pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736850018__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +22 -7
  5. pulumi_vault/ad/secret_backend.py +14 -144
  6. pulumi_vault/ad/secret_library.py +14 -11
  7. pulumi_vault/ad/secret_role.py +12 -11
  8. pulumi_vault/alicloud/auth_backend_role.py +74 -192
  9. pulumi_vault/approle/auth_backend_login.py +12 -11
  10. pulumi_vault/approle/auth_backend_role.py +75 -193
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
  13. pulumi_vault/audit.py +24 -27
  14. pulumi_vault/audit_request_header.py +11 -6
  15. pulumi_vault/auth_backend.py +64 -12
  16. pulumi_vault/aws/auth_backend_cert.py +12 -7
  17. pulumi_vault/aws/auth_backend_client.py +265 -24
  18. pulumi_vault/aws/auth_backend_config_identity.py +12 -11
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +75 -193
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
  24. pulumi_vault/aws/auth_backend_sts_role.py +12 -11
  25. pulumi_vault/aws/get_access_credentials.py +34 -7
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +75 -7
  28. pulumi_vault/aws/secret_backend_role.py +183 -11
  29. pulumi_vault/aws/secret_backend_static_role.py +14 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +151 -17
  32. pulumi_vault/azure/auth_backend_role.py +75 -193
  33. pulumi_vault/azure/backend.py +223 -29
  34. pulumi_vault/azure/backend_role.py +42 -41
  35. pulumi_vault/azure/get_access_credentials.py +39 -11
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -271
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +22 -25
  44. pulumi_vault/consul/secret_backend_role.py +14 -80
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +117 -114
  48. pulumi_vault/database/secret_backend_role.py +29 -24
  49. pulumi_vault/database/secret_backend_static_role.py +85 -15
  50. pulumi_vault/database/secrets_mount.py +425 -138
  51. pulumi_vault/egp_policy.py +16 -15
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +248 -35
  54. pulumi_vault/gcp/auth_backend_role.py +75 -271
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -9
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -16
  58. pulumi_vault/gcp/secret_impersonated_account.py +74 -17
  59. pulumi_vault/gcp/secret_roleset.py +29 -26
  60. pulumi_vault/gcp/secret_static_account.py +37 -34
  61. pulumi_vault/generic/endpoint.py +22 -21
  62. pulumi_vault/generic/get_secret.py +68 -12
  63. pulumi_vault/generic/secret.py +19 -14
  64. pulumi_vault/get_auth_backend.py +24 -11
  65. pulumi_vault/get_auth_backends.py +33 -11
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -15
  69. pulumi_vault/get_policy_document.py +34 -23
  70. pulumi_vault/get_raft_autopilot_state.py +29 -14
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +17 -16
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +14 -13
  75. pulumi_vault/github/user.py +14 -13
  76. pulumi_vault/identity/entity.py +18 -15
  77. pulumi_vault/identity/entity_alias.py +18 -15
  78. pulumi_vault/identity/entity_policies.py +24 -19
  79. pulumi_vault/identity/get_entity.py +40 -14
  80. pulumi_vault/identity/get_group.py +45 -13
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -11
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -13
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -14
  84. pulumi_vault/identity/group.py +50 -49
  85. pulumi_vault/identity/group_alias.py +14 -11
  86. pulumi_vault/identity/group_member_entity_ids.py +24 -74
  87. pulumi_vault/identity/group_member_group_ids.py +36 -27
  88. pulumi_vault/identity/group_policies.py +16 -15
  89. pulumi_vault/identity/mfa_duo.py +9 -8
  90. pulumi_vault/identity/mfa_login_enforcement.py +13 -8
  91. pulumi_vault/identity/mfa_okta.py +9 -8
  92. pulumi_vault/identity/mfa_pingid.py +5 -4
  93. pulumi_vault/identity/mfa_totp.py +5 -4
  94. pulumi_vault/identity/oidc.py +12 -11
  95. pulumi_vault/identity/oidc_assignment.py +22 -13
  96. pulumi_vault/identity/oidc_client.py +34 -25
  97. pulumi_vault/identity/oidc_key.py +28 -19
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
  99. pulumi_vault/identity/oidc_provider.py +34 -23
  100. pulumi_vault/identity/oidc_role.py +40 -27
  101. pulumi_vault/identity/oidc_scope.py +18 -15
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +39 -46
  105. pulumi_vault/jwt/auth_backend_role.py +131 -260
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +22 -21
  108. pulumi_vault/kmip/secret_role.py +12 -11
  109. pulumi_vault/kmip/secret_scope.py +12 -11
  110. pulumi_vault/kubernetes/auth_backend_config.py +55 -7
  111. pulumi_vault/kubernetes/auth_backend_role.py +68 -179
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -15
  115. pulumi_vault/kubernetes/secret_backend.py +314 -29
  116. pulumi_vault/kubernetes/secret_backend_role.py +135 -56
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +23 -12
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
  120. pulumi_vault/kv/get_secret_v2.py +89 -9
  121. pulumi_vault/kv/get_secrets_list.py +22 -15
  122. pulumi_vault/kv/get_secrets_list_v2.py +35 -19
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +19 -18
  125. pulumi_vault/kv/secret_backend_v2.py +12 -11
  126. pulumi_vault/kv/secret_v2.py +55 -52
  127. pulumi_vault/ldap/auth_backend.py +125 -168
  128. pulumi_vault/ldap/auth_backend_group.py +12 -11
  129. pulumi_vault/ldap/auth_backend_user.py +12 -11
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +352 -84
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +14 -11
  135. pulumi_vault/ldap/secret_backend_static_role.py +67 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +27 -43
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +16 -13
  140. pulumi_vault/mfa_okta.py +16 -13
  141. pulumi_vault/mfa_pingid.py +16 -13
  142. pulumi_vault/mfa_totp.py +22 -19
  143. pulumi_vault/mongodbatlas/secret_backend.py +18 -17
  144. pulumi_vault/mongodbatlas/secret_role.py +41 -38
  145. pulumi_vault/mount.py +389 -65
  146. pulumi_vault/namespace.py +26 -21
  147. pulumi_vault/nomad_secret_backend.py +16 -15
  148. pulumi_vault/nomad_secret_role.py +12 -11
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +483 -41
  151. pulumi_vault/okta/auth_backend_group.py +12 -11
  152. pulumi_vault/okta/auth_backend_user.py +12 -11
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +18 -15
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -13
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -12
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
  174. pulumi_vault/pkisecret/secret_backend_key.py +12 -7
  175. pulumi_vault/pkisecret/secret_backend_role.py +19 -16
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +12 -7
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +58 -8
  185. pulumi_vault/quota_rate_limit.py +54 -4
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +16 -15
  189. pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
  190. pulumi_vault/raft_autopilot.py +12 -11
  191. pulumi_vault/raft_snapshot_agent_config.py +121 -311
  192. pulumi_vault/rgp_policy.py +14 -13
  193. pulumi_vault/saml/auth_backend.py +20 -19
  194. pulumi_vault/saml/auth_backend_role.py +90 -199
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -75
  199. pulumi_vault/secrets/sync_aws_destination.py +240 -29
  200. pulumi_vault/secrets/sync_azure_destination.py +90 -33
  201. pulumi_vault/secrets/sync_config.py +7 -6
  202. pulumi_vault/secrets/sync_gcp_destination.py +156 -27
  203. pulumi_vault/secrets/sync_gh_destination.py +187 -15
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +72 -15
  206. pulumi_vault/ssh/_inputs.py +28 -32
  207. pulumi_vault/ssh/outputs.py +11 -32
  208. pulumi_vault/ssh/secret_backend_ca.py +106 -11
  209. pulumi_vault/ssh/secret_backend_role.py +83 -120
  210. pulumi_vault/terraformcloud/secret_backend.py +5 -56
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -24
  212. pulumi_vault/terraformcloud/secret_role.py +14 -76
  213. pulumi_vault/token.py +26 -25
  214. pulumi_vault/tokenauth/auth_backend_role.py +76 -201
  215. pulumi_vault/transform/alphabet.py +16 -13
  216. pulumi_vault/transform/get_decode.py +45 -21
  217. pulumi_vault/transform/get_encode.py +45 -21
  218. pulumi_vault/transform/role.py +16 -13
  219. pulumi_vault/transform/template.py +30 -25
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -25
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +25 -97
  224. pulumi_vault/transit/secret_cache_config.py +12 -11
  225. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736850018.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['EndpointArgs', 'Endpoint']
@@ -46,7 +51,7 @@ class EndpointArgs:
46
51
  many configuration endpoints. Defaults to false.
47
52
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
48
53
  The value should not contain leading or trailing forward slashes.
49
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
54
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
50
55
  *Available only for Vault Enterprise*.
51
56
  :param pulumi.Input[Sequence[pulumi.Input[str]]] write_fields: - (Optional). A list of fields that should be returned
52
57
  in `write_data_json` and `write_data`. If omitted, data returned by
@@ -151,7 +156,7 @@ class EndpointArgs:
151
156
  """
152
157
  The namespace to provision the resource in.
153
158
  The value should not contain leading or trailing forward slashes.
154
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
159
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
155
160
  *Available only for Vault Enterprise*.
156
161
  """
157
162
  return pulumi.get(self, "namespace")
@@ -212,7 +217,7 @@ class _EndpointState:
212
217
  many configuration endpoints. Defaults to false.
213
218
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
214
219
  The value should not contain leading or trailing forward slashes.
215
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
220
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
216
221
  *Available only for Vault Enterprise*.
217
222
  :param pulumi.Input[str] path: The full logical path at which to write the given
218
223
  data. Consult each backend's documentation to see which endpoints
@@ -319,7 +324,7 @@ class _EndpointState:
319
324
  """
320
325
  The namespace to provision the resource in.
321
326
  The value should not contain leading or trailing forward slashes.
322
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
327
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
323
328
  *Available only for Vault Enterprise*.
324
329
  """
325
330
  return pulumi.get(self, "namespace")
@@ -407,7 +412,6 @@ class Endpoint(pulumi.CustomResource):
407
412
  """
408
413
  ## Example Usage
409
414
 
410
- <!--Start PulumiCodeChooser -->
411
415
  ```python
412
416
  import pulumi
413
417
  import pulumi_vault as vault
@@ -421,8 +425,8 @@ class Endpoint(pulumi.CustomResource):
421
425
  "password": "changeme"
422
426
  }
423
427
  \"\"\",
424
- opts=pulumi.ResourceOptions(depends_on=[userpass]))
425
- u1_token = vault.generic.Endpoint("u1Token",
428
+ opts = pulumi.ResourceOptions(depends_on=[userpass]))
429
+ u1_token = vault.generic.Endpoint("u1_token",
426
430
  path="auth/userpass/login/u1",
427
431
  disable_read=True,
428
432
  disable_delete=True,
@@ -430,8 +434,8 @@ class Endpoint(pulumi.CustomResource):
430
434
  "password": "changeme"
431
435
  }
432
436
  \"\"\",
433
- opts=pulumi.ResourceOptions(depends_on=[u1]))
434
- u1_entity = vault.generic.Endpoint("u1Entity",
437
+ opts = pulumi.ResourceOptions(depends_on=[u1]))
438
+ u1_entity = vault.generic.Endpoint("u1_entity",
435
439
  disable_read=True,
436
440
  disable_delete=True,
437
441
  path="identity/lookup/entity",
@@ -442,10 +446,9 @@ class Endpoint(pulumi.CustomResource):
442
446
  "alias_mount_accessor": vault_auth_backend.userpass.accessor
443
447
  }
444
448
  \"\"\",
445
- opts=pulumi.ResourceOptions(depends_on=[u1_token]))
449
+ opts = pulumi.ResourceOptions(depends_on=[u1_token]))
446
450
  pulumi.export("u1Id", u1_entity.write_data["id"])
447
451
  ```
448
- <!--End PulumiCodeChooser -->
449
452
 
450
453
  ## Required Vault Capabilities
451
454
 
@@ -479,7 +482,7 @@ class Endpoint(pulumi.CustomResource):
479
482
  many configuration endpoints. Defaults to false.
480
483
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
481
484
  The value should not contain leading or trailing forward slashes.
482
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
485
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
483
486
  *Available only for Vault Enterprise*.
484
487
  :param pulumi.Input[str] path: The full logical path at which to write the given
485
488
  data. Consult each backend's documentation to see which endpoints
@@ -502,7 +505,6 @@ class Endpoint(pulumi.CustomResource):
502
505
  """
503
506
  ## Example Usage
504
507
 
505
- <!--Start PulumiCodeChooser -->
506
508
  ```python
507
509
  import pulumi
508
510
  import pulumi_vault as vault
@@ -516,8 +518,8 @@ class Endpoint(pulumi.CustomResource):
516
518
  "password": "changeme"
517
519
  }
518
520
  \"\"\",
519
- opts=pulumi.ResourceOptions(depends_on=[userpass]))
520
- u1_token = vault.generic.Endpoint("u1Token",
521
+ opts = pulumi.ResourceOptions(depends_on=[userpass]))
522
+ u1_token = vault.generic.Endpoint("u1_token",
521
523
  path="auth/userpass/login/u1",
522
524
  disable_read=True,
523
525
  disable_delete=True,
@@ -525,8 +527,8 @@ class Endpoint(pulumi.CustomResource):
525
527
  "password": "changeme"
526
528
  }
527
529
  \"\"\",
528
- opts=pulumi.ResourceOptions(depends_on=[u1]))
529
- u1_entity = vault.generic.Endpoint("u1Entity",
530
+ opts = pulumi.ResourceOptions(depends_on=[u1]))
531
+ u1_entity = vault.generic.Endpoint("u1_entity",
530
532
  disable_read=True,
531
533
  disable_delete=True,
532
534
  path="identity/lookup/entity",
@@ -537,10 +539,9 @@ class Endpoint(pulumi.CustomResource):
537
539
  "alias_mount_accessor": vault_auth_backend.userpass.accessor
538
540
  }
539
541
  \"\"\",
540
- opts=pulumi.ResourceOptions(depends_on=[u1_token]))
542
+ opts = pulumi.ResourceOptions(depends_on=[u1_token]))
541
543
  pulumi.export("u1Id", u1_entity.write_data["id"])
542
544
  ```
543
- <!--End PulumiCodeChooser -->
544
545
 
545
546
  ## Required Vault Capabilities
546
547
 
@@ -644,7 +645,7 @@ class Endpoint(pulumi.CustomResource):
644
645
  many configuration endpoints. Defaults to false.
645
646
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
646
647
  The value should not contain leading or trailing forward slashes.
647
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
648
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
648
649
  *Available only for Vault Enterprise*.
649
650
  :param pulumi.Input[str] path: The full logical path at which to write the given
650
651
  data. Consult each backend's documentation to see which endpoints
@@ -731,7 +732,7 @@ class Endpoint(pulumi.CustomResource):
731
732
  """
732
733
  The namespace to provision the resource in.
733
734
  The value should not contain leading or trailing forward slashes.
734
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
735
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
735
736
  *Available only for Vault Enterprise*.
736
737
  """
737
738
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -58,7 +63,7 @@ class GetSecretResult:
58
63
 
59
64
  @property
60
65
  @pulumi.getter
61
- def data(self) -> Mapping[str, Any]:
66
+ def data(self) -> Mapping[str, str]:
62
67
  """
63
68
  A mapping whose keys are the top-level data keys returned from
64
69
  Vault and whose values are the corresponding values. This map can only
@@ -162,19 +167,37 @@ def get_secret(namespace: Optional[str] = None,
162
167
 
163
168
  ### Generic secret
164
169
 
165
- <!--Start PulumiCodeChooser -->
166
170
  ```python
167
171
  import pulumi
168
172
  import pulumi_vault as vault
169
173
 
170
174
  rundeck_auth = vault.generic.get_secret(path="secret/rundeck_auth")
171
175
  ```
172
- <!--End PulumiCodeChooser -->
176
+
177
+ ### KV
178
+
179
+ For this example, consider `example` as a path for a KV engine.
180
+
181
+ ```python
182
+ import pulumi
183
+ import pulumi_vault as vault
184
+
185
+
186
+ def not_implemented(msg):
187
+ raise NotImplementedError(msg)
188
+
189
+ example_creds = vault.generic.get_secret(path="example/creds")
190
+ example_template = not_implemented("The template_file data resource is not yet supported.")
191
+ ```
192
+
193
+ ## Required Vault Capabilities
194
+
195
+ Use of this resource requires the `read` capability on the given path.
173
196
 
174
197
 
175
198
  :param str namespace: The namespace of the target resource.
176
199
  The value should not contain leading or trailing forward slashes.
177
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
200
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
178
201
  *Available only for Vault Enterprise*.
179
202
  :param str path: The full logical path from which to request data.
180
203
  To read data from the "generic" secret backend mounted in Vault by
@@ -208,32 +231,47 @@ def get_secret(namespace: Optional[str] = None,
208
231
  path=pulumi.get(__ret__, 'path'),
209
232
  version=pulumi.get(__ret__, 'version'),
210
233
  with_lease_start_time=pulumi.get(__ret__, 'with_lease_start_time'))
211
-
212
-
213
- @_utilities.lift_output_func(get_secret)
214
234
  def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
215
235
  path: Optional[pulumi.Input[str]] = None,
216
236
  version: Optional[pulumi.Input[Optional[int]]] = None,
217
237
  with_lease_start_time: Optional[pulumi.Input[Optional[bool]]] = None,
218
- opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecretResult]:
238
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretResult]:
219
239
  """
220
240
  ## Example Usage
221
241
 
222
242
  ### Generic secret
223
243
 
224
- <!--Start PulumiCodeChooser -->
225
244
  ```python
226
245
  import pulumi
227
246
  import pulumi_vault as vault
228
247
 
229
248
  rundeck_auth = vault.generic.get_secret(path="secret/rundeck_auth")
230
249
  ```
231
- <!--End PulumiCodeChooser -->
250
+
251
+ ### KV
252
+
253
+ For this example, consider `example` as a path for a KV engine.
254
+
255
+ ```python
256
+ import pulumi
257
+ import pulumi_vault as vault
258
+
259
+
260
+ def not_implemented(msg):
261
+ raise NotImplementedError(msg)
262
+
263
+ example_creds = vault.generic.get_secret(path="example/creds")
264
+ example_template = not_implemented("The template_file data resource is not yet supported.")
265
+ ```
266
+
267
+ ## Required Vault Capabilities
268
+
269
+ Use of this resource requires the `read` capability on the given path.
232
270
 
233
271
 
234
272
  :param str namespace: The namespace of the target resource.
235
273
  The value should not contain leading or trailing forward slashes.
236
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
274
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
237
275
  *Available only for Vault Enterprise*.
238
276
  :param str path: The full logical path from which to request data.
239
277
  To read data from the "generic" secret backend mounted in Vault by
@@ -247,4 +285,22 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
247
285
  Note that storing the `lease_start_time` in the TF state will cause a persistent drift
248
286
  on every `pulumi preview` and will require a `pulumi up`.
249
287
  """
250
- ...
288
+ __args__ = dict()
289
+ __args__['namespace'] = namespace
290
+ __args__['path'] = path
291
+ __args__['version'] = version
292
+ __args__['withLeaseStartTime'] = with_lease_start_time
293
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
294
+ __ret__ = pulumi.runtime.invoke_output('vault:generic/getSecret:getSecret', __args__, opts=opts, typ=GetSecretResult)
295
+ return __ret__.apply(lambda __response__: GetSecretResult(
296
+ data=pulumi.get(__response__, 'data'),
297
+ data_json=pulumi.get(__response__, 'data_json'),
298
+ id=pulumi.get(__response__, 'id'),
299
+ lease_duration=pulumi.get(__response__, 'lease_duration'),
300
+ lease_id=pulumi.get(__response__, 'lease_id'),
301
+ lease_renewable=pulumi.get(__response__, 'lease_renewable'),
302
+ lease_start_time=pulumi.get(__response__, 'lease_start_time'),
303
+ namespace=pulumi.get(__response__, 'namespace'),
304
+ path=pulumi.get(__response__, 'path'),
305
+ version=pulumi.get(__response__, 'version'),
306
+ with_lease_start_time=pulumi.get(__response__, 'with_lease_start_time')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretArgs', 'Secret']
@@ -37,7 +42,7 @@ class SecretArgs:
37
42
  break drift detection. Defaults to false.
38
43
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
39
44
  The value should not contain leading or trailing forward slashes.
40
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
45
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
41
46
  *Available only for Vault Enterprise*.
42
47
  """
43
48
  pulumi.set(__self__, "data_json", data_json)
@@ -113,7 +118,7 @@ class SecretArgs:
113
118
  """
114
119
  The namespace to provision the resource in.
115
120
  The value should not contain leading or trailing forward slashes.
116
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
121
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
117
122
  *Available only for Vault Enterprise*.
118
123
  """
119
124
  return pulumi.get(self, "namespace")
@@ -126,7 +131,7 @@ class SecretArgs:
126
131
  @pulumi.input_type
127
132
  class _SecretState:
128
133
  def __init__(__self__, *,
129
- data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
134
+ data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
130
135
  data_json: Optional[pulumi.Input[str]] = None,
131
136
  delete_all_versions: Optional[pulumi.Input[bool]] = None,
132
137
  disable_read: Optional[pulumi.Input[bool]] = None,
@@ -134,7 +139,7 @@ class _SecretState:
134
139
  path: Optional[pulumi.Input[str]] = None):
135
140
  """
136
141
  Input properties used for looking up and filtering Secret resources.
137
- :param pulumi.Input[Mapping[str, Any]] data: A mapping whose keys are the top-level data keys returned from
142
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
138
143
  Vault and whose values are the corresponding values. This map can only
139
144
  represent string data, so any non-string values returned from Vault are
140
145
  serialized as JSON.
@@ -149,7 +154,7 @@ class _SecretState:
149
154
  break drift detection. Defaults to false.
150
155
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
151
156
  The value should not contain leading or trailing forward slashes.
152
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
157
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
153
158
  *Available only for Vault Enterprise*.
154
159
  :param pulumi.Input[str] path: The full logical path at which to write the given data.
155
160
  To write data into the "generic" secret backend mounted in Vault by default,
@@ -172,7 +177,7 @@ class _SecretState:
172
177
 
173
178
  @property
174
179
  @pulumi.getter
175
- def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
180
+ def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
176
181
  """
177
182
  A mapping whose keys are the top-level data keys returned from
178
183
  Vault and whose values are the corresponding values. This map can only
@@ -182,7 +187,7 @@ class _SecretState:
182
187
  return pulumi.get(self, "data")
183
188
 
184
189
  @data.setter
185
- def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
190
+ def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
186
191
  pulumi.set(self, "data", value)
187
192
 
188
193
  @property
@@ -233,7 +238,7 @@ class _SecretState:
233
238
  """
234
239
  The namespace to provision the resource in.
235
240
  The value should not contain leading or trailing forward slashes.
236
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
241
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
237
242
  *Available only for Vault Enterprise*.
238
243
  """
239
244
  return pulumi.get(self, "namespace")
@@ -292,7 +297,7 @@ class Secret(pulumi.CustomResource):
292
297
  break drift detection. Defaults to false.
293
298
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
294
299
  The value should not contain leading or trailing forward slashes.
295
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
300
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
296
301
  *Available only for Vault Enterprise*.
297
302
  :param pulumi.Input[str] path: The full logical path at which to write the given data.
298
303
  To write data into the "generic" secret backend mounted in Vault by default,
@@ -366,7 +371,7 @@ class Secret(pulumi.CustomResource):
366
371
  def get(resource_name: str,
367
372
  id: pulumi.Input[str],
368
373
  opts: Optional[pulumi.ResourceOptions] = None,
369
- data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
374
+ data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
370
375
  data_json: Optional[pulumi.Input[str]] = None,
371
376
  delete_all_versions: Optional[pulumi.Input[bool]] = None,
372
377
  disable_read: Optional[pulumi.Input[bool]] = None,
@@ -379,7 +384,7 @@ class Secret(pulumi.CustomResource):
379
384
  :param str resource_name: The unique name of the resulting resource.
380
385
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
381
386
  :param pulumi.ResourceOptions opts: Options for the resource.
382
- :param pulumi.Input[Mapping[str, Any]] data: A mapping whose keys are the top-level data keys returned from
387
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
383
388
  Vault and whose values are the corresponding values. This map can only
384
389
  represent string data, so any non-string values returned from Vault are
385
390
  serialized as JSON.
@@ -394,7 +399,7 @@ class Secret(pulumi.CustomResource):
394
399
  break drift detection. Defaults to false.
395
400
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
396
401
  The value should not contain leading or trailing forward slashes.
397
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
402
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
398
403
  *Available only for Vault Enterprise*.
399
404
  :param pulumi.Input[str] path: The full logical path at which to write the given data.
400
405
  To write data into the "generic" secret backend mounted in Vault by default,
@@ -416,7 +421,7 @@ class Secret(pulumi.CustomResource):
416
421
 
417
422
  @property
418
423
  @pulumi.getter
419
- def data(self) -> pulumi.Output[Mapping[str, Any]]:
424
+ def data(self) -> pulumi.Output[Mapping[str, str]]:
420
425
  """
421
426
  A mapping whose keys are the top-level data keys returned from
422
427
  Vault and whose values are the corresponding values. This map can only
@@ -461,7 +466,7 @@ class Secret(pulumi.CustomResource):
461
466
  """
462
467
  The namespace to provision the resource in.
463
468
  The value should not contain leading or trailing forward slashes.
464
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
469
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
465
470
  *Available only for Vault Enterprise*.
466
471
  """
467
472
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = [
@@ -152,19 +157,17 @@ def get_auth_backend(namespace: Optional[str] = None,
152
157
  """
153
158
  ## Example Usage
154
159
 
155
- <!--Start PulumiCodeChooser -->
156
160
  ```python
157
161
  import pulumi
158
162
  import pulumi_vault as vault
159
163
 
160
164
  example = vault.get_auth_backend(path="userpass")
161
165
  ```
162
- <!--End PulumiCodeChooser -->
163
166
 
164
167
 
165
168
  :param str namespace: The namespace of the target resource.
166
169
  The value should not contain leading or trailing forward slashes.
167
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
170
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
168
171
  *Available only for Vault Enterprise*.
169
172
  :param str path: The auth backend mount point.
170
173
  """
@@ -185,29 +188,39 @@ def get_auth_backend(namespace: Optional[str] = None,
185
188
  namespace=pulumi.get(__ret__, 'namespace'),
186
189
  path=pulumi.get(__ret__, 'path'),
187
190
  type=pulumi.get(__ret__, 'type'))
188
-
189
-
190
- @_utilities.lift_output_func(get_auth_backend)
191
191
  def get_auth_backend_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
192
192
  path: Optional[pulumi.Input[str]] = None,
193
- opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendResult]:
193
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAuthBackendResult]:
194
194
  """
195
195
  ## Example Usage
196
196
 
197
- <!--Start PulumiCodeChooser -->
198
197
  ```python
199
198
  import pulumi
200
199
  import pulumi_vault as vault
201
200
 
202
201
  example = vault.get_auth_backend(path="userpass")
203
202
  ```
204
- <!--End PulumiCodeChooser -->
205
203
 
206
204
 
207
205
  :param str namespace: The namespace of the target resource.
208
206
  The value should not contain leading or trailing forward slashes.
209
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
207
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
210
208
  *Available only for Vault Enterprise*.
211
209
  :param str path: The auth backend mount point.
212
210
  """
213
- ...
211
+ __args__ = dict()
212
+ __args__['namespace'] = namespace
213
+ __args__['path'] = path
214
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
215
+ __ret__ = pulumi.runtime.invoke_output('vault:index/getAuthBackend:getAuthBackend', __args__, opts=opts, typ=GetAuthBackendResult)
216
+ return __ret__.apply(lambda __response__: GetAuthBackendResult(
217
+ accessor=pulumi.get(__response__, 'accessor'),
218
+ default_lease_ttl_seconds=pulumi.get(__response__, 'default_lease_ttl_seconds'),
219
+ description=pulumi.get(__response__, 'description'),
220
+ id=pulumi.get(__response__, 'id'),
221
+ listing_visibility=pulumi.get(__response__, 'listing_visibility'),
222
+ local=pulumi.get(__response__, 'local'),
223
+ max_lease_ttl_seconds=pulumi.get(__response__, 'max_lease_ttl_seconds'),
224
+ namespace=pulumi.get(__response__, 'namespace'),
225
+ path=pulumi.get(__response__, 'path'),
226
+ type=pulumi.get(__response__, 'type')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = [
@@ -92,19 +97,24 @@ def get_auth_backends(namespace: Optional[str] = None,
92
97
  """
93
98
  ## Example Usage
94
99
 
95
- <!--Start PulumiCodeChooser -->
96
100
  ```python
97
101
  import pulumi
98
102
  import pulumi_vault as vault
99
103
 
100
104
  example = vault.get_auth_backends()
101
105
  ```
102
- <!--End PulumiCodeChooser -->
106
+
107
+ ```python
108
+ import pulumi
109
+ import pulumi_vault as vault
110
+
111
+ example_filter = vault.get_auth_backends(type="kubernetes")
112
+ ```
103
113
 
104
114
 
105
115
  :param str namespace: The namespace of the target resource.
106
116
  The value should not contain leading or trailing forward slashes.
107
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
117
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
108
118
  *Available only for Vault Enterprise*.
109
119
  :param str type: The name of the auth method type. Allows filtering of backends returned by type.
110
120
  """
@@ -120,29 +130,41 @@ def get_auth_backends(namespace: Optional[str] = None,
120
130
  namespace=pulumi.get(__ret__, 'namespace'),
121
131
  paths=pulumi.get(__ret__, 'paths'),
122
132
  type=pulumi.get(__ret__, 'type'))
123
-
124
-
125
- @_utilities.lift_output_func(get_auth_backends)
126
133
  def get_auth_backends_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
127
134
  type: Optional[pulumi.Input[Optional[str]]] = None,
128
- opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendsResult]:
135
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAuthBackendsResult]:
129
136
  """
130
137
  ## Example Usage
131
138
 
132
- <!--Start PulumiCodeChooser -->
133
139
  ```python
134
140
  import pulumi
135
141
  import pulumi_vault as vault
136
142
 
137
143
  example = vault.get_auth_backends()
138
144
  ```
139
- <!--End PulumiCodeChooser -->
145
+
146
+ ```python
147
+ import pulumi
148
+ import pulumi_vault as vault
149
+
150
+ example_filter = vault.get_auth_backends(type="kubernetes")
151
+ ```
140
152
 
141
153
 
142
154
  :param str namespace: The namespace of the target resource.
143
155
  The value should not contain leading or trailing forward slashes.
144
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
156
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
145
157
  *Available only for Vault Enterprise*.
146
158
  :param str type: The name of the auth method type. Allows filtering of backends returned by type.
147
159
  """
148
- ...
160
+ __args__ = dict()
161
+ __args__['namespace'] = namespace
162
+ __args__['type'] = type
163
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
164
+ __ret__ = pulumi.runtime.invoke_output('vault:index/getAuthBackends:getAuthBackends', __args__, opts=opts, typ=GetAuthBackendsResult)
165
+ return __ret__.apply(lambda __response__: GetAuthBackendsResult(
166
+ accessors=pulumi.get(__response__, 'accessors'),
167
+ id=pulumi.get(__response__, 'id'),
168
+ namespace=pulumi.get(__response__, 'namespace'),
169
+ paths=pulumi.get(__response__, 'paths'),
170
+ type=pulumi.get(__response__, 'type')))