pulumi-vault 6.3.2a1729803197__py3-none-any.whl → 6.4.0a1723454543__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +0 -560
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +4 -19
  4. pulumi_vault/ad/secret_backend.py +0 -5
  5. pulumi_vault/ad/secret_library.py +0 -5
  6. pulumi_vault/ad/secret_role.py +0 -5
  7. pulumi_vault/alicloud/auth_backend_role.py +0 -5
  8. pulumi_vault/approle/auth_backend_login.py +0 -5
  9. pulumi_vault/approle/auth_backend_role.py +0 -5
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -5
  11. pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
  12. pulumi_vault/audit.py +0 -5
  13. pulumi_vault/audit_request_header.py +0 -5
  14. pulumi_vault/auth_backend.py +0 -5
  15. pulumi_vault/aws/auth_backend_cert.py +0 -5
  16. pulumi_vault/aws/auth_backend_client.py +0 -5
  17. pulumi_vault/aws/auth_backend_config_identity.py +0 -5
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
  19. pulumi_vault/aws/auth_backend_login.py +7 -12
  20. pulumi_vault/aws/auth_backend_role.py +0 -5
  21. pulumi_vault/aws/auth_backend_role_tag.py +0 -5
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
  23. pulumi_vault/aws/auth_backend_sts_role.py +0 -5
  24. pulumi_vault/aws/get_access_credentials.py +4 -31
  25. pulumi_vault/aws/get_static_access_credentials.py +4 -18
  26. pulumi_vault/aws/secret_backend.py +0 -5
  27. pulumi_vault/aws/secret_backend_role.py +0 -5
  28. pulumi_vault/aws/secret_backend_static_role.py +0 -5
  29. pulumi_vault/azure/_inputs.py +0 -24
  30. pulumi_vault/azure/auth_backend_config.py +0 -5
  31. pulumi_vault/azure/auth_backend_role.py +0 -5
  32. pulumi_vault/azure/backend.py +0 -5
  33. pulumi_vault/azure/backend_role.py +0 -5
  34. pulumi_vault/azure/get_access_credentials.py +4 -36
  35. pulumi_vault/azure/outputs.py +0 -5
  36. pulumi_vault/cert_auth_backend_role.py +0 -5
  37. pulumi_vault/config/__init__.pyi +0 -5
  38. pulumi_vault/config/_inputs.py +0 -21
  39. pulumi_vault/config/outputs.py +0 -5
  40. pulumi_vault/config/ui_custom_message.py +14 -19
  41. pulumi_vault/config/vars.py +0 -5
  42. pulumi_vault/consul/secret_backend.py +0 -5
  43. pulumi_vault/consul/secret_backend_role.py +0 -5
  44. pulumi_vault/database/_inputs.py +105 -2056
  45. pulumi_vault/database/outputs.py +54 -59
  46. pulumi_vault/database/secret_backend_connection.py +14 -19
  47. pulumi_vault/database/secret_backend_role.py +14 -19
  48. pulumi_vault/database/secret_backend_static_role.py +0 -5
  49. pulumi_vault/database/secrets_mount.py +14 -19
  50. pulumi_vault/egp_policy.py +0 -5
  51. pulumi_vault/gcp/_inputs.py +0 -111
  52. pulumi_vault/gcp/auth_backend.py +0 -5
  53. pulumi_vault/gcp/auth_backend_role.py +0 -5
  54. pulumi_vault/gcp/get_auth_backend_role.py +4 -42
  55. pulumi_vault/gcp/outputs.py +0 -5
  56. pulumi_vault/gcp/secret_backend.py +0 -5
  57. pulumi_vault/gcp/secret_impersonated_account.py +0 -5
  58. pulumi_vault/gcp/secret_roleset.py +0 -5
  59. pulumi_vault/gcp/secret_static_account.py +0 -5
  60. pulumi_vault/generic/endpoint.py +0 -5
  61. pulumi_vault/generic/get_secret.py +5 -25
  62. pulumi_vault/generic/secret.py +7 -12
  63. pulumi_vault/get_auth_backend.py +4 -21
  64. pulumi_vault/get_auth_backends.py +4 -16
  65. pulumi_vault/get_namespace.py +5 -18
  66. pulumi_vault/get_namespaces.py +4 -13
  67. pulumi_vault/get_nomad_access_token.py +8 -28
  68. pulumi_vault/get_policy_document.py +4 -15
  69. pulumi_vault/get_raft_autopilot_state.py +7 -26
  70. pulumi_vault/github/_inputs.py +0 -55
  71. pulumi_vault/github/auth_backend.py +0 -5
  72. pulumi_vault/github/outputs.py +0 -5
  73. pulumi_vault/github/team.py +0 -5
  74. pulumi_vault/github/user.py +0 -5
  75. pulumi_vault/identity/entity.py +0 -5
  76. pulumi_vault/identity/entity_alias.py +0 -5
  77. pulumi_vault/identity/entity_policies.py +0 -5
  78. pulumi_vault/identity/get_entity.py +5 -35
  79. pulumi_vault/identity/get_group.py +6 -42
  80. pulumi_vault/identity/get_oidc_client_creds.py +4 -16
  81. pulumi_vault/identity/get_oidc_openid_config.py +4 -26
  82. pulumi_vault/identity/get_oidc_public_keys.py +5 -16
  83. pulumi_vault/identity/group.py +0 -5
  84. pulumi_vault/identity/group_alias.py +0 -5
  85. pulumi_vault/identity/group_member_entity_ids.py +0 -5
  86. pulumi_vault/identity/group_member_group_ids.py +0 -5
  87. pulumi_vault/identity/group_policies.py +0 -5
  88. pulumi_vault/identity/mfa_duo.py +0 -5
  89. pulumi_vault/identity/mfa_login_enforcement.py +0 -5
  90. pulumi_vault/identity/mfa_okta.py +0 -5
  91. pulumi_vault/identity/mfa_pingid.py +0 -5
  92. pulumi_vault/identity/mfa_totp.py +0 -5
  93. pulumi_vault/identity/oidc.py +0 -5
  94. pulumi_vault/identity/oidc_assignment.py +0 -5
  95. pulumi_vault/identity/oidc_client.py +0 -5
  96. pulumi_vault/identity/oidc_key.py +0 -5
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
  98. pulumi_vault/identity/oidc_provider.py +0 -5
  99. pulumi_vault/identity/oidc_role.py +0 -5
  100. pulumi_vault/identity/oidc_scope.py +0 -5
  101. pulumi_vault/identity/outputs.py +3 -8
  102. pulumi_vault/jwt/_inputs.py +0 -55
  103. pulumi_vault/jwt/auth_backend.py +0 -5
  104. pulumi_vault/jwt/auth_backend_role.py +28 -33
  105. pulumi_vault/jwt/outputs.py +0 -5
  106. pulumi_vault/kmip/secret_backend.py +0 -5
  107. pulumi_vault/kmip/secret_role.py +0 -5
  108. pulumi_vault/kmip/secret_scope.py +0 -5
  109. pulumi_vault/kubernetes/auth_backend_config.py +0 -5
  110. pulumi_vault/kubernetes/auth_backend_role.py +0 -5
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +4 -26
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
  113. pulumi_vault/kubernetes/get_service_account_token.py +4 -28
  114. pulumi_vault/kubernetes/secret_backend.py +14 -19
  115. pulumi_vault/kubernetes/secret_backend_role.py +0 -5
  116. pulumi_vault/kv/_inputs.py +4 -36
  117. pulumi_vault/kv/get_secret.py +5 -20
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +5 -24
  119. pulumi_vault/kv/get_secret_v2.py +6 -27
  120. pulumi_vault/kv/get_secrets_list.py +4 -15
  121. pulumi_vault/kv/get_secrets_list_v2.py +4 -18
  122. pulumi_vault/kv/outputs.py +3 -8
  123. pulumi_vault/kv/secret.py +7 -12
  124. pulumi_vault/kv/secret_backend_v2.py +0 -5
  125. pulumi_vault/kv/secret_v2.py +28 -33
  126. pulumi_vault/ldap/auth_backend.py +0 -5
  127. pulumi_vault/ldap/auth_backend_group.py +0 -5
  128. pulumi_vault/ldap/auth_backend_user.py +0 -5
  129. pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
  130. pulumi_vault/ldap/get_static_credentials.py +4 -23
  131. pulumi_vault/ldap/secret_backend.py +14 -19
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
  133. pulumi_vault/ldap/secret_backend_library_set.py +0 -5
  134. pulumi_vault/ldap/secret_backend_static_role.py +0 -5
  135. pulumi_vault/managed/_inputs.py +0 -205
  136. pulumi_vault/managed/keys.py +0 -5
  137. pulumi_vault/managed/outputs.py +0 -5
  138. pulumi_vault/mfa_duo.py +0 -5
  139. pulumi_vault/mfa_okta.py +0 -5
  140. pulumi_vault/mfa_pingid.py +0 -5
  141. pulumi_vault/mfa_totp.py +0 -5
  142. pulumi_vault/mongodbatlas/secret_backend.py +0 -5
  143. pulumi_vault/mongodbatlas/secret_role.py +0 -5
  144. pulumi_vault/mount.py +16 -21
  145. pulumi_vault/namespace.py +14 -19
  146. pulumi_vault/nomad_secret_backend.py +0 -5
  147. pulumi_vault/nomad_secret_role.py +0 -5
  148. pulumi_vault/okta/_inputs.py +0 -39
  149. pulumi_vault/okta/auth_backend.py +0 -5
  150. pulumi_vault/okta/auth_backend_group.py +0 -5
  151. pulumi_vault/okta/auth_backend_user.py +0 -5
  152. pulumi_vault/okta/outputs.py +0 -5
  153. pulumi_vault/outputs.py +0 -5
  154. pulumi_vault/password_policy.py +0 -5
  155. pulumi_vault/pkisecret/_inputs.py +8 -49
  156. pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
  157. pulumi_vault/pkisecret/backend_config_est.py +14 -19
  158. pulumi_vault/pkisecret/get_backend_config_est.py +5 -23
  159. pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
  160. pulumi_vault/pkisecret/get_backend_issuers.py +5 -18
  161. pulumi_vault/pkisecret/get_backend_key.py +4 -19
  162. pulumi_vault/pkisecret/get_backend_keys.py +5 -18
  163. pulumi_vault/pkisecret/outputs.py +12 -17
  164. pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
  172. pulumi_vault/pkisecret/secret_backend_key.py +0 -5
  173. pulumi_vault/pkisecret/secret_backend_role.py +0 -5
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
  176. pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
  177. pulumi_vault/plugin.py +0 -5
  178. pulumi_vault/plugin_pinned_version.py +0 -5
  179. pulumi_vault/policy.py +0 -5
  180. pulumi_vault/provider.py +0 -5
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +0 -5
  183. pulumi_vault/quota_rate_limit.py +0 -5
  184. pulumi_vault/rabbitmq/_inputs.py +0 -61
  185. pulumi_vault/rabbitmq/outputs.py +0 -5
  186. pulumi_vault/rabbitmq/secret_backend.py +0 -5
  187. pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
  188. pulumi_vault/raft_autopilot.py +0 -5
  189. pulumi_vault/raft_snapshot_agent_config.py +0 -5
  190. pulumi_vault/rgp_policy.py +0 -5
  191. pulumi_vault/saml/auth_backend.py +0 -5
  192. pulumi_vault/saml/auth_backend_role.py +14 -19
  193. pulumi_vault/secrets/_inputs.py +0 -30
  194. pulumi_vault/secrets/outputs.py +0 -5
  195. pulumi_vault/secrets/sync_association.py +0 -5
  196. pulumi_vault/secrets/sync_aws_destination.py +14 -19
  197. pulumi_vault/secrets/sync_azure_destination.py +14 -19
  198. pulumi_vault/secrets/sync_config.py +0 -5
  199. pulumi_vault/secrets/sync_gcp_destination.py +14 -19
  200. pulumi_vault/secrets/sync_gh_destination.py +0 -5
  201. pulumi_vault/secrets/sync_github_apps.py +0 -5
  202. pulumi_vault/secrets/sync_vercel_destination.py +0 -5
  203. pulumi_vault/ssh/_inputs.py +0 -22
  204. pulumi_vault/ssh/outputs.py +0 -5
  205. pulumi_vault/ssh/secret_backend_ca.py +0 -5
  206. pulumi_vault/ssh/secret_backend_role.py +28 -33
  207. pulumi_vault/terraformcloud/secret_backend.py +0 -5
  208. pulumi_vault/terraformcloud/secret_creds.py +0 -5
  209. pulumi_vault/terraformcloud/secret_role.py +0 -5
  210. pulumi_vault/token.py +0 -5
  211. pulumi_vault/tokenauth/auth_backend_role.py +14 -5
  212. pulumi_vault/transform/alphabet.py +0 -5
  213. pulumi_vault/transform/get_decode.py +14 -38
  214. pulumi_vault/transform/get_encode.py +14 -38
  215. pulumi_vault/transform/role.py +0 -5
  216. pulumi_vault/transform/template.py +14 -19
  217. pulumi_vault/transform/transformation.py +0 -5
  218. pulumi_vault/transit/get_decrypt.py +4 -21
  219. pulumi_vault/transit/get_encrypt.py +4 -23
  220. pulumi_vault/transit/secret_backend_key.py +7 -12
  221. pulumi_vault/transit/secret_cache_config.py +0 -5
  222. {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/METADATA +2 -3
  223. pulumi_vault-6.4.0a1723454543.dist-info/RECORD +256 -0
  224. {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/WHEEL +1 -1
  225. pulumi_vault-6.3.2a1729803197.dist-info/RECORD +0 -256
  226. {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/top_level.txt +0 -0
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SyncGithubAppsArgs', 'SyncGithubApps']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SyncVercelDestinationArgs', 'SyncVercelDestination']
@@ -4,37 +4,15 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
18
13
  'SecretBackendRoleAllowedUserKeyConfigArgs',
19
- 'SecretBackendRoleAllowedUserKeyConfigArgsDict',
20
14
  ]
21
15
 
22
- MYPY = False
23
-
24
- if not MYPY:
25
- class SecretBackendRoleAllowedUserKeyConfigArgsDict(TypedDict):
26
- lengths: pulumi.Input[Sequence[pulumi.Input[int]]]
27
- """
28
- List of allowed key lengths, vault-1.10 and above
29
- """
30
- type: pulumi.Input[str]
31
- """
32
- Key type, choices:
33
- rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
34
- """
35
- elif False:
36
- SecretBackendRoleAllowedUserKeyConfigArgsDict: TypeAlias = Mapping[str, Any]
37
-
38
16
  @pulumi.input_type
39
17
  class SecretBackendRoleAllowedUserKeyConfigArgs:
40
18
  def __init__(__self__, *,
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretBackendCaArgs', 'SecretBackendCa']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
  from . import outputs
17
12
  from ._inputs import *
@@ -37,8 +32,8 @@ class SecretBackendRoleArgs:
37
32
  allowed_users: Optional[pulumi.Input[str]] = None,
38
33
  allowed_users_template: Optional[pulumi.Input[bool]] = None,
39
34
  cidr_list: Optional[pulumi.Input[str]] = None,
40
- default_critical_options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
41
- default_extensions: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
35
+ default_critical_options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
36
+ default_extensions: Optional[pulumi.Input[Mapping[str, Any]]] = None,
42
37
  default_user: Optional[pulumi.Input[str]] = None,
43
38
  default_user_template: Optional[pulumi.Input[bool]] = None,
44
39
  key_id_format: Optional[pulumi.Input[str]] = None,
@@ -68,8 +63,8 @@ class SecretBackendRoleArgs:
68
63
  :param pulumi.Input[str] allowed_users: Specifies a comma-separated list of usernames that are to be allowed, only if certain usernames are to be allowed.
69
64
  :param pulumi.Input[bool] allowed_users_template: Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
70
65
  :param pulumi.Input[str] cidr_list: The comma-separated string of CIDR blocks for which this role is applicable.
71
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] default_critical_options: Specifies a map of critical options that certificates have when signed.
72
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] default_extensions: Specifies a map of extensions that certificates have when signed.
66
+ :param pulumi.Input[Mapping[str, Any]] default_critical_options: Specifies a map of critical options that certificates have when signed.
67
+ :param pulumi.Input[Mapping[str, Any]] default_extensions: Specifies a map of extensions that certificates have when signed.
73
68
  :param pulumi.Input[str] default_user: Specifies the default username for which a credential will be generated.
74
69
  :param pulumi.Input[bool] default_user_template: If set, `default_users` can be specified using identity template values. A non-templated user is also permitted.
75
70
  :param pulumi.Input[str] key_id_format: Specifies a custom format for the key id of a signed certificate.
@@ -330,26 +325,26 @@ class SecretBackendRoleArgs:
330
325
 
331
326
  @property
332
327
  @pulumi.getter(name="defaultCriticalOptions")
333
- def default_critical_options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
328
+ def default_critical_options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
334
329
  """
335
330
  Specifies a map of critical options that certificates have when signed.
336
331
  """
337
332
  return pulumi.get(self, "default_critical_options")
338
333
 
339
334
  @default_critical_options.setter
340
- def default_critical_options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
335
+ def default_critical_options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
341
336
  pulumi.set(self, "default_critical_options", value)
342
337
 
343
338
  @property
344
339
  @pulumi.getter(name="defaultExtensions")
345
- def default_extensions(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
340
+ def default_extensions(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
346
341
  """
347
342
  Specifies a map of extensions that certificates have when signed.
348
343
  """
349
344
  return pulumi.get(self, "default_extensions")
350
345
 
351
346
  @default_extensions.setter
352
- def default_extensions(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
347
+ def default_extensions(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
353
348
  pulumi.set(self, "default_extensions", value)
354
349
 
355
350
  @property
@@ -470,8 +465,8 @@ class _SecretBackendRoleState:
470
465
  allowed_users_template: Optional[pulumi.Input[bool]] = None,
471
466
  backend: Optional[pulumi.Input[str]] = None,
472
467
  cidr_list: Optional[pulumi.Input[str]] = None,
473
- default_critical_options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
474
- default_extensions: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
468
+ default_critical_options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
469
+ default_extensions: Optional[pulumi.Input[Mapping[str, Any]]] = None,
475
470
  default_user: Optional[pulumi.Input[str]] = None,
476
471
  default_user_template: Optional[pulumi.Input[bool]] = None,
477
472
  key_id_format: Optional[pulumi.Input[str]] = None,
@@ -501,8 +496,8 @@ class _SecretBackendRoleState:
501
496
  :param pulumi.Input[bool] allowed_users_template: Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
502
497
  :param pulumi.Input[str] backend: The path where the SSH secret backend is mounted.
503
498
  :param pulumi.Input[str] cidr_list: The comma-separated string of CIDR blocks for which this role is applicable.
504
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] default_critical_options: Specifies a map of critical options that certificates have when signed.
505
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] default_extensions: Specifies a map of extensions that certificates have when signed.
499
+ :param pulumi.Input[Mapping[str, Any]] default_critical_options: Specifies a map of critical options that certificates have when signed.
500
+ :param pulumi.Input[Mapping[str, Any]] default_extensions: Specifies a map of extensions that certificates have when signed.
506
501
  :param pulumi.Input[str] default_user: Specifies the default username for which a credential will be generated.
507
502
  :param pulumi.Input[bool] default_user_template: If set, `default_users` can be specified using identity template values. A non-templated user is also permitted.
508
503
  :param pulumi.Input[str] key_id_format: Specifies a custom format for the key id of a signed certificate.
@@ -754,26 +749,26 @@ class _SecretBackendRoleState:
754
749
 
755
750
  @property
756
751
  @pulumi.getter(name="defaultCriticalOptions")
757
- def default_critical_options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
752
+ def default_critical_options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
758
753
  """
759
754
  Specifies a map of critical options that certificates have when signed.
760
755
  """
761
756
  return pulumi.get(self, "default_critical_options")
762
757
 
763
758
  @default_critical_options.setter
764
- def default_critical_options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
759
+ def default_critical_options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
765
760
  pulumi.set(self, "default_critical_options", value)
766
761
 
767
762
  @property
768
763
  @pulumi.getter(name="defaultExtensions")
769
- def default_extensions(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
764
+ def default_extensions(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
770
765
  """
771
766
  Specifies a map of extensions that certificates have when signed.
772
767
  """
773
768
  return pulumi.get(self, "default_extensions")
774
769
 
775
770
  @default_extensions.setter
776
- def default_extensions(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
771
+ def default_extensions(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
777
772
  pulumi.set(self, "default_extensions", value)
778
773
 
779
774
  @property
@@ -908,8 +903,8 @@ class SecretBackendRole(pulumi.CustomResource):
908
903
  allowed_users_template: Optional[pulumi.Input[bool]] = None,
909
904
  backend: Optional[pulumi.Input[str]] = None,
910
905
  cidr_list: Optional[pulumi.Input[str]] = None,
911
- default_critical_options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
912
- default_extensions: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
906
+ default_critical_options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
907
+ default_extensions: Optional[pulumi.Input[Mapping[str, Any]]] = None,
913
908
  default_user: Optional[pulumi.Input[str]] = None,
914
909
  default_user_template: Optional[pulumi.Input[bool]] = None,
915
910
  key_id_format: Optional[pulumi.Input[str]] = None,
@@ -973,8 +968,8 @@ class SecretBackendRole(pulumi.CustomResource):
973
968
  :param pulumi.Input[bool] allowed_users_template: Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
974
969
  :param pulumi.Input[str] backend: The path where the SSH secret backend is mounted.
975
970
  :param pulumi.Input[str] cidr_list: The comma-separated string of CIDR blocks for which this role is applicable.
976
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] default_critical_options: Specifies a map of critical options that certificates have when signed.
977
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] default_extensions: Specifies a map of extensions that certificates have when signed.
971
+ :param pulumi.Input[Mapping[str, Any]] default_critical_options: Specifies a map of critical options that certificates have when signed.
972
+ :param pulumi.Input[Mapping[str, Any]] default_extensions: Specifies a map of extensions that certificates have when signed.
978
973
  :param pulumi.Input[str] default_user: Specifies the default username for which a credential will be generated.
979
974
  :param pulumi.Input[bool] default_user_template: If set, `default_users` can be specified using identity template values. A non-templated user is also permitted.
980
975
  :param pulumi.Input[str] key_id_format: Specifies a custom format for the key id of a signed certificate.
@@ -1057,8 +1052,8 @@ class SecretBackendRole(pulumi.CustomResource):
1057
1052
  allowed_users_template: Optional[pulumi.Input[bool]] = None,
1058
1053
  backend: Optional[pulumi.Input[str]] = None,
1059
1054
  cidr_list: Optional[pulumi.Input[str]] = None,
1060
- default_critical_options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1061
- default_extensions: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1055
+ default_critical_options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1056
+ default_extensions: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1062
1057
  default_user: Optional[pulumi.Input[str]] = None,
1063
1058
  default_user_template: Optional[pulumi.Input[bool]] = None,
1064
1059
  key_id_format: Optional[pulumi.Input[str]] = None,
@@ -1132,8 +1127,8 @@ class SecretBackendRole(pulumi.CustomResource):
1132
1127
  allowed_users_template: Optional[pulumi.Input[bool]] = None,
1133
1128
  backend: Optional[pulumi.Input[str]] = None,
1134
1129
  cidr_list: Optional[pulumi.Input[str]] = None,
1135
- default_critical_options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1136
- default_extensions: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1130
+ default_critical_options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1131
+ default_extensions: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1137
1132
  default_user: Optional[pulumi.Input[str]] = None,
1138
1133
  default_user_template: Optional[pulumi.Input[bool]] = None,
1139
1134
  key_id_format: Optional[pulumi.Input[str]] = None,
@@ -1168,8 +1163,8 @@ class SecretBackendRole(pulumi.CustomResource):
1168
1163
  :param pulumi.Input[bool] allowed_users_template: Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
1169
1164
  :param pulumi.Input[str] backend: The path where the SSH secret backend is mounted.
1170
1165
  :param pulumi.Input[str] cidr_list: The comma-separated string of CIDR blocks for which this role is applicable.
1171
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] default_critical_options: Specifies a map of critical options that certificates have when signed.
1172
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] default_extensions: Specifies a map of extensions that certificates have when signed.
1166
+ :param pulumi.Input[Mapping[str, Any]] default_critical_options: Specifies a map of critical options that certificates have when signed.
1167
+ :param pulumi.Input[Mapping[str, Any]] default_extensions: Specifies a map of extensions that certificates have when signed.
1173
1168
  :param pulumi.Input[str] default_user: Specifies the default username for which a credential will be generated.
1174
1169
  :param pulumi.Input[bool] default_user_template: If set, `default_users` can be specified using identity template values. A non-templated user is also permitted.
1175
1170
  :param pulumi.Input[str] key_id_format: Specifies a custom format for the key id of a signed certificate.
@@ -1340,7 +1335,7 @@ class SecretBackendRole(pulumi.CustomResource):
1340
1335
 
1341
1336
  @property
1342
1337
  @pulumi.getter(name="defaultCriticalOptions")
1343
- def default_critical_options(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
1338
+ def default_critical_options(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
1344
1339
  """
1345
1340
  Specifies a map of critical options that certificates have when signed.
1346
1341
  """
@@ -1348,7 +1343,7 @@ class SecretBackendRole(pulumi.CustomResource):
1348
1343
 
1349
1344
  @property
1350
1345
  @pulumi.getter(name="defaultExtensions")
1351
- def default_extensions(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
1346
+ def default_extensions(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
1352
1347
  """
1353
1348
  Specifies a map of extensions that certificates have when signed.
1354
1349
  """
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretBackendArgs', 'SecretBackend']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretCredsArgs', 'SecretCreds']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretRoleArgs', 'SecretRole']
pulumi_vault/token.py CHANGED
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
 
17
12
  __all__ = ['TokenArgs', 'Token']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
@@ -52,6 +47,8 @@ class AuthBackendRoleArgs:
52
47
  *Available only for Vault Enterprise*.
53
48
  :param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
54
49
  :param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
50
+
51
+ > Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
55
52
  :param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
56
53
  :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
57
54
  :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
@@ -205,6 +202,8 @@ class AuthBackendRoleArgs:
205
202
  def path_suffix(self) -> Optional[pulumi.Input[str]]:
206
203
  """
207
204
  Tokens created against this role will have the given suffix as part of their path in addition to the role name.
205
+
206
+ > Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
208
207
  """
209
208
  return pulumi.get(self, "path_suffix")
210
209
 
@@ -368,6 +367,8 @@ class _AuthBackendRoleState:
368
367
  *Available only for Vault Enterprise*.
369
368
  :param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
370
369
  :param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
370
+
371
+ > Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
371
372
  :param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
372
373
  :param pulumi.Input[str] role_name: The name of the role.
373
374
  :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
@@ -511,6 +512,8 @@ class _AuthBackendRoleState:
511
512
  def path_suffix(self) -> Optional[pulumi.Input[str]]:
512
513
  """
513
514
  Tokens created against this role will have the given suffix as part of their path in addition to the role name.
515
+
516
+ > Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
514
517
  """
515
518
  return pulumi.get(self, "path_suffix")
516
519
 
@@ -723,6 +726,8 @@ class AuthBackendRole(pulumi.CustomResource):
723
726
  *Available only for Vault Enterprise*.
724
727
  :param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
725
728
  :param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
729
+
730
+ > Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
726
731
  :param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
727
732
  :param pulumi.Input[str] role_name: The name of the role.
728
733
  :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
@@ -886,6 +891,8 @@ class AuthBackendRole(pulumi.CustomResource):
886
891
  *Available only for Vault Enterprise*.
887
892
  :param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
888
893
  :param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
894
+
895
+ > Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
889
896
  :param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
890
897
  :param pulumi.Input[str] role_name: The name of the role.
891
898
  :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
@@ -987,6 +994,8 @@ class AuthBackendRole(pulumi.CustomResource):
987
994
  def path_suffix(self) -> pulumi.Output[Optional[str]]:
988
995
  """
989
996
  Tokens created against this role will have the given suffix as part of their path in addition to the role name.
997
+
998
+ > Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
990
999
  """
991
1000
  return pulumi.get(self, "path_suffix")
992
1001
 
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['AlphabetArgs', 'Alphabet']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -60,12 +55,12 @@ class GetDecodeResult:
60
55
 
61
56
  @property
62
57
  @pulumi.getter(name="batchInputs")
63
- def batch_inputs(self) -> Optional[Sequence[Mapping[str, str]]]:
58
+ def batch_inputs(self) -> Optional[Sequence[Mapping[str, Any]]]:
64
59
  return pulumi.get(self, "batch_inputs")
65
60
 
66
61
  @property
67
62
  @pulumi.getter(name="batchResults")
68
- def batch_results(self) -> Sequence[Mapping[str, str]]:
63
+ def batch_results(self) -> Sequence[Mapping[str, Any]]:
69
64
  return pulumi.get(self, "batch_results")
70
65
 
71
66
  @property
@@ -130,8 +125,8 @@ class AwaitableGetDecodeResult(GetDecodeResult):
130
125
  value=self.value)
131
126
 
132
127
 
133
- def get_decode(batch_inputs: Optional[Sequence[Mapping[str, str]]] = None,
134
- batch_results: Optional[Sequence[Mapping[str, str]]] = None,
128
+ def get_decode(batch_inputs: Optional[Sequence[Mapping[str, Any]]] = None,
129
+ batch_results: Optional[Sequence[Mapping[str, Any]]] = None,
135
130
  decoded_value: Optional[str] = None,
136
131
  namespace: Optional[str] = None,
137
132
  path: Optional[str] = None,
@@ -171,8 +166,8 @@ def get_decode(batch_inputs: Optional[Sequence[Mapping[str, str]]] = None,
171
166
  ```
172
167
 
173
168
 
174
- :param Sequence[Mapping[str, str]] batch_inputs: Specifies a list of items to be decoded in a single batch. If this parameter is set, the top-level parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.
175
- :param Sequence[Mapping[str, str]] batch_results: The result of decoding a batch.
169
+ :param Sequence[Mapping[str, Any]] batch_inputs: Specifies a list of items to be decoded in a single batch. If this parameter is set, the top-level parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.
170
+ :param Sequence[Mapping[str, Any]] batch_results: The result of decoding a batch.
176
171
  :param str decoded_value: The result of decoding a value.
177
172
  :param str namespace: The namespace of the target resource.
178
173
  The value should not contain leading or trailing forward slashes.
@@ -208,8 +203,11 @@ def get_decode(batch_inputs: Optional[Sequence[Mapping[str, str]]] = None,
208
203
  transformation=pulumi.get(__ret__, 'transformation'),
209
204
  tweak=pulumi.get(__ret__, 'tweak'),
210
205
  value=pulumi.get(__ret__, 'value'))
211
- def get_decode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapping[str, str]]]]] = None,
212
- batch_results: Optional[pulumi.Input[Optional[Sequence[Mapping[str, str]]]]] = None,
206
+
207
+
208
+ @_utilities.lift_output_func(get_decode)
209
+ def get_decode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapping[str, Any]]]]] = None,
210
+ batch_results: Optional[pulumi.Input[Optional[Sequence[Mapping[str, Any]]]]] = None,
213
211
  decoded_value: Optional[pulumi.Input[Optional[str]]] = None,
214
212
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
215
213
  path: Optional[pulumi.Input[str]] = None,
@@ -249,8 +247,8 @@ def get_decode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
249
247
  ```
250
248
 
251
249
 
252
- :param Sequence[Mapping[str, str]] batch_inputs: Specifies a list of items to be decoded in a single batch. If this parameter is set, the top-level parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.
253
- :param Sequence[Mapping[str, str]] batch_results: The result of decoding a batch.
250
+ :param Sequence[Mapping[str, Any]] batch_inputs: Specifies a list of items to be decoded in a single batch. If this parameter is set, the top-level parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.
251
+ :param Sequence[Mapping[str, Any]] batch_results: The result of decoding a batch.
254
252
  :param str decoded_value: The result of decoding a value.
255
253
  :param str namespace: The namespace of the target resource.
256
254
  The value should not contain leading or trailing forward slashes.
@@ -262,26 +260,4 @@ def get_decode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
262
260
  :param str tweak: The tweak value to use. Only applicable for FPE transformations
263
261
  :param str value: The value in which to decode.
264
262
  """
265
- __args__ = dict()
266
- __args__['batchInputs'] = batch_inputs
267
- __args__['batchResults'] = batch_results
268
- __args__['decodedValue'] = decoded_value
269
- __args__['namespace'] = namespace
270
- __args__['path'] = path
271
- __args__['roleName'] = role_name
272
- __args__['transformation'] = transformation
273
- __args__['tweak'] = tweak
274
- __args__['value'] = value
275
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
276
- __ret__ = pulumi.runtime.invoke_output('vault:transform/getDecode:getDecode', __args__, opts=opts, typ=GetDecodeResult)
277
- return __ret__.apply(lambda __response__: GetDecodeResult(
278
- batch_inputs=pulumi.get(__response__, 'batch_inputs'),
279
- batch_results=pulumi.get(__response__, 'batch_results'),
280
- decoded_value=pulumi.get(__response__, 'decoded_value'),
281
- id=pulumi.get(__response__, 'id'),
282
- namespace=pulumi.get(__response__, 'namespace'),
283
- path=pulumi.get(__response__, 'path'),
284
- role_name=pulumi.get(__response__, 'role_name'),
285
- transformation=pulumi.get(__response__, 'transformation'),
286
- tweak=pulumi.get(__response__, 'tweak'),
287
- value=pulumi.get(__response__, 'value')))
263
+ ...