pulumi-vault 6.5.0__py3-none-any.whl → 6.5.0a1732603022__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +0 -24
- pulumi_vault/ad/get_access_credentials.py +2 -2
- pulumi_vault/approle/get_auth_backend_role_id.py +2 -2
- pulumi_vault/aws/auth_backend_sts_role.py +0 -47
- pulumi_vault/aws/get_access_credentials.py +2 -2
- pulumi_vault/aws/get_static_access_credentials.py +2 -2
- pulumi_vault/aws/secret_backend.py +0 -141
- pulumi_vault/azure/get_access_credentials.py +2 -2
- pulumi_vault/database/_inputs.py +0 -40
- pulumi_vault/database/outputs.py +0 -28
- pulumi_vault/gcp/get_auth_backend_role.py +2 -2
- pulumi_vault/generic/get_secret.py +2 -2
- pulumi_vault/get_auth_backend.py +2 -2
- pulumi_vault/get_auth_backends.py +2 -2
- pulumi_vault/get_namespace.py +2 -2
- pulumi_vault/get_namespaces.py +2 -2
- pulumi_vault/get_nomad_access_token.py +2 -2
- pulumi_vault/get_policy_document.py +2 -2
- pulumi_vault/get_raft_autopilot_state.py +2 -2
- pulumi_vault/identity/get_entity.py +2 -2
- pulumi_vault/identity/get_group.py +2 -2
- pulumi_vault/identity/get_oidc_client_creds.py +2 -2
- pulumi_vault/identity/get_oidc_openid_config.py +2 -2
- pulumi_vault/identity/get_oidc_public_keys.py +2 -2
- pulumi_vault/kubernetes/get_auth_backend_config.py +2 -2
- pulumi_vault/kubernetes/get_auth_backend_role.py +2 -2
- pulumi_vault/kubernetes/get_service_account_token.py +2 -2
- pulumi_vault/kv/get_secret.py +2 -2
- pulumi_vault/kv/get_secret_subkeys_v2.py +2 -2
- pulumi_vault/kv/get_secret_v2.py +2 -2
- pulumi_vault/kv/get_secrets_list.py +2 -2
- pulumi_vault/kv/get_secrets_list_v2.py +2 -2
- pulumi_vault/ldap/get_dynamic_credentials.py +2 -2
- pulumi_vault/ldap/get_static_credentials.py +2 -2
- pulumi_vault/pkisecret/__init__.py +0 -4
- pulumi_vault/pkisecret/_inputs.py +0 -34
- pulumi_vault/pkisecret/get_backend_config_est.py +2 -2
- pulumi_vault/pkisecret/get_backend_issuer.py +2 -2
- pulumi_vault/pkisecret/get_backend_issuers.py +2 -2
- pulumi_vault/pkisecret/get_backend_key.py +2 -2
- pulumi_vault/pkisecret/get_backend_keys.py +2 -2
- pulumi_vault/pkisecret/outputs.py +0 -40
- pulumi_vault/pkisecret/secret_backend_role.py +0 -47
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/ssh/secret_backend_role.py +0 -27
- pulumi_vault/transform/get_decode.py +2 -2
- pulumi_vault/transform/get_encode.py +2 -2
- pulumi_vault/transit/get_decrypt.py +2 -2
- pulumi_vault/transit/get_encrypt.py +2 -2
- {pulumi_vault-6.5.0.dist-info → pulumi_vault-6.5.0a1732603022.dist-info}/METADATA +4 -4
- {pulumi_vault-6.5.0.dist-info → pulumi_vault-6.5.0a1732603022.dist-info}/RECORD +53 -57
- {pulumi_vault-6.5.0.dist-info → pulumi_vault-6.5.0a1732603022.dist-info}/WHEEL +1 -1
- pulumi_vault/pkisecret/backend_acme_eab.py +0 -549
- pulumi_vault/pkisecret/backend_config_acme.py +0 -642
- pulumi_vault/pkisecret/backend_config_cmpv2.py +0 -525
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +0 -209
- {pulumi_vault-6.5.0.dist-info → pulumi_vault-6.5.0a1732603022.dist-info}/top_level.txt +0 -0
pulumi_vault/database/outputs.py
CHANGED
@@ -1928,8 +1928,6 @@ class SecretBackendConnectionPostgresql(dict):
|
|
1928
1928
|
suggest = "max_idle_connections"
|
1929
1929
|
elif key == "maxOpenConnections":
|
1930
1930
|
suggest = "max_open_connections"
|
1931
|
-
elif key == "passwordAuthentication":
|
1932
|
-
suggest = "password_authentication"
|
1933
1931
|
elif key == "privateKey":
|
1934
1932
|
suggest = "private_key"
|
1935
1933
|
elif key == "selfManaged":
|
@@ -1962,7 +1960,6 @@ class SecretBackendConnectionPostgresql(dict):
|
|
1962
1960
|
max_idle_connections: Optional[int] = None,
|
1963
1961
|
max_open_connections: Optional[int] = None,
|
1964
1962
|
password: Optional[str] = None,
|
1965
|
-
password_authentication: Optional[str] = None,
|
1966
1963
|
private_key: Optional[str] = None,
|
1967
1964
|
self_managed: Optional[bool] = None,
|
1968
1965
|
service_account_json: Optional[str] = None,
|
@@ -1978,7 +1975,6 @@ class SecretBackendConnectionPostgresql(dict):
|
|
1978
1975
|
:param int max_idle_connections: Maximum number of idle connections to the database.
|
1979
1976
|
:param int max_open_connections: Maximum number of open connections to the database.
|
1980
1977
|
:param str password: The root credential password used in the connection URL
|
1981
|
-
:param str password_authentication: When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
|
1982
1978
|
:param str private_key: The secret key used for the x509 client certificate. Must be PEM encoded.
|
1983
1979
|
:param bool self_managed: If set, allows onboarding static roles with a rootless connection configuration.
|
1984
1980
|
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
@@ -2001,8 +1997,6 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2001
1997
|
pulumi.set(__self__, "max_open_connections", max_open_connections)
|
2002
1998
|
if password is not None:
|
2003
1999
|
pulumi.set(__self__, "password", password)
|
2004
|
-
if password_authentication is not None:
|
2005
|
-
pulumi.set(__self__, "password_authentication", password_authentication)
|
2006
2000
|
if private_key is not None:
|
2007
2001
|
pulumi.set(__self__, "private_key", private_key)
|
2008
2002
|
if self_managed is not None:
|
@@ -2074,14 +2068,6 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2074
2068
|
"""
|
2075
2069
|
return pulumi.get(self, "password")
|
2076
2070
|
|
2077
|
-
@property
|
2078
|
-
@pulumi.getter(name="passwordAuthentication")
|
2079
|
-
def password_authentication(self) -> Optional[str]:
|
2080
|
-
"""
|
2081
|
-
When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
|
2082
|
-
"""
|
2083
|
-
return pulumi.get(self, "password_authentication")
|
2084
|
-
|
2085
2071
|
@property
|
2086
2072
|
@pulumi.getter(name="privateKey")
|
2087
2073
|
def private_key(self) -> Optional[str]:
|
@@ -5554,8 +5540,6 @@ class SecretsMountPostgresql(dict):
|
|
5554
5540
|
suggest = "max_idle_connections"
|
5555
5541
|
elif key == "maxOpenConnections":
|
5556
5542
|
suggest = "max_open_connections"
|
5557
|
-
elif key == "passwordAuthentication":
|
5558
|
-
suggest = "password_authentication"
|
5559
5543
|
elif key == "pluginName":
|
5560
5544
|
suggest = "plugin_name"
|
5561
5545
|
elif key == "privateKey":
|
@@ -5597,7 +5581,6 @@ class SecretsMountPostgresql(dict):
|
|
5597
5581
|
max_idle_connections: Optional[int] = None,
|
5598
5582
|
max_open_connections: Optional[int] = None,
|
5599
5583
|
password: Optional[str] = None,
|
5600
|
-
password_authentication: Optional[str] = None,
|
5601
5584
|
plugin_name: Optional[str] = None,
|
5602
5585
|
private_key: Optional[str] = None,
|
5603
5586
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
@@ -5622,7 +5605,6 @@ class SecretsMountPostgresql(dict):
|
|
5622
5605
|
:param int max_idle_connections: Maximum number of idle connections to the database.
|
5623
5606
|
:param int max_open_connections: Maximum number of open connections to the database.
|
5624
5607
|
:param str password: The root credential password used in the connection URL
|
5625
|
-
:param str password_authentication: When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
|
5626
5608
|
:param str plugin_name: Specifies the name of the plugin to use.
|
5627
5609
|
:param str private_key: The secret key used for the x509 client certificate. Must be PEM encoded.
|
5628
5610
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
@@ -5654,8 +5636,6 @@ class SecretsMountPostgresql(dict):
|
|
5654
5636
|
pulumi.set(__self__, "max_open_connections", max_open_connections)
|
5655
5637
|
if password is not None:
|
5656
5638
|
pulumi.set(__self__, "password", password)
|
5657
|
-
if password_authentication is not None:
|
5658
|
-
pulumi.set(__self__, "password_authentication", password_authentication)
|
5659
5639
|
if plugin_name is not None:
|
5660
5640
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
5661
5641
|
if private_key is not None:
|
@@ -5760,14 +5740,6 @@ class SecretsMountPostgresql(dict):
|
|
5760
5740
|
"""
|
5761
5741
|
return pulumi.get(self, "password")
|
5762
5742
|
|
5763
|
-
@property
|
5764
|
-
@pulumi.getter(name="passwordAuthentication")
|
5765
|
-
def password_authentication(self) -> Optional[str]:
|
5766
|
-
"""
|
5767
|
-
When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
|
5768
|
-
"""
|
5769
|
-
return pulumi.get(self, "password_authentication")
|
5770
|
-
|
5771
5743
|
@property
|
5772
5744
|
@pulumi.getter(name="pluginName")
|
5773
5745
|
def plugin_name(self) -> Optional[str]:
|
@@ -410,7 +410,7 @@ def get_auth_backend_role_output(backend: Optional[pulumi.Input[Optional[str]]]
|
|
410
410
|
token_policies: Optional[pulumi.Input[Optional[Sequence[str]]]] = None,
|
411
411
|
token_ttl: Optional[pulumi.Input[Optional[int]]] = None,
|
412
412
|
token_type: Optional[pulumi.Input[Optional[str]]] = None,
|
413
|
-
opts: Optional[
|
413
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendRoleResult]:
|
414
414
|
"""
|
415
415
|
Reads a GCP auth role from a Vault server.
|
416
416
|
|
@@ -473,7 +473,7 @@ def get_auth_backend_role_output(backend: Optional[pulumi.Input[Optional[str]]]
|
|
473
473
|
__args__['tokenPolicies'] = token_policies
|
474
474
|
__args__['tokenTtl'] = token_ttl
|
475
475
|
__args__['tokenType'] = token_type
|
476
|
-
opts = pulumi.
|
476
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
477
477
|
__ret__ = pulumi.runtime.invoke_output('vault:gcp/getAuthBackendRole:getAuthBackendRole', __args__, opts=opts, typ=GetAuthBackendRoleResult)
|
478
478
|
return __ret__.apply(lambda __response__: GetAuthBackendRoleResult(
|
479
479
|
backend=pulumi.get(__response__, 'backend'),
|
@@ -235,7 +235,7 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
|
235
235
|
path: Optional[pulumi.Input[str]] = None,
|
236
236
|
version: Optional[pulumi.Input[Optional[int]]] = None,
|
237
237
|
with_lease_start_time: Optional[pulumi.Input[Optional[bool]]] = None,
|
238
|
-
opts: Optional[
|
238
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecretResult]:
|
239
239
|
"""
|
240
240
|
## Example Usage
|
241
241
|
|
@@ -290,7 +290,7 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
|
290
290
|
__args__['path'] = path
|
291
291
|
__args__['version'] = version
|
292
292
|
__args__['withLeaseStartTime'] = with_lease_start_time
|
293
|
-
opts = pulumi.
|
293
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
294
294
|
__ret__ = pulumi.runtime.invoke_output('vault:generic/getSecret:getSecret', __args__, opts=opts, typ=GetSecretResult)
|
295
295
|
return __ret__.apply(lambda __response__: GetSecretResult(
|
296
296
|
data=pulumi.get(__response__, 'data'),
|
pulumi_vault/get_auth_backend.py
CHANGED
@@ -190,7 +190,7 @@ def get_auth_backend(namespace: Optional[str] = None,
|
|
190
190
|
type=pulumi.get(__ret__, 'type'))
|
191
191
|
def get_auth_backend_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
192
192
|
path: Optional[pulumi.Input[str]] = None,
|
193
|
-
opts: Optional[
|
193
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendResult]:
|
194
194
|
"""
|
195
195
|
## Example Usage
|
196
196
|
|
@@ -211,7 +211,7 @@ def get_auth_backend_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
|
|
211
211
|
__args__ = dict()
|
212
212
|
__args__['namespace'] = namespace
|
213
213
|
__args__['path'] = path
|
214
|
-
opts = pulumi.
|
214
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
215
215
|
__ret__ = pulumi.runtime.invoke_output('vault:index/getAuthBackend:getAuthBackend', __args__, opts=opts, typ=GetAuthBackendResult)
|
216
216
|
return __ret__.apply(lambda __response__: GetAuthBackendResult(
|
217
217
|
accessor=pulumi.get(__response__, 'accessor'),
|
@@ -132,7 +132,7 @@ def get_auth_backends(namespace: Optional[str] = None,
|
|
132
132
|
type=pulumi.get(__ret__, 'type'))
|
133
133
|
def get_auth_backends_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
134
134
|
type: Optional[pulumi.Input[Optional[str]]] = None,
|
135
|
-
opts: Optional[
|
135
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendsResult]:
|
136
136
|
"""
|
137
137
|
## Example Usage
|
138
138
|
|
@@ -160,7 +160,7 @@ def get_auth_backends_output(namespace: Optional[pulumi.Input[Optional[str]]] =
|
|
160
160
|
__args__ = dict()
|
161
161
|
__args__['namespace'] = namespace
|
162
162
|
__args__['type'] = type
|
163
|
-
opts = pulumi.
|
163
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
164
164
|
__ret__ = pulumi.runtime.invoke_output('vault:index/getAuthBackends:getAuthBackends', __args__, opts=opts, typ=GetAuthBackendsResult)
|
165
165
|
return __ret__.apply(lambda __response__: GetAuthBackendsResult(
|
166
166
|
accessors=pulumi.get(__response__, 'accessors'),
|
pulumi_vault/get_namespace.py
CHANGED
@@ -168,7 +168,7 @@ def get_namespace(namespace: Optional[str] = None,
|
|
168
168
|
path_fq=pulumi.get(__ret__, 'path_fq'))
|
169
169
|
def get_namespace_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
170
170
|
path: Optional[pulumi.Input[Optional[str]]] = None,
|
171
|
-
opts: Optional[
|
171
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNamespaceResult]:
|
172
172
|
"""
|
173
173
|
## Example Usage
|
174
174
|
|
@@ -215,7 +215,7 @@ def get_namespace_output(namespace: Optional[pulumi.Input[Optional[str]]] = None
|
|
215
215
|
__args__ = dict()
|
216
216
|
__args__['namespace'] = namespace
|
217
217
|
__args__['path'] = path
|
218
|
-
opts = pulumi.
|
218
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
219
219
|
__ret__ = pulumi.runtime.invoke_output('vault:index/getNamespace:getNamespace', __args__, opts=opts, typ=GetNamespaceResult)
|
220
220
|
return __ret__.apply(lambda __response__: GetNamespaceResult(
|
221
221
|
custom_metadata=pulumi.get(__response__, 'custom_metadata'),
|
pulumi_vault/get_namespaces.py
CHANGED
@@ -112,7 +112,7 @@ def get_namespaces(namespace: Optional[str] = None,
|
|
112
112
|
namespace=pulumi.get(__ret__, 'namespace'),
|
113
113
|
paths=pulumi.get(__ret__, 'paths'))
|
114
114
|
def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
115
|
-
opts: Optional[
|
115
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNamespacesResult]:
|
116
116
|
"""
|
117
117
|
## Example Usage
|
118
118
|
|
@@ -145,7 +145,7 @@ def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[str]]] = Non
|
|
145
145
|
"""
|
146
146
|
__args__ = dict()
|
147
147
|
__args__['namespace'] = namespace
|
148
|
-
opts = pulumi.
|
148
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
149
149
|
__ret__ = pulumi.runtime.invoke_output('vault:index/getNamespaces:getNamespaces', __args__, opts=opts, typ=GetNamespacesResult)
|
150
150
|
return __ret__.apply(lambda __response__: GetNamespacesResult(
|
151
151
|
id=pulumi.get(__response__, 'id'),
|
@@ -158,7 +158,7 @@ def get_nomad_access_token(backend: Optional[str] = None,
|
|
158
158
|
def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
|
159
159
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
160
160
|
role: Optional[pulumi.Input[str]] = None,
|
161
|
-
opts: Optional[
|
161
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNomadAccessTokenResult]:
|
162
162
|
"""
|
163
163
|
## Example Usage
|
164
164
|
|
@@ -199,7 +199,7 @@ def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
|
|
199
199
|
__args__['backend'] = backend
|
200
200
|
__args__['namespace'] = namespace
|
201
201
|
__args__['role'] = role
|
202
|
-
opts = pulumi.
|
202
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
203
203
|
__ret__ = pulumi.runtime.invoke_output('vault:index/getNomadAccessToken:getNomadAccessToken', __args__, opts=opts, typ=GetNomadAccessTokenResult)
|
204
204
|
return __ret__.apply(lambda __response__: GetNomadAccessTokenResult(
|
205
205
|
accessor_id=pulumi.get(__response__, 'accessor_id'),
|
@@ -122,7 +122,7 @@ def get_policy_document(namespace: Optional[str] = None,
|
|
122
122
|
rules=pulumi.get(__ret__, 'rules'))
|
123
123
|
def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
124
124
|
rules: Optional[pulumi.Input[Optional[Sequence[Union['GetPolicyDocumentRuleArgs', 'GetPolicyDocumentRuleArgsDict']]]]] = None,
|
125
|
-
opts: Optional[
|
125
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetPolicyDocumentResult]:
|
126
126
|
"""
|
127
127
|
This is a data source which can be used to construct a HCL representation of an Vault policy document, for use with resources which expect policy documents, such as the `Policy` resource.
|
128
128
|
|
@@ -151,7 +151,7 @@ def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]]
|
|
151
151
|
__args__ = dict()
|
152
152
|
__args__['namespace'] = namespace
|
153
153
|
__args__['rules'] = rules
|
154
|
-
opts = pulumi.
|
154
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
155
155
|
__ret__ = pulumi.runtime.invoke_output('vault:index/getPolicyDocument:getPolicyDocument', __args__, opts=opts, typ=GetPolicyDocumentResult)
|
156
156
|
return __ret__.apply(lambda __response__: GetPolicyDocumentResult(
|
157
157
|
hcl=pulumi.get(__response__, 'hcl'),
|
@@ -229,7 +229,7 @@ def get_raft_autopilot_state(namespace: Optional[str] = None,
|
|
229
229
|
upgrade_info_json=pulumi.get(__ret__, 'upgrade_info_json'),
|
230
230
|
voters=pulumi.get(__ret__, 'voters'))
|
231
231
|
def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
232
|
-
opts: Optional[
|
232
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetRaftAutopilotStateResult]:
|
233
233
|
"""
|
234
234
|
## Example Usage
|
235
235
|
|
@@ -249,7 +249,7 @@ def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[st
|
|
249
249
|
"""
|
250
250
|
__args__ = dict()
|
251
251
|
__args__['namespace'] = namespace
|
252
|
-
opts = pulumi.
|
252
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
253
253
|
__ret__ = pulumi.runtime.invoke_output('vault:index/getRaftAutopilotState:getRaftAutopilotState', __args__, opts=opts, typ=GetRaftAutopilotStateResult)
|
254
254
|
return __ret__.apply(lambda __response__: GetRaftAutopilotStateResult(
|
255
255
|
failure_tolerance=pulumi.get(__response__, 'failure_tolerance'),
|
@@ -322,7 +322,7 @@ def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
|
|
322
322
|
entity_id: Optional[pulumi.Input[Optional[str]]] = None,
|
323
323
|
entity_name: Optional[pulumi.Input[Optional[str]]] = None,
|
324
324
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
325
|
-
opts: Optional[
|
325
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetEntityResult]:
|
326
326
|
"""
|
327
327
|
## Example Usage
|
328
328
|
|
@@ -360,7 +360,7 @@ def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
|
|
360
360
|
__args__['entityId'] = entity_id
|
361
361
|
__args__['entityName'] = entity_name
|
362
362
|
__args__['namespace'] = namespace
|
363
|
-
opts = pulumi.
|
363
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
364
364
|
__ret__ = pulumi.runtime.invoke_output('vault:identity/getEntity:getEntity', __args__, opts=opts, typ=GetEntityResult)
|
365
365
|
return __ret__.apply(lambda __response__: GetEntityResult(
|
366
366
|
alias_id=pulumi.get(__response__, 'alias_id'),
|
@@ -399,7 +399,7 @@ def get_group_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
|
|
399
399
|
group_id: Optional[pulumi.Input[Optional[str]]] = None,
|
400
400
|
group_name: Optional[pulumi.Input[Optional[str]]] = None,
|
401
401
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
402
|
-
opts: Optional[
|
402
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetGroupResult]:
|
403
403
|
"""
|
404
404
|
## Example Usage
|
405
405
|
|
@@ -437,7 +437,7 @@ def get_group_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
|
|
437
437
|
__args__['groupId'] = group_id
|
438
438
|
__args__['groupName'] = group_name
|
439
439
|
__args__['namespace'] = namespace
|
440
|
-
opts = pulumi.
|
440
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
441
441
|
__ret__ = pulumi.runtime.invoke_output('vault:identity/getGroup:getGroup', __args__, opts=opts, typ=GetGroupResult)
|
442
442
|
return __ret__.apply(lambda __response__: GetGroupResult(
|
443
443
|
alias_canonical_id=pulumi.get(__response__, 'alias_canonical_id'),
|
@@ -135,7 +135,7 @@ def get_oidc_client_creds(name: Optional[str] = None,
|
|
135
135
|
namespace=pulumi.get(__ret__, 'namespace'))
|
136
136
|
def get_oidc_client_creds_output(name: Optional[pulumi.Input[str]] = None,
|
137
137
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
138
|
-
opts: Optional[
|
138
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetOidcClientCredsResult]:
|
139
139
|
"""
|
140
140
|
## Example Usage
|
141
141
|
|
@@ -165,7 +165,7 @@ def get_oidc_client_creds_output(name: Optional[pulumi.Input[str]] = None,
|
|
165
165
|
__args__ = dict()
|
166
166
|
__args__['name'] = name
|
167
167
|
__args__['namespace'] = namespace
|
168
|
-
opts = pulumi.
|
168
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
169
169
|
__ret__ = pulumi.runtime.invoke_output('vault:identity/getOidcClientCreds:getOidcClientCreds', __args__, opts=opts, typ=GetOidcClientCredsResult)
|
170
170
|
return __ret__.apply(lambda __response__: GetOidcClientCredsResult(
|
171
171
|
client_id=pulumi.get(__response__, 'client_id'),
|
@@ -275,7 +275,7 @@ def get_oidc_openid_config(name: Optional[str] = None,
|
|
275
275
|
userinfo_endpoint=pulumi.get(__ret__, 'userinfo_endpoint'))
|
276
276
|
def get_oidc_openid_config_output(name: Optional[pulumi.Input[str]] = None,
|
277
277
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
278
|
-
opts: Optional[
|
278
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetOidcOpenidConfigResult]:
|
279
279
|
"""
|
280
280
|
## Example Usage
|
281
281
|
|
@@ -314,7 +314,7 @@ def get_oidc_openid_config_output(name: Optional[pulumi.Input[str]] = None,
|
|
314
314
|
__args__ = dict()
|
315
315
|
__args__['name'] = name
|
316
316
|
__args__['namespace'] = namespace
|
317
|
-
opts = pulumi.
|
317
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
318
318
|
__ret__ = pulumi.runtime.invoke_output('vault:identity/getOidcOpenidConfig:getOidcOpenidConfig', __args__, opts=opts, typ=GetOidcOpenidConfigResult)
|
319
319
|
return __ret__.apply(lambda __response__: GetOidcOpenidConfigResult(
|
320
320
|
authorization_endpoint=pulumi.get(__response__, 'authorization_endpoint'),
|
@@ -131,7 +131,7 @@ def get_oidc_public_keys(name: Optional[str] = None,
|
|
131
131
|
namespace=pulumi.get(__ret__, 'namespace'))
|
132
132
|
def get_oidc_public_keys_output(name: Optional[pulumi.Input[str]] = None,
|
133
133
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
134
|
-
opts: Optional[
|
134
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetOidcPublicKeysResult]:
|
135
135
|
"""
|
136
136
|
## Example Usage
|
137
137
|
|
@@ -170,7 +170,7 @@ def get_oidc_public_keys_output(name: Optional[pulumi.Input[str]] = None,
|
|
170
170
|
__args__ = dict()
|
171
171
|
__args__['name'] = name
|
172
172
|
__args__['namespace'] = namespace
|
173
|
-
opts = pulumi.
|
173
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
174
174
|
__ret__ = pulumi.runtime.invoke_output('vault:identity/getOidcPublicKeys:getOidcPublicKeys', __args__, opts=opts, typ=GetOidcPublicKeysResult)
|
175
175
|
return __ret__.apply(lambda __response__: GetOidcPublicKeysResult(
|
176
176
|
id=pulumi.get(__response__, 'id'),
|
@@ -214,7 +214,7 @@ def get_auth_backend_config_output(backend: Optional[pulumi.Input[Optional[str]]
|
|
214
214
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
215
215
|
pem_keys: Optional[pulumi.Input[Optional[Sequence[str]]]] = None,
|
216
216
|
use_annotations_as_alias_metadata: Optional[pulumi.Input[Optional[bool]]] = None,
|
217
|
-
opts: Optional[
|
217
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendConfigResult]:
|
218
218
|
"""
|
219
219
|
Reads the Role of an Kubernetes from a Vault server. See the [Vault
|
220
220
|
documentation](https://www.vaultproject.io/api-docs/auth/kubernetes#read-config) for more
|
@@ -245,7 +245,7 @@ def get_auth_backend_config_output(backend: Optional[pulumi.Input[Optional[str]]
|
|
245
245
|
__args__['namespace'] = namespace
|
246
246
|
__args__['pemKeys'] = pem_keys
|
247
247
|
__args__['useAnnotationsAsAliasMetadata'] = use_annotations_as_alias_metadata
|
248
|
-
opts = pulumi.
|
248
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
249
249
|
__ret__ = pulumi.runtime.invoke_output('vault:kubernetes/getAuthBackendConfig:getAuthBackendConfig', __args__, opts=opts, typ=GetAuthBackendConfigResult)
|
250
250
|
return __ret__.apply(lambda __response__: GetAuthBackendConfigResult(
|
251
251
|
backend=pulumi.get(__response__, 'backend'),
|
@@ -354,7 +354,7 @@ def get_auth_backend_role_output(audience: Optional[pulumi.Input[Optional[str]]]
|
|
354
354
|
token_policies: Optional[pulumi.Input[Optional[Sequence[str]]]] = None,
|
355
355
|
token_ttl: Optional[pulumi.Input[Optional[int]]] = None,
|
356
356
|
token_type: Optional[pulumi.Input[Optional[str]]] = None,
|
357
|
-
opts: Optional[
|
357
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendRoleResult]:
|
358
358
|
"""
|
359
359
|
Reads the Role of an Kubernetes from a Vault server. See the [Vault
|
360
360
|
documentation](https://www.vaultproject.io/api-docs/auth/kubernetes#read-role) for more
|
@@ -411,7 +411,7 @@ def get_auth_backend_role_output(audience: Optional[pulumi.Input[Optional[str]]]
|
|
411
411
|
__args__['tokenPolicies'] = token_policies
|
412
412
|
__args__['tokenTtl'] = token_ttl
|
413
413
|
__args__['tokenType'] = token_type
|
414
|
-
opts = pulumi.
|
414
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
415
415
|
__ret__ = pulumi.runtime.invoke_output('vault:kubernetes/getAuthBackendRole:getAuthBackendRole', __args__, opts=opts, typ=GetAuthBackendRoleResult)
|
416
416
|
return __ret__.apply(lambda __response__: GetAuthBackendRoleResult(
|
417
417
|
alias_name_source=pulumi.get(__response__, 'alias_name_source'),
|
@@ -265,7 +265,7 @@ def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None
|
|
265
265
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
266
266
|
role: Optional[pulumi.Input[str]] = None,
|
267
267
|
ttl: Optional[pulumi.Input[Optional[str]]] = None,
|
268
|
-
opts: Optional[
|
268
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetServiceAccountTokenResult]:
|
269
269
|
"""
|
270
270
|
## Example Usage
|
271
271
|
|
@@ -326,7 +326,7 @@ def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None
|
|
326
326
|
__args__['namespace'] = namespace
|
327
327
|
__args__['role'] = role
|
328
328
|
__args__['ttl'] = ttl
|
329
|
-
opts = pulumi.
|
329
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
330
330
|
__ret__ = pulumi.runtime.invoke_output('vault:kubernetes/getServiceAccountToken:getServiceAccountToken', __args__, opts=opts, typ=GetServiceAccountTokenResult)
|
331
331
|
return __ret__.apply(lambda __response__: GetServiceAccountTokenResult(
|
332
332
|
backend=pulumi.get(__response__, 'backend'),
|
pulumi_vault/kv/get_secret.py
CHANGED
@@ -188,7 +188,7 @@ def get_secret(namespace: Optional[str] = None,
|
|
188
188
|
path=pulumi.get(__ret__, 'path'))
|
189
189
|
def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
190
190
|
path: Optional[pulumi.Input[str]] = None,
|
191
|
-
opts: Optional[
|
191
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecretResult]:
|
192
192
|
"""
|
193
193
|
## Example Usage
|
194
194
|
|
@@ -227,7 +227,7 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
|
227
227
|
__args__ = dict()
|
228
228
|
__args__['namespace'] = namespace
|
229
229
|
__args__['path'] = path
|
230
|
-
opts = pulumi.
|
230
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
231
231
|
__ret__ = pulumi.runtime.invoke_output('vault:kv/getSecret:getSecret', __args__, opts=opts, typ=GetSecretResult)
|
232
232
|
return __ret__.apply(lambda __response__: GetSecretResult(
|
233
233
|
data=pulumi.get(__response__, 'data'),
|
@@ -207,7 +207,7 @@ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] =
|
|
207
207
|
name: Optional[pulumi.Input[str]] = None,
|
208
208
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
209
209
|
version: Optional[pulumi.Input[Optional[int]]] = None,
|
210
|
-
opts: Optional[
|
210
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecretSubkeysV2Result]:
|
211
211
|
"""
|
212
212
|
## Example Usage
|
213
213
|
|
@@ -261,7 +261,7 @@ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] =
|
|
261
261
|
__args__['name'] = name
|
262
262
|
__args__['namespace'] = namespace
|
263
263
|
__args__['version'] = version
|
264
|
-
opts = pulumi.
|
264
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
265
265
|
__ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretSubkeysV2:getSecretSubkeysV2', __args__, opts=opts, typ=GetSecretSubkeysV2Result)
|
266
266
|
return __ret__.apply(lambda __response__: GetSecretSubkeysV2Result(
|
267
267
|
data=pulumi.get(__response__, 'data'),
|
pulumi_vault/kv/get_secret_v2.py
CHANGED
@@ -249,7 +249,7 @@ def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
|
249
249
|
name: Optional[pulumi.Input[str]] = None,
|
250
250
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
251
251
|
version: Optional[pulumi.Input[Optional[int]]] = None,
|
252
|
-
opts: Optional[
|
252
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecretV2Result]:
|
253
253
|
"""
|
254
254
|
## Example Usage
|
255
255
|
|
@@ -298,7 +298,7 @@ def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
|
298
298
|
__args__['name'] = name
|
299
299
|
__args__['namespace'] = namespace
|
300
300
|
__args__['version'] = version
|
301
|
-
opts = pulumi.
|
301
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
302
302
|
__ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretV2:getSecretV2', __args__, opts=opts, typ=GetSecretV2Result)
|
303
303
|
return __ret__.apply(lambda __response__: GetSecretV2Result(
|
304
304
|
created_time=pulumi.get(__response__, 'created_time'),
|
@@ -134,7 +134,7 @@ def get_secrets_list(namespace: Optional[str] = None,
|
|
134
134
|
path=pulumi.get(__ret__, 'path'))
|
135
135
|
def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
136
136
|
path: Optional[pulumi.Input[str]] = None,
|
137
|
-
opts: Optional[
|
137
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecretsListResult]:
|
138
138
|
"""
|
139
139
|
## Example Usage
|
140
140
|
|
@@ -177,7 +177,7 @@ def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
|
|
177
177
|
__args__ = dict()
|
178
178
|
__args__['namespace'] = namespace
|
179
179
|
__args__['path'] = path
|
180
|
-
opts = pulumi.
|
180
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
181
181
|
__ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretsList:getSecretsList', __args__, opts=opts, typ=GetSecretsListResult)
|
182
182
|
return __ret__.apply(lambda __response__: GetSecretsListResult(
|
183
183
|
id=pulumi.get(__response__, 'id'),
|
@@ -174,7 +174,7 @@ def get_secrets_list_v2(mount: Optional[str] = None,
|
|
174
174
|
def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
175
175
|
name: Optional[pulumi.Input[Optional[str]]] = None,
|
176
176
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
177
|
-
opts: Optional[
|
177
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecretsListV2Result]:
|
178
178
|
"""
|
179
179
|
## Example Usage
|
180
180
|
|
@@ -232,7 +232,7 @@ def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
|
232
232
|
__args__['mount'] = mount
|
233
233
|
__args__['name'] = name
|
234
234
|
__args__['namespace'] = namespace
|
235
|
-
opts = pulumi.
|
235
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
236
236
|
__ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretsListV2:getSecretsListV2', __args__, opts=opts, typ=GetSecretsListV2Result)
|
237
237
|
return __ret__.apply(lambda __response__: GetSecretsListV2Result(
|
238
238
|
id=pulumi.get(__response__, 'id'),
|
@@ -158,7 +158,7 @@ def get_dynamic_credentials(mount: Optional[str] = None,
|
|
158
158
|
def get_dynamic_credentials_output(mount: Optional[pulumi.Input[str]] = None,
|
159
159
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
160
160
|
role_name: Optional[pulumi.Input[str]] = None,
|
161
|
-
opts: Optional[
|
161
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetDynamicCredentialsResult]:
|
162
162
|
"""
|
163
163
|
Use this data source to access information about an existing resource.
|
164
164
|
"""
|
@@ -166,7 +166,7 @@ def get_dynamic_credentials_output(mount: Optional[pulumi.Input[str]] = None,
|
|
166
166
|
__args__['mount'] = mount
|
167
167
|
__args__['namespace'] = namespace
|
168
168
|
__args__['roleName'] = role_name
|
169
|
-
opts = pulumi.
|
169
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
170
170
|
__ret__ = pulumi.runtime.invoke_output('vault:ldap/getDynamicCredentials:getDynamicCredentials', __args__, opts=opts, typ=GetDynamicCredentialsResult)
|
171
171
|
return __ret__.apply(lambda __response__: GetDynamicCredentialsResult(
|
172
172
|
distinguished_names=pulumi.get(__response__, 'distinguished_names'),
|
@@ -168,7 +168,7 @@ def get_static_credentials(mount: Optional[str] = None,
|
|
168
168
|
def get_static_credentials_output(mount: Optional[pulumi.Input[str]] = None,
|
169
169
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
170
170
|
role_name: Optional[pulumi.Input[str]] = None,
|
171
|
-
opts: Optional[
|
171
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetStaticCredentialsResult]:
|
172
172
|
"""
|
173
173
|
Use this data source to access information about an existing resource.
|
174
174
|
"""
|
@@ -176,7 +176,7 @@ def get_static_credentials_output(mount: Optional[pulumi.Input[str]] = None,
|
|
176
176
|
__args__['mount'] = mount
|
177
177
|
__args__['namespace'] = namespace
|
178
178
|
__args__['roleName'] = role_name
|
179
|
-
opts = pulumi.
|
179
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
180
180
|
__ret__ = pulumi.runtime.invoke_output('vault:ldap/getStaticCredentials:getStaticCredentials', __args__, opts=opts, typ=GetStaticCredentialsResult)
|
181
181
|
return __ret__.apply(lambda __response__: GetStaticCredentialsResult(
|
182
182
|
dn=pulumi.get(__response__, 'dn'),
|
@@ -5,12 +5,8 @@
|
|
5
5
|
from .. import _utilities
|
6
6
|
import typing
|
7
7
|
# Export this package's modules as members:
|
8
|
-
from .backend_acme_eab import *
|
9
|
-
from .backend_config_acme import *
|
10
8
|
from .backend_config_cluster import *
|
11
|
-
from .backend_config_cmpv2 import *
|
12
9
|
from .backend_config_est import *
|
13
|
-
from .get_backend_config_cmpv2 import *
|
14
10
|
from .get_backend_config_est import *
|
15
11
|
from .get_backend_issuer import *
|
16
12
|
from .get_backend_issuers import *
|
@@ -15,8 +15,6 @@ else:
|
|
15
15
|
from .. import _utilities
|
16
16
|
|
17
17
|
__all__ = [
|
18
|
-
'BackendConfigCmpv2AuthenticatorsArgs',
|
19
|
-
'BackendConfigCmpv2AuthenticatorsArgsDict',
|
20
18
|
'BackendConfigEstAuthenticatorsArgs',
|
21
19
|
'BackendConfigEstAuthenticatorsArgsDict',
|
22
20
|
'SecretBackendRolePolicyIdentifierArgs',
|
@@ -25,38 +23,6 @@ __all__ = [
|
|
25
23
|
|
26
24
|
MYPY = False
|
27
25
|
|
28
|
-
if not MYPY:
|
29
|
-
class BackendConfigCmpv2AuthenticatorsArgsDict(TypedDict):
|
30
|
-
cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
31
|
-
"""
|
32
|
-
"The accessor (required) and cert_role (optional) properties for cert auth backends".
|
33
|
-
"""
|
34
|
-
elif False:
|
35
|
-
BackendConfigCmpv2AuthenticatorsArgsDict: TypeAlias = Mapping[str, Any]
|
36
|
-
|
37
|
-
@pulumi.input_type
|
38
|
-
class BackendConfigCmpv2AuthenticatorsArgs:
|
39
|
-
def __init__(__self__, *,
|
40
|
-
cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None):
|
41
|
-
"""
|
42
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
|
43
|
-
"""
|
44
|
-
if cert is not None:
|
45
|
-
pulumi.set(__self__, "cert", cert)
|
46
|
-
|
47
|
-
@property
|
48
|
-
@pulumi.getter
|
49
|
-
def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
50
|
-
"""
|
51
|
-
"The accessor (required) and cert_role (optional) properties for cert auth backends".
|
52
|
-
"""
|
53
|
-
return pulumi.get(self, "cert")
|
54
|
-
|
55
|
-
@cert.setter
|
56
|
-
def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
57
|
-
pulumi.set(self, "cert", value)
|
58
|
-
|
59
|
-
|
60
26
|
if not MYPY:
|
61
27
|
class BackendConfigEstAuthenticatorsArgsDict(TypedDict):
|
62
28
|
cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|