pulumi-vault 6.4.0__py3-none-any.whl → 6.4.0a1723454543__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +0 -560
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +4 -19
  4. pulumi_vault/ad/secret_backend.py +0 -5
  5. pulumi_vault/ad/secret_library.py +0 -5
  6. pulumi_vault/ad/secret_role.py +0 -5
  7. pulumi_vault/alicloud/auth_backend_role.py +0 -5
  8. pulumi_vault/approle/auth_backend_login.py +0 -5
  9. pulumi_vault/approle/auth_backend_role.py +0 -5
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -99
  11. pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
  12. pulumi_vault/audit.py +0 -5
  13. pulumi_vault/audit_request_header.py +0 -5
  14. pulumi_vault/auth_backend.py +0 -5
  15. pulumi_vault/aws/auth_backend_cert.py +0 -5
  16. pulumi_vault/aws/auth_backend_client.py +0 -5
  17. pulumi_vault/aws/auth_backend_config_identity.py +0 -5
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
  19. pulumi_vault/aws/auth_backend_login.py +7 -12
  20. pulumi_vault/aws/auth_backend_role.py +0 -5
  21. pulumi_vault/aws/auth_backend_role_tag.py +0 -5
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
  23. pulumi_vault/aws/auth_backend_sts_role.py +0 -5
  24. pulumi_vault/aws/get_access_credentials.py +4 -31
  25. pulumi_vault/aws/get_static_access_credentials.py +4 -18
  26. pulumi_vault/aws/secret_backend.py +0 -5
  27. pulumi_vault/aws/secret_backend_role.py +0 -5
  28. pulumi_vault/aws/secret_backend_static_role.py +0 -5
  29. pulumi_vault/azure/_inputs.py +0 -24
  30. pulumi_vault/azure/auth_backend_config.py +0 -5
  31. pulumi_vault/azure/auth_backend_role.py +0 -5
  32. pulumi_vault/azure/backend.py +0 -5
  33. pulumi_vault/azure/backend_role.py +0 -5
  34. pulumi_vault/azure/get_access_credentials.py +4 -36
  35. pulumi_vault/azure/outputs.py +0 -5
  36. pulumi_vault/cert_auth_backend_role.py +0 -5
  37. pulumi_vault/config/__init__.pyi +0 -5
  38. pulumi_vault/config/_inputs.py +0 -21
  39. pulumi_vault/config/outputs.py +0 -5
  40. pulumi_vault/config/ui_custom_message.py +14 -19
  41. pulumi_vault/config/vars.py +0 -5
  42. pulumi_vault/consul/secret_backend.py +0 -5
  43. pulumi_vault/consul/secret_backend_role.py +0 -5
  44. pulumi_vault/database/_inputs.py +105 -2256
  45. pulumi_vault/database/outputs.py +54 -199
  46. pulumi_vault/database/secret_backend_connection.py +14 -19
  47. pulumi_vault/database/secret_backend_role.py +14 -19
  48. pulumi_vault/database/secret_backend_static_role.py +1 -69
  49. pulumi_vault/database/secrets_mount.py +14 -19
  50. pulumi_vault/egp_policy.py +0 -5
  51. pulumi_vault/gcp/_inputs.py +0 -111
  52. pulumi_vault/gcp/auth_backend.py +0 -5
  53. pulumi_vault/gcp/auth_backend_role.py +0 -5
  54. pulumi_vault/gcp/get_auth_backend_role.py +4 -42
  55. pulumi_vault/gcp/outputs.py +0 -5
  56. pulumi_vault/gcp/secret_backend.py +0 -5
  57. pulumi_vault/gcp/secret_impersonated_account.py +3 -62
  58. pulumi_vault/gcp/secret_roleset.py +0 -5
  59. pulumi_vault/gcp/secret_static_account.py +0 -5
  60. pulumi_vault/generic/endpoint.py +0 -5
  61. pulumi_vault/generic/get_secret.py +5 -25
  62. pulumi_vault/generic/secret.py +7 -12
  63. pulumi_vault/get_auth_backend.py +4 -21
  64. pulumi_vault/get_auth_backends.py +4 -16
  65. pulumi_vault/get_namespace.py +5 -18
  66. pulumi_vault/get_namespaces.py +4 -13
  67. pulumi_vault/get_nomad_access_token.py +8 -28
  68. pulumi_vault/get_policy_document.py +4 -15
  69. pulumi_vault/get_raft_autopilot_state.py +7 -26
  70. pulumi_vault/github/_inputs.py +0 -55
  71. pulumi_vault/github/auth_backend.py +0 -5
  72. pulumi_vault/github/outputs.py +0 -5
  73. pulumi_vault/github/team.py +0 -5
  74. pulumi_vault/github/user.py +0 -5
  75. pulumi_vault/identity/entity.py +0 -5
  76. pulumi_vault/identity/entity_alias.py +0 -5
  77. pulumi_vault/identity/entity_policies.py +0 -5
  78. pulumi_vault/identity/get_entity.py +5 -35
  79. pulumi_vault/identity/get_group.py +6 -42
  80. pulumi_vault/identity/get_oidc_client_creds.py +4 -16
  81. pulumi_vault/identity/get_oidc_openid_config.py +4 -26
  82. pulumi_vault/identity/get_oidc_public_keys.py +5 -16
  83. pulumi_vault/identity/group.py +0 -5
  84. pulumi_vault/identity/group_alias.py +0 -5
  85. pulumi_vault/identity/group_member_entity_ids.py +0 -5
  86. pulumi_vault/identity/group_member_group_ids.py +0 -5
  87. pulumi_vault/identity/group_policies.py +0 -5
  88. pulumi_vault/identity/mfa_duo.py +0 -5
  89. pulumi_vault/identity/mfa_login_enforcement.py +0 -5
  90. pulumi_vault/identity/mfa_okta.py +0 -5
  91. pulumi_vault/identity/mfa_pingid.py +0 -5
  92. pulumi_vault/identity/mfa_totp.py +0 -5
  93. pulumi_vault/identity/oidc.py +0 -5
  94. pulumi_vault/identity/oidc_assignment.py +0 -5
  95. pulumi_vault/identity/oidc_client.py +0 -5
  96. pulumi_vault/identity/oidc_key.py +0 -5
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
  98. pulumi_vault/identity/oidc_provider.py +0 -5
  99. pulumi_vault/identity/oidc_role.py +0 -5
  100. pulumi_vault/identity/oidc_scope.py +0 -5
  101. pulumi_vault/identity/outputs.py +3 -8
  102. pulumi_vault/jwt/_inputs.py +0 -55
  103. pulumi_vault/jwt/auth_backend.py +0 -5
  104. pulumi_vault/jwt/auth_backend_role.py +28 -33
  105. pulumi_vault/jwt/outputs.py +0 -5
  106. pulumi_vault/kmip/secret_backend.py +0 -5
  107. pulumi_vault/kmip/secret_role.py +0 -5
  108. pulumi_vault/kmip/secret_scope.py +0 -5
  109. pulumi_vault/kubernetes/auth_backend_config.py +3 -55
  110. pulumi_vault/kubernetes/auth_backend_role.py +0 -5
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +7 -59
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
  113. pulumi_vault/kubernetes/get_service_account_token.py +4 -28
  114. pulumi_vault/kubernetes/secret_backend.py +14 -19
  115. pulumi_vault/kubernetes/secret_backend_role.py +0 -5
  116. pulumi_vault/kv/_inputs.py +4 -36
  117. pulumi_vault/kv/get_secret.py +5 -20
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +5 -24
  119. pulumi_vault/kv/get_secret_v2.py +8 -27
  120. pulumi_vault/kv/get_secrets_list.py +4 -15
  121. pulumi_vault/kv/get_secrets_list_v2.py +4 -18
  122. pulumi_vault/kv/outputs.py +3 -8
  123. pulumi_vault/kv/secret.py +7 -12
  124. pulumi_vault/kv/secret_backend_v2.py +0 -5
  125. pulumi_vault/kv/secret_v2.py +28 -33
  126. pulumi_vault/ldap/auth_backend.py +0 -52
  127. pulumi_vault/ldap/auth_backend_group.py +0 -5
  128. pulumi_vault/ldap/auth_backend_user.py +0 -5
  129. pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
  130. pulumi_vault/ldap/get_static_credentials.py +4 -23
  131. pulumi_vault/ldap/secret_backend.py +14 -19
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
  133. pulumi_vault/ldap/secret_backend_library_set.py +0 -5
  134. pulumi_vault/ldap/secret_backend_static_role.py +0 -5
  135. pulumi_vault/managed/_inputs.py +0 -205
  136. pulumi_vault/managed/keys.py +0 -5
  137. pulumi_vault/managed/outputs.py +0 -5
  138. pulumi_vault/mfa_duo.py +0 -5
  139. pulumi_vault/mfa_okta.py +0 -5
  140. pulumi_vault/mfa_pingid.py +0 -5
  141. pulumi_vault/mfa_totp.py +0 -5
  142. pulumi_vault/mongodbatlas/secret_backend.py +0 -5
  143. pulumi_vault/mongodbatlas/secret_role.py +0 -5
  144. pulumi_vault/mount.py +16 -21
  145. pulumi_vault/namespace.py +14 -19
  146. pulumi_vault/nomad_secret_backend.py +0 -5
  147. pulumi_vault/nomad_secret_role.py +0 -5
  148. pulumi_vault/okta/_inputs.py +0 -39
  149. pulumi_vault/okta/auth_backend.py +0 -5
  150. pulumi_vault/okta/auth_backend_group.py +0 -5
  151. pulumi_vault/okta/auth_backend_user.py +0 -5
  152. pulumi_vault/okta/outputs.py +0 -5
  153. pulumi_vault/outputs.py +0 -5
  154. pulumi_vault/password_policy.py +0 -5
  155. pulumi_vault/pkisecret/_inputs.py +8 -49
  156. pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
  157. pulumi_vault/pkisecret/backend_config_est.py +14 -19
  158. pulumi_vault/pkisecret/get_backend_config_est.py +5 -23
  159. pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
  160. pulumi_vault/pkisecret/get_backend_issuers.py +5 -18
  161. pulumi_vault/pkisecret/get_backend_key.py +4 -19
  162. pulumi_vault/pkisecret/get_backend_keys.py +5 -18
  163. pulumi_vault/pkisecret/outputs.py +12 -17
  164. pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
  172. pulumi_vault/pkisecret/secret_backend_key.py +0 -5
  173. pulumi_vault/pkisecret/secret_backend_role.py +0 -5
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
  176. pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
  177. pulumi_vault/plugin.py +0 -5
  178. pulumi_vault/plugin_pinned_version.py +0 -5
  179. pulumi_vault/policy.py +0 -5
  180. pulumi_vault/provider.py +0 -5
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +0 -5
  183. pulumi_vault/quota_rate_limit.py +0 -5
  184. pulumi_vault/rabbitmq/_inputs.py +0 -61
  185. pulumi_vault/rabbitmq/outputs.py +0 -5
  186. pulumi_vault/rabbitmq/secret_backend.py +0 -5
  187. pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
  188. pulumi_vault/raft_autopilot.py +0 -5
  189. pulumi_vault/raft_snapshot_agent_config.py +0 -5
  190. pulumi_vault/rgp_policy.py +0 -5
  191. pulumi_vault/saml/auth_backend.py +0 -5
  192. pulumi_vault/saml/auth_backend_role.py +14 -19
  193. pulumi_vault/secrets/_inputs.py +0 -30
  194. pulumi_vault/secrets/outputs.py +0 -5
  195. pulumi_vault/secrets/sync_association.py +0 -5
  196. pulumi_vault/secrets/sync_aws_destination.py +14 -19
  197. pulumi_vault/secrets/sync_azure_destination.py +14 -19
  198. pulumi_vault/secrets/sync_config.py +0 -5
  199. pulumi_vault/secrets/sync_gcp_destination.py +14 -19
  200. pulumi_vault/secrets/sync_gh_destination.py +0 -5
  201. pulumi_vault/secrets/sync_github_apps.py +0 -5
  202. pulumi_vault/secrets/sync_vercel_destination.py +0 -5
  203. pulumi_vault/ssh/_inputs.py +0 -22
  204. pulumi_vault/ssh/outputs.py +0 -5
  205. pulumi_vault/ssh/secret_backend_ca.py +0 -5
  206. pulumi_vault/ssh/secret_backend_role.py +28 -67
  207. pulumi_vault/terraformcloud/secret_backend.py +0 -5
  208. pulumi_vault/terraformcloud/secret_creds.py +0 -5
  209. pulumi_vault/terraformcloud/secret_role.py +0 -5
  210. pulumi_vault/token.py +0 -5
  211. pulumi_vault/tokenauth/auth_backend_role.py +14 -5
  212. pulumi_vault/transform/alphabet.py +0 -5
  213. pulumi_vault/transform/get_decode.py +14 -38
  214. pulumi_vault/transform/get_encode.py +14 -38
  215. pulumi_vault/transform/role.py +0 -5
  216. pulumi_vault/transform/template.py +14 -19
  217. pulumi_vault/transform/transformation.py +0 -5
  218. pulumi_vault/transit/get_decrypt.py +4 -21
  219. pulumi_vault/transit/get_encrypt.py +4 -23
  220. pulumi_vault/transit/secret_backend_key.py +7 -12
  221. pulumi_vault/transit/secret_cache_config.py +0 -5
  222. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/METADATA +2 -3
  223. pulumi_vault-6.4.0a1723454543.dist-info/RECORD +256 -0
  224. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/WHEEL +1 -1
  225. pulumi_vault-6.4.0.dist-info/RECORD +0 -256
  226. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/top_level.txt +0 -0
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -74,7 +69,7 @@ class GetSecretV2Result:
74
69
 
75
70
  @property
76
71
  @pulumi.getter(name="customMetadata")
77
- def custom_metadata(self) -> Mapping[str, str]:
72
+ def custom_metadata(self) -> Mapping[str, Any]:
78
73
  """
79
74
  Custom metadata for the secret.
80
75
  """
@@ -82,7 +77,7 @@ class GetSecretV2Result:
82
77
 
83
78
  @property
84
79
  @pulumi.getter
85
- def data(self) -> Mapping[str, str]:
80
+ def data(self) -> Mapping[str, Any]:
86
81
  """
87
82
  A mapping whose keys are the top-level data keys returned from
88
83
  Vault and whose values are the corresponding values. This map can only
@@ -199,6 +194,7 @@ def get_secret_v2(mount: Optional[str] = None,
199
194
  example_secret_v2 = vault.kv.SecretV2("example",
200
195
  mount=kvv2.path,
201
196
  name="secret",
197
+ cas=1,
202
198
  delete_all_versions=True,
203
199
  data_json=json.dumps({
204
200
  "zip": "zap",
@@ -245,6 +241,9 @@ def get_secret_v2(mount: Optional[str] = None,
245
241
  namespace=pulumi.get(__ret__, 'namespace'),
246
242
  path=pulumi.get(__ret__, 'path'),
247
243
  version=pulumi.get(__ret__, 'version'))
244
+
245
+
246
+ @_utilities.lift_output_func(get_secret_v2)
248
247
  def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None,
249
248
  name: Optional[pulumi.Input[str]] = None,
250
249
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
@@ -268,6 +267,7 @@ def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None,
268
267
  example_secret_v2 = vault.kv.SecretV2("example",
269
268
  mount=kvv2.path,
270
269
  name="secret",
270
+ cas=1,
271
271
  delete_all_versions=True,
272
272
  data_json=json.dumps({
273
273
  "zip": "zap",
@@ -293,23 +293,4 @@ def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None,
293
293
  *Available only for Vault Enterprise*.
294
294
  :param int version: Version of the secret to retrieve.
295
295
  """
296
- __args__ = dict()
297
- __args__['mount'] = mount
298
- __args__['name'] = name
299
- __args__['namespace'] = namespace
300
- __args__['version'] = version
301
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
302
- __ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretV2:getSecretV2', __args__, opts=opts, typ=GetSecretV2Result)
303
- return __ret__.apply(lambda __response__: GetSecretV2Result(
304
- created_time=pulumi.get(__response__, 'created_time'),
305
- custom_metadata=pulumi.get(__response__, 'custom_metadata'),
306
- data=pulumi.get(__response__, 'data'),
307
- data_json=pulumi.get(__response__, 'data_json'),
308
- deletion_time=pulumi.get(__response__, 'deletion_time'),
309
- destroyed=pulumi.get(__response__, 'destroyed'),
310
- id=pulumi.get(__response__, 'id'),
311
- mount=pulumi.get(__response__, 'mount'),
312
- name=pulumi.get(__response__, 'name'),
313
- namespace=pulumi.get(__response__, 'namespace'),
314
- path=pulumi.get(__response__, 'path'),
315
- version=pulumi.get(__response__, 'version')))
296
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -132,6 +127,9 @@ def get_secrets_list(namespace: Optional[str] = None,
132
127
  names=pulumi.get(__ret__, 'names'),
133
128
  namespace=pulumi.get(__ret__, 'namespace'),
134
129
  path=pulumi.get(__ret__, 'path'))
130
+
131
+
132
+ @_utilities.lift_output_func(get_secrets_list)
135
133
  def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
136
134
  path: Optional[pulumi.Input[str]] = None,
137
135
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecretsListResult]:
@@ -174,13 +172,4 @@ def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
174
172
  *Available only for Vault Enterprise*.
175
173
  :param str path: Full KV-V1 path where secrets will be listed.
176
174
  """
177
- __args__ = dict()
178
- __args__['namespace'] = namespace
179
- __args__['path'] = path
180
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
181
- __ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretsList:getSecretsList', __args__, opts=opts, typ=GetSecretsListResult)
182
- return __ret__.apply(lambda __response__: GetSecretsListResult(
183
- id=pulumi.get(__response__, 'id'),
184
- names=pulumi.get(__response__, 'names'),
185
- namespace=pulumi.get(__response__, 'namespace'),
186
- path=pulumi.get(__response__, 'path')))
175
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -171,6 +166,9 @@ def get_secrets_list_v2(mount: Optional[str] = None,
171
166
  names=pulumi.get(__ret__, 'names'),
172
167
  namespace=pulumi.get(__ret__, 'namespace'),
173
168
  path=pulumi.get(__ret__, 'path'))
169
+
170
+
171
+ @_utilities.lift_output_func(get_secrets_list_v2)
174
172
  def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
175
173
  name: Optional[pulumi.Input[Optional[str]]] = None,
176
174
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
@@ -228,16 +226,4 @@ def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
228
226
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
229
227
  *Available only for Vault Enterprise*.
230
228
  """
231
- __args__ = dict()
232
- __args__['mount'] = mount
233
- __args__['name'] = name
234
- __args__['namespace'] = namespace
235
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
236
- __ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretsListV2:getSecretsListV2', __args__, opts=opts, typ=GetSecretsListV2Result)
237
- return __ret__.apply(lambda __response__: GetSecretsListV2Result(
238
- id=pulumi.get(__response__, 'id'),
239
- mount=pulumi.get(__response__, 'mount'),
240
- name=pulumi.get(__response__, 'name'),
241
- names=pulumi.get(__response__, 'names'),
242
- namespace=pulumi.get(__response__, 'namespace'),
243
- path=pulumi.get(__response__, 'path')))
229
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -43,12 +38,12 @@ class SecretV2CustomMetadata(dict):
43
38
 
44
39
  def __init__(__self__, *,
45
40
  cas_required: Optional[bool] = None,
46
- data: Optional[Mapping[str, str]] = None,
41
+ data: Optional[Mapping[str, Any]] = None,
47
42
  delete_version_after: Optional[int] = None,
48
43
  max_versions: Optional[int] = None):
49
44
  """
50
45
  :param bool cas_required: If true, all keys will require the cas parameter to be set on all write requests.
51
- :param Mapping[str, str] data: A mapping whose keys are the top-level data keys returned from
46
+ :param Mapping[str, Any] data: A mapping whose keys are the top-level data keys returned from
52
47
  Vault and whose values are the corresponding values. This map can only
53
48
  represent string data, so any non-string values returned from Vault are
54
49
  serialized as JSON.
@@ -74,7 +69,7 @@ class SecretV2CustomMetadata(dict):
74
69
 
75
70
  @property
76
71
  @pulumi.getter
77
- def data(self) -> Optional[Mapping[str, str]]:
72
+ def data(self) -> Optional[Mapping[str, Any]]:
78
73
  """
79
74
  A mapping whose keys are the top-level data keys returned from
80
75
  Vault and whose values are the corresponding values. This map can only
pulumi_vault/kv/secret.py CHANGED
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretArgs', 'Secret']
@@ -81,13 +76,13 @@ class SecretArgs:
81
76
  @pulumi.input_type
82
77
  class _SecretState:
83
78
  def __init__(__self__, *,
84
- data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
79
+ data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
85
80
  data_json: Optional[pulumi.Input[str]] = None,
86
81
  namespace: Optional[pulumi.Input[str]] = None,
87
82
  path: Optional[pulumi.Input[str]] = None):
88
83
  """
89
84
  Input properties used for looking up and filtering Secret resources.
90
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
85
+ :param pulumi.Input[Mapping[str, Any]] data: A mapping whose keys are the top-level data keys returned from
91
86
  Vault and whose values are the corresponding values. This map can only
92
87
  represent string data, so any non-string values returned from Vault are
93
88
  serialized as JSON.
@@ -110,7 +105,7 @@ class _SecretState:
110
105
 
111
106
  @property
112
107
  @pulumi.getter
113
- def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
108
+ def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
114
109
  """
115
110
  A mapping whose keys are the top-level data keys returned from
116
111
  Vault and whose values are the corresponding values. This map can only
@@ -120,7 +115,7 @@ class _SecretState:
120
115
  return pulumi.get(self, "data")
121
116
 
122
117
  @data.setter
123
- def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
118
+ def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
124
119
  pulumi.set(self, "data", value)
125
120
 
126
121
  @property
@@ -322,7 +317,7 @@ class Secret(pulumi.CustomResource):
322
317
  def get(resource_name: str,
323
318
  id: pulumi.Input[str],
324
319
  opts: Optional[pulumi.ResourceOptions] = None,
325
- data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
320
+ data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
326
321
  data_json: Optional[pulumi.Input[str]] = None,
327
322
  namespace: Optional[pulumi.Input[str]] = None,
328
323
  path: Optional[pulumi.Input[str]] = None) -> 'Secret':
@@ -333,7 +328,7 @@ class Secret(pulumi.CustomResource):
333
328
  :param str resource_name: The unique name of the resulting resource.
334
329
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
335
330
  :param pulumi.ResourceOptions opts: Options for the resource.
336
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
331
+ :param pulumi.Input[Mapping[str, Any]] data: A mapping whose keys are the top-level data keys returned from
337
332
  Vault and whose values are the corresponding values. This map can only
338
333
  represent string data, so any non-string values returned from Vault are
339
334
  serialized as JSON.
@@ -357,7 +352,7 @@ class Secret(pulumi.CustomResource):
357
352
 
358
353
  @property
359
354
  @pulumi.getter
360
- def data(self) -> pulumi.Output[Mapping[str, str]]:
355
+ def data(self) -> pulumi.Output[Mapping[str, Any]]:
361
356
  """
362
357
  A mapping whose keys are the top-level data keys returned from
363
358
  Vault and whose values are the corresponding values. This map can only
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretBackendV2Args', 'SecretBackendV2']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
  from . import outputs
17
12
  from ._inputs import *
@@ -29,7 +24,7 @@ class SecretV2Args:
29
24
  disable_read: Optional[pulumi.Input[bool]] = None,
30
25
  name: Optional[pulumi.Input[str]] = None,
31
26
  namespace: Optional[pulumi.Input[str]] = None,
32
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None):
27
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None):
33
28
  """
34
29
  The set of arguments for constructing a SecretV2 resource.
35
30
  :param pulumi.Input[str] data_json: JSON-encoded string that will be
@@ -54,7 +49,7 @@ class SecretV2Args:
54
49
  The value should not contain leading or trailing forward slashes.
55
50
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
56
51
  *Available only for Vault Enterprise*.
57
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: An object that holds option settings.
52
+ :param pulumi.Input[Mapping[str, Any]] options: An object that holds option settings.
58
53
  """
59
54
  pulumi.set(__self__, "data_json", data_json)
60
55
  pulumi.set(__self__, "mount", mount)
@@ -185,14 +180,14 @@ class SecretV2Args:
185
180
 
186
181
  @property
187
182
  @pulumi.getter
188
- def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
183
+ def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
189
184
  """
190
185
  An object that holds option settings.
191
186
  """
192
187
  return pulumi.get(self, "options")
193
188
 
194
189
  @options.setter
195
- def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
190
+ def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
196
191
  pulumi.set(self, "options", value)
197
192
 
198
193
 
@@ -201,15 +196,15 @@ class _SecretV2State:
201
196
  def __init__(__self__, *,
202
197
  cas: Optional[pulumi.Input[int]] = None,
203
198
  custom_metadata: Optional[pulumi.Input['SecretV2CustomMetadataArgs']] = None,
204
- data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
199
+ data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
205
200
  data_json: Optional[pulumi.Input[str]] = None,
206
201
  delete_all_versions: Optional[pulumi.Input[bool]] = None,
207
202
  disable_read: Optional[pulumi.Input[bool]] = None,
208
- metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
203
+ metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
209
204
  mount: Optional[pulumi.Input[str]] = None,
210
205
  name: Optional[pulumi.Input[str]] = None,
211
206
  namespace: Optional[pulumi.Input[str]] = None,
212
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
207
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
213
208
  path: Optional[pulumi.Input[str]] = None):
214
209
  """
215
210
  Input properties used for looking up and filtering SecretV2 resources.
@@ -220,7 +215,7 @@ class _SecretV2State:
220
215
  :param pulumi.Input['SecretV2CustomMetadataArgs'] custom_metadata: A nested block that allows configuring metadata for the
221
216
  KV secret. Refer to the
222
217
  Configuration Options for more info.
223
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
218
+ :param pulumi.Input[Mapping[str, Any]] data: A mapping whose keys are the top-level data keys returned from
224
219
  Vault and whose values are the corresponding values. This map can only
225
220
  represent string data, so any non-string values returned from Vault are
226
221
  serialized as JSON.
@@ -230,7 +225,7 @@ class _SecretV2State:
230
225
  versions for the specified key.
231
226
  :param pulumi.Input[bool] disable_read: If set to true, disables reading secret from Vault;
232
227
  note: drift won't be detected.
233
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: Metadata associated with this secret read from Vault.
228
+ :param pulumi.Input[Mapping[str, Any]] metadata: Metadata associated with this secret read from Vault.
234
229
  :param pulumi.Input[str] mount: Path where KV-V2 engine is mounted.
235
230
  :param pulumi.Input[str] name: Full name of the secret. For a nested secret
236
231
  the name is the nested path excluding the mount and data
@@ -240,7 +235,7 @@ class _SecretV2State:
240
235
  The value should not contain leading or trailing forward slashes.
241
236
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
242
237
  *Available only for Vault Enterprise*.
243
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: An object that holds option settings.
238
+ :param pulumi.Input[Mapping[str, Any]] options: An object that holds option settings.
244
239
  :param pulumi.Input[str] path: Full path where the KV-V2 secret will be written.
245
240
  """
246
241
  if cas is not None:
@@ -299,7 +294,7 @@ class _SecretV2State:
299
294
 
300
295
  @property
301
296
  @pulumi.getter
302
- def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
297
+ def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
303
298
  """
304
299
  A mapping whose keys are the top-level data keys returned from
305
300
  Vault and whose values are the corresponding values. This map can only
@@ -309,7 +304,7 @@ class _SecretV2State:
309
304
  return pulumi.get(self, "data")
310
305
 
311
306
  @data.setter
312
- def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
307
+ def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
313
308
  pulumi.set(self, "data", value)
314
309
 
315
310
  @property
@@ -353,14 +348,14 @@ class _SecretV2State:
353
348
 
354
349
  @property
355
350
  @pulumi.getter
356
- def metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
351
+ def metadata(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
357
352
  """
358
353
  Metadata associated with this secret read from Vault.
359
354
  """
360
355
  return pulumi.get(self, "metadata")
361
356
 
362
357
  @metadata.setter
363
- def metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
358
+ def metadata(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
364
359
  pulumi.set(self, "metadata", value)
365
360
 
366
361
  @property
@@ -407,14 +402,14 @@ class _SecretV2State:
407
402
 
408
403
  @property
409
404
  @pulumi.getter
410
- def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
405
+ def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
411
406
  """
412
407
  An object that holds option settings.
413
408
  """
414
409
  return pulumi.get(self, "options")
415
410
 
416
411
  @options.setter
417
- def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
412
+ def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
418
413
  pulumi.set(self, "options", value)
419
414
 
420
415
  @property
@@ -443,7 +438,7 @@ class SecretV2(pulumi.CustomResource):
443
438
  mount: Optional[pulumi.Input[str]] = None,
444
439
  name: Optional[pulumi.Input[str]] = None,
445
440
  namespace: Optional[pulumi.Input[str]] = None,
446
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
441
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
447
442
  __props__=None):
448
443
  """
449
444
  Writes a KV-V2 secret to a given path in Vault.
@@ -534,7 +529,7 @@ class SecretV2(pulumi.CustomResource):
534
529
  The value should not contain leading or trailing forward slashes.
535
530
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
536
531
  *Available only for Vault Enterprise*.
537
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: An object that holds option settings.
532
+ :param pulumi.Input[Mapping[str, Any]] options: An object that holds option settings.
538
533
  """
539
534
  ...
540
535
  @overload
@@ -630,7 +625,7 @@ class SecretV2(pulumi.CustomResource):
630
625
  mount: Optional[pulumi.Input[str]] = None,
631
626
  name: Optional[pulumi.Input[str]] = None,
632
627
  namespace: Optional[pulumi.Input[str]] = None,
633
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
628
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
634
629
  __props__=None):
635
630
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
636
631
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -670,15 +665,15 @@ class SecretV2(pulumi.CustomResource):
670
665
  opts: Optional[pulumi.ResourceOptions] = None,
671
666
  cas: Optional[pulumi.Input[int]] = None,
672
667
  custom_metadata: Optional[pulumi.Input[Union['SecretV2CustomMetadataArgs', 'SecretV2CustomMetadataArgsDict']]] = None,
673
- data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
668
+ data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
674
669
  data_json: Optional[pulumi.Input[str]] = None,
675
670
  delete_all_versions: Optional[pulumi.Input[bool]] = None,
676
671
  disable_read: Optional[pulumi.Input[bool]] = None,
677
- metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
672
+ metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
678
673
  mount: Optional[pulumi.Input[str]] = None,
679
674
  name: Optional[pulumi.Input[str]] = None,
680
675
  namespace: Optional[pulumi.Input[str]] = None,
681
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
676
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
682
677
  path: Optional[pulumi.Input[str]] = None) -> 'SecretV2':
683
678
  """
684
679
  Get an existing SecretV2 resource's state with the given name, id, and optional extra
@@ -694,7 +689,7 @@ class SecretV2(pulumi.CustomResource):
694
689
  :param pulumi.Input[Union['SecretV2CustomMetadataArgs', 'SecretV2CustomMetadataArgsDict']] custom_metadata: A nested block that allows configuring metadata for the
695
690
  KV secret. Refer to the
696
691
  Configuration Options for more info.
697
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
692
+ :param pulumi.Input[Mapping[str, Any]] data: A mapping whose keys are the top-level data keys returned from
698
693
  Vault and whose values are the corresponding values. This map can only
699
694
  represent string data, so any non-string values returned from Vault are
700
695
  serialized as JSON.
@@ -704,7 +699,7 @@ class SecretV2(pulumi.CustomResource):
704
699
  versions for the specified key.
705
700
  :param pulumi.Input[bool] disable_read: If set to true, disables reading secret from Vault;
706
701
  note: drift won't be detected.
707
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: Metadata associated with this secret read from Vault.
702
+ :param pulumi.Input[Mapping[str, Any]] metadata: Metadata associated with this secret read from Vault.
708
703
  :param pulumi.Input[str] mount: Path where KV-V2 engine is mounted.
709
704
  :param pulumi.Input[str] name: Full name of the secret. For a nested secret
710
705
  the name is the nested path excluding the mount and data
@@ -714,7 +709,7 @@ class SecretV2(pulumi.CustomResource):
714
709
  The value should not contain leading or trailing forward slashes.
715
710
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
716
711
  *Available only for Vault Enterprise*.
717
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: An object that holds option settings.
712
+ :param pulumi.Input[Mapping[str, Any]] options: An object that holds option settings.
718
713
  :param pulumi.Input[str] path: Full path where the KV-V2 secret will be written.
719
714
  """
720
715
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -758,7 +753,7 @@ class SecretV2(pulumi.CustomResource):
758
753
 
759
754
  @property
760
755
  @pulumi.getter
761
- def data(self) -> pulumi.Output[Mapping[str, str]]:
756
+ def data(self) -> pulumi.Output[Mapping[str, Any]]:
762
757
  """
763
758
  A mapping whose keys are the top-level data keys returned from
764
759
  Vault and whose values are the corresponding values. This map can only
@@ -796,7 +791,7 @@ class SecretV2(pulumi.CustomResource):
796
791
 
797
792
  @property
798
793
  @pulumi.getter
799
- def metadata(self) -> pulumi.Output[Mapping[str, str]]:
794
+ def metadata(self) -> pulumi.Output[Mapping[str, Any]]:
800
795
  """
801
796
  Metadata associated with this secret read from Vault.
802
797
  """
@@ -834,7 +829,7 @@ class SecretV2(pulumi.CustomResource):
834
829
 
835
830
  @property
836
831
  @pulumi.getter
837
- def options(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
832
+ def options(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
838
833
  """
839
834
  An object that holds option settings.
840
835
  """