pulumi-vault 6.4.0a1728108872__py3-none-any.whl → 6.4.0a1729059229__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +560 -0
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +19 -4
  4. pulumi_vault/ad/secret_backend.py +5 -0
  5. pulumi_vault/ad/secret_library.py +5 -0
  6. pulumi_vault/ad/secret_role.py +5 -0
  7. pulumi_vault/alicloud/auth_backend_role.py +5 -0
  8. pulumi_vault/approle/auth_backend_login.py +5 -0
  9. pulumi_vault/approle/auth_backend_role.py +5 -0
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
  11. pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
  12. pulumi_vault/audit.py +5 -0
  13. pulumi_vault/audit_request_header.py +5 -0
  14. pulumi_vault/auth_backend.py +5 -0
  15. pulumi_vault/aws/auth_backend_cert.py +5 -0
  16. pulumi_vault/aws/auth_backend_client.py +5 -0
  17. pulumi_vault/aws/auth_backend_config_identity.py +5 -0
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
  19. pulumi_vault/aws/auth_backend_login.py +5 -0
  20. pulumi_vault/aws/auth_backend_role.py +5 -0
  21. pulumi_vault/aws/auth_backend_role_tag.py +5 -0
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
  23. pulumi_vault/aws/auth_backend_sts_role.py +5 -0
  24. pulumi_vault/aws/get_access_credentials.py +31 -4
  25. pulumi_vault/aws/get_static_access_credentials.py +18 -4
  26. pulumi_vault/aws/secret_backend.py +5 -0
  27. pulumi_vault/aws/secret_backend_role.py +5 -0
  28. pulumi_vault/aws/secret_backend_static_role.py +5 -0
  29. pulumi_vault/azure/_inputs.py +24 -0
  30. pulumi_vault/azure/auth_backend_config.py +5 -0
  31. pulumi_vault/azure/auth_backend_role.py +5 -0
  32. pulumi_vault/azure/backend.py +5 -0
  33. pulumi_vault/azure/backend_role.py +5 -0
  34. pulumi_vault/azure/get_access_credentials.py +36 -4
  35. pulumi_vault/azure/outputs.py +5 -0
  36. pulumi_vault/cert_auth_backend_role.py +5 -0
  37. pulumi_vault/config/__init__.pyi +5 -0
  38. pulumi_vault/config/_inputs.py +21 -0
  39. pulumi_vault/config/outputs.py +5 -0
  40. pulumi_vault/config/ui_custom_message.py +5 -0
  41. pulumi_vault/config/vars.py +5 -0
  42. pulumi_vault/consul/secret_backend.py +5 -0
  43. pulumi_vault/consul/secret_backend_role.py +5 -0
  44. pulumi_vault/database/_inputs.py +2019 -68
  45. pulumi_vault/database/outputs.py +5 -0
  46. pulumi_vault/database/secret_backend_connection.py +5 -0
  47. pulumi_vault/database/secret_backend_role.py +5 -0
  48. pulumi_vault/database/secret_backend_static_role.py +5 -0
  49. pulumi_vault/database/secrets_mount.py +5 -0
  50. pulumi_vault/egp_policy.py +5 -0
  51. pulumi_vault/gcp/_inputs.py +111 -0
  52. pulumi_vault/gcp/auth_backend.py +5 -0
  53. pulumi_vault/gcp/auth_backend_role.py +5 -0
  54. pulumi_vault/gcp/get_auth_backend_role.py +42 -4
  55. pulumi_vault/gcp/outputs.py +5 -0
  56. pulumi_vault/gcp/secret_backend.py +5 -0
  57. pulumi_vault/gcp/secret_impersonated_account.py +5 -0
  58. pulumi_vault/gcp/secret_roleset.py +5 -0
  59. pulumi_vault/gcp/secret_static_account.py +5 -0
  60. pulumi_vault/generic/endpoint.py +5 -0
  61. pulumi_vault/generic/get_secret.py +24 -4
  62. pulumi_vault/generic/secret.py +5 -0
  63. pulumi_vault/get_auth_backend.py +21 -4
  64. pulumi_vault/get_auth_backends.py +16 -4
  65. pulumi_vault/get_namespace.py +17 -4
  66. pulumi_vault/get_namespaces.py +13 -4
  67. pulumi_vault/get_nomad_access_token.py +18 -4
  68. pulumi_vault/get_policy_document.py +15 -4
  69. pulumi_vault/get_raft_autopilot_state.py +23 -4
  70. pulumi_vault/github/_inputs.py +55 -0
  71. pulumi_vault/github/auth_backend.py +5 -0
  72. pulumi_vault/github/outputs.py +5 -0
  73. pulumi_vault/github/team.py +5 -0
  74. pulumi_vault/github/user.py +5 -0
  75. pulumi_vault/identity/entity.py +5 -0
  76. pulumi_vault/identity/entity_alias.py +5 -0
  77. pulumi_vault/identity/entity_policies.py +5 -0
  78. pulumi_vault/identity/get_entity.py +34 -4
  79. pulumi_vault/identity/get_group.py +40 -4
  80. pulumi_vault/identity/get_oidc_client_creds.py +16 -4
  81. pulumi_vault/identity/get_oidc_openid_config.py +26 -4
  82. pulumi_vault/identity/get_oidc_public_keys.py +15 -4
  83. pulumi_vault/identity/group.py +5 -0
  84. pulumi_vault/identity/group_alias.py +5 -0
  85. pulumi_vault/identity/group_member_entity_ids.py +5 -0
  86. pulumi_vault/identity/group_member_group_ids.py +5 -0
  87. pulumi_vault/identity/group_policies.py +5 -0
  88. pulumi_vault/identity/mfa_duo.py +5 -0
  89. pulumi_vault/identity/mfa_login_enforcement.py +5 -0
  90. pulumi_vault/identity/mfa_okta.py +5 -0
  91. pulumi_vault/identity/mfa_pingid.py +5 -0
  92. pulumi_vault/identity/mfa_totp.py +5 -0
  93. pulumi_vault/identity/oidc.py +5 -0
  94. pulumi_vault/identity/oidc_assignment.py +5 -0
  95. pulumi_vault/identity/oidc_client.py +5 -0
  96. pulumi_vault/identity/oidc_key.py +5 -0
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
  98. pulumi_vault/identity/oidc_provider.py +5 -0
  99. pulumi_vault/identity/oidc_role.py +5 -0
  100. pulumi_vault/identity/oidc_scope.py +5 -0
  101. pulumi_vault/identity/outputs.py +5 -0
  102. pulumi_vault/jwt/_inputs.py +55 -0
  103. pulumi_vault/jwt/auth_backend.py +5 -0
  104. pulumi_vault/jwt/auth_backend_role.py +5 -0
  105. pulumi_vault/jwt/outputs.py +5 -0
  106. pulumi_vault/kmip/secret_backend.py +5 -0
  107. pulumi_vault/kmip/secret_role.py +5 -0
  108. pulumi_vault/kmip/secret_scope.py +5 -0
  109. pulumi_vault/kubernetes/auth_backend_config.py +5 -0
  110. pulumi_vault/kubernetes/auth_backend_role.py +5 -0
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
  113. pulumi_vault/kubernetes/get_service_account_token.py +28 -4
  114. pulumi_vault/kubernetes/secret_backend.py +5 -0
  115. pulumi_vault/kubernetes/secret_backend_role.py +5 -0
  116. pulumi_vault/kv/_inputs.py +32 -0
  117. pulumi_vault/kv/get_secret.py +19 -4
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +23 -4
  119. pulumi_vault/kv/get_secret_v2.py +25 -4
  120. pulumi_vault/kv/get_secrets_list.py +15 -4
  121. pulumi_vault/kv/get_secrets_list_v2.py +18 -4
  122. pulumi_vault/kv/outputs.py +5 -0
  123. pulumi_vault/kv/secret.py +5 -0
  124. pulumi_vault/kv/secret_backend_v2.py +5 -0
  125. pulumi_vault/kv/secret_v2.py +5 -0
  126. pulumi_vault/ldap/auth_backend.py +5 -0
  127. pulumi_vault/ldap/auth_backend_group.py +5 -0
  128. pulumi_vault/ldap/auth_backend_user.py +5 -0
  129. pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
  130. pulumi_vault/ldap/get_static_credentials.py +23 -4
  131. pulumi_vault/ldap/secret_backend.py +5 -0
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
  133. pulumi_vault/ldap/secret_backend_library_set.py +5 -0
  134. pulumi_vault/ldap/secret_backend_static_role.py +5 -0
  135. pulumi_vault/managed/_inputs.py +205 -0
  136. pulumi_vault/managed/keys.py +5 -0
  137. pulumi_vault/managed/outputs.py +5 -0
  138. pulumi_vault/mfa_duo.py +5 -0
  139. pulumi_vault/mfa_okta.py +5 -0
  140. pulumi_vault/mfa_pingid.py +5 -0
  141. pulumi_vault/mfa_totp.py +5 -0
  142. pulumi_vault/mongodbatlas/secret_backend.py +5 -0
  143. pulumi_vault/mongodbatlas/secret_role.py +5 -0
  144. pulumi_vault/mount.py +5 -0
  145. pulumi_vault/namespace.py +5 -0
  146. pulumi_vault/nomad_secret_backend.py +5 -0
  147. pulumi_vault/nomad_secret_role.py +5 -0
  148. pulumi_vault/okta/_inputs.py +39 -0
  149. pulumi_vault/okta/auth_backend.py +5 -0
  150. pulumi_vault/okta/auth_backend_group.py +5 -0
  151. pulumi_vault/okta/auth_backend_user.py +5 -0
  152. pulumi_vault/okta/outputs.py +5 -0
  153. pulumi_vault/outputs.py +5 -0
  154. pulumi_vault/password_policy.py +5 -0
  155. pulumi_vault/pkisecret/_inputs.py +41 -0
  156. pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
  157. pulumi_vault/pkisecret/backend_config_est.py +5 -0
  158. pulumi_vault/pkisecret/get_backend_config_est.py +22 -4
  159. pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
  160. pulumi_vault/pkisecret/get_backend_issuers.py +17 -4
  161. pulumi_vault/pkisecret/get_backend_key.py +19 -4
  162. pulumi_vault/pkisecret/get_backend_keys.py +17 -4
  163. pulumi_vault/pkisecret/outputs.py +5 -0
  164. pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
  172. pulumi_vault/pkisecret/secret_backend_key.py +5 -0
  173. pulumi_vault/pkisecret/secret_backend_role.py +5 -0
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
  176. pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
  177. pulumi_vault/plugin.py +5 -0
  178. pulumi_vault/plugin_pinned_version.py +5 -0
  179. pulumi_vault/policy.py +5 -0
  180. pulumi_vault/provider.py +5 -0
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +5 -0
  183. pulumi_vault/quota_rate_limit.py +5 -0
  184. pulumi_vault/rabbitmq/_inputs.py +61 -0
  185. pulumi_vault/rabbitmq/outputs.py +5 -0
  186. pulumi_vault/rabbitmq/secret_backend.py +5 -0
  187. pulumi_vault/rabbitmq/secret_backend_role.py +5 -0
  188. pulumi_vault/raft_autopilot.py +5 -0
  189. pulumi_vault/raft_snapshot_agent_config.py +5 -0
  190. pulumi_vault/rgp_policy.py +5 -0
  191. pulumi_vault/saml/auth_backend.py +5 -0
  192. pulumi_vault/saml/auth_backend_role.py +5 -0
  193. pulumi_vault/secrets/_inputs.py +30 -0
  194. pulumi_vault/secrets/outputs.py +5 -0
  195. pulumi_vault/secrets/sync_association.py +5 -0
  196. pulumi_vault/secrets/sync_aws_destination.py +5 -0
  197. pulumi_vault/secrets/sync_azure_destination.py +5 -0
  198. pulumi_vault/secrets/sync_config.py +5 -0
  199. pulumi_vault/secrets/sync_gcp_destination.py +5 -0
  200. pulumi_vault/secrets/sync_gh_destination.py +5 -0
  201. pulumi_vault/secrets/sync_github_apps.py +5 -0
  202. pulumi_vault/secrets/sync_vercel_destination.py +5 -0
  203. pulumi_vault/ssh/_inputs.py +22 -0
  204. pulumi_vault/ssh/outputs.py +5 -0
  205. pulumi_vault/ssh/secret_backend_ca.py +5 -0
  206. pulumi_vault/ssh/secret_backend_role.py +5 -0
  207. pulumi_vault/terraformcloud/secret_backend.py +5 -0
  208. pulumi_vault/terraformcloud/secret_creds.py +5 -0
  209. pulumi_vault/terraformcloud/secret_role.py +5 -0
  210. pulumi_vault/token.py +5 -0
  211. pulumi_vault/tokenauth/auth_backend_role.py +5 -0
  212. pulumi_vault/transform/alphabet.py +5 -0
  213. pulumi_vault/transform/get_decode.py +28 -4
  214. pulumi_vault/transform/get_encode.py +28 -4
  215. pulumi_vault/transform/role.py +5 -0
  216. pulumi_vault/transform/template.py +5 -0
  217. pulumi_vault/transform/transformation.py +5 -0
  218. pulumi_vault/transit/get_decrypt.py +21 -4
  219. pulumi_vault/transit/get_encrypt.py +23 -4
  220. pulumi_vault/transit/secret_backend_key.py +5 -0
  221. pulumi_vault/transit/secret_cache_config.py +5 -0
  222. {pulumi_vault-6.4.0a1728108872.dist-info → pulumi_vault-6.4.0a1729059229.dist-info}/METADATA +3 -2
  223. pulumi_vault-6.4.0a1729059229.dist-info/RECORD +256 -0
  224. pulumi_vault-6.4.0a1728108872.dist-info/RECORD +0 -256
  225. {pulumi_vault-6.4.0a1728108872.dist-info → pulumi_vault-6.4.0a1729059229.dist-info}/WHEEL +0 -0
  226. {pulumi_vault-6.4.0a1728108872.dist-info → pulumi_vault-6.4.0a1729059229.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -181,9 +186,6 @@ def get_secret(namespace: Optional[str] = None,
181
186
  lease_renewable=pulumi.get(__ret__, 'lease_renewable'),
182
187
  namespace=pulumi.get(__ret__, 'namespace'),
183
188
  path=pulumi.get(__ret__, 'path'))
184
-
185
-
186
- @_utilities.lift_output_func(get_secret)
187
189
  def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
188
190
  path: Optional[pulumi.Input[str]] = None,
189
191
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecretResult]:
@@ -222,4 +224,17 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
222
224
  *Available only for Vault Enterprise*.
223
225
  :param str path: Full path of the KV-V1 secret.
224
226
  """
225
- ...
227
+ __args__ = dict()
228
+ __args__['namespace'] = namespace
229
+ __args__['path'] = path
230
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
231
+ __ret__ = pulumi.runtime.invoke_output('vault:kv/getSecret:getSecret', __args__, opts=opts, typ=GetSecretResult)
232
+ return __ret__.apply(lambda __response__: GetSecretResult(
233
+ data=pulumi.get(__response__, 'data'),
234
+ data_json=pulumi.get(__response__, 'data_json'),
235
+ id=pulumi.get(__response__, 'id'),
236
+ lease_duration=pulumi.get(__response__, 'lease_duration'),
237
+ lease_id=pulumi.get(__response__, 'lease_id'),
238
+ lease_renewable=pulumi.get(__response__, 'lease_renewable'),
239
+ namespace=pulumi.get(__response__, 'namespace'),
240
+ path=pulumi.get(__response__, 'path')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -197,9 +202,6 @@ def get_secret_subkeys_v2(depth: Optional[int] = None,
197
202
  namespace=pulumi.get(__ret__, 'namespace'),
198
203
  path=pulumi.get(__ret__, 'path'),
199
204
  version=pulumi.get(__ret__, 'version'))
200
-
201
-
202
- @_utilities.lift_output_func(get_secret_subkeys_v2)
203
205
  def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] = None,
204
206
  mount: Optional[pulumi.Input[str]] = None,
205
207
  name: Optional[pulumi.Input[str]] = None,
@@ -253,4 +255,21 @@ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] =
253
255
  :param int version: Specifies the version to return. If not
254
256
  set the latest version is returned.
255
257
  """
256
- ...
258
+ __args__ = dict()
259
+ __args__['depth'] = depth
260
+ __args__['mount'] = mount
261
+ __args__['name'] = name
262
+ __args__['namespace'] = namespace
263
+ __args__['version'] = version
264
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
265
+ __ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretSubkeysV2:getSecretSubkeysV2', __args__, opts=opts, typ=GetSecretSubkeysV2Result)
266
+ return __ret__.apply(lambda __response__: GetSecretSubkeysV2Result(
267
+ data=pulumi.get(__response__, 'data'),
268
+ data_json=pulumi.get(__response__, 'data_json'),
269
+ depth=pulumi.get(__response__, 'depth'),
270
+ id=pulumi.get(__response__, 'id'),
271
+ mount=pulumi.get(__response__, 'mount'),
272
+ name=pulumi.get(__response__, 'name'),
273
+ namespace=pulumi.get(__response__, 'namespace'),
274
+ path=pulumi.get(__response__, 'path'),
275
+ version=pulumi.get(__response__, 'version')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -241,9 +246,6 @@ def get_secret_v2(mount: Optional[str] = None,
241
246
  namespace=pulumi.get(__ret__, 'namespace'),
242
247
  path=pulumi.get(__ret__, 'path'),
243
248
  version=pulumi.get(__ret__, 'version'))
244
-
245
-
246
- @_utilities.lift_output_func(get_secret_v2)
247
249
  def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None,
248
250
  name: Optional[pulumi.Input[str]] = None,
249
251
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
@@ -293,4 +295,23 @@ def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None,
293
295
  *Available only for Vault Enterprise*.
294
296
  :param int version: Version of the secret to retrieve.
295
297
  """
296
- ...
298
+ __args__ = dict()
299
+ __args__['mount'] = mount
300
+ __args__['name'] = name
301
+ __args__['namespace'] = namespace
302
+ __args__['version'] = version
303
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
304
+ __ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretV2:getSecretV2', __args__, opts=opts, typ=GetSecretV2Result)
305
+ return __ret__.apply(lambda __response__: GetSecretV2Result(
306
+ created_time=pulumi.get(__response__, 'created_time'),
307
+ custom_metadata=pulumi.get(__response__, 'custom_metadata'),
308
+ data=pulumi.get(__response__, 'data'),
309
+ data_json=pulumi.get(__response__, 'data_json'),
310
+ deletion_time=pulumi.get(__response__, 'deletion_time'),
311
+ destroyed=pulumi.get(__response__, 'destroyed'),
312
+ id=pulumi.get(__response__, 'id'),
313
+ mount=pulumi.get(__response__, 'mount'),
314
+ name=pulumi.get(__response__, 'name'),
315
+ namespace=pulumi.get(__response__, 'namespace'),
316
+ path=pulumi.get(__response__, 'path'),
317
+ version=pulumi.get(__response__, 'version')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -127,9 +132,6 @@ def get_secrets_list(namespace: Optional[str] = None,
127
132
  names=pulumi.get(__ret__, 'names'),
128
133
  namespace=pulumi.get(__ret__, 'namespace'),
129
134
  path=pulumi.get(__ret__, 'path'))
130
-
131
-
132
- @_utilities.lift_output_func(get_secrets_list)
133
135
  def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
134
136
  path: Optional[pulumi.Input[str]] = None,
135
137
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecretsListResult]:
@@ -172,4 +174,13 @@ def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
172
174
  *Available only for Vault Enterprise*.
173
175
  :param str path: Full KV-V1 path where secrets will be listed.
174
176
  """
175
- ...
177
+ __args__ = dict()
178
+ __args__['namespace'] = namespace
179
+ __args__['path'] = path
180
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
181
+ __ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretsList:getSecretsList', __args__, opts=opts, typ=GetSecretsListResult)
182
+ return __ret__.apply(lambda __response__: GetSecretsListResult(
183
+ id=pulumi.get(__response__, 'id'),
184
+ names=pulumi.get(__response__, 'names'),
185
+ namespace=pulumi.get(__response__, 'namespace'),
186
+ path=pulumi.get(__response__, 'path')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -166,9 +171,6 @@ def get_secrets_list_v2(mount: Optional[str] = None,
166
171
  names=pulumi.get(__ret__, 'names'),
167
172
  namespace=pulumi.get(__ret__, 'namespace'),
168
173
  path=pulumi.get(__ret__, 'path'))
169
-
170
-
171
- @_utilities.lift_output_func(get_secrets_list_v2)
172
174
  def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
173
175
  name: Optional[pulumi.Input[Optional[str]]] = None,
174
176
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
@@ -226,4 +228,16 @@ def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
226
228
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
227
229
  *Available only for Vault Enterprise*.
228
230
  """
229
- ...
231
+ __args__ = dict()
232
+ __args__['mount'] = mount
233
+ __args__['name'] = name
234
+ __args__['namespace'] = namespace
235
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
236
+ __ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretsListV2:getSecretsListV2', __args__, opts=opts, typ=GetSecretsListV2Result)
237
+ return __ret__.apply(lambda __response__: GetSecretsListV2Result(
238
+ id=pulumi.get(__response__, 'id'),
239
+ mount=pulumi.get(__response__, 'mount'),
240
+ name=pulumi.get(__response__, 'name'),
241
+ names=pulumi.get(__response__, 'names'),
242
+ namespace=pulumi.get(__response__, 'namespace'),
243
+ path=pulumi.get(__response__, 'path')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
pulumi_vault/kv/secret.py CHANGED
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretArgs', 'Secret']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendV2Args', 'SecretBackendV2']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
  from . import outputs
12
17
  from ._inputs import *
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['AuthBackendArgs', 'AuthBackend']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['AuthBackendGroupArgs', 'AuthBackendGroup']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['AuthBackendUserArgs', 'AuthBackendUser']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -150,9 +155,6 @@ def get_dynamic_credentials(mount: Optional[str] = None,
150
155
  password=pulumi.get(__ret__, 'password'),
151
156
  role_name=pulumi.get(__ret__, 'role_name'),
152
157
  username=pulumi.get(__ret__, 'username'))
153
-
154
-
155
- @_utilities.lift_output_func(get_dynamic_credentials)
156
158
  def get_dynamic_credentials_output(mount: Optional[pulumi.Input[str]] = None,
157
159
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
158
160
  role_name: Optional[pulumi.Input[str]] = None,
@@ -160,4 +162,20 @@ def get_dynamic_credentials_output(mount: Optional[pulumi.Input[str]] = None,
160
162
  """
161
163
  Use this data source to access information about an existing resource.
162
164
  """
163
- ...
165
+ __args__ = dict()
166
+ __args__['mount'] = mount
167
+ __args__['namespace'] = namespace
168
+ __args__['roleName'] = role_name
169
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
170
+ __ret__ = pulumi.runtime.invoke_output('vault:ldap/getDynamicCredentials:getDynamicCredentials', __args__, opts=opts, typ=GetDynamicCredentialsResult)
171
+ return __ret__.apply(lambda __response__: GetDynamicCredentialsResult(
172
+ distinguished_names=pulumi.get(__response__, 'distinguished_names'),
173
+ id=pulumi.get(__response__, 'id'),
174
+ lease_duration=pulumi.get(__response__, 'lease_duration'),
175
+ lease_id=pulumi.get(__response__, 'lease_id'),
176
+ lease_renewable=pulumi.get(__response__, 'lease_renewable'),
177
+ mount=pulumi.get(__response__, 'mount'),
178
+ namespace=pulumi.get(__response__, 'namespace'),
179
+ password=pulumi.get(__response__, 'password'),
180
+ role_name=pulumi.get(__response__, 'role_name'),
181
+ username=pulumi.get(__response__, 'username')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -160,9 +165,6 @@ def get_static_credentials(mount: Optional[str] = None,
160
165
  rotation_period=pulumi.get(__ret__, 'rotation_period'),
161
166
  ttl=pulumi.get(__ret__, 'ttl'),
162
167
  username=pulumi.get(__ret__, 'username'))
163
-
164
-
165
- @_utilities.lift_output_func(get_static_credentials)
166
168
  def get_static_credentials_output(mount: Optional[pulumi.Input[str]] = None,
167
169
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
168
170
  role_name: Optional[pulumi.Input[str]] = None,
@@ -170,4 +172,21 @@ def get_static_credentials_output(mount: Optional[pulumi.Input[str]] = None,
170
172
  """
171
173
  Use this data source to access information about an existing resource.
172
174
  """
173
- ...
175
+ __args__ = dict()
176
+ __args__['mount'] = mount
177
+ __args__['namespace'] = namespace
178
+ __args__['roleName'] = role_name
179
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
180
+ __ret__ = pulumi.runtime.invoke_output('vault:ldap/getStaticCredentials:getStaticCredentials', __args__, opts=opts, typ=GetStaticCredentialsResult)
181
+ return __ret__.apply(lambda __response__: GetStaticCredentialsResult(
182
+ dn=pulumi.get(__response__, 'dn'),
183
+ id=pulumi.get(__response__, 'id'),
184
+ last_password=pulumi.get(__response__, 'last_password'),
185
+ last_vault_rotation=pulumi.get(__response__, 'last_vault_rotation'),
186
+ mount=pulumi.get(__response__, 'mount'),
187
+ namespace=pulumi.get(__response__, 'namespace'),
188
+ password=pulumi.get(__response__, 'password'),
189
+ role_name=pulumi.get(__response__, 'role_name'),
190
+ rotation_period=pulumi.get(__response__, 'rotation_period'),
191
+ ttl=pulumi.get(__response__, 'ttl'),
192
+ username=pulumi.get(__response__, 'username')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendArgs', 'SecretBackend']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendDynamicRoleArgs', 'SecretBackendDynamicRole']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendLibrarySetArgs', 'SecretBackendLibrarySet']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole']