pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +22 -7
  5. pulumi_vault/ad/secret_backend.py +14 -144
  6. pulumi_vault/ad/secret_library.py +14 -11
  7. pulumi_vault/ad/secret_role.py +12 -11
  8. pulumi_vault/alicloud/auth_backend_role.py +74 -192
  9. pulumi_vault/approle/auth_backend_login.py +12 -11
  10. pulumi_vault/approle/auth_backend_role.py +75 -193
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
  13. pulumi_vault/audit.py +24 -27
  14. pulumi_vault/audit_request_header.py +11 -6
  15. pulumi_vault/auth_backend.py +64 -12
  16. pulumi_vault/aws/auth_backend_cert.py +12 -7
  17. pulumi_vault/aws/auth_backend_client.py +265 -24
  18. pulumi_vault/aws/auth_backend_config_identity.py +12 -11
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +75 -193
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
  24. pulumi_vault/aws/auth_backend_sts_role.py +12 -11
  25. pulumi_vault/aws/get_access_credentials.py +34 -7
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +75 -7
  28. pulumi_vault/aws/secret_backend_role.py +183 -11
  29. pulumi_vault/aws/secret_backend_static_role.py +14 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +151 -17
  32. pulumi_vault/azure/auth_backend_role.py +75 -193
  33. pulumi_vault/azure/backend.py +223 -29
  34. pulumi_vault/azure/backend_role.py +42 -41
  35. pulumi_vault/azure/get_access_credentials.py +39 -11
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -271
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +22 -25
  44. pulumi_vault/consul/secret_backend_role.py +14 -80
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +117 -114
  48. pulumi_vault/database/secret_backend_role.py +29 -24
  49. pulumi_vault/database/secret_backend_static_role.py +85 -15
  50. pulumi_vault/database/secrets_mount.py +425 -138
  51. pulumi_vault/egp_policy.py +16 -15
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +248 -35
  54. pulumi_vault/gcp/auth_backend_role.py +75 -271
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -9
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -16
  58. pulumi_vault/gcp/secret_impersonated_account.py +74 -17
  59. pulumi_vault/gcp/secret_roleset.py +29 -26
  60. pulumi_vault/gcp/secret_static_account.py +37 -34
  61. pulumi_vault/generic/endpoint.py +22 -21
  62. pulumi_vault/generic/get_secret.py +68 -12
  63. pulumi_vault/generic/secret.py +19 -14
  64. pulumi_vault/get_auth_backend.py +24 -11
  65. pulumi_vault/get_auth_backends.py +33 -11
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -15
  69. pulumi_vault/get_policy_document.py +34 -23
  70. pulumi_vault/get_raft_autopilot_state.py +29 -14
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +17 -16
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +14 -13
  75. pulumi_vault/github/user.py +14 -13
  76. pulumi_vault/identity/entity.py +18 -15
  77. pulumi_vault/identity/entity_alias.py +18 -15
  78. pulumi_vault/identity/entity_policies.py +24 -19
  79. pulumi_vault/identity/get_entity.py +40 -14
  80. pulumi_vault/identity/get_group.py +45 -13
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -11
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -13
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -14
  84. pulumi_vault/identity/group.py +50 -49
  85. pulumi_vault/identity/group_alias.py +14 -11
  86. pulumi_vault/identity/group_member_entity_ids.py +24 -74
  87. pulumi_vault/identity/group_member_group_ids.py +36 -27
  88. pulumi_vault/identity/group_policies.py +16 -15
  89. pulumi_vault/identity/mfa_duo.py +9 -8
  90. pulumi_vault/identity/mfa_login_enforcement.py +13 -8
  91. pulumi_vault/identity/mfa_okta.py +9 -8
  92. pulumi_vault/identity/mfa_pingid.py +5 -4
  93. pulumi_vault/identity/mfa_totp.py +5 -4
  94. pulumi_vault/identity/oidc.py +12 -11
  95. pulumi_vault/identity/oidc_assignment.py +22 -13
  96. pulumi_vault/identity/oidc_client.py +34 -25
  97. pulumi_vault/identity/oidc_key.py +28 -19
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
  99. pulumi_vault/identity/oidc_provider.py +34 -23
  100. pulumi_vault/identity/oidc_role.py +40 -27
  101. pulumi_vault/identity/oidc_scope.py +18 -15
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +39 -46
  105. pulumi_vault/jwt/auth_backend_role.py +131 -260
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +22 -21
  108. pulumi_vault/kmip/secret_role.py +12 -11
  109. pulumi_vault/kmip/secret_scope.py +12 -11
  110. pulumi_vault/kubernetes/auth_backend_config.py +55 -7
  111. pulumi_vault/kubernetes/auth_backend_role.py +68 -179
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -15
  115. pulumi_vault/kubernetes/secret_backend.py +314 -29
  116. pulumi_vault/kubernetes/secret_backend_role.py +135 -56
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +23 -12
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
  120. pulumi_vault/kv/get_secret_v2.py +89 -9
  121. pulumi_vault/kv/get_secrets_list.py +22 -15
  122. pulumi_vault/kv/get_secrets_list_v2.py +35 -19
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +19 -18
  125. pulumi_vault/kv/secret_backend_v2.py +12 -11
  126. pulumi_vault/kv/secret_v2.py +55 -52
  127. pulumi_vault/ldap/auth_backend.py +125 -168
  128. pulumi_vault/ldap/auth_backend_group.py +12 -11
  129. pulumi_vault/ldap/auth_backend_user.py +12 -11
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +352 -84
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +14 -11
  135. pulumi_vault/ldap/secret_backend_static_role.py +67 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +27 -43
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +16 -13
  140. pulumi_vault/mfa_okta.py +16 -13
  141. pulumi_vault/mfa_pingid.py +16 -13
  142. pulumi_vault/mfa_totp.py +22 -19
  143. pulumi_vault/mongodbatlas/secret_backend.py +18 -17
  144. pulumi_vault/mongodbatlas/secret_role.py +41 -38
  145. pulumi_vault/mount.py +389 -65
  146. pulumi_vault/namespace.py +26 -21
  147. pulumi_vault/nomad_secret_backend.py +16 -15
  148. pulumi_vault/nomad_secret_role.py +12 -11
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +483 -41
  151. pulumi_vault/okta/auth_backend_group.py +12 -11
  152. pulumi_vault/okta/auth_backend_user.py +12 -11
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +18 -15
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -13
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -12
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
  174. pulumi_vault/pkisecret/secret_backend_key.py +12 -7
  175. pulumi_vault/pkisecret/secret_backend_role.py +19 -16
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +12 -7
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +58 -8
  185. pulumi_vault/quota_rate_limit.py +54 -4
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +16 -15
  189. pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
  190. pulumi_vault/raft_autopilot.py +12 -11
  191. pulumi_vault/raft_snapshot_agent_config.py +121 -311
  192. pulumi_vault/rgp_policy.py +14 -13
  193. pulumi_vault/saml/auth_backend.py +20 -19
  194. pulumi_vault/saml/auth_backend_role.py +90 -199
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -75
  199. pulumi_vault/secrets/sync_aws_destination.py +240 -29
  200. pulumi_vault/secrets/sync_azure_destination.py +90 -33
  201. pulumi_vault/secrets/sync_config.py +7 -6
  202. pulumi_vault/secrets/sync_gcp_destination.py +156 -27
  203. pulumi_vault/secrets/sync_gh_destination.py +187 -15
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +72 -15
  206. pulumi_vault/ssh/_inputs.py +28 -32
  207. pulumi_vault/ssh/outputs.py +11 -32
  208. pulumi_vault/ssh/secret_backend_ca.py +106 -11
  209. pulumi_vault/ssh/secret_backend_role.py +83 -120
  210. pulumi_vault/terraformcloud/secret_backend.py +5 -56
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -24
  212. pulumi_vault/terraformcloud/secret_role.py +14 -76
  213. pulumi_vault/token.py +26 -25
  214. pulumi_vault/tokenauth/auth_backend_role.py +76 -201
  215. pulumi_vault/transform/alphabet.py +16 -13
  216. pulumi_vault/transform/get_decode.py +45 -21
  217. pulumi_vault/transform/get_encode.py +45 -21
  218. pulumi_vault/transform/role.py +16 -13
  219. pulumi_vault/transform/template.py +30 -25
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -25
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +25 -97
  224. pulumi_vault/transit/secret_cache_config.py +12 -11
  225. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,251 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import copy
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+ from . import outputs
17
+
18
+ __all__ = [
19
+ 'GetBackendConfigEstResult',
20
+ 'AwaitableGetBackendConfigEstResult',
21
+ 'get_backend_config_est',
22
+ 'get_backend_config_est_output',
23
+ ]
24
+
25
+ @pulumi.output_type
26
+ class GetBackendConfigEstResult:
27
+ """
28
+ A collection of values returned by getBackendConfigEst.
29
+ """
30
+ def __init__(__self__, audit_fields=None, authenticators=None, backend=None, default_mount=None, default_path_policy=None, enable_sentinel_parsing=None, enabled=None, id=None, label_to_path_policy=None, last_updated=None, namespace=None):
31
+ if audit_fields and not isinstance(audit_fields, list):
32
+ raise TypeError("Expected argument 'audit_fields' to be a list")
33
+ pulumi.set(__self__, "audit_fields", audit_fields)
34
+ if authenticators and not isinstance(authenticators, list):
35
+ raise TypeError("Expected argument 'authenticators' to be a list")
36
+ pulumi.set(__self__, "authenticators", authenticators)
37
+ if backend and not isinstance(backend, str):
38
+ raise TypeError("Expected argument 'backend' to be a str")
39
+ pulumi.set(__self__, "backend", backend)
40
+ if default_mount and not isinstance(default_mount, bool):
41
+ raise TypeError("Expected argument 'default_mount' to be a bool")
42
+ pulumi.set(__self__, "default_mount", default_mount)
43
+ if default_path_policy and not isinstance(default_path_policy, str):
44
+ raise TypeError("Expected argument 'default_path_policy' to be a str")
45
+ pulumi.set(__self__, "default_path_policy", default_path_policy)
46
+ if enable_sentinel_parsing and not isinstance(enable_sentinel_parsing, bool):
47
+ raise TypeError("Expected argument 'enable_sentinel_parsing' to be a bool")
48
+ pulumi.set(__self__, "enable_sentinel_parsing", enable_sentinel_parsing)
49
+ if enabled and not isinstance(enabled, bool):
50
+ raise TypeError("Expected argument 'enabled' to be a bool")
51
+ pulumi.set(__self__, "enabled", enabled)
52
+ if id and not isinstance(id, str):
53
+ raise TypeError("Expected argument 'id' to be a str")
54
+ pulumi.set(__self__, "id", id)
55
+ if label_to_path_policy and not isinstance(label_to_path_policy, dict):
56
+ raise TypeError("Expected argument 'label_to_path_policy' to be a dict")
57
+ pulumi.set(__self__, "label_to_path_policy", label_to_path_policy)
58
+ if last_updated and not isinstance(last_updated, str):
59
+ raise TypeError("Expected argument 'last_updated' to be a str")
60
+ pulumi.set(__self__, "last_updated", last_updated)
61
+ if namespace and not isinstance(namespace, str):
62
+ raise TypeError("Expected argument 'namespace' to be a str")
63
+ pulumi.set(__self__, "namespace", namespace)
64
+
65
+ @property
66
+ @pulumi.getter(name="auditFields")
67
+ def audit_fields(self) -> Sequence[str]:
68
+ """
69
+ Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
70
+ """
71
+ return pulumi.get(self, "audit_fields")
72
+
73
+ @property
74
+ @pulumi.getter
75
+ def authenticators(self) -> Sequence['outputs.GetBackendConfigEstAuthenticatorResult']:
76
+ """
77
+ Lists the mount accessors EST should delegate authentication requests towards (see below for nested schema).
78
+ """
79
+ return pulumi.get(self, "authenticators")
80
+
81
+ @property
82
+ @pulumi.getter
83
+ def backend(self) -> str:
84
+ return pulumi.get(self, "backend")
85
+
86
+ @property
87
+ @pulumi.getter(name="defaultMount")
88
+ def default_mount(self) -> bool:
89
+ """
90
+ If set, this mount is registered as the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster.
91
+ """
92
+ return pulumi.get(self, "default_mount")
93
+
94
+ @property
95
+ @pulumi.getter(name="defaultPathPolicy")
96
+ def default_path_policy(self) -> str:
97
+ """
98
+ Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
99
+ """
100
+ return pulumi.get(self, "default_path_policy")
101
+
102
+ @property
103
+ @pulumi.getter(name="enableSentinelParsing")
104
+ def enable_sentinel_parsing(self) -> bool:
105
+ """
106
+ If set, parse out fields from the provided CSR making them available for Sentinel policies.
107
+ """
108
+ return pulumi.get(self, "enable_sentinel_parsing")
109
+
110
+ @property
111
+ @pulumi.getter
112
+ def enabled(self) -> bool:
113
+ """
114
+ Specifies whether EST is enabled.
115
+ """
116
+ return pulumi.get(self, "enabled")
117
+
118
+ @property
119
+ @pulumi.getter
120
+ def id(self) -> str:
121
+ """
122
+ The provider-assigned unique ID for this managed resource.
123
+ """
124
+ return pulumi.get(self, "id")
125
+
126
+ @property
127
+ @pulumi.getter(name="labelToPathPolicy")
128
+ def label_to_path_policy(self) -> Mapping[str, str]:
129
+ """
130
+ A pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
131
+ """
132
+ return pulumi.get(self, "label_to_path_policy")
133
+
134
+ @property
135
+ @pulumi.getter(name="lastUpdated")
136
+ def last_updated(self) -> str:
137
+ """
138
+ A read-only timestamp representing the last time the configuration was updated.
139
+ """
140
+ return pulumi.get(self, "last_updated")
141
+
142
+ @property
143
+ @pulumi.getter
144
+ def namespace(self) -> Optional[str]:
145
+ return pulumi.get(self, "namespace")
146
+
147
+
148
+ class AwaitableGetBackendConfigEstResult(GetBackendConfigEstResult):
149
+ # pylint: disable=using-constant-test
150
+ def __await__(self):
151
+ if False:
152
+ yield self
153
+ return GetBackendConfigEstResult(
154
+ audit_fields=self.audit_fields,
155
+ authenticators=self.authenticators,
156
+ backend=self.backend,
157
+ default_mount=self.default_mount,
158
+ default_path_policy=self.default_path_policy,
159
+ enable_sentinel_parsing=self.enable_sentinel_parsing,
160
+ enabled=self.enabled,
161
+ id=self.id,
162
+ label_to_path_policy=self.label_to_path_policy,
163
+ last_updated=self.last_updated,
164
+ namespace=self.namespace)
165
+
166
+
167
+ def get_backend_config_est(backend: Optional[str] = None,
168
+ namespace: Optional[str] = None,
169
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendConfigEstResult:
170
+ """
171
+ ## Example Usage
172
+
173
+ ```python
174
+ import pulumi
175
+ import pulumi_vault as vault
176
+
177
+ pki = vault.Mount("pki",
178
+ path="pki",
179
+ type="pki",
180
+ description="PKI secret engine mount")
181
+ est_config = vault.pkiSecret.get_backend_config_est_output(backend=pki.path)
182
+ ```
183
+
184
+
185
+ :param str backend: The path to the PKI secret backend to
186
+ read the EST configuration from, with no leading or trailing `/`s.
187
+ :param str namespace: The namespace of the target resource.
188
+ The value should not contain leading or trailing forward slashes.
189
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
190
+ *Available only for Vault Enterprise*.
191
+ """
192
+ __args__ = dict()
193
+ __args__['backend'] = backend
194
+ __args__['namespace'] = namespace
195
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
196
+ __ret__ = pulumi.runtime.invoke('vault:pkiSecret/getBackendConfigEst:getBackendConfigEst', __args__, opts=opts, typ=GetBackendConfigEstResult).value
197
+
198
+ return AwaitableGetBackendConfigEstResult(
199
+ audit_fields=pulumi.get(__ret__, 'audit_fields'),
200
+ authenticators=pulumi.get(__ret__, 'authenticators'),
201
+ backend=pulumi.get(__ret__, 'backend'),
202
+ default_mount=pulumi.get(__ret__, 'default_mount'),
203
+ default_path_policy=pulumi.get(__ret__, 'default_path_policy'),
204
+ enable_sentinel_parsing=pulumi.get(__ret__, 'enable_sentinel_parsing'),
205
+ enabled=pulumi.get(__ret__, 'enabled'),
206
+ id=pulumi.get(__ret__, 'id'),
207
+ label_to_path_policy=pulumi.get(__ret__, 'label_to_path_policy'),
208
+ last_updated=pulumi.get(__ret__, 'last_updated'),
209
+ namespace=pulumi.get(__ret__, 'namespace'))
210
+ def get_backend_config_est_output(backend: Optional[pulumi.Input[str]] = None,
211
+ namespace: Optional[pulumi.Input[Optional[str]]] = None,
212
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendConfigEstResult]:
213
+ """
214
+ ## Example Usage
215
+
216
+ ```python
217
+ import pulumi
218
+ import pulumi_vault as vault
219
+
220
+ pki = vault.Mount("pki",
221
+ path="pki",
222
+ type="pki",
223
+ description="PKI secret engine mount")
224
+ est_config = vault.pkiSecret.get_backend_config_est_output(backend=pki.path)
225
+ ```
226
+
227
+
228
+ :param str backend: The path to the PKI secret backend to
229
+ read the EST configuration from, with no leading or trailing `/`s.
230
+ :param str namespace: The namespace of the target resource.
231
+ The value should not contain leading or trailing forward slashes.
232
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
233
+ *Available only for Vault Enterprise*.
234
+ """
235
+ __args__ = dict()
236
+ __args__['backend'] = backend
237
+ __args__['namespace'] = namespace
238
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
239
+ __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendConfigEst:getBackendConfigEst', __args__, opts=opts, typ=GetBackendConfigEstResult)
240
+ return __ret__.apply(lambda __response__: GetBackendConfigEstResult(
241
+ audit_fields=pulumi.get(__response__, 'audit_fields'),
242
+ authenticators=pulumi.get(__response__, 'authenticators'),
243
+ backend=pulumi.get(__response__, 'backend'),
244
+ default_mount=pulumi.get(__response__, 'default_mount'),
245
+ default_path_policy=pulumi.get(__response__, 'default_path_policy'),
246
+ enable_sentinel_parsing=pulumi.get(__response__, 'enable_sentinel_parsing'),
247
+ enabled=pulumi.get(__response__, 'enabled'),
248
+ id=pulumi.get(__response__, 'id'),
249
+ label_to_path_policy=pulumi.get(__response__, 'label_to_path_policy'),
250
+ last_updated=pulumi.get(__response__, 'last_updated'),
251
+ namespace=pulumi.get(__response__, 'namespace')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -175,13 +180,31 @@ def get_backend_issuer(backend: Optional[str] = None,
175
180
  """
176
181
  ## Example Usage
177
182
 
183
+ ```python
184
+ import pulumi
185
+ import pulumi_vault as vault
186
+
187
+ pki = vault.Mount("pki",
188
+ path="pki",
189
+ type="pki",
190
+ description="PKI secret engine mount")
191
+ root = vault.pki_secret.SecretBackendRootCert("root",
192
+ backend=pki.path,
193
+ type="internal",
194
+ common_name="example",
195
+ ttl="86400",
196
+ issuer_name="example")
197
+ example = root.issuer_id.apply(lambda issuer_id: vault.pkiSecret.get_backend_issuer_output(backend=root.path,
198
+ issuer_ref=issuer_id))
199
+ ```
200
+
178
201
 
179
202
  :param str backend: The path to the PKI secret backend to
180
203
  read the issuer from, with no leading or trailing `/`s.
181
204
  :param str issuer_ref: Reference to an existing issuer.
182
205
  :param str namespace: The namespace of the target resource.
183
206
  The value should not contain leading or trailing forward slashes.
184
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
207
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
185
208
  *Available only for Vault Enterprise*.
186
209
  """
187
210
  __args__ = dict()
@@ -204,23 +227,56 @@ def get_backend_issuer(backend: Optional[str] = None,
204
227
  manual_chains=pulumi.get(__ret__, 'manual_chains'),
205
228
  namespace=pulumi.get(__ret__, 'namespace'),
206
229
  usage=pulumi.get(__ret__, 'usage'))
207
-
208
-
209
- @_utilities.lift_output_func(get_backend_issuer)
210
230
  def get_backend_issuer_output(backend: Optional[pulumi.Input[str]] = None,
211
231
  issuer_ref: Optional[pulumi.Input[str]] = None,
212
232
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
213
- opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendIssuerResult]:
233
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendIssuerResult]:
214
234
  """
215
235
  ## Example Usage
216
236
 
237
+ ```python
238
+ import pulumi
239
+ import pulumi_vault as vault
240
+
241
+ pki = vault.Mount("pki",
242
+ path="pki",
243
+ type="pki",
244
+ description="PKI secret engine mount")
245
+ root = vault.pki_secret.SecretBackendRootCert("root",
246
+ backend=pki.path,
247
+ type="internal",
248
+ common_name="example",
249
+ ttl="86400",
250
+ issuer_name="example")
251
+ example = root.issuer_id.apply(lambda issuer_id: vault.pkiSecret.get_backend_issuer_output(backend=root.path,
252
+ issuer_ref=issuer_id))
253
+ ```
254
+
217
255
 
218
256
  :param str backend: The path to the PKI secret backend to
219
257
  read the issuer from, with no leading or trailing `/`s.
220
258
  :param str issuer_ref: Reference to an existing issuer.
221
259
  :param str namespace: The namespace of the target resource.
222
260
  The value should not contain leading or trailing forward slashes.
223
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
261
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
224
262
  *Available only for Vault Enterprise*.
225
263
  """
226
- ...
264
+ __args__ = dict()
265
+ __args__['backend'] = backend
266
+ __args__['issuerRef'] = issuer_ref
267
+ __args__['namespace'] = namespace
268
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
269
+ __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendIssuer:getBackendIssuer', __args__, opts=opts, typ=GetBackendIssuerResult)
270
+ return __ret__.apply(lambda __response__: GetBackendIssuerResult(
271
+ backend=pulumi.get(__response__, 'backend'),
272
+ ca_chains=pulumi.get(__response__, 'ca_chains'),
273
+ certificate=pulumi.get(__response__, 'certificate'),
274
+ id=pulumi.get(__response__, 'id'),
275
+ issuer_id=pulumi.get(__response__, 'issuer_id'),
276
+ issuer_name=pulumi.get(__response__, 'issuer_name'),
277
+ issuer_ref=pulumi.get(__response__, 'issuer_ref'),
278
+ key_id=pulumi.get(__response__, 'key_id'),
279
+ leaf_not_after_behavior=pulumi.get(__response__, 'leaf_not_after_behavior'),
280
+ manual_chains=pulumi.get(__response__, 'manual_chains'),
281
+ namespace=pulumi.get(__response__, 'namespace'),
282
+ usage=pulumi.get(__response__, 'usage')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -56,7 +61,7 @@ class GetBackendIssuersResult:
56
61
 
57
62
  @property
58
63
  @pulumi.getter(name="keyInfo")
59
- def key_info(self) -> Mapping[str, Any]:
64
+ def key_info(self) -> Mapping[str, str]:
60
65
  """
61
66
  Map of issuer strings read from Vault.
62
67
  """
@@ -104,7 +109,6 @@ def get_backend_issuers(backend: Optional[str] = None,
104
109
  """
105
110
  ## Example Usage
106
111
 
107
- <!--Start PulumiCodeChooser -->
108
112
  ```python
109
113
  import pulumi
110
114
  import pulumi_vault as vault
@@ -121,14 +125,13 @@ def get_backend_issuers(backend: Optional[str] = None,
121
125
  issuer_name="example")
122
126
  test = vault.pkiSecret.get_backend_issuers_output(backend=root.backend)
123
127
  ```
124
- <!--End PulumiCodeChooser -->
125
128
 
126
129
 
127
130
  :param str backend: The path to the PKI secret backend to
128
131
  read the issuers from, with no leading or trailing `/`s.
129
132
  :param str namespace: The namespace of the target resource.
130
133
  The value should not contain leading or trailing forward slashes.
131
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
134
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
132
135
  *Available only for Vault Enterprise*.
133
136
  """
134
137
  __args__ = dict()
@@ -144,16 +147,12 @@ def get_backend_issuers(backend: Optional[str] = None,
144
147
  key_info_json=pulumi.get(__ret__, 'key_info_json'),
145
148
  keys=pulumi.get(__ret__, 'keys'),
146
149
  namespace=pulumi.get(__ret__, 'namespace'))
147
-
148
-
149
- @_utilities.lift_output_func(get_backend_issuers)
150
150
  def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None,
151
151
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
152
- opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendIssuersResult]:
152
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendIssuersResult]:
153
153
  """
154
154
  ## Example Usage
155
155
 
156
- <!--Start PulumiCodeChooser -->
157
156
  ```python
158
157
  import pulumi
159
158
  import pulumi_vault as vault
@@ -170,14 +169,24 @@ def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None,
170
169
  issuer_name="example")
171
170
  test = vault.pkiSecret.get_backend_issuers_output(backend=root.backend)
172
171
  ```
173
- <!--End PulumiCodeChooser -->
174
172
 
175
173
 
176
174
  :param str backend: The path to the PKI secret backend to
177
175
  read the issuers from, with no leading or trailing `/`s.
178
176
  :param str namespace: The namespace of the target resource.
179
177
  The value should not contain leading or trailing forward slashes.
180
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
178
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
181
179
  *Available only for Vault Enterprise*.
182
180
  """
183
- ...
181
+ __args__ = dict()
182
+ __args__['backend'] = backend
183
+ __args__['namespace'] = namespace
184
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
185
+ __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendIssuers:getBackendIssuers', __args__, opts=opts, typ=GetBackendIssuersResult)
186
+ return __ret__.apply(lambda __response__: GetBackendIssuersResult(
187
+ backend=pulumi.get(__response__, 'backend'),
188
+ id=pulumi.get(__response__, 'id'),
189
+ key_info=pulumi.get(__response__, 'key_info'),
190
+ key_info_json=pulumi.get(__response__, 'key_info_json'),
191
+ keys=pulumi.get(__response__, 'keys'),
192
+ namespace=pulumi.get(__response__, 'namespace')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -114,7 +119,6 @@ def get_backend_key(backend: Optional[str] = None,
114
119
  """
115
120
  ## Example Usage
116
121
 
117
- <!--Start PulumiCodeChooser -->
118
122
  ```python
119
123
  import pulumi
120
124
  import pulumi_vault as vault
@@ -129,10 +133,9 @@ def get_backend_key(backend: Optional[str] = None,
129
133
  key_name="example",
130
134
  key_type="rsa",
131
135
  key_bits=4096)
132
- example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=vault_mount["key"]["path"],
136
+ example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=key_vault_mount["path"],
133
137
  key_ref=key_id))
134
138
  ```
135
- <!--End PulumiCodeChooser -->
136
139
 
137
140
 
138
141
  :param str backend: The path to the PKI secret backend to
@@ -140,7 +143,7 @@ def get_backend_key(backend: Optional[str] = None,
140
143
  :param str key_ref: Reference to an existing key.
141
144
  :param str namespace: The namespace of the target resource.
142
145
  The value should not contain leading or trailing forward slashes.
143
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
146
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
144
147
  *Available only for Vault Enterprise*.
145
148
  """
146
149
  __args__ = dict()
@@ -158,17 +161,13 @@ def get_backend_key(backend: Optional[str] = None,
158
161
  key_ref=pulumi.get(__ret__, 'key_ref'),
159
162
  key_type=pulumi.get(__ret__, 'key_type'),
160
163
  namespace=pulumi.get(__ret__, 'namespace'))
161
-
162
-
163
- @_utilities.lift_output_func(get_backend_key)
164
164
  def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
165
165
  key_ref: Optional[pulumi.Input[str]] = None,
166
166
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
167
- opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendKeyResult]:
167
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendKeyResult]:
168
168
  """
169
169
  ## Example Usage
170
170
 
171
- <!--Start PulumiCodeChooser -->
172
171
  ```python
173
172
  import pulumi
174
173
  import pulumi_vault as vault
@@ -183,10 +182,9 @@ def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
183
182
  key_name="example",
184
183
  key_type="rsa",
185
184
  key_bits=4096)
186
- example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=vault_mount["key"]["path"],
185
+ example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=key_vault_mount["path"],
187
186
  key_ref=key_id))
188
187
  ```
189
- <!--End PulumiCodeChooser -->
190
188
 
191
189
 
192
190
  :param str backend: The path to the PKI secret backend to
@@ -194,7 +192,20 @@ def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
194
192
  :param str key_ref: Reference to an existing key.
195
193
  :param str namespace: The namespace of the target resource.
196
194
  The value should not contain leading or trailing forward slashes.
197
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
195
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
198
196
  *Available only for Vault Enterprise*.
199
197
  """
200
- ...
198
+ __args__ = dict()
199
+ __args__['backend'] = backend
200
+ __args__['keyRef'] = key_ref
201
+ __args__['namespace'] = namespace
202
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
203
+ __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendKey:getBackendKey', __args__, opts=opts, typ=GetBackendKeyResult)
204
+ return __ret__.apply(lambda __response__: GetBackendKeyResult(
205
+ backend=pulumi.get(__response__, 'backend'),
206
+ id=pulumi.get(__response__, 'id'),
207
+ key_id=pulumi.get(__response__, 'key_id'),
208
+ key_name=pulumi.get(__response__, 'key_name'),
209
+ key_ref=pulumi.get(__response__, 'key_ref'),
210
+ key_type=pulumi.get(__response__, 'key_type'),
211
+ namespace=pulumi.get(__response__, 'namespace')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -56,7 +61,7 @@ class GetBackendKeysResult:
56
61
 
57
62
  @property
58
63
  @pulumi.getter(name="keyInfo")
59
- def key_info(self) -> Mapping[str, Any]:
64
+ def key_info(self) -> Mapping[str, str]:
60
65
  """
61
66
  Map of key strings read from Vault.
62
67
  """
@@ -104,7 +109,6 @@ def get_backend_keys(backend: Optional[str] = None,
104
109
  """
105
110
  ## Example Usage
106
111
 
107
- <!--Start PulumiCodeChooser -->
108
112
  ```python
109
113
  import pulumi
110
114
  import pulumi_vault as vault
@@ -121,14 +125,13 @@ def get_backend_keys(backend: Optional[str] = None,
121
125
  key_name="example")
122
126
  example = vault.pkiSecret.get_backend_keys_output(backend=root.backend)
123
127
  ```
124
- <!--End PulumiCodeChooser -->
125
128
 
126
129
 
127
130
  :param str backend: The path to the PKI secret backend to
128
131
  read the keys from, with no leading or trailing `/`s.
129
132
  :param str namespace: The namespace of the target resource.
130
133
  The value should not contain leading or trailing forward slashes.
131
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
134
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
132
135
  *Available only for Vault Enterprise*.
133
136
  """
134
137
  __args__ = dict()
@@ -144,16 +147,12 @@ def get_backend_keys(backend: Optional[str] = None,
144
147
  key_info_json=pulumi.get(__ret__, 'key_info_json'),
145
148
  keys=pulumi.get(__ret__, 'keys'),
146
149
  namespace=pulumi.get(__ret__, 'namespace'))
147
-
148
-
149
- @_utilities.lift_output_func(get_backend_keys)
150
150
  def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None,
151
151
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
152
- opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendKeysResult]:
152
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendKeysResult]:
153
153
  """
154
154
  ## Example Usage
155
155
 
156
- <!--Start PulumiCodeChooser -->
157
156
  ```python
158
157
  import pulumi
159
158
  import pulumi_vault as vault
@@ -170,14 +169,24 @@ def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None,
170
169
  key_name="example")
171
170
  example = vault.pkiSecret.get_backend_keys_output(backend=root.backend)
172
171
  ```
173
- <!--End PulumiCodeChooser -->
174
172
 
175
173
 
176
174
  :param str backend: The path to the PKI secret backend to
177
175
  read the keys from, with no leading or trailing `/`s.
178
176
  :param str namespace: The namespace of the target resource.
179
177
  The value should not contain leading or trailing forward slashes.
180
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
178
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
181
179
  *Available only for Vault Enterprise*.
182
180
  """
183
- ...
181
+ __args__ = dict()
182
+ __args__['backend'] = backend
183
+ __args__['namespace'] = namespace
184
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
185
+ __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendKeys:getBackendKeys', __args__, opts=opts, typ=GetBackendKeysResult)
186
+ return __ret__.apply(lambda __response__: GetBackendKeysResult(
187
+ backend=pulumi.get(__response__, 'backend'),
188
+ id=pulumi.get(__response__, 'id'),
189
+ key_info=pulumi.get(__response__, 'key_info'),
190
+ key_info_json=pulumi.get(__response__, 'key_info_json'),
191
+ keys=pulumi.get(__response__, 'keys'),
192
+ namespace=pulumi.get(__response__, 'namespace')))