pulumi-vault 6.4.0__py3-none-any.whl → 6.4.0a1723820369__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +0 -560
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +4 -19
  4. pulumi_vault/ad/secret_backend.py +0 -5
  5. pulumi_vault/ad/secret_library.py +0 -5
  6. pulumi_vault/ad/secret_role.py +0 -5
  7. pulumi_vault/alicloud/auth_backend_role.py +0 -5
  8. pulumi_vault/approle/auth_backend_login.py +0 -5
  9. pulumi_vault/approle/auth_backend_role.py +0 -5
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -99
  11. pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
  12. pulumi_vault/audit.py +0 -5
  13. pulumi_vault/audit_request_header.py +0 -5
  14. pulumi_vault/auth_backend.py +0 -5
  15. pulumi_vault/aws/auth_backend_cert.py +0 -5
  16. pulumi_vault/aws/auth_backend_client.py +0 -5
  17. pulumi_vault/aws/auth_backend_config_identity.py +0 -5
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
  19. pulumi_vault/aws/auth_backend_login.py +0 -5
  20. pulumi_vault/aws/auth_backend_role.py +0 -5
  21. pulumi_vault/aws/auth_backend_role_tag.py +0 -5
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
  23. pulumi_vault/aws/auth_backend_sts_role.py +0 -5
  24. pulumi_vault/aws/get_access_credentials.py +4 -31
  25. pulumi_vault/aws/get_static_access_credentials.py +4 -18
  26. pulumi_vault/aws/secret_backend.py +0 -5
  27. pulumi_vault/aws/secret_backend_role.py +0 -5
  28. pulumi_vault/aws/secret_backend_static_role.py +0 -5
  29. pulumi_vault/azure/_inputs.py +0 -24
  30. pulumi_vault/azure/auth_backend_config.py +0 -5
  31. pulumi_vault/azure/auth_backend_role.py +0 -5
  32. pulumi_vault/azure/backend.py +0 -5
  33. pulumi_vault/azure/backend_role.py +0 -5
  34. pulumi_vault/azure/get_access_credentials.py +4 -36
  35. pulumi_vault/azure/outputs.py +0 -5
  36. pulumi_vault/cert_auth_backend_role.py +0 -5
  37. pulumi_vault/config/__init__.pyi +0 -5
  38. pulumi_vault/config/_inputs.py +0 -21
  39. pulumi_vault/config/outputs.py +0 -5
  40. pulumi_vault/config/ui_custom_message.py +0 -5
  41. pulumi_vault/config/vars.py +0 -5
  42. pulumi_vault/consul/secret_backend.py +0 -5
  43. pulumi_vault/consul/secret_backend_role.py +0 -5
  44. pulumi_vault/database/_inputs.py +34 -2185
  45. pulumi_vault/database/outputs.py +0 -145
  46. pulumi_vault/database/secret_backend_connection.py +0 -5
  47. pulumi_vault/database/secret_backend_role.py +0 -5
  48. pulumi_vault/database/secret_backend_static_role.py +1 -69
  49. pulumi_vault/database/secrets_mount.py +0 -5
  50. pulumi_vault/egp_policy.py +0 -5
  51. pulumi_vault/gcp/_inputs.py +0 -111
  52. pulumi_vault/gcp/auth_backend.py +0 -5
  53. pulumi_vault/gcp/auth_backend_role.py +0 -5
  54. pulumi_vault/gcp/get_auth_backend_role.py +4 -42
  55. pulumi_vault/gcp/outputs.py +0 -5
  56. pulumi_vault/gcp/secret_backend.py +0 -5
  57. pulumi_vault/gcp/secret_impersonated_account.py +3 -62
  58. pulumi_vault/gcp/secret_roleset.py +0 -5
  59. pulumi_vault/gcp/secret_static_account.py +0 -5
  60. pulumi_vault/generic/endpoint.py +0 -5
  61. pulumi_vault/generic/get_secret.py +4 -24
  62. pulumi_vault/generic/secret.py +0 -5
  63. pulumi_vault/get_auth_backend.py +4 -21
  64. pulumi_vault/get_auth_backends.py +4 -16
  65. pulumi_vault/get_namespace.py +4 -17
  66. pulumi_vault/get_namespaces.py +4 -13
  67. pulumi_vault/get_nomad_access_token.py +4 -18
  68. pulumi_vault/get_policy_document.py +4 -15
  69. pulumi_vault/get_raft_autopilot_state.py +4 -23
  70. pulumi_vault/github/_inputs.py +0 -55
  71. pulumi_vault/github/auth_backend.py +0 -5
  72. pulumi_vault/github/outputs.py +0 -5
  73. pulumi_vault/github/team.py +0 -5
  74. pulumi_vault/github/user.py +0 -5
  75. pulumi_vault/identity/entity.py +0 -5
  76. pulumi_vault/identity/entity_alias.py +0 -5
  77. pulumi_vault/identity/entity_policies.py +0 -5
  78. pulumi_vault/identity/get_entity.py +4 -34
  79. pulumi_vault/identity/get_group.py +4 -40
  80. pulumi_vault/identity/get_oidc_client_creds.py +4 -16
  81. pulumi_vault/identity/get_oidc_openid_config.py +4 -26
  82. pulumi_vault/identity/get_oidc_public_keys.py +4 -15
  83. pulumi_vault/identity/group.py +0 -5
  84. pulumi_vault/identity/group_alias.py +0 -5
  85. pulumi_vault/identity/group_member_entity_ids.py +0 -5
  86. pulumi_vault/identity/group_member_group_ids.py +0 -5
  87. pulumi_vault/identity/group_policies.py +0 -5
  88. pulumi_vault/identity/mfa_duo.py +0 -5
  89. pulumi_vault/identity/mfa_login_enforcement.py +0 -5
  90. pulumi_vault/identity/mfa_okta.py +0 -5
  91. pulumi_vault/identity/mfa_pingid.py +0 -5
  92. pulumi_vault/identity/mfa_totp.py +0 -5
  93. pulumi_vault/identity/oidc.py +0 -5
  94. pulumi_vault/identity/oidc_assignment.py +0 -5
  95. pulumi_vault/identity/oidc_client.py +0 -5
  96. pulumi_vault/identity/oidc_key.py +0 -5
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
  98. pulumi_vault/identity/oidc_provider.py +0 -5
  99. pulumi_vault/identity/oidc_role.py +0 -5
  100. pulumi_vault/identity/oidc_scope.py +0 -5
  101. pulumi_vault/identity/outputs.py +0 -5
  102. pulumi_vault/jwt/_inputs.py +0 -55
  103. pulumi_vault/jwt/auth_backend.py +0 -5
  104. pulumi_vault/jwt/auth_backend_role.py +0 -5
  105. pulumi_vault/jwt/outputs.py +0 -5
  106. pulumi_vault/kmip/secret_backend.py +0 -5
  107. pulumi_vault/kmip/secret_role.py +0 -5
  108. pulumi_vault/kmip/secret_scope.py +0 -5
  109. pulumi_vault/kubernetes/auth_backend_config.py +3 -55
  110. pulumi_vault/kubernetes/auth_backend_role.py +0 -5
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +7 -59
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
  113. pulumi_vault/kubernetes/get_service_account_token.py +4 -28
  114. pulumi_vault/kubernetes/secret_backend.py +0 -5
  115. pulumi_vault/kubernetes/secret_backend_role.py +0 -5
  116. pulumi_vault/kv/_inputs.py +0 -32
  117. pulumi_vault/kv/get_secret.py +4 -19
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +4 -23
  119. pulumi_vault/kv/get_secret_v2.py +6 -25
  120. pulumi_vault/kv/get_secrets_list.py +4 -15
  121. pulumi_vault/kv/get_secrets_list_v2.py +4 -18
  122. pulumi_vault/kv/outputs.py +0 -5
  123. pulumi_vault/kv/secret.py +0 -5
  124. pulumi_vault/kv/secret_backend_v2.py +0 -5
  125. pulumi_vault/kv/secret_v2.py +0 -5
  126. pulumi_vault/ldap/auth_backend.py +0 -52
  127. pulumi_vault/ldap/auth_backend_group.py +0 -5
  128. pulumi_vault/ldap/auth_backend_user.py +0 -5
  129. pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
  130. pulumi_vault/ldap/get_static_credentials.py +4 -23
  131. pulumi_vault/ldap/secret_backend.py +0 -5
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
  133. pulumi_vault/ldap/secret_backend_library_set.py +0 -5
  134. pulumi_vault/ldap/secret_backend_static_role.py +0 -5
  135. pulumi_vault/managed/_inputs.py +0 -205
  136. pulumi_vault/managed/keys.py +0 -5
  137. pulumi_vault/managed/outputs.py +0 -5
  138. pulumi_vault/mfa_duo.py +0 -5
  139. pulumi_vault/mfa_okta.py +0 -5
  140. pulumi_vault/mfa_pingid.py +0 -5
  141. pulumi_vault/mfa_totp.py +0 -5
  142. pulumi_vault/mongodbatlas/secret_backend.py +0 -5
  143. pulumi_vault/mongodbatlas/secret_role.py +0 -5
  144. pulumi_vault/mount.py +0 -5
  145. pulumi_vault/namespace.py +0 -5
  146. pulumi_vault/nomad_secret_backend.py +0 -5
  147. pulumi_vault/nomad_secret_role.py +0 -5
  148. pulumi_vault/okta/_inputs.py +0 -39
  149. pulumi_vault/okta/auth_backend.py +0 -5
  150. pulumi_vault/okta/auth_backend_group.py +0 -5
  151. pulumi_vault/okta/auth_backend_user.py +0 -5
  152. pulumi_vault/okta/outputs.py +0 -5
  153. pulumi_vault/outputs.py +0 -5
  154. pulumi_vault/password_policy.py +0 -5
  155. pulumi_vault/pkisecret/_inputs.py +0 -41
  156. pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
  157. pulumi_vault/pkisecret/backend_config_est.py +0 -5
  158. pulumi_vault/pkisecret/get_backend_config_est.py +4 -22
  159. pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
  160. pulumi_vault/pkisecret/get_backend_issuers.py +4 -17
  161. pulumi_vault/pkisecret/get_backend_key.py +4 -19
  162. pulumi_vault/pkisecret/get_backend_keys.py +4 -17
  163. pulumi_vault/pkisecret/outputs.py +0 -5
  164. pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
  172. pulumi_vault/pkisecret/secret_backend_key.py +0 -5
  173. pulumi_vault/pkisecret/secret_backend_role.py +0 -5
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
  176. pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
  177. pulumi_vault/plugin.py +0 -5
  178. pulumi_vault/plugin_pinned_version.py +0 -5
  179. pulumi_vault/policy.py +0 -5
  180. pulumi_vault/provider.py +0 -5
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +0 -5
  183. pulumi_vault/quota_rate_limit.py +0 -5
  184. pulumi_vault/rabbitmq/_inputs.py +0 -61
  185. pulumi_vault/rabbitmq/outputs.py +0 -5
  186. pulumi_vault/rabbitmq/secret_backend.py +0 -5
  187. pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
  188. pulumi_vault/raft_autopilot.py +0 -5
  189. pulumi_vault/raft_snapshot_agent_config.py +0 -5
  190. pulumi_vault/rgp_policy.py +0 -5
  191. pulumi_vault/saml/auth_backend.py +0 -5
  192. pulumi_vault/saml/auth_backend_role.py +0 -5
  193. pulumi_vault/secrets/_inputs.py +0 -30
  194. pulumi_vault/secrets/outputs.py +0 -5
  195. pulumi_vault/secrets/sync_association.py +0 -5
  196. pulumi_vault/secrets/sync_aws_destination.py +0 -5
  197. pulumi_vault/secrets/sync_azure_destination.py +0 -5
  198. pulumi_vault/secrets/sync_config.py +0 -5
  199. pulumi_vault/secrets/sync_gcp_destination.py +0 -5
  200. pulumi_vault/secrets/sync_gh_destination.py +0 -5
  201. pulumi_vault/secrets/sync_github_apps.py +0 -5
  202. pulumi_vault/secrets/sync_vercel_destination.py +0 -5
  203. pulumi_vault/ssh/_inputs.py +0 -22
  204. pulumi_vault/ssh/outputs.py +0 -5
  205. pulumi_vault/ssh/secret_backend_ca.py +0 -5
  206. pulumi_vault/ssh/secret_backend_role.py +0 -39
  207. pulumi_vault/terraformcloud/secret_backend.py +0 -5
  208. pulumi_vault/terraformcloud/secret_creds.py +0 -5
  209. pulumi_vault/terraformcloud/secret_role.py +0 -5
  210. pulumi_vault/token.py +0 -5
  211. pulumi_vault/tokenauth/auth_backend_role.py +14 -5
  212. pulumi_vault/transform/alphabet.py +0 -5
  213. pulumi_vault/transform/get_decode.py +4 -28
  214. pulumi_vault/transform/get_encode.py +4 -28
  215. pulumi_vault/transform/role.py +0 -5
  216. pulumi_vault/transform/template.py +0 -5
  217. pulumi_vault/transform/transformation.py +0 -5
  218. pulumi_vault/transit/get_decrypt.py +4 -21
  219. pulumi_vault/transit/get_encrypt.py +4 -23
  220. pulumi_vault/transit/secret_backend_key.py +0 -5
  221. pulumi_vault/transit/secret_cache_config.py +0 -5
  222. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/METADATA +2 -3
  223. pulumi_vault-6.4.0a1723820369.dist-info/RECORD +256 -0
  224. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/WHEEL +1 -1
  225. pulumi_vault-6.4.0.dist-info/RECORD +0 -256
  226. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/top_level.txt +0 -0
@@ -264,7 +264,7 @@ def call_plain(
264
264
  output = pulumi.runtime.call(tok, props, res, typ)
265
265
 
266
266
  # Ingoring deps silently. They are typically non-empty, r.f() calls include r as a dependency.
267
- result, known, secret, _ = _sync_await(asyncio.create_task(_await_output(output)))
267
+ result, known, secret, _ = _sync_await(asyncio.ensure_future(_await_output(output)))
268
268
 
269
269
  problem = None
270
270
  if not known:
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -144,6 +139,9 @@ def get_access_credentials(backend: Optional[str] = None,
144
139
  namespace=pulumi.get(__ret__, 'namespace'),
145
140
  role=pulumi.get(__ret__, 'role'),
146
141
  username=pulumi.get(__ret__, 'username'))
142
+
143
+
144
+ @_utilities.lift_output_func(get_access_credentials)
147
145
  def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
148
146
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
149
147
  role: Optional[pulumi.Input[str]] = None,
@@ -161,17 +159,4 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
161
159
  :param str role: The name of the AD secret backend role to read
162
160
  credentials from, with no leading or trailing `/`s.
163
161
  """
164
- __args__ = dict()
165
- __args__['backend'] = backend
166
- __args__['namespace'] = namespace
167
- __args__['role'] = role
168
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
169
- __ret__ = pulumi.runtime.invoke_output('vault:ad/getAccessCredentials:getAccessCredentials', __args__, opts=opts, typ=GetAccessCredentialsResult)
170
- return __ret__.apply(lambda __response__: GetAccessCredentialsResult(
171
- backend=pulumi.get(__response__, 'backend'),
172
- current_password=pulumi.get(__response__, 'current_password'),
173
- id=pulumi.get(__response__, 'id'),
174
- last_password=pulumi.get(__response__, 'last_password'),
175
- namespace=pulumi.get(__response__, 'namespace'),
176
- role=pulumi.get(__response__, 'role'),
177
- username=pulumi.get(__response__, 'username')))
162
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretBackendArgs', 'SecretBackend']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretLibraryArgs', 'SecretLibrary']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretRoleArgs', 'SecretRole']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['AuthBackendLoginArgs', 'AuthBackendLogin']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['AuthBackendRoleSecretIdArgs', 'AuthBackendRoleSecretId']
@@ -24,9 +19,7 @@ class AuthBackendRoleSecretIdArgs:
24
19
  cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
25
20
  metadata: Optional[pulumi.Input[str]] = None,
26
21
  namespace: Optional[pulumi.Input[str]] = None,
27
- num_uses: Optional[pulumi.Input[int]] = None,
28
22
  secret_id: Optional[pulumi.Input[str]] = None,
29
- ttl: Optional[pulumi.Input[int]] = None,
30
23
  with_wrapped_accessor: Optional[pulumi.Input[bool]] = None,
31
24
  wrapping_ttl: Optional[pulumi.Input[str]] = None):
32
25
  """
@@ -41,10 +34,8 @@ class AuthBackendRoleSecretIdArgs:
41
34
  The value should not contain leading or trailing forward slashes.
42
35
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
43
36
  *Available only for Vault Enterprise*.
44
- :param pulumi.Input[int] num_uses: The number of uses for the secret-id.
45
37
  :param pulumi.Input[str] secret_id: The SecretID to be created. If set, uses "Push"
46
38
  mode. Defaults to Vault auto-generating SecretIDs.
47
- :param pulumi.Input[int] ttl: The TTL duration of the SecretID.
48
39
  :param pulumi.Input[bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
49
40
  If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
50
41
  invalidated through unwrapping.
@@ -62,12 +53,8 @@ class AuthBackendRoleSecretIdArgs:
62
53
  pulumi.set(__self__, "metadata", metadata)
63
54
  if namespace is not None:
64
55
  pulumi.set(__self__, "namespace", namespace)
65
- if num_uses is not None:
66
- pulumi.set(__self__, "num_uses", num_uses)
67
56
  if secret_id is not None:
68
57
  pulumi.set(__self__, "secret_id", secret_id)
69
- if ttl is not None:
70
- pulumi.set(__self__, "ttl", ttl)
71
58
  if with_wrapped_accessor is not None:
72
59
  pulumi.set(__self__, "with_wrapped_accessor", with_wrapped_accessor)
73
60
  if wrapping_ttl is not None:
@@ -138,18 +125,6 @@ class AuthBackendRoleSecretIdArgs:
138
125
  def namespace(self, value: Optional[pulumi.Input[str]]):
139
126
  pulumi.set(self, "namespace", value)
140
127
 
141
- @property
142
- @pulumi.getter(name="numUses")
143
- def num_uses(self) -> Optional[pulumi.Input[int]]:
144
- """
145
- The number of uses for the secret-id.
146
- """
147
- return pulumi.get(self, "num_uses")
148
-
149
- @num_uses.setter
150
- def num_uses(self, value: Optional[pulumi.Input[int]]):
151
- pulumi.set(self, "num_uses", value)
152
-
153
128
  @property
154
129
  @pulumi.getter(name="secretId")
155
130
  def secret_id(self) -> Optional[pulumi.Input[str]]:
@@ -163,18 +138,6 @@ class AuthBackendRoleSecretIdArgs:
163
138
  def secret_id(self, value: Optional[pulumi.Input[str]]):
164
139
  pulumi.set(self, "secret_id", value)
165
140
 
166
- @property
167
- @pulumi.getter
168
- def ttl(self) -> Optional[pulumi.Input[int]]:
169
- """
170
- The TTL duration of the SecretID.
171
- """
172
- return pulumi.get(self, "ttl")
173
-
174
- @ttl.setter
175
- def ttl(self, value: Optional[pulumi.Input[int]]):
176
- pulumi.set(self, "ttl", value)
177
-
178
141
  @property
179
142
  @pulumi.getter(name="withWrappedAccessor")
180
143
  def with_wrapped_accessor(self) -> Optional[pulumi.Input[bool]]:
@@ -213,10 +176,8 @@ class _AuthBackendRoleSecretIdState:
213
176
  cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
214
177
  metadata: Optional[pulumi.Input[str]] = None,
215
178
  namespace: Optional[pulumi.Input[str]] = None,
216
- num_uses: Optional[pulumi.Input[int]] = None,
217
179
  role_name: Optional[pulumi.Input[str]] = None,
218
180
  secret_id: Optional[pulumi.Input[str]] = None,
219
- ttl: Optional[pulumi.Input[int]] = None,
220
181
  with_wrapped_accessor: Optional[pulumi.Input[bool]] = None,
221
182
  wrapping_accessor: Optional[pulumi.Input[str]] = None,
222
183
  wrapping_token: Optional[pulumi.Input[str]] = None,
@@ -233,11 +194,9 @@ class _AuthBackendRoleSecretIdState:
233
194
  The value should not contain leading or trailing forward slashes.
234
195
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
235
196
  *Available only for Vault Enterprise*.
236
- :param pulumi.Input[int] num_uses: The number of uses for the secret-id.
237
197
  :param pulumi.Input[str] role_name: The name of the role to create the SecretID for.
238
198
  :param pulumi.Input[str] secret_id: The SecretID to be created. If set, uses "Push"
239
199
  mode. Defaults to Vault auto-generating SecretIDs.
240
- :param pulumi.Input[int] ttl: The TTL duration of the SecretID.
241
200
  :param pulumi.Input[bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
242
201
  If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
243
202
  invalidated through unwrapping.
@@ -259,14 +218,10 @@ class _AuthBackendRoleSecretIdState:
259
218
  pulumi.set(__self__, "metadata", metadata)
260
219
  if namespace is not None:
261
220
  pulumi.set(__self__, "namespace", namespace)
262
- if num_uses is not None:
263
- pulumi.set(__self__, "num_uses", num_uses)
264
221
  if role_name is not None:
265
222
  pulumi.set(__self__, "role_name", role_name)
266
223
  if secret_id is not None:
267
224
  pulumi.set(__self__, "secret_id", secret_id)
268
- if ttl is not None:
269
- pulumi.set(__self__, "ttl", ttl)
270
225
  if with_wrapped_accessor is not None:
271
226
  pulumi.set(__self__, "with_wrapped_accessor", with_wrapped_accessor)
272
227
  if wrapping_accessor is not None:
@@ -341,18 +296,6 @@ class _AuthBackendRoleSecretIdState:
341
296
  def namespace(self, value: Optional[pulumi.Input[str]]):
342
297
  pulumi.set(self, "namespace", value)
343
298
 
344
- @property
345
- @pulumi.getter(name="numUses")
346
- def num_uses(self) -> Optional[pulumi.Input[int]]:
347
- """
348
- The number of uses for the secret-id.
349
- """
350
- return pulumi.get(self, "num_uses")
351
-
352
- @num_uses.setter
353
- def num_uses(self, value: Optional[pulumi.Input[int]]):
354
- pulumi.set(self, "num_uses", value)
355
-
356
299
  @property
357
300
  @pulumi.getter(name="roleName")
358
301
  def role_name(self) -> Optional[pulumi.Input[str]]:
@@ -378,18 +321,6 @@ class _AuthBackendRoleSecretIdState:
378
321
  def secret_id(self, value: Optional[pulumi.Input[str]]):
379
322
  pulumi.set(self, "secret_id", value)
380
323
 
381
- @property
382
- @pulumi.getter
383
- def ttl(self) -> Optional[pulumi.Input[int]]:
384
- """
385
- The TTL duration of the SecretID.
386
- """
387
- return pulumi.get(self, "ttl")
388
-
389
- @ttl.setter
390
- def ttl(self, value: Optional[pulumi.Input[int]]):
391
- pulumi.set(self, "ttl", value)
392
-
393
324
  @property
394
325
  @pulumi.getter(name="withWrappedAccessor")
395
326
  def with_wrapped_accessor(self) -> Optional[pulumi.Input[bool]]:
@@ -454,10 +385,8 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
454
385
  cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
455
386
  metadata: Optional[pulumi.Input[str]] = None,
456
387
  namespace: Optional[pulumi.Input[str]] = None,
457
- num_uses: Optional[pulumi.Input[int]] = None,
458
388
  role_name: Optional[pulumi.Input[str]] = None,
459
389
  secret_id: Optional[pulumi.Input[str]] = None,
460
- ttl: Optional[pulumi.Input[int]] = None,
461
390
  with_wrapped_accessor: Optional[pulumi.Input[bool]] = None,
462
391
  wrapping_ttl: Optional[pulumi.Input[str]] = None,
463
392
  __props__=None):
@@ -501,11 +430,9 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
501
430
  The value should not contain leading or trailing forward slashes.
502
431
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
503
432
  *Available only for Vault Enterprise*.
504
- :param pulumi.Input[int] num_uses: The number of uses for the secret-id.
505
433
  :param pulumi.Input[str] role_name: The name of the role to create the SecretID for.
506
434
  :param pulumi.Input[str] secret_id: The SecretID to be created. If set, uses "Push"
507
435
  mode. Defaults to Vault auto-generating SecretIDs.
508
- :param pulumi.Input[int] ttl: The TTL duration of the SecretID.
509
436
  :param pulumi.Input[bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
510
437
  If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
511
438
  invalidated through unwrapping.
@@ -568,10 +495,8 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
568
495
  cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
569
496
  metadata: Optional[pulumi.Input[str]] = None,
570
497
  namespace: Optional[pulumi.Input[str]] = None,
571
- num_uses: Optional[pulumi.Input[int]] = None,
572
498
  role_name: Optional[pulumi.Input[str]] = None,
573
499
  secret_id: Optional[pulumi.Input[str]] = None,
574
- ttl: Optional[pulumi.Input[int]] = None,
575
500
  with_wrapped_accessor: Optional[pulumi.Input[bool]] = None,
576
501
  wrapping_ttl: Optional[pulumi.Input[str]] = None,
577
502
  __props__=None):
@@ -587,12 +512,10 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
587
512
  __props__.__dict__["cidr_lists"] = cidr_lists
588
513
  __props__.__dict__["metadata"] = metadata
589
514
  __props__.__dict__["namespace"] = namespace
590
- __props__.__dict__["num_uses"] = num_uses
591
515
  if role_name is None and not opts.urn:
592
516
  raise TypeError("Missing required property 'role_name'")
593
517
  __props__.__dict__["role_name"] = role_name
594
518
  __props__.__dict__["secret_id"] = None if secret_id is None else pulumi.Output.secret(secret_id)
595
- __props__.__dict__["ttl"] = ttl
596
519
  __props__.__dict__["with_wrapped_accessor"] = with_wrapped_accessor
597
520
  __props__.__dict__["wrapping_ttl"] = wrapping_ttl
598
521
  __props__.__dict__["accessor"] = None
@@ -617,10 +540,8 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
617
540
  cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
618
541
  metadata: Optional[pulumi.Input[str]] = None,
619
542
  namespace: Optional[pulumi.Input[str]] = None,
620
- num_uses: Optional[pulumi.Input[int]] = None,
621
543
  role_name: Optional[pulumi.Input[str]] = None,
622
544
  secret_id: Optional[pulumi.Input[str]] = None,
623
- ttl: Optional[pulumi.Input[int]] = None,
624
545
  with_wrapped_accessor: Optional[pulumi.Input[bool]] = None,
625
546
  wrapping_accessor: Optional[pulumi.Input[str]] = None,
626
547
  wrapping_token: Optional[pulumi.Input[str]] = None,
@@ -642,11 +563,9 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
642
563
  The value should not contain leading or trailing forward slashes.
643
564
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
644
565
  *Available only for Vault Enterprise*.
645
- :param pulumi.Input[int] num_uses: The number of uses for the secret-id.
646
566
  :param pulumi.Input[str] role_name: The name of the role to create the SecretID for.
647
567
  :param pulumi.Input[str] secret_id: The SecretID to be created. If set, uses "Push"
648
568
  mode. Defaults to Vault auto-generating SecretIDs.
649
- :param pulumi.Input[int] ttl: The TTL duration of the SecretID.
650
569
  :param pulumi.Input[bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
651
570
  If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
652
571
  invalidated through unwrapping.
@@ -667,10 +586,8 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
667
586
  __props__.__dict__["cidr_lists"] = cidr_lists
668
587
  __props__.__dict__["metadata"] = metadata
669
588
  __props__.__dict__["namespace"] = namespace
670
- __props__.__dict__["num_uses"] = num_uses
671
589
  __props__.__dict__["role_name"] = role_name
672
590
  __props__.__dict__["secret_id"] = secret_id
673
- __props__.__dict__["ttl"] = ttl
674
591
  __props__.__dict__["with_wrapped_accessor"] = with_wrapped_accessor
675
592
  __props__.__dict__["wrapping_accessor"] = wrapping_accessor
676
593
  __props__.__dict__["wrapping_token"] = wrapping_token
@@ -722,14 +639,6 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
722
639
  """
723
640
  return pulumi.get(self, "namespace")
724
641
 
725
- @property
726
- @pulumi.getter(name="numUses")
727
- def num_uses(self) -> pulumi.Output[Optional[int]]:
728
- """
729
- The number of uses for the secret-id.
730
- """
731
- return pulumi.get(self, "num_uses")
732
-
733
642
  @property
734
643
  @pulumi.getter(name="roleName")
735
644
  def role_name(self) -> pulumi.Output[str]:
@@ -747,14 +656,6 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
747
656
  """
748
657
  return pulumi.get(self, "secret_id")
749
658
 
750
- @property
751
- @pulumi.getter
752
- def ttl(self) -> pulumi.Output[Optional[int]]:
753
- """
754
- The TTL duration of the SecretID.
755
- """
756
- return pulumi.get(self, "ttl")
757
-
758
659
  @property
759
660
  @pulumi.getter(name="withWrappedAccessor")
760
661
  def with_wrapped_accessor(self) -> pulumi.Output[Optional[bool]]:
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -128,6 +123,9 @@ def get_auth_backend_role_id(backend: Optional[str] = None,
128
123
  namespace=pulumi.get(__ret__, 'namespace'),
129
124
  role_id=pulumi.get(__ret__, 'role_id'),
130
125
  role_name=pulumi.get(__ret__, 'role_name'))
126
+
127
+
128
+ @_utilities.lift_output_func(get_auth_backend_role_id)
131
129
  def get_auth_backend_role_id_output(backend: Optional[pulumi.Input[Optional[str]]] = None,
132
130
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
133
131
  role_name: Optional[pulumi.Input[str]] = None,
@@ -155,15 +153,4 @@ def get_auth_backend_role_id_output(backend: Optional[pulumi.Input[Optional[str]
155
153
  *Available only for Vault Enterprise*.
156
154
  :param str role_name: The name of the role to retrieve the Role ID for.
157
155
  """
158
- __args__ = dict()
159
- __args__['backend'] = backend
160
- __args__['namespace'] = namespace
161
- __args__['roleName'] = role_name
162
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
163
- __ret__ = pulumi.runtime.invoke_output('vault:appRole/getAuthBackendRoleId:getAuthBackendRoleId', __args__, opts=opts, typ=GetAuthBackendRoleIdResult)
164
- return __ret__.apply(lambda __response__: GetAuthBackendRoleIdResult(
165
- backend=pulumi.get(__response__, 'backend'),
166
- id=pulumi.get(__response__, 'id'),
167
- namespace=pulumi.get(__response__, 'namespace'),
168
- role_id=pulumi.get(__response__, 'role_id'),
169
- role_name=pulumi.get(__response__, 'role_name')))
156
+ ...
pulumi_vault/audit.py CHANGED
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
 
17
12
  __all__ = ['AuditArgs', 'Audit']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
 
17
12
  __all__ = ['AuditRequestHeaderArgs', 'AuditRequestHeader']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
  from . import outputs
17
12
  from ._inputs import *
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['AuthBackendCertArgs', 'AuthBackendCert']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['AuthBackendClientArgs', 'AuthBackendClient']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['AuthBackendConfigIdentityArgs', 'AuthBackendConfigIdentity']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['AuthBackendIdentityWhitelistArgs', 'AuthBackendIdentityWhitelist']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['AuthBackendLoginArgs', 'AuthBackendLogin']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['AuthBackendRoleTagArgs', 'AuthBackendRoleTag']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['AuthBackendRoletagBlacklistArgs', 'AuthBackendRoletagBlacklist']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['AuthBackendStsRoleArgs', 'AuthBackendStsRole']