pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736850018__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +22 -7
  5. pulumi_vault/ad/secret_backend.py +14 -144
  6. pulumi_vault/ad/secret_library.py +14 -11
  7. pulumi_vault/ad/secret_role.py +12 -11
  8. pulumi_vault/alicloud/auth_backend_role.py +74 -192
  9. pulumi_vault/approle/auth_backend_login.py +12 -11
  10. pulumi_vault/approle/auth_backend_role.py +75 -193
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
  13. pulumi_vault/audit.py +24 -27
  14. pulumi_vault/audit_request_header.py +11 -6
  15. pulumi_vault/auth_backend.py +64 -12
  16. pulumi_vault/aws/auth_backend_cert.py +12 -7
  17. pulumi_vault/aws/auth_backend_client.py +265 -24
  18. pulumi_vault/aws/auth_backend_config_identity.py +12 -11
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +75 -193
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
  24. pulumi_vault/aws/auth_backend_sts_role.py +12 -11
  25. pulumi_vault/aws/get_access_credentials.py +34 -7
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +75 -7
  28. pulumi_vault/aws/secret_backend_role.py +183 -11
  29. pulumi_vault/aws/secret_backend_static_role.py +14 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +151 -17
  32. pulumi_vault/azure/auth_backend_role.py +75 -193
  33. pulumi_vault/azure/backend.py +223 -29
  34. pulumi_vault/azure/backend_role.py +42 -41
  35. pulumi_vault/azure/get_access_credentials.py +39 -11
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -271
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +22 -25
  44. pulumi_vault/consul/secret_backend_role.py +14 -80
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +117 -114
  48. pulumi_vault/database/secret_backend_role.py +29 -24
  49. pulumi_vault/database/secret_backend_static_role.py +85 -15
  50. pulumi_vault/database/secrets_mount.py +425 -138
  51. pulumi_vault/egp_policy.py +16 -15
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +248 -35
  54. pulumi_vault/gcp/auth_backend_role.py +75 -271
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -9
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -16
  58. pulumi_vault/gcp/secret_impersonated_account.py +74 -17
  59. pulumi_vault/gcp/secret_roleset.py +29 -26
  60. pulumi_vault/gcp/secret_static_account.py +37 -34
  61. pulumi_vault/generic/endpoint.py +22 -21
  62. pulumi_vault/generic/get_secret.py +68 -12
  63. pulumi_vault/generic/secret.py +19 -14
  64. pulumi_vault/get_auth_backend.py +24 -11
  65. pulumi_vault/get_auth_backends.py +33 -11
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -15
  69. pulumi_vault/get_policy_document.py +34 -23
  70. pulumi_vault/get_raft_autopilot_state.py +29 -14
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +17 -16
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +14 -13
  75. pulumi_vault/github/user.py +14 -13
  76. pulumi_vault/identity/entity.py +18 -15
  77. pulumi_vault/identity/entity_alias.py +18 -15
  78. pulumi_vault/identity/entity_policies.py +24 -19
  79. pulumi_vault/identity/get_entity.py +40 -14
  80. pulumi_vault/identity/get_group.py +45 -13
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -11
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -13
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -14
  84. pulumi_vault/identity/group.py +50 -49
  85. pulumi_vault/identity/group_alias.py +14 -11
  86. pulumi_vault/identity/group_member_entity_ids.py +24 -74
  87. pulumi_vault/identity/group_member_group_ids.py +36 -27
  88. pulumi_vault/identity/group_policies.py +16 -15
  89. pulumi_vault/identity/mfa_duo.py +9 -8
  90. pulumi_vault/identity/mfa_login_enforcement.py +13 -8
  91. pulumi_vault/identity/mfa_okta.py +9 -8
  92. pulumi_vault/identity/mfa_pingid.py +5 -4
  93. pulumi_vault/identity/mfa_totp.py +5 -4
  94. pulumi_vault/identity/oidc.py +12 -11
  95. pulumi_vault/identity/oidc_assignment.py +22 -13
  96. pulumi_vault/identity/oidc_client.py +34 -25
  97. pulumi_vault/identity/oidc_key.py +28 -19
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
  99. pulumi_vault/identity/oidc_provider.py +34 -23
  100. pulumi_vault/identity/oidc_role.py +40 -27
  101. pulumi_vault/identity/oidc_scope.py +18 -15
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +39 -46
  105. pulumi_vault/jwt/auth_backend_role.py +131 -260
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +22 -21
  108. pulumi_vault/kmip/secret_role.py +12 -11
  109. pulumi_vault/kmip/secret_scope.py +12 -11
  110. pulumi_vault/kubernetes/auth_backend_config.py +55 -7
  111. pulumi_vault/kubernetes/auth_backend_role.py +68 -179
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -15
  115. pulumi_vault/kubernetes/secret_backend.py +314 -29
  116. pulumi_vault/kubernetes/secret_backend_role.py +135 -56
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +23 -12
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
  120. pulumi_vault/kv/get_secret_v2.py +89 -9
  121. pulumi_vault/kv/get_secrets_list.py +22 -15
  122. pulumi_vault/kv/get_secrets_list_v2.py +35 -19
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +19 -18
  125. pulumi_vault/kv/secret_backend_v2.py +12 -11
  126. pulumi_vault/kv/secret_v2.py +55 -52
  127. pulumi_vault/ldap/auth_backend.py +125 -168
  128. pulumi_vault/ldap/auth_backend_group.py +12 -11
  129. pulumi_vault/ldap/auth_backend_user.py +12 -11
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +352 -84
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +14 -11
  135. pulumi_vault/ldap/secret_backend_static_role.py +67 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +27 -43
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +16 -13
  140. pulumi_vault/mfa_okta.py +16 -13
  141. pulumi_vault/mfa_pingid.py +16 -13
  142. pulumi_vault/mfa_totp.py +22 -19
  143. pulumi_vault/mongodbatlas/secret_backend.py +18 -17
  144. pulumi_vault/mongodbatlas/secret_role.py +41 -38
  145. pulumi_vault/mount.py +389 -65
  146. pulumi_vault/namespace.py +26 -21
  147. pulumi_vault/nomad_secret_backend.py +16 -15
  148. pulumi_vault/nomad_secret_role.py +12 -11
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +483 -41
  151. pulumi_vault/okta/auth_backend_group.py +12 -11
  152. pulumi_vault/okta/auth_backend_user.py +12 -11
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +18 -15
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -13
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -12
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
  174. pulumi_vault/pkisecret/secret_backend_key.py +12 -7
  175. pulumi_vault/pkisecret/secret_backend_role.py +19 -16
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +12 -7
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +58 -8
  185. pulumi_vault/quota_rate_limit.py +54 -4
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +16 -15
  189. pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
  190. pulumi_vault/raft_autopilot.py +12 -11
  191. pulumi_vault/raft_snapshot_agent_config.py +121 -311
  192. pulumi_vault/rgp_policy.py +14 -13
  193. pulumi_vault/saml/auth_backend.py +20 -19
  194. pulumi_vault/saml/auth_backend_role.py +90 -199
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -75
  199. pulumi_vault/secrets/sync_aws_destination.py +240 -29
  200. pulumi_vault/secrets/sync_azure_destination.py +90 -33
  201. pulumi_vault/secrets/sync_config.py +7 -6
  202. pulumi_vault/secrets/sync_gcp_destination.py +156 -27
  203. pulumi_vault/secrets/sync_gh_destination.py +187 -15
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +72 -15
  206. pulumi_vault/ssh/_inputs.py +28 -32
  207. pulumi_vault/ssh/outputs.py +11 -32
  208. pulumi_vault/ssh/secret_backend_ca.py +106 -11
  209. pulumi_vault/ssh/secret_backend_role.py +83 -120
  210. pulumi_vault/terraformcloud/secret_backend.py +5 -56
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -24
  212. pulumi_vault/terraformcloud/secret_role.py +14 -76
  213. pulumi_vault/token.py +26 -25
  214. pulumi_vault/tokenauth/auth_backend_role.py +76 -201
  215. pulumi_vault/transform/alphabet.py +16 -13
  216. pulumi_vault/transform/get_decode.py +45 -21
  217. pulumi_vault/transform/get_encode.py +45 -21
  218. pulumi_vault/transform/role.py +16 -13
  219. pulumi_vault/transform/template.py +30 -25
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -25
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +25 -97
  224. pulumi_vault/transit/secret_cache_config.py +12 -11
  225. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736850018.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['AuthBackendGroupArgs', 'AuthBackendGroup']
@@ -26,7 +31,7 @@ class AuthBackendGroupArgs:
26
31
  For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
27
32
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
28
33
  The value should not contain leading or trailing forward slashes.
29
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
34
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
30
35
  *Available only for Vault Enterprise*.
31
36
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies which should be granted to members of the group
32
37
  """
@@ -70,7 +75,7 @@ class AuthBackendGroupArgs:
70
75
  """
71
76
  The namespace to provision the resource in.
72
77
  The value should not contain leading or trailing forward slashes.
73
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
78
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
74
79
  *Available only for Vault Enterprise*.
75
80
  """
76
81
  return pulumi.get(self, "namespace")
@@ -107,7 +112,7 @@ class _AuthBackendGroupState:
107
112
  :param pulumi.Input[str] groupname: The LDAP groupname
108
113
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
109
114
  The value should not contain leading or trailing forward slashes.
110
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
115
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
111
116
  *Available only for Vault Enterprise*.
112
117
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies which should be granted to members of the group
113
118
  """
@@ -152,7 +157,7 @@ class _AuthBackendGroupState:
152
157
  """
153
158
  The namespace to provision the resource in.
154
159
  The value should not contain leading or trailing forward slashes.
155
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
160
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
156
161
  *Available only for Vault Enterprise*.
157
162
  """
158
163
  return pulumi.get(self, "namespace")
@@ -189,7 +194,6 @@ class AuthBackendGroup(pulumi.CustomResource):
189
194
 
190
195
  ## Example Usage
191
196
 
192
- <!--Start PulumiCodeChooser -->
193
197
  ```python
194
198
  import pulumi
195
199
  import pulumi_vault as vault
@@ -208,7 +212,6 @@ class AuthBackendGroup(pulumi.CustomResource):
208
212
  policies=["dba"],
209
213
  backend=ldap.path)
210
214
  ```
211
- <!--End PulumiCodeChooser -->
212
215
 
213
216
  ## Import
214
217
 
@@ -226,7 +229,7 @@ class AuthBackendGroup(pulumi.CustomResource):
226
229
  :param pulumi.Input[str] groupname: The LDAP groupname
227
230
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
228
231
  The value should not contain leading or trailing forward slashes.
229
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
232
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
230
233
  *Available only for Vault Enterprise*.
231
234
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies which should be granted to members of the group
232
235
  """
@@ -241,7 +244,6 @@ class AuthBackendGroup(pulumi.CustomResource):
241
244
 
242
245
  ## Example Usage
243
246
 
244
- <!--Start PulumiCodeChooser -->
245
247
  ```python
246
248
  import pulumi
247
249
  import pulumi_vault as vault
@@ -260,7 +262,6 @@ class AuthBackendGroup(pulumi.CustomResource):
260
262
  policies=["dba"],
261
263
  backend=ldap.path)
262
264
  ```
263
- <!--End PulumiCodeChooser -->
264
265
 
265
266
  ## Import
266
267
 
@@ -331,7 +332,7 @@ class AuthBackendGroup(pulumi.CustomResource):
331
332
  :param pulumi.Input[str] groupname: The LDAP groupname
332
333
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
333
334
  The value should not contain leading or trailing forward slashes.
334
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
335
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
335
336
  *Available only for Vault Enterprise*.
336
337
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies which should be granted to members of the group
337
338
  """
@@ -369,7 +370,7 @@ class AuthBackendGroup(pulumi.CustomResource):
369
370
  """
370
371
  The namespace to provision the resource in.
371
372
  The value should not contain leading or trailing forward slashes.
372
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
373
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
373
374
  *Available only for Vault Enterprise*.
374
375
  """
375
376
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['AuthBackendUserArgs', 'AuthBackendUser']
@@ -28,7 +33,7 @@ class AuthBackendUserArgs:
28
33
  :param pulumi.Input[Sequence[pulumi.Input[str]]] groups: Override LDAP groups which should be granted to user
29
34
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
30
35
  The value should not contain leading or trailing forward slashes.
31
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
36
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
32
37
  *Available only for Vault Enterprise*.
33
38
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies which should be granted to user
34
39
  """
@@ -86,7 +91,7 @@ class AuthBackendUserArgs:
86
91
  """
87
92
  The namespace to provision the resource in.
88
93
  The value should not contain leading or trailing forward slashes.
89
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
94
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
90
95
  *Available only for Vault Enterprise*.
91
96
  """
92
97
  return pulumi.get(self, "namespace")
@@ -124,7 +129,7 @@ class _AuthBackendUserState:
124
129
  :param pulumi.Input[Sequence[pulumi.Input[str]]] groups: Override LDAP groups which should be granted to user
125
130
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
126
131
  The value should not contain leading or trailing forward slashes.
127
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
132
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
128
133
  *Available only for Vault Enterprise*.
129
134
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies which should be granted to user
130
135
  :param pulumi.Input[str] username: The LDAP username
@@ -172,7 +177,7 @@ class _AuthBackendUserState:
172
177
  """
173
178
  The namespace to provision the resource in.
174
179
  The value should not contain leading or trailing forward slashes.
175
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
180
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
176
181
  *Available only for Vault Enterprise*.
177
182
  """
178
183
  return pulumi.get(self, "namespace")
@@ -222,7 +227,6 @@ class AuthBackendUser(pulumi.CustomResource):
222
227
 
223
228
  ## Example Usage
224
229
 
225
- <!--Start PulumiCodeChooser -->
226
230
  ```python
227
231
  import pulumi
228
232
  import pulumi_vault as vault
@@ -244,7 +248,6 @@ class AuthBackendUser(pulumi.CustomResource):
244
248
  ],
245
249
  backend=ldap.path)
246
250
  ```
247
- <!--End PulumiCodeChooser -->
248
251
 
249
252
  ## Import
250
253
 
@@ -262,7 +265,7 @@ class AuthBackendUser(pulumi.CustomResource):
262
265
  :param pulumi.Input[Sequence[pulumi.Input[str]]] groups: Override LDAP groups which should be granted to user
263
266
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
264
267
  The value should not contain leading or trailing forward slashes.
265
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
268
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
266
269
  *Available only for Vault Enterprise*.
267
270
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies which should be granted to user
268
271
  :param pulumi.Input[str] username: The LDAP username
@@ -278,7 +281,6 @@ class AuthBackendUser(pulumi.CustomResource):
278
281
 
279
282
  ## Example Usage
280
283
 
281
- <!--Start PulumiCodeChooser -->
282
284
  ```python
283
285
  import pulumi
284
286
  import pulumi_vault as vault
@@ -300,7 +302,6 @@ class AuthBackendUser(pulumi.CustomResource):
300
302
  ],
301
303
  backend=ldap.path)
302
304
  ```
303
- <!--End PulumiCodeChooser -->
304
305
 
305
306
  ## Import
306
307
 
@@ -374,7 +375,7 @@ class AuthBackendUser(pulumi.CustomResource):
374
375
  :param pulumi.Input[Sequence[pulumi.Input[str]]] groups: Override LDAP groups which should be granted to user
375
376
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
376
377
  The value should not contain leading or trailing forward slashes.
377
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
378
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
378
379
  *Available only for Vault Enterprise*.
379
380
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies which should be granted to user
380
381
  :param pulumi.Input[str] username: The LDAP username
@@ -414,7 +415,7 @@ class AuthBackendUser(pulumi.CustomResource):
414
415
  """
415
416
  The namespace to provision the resource in.
416
417
  The value should not contain leading or trailing forward slashes.
417
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
418
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
418
419
  *Available only for Vault Enterprise*.
419
420
  """
420
421
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -150,14 +155,27 @@ def get_dynamic_credentials(mount: Optional[str] = None,
150
155
  password=pulumi.get(__ret__, 'password'),
151
156
  role_name=pulumi.get(__ret__, 'role_name'),
152
157
  username=pulumi.get(__ret__, 'username'))
153
-
154
-
155
- @_utilities.lift_output_func(get_dynamic_credentials)
156
158
  def get_dynamic_credentials_output(mount: Optional[pulumi.Input[str]] = None,
157
159
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
158
160
  role_name: Optional[pulumi.Input[str]] = None,
159
- opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetDynamicCredentialsResult]:
161
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetDynamicCredentialsResult]:
160
162
  """
161
163
  Use this data source to access information about an existing resource.
162
164
  """
163
- ...
165
+ __args__ = dict()
166
+ __args__['mount'] = mount
167
+ __args__['namespace'] = namespace
168
+ __args__['roleName'] = role_name
169
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
170
+ __ret__ = pulumi.runtime.invoke_output('vault:ldap/getDynamicCredentials:getDynamicCredentials', __args__, opts=opts, typ=GetDynamicCredentialsResult)
171
+ return __ret__.apply(lambda __response__: GetDynamicCredentialsResult(
172
+ distinguished_names=pulumi.get(__response__, 'distinguished_names'),
173
+ id=pulumi.get(__response__, 'id'),
174
+ lease_duration=pulumi.get(__response__, 'lease_duration'),
175
+ lease_id=pulumi.get(__response__, 'lease_id'),
176
+ lease_renewable=pulumi.get(__response__, 'lease_renewable'),
177
+ mount=pulumi.get(__response__, 'mount'),
178
+ namespace=pulumi.get(__response__, 'namespace'),
179
+ password=pulumi.get(__response__, 'password'),
180
+ role_name=pulumi.get(__response__, 'role_name'),
181
+ username=pulumi.get(__response__, 'username')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -160,14 +165,28 @@ def get_static_credentials(mount: Optional[str] = None,
160
165
  rotation_period=pulumi.get(__ret__, 'rotation_period'),
161
166
  ttl=pulumi.get(__ret__, 'ttl'),
162
167
  username=pulumi.get(__ret__, 'username'))
163
-
164
-
165
- @_utilities.lift_output_func(get_static_credentials)
166
168
  def get_static_credentials_output(mount: Optional[pulumi.Input[str]] = None,
167
169
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
168
170
  role_name: Optional[pulumi.Input[str]] = None,
169
- opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetStaticCredentialsResult]:
171
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetStaticCredentialsResult]:
170
172
  """
171
173
  Use this data source to access information about an existing resource.
172
174
  """
173
- ...
175
+ __args__ = dict()
176
+ __args__['mount'] = mount
177
+ __args__['namespace'] = namespace
178
+ __args__['roleName'] = role_name
179
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
180
+ __ret__ = pulumi.runtime.invoke_output('vault:ldap/getStaticCredentials:getStaticCredentials', __args__, opts=opts, typ=GetStaticCredentialsResult)
181
+ return __ret__.apply(lambda __response__: GetStaticCredentialsResult(
182
+ dn=pulumi.get(__response__, 'dn'),
183
+ id=pulumi.get(__response__, 'id'),
184
+ last_password=pulumi.get(__response__, 'last_password'),
185
+ last_vault_rotation=pulumi.get(__response__, 'last_vault_rotation'),
186
+ mount=pulumi.get(__response__, 'mount'),
187
+ namespace=pulumi.get(__response__, 'namespace'),
188
+ password=pulumi.get(__response__, 'password'),
189
+ role_name=pulumi.get(__response__, 'role_name'),
190
+ rotation_period=pulumi.get(__response__, 'rotation_period'),
191
+ ttl=pulumi.get(__response__, 'ttl'),
192
+ username=pulumi.get(__response__, 'username')))