pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +26 -9
  5. pulumi_vault/ad/secret_backend.py +16 -142
  6. pulumi_vault/ad/secret_library.py +16 -9
  7. pulumi_vault/ad/secret_role.py +14 -9
  8. pulumi_vault/alicloud/auth_backend_role.py +76 -190
  9. pulumi_vault/approle/auth_backend_login.py +12 -7
  10. pulumi_vault/approle/auth_backend_role.py +77 -191
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
  13. pulumi_vault/audit.py +30 -21
  14. pulumi_vault/audit_request_header.py +11 -2
  15. pulumi_vault/auth_backend.py +66 -14
  16. pulumi_vault/aws/auth_backend_cert.py +18 -9
  17. pulumi_vault/aws/auth_backend_client.py +267 -22
  18. pulumi_vault/aws/auth_backend_config_identity.py +14 -9
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +77 -191
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
  24. pulumi_vault/aws/auth_backend_sts_role.py +14 -9
  25. pulumi_vault/aws/get_access_credentials.py +38 -9
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +77 -9
  28. pulumi_vault/aws/secret_backend_role.py +185 -9
  29. pulumi_vault/aws/secret_backend_static_role.py +20 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +153 -15
  32. pulumi_vault/azure/auth_backend_role.py +77 -191
  33. pulumi_vault/azure/backend.py +227 -21
  34. pulumi_vault/azure/backend_role.py +42 -37
  35. pulumi_vault/azure/get_access_credentials.py +41 -7
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -267
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +28 -19
  44. pulumi_vault/consul/secret_backend_role.py +18 -78
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +119 -112
  48. pulumi_vault/database/secret_backend_role.py +31 -22
  49. pulumi_vault/database/secret_backend_static_role.py +87 -13
  50. pulumi_vault/database/secrets_mount.py +427 -136
  51. pulumi_vault/egp_policy.py +16 -11
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +250 -33
  54. pulumi_vault/gcp/auth_backend_role.py +77 -269
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -5
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -12
  58. pulumi_vault/gcp/secret_impersonated_account.py +76 -15
  59. pulumi_vault/gcp/secret_roleset.py +31 -24
  60. pulumi_vault/gcp/secret_static_account.py +39 -32
  61. pulumi_vault/generic/endpoint.py +24 -17
  62. pulumi_vault/generic/get_secret.py +64 -8
  63. pulumi_vault/generic/secret.py +21 -16
  64. pulumi_vault/get_auth_backend.py +24 -7
  65. pulumi_vault/get_auth_backends.py +51 -9
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -11
  69. pulumi_vault/get_policy_document.py +34 -19
  70. pulumi_vault/get_raft_autopilot_state.py +29 -10
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +19 -14
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +16 -11
  75. pulumi_vault/github/user.py +16 -11
  76. pulumi_vault/identity/entity.py +20 -13
  77. pulumi_vault/identity/entity_alias.py +20 -13
  78. pulumi_vault/identity/entity_policies.py +28 -11
  79. pulumi_vault/identity/get_entity.py +42 -10
  80. pulumi_vault/identity/get_group.py +47 -9
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -7
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -9
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -10
  84. pulumi_vault/identity/group.py +58 -39
  85. pulumi_vault/identity/group_alias.py +16 -9
  86. pulumi_vault/identity/group_member_entity_ids.py +28 -66
  87. pulumi_vault/identity/group_member_group_ids.py +40 -19
  88. pulumi_vault/identity/group_policies.py +20 -7
  89. pulumi_vault/identity/mfa_duo.py +11 -6
  90. pulumi_vault/identity/mfa_login_enforcement.py +15 -6
  91. pulumi_vault/identity/mfa_okta.py +11 -6
  92. pulumi_vault/identity/mfa_pingid.py +7 -2
  93. pulumi_vault/identity/mfa_totp.py +7 -2
  94. pulumi_vault/identity/oidc.py +12 -7
  95. pulumi_vault/identity/oidc_assignment.py +24 -11
  96. pulumi_vault/identity/oidc_client.py +36 -23
  97. pulumi_vault/identity/oidc_key.py +30 -17
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
  99. pulumi_vault/identity/oidc_provider.py +36 -21
  100. pulumi_vault/identity/oidc_role.py +42 -21
  101. pulumi_vault/identity/oidc_scope.py +20 -13
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +45 -40
  105. pulumi_vault/jwt/auth_backend_role.py +133 -254
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +24 -19
  108. pulumi_vault/kmip/secret_role.py +14 -9
  109. pulumi_vault/kmip/secret_scope.py +14 -9
  110. pulumi_vault/kubernetes/auth_backend_config.py +57 -5
  111. pulumi_vault/kubernetes/auth_backend_role.py +70 -177
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -11
  115. pulumi_vault/kubernetes/secret_backend.py +316 -27
  116. pulumi_vault/kubernetes/secret_backend_role.py +137 -46
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +25 -8
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
  120. pulumi_vault/kv/get_secret_v2.py +85 -9
  121. pulumi_vault/kv/get_secrets_list.py +24 -11
  122. pulumi_vault/kv/get_secrets_list_v2.py +37 -15
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +23 -16
  125. pulumi_vault/kv/secret_backend_v2.py +20 -11
  126. pulumi_vault/kv/secret_v2.py +59 -50
  127. pulumi_vault/ldap/auth_backend.py +127 -166
  128. pulumi_vault/ldap/auth_backend_group.py +14 -9
  129. pulumi_vault/ldap/auth_backend_user.py +14 -9
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +354 -82
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +16 -9
  135. pulumi_vault/ldap/secret_backend_static_role.py +73 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +29 -57
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +18 -11
  140. pulumi_vault/mfa_okta.py +18 -11
  141. pulumi_vault/mfa_pingid.py +18 -11
  142. pulumi_vault/mfa_totp.py +24 -17
  143. pulumi_vault/mongodbatlas/secret_backend.py +20 -15
  144. pulumi_vault/mongodbatlas/secret_role.py +47 -38
  145. pulumi_vault/mount.py +391 -51
  146. pulumi_vault/namespace.py +68 -83
  147. pulumi_vault/nomad_secret_backend.py +18 -13
  148. pulumi_vault/nomad_secret_role.py +14 -9
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +485 -39
  151. pulumi_vault/okta/auth_backend_group.py +14 -9
  152. pulumi_vault/okta/auth_backend_user.py +14 -9
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +20 -13
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -9
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -8
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
  174. pulumi_vault/pkisecret/secret_backend_key.py +14 -9
  175. pulumi_vault/pkisecret/secret_backend_role.py +21 -14
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +14 -9
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +60 -6
  185. pulumi_vault/quota_rate_limit.py +56 -2
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +18 -13
  189. pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
  190. pulumi_vault/raft_autopilot.py +14 -9
  191. pulumi_vault/raft_snapshot_agent_config.py +129 -224
  192. pulumi_vault/rgp_policy.py +14 -9
  193. pulumi_vault/saml/auth_backend.py +22 -17
  194. pulumi_vault/saml/auth_backend_role.py +92 -197
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -71
  199. pulumi_vault/secrets/sync_aws_destination.py +242 -27
  200. pulumi_vault/secrets/sync_azure_destination.py +92 -31
  201. pulumi_vault/secrets/sync_config.py +9 -4
  202. pulumi_vault/secrets/sync_gcp_destination.py +158 -25
  203. pulumi_vault/secrets/sync_gh_destination.py +189 -13
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +74 -13
  206. pulumi_vault/ssh/_inputs.py +28 -28
  207. pulumi_vault/ssh/outputs.py +11 -28
  208. pulumi_vault/ssh/secret_backend_ca.py +108 -9
  209. pulumi_vault/ssh/secret_backend_role.py +85 -118
  210. pulumi_vault/terraformcloud/secret_backend.py +7 -54
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -20
  212. pulumi_vault/terraformcloud/secret_role.py +16 -74
  213. pulumi_vault/token.py +28 -23
  214. pulumi_vault/tokenauth/auth_backend_role.py +78 -199
  215. pulumi_vault/transform/alphabet.py +16 -9
  216. pulumi_vault/transform/get_decode.py +45 -17
  217. pulumi_vault/transform/get_encode.py +45 -17
  218. pulumi_vault/transform/role.py +16 -9
  219. pulumi_vault/transform/template.py +30 -21
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -21
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +27 -93
  224. pulumi_vault/transit/secret_cache_config.py +12 -7
  225. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['EndpointArgs', 'Endpoint']
@@ -46,7 +51,7 @@ class EndpointArgs:
46
51
  many configuration endpoints. Defaults to false.
47
52
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
48
53
  The value should not contain leading or trailing forward slashes.
49
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
54
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
50
55
  *Available only for Vault Enterprise*.
51
56
  :param pulumi.Input[Sequence[pulumi.Input[str]]] write_fields: - (Optional). A list of fields that should be returned
52
57
  in `write_data_json` and `write_data`. If omitted, data returned by
@@ -151,7 +156,7 @@ class EndpointArgs:
151
156
  """
152
157
  The namespace to provision the resource in.
153
158
  The value should not contain leading or trailing forward slashes.
154
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
159
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
155
160
  *Available only for Vault Enterprise*.
156
161
  """
157
162
  return pulumi.get(self, "namespace")
@@ -212,7 +217,7 @@ class _EndpointState:
212
217
  many configuration endpoints. Defaults to false.
213
218
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
214
219
  The value should not contain leading or trailing forward slashes.
215
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
220
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
216
221
  *Available only for Vault Enterprise*.
217
222
  :param pulumi.Input[str] path: The full logical path at which to write the given
218
223
  data. Consult each backend's documentation to see which endpoints
@@ -319,7 +324,7 @@ class _EndpointState:
319
324
  """
320
325
  The namespace to provision the resource in.
321
326
  The value should not contain leading or trailing forward slashes.
322
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
327
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
323
328
  *Available only for Vault Enterprise*.
324
329
  """
325
330
  return pulumi.get(self, "namespace")
@@ -420,8 +425,8 @@ class Endpoint(pulumi.CustomResource):
420
425
  "password": "changeme"
421
426
  }
422
427
  \"\"\",
423
- opts=pulumi.ResourceOptions(depends_on=[userpass]))
424
- u1_token = vault.generic.Endpoint("u1Token",
428
+ opts = pulumi.ResourceOptions(depends_on=[userpass]))
429
+ u1_token = vault.generic.Endpoint("u1_token",
425
430
  path="auth/userpass/login/u1",
426
431
  disable_read=True,
427
432
  disable_delete=True,
@@ -429,8 +434,8 @@ class Endpoint(pulumi.CustomResource):
429
434
  "password": "changeme"
430
435
  }
431
436
  \"\"\",
432
- opts=pulumi.ResourceOptions(depends_on=[u1]))
433
- u1_entity = vault.generic.Endpoint("u1Entity",
437
+ opts = pulumi.ResourceOptions(depends_on=[u1]))
438
+ u1_entity = vault.generic.Endpoint("u1_entity",
434
439
  disable_read=True,
435
440
  disable_delete=True,
436
441
  path="identity/lookup/entity",
@@ -441,9 +446,10 @@ class Endpoint(pulumi.CustomResource):
441
446
  "alias_mount_accessor": vault_auth_backend.userpass.accessor
442
447
  }
443
448
  \"\"\",
444
- opts=pulumi.ResourceOptions(depends_on=[u1_token]))
449
+ opts = pulumi.ResourceOptions(depends_on=[u1_token]))
445
450
  pulumi.export("u1Id", u1_entity.write_data["id"])
446
451
  ```
452
+
447
453
  ## Required Vault Capabilities
448
454
 
449
455
  Use of this resource requires the `create` or `update` capability
@@ -476,7 +482,7 @@ class Endpoint(pulumi.CustomResource):
476
482
  many configuration endpoints. Defaults to false.
477
483
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
478
484
  The value should not contain leading or trailing forward slashes.
479
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
485
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
480
486
  *Available only for Vault Enterprise*.
481
487
  :param pulumi.Input[str] path: The full logical path at which to write the given
482
488
  data. Consult each backend's documentation to see which endpoints
@@ -512,8 +518,8 @@ class Endpoint(pulumi.CustomResource):
512
518
  "password": "changeme"
513
519
  }
514
520
  \"\"\",
515
- opts=pulumi.ResourceOptions(depends_on=[userpass]))
516
- u1_token = vault.generic.Endpoint("u1Token",
521
+ opts = pulumi.ResourceOptions(depends_on=[userpass]))
522
+ u1_token = vault.generic.Endpoint("u1_token",
517
523
  path="auth/userpass/login/u1",
518
524
  disable_read=True,
519
525
  disable_delete=True,
@@ -521,8 +527,8 @@ class Endpoint(pulumi.CustomResource):
521
527
  "password": "changeme"
522
528
  }
523
529
  \"\"\",
524
- opts=pulumi.ResourceOptions(depends_on=[u1]))
525
- u1_entity = vault.generic.Endpoint("u1Entity",
530
+ opts = pulumi.ResourceOptions(depends_on=[u1]))
531
+ u1_entity = vault.generic.Endpoint("u1_entity",
526
532
  disable_read=True,
527
533
  disable_delete=True,
528
534
  path="identity/lookup/entity",
@@ -533,9 +539,10 @@ class Endpoint(pulumi.CustomResource):
533
539
  "alias_mount_accessor": vault_auth_backend.userpass.accessor
534
540
  }
535
541
  \"\"\",
536
- opts=pulumi.ResourceOptions(depends_on=[u1_token]))
542
+ opts = pulumi.ResourceOptions(depends_on=[u1_token]))
537
543
  pulumi.export("u1Id", u1_entity.write_data["id"])
538
544
  ```
545
+
539
546
  ## Required Vault Capabilities
540
547
 
541
548
  Use of this resource requires the `create` or `update` capability
@@ -638,7 +645,7 @@ class Endpoint(pulumi.CustomResource):
638
645
  many configuration endpoints. Defaults to false.
639
646
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
640
647
  The value should not contain leading or trailing forward slashes.
641
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
648
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
642
649
  *Available only for Vault Enterprise*.
643
650
  :param pulumi.Input[str] path: The full logical path at which to write the given
644
651
  data. Consult each backend's documentation to see which endpoints
@@ -725,7 +732,7 @@ class Endpoint(pulumi.CustomResource):
725
732
  """
726
733
  The namespace to provision the resource in.
727
734
  The value should not contain leading or trailing forward slashes.
728
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
735
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
729
736
  *Available only for Vault Enterprise*.
730
737
  """
731
738
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -58,7 +63,7 @@ class GetSecretResult:
58
63
 
59
64
  @property
60
65
  @pulumi.getter
61
- def data(self) -> Mapping[str, Any]:
66
+ def data(self) -> Mapping[str, str]:
62
67
  """
63
68
  A mapping whose keys are the top-level data keys returned from
64
69
  Vault and whose values are the corresponding values. This map can only
@@ -159,6 +164,7 @@ def get_secret(namespace: Optional[str] = None,
159
164
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecretResult:
160
165
  """
161
166
  ## Example Usage
167
+
162
168
  ### Generic secret
163
169
 
164
170
  ```python
@@ -167,6 +173,23 @@ def get_secret(namespace: Optional[str] = None,
167
173
 
168
174
  rundeck_auth = vault.generic.get_secret(path="secret/rundeck_auth")
169
175
  ```
176
+
177
+ ### KV
178
+
179
+ For this example, consider `example` as a path for a KV engine.
180
+
181
+ ```python
182
+ import pulumi
183
+ import pulumi_vault as vault
184
+
185
+
186
+ def not_implemented(msg):
187
+ raise NotImplementedError(msg)
188
+
189
+ example_creds = vault.generic.get_secret(path="example/creds")
190
+ example_template = not_implemented("The template_file data resource is not yet supported.")
191
+ ```
192
+
170
193
  ## Required Vault Capabilities
171
194
 
172
195
  Use of this resource requires the `read` capability on the given path.
@@ -174,7 +197,7 @@ def get_secret(namespace: Optional[str] = None,
174
197
 
175
198
  :param str namespace: The namespace of the target resource.
176
199
  The value should not contain leading or trailing forward slashes.
177
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
200
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
178
201
  *Available only for Vault Enterprise*.
179
202
  :param str path: The full logical path from which to request data.
180
203
  To read data from the "generic" secret backend mounted in Vault by
@@ -208,16 +231,14 @@ def get_secret(namespace: Optional[str] = None,
208
231
  path=pulumi.get(__ret__, 'path'),
209
232
  version=pulumi.get(__ret__, 'version'),
210
233
  with_lease_start_time=pulumi.get(__ret__, 'with_lease_start_time'))
211
-
212
-
213
- @_utilities.lift_output_func(get_secret)
214
234
  def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
215
235
  path: Optional[pulumi.Input[str]] = None,
216
236
  version: Optional[pulumi.Input[Optional[int]]] = None,
217
237
  with_lease_start_time: Optional[pulumi.Input[Optional[bool]]] = None,
218
- opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecretResult]:
238
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretResult]:
219
239
  """
220
240
  ## Example Usage
241
+
221
242
  ### Generic secret
222
243
 
223
244
  ```python
@@ -226,6 +247,23 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
226
247
 
227
248
  rundeck_auth = vault.generic.get_secret(path="secret/rundeck_auth")
228
249
  ```
250
+
251
+ ### KV
252
+
253
+ For this example, consider `example` as a path for a KV engine.
254
+
255
+ ```python
256
+ import pulumi
257
+ import pulumi_vault as vault
258
+
259
+
260
+ def not_implemented(msg):
261
+ raise NotImplementedError(msg)
262
+
263
+ example_creds = vault.generic.get_secret(path="example/creds")
264
+ example_template = not_implemented("The template_file data resource is not yet supported.")
265
+ ```
266
+
229
267
  ## Required Vault Capabilities
230
268
 
231
269
  Use of this resource requires the `read` capability on the given path.
@@ -233,7 +271,7 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
233
271
 
234
272
  :param str namespace: The namespace of the target resource.
235
273
  The value should not contain leading or trailing forward slashes.
236
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
274
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
237
275
  *Available only for Vault Enterprise*.
238
276
  :param str path: The full logical path from which to request data.
239
277
  To read data from the "generic" secret backend mounted in Vault by
@@ -247,4 +285,22 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
247
285
  Note that storing the `lease_start_time` in the TF state will cause a persistent drift
248
286
  on every `pulumi preview` and will require a `pulumi up`.
249
287
  """
250
- ...
288
+ __args__ = dict()
289
+ __args__['namespace'] = namespace
290
+ __args__['path'] = path
291
+ __args__['version'] = version
292
+ __args__['withLeaseStartTime'] = with_lease_start_time
293
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
294
+ __ret__ = pulumi.runtime.invoke_output('vault:generic/getSecret:getSecret', __args__, opts=opts, typ=GetSecretResult)
295
+ return __ret__.apply(lambda __response__: GetSecretResult(
296
+ data=pulumi.get(__response__, 'data'),
297
+ data_json=pulumi.get(__response__, 'data_json'),
298
+ id=pulumi.get(__response__, 'id'),
299
+ lease_duration=pulumi.get(__response__, 'lease_duration'),
300
+ lease_id=pulumi.get(__response__, 'lease_id'),
301
+ lease_renewable=pulumi.get(__response__, 'lease_renewable'),
302
+ lease_start_time=pulumi.get(__response__, 'lease_start_time'),
303
+ namespace=pulumi.get(__response__, 'namespace'),
304
+ path=pulumi.get(__response__, 'path'),
305
+ version=pulumi.get(__response__, 'version'),
306
+ with_lease_start_time=pulumi.get(__response__, 'with_lease_start_time')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretArgs', 'Secret']
@@ -37,7 +42,7 @@ class SecretArgs:
37
42
  break drift detection. Defaults to false.
38
43
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
39
44
  The value should not contain leading or trailing forward slashes.
40
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
45
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
41
46
  *Available only for Vault Enterprise*.
42
47
  """
43
48
  pulumi.set(__self__, "data_json", data_json)
@@ -113,7 +118,7 @@ class SecretArgs:
113
118
  """
114
119
  The namespace to provision the resource in.
115
120
  The value should not contain leading or trailing forward slashes.
116
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
121
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
117
122
  *Available only for Vault Enterprise*.
118
123
  """
119
124
  return pulumi.get(self, "namespace")
@@ -126,7 +131,7 @@ class SecretArgs:
126
131
  @pulumi.input_type
127
132
  class _SecretState:
128
133
  def __init__(__self__, *,
129
- data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
134
+ data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
130
135
  data_json: Optional[pulumi.Input[str]] = None,
131
136
  delete_all_versions: Optional[pulumi.Input[bool]] = None,
132
137
  disable_read: Optional[pulumi.Input[bool]] = None,
@@ -134,7 +139,7 @@ class _SecretState:
134
139
  path: Optional[pulumi.Input[str]] = None):
135
140
  """
136
141
  Input properties used for looking up and filtering Secret resources.
137
- :param pulumi.Input[Mapping[str, Any]] data: A mapping whose keys are the top-level data keys returned from
142
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
138
143
  Vault and whose values are the corresponding values. This map can only
139
144
  represent string data, so any non-string values returned from Vault are
140
145
  serialized as JSON.
@@ -149,7 +154,7 @@ class _SecretState:
149
154
  break drift detection. Defaults to false.
150
155
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
151
156
  The value should not contain leading or trailing forward slashes.
152
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
157
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
153
158
  *Available only for Vault Enterprise*.
154
159
  :param pulumi.Input[str] path: The full logical path at which to write the given data.
155
160
  To write data into the "generic" secret backend mounted in Vault by default,
@@ -172,7 +177,7 @@ class _SecretState:
172
177
 
173
178
  @property
174
179
  @pulumi.getter
175
- def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
180
+ def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
176
181
  """
177
182
  A mapping whose keys are the top-level data keys returned from
178
183
  Vault and whose values are the corresponding values. This map can only
@@ -182,7 +187,7 @@ class _SecretState:
182
187
  return pulumi.get(self, "data")
183
188
 
184
189
  @data.setter
185
- def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
190
+ def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
186
191
  pulumi.set(self, "data", value)
187
192
 
188
193
  @property
@@ -233,7 +238,7 @@ class _SecretState:
233
238
  """
234
239
  The namespace to provision the resource in.
235
240
  The value should not contain leading or trailing forward slashes.
236
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
241
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
237
242
  *Available only for Vault Enterprise*.
238
243
  """
239
244
  return pulumi.get(self, "namespace")
@@ -276,7 +281,7 @@ class Secret(pulumi.CustomResource):
276
281
  Generic secrets can be imported using the `path`, e.g.
277
282
 
278
283
  ```sh
279
- $ pulumi import vault:generic/secret:Secret example secret/foo
284
+ $ pulumi import vault:generic/secret:Secret example secret/foo
280
285
  ```
281
286
 
282
287
  :param str resource_name: The name of the resource.
@@ -292,7 +297,7 @@ class Secret(pulumi.CustomResource):
292
297
  break drift detection. Defaults to false.
293
298
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
294
299
  The value should not contain leading or trailing forward slashes.
295
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
300
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
296
301
  *Available only for Vault Enterprise*.
297
302
  :param pulumi.Input[str] path: The full logical path at which to write the given data.
298
303
  To write data into the "generic" secret backend mounted in Vault by default,
@@ -312,7 +317,7 @@ class Secret(pulumi.CustomResource):
312
317
  Generic secrets can be imported using the `path`, e.g.
313
318
 
314
319
  ```sh
315
- $ pulumi import vault:generic/secret:Secret example secret/foo
320
+ $ pulumi import vault:generic/secret:Secret example secret/foo
316
321
  ```
317
322
 
318
323
  :param str resource_name: The name of the resource.
@@ -366,7 +371,7 @@ class Secret(pulumi.CustomResource):
366
371
  def get(resource_name: str,
367
372
  id: pulumi.Input[str],
368
373
  opts: Optional[pulumi.ResourceOptions] = None,
369
- data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
374
+ data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
370
375
  data_json: Optional[pulumi.Input[str]] = None,
371
376
  delete_all_versions: Optional[pulumi.Input[bool]] = None,
372
377
  disable_read: Optional[pulumi.Input[bool]] = None,
@@ -379,7 +384,7 @@ class Secret(pulumi.CustomResource):
379
384
  :param str resource_name: The unique name of the resulting resource.
380
385
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
381
386
  :param pulumi.ResourceOptions opts: Options for the resource.
382
- :param pulumi.Input[Mapping[str, Any]] data: A mapping whose keys are the top-level data keys returned from
387
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
383
388
  Vault and whose values are the corresponding values. This map can only
384
389
  represent string data, so any non-string values returned from Vault are
385
390
  serialized as JSON.
@@ -394,7 +399,7 @@ class Secret(pulumi.CustomResource):
394
399
  break drift detection. Defaults to false.
395
400
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
396
401
  The value should not contain leading or trailing forward slashes.
397
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
402
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
398
403
  *Available only for Vault Enterprise*.
399
404
  :param pulumi.Input[str] path: The full logical path at which to write the given data.
400
405
  To write data into the "generic" secret backend mounted in Vault by default,
@@ -416,7 +421,7 @@ class Secret(pulumi.CustomResource):
416
421
 
417
422
  @property
418
423
  @pulumi.getter
419
- def data(self) -> pulumi.Output[Mapping[str, Any]]:
424
+ def data(self) -> pulumi.Output[Mapping[str, str]]:
420
425
  """
421
426
  A mapping whose keys are the top-level data keys returned from
422
427
  Vault and whose values are the corresponding values. This map can only
@@ -461,7 +466,7 @@ class Secret(pulumi.CustomResource):
461
466
  """
462
467
  The namespace to provision the resource in.
463
468
  The value should not contain leading or trailing forward slashes.
464
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
469
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
465
470
  *Available only for Vault Enterprise*.
466
471
  """
467
472
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = [
@@ -162,7 +167,7 @@ def get_auth_backend(namespace: Optional[str] = None,
162
167
 
163
168
  :param str namespace: The namespace of the target resource.
164
169
  The value should not contain leading or trailing forward slashes.
165
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
170
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
166
171
  *Available only for Vault Enterprise*.
167
172
  :param str path: The auth backend mount point.
168
173
  """
@@ -183,12 +188,9 @@ def get_auth_backend(namespace: Optional[str] = None,
183
188
  namespace=pulumi.get(__ret__, 'namespace'),
184
189
  path=pulumi.get(__ret__, 'path'),
185
190
  type=pulumi.get(__ret__, 'type'))
186
-
187
-
188
- @_utilities.lift_output_func(get_auth_backend)
189
191
  def get_auth_backend_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
190
192
  path: Optional[pulumi.Input[str]] = None,
191
- opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendResult]:
193
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAuthBackendResult]:
192
194
  """
193
195
  ## Example Usage
194
196
 
@@ -202,8 +204,23 @@ def get_auth_backend_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
202
204
 
203
205
  :param str namespace: The namespace of the target resource.
204
206
  The value should not contain leading or trailing forward slashes.
205
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
207
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
206
208
  *Available only for Vault Enterprise*.
207
209
  :param str path: The auth backend mount point.
208
210
  """
209
- ...
211
+ __args__ = dict()
212
+ __args__['namespace'] = namespace
213
+ __args__['path'] = path
214
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
215
+ __ret__ = pulumi.runtime.invoke_output('vault:index/getAuthBackend:getAuthBackend', __args__, opts=opts, typ=GetAuthBackendResult)
216
+ return __ret__.apply(lambda __response__: GetAuthBackendResult(
217
+ accessor=pulumi.get(__response__, 'accessor'),
218
+ default_lease_ttl_seconds=pulumi.get(__response__, 'default_lease_ttl_seconds'),
219
+ description=pulumi.get(__response__, 'description'),
220
+ id=pulumi.get(__response__, 'id'),
221
+ listing_visibility=pulumi.get(__response__, 'listing_visibility'),
222
+ local=pulumi.get(__response__, 'local'),
223
+ max_lease_ttl_seconds=pulumi.get(__response__, 'max_lease_ttl_seconds'),
224
+ namespace=pulumi.get(__response__, 'namespace'),
225
+ path=pulumi.get(__response__, 'path'),
226
+ type=pulumi.get(__response__, 'type')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = [
@@ -90,11 +95,26 @@ def get_auth_backends(namespace: Optional[str] = None,
90
95
  type: Optional[str] = None,
91
96
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetAuthBackendsResult:
92
97
  """
93
- Use this data source to access information about an existing resource.
98
+ ## Example Usage
99
+
100
+ ```python
101
+ import pulumi
102
+ import pulumi_vault as vault
103
+
104
+ example = vault.get_auth_backends()
105
+ ```
106
+
107
+ ```python
108
+ import pulumi
109
+ import pulumi_vault as vault
110
+
111
+ example_filter = vault.get_auth_backends(type="kubernetes")
112
+ ```
113
+
94
114
 
95
115
  :param str namespace: The namespace of the target resource.
96
116
  The value should not contain leading or trailing forward slashes.
97
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
117
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
98
118
  *Available only for Vault Enterprise*.
99
119
  :param str type: The name of the auth method type. Allows filtering of backends returned by type.
100
120
  """
@@ -110,19 +130,41 @@ def get_auth_backends(namespace: Optional[str] = None,
110
130
  namespace=pulumi.get(__ret__, 'namespace'),
111
131
  paths=pulumi.get(__ret__, 'paths'),
112
132
  type=pulumi.get(__ret__, 'type'))
113
-
114
-
115
- @_utilities.lift_output_func(get_auth_backends)
116
133
  def get_auth_backends_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
117
134
  type: Optional[pulumi.Input[Optional[str]]] = None,
118
- opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendsResult]:
135
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAuthBackendsResult]:
119
136
  """
120
- Use this data source to access information about an existing resource.
137
+ ## Example Usage
138
+
139
+ ```python
140
+ import pulumi
141
+ import pulumi_vault as vault
142
+
143
+ example = vault.get_auth_backends()
144
+ ```
145
+
146
+ ```python
147
+ import pulumi
148
+ import pulumi_vault as vault
149
+
150
+ example_filter = vault.get_auth_backends(type="kubernetes")
151
+ ```
152
+
121
153
 
122
154
  :param str namespace: The namespace of the target resource.
123
155
  The value should not contain leading or trailing forward slashes.
124
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
156
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
125
157
  *Available only for Vault Enterprise*.
126
158
  :param str type: The name of the auth method type. Allows filtering of backends returned by type.
127
159
  """
128
- ...
160
+ __args__ = dict()
161
+ __args__['namespace'] = namespace
162
+ __args__['type'] = type
163
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
164
+ __ret__ = pulumi.runtime.invoke_output('vault:index/getAuthBackends:getAuthBackends', __args__, opts=opts, typ=GetAuthBackendsResult)
165
+ return __ret__.apply(lambda __response__: GetAuthBackendsResult(
166
+ accessors=pulumi.get(__response__, 'accessors'),
167
+ id=pulumi.get(__response__, 'id'),
168
+ namespace=pulumi.get(__response__, 'namespace'),
169
+ paths=pulumi.get(__response__, 'paths'),
170
+ type=pulumi.get(__response__, 'type')))