pulumi-vault 6.4.0a1728368050__py3-none-any.whl → 6.4.0a1729059229__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +560 -0
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +19 -4
  4. pulumi_vault/ad/secret_backend.py +5 -0
  5. pulumi_vault/ad/secret_library.py +5 -0
  6. pulumi_vault/ad/secret_role.py +5 -0
  7. pulumi_vault/alicloud/auth_backend_role.py +5 -0
  8. pulumi_vault/approle/auth_backend_login.py +5 -0
  9. pulumi_vault/approle/auth_backend_role.py +5 -0
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
  11. pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
  12. pulumi_vault/audit.py +5 -0
  13. pulumi_vault/audit_request_header.py +5 -0
  14. pulumi_vault/auth_backend.py +5 -0
  15. pulumi_vault/aws/auth_backend_cert.py +5 -0
  16. pulumi_vault/aws/auth_backend_client.py +5 -0
  17. pulumi_vault/aws/auth_backend_config_identity.py +5 -0
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
  19. pulumi_vault/aws/auth_backend_login.py +5 -0
  20. pulumi_vault/aws/auth_backend_role.py +5 -0
  21. pulumi_vault/aws/auth_backend_role_tag.py +5 -0
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
  23. pulumi_vault/aws/auth_backend_sts_role.py +5 -0
  24. pulumi_vault/aws/get_access_credentials.py +31 -4
  25. pulumi_vault/aws/get_static_access_credentials.py +18 -4
  26. pulumi_vault/aws/secret_backend.py +5 -0
  27. pulumi_vault/aws/secret_backend_role.py +5 -0
  28. pulumi_vault/aws/secret_backend_static_role.py +5 -0
  29. pulumi_vault/azure/_inputs.py +24 -0
  30. pulumi_vault/azure/auth_backend_config.py +5 -0
  31. pulumi_vault/azure/auth_backend_role.py +5 -0
  32. pulumi_vault/azure/backend.py +5 -0
  33. pulumi_vault/azure/backend_role.py +5 -0
  34. pulumi_vault/azure/get_access_credentials.py +36 -4
  35. pulumi_vault/azure/outputs.py +5 -0
  36. pulumi_vault/cert_auth_backend_role.py +5 -0
  37. pulumi_vault/config/__init__.pyi +5 -0
  38. pulumi_vault/config/_inputs.py +21 -0
  39. pulumi_vault/config/outputs.py +5 -0
  40. pulumi_vault/config/ui_custom_message.py +5 -0
  41. pulumi_vault/config/vars.py +5 -0
  42. pulumi_vault/consul/secret_backend.py +5 -0
  43. pulumi_vault/consul/secret_backend_role.py +5 -0
  44. pulumi_vault/database/_inputs.py +2019 -68
  45. pulumi_vault/database/outputs.py +5 -0
  46. pulumi_vault/database/secret_backend_connection.py +5 -0
  47. pulumi_vault/database/secret_backend_role.py +5 -0
  48. pulumi_vault/database/secret_backend_static_role.py +5 -0
  49. pulumi_vault/database/secrets_mount.py +5 -0
  50. pulumi_vault/egp_policy.py +5 -0
  51. pulumi_vault/gcp/_inputs.py +111 -0
  52. pulumi_vault/gcp/auth_backend.py +5 -0
  53. pulumi_vault/gcp/auth_backend_role.py +5 -0
  54. pulumi_vault/gcp/get_auth_backend_role.py +42 -4
  55. pulumi_vault/gcp/outputs.py +5 -0
  56. pulumi_vault/gcp/secret_backend.py +5 -0
  57. pulumi_vault/gcp/secret_impersonated_account.py +5 -0
  58. pulumi_vault/gcp/secret_roleset.py +5 -0
  59. pulumi_vault/gcp/secret_static_account.py +5 -0
  60. pulumi_vault/generic/endpoint.py +5 -0
  61. pulumi_vault/generic/get_secret.py +24 -4
  62. pulumi_vault/generic/secret.py +5 -0
  63. pulumi_vault/get_auth_backend.py +21 -4
  64. pulumi_vault/get_auth_backends.py +16 -4
  65. pulumi_vault/get_namespace.py +17 -4
  66. pulumi_vault/get_namespaces.py +13 -4
  67. pulumi_vault/get_nomad_access_token.py +18 -4
  68. pulumi_vault/get_policy_document.py +15 -4
  69. pulumi_vault/get_raft_autopilot_state.py +23 -4
  70. pulumi_vault/github/_inputs.py +55 -0
  71. pulumi_vault/github/auth_backend.py +5 -0
  72. pulumi_vault/github/outputs.py +5 -0
  73. pulumi_vault/github/team.py +5 -0
  74. pulumi_vault/github/user.py +5 -0
  75. pulumi_vault/identity/entity.py +5 -0
  76. pulumi_vault/identity/entity_alias.py +5 -0
  77. pulumi_vault/identity/entity_policies.py +5 -0
  78. pulumi_vault/identity/get_entity.py +34 -4
  79. pulumi_vault/identity/get_group.py +40 -4
  80. pulumi_vault/identity/get_oidc_client_creds.py +16 -4
  81. pulumi_vault/identity/get_oidc_openid_config.py +26 -4
  82. pulumi_vault/identity/get_oidc_public_keys.py +15 -4
  83. pulumi_vault/identity/group.py +5 -0
  84. pulumi_vault/identity/group_alias.py +5 -0
  85. pulumi_vault/identity/group_member_entity_ids.py +5 -0
  86. pulumi_vault/identity/group_member_group_ids.py +5 -0
  87. pulumi_vault/identity/group_policies.py +5 -0
  88. pulumi_vault/identity/mfa_duo.py +5 -0
  89. pulumi_vault/identity/mfa_login_enforcement.py +5 -0
  90. pulumi_vault/identity/mfa_okta.py +5 -0
  91. pulumi_vault/identity/mfa_pingid.py +5 -0
  92. pulumi_vault/identity/mfa_totp.py +5 -0
  93. pulumi_vault/identity/oidc.py +5 -0
  94. pulumi_vault/identity/oidc_assignment.py +5 -0
  95. pulumi_vault/identity/oidc_client.py +5 -0
  96. pulumi_vault/identity/oidc_key.py +5 -0
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
  98. pulumi_vault/identity/oidc_provider.py +5 -0
  99. pulumi_vault/identity/oidc_role.py +5 -0
  100. pulumi_vault/identity/oidc_scope.py +5 -0
  101. pulumi_vault/identity/outputs.py +5 -0
  102. pulumi_vault/jwt/_inputs.py +55 -0
  103. pulumi_vault/jwt/auth_backend.py +5 -0
  104. pulumi_vault/jwt/auth_backend_role.py +5 -0
  105. pulumi_vault/jwt/outputs.py +5 -0
  106. pulumi_vault/kmip/secret_backend.py +5 -0
  107. pulumi_vault/kmip/secret_role.py +5 -0
  108. pulumi_vault/kmip/secret_scope.py +5 -0
  109. pulumi_vault/kubernetes/auth_backend_config.py +5 -0
  110. pulumi_vault/kubernetes/auth_backend_role.py +5 -0
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
  113. pulumi_vault/kubernetes/get_service_account_token.py +28 -4
  114. pulumi_vault/kubernetes/secret_backend.py +5 -0
  115. pulumi_vault/kubernetes/secret_backend_role.py +5 -0
  116. pulumi_vault/kv/_inputs.py +32 -0
  117. pulumi_vault/kv/get_secret.py +19 -4
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +23 -4
  119. pulumi_vault/kv/get_secret_v2.py +25 -4
  120. pulumi_vault/kv/get_secrets_list.py +15 -4
  121. pulumi_vault/kv/get_secrets_list_v2.py +18 -4
  122. pulumi_vault/kv/outputs.py +5 -0
  123. pulumi_vault/kv/secret.py +5 -0
  124. pulumi_vault/kv/secret_backend_v2.py +5 -0
  125. pulumi_vault/kv/secret_v2.py +5 -0
  126. pulumi_vault/ldap/auth_backend.py +5 -0
  127. pulumi_vault/ldap/auth_backend_group.py +5 -0
  128. pulumi_vault/ldap/auth_backend_user.py +5 -0
  129. pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
  130. pulumi_vault/ldap/get_static_credentials.py +23 -4
  131. pulumi_vault/ldap/secret_backend.py +5 -0
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
  133. pulumi_vault/ldap/secret_backend_library_set.py +5 -0
  134. pulumi_vault/ldap/secret_backend_static_role.py +5 -0
  135. pulumi_vault/managed/_inputs.py +205 -0
  136. pulumi_vault/managed/keys.py +5 -0
  137. pulumi_vault/managed/outputs.py +5 -0
  138. pulumi_vault/mfa_duo.py +5 -0
  139. pulumi_vault/mfa_okta.py +5 -0
  140. pulumi_vault/mfa_pingid.py +5 -0
  141. pulumi_vault/mfa_totp.py +5 -0
  142. pulumi_vault/mongodbatlas/secret_backend.py +5 -0
  143. pulumi_vault/mongodbatlas/secret_role.py +5 -0
  144. pulumi_vault/mount.py +5 -0
  145. pulumi_vault/namespace.py +5 -0
  146. pulumi_vault/nomad_secret_backend.py +5 -0
  147. pulumi_vault/nomad_secret_role.py +5 -0
  148. pulumi_vault/okta/_inputs.py +39 -0
  149. pulumi_vault/okta/auth_backend.py +5 -0
  150. pulumi_vault/okta/auth_backend_group.py +5 -0
  151. pulumi_vault/okta/auth_backend_user.py +5 -0
  152. pulumi_vault/okta/outputs.py +5 -0
  153. pulumi_vault/outputs.py +5 -0
  154. pulumi_vault/password_policy.py +5 -0
  155. pulumi_vault/pkisecret/_inputs.py +41 -0
  156. pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
  157. pulumi_vault/pkisecret/backend_config_est.py +5 -0
  158. pulumi_vault/pkisecret/get_backend_config_est.py +22 -4
  159. pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
  160. pulumi_vault/pkisecret/get_backend_issuers.py +17 -4
  161. pulumi_vault/pkisecret/get_backend_key.py +19 -4
  162. pulumi_vault/pkisecret/get_backend_keys.py +17 -4
  163. pulumi_vault/pkisecret/outputs.py +5 -0
  164. pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
  172. pulumi_vault/pkisecret/secret_backend_key.py +5 -0
  173. pulumi_vault/pkisecret/secret_backend_role.py +5 -0
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
  176. pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
  177. pulumi_vault/plugin.py +5 -0
  178. pulumi_vault/plugin_pinned_version.py +5 -0
  179. pulumi_vault/policy.py +5 -0
  180. pulumi_vault/provider.py +5 -0
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +5 -0
  183. pulumi_vault/quota_rate_limit.py +5 -0
  184. pulumi_vault/rabbitmq/_inputs.py +61 -0
  185. pulumi_vault/rabbitmq/outputs.py +5 -0
  186. pulumi_vault/rabbitmq/secret_backend.py +5 -0
  187. pulumi_vault/rabbitmq/secret_backend_role.py +5 -0
  188. pulumi_vault/raft_autopilot.py +5 -0
  189. pulumi_vault/raft_snapshot_agent_config.py +5 -0
  190. pulumi_vault/rgp_policy.py +5 -0
  191. pulumi_vault/saml/auth_backend.py +5 -0
  192. pulumi_vault/saml/auth_backend_role.py +5 -0
  193. pulumi_vault/secrets/_inputs.py +30 -0
  194. pulumi_vault/secrets/outputs.py +5 -0
  195. pulumi_vault/secrets/sync_association.py +5 -0
  196. pulumi_vault/secrets/sync_aws_destination.py +5 -0
  197. pulumi_vault/secrets/sync_azure_destination.py +5 -0
  198. pulumi_vault/secrets/sync_config.py +5 -0
  199. pulumi_vault/secrets/sync_gcp_destination.py +5 -0
  200. pulumi_vault/secrets/sync_gh_destination.py +5 -0
  201. pulumi_vault/secrets/sync_github_apps.py +5 -0
  202. pulumi_vault/secrets/sync_vercel_destination.py +5 -0
  203. pulumi_vault/ssh/_inputs.py +22 -0
  204. pulumi_vault/ssh/outputs.py +5 -0
  205. pulumi_vault/ssh/secret_backend_ca.py +5 -0
  206. pulumi_vault/ssh/secret_backend_role.py +5 -0
  207. pulumi_vault/terraformcloud/secret_backend.py +5 -0
  208. pulumi_vault/terraformcloud/secret_creds.py +5 -0
  209. pulumi_vault/terraformcloud/secret_role.py +5 -0
  210. pulumi_vault/token.py +5 -0
  211. pulumi_vault/tokenauth/auth_backend_role.py +5 -0
  212. pulumi_vault/transform/alphabet.py +5 -0
  213. pulumi_vault/transform/get_decode.py +28 -4
  214. pulumi_vault/transform/get_encode.py +28 -4
  215. pulumi_vault/transform/role.py +5 -0
  216. pulumi_vault/transform/template.py +5 -0
  217. pulumi_vault/transform/transformation.py +5 -0
  218. pulumi_vault/transit/get_decrypt.py +21 -4
  219. pulumi_vault/transit/get_encrypt.py +23 -4
  220. pulumi_vault/transit/secret_backend_key.py +5 -0
  221. pulumi_vault/transit/secret_cache_config.py +5 -0
  222. {pulumi_vault-6.4.0a1728368050.dist-info → pulumi_vault-6.4.0a1729059229.dist-info}/METADATA +3 -2
  223. pulumi_vault-6.4.0a1729059229.dist-info/RECORD +256 -0
  224. pulumi_vault-6.4.0a1728368050.dist-info/RECORD +0 -256
  225. {pulumi_vault-6.4.0a1728368050.dist-info → pulumi_vault-6.4.0a1729059229.dist-info}/WHEEL +0 -0
  226. {pulumi_vault-6.4.0a1728368050.dist-info → pulumi_vault-6.4.0a1729059229.dist-info}/top_level.txt +0 -0
@@ -4,17 +4,88 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
13
18
  'KeysAwArgs',
19
+ 'KeysAwArgsDict',
14
20
  'KeysAzureArgs',
21
+ 'KeysAzureArgsDict',
15
22
  'KeysPkcArgs',
23
+ 'KeysPkcArgsDict',
16
24
  ]
17
25
 
26
+ MYPY = False
27
+
28
+ if not MYPY:
29
+ class KeysAwArgsDict(TypedDict):
30
+ access_key: pulumi.Input[str]
31
+ """
32
+ The AWS access key to use
33
+ """
34
+ key_bits: pulumi.Input[str]
35
+ """
36
+ The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
37
+ """
38
+ key_type: pulumi.Input[str]
39
+ """
40
+ The type of key to use
41
+ """
42
+ kms_key: pulumi.Input[str]
43
+ """
44
+ An identifier for the key
45
+ """
46
+ name: pulumi.Input[str]
47
+ """
48
+ A unique lowercase name that serves as identifying the key
49
+ """
50
+ secret_key: pulumi.Input[str]
51
+ """
52
+ The AWS secret key to use
53
+ """
54
+ allow_generate_key: NotRequired[pulumi.Input[bool]]
55
+ """
56
+ If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
57
+ """
58
+ allow_replace_key: NotRequired[pulumi.Input[bool]]
59
+ """
60
+ Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
61
+ """
62
+ allow_store_key: NotRequired[pulumi.Input[bool]]
63
+ """
64
+ Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
65
+ """
66
+ any_mount: NotRequired[pulumi.Input[bool]]
67
+ """
68
+ Allow usage from any mount point within the namespace if 'true'
69
+ """
70
+ curve: NotRequired[pulumi.Input[str]]
71
+ """
72
+ The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
73
+ """
74
+ endpoint: NotRequired[pulumi.Input[str]]
75
+ """
76
+ Used to specify a custom AWS endpoint
77
+ """
78
+ region: NotRequired[pulumi.Input[str]]
79
+ """
80
+ The AWS region where the keys are stored (or will be stored)
81
+ """
82
+ uuid: NotRequired[pulumi.Input[str]]
83
+ """
84
+ ID of the managed key read from Vault
85
+ """
86
+ elif False:
87
+ KeysAwArgsDict: TypeAlias = Mapping[str, Any]
88
+
18
89
  @pulumi.input_type
19
90
  class KeysAwArgs:
20
91
  def __init__(__self__, *,
@@ -240,6 +311,71 @@ class KeysAwArgs:
240
311
  pulumi.set(self, "uuid", value)
241
312
 
242
313
 
314
+ if not MYPY:
315
+ class KeysAzureArgsDict(TypedDict):
316
+ client_id: pulumi.Input[str]
317
+ """
318
+ The client id for credentials to query the Azure APIs
319
+ """
320
+ client_secret: pulumi.Input[str]
321
+ """
322
+ The client secret for credentials to query the Azure APIs
323
+ """
324
+ key_name: pulumi.Input[str]
325
+ """
326
+ The Key Vault key to use for encryption and decryption
327
+ """
328
+ key_type: pulumi.Input[str]
329
+ """
330
+ The type of key to use
331
+ """
332
+ name: pulumi.Input[str]
333
+ """
334
+ A unique lowercase name that serves as identifying the key
335
+ """
336
+ tenant_id: pulumi.Input[str]
337
+ """
338
+ The tenant id for the Azure Active Directory organization
339
+ """
340
+ vault_name: pulumi.Input[str]
341
+ """
342
+ The Key Vault vault to use the encryption keys for encryption and decryption
343
+ """
344
+ allow_generate_key: NotRequired[pulumi.Input[bool]]
345
+ """
346
+ If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
347
+ """
348
+ allow_replace_key: NotRequired[pulumi.Input[bool]]
349
+ """
350
+ Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
351
+ """
352
+ allow_store_key: NotRequired[pulumi.Input[bool]]
353
+ """
354
+ Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
355
+ """
356
+ any_mount: NotRequired[pulumi.Input[bool]]
357
+ """
358
+ Allow usage from any mount point within the namespace if 'true'
359
+ """
360
+ environment: NotRequired[pulumi.Input[str]]
361
+ """
362
+ The Azure Cloud environment API endpoints to use
363
+ """
364
+ key_bits: NotRequired[pulumi.Input[str]]
365
+ """
366
+ The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
367
+ """
368
+ resource: NotRequired[pulumi.Input[str]]
369
+ """
370
+ The Azure Key Vault resource's DNS Suffix to connect to
371
+ """
372
+ uuid: NotRequired[pulumi.Input[str]]
373
+ """
374
+ ID of the managed key read from Vault
375
+ """
376
+ elif False:
377
+ KeysAzureArgsDict: TypeAlias = Mapping[str, Any]
378
+
243
379
  @pulumi.input_type
244
380
  class KeysAzureArgs:
245
381
  def __init__(__self__, *,
@@ -480,6 +616,75 @@ class KeysAzureArgs:
480
616
  pulumi.set(self, "uuid", value)
481
617
 
482
618
 
619
+ if not MYPY:
620
+ class KeysPkcArgsDict(TypedDict):
621
+ key_id: pulumi.Input[str]
622
+ """
623
+ The id of a PKCS#11 key to use
624
+ """
625
+ key_label: pulumi.Input[str]
626
+ """
627
+ The label of the key to use
628
+ """
629
+ library: pulumi.Input[str]
630
+ """
631
+ The name of the kms_library stanza to use from Vault's config to lookup the local library path
632
+ """
633
+ mechanism: pulumi.Input[str]
634
+ """
635
+ The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
636
+ """
637
+ name: pulumi.Input[str]
638
+ """
639
+ A unique lowercase name that serves as identifying the key
640
+ """
641
+ pin: pulumi.Input[str]
642
+ """
643
+ The PIN for login
644
+ """
645
+ allow_generate_key: NotRequired[pulumi.Input[bool]]
646
+ """
647
+ If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
648
+ """
649
+ allow_replace_key: NotRequired[pulumi.Input[bool]]
650
+ """
651
+ Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
652
+ """
653
+ allow_store_key: NotRequired[pulumi.Input[bool]]
654
+ """
655
+ Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
656
+ """
657
+ any_mount: NotRequired[pulumi.Input[bool]]
658
+ """
659
+ Allow usage from any mount point within the namespace if 'true'
660
+ """
661
+ curve: NotRequired[pulumi.Input[str]]
662
+ """
663
+ Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
664
+ """
665
+ force_rw_session: NotRequired[pulumi.Input[str]]
666
+ """
667
+ Force all operations to open up a read-write session to the HSM
668
+ """
669
+ key_bits: NotRequired[pulumi.Input[str]]
670
+ """
671
+ Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
672
+ """
673
+ slot: NotRequired[pulumi.Input[str]]
674
+ """
675
+ The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
676
+ """
677
+ token_label: NotRequired[pulumi.Input[str]]
678
+ """
679
+ The slot token label to use
680
+ """
681
+ uuid: NotRequired[pulumi.Input[str]]
682
+ """
683
+ ID of the managed key read from Vault
684
+ """
685
+ elif False:
686
+ KeysPkcArgsDict: TypeAlias = Mapping[str, Any]
687
+
483
688
  @pulumi.input_type
484
689
  class KeysPkcArgs:
485
690
  def __init__(__self__, *,
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
  from . import outputs
12
17
  from ._inputs import *
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
pulumi_vault/mfa_duo.py CHANGED
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['MfaDuoArgs', 'MfaDuo']
pulumi_vault/mfa_okta.py CHANGED
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['MfaOktaArgs', 'MfaOkta']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['MfaPingidArgs', 'MfaPingid']
pulumi_vault/mfa_totp.py CHANGED
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['MfaTotpArgs', 'MfaTotp']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendArgs', 'SecretBackend']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretRoleArgs', 'SecretRole']
pulumi_vault/mount.py CHANGED
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['MountArgs', 'Mount']
pulumi_vault/namespace.py CHANGED
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['NamespaceArgs', 'Namespace']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['NomadSecretBackendArgs', 'NomadSecretBackend']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['NomadSecretRoleArgs', 'NomadSecretRole']
@@ -4,16 +4,38 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
13
18
  'AuthBackendGroupArgs',
19
+ 'AuthBackendGroupArgsDict',
14
20
  'AuthBackendUserArgs',
21
+ 'AuthBackendUserArgsDict',
15
22
  ]
16
23
 
24
+ MYPY = False
25
+
26
+ if not MYPY:
27
+ class AuthBackendGroupArgsDict(TypedDict):
28
+ group_name: pulumi.Input[str]
29
+ """
30
+ Name of the Okta group
31
+ """
32
+ policies: pulumi.Input[Sequence[pulumi.Input[str]]]
33
+ """
34
+ Policies to associate with this group
35
+ """
36
+ elif False:
37
+ AuthBackendGroupArgsDict: TypeAlias = Mapping[str, Any]
38
+
17
39
  @pulumi.input_type
18
40
  class AuthBackendGroupArgs:
19
41
  def __init__(__self__, *,
@@ -51,6 +73,23 @@ class AuthBackendGroupArgs:
51
73
  pulumi.set(self, "policies", value)
52
74
 
53
75
 
76
+ if not MYPY:
77
+ class AuthBackendUserArgsDict(TypedDict):
78
+ username: pulumi.Input[str]
79
+ """
80
+ Name of the user within Okta
81
+ """
82
+ groups: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
83
+ """
84
+ Groups within the Okta auth backend to associate with this user
85
+ """
86
+ policies: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
87
+ """
88
+ Policies to associate with this user
89
+ """
90
+ elif False:
91
+ AuthBackendUserArgsDict: TypeAlias = Mapping[str, Any]
92
+
54
93
  @pulumi.input_type
55
94
  class AuthBackendUserArgs:
56
95
  def __init__(__self__, *,
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
  from . import outputs
12
17
  from ._inputs import *
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['AuthBackendGroupInitArgs', 'AuthBackendGroup']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['AuthBackendUserInitArgs', 'AuthBackendUser']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
pulumi_vault/outputs.py CHANGED
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
  from . import outputs
12
17
 
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['PasswordPolicyArgs', 'PasswordPolicy']
@@ -4,16 +4,38 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
13
18
  'BackendConfigEstAuthenticatorsArgs',
19
+ 'BackendConfigEstAuthenticatorsArgsDict',
14
20
  'SecretBackendRolePolicyIdentifierArgs',
21
+ 'SecretBackendRolePolicyIdentifierArgsDict',
15
22
  ]
16
23
 
24
+ MYPY = False
25
+
26
+ if not MYPY:
27
+ class BackendConfigEstAuthenticatorsArgsDict(TypedDict):
28
+ cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
29
+ """
30
+ "The accessor (required) and cert_role (optional) properties for cert auth backends".
31
+ """
32
+ userpass: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
33
+ """
34
+ "The accessor (required) property for user pass auth backends".
35
+ """
36
+ elif False:
37
+ BackendConfigEstAuthenticatorsArgsDict: TypeAlias = Mapping[str, Any]
38
+
17
39
  @pulumi.input_type
18
40
  class BackendConfigEstAuthenticatorsArgs:
19
41
  def __init__(__self__, *,
@@ -53,6 +75,25 @@ class BackendConfigEstAuthenticatorsArgs:
53
75
  pulumi.set(self, "userpass", value)
54
76
 
55
77
 
78
+ if not MYPY:
79
+ class SecretBackendRolePolicyIdentifierArgsDict(TypedDict):
80
+ oid: pulumi.Input[str]
81
+ """
82
+ The OID for the policy identifier
83
+ """
84
+ cps: NotRequired[pulumi.Input[str]]
85
+ """
86
+ The URL of the CPS for the policy identifier
87
+
88
+ Example usage:
89
+ """
90
+ notice: NotRequired[pulumi.Input[str]]
91
+ """
92
+ A notice for the policy identifier
93
+ """
94
+ elif False:
95
+ SecretBackendRolePolicyIdentifierArgsDict: TypeAlias = Mapping[str, Any]
96
+
56
97
  @pulumi.input_type
57
98
  class SecretBackendRolePolicyIdentifierArgs:
58
99
  def __init__(__self__, *,
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['BackendConfigClusterArgs', 'BackendConfigCluster']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
  from . import outputs
12
17
  from ._inputs import *