pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,331 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+
6
+ import asyncio
7
+ import functools
8
+ import importlib.metadata
9
+ import importlib.util
10
+ import inspect
11
+ import json
12
+ import os
13
+ import sys
14
+ import typing
15
+ import warnings
16
+ import base64
17
+
18
+ import pulumi
19
+ import pulumi.runtime
20
+ from pulumi.runtime.sync_await import _sync_await
21
+ from pulumi.runtime.proto import resource_pb2
22
+
23
+ from semver import VersionInfo as SemverVersion
24
+ from parver import Version as PEP440Version
25
+
26
+ C = typing.TypeVar("C", bound=typing.Callable)
27
+
28
+
29
+ def get_env(*args):
30
+ for v in args:
31
+ value = os.getenv(v)
32
+ if value is not None:
33
+ return value
34
+ return None
35
+
36
+
37
+ def get_env_bool(*args):
38
+ str = get_env(*args)
39
+ if str is not None:
40
+ # NOTE: these values are taken from https://golang.org/src/strconv/atob.go?s=351:391#L1, which is what
41
+ # Terraform uses internally when parsing boolean values.
42
+ if str in ["1", "t", "T", "true", "TRUE", "True"]:
43
+ return True
44
+ if str in ["0", "f", "F", "false", "FALSE", "False"]:
45
+ return False
46
+ return None
47
+
48
+
49
+ def get_env_int(*args):
50
+ str = get_env(*args)
51
+ if str is not None:
52
+ try:
53
+ return int(str)
54
+ except:
55
+ return None
56
+ return None
57
+
58
+
59
+ def get_env_float(*args):
60
+ str = get_env(*args)
61
+ if str is not None:
62
+ try:
63
+ return float(str)
64
+ except:
65
+ return None
66
+ return None
67
+
68
+
69
+ def _get_semver_version():
70
+ # __name__ is set to the fully-qualified name of the current module, In our case, it will be
71
+ # <some module>._utilities. <some module> is the module we want to query the version for.
72
+ root_package, *rest = __name__.split('.')
73
+
74
+ # pkg_resources uses setuptools to inspect the set of installed packages. We use it here to ask
75
+ # for the currently installed version of the root package (i.e. us) and get its version.
76
+
77
+ # Unfortunately, PEP440 and semver differ slightly in incompatible ways. The Pulumi engine expects
78
+ # to receive a valid semver string when receiving requests from the language host, so it's our
79
+ # responsibility as the library to convert our own PEP440 version into a valid semver string.
80
+
81
+ pep440_version_string = importlib.metadata.version(root_package)
82
+ pep440_version = PEP440Version.parse(pep440_version_string)
83
+ (major, minor, patch) = pep440_version.release
84
+ prerelease = None
85
+ if pep440_version.pre_tag == 'a':
86
+ prerelease = f"alpha.{pep440_version.pre}"
87
+ elif pep440_version.pre_tag == 'b':
88
+ prerelease = f"beta.{pep440_version.pre}"
89
+ elif pep440_version.pre_tag == 'rc':
90
+ prerelease = f"rc.{pep440_version.pre}"
91
+ elif pep440_version.dev is not None:
92
+ # PEP440 has explicit support for dev builds, while semver encodes them as "prerelease" versions. To bridge
93
+ # between the two, we convert our dev build version into a prerelease tag. This matches what all of our other
94
+ # packages do when constructing their own semver string.
95
+ prerelease = f"dev.{pep440_version.dev}"
96
+ elif pep440_version.local is not None:
97
+ # PEP440 only allows a small set of prerelease tags, so when converting an arbitrary prerelease,
98
+ # PypiVersion in /pkg/codegen/python/utilities.go converts it to a local version. Therefore, we need to
99
+ # do the reverse conversion here and set the local version as the prerelease tag.
100
+ prerelease = pep440_version.local
101
+
102
+ return SemverVersion(major=major, minor=minor, patch=patch, prerelease=prerelease)
103
+
104
+
105
+ # Determine the version once and cache the value, which measurably improves program performance.
106
+ _version = _get_semver_version()
107
+ _version_str = str(_version)
108
+
109
+ def get_resource_opts_defaults() -> pulumi.ResourceOptions:
110
+ return pulumi.ResourceOptions(
111
+ version=get_version(),
112
+ plugin_download_url=get_plugin_download_url(),
113
+ )
114
+
115
+ def get_invoke_opts_defaults() -> pulumi.InvokeOptions:
116
+ return pulumi.InvokeOptions(
117
+ version=get_version(),
118
+ plugin_download_url=get_plugin_download_url(),
119
+ )
120
+
121
+ def get_resource_args_opts(resource_args_type, resource_options_type, *args, **kwargs):
122
+ """
123
+ Return the resource args and options given the *args and **kwargs of a resource's
124
+ __init__ method.
125
+ """
126
+
127
+ resource_args, opts = None, None
128
+
129
+ # If the first item is the resource args type, save it and remove it from the args list.
130
+ if args and isinstance(args[0], resource_args_type):
131
+ resource_args, args = args[0], args[1:]
132
+
133
+ # Now look at the first item in the args list again.
134
+ # If the first item is the resource options class, save it.
135
+ if args and isinstance(args[0], resource_options_type):
136
+ opts = args[0]
137
+
138
+ # If resource_args is None, see if "args" is in kwargs, and, if so, if it's typed as the
139
+ # the resource args type.
140
+ if resource_args is None:
141
+ a = kwargs.get("args")
142
+ if isinstance(a, resource_args_type):
143
+ resource_args = a
144
+
145
+ # If opts is None, look it up in kwargs.
146
+ if opts is None:
147
+ opts = kwargs.get("opts")
148
+
149
+ return resource_args, opts
150
+
151
+
152
+ # Temporary: just use pulumi._utils.lazy_import once everyone upgrades.
153
+ def lazy_import(fullname):
154
+
155
+ import pulumi._utils as u
156
+ f = getattr(u, 'lazy_import', None)
157
+ if f is None:
158
+ f = _lazy_import_temp
159
+
160
+ return f(fullname)
161
+
162
+
163
+ # Copied from pulumi._utils.lazy_import, see comments there.
164
+ def _lazy_import_temp(fullname):
165
+ m = sys.modules.get(fullname, None)
166
+ if m is not None:
167
+ return m
168
+
169
+ spec = importlib.util.find_spec(fullname)
170
+
171
+ m = sys.modules.get(fullname, None)
172
+ if m is not None:
173
+ return m
174
+
175
+ loader = importlib.util.LazyLoader(spec.loader)
176
+ spec.loader = loader
177
+ module = importlib.util.module_from_spec(spec)
178
+
179
+ m = sys.modules.get(fullname, None)
180
+ if m is not None:
181
+ return m
182
+
183
+ sys.modules[fullname] = module
184
+ loader.exec_module(module)
185
+ return module
186
+
187
+
188
+ class Package(pulumi.runtime.ResourcePackage):
189
+ def __init__(self, pkg_info):
190
+ super().__init__()
191
+ self.pkg_info = pkg_info
192
+
193
+ def version(self):
194
+ return _version
195
+
196
+ def construct_provider(self, name: str, typ: str, urn: str) -> pulumi.ProviderResource:
197
+ if typ != self.pkg_info['token']:
198
+ raise Exception(f"unknown provider type {typ}")
199
+ Provider = getattr(lazy_import(self.pkg_info['fqn']), self.pkg_info['class'])
200
+ return Provider(name, pulumi.ResourceOptions(urn=urn))
201
+
202
+
203
+ class Module(pulumi.runtime.ResourceModule):
204
+ def __init__(self, mod_info):
205
+ super().__init__()
206
+ self.mod_info = mod_info
207
+
208
+ def version(self):
209
+ return _version
210
+
211
+ def construct(self, name: str, typ: str, urn: str) -> pulumi.Resource:
212
+ class_name = self.mod_info['classes'].get(typ, None)
213
+
214
+ if class_name is None:
215
+ raise Exception(f"unknown resource type {typ}")
216
+
217
+ TheClass = getattr(lazy_import(self.mod_info['fqn']), class_name)
218
+ return TheClass(name, pulumi.ResourceOptions(urn=urn))
219
+
220
+
221
+ def register(resource_modules, resource_packages):
222
+ resource_modules = json.loads(resource_modules)
223
+ resource_packages = json.loads(resource_packages)
224
+
225
+ for pkg_info in resource_packages:
226
+ pulumi.runtime.register_resource_package(pkg_info['pkg'], Package(pkg_info))
227
+
228
+ for mod_info in resource_modules:
229
+ pulumi.runtime.register_resource_module(
230
+ mod_info['pkg'],
231
+ mod_info['mod'],
232
+ Module(mod_info))
233
+
234
+
235
+ _F = typing.TypeVar('_F', bound=typing.Callable[..., typing.Any])
236
+
237
+
238
+ def lift_output_func(func: typing.Any) -> typing.Callable[[_F], _F]:
239
+ """Decorator internally used on {fn}_output lifted function versions
240
+ to implement them automatically from the un-lifted function."""
241
+
242
+ func_sig = inspect.signature(func)
243
+
244
+ def lifted_func(*args, opts=None, **kwargs):
245
+ bound_args = func_sig.bind(*args, **kwargs)
246
+ # Convert tuple to list, see pulumi/pulumi#8172
247
+ args_list = list(bound_args.args)
248
+ return pulumi.Output.from_input({
249
+ 'args': args_list,
250
+ 'kwargs': bound_args.kwargs
251
+ }).apply(lambda resolved_args: func(*resolved_args['args'],
252
+ opts=opts,
253
+ **resolved_args['kwargs']))
254
+
255
+ return (lambda _: lifted_func)
256
+
257
+
258
+ def call_plain(
259
+ tok: str,
260
+ props: pulumi.Inputs,
261
+ res: typing.Optional[pulumi.Resource] = None,
262
+ typ: typing.Optional[type] = None,
263
+ ) -> typing.Any:
264
+ """
265
+ Wraps pulumi.runtime.plain to force the output and return it plainly.
266
+ """
267
+
268
+ output = pulumi.runtime.call(tok, props, res, typ)
269
+
270
+ # Ingoring deps silently. They are typically non-empty, r.f() calls include r as a dependency.
271
+ result, known, secret, _ = _sync_await(asyncio.create_task(_await_output(output)))
272
+
273
+ problem = None
274
+ if not known:
275
+ problem = ' an unknown value'
276
+ elif secret:
277
+ problem = ' a secret value'
278
+
279
+ if problem:
280
+ raise AssertionError(
281
+ f"Plain resource method '{tok}' incorrectly returned {problem}. "
282
+ + "This is an error in the provider, please report this to the provider developer."
283
+ )
284
+
285
+ return result
286
+
287
+
288
+ async def _await_output(o: pulumi.Output[typing.Any]) -> typing.Tuple[object, bool, bool, set]:
289
+ return (
290
+ await o._future,
291
+ await o._is_known,
292
+ await o._is_secret,
293
+ await o._resources,
294
+ )
295
+
296
+
297
+ # This is included to provide an upgrade path for users who are using a version
298
+ # of the Pulumi SDK (<3.121.0) that does not include the `deprecated` decorator.
299
+ def deprecated(message: str) -> typing.Callable[[C], C]:
300
+ """
301
+ Decorator to indicate a function is deprecated.
302
+
303
+ As well as inserting appropriate statements to indicate that the function is
304
+ deprecated, this decorator also tags the function with a special attribute
305
+ so that Pulumi code can detect that it is deprecated and react appropriately
306
+ in certain situations.
307
+
308
+ message is the deprecation message that should be printed if the function is called.
309
+ """
310
+
311
+ def decorator(fn: C) -> C:
312
+ if not callable(fn):
313
+ raise TypeError("Expected fn to be callable")
314
+
315
+ @functools.wraps(fn)
316
+ def deprecated_fn(*args, **kwargs):
317
+ warnings.warn(message)
318
+ pulumi.warn(f"{fn.__name__} is deprecated: {message}")
319
+
320
+ return fn(*args, **kwargs)
321
+
322
+ deprecated_fn.__dict__["_pulumi_deprecated_callable"] = fn
323
+ return typing.cast(C, deprecated_fn)
324
+
325
+ return decorator
326
+
327
+ def get_plugin_download_url():
328
+ return None
329
+
330
+ def get_version():
331
+ return _version_str
@@ -0,0 +1,12 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ from .. import _utilities
7
+ import typing
8
+ # Export this package's modules as members:
9
+ from .get_access_credentials import *
10
+ from .secret_backend import *
11
+ from .secret_library import *
12
+ from .secret_role import *
@@ -0,0 +1,177 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = [
18
+ 'GetAccessCredentialsResult',
19
+ 'AwaitableGetAccessCredentialsResult',
20
+ 'get_access_credentials',
21
+ 'get_access_credentials_output',
22
+ ]
23
+
24
+ @pulumi.output_type
25
+ class GetAccessCredentialsResult:
26
+ """
27
+ A collection of values returned by getAccessCredentials.
28
+ """
29
+ def __init__(__self__, backend=None, current_password=None, id=None, last_password=None, namespace=None, role=None, username=None):
30
+ if backend and not isinstance(backend, str):
31
+ raise TypeError("Expected argument 'backend' to be a str")
32
+ pulumi.set(__self__, "backend", backend)
33
+ if current_password and not isinstance(current_password, str):
34
+ raise TypeError("Expected argument 'current_password' to be a str")
35
+ pulumi.set(__self__, "current_password", current_password)
36
+ if id and not isinstance(id, str):
37
+ raise TypeError("Expected argument 'id' to be a str")
38
+ pulumi.set(__self__, "id", id)
39
+ if last_password and not isinstance(last_password, str):
40
+ raise TypeError("Expected argument 'last_password' to be a str")
41
+ pulumi.set(__self__, "last_password", last_password)
42
+ if namespace and not isinstance(namespace, str):
43
+ raise TypeError("Expected argument 'namespace' to be a str")
44
+ pulumi.set(__self__, "namespace", namespace)
45
+ if role and not isinstance(role, str):
46
+ raise TypeError("Expected argument 'role' to be a str")
47
+ pulumi.set(__self__, "role", role)
48
+ if username and not isinstance(username, str):
49
+ raise TypeError("Expected argument 'username' to be a str")
50
+ pulumi.set(__self__, "username", username)
51
+
52
+ @_builtins.property
53
+ @pulumi.getter
54
+ def backend(self) -> _builtins.str:
55
+ return pulumi.get(self, "backend")
56
+
57
+ @_builtins.property
58
+ @pulumi.getter(name="currentPassword")
59
+ def current_password(self) -> _builtins.str:
60
+ """
61
+ The current set password on the Active Directory service account.
62
+ """
63
+ return pulumi.get(self, "current_password")
64
+
65
+ @_builtins.property
66
+ @pulumi.getter
67
+ def id(self) -> _builtins.str:
68
+ """
69
+ The provider-assigned unique ID for this managed resource.
70
+ """
71
+ return pulumi.get(self, "id")
72
+
73
+ @_builtins.property
74
+ @pulumi.getter(name="lastPassword")
75
+ def last_password(self) -> _builtins.str:
76
+ """
77
+ The current set password on the Active Directory service account, provided because AD is eventually consistent.
78
+ """
79
+ return pulumi.get(self, "last_password")
80
+
81
+ @_builtins.property
82
+ @pulumi.getter
83
+ def namespace(self) -> Optional[_builtins.str]:
84
+ return pulumi.get(self, "namespace")
85
+
86
+ @_builtins.property
87
+ @pulumi.getter
88
+ def role(self) -> _builtins.str:
89
+ return pulumi.get(self, "role")
90
+
91
+ @_builtins.property
92
+ @pulumi.getter
93
+ def username(self) -> _builtins.str:
94
+ """
95
+ The Active Directory service account username.
96
+ """
97
+ return pulumi.get(self, "username")
98
+
99
+
100
+ class AwaitableGetAccessCredentialsResult(GetAccessCredentialsResult):
101
+ # pylint: disable=using-constant-test
102
+ def __await__(self):
103
+ if False:
104
+ yield self
105
+ return GetAccessCredentialsResult(
106
+ backend=self.backend,
107
+ current_password=self.current_password,
108
+ id=self.id,
109
+ last_password=self.last_password,
110
+ namespace=self.namespace,
111
+ role=self.role,
112
+ username=self.username)
113
+
114
+
115
+ def get_access_credentials(backend: Optional[_builtins.str] = None,
116
+ namespace: Optional[_builtins.str] = None,
117
+ role: Optional[_builtins.str] = None,
118
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetAccessCredentialsResult:
119
+ """
120
+ ## Example Usage
121
+
122
+
123
+ :param _builtins.str backend: The path to the AD secret backend to
124
+ read credentials from, with no leading or trailing `/`s.
125
+ :param _builtins.str namespace: The namespace of the target resource.
126
+ The value should not contain leading or trailing forward slashes.
127
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
128
+ *Available only for Vault Enterprise*.
129
+ :param _builtins.str role: The name of the AD secret backend role to read
130
+ credentials from, with no leading or trailing `/`s.
131
+ """
132
+ __args__ = dict()
133
+ __args__['backend'] = backend
134
+ __args__['namespace'] = namespace
135
+ __args__['role'] = role
136
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
137
+ __ret__ = pulumi.runtime.invoke('vault:ad/getAccessCredentials:getAccessCredentials', __args__, opts=opts, typ=GetAccessCredentialsResult).value
138
+
139
+ return AwaitableGetAccessCredentialsResult(
140
+ backend=pulumi.get(__ret__, 'backend'),
141
+ current_password=pulumi.get(__ret__, 'current_password'),
142
+ id=pulumi.get(__ret__, 'id'),
143
+ last_password=pulumi.get(__ret__, 'last_password'),
144
+ namespace=pulumi.get(__ret__, 'namespace'),
145
+ role=pulumi.get(__ret__, 'role'),
146
+ username=pulumi.get(__ret__, 'username'))
147
+ def get_access_credentials_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
148
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
149
+ role: Optional[pulumi.Input[_builtins.str]] = None,
150
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAccessCredentialsResult]:
151
+ """
152
+ ## Example Usage
153
+
154
+
155
+ :param _builtins.str backend: The path to the AD secret backend to
156
+ read credentials from, with no leading or trailing `/`s.
157
+ :param _builtins.str namespace: The namespace of the target resource.
158
+ The value should not contain leading or trailing forward slashes.
159
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
160
+ *Available only for Vault Enterprise*.
161
+ :param _builtins.str role: The name of the AD secret backend role to read
162
+ credentials from, with no leading or trailing `/`s.
163
+ """
164
+ __args__ = dict()
165
+ __args__['backend'] = backend
166
+ __args__['namespace'] = namespace
167
+ __args__['role'] = role
168
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
169
+ __ret__ = pulumi.runtime.invoke_output('vault:ad/getAccessCredentials:getAccessCredentials', __args__, opts=opts, typ=GetAccessCredentialsResult)
170
+ return __ret__.apply(lambda __response__: GetAccessCredentialsResult(
171
+ backend=pulumi.get(__response__, 'backend'),
172
+ current_password=pulumi.get(__response__, 'current_password'),
173
+ id=pulumi.get(__response__, 'id'),
174
+ last_password=pulumi.get(__response__, 'last_password'),
175
+ namespace=pulumi.get(__response__, 'namespace'),
176
+ role=pulumi.get(__response__, 'role'),
177
+ username=pulumi.get(__response__, 'username')))