pulumi-vault 6.4.0__py3-none-any.whl → 6.4.0a1723454543__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +0 -560
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +4 -19
  4. pulumi_vault/ad/secret_backend.py +0 -5
  5. pulumi_vault/ad/secret_library.py +0 -5
  6. pulumi_vault/ad/secret_role.py +0 -5
  7. pulumi_vault/alicloud/auth_backend_role.py +0 -5
  8. pulumi_vault/approle/auth_backend_login.py +0 -5
  9. pulumi_vault/approle/auth_backend_role.py +0 -5
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -99
  11. pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
  12. pulumi_vault/audit.py +0 -5
  13. pulumi_vault/audit_request_header.py +0 -5
  14. pulumi_vault/auth_backend.py +0 -5
  15. pulumi_vault/aws/auth_backend_cert.py +0 -5
  16. pulumi_vault/aws/auth_backend_client.py +0 -5
  17. pulumi_vault/aws/auth_backend_config_identity.py +0 -5
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
  19. pulumi_vault/aws/auth_backend_login.py +7 -12
  20. pulumi_vault/aws/auth_backend_role.py +0 -5
  21. pulumi_vault/aws/auth_backend_role_tag.py +0 -5
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
  23. pulumi_vault/aws/auth_backend_sts_role.py +0 -5
  24. pulumi_vault/aws/get_access_credentials.py +4 -31
  25. pulumi_vault/aws/get_static_access_credentials.py +4 -18
  26. pulumi_vault/aws/secret_backend.py +0 -5
  27. pulumi_vault/aws/secret_backend_role.py +0 -5
  28. pulumi_vault/aws/secret_backend_static_role.py +0 -5
  29. pulumi_vault/azure/_inputs.py +0 -24
  30. pulumi_vault/azure/auth_backend_config.py +0 -5
  31. pulumi_vault/azure/auth_backend_role.py +0 -5
  32. pulumi_vault/azure/backend.py +0 -5
  33. pulumi_vault/azure/backend_role.py +0 -5
  34. pulumi_vault/azure/get_access_credentials.py +4 -36
  35. pulumi_vault/azure/outputs.py +0 -5
  36. pulumi_vault/cert_auth_backend_role.py +0 -5
  37. pulumi_vault/config/__init__.pyi +0 -5
  38. pulumi_vault/config/_inputs.py +0 -21
  39. pulumi_vault/config/outputs.py +0 -5
  40. pulumi_vault/config/ui_custom_message.py +14 -19
  41. pulumi_vault/config/vars.py +0 -5
  42. pulumi_vault/consul/secret_backend.py +0 -5
  43. pulumi_vault/consul/secret_backend_role.py +0 -5
  44. pulumi_vault/database/_inputs.py +105 -2256
  45. pulumi_vault/database/outputs.py +54 -199
  46. pulumi_vault/database/secret_backend_connection.py +14 -19
  47. pulumi_vault/database/secret_backend_role.py +14 -19
  48. pulumi_vault/database/secret_backend_static_role.py +1 -69
  49. pulumi_vault/database/secrets_mount.py +14 -19
  50. pulumi_vault/egp_policy.py +0 -5
  51. pulumi_vault/gcp/_inputs.py +0 -111
  52. pulumi_vault/gcp/auth_backend.py +0 -5
  53. pulumi_vault/gcp/auth_backend_role.py +0 -5
  54. pulumi_vault/gcp/get_auth_backend_role.py +4 -42
  55. pulumi_vault/gcp/outputs.py +0 -5
  56. pulumi_vault/gcp/secret_backend.py +0 -5
  57. pulumi_vault/gcp/secret_impersonated_account.py +3 -62
  58. pulumi_vault/gcp/secret_roleset.py +0 -5
  59. pulumi_vault/gcp/secret_static_account.py +0 -5
  60. pulumi_vault/generic/endpoint.py +0 -5
  61. pulumi_vault/generic/get_secret.py +5 -25
  62. pulumi_vault/generic/secret.py +7 -12
  63. pulumi_vault/get_auth_backend.py +4 -21
  64. pulumi_vault/get_auth_backends.py +4 -16
  65. pulumi_vault/get_namespace.py +5 -18
  66. pulumi_vault/get_namespaces.py +4 -13
  67. pulumi_vault/get_nomad_access_token.py +8 -28
  68. pulumi_vault/get_policy_document.py +4 -15
  69. pulumi_vault/get_raft_autopilot_state.py +7 -26
  70. pulumi_vault/github/_inputs.py +0 -55
  71. pulumi_vault/github/auth_backend.py +0 -5
  72. pulumi_vault/github/outputs.py +0 -5
  73. pulumi_vault/github/team.py +0 -5
  74. pulumi_vault/github/user.py +0 -5
  75. pulumi_vault/identity/entity.py +0 -5
  76. pulumi_vault/identity/entity_alias.py +0 -5
  77. pulumi_vault/identity/entity_policies.py +0 -5
  78. pulumi_vault/identity/get_entity.py +5 -35
  79. pulumi_vault/identity/get_group.py +6 -42
  80. pulumi_vault/identity/get_oidc_client_creds.py +4 -16
  81. pulumi_vault/identity/get_oidc_openid_config.py +4 -26
  82. pulumi_vault/identity/get_oidc_public_keys.py +5 -16
  83. pulumi_vault/identity/group.py +0 -5
  84. pulumi_vault/identity/group_alias.py +0 -5
  85. pulumi_vault/identity/group_member_entity_ids.py +0 -5
  86. pulumi_vault/identity/group_member_group_ids.py +0 -5
  87. pulumi_vault/identity/group_policies.py +0 -5
  88. pulumi_vault/identity/mfa_duo.py +0 -5
  89. pulumi_vault/identity/mfa_login_enforcement.py +0 -5
  90. pulumi_vault/identity/mfa_okta.py +0 -5
  91. pulumi_vault/identity/mfa_pingid.py +0 -5
  92. pulumi_vault/identity/mfa_totp.py +0 -5
  93. pulumi_vault/identity/oidc.py +0 -5
  94. pulumi_vault/identity/oidc_assignment.py +0 -5
  95. pulumi_vault/identity/oidc_client.py +0 -5
  96. pulumi_vault/identity/oidc_key.py +0 -5
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
  98. pulumi_vault/identity/oidc_provider.py +0 -5
  99. pulumi_vault/identity/oidc_role.py +0 -5
  100. pulumi_vault/identity/oidc_scope.py +0 -5
  101. pulumi_vault/identity/outputs.py +3 -8
  102. pulumi_vault/jwt/_inputs.py +0 -55
  103. pulumi_vault/jwt/auth_backend.py +0 -5
  104. pulumi_vault/jwt/auth_backend_role.py +28 -33
  105. pulumi_vault/jwt/outputs.py +0 -5
  106. pulumi_vault/kmip/secret_backend.py +0 -5
  107. pulumi_vault/kmip/secret_role.py +0 -5
  108. pulumi_vault/kmip/secret_scope.py +0 -5
  109. pulumi_vault/kubernetes/auth_backend_config.py +3 -55
  110. pulumi_vault/kubernetes/auth_backend_role.py +0 -5
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +7 -59
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
  113. pulumi_vault/kubernetes/get_service_account_token.py +4 -28
  114. pulumi_vault/kubernetes/secret_backend.py +14 -19
  115. pulumi_vault/kubernetes/secret_backend_role.py +0 -5
  116. pulumi_vault/kv/_inputs.py +4 -36
  117. pulumi_vault/kv/get_secret.py +5 -20
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +5 -24
  119. pulumi_vault/kv/get_secret_v2.py +8 -27
  120. pulumi_vault/kv/get_secrets_list.py +4 -15
  121. pulumi_vault/kv/get_secrets_list_v2.py +4 -18
  122. pulumi_vault/kv/outputs.py +3 -8
  123. pulumi_vault/kv/secret.py +7 -12
  124. pulumi_vault/kv/secret_backend_v2.py +0 -5
  125. pulumi_vault/kv/secret_v2.py +28 -33
  126. pulumi_vault/ldap/auth_backend.py +0 -52
  127. pulumi_vault/ldap/auth_backend_group.py +0 -5
  128. pulumi_vault/ldap/auth_backend_user.py +0 -5
  129. pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
  130. pulumi_vault/ldap/get_static_credentials.py +4 -23
  131. pulumi_vault/ldap/secret_backend.py +14 -19
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
  133. pulumi_vault/ldap/secret_backend_library_set.py +0 -5
  134. pulumi_vault/ldap/secret_backend_static_role.py +0 -5
  135. pulumi_vault/managed/_inputs.py +0 -205
  136. pulumi_vault/managed/keys.py +0 -5
  137. pulumi_vault/managed/outputs.py +0 -5
  138. pulumi_vault/mfa_duo.py +0 -5
  139. pulumi_vault/mfa_okta.py +0 -5
  140. pulumi_vault/mfa_pingid.py +0 -5
  141. pulumi_vault/mfa_totp.py +0 -5
  142. pulumi_vault/mongodbatlas/secret_backend.py +0 -5
  143. pulumi_vault/mongodbatlas/secret_role.py +0 -5
  144. pulumi_vault/mount.py +16 -21
  145. pulumi_vault/namespace.py +14 -19
  146. pulumi_vault/nomad_secret_backend.py +0 -5
  147. pulumi_vault/nomad_secret_role.py +0 -5
  148. pulumi_vault/okta/_inputs.py +0 -39
  149. pulumi_vault/okta/auth_backend.py +0 -5
  150. pulumi_vault/okta/auth_backend_group.py +0 -5
  151. pulumi_vault/okta/auth_backend_user.py +0 -5
  152. pulumi_vault/okta/outputs.py +0 -5
  153. pulumi_vault/outputs.py +0 -5
  154. pulumi_vault/password_policy.py +0 -5
  155. pulumi_vault/pkisecret/_inputs.py +8 -49
  156. pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
  157. pulumi_vault/pkisecret/backend_config_est.py +14 -19
  158. pulumi_vault/pkisecret/get_backend_config_est.py +5 -23
  159. pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
  160. pulumi_vault/pkisecret/get_backend_issuers.py +5 -18
  161. pulumi_vault/pkisecret/get_backend_key.py +4 -19
  162. pulumi_vault/pkisecret/get_backend_keys.py +5 -18
  163. pulumi_vault/pkisecret/outputs.py +12 -17
  164. pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
  172. pulumi_vault/pkisecret/secret_backend_key.py +0 -5
  173. pulumi_vault/pkisecret/secret_backend_role.py +0 -5
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
  176. pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
  177. pulumi_vault/plugin.py +0 -5
  178. pulumi_vault/plugin_pinned_version.py +0 -5
  179. pulumi_vault/policy.py +0 -5
  180. pulumi_vault/provider.py +0 -5
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +0 -5
  183. pulumi_vault/quota_rate_limit.py +0 -5
  184. pulumi_vault/rabbitmq/_inputs.py +0 -61
  185. pulumi_vault/rabbitmq/outputs.py +0 -5
  186. pulumi_vault/rabbitmq/secret_backend.py +0 -5
  187. pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
  188. pulumi_vault/raft_autopilot.py +0 -5
  189. pulumi_vault/raft_snapshot_agent_config.py +0 -5
  190. pulumi_vault/rgp_policy.py +0 -5
  191. pulumi_vault/saml/auth_backend.py +0 -5
  192. pulumi_vault/saml/auth_backend_role.py +14 -19
  193. pulumi_vault/secrets/_inputs.py +0 -30
  194. pulumi_vault/secrets/outputs.py +0 -5
  195. pulumi_vault/secrets/sync_association.py +0 -5
  196. pulumi_vault/secrets/sync_aws_destination.py +14 -19
  197. pulumi_vault/secrets/sync_azure_destination.py +14 -19
  198. pulumi_vault/secrets/sync_config.py +0 -5
  199. pulumi_vault/secrets/sync_gcp_destination.py +14 -19
  200. pulumi_vault/secrets/sync_gh_destination.py +0 -5
  201. pulumi_vault/secrets/sync_github_apps.py +0 -5
  202. pulumi_vault/secrets/sync_vercel_destination.py +0 -5
  203. pulumi_vault/ssh/_inputs.py +0 -22
  204. pulumi_vault/ssh/outputs.py +0 -5
  205. pulumi_vault/ssh/secret_backend_ca.py +0 -5
  206. pulumi_vault/ssh/secret_backend_role.py +28 -67
  207. pulumi_vault/terraformcloud/secret_backend.py +0 -5
  208. pulumi_vault/terraformcloud/secret_creds.py +0 -5
  209. pulumi_vault/terraformcloud/secret_role.py +0 -5
  210. pulumi_vault/token.py +0 -5
  211. pulumi_vault/tokenauth/auth_backend_role.py +14 -5
  212. pulumi_vault/transform/alphabet.py +0 -5
  213. pulumi_vault/transform/get_decode.py +14 -38
  214. pulumi_vault/transform/get_encode.py +14 -38
  215. pulumi_vault/transform/role.py +0 -5
  216. pulumi_vault/transform/template.py +14 -19
  217. pulumi_vault/transform/transformation.py +0 -5
  218. pulumi_vault/transit/get_decrypt.py +4 -21
  219. pulumi_vault/transit/get_encrypt.py +4 -23
  220. pulumi_vault/transit/secret_backend_key.py +7 -12
  221. pulumi_vault/transit/secret_cache_config.py +0 -5
  222. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/METADATA +2 -3
  223. pulumi_vault-6.4.0a1723454543.dist-info/RECORD +256 -0
  224. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/WHEEL +1 -1
  225. pulumi_vault-6.4.0.dist-info/RECORD +0 -256
  226. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/top_level.txt +0 -0
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -26,7 +21,7 @@ class GetAuthBackendConfigResult:
26
21
  """
27
22
  A collection of values returned by getAuthBackendConfig.
28
23
  """
29
- def __init__(__self__, backend=None, disable_iss_validation=None, disable_local_ca_jwt=None, id=None, issuer=None, kubernetes_ca_cert=None, kubernetes_host=None, namespace=None, pem_keys=None, use_annotations_as_alias_metadata=None):
24
+ def __init__(__self__, backend=None, disable_iss_validation=None, disable_local_ca_jwt=None, id=None, issuer=None, kubernetes_ca_cert=None, kubernetes_host=None, namespace=None, pem_keys=None):
30
25
  if backend and not isinstance(backend, str):
31
26
  raise TypeError("Expected argument 'backend' to be a str")
32
27
  pulumi.set(__self__, "backend", backend)
@@ -54,9 +49,6 @@ class GetAuthBackendConfigResult:
54
49
  if pem_keys and not isinstance(pem_keys, list):
55
50
  raise TypeError("Expected argument 'pem_keys' to be a list")
56
51
  pulumi.set(__self__, "pem_keys", pem_keys)
57
- if use_annotations_as_alias_metadata and not isinstance(use_annotations_as_alias_metadata, bool):
58
- raise TypeError("Expected argument 'use_annotations_as_alias_metadata' to be a bool")
59
- pulumi.set(__self__, "use_annotations_as_alias_metadata", use_annotations_as_alias_metadata)
60
52
 
61
53
  @property
62
54
  @pulumi.getter
@@ -66,17 +58,11 @@ class GetAuthBackendConfigResult:
66
58
  @property
67
59
  @pulumi.getter(name="disableIssValidation")
68
60
  def disable_iss_validation(self) -> bool:
69
- """
70
- (Optional) Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
71
- """
72
61
  return pulumi.get(self, "disable_iss_validation")
73
62
 
74
63
  @property
75
64
  @pulumi.getter(name="disableLocalCaJwt")
76
65
  def disable_local_ca_jwt(self) -> bool:
77
- """
78
- (Optional) Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
79
- """
80
66
  return pulumi.get(self, "disable_local_ca_jwt")
81
67
 
82
68
  @property
@@ -124,14 +110,6 @@ class GetAuthBackendConfigResult:
124
110
  """
125
111
  return pulumi.get(self, "pem_keys")
126
112
 
127
- @property
128
- @pulumi.getter(name="useAnnotationsAsAliasMetadata")
129
- def use_annotations_as_alias_metadata(self) -> bool:
130
- """
131
- (Optional) Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
132
- """
133
- return pulumi.get(self, "use_annotations_as_alias_metadata")
134
-
135
113
 
136
114
  class AwaitableGetAuthBackendConfigResult(GetAuthBackendConfigResult):
137
115
  # pylint: disable=using-constant-test
@@ -147,8 +125,7 @@ class AwaitableGetAuthBackendConfigResult(GetAuthBackendConfigResult):
147
125
  kubernetes_ca_cert=self.kubernetes_ca_cert,
148
126
  kubernetes_host=self.kubernetes_host,
149
127
  namespace=self.namespace,
150
- pem_keys=self.pem_keys,
151
- use_annotations_as_alias_metadata=self.use_annotations_as_alias_metadata)
128
+ pem_keys=self.pem_keys)
152
129
 
153
130
 
154
131
  def get_auth_backend_config(backend: Optional[str] = None,
@@ -159,7 +136,6 @@ def get_auth_backend_config(backend: Optional[str] = None,
159
136
  kubernetes_host: Optional[str] = None,
160
137
  namespace: Optional[str] = None,
161
138
  pem_keys: Optional[Sequence[str]] = None,
162
- use_annotations_as_alias_metadata: Optional[bool] = None,
163
139
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetAuthBackendConfigResult:
164
140
  """
165
141
  Reads the Role of an Kubernetes from a Vault server. See the [Vault
@@ -169,8 +145,6 @@ def get_auth_backend_config(backend: Optional[str] = None,
169
145
 
170
146
  :param str backend: The unique name for the Kubernetes backend the config to
171
147
  retrieve Role attributes for resides in. Defaults to "kubernetes".
172
- :param bool disable_iss_validation: (Optional) Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
173
- :param bool disable_local_ca_jwt: (Optional) Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
174
148
  :param str issuer: Optional JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
175
149
  :param str kubernetes_ca_cert: PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
176
150
  :param str kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
@@ -179,7 +153,6 @@ def get_auth_backend_config(backend: Optional[str] = None,
179
153
  The `namespace` is always relative to the provider's configured namespace.
180
154
  *Available only for Vault Enterprise*.
181
155
  :param Sequence[str] pem_keys: Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
182
- :param bool use_annotations_as_alias_metadata: (Optional) Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
183
156
  """
184
157
  __args__ = dict()
185
158
  __args__['backend'] = backend
@@ -190,7 +163,6 @@ def get_auth_backend_config(backend: Optional[str] = None,
190
163
  __args__['kubernetesHost'] = kubernetes_host
191
164
  __args__['namespace'] = namespace
192
165
  __args__['pemKeys'] = pem_keys
193
- __args__['useAnnotationsAsAliasMetadata'] = use_annotations_as_alias_metadata
194
166
  opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
195
167
  __ret__ = pulumi.runtime.invoke('vault:kubernetes/getAuthBackendConfig:getAuthBackendConfig', __args__, opts=opts, typ=GetAuthBackendConfigResult).value
196
168
 
@@ -203,8 +175,10 @@ def get_auth_backend_config(backend: Optional[str] = None,
203
175
  kubernetes_ca_cert=pulumi.get(__ret__, 'kubernetes_ca_cert'),
204
176
  kubernetes_host=pulumi.get(__ret__, 'kubernetes_host'),
205
177
  namespace=pulumi.get(__ret__, 'namespace'),
206
- pem_keys=pulumi.get(__ret__, 'pem_keys'),
207
- use_annotations_as_alias_metadata=pulumi.get(__ret__, 'use_annotations_as_alias_metadata'))
178
+ pem_keys=pulumi.get(__ret__, 'pem_keys'))
179
+
180
+
181
+ @_utilities.lift_output_func(get_auth_backend_config)
208
182
  def get_auth_backend_config_output(backend: Optional[pulumi.Input[Optional[str]]] = None,
209
183
  disable_iss_validation: Optional[pulumi.Input[Optional[bool]]] = None,
210
184
  disable_local_ca_jwt: Optional[pulumi.Input[Optional[bool]]] = None,
@@ -213,7 +187,6 @@ def get_auth_backend_config_output(backend: Optional[pulumi.Input[Optional[str]]
213
187
  kubernetes_host: Optional[pulumi.Input[Optional[str]]] = None,
214
188
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
215
189
  pem_keys: Optional[pulumi.Input[Optional[Sequence[str]]]] = None,
216
- use_annotations_as_alias_metadata: Optional[pulumi.Input[Optional[bool]]] = None,
217
190
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendConfigResult]:
218
191
  """
219
192
  Reads the Role of an Kubernetes from a Vault server. See the [Vault
@@ -223,8 +196,6 @@ def get_auth_backend_config_output(backend: Optional[pulumi.Input[Optional[str]]
223
196
 
224
197
  :param str backend: The unique name for the Kubernetes backend the config to
225
198
  retrieve Role attributes for resides in. Defaults to "kubernetes".
226
- :param bool disable_iss_validation: (Optional) Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
227
- :param bool disable_local_ca_jwt: (Optional) Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
228
199
  :param str issuer: Optional JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
229
200
  :param str kubernetes_ca_cert: PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
230
201
  :param str kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
@@ -233,28 +204,5 @@ def get_auth_backend_config_output(backend: Optional[pulumi.Input[Optional[str]]
233
204
  The `namespace` is always relative to the provider's configured namespace.
234
205
  *Available only for Vault Enterprise*.
235
206
  :param Sequence[str] pem_keys: Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
236
- :param bool use_annotations_as_alias_metadata: (Optional) Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
237
207
  """
238
- __args__ = dict()
239
- __args__['backend'] = backend
240
- __args__['disableIssValidation'] = disable_iss_validation
241
- __args__['disableLocalCaJwt'] = disable_local_ca_jwt
242
- __args__['issuer'] = issuer
243
- __args__['kubernetesCaCert'] = kubernetes_ca_cert
244
- __args__['kubernetesHost'] = kubernetes_host
245
- __args__['namespace'] = namespace
246
- __args__['pemKeys'] = pem_keys
247
- __args__['useAnnotationsAsAliasMetadata'] = use_annotations_as_alias_metadata
248
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
249
- __ret__ = pulumi.runtime.invoke_output('vault:kubernetes/getAuthBackendConfig:getAuthBackendConfig', __args__, opts=opts, typ=GetAuthBackendConfigResult)
250
- return __ret__.apply(lambda __response__: GetAuthBackendConfigResult(
251
- backend=pulumi.get(__response__, 'backend'),
252
- disable_iss_validation=pulumi.get(__response__, 'disable_iss_validation'),
253
- disable_local_ca_jwt=pulumi.get(__response__, 'disable_local_ca_jwt'),
254
- id=pulumi.get(__response__, 'id'),
255
- issuer=pulumi.get(__response__, 'issuer'),
256
- kubernetes_ca_cert=pulumi.get(__response__, 'kubernetes_ca_cert'),
257
- kubernetes_host=pulumi.get(__response__, 'kubernetes_host'),
258
- namespace=pulumi.get(__response__, 'namespace'),
259
- pem_keys=pulumi.get(__response__, 'pem_keys'),
260
- use_annotations_as_alias_metadata=pulumi.get(__response__, 'use_annotations_as_alias_metadata')))
208
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -341,6 +336,9 @@ def get_auth_backend_role(audience: Optional[str] = None,
341
336
  token_policies=pulumi.get(__ret__, 'token_policies'),
342
337
  token_ttl=pulumi.get(__ret__, 'token_ttl'),
343
338
  token_type=pulumi.get(__ret__, 'token_type'))
339
+
340
+
341
+ @_utilities.lift_output_func(get_auth_backend_role)
344
342
  def get_auth_backend_role_output(audience: Optional[pulumi.Input[Optional[str]]] = None,
345
343
  backend: Optional[pulumi.Input[Optional[str]]] = None,
346
344
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
@@ -397,37 +395,4 @@ def get_auth_backend_role_output(audience: Optional[pulumi.Input[Optional[str]]]
397
395
  `default-service` and `default-batch` which specify the type to return unless the client
398
396
  requests a different type at generation time.
399
397
  """
400
- __args__ = dict()
401
- __args__['audience'] = audience
402
- __args__['backend'] = backend
403
- __args__['namespace'] = namespace
404
- __args__['roleName'] = role_name
405
- __args__['tokenBoundCidrs'] = token_bound_cidrs
406
- __args__['tokenExplicitMaxTtl'] = token_explicit_max_ttl
407
- __args__['tokenMaxTtl'] = token_max_ttl
408
- __args__['tokenNoDefaultPolicy'] = token_no_default_policy
409
- __args__['tokenNumUses'] = token_num_uses
410
- __args__['tokenPeriod'] = token_period
411
- __args__['tokenPolicies'] = token_policies
412
- __args__['tokenTtl'] = token_ttl
413
- __args__['tokenType'] = token_type
414
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
415
- __ret__ = pulumi.runtime.invoke_output('vault:kubernetes/getAuthBackendRole:getAuthBackendRole', __args__, opts=opts, typ=GetAuthBackendRoleResult)
416
- return __ret__.apply(lambda __response__: GetAuthBackendRoleResult(
417
- alias_name_source=pulumi.get(__response__, 'alias_name_source'),
418
- audience=pulumi.get(__response__, 'audience'),
419
- backend=pulumi.get(__response__, 'backend'),
420
- bound_service_account_names=pulumi.get(__response__, 'bound_service_account_names'),
421
- bound_service_account_namespaces=pulumi.get(__response__, 'bound_service_account_namespaces'),
422
- id=pulumi.get(__response__, 'id'),
423
- namespace=pulumi.get(__response__, 'namespace'),
424
- role_name=pulumi.get(__response__, 'role_name'),
425
- token_bound_cidrs=pulumi.get(__response__, 'token_bound_cidrs'),
426
- token_explicit_max_ttl=pulumi.get(__response__, 'token_explicit_max_ttl'),
427
- token_max_ttl=pulumi.get(__response__, 'token_max_ttl'),
428
- token_no_default_policy=pulumi.get(__response__, 'token_no_default_policy'),
429
- token_num_uses=pulumi.get(__response__, 'token_num_uses'),
430
- token_period=pulumi.get(__response__, 'token_period'),
431
- token_policies=pulumi.get(__response__, 'token_policies'),
432
- token_ttl=pulumi.get(__response__, 'token_ttl'),
433
- token_type=pulumi.get(__response__, 'token_type')))
398
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -259,6 +254,9 @@ def get_service_account_token(backend: Optional[str] = None,
259
254
  service_account_namespace=pulumi.get(__ret__, 'service_account_namespace'),
260
255
  service_account_token=pulumi.get(__ret__, 'service_account_token'),
261
256
  ttl=pulumi.get(__ret__, 'ttl'))
257
+
258
+
259
+ @_utilities.lift_output_func(get_service_account_token)
262
260
  def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None,
263
261
  cluster_role_binding: Optional[pulumi.Input[Optional[bool]]] = None,
264
262
  kubernetes_namespace: Optional[pulumi.Input[str]] = None,
@@ -319,26 +317,4 @@ def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None
319
317
  :param str ttl: The TTL of the generated Kubernetes service account token, specified in
320
318
  seconds or as a Go duration format string.
321
319
  """
322
- __args__ = dict()
323
- __args__['backend'] = backend
324
- __args__['clusterRoleBinding'] = cluster_role_binding
325
- __args__['kubernetesNamespace'] = kubernetes_namespace
326
- __args__['namespace'] = namespace
327
- __args__['role'] = role
328
- __args__['ttl'] = ttl
329
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
330
- __ret__ = pulumi.runtime.invoke_output('vault:kubernetes/getServiceAccountToken:getServiceAccountToken', __args__, opts=opts, typ=GetServiceAccountTokenResult)
331
- return __ret__.apply(lambda __response__: GetServiceAccountTokenResult(
332
- backend=pulumi.get(__response__, 'backend'),
333
- cluster_role_binding=pulumi.get(__response__, 'cluster_role_binding'),
334
- id=pulumi.get(__response__, 'id'),
335
- kubernetes_namespace=pulumi.get(__response__, 'kubernetes_namespace'),
336
- lease_duration=pulumi.get(__response__, 'lease_duration'),
337
- lease_id=pulumi.get(__response__, 'lease_id'),
338
- lease_renewable=pulumi.get(__response__, 'lease_renewable'),
339
- namespace=pulumi.get(__response__, 'namespace'),
340
- role=pulumi.get(__response__, 'role'),
341
- service_account_name=pulumi.get(__response__, 'service_account_name'),
342
- service_account_namespace=pulumi.get(__response__, 'service_account_namespace'),
343
- service_account_token=pulumi.get(__response__, 'service_account_token'),
344
- ttl=pulumi.get(__response__, 'ttl')))
320
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretBackendArgs', 'SecretBackend']
@@ -36,7 +31,7 @@ class SecretBackendArgs:
36
31
  local: Optional[pulumi.Input[bool]] = None,
37
32
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
38
33
  namespace: Optional[pulumi.Input[str]] = None,
39
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
34
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
40
35
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
41
36
  plugin_version: Optional[pulumi.Input[str]] = None,
42
37
  seal_wrap: Optional[pulumi.Input[bool]] = None,
@@ -69,7 +64,7 @@ class SecretBackendArgs:
69
64
  The value should not contain leading or trailing forward slashes.
70
65
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
71
66
  *Available only for Vault Enterprise*.
72
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
67
+ :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
73
68
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
74
69
  :param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
75
70
  :param pulumi.Input[bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
@@ -336,14 +331,14 @@ class SecretBackendArgs:
336
331
 
337
332
  @property
338
333
  @pulumi.getter
339
- def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
334
+ def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
340
335
  """
341
336
  Specifies mount type specific options that are passed to the backend
342
337
  """
343
338
  return pulumi.get(self, "options")
344
339
 
345
340
  @options.setter
346
- def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
341
+ def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
347
342
  pulumi.set(self, "options", value)
348
343
 
349
344
  @property
@@ -417,7 +412,7 @@ class _SecretBackendState:
417
412
  local: Optional[pulumi.Input[bool]] = None,
418
413
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
419
414
  namespace: Optional[pulumi.Input[str]] = None,
420
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
415
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
421
416
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
422
417
  path: Optional[pulumi.Input[str]] = None,
423
418
  plugin_version: Optional[pulumi.Input[str]] = None,
@@ -451,7 +446,7 @@ class _SecretBackendState:
451
446
  The value should not contain leading or trailing forward slashes.
452
447
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
453
448
  *Available only for Vault Enterprise*.
454
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
449
+ :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
455
450
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
456
451
  :param pulumi.Input[str] path: Where the secret backend will be mounted
457
452
  :param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
@@ -722,14 +717,14 @@ class _SecretBackendState:
722
717
 
723
718
  @property
724
719
  @pulumi.getter
725
- def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
720
+ def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
726
721
  """
727
722
  Specifies mount type specific options that are passed to the backend
728
723
  """
729
724
  return pulumi.get(self, "options")
730
725
 
731
726
  @options.setter
732
- def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
727
+ def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
733
728
  pulumi.set(self, "options", value)
734
729
 
735
730
  @property
@@ -816,7 +811,7 @@ class SecretBackend(pulumi.CustomResource):
816
811
  local: Optional[pulumi.Input[bool]] = None,
817
812
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
818
813
  namespace: Optional[pulumi.Input[str]] = None,
819
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
814
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
820
815
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
821
816
  path: Optional[pulumi.Input[str]] = None,
822
817
  plugin_version: Optional[pulumi.Input[str]] = None,
@@ -877,7 +872,7 @@ class SecretBackend(pulumi.CustomResource):
877
872
  The value should not contain leading or trailing forward slashes.
878
873
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
879
874
  *Available only for Vault Enterprise*.
880
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
875
+ :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
881
876
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
882
877
  :param pulumi.Input[str] path: Where the secret backend will be mounted
883
878
  :param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
@@ -950,7 +945,7 @@ class SecretBackend(pulumi.CustomResource):
950
945
  local: Optional[pulumi.Input[bool]] = None,
951
946
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
952
947
  namespace: Optional[pulumi.Input[str]] = None,
953
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
948
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
954
949
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
955
950
  path: Optional[pulumi.Input[str]] = None,
956
951
  plugin_version: Optional[pulumi.Input[str]] = None,
@@ -1019,7 +1014,7 @@ class SecretBackend(pulumi.CustomResource):
1019
1014
  local: Optional[pulumi.Input[bool]] = None,
1020
1015
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1021
1016
  namespace: Optional[pulumi.Input[str]] = None,
1022
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1017
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1023
1018
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1024
1019
  path: Optional[pulumi.Input[str]] = None,
1025
1020
  plugin_version: Optional[pulumi.Input[str]] = None,
@@ -1058,7 +1053,7 @@ class SecretBackend(pulumi.CustomResource):
1058
1053
  The value should not contain leading or trailing forward slashes.
1059
1054
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1060
1055
  *Available only for Vault Enterprise*.
1061
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
1056
+ :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
1062
1057
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1063
1058
  :param pulumi.Input[str] path: Where the secret backend will be mounted
1064
1059
  :param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
@@ -1243,7 +1238,7 @@ class SecretBackend(pulumi.CustomResource):
1243
1238
 
1244
1239
  @property
1245
1240
  @pulumi.getter
1246
- def options(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
1241
+ def options(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
1247
1242
  """
1248
1243
  Specifies mount type specific options that are passed to the backend
1249
1244
  """
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
@@ -4,57 +4,25 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
18
13
  'SecretV2CustomMetadataArgs',
19
- 'SecretV2CustomMetadataArgsDict',
20
14
  ]
21
15
 
22
- MYPY = False
23
-
24
- if not MYPY:
25
- class SecretV2CustomMetadataArgsDict(TypedDict):
26
- cas_required: NotRequired[pulumi.Input[bool]]
27
- """
28
- If true, all keys will require the cas parameter to be set on all write requests.
29
- """
30
- data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
31
- """
32
- A mapping whose keys are the top-level data keys returned from
33
- Vault and whose values are the corresponding values. This map can only
34
- represent string data, so any non-string values returned from Vault are
35
- serialized as JSON.
36
- """
37
- delete_version_after: NotRequired[pulumi.Input[int]]
38
- """
39
- If set, specifies the length of time before a version is deleted.
40
- """
41
- max_versions: NotRequired[pulumi.Input[int]]
42
- """
43
- The number of versions to keep per key.
44
- """
45
- elif False:
46
- SecretV2CustomMetadataArgsDict: TypeAlias = Mapping[str, Any]
47
-
48
16
  @pulumi.input_type
49
17
  class SecretV2CustomMetadataArgs:
50
18
  def __init__(__self__, *,
51
19
  cas_required: Optional[pulumi.Input[bool]] = None,
52
- data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
20
+ data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
53
21
  delete_version_after: Optional[pulumi.Input[int]] = None,
54
22
  max_versions: Optional[pulumi.Input[int]] = None):
55
23
  """
56
24
  :param pulumi.Input[bool] cas_required: If true, all keys will require the cas parameter to be set on all write requests.
57
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
25
+ :param pulumi.Input[Mapping[str, Any]] data: A mapping whose keys are the top-level data keys returned from
58
26
  Vault and whose values are the corresponding values. This map can only
59
27
  represent string data, so any non-string values returned from Vault are
60
28
  serialized as JSON.
@@ -84,7 +52,7 @@ class SecretV2CustomMetadataArgs:
84
52
 
85
53
  @property
86
54
  @pulumi.getter
87
- def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
55
+ def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
88
56
  """
89
57
  A mapping whose keys are the top-level data keys returned from
90
58
  Vault and whose values are the corresponding values. This map can only
@@ -94,7 +62,7 @@ class SecretV2CustomMetadataArgs:
94
62
  return pulumi.get(self, "data")
95
63
 
96
64
  @data.setter
97
- def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
65
+ def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
98
66
  pulumi.set(self, "data", value)
99
67
 
100
68
  @property
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -54,7 +49,7 @@ class GetSecretResult:
54
49
 
55
50
  @property
56
51
  @pulumi.getter
57
- def data(self) -> Mapping[str, str]:
52
+ def data(self) -> Mapping[str, Any]:
58
53
  """
59
54
  A mapping whose keys are the top-level data keys returned from
60
55
  Vault and whose values are the corresponding values. This map can only
@@ -186,6 +181,9 @@ def get_secret(namespace: Optional[str] = None,
186
181
  lease_renewable=pulumi.get(__ret__, 'lease_renewable'),
187
182
  namespace=pulumi.get(__ret__, 'namespace'),
188
183
  path=pulumi.get(__ret__, 'path'))
184
+
185
+
186
+ @_utilities.lift_output_func(get_secret)
189
187
  def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
190
188
  path: Optional[pulumi.Input[str]] = None,
191
189
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecretResult]:
@@ -224,17 +222,4 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
224
222
  *Available only for Vault Enterprise*.
225
223
  :param str path: Full path of the KV-V1 secret.
226
224
  """
227
- __args__ = dict()
228
- __args__['namespace'] = namespace
229
- __args__['path'] = path
230
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
231
- __ret__ = pulumi.runtime.invoke_output('vault:kv/getSecret:getSecret', __args__, opts=opts, typ=GetSecretResult)
232
- return __ret__.apply(lambda __response__: GetSecretResult(
233
- data=pulumi.get(__response__, 'data'),
234
- data_json=pulumi.get(__response__, 'data_json'),
235
- id=pulumi.get(__response__, 'id'),
236
- lease_duration=pulumi.get(__response__, 'lease_duration'),
237
- lease_id=pulumi.get(__response__, 'lease_id'),
238
- lease_renewable=pulumi.get(__response__, 'lease_renewable'),
239
- namespace=pulumi.get(__response__, 'namespace'),
240
- path=pulumi.get(__response__, 'path')))
225
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -57,7 +52,7 @@ class GetSecretSubkeysV2Result:
57
52
 
58
53
  @property
59
54
  @pulumi.getter
60
- def data(self) -> Mapping[str, str]:
55
+ def data(self) -> Mapping[str, Any]:
61
56
  """
62
57
  Subkeys for the KV-V2 secret stored as a serialized map of strings.
63
58
  """
@@ -202,6 +197,9 @@ def get_secret_subkeys_v2(depth: Optional[int] = None,
202
197
  namespace=pulumi.get(__ret__, 'namespace'),
203
198
  path=pulumi.get(__ret__, 'path'),
204
199
  version=pulumi.get(__ret__, 'version'))
200
+
201
+
202
+ @_utilities.lift_output_func(get_secret_subkeys_v2)
205
203
  def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] = None,
206
204
  mount: Optional[pulumi.Input[str]] = None,
207
205
  name: Optional[pulumi.Input[str]] = None,
@@ -255,21 +253,4 @@ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] =
255
253
  :param int version: Specifies the version to return. If not
256
254
  set the latest version is returned.
257
255
  """
258
- __args__ = dict()
259
- __args__['depth'] = depth
260
- __args__['mount'] = mount
261
- __args__['name'] = name
262
- __args__['namespace'] = namespace
263
- __args__['version'] = version
264
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
265
- __ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretSubkeysV2:getSecretSubkeysV2', __args__, opts=opts, typ=GetSecretSubkeysV2Result)
266
- return __ret__.apply(lambda __response__: GetSecretSubkeysV2Result(
267
- data=pulumi.get(__response__, 'data'),
268
- data_json=pulumi.get(__response__, 'data_json'),
269
- depth=pulumi.get(__response__, 'depth'),
270
- id=pulumi.get(__response__, 'id'),
271
- mount=pulumi.get(__response__, 'mount'),
272
- name=pulumi.get(__response__, 'name'),
273
- namespace=pulumi.get(__response__, 'namespace'),
274
- path=pulumi.get(__response__, 'path'),
275
- version=pulumi.get(__response__, 'version')))
256
+ ...