pulumi-vault 6.3.2a1729803197__py3-none-any.whl → 6.4.0a1723454543__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +0 -560
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +4 -19
  4. pulumi_vault/ad/secret_backend.py +0 -5
  5. pulumi_vault/ad/secret_library.py +0 -5
  6. pulumi_vault/ad/secret_role.py +0 -5
  7. pulumi_vault/alicloud/auth_backend_role.py +0 -5
  8. pulumi_vault/approle/auth_backend_login.py +0 -5
  9. pulumi_vault/approle/auth_backend_role.py +0 -5
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -5
  11. pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
  12. pulumi_vault/audit.py +0 -5
  13. pulumi_vault/audit_request_header.py +0 -5
  14. pulumi_vault/auth_backend.py +0 -5
  15. pulumi_vault/aws/auth_backend_cert.py +0 -5
  16. pulumi_vault/aws/auth_backend_client.py +0 -5
  17. pulumi_vault/aws/auth_backend_config_identity.py +0 -5
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
  19. pulumi_vault/aws/auth_backend_login.py +7 -12
  20. pulumi_vault/aws/auth_backend_role.py +0 -5
  21. pulumi_vault/aws/auth_backend_role_tag.py +0 -5
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
  23. pulumi_vault/aws/auth_backend_sts_role.py +0 -5
  24. pulumi_vault/aws/get_access_credentials.py +4 -31
  25. pulumi_vault/aws/get_static_access_credentials.py +4 -18
  26. pulumi_vault/aws/secret_backend.py +0 -5
  27. pulumi_vault/aws/secret_backend_role.py +0 -5
  28. pulumi_vault/aws/secret_backend_static_role.py +0 -5
  29. pulumi_vault/azure/_inputs.py +0 -24
  30. pulumi_vault/azure/auth_backend_config.py +0 -5
  31. pulumi_vault/azure/auth_backend_role.py +0 -5
  32. pulumi_vault/azure/backend.py +0 -5
  33. pulumi_vault/azure/backend_role.py +0 -5
  34. pulumi_vault/azure/get_access_credentials.py +4 -36
  35. pulumi_vault/azure/outputs.py +0 -5
  36. pulumi_vault/cert_auth_backend_role.py +0 -5
  37. pulumi_vault/config/__init__.pyi +0 -5
  38. pulumi_vault/config/_inputs.py +0 -21
  39. pulumi_vault/config/outputs.py +0 -5
  40. pulumi_vault/config/ui_custom_message.py +14 -19
  41. pulumi_vault/config/vars.py +0 -5
  42. pulumi_vault/consul/secret_backend.py +0 -5
  43. pulumi_vault/consul/secret_backend_role.py +0 -5
  44. pulumi_vault/database/_inputs.py +105 -2056
  45. pulumi_vault/database/outputs.py +54 -59
  46. pulumi_vault/database/secret_backend_connection.py +14 -19
  47. pulumi_vault/database/secret_backend_role.py +14 -19
  48. pulumi_vault/database/secret_backend_static_role.py +0 -5
  49. pulumi_vault/database/secrets_mount.py +14 -19
  50. pulumi_vault/egp_policy.py +0 -5
  51. pulumi_vault/gcp/_inputs.py +0 -111
  52. pulumi_vault/gcp/auth_backend.py +0 -5
  53. pulumi_vault/gcp/auth_backend_role.py +0 -5
  54. pulumi_vault/gcp/get_auth_backend_role.py +4 -42
  55. pulumi_vault/gcp/outputs.py +0 -5
  56. pulumi_vault/gcp/secret_backend.py +0 -5
  57. pulumi_vault/gcp/secret_impersonated_account.py +0 -5
  58. pulumi_vault/gcp/secret_roleset.py +0 -5
  59. pulumi_vault/gcp/secret_static_account.py +0 -5
  60. pulumi_vault/generic/endpoint.py +0 -5
  61. pulumi_vault/generic/get_secret.py +5 -25
  62. pulumi_vault/generic/secret.py +7 -12
  63. pulumi_vault/get_auth_backend.py +4 -21
  64. pulumi_vault/get_auth_backends.py +4 -16
  65. pulumi_vault/get_namespace.py +5 -18
  66. pulumi_vault/get_namespaces.py +4 -13
  67. pulumi_vault/get_nomad_access_token.py +8 -28
  68. pulumi_vault/get_policy_document.py +4 -15
  69. pulumi_vault/get_raft_autopilot_state.py +7 -26
  70. pulumi_vault/github/_inputs.py +0 -55
  71. pulumi_vault/github/auth_backend.py +0 -5
  72. pulumi_vault/github/outputs.py +0 -5
  73. pulumi_vault/github/team.py +0 -5
  74. pulumi_vault/github/user.py +0 -5
  75. pulumi_vault/identity/entity.py +0 -5
  76. pulumi_vault/identity/entity_alias.py +0 -5
  77. pulumi_vault/identity/entity_policies.py +0 -5
  78. pulumi_vault/identity/get_entity.py +5 -35
  79. pulumi_vault/identity/get_group.py +6 -42
  80. pulumi_vault/identity/get_oidc_client_creds.py +4 -16
  81. pulumi_vault/identity/get_oidc_openid_config.py +4 -26
  82. pulumi_vault/identity/get_oidc_public_keys.py +5 -16
  83. pulumi_vault/identity/group.py +0 -5
  84. pulumi_vault/identity/group_alias.py +0 -5
  85. pulumi_vault/identity/group_member_entity_ids.py +0 -5
  86. pulumi_vault/identity/group_member_group_ids.py +0 -5
  87. pulumi_vault/identity/group_policies.py +0 -5
  88. pulumi_vault/identity/mfa_duo.py +0 -5
  89. pulumi_vault/identity/mfa_login_enforcement.py +0 -5
  90. pulumi_vault/identity/mfa_okta.py +0 -5
  91. pulumi_vault/identity/mfa_pingid.py +0 -5
  92. pulumi_vault/identity/mfa_totp.py +0 -5
  93. pulumi_vault/identity/oidc.py +0 -5
  94. pulumi_vault/identity/oidc_assignment.py +0 -5
  95. pulumi_vault/identity/oidc_client.py +0 -5
  96. pulumi_vault/identity/oidc_key.py +0 -5
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
  98. pulumi_vault/identity/oidc_provider.py +0 -5
  99. pulumi_vault/identity/oidc_role.py +0 -5
  100. pulumi_vault/identity/oidc_scope.py +0 -5
  101. pulumi_vault/identity/outputs.py +3 -8
  102. pulumi_vault/jwt/_inputs.py +0 -55
  103. pulumi_vault/jwt/auth_backend.py +0 -5
  104. pulumi_vault/jwt/auth_backend_role.py +28 -33
  105. pulumi_vault/jwt/outputs.py +0 -5
  106. pulumi_vault/kmip/secret_backend.py +0 -5
  107. pulumi_vault/kmip/secret_role.py +0 -5
  108. pulumi_vault/kmip/secret_scope.py +0 -5
  109. pulumi_vault/kubernetes/auth_backend_config.py +0 -5
  110. pulumi_vault/kubernetes/auth_backend_role.py +0 -5
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +4 -26
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
  113. pulumi_vault/kubernetes/get_service_account_token.py +4 -28
  114. pulumi_vault/kubernetes/secret_backend.py +14 -19
  115. pulumi_vault/kubernetes/secret_backend_role.py +0 -5
  116. pulumi_vault/kv/_inputs.py +4 -36
  117. pulumi_vault/kv/get_secret.py +5 -20
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +5 -24
  119. pulumi_vault/kv/get_secret_v2.py +6 -27
  120. pulumi_vault/kv/get_secrets_list.py +4 -15
  121. pulumi_vault/kv/get_secrets_list_v2.py +4 -18
  122. pulumi_vault/kv/outputs.py +3 -8
  123. pulumi_vault/kv/secret.py +7 -12
  124. pulumi_vault/kv/secret_backend_v2.py +0 -5
  125. pulumi_vault/kv/secret_v2.py +28 -33
  126. pulumi_vault/ldap/auth_backend.py +0 -5
  127. pulumi_vault/ldap/auth_backend_group.py +0 -5
  128. pulumi_vault/ldap/auth_backend_user.py +0 -5
  129. pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
  130. pulumi_vault/ldap/get_static_credentials.py +4 -23
  131. pulumi_vault/ldap/secret_backend.py +14 -19
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
  133. pulumi_vault/ldap/secret_backend_library_set.py +0 -5
  134. pulumi_vault/ldap/secret_backend_static_role.py +0 -5
  135. pulumi_vault/managed/_inputs.py +0 -205
  136. pulumi_vault/managed/keys.py +0 -5
  137. pulumi_vault/managed/outputs.py +0 -5
  138. pulumi_vault/mfa_duo.py +0 -5
  139. pulumi_vault/mfa_okta.py +0 -5
  140. pulumi_vault/mfa_pingid.py +0 -5
  141. pulumi_vault/mfa_totp.py +0 -5
  142. pulumi_vault/mongodbatlas/secret_backend.py +0 -5
  143. pulumi_vault/mongodbatlas/secret_role.py +0 -5
  144. pulumi_vault/mount.py +16 -21
  145. pulumi_vault/namespace.py +14 -19
  146. pulumi_vault/nomad_secret_backend.py +0 -5
  147. pulumi_vault/nomad_secret_role.py +0 -5
  148. pulumi_vault/okta/_inputs.py +0 -39
  149. pulumi_vault/okta/auth_backend.py +0 -5
  150. pulumi_vault/okta/auth_backend_group.py +0 -5
  151. pulumi_vault/okta/auth_backend_user.py +0 -5
  152. pulumi_vault/okta/outputs.py +0 -5
  153. pulumi_vault/outputs.py +0 -5
  154. pulumi_vault/password_policy.py +0 -5
  155. pulumi_vault/pkisecret/_inputs.py +8 -49
  156. pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
  157. pulumi_vault/pkisecret/backend_config_est.py +14 -19
  158. pulumi_vault/pkisecret/get_backend_config_est.py +5 -23
  159. pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
  160. pulumi_vault/pkisecret/get_backend_issuers.py +5 -18
  161. pulumi_vault/pkisecret/get_backend_key.py +4 -19
  162. pulumi_vault/pkisecret/get_backend_keys.py +5 -18
  163. pulumi_vault/pkisecret/outputs.py +12 -17
  164. pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
  172. pulumi_vault/pkisecret/secret_backend_key.py +0 -5
  173. pulumi_vault/pkisecret/secret_backend_role.py +0 -5
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
  176. pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
  177. pulumi_vault/plugin.py +0 -5
  178. pulumi_vault/plugin_pinned_version.py +0 -5
  179. pulumi_vault/policy.py +0 -5
  180. pulumi_vault/provider.py +0 -5
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +0 -5
  183. pulumi_vault/quota_rate_limit.py +0 -5
  184. pulumi_vault/rabbitmq/_inputs.py +0 -61
  185. pulumi_vault/rabbitmq/outputs.py +0 -5
  186. pulumi_vault/rabbitmq/secret_backend.py +0 -5
  187. pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
  188. pulumi_vault/raft_autopilot.py +0 -5
  189. pulumi_vault/raft_snapshot_agent_config.py +0 -5
  190. pulumi_vault/rgp_policy.py +0 -5
  191. pulumi_vault/saml/auth_backend.py +0 -5
  192. pulumi_vault/saml/auth_backend_role.py +14 -19
  193. pulumi_vault/secrets/_inputs.py +0 -30
  194. pulumi_vault/secrets/outputs.py +0 -5
  195. pulumi_vault/secrets/sync_association.py +0 -5
  196. pulumi_vault/secrets/sync_aws_destination.py +14 -19
  197. pulumi_vault/secrets/sync_azure_destination.py +14 -19
  198. pulumi_vault/secrets/sync_config.py +0 -5
  199. pulumi_vault/secrets/sync_gcp_destination.py +14 -19
  200. pulumi_vault/secrets/sync_gh_destination.py +0 -5
  201. pulumi_vault/secrets/sync_github_apps.py +0 -5
  202. pulumi_vault/secrets/sync_vercel_destination.py +0 -5
  203. pulumi_vault/ssh/_inputs.py +0 -22
  204. pulumi_vault/ssh/outputs.py +0 -5
  205. pulumi_vault/ssh/secret_backend_ca.py +0 -5
  206. pulumi_vault/ssh/secret_backend_role.py +28 -33
  207. pulumi_vault/terraformcloud/secret_backend.py +0 -5
  208. pulumi_vault/terraformcloud/secret_creds.py +0 -5
  209. pulumi_vault/terraformcloud/secret_role.py +0 -5
  210. pulumi_vault/token.py +0 -5
  211. pulumi_vault/tokenauth/auth_backend_role.py +14 -5
  212. pulumi_vault/transform/alphabet.py +0 -5
  213. pulumi_vault/transform/get_decode.py +14 -38
  214. pulumi_vault/transform/get_encode.py +14 -38
  215. pulumi_vault/transform/role.py +0 -5
  216. pulumi_vault/transform/template.py +14 -19
  217. pulumi_vault/transform/transformation.py +0 -5
  218. pulumi_vault/transit/get_decrypt.py +4 -21
  219. pulumi_vault/transit/get_encrypt.py +4 -23
  220. pulumi_vault/transit/secret_backend_key.py +7 -12
  221. pulumi_vault/transit/secret_cache_config.py +0 -5
  222. {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/METADATA +2 -3
  223. pulumi_vault-6.4.0a1723454543.dist-info/RECORD +256 -0
  224. {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/WHEEL +1 -1
  225. pulumi_vault-6.3.2a1729803197.dist-info/RECORD +0 -256
  226. {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/top_level.txt +0 -0
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -63,7 +58,7 @@ class GetSecretResult:
63
58
 
64
59
  @property
65
60
  @pulumi.getter
66
- def data(self) -> Mapping[str, str]:
61
+ def data(self) -> Mapping[str, Any]:
67
62
  """
68
63
  A mapping whose keys are the top-level data keys returned from
69
64
  Vault and whose values are the corresponding values. This map can only
@@ -231,6 +226,9 @@ def get_secret(namespace: Optional[str] = None,
231
226
  path=pulumi.get(__ret__, 'path'),
232
227
  version=pulumi.get(__ret__, 'version'),
233
228
  with_lease_start_time=pulumi.get(__ret__, 'with_lease_start_time'))
229
+
230
+
231
+ @_utilities.lift_output_func(get_secret)
234
232
  def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
235
233
  path: Optional[pulumi.Input[str]] = None,
236
234
  version: Optional[pulumi.Input[Optional[int]]] = None,
@@ -285,22 +283,4 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
285
283
  Note that storing the `lease_start_time` in the TF state will cause a persistent drift
286
284
  on every `pulumi preview` and will require a `pulumi up`.
287
285
  """
288
- __args__ = dict()
289
- __args__['namespace'] = namespace
290
- __args__['path'] = path
291
- __args__['version'] = version
292
- __args__['withLeaseStartTime'] = with_lease_start_time
293
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
294
- __ret__ = pulumi.runtime.invoke_output('vault:generic/getSecret:getSecret', __args__, opts=opts, typ=GetSecretResult)
295
- return __ret__.apply(lambda __response__: GetSecretResult(
296
- data=pulumi.get(__response__, 'data'),
297
- data_json=pulumi.get(__response__, 'data_json'),
298
- id=pulumi.get(__response__, 'id'),
299
- lease_duration=pulumi.get(__response__, 'lease_duration'),
300
- lease_id=pulumi.get(__response__, 'lease_id'),
301
- lease_renewable=pulumi.get(__response__, 'lease_renewable'),
302
- lease_start_time=pulumi.get(__response__, 'lease_start_time'),
303
- namespace=pulumi.get(__response__, 'namespace'),
304
- path=pulumi.get(__response__, 'path'),
305
- version=pulumi.get(__response__, 'version'),
306
- with_lease_start_time=pulumi.get(__response__, 'with_lease_start_time')))
286
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretArgs', 'Secret']
@@ -131,7 +126,7 @@ class SecretArgs:
131
126
  @pulumi.input_type
132
127
  class _SecretState:
133
128
  def __init__(__self__, *,
134
- data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
129
+ data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
135
130
  data_json: Optional[pulumi.Input[str]] = None,
136
131
  delete_all_versions: Optional[pulumi.Input[bool]] = None,
137
132
  disable_read: Optional[pulumi.Input[bool]] = None,
@@ -139,7 +134,7 @@ class _SecretState:
139
134
  path: Optional[pulumi.Input[str]] = None):
140
135
  """
141
136
  Input properties used for looking up and filtering Secret resources.
142
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
137
+ :param pulumi.Input[Mapping[str, Any]] data: A mapping whose keys are the top-level data keys returned from
143
138
  Vault and whose values are the corresponding values. This map can only
144
139
  represent string data, so any non-string values returned from Vault are
145
140
  serialized as JSON.
@@ -177,7 +172,7 @@ class _SecretState:
177
172
 
178
173
  @property
179
174
  @pulumi.getter
180
- def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
175
+ def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
181
176
  """
182
177
  A mapping whose keys are the top-level data keys returned from
183
178
  Vault and whose values are the corresponding values. This map can only
@@ -187,7 +182,7 @@ class _SecretState:
187
182
  return pulumi.get(self, "data")
188
183
 
189
184
  @data.setter
190
- def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
185
+ def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
191
186
  pulumi.set(self, "data", value)
192
187
 
193
188
  @property
@@ -371,7 +366,7 @@ class Secret(pulumi.CustomResource):
371
366
  def get(resource_name: str,
372
367
  id: pulumi.Input[str],
373
368
  opts: Optional[pulumi.ResourceOptions] = None,
374
- data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
369
+ data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
375
370
  data_json: Optional[pulumi.Input[str]] = None,
376
371
  delete_all_versions: Optional[pulumi.Input[bool]] = None,
377
372
  disable_read: Optional[pulumi.Input[bool]] = None,
@@ -384,7 +379,7 @@ class Secret(pulumi.CustomResource):
384
379
  :param str resource_name: The unique name of the resulting resource.
385
380
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
386
381
  :param pulumi.ResourceOptions opts: Options for the resource.
387
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
382
+ :param pulumi.Input[Mapping[str, Any]] data: A mapping whose keys are the top-level data keys returned from
388
383
  Vault and whose values are the corresponding values. This map can only
389
384
  represent string data, so any non-string values returned from Vault are
390
385
  serialized as JSON.
@@ -421,7 +416,7 @@ class Secret(pulumi.CustomResource):
421
416
 
422
417
  @property
423
418
  @pulumi.getter
424
- def data(self) -> pulumi.Output[Mapping[str, str]]:
419
+ def data(self) -> pulumi.Output[Mapping[str, Any]]:
425
420
  """
426
421
  A mapping whose keys are the top-level data keys returned from
427
422
  Vault and whose values are the corresponding values. This map can only
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
 
17
12
  __all__ = [
@@ -188,6 +183,9 @@ def get_auth_backend(namespace: Optional[str] = None,
188
183
  namespace=pulumi.get(__ret__, 'namespace'),
189
184
  path=pulumi.get(__ret__, 'path'),
190
185
  type=pulumi.get(__ret__, 'type'))
186
+
187
+
188
+ @_utilities.lift_output_func(get_auth_backend)
191
189
  def get_auth_backend_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
192
190
  path: Optional[pulumi.Input[str]] = None,
193
191
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendResult]:
@@ -208,19 +206,4 @@ def get_auth_backend_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
208
206
  *Available only for Vault Enterprise*.
209
207
  :param str path: The auth backend mount point.
210
208
  """
211
- __args__ = dict()
212
- __args__['namespace'] = namespace
213
- __args__['path'] = path
214
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
215
- __ret__ = pulumi.runtime.invoke_output('vault:index/getAuthBackend:getAuthBackend', __args__, opts=opts, typ=GetAuthBackendResult)
216
- return __ret__.apply(lambda __response__: GetAuthBackendResult(
217
- accessor=pulumi.get(__response__, 'accessor'),
218
- default_lease_ttl_seconds=pulumi.get(__response__, 'default_lease_ttl_seconds'),
219
- description=pulumi.get(__response__, 'description'),
220
- id=pulumi.get(__response__, 'id'),
221
- listing_visibility=pulumi.get(__response__, 'listing_visibility'),
222
- local=pulumi.get(__response__, 'local'),
223
- max_lease_ttl_seconds=pulumi.get(__response__, 'max_lease_ttl_seconds'),
224
- namespace=pulumi.get(__response__, 'namespace'),
225
- path=pulumi.get(__response__, 'path'),
226
- type=pulumi.get(__response__, 'type')))
209
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
 
17
12
  __all__ = [
@@ -130,6 +125,9 @@ def get_auth_backends(namespace: Optional[str] = None,
130
125
  namespace=pulumi.get(__ret__, 'namespace'),
131
126
  paths=pulumi.get(__ret__, 'paths'),
132
127
  type=pulumi.get(__ret__, 'type'))
128
+
129
+
130
+ @_utilities.lift_output_func(get_auth_backends)
133
131
  def get_auth_backends_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
134
132
  type: Optional[pulumi.Input[Optional[str]]] = None,
135
133
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendsResult]:
@@ -157,14 +155,4 @@ def get_auth_backends_output(namespace: Optional[pulumi.Input[Optional[str]]] =
157
155
  *Available only for Vault Enterprise*.
158
156
  :param str type: The name of the auth method type. Allows filtering of backends returned by type.
159
157
  """
160
- __args__ = dict()
161
- __args__['namespace'] = namespace
162
- __args__['type'] = type
163
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
164
- __ret__ = pulumi.runtime.invoke_output('vault:index/getAuthBackends:getAuthBackends', __args__, opts=opts, typ=GetAuthBackendsResult)
165
- return __ret__.apply(lambda __response__: GetAuthBackendsResult(
166
- accessors=pulumi.get(__response__, 'accessors'),
167
- id=pulumi.get(__response__, 'id'),
168
- namespace=pulumi.get(__response__, 'namespace'),
169
- paths=pulumi.get(__response__, 'paths'),
170
- type=pulumi.get(__response__, 'type')))
158
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
 
17
12
  __all__ = [
@@ -48,7 +43,7 @@ class GetNamespaceResult:
48
43
 
49
44
  @property
50
45
  @pulumi.getter(name="customMetadata")
51
- def custom_metadata(self) -> Mapping[str, str]:
46
+ def custom_metadata(self) -> Mapping[str, Any]:
52
47
  """
53
48
  (Optional) A map of strings containing arbitrary metadata for the namespace.
54
49
  Only fetched if `path` is specified.
@@ -166,6 +161,9 @@ def get_namespace(namespace: Optional[str] = None,
166
161
  namespace_id=pulumi.get(__ret__, 'namespace_id'),
167
162
  path=pulumi.get(__ret__, 'path'),
168
163
  path_fq=pulumi.get(__ret__, 'path_fq'))
164
+
165
+
166
+ @_utilities.lift_output_func(get_namespace)
169
167
  def get_namespace_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
170
168
  path: Optional[pulumi.Input[Optional[str]]] = None,
171
169
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNamespaceResult]:
@@ -212,15 +210,4 @@ def get_namespace_output(namespace: Optional[pulumi.Input[Optional[str]]] = None
212
210
  based on the `namespace` arguments of the provider and this data source.
213
211
  Other path related attributes will be empty in this case.
214
212
  """
215
- __args__ = dict()
216
- __args__['namespace'] = namespace
217
- __args__['path'] = path
218
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
219
- __ret__ = pulumi.runtime.invoke_output('vault:index/getNamespace:getNamespace', __args__, opts=opts, typ=GetNamespaceResult)
220
- return __ret__.apply(lambda __response__: GetNamespaceResult(
221
- custom_metadata=pulumi.get(__response__, 'custom_metadata'),
222
- id=pulumi.get(__response__, 'id'),
223
- namespace=pulumi.get(__response__, 'namespace'),
224
- namespace_id=pulumi.get(__response__, 'namespace_id'),
225
- path=pulumi.get(__response__, 'path'),
226
- path_fq=pulumi.get(__response__, 'path_fq')))
213
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
 
17
12
  __all__ = [
@@ -111,6 +106,9 @@ def get_namespaces(namespace: Optional[str] = None,
111
106
  id=pulumi.get(__ret__, 'id'),
112
107
  namespace=pulumi.get(__ret__, 'namespace'),
113
108
  paths=pulumi.get(__ret__, 'paths'))
109
+
110
+
111
+ @_utilities.lift_output_func(get_namespaces)
114
112
  def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
115
113
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNamespacesResult]:
116
114
  """
@@ -143,11 +141,4 @@ def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[str]]] = Non
143
141
  The value should not contain leading or trailing forward slashes.
144
142
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
145
143
  """
146
- __args__ = dict()
147
- __args__['namespace'] = namespace
148
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
149
- __ret__ = pulumi.runtime.invoke_output('vault:index/getNamespaces:getNamespaces', __args__, opts=opts, typ=GetNamespacesResult)
150
- return __ret__.apply(lambda __response__: GetNamespacesResult(
151
- id=pulumi.get(__response__, 'id'),
152
- namespace=pulumi.get(__response__, 'namespace'),
153
- paths=pulumi.get(__response__, 'paths')))
144
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
 
17
12
  __all__ = [
@@ -124,11 +119,8 @@ def get_nomad_access_token(backend: Optional[str] = None,
124
119
  role="test",
125
120
  type="client",
126
121
  policies=["readonly"])
127
- token = pulumi.Output.all(
128
- backend=config.backend,
129
- role=test.role
130
- ).apply(lambda resolved_outputs: vault.get_nomad_access_token_output(backend=resolved_outputs['backend'],
131
- role=resolved_outputs['role']))
122
+ token = pulumi.Output.all(config.backend, test.role).apply(lambda backend, role: vault.get_nomad_access_token_output(backend=backend,
123
+ role=role))
132
124
  ```
133
125
 
134
126
 
@@ -155,6 +147,9 @@ def get_nomad_access_token(backend: Optional[str] = None,
155
147
  namespace=pulumi.get(__ret__, 'namespace'),
156
148
  role=pulumi.get(__ret__, 'role'),
157
149
  secret_id=pulumi.get(__ret__, 'secret_id'))
150
+
151
+
152
+ @_utilities.lift_output_func(get_nomad_access_token)
158
153
  def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
159
154
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
160
155
  role: Optional[pulumi.Input[str]] = None,
@@ -178,11 +173,8 @@ def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
178
173
  role="test",
179
174
  type="client",
180
175
  policies=["readonly"])
181
- token = pulumi.Output.all(
182
- backend=config.backend,
183
- role=test.role
184
- ).apply(lambda resolved_outputs: vault.get_nomad_access_token_output(backend=resolved_outputs['backend'],
185
- role=resolved_outputs['role']))
176
+ token = pulumi.Output.all(config.backend, test.role).apply(lambda backend, role: vault.get_nomad_access_token_output(backend=backend,
177
+ role=role))
186
178
  ```
187
179
 
188
180
 
@@ -195,16 +187,4 @@ def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
195
187
  :param str role: The name of the Nomad secret backend role to generate
196
188
  a token for, with no leading or trailing `/`s.
197
189
  """
198
- __args__ = dict()
199
- __args__['backend'] = backend
200
- __args__['namespace'] = namespace
201
- __args__['role'] = role
202
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
203
- __ret__ = pulumi.runtime.invoke_output('vault:index/getNomadAccessToken:getNomadAccessToken', __args__, opts=opts, typ=GetNomadAccessTokenResult)
204
- return __ret__.apply(lambda __response__: GetNomadAccessTokenResult(
205
- accessor_id=pulumi.get(__response__, 'accessor_id'),
206
- backend=pulumi.get(__response__, 'backend'),
207
- id=pulumi.get(__response__, 'id'),
208
- namespace=pulumi.get(__response__, 'namespace'),
209
- role=pulumi.get(__response__, 'role'),
210
- secret_id=pulumi.get(__response__, 'secret_id')))
190
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
  from . import outputs
17
12
  from ._inputs import *
@@ -120,6 +115,9 @@ def get_policy_document(namespace: Optional[str] = None,
120
115
  id=pulumi.get(__ret__, 'id'),
121
116
  namespace=pulumi.get(__ret__, 'namespace'),
122
117
  rules=pulumi.get(__ret__, 'rules'))
118
+
119
+
120
+ @_utilities.lift_output_func(get_policy_document)
123
121
  def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
124
122
  rules: Optional[pulumi.Input[Optional[Sequence[Union['GetPolicyDocumentRuleArgs', 'GetPolicyDocumentRuleArgsDict']]]]] = None,
125
123
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetPolicyDocumentResult]:
@@ -148,13 +146,4 @@ def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]]
148
146
  policy=example.hcl)
149
147
  ```
150
148
  """
151
- __args__ = dict()
152
- __args__['namespace'] = namespace
153
- __args__['rules'] = rules
154
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
155
- __ret__ = pulumi.runtime.invoke_output('vault:index/getPolicyDocument:getPolicyDocument', __args__, opts=opts, typ=GetPolicyDocumentResult)
156
- return __ret__.apply(lambda __response__: GetPolicyDocumentResult(
157
- hcl=pulumi.get(__response__, 'hcl'),
158
- id=pulumi.get(__response__, 'id'),
159
- namespace=pulumi.get(__response__, 'namespace'),
160
- rules=pulumi.get(__response__, 'rules')))
149
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
 
17
12
  __all__ = [
@@ -114,7 +109,7 @@ class GetRaftAutopilotStateResult:
114
109
 
115
110
  @property
116
111
  @pulumi.getter(name="redundancyZones")
117
- def redundancy_zones(self) -> Mapping[str, str]:
112
+ def redundancy_zones(self) -> Mapping[str, Any]:
118
113
  """
119
114
  Additional output related to redundancy zones stored as a serialized map of strings.
120
115
  """
@@ -130,7 +125,7 @@ class GetRaftAutopilotStateResult:
130
125
 
131
126
  @property
132
127
  @pulumi.getter
133
- def servers(self) -> Mapping[str, str]:
128
+ def servers(self) -> Mapping[str, Any]:
134
129
  """
135
130
  Additionaly output related to servers in the cluster stored as a serialized map of strings.
136
131
  """
@@ -146,7 +141,7 @@ class GetRaftAutopilotStateResult:
146
141
 
147
142
  @property
148
143
  @pulumi.getter(name="upgradeInfo")
149
- def upgrade_info(self) -> Mapping[str, str]:
144
+ def upgrade_info(self) -> Mapping[str, Any]:
150
145
  """
151
146
  Additional output related to upgrade information stored as a serialized map of strings.
152
147
  """
@@ -228,6 +223,9 @@ def get_raft_autopilot_state(namespace: Optional[str] = None,
228
223
  upgrade_info=pulumi.get(__ret__, 'upgrade_info'),
229
224
  upgrade_info_json=pulumi.get(__ret__, 'upgrade_info_json'),
230
225
  voters=pulumi.get(__ret__, 'voters'))
226
+
227
+
228
+ @_utilities.lift_output_func(get_raft_autopilot_state)
231
229
  def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
232
230
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetRaftAutopilotStateResult]:
233
231
  """
@@ -247,21 +245,4 @@ def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[st
247
245
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
248
246
  *Available only for Vault Enterprise*.
249
247
  """
250
- __args__ = dict()
251
- __args__['namespace'] = namespace
252
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
253
- __ret__ = pulumi.runtime.invoke_output('vault:index/getRaftAutopilotState:getRaftAutopilotState', __args__, opts=opts, typ=GetRaftAutopilotStateResult)
254
- return __ret__.apply(lambda __response__: GetRaftAutopilotStateResult(
255
- failure_tolerance=pulumi.get(__response__, 'failure_tolerance'),
256
- healthy=pulumi.get(__response__, 'healthy'),
257
- id=pulumi.get(__response__, 'id'),
258
- leader=pulumi.get(__response__, 'leader'),
259
- namespace=pulumi.get(__response__, 'namespace'),
260
- optimistic_failure_tolerance=pulumi.get(__response__, 'optimistic_failure_tolerance'),
261
- redundancy_zones=pulumi.get(__response__, 'redundancy_zones'),
262
- redundancy_zones_json=pulumi.get(__response__, 'redundancy_zones_json'),
263
- servers=pulumi.get(__response__, 'servers'),
264
- servers_json=pulumi.get(__response__, 'servers_json'),
265
- upgrade_info=pulumi.get(__response__, 'upgrade_info'),
266
- upgrade_info_json=pulumi.get(__response__, 'upgrade_info_json'),
267
- voters=pulumi.get(__response__, 'voters')))
248
+ ...
@@ -4,70 +4,15 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
18
13
  'AuthBackendTuneArgs',
19
- 'AuthBackendTuneArgsDict',
20
14
  ]
21
15
 
22
- MYPY = False
23
-
24
- if not MYPY:
25
- class AuthBackendTuneArgsDict(TypedDict):
26
- allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
27
- """
28
- List of headers to whitelist and allowing
29
- a plugin to include them in the response.
30
- """
31
- audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
32
- """
33
- Specifies the list of keys that will
34
- not be HMAC'd by audit devices in the request data object.
35
- """
36
- audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
37
- """
38
- Specifies the list of keys that will
39
- not be HMAC'd by audit devices in the response data object.
40
- """
41
- default_lease_ttl: NotRequired[pulumi.Input[str]]
42
- """
43
- Specifies the default time-to-live.
44
- If set, this overrides the global default.
45
- Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
46
- """
47
- listing_visibility: NotRequired[pulumi.Input[str]]
48
- """
49
- Specifies whether to show this mount in
50
- the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
51
- """
52
- max_lease_ttl: NotRequired[pulumi.Input[str]]
53
- """
54
- Specifies the maximum time-to-live.
55
- If set, this overrides the global default.
56
- Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
57
- """
58
- passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
59
- """
60
- List of headers to whitelist and
61
- pass from the request to the backend.
62
- """
63
- token_type: NotRequired[pulumi.Input[str]]
64
- """
65
- Specifies the type of tokens that should be returned by
66
- the mount. Valid values are "default-service", "default-batch", "service", "batch".
67
- """
68
- elif False:
69
- AuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any]
70
-
71
16
  @pulumi.input_type
72
17
  class AuthBackendTuneArgs:
73
18
  def __init__(__self__, *,
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
  from . import outputs
17
12
  from ._inputs import *
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['TeamArgs', 'Team']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['UserArgs', 'User']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['EntityArgs', 'Entity']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['EntityAliasArgs', 'EntityAlias']