORD +0 -256
  225. {pulumi_vault-6.4.0a1728368050.dist-info → pulumi_vault-6.4.0a1729059229.dist-info}/WHEEL +0 -0
  226. {pulumi_vault-6.4.0a1728368050.dist-info → pulumi_vault-6.4.0a1729059229.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = [
@@ -150,9 +155,6 @@ def get_nomad_access_token(backend: Optional[str] = None,
150
155
  namespace=pulumi.get(__ret__, 'namespace'),
151
156
  role=pulumi.get(__ret__, 'role'),
152
157
  secret_id=pulumi.get(__ret__, 'secret_id'))
153
-
154
-
155
- @_utilities.lift_output_func(get_nomad_access_token)
156
158
  def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
157
159
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
158
160
  role: Optional[pulumi.Input[str]] = None,
@@ -193,4 +195,16 @@ def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
193
195
  :param str role: The name of the Nomad secret backend role to generate
194
196
  a token for, with no leading or trailing `/`s.
195
197
  """
196
- ...
198
+ __args__ = dict()
199
+ __args__['backend'] = backend
200
+ __args__['namespace'] = namespace
201
+ __args__['role'] = role
202
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
203
+ __ret__ = pulumi.runtime.invoke_output('vault:index/getNomadAccessToken:getNomadAccessToken', __args__, opts=opts, typ=GetNomadAccessTokenResult)
204
+ return __ret__.apply(lambda __response__: GetNomadAccessTokenResult(
205
+ accessor_id=pulumi.get(__response__, 'accessor_id'),
206
+ backend=pulumi.get(__response__, 'backend'),
207
+ id=pulumi.get(__response__, 'id'),
208
+ namespace=pulumi.get(__response__, 'namespace'),
209
+ role=pulumi.get(__response__, 'role'),
210
+ secret_id=pulumi.get(__response__, 'secret_id')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
  from . import outputs
12
17
  from ._inputs import *
@@ -115,9 +120,6 @@ def get_policy_document(namespace: Optional[str] = None,
115
120
  id=pulumi.get(__ret__, 'id'),
116
121
  namespace=pulumi.get(__ret__, 'namespace'),
117
122
  rules=pulumi.get(__ret__, 'rules'))
118
-
119
-
120
- @_utilities.lift_output_func(get_policy_document)
121
123
  def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
122
124
  rules: Optional[pulumi.Input[Optional[Sequence[Union['GetPolicyDocumentRuleArgs', 'GetPolicyDocumentRuleArgsDict']]]]] = None,
123
125
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetPolicyDocumentResult]:
@@ -146,4 +148,13 @@ def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]]
146
148
  policy=example.hcl)
147
149
  ```
148
150
  """
149
- ...
151
+ __args__ = dict()
152
+ __args__['namespace'] = namespace
153
+ __args__['rules'] = rules
154
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
155
+ __ret__ = pulumi.runtime.invoke_output('vault:index/getPolicyDocument:getPolicyDocument', __args__, opts=opts, typ=GetPolicyDocumentResult)
156
+ return __ret__.apply(lambda __response__: GetPolicyDocumentResult(
157
+ hcl=pulumi.get(__response__, 'hcl'),
158
+ id=pulumi.get(__response__, 'id'),
159
+ namespace=pulumi.get(__response__, 'namespace'),
160
+ rules=pulumi.get(__response__, 'rules')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = [
@@ -223,9 +228,6 @@ def get_raft_autopilot_state(namespace: Optional[str] = None,
223
228
  upgrade_info=pulumi.get(__ret__, 'upgrade_info'),
224
229
  upgrade_info_json=pulumi.get(__ret__, 'upgrade_info_json'),
225
230
  voters=pulumi.get(__ret__, 'voters'))
226
-
227
-
228
- @_utilities.lift_output_func(get_raft_autopilot_state)
229
231
  def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
230
232
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetRaftAutopilotStateResult]:
231
233
  """
@@ -245,4 +247,21 @@ def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[st
245
247
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
246
248
  *Available only for Vault Enterprise*.
247
249
  """
248
- ...
250
+ __args__ = dict()
251
+ __args__['namespace'] = namespace
252
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
253
+ __ret__ = pulumi.runtime.invoke_output('vault:index/getRaftAutopilotState:getRaftAutopilotState', __args__, opts=opts, typ=GetRaftAutopilotStateResult)
254
+ return __ret__.apply(lambda __response__: GetRaftAutopilotStateResult(
255
+ failure_tolerance=pulumi.get(__response__, 'failure_tolerance'),
256
+ healthy=pulumi.get(__response__, 'healthy'),
257
+ id=pulumi.get(__response__, 'id'),
258
+ leader=pulumi.get(__response__, 'leader'),
259
+ namespace=pulumi.get(__response__, 'namespace'),
260
+ optimistic_failure_tolerance=pulumi.get(__response__, 'optimistic_failure_tolerance'),
261
+ redundancy_zones=pulumi.get(__response__, 'redundancy_zones'),
262
+ redundancy_zones_json=pulumi.get(__response__, 'redundancy_zones_json'),
263
+ servers=pulumi.get(__response__, 'servers'),
264
+ servers_json=pulumi.get(__response__, 'servers_json'),
265
+ upgrade_info=pulumi.get(__response__, 'upgrade_info'),
266
+ upgrade_info_json=pulumi.get(__response__, 'upgrade_info_json'),
267
+ voters=pulumi.get(__response__, 'voters')))
@@ -4,15 +4,70 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
13
18
  'AuthBackendTuneArgs',
19
+ 'AuthBackendTuneArgsDict',
14
20
  ]
15
21
 
22
+ MYPY = False
23
+
24
+ if not MYPY:
25
+ class AuthBackendTuneArgsDict(TypedDict):
26
+ allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
27
+ """
28
+ List of headers to whitelist and allowing
29
+ a plugin to include them in the response.
30
+ """
31
+ audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
32
+ """
33
+ Specifies the list of keys that will
34
+ not be HMAC'd by audit devices in the request data object.
35
+ """
36
+ audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
37
+ """
38
+ Specifies the list of keys that will
39
+ not be HMAC'd by audit devices in the response data object.
40
+ """
41
+ default_lease_ttl: NotRequired[pulumi.Input[str]]
42
+ """
43
+ Specifies the default time-to-live.
44
+ If set, this overrides the global default.
45
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
46
+ """
47
+ listing_visibility: NotRequired[pulumi.Input[str]]
48
+ """
49
+ Specifies whether to show this mount in
50
+ the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
51
+ """
52
+ max_lease_ttl: NotRequired[pulumi.Input[str]]
53
+ """
54
+ Specifies the maximum time-to-live.
55
+ If set, this overrides the global default.
56
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
57
+ """
58
+ passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
59
+ """
60
+ List of headers to whitelist and
61
+ pass from the request to the backend.
62
+ """
63
+ token_type: NotRequired[pulumi.Input[str]]
64
+ """
65
+ Specifies the type of tokens that should be returned by
66
+ the mount. Valid values are "default-service", "default-batch", "service", "batch".
67
+ """
68
+ elif False:
69
+ AuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any]
70
+
16
71
  @pulumi.input_type
17
72
  class AuthBackendTuneArgs:
18
73
  def __init__(__self__, *,
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
  from . import outputs
12
17
  from ._inputs import *
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['TeamArgs', 'Team']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['UserArgs', 'User']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['EntityArgs', 'Entity']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['EntityAliasArgs', 'EntityAlias']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['EntityPoliciesArgs', 'EntityPolicies']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
  from . import outputs
12
17
 
@@ -311,9 +316,6 @@ def get_entity(alias_id: Optional[str] = None,
311
316
  namespace=pulumi.get(__ret__, 'namespace'),
312
317
  namespace_id=pulumi.get(__ret__, 'namespace_id'),
313
318
  policies=pulumi.get(__ret__, 'policies'))
314
-
315
-
316
- @_utilities.lift_output_func(get_entity)
317
319
  def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
318
320
  alias_mount_accessor: Optional[pulumi.Input[Optional[str]]] = None,
319
321
  alias_name: Optional[pulumi.Input[Optional[str]]] = None,
@@ -351,4 +353,32 @@ def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
351
353
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
352
354
  *Available only for Vault Enterprise*.
353
355
  """
354
- ...
356
+ __args__ = dict()
357
+ __args__['aliasId'] = alias_id
358
+ __args__['aliasMountAccessor'] = alias_mount_accessor
359
+ __args__['aliasName'] = alias_name
360
+ __args__['entityId'] = entity_id
361
+ __args__['entityName'] = entity_name
362
+ __args__['namespace'] = namespace
363
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
364
+ __ret__ = pulumi.runtime.invoke_output('vault:identity/getEntity:getEntity', __args__, opts=opts, typ=GetEntityResult)
365
+ return __ret__.apply(lambda __response__: GetEntityResult(
366
+ alias_id=pulumi.get(__response__, 'alias_id'),
367
+ alias_mount_accessor=pulumi.get(__response__, 'alias_mount_accessor'),
368
+ alias_name=pulumi.get(__response__, 'alias_name'),
369
+ aliases=pulumi.get(__response__, 'aliases'),
370
+ creation_time=pulumi.get(__response__, 'creation_time'),
371
+ data_json=pulumi.get(__response__, 'data_json'),
372
+ direct_group_ids=pulumi.get(__response__, 'direct_group_ids'),
373
+ disabled=pulumi.get(__response__, 'disabled'),
374
+ entity_id=pulumi.get(__response__, 'entity_id'),
375
+ entity_name=pulumi.get(__response__, 'entity_name'),
376
+ group_ids=pulumi.get(__response__, 'group_ids'),
377
+ id=pulumi.get(__response__, 'id'),
378
+ inherited_group_ids=pulumi.get(__response__, 'inherited_group_ids'),
379
+ last_update_time=pulumi.get(__response__, 'last_update_time'),
380
+ merged_entity_ids=pulumi.get(__response__, 'merged_entity_ids'),
381
+ metadata=pulumi.get(__response__, 'metadata'),
382
+ namespace=pulumi.get(__response__, 'namespace'),
383
+ namespace_id=pulumi.get(__response__, 'namespace_id'),
384
+ policies=pulumi.get(__response__, 'policies')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -388,9 +393,6 @@ def get_group(alias_id: Optional[str] = None,
388
393
  parent_group_ids=pulumi.get(__ret__, 'parent_group_ids'),
389
394
  policies=pulumi.get(__ret__, 'policies'),
390
395
  type=pulumi.get(__ret__, 'type'))
391
-
392
-
393
- @_utilities.lift_output_func(get_group)
394
396
  def get_group_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
395
397
  alias_mount_accessor: Optional[pulumi.Input[Optional[str]]] = None,
396
398
  alias_name: Optional[pulumi.Input[Optional[str]]] = None,
@@ -428,4 +430,38 @@ def get_group_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
428
430
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
429
431
  *Available only for Vault Enterprise*.
430
432
  """
431
- ...
433
+ __args__ = dict()
434
+ __args__['aliasId'] = alias_id
435
+ __args__['aliasMountAccessor'] = alias_mount_accessor
436
+ __args__['aliasName'] = alias_name
437
+ __args__['groupId'] = group_id
438
+ __args__['groupName'] = group_name
439
+ __args__['namespace'] = namespace
440
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
441
+ __ret__ = pulumi.runtime.invoke_output('vault:identity/getGroup:getGroup', __args__, opts=opts, typ=GetGroupResult)
442
+ return __ret__.apply(lambda __response__: GetGroupResult(
443
+ alias_canonical_id=pulumi.get(__response__, 'alias_canonical_id'),
444
+ alias_creation_time=pulumi.get(__response__, 'alias_creation_time'),
445
+ alias_id=pulumi.get(__response__, 'alias_id'),
446
+ alias_last_update_time=pulumi.get(__response__, 'alias_last_update_time'),
447
+ alias_merged_from_canonical_ids=pulumi.get(__response__, 'alias_merged_from_canonical_ids'),
448
+ alias_metadata=pulumi.get(__response__, 'alias_metadata'),
449
+ alias_mount_accessor=pulumi.get(__response__, 'alias_mount_accessor'),
450
+ alias_mount_path=pulumi.get(__response__, 'alias_mount_path'),
451
+ alias_mount_type=pulumi.get(__response__, 'alias_mount_type'),
452
+ alias_name=pulumi.get(__response__, 'alias_name'),
453
+ creation_time=pulumi.get(__response__, 'creation_time'),
454
+ data_json=pulumi.get(__response__, 'data_json'),
455
+ group_id=pulumi.get(__response__, 'group_id'),
456
+ group_name=pulumi.get(__response__, 'group_name'),
457
+ id=pulumi.get(__response__, 'id'),
458
+ last_update_time=pulumi.get(__response__, 'last_update_time'),
459
+ member_entity_ids=pulumi.get(__response__, 'member_entity_ids'),
460
+ member_group_ids=pulumi.get(__response__, 'member_group_ids'),
461
+ metadata=pulumi.get(__response__, 'metadata'),
462
+ modify_index=pulumi.get(__response__, 'modify_index'),
463
+ namespace=pulumi.get(__response__, 'namespace'),
464
+ namespace_id=pulumi.get(__response__, 'namespace_id'),
465
+ parent_group_ids=pulumi.get(__response__, 'parent_group_ids'),
466
+ policies=pulumi.get(__response__, 'policies'),
467
+ type=pulumi.get(__response__, 'type')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -128,9 +133,6 @@ def get_oidc_client_creds(name: Optional[str] = None,
128
133
  id=pulumi.get(__ret__, 'id'),
129
134
  name=pulumi.get(__ret__, 'name'),
130
135
  namespace=pulumi.get(__ret__, 'namespace'))
131
-
132
-
133
- @_utilities.lift_output_func(get_oidc_client_creds)
134
136
  def get_oidc_client_creds_output(name: Optional[pulumi.Input[str]] = None,
135
137
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
136
138
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetOidcClientCredsResult]:
@@ -160,4 +162,14 @@ def get_oidc_client_creds_output(name: Optional[pulumi.Input[str]] = None,
160
162
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
161
163
  *Available only for Vault Enterprise*.
162
164
  """
163
- ...
165
+ __args__ = dict()
166
+ __args__['name'] = name
167
+ __args__['namespace'] = namespace
168
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
169
+ __ret__ = pulumi.runtime.invoke_output('vault:identity/getOidcClientCreds:getOidcClientCreds', __args__, opts=opts, typ=GetOidcClientCredsResult)
170
+ return __ret__.apply(lambda __response__: GetOidcClientCredsResult(
171
+ client_id=pulumi.get(__response__, 'client_id'),
172
+ client_secret=pulumi.get(__response__, 'client_secret'),
173
+ id=pulumi.get(__response__, 'id'),
174
+ name=pulumi.get(__response__, 'name'),
175
+ namespace=pulumi.get(__response__, 'namespace')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -268,9 +273,6 @@ def get_oidc_openid_config(name: Optional[str] = None,
268
273
  token_endpoint=pulumi.get(__ret__, 'token_endpoint'),
269
274
  token_endpoint_auth_methods_supporteds=pulumi.get(__ret__, 'token_endpoint_auth_methods_supporteds'),
270
275
  userinfo_endpoint=pulumi.get(__ret__, 'userinfo_endpoint'))
271
-
272
-
273
- @_utilities.lift_output_func(get_oidc_openid_config)
274
276
  def get_oidc_openid_config_output(name: Optional[pulumi.Input[str]] = None,
275
277
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
276
278
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetOidcOpenidConfigResult]:
@@ -309,4 +311,24 @@ def get_oidc_openid_config_output(name: Optional[pulumi.Input[str]] = None,
309
311
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
310
312
  *Available only for Vault Enterprise*.
311
313
  """
312
- ...
314
+ __args__ = dict()
315
+ __args__['name'] = name
316
+ __args__['namespace'] = namespace
317
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
318
+ __ret__ = pulumi.runtime.invoke_output('vault:identity/getOidcOpenidConfig:getOidcOpenidConfig', __args__, opts=opts, typ=GetOidcOpenidConfigResult)
319
+ return __ret__.apply(lambda __response__: GetOidcOpenidConfigResult(
320
+ authorization_endpoint=pulumi.get(__response__, 'authorization_endpoint'),
321
+ grant_types_supporteds=pulumi.get(__response__, 'grant_types_supporteds'),
322
+ id=pulumi.get(__response__, 'id'),
323
+ id_token_signing_alg_values_supporteds=pulumi.get(__response__, 'id_token_signing_alg_values_supporteds'),
324
+ issuer=pulumi.get(__response__, 'issuer'),
325
+ jwks_uri=pulumi.get(__response__, 'jwks_uri'),
326
+ name=pulumi.get(__response__, 'name'),
327
+ namespace=pulumi.get(__response__, 'namespace'),
328
+ request_uri_parameter_supported=pulumi.get(__response__, 'request_uri_parameter_supported'),
329
+ response_types_supporteds=pulumi.get(__response__, 'response_types_supporteds'),
330
+ scopes_supporteds=pulumi.get(__response__, 'scopes_supporteds'),
331
+ subject_types_supporteds=pulumi.get(__response__, 'subject_types_supporteds'),
332
+ token_endpoint=pulumi.get(__response__, 'token_endpoint'),
333
+ token_endpoint_auth_methods_supporteds=pulumi.get(__response__, 'token_endpoint_auth_methods_supporteds'),
334
+ userinfo_endpoint=pulumi.get(__response__, 'userinfo_endpoint')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -124,9 +129,6 @@ def get_oidc_public_keys(name: Optional[str] = None,
124
129
  keys=pulumi.get(__ret__, 'keys'),
125
130
  name=pulumi.get(__ret__, 'name'),
126
131
  namespace=pulumi.get(__ret__, 'namespace'))
127
-
128
-
129
- @_utilities.lift_output_func(get_oidc_public_keys)
130
132
  def get_oidc_public_keys_output(name: Optional[pulumi.Input[str]] = None,
131
133
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
132
134
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetOidcPublicKeysResult]:
@@ -165,4 +167,13 @@ def get_oidc_public_keys_output(name: Optional[pulumi.Input[str]] = None,
165
167
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
166
168
  *Available only for Vault Enterprise*.
167
169
  """
168
- ...
170
+ __args__ = dict()
171
+ __args__['name'] = name
172
+ __args__['namespace'] = namespace
173
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
174
+ __ret__ = pulumi.runtime.invoke_output('vault:identity/getOidcPublicKeys:getOidcPublicKeys', __args__, opts=opts, typ=GetOidcPublicKeysResult)
175
+ return __ret__.apply(lambda __response__: GetOidcPublicKeysResult(
176
+ id=pulumi.get(__response__, 'id'),
177
+ keys=pulumi.get(__response__, 'keys'),
178
+ name=pulumi.get(__response__, 'name'),
179
+ namespace=pulumi.get(__response__, 'namespace')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['GroupArgs', 'Group']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['GroupAliasArgs', 'GroupAlias']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['GroupMemberEntityIdsArgs', 'GroupMemberEntityIds']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['GroupMemberGroupIdsArgs', 'GroupMemberGroupIds']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['GroupPoliciesArgs', 'GroupPolicies']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['MfaDuoArgs', 'MfaDuo']