pulumi-vault 6.4.0__py3-none-any.whl → 6.4.0a1723820369__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -560
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +4 -19
- pulumi_vault/ad/secret_backend.py +0 -5
- pulumi_vault/ad/secret_library.py +0 -5
- pulumi_vault/ad/secret_role.py +0 -5
- pulumi_vault/alicloud/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_login.py +0 -5
- pulumi_vault/approle/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -99
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
- pulumi_vault/audit.py +0 -5
- pulumi_vault/audit_request_header.py +0 -5
- pulumi_vault/auth_backend.py +0 -5
- pulumi_vault/aws/auth_backend_cert.py +0 -5
- pulumi_vault/aws/auth_backend_client.py +0 -5
- pulumi_vault/aws/auth_backend_config_identity.py +0 -5
- pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
- pulumi_vault/aws/auth_backend_login.py +0 -5
- pulumi_vault/aws/auth_backend_role.py +0 -5
- pulumi_vault/aws/auth_backend_role_tag.py +0 -5
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
- pulumi_vault/aws/auth_backend_sts_role.py +0 -5
- pulumi_vault/aws/get_access_credentials.py +4 -31
- pulumi_vault/aws/get_static_access_credentials.py +4 -18
- pulumi_vault/aws/secret_backend.py +0 -5
- pulumi_vault/aws/secret_backend_role.py +0 -5
- pulumi_vault/aws/secret_backend_static_role.py +0 -5
- pulumi_vault/azure/_inputs.py +0 -24
- pulumi_vault/azure/auth_backend_config.py +0 -5
- pulumi_vault/azure/auth_backend_role.py +0 -5
- pulumi_vault/azure/backend.py +0 -5
- pulumi_vault/azure/backend_role.py +0 -5
- pulumi_vault/azure/get_access_credentials.py +4 -36
- pulumi_vault/azure/outputs.py +0 -5
- pulumi_vault/cert_auth_backend_role.py +0 -5
- pulumi_vault/config/__init__.pyi +0 -5
- pulumi_vault/config/_inputs.py +0 -21
- pulumi_vault/config/outputs.py +0 -5
- pulumi_vault/config/ui_custom_message.py +0 -5
- pulumi_vault/config/vars.py +0 -5
- pulumi_vault/consul/secret_backend.py +0 -5
- pulumi_vault/consul/secret_backend_role.py +0 -5
- pulumi_vault/database/_inputs.py +34 -2185
- pulumi_vault/database/outputs.py +0 -145
- pulumi_vault/database/secret_backend_connection.py +0 -5
- pulumi_vault/database/secret_backend_role.py +0 -5
- pulumi_vault/database/secret_backend_static_role.py +1 -69
- pulumi_vault/database/secrets_mount.py +0 -5
- pulumi_vault/egp_policy.py +0 -5
- pulumi_vault/gcp/_inputs.py +0 -111
- pulumi_vault/gcp/auth_backend.py +0 -5
- pulumi_vault/gcp/auth_backend_role.py +0 -5
- pulumi_vault/gcp/get_auth_backend_role.py +4 -42
- pulumi_vault/gcp/outputs.py +0 -5
- pulumi_vault/gcp/secret_backend.py +0 -5
- pulumi_vault/gcp/secret_impersonated_account.py +3 -62
- pulumi_vault/gcp/secret_roleset.py +0 -5
- pulumi_vault/gcp/secret_static_account.py +0 -5
- pulumi_vault/generic/endpoint.py +0 -5
- pulumi_vault/generic/get_secret.py +4 -24
- pulumi_vault/generic/secret.py +0 -5
- pulumi_vault/get_auth_backend.py +4 -21
- pulumi_vault/get_auth_backends.py +4 -16
- pulumi_vault/get_namespace.py +4 -17
- pulumi_vault/get_namespaces.py +4 -13
- pulumi_vault/get_nomad_access_token.py +4 -18
- pulumi_vault/get_policy_document.py +4 -15
- pulumi_vault/get_raft_autopilot_state.py +4 -23
- pulumi_vault/github/_inputs.py +0 -55
- pulumi_vault/github/auth_backend.py +0 -5
- pulumi_vault/github/outputs.py +0 -5
- pulumi_vault/github/team.py +0 -5
- pulumi_vault/github/user.py +0 -5
- pulumi_vault/identity/entity.py +0 -5
- pulumi_vault/identity/entity_alias.py +0 -5
- pulumi_vault/identity/entity_policies.py +0 -5
- pulumi_vault/identity/get_entity.py +4 -34
- pulumi_vault/identity/get_group.py +4 -40
- pulumi_vault/identity/get_oidc_client_creds.py +4 -16
- pulumi_vault/identity/get_oidc_openid_config.py +4 -26
- pulumi_vault/identity/get_oidc_public_keys.py +4 -15
- pulumi_vault/identity/group.py +0 -5
- pulumi_vault/identity/group_alias.py +0 -5
- pulumi_vault/identity/group_member_entity_ids.py +0 -5
- pulumi_vault/identity/group_member_group_ids.py +0 -5
- pulumi_vault/identity/group_policies.py +0 -5
- pulumi_vault/identity/mfa_duo.py +0 -5
- pulumi_vault/identity/mfa_login_enforcement.py +0 -5
- pulumi_vault/identity/mfa_okta.py +0 -5
- pulumi_vault/identity/mfa_pingid.py +0 -5
- pulumi_vault/identity/mfa_totp.py +0 -5
- pulumi_vault/identity/oidc.py +0 -5
- pulumi_vault/identity/oidc_assignment.py +0 -5
- pulumi_vault/identity/oidc_client.py +0 -5
- pulumi_vault/identity/oidc_key.py +0 -5
- pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
- pulumi_vault/identity/oidc_provider.py +0 -5
- pulumi_vault/identity/oidc_role.py +0 -5
- pulumi_vault/identity/oidc_scope.py +0 -5
- pulumi_vault/identity/outputs.py +0 -5
- pulumi_vault/jwt/_inputs.py +0 -55
- pulumi_vault/jwt/auth_backend.py +0 -5
- pulumi_vault/jwt/auth_backend_role.py +0 -5
- pulumi_vault/jwt/outputs.py +0 -5
- pulumi_vault/kmip/secret_backend.py +0 -5
- pulumi_vault/kmip/secret_role.py +0 -5
- pulumi_vault/kmip/secret_scope.py +0 -5
- pulumi_vault/kubernetes/auth_backend_config.py +3 -55
- pulumi_vault/kubernetes/auth_backend_role.py +0 -5
- pulumi_vault/kubernetes/get_auth_backend_config.py +7 -59
- pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
- pulumi_vault/kubernetes/get_service_account_token.py +4 -28
- pulumi_vault/kubernetes/secret_backend.py +0 -5
- pulumi_vault/kubernetes/secret_backend_role.py +0 -5
- pulumi_vault/kv/_inputs.py +0 -32
- pulumi_vault/kv/get_secret.py +4 -19
- pulumi_vault/kv/get_secret_subkeys_v2.py +4 -23
- pulumi_vault/kv/get_secret_v2.py +6 -25
- pulumi_vault/kv/get_secrets_list.py +4 -15
- pulumi_vault/kv/get_secrets_list_v2.py +4 -18
- pulumi_vault/kv/outputs.py +0 -5
- pulumi_vault/kv/secret.py +0 -5
- pulumi_vault/kv/secret_backend_v2.py +0 -5
- pulumi_vault/kv/secret_v2.py +0 -5
- pulumi_vault/ldap/auth_backend.py +0 -52
- pulumi_vault/ldap/auth_backend_group.py +0 -5
- pulumi_vault/ldap/auth_backend_user.py +0 -5
- pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
- pulumi_vault/ldap/get_static_credentials.py +4 -23
- pulumi_vault/ldap/secret_backend.py +0 -5
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
- pulumi_vault/ldap/secret_backend_library_set.py +0 -5
- pulumi_vault/ldap/secret_backend_static_role.py +0 -5
- pulumi_vault/managed/_inputs.py +0 -205
- pulumi_vault/managed/keys.py +0 -5
- pulumi_vault/managed/outputs.py +0 -5
- pulumi_vault/mfa_duo.py +0 -5
- pulumi_vault/mfa_okta.py +0 -5
- pulumi_vault/mfa_pingid.py +0 -5
- pulumi_vault/mfa_totp.py +0 -5
- pulumi_vault/mongodbatlas/secret_backend.py +0 -5
- pulumi_vault/mongodbatlas/secret_role.py +0 -5
- pulumi_vault/mount.py +0 -5
- pulumi_vault/namespace.py +0 -5
- pulumi_vault/nomad_secret_backend.py +0 -5
- pulumi_vault/nomad_secret_role.py +0 -5
- pulumi_vault/okta/_inputs.py +0 -39
- pulumi_vault/okta/auth_backend.py +0 -5
- pulumi_vault/okta/auth_backend_group.py +0 -5
- pulumi_vault/okta/auth_backend_user.py +0 -5
- pulumi_vault/okta/outputs.py +0 -5
- pulumi_vault/outputs.py +0 -5
- pulumi_vault/password_policy.py +0 -5
- pulumi_vault/pkisecret/_inputs.py +0 -41
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
- pulumi_vault/pkisecret/backend_config_est.py +0 -5
- pulumi_vault/pkisecret/get_backend_config_est.py +4 -22
- pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -17
- pulumi_vault/pkisecret/get_backend_key.py +4 -19
- pulumi_vault/pkisecret/get_backend_keys.py +4 -17
- pulumi_vault/pkisecret/outputs.py +0 -5
- pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
- pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
- pulumi_vault/pkisecret/secret_backend_key.py +0 -5
- pulumi_vault/pkisecret/secret_backend_role.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
- pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
- pulumi_vault/plugin.py +0 -5
- pulumi_vault/plugin_pinned_version.py +0 -5
- pulumi_vault/policy.py +0 -5
- pulumi_vault/provider.py +0 -5
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +0 -5
- pulumi_vault/quota_rate_limit.py +0 -5
- pulumi_vault/rabbitmq/_inputs.py +0 -61
- pulumi_vault/rabbitmq/outputs.py +0 -5
- pulumi_vault/rabbitmq/secret_backend.py +0 -5
- pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
- pulumi_vault/raft_autopilot.py +0 -5
- pulumi_vault/raft_snapshot_agent_config.py +0 -5
- pulumi_vault/rgp_policy.py +0 -5
- pulumi_vault/saml/auth_backend.py +0 -5
- pulumi_vault/saml/auth_backend_role.py +0 -5
- pulumi_vault/secrets/_inputs.py +0 -30
- pulumi_vault/secrets/outputs.py +0 -5
- pulumi_vault/secrets/sync_association.py +0 -5
- pulumi_vault/secrets/sync_aws_destination.py +0 -5
- pulumi_vault/secrets/sync_azure_destination.py +0 -5
- pulumi_vault/secrets/sync_config.py +0 -5
- pulumi_vault/secrets/sync_gcp_destination.py +0 -5
- pulumi_vault/secrets/sync_gh_destination.py +0 -5
- pulumi_vault/secrets/sync_github_apps.py +0 -5
- pulumi_vault/secrets/sync_vercel_destination.py +0 -5
- pulumi_vault/ssh/_inputs.py +0 -22
- pulumi_vault/ssh/outputs.py +0 -5
- pulumi_vault/ssh/secret_backend_ca.py +0 -5
- pulumi_vault/ssh/secret_backend_role.py +0 -39
- pulumi_vault/terraformcloud/secret_backend.py +0 -5
- pulumi_vault/terraformcloud/secret_creds.py +0 -5
- pulumi_vault/terraformcloud/secret_role.py +0 -5
- pulumi_vault/token.py +0 -5
- pulumi_vault/tokenauth/auth_backend_role.py +14 -5
- pulumi_vault/transform/alphabet.py +0 -5
- pulumi_vault/transform/get_decode.py +4 -28
- pulumi_vault/transform/get_encode.py +4 -28
- pulumi_vault/transform/role.py +0 -5
- pulumi_vault/transform/template.py +0 -5
- pulumi_vault/transform/transformation.py +0 -5
- pulumi_vault/transit/get_decrypt.py +4 -21
- pulumi_vault/transit/get_encrypt.py +4 -23
- pulumi_vault/transit/secret_backend_key.py +0 -5
- pulumi_vault/transit/secret_cache_config.py +0 -5
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/METADATA +2 -3
- pulumi_vault-6.4.0a1723820369.dist-info/RECORD +256 -0
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/WHEEL +1 -1
- pulumi_vault-6.4.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/top_level.txt +0 -0
pulumi_vault/get_namespace.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -166,6 +161,9 @@ def get_namespace(namespace: Optional[str] = None,
|
|
166
161
|
namespace_id=pulumi.get(__ret__, 'namespace_id'),
|
167
162
|
path=pulumi.get(__ret__, 'path'),
|
168
163
|
path_fq=pulumi.get(__ret__, 'path_fq'))
|
164
|
+
|
165
|
+
|
166
|
+
@_utilities.lift_output_func(get_namespace)
|
169
167
|
def get_namespace_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
170
168
|
path: Optional[pulumi.Input[Optional[str]]] = None,
|
171
169
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNamespaceResult]:
|
@@ -212,15 +210,4 @@ def get_namespace_output(namespace: Optional[pulumi.Input[Optional[str]]] = None
|
|
212
210
|
based on the `namespace` arguments of the provider and this data source.
|
213
211
|
Other path related attributes will be empty in this case.
|
214
212
|
"""
|
215
|
-
|
216
|
-
__args__['namespace'] = namespace
|
217
|
-
__args__['path'] = path
|
218
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
219
|
-
__ret__ = pulumi.runtime.invoke_output('vault:index/getNamespace:getNamespace', __args__, opts=opts, typ=GetNamespaceResult)
|
220
|
-
return __ret__.apply(lambda __response__: GetNamespaceResult(
|
221
|
-
custom_metadata=pulumi.get(__response__, 'custom_metadata'),
|
222
|
-
id=pulumi.get(__response__, 'id'),
|
223
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
224
|
-
namespace_id=pulumi.get(__response__, 'namespace_id'),
|
225
|
-
path=pulumi.get(__response__, 'path'),
|
226
|
-
path_fq=pulumi.get(__response__, 'path_fq')))
|
213
|
+
...
|
pulumi_vault/get_namespaces.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -111,6 +106,9 @@ def get_namespaces(namespace: Optional[str] = None,
|
|
111
106
|
id=pulumi.get(__ret__, 'id'),
|
112
107
|
namespace=pulumi.get(__ret__, 'namespace'),
|
113
108
|
paths=pulumi.get(__ret__, 'paths'))
|
109
|
+
|
110
|
+
|
111
|
+
@_utilities.lift_output_func(get_namespaces)
|
114
112
|
def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
115
113
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNamespacesResult]:
|
116
114
|
"""
|
@@ -143,11 +141,4 @@ def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[str]]] = Non
|
|
143
141
|
The value should not contain leading or trailing forward slashes.
|
144
142
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
145
143
|
"""
|
146
|
-
|
147
|
-
__args__['namespace'] = namespace
|
148
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
149
|
-
__ret__ = pulumi.runtime.invoke_output('vault:index/getNamespaces:getNamespaces', __args__, opts=opts, typ=GetNamespacesResult)
|
150
|
-
return __ret__.apply(lambda __response__: GetNamespacesResult(
|
151
|
-
id=pulumi.get(__response__, 'id'),
|
152
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
153
|
-
paths=pulumi.get(__response__, 'paths')))
|
144
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -155,6 +150,9 @@ def get_nomad_access_token(backend: Optional[str] = None,
|
|
155
150
|
namespace=pulumi.get(__ret__, 'namespace'),
|
156
151
|
role=pulumi.get(__ret__, 'role'),
|
157
152
|
secret_id=pulumi.get(__ret__, 'secret_id'))
|
153
|
+
|
154
|
+
|
155
|
+
@_utilities.lift_output_func(get_nomad_access_token)
|
158
156
|
def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
|
159
157
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
160
158
|
role: Optional[pulumi.Input[str]] = None,
|
@@ -195,16 +193,4 @@ def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
|
|
195
193
|
:param str role: The name of the Nomad secret backend role to generate
|
196
194
|
a token for, with no leading or trailing `/`s.
|
197
195
|
"""
|
198
|
-
|
199
|
-
__args__['backend'] = backend
|
200
|
-
__args__['namespace'] = namespace
|
201
|
-
__args__['role'] = role
|
202
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
203
|
-
__ret__ = pulumi.runtime.invoke_output('vault:index/getNomadAccessToken:getNomadAccessToken', __args__, opts=opts, typ=GetNomadAccessTokenResult)
|
204
|
-
return __ret__.apply(lambda __response__: GetNomadAccessTokenResult(
|
205
|
-
accessor_id=pulumi.get(__response__, 'accessor_id'),
|
206
|
-
backend=pulumi.get(__response__, 'backend'),
|
207
|
-
id=pulumi.get(__response__, 'id'),
|
208
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
209
|
-
role=pulumi.get(__response__, 'role'),
|
210
|
-
secret_id=pulumi.get(__response__, 'secret_id')))
|
196
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
from . import outputs
|
17
12
|
from ._inputs import *
|
@@ -120,6 +115,9 @@ def get_policy_document(namespace: Optional[str] = None,
|
|
120
115
|
id=pulumi.get(__ret__, 'id'),
|
121
116
|
namespace=pulumi.get(__ret__, 'namespace'),
|
122
117
|
rules=pulumi.get(__ret__, 'rules'))
|
118
|
+
|
119
|
+
|
120
|
+
@_utilities.lift_output_func(get_policy_document)
|
123
121
|
def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
124
122
|
rules: Optional[pulumi.Input[Optional[Sequence[Union['GetPolicyDocumentRuleArgs', 'GetPolicyDocumentRuleArgsDict']]]]] = None,
|
125
123
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetPolicyDocumentResult]:
|
@@ -148,13 +146,4 @@ def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]]
|
|
148
146
|
policy=example.hcl)
|
149
147
|
```
|
150
148
|
"""
|
151
|
-
|
152
|
-
__args__['namespace'] = namespace
|
153
|
-
__args__['rules'] = rules
|
154
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
155
|
-
__ret__ = pulumi.runtime.invoke_output('vault:index/getPolicyDocument:getPolicyDocument', __args__, opts=opts, typ=GetPolicyDocumentResult)
|
156
|
-
return __ret__.apply(lambda __response__: GetPolicyDocumentResult(
|
157
|
-
hcl=pulumi.get(__response__, 'hcl'),
|
158
|
-
id=pulumi.get(__response__, 'id'),
|
159
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
160
|
-
rules=pulumi.get(__response__, 'rules')))
|
149
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -228,6 +223,9 @@ def get_raft_autopilot_state(namespace: Optional[str] = None,
|
|
228
223
|
upgrade_info=pulumi.get(__ret__, 'upgrade_info'),
|
229
224
|
upgrade_info_json=pulumi.get(__ret__, 'upgrade_info_json'),
|
230
225
|
voters=pulumi.get(__ret__, 'voters'))
|
226
|
+
|
227
|
+
|
228
|
+
@_utilities.lift_output_func(get_raft_autopilot_state)
|
231
229
|
def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
232
230
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetRaftAutopilotStateResult]:
|
233
231
|
"""
|
@@ -247,21 +245,4 @@ def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[st
|
|
247
245
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
248
246
|
*Available only for Vault Enterprise*.
|
249
247
|
"""
|
250
|
-
|
251
|
-
__args__['namespace'] = namespace
|
252
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
253
|
-
__ret__ = pulumi.runtime.invoke_output('vault:index/getRaftAutopilotState:getRaftAutopilotState', __args__, opts=opts, typ=GetRaftAutopilotStateResult)
|
254
|
-
return __ret__.apply(lambda __response__: GetRaftAutopilotStateResult(
|
255
|
-
failure_tolerance=pulumi.get(__response__, 'failure_tolerance'),
|
256
|
-
healthy=pulumi.get(__response__, 'healthy'),
|
257
|
-
id=pulumi.get(__response__, 'id'),
|
258
|
-
leader=pulumi.get(__response__, 'leader'),
|
259
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
260
|
-
optimistic_failure_tolerance=pulumi.get(__response__, 'optimistic_failure_tolerance'),
|
261
|
-
redundancy_zones=pulumi.get(__response__, 'redundancy_zones'),
|
262
|
-
redundancy_zones_json=pulumi.get(__response__, 'redundancy_zones_json'),
|
263
|
-
servers=pulumi.get(__response__, 'servers'),
|
264
|
-
servers_json=pulumi.get(__response__, 'servers_json'),
|
265
|
-
upgrade_info=pulumi.get(__response__, 'upgrade_info'),
|
266
|
-
upgrade_info_json=pulumi.get(__response__, 'upgrade_info_json'),
|
267
|
-
voters=pulumi.get(__response__, 'voters')))
|
248
|
+
...
|
pulumi_vault/github/_inputs.py
CHANGED
@@ -4,70 +4,15 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
18
13
|
'AuthBackendTuneArgs',
|
19
|
-
'AuthBackendTuneArgsDict',
|
20
14
|
]
|
21
15
|
|
22
|
-
MYPY = False
|
23
|
-
|
24
|
-
if not MYPY:
|
25
|
-
class AuthBackendTuneArgsDict(TypedDict):
|
26
|
-
allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
27
|
-
"""
|
28
|
-
List of headers to whitelist and allowing
|
29
|
-
a plugin to include them in the response.
|
30
|
-
"""
|
31
|
-
audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
32
|
-
"""
|
33
|
-
Specifies the list of keys that will
|
34
|
-
not be HMAC'd by audit devices in the request data object.
|
35
|
-
"""
|
36
|
-
audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
37
|
-
"""
|
38
|
-
Specifies the list of keys that will
|
39
|
-
not be HMAC'd by audit devices in the response data object.
|
40
|
-
"""
|
41
|
-
default_lease_ttl: NotRequired[pulumi.Input[str]]
|
42
|
-
"""
|
43
|
-
Specifies the default time-to-live.
|
44
|
-
If set, this overrides the global default.
|
45
|
-
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
46
|
-
"""
|
47
|
-
listing_visibility: NotRequired[pulumi.Input[str]]
|
48
|
-
"""
|
49
|
-
Specifies whether to show this mount in
|
50
|
-
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
51
|
-
"""
|
52
|
-
max_lease_ttl: NotRequired[pulumi.Input[str]]
|
53
|
-
"""
|
54
|
-
Specifies the maximum time-to-live.
|
55
|
-
If set, this overrides the global default.
|
56
|
-
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
57
|
-
"""
|
58
|
-
passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
59
|
-
"""
|
60
|
-
List of headers to whitelist and
|
61
|
-
pass from the request to the backend.
|
62
|
-
"""
|
63
|
-
token_type: NotRequired[pulumi.Input[str]]
|
64
|
-
"""
|
65
|
-
Specifies the type of tokens that should be returned by
|
66
|
-
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
67
|
-
"""
|
68
|
-
elif False:
|
69
|
-
AuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any]
|
70
|
-
|
71
16
|
@pulumi.input_type
|
72
17
|
class AuthBackendTuneArgs:
|
73
18
|
def __init__(__self__, *,
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
from . import outputs
|
17
12
|
from ._inputs import *
|
pulumi_vault/github/outputs.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
pulumi_vault/github/team.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['TeamArgs', 'Team']
|
pulumi_vault/github/user.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['UserArgs', 'User']
|
pulumi_vault/identity/entity.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['EntityArgs', 'Entity']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['EntityAliasArgs', 'EntityAlias']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['EntityPoliciesArgs', 'EntityPolicies']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
from . import outputs
|
17
12
|
|
@@ -316,6 +311,9 @@ def get_entity(alias_id: Optional[str] = None,
|
|
316
311
|
namespace=pulumi.get(__ret__, 'namespace'),
|
317
312
|
namespace_id=pulumi.get(__ret__, 'namespace_id'),
|
318
313
|
policies=pulumi.get(__ret__, 'policies'))
|
314
|
+
|
315
|
+
|
316
|
+
@_utilities.lift_output_func(get_entity)
|
319
317
|
def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
|
320
318
|
alias_mount_accessor: Optional[pulumi.Input[Optional[str]]] = None,
|
321
319
|
alias_name: Optional[pulumi.Input[Optional[str]]] = None,
|
@@ -353,32 +351,4 @@ def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
|
|
353
351
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
354
352
|
*Available only for Vault Enterprise*.
|
355
353
|
"""
|
356
|
-
|
357
|
-
__args__['aliasId'] = alias_id
|
358
|
-
__args__['aliasMountAccessor'] = alias_mount_accessor
|
359
|
-
__args__['aliasName'] = alias_name
|
360
|
-
__args__['entityId'] = entity_id
|
361
|
-
__args__['entityName'] = entity_name
|
362
|
-
__args__['namespace'] = namespace
|
363
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
364
|
-
__ret__ = pulumi.runtime.invoke_output('vault:identity/getEntity:getEntity', __args__, opts=opts, typ=GetEntityResult)
|
365
|
-
return __ret__.apply(lambda __response__: GetEntityResult(
|
366
|
-
alias_id=pulumi.get(__response__, 'alias_id'),
|
367
|
-
alias_mount_accessor=pulumi.get(__response__, 'alias_mount_accessor'),
|
368
|
-
alias_name=pulumi.get(__response__, 'alias_name'),
|
369
|
-
aliases=pulumi.get(__response__, 'aliases'),
|
370
|
-
creation_time=pulumi.get(__response__, 'creation_time'),
|
371
|
-
data_json=pulumi.get(__response__, 'data_json'),
|
372
|
-
direct_group_ids=pulumi.get(__response__, 'direct_group_ids'),
|
373
|
-
disabled=pulumi.get(__response__, 'disabled'),
|
374
|
-
entity_id=pulumi.get(__response__, 'entity_id'),
|
375
|
-
entity_name=pulumi.get(__response__, 'entity_name'),
|
376
|
-
group_ids=pulumi.get(__response__, 'group_ids'),
|
377
|
-
id=pulumi.get(__response__, 'id'),
|
378
|
-
inherited_group_ids=pulumi.get(__response__, 'inherited_group_ids'),
|
379
|
-
last_update_time=pulumi.get(__response__, 'last_update_time'),
|
380
|
-
merged_entity_ids=pulumi.get(__response__, 'merged_entity_ids'),
|
381
|
-
metadata=pulumi.get(__response__, 'metadata'),
|
382
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
383
|
-
namespace_id=pulumi.get(__response__, 'namespace_id'),
|
384
|
-
policies=pulumi.get(__response__, 'policies')))
|
354
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -393,6 +388,9 @@ def get_group(alias_id: Optional[str] = None,
|
|
393
388
|
parent_group_ids=pulumi.get(__ret__, 'parent_group_ids'),
|
394
389
|
policies=pulumi.get(__ret__, 'policies'),
|
395
390
|
type=pulumi.get(__ret__, 'type'))
|
391
|
+
|
392
|
+
|
393
|
+
@_utilities.lift_output_func(get_group)
|
396
394
|
def get_group_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
|
397
395
|
alias_mount_accessor: Optional[pulumi.Input[Optional[str]]] = None,
|
398
396
|
alias_name: Optional[pulumi.Input[Optional[str]]] = None,
|
@@ -430,38 +428,4 @@ def get_group_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
|
|
430
428
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
431
429
|
*Available only for Vault Enterprise*.
|
432
430
|
"""
|
433
|
-
|
434
|
-
__args__['aliasId'] = alias_id
|
435
|
-
__args__['aliasMountAccessor'] = alias_mount_accessor
|
436
|
-
__args__['aliasName'] = alias_name
|
437
|
-
__args__['groupId'] = group_id
|
438
|
-
__args__['groupName'] = group_name
|
439
|
-
__args__['namespace'] = namespace
|
440
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
441
|
-
__ret__ = pulumi.runtime.invoke_output('vault:identity/getGroup:getGroup', __args__, opts=opts, typ=GetGroupResult)
|
442
|
-
return __ret__.apply(lambda __response__: GetGroupResult(
|
443
|
-
alias_canonical_id=pulumi.get(__response__, 'alias_canonical_id'),
|
444
|
-
alias_creation_time=pulumi.get(__response__, 'alias_creation_time'),
|
445
|
-
alias_id=pulumi.get(__response__, 'alias_id'),
|
446
|
-
alias_last_update_time=pulumi.get(__response__, 'alias_last_update_time'),
|
447
|
-
alias_merged_from_canonical_ids=pulumi.get(__response__, 'alias_merged_from_canonical_ids'),
|
448
|
-
alias_metadata=pulumi.get(__response__, 'alias_metadata'),
|
449
|
-
alias_mount_accessor=pulumi.get(__response__, 'alias_mount_accessor'),
|
450
|
-
alias_mount_path=pulumi.get(__response__, 'alias_mount_path'),
|
451
|
-
alias_mount_type=pulumi.get(__response__, 'alias_mount_type'),
|
452
|
-
alias_name=pulumi.get(__response__, 'alias_name'),
|
453
|
-
creation_time=pulumi.get(__response__, 'creation_time'),
|
454
|
-
data_json=pulumi.get(__response__, 'data_json'),
|
455
|
-
group_id=pulumi.get(__response__, 'group_id'),
|
456
|
-
group_name=pulumi.get(__response__, 'group_name'),
|
457
|
-
id=pulumi.get(__response__, 'id'),
|
458
|
-
last_update_time=pulumi.get(__response__, 'last_update_time'),
|
459
|
-
member_entity_ids=pulumi.get(__response__, 'member_entity_ids'),
|
460
|
-
member_group_ids=pulumi.get(__response__, 'member_group_ids'),
|
461
|
-
metadata=pulumi.get(__response__, 'metadata'),
|
462
|
-
modify_index=pulumi.get(__response__, 'modify_index'),
|
463
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
464
|
-
namespace_id=pulumi.get(__response__, 'namespace_id'),
|
465
|
-
parent_group_ids=pulumi.get(__response__, 'parent_group_ids'),
|
466
|
-
policies=pulumi.get(__response__, 'policies'),
|
467
|
-
type=pulumi.get(__response__, 'type')))
|
431
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -133,6 +128,9 @@ def get_oidc_client_creds(name: Optional[str] = None,
|
|
133
128
|
id=pulumi.get(__ret__, 'id'),
|
134
129
|
name=pulumi.get(__ret__, 'name'),
|
135
130
|
namespace=pulumi.get(__ret__, 'namespace'))
|
131
|
+
|
132
|
+
|
133
|
+
@_utilities.lift_output_func(get_oidc_client_creds)
|
136
134
|
def get_oidc_client_creds_output(name: Optional[pulumi.Input[str]] = None,
|
137
135
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
138
136
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetOidcClientCredsResult]:
|
@@ -162,14 +160,4 @@ def get_oidc_client_creds_output(name: Optional[pulumi.Input[str]] = None,
|
|
162
160
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
163
161
|
*Available only for Vault Enterprise*.
|
164
162
|
"""
|
165
|
-
|
166
|
-
__args__['name'] = name
|
167
|
-
__args__['namespace'] = namespace
|
168
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
169
|
-
__ret__ = pulumi.runtime.invoke_output('vault:identity/getOidcClientCreds:getOidcClientCreds', __args__, opts=opts, typ=GetOidcClientCredsResult)
|
170
|
-
return __ret__.apply(lambda __response__: GetOidcClientCredsResult(
|
171
|
-
client_id=pulumi.get(__response__, 'client_id'),
|
172
|
-
client_secret=pulumi.get(__response__, 'client_secret'),
|
173
|
-
id=pulumi.get(__response__, 'id'),
|
174
|
-
name=pulumi.get(__response__, 'name'),
|
175
|
-
namespace=pulumi.get(__response__, 'namespace')))
|
163
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -273,6 +268,9 @@ def get_oidc_openid_config(name: Optional[str] = None,
|
|
273
268
|
token_endpoint=pulumi.get(__ret__, 'token_endpoint'),
|
274
269
|
token_endpoint_auth_methods_supporteds=pulumi.get(__ret__, 'token_endpoint_auth_methods_supporteds'),
|
275
270
|
userinfo_endpoint=pulumi.get(__ret__, 'userinfo_endpoint'))
|
271
|
+
|
272
|
+
|
273
|
+
@_utilities.lift_output_func(get_oidc_openid_config)
|
276
274
|
def get_oidc_openid_config_output(name: Optional[pulumi.Input[str]] = None,
|
277
275
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
278
276
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetOidcOpenidConfigResult]:
|
@@ -311,24 +309,4 @@ def get_oidc_openid_config_output(name: Optional[pulumi.Input[str]] = None,
|
|
311
309
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
312
310
|
*Available only for Vault Enterprise*.
|
313
311
|
"""
|
314
|
-
|
315
|
-
__args__['name'] = name
|
316
|
-
__args__['namespace'] = namespace
|
317
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
318
|
-
__ret__ = pulumi.runtime.invoke_output('vault:identity/getOidcOpenidConfig:getOidcOpenidConfig', __args__, opts=opts, typ=GetOidcOpenidConfigResult)
|
319
|
-
return __ret__.apply(lambda __response__: GetOidcOpenidConfigResult(
|
320
|
-
authorization_endpoint=pulumi.get(__response__, 'authorization_endpoint'),
|
321
|
-
grant_types_supporteds=pulumi.get(__response__, 'grant_types_supporteds'),
|
322
|
-
id=pulumi.get(__response__, 'id'),
|
323
|
-
id_token_signing_alg_values_supporteds=pulumi.get(__response__, 'id_token_signing_alg_values_supporteds'),
|
324
|
-
issuer=pulumi.get(__response__, 'issuer'),
|
325
|
-
jwks_uri=pulumi.get(__response__, 'jwks_uri'),
|
326
|
-
name=pulumi.get(__response__, 'name'),
|
327
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
328
|
-
request_uri_parameter_supported=pulumi.get(__response__, 'request_uri_parameter_supported'),
|
329
|
-
response_types_supporteds=pulumi.get(__response__, 'response_types_supporteds'),
|
330
|
-
scopes_supporteds=pulumi.get(__response__, 'scopes_supporteds'),
|
331
|
-
subject_types_supporteds=pulumi.get(__response__, 'subject_types_supporteds'),
|
332
|
-
token_endpoint=pulumi.get(__response__, 'token_endpoint'),
|
333
|
-
token_endpoint_auth_methods_supporteds=pulumi.get(__response__, 'token_endpoint_auth_methods_supporteds'),
|
334
|
-
userinfo_endpoint=pulumi.get(__response__, 'userinfo_endpoint')))
|
312
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -129,6 +124,9 @@ def get_oidc_public_keys(name: Optional[str] = None,
|
|
129
124
|
keys=pulumi.get(__ret__, 'keys'),
|
130
125
|
name=pulumi.get(__ret__, 'name'),
|
131
126
|
namespace=pulumi.get(__ret__, 'namespace'))
|
127
|
+
|
128
|
+
|
129
|
+
@_utilities.lift_output_func(get_oidc_public_keys)
|
132
130
|
def get_oidc_public_keys_output(name: Optional[pulumi.Input[str]] = None,
|
133
131
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
134
132
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetOidcPublicKeysResult]:
|
@@ -167,13 +165,4 @@ def get_oidc_public_keys_output(name: Optional[pulumi.Input[str]] = None,
|
|
167
165
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
168
166
|
*Available only for Vault Enterprise*.
|
169
167
|
"""
|
170
|
-
|
171
|
-
__args__['name'] = name
|
172
|
-
__args__['namespace'] = namespace
|
173
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
174
|
-
__ret__ = pulumi.runtime.invoke_output('vault:identity/getOidcPublicKeys:getOidcPublicKeys', __args__, opts=opts, typ=GetOidcPublicKeysResult)
|
175
|
-
return __ret__.apply(lambda __response__: GetOidcPublicKeysResult(
|
176
|
-
id=pulumi.get(__response__, 'id'),
|
177
|
-
keys=pulumi.get(__response__, 'keys'),
|
178
|
-
name=pulumi.get(__response__, 'name'),
|
179
|
-
namespace=pulumi.get(__response__, 'namespace')))
|
168
|
+
...
|
pulumi_vault/identity/group.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['GroupArgs', 'Group']
|