pulumi-vault 6.4.0__py3-none-any.whl → 6.4.0a1723820369__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +0 -560
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +4 -19
  4. pulumi_vault/ad/secret_backend.py +0 -5
  5. pulumi_vault/ad/secret_library.py +0 -5
  6. pulumi_vault/ad/secret_role.py +0 -5
  7. pulumi_vault/alicloud/auth_backend_role.py +0 -5
  8. pulumi_vault/approle/auth_backend_login.py +0 -5
  9. pulumi_vault/approle/auth_backend_role.py +0 -5
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -99
  11. pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
  12. pulumi_vault/audit.py +0 -5
  13. pulumi_vault/audit_request_header.py +0 -5
  14. pulumi_vault/auth_backend.py +0 -5
  15. pulumi_vault/aws/auth_backend_cert.py +0 -5
  16. pulumi_vault/aws/auth_backend_client.py +0 -5
  17. pulumi_vault/aws/auth_backend_config_identity.py +0 -5
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
  19. pulumi_vault/aws/auth_backend_login.py +0 -5
  20. pulumi_vault/aws/auth_backend_role.py +0 -5
  21. pulumi_vault/aws/auth_backend_role_tag.py +0 -5
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
  23. pulumi_vault/aws/auth_backend_sts_role.py +0 -5
  24. pulumi_vault/aws/get_access_credentials.py +4 -31
  25. pulumi_vault/aws/get_static_access_credentials.py +4 -18
  26. pulumi_vault/aws/secret_backend.py +0 -5
  27. pulumi_vault/aws/secret_backend_role.py +0 -5
  28. pulumi_vault/aws/secret_backend_static_role.py +0 -5
  29. pulumi_vault/azure/_inputs.py +0 -24
  30. pulumi_vault/azure/auth_backend_config.py +0 -5
  31. pulumi_vault/azure/auth_backend_role.py +0 -5
  32. pulumi_vault/azure/backend.py +0 -5
  33. pulumi_vault/azure/backend_role.py +0 -5
  34. pulumi_vault/azure/get_access_credentials.py +4 -36
  35. pulumi_vault/azure/outputs.py +0 -5
  36. pulumi_vault/cert_auth_backend_role.py +0 -5
  37. pulumi_vault/config/__init__.pyi +0 -5
  38. pulumi_vault/config/_inputs.py +0 -21
  39. pulumi_vault/config/outputs.py +0 -5
  40. pulumi_vault/config/ui_custom_message.py +0 -5
  41. pulumi_vault/config/vars.py +0 -5
  42. pulumi_vault/consul/secret_backend.py +0 -5
  43. pulumi_vault/consul/secret_backend_role.py +0 -5
  44. pulumi_vault/database/_inputs.py +34 -2185
  45. pulumi_vault/database/outputs.py +0 -145
  46. pulumi_vault/database/secret_backend_connection.py +0 -5
  47. pulumi_vault/database/secret_backend_role.py +0 -5
  48. pulumi_vault/database/secret_backend_static_role.py +1 -69
  49. pulumi_vault/database/secrets_mount.py +0 -5
  50. pulumi_vault/egp_policy.py +0 -5
  51. pulumi_vault/gcp/_inputs.py +0 -111
  52. pulumi_vault/gcp/auth_backend.py +0 -5
  53. pulumi_vault/gcp/auth_backend_role.py +0 -5
  54. pulumi_vault/gcp/get_auth_backend_role.py +4 -42
  55. pulumi_vault/gcp/outputs.py +0 -5
  56. pulumi_vault/gcp/secret_backend.py +0 -5
  57. pulumi_vault/gcp/secret_impersonated_account.py +3 -62
  58. pulumi_vault/gcp/secret_roleset.py +0 -5
  59. pulumi_vault/gcp/secret_static_account.py +0 -5
  60. pulumi_vault/generic/endpoint.py +0 -5
  61. pulumi_vault/generic/get_secret.py +4 -24
  62. pulumi_vault/generic/secret.py +0 -5
  63. pulumi_vault/get_auth_backend.py +4 -21
  64. pulumi_vault/get_auth_backends.py +4 -16
  65. pulumi_vault/get_namespace.py +4 -17
  66. pulumi_vault/get_namespaces.py +4 -13
  67. pulumi_vault/get_nomad_access_token.py +4 -18
  68. pulumi_vault/get_policy_document.py +4 -15
  69. pulumi_vault/get_raft_autopilot_state.py +4 -23
  70. pulumi_vault/github/_inputs.py +0 -55
  71. pulumi_vault/github/auth_backend.py +0 -5
  72. pulumi_vault/github/outputs.py +0 -5
  73. pulumi_vault/github/team.py +0 -5
  74. pulumi_vault/github/user.py +0 -5
  75. pulumi_vault/identity/entity.py +0 -5
  76. pulumi_vault/identity/entity_alias.py +0 -5
  77. pulumi_vault/identity/entity_policies.py +0 -5
  78. pulumi_vault/identity/get_entity.py +4 -34
  79. pulumi_vault/identity/get_group.py +4 -40
  80. pulumi_vault/identity/get_oidc_client_creds.py +4 -16
  81. pulumi_vault/identity/get_oidc_openid_config.py +4 -26
  82. pulumi_vault/identity/get_oidc_public_keys.py +4 -15
  83. pulumi_vault/identity/group.py +0 -5
  84. pulumi_vault/identity/group_alias.py +0 -5
  85. pulumi_vault/identity/group_member_entity_ids.py +0 -5
  86. pulumi_vault/identity/group_member_group_ids.py +0 -5
  87. pulumi_vault/identity/group_policies.py +0 -5
  88. pulumi_vault/identity/mfa_duo.py +0 -5
  89. pulumi_vault/identity/mfa_login_enforcement.py +0 -5
  90. pulumi_vault/identity/mfa_okta.py +0 -5
  91. pulumi_vault/identity/mfa_pingid.py +0 -5
  92. pulumi_vault/identity/mfa_totp.py +0 -5
  93. pulumi_vault/identity/oidc.py +0 -5
  94. pulumi_vault/identity/oidc_assignment.py +0 -5
  95. pulumi_vault/identity/oidc_client.py +0 -5
  96. pulumi_vault/identity/oidc_key.py +0 -5
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
  98. pulumi_vault/identity/oidc_provider.py +0 -5
  99. pulumi_vault/identity/oidc_role.py +0 -5
  100. pulumi_vault/identity/oidc_scope.py +0 -5
  101. pulumi_vault/identity/outputs.py +0 -5
  102. pulumi_vault/jwt/_inputs.py +0 -55
  103. pulumi_vault/jwt/auth_backend.py +0 -5
  104. pulumi_vault/jwt/auth_backend_role.py +0 -5
  105. pulumi_vault/jwt/outputs.py +0 -5
  106. pulumi_vault/kmip/secret_backend.py +0 -5
  107. pulumi_vault/kmip/secret_role.py +0 -5
  108. pulumi_vault/kmip/secret_scope.py +0 -5
  109. pulumi_vault/kubernetes/auth_backend_config.py +3 -55
  110. pulumi_vault/kubernetes/auth_backend_role.py +0 -5
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +7 -59
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
  113. pulumi_vault/kubernetes/get_service_account_token.py +4 -28
  114. pulumi_vault/kubernetes/secret_backend.py +0 -5
  115. pulumi_vault/kubernetes/secret_backend_role.py +0 -5
  116. pulumi_vault/kv/_inputs.py +0 -32
  117. pulumi_vault/kv/get_secret.py +4 -19
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +4 -23
  119. pulumi_vault/kv/get_secret_v2.py +6 -25
  120. pulumi_vault/kv/get_secrets_list.py +4 -15
  121. pulumi_vault/kv/get_secrets_list_v2.py +4 -18
  122. pulumi_vault/kv/outputs.py +0 -5
  123. pulumi_vault/kv/secret.py +0 -5
  124. pulumi_vault/kv/secret_backend_v2.py +0 -5
  125. pulumi_vault/kv/secret_v2.py +0 -5
  126. pulumi_vault/ldap/auth_backend.py +0 -52
  127. pulumi_vault/ldap/auth_backend_group.py +0 -5
  128. pulumi_vault/ldap/auth_backend_user.py +0 -5
  129. pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
  130. pulumi_vault/ldap/get_static_credentials.py +4 -23
  131. pulumi_vault/ldap/secret_backend.py +0 -5
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
  133. pulumi_vault/ldap/secret_backend_library_set.py +0 -5
  134. pulumi_vault/ldap/secret_backend_static_role.py +0 -5
  135. pulumi_vault/managed/_inputs.py +0 -205
  136. pulumi_vault/managed/keys.py +0 -5
  137. pulumi_vault/managed/outputs.py +0 -5
  138. pulumi_vault/mfa_duo.py +0 -5
  139. pulumi_vault/mfa_okta.py +0 -5
  140. pulumi_vault/mfa_pingid.py +0 -5
  141. pulumi_vault/mfa_totp.py +0 -5
  142. pulumi_vault/mongodbatlas/secret_backend.py +0 -5
  143. pulumi_vault/mongodbatlas/secret_role.py +0 -5
  144. pulumi_vault/mount.py +0 -5
  145. pulumi_vault/namespace.py +0 -5
  146. pulumi_vault/nomad_secret_backend.py +0 -5
  147. pulumi_vault/nomad_secret_role.py +0 -5
  148. pulumi_vault/okta/_inputs.py +0 -39
  149. pulumi_vault/okta/auth_backend.py +0 -5
  150. pulumi_vault/okta/auth_backend_group.py +0 -5
  151. pulumi_vault/okta/auth_backend_user.py +0 -5
  152. pulumi_vault/okta/outputs.py +0 -5
  153. pulumi_vault/outputs.py +0 -5
  154. pulumi_vault/password_policy.py +0 -5
  155. pulumi_vault/pkisecret/_inputs.py +0 -41
  156. pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
  157. pulumi_vault/pkisecret/backend_config_est.py +0 -5
  158. pulumi_vault/pkisecret/get_backend_config_est.py +4 -22
  159. pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
  160. pulumi_vault/pkisecret/get_backend_issuers.py +4 -17
  161. pulumi_vault/pkisecret/get_backend_key.py +4 -19
  162. pulumi_vault/pkisecret/get_backend_keys.py +4 -17
  163. pulumi_vault/pkisecret/outputs.py +0 -5
  164. pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
  172. pulumi_vault/pkisecret/secret_backend_key.py +0 -5
  173. pulumi_vault/pkisecret/secret_backend_role.py +0 -5
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
  176. pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
  177. pulumi_vault/plugin.py +0 -5
  178. pulumi_vault/plugin_pinned_version.py +0 -5
  179. pulumi_vault/policy.py +0 -5
  180. pulumi_vault/provider.py +0 -5
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +0 -5
  183. pulumi_vault/quota_rate_limit.py +0 -5
  184. pulumi_vault/rabbitmq/_inputs.py +0 -61
  185. pulumi_vault/rabbitmq/outputs.py +0 -5
  186. pulumi_vault/rabbitmq/secret_backend.py +0 -5
  187. pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
  188. pulumi_vault/raft_autopilot.py +0 -5
  189. pulumi_vault/raft_snapshot_agent_config.py +0 -5
  190. pulumi_vault/rgp_policy.py +0 -5
  191. pulumi_vault/saml/auth_backend.py +0 -5
  192. pulumi_vault/saml/auth_backend_role.py +0 -5
  193. pulumi_vault/secrets/_inputs.py +0 -30
  194. pulumi_vault/secrets/outputs.py +0 -5
  195. pulumi_vault/secrets/sync_association.py +0 -5
  196. pulumi_vault/secrets/sync_aws_destination.py +0 -5
  197. pulumi_vault/secrets/sync_azure_destination.py +0 -5
  198. pulumi_vault/secrets/sync_config.py +0 -5
  199. pulumi_vault/secrets/sync_gcp_destination.py +0 -5
  200. pulumi_vault/secrets/sync_gh_destination.py +0 -5
  201. pulumi_vault/secrets/sync_github_apps.py +0 -5
  202. pulumi_vault/secrets/sync_vercel_destination.py +0 -5
  203. pulumi_vault/ssh/_inputs.py +0 -22
  204. pulumi_vault/ssh/outputs.py +0 -5
  205. pulumi_vault/ssh/secret_backend_ca.py +0 -5
  206. pulumi_vault/ssh/secret_backend_role.py +0 -39
  207. pulumi_vault/terraformcloud/secret_backend.py +0 -5
  208. pulumi_vault/terraformcloud/secret_creds.py +0 -5
  209. pulumi_vault/terraformcloud/secret_role.py +0 -5
  210. pulumi_vault/token.py +0 -5
  211. pulumi_vault/tokenauth/auth_backend_role.py +14 -5
  212. pulumi_vault/transform/alphabet.py +0 -5
  213. pulumi_vault/transform/get_decode.py +4 -28
  214. pulumi_vault/transform/get_encode.py +4 -28
  215. pulumi_vault/transform/role.py +0 -5
  216. pulumi_vault/transform/template.py +0 -5
  217. pulumi_vault/transform/transformation.py +0 -5
  218. pulumi_vault/transit/get_decrypt.py +4 -21
  219. pulumi_vault/transit/get_encrypt.py +4 -23
  220. pulumi_vault/transit/secret_backend_key.py +0 -5
  221. pulumi_vault/transit/secret_cache_config.py +0 -5
  222. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/METADATA +2 -3
  223. pulumi_vault-6.4.0a1723820369.dist-info/RECORD +256 -0
  224. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/WHEEL +1 -1
  225. pulumi_vault-6.4.0.dist-info/RECORD +0 -256
  226. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/top_level.txt +0 -0
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
 
17
12
  __all__ = [
@@ -166,6 +161,9 @@ def get_namespace(namespace: Optional[str] = None,
166
161
  namespace_id=pulumi.get(__ret__, 'namespace_id'),
167
162
  path=pulumi.get(__ret__, 'path'),
168
163
  path_fq=pulumi.get(__ret__, 'path_fq'))
164
+
165
+
166
+ @_utilities.lift_output_func(get_namespace)
169
167
  def get_namespace_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
170
168
  path: Optional[pulumi.Input[Optional[str]]] = None,
171
169
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNamespaceResult]:
@@ -212,15 +210,4 @@ def get_namespace_output(namespace: Optional[pulumi.Input[Optional[str]]] = None
212
210
  based on the `namespace` arguments of the provider and this data source.
213
211
  Other path related attributes will be empty in this case.
214
212
  """
215
- __args__ = dict()
216
- __args__['namespace'] = namespace
217
- __args__['path'] = path
218
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
219
- __ret__ = pulumi.runtime.invoke_output('vault:index/getNamespace:getNamespace', __args__, opts=opts, typ=GetNamespaceResult)
220
- return __ret__.apply(lambda __response__: GetNamespaceResult(
221
- custom_metadata=pulumi.get(__response__, 'custom_metadata'),
222
- id=pulumi.get(__response__, 'id'),
223
- namespace=pulumi.get(__response__, 'namespace'),
224
- namespace_id=pulumi.get(__response__, 'namespace_id'),
225
- path=pulumi.get(__response__, 'path'),
226
- path_fq=pulumi.get(__response__, 'path_fq')))
213
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
 
17
12
  __all__ = [
@@ -111,6 +106,9 @@ def get_namespaces(namespace: Optional[str] = None,
111
106
  id=pulumi.get(__ret__, 'id'),
112
107
  namespace=pulumi.get(__ret__, 'namespace'),
113
108
  paths=pulumi.get(__ret__, 'paths'))
109
+
110
+
111
+ @_utilities.lift_output_func(get_namespaces)
114
112
  def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
115
113
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNamespacesResult]:
116
114
  """
@@ -143,11 +141,4 @@ def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[str]]] = Non
143
141
  The value should not contain leading or trailing forward slashes.
144
142
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
145
143
  """
146
- __args__ = dict()
147
- __args__['namespace'] = namespace
148
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
149
- __ret__ = pulumi.runtime.invoke_output('vault:index/getNamespaces:getNamespaces', __args__, opts=opts, typ=GetNamespacesResult)
150
- return __ret__.apply(lambda __response__: GetNamespacesResult(
151
- id=pulumi.get(__response__, 'id'),
152
- namespace=pulumi.get(__response__, 'namespace'),
153
- paths=pulumi.get(__response__, 'paths')))
144
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
 
17
12
  __all__ = [
@@ -155,6 +150,9 @@ def get_nomad_access_token(backend: Optional[str] = None,
155
150
  namespace=pulumi.get(__ret__, 'namespace'),
156
151
  role=pulumi.get(__ret__, 'role'),
157
152
  secret_id=pulumi.get(__ret__, 'secret_id'))
153
+
154
+
155
+ @_utilities.lift_output_func(get_nomad_access_token)
158
156
  def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
159
157
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
160
158
  role: Optional[pulumi.Input[str]] = None,
@@ -195,16 +193,4 @@ def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
195
193
  :param str role: The name of the Nomad secret backend role to generate
196
194
  a token for, with no leading or trailing `/`s.
197
195
  """
198
- __args__ = dict()
199
- __args__['backend'] = backend
200
- __args__['namespace'] = namespace
201
- __args__['role'] = role
202
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
203
- __ret__ = pulumi.runtime.invoke_output('vault:index/getNomadAccessToken:getNomadAccessToken', __args__, opts=opts, typ=GetNomadAccessTokenResult)
204
- return __ret__.apply(lambda __response__: GetNomadAccessTokenResult(
205
- accessor_id=pulumi.get(__response__, 'accessor_id'),
206
- backend=pulumi.get(__response__, 'backend'),
207
- id=pulumi.get(__response__, 'id'),
208
- namespace=pulumi.get(__response__, 'namespace'),
209
- role=pulumi.get(__response__, 'role'),
210
- secret_id=pulumi.get(__response__, 'secret_id')))
196
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
  from . import outputs
17
12
  from ._inputs import *
@@ -120,6 +115,9 @@ def get_policy_document(namespace: Optional[str] = None,
120
115
  id=pulumi.get(__ret__, 'id'),
121
116
  namespace=pulumi.get(__ret__, 'namespace'),
122
117
  rules=pulumi.get(__ret__, 'rules'))
118
+
119
+
120
+ @_utilities.lift_output_func(get_policy_document)
123
121
  def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
124
122
  rules: Optional[pulumi.Input[Optional[Sequence[Union['GetPolicyDocumentRuleArgs', 'GetPolicyDocumentRuleArgsDict']]]]] = None,
125
123
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetPolicyDocumentResult]:
@@ -148,13 +146,4 @@ def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]]
148
146
  policy=example.hcl)
149
147
  ```
150
148
  """
151
- __args__ = dict()
152
- __args__['namespace'] = namespace
153
- __args__['rules'] = rules
154
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
155
- __ret__ = pulumi.runtime.invoke_output('vault:index/getPolicyDocument:getPolicyDocument', __args__, opts=opts, typ=GetPolicyDocumentResult)
156
- return __ret__.apply(lambda __response__: GetPolicyDocumentResult(
157
- hcl=pulumi.get(__response__, 'hcl'),
158
- id=pulumi.get(__response__, 'id'),
159
- namespace=pulumi.get(__response__, 'namespace'),
160
- rules=pulumi.get(__response__, 'rules')))
149
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
 
17
12
  __all__ = [
@@ -228,6 +223,9 @@ def get_raft_autopilot_state(namespace: Optional[str] = None,
228
223
  upgrade_info=pulumi.get(__ret__, 'upgrade_info'),
229
224
  upgrade_info_json=pulumi.get(__ret__, 'upgrade_info_json'),
230
225
  voters=pulumi.get(__ret__, 'voters'))
226
+
227
+
228
+ @_utilities.lift_output_func(get_raft_autopilot_state)
231
229
  def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
232
230
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetRaftAutopilotStateResult]:
233
231
  """
@@ -247,21 +245,4 @@ def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[st
247
245
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
248
246
  *Available only for Vault Enterprise*.
249
247
  """
250
- __args__ = dict()
251
- __args__['namespace'] = namespace
252
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
253
- __ret__ = pulumi.runtime.invoke_output('vault:index/getRaftAutopilotState:getRaftAutopilotState', __args__, opts=opts, typ=GetRaftAutopilotStateResult)
254
- return __ret__.apply(lambda __response__: GetRaftAutopilotStateResult(
255
- failure_tolerance=pulumi.get(__response__, 'failure_tolerance'),
256
- healthy=pulumi.get(__response__, 'healthy'),
257
- id=pulumi.get(__response__, 'id'),
258
- leader=pulumi.get(__response__, 'leader'),
259
- namespace=pulumi.get(__response__, 'namespace'),
260
- optimistic_failure_tolerance=pulumi.get(__response__, 'optimistic_failure_tolerance'),
261
- redundancy_zones=pulumi.get(__response__, 'redundancy_zones'),
262
- redundancy_zones_json=pulumi.get(__response__, 'redundancy_zones_json'),
263
- servers=pulumi.get(__response__, 'servers'),
264
- servers_json=pulumi.get(__response__, 'servers_json'),
265
- upgrade_info=pulumi.get(__response__, 'upgrade_info'),
266
- upgrade_info_json=pulumi.get(__response__, 'upgrade_info_json'),
267
- voters=pulumi.get(__response__, 'voters')))
248
+ ...
@@ -4,70 +4,15 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
18
13
  'AuthBackendTuneArgs',
19
- 'AuthBackendTuneArgsDict',
20
14
  ]
21
15
 
22
- MYPY = False
23
-
24
- if not MYPY:
25
- class AuthBackendTuneArgsDict(TypedDict):
26
- allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
27
- """
28
- List of headers to whitelist and allowing
29
- a plugin to include them in the response.
30
- """
31
- audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
32
- """
33
- Specifies the list of keys that will
34
- not be HMAC'd by audit devices in the request data object.
35
- """
36
- audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
37
- """
38
- Specifies the list of keys that will
39
- not be HMAC'd by audit devices in the response data object.
40
- """
41
- default_lease_ttl: NotRequired[pulumi.Input[str]]
42
- """
43
- Specifies the default time-to-live.
44
- If set, this overrides the global default.
45
- Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
46
- """
47
- listing_visibility: NotRequired[pulumi.Input[str]]
48
- """
49
- Specifies whether to show this mount in
50
- the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
51
- """
52
- max_lease_ttl: NotRequired[pulumi.Input[str]]
53
- """
54
- Specifies the maximum time-to-live.
55
- If set, this overrides the global default.
56
- Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
57
- """
58
- passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
59
- """
60
- List of headers to whitelist and
61
- pass from the request to the backend.
62
- """
63
- token_type: NotRequired[pulumi.Input[str]]
64
- """
65
- Specifies the type of tokens that should be returned by
66
- the mount. Valid values are "default-service", "default-batch", "service", "batch".
67
- """
68
- elif False:
69
- AuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any]
70
-
71
16
  @pulumi.input_type
72
17
  class AuthBackendTuneArgs:
73
18
  def __init__(__self__, *,
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
  from . import outputs
17
12
  from ._inputs import *
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['TeamArgs', 'Team']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['UserArgs', 'User']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['EntityArgs', 'Entity']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['EntityAliasArgs', 'EntityAlias']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['EntityPoliciesArgs', 'EntityPolicies']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
  from . import outputs
17
12
 
@@ -316,6 +311,9 @@ def get_entity(alias_id: Optional[str] = None,
316
311
  namespace=pulumi.get(__ret__, 'namespace'),
317
312
  namespace_id=pulumi.get(__ret__, 'namespace_id'),
318
313
  policies=pulumi.get(__ret__, 'policies'))
314
+
315
+
316
+ @_utilities.lift_output_func(get_entity)
319
317
  def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
320
318
  alias_mount_accessor: Optional[pulumi.Input[Optional[str]]] = None,
321
319
  alias_name: Optional[pulumi.Input[Optional[str]]] = None,
@@ -353,32 +351,4 @@ def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
353
351
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
354
352
  *Available only for Vault Enterprise*.
355
353
  """
356
- __args__ = dict()
357
- __args__['aliasId'] = alias_id
358
- __args__['aliasMountAccessor'] = alias_mount_accessor
359
- __args__['aliasName'] = alias_name
360
- __args__['entityId'] = entity_id
361
- __args__['entityName'] = entity_name
362
- __args__['namespace'] = namespace
363
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
364
- __ret__ = pulumi.runtime.invoke_output('vault:identity/getEntity:getEntity', __args__, opts=opts, typ=GetEntityResult)
365
- return __ret__.apply(lambda __response__: GetEntityResult(
366
- alias_id=pulumi.get(__response__, 'alias_id'),
367
- alias_mount_accessor=pulumi.get(__response__, 'alias_mount_accessor'),
368
- alias_name=pulumi.get(__response__, 'alias_name'),
369
- aliases=pulumi.get(__response__, 'aliases'),
370
- creation_time=pulumi.get(__response__, 'creation_time'),
371
- data_json=pulumi.get(__response__, 'data_json'),
372
- direct_group_ids=pulumi.get(__response__, 'direct_group_ids'),
373
- disabled=pulumi.get(__response__, 'disabled'),
374
- entity_id=pulumi.get(__response__, 'entity_id'),
375
- entity_name=pulumi.get(__response__, 'entity_name'),
376
- group_ids=pulumi.get(__response__, 'group_ids'),
377
- id=pulumi.get(__response__, 'id'),
378
- inherited_group_ids=pulumi.get(__response__, 'inherited_group_ids'),
379
- last_update_time=pulumi.get(__response__, 'last_update_time'),
380
- merged_entity_ids=pulumi.get(__response__, 'merged_entity_ids'),
381
- metadata=pulumi.get(__response__, 'metadata'),
382
- namespace=pulumi.get(__response__, 'namespace'),
383
- namespace_id=pulumi.get(__response__, 'namespace_id'),
384
- policies=pulumi.get(__response__, 'policies')))
354
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -393,6 +388,9 @@ def get_group(alias_id: Optional[str] = None,
393
388
  parent_group_ids=pulumi.get(__ret__, 'parent_group_ids'),
394
389
  policies=pulumi.get(__ret__, 'policies'),
395
390
  type=pulumi.get(__ret__, 'type'))
391
+
392
+
393
+ @_utilities.lift_output_func(get_group)
396
394
  def get_group_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
397
395
  alias_mount_accessor: Optional[pulumi.Input[Optional[str]]] = None,
398
396
  alias_name: Optional[pulumi.Input[Optional[str]]] = None,
@@ -430,38 +428,4 @@ def get_group_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
430
428
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
431
429
  *Available only for Vault Enterprise*.
432
430
  """
433
- __args__ = dict()
434
- __args__['aliasId'] = alias_id
435
- __args__['aliasMountAccessor'] = alias_mount_accessor
436
- __args__['aliasName'] = alias_name
437
- __args__['groupId'] = group_id
438
- __args__['groupName'] = group_name
439
- __args__['namespace'] = namespace
440
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
441
- __ret__ = pulumi.runtime.invoke_output('vault:identity/getGroup:getGroup', __args__, opts=opts, typ=GetGroupResult)
442
- return __ret__.apply(lambda __response__: GetGroupResult(
443
- alias_canonical_id=pulumi.get(__response__, 'alias_canonical_id'),
444
- alias_creation_time=pulumi.get(__response__, 'alias_creation_time'),
445
- alias_id=pulumi.get(__response__, 'alias_id'),
446
- alias_last_update_time=pulumi.get(__response__, 'alias_last_update_time'),
447
- alias_merged_from_canonical_ids=pulumi.get(__response__, 'alias_merged_from_canonical_ids'),
448
- alias_metadata=pulumi.get(__response__, 'alias_metadata'),
449
- alias_mount_accessor=pulumi.get(__response__, 'alias_mount_accessor'),
450
- alias_mount_path=pulumi.get(__response__, 'alias_mount_path'),
451
- alias_mount_type=pulumi.get(__response__, 'alias_mount_type'),
452
- alias_name=pulumi.get(__response__, 'alias_name'),
453
- creation_time=pulumi.get(__response__, 'creation_time'),
454
- data_json=pulumi.get(__response__, 'data_json'),
455
- group_id=pulumi.get(__response__, 'group_id'),
456
- group_name=pulumi.get(__response__, 'group_name'),
457
- id=pulumi.get(__response__, 'id'),
458
- last_update_time=pulumi.get(__response__, 'last_update_time'),
459
- member_entity_ids=pulumi.get(__response__, 'member_entity_ids'),
460
- member_group_ids=pulumi.get(__response__, 'member_group_ids'),
461
- metadata=pulumi.get(__response__, 'metadata'),
462
- modify_index=pulumi.get(__response__, 'modify_index'),
463
- namespace=pulumi.get(__response__, 'namespace'),
464
- namespace_id=pulumi.get(__response__, 'namespace_id'),
465
- parent_group_ids=pulumi.get(__response__, 'parent_group_ids'),
466
- policies=pulumi.get(__response__, 'policies'),
467
- type=pulumi.get(__response__, 'type')))
431
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -133,6 +128,9 @@ def get_oidc_client_creds(name: Optional[str] = None,
133
128
  id=pulumi.get(__ret__, 'id'),
134
129
  name=pulumi.get(__ret__, 'name'),
135
130
  namespace=pulumi.get(__ret__, 'namespace'))
131
+
132
+
133
+ @_utilities.lift_output_func(get_oidc_client_creds)
136
134
  def get_oidc_client_creds_output(name: Optional[pulumi.Input[str]] = None,
137
135
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
138
136
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetOidcClientCredsResult]:
@@ -162,14 +160,4 @@ def get_oidc_client_creds_output(name: Optional[pulumi.Input[str]] = None,
162
160
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
163
161
  *Available only for Vault Enterprise*.
164
162
  """
165
- __args__ = dict()
166
- __args__['name'] = name
167
- __args__['namespace'] = namespace
168
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
169
- __ret__ = pulumi.runtime.invoke_output('vault:identity/getOidcClientCreds:getOidcClientCreds', __args__, opts=opts, typ=GetOidcClientCredsResult)
170
- return __ret__.apply(lambda __response__: GetOidcClientCredsResult(
171
- client_id=pulumi.get(__response__, 'client_id'),
172
- client_secret=pulumi.get(__response__, 'client_secret'),
173
- id=pulumi.get(__response__, 'id'),
174
- name=pulumi.get(__response__, 'name'),
175
- namespace=pulumi.get(__response__, 'namespace')))
163
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -273,6 +268,9 @@ def get_oidc_openid_config(name: Optional[str] = None,
273
268
  token_endpoint=pulumi.get(__ret__, 'token_endpoint'),
274
269
  token_endpoint_auth_methods_supporteds=pulumi.get(__ret__, 'token_endpoint_auth_methods_supporteds'),
275
270
  userinfo_endpoint=pulumi.get(__ret__, 'userinfo_endpoint'))
271
+
272
+
273
+ @_utilities.lift_output_func(get_oidc_openid_config)
276
274
  def get_oidc_openid_config_output(name: Optional[pulumi.Input[str]] = None,
277
275
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
278
276
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetOidcOpenidConfigResult]:
@@ -311,24 +309,4 @@ def get_oidc_openid_config_output(name: Optional[pulumi.Input[str]] = None,
311
309
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
312
310
  *Available only for Vault Enterprise*.
313
311
  """
314
- __args__ = dict()
315
- __args__['name'] = name
316
- __args__['namespace'] = namespace
317
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
318
- __ret__ = pulumi.runtime.invoke_output('vault:identity/getOidcOpenidConfig:getOidcOpenidConfig', __args__, opts=opts, typ=GetOidcOpenidConfigResult)
319
- return __ret__.apply(lambda __response__: GetOidcOpenidConfigResult(
320
- authorization_endpoint=pulumi.get(__response__, 'authorization_endpoint'),
321
- grant_types_supporteds=pulumi.get(__response__, 'grant_types_supporteds'),
322
- id=pulumi.get(__response__, 'id'),
323
- id_token_signing_alg_values_supporteds=pulumi.get(__response__, 'id_token_signing_alg_values_supporteds'),
324
- issuer=pulumi.get(__response__, 'issuer'),
325
- jwks_uri=pulumi.get(__response__, 'jwks_uri'),
326
- name=pulumi.get(__response__, 'name'),
327
- namespace=pulumi.get(__response__, 'namespace'),
328
- request_uri_parameter_supported=pulumi.get(__response__, 'request_uri_parameter_supported'),
329
- response_types_supporteds=pulumi.get(__response__, 'response_types_supporteds'),
330
- scopes_supporteds=pulumi.get(__response__, 'scopes_supporteds'),
331
- subject_types_supporteds=pulumi.get(__response__, 'subject_types_supporteds'),
332
- token_endpoint=pulumi.get(__response__, 'token_endpoint'),
333
- token_endpoint_auth_methods_supporteds=pulumi.get(__response__, 'token_endpoint_auth_methods_supporteds'),
334
- userinfo_endpoint=pulumi.get(__response__, 'userinfo_endpoint')))
312
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -129,6 +124,9 @@ def get_oidc_public_keys(name: Optional[str] = None,
129
124
  keys=pulumi.get(__ret__, 'keys'),
130
125
  name=pulumi.get(__ret__, 'name'),
131
126
  namespace=pulumi.get(__ret__, 'namespace'))
127
+
128
+
129
+ @_utilities.lift_output_func(get_oidc_public_keys)
132
130
  def get_oidc_public_keys_output(name: Optional[pulumi.Input[str]] = None,
133
131
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
134
132
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetOidcPublicKeysResult]:
@@ -167,13 +165,4 @@ def get_oidc_public_keys_output(name: Optional[pulumi.Input[str]] = None,
167
165
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
168
166
  *Available only for Vault Enterprise*.
169
167
  """
170
- __args__ = dict()
171
- __args__['name'] = name
172
- __args__['namespace'] = namespace
173
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
174
- __ret__ = pulumi.runtime.invoke_output('vault:identity/getOidcPublicKeys:getOidcPublicKeys', __args__, opts=opts, typ=GetOidcPublicKeysResult)
175
- return __ret__.apply(lambda __response__: GetOidcPublicKeysResult(
176
- id=pulumi.get(__response__, 'id'),
177
- keys=pulumi.get(__response__, 'keys'),
178
- name=pulumi.get(__response__, 'name'),
179
- namespace=pulumi.get(__response__, 'namespace')))
168
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['GroupArgs', 'Group']