pulumi-vault 6.4.0__py3-none-any.whl → 6.4.0a1723454543__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +0 -560
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +4 -19
  4. pulumi_vault/ad/secret_backend.py +0 -5
  5. pulumi_vault/ad/secret_library.py +0 -5
  6. pulumi_vault/ad/secret_role.py +0 -5
  7. pulumi_vault/alicloud/auth_backend_role.py +0 -5
  8. pulumi_vault/approle/auth_backend_login.py +0 -5
  9. pulumi_vault/approle/auth_backend_role.py +0 -5
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -99
  11. pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
  12. pulumi_vault/audit.py +0 -5
  13. pulumi_vault/audit_request_header.py +0 -5
  14. pulumi_vault/auth_backend.py +0 -5
  15. pulumi_vault/aws/auth_backend_cert.py +0 -5
  16. pulumi_vault/aws/auth_backend_client.py +0 -5
  17. pulumi_vault/aws/auth_backend_config_identity.py +0 -5
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
  19. pulumi_vault/aws/auth_backend_login.py +7 -12
  20. pulumi_vault/aws/auth_backend_role.py +0 -5
  21. pulumi_vault/aws/auth_backend_role_tag.py +0 -5
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
  23. pulumi_vault/aws/auth_backend_sts_role.py +0 -5
  24. pulumi_vault/aws/get_access_credentials.py +4 -31
  25. pulumi_vault/aws/get_static_access_credentials.py +4 -18
  26. pulumi_vault/aws/secret_backend.py +0 -5
  27. pulumi_vault/aws/secret_backend_role.py +0 -5
  28. pulumi_vault/aws/secret_backend_static_role.py +0 -5
  29. pulumi_vault/azure/_inputs.py +0 -24
  30. pulumi_vault/azure/auth_backend_config.py +0 -5
  31. pulumi_vault/azure/auth_backend_role.py +0 -5
  32. pulumi_vault/azure/backend.py +0 -5
  33. pulumi_vault/azure/backend_role.py +0 -5
  34. pulumi_vault/azure/get_access_credentials.py +4 -36
  35. pulumi_vault/azure/outputs.py +0 -5
  36. pulumi_vault/cert_auth_backend_role.py +0 -5
  37. pulumi_vault/config/__init__.pyi +0 -5
  38. pulumi_vault/config/_inputs.py +0 -21
  39. pulumi_vault/config/outputs.py +0 -5
  40. pulumi_vault/config/ui_custom_message.py +14 -19
  41. pulumi_vault/config/vars.py +0 -5
  42. pulumi_vault/consul/secret_backend.py +0 -5
  43. pulumi_vault/consul/secret_backend_role.py +0 -5
  44. pulumi_vault/database/_inputs.py +105 -2256
  45. pulumi_vault/database/outputs.py +54 -199
  46. pulumi_vault/database/secret_backend_connection.py +14 -19
  47. pulumi_vault/database/secret_backend_role.py +14 -19
  48. pulumi_vault/database/secret_backend_static_role.py +1 -69
  49. pulumi_vault/database/secrets_mount.py +14 -19
  50. pulumi_vault/egp_policy.py +0 -5
  51. pulumi_vault/gcp/_inputs.py +0 -111
  52. pulumi_vault/gcp/auth_backend.py +0 -5
  53. pulumi_vault/gcp/auth_backend_role.py +0 -5
  54. pulumi_vault/gcp/get_auth_backend_role.py +4 -42
  55. pulumi_vault/gcp/outputs.py +0 -5
  56. pulumi_vault/gcp/secret_backend.py +0 -5
  57. pulumi_vault/gcp/secret_impersonated_account.py +3 -62
  58. pulumi_vault/gcp/secret_roleset.py +0 -5
  59. pulumi_vault/gcp/secret_static_account.py +0 -5
  60. pulumi_vault/generic/endpoint.py +0 -5
  61. pulumi_vault/generic/get_secret.py +5 -25
  62. pulumi_vault/generic/secret.py +7 -12
  63. pulumi_vault/get_auth_backend.py +4 -21
  64. pulumi_vault/get_auth_backends.py +4 -16
  65. pulumi_vault/get_namespace.py +5 -18
  66. pulumi_vault/get_namespaces.py +4 -13
  67. pulumi_vault/get_nomad_access_token.py +8 -28
  68. pulumi_vault/get_policy_document.py +4 -15
  69. pulumi_vault/get_raft_autopilot_state.py +7 -26
  70. pulumi_vault/github/_inputs.py +0 -55
  71. pulumi_vault/github/auth_backend.py +0 -5
  72. pulumi_vault/github/outputs.py +0 -5
  73. pulumi_vault/github/team.py +0 -5
  74. pulumi_vault/github/user.py +0 -5
  75. pulumi_vault/identity/entity.py +0 -5
  76. pulumi_vault/identity/entity_alias.py +0 -5
  77. pulumi_vault/identity/entity_policies.py +0 -5
  78. pulumi_vault/identity/get_entity.py +5 -35
  79. pulumi_vault/identity/get_group.py +6 -42
  80. pulumi_vault/identity/get_oidc_client_creds.py +4 -16
  81. pulumi_vault/identity/get_oidc_openid_config.py +4 -26
  82. pulumi_vault/identity/get_oidc_public_keys.py +5 -16
  83. pulumi_vault/identity/group.py +0 -5
  84. pulumi_vault/identity/group_alias.py +0 -5
  85. pulumi_vault/identity/group_member_entity_ids.py +0 -5
  86. pulumi_vault/identity/group_member_group_ids.py +0 -5
  87. pulumi_vault/identity/group_policies.py +0 -5
  88. pulumi_vault/identity/mfa_duo.py +0 -5
  89. pulumi_vault/identity/mfa_login_enforcement.py +0 -5
  90. pulumi_vault/identity/mfa_okta.py +0 -5
  91. pulumi_vault/identity/mfa_pingid.py +0 -5
  92. pulumi_vault/identity/mfa_totp.py +0 -5
  93. pulumi_vault/identity/oidc.py +0 -5
  94. pulumi_vault/identity/oidc_assignment.py +0 -5
  95. pulumi_vault/identity/oidc_client.py +0 -5
  96. pulumi_vault/identity/oidc_key.py +0 -5
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
  98. pulumi_vault/identity/oidc_provider.py +0 -5
  99. pulumi_vault/identity/oidc_role.py +0 -5
  100. pulumi_vault/identity/oidc_scope.py +0 -5
  101. pulumi_vault/identity/outputs.py +3 -8
  102. pulumi_vault/jwt/_inputs.py +0 -55
  103. pulumi_vault/jwt/auth_backend.py +0 -5
  104. pulumi_vault/jwt/auth_backend_role.py +28 -33
  105. pulumi_vault/jwt/outputs.py +0 -5
  106. pulumi_vault/kmip/secret_backend.py +0 -5
  107. pulumi_vault/kmip/secret_role.py +0 -5
  108. pulumi_vault/kmip/secret_scope.py +0 -5
  109. pulumi_vault/kubernetes/auth_backend_config.py +3 -55
  110. pulumi_vault/kubernetes/auth_backend_role.py +0 -5
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +7 -59
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
  113. pulumi_vault/kubernetes/get_service_account_token.py +4 -28
  114. pulumi_vault/kubernetes/secret_backend.py +14 -19
  115. pulumi_vault/kubernetes/secret_backend_role.py +0 -5
  116. pulumi_vault/kv/_inputs.py +4 -36
  117. pulumi_vault/kv/get_secret.py +5 -20
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +5 -24
  119. pulumi_vault/kv/get_secret_v2.py +8 -27
  120. pulumi_vault/kv/get_secrets_list.py +4 -15
  121. pulumi_vault/kv/get_secrets_list_v2.py +4 -18
  122. pulumi_vault/kv/outputs.py +3 -8
  123. pulumi_vault/kv/secret.py +7 -12
  124. pulumi_vault/kv/secret_backend_v2.py +0 -5
  125. pulumi_vault/kv/secret_v2.py +28 -33
  126. pulumi_vault/ldap/auth_backend.py +0 -52
  127. pulumi_vault/ldap/auth_backend_group.py +0 -5
  128. pulumi_vault/ldap/auth_backend_user.py +0 -5
  129. pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
  130. pulumi_vault/ldap/get_static_credentials.py +4 -23
  131. pulumi_vault/ldap/secret_backend.py +14 -19
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
  133. pulumi_vault/ldap/secret_backend_library_set.py +0 -5
  134. pulumi_vault/ldap/secret_backend_static_role.py +0 -5
  135. pulumi_vault/managed/_inputs.py +0 -205
  136. pulumi_vault/managed/keys.py +0 -5
  137. pulumi_vault/managed/outputs.py +0 -5
  138. pulumi_vault/mfa_duo.py +0 -5
  139. pulumi_vault/mfa_okta.py +0 -5
  140. pulumi_vault/mfa_pingid.py +0 -5
  141. pulumi_vault/mfa_totp.py +0 -5
  142. pulumi_vault/mongodbatlas/secret_backend.py +0 -5
  143. pulumi_vault/mongodbatlas/secret_role.py +0 -5
  144. pulumi_vault/mount.py +16 -21
  145. pulumi_vault/namespace.py +14 -19
  146. pulumi_vault/nomad_secret_backend.py +0 -5
  147. pulumi_vault/nomad_secret_role.py +0 -5
  148. pulumi_vault/okta/_inputs.py +0 -39
  149. pulumi_vault/okta/auth_backend.py +0 -5
  150. pulumi_vault/okta/auth_backend_group.py +0 -5
  151. pulumi_vault/okta/auth_backend_user.py +0 -5
  152. pulumi_vault/okta/outputs.py +0 -5
  153. pulumi_vault/outputs.py +0 -5
  154. pulumi_vault/password_policy.py +0 -5
  155. pulumi_vault/pkisecret/_inputs.py +8 -49
  156. pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
  157. pulumi_vault/pkisecret/backend_config_est.py +14 -19
  158. pulumi_vault/pkisecret/get_backend_config_est.py +5 -23
  159. pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
  160. pulumi_vault/pkisecret/get_backend_issuers.py +5 -18
  161. pulumi_vault/pkisecret/get_backend_key.py +4 -19
  162. pulumi_vault/pkisecret/get_backend_keys.py +5 -18
  163. pulumi_vault/pkisecret/outputs.py +12 -17
  164. pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
  172. pulumi_vault/pkisecret/secret_backend_key.py +0 -5
  173. pulumi_vault/pkisecret/secret_backend_role.py +0 -5
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
  176. pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
  177. pulumi_vault/plugin.py +0 -5
  178. pulumi_vault/plugin_pinned_version.py +0 -5
  179. pulumi_vault/policy.py +0 -5
  180. pulumi_vault/provider.py +0 -5
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +0 -5
  183. pulumi_vault/quota_rate_limit.py +0 -5
  184. pulumi_vault/rabbitmq/_inputs.py +0 -61
  185. pulumi_vault/rabbitmq/outputs.py +0 -5
  186. pulumi_vault/rabbitmq/secret_backend.py +0 -5
  187. pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
  188. pulumi_vault/raft_autopilot.py +0 -5
  189. pulumi_vault/raft_snapshot_agent_config.py +0 -5
  190. pulumi_vault/rgp_policy.py +0 -5
  191. pulumi_vault/saml/auth_backend.py +0 -5
  192. pulumi_vault/saml/auth_backend_role.py +14 -19
  193. pulumi_vault/secrets/_inputs.py +0 -30
  194. pulumi_vault/secrets/outputs.py +0 -5
  195. pulumi_vault/secrets/sync_association.py +0 -5
  196. pulumi_vault/secrets/sync_aws_destination.py +14 -19
  197. pulumi_vault/secrets/sync_azure_destination.py +14 -19
  198. pulumi_vault/secrets/sync_config.py +0 -5
  199. pulumi_vault/secrets/sync_gcp_destination.py +14 -19
  200. pulumi_vault/secrets/sync_gh_destination.py +0 -5
  201. pulumi_vault/secrets/sync_github_apps.py +0 -5
  202. pulumi_vault/secrets/sync_vercel_destination.py +0 -5
  203. pulumi_vault/ssh/_inputs.py +0 -22
  204. pulumi_vault/ssh/outputs.py +0 -5
  205. pulumi_vault/ssh/secret_backend_ca.py +0 -5
  206. pulumi_vault/ssh/secret_backend_role.py +28 -67
  207. pulumi_vault/terraformcloud/secret_backend.py +0 -5
  208. pulumi_vault/terraformcloud/secret_creds.py +0 -5
  209. pulumi_vault/terraformcloud/secret_role.py +0 -5
  210. pulumi_vault/token.py +0 -5
  211. pulumi_vault/tokenauth/auth_backend_role.py +14 -5
  212. pulumi_vault/transform/alphabet.py +0 -5
  213. pulumi_vault/transform/get_decode.py +14 -38
  214. pulumi_vault/transform/get_encode.py +14 -38
  215. pulumi_vault/transform/role.py +0 -5
  216. pulumi_vault/transform/template.py +14 -19
  217. pulumi_vault/transform/transformation.py +0 -5
  218. pulumi_vault/transit/get_decrypt.py +4 -21
  219. pulumi_vault/transit/get_encrypt.py +4 -23
  220. pulumi_vault/transit/secret_backend_key.py +7 -12
  221. pulumi_vault/transit/secret_cache_config.py +0 -5
  222. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/METADATA +2 -3
  223. pulumi_vault-6.4.0a1723454543.dist-info/RECORD +256 -0
  224. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/WHEEL +1 -1
  225. pulumi_vault-6.4.0.dist-info/RECORD +0 -256
  226. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/top_level.txt +0 -0
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
 
17
12
  __all__ = [
@@ -188,6 +183,9 @@ def get_auth_backend(namespace: Optional[str] = None,
188
183
  namespace=pulumi.get(__ret__, 'namespace'),
189
184
  path=pulumi.get(__ret__, 'path'),
190
185
  type=pulumi.get(__ret__, 'type'))
186
+
187
+
188
+ @_utilities.lift_output_func(get_auth_backend)
191
189
  def get_auth_backend_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
192
190
  path: Optional[pulumi.Input[str]] = None,
193
191
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendResult]:
@@ -208,19 +206,4 @@ def get_auth_backend_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
208
206
  *Available only for Vault Enterprise*.
209
207
  :param str path: The auth backend mount point.
210
208
  """
211
- __args__ = dict()
212
- __args__['namespace'] = namespace
213
- __args__['path'] = path
214
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
215
- __ret__ = pulumi.runtime.invoke_output('vault:index/getAuthBackend:getAuthBackend', __args__, opts=opts, typ=GetAuthBackendResult)
216
- return __ret__.apply(lambda __response__: GetAuthBackendResult(
217
- accessor=pulumi.get(__response__, 'accessor'),
218
- default_lease_ttl_seconds=pulumi.get(__response__, 'default_lease_ttl_seconds'),
219
- description=pulumi.get(__response__, 'description'),
220
- id=pulumi.get(__response__, 'id'),
221
- listing_visibility=pulumi.get(__response__, 'listing_visibility'),
222
- local=pulumi.get(__response__, 'local'),
223
- max_lease_ttl_seconds=pulumi.get(__response__, 'max_lease_ttl_seconds'),
224
- namespace=pulumi.get(__response__, 'namespace'),
225
- path=pulumi.get(__response__, 'path'),
226
- type=pulumi.get(__response__, 'type')))
209
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
 
17
12
  __all__ = [
@@ -130,6 +125,9 @@ def get_auth_backends(namespace: Optional[str] = None,
130
125
  namespace=pulumi.get(__ret__, 'namespace'),
131
126
  paths=pulumi.get(__ret__, 'paths'),
132
127
  type=pulumi.get(__ret__, 'type'))
128
+
129
+
130
+ @_utilities.lift_output_func(get_auth_backends)
133
131
  def get_auth_backends_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
134
132
  type: Optional[pulumi.Input[Optional[str]]] = None,
135
133
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendsResult]:
@@ -157,14 +155,4 @@ def get_auth_backends_output(namespace: Optional[pulumi.Input[Optional[str]]] =
157
155
  *Available only for Vault Enterprise*.
158
156
  :param str type: The name of the auth method type. Allows filtering of backends returned by type.
159
157
  """
160
- __args__ = dict()
161
- __args__['namespace'] = namespace
162
- __args__['type'] = type
163
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
164
- __ret__ = pulumi.runtime.invoke_output('vault:index/getAuthBackends:getAuthBackends', __args__, opts=opts, typ=GetAuthBackendsResult)
165
- return __ret__.apply(lambda __response__: GetAuthBackendsResult(
166
- accessors=pulumi.get(__response__, 'accessors'),
167
- id=pulumi.get(__response__, 'id'),
168
- namespace=pulumi.get(__response__, 'namespace'),
169
- paths=pulumi.get(__response__, 'paths'),
170
- type=pulumi.get(__response__, 'type')))
158
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
 
17
12
  __all__ = [
@@ -48,7 +43,7 @@ class GetNamespaceResult:
48
43
 
49
44
  @property
50
45
  @pulumi.getter(name="customMetadata")
51
- def custom_metadata(self) -> Mapping[str, str]:
46
+ def custom_metadata(self) -> Mapping[str, Any]:
52
47
  """
53
48
  (Optional) A map of strings containing arbitrary metadata for the namespace.
54
49
  Only fetched if `path` is specified.
@@ -166,6 +161,9 @@ def get_namespace(namespace: Optional[str] = None,
166
161
  namespace_id=pulumi.get(__ret__, 'namespace_id'),
167
162
  path=pulumi.get(__ret__, 'path'),
168
163
  path_fq=pulumi.get(__ret__, 'path_fq'))
164
+
165
+
166
+ @_utilities.lift_output_func(get_namespace)
169
167
  def get_namespace_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
170
168
  path: Optional[pulumi.Input[Optional[str]]] = None,
171
169
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNamespaceResult]:
@@ -212,15 +210,4 @@ def get_namespace_output(namespace: Optional[pulumi.Input[Optional[str]]] = None
212
210
  based on the `namespace` arguments of the provider and this data source.
213
211
  Other path related attributes will be empty in this case.
214
212
  """
215
- __args__ = dict()
216
- __args__['namespace'] = namespace
217
- __args__['path'] = path
218
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
219
- __ret__ = pulumi.runtime.invoke_output('vault:index/getNamespace:getNamespace', __args__, opts=opts, typ=GetNamespaceResult)
220
- return __ret__.apply(lambda __response__: GetNamespaceResult(
221
- custom_metadata=pulumi.get(__response__, 'custom_metadata'),
222
- id=pulumi.get(__response__, 'id'),
223
- namespace=pulumi.get(__response__, 'namespace'),
224
- namespace_id=pulumi.get(__response__, 'namespace_id'),
225
- path=pulumi.get(__response__, 'path'),
226
- path_fq=pulumi.get(__response__, 'path_fq')))
213
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
 
17
12
  __all__ = [
@@ -111,6 +106,9 @@ def get_namespaces(namespace: Optional[str] = None,
111
106
  id=pulumi.get(__ret__, 'id'),
112
107
  namespace=pulumi.get(__ret__, 'namespace'),
113
108
  paths=pulumi.get(__ret__, 'paths'))
109
+
110
+
111
+ @_utilities.lift_output_func(get_namespaces)
114
112
  def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
115
113
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNamespacesResult]:
116
114
  """
@@ -143,11 +141,4 @@ def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[str]]] = Non
143
141
  The value should not contain leading or trailing forward slashes.
144
142
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
145
143
  """
146
- __args__ = dict()
147
- __args__['namespace'] = namespace
148
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
149
- __ret__ = pulumi.runtime.invoke_output('vault:index/getNamespaces:getNamespaces', __args__, opts=opts, typ=GetNamespacesResult)
150
- return __ret__.apply(lambda __response__: GetNamespacesResult(
151
- id=pulumi.get(__response__, 'id'),
152
- namespace=pulumi.get(__response__, 'namespace'),
153
- paths=pulumi.get(__response__, 'paths')))
144
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
 
17
12
  __all__ = [
@@ -124,11 +119,8 @@ def get_nomad_access_token(backend: Optional[str] = None,
124
119
  role="test",
125
120
  type="client",
126
121
  policies=["readonly"])
127
- token = pulumi.Output.all(
128
- backend=config.backend,
129
- role=test.role
130
- ).apply(lambda resolved_outputs: vault.get_nomad_access_token_output(backend=resolved_outputs['backend'],
131
- role=resolved_outputs['role']))
122
+ token = pulumi.Output.all(config.backend, test.role).apply(lambda backend, role: vault.get_nomad_access_token_output(backend=backend,
123
+ role=role))
132
124
  ```
133
125
 
134
126
 
@@ -155,6 +147,9 @@ def get_nomad_access_token(backend: Optional[str] = None,
155
147
  namespace=pulumi.get(__ret__, 'namespace'),
156
148
  role=pulumi.get(__ret__, 'role'),
157
149
  secret_id=pulumi.get(__ret__, 'secret_id'))
150
+
151
+
152
+ @_utilities.lift_output_func(get_nomad_access_token)
158
153
  def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
159
154
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
160
155
  role: Optional[pulumi.Input[str]] = None,
@@ -178,11 +173,8 @@ def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
178
173
  role="test",
179
174
  type="client",
180
175
  policies=["readonly"])
181
- token = pulumi.Output.all(
182
- backend=config.backend,
183
- role=test.role
184
- ).apply(lambda resolved_outputs: vault.get_nomad_access_token_output(backend=resolved_outputs['backend'],
185
- role=resolved_outputs['role']))
176
+ token = pulumi.Output.all(config.backend, test.role).apply(lambda backend, role: vault.get_nomad_access_token_output(backend=backend,
177
+ role=role))
186
178
  ```
187
179
 
188
180
 
@@ -195,16 +187,4 @@ def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
195
187
  :param str role: The name of the Nomad secret backend role to generate
196
188
  a token for, with no leading or trailing `/`s.
197
189
  """
198
- __args__ = dict()
199
- __args__['backend'] = backend
200
- __args__['namespace'] = namespace
201
- __args__['role'] = role
202
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
203
- __ret__ = pulumi.runtime.invoke_output('vault:index/getNomadAccessToken:getNomadAccessToken', __args__, opts=opts, typ=GetNomadAccessTokenResult)
204
- return __ret__.apply(lambda __response__: GetNomadAccessTokenResult(
205
- accessor_id=pulumi.get(__response__, 'accessor_id'),
206
- backend=pulumi.get(__response__, 'backend'),
207
- id=pulumi.get(__response__, 'id'),
208
- namespace=pulumi.get(__response__, 'namespace'),
209
- role=pulumi.get(__response__, 'role'),
210
- secret_id=pulumi.get(__response__, 'secret_id')))
190
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
  from . import outputs
17
12
  from ._inputs import *
@@ -120,6 +115,9 @@ def get_policy_document(namespace: Optional[str] = None,
120
115
  id=pulumi.get(__ret__, 'id'),
121
116
  namespace=pulumi.get(__ret__, 'namespace'),
122
117
  rules=pulumi.get(__ret__, 'rules'))
118
+
119
+
120
+ @_utilities.lift_output_func(get_policy_document)
123
121
  def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
124
122
  rules: Optional[pulumi.Input[Optional[Sequence[Union['GetPolicyDocumentRuleArgs', 'GetPolicyDocumentRuleArgsDict']]]]] = None,
125
123
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetPolicyDocumentResult]:
@@ -148,13 +146,4 @@ def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]]
148
146
  policy=example.hcl)
149
147
  ```
150
148
  """
151
- __args__ = dict()
152
- __args__['namespace'] = namespace
153
- __args__['rules'] = rules
154
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
155
- __ret__ = pulumi.runtime.invoke_output('vault:index/getPolicyDocument:getPolicyDocument', __args__, opts=opts, typ=GetPolicyDocumentResult)
156
- return __ret__.apply(lambda __response__: GetPolicyDocumentResult(
157
- hcl=pulumi.get(__response__, 'hcl'),
158
- id=pulumi.get(__response__, 'id'),
159
- namespace=pulumi.get(__response__, 'namespace'),
160
- rules=pulumi.get(__response__, 'rules')))
149
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
 
17
12
  __all__ = [
@@ -114,7 +109,7 @@ class GetRaftAutopilotStateResult:
114
109
 
115
110
  @property
116
111
  @pulumi.getter(name="redundancyZones")
117
- def redundancy_zones(self) -> Mapping[str, str]:
112
+ def redundancy_zones(self) -> Mapping[str, Any]:
118
113
  """
119
114
  Additional output related to redundancy zones stored as a serialized map of strings.
120
115
  """
@@ -130,7 +125,7 @@ class GetRaftAutopilotStateResult:
130
125
 
131
126
  @property
132
127
  @pulumi.getter
133
- def servers(self) -> Mapping[str, str]:
128
+ def servers(self) -> Mapping[str, Any]:
134
129
  """
135
130
  Additionaly output related to servers in the cluster stored as a serialized map of strings.
136
131
  """
@@ -146,7 +141,7 @@ class GetRaftAutopilotStateResult:
146
141
 
147
142
  @property
148
143
  @pulumi.getter(name="upgradeInfo")
149
- def upgrade_info(self) -> Mapping[str, str]:
144
+ def upgrade_info(self) -> Mapping[str, Any]:
150
145
  """
151
146
  Additional output related to upgrade information stored as a serialized map of strings.
152
147
  """
@@ -228,6 +223,9 @@ def get_raft_autopilot_state(namespace: Optional[str] = None,
228
223
  upgrade_info=pulumi.get(__ret__, 'upgrade_info'),
229
224
  upgrade_info_json=pulumi.get(__ret__, 'upgrade_info_json'),
230
225
  voters=pulumi.get(__ret__, 'voters'))
226
+
227
+
228
+ @_utilities.lift_output_func(get_raft_autopilot_state)
231
229
  def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
232
230
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetRaftAutopilotStateResult]:
233
231
  """
@@ -247,21 +245,4 @@ def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[st
247
245
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
248
246
  *Available only for Vault Enterprise*.
249
247
  """
250
- __args__ = dict()
251
- __args__['namespace'] = namespace
252
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
253
- __ret__ = pulumi.runtime.invoke_output('vault:index/getRaftAutopilotState:getRaftAutopilotState', __args__, opts=opts, typ=GetRaftAutopilotStateResult)
254
- return __ret__.apply(lambda __response__: GetRaftAutopilotStateResult(
255
- failure_tolerance=pulumi.get(__response__, 'failure_tolerance'),
256
- healthy=pulumi.get(__response__, 'healthy'),
257
- id=pulumi.get(__response__, 'id'),
258
- leader=pulumi.get(__response__, 'leader'),
259
- namespace=pulumi.get(__response__, 'namespace'),
260
- optimistic_failure_tolerance=pulumi.get(__response__, 'optimistic_failure_tolerance'),
261
- redundancy_zones=pulumi.get(__response__, 'redundancy_zones'),
262
- redundancy_zones_json=pulumi.get(__response__, 'redundancy_zones_json'),
263
- servers=pulumi.get(__response__, 'servers'),
264
- servers_json=pulumi.get(__response__, 'servers_json'),
265
- upgrade_info=pulumi.get(__response__, 'upgrade_info'),
266
- upgrade_info_json=pulumi.get(__response__, 'upgrade_info_json'),
267
- voters=pulumi.get(__response__, 'voters')))
248
+ ...
@@ -4,70 +4,15 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
18
13
  'AuthBackendTuneArgs',
19
- 'AuthBackendTuneArgsDict',
20
14
  ]
21
15
 
22
- MYPY = False
23
-
24
- if not MYPY:
25
- class AuthBackendTuneArgsDict(TypedDict):
26
- allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
27
- """
28
- List of headers to whitelist and allowing
29
- a plugin to include them in the response.
30
- """
31
- audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
32
- """
33
- Specifies the list of keys that will
34
- not be HMAC'd by audit devices in the request data object.
35
- """
36
- audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
37
- """
38
- Specifies the list of keys that will
39
- not be HMAC'd by audit devices in the response data object.
40
- """
41
- default_lease_ttl: NotRequired[pulumi.Input[str]]
42
- """
43
- Specifies the default time-to-live.
44
- If set, this overrides the global default.
45
- Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
46
- """
47
- listing_visibility: NotRequired[pulumi.Input[str]]
48
- """
49
- Specifies whether to show this mount in
50
- the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
51
- """
52
- max_lease_ttl: NotRequired[pulumi.Input[str]]
53
- """
54
- Specifies the maximum time-to-live.
55
- If set, this overrides the global default.
56
- Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
57
- """
58
- passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
59
- """
60
- List of headers to whitelist and
61
- pass from the request to the backend.
62
- """
63
- token_type: NotRequired[pulumi.Input[str]]
64
- """
65
- Specifies the type of tokens that should be returned by
66
- the mount. Valid values are "default-service", "default-batch", "service", "batch".
67
- """
68
- elif False:
69
- AuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any]
70
-
71
16
  @pulumi.input_type
72
17
  class AuthBackendTuneArgs:
73
18
  def __init__(__self__, *,
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
  from . import outputs
17
12
  from ._inputs import *
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['TeamArgs', 'Team']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['UserArgs', 'User']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['EntityArgs', 'Entity']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['EntityAliasArgs', 'EntityAlias']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['EntityPoliciesArgs', 'EntityPolicies']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
  from . import outputs
17
12
 
@@ -194,7 +189,7 @@ class GetEntityResult:
194
189
 
195
190
  @property
196
191
  @pulumi.getter
197
- def metadata(self) -> Mapping[str, str]:
192
+ def metadata(self) -> Mapping[str, Any]:
198
193
  """
199
194
  Arbitrary metadata
200
195
  """
@@ -316,6 +311,9 @@ def get_entity(alias_id: Optional[str] = None,
316
311
  namespace=pulumi.get(__ret__, 'namespace'),
317
312
  namespace_id=pulumi.get(__ret__, 'namespace_id'),
318
313
  policies=pulumi.get(__ret__, 'policies'))
314
+
315
+
316
+ @_utilities.lift_output_func(get_entity)
319
317
  def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
320
318
  alias_mount_accessor: Optional[pulumi.Input[Optional[str]]] = None,
321
319
  alias_name: Optional[pulumi.Input[Optional[str]]] = None,
@@ -353,32 +351,4 @@ def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
353
351
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
354
352
  *Available only for Vault Enterprise*.
355
353
  """
356
- __args__ = dict()
357
- __args__['aliasId'] = alias_id
358
- __args__['aliasMountAccessor'] = alias_mount_accessor
359
- __args__['aliasName'] = alias_name
360
- __args__['entityId'] = entity_id
361
- __args__['entityName'] = entity_name
362
- __args__['namespace'] = namespace
363
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
364
- __ret__ = pulumi.runtime.invoke_output('vault:identity/getEntity:getEntity', __args__, opts=opts, typ=GetEntityResult)
365
- return __ret__.apply(lambda __response__: GetEntityResult(
366
- alias_id=pulumi.get(__response__, 'alias_id'),
367
- alias_mount_accessor=pulumi.get(__response__, 'alias_mount_accessor'),
368
- alias_name=pulumi.get(__response__, 'alias_name'),
369
- aliases=pulumi.get(__response__, 'aliases'),
370
- creation_time=pulumi.get(__response__, 'creation_time'),
371
- data_json=pulumi.get(__response__, 'data_json'),
372
- direct_group_ids=pulumi.get(__response__, 'direct_group_ids'),
373
- disabled=pulumi.get(__response__, 'disabled'),
374
- entity_id=pulumi.get(__response__, 'entity_id'),
375
- entity_name=pulumi.get(__response__, 'entity_name'),
376
- group_ids=pulumi.get(__response__, 'group_ids'),
377
- id=pulumi.get(__response__, 'id'),
378
- inherited_group_ids=pulumi.get(__response__, 'inherited_group_ids'),
379
- last_update_time=pulumi.get(__response__, 'last_update_time'),
380
- merged_entity_ids=pulumi.get(__response__, 'merged_entity_ids'),
381
- metadata=pulumi.get(__response__, 'metadata'),
382
- namespace=pulumi.get(__response__, 'namespace'),
383
- namespace_id=pulumi.get(__response__, 'namespace_id'),
384
- policies=pulumi.get(__response__, 'policies')))
354
+ ...