pulumi-vault 6.3.2a1729803197__py3-none-any.whl → 6.4.0a1723454543__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +0 -560
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +4 -19
  4. pulumi_vault/ad/secret_backend.py +0 -5
  5. pulumi_vault/ad/secret_library.py +0 -5
  6. pulumi_vault/ad/secret_role.py +0 -5
  7. pulumi_vault/alicloud/auth_backend_role.py +0 -5
  8. pulumi_vault/approle/auth_backend_login.py +0 -5
  9. pulumi_vault/approle/auth_backend_role.py +0 -5
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -5
  11. pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
  12. pulumi_vault/audit.py +0 -5
  13. pulumi_vault/audit_request_header.py +0 -5
  14. pulumi_vault/auth_backend.py +0 -5
  15. pulumi_vault/aws/auth_backend_cert.py +0 -5
  16. pulumi_vault/aws/auth_backend_client.py +0 -5
  17. pulumi_vault/aws/auth_backend_config_identity.py +0 -5
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
  19. pulumi_vault/aws/auth_backend_login.py +7 -12
  20. pulumi_vault/aws/auth_backend_role.py +0 -5
  21. pulumi_vault/aws/auth_backend_role_tag.py +0 -5
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
  23. pulumi_vault/aws/auth_backend_sts_role.py +0 -5
  24. pulumi_vault/aws/get_access_credentials.py +4 -31
  25. pulumi_vault/aws/get_static_access_credentials.py +4 -18
  26. pulumi_vault/aws/secret_backend.py +0 -5
  27. pulumi_vault/aws/secret_backend_role.py +0 -5
  28. pulumi_vault/aws/secret_backend_static_role.py +0 -5
  29. pulumi_vault/azure/_inputs.py +0 -24
  30. pulumi_vault/azure/auth_backend_config.py +0 -5
  31. pulumi_vault/azure/auth_backend_role.py +0 -5
  32. pulumi_vault/azure/backend.py +0 -5
  33. pulumi_vault/azure/backend_role.py +0 -5
  34. pulumi_vault/azure/get_access_credentials.py +4 -36
  35. pulumi_vault/azure/outputs.py +0 -5
  36. pulumi_vault/cert_auth_backend_role.py +0 -5
  37. pulumi_vault/config/__init__.pyi +0 -5
  38. pulumi_vault/config/_inputs.py +0 -21
  39. pulumi_vault/config/outputs.py +0 -5
  40. pulumi_vault/config/ui_custom_message.py +14 -19
  41. pulumi_vault/config/vars.py +0 -5
  42. pulumi_vault/consul/secret_backend.py +0 -5
  43. pulumi_vault/consul/secret_backend_role.py +0 -5
  44. pulumi_vault/database/_inputs.py +105 -2056
  45. pulumi_vault/database/outputs.py +54 -59
  46. pulumi_vault/database/secret_backend_connection.py +14 -19
  47. pulumi_vault/database/secret_backend_role.py +14 -19
  48. pulumi_vault/database/secret_backend_static_role.py +0 -5
  49. pulumi_vault/database/secrets_mount.py +14 -19
  50. pulumi_vault/egp_policy.py +0 -5
  51. pulumi_vault/gcp/_inputs.py +0 -111
  52. pulumi_vault/gcp/auth_backend.py +0 -5
  53. pulumi_vault/gcp/auth_backend_role.py +0 -5
  54. pulumi_vault/gcp/get_auth_backend_role.py +4 -42
  55. pulumi_vault/gcp/outputs.py +0 -5
  56. pulumi_vault/gcp/secret_backend.py +0 -5
  57. pulumi_vault/gcp/secret_impersonated_account.py +0 -5
  58. pulumi_vault/gcp/secret_roleset.py +0 -5
  59. pulumi_vault/gcp/secret_static_account.py +0 -5
  60. pulumi_vault/generic/endpoint.py +0 -5
  61. pulumi_vault/generic/get_secret.py +5 -25
  62. pulumi_vault/generic/secret.py +7 -12
  63. pulumi_vault/get_auth_backend.py +4 -21
  64. pulumi_vault/get_auth_backends.py +4 -16
  65. pulumi_vault/get_namespace.py +5 -18
  66. pulumi_vault/get_namespaces.py +4 -13
  67. pulumi_vault/get_nomad_access_token.py +8 -28
  68. pulumi_vault/get_policy_document.py +4 -15
  69. pulumi_vault/get_raft_autopilot_state.py +7 -26
  70. pulumi_vault/github/_inputs.py +0 -55
  71. pulumi_vault/github/auth_backend.py +0 -5
  72. pulumi_vault/github/outputs.py +0 -5
  73. pulumi_vault/github/team.py +0 -5
  74. pulumi_vault/github/user.py +0 -5
  75. pulumi_vault/identity/entity.py +0 -5
  76. pulumi_vault/identity/entity_alias.py +0 -5
  77. pulumi_vault/identity/entity_policies.py +0 -5
  78. pulumi_vault/identity/get_entity.py +5 -35
  79. pulumi_vault/identity/get_group.py +6 -42
  80. pulumi_vault/identity/get_oidc_client_creds.py +4 -16
  81. pulumi_vault/identity/get_oidc_openid_config.py +4 -26
  82. pulumi_vault/identity/get_oidc_public_keys.py +5 -16
  83. pulumi_vault/identity/group.py +0 -5
  84. pulumi_vault/identity/group_alias.py +0 -5
  85. pulumi_vault/identity/group_member_entity_ids.py +0 -5
  86. pulumi_vault/identity/group_member_group_ids.py +0 -5
  87. pulumi_vault/identity/group_policies.py +0 -5
  88. pulumi_vault/identity/mfa_duo.py +0 -5
  89. pulumi_vault/identity/mfa_login_enforcement.py +0 -5
  90. pulumi_vault/identity/mfa_okta.py +0 -5
  91. pulumi_vault/identity/mfa_pingid.py +0 -5
  92. pulumi_vault/identity/mfa_totp.py +0 -5
  93. pulumi_vault/identity/oidc.py +0 -5
  94. pulumi_vault/identity/oidc_assignment.py +0 -5
  95. pulumi_vault/identity/oidc_client.py +0 -5
  96. pulumi_vault/identity/oidc_key.py +0 -5
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
  98. pulumi_vault/identity/oidc_provider.py +0 -5
  99. pulumi_vault/identity/oidc_role.py +0 -5
  100. pulumi_vault/identity/oidc_scope.py +0 -5
  101. pulumi_vault/identity/outputs.py +3 -8
  102. pulumi_vault/jwt/_inputs.py +0 -55
  103. pulumi_vault/jwt/auth_backend.py +0 -5
  104. pulumi_vault/jwt/auth_backend_role.py +28 -33
  105. pulumi_vault/jwt/outputs.py +0 -5
  106. pulumi_vault/kmip/secret_backend.py +0 -5
  107. pulumi_vault/kmip/secret_role.py +0 -5
  108. pulumi_vault/kmip/secret_scope.py +0 -5
  109. pulumi_vault/kubernetes/auth_backend_config.py +0 -5
  110. pulumi_vault/kubernetes/auth_backend_role.py +0 -5
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +4 -26
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
  113. pulumi_vault/kubernetes/get_service_account_token.py +4 -28
  114. pulumi_vault/kubernetes/secret_backend.py +14 -19
  115. pulumi_vault/kubernetes/secret_backend_role.py +0 -5
  116. pulumi_vault/kv/_inputs.py +4 -36
  117. pulumi_vault/kv/get_secret.py +5 -20
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +5 -24
  119. pulumi_vault/kv/get_secret_v2.py +6 -27
  120. pulumi_vault/kv/get_secrets_list.py +4 -15
  121. pulumi_vault/kv/get_secrets_list_v2.py +4 -18
  122. pulumi_vault/kv/outputs.py +3 -8
  123. pulumi_vault/kv/secret.py +7 -12
  124. pulumi_vault/kv/secret_backend_v2.py +0 -5
  125. pulumi_vault/kv/secret_v2.py +28 -33
  126. pulumi_vault/ldap/auth_backend.py +0 -5
  127. pulumi_vault/ldap/auth_backend_group.py +0 -5
  128. pulumi_vault/ldap/auth_backend_user.py +0 -5
  129. pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
  130. pulumi_vault/ldap/get_static_credentials.py +4 -23
  131. pulumi_vault/ldap/secret_backend.py +14 -19
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
  133. pulumi_vault/ldap/secret_backend_library_set.py +0 -5
  134. pulumi_vault/ldap/secret_backend_static_role.py +0 -5
  135. pulumi_vault/managed/_inputs.py +0 -205
  136. pulumi_vault/managed/keys.py +0 -5
  137. pulumi_vault/managed/outputs.py +0 -5
  138. pulumi_vault/mfa_duo.py +0 -5
  139. pulumi_vault/mfa_okta.py +0 -5
  140. pulumi_vault/mfa_pingid.py +0 -5
  141. pulumi_vault/mfa_totp.py +0 -5
  142. pulumi_vault/mongodbatlas/secret_backend.py +0 -5
  143. pulumi_vault/mongodbatlas/secret_role.py +0 -5
  144. pulumi_vault/mount.py +16 -21
  145. pulumi_vault/namespace.py +14 -19
  146. pulumi_vault/nomad_secret_backend.py +0 -5
  147. pulumi_vault/nomad_secret_role.py +0 -5
  148. pulumi_vault/okta/_inputs.py +0 -39
  149. pulumi_vault/okta/auth_backend.py +0 -5
  150. pulumi_vault/okta/auth_backend_group.py +0 -5
  151. pulumi_vault/okta/auth_backend_user.py +0 -5
  152. pulumi_vault/okta/outputs.py +0 -5
  153. pulumi_vault/outputs.py +0 -5
  154. pulumi_vault/password_policy.py +0 -5
  155. pulumi_vault/pkisecret/_inputs.py +8 -49
  156. pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
  157. pulumi_vault/pkisecret/backend_config_est.py +14 -19
  158. pulumi_vault/pkisecret/get_backend_config_est.py +5 -23
  159. pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
  160. pulumi_vault/pkisecret/get_backend_issuers.py +5 -18
  161. pulumi_vault/pkisecret/get_backend_key.py +4 -19
  162. pulumi_vault/pkisecret/get_backend_keys.py +5 -18
  163. pulumi_vault/pkisecret/outputs.py +12 -17
  164. pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
  172. pulumi_vault/pkisecret/secret_backend_key.py +0 -5
  173. pulumi_vault/pkisecret/secret_backend_role.py +0 -5
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
  176. pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
  177. pulumi_vault/plugin.py +0 -5
  178. pulumi_vault/plugin_pinned_version.py +0 -5
  179. pulumi_vault/policy.py +0 -5
  180. pulumi_vault/provider.py +0 -5
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +0 -5
  183. pulumi_vault/quota_rate_limit.py +0 -5
  184. pulumi_vault/rabbitmq/_inputs.py +0 -61
  185. pulumi_vault/rabbitmq/outputs.py +0 -5
  186. pulumi_vault/rabbitmq/secret_backend.py +0 -5
  187. pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
  188. pulumi_vault/raft_autopilot.py +0 -5
  189. pulumi_vault/raft_snapshot_agent_config.py +0 -5
  190. pulumi_vault/rgp_policy.py +0 -5
  191. pulumi_vault/saml/auth_backend.py +0 -5
  192. pulumi_vault/saml/auth_backend_role.py +14 -19
  193. pulumi_vault/secrets/_inputs.py +0 -30
  194. pulumi_vault/secrets/outputs.py +0 -5
  195. pulumi_vault/secrets/sync_association.py +0 -5
  196. pulumi_vault/secrets/sync_aws_destination.py +14 -19
  197. pulumi_vault/secrets/sync_azure_destination.py +14 -19
  198. pulumi_vault/secrets/sync_config.py +0 -5
  199. pulumi_vault/secrets/sync_gcp_destination.py +14 -19
  200. pulumi_vault/secrets/sync_gh_destination.py +0 -5
  201. pulumi_vault/secrets/sync_github_apps.py +0 -5
  202. pulumi_vault/secrets/sync_vercel_destination.py +0 -5
  203. pulumi_vault/ssh/_inputs.py +0 -22
  204. pulumi_vault/ssh/outputs.py +0 -5
  205. pulumi_vault/ssh/secret_backend_ca.py +0 -5
  206. pulumi_vault/ssh/secret_backend_role.py +28 -33
  207. pulumi_vault/terraformcloud/secret_backend.py +0 -5
  208. pulumi_vault/terraformcloud/secret_creds.py +0 -5
  209. pulumi_vault/terraformcloud/secret_role.py +0 -5
  210. pulumi_vault/token.py +0 -5
  211. pulumi_vault/tokenauth/auth_backend_role.py +14 -5
  212. pulumi_vault/transform/alphabet.py +0 -5
  213. pulumi_vault/transform/get_decode.py +14 -38
  214. pulumi_vault/transform/get_encode.py +14 -38
  215. pulumi_vault/transform/role.py +0 -5
  216. pulumi_vault/transform/template.py +14 -19
  217. pulumi_vault/transform/transformation.py +0 -5
  218. pulumi_vault/transit/get_decrypt.py +4 -21
  219. pulumi_vault/transit/get_encrypt.py +4 -23
  220. pulumi_vault/transit/secret_backend_key.py +7 -12
  221. pulumi_vault/transit/secret_cache_config.py +0 -5
  222. {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/METADATA +2 -3
  223. pulumi_vault-6.4.0a1723454543.dist-info/RECORD +256 -0
  224. {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/WHEEL +1 -1
  225. pulumi_vault-6.3.2a1729803197.dist-info/RECORD +0 -256
  226. {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/top_level.txt +0 -0
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
 
17
12
  __all__ = ['NomadSecretRoleArgs', 'NomadSecretRole']
@@ -4,38 +4,16 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
18
13
  'AuthBackendGroupArgs',
19
- 'AuthBackendGroupArgsDict',
20
14
  'AuthBackendUserArgs',
21
- 'AuthBackendUserArgsDict',
22
15
  ]
23
16
 
24
- MYPY = False
25
-
26
- if not MYPY:
27
- class AuthBackendGroupArgsDict(TypedDict):
28
- group_name: pulumi.Input[str]
29
- """
30
- Name of the Okta group
31
- """
32
- policies: pulumi.Input[Sequence[pulumi.Input[str]]]
33
- """
34
- Policies to associate with this group
35
- """
36
- elif False:
37
- AuthBackendGroupArgsDict: TypeAlias = Mapping[str, Any]
38
-
39
17
  @pulumi.input_type
40
18
  class AuthBackendGroupArgs:
41
19
  def __init__(__self__, *,
@@ -73,23 +51,6 @@ class AuthBackendGroupArgs:
73
51
  pulumi.set(self, "policies", value)
74
52
 
75
53
 
76
- if not MYPY:
77
- class AuthBackendUserArgsDict(TypedDict):
78
- username: pulumi.Input[str]
79
- """
80
- Name of the user within Okta
81
- """
82
- groups: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
83
- """
84
- Groups within the Okta auth backend to associate with this user
85
- """
86
- policies: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
87
- """
88
- Policies to associate with this user
89
- """
90
- elif False:
91
- AuthBackendUserArgsDict: TypeAlias = Mapping[str, Any]
92
-
93
54
  @pulumi.input_type
94
55
  class AuthBackendUserArgs:
95
56
  def __init__(__self__, *,
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
  from . import outputs
17
12
  from ._inputs import *
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['AuthBackendGroupInitArgs', 'AuthBackendGroup']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['AuthBackendUserInitArgs', 'AuthBackendUser']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
pulumi_vault/outputs.py CHANGED
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
  from . import outputs
17
12
 
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
 
17
12
  __all__ = ['PasswordPolicyArgs', 'PasswordPolicy']
@@ -4,46 +4,24 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
18
13
  'BackendConfigEstAuthenticatorsArgs',
19
- 'BackendConfigEstAuthenticatorsArgsDict',
20
14
  'SecretBackendRolePolicyIdentifierArgs',
21
- 'SecretBackendRolePolicyIdentifierArgsDict',
22
15
  ]
23
16
 
24
- MYPY = False
25
-
26
- if not MYPY:
27
- class BackendConfigEstAuthenticatorsArgsDict(TypedDict):
28
- cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
29
- """
30
- "The accessor (required) and cert_role (optional) properties for cert auth backends".
31
- """
32
- userpass: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
33
- """
34
- "The accessor (required) property for user pass auth backends".
35
- """
36
- elif False:
37
- BackendConfigEstAuthenticatorsArgsDict: TypeAlias = Mapping[str, Any]
38
-
39
17
  @pulumi.input_type
40
18
  class BackendConfigEstAuthenticatorsArgs:
41
19
  def __init__(__self__, *,
42
- cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
43
- userpass: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None):
20
+ cert: Optional[pulumi.Input[Mapping[str, Any]]] = None,
21
+ userpass: Optional[pulumi.Input[Mapping[str, Any]]] = None):
44
22
  """
45
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
46
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] userpass: "The accessor (required) property for user pass auth backends".
23
+ :param pulumi.Input[Mapping[str, Any]] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
24
+ :param pulumi.Input[Mapping[str, Any]] userpass: "The accessor (required) property for user pass auth backends".
47
25
  """
48
26
  if cert is not None:
49
27
  pulumi.set(__self__, "cert", cert)
@@ -52,48 +30,29 @@ class BackendConfigEstAuthenticatorsArgs:
52
30
 
53
31
  @property
54
32
  @pulumi.getter
55
- def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
33
+ def cert(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
56
34
  """
57
35
  "The accessor (required) and cert_role (optional) properties for cert auth backends".
58
36
  """
59
37
  return pulumi.get(self, "cert")
60
38
 
61
39
  @cert.setter
62
- def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
40
+ def cert(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
63
41
  pulumi.set(self, "cert", value)
64
42
 
65
43
  @property
66
44
  @pulumi.getter
67
- def userpass(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
45
+ def userpass(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
68
46
  """
69
47
  "The accessor (required) property for user pass auth backends".
70
48
  """
71
49
  return pulumi.get(self, "userpass")
72
50
 
73
51
  @userpass.setter
74
- def userpass(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
52
+ def userpass(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
75
53
  pulumi.set(self, "userpass", value)
76
54
 
77
55
 
78
- if not MYPY:
79
- class SecretBackendRolePolicyIdentifierArgsDict(TypedDict):
80
- oid: pulumi.Input[str]
81
- """
82
- The OID for the policy identifier
83
- """
84
- cps: NotRequired[pulumi.Input[str]]
85
- """
86
- The URL of the CPS for the policy identifier
87
-
88
- Example usage:
89
- """
90
- notice: NotRequired[pulumi.Input[str]]
91
- """
92
- A notice for the policy identifier
93
- """
94
- elif False:
95
- SecretBackendRolePolicyIdentifierArgsDict: TypeAlias = Mapping[str, Any]
96
-
97
56
  @pulumi.input_type
98
57
  class SecretBackendRolePolicyIdentifierArgs:
99
58
  def __init__(__self__, *,
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['BackendConfigClusterArgs', 'BackendConfigCluster']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
  from . import outputs
17
12
  from ._inputs import *
@@ -28,7 +23,7 @@ class BackendConfigEstArgs:
28
23
  default_path_policy: Optional[pulumi.Input[str]] = None,
29
24
  enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
30
25
  enabled: Optional[pulumi.Input[bool]] = None,
31
- label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
26
+ label_to_path_policy: Optional[pulumi.Input[Mapping[str, Any]]] = None,
32
27
  namespace: Optional[pulumi.Input[str]] = None):
33
28
  """
34
29
  The set of arguments for constructing a BackendConfigEst resource.
@@ -42,7 +37,7 @@ class BackendConfigEstArgs:
42
37
  :param pulumi.Input[str] default_path_policy: Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
43
38
  :param pulumi.Input[bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
44
39
  :param pulumi.Input[bool] enabled: Specifies whether EST is enabled.
45
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
40
+ :param pulumi.Input[Mapping[str, Any]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
46
41
  :param pulumi.Input[str] namespace: The namespace of the target resource.
47
42
  The value should not contain leading or trailing forward slashes.
48
43
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -155,14 +150,14 @@ class BackendConfigEstArgs:
155
150
 
156
151
  @property
157
152
  @pulumi.getter(name="labelToPathPolicy")
158
- def label_to_path_policy(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
153
+ def label_to_path_policy(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
159
154
  """
160
155
  Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
161
156
  """
162
157
  return pulumi.get(self, "label_to_path_policy")
163
158
 
164
159
  @label_to_path_policy.setter
165
- def label_to_path_policy(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
160
+ def label_to_path_policy(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
166
161
  pulumi.set(self, "label_to_path_policy", value)
167
162
 
168
163
  @property
@@ -191,7 +186,7 @@ class _BackendConfigEstState:
191
186
  default_path_policy: Optional[pulumi.Input[str]] = None,
192
187
  enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
193
188
  enabled: Optional[pulumi.Input[bool]] = None,
194
- label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
189
+ label_to_path_policy: Optional[pulumi.Input[Mapping[str, Any]]] = None,
195
190
  last_updated: Optional[pulumi.Input[str]] = None,
196
191
  namespace: Optional[pulumi.Input[str]] = None):
197
192
  """
@@ -206,7 +201,7 @@ class _BackendConfigEstState:
206
201
  :param pulumi.Input[str] default_path_policy: Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
207
202
  :param pulumi.Input[bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
208
203
  :param pulumi.Input[bool] enabled: Specifies whether EST is enabled.
209
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
204
+ :param pulumi.Input[Mapping[str, Any]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
210
205
  :param pulumi.Input[str] last_updated: A read-only timestamp representing the last time the configuration was updated.
211
206
  :param pulumi.Input[str] namespace: The namespace of the target resource.
212
207
  The value should not contain leading or trailing forward slashes.
@@ -323,14 +318,14 @@ class _BackendConfigEstState:
323
318
 
324
319
  @property
325
320
  @pulumi.getter(name="labelToPathPolicy")
326
- def label_to_path_policy(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
321
+ def label_to_path_policy(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
327
322
  """
328
323
  Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
329
324
  """
330
325
  return pulumi.get(self, "label_to_path_policy")
331
326
 
332
327
  @label_to_path_policy.setter
333
- def label_to_path_policy(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
328
+ def label_to_path_policy(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
334
329
  pulumi.set(self, "label_to_path_policy", value)
335
330
 
336
331
  @property
@@ -373,7 +368,7 @@ class BackendConfigEst(pulumi.CustomResource):
373
368
  default_path_policy: Optional[pulumi.Input[str]] = None,
374
369
  enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
375
370
  enabled: Optional[pulumi.Input[bool]] = None,
376
- label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
371
+ label_to_path_policy: Optional[pulumi.Input[Mapping[str, Any]]] = None,
377
372
  namespace: Optional[pulumi.Input[str]] = None,
378
373
  __props__=None):
379
374
  """
@@ -401,7 +396,7 @@ class BackendConfigEst(pulumi.CustomResource):
401
396
  :param pulumi.Input[str] default_path_policy: Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
402
397
  :param pulumi.Input[bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
403
398
  :param pulumi.Input[bool] enabled: Specifies whether EST is enabled.
404
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
399
+ :param pulumi.Input[Mapping[str, Any]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
405
400
  :param pulumi.Input[str] namespace: The namespace of the target resource.
406
401
  The value should not contain leading or trailing forward slashes.
407
402
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -448,7 +443,7 @@ class BackendConfigEst(pulumi.CustomResource):
448
443
  default_path_policy: Optional[pulumi.Input[str]] = None,
449
444
  enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
450
445
  enabled: Optional[pulumi.Input[bool]] = None,
451
- label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
446
+ label_to_path_policy: Optional[pulumi.Input[Mapping[str, Any]]] = None,
452
447
  namespace: Optional[pulumi.Input[str]] = None,
453
448
  __props__=None):
454
449
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
@@ -488,7 +483,7 @@ class BackendConfigEst(pulumi.CustomResource):
488
483
  default_path_policy: Optional[pulumi.Input[str]] = None,
489
484
  enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
490
485
  enabled: Optional[pulumi.Input[bool]] = None,
491
- label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
486
+ label_to_path_policy: Optional[pulumi.Input[Mapping[str, Any]]] = None,
492
487
  last_updated: Optional[pulumi.Input[str]] = None,
493
488
  namespace: Optional[pulumi.Input[str]] = None) -> 'BackendConfigEst':
494
489
  """
@@ -508,7 +503,7 @@ class BackendConfigEst(pulumi.CustomResource):
508
503
  :param pulumi.Input[str] default_path_policy: Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
509
504
  :param pulumi.Input[bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
510
505
  :param pulumi.Input[bool] enabled: Specifies whether EST is enabled.
511
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
506
+ :param pulumi.Input[Mapping[str, Any]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
512
507
  :param pulumi.Input[str] last_updated: A read-only timestamp representing the last time the configuration was updated.
513
508
  :param pulumi.Input[str] namespace: The namespace of the target resource.
514
509
  The value should not contain leading or trailing forward slashes.
@@ -592,7 +587,7 @@ class BackendConfigEst(pulumi.CustomResource):
592
587
 
593
588
  @property
594
589
  @pulumi.getter(name="labelToPathPolicy")
595
- def label_to_path_policy(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
590
+ def label_to_path_policy(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
596
591
  """
597
592
  Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
598
593
  """
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
  from . import outputs
17
12
 
@@ -125,7 +120,7 @@ class GetBackendConfigEstResult:
125
120
 
126
121
  @property
127
122
  @pulumi.getter(name="labelToPathPolicy")
128
- def label_to_path_policy(self) -> Mapping[str, str]:
123
+ def label_to_path_policy(self) -> Mapping[str, Any]:
129
124
  """
130
125
  A pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
131
126
  """
@@ -207,6 +202,9 @@ def get_backend_config_est(backend: Optional[str] = None,
207
202
  label_to_path_policy=pulumi.get(__ret__, 'label_to_path_policy'),
208
203
  last_updated=pulumi.get(__ret__, 'last_updated'),
209
204
  namespace=pulumi.get(__ret__, 'namespace'))
205
+
206
+
207
+ @_utilities.lift_output_func(get_backend_config_est)
210
208
  def get_backend_config_est_output(backend: Optional[pulumi.Input[str]] = None,
211
209
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
212
210
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendConfigEstResult]:
@@ -232,20 +230,4 @@ def get_backend_config_est_output(backend: Optional[pulumi.Input[str]] = None,
232
230
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
233
231
  *Available only for Vault Enterprise*.
234
232
  """
235
- __args__ = dict()
236
- __args__['backend'] = backend
237
- __args__['namespace'] = namespace
238
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
239
- __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendConfigEst:getBackendConfigEst', __args__, opts=opts, typ=GetBackendConfigEstResult)
240
- return __ret__.apply(lambda __response__: GetBackendConfigEstResult(
241
- audit_fields=pulumi.get(__response__, 'audit_fields'),
242
- authenticators=pulumi.get(__response__, 'authenticators'),
243
- backend=pulumi.get(__response__, 'backend'),
244
- default_mount=pulumi.get(__response__, 'default_mount'),
245
- default_path_policy=pulumi.get(__response__, 'default_path_policy'),
246
- enable_sentinel_parsing=pulumi.get(__response__, 'enable_sentinel_parsing'),
247
- enabled=pulumi.get(__response__, 'enabled'),
248
- id=pulumi.get(__response__, 'id'),
249
- label_to_path_policy=pulumi.get(__response__, 'label_to_path_policy'),
250
- last_updated=pulumi.get(__response__, 'last_updated'),
251
- namespace=pulumi.get(__response__, 'namespace')))
233
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -227,6 +222,9 @@ def get_backend_issuer(backend: Optional[str] = None,
227
222
  manual_chains=pulumi.get(__ret__, 'manual_chains'),
228
223
  namespace=pulumi.get(__ret__, 'namespace'),
229
224
  usage=pulumi.get(__ret__, 'usage'))
225
+
226
+
227
+ @_utilities.lift_output_func(get_backend_issuer)
230
228
  def get_backend_issuer_output(backend: Optional[pulumi.Input[str]] = None,
231
229
  issuer_ref: Optional[pulumi.Input[str]] = None,
232
230
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
@@ -261,22 +259,4 @@ def get_backend_issuer_output(backend: Optional[pulumi.Input[str]] = None,
261
259
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
262
260
  *Available only for Vault Enterprise*.
263
261
  """
264
- __args__ = dict()
265
- __args__['backend'] = backend
266
- __args__['issuerRef'] = issuer_ref
267
- __args__['namespace'] = namespace
268
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
269
- __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendIssuer:getBackendIssuer', __args__, opts=opts, typ=GetBackendIssuerResult)
270
- return __ret__.apply(lambda __response__: GetBackendIssuerResult(
271
- backend=pulumi.get(__response__, 'backend'),
272
- ca_chains=pulumi.get(__response__, 'ca_chains'),
273
- certificate=pulumi.get(__response__, 'certificate'),
274
- id=pulumi.get(__response__, 'id'),
275
- issuer_id=pulumi.get(__response__, 'issuer_id'),
276
- issuer_name=pulumi.get(__response__, 'issuer_name'),
277
- issuer_ref=pulumi.get(__response__, 'issuer_ref'),
278
- key_id=pulumi.get(__response__, 'key_id'),
279
- leaf_not_after_behavior=pulumi.get(__response__, 'leaf_not_after_behavior'),
280
- manual_chains=pulumi.get(__response__, 'manual_chains'),
281
- namespace=pulumi.get(__response__, 'namespace'),
282
- usage=pulumi.get(__response__, 'usage')))
262
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -61,7 +56,7 @@ class GetBackendIssuersResult:
61
56
 
62
57
  @property
63
58
  @pulumi.getter(name="keyInfo")
64
- def key_info(self) -> Mapping[str, str]:
59
+ def key_info(self) -> Mapping[str, Any]:
65
60
  """
66
61
  Map of issuer strings read from Vault.
67
62
  """
@@ -147,6 +142,9 @@ def get_backend_issuers(backend: Optional[str] = None,
147
142
  key_info_json=pulumi.get(__ret__, 'key_info_json'),
148
143
  keys=pulumi.get(__ret__, 'keys'),
149
144
  namespace=pulumi.get(__ret__, 'namespace'))
145
+
146
+
147
+ @_utilities.lift_output_func(get_backend_issuers)
150
148
  def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None,
151
149
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
152
150
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendIssuersResult]:
@@ -178,15 +176,4 @@ def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None,
178
176
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
179
177
  *Available only for Vault Enterprise*.
180
178
  """
181
- __args__ = dict()
182
- __args__['backend'] = backend
183
- __args__['namespace'] = namespace
184
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
185
- __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendIssuers:getBackendIssuers', __args__, opts=opts, typ=GetBackendIssuersResult)
186
- return __ret__.apply(lambda __response__: GetBackendIssuersResult(
187
- backend=pulumi.get(__response__, 'backend'),
188
- id=pulumi.get(__response__, 'id'),
189
- key_info=pulumi.get(__response__, 'key_info'),
190
- key_info_json=pulumi.get(__response__, 'key_info_json'),
191
- keys=pulumi.get(__response__, 'keys'),
192
- namespace=pulumi.get(__response__, 'namespace')))
179
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -161,6 +156,9 @@ def get_backend_key(backend: Optional[str] = None,
161
156
  key_ref=pulumi.get(__ret__, 'key_ref'),
162
157
  key_type=pulumi.get(__ret__, 'key_type'),
163
158
  namespace=pulumi.get(__ret__, 'namespace'))
159
+
160
+
161
+ @_utilities.lift_output_func(get_backend_key)
164
162
  def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
165
163
  key_ref: Optional[pulumi.Input[str]] = None,
166
164
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
@@ -195,17 +193,4 @@ def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
195
193
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
196
194
  *Available only for Vault Enterprise*.
197
195
  """
198
- __args__ = dict()
199
- __args__['backend'] = backend
200
- __args__['keyRef'] = key_ref
201
- __args__['namespace'] = namespace
202
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
203
- __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendKey:getBackendKey', __args__, opts=opts, typ=GetBackendKeyResult)
204
- return __ret__.apply(lambda __response__: GetBackendKeyResult(
205
- backend=pulumi.get(__response__, 'backend'),
206
- id=pulumi.get(__response__, 'id'),
207
- key_id=pulumi.get(__response__, 'key_id'),
208
- key_name=pulumi.get(__response__, 'key_name'),
209
- key_ref=pulumi.get(__response__, 'key_ref'),
210
- key_type=pulumi.get(__response__, 'key_type'),
211
- namespace=pulumi.get(__response__, 'namespace')))
196
+ ...