pulumi-vault 6.4.0a1728368050__py3-none-any.whl → 6.4.0a1729059229__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +19 -4
- pulumi_vault/ad/secret_backend.py +5 -0
- pulumi_vault/ad/secret_library.py +5 -0
- pulumi_vault/ad/secret_role.py +5 -0
- pulumi_vault/alicloud/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_login.py +5 -0
- pulumi_vault/approle/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
- pulumi_vault/audit.py +5 -0
- pulumi_vault/audit_request_header.py +5 -0
- pulumi_vault/auth_backend.py +5 -0
- pulumi_vault/aws/auth_backend_cert.py +5 -0
- pulumi_vault/aws/auth_backend_client.py +5 -0
- pulumi_vault/aws/auth_backend_config_identity.py +5 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
- pulumi_vault/aws/auth_backend_login.py +5 -0
- pulumi_vault/aws/auth_backend_role.py +5 -0
- pulumi_vault/aws/auth_backend_role_tag.py +5 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
- pulumi_vault/aws/auth_backend_sts_role.py +5 -0
- pulumi_vault/aws/get_access_credentials.py +31 -4
- pulumi_vault/aws/get_static_access_credentials.py +18 -4
- pulumi_vault/aws/secret_backend.py +5 -0
- pulumi_vault/aws/secret_backend_role.py +5 -0
- pulumi_vault/aws/secret_backend_static_role.py +5 -0
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +5 -0
- pulumi_vault/azure/auth_backend_role.py +5 -0
- pulumi_vault/azure/backend.py +5 -0
- pulumi_vault/azure/backend_role.py +5 -0
- pulumi_vault/azure/get_access_credentials.py +36 -4
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +5 -0
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +21 -0
- pulumi_vault/config/outputs.py +5 -0
- pulumi_vault/config/ui_custom_message.py +5 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +5 -0
- pulumi_vault/consul/secret_backend_role.py +5 -0
- pulumi_vault/database/_inputs.py +2019 -68
- pulumi_vault/database/outputs.py +5 -0
- pulumi_vault/database/secret_backend_connection.py +5 -0
- pulumi_vault/database/secret_backend_role.py +5 -0
- pulumi_vault/database/secret_backend_static_role.py +5 -0
- pulumi_vault/database/secrets_mount.py +5 -0
- pulumi_vault/egp_policy.py +5 -0
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +5 -0
- pulumi_vault/gcp/auth_backend_role.py +5 -0
- pulumi_vault/gcp/get_auth_backend_role.py +42 -4
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +5 -0
- pulumi_vault/gcp/secret_impersonated_account.py +5 -0
- pulumi_vault/gcp/secret_roleset.py +5 -0
- pulumi_vault/gcp/secret_static_account.py +5 -0
- pulumi_vault/generic/endpoint.py +5 -0
- pulumi_vault/generic/get_secret.py +24 -4
- pulumi_vault/generic/secret.py +5 -0
- pulumi_vault/get_auth_backend.py +21 -4
- pulumi_vault/get_auth_backends.py +16 -4
- pulumi_vault/get_namespace.py +17 -4
- pulumi_vault/get_namespaces.py +13 -4
- pulumi_vault/get_nomad_access_token.py +18 -4
- pulumi_vault/get_policy_document.py +15 -4
- pulumi_vault/get_raft_autopilot_state.py +23 -4
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +5 -0
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +5 -0
- pulumi_vault/github/user.py +5 -0
- pulumi_vault/identity/entity.py +5 -0
- pulumi_vault/identity/entity_alias.py +5 -0
- pulumi_vault/identity/entity_policies.py +5 -0
- pulumi_vault/identity/get_entity.py +34 -4
- pulumi_vault/identity/get_group.py +40 -4
- pulumi_vault/identity/get_oidc_client_creds.py +16 -4
- pulumi_vault/identity/get_oidc_openid_config.py +26 -4
- pulumi_vault/identity/get_oidc_public_keys.py +15 -4
- pulumi_vault/identity/group.py +5 -0
- pulumi_vault/identity/group_alias.py +5 -0
- pulumi_vault/identity/group_member_entity_ids.py +5 -0
- pulumi_vault/identity/group_member_group_ids.py +5 -0
- pulumi_vault/identity/group_policies.py +5 -0
- pulumi_vault/identity/mfa_duo.py +5 -0
- pulumi_vault/identity/mfa_login_enforcement.py +5 -0
- pulumi_vault/identity/mfa_okta.py +5 -0
- pulumi_vault/identity/mfa_pingid.py +5 -0
- pulumi_vault/identity/mfa_totp.py +5 -0
- pulumi_vault/identity/oidc.py +5 -0
- pulumi_vault/identity/oidc_assignment.py +5 -0
- pulumi_vault/identity/oidc_client.py +5 -0
- pulumi_vault/identity/oidc_key.py +5 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
- pulumi_vault/identity/oidc_provider.py +5 -0
- pulumi_vault/identity/oidc_role.py +5 -0
- pulumi_vault/identity/oidc_scope.py +5 -0
- pulumi_vault/identity/outputs.py +5 -0
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +5 -0
- pulumi_vault/jwt/auth_backend_role.py +5 -0
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +5 -0
- pulumi_vault/kmip/secret_role.py +5 -0
- pulumi_vault/kmip/secret_scope.py +5 -0
- pulumi_vault/kubernetes/auth_backend_config.py +5 -0
- pulumi_vault/kubernetes/auth_backend_role.py +5 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
- pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
- pulumi_vault/kubernetes/get_service_account_token.py +28 -4
- pulumi_vault/kubernetes/secret_backend.py +5 -0
- pulumi_vault/kubernetes/secret_backend_role.py +5 -0
- pulumi_vault/kv/_inputs.py +32 -0
- pulumi_vault/kv/get_secret.py +19 -4
- pulumi_vault/kv/get_secret_subkeys_v2.py +23 -4
- pulumi_vault/kv/get_secret_v2.py +25 -4
- pulumi_vault/kv/get_secrets_list.py +15 -4
- pulumi_vault/kv/get_secrets_list_v2.py +18 -4
- pulumi_vault/kv/outputs.py +5 -0
- pulumi_vault/kv/secret.py +5 -0
- pulumi_vault/kv/secret_backend_v2.py +5 -0
- pulumi_vault/kv/secret_v2.py +5 -0
- pulumi_vault/ldap/auth_backend.py +5 -0
- pulumi_vault/ldap/auth_backend_group.py +5 -0
- pulumi_vault/ldap/auth_backend_user.py +5 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
- pulumi_vault/ldap/get_static_credentials.py +23 -4
- pulumi_vault/ldap/secret_backend.py +5 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
- pulumi_vault/ldap/secret_backend_library_set.py +5 -0
- pulumi_vault/ldap/secret_backend_static_role.py +5 -0
- pulumi_vault/managed/_inputs.py +205 -0
- pulumi_vault/managed/keys.py +5 -0
- pulumi_vault/managed/outputs.py +5 -0
- pulumi_vault/mfa_duo.py +5 -0
- pulumi_vault/mfa_okta.py +5 -0
- pulumi_vault/mfa_pingid.py +5 -0
- pulumi_vault/mfa_totp.py +5 -0
- pulumi_vault/mongodbatlas/secret_backend.py +5 -0
- pulumi_vault/mongodbatlas/secret_role.py +5 -0
- pulumi_vault/mount.py +5 -0
- pulumi_vault/namespace.py +5 -0
- pulumi_vault/nomad_secret_backend.py +5 -0
- pulumi_vault/nomad_secret_role.py +5 -0
- pulumi_vault/okta/_inputs.py +39 -0
- pulumi_vault/okta/auth_backend.py +5 -0
- pulumi_vault/okta/auth_backend_group.py +5 -0
- pulumi_vault/okta/auth_backend_user.py +5 -0
- pulumi_vault/okta/outputs.py +5 -0
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +5 -0
- pulumi_vault/pkisecret/_inputs.py +41 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
- pulumi_vault/pkisecret/backend_config_est.py +5 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +22 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
- pulumi_vault/pkisecret/get_backend_issuers.py +17 -4
- pulumi_vault/pkisecret/get_backend_key.py +19 -4
- pulumi_vault/pkisecret/get_backend_keys.py +17 -4
- pulumi_vault/pkisecret/outputs.py +5 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
- pulumi_vault/pkisecret/secret_backend_key.py +5 -0
- pulumi_vault/pkisecret/secret_backend_role.py +5 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
- pulumi_vault/plugin.py +5 -0
- pulumi_vault/plugin_pinned_version.py +5 -0
- pulumi_vault/policy.py +5 -0
- pulumi_vault/provider.py +5 -0
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +5 -0
- pulumi_vault/quota_rate_limit.py +5 -0
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +5 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +5 -0
- pulumi_vault/raft_autopilot.py +5 -0
- pulumi_vault/raft_snapshot_agent_config.py +5 -0
- pulumi_vault/rgp_policy.py +5 -0
- pulumi_vault/saml/auth_backend.py +5 -0
- pulumi_vault/saml/auth_backend_role.py +5 -0
- pulumi_vault/secrets/_inputs.py +30 -0
- pulumi_vault/secrets/outputs.py +5 -0
- pulumi_vault/secrets/sync_association.py +5 -0
- pulumi_vault/secrets/sync_aws_destination.py +5 -0
- pulumi_vault/secrets/sync_azure_destination.py +5 -0
- pulumi_vault/secrets/sync_config.py +5 -0
- pulumi_vault/secrets/sync_gcp_destination.py +5 -0
- pulumi_vault/secrets/sync_gh_destination.py +5 -0
- pulumi_vault/secrets/sync_github_apps.py +5 -0
- pulumi_vault/secrets/sync_vercel_destination.py +5 -0
- pulumi_vault/ssh/_inputs.py +22 -0
- pulumi_vault/ssh/outputs.py +5 -0
- pulumi_vault/ssh/secret_backend_ca.py +5 -0
- pulumi_vault/ssh/secret_backend_role.py +5 -0
- pulumi_vault/terraformcloud/secret_backend.py +5 -0
- pulumi_vault/terraformcloud/secret_creds.py +5 -0
- pulumi_vault/terraformcloud/secret_role.py +5 -0
- pulumi_vault/token.py +5 -0
- pulumi_vault/tokenauth/auth_backend_role.py +5 -0
- pulumi_vault/transform/alphabet.py +5 -0
- pulumi_vault/transform/get_decode.py +28 -4
- pulumi_vault/transform/get_encode.py +28 -4
- pulumi_vault/transform/role.py +5 -0
- pulumi_vault/transform/template.py +5 -0
- pulumi_vault/transform/transformation.py +5 -0
- pulumi_vault/transit/get_decrypt.py +21 -4
- pulumi_vault/transit/get_encrypt.py +23 -4
- pulumi_vault/transit/secret_backend_key.py +5 -0
- pulumi_vault/transit/secret_cache_config.py +5 -0
- {pulumi_vault-6.4.0a1728368050.dist-info → pulumi_vault-6.4.0a1729059229.dist-info}/METADATA +3 -2
- pulumi_vault-6.4.0a1729059229.dist-info/RECORD +256 -0
- pulumi_vault-6.4.0a1728368050.dist-info/RECORD +0 -256
- {pulumi_vault-6.4.0a1728368050.dist-info → pulumi_vault-6.4.0a1729059229.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.4.0a1728368050.dist-info → pulumi_vault-6.4.0a1729059229.dist-info}/top_level.txt +0 -0
pulumi_vault/database/outputs.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
from . import outputs
|
12
17
|
from ._inputs import *
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
from . import outputs
|
12
17
|
from ._inputs import *
|
pulumi_vault/egp_policy.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['EgpPolicyArgs', 'EgpPolicy']
|
pulumi_vault/gcp/_inputs.py
CHANGED
@@ -4,18 +4,53 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
13
18
|
'AuthBackendCustomEndpointArgs',
|
19
|
+
'AuthBackendCustomEndpointArgsDict',
|
14
20
|
'AuthBackendTuneArgs',
|
21
|
+
'AuthBackendTuneArgsDict',
|
15
22
|
'SecretRolesetBindingArgs',
|
23
|
+
'SecretRolesetBindingArgsDict',
|
16
24
|
'SecretStaticAccountBindingArgs',
|
25
|
+
'SecretStaticAccountBindingArgsDict',
|
17
26
|
]
|
18
27
|
|
28
|
+
MYPY = False
|
29
|
+
|
30
|
+
if not MYPY:
|
31
|
+
class AuthBackendCustomEndpointArgsDict(TypedDict):
|
32
|
+
api: NotRequired[pulumi.Input[str]]
|
33
|
+
"""
|
34
|
+
Replaces the service endpoint used in API requests to `https://www.googleapis.com`.
|
35
|
+
"""
|
36
|
+
compute: NotRequired[pulumi.Input[str]]
|
37
|
+
"""
|
38
|
+
Replaces the service endpoint used in API requests to `https://compute.googleapis.com`.
|
39
|
+
|
40
|
+
The endpoint value provided for a given key has the form of `scheme://host:port`.
|
41
|
+
The `scheme://` and `:port` portions of the endpoint value are optional.
|
42
|
+
"""
|
43
|
+
crm: NotRequired[pulumi.Input[str]]
|
44
|
+
"""
|
45
|
+
Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`.
|
46
|
+
"""
|
47
|
+
iam: NotRequired[pulumi.Input[str]]
|
48
|
+
"""
|
49
|
+
Replaces the service endpoint used in API requests to `https://iam.googleapis.com`.
|
50
|
+
"""
|
51
|
+
elif False:
|
52
|
+
AuthBackendCustomEndpointArgsDict: TypeAlias = Mapping[str, Any]
|
53
|
+
|
19
54
|
@pulumi.input_type
|
20
55
|
class AuthBackendCustomEndpointArgs:
|
21
56
|
def __init__(__self__, *,
|
@@ -93,6 +128,56 @@ class AuthBackendCustomEndpointArgs:
|
|
93
128
|
pulumi.set(self, "iam", value)
|
94
129
|
|
95
130
|
|
131
|
+
if not MYPY:
|
132
|
+
class AuthBackendTuneArgsDict(TypedDict):
|
133
|
+
allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
134
|
+
"""
|
135
|
+
List of headers to whitelist and allowing
|
136
|
+
a plugin to include them in the response.
|
137
|
+
"""
|
138
|
+
audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
139
|
+
"""
|
140
|
+
Specifies the list of keys that will
|
141
|
+
not be HMAC'd by audit devices in the request data object.
|
142
|
+
"""
|
143
|
+
audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
144
|
+
"""
|
145
|
+
Specifies the list of keys that will
|
146
|
+
not be HMAC'd by audit devices in the response data object.
|
147
|
+
"""
|
148
|
+
default_lease_ttl: NotRequired[pulumi.Input[str]]
|
149
|
+
"""
|
150
|
+
Specifies the default time-to-live.
|
151
|
+
If set, this overrides the global default.
|
152
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
153
|
+
"""
|
154
|
+
listing_visibility: NotRequired[pulumi.Input[str]]
|
155
|
+
"""
|
156
|
+
Specifies whether to show this mount in
|
157
|
+
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
158
|
+
"""
|
159
|
+
max_lease_ttl: NotRequired[pulumi.Input[str]]
|
160
|
+
"""
|
161
|
+
Specifies the maximum time-to-live.
|
162
|
+
If set, this overrides the global default.
|
163
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
164
|
+
"""
|
165
|
+
passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
166
|
+
"""
|
167
|
+
List of headers to whitelist and
|
168
|
+
pass from the request to the backend.
|
169
|
+
"""
|
170
|
+
token_type: NotRequired[pulumi.Input[str]]
|
171
|
+
"""
|
172
|
+
Specifies the type of tokens that should be returned by
|
173
|
+
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
174
|
+
|
175
|
+
|
176
|
+
For more details on the usage of each argument consult the [Vault GCP API documentation](https://www.vaultproject.io/api-docs/auth/gcp#configure).
|
177
|
+
"""
|
178
|
+
elif False:
|
179
|
+
AuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any]
|
180
|
+
|
96
181
|
@pulumi.input_type
|
97
182
|
class AuthBackendTuneArgs:
|
98
183
|
def __init__(__self__, *,
|
@@ -254,6 +339,19 @@ class AuthBackendTuneArgs:
|
|
254
339
|
pulumi.set(self, "token_type", value)
|
255
340
|
|
256
341
|
|
342
|
+
if not MYPY:
|
343
|
+
class SecretRolesetBindingArgsDict(TypedDict):
|
344
|
+
resource: pulumi.Input[str]
|
345
|
+
"""
|
346
|
+
Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different [formats](https://www.vaultproject.io/docs/secrets/gcp/index.html#roleset-bindings).
|
347
|
+
"""
|
348
|
+
roles: pulumi.Input[Sequence[pulumi.Input[str]]]
|
349
|
+
"""
|
350
|
+
List of [GCP IAM roles](https://cloud.google.com/iam/docs/understanding-roles) for the resource.
|
351
|
+
"""
|
352
|
+
elif False:
|
353
|
+
SecretRolesetBindingArgsDict: TypeAlias = Mapping[str, Any]
|
354
|
+
|
257
355
|
@pulumi.input_type
|
258
356
|
class SecretRolesetBindingArgs:
|
259
357
|
def __init__(__self__, *,
|
@@ -291,6 +389,19 @@ class SecretRolesetBindingArgs:
|
|
291
389
|
pulumi.set(self, "roles", value)
|
292
390
|
|
293
391
|
|
392
|
+
if not MYPY:
|
393
|
+
class SecretStaticAccountBindingArgsDict(TypedDict):
|
394
|
+
resource: pulumi.Input[str]
|
395
|
+
"""
|
396
|
+
Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different [formats](https://www.vaultproject.io/docs/secrets/gcp/index.html#bindings).
|
397
|
+
"""
|
398
|
+
roles: pulumi.Input[Sequence[pulumi.Input[str]]]
|
399
|
+
"""
|
400
|
+
List of [GCP IAM roles](https://cloud.google.com/iam/docs/understanding-roles) for the resource.
|
401
|
+
"""
|
402
|
+
elif False:
|
403
|
+
SecretStaticAccountBindingArgsDict: TypeAlias = Mapping[str, Any]
|
404
|
+
|
294
405
|
@pulumi.input_type
|
295
406
|
class SecretStaticAccountBindingArgs:
|
296
407
|
def __init__(__self__, *,
|
pulumi_vault/gcp/auth_backend.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
from . import outputs
|
12
17
|
from ._inputs import *
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -393,9 +398,6 @@ def get_auth_backend_role(backend: Optional[str] = None,
|
|
393
398
|
token_ttl=pulumi.get(__ret__, 'token_ttl'),
|
394
399
|
token_type=pulumi.get(__ret__, 'token_type'),
|
395
400
|
type=pulumi.get(__ret__, 'type'))
|
396
|
-
|
397
|
-
|
398
|
-
@_utilities.lift_output_func(get_auth_backend_role)
|
399
401
|
def get_auth_backend_role_output(backend: Optional[pulumi.Input[Optional[str]]] = None,
|
400
402
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
401
403
|
role_name: Optional[pulumi.Input[str]] = None,
|
@@ -458,4 +460,40 @@ def get_auth_backend_role_output(backend: Optional[pulumi.Input[Optional[str]]]
|
|
458
460
|
`default-service` and `default-batch` which specify the type to return unless the client
|
459
461
|
requests a different type at generation time.
|
460
462
|
"""
|
461
|
-
|
463
|
+
__args__ = dict()
|
464
|
+
__args__['backend'] = backend
|
465
|
+
__args__['namespace'] = namespace
|
466
|
+
__args__['roleName'] = role_name
|
467
|
+
__args__['tokenBoundCidrs'] = token_bound_cidrs
|
468
|
+
__args__['tokenExplicitMaxTtl'] = token_explicit_max_ttl
|
469
|
+
__args__['tokenMaxTtl'] = token_max_ttl
|
470
|
+
__args__['tokenNoDefaultPolicy'] = token_no_default_policy
|
471
|
+
__args__['tokenNumUses'] = token_num_uses
|
472
|
+
__args__['tokenPeriod'] = token_period
|
473
|
+
__args__['tokenPolicies'] = token_policies
|
474
|
+
__args__['tokenTtl'] = token_ttl
|
475
|
+
__args__['tokenType'] = token_type
|
476
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
477
|
+
__ret__ = pulumi.runtime.invoke_output('vault:gcp/getAuthBackendRole:getAuthBackendRole', __args__, opts=opts, typ=GetAuthBackendRoleResult)
|
478
|
+
return __ret__.apply(lambda __response__: GetAuthBackendRoleResult(
|
479
|
+
backend=pulumi.get(__response__, 'backend'),
|
480
|
+
bound_instance_groups=pulumi.get(__response__, 'bound_instance_groups'),
|
481
|
+
bound_labels=pulumi.get(__response__, 'bound_labels'),
|
482
|
+
bound_projects=pulumi.get(__response__, 'bound_projects'),
|
483
|
+
bound_regions=pulumi.get(__response__, 'bound_regions'),
|
484
|
+
bound_service_accounts=pulumi.get(__response__, 'bound_service_accounts'),
|
485
|
+
bound_zones=pulumi.get(__response__, 'bound_zones'),
|
486
|
+
id=pulumi.get(__response__, 'id'),
|
487
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
488
|
+
role_id=pulumi.get(__response__, 'role_id'),
|
489
|
+
role_name=pulumi.get(__response__, 'role_name'),
|
490
|
+
token_bound_cidrs=pulumi.get(__response__, 'token_bound_cidrs'),
|
491
|
+
token_explicit_max_ttl=pulumi.get(__response__, 'token_explicit_max_ttl'),
|
492
|
+
token_max_ttl=pulumi.get(__response__, 'token_max_ttl'),
|
493
|
+
token_no_default_policy=pulumi.get(__response__, 'token_no_default_policy'),
|
494
|
+
token_num_uses=pulumi.get(__response__, 'token_num_uses'),
|
495
|
+
token_period=pulumi.get(__response__, 'token_period'),
|
496
|
+
token_policies=pulumi.get(__response__, 'token_policies'),
|
497
|
+
token_ttl=pulumi.get(__response__, 'token_ttl'),
|
498
|
+
token_type=pulumi.get(__response__, 'token_type'),
|
499
|
+
type=pulumi.get(__response__, 'type')))
|
pulumi_vault/gcp/outputs.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendArgs', 'SecretBackend']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretImpersonatedAccountArgs', 'SecretImpersonatedAccount']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
from . import outputs
|
12
17
|
from ._inputs import *
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
from . import outputs
|
12
17
|
from ._inputs import *
|
pulumi_vault/generic/endpoint.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['EndpointArgs', 'Endpoint']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -226,9 +231,6 @@ def get_secret(namespace: Optional[str] = None,
|
|
226
231
|
path=pulumi.get(__ret__, 'path'),
|
227
232
|
version=pulumi.get(__ret__, 'version'),
|
228
233
|
with_lease_start_time=pulumi.get(__ret__, 'with_lease_start_time'))
|
229
|
-
|
230
|
-
|
231
|
-
@_utilities.lift_output_func(get_secret)
|
232
234
|
def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
233
235
|
path: Optional[pulumi.Input[str]] = None,
|
234
236
|
version: Optional[pulumi.Input[Optional[int]]] = None,
|
@@ -283,4 +285,22 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
|
283
285
|
Note that storing the `lease_start_time` in the TF state will cause a persistent drift
|
284
286
|
on every `pulumi preview` and will require a `pulumi up`.
|
285
287
|
"""
|
286
|
-
|
288
|
+
__args__ = dict()
|
289
|
+
__args__['namespace'] = namespace
|
290
|
+
__args__['path'] = path
|
291
|
+
__args__['version'] = version
|
292
|
+
__args__['withLeaseStartTime'] = with_lease_start_time
|
293
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
294
|
+
__ret__ = pulumi.runtime.invoke_output('vault:generic/getSecret:getSecret', __args__, opts=opts, typ=GetSecretResult)
|
295
|
+
return __ret__.apply(lambda __response__: GetSecretResult(
|
296
|
+
data=pulumi.get(__response__, 'data'),
|
297
|
+
data_json=pulumi.get(__response__, 'data_json'),
|
298
|
+
id=pulumi.get(__response__, 'id'),
|
299
|
+
lease_duration=pulumi.get(__response__, 'lease_duration'),
|
300
|
+
lease_id=pulumi.get(__response__, 'lease_id'),
|
301
|
+
lease_renewable=pulumi.get(__response__, 'lease_renewable'),
|
302
|
+
lease_start_time=pulumi.get(__response__, 'lease_start_time'),
|
303
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
304
|
+
path=pulumi.get(__response__, 'path'),
|
305
|
+
version=pulumi.get(__response__, 'version'),
|
306
|
+
with_lease_start_time=pulumi.get(__response__, 'with_lease_start_time')))
|
pulumi_vault/generic/secret.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretArgs', 'Secret']
|
pulumi_vault/get_auth_backend.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -183,9 +188,6 @@ def get_auth_backend(namespace: Optional[str] = None,
|
|
183
188
|
namespace=pulumi.get(__ret__, 'namespace'),
|
184
189
|
path=pulumi.get(__ret__, 'path'),
|
185
190
|
type=pulumi.get(__ret__, 'type'))
|
186
|
-
|
187
|
-
|
188
|
-
@_utilities.lift_output_func(get_auth_backend)
|
189
191
|
def get_auth_backend_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
190
192
|
path: Optional[pulumi.Input[str]] = None,
|
191
193
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendResult]:
|
@@ -206,4 +208,19 @@ def get_auth_backend_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
|
|
206
208
|
*Available only for Vault Enterprise*.
|
207
209
|
:param str path: The auth backend mount point.
|
208
210
|
"""
|
209
|
-
|
211
|
+
__args__ = dict()
|
212
|
+
__args__['namespace'] = namespace
|
213
|
+
__args__['path'] = path
|
214
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
215
|
+
__ret__ = pulumi.runtime.invoke_output('vault:index/getAuthBackend:getAuthBackend', __args__, opts=opts, typ=GetAuthBackendResult)
|
216
|
+
return __ret__.apply(lambda __response__: GetAuthBackendResult(
|
217
|
+
accessor=pulumi.get(__response__, 'accessor'),
|
218
|
+
default_lease_ttl_seconds=pulumi.get(__response__, 'default_lease_ttl_seconds'),
|
219
|
+
description=pulumi.get(__response__, 'description'),
|
220
|
+
id=pulumi.get(__response__, 'id'),
|
221
|
+
listing_visibility=pulumi.get(__response__, 'listing_visibility'),
|
222
|
+
local=pulumi.get(__response__, 'local'),
|
223
|
+
max_lease_ttl_seconds=pulumi.get(__response__, 'max_lease_ttl_seconds'),
|
224
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
225
|
+
path=pulumi.get(__response__, 'path'),
|
226
|
+
type=pulumi.get(__response__, 'type')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -125,9 +130,6 @@ def get_auth_backends(namespace: Optional[str] = None,
|
|
125
130
|
namespace=pulumi.get(__ret__, 'namespace'),
|
126
131
|
paths=pulumi.get(__ret__, 'paths'),
|
127
132
|
type=pulumi.get(__ret__, 'type'))
|
128
|
-
|
129
|
-
|
130
|
-
@_utilities.lift_output_func(get_auth_backends)
|
131
133
|
def get_auth_backends_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
132
134
|
type: Optional[pulumi.Input[Optional[str]]] = None,
|
133
135
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendsResult]:
|
@@ -155,4 +157,14 @@ def get_auth_backends_output(namespace: Optional[pulumi.Input[Optional[str]]] =
|
|
155
157
|
*Available only for Vault Enterprise*.
|
156
158
|
:param str type: The name of the auth method type. Allows filtering of backends returned by type.
|
157
159
|
"""
|
158
|
-
|
160
|
+
__args__ = dict()
|
161
|
+
__args__['namespace'] = namespace
|
162
|
+
__args__['type'] = type
|
163
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
164
|
+
__ret__ = pulumi.runtime.invoke_output('vault:index/getAuthBackends:getAuthBackends', __args__, opts=opts, typ=GetAuthBackendsResult)
|
165
|
+
return __ret__.apply(lambda __response__: GetAuthBackendsResult(
|
166
|
+
accessors=pulumi.get(__response__, 'accessors'),
|
167
|
+
id=pulumi.get(__response__, 'id'),
|
168
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
169
|
+
paths=pulumi.get(__response__, 'paths'),
|
170
|
+
type=pulumi.get(__response__, 'type')))
|
pulumi_vault/get_namespace.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -161,9 +166,6 @@ def get_namespace(namespace: Optional[str] = None,
|
|
161
166
|
namespace_id=pulumi.get(__ret__, 'namespace_id'),
|
162
167
|
path=pulumi.get(__ret__, 'path'),
|
163
168
|
path_fq=pulumi.get(__ret__, 'path_fq'))
|
164
|
-
|
165
|
-
|
166
|
-
@_utilities.lift_output_func(get_namespace)
|
167
169
|
def get_namespace_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
168
170
|
path: Optional[pulumi.Input[Optional[str]]] = None,
|
169
171
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNamespaceResult]:
|
@@ -210,4 +212,15 @@ def get_namespace_output(namespace: Optional[pulumi.Input[Optional[str]]] = None
|
|
210
212
|
based on the `namespace` arguments of the provider and this data source.
|
211
213
|
Other path related attributes will be empty in this case.
|
212
214
|
"""
|
213
|
-
|
215
|
+
__args__ = dict()
|
216
|
+
__args__['namespace'] = namespace
|
217
|
+
__args__['path'] = path
|
218
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
219
|
+
__ret__ = pulumi.runtime.invoke_output('vault:index/getNamespace:getNamespace', __args__, opts=opts, typ=GetNamespaceResult)
|
220
|
+
return __ret__.apply(lambda __response__: GetNamespaceResult(
|
221
|
+
custom_metadata=pulumi.get(__response__, 'custom_metadata'),
|
222
|
+
id=pulumi.get(__response__, 'id'),
|
223
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
224
|
+
namespace_id=pulumi.get(__response__, 'namespace_id'),
|
225
|
+
path=pulumi.get(__response__, 'path'),
|
226
|
+
path_fq=pulumi.get(__response__, 'path_fq')))
|
pulumi_vault/get_namespaces.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -106,9 +111,6 @@ def get_namespaces(namespace: Optional[str] = None,
|
|
106
111
|
id=pulumi.get(__ret__, 'id'),
|
107
112
|
namespace=pulumi.get(__ret__, 'namespace'),
|
108
113
|
paths=pulumi.get(__ret__, 'paths'))
|
109
|
-
|
110
|
-
|
111
|
-
@_utilities.lift_output_func(get_namespaces)
|
112
114
|
def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
113
115
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNamespacesResult]:
|
114
116
|
"""
|
@@ -141,4 +143,11 @@ def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[str]]] = Non
|
|
141
143
|
The value should not contain leading or trailing forward slashes.
|
142
144
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
143
145
|
"""
|
144
|
-
|
146
|
+
__args__ = dict()
|
147
|
+
__args__['namespace'] = namespace
|
148
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
149
|
+
__ret__ = pulumi.runtime.invoke_output('vault:index/getNamespaces:getNamespaces', __args__, opts=opts, typ=GetNamespacesResult)
|
150
|
+
return __ret__.apply(lambda __response__: GetNamespacesResult(
|
151
|
+
id=pulumi.get(__response__, 'id'),
|
152
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
153
|
+
paths=pulumi.get(__response__, 'paths')))
|