pulumi-vault 6.4.0__py3-none-any.whl → 6.4.0a1723454543__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -560
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +4 -19
- pulumi_vault/ad/secret_backend.py +0 -5
- pulumi_vault/ad/secret_library.py +0 -5
- pulumi_vault/ad/secret_role.py +0 -5
- pulumi_vault/alicloud/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_login.py +0 -5
- pulumi_vault/approle/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -99
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
- pulumi_vault/audit.py +0 -5
- pulumi_vault/audit_request_header.py +0 -5
- pulumi_vault/auth_backend.py +0 -5
- pulumi_vault/aws/auth_backend_cert.py +0 -5
- pulumi_vault/aws/auth_backend_client.py +0 -5
- pulumi_vault/aws/auth_backend_config_identity.py +0 -5
- pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
- pulumi_vault/aws/auth_backend_login.py +7 -12
- pulumi_vault/aws/auth_backend_role.py +0 -5
- pulumi_vault/aws/auth_backend_role_tag.py +0 -5
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
- pulumi_vault/aws/auth_backend_sts_role.py +0 -5
- pulumi_vault/aws/get_access_credentials.py +4 -31
- pulumi_vault/aws/get_static_access_credentials.py +4 -18
- pulumi_vault/aws/secret_backend.py +0 -5
- pulumi_vault/aws/secret_backend_role.py +0 -5
- pulumi_vault/aws/secret_backend_static_role.py +0 -5
- pulumi_vault/azure/_inputs.py +0 -24
- pulumi_vault/azure/auth_backend_config.py +0 -5
- pulumi_vault/azure/auth_backend_role.py +0 -5
- pulumi_vault/azure/backend.py +0 -5
- pulumi_vault/azure/backend_role.py +0 -5
- pulumi_vault/azure/get_access_credentials.py +4 -36
- pulumi_vault/azure/outputs.py +0 -5
- pulumi_vault/cert_auth_backend_role.py +0 -5
- pulumi_vault/config/__init__.pyi +0 -5
- pulumi_vault/config/_inputs.py +0 -21
- pulumi_vault/config/outputs.py +0 -5
- pulumi_vault/config/ui_custom_message.py +14 -19
- pulumi_vault/config/vars.py +0 -5
- pulumi_vault/consul/secret_backend.py +0 -5
- pulumi_vault/consul/secret_backend_role.py +0 -5
- pulumi_vault/database/_inputs.py +105 -2256
- pulumi_vault/database/outputs.py +54 -199
- pulumi_vault/database/secret_backend_connection.py +14 -19
- pulumi_vault/database/secret_backend_role.py +14 -19
- pulumi_vault/database/secret_backend_static_role.py +1 -69
- pulumi_vault/database/secrets_mount.py +14 -19
- pulumi_vault/egp_policy.py +0 -5
- pulumi_vault/gcp/_inputs.py +0 -111
- pulumi_vault/gcp/auth_backend.py +0 -5
- pulumi_vault/gcp/auth_backend_role.py +0 -5
- pulumi_vault/gcp/get_auth_backend_role.py +4 -42
- pulumi_vault/gcp/outputs.py +0 -5
- pulumi_vault/gcp/secret_backend.py +0 -5
- pulumi_vault/gcp/secret_impersonated_account.py +3 -62
- pulumi_vault/gcp/secret_roleset.py +0 -5
- pulumi_vault/gcp/secret_static_account.py +0 -5
- pulumi_vault/generic/endpoint.py +0 -5
- pulumi_vault/generic/get_secret.py +5 -25
- pulumi_vault/generic/secret.py +7 -12
- pulumi_vault/get_auth_backend.py +4 -21
- pulumi_vault/get_auth_backends.py +4 -16
- pulumi_vault/get_namespace.py +5 -18
- pulumi_vault/get_namespaces.py +4 -13
- pulumi_vault/get_nomad_access_token.py +8 -28
- pulumi_vault/get_policy_document.py +4 -15
- pulumi_vault/get_raft_autopilot_state.py +7 -26
- pulumi_vault/github/_inputs.py +0 -55
- pulumi_vault/github/auth_backend.py +0 -5
- pulumi_vault/github/outputs.py +0 -5
- pulumi_vault/github/team.py +0 -5
- pulumi_vault/github/user.py +0 -5
- pulumi_vault/identity/entity.py +0 -5
- pulumi_vault/identity/entity_alias.py +0 -5
- pulumi_vault/identity/entity_policies.py +0 -5
- pulumi_vault/identity/get_entity.py +5 -35
- pulumi_vault/identity/get_group.py +6 -42
- pulumi_vault/identity/get_oidc_client_creds.py +4 -16
- pulumi_vault/identity/get_oidc_openid_config.py +4 -26
- pulumi_vault/identity/get_oidc_public_keys.py +5 -16
- pulumi_vault/identity/group.py +0 -5
- pulumi_vault/identity/group_alias.py +0 -5
- pulumi_vault/identity/group_member_entity_ids.py +0 -5
- pulumi_vault/identity/group_member_group_ids.py +0 -5
- pulumi_vault/identity/group_policies.py +0 -5
- pulumi_vault/identity/mfa_duo.py +0 -5
- pulumi_vault/identity/mfa_login_enforcement.py +0 -5
- pulumi_vault/identity/mfa_okta.py +0 -5
- pulumi_vault/identity/mfa_pingid.py +0 -5
- pulumi_vault/identity/mfa_totp.py +0 -5
- pulumi_vault/identity/oidc.py +0 -5
- pulumi_vault/identity/oidc_assignment.py +0 -5
- pulumi_vault/identity/oidc_client.py +0 -5
- pulumi_vault/identity/oidc_key.py +0 -5
- pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
- pulumi_vault/identity/oidc_provider.py +0 -5
- pulumi_vault/identity/oidc_role.py +0 -5
- pulumi_vault/identity/oidc_scope.py +0 -5
- pulumi_vault/identity/outputs.py +3 -8
- pulumi_vault/jwt/_inputs.py +0 -55
- pulumi_vault/jwt/auth_backend.py +0 -5
- pulumi_vault/jwt/auth_backend_role.py +28 -33
- pulumi_vault/jwt/outputs.py +0 -5
- pulumi_vault/kmip/secret_backend.py +0 -5
- pulumi_vault/kmip/secret_role.py +0 -5
- pulumi_vault/kmip/secret_scope.py +0 -5
- pulumi_vault/kubernetes/auth_backend_config.py +3 -55
- pulumi_vault/kubernetes/auth_backend_role.py +0 -5
- pulumi_vault/kubernetes/get_auth_backend_config.py +7 -59
- pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
- pulumi_vault/kubernetes/get_service_account_token.py +4 -28
- pulumi_vault/kubernetes/secret_backend.py +14 -19
- pulumi_vault/kubernetes/secret_backend_role.py +0 -5
- pulumi_vault/kv/_inputs.py +4 -36
- pulumi_vault/kv/get_secret.py +5 -20
- pulumi_vault/kv/get_secret_subkeys_v2.py +5 -24
- pulumi_vault/kv/get_secret_v2.py +8 -27
- pulumi_vault/kv/get_secrets_list.py +4 -15
- pulumi_vault/kv/get_secrets_list_v2.py +4 -18
- pulumi_vault/kv/outputs.py +3 -8
- pulumi_vault/kv/secret.py +7 -12
- pulumi_vault/kv/secret_backend_v2.py +0 -5
- pulumi_vault/kv/secret_v2.py +28 -33
- pulumi_vault/ldap/auth_backend.py +0 -52
- pulumi_vault/ldap/auth_backend_group.py +0 -5
- pulumi_vault/ldap/auth_backend_user.py +0 -5
- pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
- pulumi_vault/ldap/get_static_credentials.py +4 -23
- pulumi_vault/ldap/secret_backend.py +14 -19
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
- pulumi_vault/ldap/secret_backend_library_set.py +0 -5
- pulumi_vault/ldap/secret_backend_static_role.py +0 -5
- pulumi_vault/managed/_inputs.py +0 -205
- pulumi_vault/managed/keys.py +0 -5
- pulumi_vault/managed/outputs.py +0 -5
- pulumi_vault/mfa_duo.py +0 -5
- pulumi_vault/mfa_okta.py +0 -5
- pulumi_vault/mfa_pingid.py +0 -5
- pulumi_vault/mfa_totp.py +0 -5
- pulumi_vault/mongodbatlas/secret_backend.py +0 -5
- pulumi_vault/mongodbatlas/secret_role.py +0 -5
- pulumi_vault/mount.py +16 -21
- pulumi_vault/namespace.py +14 -19
- pulumi_vault/nomad_secret_backend.py +0 -5
- pulumi_vault/nomad_secret_role.py +0 -5
- pulumi_vault/okta/_inputs.py +0 -39
- pulumi_vault/okta/auth_backend.py +0 -5
- pulumi_vault/okta/auth_backend_group.py +0 -5
- pulumi_vault/okta/auth_backend_user.py +0 -5
- pulumi_vault/okta/outputs.py +0 -5
- pulumi_vault/outputs.py +0 -5
- pulumi_vault/password_policy.py +0 -5
- pulumi_vault/pkisecret/_inputs.py +8 -49
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
- pulumi_vault/pkisecret/backend_config_est.py +14 -19
- pulumi_vault/pkisecret/get_backend_config_est.py +5 -23
- pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
- pulumi_vault/pkisecret/get_backend_issuers.py +5 -18
- pulumi_vault/pkisecret/get_backend_key.py +4 -19
- pulumi_vault/pkisecret/get_backend_keys.py +5 -18
- pulumi_vault/pkisecret/outputs.py +12 -17
- pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
- pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
- pulumi_vault/pkisecret/secret_backend_key.py +0 -5
- pulumi_vault/pkisecret/secret_backend_role.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
- pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
- pulumi_vault/plugin.py +0 -5
- pulumi_vault/plugin_pinned_version.py +0 -5
- pulumi_vault/policy.py +0 -5
- pulumi_vault/provider.py +0 -5
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +0 -5
- pulumi_vault/quota_rate_limit.py +0 -5
- pulumi_vault/rabbitmq/_inputs.py +0 -61
- pulumi_vault/rabbitmq/outputs.py +0 -5
- pulumi_vault/rabbitmq/secret_backend.py +0 -5
- pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
- pulumi_vault/raft_autopilot.py +0 -5
- pulumi_vault/raft_snapshot_agent_config.py +0 -5
- pulumi_vault/rgp_policy.py +0 -5
- pulumi_vault/saml/auth_backend.py +0 -5
- pulumi_vault/saml/auth_backend_role.py +14 -19
- pulumi_vault/secrets/_inputs.py +0 -30
- pulumi_vault/secrets/outputs.py +0 -5
- pulumi_vault/secrets/sync_association.py +0 -5
- pulumi_vault/secrets/sync_aws_destination.py +14 -19
- pulumi_vault/secrets/sync_azure_destination.py +14 -19
- pulumi_vault/secrets/sync_config.py +0 -5
- pulumi_vault/secrets/sync_gcp_destination.py +14 -19
- pulumi_vault/secrets/sync_gh_destination.py +0 -5
- pulumi_vault/secrets/sync_github_apps.py +0 -5
- pulumi_vault/secrets/sync_vercel_destination.py +0 -5
- pulumi_vault/ssh/_inputs.py +0 -22
- pulumi_vault/ssh/outputs.py +0 -5
- pulumi_vault/ssh/secret_backend_ca.py +0 -5
- pulumi_vault/ssh/secret_backend_role.py +28 -67
- pulumi_vault/terraformcloud/secret_backend.py +0 -5
- pulumi_vault/terraformcloud/secret_creds.py +0 -5
- pulumi_vault/terraformcloud/secret_role.py +0 -5
- pulumi_vault/token.py +0 -5
- pulumi_vault/tokenauth/auth_backend_role.py +14 -5
- pulumi_vault/transform/alphabet.py +0 -5
- pulumi_vault/transform/get_decode.py +14 -38
- pulumi_vault/transform/get_encode.py +14 -38
- pulumi_vault/transform/role.py +0 -5
- pulumi_vault/transform/template.py +14 -19
- pulumi_vault/transform/transformation.py +0 -5
- pulumi_vault/transit/get_decrypt.py +4 -21
- pulumi_vault/transit/get_encrypt.py +4 -23
- pulumi_vault/transit/secret_backend_key.py +7 -12
- pulumi_vault/transit/secret_cache_config.py +0 -5
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/METADATA +2 -3
- pulumi_vault-6.4.0a1723454543.dist-info/RECORD +256 -0
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/WHEEL +1 -1
- pulumi_vault-6.4.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/top_level.txt +0 -0
pulumi_vault/get_auth_backend.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -188,6 +183,9 @@ def get_auth_backend(namespace: Optional[str] = None,
|
|
188
183
|
namespace=pulumi.get(__ret__, 'namespace'),
|
189
184
|
path=pulumi.get(__ret__, 'path'),
|
190
185
|
type=pulumi.get(__ret__, 'type'))
|
186
|
+
|
187
|
+
|
188
|
+
@_utilities.lift_output_func(get_auth_backend)
|
191
189
|
def get_auth_backend_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
192
190
|
path: Optional[pulumi.Input[str]] = None,
|
193
191
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendResult]:
|
@@ -208,19 +206,4 @@ def get_auth_backend_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
|
|
208
206
|
*Available only for Vault Enterprise*.
|
209
207
|
:param str path: The auth backend mount point.
|
210
208
|
"""
|
211
|
-
|
212
|
-
__args__['namespace'] = namespace
|
213
|
-
__args__['path'] = path
|
214
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
215
|
-
__ret__ = pulumi.runtime.invoke_output('vault:index/getAuthBackend:getAuthBackend', __args__, opts=opts, typ=GetAuthBackendResult)
|
216
|
-
return __ret__.apply(lambda __response__: GetAuthBackendResult(
|
217
|
-
accessor=pulumi.get(__response__, 'accessor'),
|
218
|
-
default_lease_ttl_seconds=pulumi.get(__response__, 'default_lease_ttl_seconds'),
|
219
|
-
description=pulumi.get(__response__, 'description'),
|
220
|
-
id=pulumi.get(__response__, 'id'),
|
221
|
-
listing_visibility=pulumi.get(__response__, 'listing_visibility'),
|
222
|
-
local=pulumi.get(__response__, 'local'),
|
223
|
-
max_lease_ttl_seconds=pulumi.get(__response__, 'max_lease_ttl_seconds'),
|
224
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
225
|
-
path=pulumi.get(__response__, 'path'),
|
226
|
-
type=pulumi.get(__response__, 'type')))
|
209
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -130,6 +125,9 @@ def get_auth_backends(namespace: Optional[str] = None,
|
|
130
125
|
namespace=pulumi.get(__ret__, 'namespace'),
|
131
126
|
paths=pulumi.get(__ret__, 'paths'),
|
132
127
|
type=pulumi.get(__ret__, 'type'))
|
128
|
+
|
129
|
+
|
130
|
+
@_utilities.lift_output_func(get_auth_backends)
|
133
131
|
def get_auth_backends_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
134
132
|
type: Optional[pulumi.Input[Optional[str]]] = None,
|
135
133
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendsResult]:
|
@@ -157,14 +155,4 @@ def get_auth_backends_output(namespace: Optional[pulumi.Input[Optional[str]]] =
|
|
157
155
|
*Available only for Vault Enterprise*.
|
158
156
|
:param str type: The name of the auth method type. Allows filtering of backends returned by type.
|
159
157
|
"""
|
160
|
-
|
161
|
-
__args__['namespace'] = namespace
|
162
|
-
__args__['type'] = type
|
163
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
164
|
-
__ret__ = pulumi.runtime.invoke_output('vault:index/getAuthBackends:getAuthBackends', __args__, opts=opts, typ=GetAuthBackendsResult)
|
165
|
-
return __ret__.apply(lambda __response__: GetAuthBackendsResult(
|
166
|
-
accessors=pulumi.get(__response__, 'accessors'),
|
167
|
-
id=pulumi.get(__response__, 'id'),
|
168
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
169
|
-
paths=pulumi.get(__response__, 'paths'),
|
170
|
-
type=pulumi.get(__response__, 'type')))
|
158
|
+
...
|
pulumi_vault/get_namespace.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -48,7 +43,7 @@ class GetNamespaceResult:
|
|
48
43
|
|
49
44
|
@property
|
50
45
|
@pulumi.getter(name="customMetadata")
|
51
|
-
def custom_metadata(self) -> Mapping[str,
|
46
|
+
def custom_metadata(self) -> Mapping[str, Any]:
|
52
47
|
"""
|
53
48
|
(Optional) A map of strings containing arbitrary metadata for the namespace.
|
54
49
|
Only fetched if `path` is specified.
|
@@ -166,6 +161,9 @@ def get_namespace(namespace: Optional[str] = None,
|
|
166
161
|
namespace_id=pulumi.get(__ret__, 'namespace_id'),
|
167
162
|
path=pulumi.get(__ret__, 'path'),
|
168
163
|
path_fq=pulumi.get(__ret__, 'path_fq'))
|
164
|
+
|
165
|
+
|
166
|
+
@_utilities.lift_output_func(get_namespace)
|
169
167
|
def get_namespace_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
170
168
|
path: Optional[pulumi.Input[Optional[str]]] = None,
|
171
169
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNamespaceResult]:
|
@@ -212,15 +210,4 @@ def get_namespace_output(namespace: Optional[pulumi.Input[Optional[str]]] = None
|
|
212
210
|
based on the `namespace` arguments of the provider and this data source.
|
213
211
|
Other path related attributes will be empty in this case.
|
214
212
|
"""
|
215
|
-
|
216
|
-
__args__['namespace'] = namespace
|
217
|
-
__args__['path'] = path
|
218
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
219
|
-
__ret__ = pulumi.runtime.invoke_output('vault:index/getNamespace:getNamespace', __args__, opts=opts, typ=GetNamespaceResult)
|
220
|
-
return __ret__.apply(lambda __response__: GetNamespaceResult(
|
221
|
-
custom_metadata=pulumi.get(__response__, 'custom_metadata'),
|
222
|
-
id=pulumi.get(__response__, 'id'),
|
223
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
224
|
-
namespace_id=pulumi.get(__response__, 'namespace_id'),
|
225
|
-
path=pulumi.get(__response__, 'path'),
|
226
|
-
path_fq=pulumi.get(__response__, 'path_fq')))
|
213
|
+
...
|
pulumi_vault/get_namespaces.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -111,6 +106,9 @@ def get_namespaces(namespace: Optional[str] = None,
|
|
111
106
|
id=pulumi.get(__ret__, 'id'),
|
112
107
|
namespace=pulumi.get(__ret__, 'namespace'),
|
113
108
|
paths=pulumi.get(__ret__, 'paths'))
|
109
|
+
|
110
|
+
|
111
|
+
@_utilities.lift_output_func(get_namespaces)
|
114
112
|
def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
115
113
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNamespacesResult]:
|
116
114
|
"""
|
@@ -143,11 +141,4 @@ def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[str]]] = Non
|
|
143
141
|
The value should not contain leading or trailing forward slashes.
|
144
142
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
145
143
|
"""
|
146
|
-
|
147
|
-
__args__['namespace'] = namespace
|
148
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
149
|
-
__ret__ = pulumi.runtime.invoke_output('vault:index/getNamespaces:getNamespaces', __args__, opts=opts, typ=GetNamespacesResult)
|
150
|
-
return __ret__.apply(lambda __response__: GetNamespacesResult(
|
151
|
-
id=pulumi.get(__response__, 'id'),
|
152
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
153
|
-
paths=pulumi.get(__response__, 'paths')))
|
144
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -124,11 +119,8 @@ def get_nomad_access_token(backend: Optional[str] = None,
|
|
124
119
|
role="test",
|
125
120
|
type="client",
|
126
121
|
policies=["readonly"])
|
127
|
-
token = pulumi.Output.all(
|
128
|
-
|
129
|
-
role=test.role
|
130
|
-
).apply(lambda resolved_outputs: vault.get_nomad_access_token_output(backend=resolved_outputs['backend'],
|
131
|
-
role=resolved_outputs['role']))
|
122
|
+
token = pulumi.Output.all(config.backend, test.role).apply(lambda backend, role: vault.get_nomad_access_token_output(backend=backend,
|
123
|
+
role=role))
|
132
124
|
```
|
133
125
|
|
134
126
|
|
@@ -155,6 +147,9 @@ def get_nomad_access_token(backend: Optional[str] = None,
|
|
155
147
|
namespace=pulumi.get(__ret__, 'namespace'),
|
156
148
|
role=pulumi.get(__ret__, 'role'),
|
157
149
|
secret_id=pulumi.get(__ret__, 'secret_id'))
|
150
|
+
|
151
|
+
|
152
|
+
@_utilities.lift_output_func(get_nomad_access_token)
|
158
153
|
def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
|
159
154
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
160
155
|
role: Optional[pulumi.Input[str]] = None,
|
@@ -178,11 +173,8 @@ def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
|
|
178
173
|
role="test",
|
179
174
|
type="client",
|
180
175
|
policies=["readonly"])
|
181
|
-
token = pulumi.Output.all(
|
182
|
-
|
183
|
-
role=test.role
|
184
|
-
).apply(lambda resolved_outputs: vault.get_nomad_access_token_output(backend=resolved_outputs['backend'],
|
185
|
-
role=resolved_outputs['role']))
|
176
|
+
token = pulumi.Output.all(config.backend, test.role).apply(lambda backend, role: vault.get_nomad_access_token_output(backend=backend,
|
177
|
+
role=role))
|
186
178
|
```
|
187
179
|
|
188
180
|
|
@@ -195,16 +187,4 @@ def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
|
|
195
187
|
:param str role: The name of the Nomad secret backend role to generate
|
196
188
|
a token for, with no leading or trailing `/`s.
|
197
189
|
"""
|
198
|
-
|
199
|
-
__args__['backend'] = backend
|
200
|
-
__args__['namespace'] = namespace
|
201
|
-
__args__['role'] = role
|
202
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
203
|
-
__ret__ = pulumi.runtime.invoke_output('vault:index/getNomadAccessToken:getNomadAccessToken', __args__, opts=opts, typ=GetNomadAccessTokenResult)
|
204
|
-
return __ret__.apply(lambda __response__: GetNomadAccessTokenResult(
|
205
|
-
accessor_id=pulumi.get(__response__, 'accessor_id'),
|
206
|
-
backend=pulumi.get(__response__, 'backend'),
|
207
|
-
id=pulumi.get(__response__, 'id'),
|
208
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
209
|
-
role=pulumi.get(__response__, 'role'),
|
210
|
-
secret_id=pulumi.get(__response__, 'secret_id')))
|
190
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
from . import outputs
|
17
12
|
from ._inputs import *
|
@@ -120,6 +115,9 @@ def get_policy_document(namespace: Optional[str] = None,
|
|
120
115
|
id=pulumi.get(__ret__, 'id'),
|
121
116
|
namespace=pulumi.get(__ret__, 'namespace'),
|
122
117
|
rules=pulumi.get(__ret__, 'rules'))
|
118
|
+
|
119
|
+
|
120
|
+
@_utilities.lift_output_func(get_policy_document)
|
123
121
|
def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
124
122
|
rules: Optional[pulumi.Input[Optional[Sequence[Union['GetPolicyDocumentRuleArgs', 'GetPolicyDocumentRuleArgsDict']]]]] = None,
|
125
123
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetPolicyDocumentResult]:
|
@@ -148,13 +146,4 @@ def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]]
|
|
148
146
|
policy=example.hcl)
|
149
147
|
```
|
150
148
|
"""
|
151
|
-
|
152
|
-
__args__['namespace'] = namespace
|
153
|
-
__args__['rules'] = rules
|
154
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
155
|
-
__ret__ = pulumi.runtime.invoke_output('vault:index/getPolicyDocument:getPolicyDocument', __args__, opts=opts, typ=GetPolicyDocumentResult)
|
156
|
-
return __ret__.apply(lambda __response__: GetPolicyDocumentResult(
|
157
|
-
hcl=pulumi.get(__response__, 'hcl'),
|
158
|
-
id=pulumi.get(__response__, 'id'),
|
159
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
160
|
-
rules=pulumi.get(__response__, 'rules')))
|
149
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -114,7 +109,7 @@ class GetRaftAutopilotStateResult:
|
|
114
109
|
|
115
110
|
@property
|
116
111
|
@pulumi.getter(name="redundancyZones")
|
117
|
-
def redundancy_zones(self) -> Mapping[str,
|
112
|
+
def redundancy_zones(self) -> Mapping[str, Any]:
|
118
113
|
"""
|
119
114
|
Additional output related to redundancy zones stored as a serialized map of strings.
|
120
115
|
"""
|
@@ -130,7 +125,7 @@ class GetRaftAutopilotStateResult:
|
|
130
125
|
|
131
126
|
@property
|
132
127
|
@pulumi.getter
|
133
|
-
def servers(self) -> Mapping[str,
|
128
|
+
def servers(self) -> Mapping[str, Any]:
|
134
129
|
"""
|
135
130
|
Additionaly output related to servers in the cluster stored as a serialized map of strings.
|
136
131
|
"""
|
@@ -146,7 +141,7 @@ class GetRaftAutopilotStateResult:
|
|
146
141
|
|
147
142
|
@property
|
148
143
|
@pulumi.getter(name="upgradeInfo")
|
149
|
-
def upgrade_info(self) -> Mapping[str,
|
144
|
+
def upgrade_info(self) -> Mapping[str, Any]:
|
150
145
|
"""
|
151
146
|
Additional output related to upgrade information stored as a serialized map of strings.
|
152
147
|
"""
|
@@ -228,6 +223,9 @@ def get_raft_autopilot_state(namespace: Optional[str] = None,
|
|
228
223
|
upgrade_info=pulumi.get(__ret__, 'upgrade_info'),
|
229
224
|
upgrade_info_json=pulumi.get(__ret__, 'upgrade_info_json'),
|
230
225
|
voters=pulumi.get(__ret__, 'voters'))
|
226
|
+
|
227
|
+
|
228
|
+
@_utilities.lift_output_func(get_raft_autopilot_state)
|
231
229
|
def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
232
230
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetRaftAutopilotStateResult]:
|
233
231
|
"""
|
@@ -247,21 +245,4 @@ def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[st
|
|
247
245
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
248
246
|
*Available only for Vault Enterprise*.
|
249
247
|
"""
|
250
|
-
|
251
|
-
__args__['namespace'] = namespace
|
252
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
253
|
-
__ret__ = pulumi.runtime.invoke_output('vault:index/getRaftAutopilotState:getRaftAutopilotState', __args__, opts=opts, typ=GetRaftAutopilotStateResult)
|
254
|
-
return __ret__.apply(lambda __response__: GetRaftAutopilotStateResult(
|
255
|
-
failure_tolerance=pulumi.get(__response__, 'failure_tolerance'),
|
256
|
-
healthy=pulumi.get(__response__, 'healthy'),
|
257
|
-
id=pulumi.get(__response__, 'id'),
|
258
|
-
leader=pulumi.get(__response__, 'leader'),
|
259
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
260
|
-
optimistic_failure_tolerance=pulumi.get(__response__, 'optimistic_failure_tolerance'),
|
261
|
-
redundancy_zones=pulumi.get(__response__, 'redundancy_zones'),
|
262
|
-
redundancy_zones_json=pulumi.get(__response__, 'redundancy_zones_json'),
|
263
|
-
servers=pulumi.get(__response__, 'servers'),
|
264
|
-
servers_json=pulumi.get(__response__, 'servers_json'),
|
265
|
-
upgrade_info=pulumi.get(__response__, 'upgrade_info'),
|
266
|
-
upgrade_info_json=pulumi.get(__response__, 'upgrade_info_json'),
|
267
|
-
voters=pulumi.get(__response__, 'voters')))
|
248
|
+
...
|
pulumi_vault/github/_inputs.py
CHANGED
@@ -4,70 +4,15 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
18
13
|
'AuthBackendTuneArgs',
|
19
|
-
'AuthBackendTuneArgsDict',
|
20
14
|
]
|
21
15
|
|
22
|
-
MYPY = False
|
23
|
-
|
24
|
-
if not MYPY:
|
25
|
-
class AuthBackendTuneArgsDict(TypedDict):
|
26
|
-
allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
27
|
-
"""
|
28
|
-
List of headers to whitelist and allowing
|
29
|
-
a plugin to include them in the response.
|
30
|
-
"""
|
31
|
-
audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
32
|
-
"""
|
33
|
-
Specifies the list of keys that will
|
34
|
-
not be HMAC'd by audit devices in the request data object.
|
35
|
-
"""
|
36
|
-
audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
37
|
-
"""
|
38
|
-
Specifies the list of keys that will
|
39
|
-
not be HMAC'd by audit devices in the response data object.
|
40
|
-
"""
|
41
|
-
default_lease_ttl: NotRequired[pulumi.Input[str]]
|
42
|
-
"""
|
43
|
-
Specifies the default time-to-live.
|
44
|
-
If set, this overrides the global default.
|
45
|
-
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
46
|
-
"""
|
47
|
-
listing_visibility: NotRequired[pulumi.Input[str]]
|
48
|
-
"""
|
49
|
-
Specifies whether to show this mount in
|
50
|
-
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
51
|
-
"""
|
52
|
-
max_lease_ttl: NotRequired[pulumi.Input[str]]
|
53
|
-
"""
|
54
|
-
Specifies the maximum time-to-live.
|
55
|
-
If set, this overrides the global default.
|
56
|
-
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
57
|
-
"""
|
58
|
-
passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
59
|
-
"""
|
60
|
-
List of headers to whitelist and
|
61
|
-
pass from the request to the backend.
|
62
|
-
"""
|
63
|
-
token_type: NotRequired[pulumi.Input[str]]
|
64
|
-
"""
|
65
|
-
Specifies the type of tokens that should be returned by
|
66
|
-
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
67
|
-
"""
|
68
|
-
elif False:
|
69
|
-
AuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any]
|
70
|
-
|
71
16
|
@pulumi.input_type
|
72
17
|
class AuthBackendTuneArgs:
|
73
18
|
def __init__(__self__, *,
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
from . import outputs
|
17
12
|
from ._inputs import *
|
pulumi_vault/github/outputs.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
pulumi_vault/github/team.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['TeamArgs', 'Team']
|
pulumi_vault/github/user.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['UserArgs', 'User']
|
pulumi_vault/identity/entity.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['EntityArgs', 'Entity']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['EntityAliasArgs', 'EntityAlias']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['EntityPoliciesArgs', 'EntityPolicies']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
from . import outputs
|
17
12
|
|
@@ -194,7 +189,7 @@ class GetEntityResult:
|
|
194
189
|
|
195
190
|
@property
|
196
191
|
@pulumi.getter
|
197
|
-
def metadata(self) -> Mapping[str,
|
192
|
+
def metadata(self) -> Mapping[str, Any]:
|
198
193
|
"""
|
199
194
|
Arbitrary metadata
|
200
195
|
"""
|
@@ -316,6 +311,9 @@ def get_entity(alias_id: Optional[str] = None,
|
|
316
311
|
namespace=pulumi.get(__ret__, 'namespace'),
|
317
312
|
namespace_id=pulumi.get(__ret__, 'namespace_id'),
|
318
313
|
policies=pulumi.get(__ret__, 'policies'))
|
314
|
+
|
315
|
+
|
316
|
+
@_utilities.lift_output_func(get_entity)
|
319
317
|
def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
|
320
318
|
alias_mount_accessor: Optional[pulumi.Input[Optional[str]]] = None,
|
321
319
|
alias_name: Optional[pulumi.Input[Optional[str]]] = None,
|
@@ -353,32 +351,4 @@ def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
|
|
353
351
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
354
352
|
*Available only for Vault Enterprise*.
|
355
353
|
"""
|
356
|
-
|
357
|
-
__args__['aliasId'] = alias_id
|
358
|
-
__args__['aliasMountAccessor'] = alias_mount_accessor
|
359
|
-
__args__['aliasName'] = alias_name
|
360
|
-
__args__['entityId'] = entity_id
|
361
|
-
__args__['entityName'] = entity_name
|
362
|
-
__args__['namespace'] = namespace
|
363
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
364
|
-
__ret__ = pulumi.runtime.invoke_output('vault:identity/getEntity:getEntity', __args__, opts=opts, typ=GetEntityResult)
|
365
|
-
return __ret__.apply(lambda __response__: GetEntityResult(
|
366
|
-
alias_id=pulumi.get(__response__, 'alias_id'),
|
367
|
-
alias_mount_accessor=pulumi.get(__response__, 'alias_mount_accessor'),
|
368
|
-
alias_name=pulumi.get(__response__, 'alias_name'),
|
369
|
-
aliases=pulumi.get(__response__, 'aliases'),
|
370
|
-
creation_time=pulumi.get(__response__, 'creation_time'),
|
371
|
-
data_json=pulumi.get(__response__, 'data_json'),
|
372
|
-
direct_group_ids=pulumi.get(__response__, 'direct_group_ids'),
|
373
|
-
disabled=pulumi.get(__response__, 'disabled'),
|
374
|
-
entity_id=pulumi.get(__response__, 'entity_id'),
|
375
|
-
entity_name=pulumi.get(__response__, 'entity_name'),
|
376
|
-
group_ids=pulumi.get(__response__, 'group_ids'),
|
377
|
-
id=pulumi.get(__response__, 'id'),
|
378
|
-
inherited_group_ids=pulumi.get(__response__, 'inherited_group_ids'),
|
379
|
-
last_update_time=pulumi.get(__response__, 'last_update_time'),
|
380
|
-
merged_entity_ids=pulumi.get(__response__, 'merged_entity_ids'),
|
381
|
-
metadata=pulumi.get(__response__, 'metadata'),
|
382
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
383
|
-
namespace_id=pulumi.get(__response__, 'namespace_id'),
|
384
|
-
policies=pulumi.get(__response__, 'policies')))
|
354
|
+
...
|