From 20e362d78d88137c1b5bc963c18b083cfed2435d Mon Sep 17 00:00:00 2001 From: Pulumi Bot <30351955+pulumi-bot@users.noreply.github.com> Date: Fri, 11 Oct 2024 01:48:00 -0700 Subject: [PATCH] Upgrade pulumi-terraform-bridge to v3.92.0 (#620) This PR was generated via `$ upgrade-provider pulumi/pulumi-vault --kind=bridge --pr-reviewers=iwahbe`. --- - Upgrading pulumi-terraform-bridge from v3.91.1 to v3.92.0. --------- Co-authored-by: Ian Wahbe --- examples/go.mod | 4 +- examples/go.sum | 8 +- .../cmd/pulumi-resource-vault/schema.json | 10 +- provider/go.mod | 10 +- provider/go.sum | 20 +- provider/provider_program_test.go | 56 +- sdk/go.mod | 2 +- sdk/go.sum | 4 +- sdk/go/vault/getAuthBackends.go | 2 +- sdk/go/vault/getNamespace.go | 2 +- sdk/go/vault/getNamespaces.go | 2 +- sdk/go/vault/getRaftAutopilotState.go | 2 +- sdk/go/vault/raftSnapshotAgentConfig.go | 2 +- sdk/nodejs/package.json | 2 +- sdk/python/pulumi_vault/_inputs.py | 560 +++++ sdk/python/pulumi_vault/_utilities.py | 2 +- .../pulumi_vault/ad/get_access_credentials.py | 23 +- sdk/python/pulumi_vault/ad/secret_backend.py | 5 + sdk/python/pulumi_vault/ad/secret_library.py | 5 + sdk/python/pulumi_vault/ad/secret_role.py | 5 + .../alicloud/auth_backend_role.py | 5 + .../approle/auth_backend_login.py | 5 + .../pulumi_vault/approle/auth_backend_role.py | 5 + .../approle/auth_backend_role_secret_id.py | 5 + .../approle/get_auth_backend_role_id.py | 21 +- sdk/python/pulumi_vault/audit.py | 5 + .../pulumi_vault/audit_request_header.py | 5 + sdk/python/pulumi_vault/auth_backend.py | 5 + .../pulumi_vault/aws/auth_backend_cert.py | 5 + .../pulumi_vault/aws/auth_backend_client.py | 5 + .../aws/auth_backend_config_identity.py | 5 + .../aws/auth_backend_identity_whitelist.py | 5 + .../pulumi_vault/aws/auth_backend_login.py | 5 + .../pulumi_vault/aws/auth_backend_role.py | 5 + .../pulumi_vault/aws/auth_backend_role_tag.py | 5 + .../aws/auth_backend_roletag_blacklist.py | 5 + .../pulumi_vault/aws/auth_backend_sts_role.py | 5 + .../aws/get_access_credentials.py | 35 +- .../aws/get_static_access_credentials.py | 22 +- sdk/python/pulumi_vault/aws/secret_backend.py | 5 + .../pulumi_vault/aws/secret_backend_role.py | 5 + .../aws/secret_backend_static_role.py | 5 + sdk/python/pulumi_vault/azure/_inputs.py | 24 + .../pulumi_vault/azure/auth_backend_config.py | 5 + .../pulumi_vault/azure/auth_backend_role.py | 5 + sdk/python/pulumi_vault/azure/backend.py | 5 + sdk/python/pulumi_vault/azure/backend_role.py | 5 + .../azure/get_access_credentials.py | 40 +- sdk/python/pulumi_vault/azure/outputs.py | 5 + .../pulumi_vault/cert_auth_backend_role.py | 5 + sdk/python/pulumi_vault/config/__init__.pyi | 5 + sdk/python/pulumi_vault/config/_inputs.py | 21 + sdk/python/pulumi_vault/config/outputs.py | 5 + .../pulumi_vault/config/ui_custom_message.py | 5 + sdk/python/pulumi_vault/config/vars.py | 5 + .../pulumi_vault/consul/secret_backend.py | 5 + .../consul/secret_backend_role.py | 5 + sdk/python/pulumi_vault/database/_inputs.py | 2087 ++++++++++++++++- sdk/python/pulumi_vault/database/outputs.py | 5 + .../database/secret_backend_connection.py | 5 + .../database/secret_backend_role.py | 5 + .../database/secret_backend_static_role.py | 5 + .../pulumi_vault/database/secrets_mount.py | 5 + sdk/python/pulumi_vault/egp_policy.py | 5 + sdk/python/pulumi_vault/gcp/_inputs.py | 111 + sdk/python/pulumi_vault/gcp/auth_backend.py | 5 + .../pulumi_vault/gcp/auth_backend_role.py | 5 + .../pulumi_vault/gcp/get_auth_backend_role.py | 46 +- sdk/python/pulumi_vault/gcp/outputs.py | 5 + sdk/python/pulumi_vault/gcp/secret_backend.py | 5 + .../gcp/secret_impersonated_account.py | 5 + sdk/python/pulumi_vault/gcp/secret_roleset.py | 5 + .../pulumi_vault/gcp/secret_static_account.py | 5 + sdk/python/pulumi_vault/generic/endpoint.py | 5 + sdk/python/pulumi_vault/generic/get_secret.py | 28 +- sdk/python/pulumi_vault/generic/secret.py | 5 + sdk/python/pulumi_vault/get_auth_backend.py | 25 +- sdk/python/pulumi_vault/get_auth_backends.py | 20 +- sdk/python/pulumi_vault/get_namespace.py | 21 +- sdk/python/pulumi_vault/get_namespaces.py | 17 +- .../pulumi_vault/get_nomad_access_token.py | 22 +- .../pulumi_vault/get_policy_document.py | 19 +- .../pulumi_vault/get_raft_autopilot_state.py | 27 +- sdk/python/pulumi_vault/github/_inputs.py | 55 + .../pulumi_vault/github/auth_backend.py | 5 + sdk/python/pulumi_vault/github/outputs.py | 5 + sdk/python/pulumi_vault/github/team.py | 5 + sdk/python/pulumi_vault/github/user.py | 5 + sdk/python/pulumi_vault/identity/entity.py | 5 + .../pulumi_vault/identity/entity_alias.py | 5 + .../pulumi_vault/identity/entity_policies.py | 5 + .../pulumi_vault/identity/get_entity.py | 38 +- sdk/python/pulumi_vault/identity/get_group.py | 44 +- .../identity/get_oidc_client_creds.py | 20 +- .../identity/get_oidc_openid_config.py | 30 +- .../identity/get_oidc_public_keys.py | 19 +- sdk/python/pulumi_vault/identity/group.py | 5 + .../pulumi_vault/identity/group_alias.py | 5 + .../identity/group_member_entity_ids.py | 5 + .../identity/group_member_group_ids.py | 5 + .../pulumi_vault/identity/group_policies.py | 5 + sdk/python/pulumi_vault/identity/mfa_duo.py | 5 + .../identity/mfa_login_enforcement.py | 5 + sdk/python/pulumi_vault/identity/mfa_okta.py | 5 + .../pulumi_vault/identity/mfa_pingid.py | 5 + sdk/python/pulumi_vault/identity/mfa_totp.py | 5 + sdk/python/pulumi_vault/identity/oidc.py | 5 + .../pulumi_vault/identity/oidc_assignment.py | 5 + .../pulumi_vault/identity/oidc_client.py | 5 + sdk/python/pulumi_vault/identity/oidc_key.py | 5 + .../identity/oidc_key_allowed_client_id.py | 5 + .../pulumi_vault/identity/oidc_provider.py | 5 + sdk/python/pulumi_vault/identity/oidc_role.py | 5 + .../pulumi_vault/identity/oidc_scope.py | 5 + sdk/python/pulumi_vault/identity/outputs.py | 5 + sdk/python/pulumi_vault/jwt/_inputs.py | 55 + sdk/python/pulumi_vault/jwt/auth_backend.py | 5 + .../pulumi_vault/jwt/auth_backend_role.py | 5 + sdk/python/pulumi_vault/jwt/outputs.py | 5 + .../pulumi_vault/kmip/secret_backend.py | 5 + sdk/python/pulumi_vault/kmip/secret_role.py | 5 + sdk/python/pulumi_vault/kmip/secret_scope.py | 5 + .../kubernetes/auth_backend_config.py | 5 + .../kubernetes/auth_backend_role.py | 5 + .../kubernetes/get_auth_backend_config.py | 30 +- .../kubernetes/get_auth_backend_role.py | 43 +- .../kubernetes/get_service_account_token.py | 32 +- .../pulumi_vault/kubernetes/secret_backend.py | 5 + .../kubernetes/secret_backend_role.py | 5 + sdk/python/pulumi_vault/kv/_inputs.py | 32 + sdk/python/pulumi_vault/kv/get_secret.py | 23 +- .../pulumi_vault/kv/get_secret_subkeys_v2.py | 27 +- sdk/python/pulumi_vault/kv/get_secret_v2.py | 29 +- .../pulumi_vault/kv/get_secrets_list.py | 19 +- .../pulumi_vault/kv/get_secrets_list_v2.py | 22 +- sdk/python/pulumi_vault/kv/outputs.py | 5 + sdk/python/pulumi_vault/kv/secret.py | 5 + .../pulumi_vault/kv/secret_backend_v2.py | 5 + sdk/python/pulumi_vault/kv/secret_v2.py | 5 + sdk/python/pulumi_vault/ldap/auth_backend.py | 5 + .../pulumi_vault/ldap/auth_backend_group.py | 5 + .../pulumi_vault/ldap/auth_backend_user.py | 5 + .../ldap/get_dynamic_credentials.py | 26 +- .../ldap/get_static_credentials.py | 27 +- .../pulumi_vault/ldap/secret_backend.py | 5 + .../ldap/secret_backend_dynamic_role.py | 5 + .../ldap/secret_backend_library_set.py | 5 + .../ldap/secret_backend_static_role.py | 5 + sdk/python/pulumi_vault/managed/_inputs.py | 205 ++ sdk/python/pulumi_vault/managed/keys.py | 5 + sdk/python/pulumi_vault/managed/outputs.py | 5 + sdk/python/pulumi_vault/mfa_duo.py | 5 + sdk/python/pulumi_vault/mfa_okta.py | 5 + sdk/python/pulumi_vault/mfa_pingid.py | 5 + sdk/python/pulumi_vault/mfa_totp.py | 5 + .../mongodbatlas/secret_backend.py | 5 + .../pulumi_vault/mongodbatlas/secret_role.py | 5 + sdk/python/pulumi_vault/mount.py | 5 + sdk/python/pulumi_vault/namespace.py | 5 + .../pulumi_vault/nomad_secret_backend.py | 5 + sdk/python/pulumi_vault/nomad_secret_role.py | 5 + sdk/python/pulumi_vault/okta/_inputs.py | 39 + sdk/python/pulumi_vault/okta/auth_backend.py | 5 + .../pulumi_vault/okta/auth_backend_group.py | 5 + .../pulumi_vault/okta/auth_backend_user.py | 5 + sdk/python/pulumi_vault/okta/outputs.py | 5 + sdk/python/pulumi_vault/outputs.py | 5 + sdk/python/pulumi_vault/password_policy.py | 5 + sdk/python/pulumi_vault/pkisecret/_inputs.py | 41 + .../pkisecret/backend_config_cluster.py | 5 + .../pkisecret/backend_config_est.py | 5 + .../pkisecret/get_backend_config_est.py | 26 +- .../pkisecret/get_backend_issuer.py | 28 +- .../pkisecret/get_backend_issuers.py | 21 +- .../pulumi_vault/pkisecret/get_backend_key.py | 23 +- .../pkisecret/get_backend_keys.py | 21 +- sdk/python/pulumi_vault/pkisecret/outputs.py | 5 + .../pkisecret/secret_backend_cert.py | 5 + .../pkisecret/secret_backend_config_ca.py | 5 + .../secret_backend_config_issuers.py | 5 + .../pkisecret/secret_backend_config_urls.py | 5 + .../pkisecret/secret_backend_crl_config.py | 5 + ...ecret_backend_intermediate_cert_request.py | 5 + .../secret_backend_intermediate_set_signed.py | 5 + .../pkisecret/secret_backend_issuer.py | 5 + .../pkisecret/secret_backend_key.py | 5 + .../pkisecret/secret_backend_role.py | 5 + .../pkisecret/secret_backend_root_cert.py | 5 + .../secret_backend_root_sign_intermediate.py | 5 + .../pkisecret/secret_backend_sign.py | 5 + sdk/python/pulumi_vault/plugin.py | 5 + .../pulumi_vault/plugin_pinned_version.py | 5 + sdk/python/pulumi_vault/policy.py | 5 + sdk/python/pulumi_vault/provider.py | 5 + sdk/python/pulumi_vault/quota_lease_count.py | 5 + sdk/python/pulumi_vault/quota_rate_limit.py | 5 + sdk/python/pulumi_vault/rabbitmq/_inputs.py | 61 + sdk/python/pulumi_vault/rabbitmq/outputs.py | 5 + .../pulumi_vault/rabbitmq/secret_backend.py | 5 + .../rabbitmq/secret_backend_role.py | 5 + sdk/python/pulumi_vault/raft_autopilot.py | 5 + .../raft_snapshot_agent_config.py | 5 + sdk/python/pulumi_vault/rgp_policy.py | 5 + sdk/python/pulumi_vault/saml/auth_backend.py | 5 + .../pulumi_vault/saml/auth_backend_role.py | 5 + sdk/python/pulumi_vault/secrets/_inputs.py | 30 + sdk/python/pulumi_vault/secrets/outputs.py | 5 + .../pulumi_vault/secrets/sync_association.py | 5 + .../secrets/sync_aws_destination.py | 5 + .../secrets/sync_azure_destination.py | 5 + .../pulumi_vault/secrets/sync_config.py | 5 + .../secrets/sync_gcp_destination.py | 5 + .../secrets/sync_gh_destination.py | 5 + .../pulumi_vault/secrets/sync_github_apps.py | 5 + .../secrets/sync_vercel_destination.py | 5 + sdk/python/pulumi_vault/ssh/_inputs.py | 22 + sdk/python/pulumi_vault/ssh/outputs.py | 5 + .../pulumi_vault/ssh/secret_backend_ca.py | 5 + .../pulumi_vault/ssh/secret_backend_role.py | 5 + .../terraformcloud/secret_backend.py | 5 + .../terraformcloud/secret_creds.py | 5 + .../terraformcloud/secret_role.py | 5 + sdk/python/pulumi_vault/token.py | 5 + .../tokenauth/auth_backend_role.py | 5 + sdk/python/pulumi_vault/transform/alphabet.py | 5 + .../pulumi_vault/transform/get_decode.py | 32 +- .../pulumi_vault/transform/get_encode.py | 32 +- sdk/python/pulumi_vault/transform/role.py | 5 + sdk/python/pulumi_vault/transform/template.py | 5 + .../pulumi_vault/transform/transformation.py | 5 + .../pulumi_vault/transit/get_decrypt.py | 25 +- .../pulumi_vault/transit/get_encrypt.py | 27 +- .../transit/secret_backend_key.py | 5 + .../transit/secret_cache_config.py | 5 + sdk/python/pyproject.toml | 2 +- 235 files changed, 5030 insertions(+), 308 deletions(-) diff --git a/examples/go.mod b/examples/go.mod index 4099d8380..92001e80b 100644 --- a/examples/go.mod +++ b/examples/go.mod @@ -2,7 +2,7 @@ module github.com/pulumi/pulumi-vault/examples/v6 go 1.21 -require github.com/pulumi/pulumi/pkg/v3 v3.133.0 +require github.com/pulumi/pulumi/pkg/v3 v3.136.1 require ( cloud.google.com/go v0.112.1 // indirect @@ -123,7 +123,7 @@ require ( github.com/pmezard/go-difflib v1.0.0 // indirect github.com/pulumi/appdash v0.0.0-20231130102222-75f619a67231 // indirect github.com/pulumi/esc v0.10.0 // indirect - github.com/pulumi/pulumi/sdk/v3 v3.133.0 // indirect + github.com/pulumi/pulumi/sdk/v3 v3.136.1 // indirect github.com/rivo/uniseg v0.4.4 // indirect github.com/rogpeppe/go-internal v1.12.0 // indirect github.com/ryanuber/go-glob v1.0.0 // indirect diff --git a/examples/go.sum b/examples/go.sum index 3cbb21d73..408d628c7 100644 --- a/examples/go.sum +++ b/examples/go.sum @@ -342,10 +342,10 @@ github.com/pulumi/appdash v0.0.0-20231130102222-75f619a67231 h1:vkHw5I/plNdTr435 github.com/pulumi/appdash v0.0.0-20231130102222-75f619a67231/go.mod h1:murToZ2N9hNJzewjHBgfFdXhZKjY3z5cYC1VXk+lbFE= github.com/pulumi/esc v0.10.0 h1:jzBKzkLVW0mePeanDRfqSQoCJ5yrkux0jIwAkUxpRKE= github.com/pulumi/esc v0.10.0/go.mod h1:2Bfa+FWj/xl8CKqRTWbWgDX0SOD4opdQgvYSURTGK2c= -github.com/pulumi/pulumi/pkg/v3 v3.133.0 h1:j1rd7ToLZIQc5H0427ISOXSbOIIemZ6B0MXtRhQ38Yg= -github.com/pulumi/pulumi/pkg/v3 v3.133.0/go.mod h1:JtMAnrsFIccO138WcMfPdhO0PioDukKihnZC0xTRLwo= -github.com/pulumi/pulumi/sdk/v3 v3.133.0 h1:o+7dbJZY9BVgAjOF5GYIWgjp/zpKAgWZwD4pPjUMXKQ= -github.com/pulumi/pulumi/sdk/v3 v3.133.0/go.mod h1:J5kQEX8v87aeUhk6NdQXnjCo1DbiOnOiL3Sf2DuDda8= +github.com/pulumi/pulumi/pkg/v3 v3.136.1 h1:zA8aJZ7qI0QgZkBKjjQaYHEcigK6pZfrbfG38imXzWo= +github.com/pulumi/pulumi/pkg/v3 v3.136.1/go.mod h1:Iz8QIs07AbEdrO52hEIEM5C4VBDUYFH2NdM9u2xxBxY= +github.com/pulumi/pulumi/sdk/v3 v3.136.1 h1:VJWTgdBrLvvzIkMbGq/epNEfT65P9gTvw14UF/I7hTI= +github.com/pulumi/pulumi/sdk/v3 v3.136.1/go.mod h1:PvKsX88co8XuwuPdzolMvew5lZV+4JmZfkeSjj7A6dI= github.com/rivo/uniseg v0.1.0/go.mod h1:J6wj4VEh+S6ZtnVlnTBMWIodfgj8LQOQFoIToxlJtxc= github.com/rivo/uniseg v0.2.0/go.mod h1:J6wj4VEh+S6ZtnVlnTBMWIodfgj8LQOQFoIToxlJtxc= github.com/rivo/uniseg v0.4.4 h1:8TfxU8dW6PdqD27gjM8MVNuicgxIjxpm4K7x4jp8sis= diff --git a/provider/cmd/pulumi-resource-vault/schema.json b/provider/cmd/pulumi-resource-vault/schema.json index f4cc9b147..dfba32a94 100644 --- a/provider/cmd/pulumi-resource-vault/schema.json +++ b/provider/cmd/pulumi-resource-vault/schema.json @@ -18466,7 +18466,7 @@ } }, "vault:index/raftSnapshotAgentConfig:RaftSnapshotAgentConfig": { - "description": "## Example Usage\n\n### Local Storage\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst localBackups = new vault.RaftSnapshotAgentConfig(\"local_backups\", {\n name: \"local\",\n intervalSeconds: 86400,\n retain: 7,\n pathPrefix: \"/opt/vault/snapshots/\",\n storageType: \"local\",\n localMaxSpace: 10000000,\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nlocal_backups = vault.RaftSnapshotAgentConfig(\"local_backups\",\n name=\"local\",\n interval_seconds=86400,\n retain=7,\n path_prefix=\"/opt/vault/snapshots/\",\n storage_type=\"local\",\n local_max_space=10000000)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var localBackups = new Vault.RaftSnapshotAgentConfig(\"local_backups\", new()\n {\n Name = \"local\",\n IntervalSeconds = 86400,\n Retain = 7,\n PathPrefix = \"/opt/vault/snapshots/\",\n StorageType = \"local\",\n LocalMaxSpace = 10000000,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := vault.NewRaftSnapshotAgentConfig(ctx, \"local_backups\", \u0026vault.RaftSnapshotAgentConfigArgs{\n\t\t\tName: pulumi.String(\"local\"),\n\t\t\tIntervalSeconds: pulumi.Int(86400),\n\t\t\tRetain: pulumi.Int(7),\n\t\t\tPathPrefix: pulumi.String(\"/opt/vault/snapshots/\"),\n\t\t\tStorageType: pulumi.String(\"local\"),\n\t\t\tLocalMaxSpace: pulumi.Int(10000000),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.RaftSnapshotAgentConfig;\nimport com.pulumi.vault.RaftSnapshotAgentConfigArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var localBackups = new RaftSnapshotAgentConfig(\"localBackups\", RaftSnapshotAgentConfigArgs.builder()\n .name(\"local\")\n .intervalSeconds(86400)\n .retain(7)\n .pathPrefix(\"/opt/vault/snapshots/\")\n .storageType(\"local\")\n .localMaxSpace(10000000)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n localBackups:\n type: vault:RaftSnapshotAgentConfig\n name: local_backups\n properties:\n name: local\n intervalSeconds: 86400 # 24h\n retain: 7\n pathPrefix: /opt/vault/snapshots/\n storageType: local\n localMaxSpace: 1e+07\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### AWS S3\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as aws from \"@pulumi/aws\";\nimport * as vault from \"@pulumi/vault\";\n\nconst config = new pulumi.Config();\nconst awsAccessKeyId = config.requireObject(\"awsAccessKeyId\");\nconst awsSecretAccessKey = config.requireObject(\"awsSecretAccessKey\");\nconst current = aws.getRegion({});\nconst s3Backups = new vault.RaftSnapshotAgentConfig(\"s3_backups\", {\n name: \"s3\",\n intervalSeconds: 86400,\n retain: 7,\n pathPrefix: \"/path/in/bucket\",\n storageType: \"aws-s3\",\n awsS3Bucket: \"my-bucket\",\n awsS3Region: current.then(current =\u003e current.name),\n awsAccessKeyId: awsAccessKeyId,\n awsSecretAccessKey: awsSecretAccessKey,\n awsS3EnableKms: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_aws as aws\nimport pulumi_vault as vault\n\nconfig = pulumi.Config()\naws_access_key_id = config.require_object(\"awsAccessKeyId\")\naws_secret_access_key = config.require_object(\"awsSecretAccessKey\")\ncurrent = aws.get_region()\ns3_backups = vault.RaftSnapshotAgentConfig(\"s3_backups\",\n name=\"s3\",\n interval_seconds=86400,\n retain=7,\n path_prefix=\"/path/in/bucket\",\n storage_type=\"aws-s3\",\n aws_s3_bucket=\"my-bucket\",\n aws_s3_region=current.name,\n aws_access_key_id=aws_access_key_id,\n aws_secret_access_key=aws_secret_access_key,\n aws_s3_enable_kms=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Aws = Pulumi.Aws;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var config = new Config();\n var awsAccessKeyId = config.RequireObject\u003cdynamic\u003e(\"awsAccessKeyId\");\n var awsSecretAccessKey = config.RequireObject\u003cdynamic\u003e(\"awsSecretAccessKey\");\n var current = Aws.GetRegion.Invoke();\n\n var s3Backups = new Vault.RaftSnapshotAgentConfig(\"s3_backups\", new()\n {\n Name = \"s3\",\n IntervalSeconds = 86400,\n Retain = 7,\n PathPrefix = \"/path/in/bucket\",\n StorageType = \"aws-s3\",\n AwsS3Bucket = \"my-bucket\",\n AwsS3Region = current.Apply(getRegionResult =\u003e getRegionResult.Name),\n AwsAccessKeyId = awsAccessKeyId,\n AwsSecretAccessKey = awsSecretAccessKey,\n AwsS3EnableKms = true,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-aws/sdk/v5/go/aws\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi/config\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcfg := config.New(ctx, \"\")\n\t\tawsAccessKeyId := cfg.RequireObject(\"awsAccessKeyId\")\n\t\tawsSecretAccessKey := cfg.RequireObject(\"awsSecretAccessKey\")\n\t\tcurrent, err := aws.GetRegion(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = vault.NewRaftSnapshotAgentConfig(ctx, \"s3_backups\", \u0026vault.RaftSnapshotAgentConfigArgs{\n\t\t\tName: pulumi.String(\"s3\"),\n\t\t\tIntervalSeconds: pulumi.Int(86400),\n\t\t\tRetain: pulumi.Int(7),\n\t\t\tPathPrefix: pulumi.String(\"/path/in/bucket\"),\n\t\t\tStorageType: pulumi.String(\"aws-s3\"),\n\t\t\tAwsS3Bucket: pulumi.String(\"my-bucket\"),\n\t\t\tAwsS3Region: pulumi.String(current.Name),\n\t\t\tAwsAccessKeyId: pulumi.Any(awsAccessKeyId),\n\t\t\tAwsSecretAccessKey: pulumi.Any(awsSecretAccessKey),\n\t\t\tAwsS3EnableKms: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.aws.AwsFunctions;\nimport com.pulumi.aws.inputs.GetRegionArgs;\nimport com.pulumi.vault.RaftSnapshotAgentConfig;\nimport com.pulumi.vault.RaftSnapshotAgentConfigArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var config = ctx.config();\n final var awsAccessKeyId = config.get(\"awsAccessKeyId\");\n final var awsSecretAccessKey = config.get(\"awsSecretAccessKey\");\n final var current = AwsFunctions.getRegion();\n\n var s3Backups = new RaftSnapshotAgentConfig(\"s3Backups\", RaftSnapshotAgentConfigArgs.builder()\n .name(\"s3\")\n .intervalSeconds(86400)\n .retain(7)\n .pathPrefix(\"/path/in/bucket\")\n .storageType(\"aws-s3\")\n .awsS3Bucket(\"my-bucket\")\n .awsS3Region(current.applyValue(getRegionResult -\u003e getRegionResult.name()))\n .awsAccessKeyId(awsAccessKeyId)\n .awsSecretAccessKey(awsSecretAccessKey)\n .awsS3EnableKms(true)\n .build());\n\n }\n}\n```\n```yaml\nconfiguration:\n awsAccessKeyId:\n type: dynamic\n awsSecretAccessKey:\n type: dynamic\nresources:\n s3Backups:\n type: vault:RaftSnapshotAgentConfig\n name: s3_backups\n properties:\n name: s3\n intervalSeconds: 86400 # 24h\n retain: 7\n pathPrefix: /path/in/bucket\n storageType: aws-s3\n awsS3Bucket: my-bucket\n awsS3Region: ${current.name}\n awsAccessKeyId: ${awsAccessKeyId}\n awsSecretAccessKey: ${awsSecretAccessKey}\n awsS3EnableKms: true\nvariables:\n current:\n fn::invoke:\n Function: aws:getRegion\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### Azure BLOB\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst config = new pulumi.Config();\nconst azureAccountName = config.requireObject(\"azureAccountName\");\nconst azureAccountKey = config.requireObject(\"azureAccountKey\");\nconst azureBackups = new vault.RaftSnapshotAgentConfig(\"azure_backups\", {\n name: \"azure_backup\",\n intervalSeconds: 86400,\n retain: 7,\n pathPrefix: \"/\",\n storageType: \"azure-blob\",\n azureContainerName: \"vault-blob\",\n azureAccountName: azureAccountName,\n azureAccountKey: azureAccountKey,\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nconfig = pulumi.Config()\nazure_account_name = config.require_object(\"azureAccountName\")\nazure_account_key = config.require_object(\"azureAccountKey\")\nazure_backups = vault.RaftSnapshotAgentConfig(\"azure_backups\",\n name=\"azure_backup\",\n interval_seconds=86400,\n retain=7,\n path_prefix=\"/\",\n storage_type=\"azure-blob\",\n azure_container_name=\"vault-blob\",\n azure_account_name=azure_account_name,\n azure_account_key=azure_account_key)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var config = new Config();\n var azureAccountName = config.RequireObject\u003cdynamic\u003e(\"azureAccountName\");\n var azureAccountKey = config.RequireObject\u003cdynamic\u003e(\"azureAccountKey\");\n var azureBackups = new Vault.RaftSnapshotAgentConfig(\"azure_backups\", new()\n {\n Name = \"azure_backup\",\n IntervalSeconds = 86400,\n Retain = 7,\n PathPrefix = \"/\",\n StorageType = \"azure-blob\",\n AzureContainerName = \"vault-blob\",\n AzureAccountName = azureAccountName,\n AzureAccountKey = azureAccountKey,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi/config\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcfg := config.New(ctx, \"\")\n\t\tazureAccountName := cfg.RequireObject(\"azureAccountName\")\n\t\tazureAccountKey := cfg.RequireObject(\"azureAccountKey\")\n\t\t_, err := vault.NewRaftSnapshotAgentConfig(ctx, \"azure_backups\", \u0026vault.RaftSnapshotAgentConfigArgs{\n\t\t\tName: pulumi.String(\"azure_backup\"),\n\t\t\tIntervalSeconds: pulumi.Int(86400),\n\t\t\tRetain: pulumi.Int(7),\n\t\t\tPathPrefix: pulumi.String(\"/\"),\n\t\t\tStorageType: pulumi.String(\"azure-blob\"),\n\t\t\tAzureContainerName: pulumi.String(\"vault-blob\"),\n\t\t\tAzureAccountName: pulumi.Any(azureAccountName),\n\t\t\tAzureAccountKey: pulumi.Any(azureAccountKey),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.RaftSnapshotAgentConfig;\nimport com.pulumi.vault.RaftSnapshotAgentConfigArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var config = ctx.config();\n final var azureAccountName = config.get(\"azureAccountName\");\n final var azureAccountKey = config.get(\"azureAccountKey\");\n var azureBackups = new RaftSnapshotAgentConfig(\"azureBackups\", RaftSnapshotAgentConfigArgs.builder()\n .name(\"azure_backup\")\n .intervalSeconds(86400)\n .retain(7)\n .pathPrefix(\"/\")\n .storageType(\"azure-blob\")\n .azureContainerName(\"vault-blob\")\n .azureAccountName(azureAccountName)\n .azureAccountKey(azureAccountKey)\n .build());\n\n }\n}\n```\n```yaml\nconfiguration:\n azureAccountName:\n type: dynamic\n azureAccountKey:\n type: dynamic\nresources:\n azureBackups:\n type: vault:RaftSnapshotAgentConfig\n name: azure_backups\n properties:\n name: azure_backup\n intervalSeconds: 86400 # 24h\n retain: 7\n pathPrefix: /\n storageType: azure-blob\n azureContainerName: vault-blob\n azureAccountName: ${azureAccountName}\n azureAccountKey: ${azureAccountKey}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nRaft Snapshot Agent Configurations can be imported using the `name`, e.g.\n\n```sh\n$ pulumi import vault:index/raftSnapshotAgentConfig:RaftSnapshotAgentConfig local local\n```\n", + "description": "## Example Usage\n\n### Local Storage\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst localBackups = new vault.RaftSnapshotAgentConfig(\"local_backups\", {\n name: \"local\",\n intervalSeconds: 86400,\n retain: 7,\n pathPrefix: \"/opt/vault/snapshots/\",\n storageType: \"local\",\n localMaxSpace: 10000000,\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nlocal_backups = vault.RaftSnapshotAgentConfig(\"local_backups\",\n name=\"local\",\n interval_seconds=86400,\n retain=7,\n path_prefix=\"/opt/vault/snapshots/\",\n storage_type=\"local\",\n local_max_space=10000000)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var localBackups = new Vault.RaftSnapshotAgentConfig(\"local_backups\", new()\n {\n Name = \"local\",\n IntervalSeconds = 86400,\n Retain = 7,\n PathPrefix = \"/opt/vault/snapshots/\",\n StorageType = \"local\",\n LocalMaxSpace = 10000000,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := vault.NewRaftSnapshotAgentConfig(ctx, \"local_backups\", \u0026vault.RaftSnapshotAgentConfigArgs{\n\t\t\tName: pulumi.String(\"local\"),\n\t\t\tIntervalSeconds: pulumi.Int(86400),\n\t\t\tRetain: pulumi.Int(7),\n\t\t\tPathPrefix: pulumi.String(\"/opt/vault/snapshots/\"),\n\t\t\tStorageType: pulumi.String(\"local\"),\n\t\t\tLocalMaxSpace: pulumi.Int(10000000),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.RaftSnapshotAgentConfig;\nimport com.pulumi.vault.RaftSnapshotAgentConfigArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var localBackups = new RaftSnapshotAgentConfig(\"localBackups\", RaftSnapshotAgentConfigArgs.builder()\n .name(\"local\")\n .intervalSeconds(86400)\n .retain(7)\n .pathPrefix(\"/opt/vault/snapshots/\")\n .storageType(\"local\")\n .localMaxSpace(10000000)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n localBackups:\n type: vault:RaftSnapshotAgentConfig\n name: local_backups\n properties:\n name: local\n intervalSeconds: 86400 # 24h\n retain: 7\n pathPrefix: /opt/vault/snapshots/\n storageType: local\n localMaxSpace: 1e+07\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### AWS S3\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as aws from \"@pulumi/aws\";\nimport * as vault from \"@pulumi/vault\";\n\nconst config = new pulumi.Config();\nconst awsAccessKeyId = config.requireObject(\"awsAccessKeyId\");\nconst awsSecretAccessKey = config.requireObject(\"awsSecretAccessKey\");\nconst current = aws.getRegion({});\nconst s3Backups = new vault.RaftSnapshotAgentConfig(\"s3_backups\", {\n name: \"s3\",\n intervalSeconds: 86400,\n retain: 7,\n pathPrefix: \"/path/in/bucket\",\n storageType: \"aws-s3\",\n awsS3Bucket: \"my-bucket\",\n awsS3Region: current.then(current =\u003e current.name),\n awsAccessKeyId: awsAccessKeyId,\n awsSecretAccessKey: awsSecretAccessKey,\n awsS3EnableKms: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_aws as aws\nimport pulumi_vault as vault\n\nconfig = pulumi.Config()\naws_access_key_id = config.require_object(\"awsAccessKeyId\")\naws_secret_access_key = config.require_object(\"awsSecretAccessKey\")\ncurrent = aws.get_region()\ns3_backups = vault.RaftSnapshotAgentConfig(\"s3_backups\",\n name=\"s3\",\n interval_seconds=86400,\n retain=7,\n path_prefix=\"/path/in/bucket\",\n storage_type=\"aws-s3\",\n aws_s3_bucket=\"my-bucket\",\n aws_s3_region=current.name,\n aws_access_key_id=aws_access_key_id,\n aws_secret_access_key=aws_secret_access_key,\n aws_s3_enable_kms=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Aws = Pulumi.Aws;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var config = new Config();\n var awsAccessKeyId = config.RequireObject\u003cdynamic\u003e(\"awsAccessKeyId\");\n var awsSecretAccessKey = config.RequireObject\u003cdynamic\u003e(\"awsSecretAccessKey\");\n var current = Aws.GetRegion.Invoke();\n\n var s3Backups = new Vault.RaftSnapshotAgentConfig(\"s3_backups\", new()\n {\n Name = \"s3\",\n IntervalSeconds = 86400,\n Retain = 7,\n PathPrefix = \"/path/in/bucket\",\n StorageType = \"aws-s3\",\n AwsS3Bucket = \"my-bucket\",\n AwsS3Region = current.Apply(getRegionResult =\u003e getRegionResult.Name),\n AwsAccessKeyId = awsAccessKeyId,\n AwsSecretAccessKey = awsSecretAccessKey,\n AwsS3EnableKms = true,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-aws/sdk/v5/go/aws\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi/config\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcfg := config.New(ctx, \"\")\n\t\tawsAccessKeyId := cfg.RequireObject(\"awsAccessKeyId\")\n\t\tawsSecretAccessKey := cfg.RequireObject(\"awsSecretAccessKey\")\n\t\tcurrent, err := aws.GetRegion(ctx, \u0026aws.GetRegionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = vault.NewRaftSnapshotAgentConfig(ctx, \"s3_backups\", \u0026vault.RaftSnapshotAgentConfigArgs{\n\t\t\tName: pulumi.String(\"s3\"),\n\t\t\tIntervalSeconds: pulumi.Int(86400),\n\t\t\tRetain: pulumi.Int(7),\n\t\t\tPathPrefix: pulumi.String(\"/path/in/bucket\"),\n\t\t\tStorageType: pulumi.String(\"aws-s3\"),\n\t\t\tAwsS3Bucket: pulumi.String(\"my-bucket\"),\n\t\t\tAwsS3Region: pulumi.String(current.Name),\n\t\t\tAwsAccessKeyId: pulumi.Any(awsAccessKeyId),\n\t\t\tAwsSecretAccessKey: pulumi.Any(awsSecretAccessKey),\n\t\t\tAwsS3EnableKms: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.aws.AwsFunctions;\nimport com.pulumi.aws.inputs.GetRegionArgs;\nimport com.pulumi.vault.RaftSnapshotAgentConfig;\nimport com.pulumi.vault.RaftSnapshotAgentConfigArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var config = ctx.config();\n final var awsAccessKeyId = config.get(\"awsAccessKeyId\");\n final var awsSecretAccessKey = config.get(\"awsSecretAccessKey\");\n final var current = AwsFunctions.getRegion();\n\n var s3Backups = new RaftSnapshotAgentConfig(\"s3Backups\", RaftSnapshotAgentConfigArgs.builder()\n .name(\"s3\")\n .intervalSeconds(86400)\n .retain(7)\n .pathPrefix(\"/path/in/bucket\")\n .storageType(\"aws-s3\")\n .awsS3Bucket(\"my-bucket\")\n .awsS3Region(current.applyValue(getRegionResult -\u003e getRegionResult.name()))\n .awsAccessKeyId(awsAccessKeyId)\n .awsSecretAccessKey(awsSecretAccessKey)\n .awsS3EnableKms(true)\n .build());\n\n }\n}\n```\n```yaml\nconfiguration:\n awsAccessKeyId:\n type: dynamic\n awsSecretAccessKey:\n type: dynamic\nresources:\n s3Backups:\n type: vault:RaftSnapshotAgentConfig\n name: s3_backups\n properties:\n name: s3\n intervalSeconds: 86400 # 24h\n retain: 7\n pathPrefix: /path/in/bucket\n storageType: aws-s3\n awsS3Bucket: my-bucket\n awsS3Region: ${current.name}\n awsAccessKeyId: ${awsAccessKeyId}\n awsSecretAccessKey: ${awsSecretAccessKey}\n awsS3EnableKms: true\nvariables:\n current:\n fn::invoke:\n Function: aws:getRegion\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### Azure BLOB\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst config = new pulumi.Config();\nconst azureAccountName = config.requireObject(\"azureAccountName\");\nconst azureAccountKey = config.requireObject(\"azureAccountKey\");\nconst azureBackups = new vault.RaftSnapshotAgentConfig(\"azure_backups\", {\n name: \"azure_backup\",\n intervalSeconds: 86400,\n retain: 7,\n pathPrefix: \"/\",\n storageType: \"azure-blob\",\n azureContainerName: \"vault-blob\",\n azureAccountName: azureAccountName,\n azureAccountKey: azureAccountKey,\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nconfig = pulumi.Config()\nazure_account_name = config.require_object(\"azureAccountName\")\nazure_account_key = config.require_object(\"azureAccountKey\")\nazure_backups = vault.RaftSnapshotAgentConfig(\"azure_backups\",\n name=\"azure_backup\",\n interval_seconds=86400,\n retain=7,\n path_prefix=\"/\",\n storage_type=\"azure-blob\",\n azure_container_name=\"vault-blob\",\n azure_account_name=azure_account_name,\n azure_account_key=azure_account_key)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var config = new Config();\n var azureAccountName = config.RequireObject\u003cdynamic\u003e(\"azureAccountName\");\n var azureAccountKey = config.RequireObject\u003cdynamic\u003e(\"azureAccountKey\");\n var azureBackups = new Vault.RaftSnapshotAgentConfig(\"azure_backups\", new()\n {\n Name = \"azure_backup\",\n IntervalSeconds = 86400,\n Retain = 7,\n PathPrefix = \"/\",\n StorageType = \"azure-blob\",\n AzureContainerName = \"vault-blob\",\n AzureAccountName = azureAccountName,\n AzureAccountKey = azureAccountKey,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi/config\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcfg := config.New(ctx, \"\")\n\t\tazureAccountName := cfg.RequireObject(\"azureAccountName\")\n\t\tazureAccountKey := cfg.RequireObject(\"azureAccountKey\")\n\t\t_, err := vault.NewRaftSnapshotAgentConfig(ctx, \"azure_backups\", \u0026vault.RaftSnapshotAgentConfigArgs{\n\t\t\tName: pulumi.String(\"azure_backup\"),\n\t\t\tIntervalSeconds: pulumi.Int(86400),\n\t\t\tRetain: pulumi.Int(7),\n\t\t\tPathPrefix: pulumi.String(\"/\"),\n\t\t\tStorageType: pulumi.String(\"azure-blob\"),\n\t\t\tAzureContainerName: pulumi.String(\"vault-blob\"),\n\t\t\tAzureAccountName: pulumi.Any(azureAccountName),\n\t\t\tAzureAccountKey: pulumi.Any(azureAccountKey),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.RaftSnapshotAgentConfig;\nimport com.pulumi.vault.RaftSnapshotAgentConfigArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var config = ctx.config();\n final var azureAccountName = config.get(\"azureAccountName\");\n final var azureAccountKey = config.get(\"azureAccountKey\");\n var azureBackups = new RaftSnapshotAgentConfig(\"azureBackups\", RaftSnapshotAgentConfigArgs.builder()\n .name(\"azure_backup\")\n .intervalSeconds(86400)\n .retain(7)\n .pathPrefix(\"/\")\n .storageType(\"azure-blob\")\n .azureContainerName(\"vault-blob\")\n .azureAccountName(azureAccountName)\n .azureAccountKey(azureAccountKey)\n .build());\n\n }\n}\n```\n```yaml\nconfiguration:\n azureAccountName:\n type: dynamic\n azureAccountKey:\n type: dynamic\nresources:\n azureBackups:\n type: vault:RaftSnapshotAgentConfig\n name: azure_backups\n properties:\n name: azure_backup\n intervalSeconds: 86400 # 24h\n retain: 7\n pathPrefix: /\n storageType: azure-blob\n azureContainerName: vault-blob\n azureAccountName: ${azureAccountName}\n azureAccountKey: ${azureAccountKey}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nRaft Snapshot Agent Configurations can be imported using the `name`, e.g.\n\n```sh\n$ pulumi import vault:index/raftSnapshotAgentConfig:RaftSnapshotAgentConfig local local\n```\n", "properties": { "awsAccessKeyId": { "type": "string", @@ -33321,7 +33321,7 @@ } }, "vault:index/getAuthBackends:getAuthBackends": { - "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst example = vault.getAuthBackends({});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nexample = vault.get_auth_backends()\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = Vault.GetAuthBackends.Invoke();\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := vault.GetAuthBackends(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.VaultFunctions;\nimport com.pulumi.vault.inputs.GetAuthBackendsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var example = VaultFunctions.getAuthBackends();\n\n }\n}\n```\n```yaml\nvariables:\n example:\n fn::invoke:\n Function: vault:getAuthBackends\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst example-filter = vault.getAuthBackends({\n type: \"kubernetes\",\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nexample_filter = vault.get_auth_backends(type=\"kubernetes\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example_filter = Vault.GetAuthBackends.Invoke(new()\n {\n Type = \"kubernetes\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := vault.GetAuthBackends(ctx, \u0026vault.GetAuthBackendsArgs{\n\t\t\tType: pulumi.StringRef(\"kubernetes\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.VaultFunctions;\nimport com.pulumi.vault.inputs.GetAuthBackendsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var example-filter = VaultFunctions.getAuthBackends(GetAuthBackendsArgs.builder()\n .type(\"kubernetes\")\n .build());\n\n }\n}\n```\n```yaml\nvariables:\n example-filter:\n fn::invoke:\n Function: vault:getAuthBackends\n Arguments:\n type: kubernetes\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst example = vault.getAuthBackends({});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nexample = vault.get_auth_backends()\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = Vault.GetAuthBackends.Invoke();\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := vault.GetAuthBackends(ctx, \u0026vault.GetAuthBackendsArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.VaultFunctions;\nimport com.pulumi.vault.inputs.GetAuthBackendsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var example = VaultFunctions.getAuthBackends();\n\n }\n}\n```\n```yaml\nvariables:\n example:\n fn::invoke:\n Function: vault:getAuthBackends\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst example-filter = vault.getAuthBackends({\n type: \"kubernetes\",\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nexample_filter = vault.get_auth_backends(type=\"kubernetes\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example_filter = Vault.GetAuthBackends.Invoke(new()\n {\n Type = \"kubernetes\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := vault.GetAuthBackends(ctx, \u0026vault.GetAuthBackendsArgs{\n\t\t\tType: pulumi.StringRef(\"kubernetes\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.VaultFunctions;\nimport com.pulumi.vault.inputs.GetAuthBackendsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var example-filter = VaultFunctions.getAuthBackends(GetAuthBackendsArgs.builder()\n .type(\"kubernetes\")\n .build());\n\n }\n}\n```\n```yaml\nvariables:\n example-filter:\n fn::invoke:\n Function: vault:getAuthBackends\n Arguments:\n type: kubernetes\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "inputs": { "description": "A collection of arguments for invoking getAuthBackends.\n", "properties": { @@ -33374,7 +33374,7 @@ } }, "vault:index/getNamespace:getNamespace": { - "description": "## Example Usage\n\n### Current namespace\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst current = vault.getNamespace({});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\ncurrent = vault.get_namespace()\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Vault.GetNamespace.Invoke();\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := vault.LookupNamespace(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.VaultFunctions;\nimport com.pulumi.vault.inputs.GetNamespaceArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = VaultFunctions.getNamespace();\n\n }\n}\n```\n```yaml\nvariables:\n current:\n fn::invoke:\n Function: vault:getNamespace\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### Single namespace\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst ns1 = vault.getNamespace({\n path: \"ns1\",\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nns1 = vault.get_namespace(path=\"ns1\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var ns1 = Vault.GetNamespace.Invoke(new()\n {\n Path = \"ns1\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := vault.LookupNamespace(ctx, \u0026vault.LookupNamespaceArgs{\n\t\t\tPath: pulumi.StringRef(\"ns1\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.VaultFunctions;\nimport com.pulumi.vault.inputs.GetNamespaceArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var ns1 = VaultFunctions.getNamespace(GetNamespaceArgs.builder()\n .path(\"ns1\")\n .build());\n\n }\n}\n```\n```yaml\nvariables:\n ns1:\n fn::invoke:\n Function: vault:getNamespace\n Arguments:\n path: ns1\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### Nested namespace\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst child = vault.getNamespace({\n namespace: \"parent\",\n path: \"child\",\n});\nconst fullPath = child.then(child =\u003e child.id);\n// -\u003e foo/parent/child/\nconst pathFq = child.then(child =\u003e child.pathFq);\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nchild = vault.get_namespace(namespace=\"parent\",\n path=\"child\")\nfull_path = child.id\n# -\u003e foo/parent/child/\npath_fq = child.path_fq\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var child = Vault.GetNamespace.Invoke(new()\n {\n Namespace = \"parent\",\n Path = \"child\",\n });\n\n var fullPath = child.Apply(getNamespaceResult =\u003e getNamespaceResult.Id);\n\n // -\u003e foo/parent/child/\n var pathFq = child.Apply(getNamespaceResult =\u003e getNamespaceResult.PathFq);\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tchild, err := vault.LookupNamespace(ctx, \u0026vault.LookupNamespaceArgs{\n\t\t\tNamespace: pulumi.StringRef(\"parent\"),\n\t\t\tPath: pulumi.StringRef(\"child\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ := child.Id\n\t\t// -\u003e foo/parent/child/\n\t\t_ := child.PathFq\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.VaultFunctions;\nimport com.pulumi.vault.inputs.GetNamespaceArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var child = VaultFunctions.getNamespace(GetNamespaceArgs.builder()\n .namespace(\"parent\")\n .path(\"child\")\n .build());\n\n final var fullPath = child.applyValue(getNamespaceResult -\u003e getNamespaceResult.id());\n\n // -\u003e foo/parent/child/\n final var pathFq = child.applyValue(getNamespaceResult -\u003e getNamespaceResult.pathFq());\n\n }\n}\n```\n```yaml\nvariables:\n child:\n fn::invoke:\n Function: vault:getNamespace\n Arguments:\n namespace: parent\n path: child\n fullPath: ${child.id}\n # -\u003e foo/parent/child/\n pathFq: ${child.pathFq}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "## Example Usage\n\n### Current namespace\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst current = vault.getNamespace({});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\ncurrent = vault.get_namespace()\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Vault.GetNamespace.Invoke();\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := vault.LookupNamespace(ctx, \u0026vault.LookupNamespaceArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.VaultFunctions;\nimport com.pulumi.vault.inputs.GetNamespaceArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = VaultFunctions.getNamespace();\n\n }\n}\n```\n```yaml\nvariables:\n current:\n fn::invoke:\n Function: vault:getNamespace\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### Single namespace\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst ns1 = vault.getNamespace({\n path: \"ns1\",\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nns1 = vault.get_namespace(path=\"ns1\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var ns1 = Vault.GetNamespace.Invoke(new()\n {\n Path = \"ns1\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := vault.LookupNamespace(ctx, \u0026vault.LookupNamespaceArgs{\n\t\t\tPath: pulumi.StringRef(\"ns1\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.VaultFunctions;\nimport com.pulumi.vault.inputs.GetNamespaceArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var ns1 = VaultFunctions.getNamespace(GetNamespaceArgs.builder()\n .path(\"ns1\")\n .build());\n\n }\n}\n```\n```yaml\nvariables:\n ns1:\n fn::invoke:\n Function: vault:getNamespace\n Arguments:\n path: ns1\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### Nested namespace\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst child = vault.getNamespace({\n namespace: \"parent\",\n path: \"child\",\n});\nconst fullPath = child.then(child =\u003e child.id);\n// -\u003e foo/parent/child/\nconst pathFq = child.then(child =\u003e child.pathFq);\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nchild = vault.get_namespace(namespace=\"parent\",\n path=\"child\")\nfull_path = child.id\n# -\u003e foo/parent/child/\npath_fq = child.path_fq\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var child = Vault.GetNamespace.Invoke(new()\n {\n Namespace = \"parent\",\n Path = \"child\",\n });\n\n var fullPath = child.Apply(getNamespaceResult =\u003e getNamespaceResult.Id);\n\n // -\u003e foo/parent/child/\n var pathFq = child.Apply(getNamespaceResult =\u003e getNamespaceResult.PathFq);\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tchild, err := vault.LookupNamespace(ctx, \u0026vault.LookupNamespaceArgs{\n\t\t\tNamespace: pulumi.StringRef(\"parent\"),\n\t\t\tPath: pulumi.StringRef(\"child\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ := child.Id\n\t\t// -\u003e foo/parent/child/\n\t\t_ := child.PathFq\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.VaultFunctions;\nimport com.pulumi.vault.inputs.GetNamespaceArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var child = VaultFunctions.getNamespace(GetNamespaceArgs.builder()\n .namespace(\"parent\")\n .path(\"child\")\n .build());\n\n final var fullPath = child.applyValue(getNamespaceResult -\u003e getNamespaceResult.id());\n\n // -\u003e foo/parent/child/\n final var pathFq = child.applyValue(getNamespaceResult -\u003e getNamespaceResult.pathFq());\n\n }\n}\n```\n```yaml\nvariables:\n child:\n fn::invoke:\n Function: vault:getNamespace\n Arguments:\n namespace: parent\n path: child\n fullPath: ${child.id}\n # -\u003e foo/parent/child/\n pathFq: ${child.pathFq}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "inputs": { "description": "A collection of arguments for invoking getNamespace.\n", "properties": { @@ -33430,7 +33430,7 @@ } }, "vault:index/getNamespaces:getNamespaces": { - "description": "## Example Usage\n\n### Child namespaces\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst children = vault.getNamespaces({});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nchildren = vault.get_namespaces()\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var children = Vault.GetNamespaces.Invoke();\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := vault.GetNamespaces(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.VaultFunctions;\nimport com.pulumi.vault.inputs.GetNamespacesArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var children = VaultFunctions.getNamespaces();\n\n }\n}\n```\n```yaml\nvariables:\n children:\n fn::invoke:\n Function: vault:getNamespaces\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### Nested namespace\n\nTo fetch the details of nested namespaces:\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst children = vault.getNamespaces({\n namespace: \"parent\",\n});\nconst child = .reduce((__obj, [, ]) =\u003e ({ ...__obj, [__key]: vault.getNamespace({\n namespace: _arg0_.namespace,\n path: __key,\n}) }));\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nchildren = vault.get_namespaces(namespace=\"parent\")\nchild = {__key: vault.get_namespace(namespace=children.namespace,\n path=__key) for __key, __value in children.paths}\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var children = Vault.GetNamespaces.Invoke(new()\n {\n Namespace = \"parent\",\n });\n\n var child = .ToDictionary(item =\u003e {\n var __key = item.Key;\n return __key;\n }, item =\u003e {\n var __key = item.Key;\n return Vault.GetNamespace.Invoke(new()\n {\n Namespace = _arg0_.Namespace,\n Path = __key,\n });\n });\n\n});\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "## Example Usage\n\n### Child namespaces\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst children = vault.getNamespaces({});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nchildren = vault.get_namespaces()\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var children = Vault.GetNamespaces.Invoke();\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := vault.GetNamespaces(ctx, \u0026vault.GetNamespacesArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.VaultFunctions;\nimport com.pulumi.vault.inputs.GetNamespacesArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var children = VaultFunctions.getNamespaces();\n\n }\n}\n```\n```yaml\nvariables:\n children:\n fn::invoke:\n Function: vault:getNamespaces\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### Nested namespace\n\nTo fetch the details of nested namespaces:\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst children = vault.getNamespaces({\n namespace: \"parent\",\n});\nconst child = .reduce((__obj, [, ]) =\u003e ({ ...__obj, [__key]: vault.getNamespace({\n namespace: _arg0_.namespace,\n path: __key,\n}) }));\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nchildren = vault.get_namespaces(namespace=\"parent\")\nchild = {__key: vault.get_namespace(namespace=children.namespace,\n path=__key) for __key, __value in children.paths}\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var children = Vault.GetNamespaces.Invoke(new()\n {\n Namespace = \"parent\",\n });\n\n var child = .ToDictionary(item =\u003e {\n var __key = item.Key;\n return __key;\n }, item =\u003e {\n var __key = item.Key;\n return Vault.GetNamespace.Invoke(new()\n {\n Namespace = _arg0_.Namespace,\n Path = __key,\n });\n });\n\n});\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "inputs": { "description": "A collection of arguments for invoking getNamespaces.\n", "properties": { @@ -33577,7 +33577,7 @@ } }, "vault:index/getRaftAutopilotState:getRaftAutopilotState": { - "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nexport = async () =\u003e {\n const main = await vault.getRaftAutopilotState({});\n return {\n \"failure-tolerance\": main.failureTolerance,\n };\n}\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nmain = vault.get_raft_autopilot_state()\npulumi.export(\"failure-tolerance\", main.failure_tolerance)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var main = Vault.GetRaftAutopilotState.Invoke();\n\n return new Dictionary\u003cstring, object?\u003e\n {\n [\"failure-tolerance\"] = main.Apply(getRaftAutopilotStateResult =\u003e getRaftAutopilotStateResult.FailureTolerance),\n };\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tmain, err := vault.GetRaftAutopilotState(ctx, nil, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tctx.Export(\"failure-tolerance\", main.FailureTolerance)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.VaultFunctions;\nimport com.pulumi.vault.inputs.GetRaftAutopilotStateArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var main = VaultFunctions.getRaftAutopilotState();\n\n ctx.export(\"failure-tolerance\", main.applyValue(getRaftAutopilotStateResult -\u003e getRaftAutopilotStateResult.failureTolerance()));\n }\n}\n```\n```yaml\nvariables:\n main:\n fn::invoke:\n Function: vault:getRaftAutopilotState\n Arguments: {}\noutputs:\n failure-tolerance: ${main.failureTolerance}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nexport = async () =\u003e {\n const main = await vault.getRaftAutopilotState({});\n return {\n \"failure-tolerance\": main.failureTolerance,\n };\n}\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nmain = vault.get_raft_autopilot_state()\npulumi.export(\"failure-tolerance\", main.failure_tolerance)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var main = Vault.GetRaftAutopilotState.Invoke();\n\n return new Dictionary\u003cstring, object?\u003e\n {\n [\"failure-tolerance\"] = main.Apply(getRaftAutopilotStateResult =\u003e getRaftAutopilotStateResult.FailureTolerance),\n };\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tmain, err := vault.GetRaftAutopilotState(ctx, \u0026vault.GetRaftAutopilotStateArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tctx.Export(\"failure-tolerance\", main.FailureTolerance)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.VaultFunctions;\nimport com.pulumi.vault.inputs.GetRaftAutopilotStateArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var main = VaultFunctions.getRaftAutopilotState();\n\n ctx.export(\"failure-tolerance\", main.applyValue(getRaftAutopilotStateResult -\u003e getRaftAutopilotStateResult.failureTolerance()));\n }\n}\n```\n```yaml\nvariables:\n main:\n fn::invoke:\n Function: vault:getRaftAutopilotState\n Arguments: {}\noutputs:\n failure-tolerance: ${main.failureTolerance}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "inputs": { "description": "A collection of arguments for invoking getRaftAutopilotState.\n", "properties": { diff --git a/provider/go.mod b/provider/go.mod index 38b45bf11..c0ae7507e 100644 --- a/provider/go.mod +++ b/provider/go.mod @@ -6,9 +6,9 @@ toolchain go1.22.7 require ( github.com/hashicorp/terraform-provider-vault v0.0.0 - github.com/pulumi/providertest v0.0.14 - github.com/pulumi/pulumi-terraform-bridge/v3 v3.91.1 - github.com/pulumi/pulumi/sdk/v3 v3.133.0 + github.com/pulumi/providertest v0.1.2 + github.com/pulumi/pulumi-terraform-bridge/v3 v3.92.0 + github.com/pulumi/pulumi/sdk/v3 v3.136.1 github.com/stretchr/testify v1.9.0 ) @@ -222,8 +222,8 @@ require ( github.com/pulumi/inflector v0.1.1 // indirect github.com/pulumi/pulumi-java/pkg v0.16.1 // indirect github.com/pulumi/pulumi-terraform-bridge/x/muxer v0.0.8 // indirect - github.com/pulumi/pulumi-yaml v1.10.0 // indirect - github.com/pulumi/pulumi/pkg/v3 v3.133.0 // indirect + github.com/pulumi/pulumi-yaml v1.10.3 // indirect + github.com/pulumi/pulumi/pkg/v3 v3.136.1 // indirect github.com/pulumi/schema-tools v0.1.2 // indirect github.com/pulumi/terraform-diff-reader v0.0.2 // indirect github.com/rivo/uniseg v0.4.4 // indirect diff --git a/provider/go.sum b/provider/go.sum index c2626caa9..c8ea92a0e 100644 --- a/provider/go.sum +++ b/provider/go.sum @@ -2853,20 +2853,20 @@ github.com/pulumi/esc v0.10.0 h1:jzBKzkLVW0mePeanDRfqSQoCJ5yrkux0jIwAkUxpRKE= github.com/pulumi/esc v0.10.0/go.mod h1:2Bfa+FWj/xl8CKqRTWbWgDX0SOD4opdQgvYSURTGK2c= github.com/pulumi/inflector v0.1.1 h1:dvlxlWtXwOJTUUtcYDvwnl6Mpg33prhK+7mzeF+SobA= github.com/pulumi/inflector v0.1.1/go.mod h1:HUFCjcPTz96YtTuUlwG3i3EZG4WlniBvR9bd+iJxCUY= -github.com/pulumi/providertest v0.0.14 h1:5QlAPAAs82jkQraHsJvq1xgVfC7xtW8sFJwv2pHgxQ8= -github.com/pulumi/providertest v0.0.14/go.mod h1:GcsqEGgSngwaNOD+kICJPIUQlnA911fGBU8HDlJvVL0= +github.com/pulumi/providertest v0.1.2 h1:9pJS9MeNkMyGwyNeHmvh8QqLgJy39Nk2/ym5u7r13ng= +github.com/pulumi/providertest v0.1.2/go.mod h1:GcsqEGgSngwaNOD+kICJPIUQlnA911fGBU8HDlJvVL0= github.com/pulumi/pulumi-java/pkg v0.16.1 h1:orHnDWFbpOERwaBLry9f+6nqPX7x0MsrIkaa5QDGAns= github.com/pulumi/pulumi-java/pkg v0.16.1/go.mod h1:QH0DihZkWYle9XFc+LJ76m4hUo+fA3RdyaM90pqOaSM= -github.com/pulumi/pulumi-terraform-bridge/v3 v3.91.1 h1:Twh0IKS1pGHP6LHDq1oR0vbHlV52asoUCC7spEJl3Ao= -github.com/pulumi/pulumi-terraform-bridge/v3 v3.91.1/go.mod h1:DvueDDtOIbf7W1Or4oH0o7F990ozp/ROmlm/vgLoe+g= +github.com/pulumi/pulumi-terraform-bridge/v3 v3.92.0 h1:LOUHyMFGYkchv4Bzej7v+1W1ooaspgQG6/oZVJ+3lXY= +github.com/pulumi/pulumi-terraform-bridge/v3 v3.92.0/go.mod h1:aI3U3eanRcyOX05No+Nk6FuJvppx4jjcQwFelHSI8yE= github.com/pulumi/pulumi-terraform-bridge/x/muxer v0.0.8 h1:mav2tSitA9BPJPLLahKgepHyYsMzwaTm4cvp0dcTMYw= github.com/pulumi/pulumi-terraform-bridge/x/muxer v0.0.8/go.mod h1:qUYk2c9i/yqMGNj9/bQyXpS39BxNDSXYjVN1njnq0zY= -github.com/pulumi/pulumi-yaml v1.10.0 h1:djbgMJCxJBmYMr4kOpAXH5iauxGohYjEuTLfxD3NUUI= -github.com/pulumi/pulumi-yaml v1.10.0/go.mod h1://lTvwHpgJ+WBKeMGiLrd/jinc4dl3eWV5LZ3G8iCfE= -github.com/pulumi/pulumi/pkg/v3 v3.133.0 h1:j1rd7ToLZIQc5H0427ISOXSbOIIemZ6B0MXtRhQ38Yg= -github.com/pulumi/pulumi/pkg/v3 v3.133.0/go.mod h1:JtMAnrsFIccO138WcMfPdhO0PioDukKihnZC0xTRLwo= -github.com/pulumi/pulumi/sdk/v3 v3.133.0 h1:o+7dbJZY9BVgAjOF5GYIWgjp/zpKAgWZwD4pPjUMXKQ= -github.com/pulumi/pulumi/sdk/v3 v3.133.0/go.mod h1:J5kQEX8v87aeUhk6NdQXnjCo1DbiOnOiL3Sf2DuDda8= +github.com/pulumi/pulumi-yaml v1.10.3 h1:j5cjPiE32ILmjrWnC1cfZ0MWdqCZ8fg9wlaWk7HOtM4= +github.com/pulumi/pulumi-yaml v1.10.3/go.mod h1:MFMQXkaUP5YQUKVJ6Z/aagZDl2f8hdU9oGaJfTcMf1Y= +github.com/pulumi/pulumi/pkg/v3 v3.136.1 h1:zA8aJZ7qI0QgZkBKjjQaYHEcigK6pZfrbfG38imXzWo= +github.com/pulumi/pulumi/pkg/v3 v3.136.1/go.mod h1:Iz8QIs07AbEdrO52hEIEM5C4VBDUYFH2NdM9u2xxBxY= +github.com/pulumi/pulumi/sdk/v3 v3.136.1 h1:VJWTgdBrLvvzIkMbGq/epNEfT65P9gTvw14UF/I7hTI= +github.com/pulumi/pulumi/sdk/v3 v3.136.1/go.mod h1:PvKsX88co8XuwuPdzolMvew5lZV+4JmZfkeSjj7A6dI= github.com/pulumi/schema-tools v0.1.2 h1:Fd9xvUjgck4NA+7/jSk7InqCUT4Kj940+EcnbQKpfZo= github.com/pulumi/schema-tools v0.1.2/go.mod h1:62lgj52Tzq11eqWTIaKd+EVyYAu5dEcDJxMhTjvMO/k= github.com/pulumi/terraform-diff-reader v0.0.2 h1:kTE4nEXU3/SYXESvAIem+wyHMI3abqkI3OhJ0G04LLI= diff --git a/provider/provider_program_test.go b/provider/provider_program_test.go index fba8b55fb..8acd7a618 100644 --- a/provider/provider_program_test.go +++ b/provider/provider_program_test.go @@ -15,7 +15,6 @@ import ( "github.com/pulumi/providertest/pulumitest" "github.com/pulumi/providertest/pulumitest/assertpreview" "github.com/pulumi/providertest/pulumitest/opttest" - "github.com/pulumi/pulumi/sdk/v3/go/auto" ) const providerName = "vault" @@ -34,64 +33,19 @@ var programs = []string{ func TestUpgradeCoverage(t *testing.T) { providertest.ReportUpgradeCoverage(t) } - -type UpgradeTestOpts struct { - baselineVersion string - assertFunc func(*testing.T, auto.PreviewResult) - config map[string]string -} - -func WithBaselineVersion(baselineVersion string) func(opts *UpgradeTestOpts) { - return func(opts *UpgradeTestOpts) { - opts.baselineVersion = baselineVersion - } -} - -func WithAssertFunc(assertFunc func(*testing.T, auto.PreviewResult)) func(opts *UpgradeTestOpts) { - return func(opts *UpgradeTestOpts) { - opts.assertFunc = assertFunc - } -} - -func WithConfig(config map[string]string) func(opts *UpgradeTestOpts) { - return func(opts *UpgradeTestOpts) { - opts.config = config - } -} -func testProviderUpgrade(t *testing.T, dir string, opts ...func(*UpgradeTestOpts)) { - options := &UpgradeTestOpts{} - for _, o := range opts { - o(options) - } - testProviderUpgradeWithOpts(t, dir, options.baselineVersion, options.config, options.assertFunc) -} - -func testProviderUpgradeWithOpts( - t *testing.T, dir, baselineVersion string, config map[string]string, - assertFunction func(*testing.T, auto.PreviewResult), -) { +func testProviderUpgrade(t *testing.T, dir string) { if testing.Short() { t.Skipf("Skipping in testing.Short() mode, assuming this is a CI run without credentials") } cwd, err := os.Getwd() require.NoError(t, err) - if baselineVersion == "" { - baselineVersion = defaultBaselineVersion - } test := pulumitest.NewPulumiTest(t, dir, - opttest.DownloadProviderVersion(providerName, baselineVersion), + opttest.DownloadProviderVersion(providerName, defaultBaselineVersion), opttest.LocalProviderPath(providerName, filepath.Join(cwd, "..", "bin")), ) - for k, v := range config { - test.SetConfig(k, v) - } - result := providertest.PreviewProviderUpgrade(t, test, providerName, baselineVersion, + result := providertest.PreviewProviderUpgrade(t, test, providerName, defaultBaselineVersion, optproviderupgrade.DisableAttach()) - if assertFunction != nil { - assertFunction(t, result) - } else { - assertpreview.HasNoReplacements(t, result) - } + assertpreview.HasNoReplacements(t, result) } func testProgram(t *testing.T, dir string) { @@ -104,7 +58,7 @@ func testProgram(t *testing.T, dir string) { opttest.LocalProviderPath(providerName, filepath.Join(cwd, "..", "bin")), opttest.SkipInstall(), ) - test.Up() + test.Up(t) } func TestPrograms(t *testing.T) { diff --git a/sdk/go.mod b/sdk/go.mod index 04ad97cc3..d23874e7a 100644 --- a/sdk/go.mod +++ b/sdk/go.mod @@ -4,7 +4,7 @@ go 1.21 require ( github.com/blang/semver v3.5.1+incompatible - github.com/pulumi/pulumi/sdk/v3 v3.133.0 + github.com/pulumi/pulumi/sdk/v3 v3.136.1 ) require ( diff --git a/sdk/go.sum b/sdk/go.sum index 6df8468b8..f84872a12 100644 --- a/sdk/go.sum +++ b/sdk/go.sum @@ -150,8 +150,8 @@ github.com/pulumi/appdash v0.0.0-20231130102222-75f619a67231 h1:vkHw5I/plNdTr435 github.com/pulumi/appdash v0.0.0-20231130102222-75f619a67231/go.mod h1:murToZ2N9hNJzewjHBgfFdXhZKjY3z5cYC1VXk+lbFE= github.com/pulumi/esc v0.9.1 h1:HH5eEv8sgyxSpY5a8yePyqFXzA8cvBvapfH8457+mIs= github.com/pulumi/esc v0.9.1/go.mod h1:oEJ6bOsjYlQUpjf70GiX+CXn3VBmpwFDxUTlmtUN84c= -github.com/pulumi/pulumi/sdk/v3 v3.133.0 h1:o+7dbJZY9BVgAjOF5GYIWgjp/zpKAgWZwD4pPjUMXKQ= -github.com/pulumi/pulumi/sdk/v3 v3.133.0/go.mod h1:J5kQEX8v87aeUhk6NdQXnjCo1DbiOnOiL3Sf2DuDda8= +github.com/pulumi/pulumi/sdk/v3 v3.136.1 h1:VJWTgdBrLvvzIkMbGq/epNEfT65P9gTvw14UF/I7hTI= +github.com/pulumi/pulumi/sdk/v3 v3.136.1/go.mod h1:PvKsX88co8XuwuPdzolMvew5lZV+4JmZfkeSjj7A6dI= github.com/rivo/uniseg v0.1.0/go.mod h1:J6wj4VEh+S6ZtnVlnTBMWIodfgj8LQOQFoIToxlJtxc= github.com/rivo/uniseg v0.2.0/go.mod h1:J6wj4VEh+S6ZtnVlnTBMWIodfgj8LQOQFoIToxlJtxc= github.com/rivo/uniseg v0.4.4 h1:8TfxU8dW6PdqD27gjM8MVNuicgxIjxpm4K7x4jp8sis= diff --git a/sdk/go/vault/getAuthBackends.go b/sdk/go/vault/getAuthBackends.go index 962c9efe4..7a63dd3ed 100644 --- a/sdk/go/vault/getAuthBackends.go +++ b/sdk/go/vault/getAuthBackends.go @@ -25,7 +25,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := vault.GetAuthBackends(ctx, nil, nil) +// _, err := vault.GetAuthBackends(ctx, &vault.GetAuthBackendsArgs{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/vault/getNamespace.go b/sdk/go/vault/getNamespace.go index fc42e3e51..5de8dd313 100644 --- a/sdk/go/vault/getNamespace.go +++ b/sdk/go/vault/getNamespace.go @@ -27,7 +27,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := vault.LookupNamespace(ctx, nil, nil) +// _, err := vault.LookupNamespace(ctx, &vault.LookupNamespaceArgs{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/vault/getNamespaces.go b/sdk/go/vault/getNamespaces.go index 2cd80214e..942a1e07d 100644 --- a/sdk/go/vault/getNamespaces.go +++ b/sdk/go/vault/getNamespaces.go @@ -27,7 +27,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// _, err := vault.GetNamespaces(ctx, nil, nil) +// _, err := vault.GetNamespaces(ctx, &vault.GetNamespacesArgs{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/vault/getRaftAutopilotState.go b/sdk/go/vault/getRaftAutopilotState.go index 911f1c4e8..be6cef594 100644 --- a/sdk/go/vault/getRaftAutopilotState.go +++ b/sdk/go/vault/getRaftAutopilotState.go @@ -25,7 +25,7 @@ import ( // // func main() { // pulumi.Run(func(ctx *pulumi.Context) error { -// main, err := vault.GetRaftAutopilotState(ctx, nil, nil) +// main, err := vault.GetRaftAutopilotState(ctx, &vault.GetRaftAutopilotStateArgs{}, nil) // if err != nil { // return err // } diff --git a/sdk/go/vault/raftSnapshotAgentConfig.go b/sdk/go/vault/raftSnapshotAgentConfig.go index 5971d9c25..53bcfdb02 100644 --- a/sdk/go/vault/raftSnapshotAgentConfig.go +++ b/sdk/go/vault/raftSnapshotAgentConfig.go @@ -62,7 +62,7 @@ import ( // cfg := config.New(ctx, "") // awsAccessKeyId := cfg.RequireObject("awsAccessKeyId") // awsSecretAccessKey := cfg.RequireObject("awsSecretAccessKey") -// current, err := aws.GetRegion(ctx, nil, nil) +// current, err := aws.GetRegion(ctx, &aws.GetRegionArgs{}, nil) // if err != nil { // return err // } diff --git a/sdk/nodejs/package.json b/sdk/nodejs/package.json index 7996a16d8..76cb23bac 100644 --- a/sdk/nodejs/package.json +++ b/sdk/nodejs/package.json @@ -13,7 +13,7 @@ "build": "tsc" }, "dependencies": { - "@pulumi/pulumi": "^3.42.0" + "@pulumi/pulumi": "^3.136.0" }, "devDependencies": { "@types/mime": "^2.0.0", diff --git a/sdk/python/pulumi_vault/_inputs.py b/sdk/python/pulumi_vault/_inputs.py index da269ce1d..3a812f508 100644 --- a/sdk/python/pulumi_vault/_inputs.py +++ b/sdk/python/pulumi_vault/_inputs.py @@ -4,32 +4,104 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from . import _utilities __all__ = [ 'AuthBackendTuneArgs', + 'AuthBackendTuneArgsDict', 'ProviderAuthLoginArgs', + 'ProviderAuthLoginArgsDict', 'ProviderAuthLoginAwsArgs', + 'ProviderAuthLoginAwsArgsDict', 'ProviderAuthLoginAzureArgs', + 'ProviderAuthLoginAzureArgsDict', 'ProviderAuthLoginCertArgs', + 'ProviderAuthLoginCertArgsDict', 'ProviderAuthLoginGcpArgs', + 'ProviderAuthLoginGcpArgsDict', 'ProviderAuthLoginJwtArgs', + 'ProviderAuthLoginJwtArgsDict', 'ProviderAuthLoginKerberosArgs', + 'ProviderAuthLoginKerberosArgsDict', 'ProviderAuthLoginOciArgs', + 'ProviderAuthLoginOciArgsDict', 'ProviderAuthLoginOidcArgs', + 'ProviderAuthLoginOidcArgsDict', 'ProviderAuthLoginRadiusArgs', + 'ProviderAuthLoginRadiusArgsDict', 'ProviderAuthLoginTokenFileArgs', + 'ProviderAuthLoginTokenFileArgsDict', 'ProviderAuthLoginUserpassArgs', + 'ProviderAuthLoginUserpassArgsDict', 'ProviderClientAuthArgs', + 'ProviderClientAuthArgsDict', 'ProviderHeaderArgs', + 'ProviderHeaderArgsDict', 'GetPolicyDocumentRuleArgs', + 'GetPolicyDocumentRuleArgsDict', 'GetPolicyDocumentRuleAllowedParameterArgs', + 'GetPolicyDocumentRuleAllowedParameterArgsDict', 'GetPolicyDocumentRuleDeniedParameterArgs', + 'GetPolicyDocumentRuleDeniedParameterArgsDict', ] +MYPY = False + +if not MYPY: + class AuthBackendTuneArgsDict(TypedDict): + allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + List of headers to whitelist and allowing + a plugin to include them in the response. + """ + audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + Specifies the list of keys that will + not be HMAC'd by audit devices in the request data object. + """ + audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + Specifies the list of keys that will + not be HMAC'd by audit devices in the response data object. + """ + default_lease_ttl: NotRequired[pulumi.Input[str]] + """ + Specifies the default time-to-live. + If set, this overrides the global default. + Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration) + """ + listing_visibility: NotRequired[pulumi.Input[str]] + """ + Specifies whether to show this mount in + the UI-specific listing endpoint. Valid values are "unauth" or "hidden". + """ + max_lease_ttl: NotRequired[pulumi.Input[str]] + """ + Specifies the maximum time-to-live. + If set, this overrides the global default. + Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration) + """ + passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + List of headers to whitelist and + pass from the request to the backend. + """ + token_type: NotRequired[pulumi.Input[str]] + """ + Specifies the type of tokens that should be returned by + the mount. Valid values are "default-service", "default-batch", "service", "batch". + """ +elif False: + AuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class AuthBackendTuneArgs: def __init__(__self__, *, @@ -185,6 +257,22 @@ def token_type(self, value: Optional[pulumi.Input[str]]): pulumi.set(self, "token_type", value) +if not MYPY: + class ProviderAuthLoginArgsDict(TypedDict): + path: pulumi.Input[str] + method: NotRequired[pulumi.Input[str]] + namespace: NotRequired[pulumi.Input[str]] + """ + The authentication engine's namespace. Conflicts with use_root_namespace + """ + parameters: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]] + use_root_namespace: NotRequired[pulumi.Input[bool]] + """ + Authenticate to the root Vault namespace. Conflicts with namespace + """ +elif False: + ProviderAuthLoginArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class ProviderAuthLoginArgs: def __init__(__self__, *, @@ -259,6 +347,75 @@ def use_root_namespace(self, value: Optional[pulumi.Input[bool]]): pulumi.set(self, "use_root_namespace", value) +if not MYPY: + class ProviderAuthLoginAwsArgsDict(TypedDict): + role: pulumi.Input[str] + """ + The Vault role to use when logging into Vault. + """ + aws_access_key_id: NotRequired[pulumi.Input[str]] + """ + The AWS access key ID. + """ + aws_iam_endpoint: NotRequired[pulumi.Input[str]] + """ + The IAM endpoint URL. + """ + aws_profile: NotRequired[pulumi.Input[str]] + """ + The name of the AWS profile. + """ + aws_region: NotRequired[pulumi.Input[str]] + """ + The AWS region. + """ + aws_role_arn: NotRequired[pulumi.Input[str]] + """ + The ARN of the AWS Role to assume.Used during STS AssumeRole + """ + aws_role_session_name: NotRequired[pulumi.Input[str]] + """ + Specifies the name to attach to the AWS role session. Used during STS AssumeRole + """ + aws_secret_access_key: NotRequired[pulumi.Input[str]] + """ + The AWS secret access key. + """ + aws_session_token: NotRequired[pulumi.Input[str]] + """ + The AWS session token. + """ + aws_shared_credentials_file: NotRequired[pulumi.Input[str]] + """ + Path to the AWS shared credentials file. + """ + aws_sts_endpoint: NotRequired[pulumi.Input[str]] + """ + The STS endpoint URL. + """ + aws_web_identity_token_file: NotRequired[pulumi.Input[str]] + """ + Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token. + """ + header_value: NotRequired[pulumi.Input[str]] + """ + The Vault header value to include in the STS signing request. + """ + mount: NotRequired[pulumi.Input[str]] + """ + The path where the authentication engine is mounted. + """ + namespace: NotRequired[pulumi.Input[str]] + """ + The authentication engine's namespace. Conflicts with use_root_namespace + """ + use_root_namespace: NotRequired[pulumi.Input[bool]] + """ + Authenticate to the root Vault namespace. Conflicts with namespace + """ +elif False: + ProviderAuthLoginAwsArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class ProviderAuthLoginAwsArgs: def __init__(__self__, *, @@ -521,6 +678,59 @@ def use_root_namespace(self, value: Optional[pulumi.Input[bool]]): pulumi.set(self, "use_root_namespace", value) +if not MYPY: + class ProviderAuthLoginAzureArgsDict(TypedDict): + resource_group_name: pulumi.Input[str] + """ + The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata. + """ + role: pulumi.Input[str] + """ + Name of the login role. + """ + subscription_id: pulumi.Input[str] + """ + The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata. + """ + client_id: NotRequired[pulumi.Input[str]] + """ + The identity's client ID. + """ + jwt: NotRequired[pulumi.Input[str]] + """ + A signed JSON Web Token. If not specified on will be created automatically + """ + mount: NotRequired[pulumi.Input[str]] + """ + The path where the authentication engine is mounted. + """ + namespace: NotRequired[pulumi.Input[str]] + """ + The authentication engine's namespace. Conflicts with use_root_namespace + """ + scope: NotRequired[pulumi.Input[str]] + """ + The scopes to include in the token request. + """ + tenant_id: NotRequired[pulumi.Input[str]] + """ + Provides the tenant ID to use in a multi-tenant authentication scenario. + """ + use_root_namespace: NotRequired[pulumi.Input[bool]] + """ + Authenticate to the root Vault namespace. Conflicts with namespace + """ + vm_name: NotRequired[pulumi.Input[str]] + """ + The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata. + """ + vmss_name: NotRequired[pulumi.Input[str]] + """ + The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata. + """ +elif False: + ProviderAuthLoginAzureArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class ProviderAuthLoginAzureArgs: def __init__(__self__, *, @@ -717,6 +927,35 @@ def vmss_name(self, value: Optional[pulumi.Input[str]]): pulumi.set(self, "vmss_name", value) +if not MYPY: + class ProviderAuthLoginCertArgsDict(TypedDict): + cert_file: pulumi.Input[str] + """ + Path to a file containing the client certificate. + """ + key_file: pulumi.Input[str] + """ + Path to a file containing the private key that the certificate was issued for. + """ + mount: NotRequired[pulumi.Input[str]] + """ + The path where the authentication engine is mounted. + """ + name: NotRequired[pulumi.Input[str]] + """ + Name of the certificate's role + """ + namespace: NotRequired[pulumi.Input[str]] + """ + The authentication engine's namespace. Conflicts with use_root_namespace + """ + use_root_namespace: NotRequired[pulumi.Input[bool]] + """ + Authenticate to the root Vault namespace. Conflicts with namespace + """ +elif False: + ProviderAuthLoginCertArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class ProviderAuthLoginCertArgs: def __init__(__self__, *, @@ -818,6 +1057,39 @@ def use_root_namespace(self, value: Optional[pulumi.Input[bool]]): pulumi.set(self, "use_root_namespace", value) +if not MYPY: + class ProviderAuthLoginGcpArgsDict(TypedDict): + role: pulumi.Input[str] + """ + Name of the login role. + """ + credentials: NotRequired[pulumi.Input[str]] + """ + Path to the Google Cloud credentials file. + """ + jwt: NotRequired[pulumi.Input[str]] + """ + A signed JSON Web Token. + """ + mount: NotRequired[pulumi.Input[str]] + """ + The path where the authentication engine is mounted. + """ + namespace: NotRequired[pulumi.Input[str]] + """ + The authentication engine's namespace. Conflicts with use_root_namespace + """ + service_account: NotRequired[pulumi.Input[str]] + """ + IAM service account. + """ + use_root_namespace: NotRequired[pulumi.Input[bool]] + """ + Authenticate to the root Vault namespace. Conflicts with namespace + """ +elif False: + ProviderAuthLoginGcpArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class ProviderAuthLoginGcpArgs: def __init__(__self__, *, @@ -936,6 +1208,31 @@ def use_root_namespace(self, value: Optional[pulumi.Input[bool]]): pulumi.set(self, "use_root_namespace", value) +if not MYPY: + class ProviderAuthLoginJwtArgsDict(TypedDict): + jwt: pulumi.Input[str] + """ + A signed JSON Web Token. + """ + role: pulumi.Input[str] + """ + Name of the login role. + """ + mount: NotRequired[pulumi.Input[str]] + """ + The path where the authentication engine is mounted. + """ + namespace: NotRequired[pulumi.Input[str]] + """ + The authentication engine's namespace. Conflicts with use_root_namespace + """ + use_root_namespace: NotRequired[pulumi.Input[bool]] + """ + Authenticate to the root Vault namespace. Conflicts with namespace + """ +elif False: + ProviderAuthLoginJwtArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class ProviderAuthLoginJwtArgs: def __init__(__self__, *, @@ -1021,6 +1318,55 @@ def use_root_namespace(self, value: Optional[pulumi.Input[bool]]): pulumi.set(self, "use_root_namespace", value) +if not MYPY: + class ProviderAuthLoginKerberosArgsDict(TypedDict): + disable_fast_negotiation: NotRequired[pulumi.Input[bool]] + """ + Disable the Kerberos FAST negotiation. + """ + keytab_path: NotRequired[pulumi.Input[str]] + """ + The Kerberos keytab file containing the entry of the login entity. + """ + krb5conf_path: NotRequired[pulumi.Input[str]] + """ + A valid Kerberos configuration file e.g. /etc/krb5.conf. + """ + mount: NotRequired[pulumi.Input[str]] + """ + The path where the authentication engine is mounted. + """ + namespace: NotRequired[pulumi.Input[str]] + """ + The authentication engine's namespace. Conflicts with use_root_namespace + """ + realm: NotRequired[pulumi.Input[str]] + """ + The Kerberos server's authoritative authentication domain + """ + remove_instance_name: NotRequired[pulumi.Input[bool]] + """ + Strip the host from the username found in the keytab. + """ + service: NotRequired[pulumi.Input[str]] + """ + The service principle name. + """ + token: NotRequired[pulumi.Input[str]] + """ + Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token + """ + use_root_namespace: NotRequired[pulumi.Input[bool]] + """ + Authenticate to the root Vault namespace. Conflicts with namespace + """ + username: NotRequired[pulumi.Input[str]] + """ + The username to login into Kerberos with. + """ +elif False: + ProviderAuthLoginKerberosArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class ProviderAuthLoginKerberosArgs: def __init__(__self__, *, @@ -1204,6 +1550,31 @@ def username(self, value: Optional[pulumi.Input[str]]): pulumi.set(self, "username", value) +if not MYPY: + class ProviderAuthLoginOciArgsDict(TypedDict): + auth_type: pulumi.Input[str] + """ + Authentication type to use when getting OCI credentials. + """ + role: pulumi.Input[str] + """ + Name of the login role. + """ + mount: NotRequired[pulumi.Input[str]] + """ + The path where the authentication engine is mounted. + """ + namespace: NotRequired[pulumi.Input[str]] + """ + The authentication engine's namespace. Conflicts with use_root_namespace + """ + use_root_namespace: NotRequired[pulumi.Input[bool]] + """ + Authenticate to the root Vault namespace. Conflicts with namespace + """ +elif False: + ProviderAuthLoginOciArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class ProviderAuthLoginOciArgs: def __init__(__self__, *, @@ -1289,6 +1660,35 @@ def use_root_namespace(self, value: Optional[pulumi.Input[bool]]): pulumi.set(self, "use_root_namespace", value) +if not MYPY: + class ProviderAuthLoginOidcArgsDict(TypedDict): + role: pulumi.Input[str] + """ + Name of the login role. + """ + callback_address: NotRequired[pulumi.Input[str]] + """ + The callback address. Must be a valid URI without the path. + """ + callback_listener_address: NotRequired[pulumi.Input[str]] + """ + The callback listener's address. Must be a valid URI without the path. + """ + mount: NotRequired[pulumi.Input[str]] + """ + The path where the authentication engine is mounted. + """ + namespace: NotRequired[pulumi.Input[str]] + """ + The authentication engine's namespace. Conflicts with use_root_namespace + """ + use_root_namespace: NotRequired[pulumi.Input[bool]] + """ + Authenticate to the root Vault namespace. Conflicts with namespace + """ +elif False: + ProviderAuthLoginOidcArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class ProviderAuthLoginOidcArgs: def __init__(__self__, *, @@ -1391,6 +1791,31 @@ def use_root_namespace(self, value: Optional[pulumi.Input[bool]]): pulumi.set(self, "use_root_namespace", value) +if not MYPY: + class ProviderAuthLoginRadiusArgsDict(TypedDict): + password: pulumi.Input[str] + """ + The Radius password for username. + """ + username: pulumi.Input[str] + """ + The Radius username. + """ + mount: NotRequired[pulumi.Input[str]] + """ + The path where the authentication engine is mounted. + """ + namespace: NotRequired[pulumi.Input[str]] + """ + The authentication engine's namespace. Conflicts with use_root_namespace + """ + use_root_namespace: NotRequired[pulumi.Input[bool]] + """ + Authenticate to the root Vault namespace. Conflicts with namespace + """ +elif False: + ProviderAuthLoginRadiusArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class ProviderAuthLoginRadiusArgs: def __init__(__self__, *, @@ -1476,6 +1901,23 @@ def use_root_namespace(self, value: Optional[pulumi.Input[bool]]): pulumi.set(self, "use_root_namespace", value) +if not MYPY: + class ProviderAuthLoginTokenFileArgsDict(TypedDict): + filename: pulumi.Input[str] + """ + The name of a file containing a single line that is a valid Vault token + """ + namespace: NotRequired[pulumi.Input[str]] + """ + The authentication engine's namespace. Conflicts with use_root_namespace + """ + use_root_namespace: NotRequired[pulumi.Input[bool]] + """ + Authenticate to the root Vault namespace. Conflicts with namespace + """ +elif False: + ProviderAuthLoginTokenFileArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class ProviderAuthLoginTokenFileArgs: def __init__(__self__, *, @@ -1530,6 +1972,35 @@ def use_root_namespace(self, value: Optional[pulumi.Input[bool]]): pulumi.set(self, "use_root_namespace", value) +if not MYPY: + class ProviderAuthLoginUserpassArgsDict(TypedDict): + username: pulumi.Input[str] + """ + Login with username + """ + mount: NotRequired[pulumi.Input[str]] + """ + The path where the authentication engine is mounted. + """ + namespace: NotRequired[pulumi.Input[str]] + """ + The authentication engine's namespace. Conflicts with use_root_namespace + """ + password: NotRequired[pulumi.Input[str]] + """ + Login with password + """ + password_file: NotRequired[pulumi.Input[str]] + """ + Login with password from a file + """ + use_root_namespace: NotRequired[pulumi.Input[bool]] + """ + Authenticate to the root Vault namespace. Conflicts with namespace + """ +elif False: + ProviderAuthLoginUserpassArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class ProviderAuthLoginUserpassArgs: def __init__(__self__, *, @@ -1632,6 +2103,19 @@ def use_root_namespace(self, value: Optional[pulumi.Input[bool]]): pulumi.set(self, "use_root_namespace", value) +if not MYPY: + class ProviderClientAuthArgsDict(TypedDict): + cert_file: pulumi.Input[str] + """ + Path to a file containing the client certificate. + """ + key_file: pulumi.Input[str] + """ + Path to a file containing the private key that the certificate was issued for. + """ +elif False: + ProviderClientAuthArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class ProviderClientAuthArgs: def __init__(__self__, *, @@ -1669,6 +2153,19 @@ def key_file(self, value: pulumi.Input[str]): pulumi.set(self, "key_file", value) +if not MYPY: + class ProviderHeaderArgsDict(TypedDict): + name: pulumi.Input[str] + """ + The header name + """ + value: pulumi.Input[str] + """ + The header value + """ +elif False: + ProviderHeaderArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class ProviderHeaderArgs: def __init__(__self__, *, @@ -1706,6 +2203,43 @@ def value(self, value: pulumi.Input[str]): pulumi.set(self, "value", value) +if not MYPY: + class GetPolicyDocumentRuleArgsDict(TypedDict): + capabilities: Sequence[str] + """ + A list of capabilities that this rule apply to `path`. For example, ["read", "write"]. + """ + path: str + """ + A path in Vault that this rule applies to. + """ + allowed_parameters: NotRequired[Sequence['GetPolicyDocumentRuleAllowedParameterArgsDict']] + """ + Whitelists a list of keys and values that are permitted on the given path. See Parameters below. + """ + denied_parameters: NotRequired[Sequence['GetPolicyDocumentRuleDeniedParameterArgsDict']] + """ + Blacklists a list of parameter and values. Any values specified here take precedence over `allowed_parameter`. See Parameters below. + """ + description: NotRequired[str] + """ + Description of the rule. Will be added as a comment to rendered rule. + """ + max_wrapping_ttl: NotRequired[str] + """ + The maximum allowed TTL that clients can specify for a wrapped response. + """ + min_wrapping_ttl: NotRequired[str] + """ + The minimum allowed TTL that clients can specify for a wrapped response. + """ + required_parameters: NotRequired[Sequence[str]] + """ + A list of parameters that must be specified. + """ +elif False: + GetPolicyDocumentRuleArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class GetPolicyDocumentRuleArgs: def __init__(__self__, *, @@ -1839,6 +2373,19 @@ def required_parameters(self, value: Optional[Sequence[str]]): pulumi.set(self, "required_parameters", value) +if not MYPY: + class GetPolicyDocumentRuleAllowedParameterArgsDict(TypedDict): + key: str + """ + name of permitted or denied parameter. + """ + values: Sequence[str] + """ + list of values what are permitted or denied by policy rule. + """ +elif False: + GetPolicyDocumentRuleAllowedParameterArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class GetPolicyDocumentRuleAllowedParameterArgs: def __init__(__self__, *, @@ -1876,6 +2423,19 @@ def values(self, value: Sequence[str]): pulumi.set(self, "values", value) +if not MYPY: + class GetPolicyDocumentRuleDeniedParameterArgsDict(TypedDict): + key: str + """ + name of permitted or denied parameter. + """ + values: Sequence[str] + """ + list of values what are permitted or denied by policy rule. + """ +elif False: + GetPolicyDocumentRuleDeniedParameterArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class GetPolicyDocumentRuleDeniedParameterArgs: def __init__(__self__, *, diff --git a/sdk/python/pulumi_vault/_utilities.py b/sdk/python/pulumi_vault/_utilities.py index d14b49ace..3ce408d5f 100644 --- a/sdk/python/pulumi_vault/_utilities.py +++ b/sdk/python/pulumi_vault/_utilities.py @@ -264,7 +264,7 @@ def call_plain( output = pulumi.runtime.call(tok, props, res, typ) # Ingoring deps silently. They are typically non-empty, r.f() calls include r as a dependency. - result, known, secret, _ = _sync_await(asyncio.ensure_future(_await_output(output))) + result, known, secret, _ = _sync_await(asyncio.create_task(_await_output(output))) problem = None if not known: diff --git a/sdk/python/pulumi_vault/ad/get_access_credentials.py b/sdk/python/pulumi_vault/ad/get_access_credentials.py index 2b44491fc..46705d250 100644 --- a/sdk/python/pulumi_vault/ad/get_access_credentials.py +++ b/sdk/python/pulumi_vault/ad/get_access_credentials.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ @@ -139,9 +144,6 @@ def get_access_credentials(backend: Optional[str] = None, namespace=pulumi.get(__ret__, 'namespace'), role=pulumi.get(__ret__, 'role'), username=pulumi.get(__ret__, 'username')) - - -@_utilities.lift_output_func(get_access_credentials) def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None, namespace: Optional[pulumi.Input[Optional[str]]] = None, role: Optional[pulumi.Input[str]] = None, @@ -159,4 +161,17 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None, :param str role: The name of the AD secret backend role to read credentials from, with no leading or trailing `/`s. """ - ... + __args__ = dict() + __args__['backend'] = backend + __args__['namespace'] = namespace + __args__['role'] = role + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('vault:ad/getAccessCredentials:getAccessCredentials', __args__, opts=opts, typ=GetAccessCredentialsResult) + return __ret__.apply(lambda __response__: GetAccessCredentialsResult( + backend=pulumi.get(__response__, 'backend'), + current_password=pulumi.get(__response__, 'current_password'), + id=pulumi.get(__response__, 'id'), + last_password=pulumi.get(__response__, 'last_password'), + namespace=pulumi.get(__response__, 'namespace'), + role=pulumi.get(__response__, 'role'), + username=pulumi.get(__response__, 'username'))) diff --git a/sdk/python/pulumi_vault/ad/secret_backend.py b/sdk/python/pulumi_vault/ad/secret_backend.py index fbda91af9..dc9d7750d 100644 --- a/sdk/python/pulumi_vault/ad/secret_backend.py +++ b/sdk/python/pulumi_vault/ad/secret_backend.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretBackendArgs', 'SecretBackend'] diff --git a/sdk/python/pulumi_vault/ad/secret_library.py b/sdk/python/pulumi_vault/ad/secret_library.py index 901bbcf40..c0ae3a199 100644 --- a/sdk/python/pulumi_vault/ad/secret_library.py +++ b/sdk/python/pulumi_vault/ad/secret_library.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretLibraryArgs', 'SecretLibrary'] diff --git a/sdk/python/pulumi_vault/ad/secret_role.py b/sdk/python/pulumi_vault/ad/secret_role.py index aae7d7e36..8e38a7994 100644 --- a/sdk/python/pulumi_vault/ad/secret_role.py +++ b/sdk/python/pulumi_vault/ad/secret_role.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretRoleArgs', 'SecretRole'] diff --git a/sdk/python/pulumi_vault/alicloud/auth_backend_role.py b/sdk/python/pulumi_vault/alicloud/auth_backend_role.py index 4d3cbea52..68ea58978 100644 --- a/sdk/python/pulumi_vault/alicloud/auth_backend_role.py +++ b/sdk/python/pulumi_vault/alicloud/auth_backend_role.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole'] diff --git a/sdk/python/pulumi_vault/approle/auth_backend_login.py b/sdk/python/pulumi_vault/approle/auth_backend_login.py index 51bdb6b41..d1166c90d 100644 --- a/sdk/python/pulumi_vault/approle/auth_backend_login.py +++ b/sdk/python/pulumi_vault/approle/auth_backend_login.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['AuthBackendLoginArgs', 'AuthBackendLogin'] diff --git a/sdk/python/pulumi_vault/approle/auth_backend_role.py b/sdk/python/pulumi_vault/approle/auth_backend_role.py index 790182119..318df9fe3 100644 --- a/sdk/python/pulumi_vault/approle/auth_backend_role.py +++ b/sdk/python/pulumi_vault/approle/auth_backend_role.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole'] diff --git a/sdk/python/pulumi_vault/approle/auth_backend_role_secret_id.py b/sdk/python/pulumi_vault/approle/auth_backend_role_secret_id.py index 5b9baacd0..2113f1345 100644 --- a/sdk/python/pulumi_vault/approle/auth_backend_role_secret_id.py +++ b/sdk/python/pulumi_vault/approle/auth_backend_role_secret_id.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['AuthBackendRoleSecretIdArgs', 'AuthBackendRoleSecretId'] diff --git a/sdk/python/pulumi_vault/approle/get_auth_backend_role_id.py b/sdk/python/pulumi_vault/approle/get_auth_backend_role_id.py index a03af8556..3bacc1dd7 100644 --- a/sdk/python/pulumi_vault/approle/get_auth_backend_role_id.py +++ b/sdk/python/pulumi_vault/approle/get_auth_backend_role_id.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ @@ -123,9 +128,6 @@ def get_auth_backend_role_id(backend: Optional[str] = None, namespace=pulumi.get(__ret__, 'namespace'), role_id=pulumi.get(__ret__, 'role_id'), role_name=pulumi.get(__ret__, 'role_name')) - - -@_utilities.lift_output_func(get_auth_backend_role_id) def get_auth_backend_role_id_output(backend: Optional[pulumi.Input[Optional[str]]] = None, namespace: Optional[pulumi.Input[Optional[str]]] = None, role_name: Optional[pulumi.Input[str]] = None, @@ -153,4 +155,15 @@ def get_auth_backend_role_id_output(backend: Optional[pulumi.Input[Optional[str] *Available only for Vault Enterprise*. :param str role_name: The name of the role to retrieve the Role ID for. """ - ... + __args__ = dict() + __args__['backend'] = backend + __args__['namespace'] = namespace + __args__['roleName'] = role_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('vault:appRole/getAuthBackendRoleId:getAuthBackendRoleId', __args__, opts=opts, typ=GetAuthBackendRoleIdResult) + return __ret__.apply(lambda __response__: GetAuthBackendRoleIdResult( + backend=pulumi.get(__response__, 'backend'), + id=pulumi.get(__response__, 'id'), + namespace=pulumi.get(__response__, 'namespace'), + role_id=pulumi.get(__response__, 'role_id'), + role_name=pulumi.get(__response__, 'role_name'))) diff --git a/sdk/python/pulumi_vault/audit.py b/sdk/python/pulumi_vault/audit.py index cccc33c0a..9aa501888 100644 --- a/sdk/python/pulumi_vault/audit.py +++ b/sdk/python/pulumi_vault/audit.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from . import _utilities __all__ = ['AuditArgs', 'Audit'] diff --git a/sdk/python/pulumi_vault/audit_request_header.py b/sdk/python/pulumi_vault/audit_request_header.py index e76a9e24a..c10a63d3e 100644 --- a/sdk/python/pulumi_vault/audit_request_header.py +++ b/sdk/python/pulumi_vault/audit_request_header.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from . import _utilities __all__ = ['AuditRequestHeaderArgs', 'AuditRequestHeader'] diff --git a/sdk/python/pulumi_vault/auth_backend.py b/sdk/python/pulumi_vault/auth_backend.py index 0fabf9160..6f115aa9f 100644 --- a/sdk/python/pulumi_vault/auth_backend.py +++ b/sdk/python/pulumi_vault/auth_backend.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from . import _utilities from . import outputs from ._inputs import * diff --git a/sdk/python/pulumi_vault/aws/auth_backend_cert.py b/sdk/python/pulumi_vault/aws/auth_backend_cert.py index 88bcf6f72..6a4678807 100644 --- a/sdk/python/pulumi_vault/aws/auth_backend_cert.py +++ b/sdk/python/pulumi_vault/aws/auth_backend_cert.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['AuthBackendCertArgs', 'AuthBackendCert'] diff --git a/sdk/python/pulumi_vault/aws/auth_backend_client.py b/sdk/python/pulumi_vault/aws/auth_backend_client.py index 4eb3c9a97..e4826b5d8 100644 --- a/sdk/python/pulumi_vault/aws/auth_backend_client.py +++ b/sdk/python/pulumi_vault/aws/auth_backend_client.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['AuthBackendClientArgs', 'AuthBackendClient'] diff --git a/sdk/python/pulumi_vault/aws/auth_backend_config_identity.py b/sdk/python/pulumi_vault/aws/auth_backend_config_identity.py index e66ffc390..0c35038d1 100644 --- a/sdk/python/pulumi_vault/aws/auth_backend_config_identity.py +++ b/sdk/python/pulumi_vault/aws/auth_backend_config_identity.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['AuthBackendConfigIdentityArgs', 'AuthBackendConfigIdentity'] diff --git a/sdk/python/pulumi_vault/aws/auth_backend_identity_whitelist.py b/sdk/python/pulumi_vault/aws/auth_backend_identity_whitelist.py index d21ba0e61..044aa716e 100644 --- a/sdk/python/pulumi_vault/aws/auth_backend_identity_whitelist.py +++ b/sdk/python/pulumi_vault/aws/auth_backend_identity_whitelist.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['AuthBackendIdentityWhitelistArgs', 'AuthBackendIdentityWhitelist'] diff --git a/sdk/python/pulumi_vault/aws/auth_backend_login.py b/sdk/python/pulumi_vault/aws/auth_backend_login.py index 809fe9b54..4df2dad8f 100644 --- a/sdk/python/pulumi_vault/aws/auth_backend_login.py +++ b/sdk/python/pulumi_vault/aws/auth_backend_login.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['AuthBackendLoginArgs', 'AuthBackendLogin'] diff --git a/sdk/python/pulumi_vault/aws/auth_backend_role.py b/sdk/python/pulumi_vault/aws/auth_backend_role.py index a5a7a6d70..6deeb1d1d 100644 --- a/sdk/python/pulumi_vault/aws/auth_backend_role.py +++ b/sdk/python/pulumi_vault/aws/auth_backend_role.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole'] diff --git a/sdk/python/pulumi_vault/aws/auth_backend_role_tag.py b/sdk/python/pulumi_vault/aws/auth_backend_role_tag.py index c7f8011b9..16b91696e 100644 --- a/sdk/python/pulumi_vault/aws/auth_backend_role_tag.py +++ b/sdk/python/pulumi_vault/aws/auth_backend_role_tag.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['AuthBackendRoleTagArgs', 'AuthBackendRoleTag'] diff --git a/sdk/python/pulumi_vault/aws/auth_backend_roletag_blacklist.py b/sdk/python/pulumi_vault/aws/auth_backend_roletag_blacklist.py index 9cad0af67..441397f30 100644 --- a/sdk/python/pulumi_vault/aws/auth_backend_roletag_blacklist.py +++ b/sdk/python/pulumi_vault/aws/auth_backend_roletag_blacklist.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['AuthBackendRoletagBlacklistArgs', 'AuthBackendRoletagBlacklist'] diff --git a/sdk/python/pulumi_vault/aws/auth_backend_sts_role.py b/sdk/python/pulumi_vault/aws/auth_backend_sts_role.py index be1ff8ed9..c0afae83d 100644 --- a/sdk/python/pulumi_vault/aws/auth_backend_sts_role.py +++ b/sdk/python/pulumi_vault/aws/auth_backend_sts_role.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['AuthBackendStsRoleArgs', 'AuthBackendStsRole'] diff --git a/sdk/python/pulumi_vault/aws/get_access_credentials.py b/sdk/python/pulumi_vault/aws/get_access_credentials.py index 091e759cb..d84c7ef39 100644 --- a/sdk/python/pulumi_vault/aws/get_access_credentials.py +++ b/sdk/python/pulumi_vault/aws/get_access_credentials.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ @@ -246,9 +251,6 @@ def get_access_credentials(backend: Optional[str] = None, security_token=pulumi.get(__ret__, 'security_token'), ttl=pulumi.get(__ret__, 'ttl'), type=pulumi.get(__ret__, 'type')) - - -@_utilities.lift_output_func(get_access_credentials) def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None, namespace: Optional[pulumi.Input[Optional[str]]] = None, region: Optional[pulumi.Input[Optional[str]]] = None, @@ -281,4 +283,29 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None, Key. Can also be set to `"sts"`, which will return a security token in addition to the keys. """ - ... + __args__ = dict() + __args__['backend'] = backend + __args__['namespace'] = namespace + __args__['region'] = region + __args__['role'] = role + __args__['roleArn'] = role_arn + __args__['ttl'] = ttl + __args__['type'] = type + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('vault:aws/getAccessCredentials:getAccessCredentials', __args__, opts=opts, typ=GetAccessCredentialsResult) + return __ret__.apply(lambda __response__: GetAccessCredentialsResult( + access_key=pulumi.get(__response__, 'access_key'), + backend=pulumi.get(__response__, 'backend'), + id=pulumi.get(__response__, 'id'), + lease_duration=pulumi.get(__response__, 'lease_duration'), + lease_id=pulumi.get(__response__, 'lease_id'), + lease_renewable=pulumi.get(__response__, 'lease_renewable'), + lease_start_time=pulumi.get(__response__, 'lease_start_time'), + namespace=pulumi.get(__response__, 'namespace'), + region=pulumi.get(__response__, 'region'), + role=pulumi.get(__response__, 'role'), + role_arn=pulumi.get(__response__, 'role_arn'), + secret_key=pulumi.get(__response__, 'secret_key'), + security_token=pulumi.get(__response__, 'security_token'), + ttl=pulumi.get(__response__, 'ttl'), + type=pulumi.get(__response__, 'type'))) diff --git a/sdk/python/pulumi_vault/aws/get_static_access_credentials.py b/sdk/python/pulumi_vault/aws/get_static_access_credentials.py index d7379f90e..a99db483c 100644 --- a/sdk/python/pulumi_vault/aws/get_static_access_credentials.py +++ b/sdk/python/pulumi_vault/aws/get_static_access_credentials.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ @@ -110,9 +115,6 @@ def get_static_access_credentials(backend: Optional[str] = None, name=pulumi.get(__ret__, 'name'), namespace=pulumi.get(__ret__, 'namespace'), secret_key=pulumi.get(__ret__, 'secret_key')) - - -@_utilities.lift_output_func(get_static_access_credentials) def get_static_access_credentials_output(backend: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, namespace: Optional[pulumi.Input[Optional[str]]] = None, @@ -120,4 +122,16 @@ def get_static_access_credentials_output(backend: Optional[pulumi.Input[str]] = """ Use this data source to access information about an existing resource. """ - ... + __args__ = dict() + __args__['backend'] = backend + __args__['name'] = name + __args__['namespace'] = namespace + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('vault:aws/getStaticAccessCredentials:getStaticAccessCredentials', __args__, opts=opts, typ=GetStaticAccessCredentialsResult) + return __ret__.apply(lambda __response__: GetStaticAccessCredentialsResult( + access_key=pulumi.get(__response__, 'access_key'), + backend=pulumi.get(__response__, 'backend'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + namespace=pulumi.get(__response__, 'namespace'), + secret_key=pulumi.get(__response__, 'secret_key'))) diff --git a/sdk/python/pulumi_vault/aws/secret_backend.py b/sdk/python/pulumi_vault/aws/secret_backend.py index 928a9d6ed..bc0423a3f 100644 --- a/sdk/python/pulumi_vault/aws/secret_backend.py +++ b/sdk/python/pulumi_vault/aws/secret_backend.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretBackendArgs', 'SecretBackend'] diff --git a/sdk/python/pulumi_vault/aws/secret_backend_role.py b/sdk/python/pulumi_vault/aws/secret_backend_role.py index 1be948123..80f71a1d8 100644 --- a/sdk/python/pulumi_vault/aws/secret_backend_role.py +++ b/sdk/python/pulumi_vault/aws/secret_backend_role.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretBackendRoleArgs', 'SecretBackendRole'] diff --git a/sdk/python/pulumi_vault/aws/secret_backend_static_role.py b/sdk/python/pulumi_vault/aws/secret_backend_static_role.py index e40089e97..130498b82 100644 --- a/sdk/python/pulumi_vault/aws/secret_backend_static_role.py +++ b/sdk/python/pulumi_vault/aws/secret_backend_static_role.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole'] diff --git a/sdk/python/pulumi_vault/azure/_inputs.py b/sdk/python/pulumi_vault/azure/_inputs.py index 95893deae..ad25028f5 100644 --- a/sdk/python/pulumi_vault/azure/_inputs.py +++ b/sdk/python/pulumi_vault/azure/_inputs.py @@ -4,16 +4,32 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ 'BackendRoleAzureGroupArgs', + 'BackendRoleAzureGroupArgsDict', 'BackendRoleAzureRoleArgs', + 'BackendRoleAzureRoleArgsDict', ] +MYPY = False + +if not MYPY: + class BackendRoleAzureGroupArgsDict(TypedDict): + group_name: pulumi.Input[str] + object_id: NotRequired[pulumi.Input[str]] +elif False: + BackendRoleAzureGroupArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class BackendRoleAzureGroupArgs: def __init__(__self__, *, @@ -42,6 +58,14 @@ def object_id(self, value: Optional[pulumi.Input[str]]): pulumi.set(self, "object_id", value) +if not MYPY: + class BackendRoleAzureRoleArgsDict(TypedDict): + scope: pulumi.Input[str] + role_id: NotRequired[pulumi.Input[str]] + role_name: NotRequired[pulumi.Input[str]] +elif False: + BackendRoleAzureRoleArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class BackendRoleAzureRoleArgs: def __init__(__self__, *, diff --git a/sdk/python/pulumi_vault/azure/auth_backend_config.py b/sdk/python/pulumi_vault/azure/auth_backend_config.py index fd6b4750c..703cd4d7e 100644 --- a/sdk/python/pulumi_vault/azure/auth_backend_config.py +++ b/sdk/python/pulumi_vault/azure/auth_backend_config.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['AuthBackendConfigArgs', 'AuthBackendConfig'] diff --git a/sdk/python/pulumi_vault/azure/auth_backend_role.py b/sdk/python/pulumi_vault/azure/auth_backend_role.py index 460a3996f..7f3f8e2da 100644 --- a/sdk/python/pulumi_vault/azure/auth_backend_role.py +++ b/sdk/python/pulumi_vault/azure/auth_backend_role.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole'] diff --git a/sdk/python/pulumi_vault/azure/backend.py b/sdk/python/pulumi_vault/azure/backend.py index d8d5dde16..90025a057 100644 --- a/sdk/python/pulumi_vault/azure/backend.py +++ b/sdk/python/pulumi_vault/azure/backend.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['BackendArgs', 'Backend'] diff --git a/sdk/python/pulumi_vault/azure/backend_role.py b/sdk/python/pulumi_vault/azure/backend_role.py index 9fed65366..8d601eedc 100644 --- a/sdk/python/pulumi_vault/azure/backend_role.py +++ b/sdk/python/pulumi_vault/azure/backend_role.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities from . import outputs from ._inputs import * diff --git a/sdk/python/pulumi_vault/azure/get_access_credentials.py b/sdk/python/pulumi_vault/azure/get_access_credentials.py index 465d80640..4cb208295 100644 --- a/sdk/python/pulumi_vault/azure/get_access_credentials.py +++ b/sdk/python/pulumi_vault/azure/get_access_credentials.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ @@ -298,9 +303,6 @@ def get_access_credentials(backend: Optional[str] = None, subscription_id=pulumi.get(__ret__, 'subscription_id'), tenant_id=pulumi.get(__ret__, 'tenant_id'), validate_creds=pulumi.get(__ret__, 'validate_creds')) - - -@_utilities.lift_output_func(get_access_credentials) def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None, environment: Optional[pulumi.Input[Optional[str]]] = None, max_cred_validation_seconds: Optional[pulumi.Input[Optional[int]]] = None, @@ -365,4 +367,34 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None, credentials without checking whether they have fully propagated throughout Azure Active Directory. Designating `true` activates testing. """ - ... + __args__ = dict() + __args__['backend'] = backend + __args__['environment'] = environment + __args__['maxCredValidationSeconds'] = max_cred_validation_seconds + __args__['namespace'] = namespace + __args__['numSecondsBetweenTests'] = num_seconds_between_tests + __args__['numSequentialSuccesses'] = num_sequential_successes + __args__['role'] = role + __args__['subscriptionId'] = subscription_id + __args__['tenantId'] = tenant_id + __args__['validateCreds'] = validate_creds + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('vault:azure/getAccessCredentials:getAccessCredentials', __args__, opts=opts, typ=GetAccessCredentialsResult) + return __ret__.apply(lambda __response__: GetAccessCredentialsResult( + backend=pulumi.get(__response__, 'backend'), + client_id=pulumi.get(__response__, 'client_id'), + client_secret=pulumi.get(__response__, 'client_secret'), + environment=pulumi.get(__response__, 'environment'), + id=pulumi.get(__response__, 'id'), + lease_duration=pulumi.get(__response__, 'lease_duration'), + lease_id=pulumi.get(__response__, 'lease_id'), + lease_renewable=pulumi.get(__response__, 'lease_renewable'), + lease_start_time=pulumi.get(__response__, 'lease_start_time'), + max_cred_validation_seconds=pulumi.get(__response__, 'max_cred_validation_seconds'), + namespace=pulumi.get(__response__, 'namespace'), + num_seconds_between_tests=pulumi.get(__response__, 'num_seconds_between_tests'), + num_sequential_successes=pulumi.get(__response__, 'num_sequential_successes'), + role=pulumi.get(__response__, 'role'), + subscription_id=pulumi.get(__response__, 'subscription_id'), + tenant_id=pulumi.get(__response__, 'tenant_id'), + validate_creds=pulumi.get(__response__, 'validate_creds'))) diff --git a/sdk/python/pulumi_vault/azure/outputs.py b/sdk/python/pulumi_vault/azure/outputs.py index 4d5166733..2fb7db164 100644 --- a/sdk/python/pulumi_vault/azure/outputs.py +++ b/sdk/python/pulumi_vault/azure/outputs.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ diff --git a/sdk/python/pulumi_vault/cert_auth_backend_role.py b/sdk/python/pulumi_vault/cert_auth_backend_role.py index 1010f5d63..f4593434e 100644 --- a/sdk/python/pulumi_vault/cert_auth_backend_role.py +++ b/sdk/python/pulumi_vault/cert_auth_backend_role.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from . import _utilities __all__ = ['CertAuthBackendRoleArgs', 'CertAuthBackendRole'] diff --git a/sdk/python/pulumi_vault/config/__init__.pyi b/sdk/python/pulumi_vault/config/__init__.pyi index c4195e4b9..e8e03f004 100644 --- a/sdk/python/pulumi_vault/config/__init__.pyi +++ b/sdk/python/pulumi_vault/config/__init__.pyi @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities from . import outputs diff --git a/sdk/python/pulumi_vault/config/_inputs.py b/sdk/python/pulumi_vault/config/_inputs.py index 1a657a184..c966d3b92 100644 --- a/sdk/python/pulumi_vault/config/_inputs.py +++ b/sdk/python/pulumi_vault/config/_inputs.py @@ -4,15 +4,36 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ 'UiCustomMessageLinkArgs', + 'UiCustomMessageLinkArgsDict', ] +MYPY = False + +if not MYPY: + class UiCustomMessageLinkArgsDict(TypedDict): + href: pulumi.Input[str] + """ + The URL of the hyperlink + """ + title: pulumi.Input[str] + """ + The title of the hyperlink + """ +elif False: + UiCustomMessageLinkArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class UiCustomMessageLinkArgs: def __init__(__self__, *, diff --git a/sdk/python/pulumi_vault/config/outputs.py b/sdk/python/pulumi_vault/config/outputs.py index fbe3d994a..b49a00ede 100644 --- a/sdk/python/pulumi_vault/config/outputs.py +++ b/sdk/python/pulumi_vault/config/outputs.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ diff --git a/sdk/python/pulumi_vault/config/ui_custom_message.py b/sdk/python/pulumi_vault/config/ui_custom_message.py index db53326ae..885161ffc 100644 --- a/sdk/python/pulumi_vault/config/ui_custom_message.py +++ b/sdk/python/pulumi_vault/config/ui_custom_message.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities from . import outputs from ._inputs import * diff --git a/sdk/python/pulumi_vault/config/vars.py b/sdk/python/pulumi_vault/config/vars.py index 52d480434..29ac37d1e 100644 --- a/sdk/python/pulumi_vault/config/vars.py +++ b/sdk/python/pulumi_vault/config/vars.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities from . import outputs diff --git a/sdk/python/pulumi_vault/consul/secret_backend.py b/sdk/python/pulumi_vault/consul/secret_backend.py index 683e01b83..d610be60f 100644 --- a/sdk/python/pulumi_vault/consul/secret_backend.py +++ b/sdk/python/pulumi_vault/consul/secret_backend.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretBackendArgs', 'SecretBackend'] diff --git a/sdk/python/pulumi_vault/consul/secret_backend_role.py b/sdk/python/pulumi_vault/consul/secret_backend_role.py index 73da2fdd6..dfd8ea2ba 100644 --- a/sdk/python/pulumi_vault/consul/secret_backend_role.py +++ b/sdk/python/pulumi_vault/consul/secret_backend_role.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretBackendRoleArgs', 'SecretBackendRole'] diff --git a/sdk/python/pulumi_vault/database/_inputs.py b/sdk/python/pulumi_vault/database/_inputs.py index 1cca3d089..c16f8409f 100644 --- a/sdk/python/pulumi_vault/database/_inputs.py +++ b/sdk/python/pulumi_vault/database/_inputs.py @@ -4,50 +4,138 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ 'SecretBackendConnectionCassandraArgs', + 'SecretBackendConnectionCassandraArgsDict', 'SecretBackendConnectionCouchbaseArgs', + 'SecretBackendConnectionCouchbaseArgsDict', 'SecretBackendConnectionElasticsearchArgs', + 'SecretBackendConnectionElasticsearchArgsDict', 'SecretBackendConnectionHanaArgs', + 'SecretBackendConnectionHanaArgsDict', 'SecretBackendConnectionInfluxdbArgs', + 'SecretBackendConnectionInfluxdbArgsDict', 'SecretBackendConnectionMongodbArgs', + 'SecretBackendConnectionMongodbArgsDict', 'SecretBackendConnectionMongodbatlasArgs', + 'SecretBackendConnectionMongodbatlasArgsDict', 'SecretBackendConnectionMssqlArgs', + 'SecretBackendConnectionMssqlArgsDict', 'SecretBackendConnectionMysqlArgs', + 'SecretBackendConnectionMysqlArgsDict', 'SecretBackendConnectionMysqlAuroraArgs', + 'SecretBackendConnectionMysqlAuroraArgsDict', 'SecretBackendConnectionMysqlLegacyArgs', + 'SecretBackendConnectionMysqlLegacyArgsDict', 'SecretBackendConnectionMysqlRdsArgs', + 'SecretBackendConnectionMysqlRdsArgsDict', 'SecretBackendConnectionOracleArgs', + 'SecretBackendConnectionOracleArgsDict', 'SecretBackendConnectionPostgresqlArgs', + 'SecretBackendConnectionPostgresqlArgsDict', 'SecretBackendConnectionRedisArgs', + 'SecretBackendConnectionRedisArgsDict', 'SecretBackendConnectionRedisElasticacheArgs', + 'SecretBackendConnectionRedisElasticacheArgsDict', 'SecretBackendConnectionRedshiftArgs', + 'SecretBackendConnectionRedshiftArgsDict', 'SecretBackendConnectionSnowflakeArgs', + 'SecretBackendConnectionSnowflakeArgsDict', 'SecretsMountCassandraArgs', + 'SecretsMountCassandraArgsDict', 'SecretsMountCouchbaseArgs', + 'SecretsMountCouchbaseArgsDict', 'SecretsMountElasticsearchArgs', + 'SecretsMountElasticsearchArgsDict', 'SecretsMountHanaArgs', + 'SecretsMountHanaArgsDict', 'SecretsMountInfluxdbArgs', + 'SecretsMountInfluxdbArgsDict', 'SecretsMountMongodbArgs', + 'SecretsMountMongodbArgsDict', 'SecretsMountMongodbatlaArgs', + 'SecretsMountMongodbatlaArgsDict', 'SecretsMountMssqlArgs', + 'SecretsMountMssqlArgsDict', 'SecretsMountMysqlArgs', + 'SecretsMountMysqlArgsDict', 'SecretsMountMysqlAuroraArgs', + 'SecretsMountMysqlAuroraArgsDict', 'SecretsMountMysqlLegacyArgs', + 'SecretsMountMysqlLegacyArgsDict', 'SecretsMountMysqlRdArgs', + 'SecretsMountMysqlRdArgsDict', 'SecretsMountOracleArgs', + 'SecretsMountOracleArgsDict', 'SecretsMountPostgresqlArgs', + 'SecretsMountPostgresqlArgsDict', 'SecretsMountRediArgs', + 'SecretsMountRediArgsDict', 'SecretsMountRedisElasticachArgs', + 'SecretsMountRedisElasticachArgsDict', 'SecretsMountRedshiftArgs', + 'SecretsMountRedshiftArgsDict', 'SecretsMountSnowflakeArgs', + 'SecretsMountSnowflakeArgsDict', ] +MYPY = False + +if not MYPY: + class SecretBackendConnectionCassandraArgsDict(TypedDict): + connect_timeout: NotRequired[pulumi.Input[int]] + """ + The number of seconds to use as a connection timeout. + """ + hosts: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + Cassandra hosts to connect to. + """ + insecure_tls: NotRequired[pulumi.Input[bool]] + """ + Whether to skip verification of the server certificate when using TLS. + """ + password: NotRequired[pulumi.Input[str]] + """ + The password to use when authenticating with Cassandra. + """ + pem_bundle: NotRequired[pulumi.Input[str]] + """ + Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. + """ + pem_json: NotRequired[pulumi.Input[str]] + """ + Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. + """ + port: NotRequired[pulumi.Input[int]] + """ + The transport port to use to connect to Cassandra. + """ + protocol_version: NotRequired[pulumi.Input[int]] + """ + The CQL protocol version to use. + """ + tls: NotRequired[pulumi.Input[bool]] + """ + Whether to use TLS when connecting to Cassandra. + """ + username: NotRequired[pulumi.Input[str]] + """ + The username to use when authenticating with Cassandra. + """ +elif False: + SecretBackendConnectionCassandraArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretBackendConnectionCassandraArgs: def __init__(__self__, *, @@ -215,6 +303,43 @@ def username(self, value: Optional[pulumi.Input[str]]): pulumi.set(self, "username", value) +if not MYPY: + class SecretBackendConnectionCouchbaseArgsDict(TypedDict): + hosts: pulumi.Input[Sequence[pulumi.Input[str]]] + """ + A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`. + """ + password: pulumi.Input[str] + """ + Specifies the password corresponding to the given username. + """ + username: pulumi.Input[str] + """ + Specifies the username for Vault to use. + """ + base64_pem: NotRequired[pulumi.Input[str]] + """ + Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded. + """ + bucket_name: NotRequired[pulumi.Input[str]] + """ + Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server. + """ + insecure_tls: NotRequired[pulumi.Input[bool]] + """ + Specifies whether to skip verification of the server certificate when using TLS. + """ + tls: NotRequired[pulumi.Input[bool]] + """ + Specifies whether to use TLS when connecting to Couchbase. + """ + username_template: NotRequired[pulumi.Input[str]] + """ + Template describing how dynamic usernames are generated. + """ +elif False: + SecretBackendConnectionCouchbaseArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretBackendConnectionCouchbaseArgs: def __init__(__self__, *, @@ -347,6 +472,51 @@ def username_template(self, value: Optional[pulumi.Input[str]]): pulumi.set(self, "username_template", value) +if not MYPY: + class SecretBackendConnectionElasticsearchArgsDict(TypedDict): + password: pulumi.Input[str] + """ + The password to be used in the connection URL + """ + url: pulumi.Input[str] + """ + The URL for Elasticsearch's API + """ + username: pulumi.Input[str] + """ + The username to be used in the connection URL + """ + ca_cert: NotRequired[pulumi.Input[str]] + """ + The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity + """ + ca_path: NotRequired[pulumi.Input[str]] + """ + The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity + """ + client_cert: NotRequired[pulumi.Input[str]] + """ + The path to the certificate for the Elasticsearch client to present for communication + """ + client_key: NotRequired[pulumi.Input[str]] + """ + The path to the key for the Elasticsearch client to use for communication + """ + insecure: NotRequired[pulumi.Input[bool]] + """ + Whether to disable certificate verification + """ + tls_server_name: NotRequired[pulumi.Input[str]] + """ + This, if set, is used to set the SNI host when connecting via TLS + """ + username_template: NotRequired[pulumi.Input[str]] + """ + Template describing how dynamic usernames are generated. + """ +elif False: + SecretBackendConnectionElasticsearchArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretBackendConnectionElasticsearchArgs: def __init__(__self__, *, @@ -511,6 +681,39 @@ def username_template(self, value: Optional[pulumi.Input[str]]): pulumi.set(self, "username_template", value) +if not MYPY: + class SecretBackendConnectionHanaArgsDict(TypedDict): + connection_url: NotRequired[pulumi.Input[str]] + """ + Connection string to use to connect to the database. + """ + disable_escaping: NotRequired[pulumi.Input[bool]] + """ + Disable special character escaping in username and password + """ + max_connection_lifetime: NotRequired[pulumi.Input[int]] + """ + Maximum number of seconds a connection may be reused. + """ + max_idle_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of idle connections to the database. + """ + max_open_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of open connections to the database. + """ + password: NotRequired[pulumi.Input[str]] + """ + The root credential password used in the connection URL + """ + username: NotRequired[pulumi.Input[str]] + """ + The root credential username used in the connection URL + """ +elif False: + SecretBackendConnectionHanaArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretBackendConnectionHanaArgs: def __init__(__self__, *, @@ -630,6 +833,51 @@ def username(self, value: Optional[pulumi.Input[str]]): pulumi.set(self, "username", value) +if not MYPY: + class SecretBackendConnectionInfluxdbArgsDict(TypedDict): + host: pulumi.Input[str] + """ + Influxdb host to connect to. + """ + password: pulumi.Input[str] + """ + Specifies the password corresponding to the given username. + """ + username: pulumi.Input[str] + """ + Specifies the username to use for superuser access. + """ + connect_timeout: NotRequired[pulumi.Input[int]] + """ + The number of seconds to use as a connection timeout. + """ + insecure_tls: NotRequired[pulumi.Input[bool]] + """ + Whether to skip verification of the server certificate when using TLS. + """ + pem_bundle: NotRequired[pulumi.Input[str]] + """ + Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. + """ + pem_json: NotRequired[pulumi.Input[str]] + """ + Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. + """ + port: NotRequired[pulumi.Input[int]] + """ + The transport port to use to connect to Influxdb. + """ + tls: NotRequired[pulumi.Input[bool]] + """ + Whether to use TLS when connecting to Influxdb. + """ + username_template: NotRequired[pulumi.Input[str]] + """ + Template describing how dynamic usernames are generated. + """ +elif False: + SecretBackendConnectionInfluxdbArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretBackendConnectionInfluxdbArgs: def __init__(__self__, *, @@ -794,6 +1042,39 @@ def username_template(self, value: Optional[pulumi.Input[str]]): pulumi.set(self, "username_template", value) +if not MYPY: + class SecretBackendConnectionMongodbArgsDict(TypedDict): + connection_url: NotRequired[pulumi.Input[str]] + """ + Connection string to use to connect to the database. + """ + max_connection_lifetime: NotRequired[pulumi.Input[int]] + """ + Maximum number of seconds a connection may be reused. + """ + max_idle_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of idle connections to the database. + """ + max_open_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of open connections to the database. + """ + password: NotRequired[pulumi.Input[str]] + """ + The root credential password used in the connection URL + """ + username: NotRequired[pulumi.Input[str]] + """ + The root credential username used in the connection URL + """ + username_template: NotRequired[pulumi.Input[str]] + """ + Username generation template. + """ +elif False: + SecretBackendConnectionMongodbArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretBackendConnectionMongodbArgs: def __init__(__self__, *, @@ -913,6 +1194,23 @@ def username_template(self, value: Optional[pulumi.Input[str]]): pulumi.set(self, "username_template", value) +if not MYPY: + class SecretBackendConnectionMongodbatlasArgsDict(TypedDict): + private_key: pulumi.Input[str] + """ + The Private Programmatic API Key used to connect with MongoDB Atlas API. + """ + project_id: pulumi.Input[str] + """ + The Project ID the Database User should be created within. + """ + public_key: pulumi.Input[str] + """ + The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. + """ +elif False: + SecretBackendConnectionMongodbatlasArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretBackendConnectionMongodbatlasArgs: def __init__(__self__, *, @@ -965,6 +1263,47 @@ def public_key(self, value: pulumi.Input[str]): pulumi.set(self, "public_key", value) +if not MYPY: + class SecretBackendConnectionMssqlArgsDict(TypedDict): + connection_url: NotRequired[pulumi.Input[str]] + """ + Connection string to use to connect to the database. + """ + contained_db: NotRequired[pulumi.Input[bool]] + """ + Set to true when the target is a Contained Database, e.g. AzureSQL. + """ + disable_escaping: NotRequired[pulumi.Input[bool]] + """ + Disable special character escaping in username and password + """ + max_connection_lifetime: NotRequired[pulumi.Input[int]] + """ + Maximum number of seconds a connection may be reused. + """ + max_idle_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of idle connections to the database. + """ + max_open_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of open connections to the database. + """ + password: NotRequired[pulumi.Input[str]] + """ + The root credential password used in the connection URL + """ + username: NotRequired[pulumi.Input[str]] + """ + The root credential username used in the connection URL + """ + username_template: NotRequired[pulumi.Input[str]] + """ + Username generation template. + """ +elif False: + SecretBackendConnectionMssqlArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretBackendConnectionMssqlArgs: def __init__(__self__, *, @@ -1116,6 +1455,55 @@ def username_template(self, value: Optional[pulumi.Input[str]]): pulumi.set(self, "username_template", value) +if not MYPY: + class SecretBackendConnectionMysqlArgsDict(TypedDict): + auth_type: NotRequired[pulumi.Input[str]] + """ + Specify alternative authorization type. (Only 'gcp_iam' is valid currently) + """ + connection_url: NotRequired[pulumi.Input[str]] + """ + Connection string to use to connect to the database. + """ + max_connection_lifetime: NotRequired[pulumi.Input[int]] + """ + Maximum number of seconds a connection may be reused. + """ + max_idle_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of idle connections to the database. + """ + max_open_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of open connections to the database. + """ + password: NotRequired[pulumi.Input[str]] + """ + The root credential password used in the connection URL + """ + service_account_json: NotRequired[pulumi.Input[str]] + """ + A JSON encoded credential for use with IAM authorization + """ + tls_ca: NotRequired[pulumi.Input[str]] + """ + x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. + """ + tls_certificate_key: NotRequired[pulumi.Input[str]] + """ + x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. + """ + username: NotRequired[pulumi.Input[str]] + """ + The root credential username used in the connection URL + """ + username_template: NotRequired[pulumi.Input[str]] + """ + Username generation template. + """ +elif False: + SecretBackendConnectionMysqlArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretBackendConnectionMysqlArgs: def __init__(__self__, *, @@ -1299,28 +1687,77 @@ def username_template(self, value: Optional[pulumi.Input[str]]): pulumi.set(self, "username_template", value) -@pulumi.input_type -class SecretBackendConnectionMysqlAuroraArgs: - def __init__(__self__, *, - auth_type: Optional[pulumi.Input[str]] = None, - connection_url: Optional[pulumi.Input[str]] = None, - max_connection_lifetime: Optional[pulumi.Input[int]] = None, - max_idle_connections: Optional[pulumi.Input[int]] = None, - max_open_connections: Optional[pulumi.Input[int]] = None, - password: Optional[pulumi.Input[str]] = None, - service_account_json: Optional[pulumi.Input[str]] = None, - tls_ca: Optional[pulumi.Input[str]] = None, - tls_certificate_key: Optional[pulumi.Input[str]] = None, - username: Optional[pulumi.Input[str]] = None, - username_template: Optional[pulumi.Input[str]] = None): +if not MYPY: + class SecretBackendConnectionMysqlAuroraArgsDict(TypedDict): + auth_type: NotRequired[pulumi.Input[str]] """ - :param pulumi.Input[str] auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently) - :param pulumi.Input[str] connection_url: Connection string to use to connect to the database. - :param pulumi.Input[int] max_connection_lifetime: Maximum number of seconds a connection may be reused. - :param pulumi.Input[int] max_idle_connections: Maximum number of idle connections to the database. - :param pulumi.Input[int] max_open_connections: Maximum number of open connections to the database. - :param pulumi.Input[str] password: The root credential password used in the connection URL - :param pulumi.Input[str] service_account_json: A JSON encoded credential for use with IAM authorization + Specify alternative authorization type. (Only 'gcp_iam' is valid currently) + """ + connection_url: NotRequired[pulumi.Input[str]] + """ + Connection string to use to connect to the database. + """ + max_connection_lifetime: NotRequired[pulumi.Input[int]] + """ + Maximum number of seconds a connection may be reused. + """ + max_idle_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of idle connections to the database. + """ + max_open_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of open connections to the database. + """ + password: NotRequired[pulumi.Input[str]] + """ + The root credential password used in the connection URL + """ + service_account_json: NotRequired[pulumi.Input[str]] + """ + A JSON encoded credential for use with IAM authorization + """ + tls_ca: NotRequired[pulumi.Input[str]] + """ + x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. + """ + tls_certificate_key: NotRequired[pulumi.Input[str]] + """ + x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. + """ + username: NotRequired[pulumi.Input[str]] + """ + The root credential username used in the connection URL + """ + username_template: NotRequired[pulumi.Input[str]] + """ + Username generation template. + """ +elif False: + SecretBackendConnectionMysqlAuroraArgsDict: TypeAlias = Mapping[str, Any] + +@pulumi.input_type +class SecretBackendConnectionMysqlAuroraArgs: + def __init__(__self__, *, + auth_type: Optional[pulumi.Input[str]] = None, + connection_url: Optional[pulumi.Input[str]] = None, + max_connection_lifetime: Optional[pulumi.Input[int]] = None, + max_idle_connections: Optional[pulumi.Input[int]] = None, + max_open_connections: Optional[pulumi.Input[int]] = None, + password: Optional[pulumi.Input[str]] = None, + service_account_json: Optional[pulumi.Input[str]] = None, + tls_ca: Optional[pulumi.Input[str]] = None, + tls_certificate_key: Optional[pulumi.Input[str]] = None, + username: Optional[pulumi.Input[str]] = None, + username_template: Optional[pulumi.Input[str]] = None): + """ + :param pulumi.Input[str] auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently) + :param pulumi.Input[str] connection_url: Connection string to use to connect to the database. + :param pulumi.Input[int] max_connection_lifetime: Maximum number of seconds a connection may be reused. + :param pulumi.Input[int] max_idle_connections: Maximum number of idle connections to the database. + :param pulumi.Input[int] max_open_connections: Maximum number of open connections to the database. + :param pulumi.Input[str] password: The root credential password used in the connection URL + :param pulumi.Input[str] service_account_json: A JSON encoded credential for use with IAM authorization :param pulumi.Input[str] tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. :param pulumi.Input[str] tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. :param pulumi.Input[str] username: The root credential username used in the connection URL @@ -1482,6 +1919,55 @@ def username_template(self, value: Optional[pulumi.Input[str]]): pulumi.set(self, "username_template", value) +if not MYPY: + class SecretBackendConnectionMysqlLegacyArgsDict(TypedDict): + auth_type: NotRequired[pulumi.Input[str]] + """ + Specify alternative authorization type. (Only 'gcp_iam' is valid currently) + """ + connection_url: NotRequired[pulumi.Input[str]] + """ + Connection string to use to connect to the database. + """ + max_connection_lifetime: NotRequired[pulumi.Input[int]] + """ + Maximum number of seconds a connection may be reused. + """ + max_idle_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of idle connections to the database. + """ + max_open_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of open connections to the database. + """ + password: NotRequired[pulumi.Input[str]] + """ + The root credential password used in the connection URL + """ + service_account_json: NotRequired[pulumi.Input[str]] + """ + A JSON encoded credential for use with IAM authorization + """ + tls_ca: NotRequired[pulumi.Input[str]] + """ + x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. + """ + tls_certificate_key: NotRequired[pulumi.Input[str]] + """ + x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. + """ + username: NotRequired[pulumi.Input[str]] + """ + The root credential username used in the connection URL + """ + username_template: NotRequired[pulumi.Input[str]] + """ + Username generation template. + """ +elif False: + SecretBackendConnectionMysqlLegacyArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretBackendConnectionMysqlLegacyArgs: def __init__(__self__, *, @@ -1665,6 +2151,55 @@ def username_template(self, value: Optional[pulumi.Input[str]]): pulumi.set(self, "username_template", value) +if not MYPY: + class SecretBackendConnectionMysqlRdsArgsDict(TypedDict): + auth_type: NotRequired[pulumi.Input[str]] + """ + Specify alternative authorization type. (Only 'gcp_iam' is valid currently) + """ + connection_url: NotRequired[pulumi.Input[str]] + """ + Connection string to use to connect to the database. + """ + max_connection_lifetime: NotRequired[pulumi.Input[int]] + """ + Maximum number of seconds a connection may be reused. + """ + max_idle_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of idle connections to the database. + """ + max_open_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of open connections to the database. + """ + password: NotRequired[pulumi.Input[str]] + """ + The root credential password used in the connection URL + """ + service_account_json: NotRequired[pulumi.Input[str]] + """ + A JSON encoded credential for use with IAM authorization + """ + tls_ca: NotRequired[pulumi.Input[str]] + """ + x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. + """ + tls_certificate_key: NotRequired[pulumi.Input[str]] + """ + x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. + """ + username: NotRequired[pulumi.Input[str]] + """ + The root credential username used in the connection URL + """ + username_template: NotRequired[pulumi.Input[str]] + """ + Username generation template. + """ +elif False: + SecretBackendConnectionMysqlRdsArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretBackendConnectionMysqlRdsArgs: def __init__(__self__, *, @@ -1848,6 +2383,47 @@ def username_template(self, value: Optional[pulumi.Input[str]]): pulumi.set(self, "username_template", value) +if not MYPY: + class SecretBackendConnectionOracleArgsDict(TypedDict): + connection_url: NotRequired[pulumi.Input[str]] + """ + Connection string to use to connect to the database. + """ + disconnect_sessions: NotRequired[pulumi.Input[bool]] + """ + Set to true to disconnect any open sessions prior to running the revocation statements. + """ + max_connection_lifetime: NotRequired[pulumi.Input[int]] + """ + Maximum number of seconds a connection may be reused. + """ + max_idle_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of idle connections to the database. + """ + max_open_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of open connections to the database. + """ + password: NotRequired[pulumi.Input[str]] + """ + The root credential password used in the connection URL + """ + split_statements: NotRequired[pulumi.Input[bool]] + """ + Set to true in order to split statements after semi-colons. + """ + username: NotRequired[pulumi.Input[str]] + """ + The root credential username used in the connection URL + """ + username_template: NotRequired[pulumi.Input[str]] + """ + Username generation template. + """ +elif False: + SecretBackendConnectionOracleArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretBackendConnectionOracleArgs: def __init__(__self__, *, @@ -1999,6 +2575,51 @@ def username_template(self, value: Optional[pulumi.Input[str]]): pulumi.set(self, "username_template", value) +if not MYPY: + class SecretBackendConnectionPostgresqlArgsDict(TypedDict): + auth_type: NotRequired[pulumi.Input[str]] + """ + Specify alternative authorization type. (Only 'gcp_iam' is valid currently) + """ + connection_url: NotRequired[pulumi.Input[str]] + """ + Connection string to use to connect to the database. + """ + disable_escaping: NotRequired[pulumi.Input[bool]] + """ + Disable special character escaping in username and password + """ + max_connection_lifetime: NotRequired[pulumi.Input[int]] + """ + Maximum number of seconds a connection may be reused. + """ + max_idle_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of idle connections to the database. + """ + max_open_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of open connections to the database. + """ + password: NotRequired[pulumi.Input[str]] + """ + The root credential password used in the connection URL + """ + service_account_json: NotRequired[pulumi.Input[str]] + """ + A JSON encoded credential for use with IAM authorization + """ + username: NotRequired[pulumi.Input[str]] + """ + The root credential username used in the connection URL + """ + username_template: NotRequired[pulumi.Input[str]] + """ + Username generation template. + """ +elif False: + SecretBackendConnectionPostgresqlArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretBackendConnectionPostgresqlArgs: def __init__(__self__, *, @@ -2166,6 +2787,39 @@ def username_template(self, value: Optional[pulumi.Input[str]]): pulumi.set(self, "username_template", value) +if not MYPY: + class SecretBackendConnectionRedisArgsDict(TypedDict): + host: pulumi.Input[str] + """ + Specifies the host to connect to + """ + password: pulumi.Input[str] + """ + Specifies the password corresponding to the given username. + """ + username: pulumi.Input[str] + """ + Specifies the username for Vault to use. + """ + ca_cert: NotRequired[pulumi.Input[str]] + """ + The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity. + """ + insecure_tls: NotRequired[pulumi.Input[bool]] + """ + Specifies whether to skip verification of the server certificate when using TLS. + """ + port: NotRequired[pulumi.Input[int]] + """ + The transport port to use to connect to Redis. + """ + tls: NotRequired[pulumi.Input[bool]] + """ + Specifies whether to use TLS when connecting to Redis. + """ +elif False: + SecretBackendConnectionRedisArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretBackendConnectionRedisArgs: def __init__(__self__, *, @@ -2282,6 +2936,27 @@ def tls(self, value: Optional[pulumi.Input[bool]]): pulumi.set(self, "tls", value) +if not MYPY: + class SecretBackendConnectionRedisElasticacheArgsDict(TypedDict): + url: pulumi.Input[str] + """ + The configuration endpoint for the ElastiCache cluster to connect to. + """ + password: NotRequired[pulumi.Input[str]] + """ + The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. + """ + region: NotRequired[pulumi.Input[str]] + """ + The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment. + """ + username: NotRequired[pulumi.Input[str]] + """ + The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. + """ +elif False: + SecretBackendConnectionRedisElasticacheArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretBackendConnectionRedisElasticacheArgs: def __init__(__self__, *, @@ -2352,6 +3027,43 @@ def username(self, value: Optional[pulumi.Input[str]]): pulumi.set(self, "username", value) +if not MYPY: + class SecretBackendConnectionRedshiftArgsDict(TypedDict): + connection_url: NotRequired[pulumi.Input[str]] + """ + Connection string to use to connect to the database. + """ + disable_escaping: NotRequired[pulumi.Input[bool]] + """ + Disable special character escaping in username and password + """ + max_connection_lifetime: NotRequired[pulumi.Input[int]] + """ + Maximum number of seconds a connection may be reused. + """ + max_idle_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of idle connections to the database. + """ + max_open_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of open connections to the database. + """ + password: NotRequired[pulumi.Input[str]] + """ + The root credential password used in the connection URL + """ + username: NotRequired[pulumi.Input[str]] + """ + The root credential username used in the connection URL + """ + username_template: NotRequired[pulumi.Input[str]] + """ + Username generation template. + """ +elif False: + SecretBackendConnectionRedshiftArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretBackendConnectionRedshiftArgs: def __init__(__self__, *, @@ -2487,21 +3199,54 @@ def username_template(self, value: Optional[pulumi.Input[str]]): pulumi.set(self, "username_template", value) -@pulumi.input_type -class SecretBackendConnectionSnowflakeArgs: - def __init__(__self__, *, - connection_url: Optional[pulumi.Input[str]] = None, - max_connection_lifetime: Optional[pulumi.Input[int]] = None, - max_idle_connections: Optional[pulumi.Input[int]] = None, - max_open_connections: Optional[pulumi.Input[int]] = None, - password: Optional[pulumi.Input[str]] = None, - username: Optional[pulumi.Input[str]] = None, - username_template: Optional[pulumi.Input[str]] = None): +if not MYPY: + class SecretBackendConnectionSnowflakeArgsDict(TypedDict): + connection_url: NotRequired[pulumi.Input[str]] """ - :param pulumi.Input[str] connection_url: Connection string to use to connect to the database. - :param pulumi.Input[int] max_connection_lifetime: Maximum number of seconds a connection may be reused. - :param pulumi.Input[int] max_idle_connections: Maximum number of idle connections to the database. - :param pulumi.Input[int] max_open_connections: Maximum number of open connections to the database. + Connection string to use to connect to the database. + """ + max_connection_lifetime: NotRequired[pulumi.Input[int]] + """ + Maximum number of seconds a connection may be reused. + """ + max_idle_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of idle connections to the database. + """ + max_open_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of open connections to the database. + """ + password: NotRequired[pulumi.Input[str]] + """ + The root credential password used in the connection URL + """ + username: NotRequired[pulumi.Input[str]] + """ + The root credential username used in the connection URL + """ + username_template: NotRequired[pulumi.Input[str]] + """ + Username generation template. + """ +elif False: + SecretBackendConnectionSnowflakeArgsDict: TypeAlias = Mapping[str, Any] + +@pulumi.input_type +class SecretBackendConnectionSnowflakeArgs: + def __init__(__self__, *, + connection_url: Optional[pulumi.Input[str]] = None, + max_connection_lifetime: Optional[pulumi.Input[int]] = None, + max_idle_connections: Optional[pulumi.Input[int]] = None, + max_open_connections: Optional[pulumi.Input[int]] = None, + password: Optional[pulumi.Input[str]] = None, + username: Optional[pulumi.Input[str]] = None, + username_template: Optional[pulumi.Input[str]] = None): + """ + :param pulumi.Input[str] connection_url: Connection string to use to connect to the database. + :param pulumi.Input[int] max_connection_lifetime: Maximum number of seconds a connection may be reused. + :param pulumi.Input[int] max_idle_connections: Maximum number of idle connections to the database. + :param pulumi.Input[int] max_open_connections: Maximum number of open connections to the database. :param pulumi.Input[str] password: The root credential password used in the connection URL :param pulumi.Input[str] username: The root credential username used in the connection URL :param pulumi.Input[str] username_template: Username generation template. @@ -2606,6 +3351,79 @@ def username_template(self, value: Optional[pulumi.Input[str]]): pulumi.set(self, "username_template", value) +if not MYPY: + class SecretsMountCassandraArgsDict(TypedDict): + name: pulumi.Input[str] + """ + Name of the database connection. + """ + allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + A list of roles that are allowed to use this + connection. + """ + connect_timeout: NotRequired[pulumi.Input[int]] + """ + The number of seconds to use as a connection timeout. + """ + data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]] + """ + A map of sensitive data to pass to the endpoint. Useful for templated connection strings. + + Supported list of database secrets engines that can be configured: + """ + hosts: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + Cassandra hosts to connect to. + """ + insecure_tls: NotRequired[pulumi.Input[bool]] + """ + Whether to skip verification of the server certificate when using TLS. + """ + password: NotRequired[pulumi.Input[str]] + """ + The password to use when authenticating with Cassandra. + """ + pem_bundle: NotRequired[pulumi.Input[str]] + """ + Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. + """ + pem_json: NotRequired[pulumi.Input[str]] + """ + Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. + """ + plugin_name: NotRequired[pulumi.Input[str]] + """ + Specifies the name of the plugin to use. + """ + port: NotRequired[pulumi.Input[int]] + """ + The transport port to use to connect to Cassandra. + """ + protocol_version: NotRequired[pulumi.Input[int]] + """ + The CQL protocol version to use. + """ + root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + A list of database statements to be executed to rotate the root user's credentials. + """ + tls: NotRequired[pulumi.Input[bool]] + """ + Whether to use TLS when connecting to Cassandra. + """ + username: NotRequired[pulumi.Input[str]] + """ + The username to use when authenticating with Cassandra. + """ + verify_connection: NotRequired[pulumi.Input[bool]] + """ + Whether the connection should be verified on + initial configuration or not. + """ +elif False: + SecretsMountCassandraArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretsMountCassandraArgs: def __init__(__self__, *, @@ -2876,6 +3694,71 @@ def verify_connection(self, value: Optional[pulumi.Input[bool]]): pulumi.set(self, "verify_connection", value) +if not MYPY: + class SecretsMountCouchbaseArgsDict(TypedDict): + hosts: pulumi.Input[Sequence[pulumi.Input[str]]] + """ + A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`. + """ + name: pulumi.Input[str] + """ + Name of the database connection. + """ + password: pulumi.Input[str] + """ + Specifies the password corresponding to the given username. + """ + username: pulumi.Input[str] + """ + Specifies the username for Vault to use. + """ + allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + A list of roles that are allowed to use this + connection. + """ + base64_pem: NotRequired[pulumi.Input[str]] + """ + Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded. + """ + bucket_name: NotRequired[pulumi.Input[str]] + """ + Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server. + """ + data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]] + """ + A map of sensitive data to pass to the endpoint. Useful for templated connection strings. + + Supported list of database secrets engines that can be configured: + """ + insecure_tls: NotRequired[pulumi.Input[bool]] + """ + Specifies whether to skip verification of the server certificate when using TLS. + """ + plugin_name: NotRequired[pulumi.Input[str]] + """ + Specifies the name of the plugin to use. + """ + root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + A list of database statements to be executed to rotate the root user's credentials. + """ + tls: NotRequired[pulumi.Input[bool]] + """ + Specifies whether to use TLS when connecting to Couchbase. + """ + username_template: NotRequired[pulumi.Input[str]] + """ + Template describing how dynamic usernames are generated. + """ + verify_connection: NotRequired[pulumi.Input[bool]] + """ + Whether the connection should be verified on + initial configuration or not. + """ +elif False: + SecretsMountCouchbaseArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretsMountCouchbaseArgs: def __init__(__self__, *, @@ -3111,6 +3994,79 @@ def verify_connection(self, value: Optional[pulumi.Input[bool]]): pulumi.set(self, "verify_connection", value) +if not MYPY: + class SecretsMountElasticsearchArgsDict(TypedDict): + name: pulumi.Input[str] + """ + Name of the database connection. + """ + password: pulumi.Input[str] + """ + The password to be used in the connection URL + """ + url: pulumi.Input[str] + """ + The URL for Elasticsearch's API + """ + username: pulumi.Input[str] + """ + The username to be used in the connection URL + """ + allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + A list of roles that are allowed to use this + connection. + """ + ca_cert: NotRequired[pulumi.Input[str]] + """ + The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity + """ + ca_path: NotRequired[pulumi.Input[str]] + """ + The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity + """ + client_cert: NotRequired[pulumi.Input[str]] + """ + The path to the certificate for the Elasticsearch client to present for communication + """ + client_key: NotRequired[pulumi.Input[str]] + """ + The path to the key for the Elasticsearch client to use for communication + """ + data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]] + """ + A map of sensitive data to pass to the endpoint. Useful for templated connection strings. + + Supported list of database secrets engines that can be configured: + """ + insecure: NotRequired[pulumi.Input[bool]] + """ + Whether to disable certificate verification + """ + plugin_name: NotRequired[pulumi.Input[str]] + """ + Specifies the name of the plugin to use. + """ + root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + A list of database statements to be executed to rotate the root user's credentials. + """ + tls_server_name: NotRequired[pulumi.Input[str]] + """ + This, if set, is used to set the SNI host when connecting via TLS + """ + username_template: NotRequired[pulumi.Input[str]] + """ + Template describing how dynamic usernames are generated. + """ + verify_connection: NotRequired[pulumi.Input[bool]] + """ + Whether the connection should be verified on + initial configuration or not. + """ +elif False: + SecretsMountElasticsearchArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretsMountElasticsearchArgs: def __init__(__self__, *, @@ -3378,6 +4334,67 @@ def verify_connection(self, value: Optional[pulumi.Input[bool]]): pulumi.set(self, "verify_connection", value) +if not MYPY: + class SecretsMountHanaArgsDict(TypedDict): + name: pulumi.Input[str] + """ + Name of the database connection. + """ + allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + A list of roles that are allowed to use this + connection. + """ + connection_url: NotRequired[pulumi.Input[str]] + """ + Connection string to use to connect to the database. + """ + data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]] + """ + A map of sensitive data to pass to the endpoint. Useful for templated connection strings. + + Supported list of database secrets engines that can be configured: + """ + disable_escaping: NotRequired[pulumi.Input[bool]] + """ + Disable special character escaping in username and password + """ + max_connection_lifetime: NotRequired[pulumi.Input[int]] + """ + Maximum number of seconds a connection may be reused. + """ + max_idle_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of idle connections to the database. + """ + max_open_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of open connections to the database. + """ + password: NotRequired[pulumi.Input[str]] + """ + The root credential password used in the connection URL + """ + plugin_name: NotRequired[pulumi.Input[str]] + """ + Specifies the name of the plugin to use. + """ + root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + A list of database statements to be executed to rotate the root user's credentials. + """ + username: NotRequired[pulumi.Input[str]] + """ + The root credential username used in the connection URL + """ + verify_connection: NotRequired[pulumi.Input[bool]] + """ + Whether the connection should be verified on + initial configuration or not. + """ +elif False: + SecretsMountHanaArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretsMountHanaArgs: def __init__(__self__, *, @@ -3600,6 +4617,79 @@ def verify_connection(self, value: Optional[pulumi.Input[bool]]): pulumi.set(self, "verify_connection", value) +if not MYPY: + class SecretsMountInfluxdbArgsDict(TypedDict): + host: pulumi.Input[str] + """ + Influxdb host to connect to. + """ + name: pulumi.Input[str] + """ + Name of the database connection. + """ + password: pulumi.Input[str] + """ + Specifies the password corresponding to the given username. + """ + username: pulumi.Input[str] + """ + Specifies the username to use for superuser access. + """ + allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + A list of roles that are allowed to use this + connection. + """ + connect_timeout: NotRequired[pulumi.Input[int]] + """ + The number of seconds to use as a connection timeout. + """ + data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]] + """ + A map of sensitive data to pass to the endpoint. Useful for templated connection strings. + + Supported list of database secrets engines that can be configured: + """ + insecure_tls: NotRequired[pulumi.Input[bool]] + """ + Whether to skip verification of the server certificate when using TLS. + """ + pem_bundle: NotRequired[pulumi.Input[str]] + """ + Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. + """ + pem_json: NotRequired[pulumi.Input[str]] + """ + Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. + """ + plugin_name: NotRequired[pulumi.Input[str]] + """ + Specifies the name of the plugin to use. + """ + port: NotRequired[pulumi.Input[int]] + """ + The transport port to use to connect to Influxdb. + """ + root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + A list of database statements to be executed to rotate the root user's credentials. + """ + tls: NotRequired[pulumi.Input[bool]] + """ + Whether to use TLS when connecting to Influxdb. + """ + username_template: NotRequired[pulumi.Input[str]] + """ + Template describing how dynamic usernames are generated. + """ + verify_connection: NotRequired[pulumi.Input[bool]] + """ + Whether the connection should be verified on + initial configuration or not. + """ +elif False: + SecretsMountInfluxdbArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretsMountInfluxdbArgs: def __init__(__self__, *, @@ -3867,6 +4957,67 @@ def verify_connection(self, value: Optional[pulumi.Input[bool]]): pulumi.set(self, "verify_connection", value) +if not MYPY: + class SecretsMountMongodbArgsDict(TypedDict): + name: pulumi.Input[str] + """ + Name of the database connection. + """ + allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + A list of roles that are allowed to use this + connection. + """ + connection_url: NotRequired[pulumi.Input[str]] + """ + Connection string to use to connect to the database. + """ + data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]] + """ + A map of sensitive data to pass to the endpoint. Useful for templated connection strings. + + Supported list of database secrets engines that can be configured: + """ + max_connection_lifetime: NotRequired[pulumi.Input[int]] + """ + Maximum number of seconds a connection may be reused. + """ + max_idle_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of idle connections to the database. + """ + max_open_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of open connections to the database. + """ + password: NotRequired[pulumi.Input[str]] + """ + The root credential password used in the connection URL + """ + plugin_name: NotRequired[pulumi.Input[str]] + """ + Specifies the name of the plugin to use. + """ + root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + A list of database statements to be executed to rotate the root user's credentials. + """ + username: NotRequired[pulumi.Input[str]] + """ + The root credential username used in the connection URL + """ + username_template: NotRequired[pulumi.Input[str]] + """ + Username generation template. + """ + verify_connection: NotRequired[pulumi.Input[bool]] + """ + Whether the connection should be verified on + initial configuration or not. + """ +elif False: + SecretsMountMongodbArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretsMountMongodbArgs: def __init__(__self__, *, @@ -4089,6 +5240,51 @@ def verify_connection(self, value: Optional[pulumi.Input[bool]]): pulumi.set(self, "verify_connection", value) +if not MYPY: + class SecretsMountMongodbatlaArgsDict(TypedDict): + name: pulumi.Input[str] + """ + Name of the database connection. + """ + private_key: pulumi.Input[str] + """ + The Private Programmatic API Key used to connect with MongoDB Atlas API. + """ + project_id: pulumi.Input[str] + """ + The Project ID the Database User should be created within. + """ + public_key: pulumi.Input[str] + """ + The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. + """ + allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + A list of roles that are allowed to use this + connection. + """ + data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]] + """ + A map of sensitive data to pass to the endpoint. Useful for templated connection strings. + + Supported list of database secrets engines that can be configured: + """ + plugin_name: NotRequired[pulumi.Input[str]] + """ + Specifies the name of the plugin to use. + """ + root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + A list of database statements to be executed to rotate the root user's credentials. + """ + verify_connection: NotRequired[pulumi.Input[bool]] + """ + Whether the connection should be verified on + initial configuration or not. + """ +elif False: + SecretsMountMongodbatlaArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretsMountMongodbatlaArgs: def __init__(__self__, *, @@ -4244,6 +5440,75 @@ def verify_connection(self, value: Optional[pulumi.Input[bool]]): pulumi.set(self, "verify_connection", value) +if not MYPY: + class SecretsMountMssqlArgsDict(TypedDict): + name: pulumi.Input[str] + """ + Name of the database connection. + """ + allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + A list of roles that are allowed to use this + connection. + """ + connection_url: NotRequired[pulumi.Input[str]] + """ + Connection string to use to connect to the database. + """ + contained_db: NotRequired[pulumi.Input[bool]] + """ + Set to true when the target is a Contained Database, e.g. AzureSQL. + """ + data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]] + """ + A map of sensitive data to pass to the endpoint. Useful for templated connection strings. + + Supported list of database secrets engines that can be configured: + """ + disable_escaping: NotRequired[pulumi.Input[bool]] + """ + Disable special character escaping in username and password + """ + max_connection_lifetime: NotRequired[pulumi.Input[int]] + """ + Maximum number of seconds a connection may be reused. + """ + max_idle_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of idle connections to the database. + """ + max_open_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of open connections to the database. + """ + password: NotRequired[pulumi.Input[str]] + """ + The root credential password used in the connection URL + """ + plugin_name: NotRequired[pulumi.Input[str]] + """ + Specifies the name of the plugin to use. + """ + root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + A list of database statements to be executed to rotate the root user's credentials. + """ + username: NotRequired[pulumi.Input[str]] + """ + The root credential username used in the connection URL + """ + username_template: NotRequired[pulumi.Input[str]] + """ + Username generation template. + """ + verify_connection: NotRequired[pulumi.Input[bool]] + """ + Whether the connection should be verified on + initial configuration or not. + """ +elif False: + SecretsMountMssqlArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretsMountMssqlArgs: def __init__(__self__, *, @@ -4498,6 +5763,83 @@ def verify_connection(self, value: Optional[pulumi.Input[bool]]): pulumi.set(self, "verify_connection", value) +if not MYPY: + class SecretsMountMysqlArgsDict(TypedDict): + name: pulumi.Input[str] + """ + Name of the database connection. + """ + allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + A list of roles that are allowed to use this + connection. + """ + auth_type: NotRequired[pulumi.Input[str]] + """ + Specify alternative authorization type. (Only 'gcp_iam' is valid currently) + """ + connection_url: NotRequired[pulumi.Input[str]] + """ + Connection string to use to connect to the database. + """ + data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]] + """ + A map of sensitive data to pass to the endpoint. Useful for templated connection strings. + + Supported list of database secrets engines that can be configured: + """ + max_connection_lifetime: NotRequired[pulumi.Input[int]] + """ + Maximum number of seconds a connection may be reused. + """ + max_idle_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of idle connections to the database. + """ + max_open_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of open connections to the database. + """ + password: NotRequired[pulumi.Input[str]] + """ + The root credential password used in the connection URL + """ + plugin_name: NotRequired[pulumi.Input[str]] + """ + Specifies the name of the plugin to use. + """ + root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + A list of database statements to be executed to rotate the root user's credentials. + """ + service_account_json: NotRequired[pulumi.Input[str]] + """ + A JSON encoded credential for use with IAM authorization + """ + tls_ca: NotRequired[pulumi.Input[str]] + """ + x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. + """ + tls_certificate_key: NotRequired[pulumi.Input[str]] + """ + x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. + """ + username: NotRequired[pulumi.Input[str]] + """ + The root credential username used in the connection URL + """ + username_template: NotRequired[pulumi.Input[str]] + """ + Username generation template. + """ + verify_connection: NotRequired[pulumi.Input[bool]] + """ + Whether the connection should be verified on + initial configuration or not. + """ +elif False: + SecretsMountMysqlArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretsMountMysqlArgs: def __init__(__self__, *, @@ -4784,6 +6126,83 @@ def verify_connection(self, value: Optional[pulumi.Input[bool]]): pulumi.set(self, "verify_connection", value) +if not MYPY: + class SecretsMountMysqlAuroraArgsDict(TypedDict): + name: pulumi.Input[str] + """ + Name of the database connection. + """ + allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + A list of roles that are allowed to use this + connection. + """ + auth_type: NotRequired[pulumi.Input[str]] + """ + Specify alternative authorization type. (Only 'gcp_iam' is valid currently) + """ + connection_url: NotRequired[pulumi.Input[str]] + """ + Connection string to use to connect to the database. + """ + data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]] + """ + A map of sensitive data to pass to the endpoint. Useful for templated connection strings. + + Supported list of database secrets engines that can be configured: + """ + max_connection_lifetime: NotRequired[pulumi.Input[int]] + """ + Maximum number of seconds a connection may be reused. + """ + max_idle_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of idle connections to the database. + """ + max_open_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of open connections to the database. + """ + password: NotRequired[pulumi.Input[str]] + """ + The root credential password used in the connection URL + """ + plugin_name: NotRequired[pulumi.Input[str]] + """ + Specifies the name of the plugin to use. + """ + root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + A list of database statements to be executed to rotate the root user's credentials. + """ + service_account_json: NotRequired[pulumi.Input[str]] + """ + A JSON encoded credential for use with IAM authorization + """ + tls_ca: NotRequired[pulumi.Input[str]] + """ + x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. + """ + tls_certificate_key: NotRequired[pulumi.Input[str]] + """ + x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. + """ + username: NotRequired[pulumi.Input[str]] + """ + The root credential username used in the connection URL + """ + username_template: NotRequired[pulumi.Input[str]] + """ + Username generation template. + """ + verify_connection: NotRequired[pulumi.Input[bool]] + """ + Whether the connection should be verified on + initial configuration or not. + """ +elif False: + SecretsMountMysqlAuroraArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretsMountMysqlAuroraArgs: def __init__(__self__, *, @@ -5070,6 +6489,83 @@ def verify_connection(self, value: Optional[pulumi.Input[bool]]): pulumi.set(self, "verify_connection", value) +if not MYPY: + class SecretsMountMysqlLegacyArgsDict(TypedDict): + name: pulumi.Input[str] + """ + Name of the database connection. + """ + allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + A list of roles that are allowed to use this + connection. + """ + auth_type: NotRequired[pulumi.Input[str]] + """ + Specify alternative authorization type. (Only 'gcp_iam' is valid currently) + """ + connection_url: NotRequired[pulumi.Input[str]] + """ + Connection string to use to connect to the database. + """ + data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]] + """ + A map of sensitive data to pass to the endpoint. Useful for templated connection strings. + + Supported list of database secrets engines that can be configured: + """ + max_connection_lifetime: NotRequired[pulumi.Input[int]] + """ + Maximum number of seconds a connection may be reused. + """ + max_idle_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of idle connections to the database. + """ + max_open_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of open connections to the database. + """ + password: NotRequired[pulumi.Input[str]] + """ + The root credential password used in the connection URL + """ + plugin_name: NotRequired[pulumi.Input[str]] + """ + Specifies the name of the plugin to use. + """ + root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + A list of database statements to be executed to rotate the root user's credentials. + """ + service_account_json: NotRequired[pulumi.Input[str]] + """ + A JSON encoded credential for use with IAM authorization + """ + tls_ca: NotRequired[pulumi.Input[str]] + """ + x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. + """ + tls_certificate_key: NotRequired[pulumi.Input[str]] + """ + x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. + """ + username: NotRequired[pulumi.Input[str]] + """ + The root credential username used in the connection URL + """ + username_template: NotRequired[pulumi.Input[str]] + """ + Username generation template. + """ + verify_connection: NotRequired[pulumi.Input[bool]] + """ + Whether the connection should be verified on + initial configuration or not. + """ +elif False: + SecretsMountMysqlLegacyArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretsMountMysqlLegacyArgs: def __init__(__self__, *, @@ -5356,6 +6852,83 @@ def verify_connection(self, value: Optional[pulumi.Input[bool]]): pulumi.set(self, "verify_connection", value) +if not MYPY: + class SecretsMountMysqlRdArgsDict(TypedDict): + name: pulumi.Input[str] + """ + Name of the database connection. + """ + allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + A list of roles that are allowed to use this + connection. + """ + auth_type: NotRequired[pulumi.Input[str]] + """ + Specify alternative authorization type. (Only 'gcp_iam' is valid currently) + """ + connection_url: NotRequired[pulumi.Input[str]] + """ + Connection string to use to connect to the database. + """ + data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]] + """ + A map of sensitive data to pass to the endpoint. Useful for templated connection strings. + + Supported list of database secrets engines that can be configured: + """ + max_connection_lifetime: NotRequired[pulumi.Input[int]] + """ + Maximum number of seconds a connection may be reused. + """ + max_idle_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of idle connections to the database. + """ + max_open_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of open connections to the database. + """ + password: NotRequired[pulumi.Input[str]] + """ + The root credential password used in the connection URL + """ + plugin_name: NotRequired[pulumi.Input[str]] + """ + Specifies the name of the plugin to use. + """ + root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + A list of database statements to be executed to rotate the root user's credentials. + """ + service_account_json: NotRequired[pulumi.Input[str]] + """ + A JSON encoded credential for use with IAM authorization + """ + tls_ca: NotRequired[pulumi.Input[str]] + """ + x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. + """ + tls_certificate_key: NotRequired[pulumi.Input[str]] + """ + x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. + """ + username: NotRequired[pulumi.Input[str]] + """ + The root credential username used in the connection URL + """ + username_template: NotRequired[pulumi.Input[str]] + """ + Username generation template. + """ + verify_connection: NotRequired[pulumi.Input[bool]] + """ + Whether the connection should be verified on + initial configuration or not. + """ +elif False: + SecretsMountMysqlRdArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretsMountMysqlRdArgs: def __init__(__self__, *, @@ -5598,49 +7171,118 @@ def tls_certificate_key(self) -> Optional[pulumi.Input[str]]: """ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. """ - return pulumi.get(self, "tls_certificate_key") - - @tls_certificate_key.setter - def tls_certificate_key(self, value: Optional[pulumi.Input[str]]): - pulumi.set(self, "tls_certificate_key", value) - - @property - @pulumi.getter - def username(self) -> Optional[pulumi.Input[str]]: + return pulumi.get(self, "tls_certificate_key") + + @tls_certificate_key.setter + def tls_certificate_key(self, value: Optional[pulumi.Input[str]]): + pulumi.set(self, "tls_certificate_key", value) + + @property + @pulumi.getter + def username(self) -> Optional[pulumi.Input[str]]: + """ + The root credential username used in the connection URL + """ + return pulumi.get(self, "username") + + @username.setter + def username(self, value: Optional[pulumi.Input[str]]): + pulumi.set(self, "username", value) + + @property + @pulumi.getter(name="usernameTemplate") + def username_template(self) -> Optional[pulumi.Input[str]]: + """ + Username generation template. + """ + return pulumi.get(self, "username_template") + + @username_template.setter + def username_template(self, value: Optional[pulumi.Input[str]]): + pulumi.set(self, "username_template", value) + + @property + @pulumi.getter(name="verifyConnection") + def verify_connection(self) -> Optional[pulumi.Input[bool]]: + """ + Whether the connection should be verified on + initial configuration or not. + """ + return pulumi.get(self, "verify_connection") + + @verify_connection.setter + def verify_connection(self, value: Optional[pulumi.Input[bool]]): + pulumi.set(self, "verify_connection", value) + + +if not MYPY: + class SecretsMountOracleArgsDict(TypedDict): + name: pulumi.Input[str] + """ + Name of the database connection. + """ + allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + A list of roles that are allowed to use this + connection. + """ + connection_url: NotRequired[pulumi.Input[str]] + """ + Connection string to use to connect to the database. + """ + data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]] + """ + A map of sensitive data to pass to the endpoint. Useful for templated connection strings. + + Supported list of database secrets engines that can be configured: + """ + disconnect_sessions: NotRequired[pulumi.Input[bool]] + """ + Set to true to disconnect any open sessions prior to running the revocation statements. + """ + max_connection_lifetime: NotRequired[pulumi.Input[int]] + """ + Maximum number of seconds a connection may be reused. + """ + max_idle_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of idle connections to the database. + """ + max_open_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of open connections to the database. + """ + password: NotRequired[pulumi.Input[str]] + """ + The root credential password used in the connection URL + """ + plugin_name: NotRequired[pulumi.Input[str]] + """ + Specifies the name of the plugin to use. + """ + root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + A list of database statements to be executed to rotate the root user's credentials. + """ + split_statements: NotRequired[pulumi.Input[bool]] + """ + Set to true in order to split statements after semi-colons. + """ + username: NotRequired[pulumi.Input[str]] """ The root credential username used in the connection URL """ - return pulumi.get(self, "username") - - @username.setter - def username(self, value: Optional[pulumi.Input[str]]): - pulumi.set(self, "username", value) - - @property - @pulumi.getter(name="usernameTemplate") - def username_template(self) -> Optional[pulumi.Input[str]]: + username_template: NotRequired[pulumi.Input[str]] """ Username generation template. """ - return pulumi.get(self, "username_template") - - @username_template.setter - def username_template(self, value: Optional[pulumi.Input[str]]): - pulumi.set(self, "username_template", value) - - @property - @pulumi.getter(name="verifyConnection") - def verify_connection(self) -> Optional[pulumi.Input[bool]]: + verify_connection: NotRequired[pulumi.Input[bool]] """ Whether the connection should be verified on initial configuration or not. """ - return pulumi.get(self, "verify_connection") - - @verify_connection.setter - def verify_connection(self, value: Optional[pulumi.Input[bool]]): - pulumi.set(self, "verify_connection", value) - +elif False: + SecretsMountOracleArgsDict: TypeAlias = Mapping[str, Any] @pulumi.input_type class SecretsMountOracleArgs: @@ -5896,6 +7538,79 @@ def verify_connection(self, value: Optional[pulumi.Input[bool]]): pulumi.set(self, "verify_connection", value) +if not MYPY: + class SecretsMountPostgresqlArgsDict(TypedDict): + name: pulumi.Input[str] + """ + Name of the database connection. + """ + allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + A list of roles that are allowed to use this + connection. + """ + auth_type: NotRequired[pulumi.Input[str]] + """ + Specify alternative authorization type. (Only 'gcp_iam' is valid currently) + """ + connection_url: NotRequired[pulumi.Input[str]] + """ + Connection string to use to connect to the database. + """ + data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]] + """ + A map of sensitive data to pass to the endpoint. Useful for templated connection strings. + + Supported list of database secrets engines that can be configured: + """ + disable_escaping: NotRequired[pulumi.Input[bool]] + """ + Disable special character escaping in username and password + """ + max_connection_lifetime: NotRequired[pulumi.Input[int]] + """ + Maximum number of seconds a connection may be reused. + """ + max_idle_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of idle connections to the database. + """ + max_open_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of open connections to the database. + """ + password: NotRequired[pulumi.Input[str]] + """ + The root credential password used in the connection URL + """ + plugin_name: NotRequired[pulumi.Input[str]] + """ + Specifies the name of the plugin to use. + """ + root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + A list of database statements to be executed to rotate the root user's credentials. + """ + service_account_json: NotRequired[pulumi.Input[str]] + """ + A JSON encoded credential for use with IAM authorization + """ + username: NotRequired[pulumi.Input[str]] + """ + The root credential username used in the connection URL + """ + username_template: NotRequired[pulumi.Input[str]] + """ + Username generation template. + """ + verify_connection: NotRequired[pulumi.Input[bool]] + """ + Whether the connection should be verified on + initial configuration or not. + """ +elif False: + SecretsMountPostgresqlArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretsMountPostgresqlArgs: def __init__(__self__, *, @@ -6166,6 +7881,67 @@ def verify_connection(self, value: Optional[pulumi.Input[bool]]): pulumi.set(self, "verify_connection", value) +if not MYPY: + class SecretsMountRediArgsDict(TypedDict): + host: pulumi.Input[str] + """ + Specifies the host to connect to + """ + name: pulumi.Input[str] + """ + Name of the database connection. + """ + password: pulumi.Input[str] + """ + Specifies the password corresponding to the given username. + """ + username: pulumi.Input[str] + """ + Specifies the username for Vault to use. + """ + allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + A list of roles that are allowed to use this + connection. + """ + ca_cert: NotRequired[pulumi.Input[str]] + """ + The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity. + """ + data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]] + """ + A map of sensitive data to pass to the endpoint. Useful for templated connection strings. + + Supported list of database secrets engines that can be configured: + """ + insecure_tls: NotRequired[pulumi.Input[bool]] + """ + Specifies whether to skip verification of the server certificate when using TLS. + """ + plugin_name: NotRequired[pulumi.Input[str]] + """ + Specifies the name of the plugin to use. + """ + port: NotRequired[pulumi.Input[int]] + """ + The transport port to use to connect to Redis. + """ + root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + A list of database statements to be executed to rotate the root user's credentials. + """ + tls: NotRequired[pulumi.Input[bool]] + """ + Specifies whether to use TLS when connecting to Redis. + """ + verify_connection: NotRequired[pulumi.Input[bool]] + """ + Whether the connection should be verified on + initial configuration or not. + """ +elif False: + SecretsMountRediArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretsMountRediArgs: def __init__(__self__, *, @@ -6385,6 +8161,55 @@ def verify_connection(self, value: Optional[pulumi.Input[bool]]): pulumi.set(self, "verify_connection", value) +if not MYPY: + class SecretsMountRedisElasticachArgsDict(TypedDict): + name: pulumi.Input[str] + """ + Name of the database connection. + """ + url: pulumi.Input[str] + """ + The configuration endpoint for the ElastiCache cluster to connect to. + """ + allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + A list of roles that are allowed to use this + connection. + """ + data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]] + """ + A map of sensitive data to pass to the endpoint. Useful for templated connection strings. + + Supported list of database secrets engines that can be configured: + """ + password: NotRequired[pulumi.Input[str]] + """ + The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. + """ + plugin_name: NotRequired[pulumi.Input[str]] + """ + Specifies the name of the plugin to use. + """ + region: NotRequired[pulumi.Input[str]] + """ + The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment. + """ + root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + A list of database statements to be executed to rotate the root user's credentials. + """ + username: NotRequired[pulumi.Input[str]] + """ + The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. + """ + verify_connection: NotRequired[pulumi.Input[bool]] + """ + Whether the connection should be verified on + initial configuration or not. + """ +elif False: + SecretsMountRedisElasticachArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretsMountRedisElasticachArgs: def __init__(__self__, *, @@ -6558,6 +8383,71 @@ def verify_connection(self, value: Optional[pulumi.Input[bool]]): pulumi.set(self, "verify_connection", value) +if not MYPY: + class SecretsMountRedshiftArgsDict(TypedDict): + name: pulumi.Input[str] + """ + Name of the database connection. + """ + allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + A list of roles that are allowed to use this + connection. + """ + connection_url: NotRequired[pulumi.Input[str]] + """ + Connection string to use to connect to the database. + """ + data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]] + """ + A map of sensitive data to pass to the endpoint. Useful for templated connection strings. + + Supported list of database secrets engines that can be configured: + """ + disable_escaping: NotRequired[pulumi.Input[bool]] + """ + Disable special character escaping in username and password + """ + max_connection_lifetime: NotRequired[pulumi.Input[int]] + """ + Maximum number of seconds a connection may be reused. + """ + max_idle_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of idle connections to the database. + """ + max_open_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of open connections to the database. + """ + password: NotRequired[pulumi.Input[str]] + """ + The root credential password used in the connection URL + """ + plugin_name: NotRequired[pulumi.Input[str]] + """ + Specifies the name of the plugin to use. + """ + root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + A list of database statements to be executed to rotate the root user's credentials. + """ + username: NotRequired[pulumi.Input[str]] + """ + The root credential username used in the connection URL + """ + username_template: NotRequired[pulumi.Input[str]] + """ + Username generation template. + """ + verify_connection: NotRequired[pulumi.Input[bool]] + """ + Whether the connection should be verified on + initial configuration or not. + """ +elif False: + SecretsMountRedshiftArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretsMountRedshiftArgs: def __init__(__self__, *, @@ -6796,6 +8686,67 @@ def verify_connection(self, value: Optional[pulumi.Input[bool]]): pulumi.set(self, "verify_connection", value) +if not MYPY: + class SecretsMountSnowflakeArgsDict(TypedDict): + name: pulumi.Input[str] + """ + Name of the database connection. + """ + allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + A list of roles that are allowed to use this + connection. + """ + connection_url: NotRequired[pulumi.Input[str]] + """ + Connection string to use to connect to the database. + """ + data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]] + """ + A map of sensitive data to pass to the endpoint. Useful for templated connection strings. + + Supported list of database secrets engines that can be configured: + """ + max_connection_lifetime: NotRequired[pulumi.Input[int]] + """ + Maximum number of seconds a connection may be reused. + """ + max_idle_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of idle connections to the database. + """ + max_open_connections: NotRequired[pulumi.Input[int]] + """ + Maximum number of open connections to the database. + """ + password: NotRequired[pulumi.Input[str]] + """ + The root credential password used in the connection URL + """ + plugin_name: NotRequired[pulumi.Input[str]] + """ + Specifies the name of the plugin to use. + """ + root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + A list of database statements to be executed to rotate the root user's credentials. + """ + username: NotRequired[pulumi.Input[str]] + """ + The root credential username used in the connection URL + """ + username_template: NotRequired[pulumi.Input[str]] + """ + Username generation template. + """ + verify_connection: NotRequired[pulumi.Input[bool]] + """ + Whether the connection should be verified on + initial configuration or not. + """ +elif False: + SecretsMountSnowflakeArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretsMountSnowflakeArgs: def __init__(__self__, *, diff --git a/sdk/python/pulumi_vault/database/outputs.py b/sdk/python/pulumi_vault/database/outputs.py index 1131a8ccc..65cc8a4e3 100644 --- a/sdk/python/pulumi_vault/database/outputs.py +++ b/sdk/python/pulumi_vault/database/outputs.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ diff --git a/sdk/python/pulumi_vault/database/secret_backend_connection.py b/sdk/python/pulumi_vault/database/secret_backend_connection.py index 972e7eedf..a85bfc546 100644 --- a/sdk/python/pulumi_vault/database/secret_backend_connection.py +++ b/sdk/python/pulumi_vault/database/secret_backend_connection.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities from . import outputs from ._inputs import * diff --git a/sdk/python/pulumi_vault/database/secret_backend_role.py b/sdk/python/pulumi_vault/database/secret_backend_role.py index 0c1da6046..e41cafaac 100644 --- a/sdk/python/pulumi_vault/database/secret_backend_role.py +++ b/sdk/python/pulumi_vault/database/secret_backend_role.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretBackendRoleArgs', 'SecretBackendRole'] diff --git a/sdk/python/pulumi_vault/database/secret_backend_static_role.py b/sdk/python/pulumi_vault/database/secret_backend_static_role.py index c14013027..70f7abe62 100644 --- a/sdk/python/pulumi_vault/database/secret_backend_static_role.py +++ b/sdk/python/pulumi_vault/database/secret_backend_static_role.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole'] diff --git a/sdk/python/pulumi_vault/database/secrets_mount.py b/sdk/python/pulumi_vault/database/secrets_mount.py index fea240e31..7f5f77374 100644 --- a/sdk/python/pulumi_vault/database/secrets_mount.py +++ b/sdk/python/pulumi_vault/database/secrets_mount.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities from . import outputs from ._inputs import * diff --git a/sdk/python/pulumi_vault/egp_policy.py b/sdk/python/pulumi_vault/egp_policy.py index 09d3fa08e..8d73b1daf 100644 --- a/sdk/python/pulumi_vault/egp_policy.py +++ b/sdk/python/pulumi_vault/egp_policy.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from . import _utilities __all__ = ['EgpPolicyArgs', 'EgpPolicy'] diff --git a/sdk/python/pulumi_vault/gcp/_inputs.py b/sdk/python/pulumi_vault/gcp/_inputs.py index a967ad5a8..1c8bd2504 100644 --- a/sdk/python/pulumi_vault/gcp/_inputs.py +++ b/sdk/python/pulumi_vault/gcp/_inputs.py @@ -4,18 +4,53 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ 'AuthBackendCustomEndpointArgs', + 'AuthBackendCustomEndpointArgsDict', 'AuthBackendTuneArgs', + 'AuthBackendTuneArgsDict', 'SecretRolesetBindingArgs', + 'SecretRolesetBindingArgsDict', 'SecretStaticAccountBindingArgs', + 'SecretStaticAccountBindingArgsDict', ] +MYPY = False + +if not MYPY: + class AuthBackendCustomEndpointArgsDict(TypedDict): + api: NotRequired[pulumi.Input[str]] + """ + Replaces the service endpoint used in API requests to `https://www.googleapis.com`. + """ + compute: NotRequired[pulumi.Input[str]] + """ + Replaces the service endpoint used in API requests to `https://compute.googleapis.com`. + + The endpoint value provided for a given key has the form of `scheme://host:port`. + The `scheme://` and `:port` portions of the endpoint value are optional. + """ + crm: NotRequired[pulumi.Input[str]] + """ + Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`. + """ + iam: NotRequired[pulumi.Input[str]] + """ + Replaces the service endpoint used in API requests to `https://iam.googleapis.com`. + """ +elif False: + AuthBackendCustomEndpointArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class AuthBackendCustomEndpointArgs: def __init__(__self__, *, @@ -93,6 +128,56 @@ def iam(self, value: Optional[pulumi.Input[str]]): pulumi.set(self, "iam", value) +if not MYPY: + class AuthBackendTuneArgsDict(TypedDict): + allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + List of headers to whitelist and allowing + a plugin to include them in the response. + """ + audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + Specifies the list of keys that will + not be HMAC'd by audit devices in the request data object. + """ + audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + Specifies the list of keys that will + not be HMAC'd by audit devices in the response data object. + """ + default_lease_ttl: NotRequired[pulumi.Input[str]] + """ + Specifies the default time-to-live. + If set, this overrides the global default. + Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration) + """ + listing_visibility: NotRequired[pulumi.Input[str]] + """ + Specifies whether to show this mount in + the UI-specific listing endpoint. Valid values are "unauth" or "hidden". + """ + max_lease_ttl: NotRequired[pulumi.Input[str]] + """ + Specifies the maximum time-to-live. + If set, this overrides the global default. + Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration) + """ + passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + List of headers to whitelist and + pass from the request to the backend. + """ + token_type: NotRequired[pulumi.Input[str]] + """ + Specifies the type of tokens that should be returned by + the mount. Valid values are "default-service", "default-batch", "service", "batch". + + + For more details on the usage of each argument consult the [Vault GCP API documentation](https://www.vaultproject.io/api-docs/auth/gcp#configure). + """ +elif False: + AuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class AuthBackendTuneArgs: def __init__(__self__, *, @@ -254,6 +339,19 @@ def token_type(self, value: Optional[pulumi.Input[str]]): pulumi.set(self, "token_type", value) +if not MYPY: + class SecretRolesetBindingArgsDict(TypedDict): + resource: pulumi.Input[str] + """ + Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different [formats](https://www.vaultproject.io/docs/secrets/gcp/index.html#roleset-bindings). + """ + roles: pulumi.Input[Sequence[pulumi.Input[str]]] + """ + List of [GCP IAM roles](https://cloud.google.com/iam/docs/understanding-roles) for the resource. + """ +elif False: + SecretRolesetBindingArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretRolesetBindingArgs: def __init__(__self__, *, @@ -291,6 +389,19 @@ def roles(self, value: pulumi.Input[Sequence[pulumi.Input[str]]]): pulumi.set(self, "roles", value) +if not MYPY: + class SecretStaticAccountBindingArgsDict(TypedDict): + resource: pulumi.Input[str] + """ + Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different [formats](https://www.vaultproject.io/docs/secrets/gcp/index.html#bindings). + """ + roles: pulumi.Input[Sequence[pulumi.Input[str]]] + """ + List of [GCP IAM roles](https://cloud.google.com/iam/docs/understanding-roles) for the resource. + """ +elif False: + SecretStaticAccountBindingArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretStaticAccountBindingArgs: def __init__(__self__, *, diff --git a/sdk/python/pulumi_vault/gcp/auth_backend.py b/sdk/python/pulumi_vault/gcp/auth_backend.py index 883118e40..7f513cb9c 100644 --- a/sdk/python/pulumi_vault/gcp/auth_backend.py +++ b/sdk/python/pulumi_vault/gcp/auth_backend.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities from . import outputs from ._inputs import * diff --git a/sdk/python/pulumi_vault/gcp/auth_backend_role.py b/sdk/python/pulumi_vault/gcp/auth_backend_role.py index fbc711ef3..ebc64b8e7 100644 --- a/sdk/python/pulumi_vault/gcp/auth_backend_role.py +++ b/sdk/python/pulumi_vault/gcp/auth_backend_role.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole'] diff --git a/sdk/python/pulumi_vault/gcp/get_auth_backend_role.py b/sdk/python/pulumi_vault/gcp/get_auth_backend_role.py index 03f09a0d2..a8ded0e57 100644 --- a/sdk/python/pulumi_vault/gcp/get_auth_backend_role.py +++ b/sdk/python/pulumi_vault/gcp/get_auth_backend_role.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ @@ -393,9 +398,6 @@ def get_auth_backend_role(backend: Optional[str] = None, token_ttl=pulumi.get(__ret__, 'token_ttl'), token_type=pulumi.get(__ret__, 'token_type'), type=pulumi.get(__ret__, 'type')) - - -@_utilities.lift_output_func(get_auth_backend_role) def get_auth_backend_role_output(backend: Optional[pulumi.Input[Optional[str]]] = None, namespace: Optional[pulumi.Input[Optional[str]]] = None, role_name: Optional[pulumi.Input[str]] = None, @@ -458,4 +460,40 @@ def get_auth_backend_role_output(backend: Optional[pulumi.Input[Optional[str]]] `default-service` and `default-batch` which specify the type to return unless the client requests a different type at generation time. """ - ... + __args__ = dict() + __args__['backend'] = backend + __args__['namespace'] = namespace + __args__['roleName'] = role_name + __args__['tokenBoundCidrs'] = token_bound_cidrs + __args__['tokenExplicitMaxTtl'] = token_explicit_max_ttl + __args__['tokenMaxTtl'] = token_max_ttl + __args__['tokenNoDefaultPolicy'] = token_no_default_policy + __args__['tokenNumUses'] = token_num_uses + __args__['tokenPeriod'] = token_period + __args__['tokenPolicies'] = token_policies + __args__['tokenTtl'] = token_ttl + __args__['tokenType'] = token_type + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('vault:gcp/getAuthBackendRole:getAuthBackendRole', __args__, opts=opts, typ=GetAuthBackendRoleResult) + return __ret__.apply(lambda __response__: GetAuthBackendRoleResult( + backend=pulumi.get(__response__, 'backend'), + bound_instance_groups=pulumi.get(__response__, 'bound_instance_groups'), + bound_labels=pulumi.get(__response__, 'bound_labels'), + bound_projects=pulumi.get(__response__, 'bound_projects'), + bound_regions=pulumi.get(__response__, 'bound_regions'), + bound_service_accounts=pulumi.get(__response__, 'bound_service_accounts'), + bound_zones=pulumi.get(__response__, 'bound_zones'), + id=pulumi.get(__response__, 'id'), + namespace=pulumi.get(__response__, 'namespace'), + role_id=pulumi.get(__response__, 'role_id'), + role_name=pulumi.get(__response__, 'role_name'), + token_bound_cidrs=pulumi.get(__response__, 'token_bound_cidrs'), + token_explicit_max_ttl=pulumi.get(__response__, 'token_explicit_max_ttl'), + token_max_ttl=pulumi.get(__response__, 'token_max_ttl'), + token_no_default_policy=pulumi.get(__response__, 'token_no_default_policy'), + token_num_uses=pulumi.get(__response__, 'token_num_uses'), + token_period=pulumi.get(__response__, 'token_period'), + token_policies=pulumi.get(__response__, 'token_policies'), + token_ttl=pulumi.get(__response__, 'token_ttl'), + token_type=pulumi.get(__response__, 'token_type'), + type=pulumi.get(__response__, 'type'))) diff --git a/sdk/python/pulumi_vault/gcp/outputs.py b/sdk/python/pulumi_vault/gcp/outputs.py index e3e4bf621..97812b41b 100644 --- a/sdk/python/pulumi_vault/gcp/outputs.py +++ b/sdk/python/pulumi_vault/gcp/outputs.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ diff --git a/sdk/python/pulumi_vault/gcp/secret_backend.py b/sdk/python/pulumi_vault/gcp/secret_backend.py index 9d4c0f3b3..864fbab7e 100644 --- a/sdk/python/pulumi_vault/gcp/secret_backend.py +++ b/sdk/python/pulumi_vault/gcp/secret_backend.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretBackendArgs', 'SecretBackend'] diff --git a/sdk/python/pulumi_vault/gcp/secret_impersonated_account.py b/sdk/python/pulumi_vault/gcp/secret_impersonated_account.py index e9663c703..17d8a467d 100644 --- a/sdk/python/pulumi_vault/gcp/secret_impersonated_account.py +++ b/sdk/python/pulumi_vault/gcp/secret_impersonated_account.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretImpersonatedAccountArgs', 'SecretImpersonatedAccount'] diff --git a/sdk/python/pulumi_vault/gcp/secret_roleset.py b/sdk/python/pulumi_vault/gcp/secret_roleset.py index 55b9d5cda..b70cc8bdc 100644 --- a/sdk/python/pulumi_vault/gcp/secret_roleset.py +++ b/sdk/python/pulumi_vault/gcp/secret_roleset.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities from . import outputs from ._inputs import * diff --git a/sdk/python/pulumi_vault/gcp/secret_static_account.py b/sdk/python/pulumi_vault/gcp/secret_static_account.py index 33c6d4e6c..39ceb0997 100644 --- a/sdk/python/pulumi_vault/gcp/secret_static_account.py +++ b/sdk/python/pulumi_vault/gcp/secret_static_account.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities from . import outputs from ._inputs import * diff --git a/sdk/python/pulumi_vault/generic/endpoint.py b/sdk/python/pulumi_vault/generic/endpoint.py index 2da9ceb9e..0460f1dba 100644 --- a/sdk/python/pulumi_vault/generic/endpoint.py +++ b/sdk/python/pulumi_vault/generic/endpoint.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['EndpointArgs', 'Endpoint'] diff --git a/sdk/python/pulumi_vault/generic/get_secret.py b/sdk/python/pulumi_vault/generic/get_secret.py index c3d1fee4f..5a792e3de 100644 --- a/sdk/python/pulumi_vault/generic/get_secret.py +++ b/sdk/python/pulumi_vault/generic/get_secret.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ @@ -226,9 +231,6 @@ def not_implemented(msg): path=pulumi.get(__ret__, 'path'), version=pulumi.get(__ret__, 'version'), with_lease_start_time=pulumi.get(__ret__, 'with_lease_start_time')) - - -@_utilities.lift_output_func(get_secret) def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None, path: Optional[pulumi.Input[str]] = None, version: Optional[pulumi.Input[Optional[int]]] = None, @@ -283,4 +285,22 @@ def not_implemented(msg): Note that storing the `lease_start_time` in the TF state will cause a persistent drift on every `pulumi preview` and will require a `pulumi up`. """ - ... + __args__ = dict() + __args__['namespace'] = namespace + __args__['path'] = path + __args__['version'] = version + __args__['withLeaseStartTime'] = with_lease_start_time + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('vault:generic/getSecret:getSecret', __args__, opts=opts, typ=GetSecretResult) + return __ret__.apply(lambda __response__: GetSecretResult( + data=pulumi.get(__response__, 'data'), + data_json=pulumi.get(__response__, 'data_json'), + id=pulumi.get(__response__, 'id'), + lease_duration=pulumi.get(__response__, 'lease_duration'), + lease_id=pulumi.get(__response__, 'lease_id'), + lease_renewable=pulumi.get(__response__, 'lease_renewable'), + lease_start_time=pulumi.get(__response__, 'lease_start_time'), + namespace=pulumi.get(__response__, 'namespace'), + path=pulumi.get(__response__, 'path'), + version=pulumi.get(__response__, 'version'), + with_lease_start_time=pulumi.get(__response__, 'with_lease_start_time'))) diff --git a/sdk/python/pulumi_vault/generic/secret.py b/sdk/python/pulumi_vault/generic/secret.py index f486d564b..1aa5e7c40 100644 --- a/sdk/python/pulumi_vault/generic/secret.py +++ b/sdk/python/pulumi_vault/generic/secret.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretArgs', 'Secret'] diff --git a/sdk/python/pulumi_vault/get_auth_backend.py b/sdk/python/pulumi_vault/get_auth_backend.py index d98825bb6..a432b75f6 100644 --- a/sdk/python/pulumi_vault/get_auth_backend.py +++ b/sdk/python/pulumi_vault/get_auth_backend.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from . import _utilities __all__ = [ @@ -183,9 +188,6 @@ def get_auth_backend(namespace: Optional[str] = None, namespace=pulumi.get(__ret__, 'namespace'), path=pulumi.get(__ret__, 'path'), type=pulumi.get(__ret__, 'type')) - - -@_utilities.lift_output_func(get_auth_backend) def get_auth_backend_output(namespace: Optional[pulumi.Input[Optional[str]]] = None, path: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendResult]: @@ -206,4 +208,19 @@ def get_auth_backend_output(namespace: Optional[pulumi.Input[Optional[str]]] = N *Available only for Vault Enterprise*. :param str path: The auth backend mount point. """ - ... + __args__ = dict() + __args__['namespace'] = namespace + __args__['path'] = path + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('vault:index/getAuthBackend:getAuthBackend', __args__, opts=opts, typ=GetAuthBackendResult) + return __ret__.apply(lambda __response__: GetAuthBackendResult( + accessor=pulumi.get(__response__, 'accessor'), + default_lease_ttl_seconds=pulumi.get(__response__, 'default_lease_ttl_seconds'), + description=pulumi.get(__response__, 'description'), + id=pulumi.get(__response__, 'id'), + listing_visibility=pulumi.get(__response__, 'listing_visibility'), + local=pulumi.get(__response__, 'local'), + max_lease_ttl_seconds=pulumi.get(__response__, 'max_lease_ttl_seconds'), + namespace=pulumi.get(__response__, 'namespace'), + path=pulumi.get(__response__, 'path'), + type=pulumi.get(__response__, 'type'))) diff --git a/sdk/python/pulumi_vault/get_auth_backends.py b/sdk/python/pulumi_vault/get_auth_backends.py index ba483b8cf..cb07bf635 100644 --- a/sdk/python/pulumi_vault/get_auth_backends.py +++ b/sdk/python/pulumi_vault/get_auth_backends.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from . import _utilities __all__ = [ @@ -125,9 +130,6 @@ def get_auth_backends(namespace: Optional[str] = None, namespace=pulumi.get(__ret__, 'namespace'), paths=pulumi.get(__ret__, 'paths'), type=pulumi.get(__ret__, 'type')) - - -@_utilities.lift_output_func(get_auth_backends) def get_auth_backends_output(namespace: Optional[pulumi.Input[Optional[str]]] = None, type: Optional[pulumi.Input[Optional[str]]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendsResult]: @@ -155,4 +157,14 @@ def get_auth_backends_output(namespace: Optional[pulumi.Input[Optional[str]]] = *Available only for Vault Enterprise*. :param str type: The name of the auth method type. Allows filtering of backends returned by type. """ - ... + __args__ = dict() + __args__['namespace'] = namespace + __args__['type'] = type + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('vault:index/getAuthBackends:getAuthBackends', __args__, opts=opts, typ=GetAuthBackendsResult) + return __ret__.apply(lambda __response__: GetAuthBackendsResult( + accessors=pulumi.get(__response__, 'accessors'), + id=pulumi.get(__response__, 'id'), + namespace=pulumi.get(__response__, 'namespace'), + paths=pulumi.get(__response__, 'paths'), + type=pulumi.get(__response__, 'type'))) diff --git a/sdk/python/pulumi_vault/get_namespace.py b/sdk/python/pulumi_vault/get_namespace.py index e63d2e825..e890b80bd 100644 --- a/sdk/python/pulumi_vault/get_namespace.py +++ b/sdk/python/pulumi_vault/get_namespace.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from . import _utilities __all__ = [ @@ -161,9 +166,6 @@ def get_namespace(namespace: Optional[str] = None, namespace_id=pulumi.get(__ret__, 'namespace_id'), path=pulumi.get(__ret__, 'path'), path_fq=pulumi.get(__ret__, 'path_fq')) - - -@_utilities.lift_output_func(get_namespace) def get_namespace_output(namespace: Optional[pulumi.Input[Optional[str]]] = None, path: Optional[pulumi.Input[Optional[str]]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNamespaceResult]: @@ -210,4 +212,15 @@ def get_namespace_output(namespace: Optional[pulumi.Input[Optional[str]]] = None based on the `namespace` arguments of the provider and this data source. Other path related attributes will be empty in this case. """ - ... + __args__ = dict() + __args__['namespace'] = namespace + __args__['path'] = path + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('vault:index/getNamespace:getNamespace', __args__, opts=opts, typ=GetNamespaceResult) + return __ret__.apply(lambda __response__: GetNamespaceResult( + custom_metadata=pulumi.get(__response__, 'custom_metadata'), + id=pulumi.get(__response__, 'id'), + namespace=pulumi.get(__response__, 'namespace'), + namespace_id=pulumi.get(__response__, 'namespace_id'), + path=pulumi.get(__response__, 'path'), + path_fq=pulumi.get(__response__, 'path_fq'))) diff --git a/sdk/python/pulumi_vault/get_namespaces.py b/sdk/python/pulumi_vault/get_namespaces.py index 45090d621..679b05493 100644 --- a/sdk/python/pulumi_vault/get_namespaces.py +++ b/sdk/python/pulumi_vault/get_namespaces.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from . import _utilities __all__ = [ @@ -106,9 +111,6 @@ def get_namespaces(namespace: Optional[str] = None, id=pulumi.get(__ret__, 'id'), namespace=pulumi.get(__ret__, 'namespace'), paths=pulumi.get(__ret__, 'paths')) - - -@_utilities.lift_output_func(get_namespaces) def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[str]]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNamespacesResult]: """ @@ -141,4 +143,11 @@ def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[str]]] = Non The value should not contain leading or trailing forward slashes. The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace). """ - ... + __args__ = dict() + __args__['namespace'] = namespace + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('vault:index/getNamespaces:getNamespaces', __args__, opts=opts, typ=GetNamespacesResult) + return __ret__.apply(lambda __response__: GetNamespacesResult( + id=pulumi.get(__response__, 'id'), + namespace=pulumi.get(__response__, 'namespace'), + paths=pulumi.get(__response__, 'paths'))) diff --git a/sdk/python/pulumi_vault/get_nomad_access_token.py b/sdk/python/pulumi_vault/get_nomad_access_token.py index 430677027..12508ba0e 100644 --- a/sdk/python/pulumi_vault/get_nomad_access_token.py +++ b/sdk/python/pulumi_vault/get_nomad_access_token.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from . import _utilities __all__ = [ @@ -150,9 +155,6 @@ def get_nomad_access_token(backend: Optional[str] = None, namespace=pulumi.get(__ret__, 'namespace'), role=pulumi.get(__ret__, 'role'), secret_id=pulumi.get(__ret__, 'secret_id')) - - -@_utilities.lift_output_func(get_nomad_access_token) def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None, namespace: Optional[pulumi.Input[Optional[str]]] = None, role: Optional[pulumi.Input[str]] = None, @@ -193,4 +195,16 @@ def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None, :param str role: The name of the Nomad secret backend role to generate a token for, with no leading or trailing `/`s. """ - ... + __args__ = dict() + __args__['backend'] = backend + __args__['namespace'] = namespace + __args__['role'] = role + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('vault:index/getNomadAccessToken:getNomadAccessToken', __args__, opts=opts, typ=GetNomadAccessTokenResult) + return __ret__.apply(lambda __response__: GetNomadAccessTokenResult( + accessor_id=pulumi.get(__response__, 'accessor_id'), + backend=pulumi.get(__response__, 'backend'), + id=pulumi.get(__response__, 'id'), + namespace=pulumi.get(__response__, 'namespace'), + role=pulumi.get(__response__, 'role'), + secret_id=pulumi.get(__response__, 'secret_id'))) diff --git a/sdk/python/pulumi_vault/get_policy_document.py b/sdk/python/pulumi_vault/get_policy_document.py index 20dab97da..d4d11ef7b 100644 --- a/sdk/python/pulumi_vault/get_policy_document.py +++ b/sdk/python/pulumi_vault/get_policy_document.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from . import _utilities from . import outputs from ._inputs import * @@ -115,9 +120,6 @@ def get_policy_document(namespace: Optional[str] = None, id=pulumi.get(__ret__, 'id'), namespace=pulumi.get(__ret__, 'namespace'), rules=pulumi.get(__ret__, 'rules')) - - -@_utilities.lift_output_func(get_policy_document) def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]] = None, rules: Optional[pulumi.Input[Optional[Sequence[Union['GetPolicyDocumentRuleArgs', 'GetPolicyDocumentRuleArgsDict']]]]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetPolicyDocumentResult]: @@ -146,4 +148,13 @@ def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]] policy=example.hcl) ``` """ - ... + __args__ = dict() + __args__['namespace'] = namespace + __args__['rules'] = rules + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('vault:index/getPolicyDocument:getPolicyDocument', __args__, opts=opts, typ=GetPolicyDocumentResult) + return __ret__.apply(lambda __response__: GetPolicyDocumentResult( + hcl=pulumi.get(__response__, 'hcl'), + id=pulumi.get(__response__, 'id'), + namespace=pulumi.get(__response__, 'namespace'), + rules=pulumi.get(__response__, 'rules'))) diff --git a/sdk/python/pulumi_vault/get_raft_autopilot_state.py b/sdk/python/pulumi_vault/get_raft_autopilot_state.py index adc8a0734..31f9a2d5b 100644 --- a/sdk/python/pulumi_vault/get_raft_autopilot_state.py +++ b/sdk/python/pulumi_vault/get_raft_autopilot_state.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from . import _utilities __all__ = [ @@ -223,9 +228,6 @@ def get_raft_autopilot_state(namespace: Optional[str] = None, upgrade_info=pulumi.get(__ret__, 'upgrade_info'), upgrade_info_json=pulumi.get(__ret__, 'upgrade_info_json'), voters=pulumi.get(__ret__, 'voters')) - - -@_utilities.lift_output_func(get_raft_autopilot_state) def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[str]]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetRaftAutopilotStateResult]: """ @@ -245,4 +247,21 @@ def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[st The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace). *Available only for Vault Enterprise*. """ - ... + __args__ = dict() + __args__['namespace'] = namespace + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('vault:index/getRaftAutopilotState:getRaftAutopilotState', __args__, opts=opts, typ=GetRaftAutopilotStateResult) + return __ret__.apply(lambda __response__: GetRaftAutopilotStateResult( + failure_tolerance=pulumi.get(__response__, 'failure_tolerance'), + healthy=pulumi.get(__response__, 'healthy'), + id=pulumi.get(__response__, 'id'), + leader=pulumi.get(__response__, 'leader'), + namespace=pulumi.get(__response__, 'namespace'), + optimistic_failure_tolerance=pulumi.get(__response__, 'optimistic_failure_tolerance'), + redundancy_zones=pulumi.get(__response__, 'redundancy_zones'), + redundancy_zones_json=pulumi.get(__response__, 'redundancy_zones_json'), + servers=pulumi.get(__response__, 'servers'), + servers_json=pulumi.get(__response__, 'servers_json'), + upgrade_info=pulumi.get(__response__, 'upgrade_info'), + upgrade_info_json=pulumi.get(__response__, 'upgrade_info_json'), + voters=pulumi.get(__response__, 'voters'))) diff --git a/sdk/python/pulumi_vault/github/_inputs.py b/sdk/python/pulumi_vault/github/_inputs.py index 54964a060..061dfb0dc 100644 --- a/sdk/python/pulumi_vault/github/_inputs.py +++ b/sdk/python/pulumi_vault/github/_inputs.py @@ -4,15 +4,70 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ 'AuthBackendTuneArgs', + 'AuthBackendTuneArgsDict', ] +MYPY = False + +if not MYPY: + class AuthBackendTuneArgsDict(TypedDict): + allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + List of headers to whitelist and allowing + a plugin to include them in the response. + """ + audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + Specifies the list of keys that will + not be HMAC'd by audit devices in the request data object. + """ + audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + Specifies the list of keys that will + not be HMAC'd by audit devices in the response data object. + """ + default_lease_ttl: NotRequired[pulumi.Input[str]] + """ + Specifies the default time-to-live. + If set, this overrides the global default. + Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration) + """ + listing_visibility: NotRequired[pulumi.Input[str]] + """ + Specifies whether to show this mount in + the UI-specific listing endpoint. Valid values are "unauth" or "hidden". + """ + max_lease_ttl: NotRequired[pulumi.Input[str]] + """ + Specifies the maximum time-to-live. + If set, this overrides the global default. + Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration) + """ + passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + List of headers to whitelist and + pass from the request to the backend. + """ + token_type: NotRequired[pulumi.Input[str]] + """ + Specifies the type of tokens that should be returned by + the mount. Valid values are "default-service", "default-batch", "service", "batch". + """ +elif False: + AuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class AuthBackendTuneArgs: def __init__(__self__, *, diff --git a/sdk/python/pulumi_vault/github/auth_backend.py b/sdk/python/pulumi_vault/github/auth_backend.py index 952116aa5..b73be868c 100644 --- a/sdk/python/pulumi_vault/github/auth_backend.py +++ b/sdk/python/pulumi_vault/github/auth_backend.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities from . import outputs from ._inputs import * diff --git a/sdk/python/pulumi_vault/github/outputs.py b/sdk/python/pulumi_vault/github/outputs.py index ecb920ad0..1344a802e 100644 --- a/sdk/python/pulumi_vault/github/outputs.py +++ b/sdk/python/pulumi_vault/github/outputs.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ diff --git a/sdk/python/pulumi_vault/github/team.py b/sdk/python/pulumi_vault/github/team.py index 1f6386c7b..d6f5c8701 100644 --- a/sdk/python/pulumi_vault/github/team.py +++ b/sdk/python/pulumi_vault/github/team.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['TeamArgs', 'Team'] diff --git a/sdk/python/pulumi_vault/github/user.py b/sdk/python/pulumi_vault/github/user.py index 6a4b6f248..a7c7b35eb 100644 --- a/sdk/python/pulumi_vault/github/user.py +++ b/sdk/python/pulumi_vault/github/user.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['UserArgs', 'User'] diff --git a/sdk/python/pulumi_vault/identity/entity.py b/sdk/python/pulumi_vault/identity/entity.py index 8e42f62cb..accdf7756 100644 --- a/sdk/python/pulumi_vault/identity/entity.py +++ b/sdk/python/pulumi_vault/identity/entity.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['EntityArgs', 'Entity'] diff --git a/sdk/python/pulumi_vault/identity/entity_alias.py b/sdk/python/pulumi_vault/identity/entity_alias.py index 83b991809..56f341ec9 100644 --- a/sdk/python/pulumi_vault/identity/entity_alias.py +++ b/sdk/python/pulumi_vault/identity/entity_alias.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['EntityAliasArgs', 'EntityAlias'] diff --git a/sdk/python/pulumi_vault/identity/entity_policies.py b/sdk/python/pulumi_vault/identity/entity_policies.py index c7076e54f..8eb3bb754 100644 --- a/sdk/python/pulumi_vault/identity/entity_policies.py +++ b/sdk/python/pulumi_vault/identity/entity_policies.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['EntityPoliciesArgs', 'EntityPolicies'] diff --git a/sdk/python/pulumi_vault/identity/get_entity.py b/sdk/python/pulumi_vault/identity/get_entity.py index 9d4e7f0d3..2fef14214 100644 --- a/sdk/python/pulumi_vault/identity/get_entity.py +++ b/sdk/python/pulumi_vault/identity/get_entity.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities from . import outputs @@ -311,9 +316,6 @@ def get_entity(alias_id: Optional[str] = None, namespace=pulumi.get(__ret__, 'namespace'), namespace_id=pulumi.get(__ret__, 'namespace_id'), policies=pulumi.get(__ret__, 'policies')) - - -@_utilities.lift_output_func(get_entity) def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None, alias_mount_accessor: Optional[pulumi.Input[Optional[str]]] = None, alias_name: Optional[pulumi.Input[Optional[str]]] = None, @@ -351,4 +353,32 @@ def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None, The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace). *Available only for Vault Enterprise*. """ - ... + __args__ = dict() + __args__['aliasId'] = alias_id + __args__['aliasMountAccessor'] = alias_mount_accessor + __args__['aliasName'] = alias_name + __args__['entityId'] = entity_id + __args__['entityName'] = entity_name + __args__['namespace'] = namespace + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('vault:identity/getEntity:getEntity', __args__, opts=opts, typ=GetEntityResult) + return __ret__.apply(lambda __response__: GetEntityResult( + alias_id=pulumi.get(__response__, 'alias_id'), + alias_mount_accessor=pulumi.get(__response__, 'alias_mount_accessor'), + alias_name=pulumi.get(__response__, 'alias_name'), + aliases=pulumi.get(__response__, 'aliases'), + creation_time=pulumi.get(__response__, 'creation_time'), + data_json=pulumi.get(__response__, 'data_json'), + direct_group_ids=pulumi.get(__response__, 'direct_group_ids'), + disabled=pulumi.get(__response__, 'disabled'), + entity_id=pulumi.get(__response__, 'entity_id'), + entity_name=pulumi.get(__response__, 'entity_name'), + group_ids=pulumi.get(__response__, 'group_ids'), + id=pulumi.get(__response__, 'id'), + inherited_group_ids=pulumi.get(__response__, 'inherited_group_ids'), + last_update_time=pulumi.get(__response__, 'last_update_time'), + merged_entity_ids=pulumi.get(__response__, 'merged_entity_ids'), + metadata=pulumi.get(__response__, 'metadata'), + namespace=pulumi.get(__response__, 'namespace'), + namespace_id=pulumi.get(__response__, 'namespace_id'), + policies=pulumi.get(__response__, 'policies'))) diff --git a/sdk/python/pulumi_vault/identity/get_group.py b/sdk/python/pulumi_vault/identity/get_group.py index 58f933ba4..6d3d1961e 100644 --- a/sdk/python/pulumi_vault/identity/get_group.py +++ b/sdk/python/pulumi_vault/identity/get_group.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ @@ -388,9 +393,6 @@ def get_group(alias_id: Optional[str] = None, parent_group_ids=pulumi.get(__ret__, 'parent_group_ids'), policies=pulumi.get(__ret__, 'policies'), type=pulumi.get(__ret__, 'type')) - - -@_utilities.lift_output_func(get_group) def get_group_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None, alias_mount_accessor: Optional[pulumi.Input[Optional[str]]] = None, alias_name: Optional[pulumi.Input[Optional[str]]] = None, @@ -428,4 +430,38 @@ def get_group_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None, The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace). *Available only for Vault Enterprise*. """ - ... + __args__ = dict() + __args__['aliasId'] = alias_id + __args__['aliasMountAccessor'] = alias_mount_accessor + __args__['aliasName'] = alias_name + __args__['groupId'] = group_id + __args__['groupName'] = group_name + __args__['namespace'] = namespace + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('vault:identity/getGroup:getGroup', __args__, opts=opts, typ=GetGroupResult) + return __ret__.apply(lambda __response__: GetGroupResult( + alias_canonical_id=pulumi.get(__response__, 'alias_canonical_id'), + alias_creation_time=pulumi.get(__response__, 'alias_creation_time'), + alias_id=pulumi.get(__response__, 'alias_id'), + alias_last_update_time=pulumi.get(__response__, 'alias_last_update_time'), + alias_merged_from_canonical_ids=pulumi.get(__response__, 'alias_merged_from_canonical_ids'), + alias_metadata=pulumi.get(__response__, 'alias_metadata'), + alias_mount_accessor=pulumi.get(__response__, 'alias_mount_accessor'), + alias_mount_path=pulumi.get(__response__, 'alias_mount_path'), + alias_mount_type=pulumi.get(__response__, 'alias_mount_type'), + alias_name=pulumi.get(__response__, 'alias_name'), + creation_time=pulumi.get(__response__, 'creation_time'), + data_json=pulumi.get(__response__, 'data_json'), + group_id=pulumi.get(__response__, 'group_id'), + group_name=pulumi.get(__response__, 'group_name'), + id=pulumi.get(__response__, 'id'), + last_update_time=pulumi.get(__response__, 'last_update_time'), + member_entity_ids=pulumi.get(__response__, 'member_entity_ids'), + member_group_ids=pulumi.get(__response__, 'member_group_ids'), + metadata=pulumi.get(__response__, 'metadata'), + modify_index=pulumi.get(__response__, 'modify_index'), + namespace=pulumi.get(__response__, 'namespace'), + namespace_id=pulumi.get(__response__, 'namespace_id'), + parent_group_ids=pulumi.get(__response__, 'parent_group_ids'), + policies=pulumi.get(__response__, 'policies'), + type=pulumi.get(__response__, 'type'))) diff --git a/sdk/python/pulumi_vault/identity/get_oidc_client_creds.py b/sdk/python/pulumi_vault/identity/get_oidc_client_creds.py index 08e2797d1..49b87e744 100644 --- a/sdk/python/pulumi_vault/identity/get_oidc_client_creds.py +++ b/sdk/python/pulumi_vault/identity/get_oidc_client_creds.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ @@ -128,9 +133,6 @@ def get_oidc_client_creds(name: Optional[str] = None, id=pulumi.get(__ret__, 'id'), name=pulumi.get(__ret__, 'name'), namespace=pulumi.get(__ret__, 'namespace')) - - -@_utilities.lift_output_func(get_oidc_client_creds) def get_oidc_client_creds_output(name: Optional[pulumi.Input[str]] = None, namespace: Optional[pulumi.Input[Optional[str]]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetOidcClientCredsResult]: @@ -160,4 +162,14 @@ def get_oidc_client_creds_output(name: Optional[pulumi.Input[str]] = None, The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace). *Available only for Vault Enterprise*. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['namespace'] = namespace + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('vault:identity/getOidcClientCreds:getOidcClientCreds', __args__, opts=opts, typ=GetOidcClientCredsResult) + return __ret__.apply(lambda __response__: GetOidcClientCredsResult( + client_id=pulumi.get(__response__, 'client_id'), + client_secret=pulumi.get(__response__, 'client_secret'), + id=pulumi.get(__response__, 'id'), + name=pulumi.get(__response__, 'name'), + namespace=pulumi.get(__response__, 'namespace'))) diff --git a/sdk/python/pulumi_vault/identity/get_oidc_openid_config.py b/sdk/python/pulumi_vault/identity/get_oidc_openid_config.py index 50954b459..708925a27 100644 --- a/sdk/python/pulumi_vault/identity/get_oidc_openid_config.py +++ b/sdk/python/pulumi_vault/identity/get_oidc_openid_config.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ @@ -268,9 +273,6 @@ def get_oidc_openid_config(name: Optional[str] = None, token_endpoint=pulumi.get(__ret__, 'token_endpoint'), token_endpoint_auth_methods_supporteds=pulumi.get(__ret__, 'token_endpoint_auth_methods_supporteds'), userinfo_endpoint=pulumi.get(__ret__, 'userinfo_endpoint')) - - -@_utilities.lift_output_func(get_oidc_openid_config) def get_oidc_openid_config_output(name: Optional[pulumi.Input[str]] = None, namespace: Optional[pulumi.Input[Optional[str]]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetOidcOpenidConfigResult]: @@ -309,4 +311,24 @@ def get_oidc_openid_config_output(name: Optional[pulumi.Input[str]] = None, The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace). *Available only for Vault Enterprise*. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['namespace'] = namespace + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('vault:identity/getOidcOpenidConfig:getOidcOpenidConfig', __args__, opts=opts, typ=GetOidcOpenidConfigResult) + return __ret__.apply(lambda __response__: GetOidcOpenidConfigResult( + authorization_endpoint=pulumi.get(__response__, 'authorization_endpoint'), + grant_types_supporteds=pulumi.get(__response__, 'grant_types_supporteds'), + id=pulumi.get(__response__, 'id'), + id_token_signing_alg_values_supporteds=pulumi.get(__response__, 'id_token_signing_alg_values_supporteds'), + issuer=pulumi.get(__response__, 'issuer'), + jwks_uri=pulumi.get(__response__, 'jwks_uri'), + name=pulumi.get(__response__, 'name'), + namespace=pulumi.get(__response__, 'namespace'), + request_uri_parameter_supported=pulumi.get(__response__, 'request_uri_parameter_supported'), + response_types_supporteds=pulumi.get(__response__, 'response_types_supporteds'), + scopes_supporteds=pulumi.get(__response__, 'scopes_supporteds'), + subject_types_supporteds=pulumi.get(__response__, 'subject_types_supporteds'), + token_endpoint=pulumi.get(__response__, 'token_endpoint'), + token_endpoint_auth_methods_supporteds=pulumi.get(__response__, 'token_endpoint_auth_methods_supporteds'), + userinfo_endpoint=pulumi.get(__response__, 'userinfo_endpoint'))) diff --git a/sdk/python/pulumi_vault/identity/get_oidc_public_keys.py b/sdk/python/pulumi_vault/identity/get_oidc_public_keys.py index 882413859..39d2b3b8b 100644 --- a/sdk/python/pulumi_vault/identity/get_oidc_public_keys.py +++ b/sdk/python/pulumi_vault/identity/get_oidc_public_keys.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ @@ -124,9 +129,6 @@ def get_oidc_public_keys(name: Optional[str] = None, keys=pulumi.get(__ret__, 'keys'), name=pulumi.get(__ret__, 'name'), namespace=pulumi.get(__ret__, 'namespace')) - - -@_utilities.lift_output_func(get_oidc_public_keys) def get_oidc_public_keys_output(name: Optional[pulumi.Input[str]] = None, namespace: Optional[pulumi.Input[Optional[str]]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetOidcPublicKeysResult]: @@ -165,4 +167,13 @@ def get_oidc_public_keys_output(name: Optional[pulumi.Input[str]] = None, The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace). *Available only for Vault Enterprise*. """ - ... + __args__ = dict() + __args__['name'] = name + __args__['namespace'] = namespace + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('vault:identity/getOidcPublicKeys:getOidcPublicKeys', __args__, opts=opts, typ=GetOidcPublicKeysResult) + return __ret__.apply(lambda __response__: GetOidcPublicKeysResult( + id=pulumi.get(__response__, 'id'), + keys=pulumi.get(__response__, 'keys'), + name=pulumi.get(__response__, 'name'), + namespace=pulumi.get(__response__, 'namespace'))) diff --git a/sdk/python/pulumi_vault/identity/group.py b/sdk/python/pulumi_vault/identity/group.py index 1ee2159ba..ffdeee5c5 100644 --- a/sdk/python/pulumi_vault/identity/group.py +++ b/sdk/python/pulumi_vault/identity/group.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['GroupArgs', 'Group'] diff --git a/sdk/python/pulumi_vault/identity/group_alias.py b/sdk/python/pulumi_vault/identity/group_alias.py index c41c21bd1..75563d224 100644 --- a/sdk/python/pulumi_vault/identity/group_alias.py +++ b/sdk/python/pulumi_vault/identity/group_alias.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['GroupAliasArgs', 'GroupAlias'] diff --git a/sdk/python/pulumi_vault/identity/group_member_entity_ids.py b/sdk/python/pulumi_vault/identity/group_member_entity_ids.py index 58e623e53..81cc31eb2 100644 --- a/sdk/python/pulumi_vault/identity/group_member_entity_ids.py +++ b/sdk/python/pulumi_vault/identity/group_member_entity_ids.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['GroupMemberEntityIdsArgs', 'GroupMemberEntityIds'] diff --git a/sdk/python/pulumi_vault/identity/group_member_group_ids.py b/sdk/python/pulumi_vault/identity/group_member_group_ids.py index 38a7a719b..ad0ee8a45 100644 --- a/sdk/python/pulumi_vault/identity/group_member_group_ids.py +++ b/sdk/python/pulumi_vault/identity/group_member_group_ids.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['GroupMemberGroupIdsArgs', 'GroupMemberGroupIds'] diff --git a/sdk/python/pulumi_vault/identity/group_policies.py b/sdk/python/pulumi_vault/identity/group_policies.py index 3a323a4c8..791ff4c40 100644 --- a/sdk/python/pulumi_vault/identity/group_policies.py +++ b/sdk/python/pulumi_vault/identity/group_policies.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['GroupPoliciesArgs', 'GroupPolicies'] diff --git a/sdk/python/pulumi_vault/identity/mfa_duo.py b/sdk/python/pulumi_vault/identity/mfa_duo.py index 0f3631976..d707ff889 100644 --- a/sdk/python/pulumi_vault/identity/mfa_duo.py +++ b/sdk/python/pulumi_vault/identity/mfa_duo.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['MfaDuoArgs', 'MfaDuo'] diff --git a/sdk/python/pulumi_vault/identity/mfa_login_enforcement.py b/sdk/python/pulumi_vault/identity/mfa_login_enforcement.py index 984b6e2c6..6e10eff7d 100644 --- a/sdk/python/pulumi_vault/identity/mfa_login_enforcement.py +++ b/sdk/python/pulumi_vault/identity/mfa_login_enforcement.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['MfaLoginEnforcementArgs', 'MfaLoginEnforcement'] diff --git a/sdk/python/pulumi_vault/identity/mfa_okta.py b/sdk/python/pulumi_vault/identity/mfa_okta.py index 9d8d6745b..44b98716c 100644 --- a/sdk/python/pulumi_vault/identity/mfa_okta.py +++ b/sdk/python/pulumi_vault/identity/mfa_okta.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['MfaOktaArgs', 'MfaOkta'] diff --git a/sdk/python/pulumi_vault/identity/mfa_pingid.py b/sdk/python/pulumi_vault/identity/mfa_pingid.py index 62b6f3b0c..7c0540cbb 100644 --- a/sdk/python/pulumi_vault/identity/mfa_pingid.py +++ b/sdk/python/pulumi_vault/identity/mfa_pingid.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['MfaPingidArgs', 'MfaPingid'] diff --git a/sdk/python/pulumi_vault/identity/mfa_totp.py b/sdk/python/pulumi_vault/identity/mfa_totp.py index 7348d7807..0da9e9c77 100644 --- a/sdk/python/pulumi_vault/identity/mfa_totp.py +++ b/sdk/python/pulumi_vault/identity/mfa_totp.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['MfaTotpArgs', 'MfaTotp'] diff --git a/sdk/python/pulumi_vault/identity/oidc.py b/sdk/python/pulumi_vault/identity/oidc.py index 5c6949169..d603c5a3e 100644 --- a/sdk/python/pulumi_vault/identity/oidc.py +++ b/sdk/python/pulumi_vault/identity/oidc.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['OidcArgs', 'Oidc'] diff --git a/sdk/python/pulumi_vault/identity/oidc_assignment.py b/sdk/python/pulumi_vault/identity/oidc_assignment.py index 39c8620a5..b53436630 100644 --- a/sdk/python/pulumi_vault/identity/oidc_assignment.py +++ b/sdk/python/pulumi_vault/identity/oidc_assignment.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['OidcAssignmentArgs', 'OidcAssignment'] diff --git a/sdk/python/pulumi_vault/identity/oidc_client.py b/sdk/python/pulumi_vault/identity/oidc_client.py index c34f04de5..1307743f5 100644 --- a/sdk/python/pulumi_vault/identity/oidc_client.py +++ b/sdk/python/pulumi_vault/identity/oidc_client.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['OidcClientArgs', 'OidcClient'] diff --git a/sdk/python/pulumi_vault/identity/oidc_key.py b/sdk/python/pulumi_vault/identity/oidc_key.py index d00d7774f..022e8b666 100644 --- a/sdk/python/pulumi_vault/identity/oidc_key.py +++ b/sdk/python/pulumi_vault/identity/oidc_key.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['OidcKeyArgs', 'OidcKey'] diff --git a/sdk/python/pulumi_vault/identity/oidc_key_allowed_client_id.py b/sdk/python/pulumi_vault/identity/oidc_key_allowed_client_id.py index 9aa955d33..e9df453c6 100644 --- a/sdk/python/pulumi_vault/identity/oidc_key_allowed_client_id.py +++ b/sdk/python/pulumi_vault/identity/oidc_key_allowed_client_id.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['OidcKeyAllowedClientIDArgs', 'OidcKeyAllowedClientID'] diff --git a/sdk/python/pulumi_vault/identity/oidc_provider.py b/sdk/python/pulumi_vault/identity/oidc_provider.py index 943521fcb..ea3a8e721 100644 --- a/sdk/python/pulumi_vault/identity/oidc_provider.py +++ b/sdk/python/pulumi_vault/identity/oidc_provider.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['OidcProviderArgs', 'OidcProvider'] diff --git a/sdk/python/pulumi_vault/identity/oidc_role.py b/sdk/python/pulumi_vault/identity/oidc_role.py index c797cfba6..88606780a 100644 --- a/sdk/python/pulumi_vault/identity/oidc_role.py +++ b/sdk/python/pulumi_vault/identity/oidc_role.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['OidcRoleArgs', 'OidcRole'] diff --git a/sdk/python/pulumi_vault/identity/oidc_scope.py b/sdk/python/pulumi_vault/identity/oidc_scope.py index 6c041427b..eafb94f04 100644 --- a/sdk/python/pulumi_vault/identity/oidc_scope.py +++ b/sdk/python/pulumi_vault/identity/oidc_scope.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['OidcScopeArgs', 'OidcScope'] diff --git a/sdk/python/pulumi_vault/identity/outputs.py b/sdk/python/pulumi_vault/identity/outputs.py index 2ba5b1927..4ca62fae0 100644 --- a/sdk/python/pulumi_vault/identity/outputs.py +++ b/sdk/python/pulumi_vault/identity/outputs.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ diff --git a/sdk/python/pulumi_vault/jwt/_inputs.py b/sdk/python/pulumi_vault/jwt/_inputs.py index 54964a060..061dfb0dc 100644 --- a/sdk/python/pulumi_vault/jwt/_inputs.py +++ b/sdk/python/pulumi_vault/jwt/_inputs.py @@ -4,15 +4,70 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ 'AuthBackendTuneArgs', + 'AuthBackendTuneArgsDict', ] +MYPY = False + +if not MYPY: + class AuthBackendTuneArgsDict(TypedDict): + allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + List of headers to whitelist and allowing + a plugin to include them in the response. + """ + audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + Specifies the list of keys that will + not be HMAC'd by audit devices in the request data object. + """ + audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + Specifies the list of keys that will + not be HMAC'd by audit devices in the response data object. + """ + default_lease_ttl: NotRequired[pulumi.Input[str]] + """ + Specifies the default time-to-live. + If set, this overrides the global default. + Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration) + """ + listing_visibility: NotRequired[pulumi.Input[str]] + """ + Specifies whether to show this mount in + the UI-specific listing endpoint. Valid values are "unauth" or "hidden". + """ + max_lease_ttl: NotRequired[pulumi.Input[str]] + """ + Specifies the maximum time-to-live. + If set, this overrides the global default. + Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration) + """ + passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + List of headers to whitelist and + pass from the request to the backend. + """ + token_type: NotRequired[pulumi.Input[str]] + """ + Specifies the type of tokens that should be returned by + the mount. Valid values are "default-service", "default-batch", "service", "batch". + """ +elif False: + AuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class AuthBackendTuneArgs: def __init__(__self__, *, diff --git a/sdk/python/pulumi_vault/jwt/auth_backend.py b/sdk/python/pulumi_vault/jwt/auth_backend.py index 5998dd9d4..118e2801f 100644 --- a/sdk/python/pulumi_vault/jwt/auth_backend.py +++ b/sdk/python/pulumi_vault/jwt/auth_backend.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities from . import outputs from ._inputs import * diff --git a/sdk/python/pulumi_vault/jwt/auth_backend_role.py b/sdk/python/pulumi_vault/jwt/auth_backend_role.py index 60efef198..77f5e9d96 100644 --- a/sdk/python/pulumi_vault/jwt/auth_backend_role.py +++ b/sdk/python/pulumi_vault/jwt/auth_backend_role.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole'] diff --git a/sdk/python/pulumi_vault/jwt/outputs.py b/sdk/python/pulumi_vault/jwt/outputs.py index ecb920ad0..1344a802e 100644 --- a/sdk/python/pulumi_vault/jwt/outputs.py +++ b/sdk/python/pulumi_vault/jwt/outputs.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ diff --git a/sdk/python/pulumi_vault/kmip/secret_backend.py b/sdk/python/pulumi_vault/kmip/secret_backend.py index e9b36e887..e2c67cb0a 100644 --- a/sdk/python/pulumi_vault/kmip/secret_backend.py +++ b/sdk/python/pulumi_vault/kmip/secret_backend.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretBackendArgs', 'SecretBackend'] diff --git a/sdk/python/pulumi_vault/kmip/secret_role.py b/sdk/python/pulumi_vault/kmip/secret_role.py index ca4b4eb04..cf730772f 100644 --- a/sdk/python/pulumi_vault/kmip/secret_role.py +++ b/sdk/python/pulumi_vault/kmip/secret_role.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretRoleArgs', 'SecretRole'] diff --git a/sdk/python/pulumi_vault/kmip/secret_scope.py b/sdk/python/pulumi_vault/kmip/secret_scope.py index dcbd436bb..e4bdf5b47 100644 --- a/sdk/python/pulumi_vault/kmip/secret_scope.py +++ b/sdk/python/pulumi_vault/kmip/secret_scope.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretScopeArgs', 'SecretScope'] diff --git a/sdk/python/pulumi_vault/kubernetes/auth_backend_config.py b/sdk/python/pulumi_vault/kubernetes/auth_backend_config.py index 28aa872f2..30a2d0feb 100644 --- a/sdk/python/pulumi_vault/kubernetes/auth_backend_config.py +++ b/sdk/python/pulumi_vault/kubernetes/auth_backend_config.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['AuthBackendConfigArgs', 'AuthBackendConfig'] diff --git a/sdk/python/pulumi_vault/kubernetes/auth_backend_role.py b/sdk/python/pulumi_vault/kubernetes/auth_backend_role.py index 3d0e8e7c7..700becbbc 100644 --- a/sdk/python/pulumi_vault/kubernetes/auth_backend_role.py +++ b/sdk/python/pulumi_vault/kubernetes/auth_backend_role.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole'] diff --git a/sdk/python/pulumi_vault/kubernetes/get_auth_backend_config.py b/sdk/python/pulumi_vault/kubernetes/get_auth_backend_config.py index 38b01ba23..be6ad763c 100644 --- a/sdk/python/pulumi_vault/kubernetes/get_auth_backend_config.py +++ b/sdk/python/pulumi_vault/kubernetes/get_auth_backend_config.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ @@ -176,9 +181,6 @@ def get_auth_backend_config(backend: Optional[str] = None, kubernetes_host=pulumi.get(__ret__, 'kubernetes_host'), namespace=pulumi.get(__ret__, 'namespace'), pem_keys=pulumi.get(__ret__, 'pem_keys')) - - -@_utilities.lift_output_func(get_auth_backend_config) def get_auth_backend_config_output(backend: Optional[pulumi.Input[Optional[str]]] = None, disable_iss_validation: Optional[pulumi.Input[Optional[bool]]] = None, disable_local_ca_jwt: Optional[pulumi.Input[Optional[bool]]] = None, @@ -205,4 +207,24 @@ def get_auth_backend_config_output(backend: Optional[pulumi.Input[Optional[str]] *Available only for Vault Enterprise*. :param Sequence[str] pem_keys: Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys. """ - ... + __args__ = dict() + __args__['backend'] = backend + __args__['disableIssValidation'] = disable_iss_validation + __args__['disableLocalCaJwt'] = disable_local_ca_jwt + __args__['issuer'] = issuer + __args__['kubernetesCaCert'] = kubernetes_ca_cert + __args__['kubernetesHost'] = kubernetes_host + __args__['namespace'] = namespace + __args__['pemKeys'] = pem_keys + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('vault:kubernetes/getAuthBackendConfig:getAuthBackendConfig', __args__, opts=opts, typ=GetAuthBackendConfigResult) + return __ret__.apply(lambda __response__: GetAuthBackendConfigResult( + backend=pulumi.get(__response__, 'backend'), + disable_iss_validation=pulumi.get(__response__, 'disable_iss_validation'), + disable_local_ca_jwt=pulumi.get(__response__, 'disable_local_ca_jwt'), + id=pulumi.get(__response__, 'id'), + issuer=pulumi.get(__response__, 'issuer'), + kubernetes_ca_cert=pulumi.get(__response__, 'kubernetes_ca_cert'), + kubernetes_host=pulumi.get(__response__, 'kubernetes_host'), + namespace=pulumi.get(__response__, 'namespace'), + pem_keys=pulumi.get(__response__, 'pem_keys'))) diff --git a/sdk/python/pulumi_vault/kubernetes/get_auth_backend_role.py b/sdk/python/pulumi_vault/kubernetes/get_auth_backend_role.py index 4131504df..ce400728e 100644 --- a/sdk/python/pulumi_vault/kubernetes/get_auth_backend_role.py +++ b/sdk/python/pulumi_vault/kubernetes/get_auth_backend_role.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ @@ -336,9 +341,6 @@ def get_auth_backend_role(audience: Optional[str] = None, token_policies=pulumi.get(__ret__, 'token_policies'), token_ttl=pulumi.get(__ret__, 'token_ttl'), token_type=pulumi.get(__ret__, 'token_type')) - - -@_utilities.lift_output_func(get_auth_backend_role) def get_auth_backend_role_output(audience: Optional[pulumi.Input[Optional[str]]] = None, backend: Optional[pulumi.Input[Optional[str]]] = None, namespace: Optional[pulumi.Input[Optional[str]]] = None, @@ -395,4 +397,37 @@ def get_auth_backend_role_output(audience: Optional[pulumi.Input[Optional[str]]] `default-service` and `default-batch` which specify the type to return unless the client requests a different type at generation time. """ - ... + __args__ = dict() + __args__['audience'] = audience + __args__['backend'] = backend + __args__['namespace'] = namespace + __args__['roleName'] = role_name + __args__['tokenBoundCidrs'] = token_bound_cidrs + __args__['tokenExplicitMaxTtl'] = token_explicit_max_ttl + __args__['tokenMaxTtl'] = token_max_ttl + __args__['tokenNoDefaultPolicy'] = token_no_default_policy + __args__['tokenNumUses'] = token_num_uses + __args__['tokenPeriod'] = token_period + __args__['tokenPolicies'] = token_policies + __args__['tokenTtl'] = token_ttl + __args__['tokenType'] = token_type + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('vault:kubernetes/getAuthBackendRole:getAuthBackendRole', __args__, opts=opts, typ=GetAuthBackendRoleResult) + return __ret__.apply(lambda __response__: GetAuthBackendRoleResult( + alias_name_source=pulumi.get(__response__, 'alias_name_source'), + audience=pulumi.get(__response__, 'audience'), + backend=pulumi.get(__response__, 'backend'), + bound_service_account_names=pulumi.get(__response__, 'bound_service_account_names'), + bound_service_account_namespaces=pulumi.get(__response__, 'bound_service_account_namespaces'), + id=pulumi.get(__response__, 'id'), + namespace=pulumi.get(__response__, 'namespace'), + role_name=pulumi.get(__response__, 'role_name'), + token_bound_cidrs=pulumi.get(__response__, 'token_bound_cidrs'), + token_explicit_max_ttl=pulumi.get(__response__, 'token_explicit_max_ttl'), + token_max_ttl=pulumi.get(__response__, 'token_max_ttl'), + token_no_default_policy=pulumi.get(__response__, 'token_no_default_policy'), + token_num_uses=pulumi.get(__response__, 'token_num_uses'), + token_period=pulumi.get(__response__, 'token_period'), + token_policies=pulumi.get(__response__, 'token_policies'), + token_ttl=pulumi.get(__response__, 'token_ttl'), + token_type=pulumi.get(__response__, 'token_type'))) diff --git a/sdk/python/pulumi_vault/kubernetes/get_service_account_token.py b/sdk/python/pulumi_vault/kubernetes/get_service_account_token.py index 466742fee..304cd3009 100644 --- a/sdk/python/pulumi_vault/kubernetes/get_service_account_token.py +++ b/sdk/python/pulumi_vault/kubernetes/get_service_account_token.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ @@ -254,9 +259,6 @@ def get_service_account_token(backend: Optional[str] = None, service_account_namespace=pulumi.get(__ret__, 'service_account_namespace'), service_account_token=pulumi.get(__ret__, 'service_account_token'), ttl=pulumi.get(__ret__, 'ttl')) - - -@_utilities.lift_output_func(get_service_account_token) def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None, cluster_role_binding: Optional[pulumi.Input[Optional[bool]]] = None, kubernetes_namespace: Optional[pulumi.Input[str]] = None, @@ -317,4 +319,26 @@ def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None :param str ttl: The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string. """ - ... + __args__ = dict() + __args__['backend'] = backend + __args__['clusterRoleBinding'] = cluster_role_binding + __args__['kubernetesNamespace'] = kubernetes_namespace + __args__['namespace'] = namespace + __args__['role'] = role + __args__['ttl'] = ttl + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('vault:kubernetes/getServiceAccountToken:getServiceAccountToken', __args__, opts=opts, typ=GetServiceAccountTokenResult) + return __ret__.apply(lambda __response__: GetServiceAccountTokenResult( + backend=pulumi.get(__response__, 'backend'), + cluster_role_binding=pulumi.get(__response__, 'cluster_role_binding'), + id=pulumi.get(__response__, 'id'), + kubernetes_namespace=pulumi.get(__response__, 'kubernetes_namespace'), + lease_duration=pulumi.get(__response__, 'lease_duration'), + lease_id=pulumi.get(__response__, 'lease_id'), + lease_renewable=pulumi.get(__response__, 'lease_renewable'), + namespace=pulumi.get(__response__, 'namespace'), + role=pulumi.get(__response__, 'role'), + service_account_name=pulumi.get(__response__, 'service_account_name'), + service_account_namespace=pulumi.get(__response__, 'service_account_namespace'), + service_account_token=pulumi.get(__response__, 'service_account_token'), + ttl=pulumi.get(__response__, 'ttl'))) diff --git a/sdk/python/pulumi_vault/kubernetes/secret_backend.py b/sdk/python/pulumi_vault/kubernetes/secret_backend.py index d20705a03..e71fd6932 100644 --- a/sdk/python/pulumi_vault/kubernetes/secret_backend.py +++ b/sdk/python/pulumi_vault/kubernetes/secret_backend.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretBackendArgs', 'SecretBackend'] diff --git a/sdk/python/pulumi_vault/kubernetes/secret_backend_role.py b/sdk/python/pulumi_vault/kubernetes/secret_backend_role.py index a710fbb64..506b37aa0 100644 --- a/sdk/python/pulumi_vault/kubernetes/secret_backend_role.py +++ b/sdk/python/pulumi_vault/kubernetes/secret_backend_role.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretBackendRoleArgs', 'SecretBackendRole'] diff --git a/sdk/python/pulumi_vault/kv/_inputs.py b/sdk/python/pulumi_vault/kv/_inputs.py index 649c0d275..78b53fc37 100644 --- a/sdk/python/pulumi_vault/kv/_inputs.py +++ b/sdk/python/pulumi_vault/kv/_inputs.py @@ -4,15 +4,47 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ 'SecretV2CustomMetadataArgs', + 'SecretV2CustomMetadataArgsDict', ] +MYPY = False + +if not MYPY: + class SecretV2CustomMetadataArgsDict(TypedDict): + cas_required: NotRequired[pulumi.Input[bool]] + """ + If true, all keys will require the cas parameter to be set on all write requests. + """ + data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]] + """ + A mapping whose keys are the top-level data keys returned from + Vault and whose values are the corresponding values. This map can only + represent string data, so any non-string values returned from Vault are + serialized as JSON. + """ + delete_version_after: NotRequired[pulumi.Input[int]] + """ + If set, specifies the length of time before a version is deleted. + """ + max_versions: NotRequired[pulumi.Input[int]] + """ + The number of versions to keep per key. + """ +elif False: + SecretV2CustomMetadataArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretV2CustomMetadataArgs: def __init__(__self__, *, diff --git a/sdk/python/pulumi_vault/kv/get_secret.py b/sdk/python/pulumi_vault/kv/get_secret.py index 5b0504bda..c87f6d0b2 100644 --- a/sdk/python/pulumi_vault/kv/get_secret.py +++ b/sdk/python/pulumi_vault/kv/get_secret.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ @@ -181,9 +186,6 @@ def get_secret(namespace: Optional[str] = None, lease_renewable=pulumi.get(__ret__, 'lease_renewable'), namespace=pulumi.get(__ret__, 'namespace'), path=pulumi.get(__ret__, 'path')) - - -@_utilities.lift_output_func(get_secret) def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None, path: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecretResult]: @@ -222,4 +224,17 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None, *Available only for Vault Enterprise*. :param str path: Full path of the KV-V1 secret. """ - ... + __args__ = dict() + __args__['namespace'] = namespace + __args__['path'] = path + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('vault:kv/getSecret:getSecret', __args__, opts=opts, typ=GetSecretResult) + return __ret__.apply(lambda __response__: GetSecretResult( + data=pulumi.get(__response__, 'data'), + data_json=pulumi.get(__response__, 'data_json'), + id=pulumi.get(__response__, 'id'), + lease_duration=pulumi.get(__response__, 'lease_duration'), + lease_id=pulumi.get(__response__, 'lease_id'), + lease_renewable=pulumi.get(__response__, 'lease_renewable'), + namespace=pulumi.get(__response__, 'namespace'), + path=pulumi.get(__response__, 'path'))) diff --git a/sdk/python/pulumi_vault/kv/get_secret_subkeys_v2.py b/sdk/python/pulumi_vault/kv/get_secret_subkeys_v2.py index bb335b0cb..6f9a4e162 100644 --- a/sdk/python/pulumi_vault/kv/get_secret_subkeys_v2.py +++ b/sdk/python/pulumi_vault/kv/get_secret_subkeys_v2.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ @@ -197,9 +202,6 @@ def get_secret_subkeys_v2(depth: Optional[int] = None, namespace=pulumi.get(__ret__, 'namespace'), path=pulumi.get(__ret__, 'path'), version=pulumi.get(__ret__, 'version')) - - -@_utilities.lift_output_func(get_secret_subkeys_v2) def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] = None, mount: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, @@ -253,4 +255,21 @@ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] = :param int version: Specifies the version to return. If not set the latest version is returned. """ - ... + __args__ = dict() + __args__['depth'] = depth + __args__['mount'] = mount + __args__['name'] = name + __args__['namespace'] = namespace + __args__['version'] = version + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretSubkeysV2:getSecretSubkeysV2', __args__, opts=opts, typ=GetSecretSubkeysV2Result) + return __ret__.apply(lambda __response__: GetSecretSubkeysV2Result( + data=pulumi.get(__response__, 'data'), + data_json=pulumi.get(__response__, 'data_json'), + depth=pulumi.get(__response__, 'depth'), + id=pulumi.get(__response__, 'id'), + mount=pulumi.get(__response__, 'mount'), + name=pulumi.get(__response__, 'name'), + namespace=pulumi.get(__response__, 'namespace'), + path=pulumi.get(__response__, 'path'), + version=pulumi.get(__response__, 'version'))) diff --git a/sdk/python/pulumi_vault/kv/get_secret_v2.py b/sdk/python/pulumi_vault/kv/get_secret_v2.py index 48aec0061..39373d3f8 100644 --- a/sdk/python/pulumi_vault/kv/get_secret_v2.py +++ b/sdk/python/pulumi_vault/kv/get_secret_v2.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ @@ -241,9 +246,6 @@ def get_secret_v2(mount: Optional[str] = None, namespace=pulumi.get(__ret__, 'namespace'), path=pulumi.get(__ret__, 'path'), version=pulumi.get(__ret__, 'version')) - - -@_utilities.lift_output_func(get_secret_v2) def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, namespace: Optional[pulumi.Input[Optional[str]]] = None, @@ -293,4 +295,23 @@ def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None, *Available only for Vault Enterprise*. :param int version: Version of the secret to retrieve. """ - ... + __args__ = dict() + __args__['mount'] = mount + __args__['name'] = name + __args__['namespace'] = namespace + __args__['version'] = version + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretV2:getSecretV2', __args__, opts=opts, typ=GetSecretV2Result) + return __ret__.apply(lambda __response__: GetSecretV2Result( + created_time=pulumi.get(__response__, 'created_time'), + custom_metadata=pulumi.get(__response__, 'custom_metadata'), + data=pulumi.get(__response__, 'data'), + data_json=pulumi.get(__response__, 'data_json'), + deletion_time=pulumi.get(__response__, 'deletion_time'), + destroyed=pulumi.get(__response__, 'destroyed'), + id=pulumi.get(__response__, 'id'), + mount=pulumi.get(__response__, 'mount'), + name=pulumi.get(__response__, 'name'), + namespace=pulumi.get(__response__, 'namespace'), + path=pulumi.get(__response__, 'path'), + version=pulumi.get(__response__, 'version'))) diff --git a/sdk/python/pulumi_vault/kv/get_secrets_list.py b/sdk/python/pulumi_vault/kv/get_secrets_list.py index fac0ab4e8..10c2f6ce3 100644 --- a/sdk/python/pulumi_vault/kv/get_secrets_list.py +++ b/sdk/python/pulumi_vault/kv/get_secrets_list.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ @@ -127,9 +132,6 @@ def get_secrets_list(namespace: Optional[str] = None, names=pulumi.get(__ret__, 'names'), namespace=pulumi.get(__ret__, 'namespace'), path=pulumi.get(__ret__, 'path')) - - -@_utilities.lift_output_func(get_secrets_list) def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = None, path: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecretsListResult]: @@ -172,4 +174,13 @@ def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = N *Available only for Vault Enterprise*. :param str path: Full KV-V1 path where secrets will be listed. """ - ... + __args__ = dict() + __args__['namespace'] = namespace + __args__['path'] = path + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretsList:getSecretsList', __args__, opts=opts, typ=GetSecretsListResult) + return __ret__.apply(lambda __response__: GetSecretsListResult( + id=pulumi.get(__response__, 'id'), + names=pulumi.get(__response__, 'names'), + namespace=pulumi.get(__response__, 'namespace'), + path=pulumi.get(__response__, 'path'))) diff --git a/sdk/python/pulumi_vault/kv/get_secrets_list_v2.py b/sdk/python/pulumi_vault/kv/get_secrets_list_v2.py index 1fc93cdd1..f66a7d83f 100644 --- a/sdk/python/pulumi_vault/kv/get_secrets_list_v2.py +++ b/sdk/python/pulumi_vault/kv/get_secrets_list_v2.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ @@ -166,9 +171,6 @@ def get_secrets_list_v2(mount: Optional[str] = None, names=pulumi.get(__ret__, 'names'), namespace=pulumi.get(__ret__, 'namespace'), path=pulumi.get(__ret__, 'path')) - - -@_utilities.lift_output_func(get_secrets_list_v2) def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[Optional[str]]] = None, namespace: Optional[pulumi.Input[Optional[str]]] = None, @@ -226,4 +228,16 @@ def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None, The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace). *Available only for Vault Enterprise*. """ - ... + __args__ = dict() + __args__['mount'] = mount + __args__['name'] = name + __args__['namespace'] = namespace + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretsListV2:getSecretsListV2', __args__, opts=opts, typ=GetSecretsListV2Result) + return __ret__.apply(lambda __response__: GetSecretsListV2Result( + id=pulumi.get(__response__, 'id'), + mount=pulumi.get(__response__, 'mount'), + name=pulumi.get(__response__, 'name'), + names=pulumi.get(__response__, 'names'), + namespace=pulumi.get(__response__, 'namespace'), + path=pulumi.get(__response__, 'path'))) diff --git a/sdk/python/pulumi_vault/kv/outputs.py b/sdk/python/pulumi_vault/kv/outputs.py index 61d371663..cf0670936 100644 --- a/sdk/python/pulumi_vault/kv/outputs.py +++ b/sdk/python/pulumi_vault/kv/outputs.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ diff --git a/sdk/python/pulumi_vault/kv/secret.py b/sdk/python/pulumi_vault/kv/secret.py index 7b28fff15..abc7034bc 100644 --- a/sdk/python/pulumi_vault/kv/secret.py +++ b/sdk/python/pulumi_vault/kv/secret.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretArgs', 'Secret'] diff --git a/sdk/python/pulumi_vault/kv/secret_backend_v2.py b/sdk/python/pulumi_vault/kv/secret_backend_v2.py index 5804dae3e..357db66d7 100644 --- a/sdk/python/pulumi_vault/kv/secret_backend_v2.py +++ b/sdk/python/pulumi_vault/kv/secret_backend_v2.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretBackendV2Args', 'SecretBackendV2'] diff --git a/sdk/python/pulumi_vault/kv/secret_v2.py b/sdk/python/pulumi_vault/kv/secret_v2.py index 3aff9b704..2e33b7f58 100644 --- a/sdk/python/pulumi_vault/kv/secret_v2.py +++ b/sdk/python/pulumi_vault/kv/secret_v2.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities from . import outputs from ._inputs import * diff --git a/sdk/python/pulumi_vault/ldap/auth_backend.py b/sdk/python/pulumi_vault/ldap/auth_backend.py index d66c1bd62..c747d23a1 100644 --- a/sdk/python/pulumi_vault/ldap/auth_backend.py +++ b/sdk/python/pulumi_vault/ldap/auth_backend.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['AuthBackendArgs', 'AuthBackend'] diff --git a/sdk/python/pulumi_vault/ldap/auth_backend_group.py b/sdk/python/pulumi_vault/ldap/auth_backend_group.py index 4f25427c5..42262b823 100644 --- a/sdk/python/pulumi_vault/ldap/auth_backend_group.py +++ b/sdk/python/pulumi_vault/ldap/auth_backend_group.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['AuthBackendGroupArgs', 'AuthBackendGroup'] diff --git a/sdk/python/pulumi_vault/ldap/auth_backend_user.py b/sdk/python/pulumi_vault/ldap/auth_backend_user.py index 276a31153..ba66ed4e8 100644 --- a/sdk/python/pulumi_vault/ldap/auth_backend_user.py +++ b/sdk/python/pulumi_vault/ldap/auth_backend_user.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['AuthBackendUserArgs', 'AuthBackendUser'] diff --git a/sdk/python/pulumi_vault/ldap/get_dynamic_credentials.py b/sdk/python/pulumi_vault/ldap/get_dynamic_credentials.py index cb0c380bf..1f61d844b 100644 --- a/sdk/python/pulumi_vault/ldap/get_dynamic_credentials.py +++ b/sdk/python/pulumi_vault/ldap/get_dynamic_credentials.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ @@ -150,9 +155,6 @@ def get_dynamic_credentials(mount: Optional[str] = None, password=pulumi.get(__ret__, 'password'), role_name=pulumi.get(__ret__, 'role_name'), username=pulumi.get(__ret__, 'username')) - - -@_utilities.lift_output_func(get_dynamic_credentials) def get_dynamic_credentials_output(mount: Optional[pulumi.Input[str]] = None, namespace: Optional[pulumi.Input[Optional[str]]] = None, role_name: Optional[pulumi.Input[str]] = None, @@ -160,4 +162,20 @@ def get_dynamic_credentials_output(mount: Optional[pulumi.Input[str]] = None, """ Use this data source to access information about an existing resource. """ - ... + __args__ = dict() + __args__['mount'] = mount + __args__['namespace'] = namespace + __args__['roleName'] = role_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('vault:ldap/getDynamicCredentials:getDynamicCredentials', __args__, opts=opts, typ=GetDynamicCredentialsResult) + return __ret__.apply(lambda __response__: GetDynamicCredentialsResult( + distinguished_names=pulumi.get(__response__, 'distinguished_names'), + id=pulumi.get(__response__, 'id'), + lease_duration=pulumi.get(__response__, 'lease_duration'), + lease_id=pulumi.get(__response__, 'lease_id'), + lease_renewable=pulumi.get(__response__, 'lease_renewable'), + mount=pulumi.get(__response__, 'mount'), + namespace=pulumi.get(__response__, 'namespace'), + password=pulumi.get(__response__, 'password'), + role_name=pulumi.get(__response__, 'role_name'), + username=pulumi.get(__response__, 'username'))) diff --git a/sdk/python/pulumi_vault/ldap/get_static_credentials.py b/sdk/python/pulumi_vault/ldap/get_static_credentials.py index af634c51d..ff3e21845 100644 --- a/sdk/python/pulumi_vault/ldap/get_static_credentials.py +++ b/sdk/python/pulumi_vault/ldap/get_static_credentials.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ @@ -160,9 +165,6 @@ def get_static_credentials(mount: Optional[str] = None, rotation_period=pulumi.get(__ret__, 'rotation_period'), ttl=pulumi.get(__ret__, 'ttl'), username=pulumi.get(__ret__, 'username')) - - -@_utilities.lift_output_func(get_static_credentials) def get_static_credentials_output(mount: Optional[pulumi.Input[str]] = None, namespace: Optional[pulumi.Input[Optional[str]]] = None, role_name: Optional[pulumi.Input[str]] = None, @@ -170,4 +172,21 @@ def get_static_credentials_output(mount: Optional[pulumi.Input[str]] = None, """ Use this data source to access information about an existing resource. """ - ... + __args__ = dict() + __args__['mount'] = mount + __args__['namespace'] = namespace + __args__['roleName'] = role_name + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('vault:ldap/getStaticCredentials:getStaticCredentials', __args__, opts=opts, typ=GetStaticCredentialsResult) + return __ret__.apply(lambda __response__: GetStaticCredentialsResult( + dn=pulumi.get(__response__, 'dn'), + id=pulumi.get(__response__, 'id'), + last_password=pulumi.get(__response__, 'last_password'), + last_vault_rotation=pulumi.get(__response__, 'last_vault_rotation'), + mount=pulumi.get(__response__, 'mount'), + namespace=pulumi.get(__response__, 'namespace'), + password=pulumi.get(__response__, 'password'), + role_name=pulumi.get(__response__, 'role_name'), + rotation_period=pulumi.get(__response__, 'rotation_period'), + ttl=pulumi.get(__response__, 'ttl'), + username=pulumi.get(__response__, 'username'))) diff --git a/sdk/python/pulumi_vault/ldap/secret_backend.py b/sdk/python/pulumi_vault/ldap/secret_backend.py index 26c0a24a0..1f92c0146 100644 --- a/sdk/python/pulumi_vault/ldap/secret_backend.py +++ b/sdk/python/pulumi_vault/ldap/secret_backend.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretBackendArgs', 'SecretBackend'] diff --git a/sdk/python/pulumi_vault/ldap/secret_backend_dynamic_role.py b/sdk/python/pulumi_vault/ldap/secret_backend_dynamic_role.py index 050d13da3..39eb0aa78 100644 --- a/sdk/python/pulumi_vault/ldap/secret_backend_dynamic_role.py +++ b/sdk/python/pulumi_vault/ldap/secret_backend_dynamic_role.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretBackendDynamicRoleArgs', 'SecretBackendDynamicRole'] diff --git a/sdk/python/pulumi_vault/ldap/secret_backend_library_set.py b/sdk/python/pulumi_vault/ldap/secret_backend_library_set.py index e8aa609ef..a2e74ee0f 100644 --- a/sdk/python/pulumi_vault/ldap/secret_backend_library_set.py +++ b/sdk/python/pulumi_vault/ldap/secret_backend_library_set.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretBackendLibrarySetArgs', 'SecretBackendLibrarySet'] diff --git a/sdk/python/pulumi_vault/ldap/secret_backend_static_role.py b/sdk/python/pulumi_vault/ldap/secret_backend_static_role.py index bcfbd7c02..65a3aefb5 100644 --- a/sdk/python/pulumi_vault/ldap/secret_backend_static_role.py +++ b/sdk/python/pulumi_vault/ldap/secret_backend_static_role.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole'] diff --git a/sdk/python/pulumi_vault/managed/_inputs.py b/sdk/python/pulumi_vault/managed/_inputs.py index 86df2089c..23b8da8ad 100644 --- a/sdk/python/pulumi_vault/managed/_inputs.py +++ b/sdk/python/pulumi_vault/managed/_inputs.py @@ -4,17 +4,88 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ 'KeysAwArgs', + 'KeysAwArgsDict', 'KeysAzureArgs', + 'KeysAzureArgsDict', 'KeysPkcArgs', + 'KeysPkcArgsDict', ] +MYPY = False + +if not MYPY: + class KeysAwArgsDict(TypedDict): + access_key: pulumi.Input[str] + """ + The AWS access key to use + """ + key_bits: pulumi.Input[str] + """ + The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' + """ + key_type: pulumi.Input[str] + """ + The type of key to use + """ + kms_key: pulumi.Input[str] + """ + An identifier for the key + """ + name: pulumi.Input[str] + """ + A unique lowercase name that serves as identifying the key + """ + secret_key: pulumi.Input[str] + """ + The AWS secret key to use + """ + allow_generate_key: NotRequired[pulumi.Input[bool]] + """ + If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend + """ + allow_replace_key: NotRequired[pulumi.Input[bool]] + """ + Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists. + """ + allow_store_key: NotRequired[pulumi.Input[bool]] + """ + Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden + """ + any_mount: NotRequired[pulumi.Input[bool]] + """ + Allow usage from any mount point within the namespace if 'true' + """ + curve: NotRequired[pulumi.Input[str]] + """ + The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true + """ + endpoint: NotRequired[pulumi.Input[str]] + """ + Used to specify a custom AWS endpoint + """ + region: NotRequired[pulumi.Input[str]] + """ + The AWS region where the keys are stored (or will be stored) + """ + uuid: NotRequired[pulumi.Input[str]] + """ + ID of the managed key read from Vault + """ +elif False: + KeysAwArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class KeysAwArgs: def __init__(__self__, *, @@ -240,6 +311,71 @@ def uuid(self, value: Optional[pulumi.Input[str]]): pulumi.set(self, "uuid", value) +if not MYPY: + class KeysAzureArgsDict(TypedDict): + client_id: pulumi.Input[str] + """ + The client id for credentials to query the Azure APIs + """ + client_secret: pulumi.Input[str] + """ + The client secret for credentials to query the Azure APIs + """ + key_name: pulumi.Input[str] + """ + The Key Vault key to use for encryption and decryption + """ + key_type: pulumi.Input[str] + """ + The type of key to use + """ + name: pulumi.Input[str] + """ + A unique lowercase name that serves as identifying the key + """ + tenant_id: pulumi.Input[str] + """ + The tenant id for the Azure Active Directory organization + """ + vault_name: pulumi.Input[str] + """ + The Key Vault vault to use the encryption keys for encryption and decryption + """ + allow_generate_key: NotRequired[pulumi.Input[bool]] + """ + If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend + """ + allow_replace_key: NotRequired[pulumi.Input[bool]] + """ + Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists. + """ + allow_store_key: NotRequired[pulumi.Input[bool]] + """ + Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden + """ + any_mount: NotRequired[pulumi.Input[bool]] + """ + Allow usage from any mount point within the namespace if 'true' + """ + environment: NotRequired[pulumi.Input[str]] + """ + The Azure Cloud environment API endpoints to use + """ + key_bits: NotRequired[pulumi.Input[str]] + """ + The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true + """ + resource: NotRequired[pulumi.Input[str]] + """ + The Azure Key Vault resource's DNS Suffix to connect to + """ + uuid: NotRequired[pulumi.Input[str]] + """ + ID of the managed key read from Vault + """ +elif False: + KeysAzureArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class KeysAzureArgs: def __init__(__self__, *, @@ -480,6 +616,75 @@ def uuid(self, value: Optional[pulumi.Input[str]]): pulumi.set(self, "uuid", value) +if not MYPY: + class KeysPkcArgsDict(TypedDict): + key_id: pulumi.Input[str] + """ + The id of a PKCS#11 key to use + """ + key_label: pulumi.Input[str] + """ + The label of the key to use + """ + library: pulumi.Input[str] + """ + The name of the kms_library stanza to use from Vault's config to lookup the local library path + """ + mechanism: pulumi.Input[str] + """ + The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string. + """ + name: pulumi.Input[str] + """ + A unique lowercase name that serves as identifying the key + """ + pin: pulumi.Input[str] + """ + The PIN for login + """ + allow_generate_key: NotRequired[pulumi.Input[bool]] + """ + If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend + """ + allow_replace_key: NotRequired[pulumi.Input[bool]] + """ + Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists. + """ + allow_store_key: NotRequired[pulumi.Input[bool]] + """ + Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden + """ + any_mount: NotRequired[pulumi.Input[bool]] + """ + Allow usage from any mount point within the namespace if 'true' + """ + curve: NotRequired[pulumi.Input[str]] + """ + Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true + """ + force_rw_session: NotRequired[pulumi.Input[str]] + """ + Force all operations to open up a read-write session to the HSM + """ + key_bits: NotRequired[pulumi.Input[str]] + """ + Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true + """ + slot: NotRequired[pulumi.Input[str]] + """ + The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953') + """ + token_label: NotRequired[pulumi.Input[str]] + """ + The slot token label to use + """ + uuid: NotRequired[pulumi.Input[str]] + """ + ID of the managed key read from Vault + """ +elif False: + KeysPkcArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class KeysPkcArgs: def __init__(__self__, *, diff --git a/sdk/python/pulumi_vault/managed/keys.py b/sdk/python/pulumi_vault/managed/keys.py index 3e7d4a4de..465d54ab2 100644 --- a/sdk/python/pulumi_vault/managed/keys.py +++ b/sdk/python/pulumi_vault/managed/keys.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities from . import outputs from ._inputs import * diff --git a/sdk/python/pulumi_vault/managed/outputs.py b/sdk/python/pulumi_vault/managed/outputs.py index 5a70d21cb..09da31923 100644 --- a/sdk/python/pulumi_vault/managed/outputs.py +++ b/sdk/python/pulumi_vault/managed/outputs.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ diff --git a/sdk/python/pulumi_vault/mfa_duo.py b/sdk/python/pulumi_vault/mfa_duo.py index c6ed0aa03..d7e340f6a 100644 --- a/sdk/python/pulumi_vault/mfa_duo.py +++ b/sdk/python/pulumi_vault/mfa_duo.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from . import _utilities __all__ = ['MfaDuoArgs', 'MfaDuo'] diff --git a/sdk/python/pulumi_vault/mfa_okta.py b/sdk/python/pulumi_vault/mfa_okta.py index 3e783de77..cc75dda0d 100644 --- a/sdk/python/pulumi_vault/mfa_okta.py +++ b/sdk/python/pulumi_vault/mfa_okta.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from . import _utilities __all__ = ['MfaOktaArgs', 'MfaOkta'] diff --git a/sdk/python/pulumi_vault/mfa_pingid.py b/sdk/python/pulumi_vault/mfa_pingid.py index 14bf68a63..5c25814b5 100644 --- a/sdk/python/pulumi_vault/mfa_pingid.py +++ b/sdk/python/pulumi_vault/mfa_pingid.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from . import _utilities __all__ = ['MfaPingidArgs', 'MfaPingid'] diff --git a/sdk/python/pulumi_vault/mfa_totp.py b/sdk/python/pulumi_vault/mfa_totp.py index 03540ae93..d1611613b 100644 --- a/sdk/python/pulumi_vault/mfa_totp.py +++ b/sdk/python/pulumi_vault/mfa_totp.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from . import _utilities __all__ = ['MfaTotpArgs', 'MfaTotp'] diff --git a/sdk/python/pulumi_vault/mongodbatlas/secret_backend.py b/sdk/python/pulumi_vault/mongodbatlas/secret_backend.py index 9662e23d4..bc1ecc053 100644 --- a/sdk/python/pulumi_vault/mongodbatlas/secret_backend.py +++ b/sdk/python/pulumi_vault/mongodbatlas/secret_backend.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretBackendArgs', 'SecretBackend'] diff --git a/sdk/python/pulumi_vault/mongodbatlas/secret_role.py b/sdk/python/pulumi_vault/mongodbatlas/secret_role.py index 9bc3c7381..00380dd76 100644 --- a/sdk/python/pulumi_vault/mongodbatlas/secret_role.py +++ b/sdk/python/pulumi_vault/mongodbatlas/secret_role.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretRoleArgs', 'SecretRole'] diff --git a/sdk/python/pulumi_vault/mount.py b/sdk/python/pulumi_vault/mount.py index 70825760f..39b3a1e4e 100644 --- a/sdk/python/pulumi_vault/mount.py +++ b/sdk/python/pulumi_vault/mount.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from . import _utilities __all__ = ['MountArgs', 'Mount'] diff --git a/sdk/python/pulumi_vault/namespace.py b/sdk/python/pulumi_vault/namespace.py index e7a5b46e2..a3adecd9e 100644 --- a/sdk/python/pulumi_vault/namespace.py +++ b/sdk/python/pulumi_vault/namespace.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from . import _utilities __all__ = ['NamespaceArgs', 'Namespace'] diff --git a/sdk/python/pulumi_vault/nomad_secret_backend.py b/sdk/python/pulumi_vault/nomad_secret_backend.py index e9d5aa579..ec3956e81 100644 --- a/sdk/python/pulumi_vault/nomad_secret_backend.py +++ b/sdk/python/pulumi_vault/nomad_secret_backend.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from . import _utilities __all__ = ['NomadSecretBackendArgs', 'NomadSecretBackend'] diff --git a/sdk/python/pulumi_vault/nomad_secret_role.py b/sdk/python/pulumi_vault/nomad_secret_role.py index 1fc949def..9737bcc2f 100644 --- a/sdk/python/pulumi_vault/nomad_secret_role.py +++ b/sdk/python/pulumi_vault/nomad_secret_role.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from . import _utilities __all__ = ['NomadSecretRoleArgs', 'NomadSecretRole'] diff --git a/sdk/python/pulumi_vault/okta/_inputs.py b/sdk/python/pulumi_vault/okta/_inputs.py index 4e2400951..fad9ad780 100644 --- a/sdk/python/pulumi_vault/okta/_inputs.py +++ b/sdk/python/pulumi_vault/okta/_inputs.py @@ -4,16 +4,38 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ 'AuthBackendGroupArgs', + 'AuthBackendGroupArgsDict', 'AuthBackendUserArgs', + 'AuthBackendUserArgsDict', ] +MYPY = False + +if not MYPY: + class AuthBackendGroupArgsDict(TypedDict): + group_name: pulumi.Input[str] + """ + Name of the Okta group + """ + policies: pulumi.Input[Sequence[pulumi.Input[str]]] + """ + Policies to associate with this group + """ +elif False: + AuthBackendGroupArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class AuthBackendGroupArgs: def __init__(__self__, *, @@ -51,6 +73,23 @@ def policies(self, value: pulumi.Input[Sequence[pulumi.Input[str]]]): pulumi.set(self, "policies", value) +if not MYPY: + class AuthBackendUserArgsDict(TypedDict): + username: pulumi.Input[str] + """ + Name of the user within Okta + """ + groups: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + Groups within the Okta auth backend to associate with this user + """ + policies: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]] + """ + Policies to associate with this user + """ +elif False: + AuthBackendUserArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class AuthBackendUserArgs: def __init__(__self__, *, diff --git a/sdk/python/pulumi_vault/okta/auth_backend.py b/sdk/python/pulumi_vault/okta/auth_backend.py index 642aec4fd..1afa6e3d7 100644 --- a/sdk/python/pulumi_vault/okta/auth_backend.py +++ b/sdk/python/pulumi_vault/okta/auth_backend.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities from . import outputs from ._inputs import * diff --git a/sdk/python/pulumi_vault/okta/auth_backend_group.py b/sdk/python/pulumi_vault/okta/auth_backend_group.py index e51e9beba..3a8169efb 100644 --- a/sdk/python/pulumi_vault/okta/auth_backend_group.py +++ b/sdk/python/pulumi_vault/okta/auth_backend_group.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['AuthBackendGroupInitArgs', 'AuthBackendGroup'] diff --git a/sdk/python/pulumi_vault/okta/auth_backend_user.py b/sdk/python/pulumi_vault/okta/auth_backend_user.py index 972fff64c..863abd364 100644 --- a/sdk/python/pulumi_vault/okta/auth_backend_user.py +++ b/sdk/python/pulumi_vault/okta/auth_backend_user.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['AuthBackendUserInitArgs', 'AuthBackendUser'] diff --git a/sdk/python/pulumi_vault/okta/outputs.py b/sdk/python/pulumi_vault/okta/outputs.py index 4c44354c2..08187375d 100644 --- a/sdk/python/pulumi_vault/okta/outputs.py +++ b/sdk/python/pulumi_vault/okta/outputs.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ diff --git a/sdk/python/pulumi_vault/outputs.py b/sdk/python/pulumi_vault/outputs.py index 728246353..cde94a086 100644 --- a/sdk/python/pulumi_vault/outputs.py +++ b/sdk/python/pulumi_vault/outputs.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from . import _utilities from . import outputs diff --git a/sdk/python/pulumi_vault/password_policy.py b/sdk/python/pulumi_vault/password_policy.py index 9887cb398..e35061adc 100644 --- a/sdk/python/pulumi_vault/password_policy.py +++ b/sdk/python/pulumi_vault/password_policy.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from . import _utilities __all__ = ['PasswordPolicyArgs', 'PasswordPolicy'] diff --git a/sdk/python/pulumi_vault/pkisecret/_inputs.py b/sdk/python/pulumi_vault/pkisecret/_inputs.py index be1cde35c..7b5bef230 100644 --- a/sdk/python/pulumi_vault/pkisecret/_inputs.py +++ b/sdk/python/pulumi_vault/pkisecret/_inputs.py @@ -4,16 +4,38 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ 'BackendConfigEstAuthenticatorsArgs', + 'BackendConfigEstAuthenticatorsArgsDict', 'SecretBackendRolePolicyIdentifierArgs', + 'SecretBackendRolePolicyIdentifierArgsDict', ] +MYPY = False + +if not MYPY: + class BackendConfigEstAuthenticatorsArgsDict(TypedDict): + cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]] + """ + "The accessor (required) and cert_role (optional) properties for cert auth backends". + """ + userpass: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]] + """ + "The accessor (required) property for user pass auth backends". + """ +elif False: + BackendConfigEstAuthenticatorsArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class BackendConfigEstAuthenticatorsArgs: def __init__(__self__, *, @@ -53,6 +75,25 @@ def userpass(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]] pulumi.set(self, "userpass", value) +if not MYPY: + class SecretBackendRolePolicyIdentifierArgsDict(TypedDict): + oid: pulumi.Input[str] + """ + The OID for the policy identifier + """ + cps: NotRequired[pulumi.Input[str]] + """ + The URL of the CPS for the policy identifier + + Example usage: + """ + notice: NotRequired[pulumi.Input[str]] + """ + A notice for the policy identifier + """ +elif False: + SecretBackendRolePolicyIdentifierArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretBackendRolePolicyIdentifierArgs: def __init__(__self__, *, diff --git a/sdk/python/pulumi_vault/pkisecret/backend_config_cluster.py b/sdk/python/pulumi_vault/pkisecret/backend_config_cluster.py index 22dce5cc2..5f8e35344 100644 --- a/sdk/python/pulumi_vault/pkisecret/backend_config_cluster.py +++ b/sdk/python/pulumi_vault/pkisecret/backend_config_cluster.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['BackendConfigClusterArgs', 'BackendConfigCluster'] diff --git a/sdk/python/pulumi_vault/pkisecret/backend_config_est.py b/sdk/python/pulumi_vault/pkisecret/backend_config_est.py index 372bd3a26..ec9cc95f4 100644 --- a/sdk/python/pulumi_vault/pkisecret/backend_config_est.py +++ b/sdk/python/pulumi_vault/pkisecret/backend_config_est.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities from . import outputs from ._inputs import * diff --git a/sdk/python/pulumi_vault/pkisecret/get_backend_config_est.py b/sdk/python/pulumi_vault/pkisecret/get_backend_config_est.py index 6680c3b6e..7273d31f4 100644 --- a/sdk/python/pulumi_vault/pkisecret/get_backend_config_est.py +++ b/sdk/python/pulumi_vault/pkisecret/get_backend_config_est.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities from . import outputs @@ -202,9 +207,6 @@ def get_backend_config_est(backend: Optional[str] = None, label_to_path_policy=pulumi.get(__ret__, 'label_to_path_policy'), last_updated=pulumi.get(__ret__, 'last_updated'), namespace=pulumi.get(__ret__, 'namespace')) - - -@_utilities.lift_output_func(get_backend_config_est) def get_backend_config_est_output(backend: Optional[pulumi.Input[str]] = None, namespace: Optional[pulumi.Input[Optional[str]]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendConfigEstResult]: @@ -230,4 +232,20 @@ def get_backend_config_est_output(backend: Optional[pulumi.Input[str]] = None, The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace). *Available only for Vault Enterprise*. """ - ... + __args__ = dict() + __args__['backend'] = backend + __args__['namespace'] = namespace + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendConfigEst:getBackendConfigEst', __args__, opts=opts, typ=GetBackendConfigEstResult) + return __ret__.apply(lambda __response__: GetBackendConfigEstResult( + audit_fields=pulumi.get(__response__, 'audit_fields'), + authenticators=pulumi.get(__response__, 'authenticators'), + backend=pulumi.get(__response__, 'backend'), + default_mount=pulumi.get(__response__, 'default_mount'), + default_path_policy=pulumi.get(__response__, 'default_path_policy'), + enable_sentinel_parsing=pulumi.get(__response__, 'enable_sentinel_parsing'), + enabled=pulumi.get(__response__, 'enabled'), + id=pulumi.get(__response__, 'id'), + label_to_path_policy=pulumi.get(__response__, 'label_to_path_policy'), + last_updated=pulumi.get(__response__, 'last_updated'), + namespace=pulumi.get(__response__, 'namespace'))) diff --git a/sdk/python/pulumi_vault/pkisecret/get_backend_issuer.py b/sdk/python/pulumi_vault/pkisecret/get_backend_issuer.py index 75e67ed48..eec75aac5 100644 --- a/sdk/python/pulumi_vault/pkisecret/get_backend_issuer.py +++ b/sdk/python/pulumi_vault/pkisecret/get_backend_issuer.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ @@ -222,9 +227,6 @@ def get_backend_issuer(backend: Optional[str] = None, manual_chains=pulumi.get(__ret__, 'manual_chains'), namespace=pulumi.get(__ret__, 'namespace'), usage=pulumi.get(__ret__, 'usage')) - - -@_utilities.lift_output_func(get_backend_issuer) def get_backend_issuer_output(backend: Optional[pulumi.Input[str]] = None, issuer_ref: Optional[pulumi.Input[str]] = None, namespace: Optional[pulumi.Input[Optional[str]]] = None, @@ -259,4 +261,22 @@ def get_backend_issuer_output(backend: Optional[pulumi.Input[str]] = None, The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace). *Available only for Vault Enterprise*. """ - ... + __args__ = dict() + __args__['backend'] = backend + __args__['issuerRef'] = issuer_ref + __args__['namespace'] = namespace + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendIssuer:getBackendIssuer', __args__, opts=opts, typ=GetBackendIssuerResult) + return __ret__.apply(lambda __response__: GetBackendIssuerResult( + backend=pulumi.get(__response__, 'backend'), + ca_chains=pulumi.get(__response__, 'ca_chains'), + certificate=pulumi.get(__response__, 'certificate'), + id=pulumi.get(__response__, 'id'), + issuer_id=pulumi.get(__response__, 'issuer_id'), + issuer_name=pulumi.get(__response__, 'issuer_name'), + issuer_ref=pulumi.get(__response__, 'issuer_ref'), + key_id=pulumi.get(__response__, 'key_id'), + leaf_not_after_behavior=pulumi.get(__response__, 'leaf_not_after_behavior'), + manual_chains=pulumi.get(__response__, 'manual_chains'), + namespace=pulumi.get(__response__, 'namespace'), + usage=pulumi.get(__response__, 'usage'))) diff --git a/sdk/python/pulumi_vault/pkisecret/get_backend_issuers.py b/sdk/python/pulumi_vault/pkisecret/get_backend_issuers.py index 330ab1415..1b9553f23 100644 --- a/sdk/python/pulumi_vault/pkisecret/get_backend_issuers.py +++ b/sdk/python/pulumi_vault/pkisecret/get_backend_issuers.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ @@ -142,9 +147,6 @@ def get_backend_issuers(backend: Optional[str] = None, key_info_json=pulumi.get(__ret__, 'key_info_json'), keys=pulumi.get(__ret__, 'keys'), namespace=pulumi.get(__ret__, 'namespace')) - - -@_utilities.lift_output_func(get_backend_issuers) def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None, namespace: Optional[pulumi.Input[Optional[str]]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendIssuersResult]: @@ -176,4 +178,15 @@ def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None, The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace). *Available only for Vault Enterprise*. """ - ... + __args__ = dict() + __args__['backend'] = backend + __args__['namespace'] = namespace + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendIssuers:getBackendIssuers', __args__, opts=opts, typ=GetBackendIssuersResult) + return __ret__.apply(lambda __response__: GetBackendIssuersResult( + backend=pulumi.get(__response__, 'backend'), + id=pulumi.get(__response__, 'id'), + key_info=pulumi.get(__response__, 'key_info'), + key_info_json=pulumi.get(__response__, 'key_info_json'), + keys=pulumi.get(__response__, 'keys'), + namespace=pulumi.get(__response__, 'namespace'))) diff --git a/sdk/python/pulumi_vault/pkisecret/get_backend_key.py b/sdk/python/pulumi_vault/pkisecret/get_backend_key.py index 541405787..2002e6cd7 100644 --- a/sdk/python/pulumi_vault/pkisecret/get_backend_key.py +++ b/sdk/python/pulumi_vault/pkisecret/get_backend_key.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ @@ -156,9 +161,6 @@ def get_backend_key(backend: Optional[str] = None, key_ref=pulumi.get(__ret__, 'key_ref'), key_type=pulumi.get(__ret__, 'key_type'), namespace=pulumi.get(__ret__, 'namespace')) - - -@_utilities.lift_output_func(get_backend_key) def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None, key_ref: Optional[pulumi.Input[str]] = None, namespace: Optional[pulumi.Input[Optional[str]]] = None, @@ -193,4 +195,17 @@ def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None, The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace). *Available only for Vault Enterprise*. """ - ... + __args__ = dict() + __args__['backend'] = backend + __args__['keyRef'] = key_ref + __args__['namespace'] = namespace + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendKey:getBackendKey', __args__, opts=opts, typ=GetBackendKeyResult) + return __ret__.apply(lambda __response__: GetBackendKeyResult( + backend=pulumi.get(__response__, 'backend'), + id=pulumi.get(__response__, 'id'), + key_id=pulumi.get(__response__, 'key_id'), + key_name=pulumi.get(__response__, 'key_name'), + key_ref=pulumi.get(__response__, 'key_ref'), + key_type=pulumi.get(__response__, 'key_type'), + namespace=pulumi.get(__response__, 'namespace'))) diff --git a/sdk/python/pulumi_vault/pkisecret/get_backend_keys.py b/sdk/python/pulumi_vault/pkisecret/get_backend_keys.py index c56577b2d..083f67c7f 100644 --- a/sdk/python/pulumi_vault/pkisecret/get_backend_keys.py +++ b/sdk/python/pulumi_vault/pkisecret/get_backend_keys.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ @@ -142,9 +147,6 @@ def get_backend_keys(backend: Optional[str] = None, key_info_json=pulumi.get(__ret__, 'key_info_json'), keys=pulumi.get(__ret__, 'keys'), namespace=pulumi.get(__ret__, 'namespace')) - - -@_utilities.lift_output_func(get_backend_keys) def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None, namespace: Optional[pulumi.Input[Optional[str]]] = None, opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendKeysResult]: @@ -176,4 +178,15 @@ def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None, The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace). *Available only for Vault Enterprise*. """ - ... + __args__ = dict() + __args__['backend'] = backend + __args__['namespace'] = namespace + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendKeys:getBackendKeys', __args__, opts=opts, typ=GetBackendKeysResult) + return __ret__.apply(lambda __response__: GetBackendKeysResult( + backend=pulumi.get(__response__, 'backend'), + id=pulumi.get(__response__, 'id'), + key_info=pulumi.get(__response__, 'key_info'), + key_info_json=pulumi.get(__response__, 'key_info_json'), + keys=pulumi.get(__response__, 'keys'), + namespace=pulumi.get(__response__, 'namespace'))) diff --git a/sdk/python/pulumi_vault/pkisecret/outputs.py b/sdk/python/pulumi_vault/pkisecret/outputs.py index e674012e3..617b8d211 100644 --- a/sdk/python/pulumi_vault/pkisecret/outputs.py +++ b/sdk/python/pulumi_vault/pkisecret/outputs.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ diff --git a/sdk/python/pulumi_vault/pkisecret/secret_backend_cert.py b/sdk/python/pulumi_vault/pkisecret/secret_backend_cert.py index f131ad0f0..8a4382bb9 100644 --- a/sdk/python/pulumi_vault/pkisecret/secret_backend_cert.py +++ b/sdk/python/pulumi_vault/pkisecret/secret_backend_cert.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretBackendCertArgs', 'SecretBackendCert'] diff --git a/sdk/python/pulumi_vault/pkisecret/secret_backend_config_ca.py b/sdk/python/pulumi_vault/pkisecret/secret_backend_config_ca.py index 689818838..7a376b4c8 100644 --- a/sdk/python/pulumi_vault/pkisecret/secret_backend_config_ca.py +++ b/sdk/python/pulumi_vault/pkisecret/secret_backend_config_ca.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretBackendConfigCaArgs', 'SecretBackendConfigCa'] diff --git a/sdk/python/pulumi_vault/pkisecret/secret_backend_config_issuers.py b/sdk/python/pulumi_vault/pkisecret/secret_backend_config_issuers.py index 501274605..e617668f2 100644 --- a/sdk/python/pulumi_vault/pkisecret/secret_backend_config_issuers.py +++ b/sdk/python/pulumi_vault/pkisecret/secret_backend_config_issuers.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretBackendConfigIssuersArgs', 'SecretBackendConfigIssuers'] diff --git a/sdk/python/pulumi_vault/pkisecret/secret_backend_config_urls.py b/sdk/python/pulumi_vault/pkisecret/secret_backend_config_urls.py index 23f6ffd2e..418c8c2fe 100644 --- a/sdk/python/pulumi_vault/pkisecret/secret_backend_config_urls.py +++ b/sdk/python/pulumi_vault/pkisecret/secret_backend_config_urls.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretBackendConfigUrlsArgs', 'SecretBackendConfigUrls'] diff --git a/sdk/python/pulumi_vault/pkisecret/secret_backend_crl_config.py b/sdk/python/pulumi_vault/pkisecret/secret_backend_crl_config.py index 24f0f15a5..d0c0b0246 100644 --- a/sdk/python/pulumi_vault/pkisecret/secret_backend_crl_config.py +++ b/sdk/python/pulumi_vault/pkisecret/secret_backend_crl_config.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretBackendCrlConfigArgs', 'SecretBackendCrlConfig'] diff --git a/sdk/python/pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py b/sdk/python/pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py index 023303fd7..a5eaef75c 100644 --- a/sdk/python/pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +++ b/sdk/python/pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretBackendIntermediateCertRequestArgs', 'SecretBackendIntermediateCertRequest'] diff --git a/sdk/python/pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py b/sdk/python/pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py index 2f355a428..52b9a5bbc 100644 --- a/sdk/python/pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +++ b/sdk/python/pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretBackendIntermediateSetSignedArgs', 'SecretBackendIntermediateSetSigned'] diff --git a/sdk/python/pulumi_vault/pkisecret/secret_backend_issuer.py b/sdk/python/pulumi_vault/pkisecret/secret_backend_issuer.py index 1ad1fc9a6..40c88b74f 100644 --- a/sdk/python/pulumi_vault/pkisecret/secret_backend_issuer.py +++ b/sdk/python/pulumi_vault/pkisecret/secret_backend_issuer.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretBackendIssuerArgs', 'SecretBackendIssuer'] diff --git a/sdk/python/pulumi_vault/pkisecret/secret_backend_key.py b/sdk/python/pulumi_vault/pkisecret/secret_backend_key.py index 1ef4a5f11..425ed215b 100644 --- a/sdk/python/pulumi_vault/pkisecret/secret_backend_key.py +++ b/sdk/python/pulumi_vault/pkisecret/secret_backend_key.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretBackendKeyArgs', 'SecretBackendKey'] diff --git a/sdk/python/pulumi_vault/pkisecret/secret_backend_role.py b/sdk/python/pulumi_vault/pkisecret/secret_backend_role.py index a2d308f7a..b4cdbaad4 100644 --- a/sdk/python/pulumi_vault/pkisecret/secret_backend_role.py +++ b/sdk/python/pulumi_vault/pkisecret/secret_backend_role.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities from . import outputs from ._inputs import * diff --git a/sdk/python/pulumi_vault/pkisecret/secret_backend_root_cert.py b/sdk/python/pulumi_vault/pkisecret/secret_backend_root_cert.py index f7f94bc3e..b065a4191 100644 --- a/sdk/python/pulumi_vault/pkisecret/secret_backend_root_cert.py +++ b/sdk/python/pulumi_vault/pkisecret/secret_backend_root_cert.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretBackendRootCertArgs', 'SecretBackendRootCert'] diff --git a/sdk/python/pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py b/sdk/python/pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py index 14012bb9d..cc3f99dce 100644 --- a/sdk/python/pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +++ b/sdk/python/pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretBackendRootSignIntermediateArgs', 'SecretBackendRootSignIntermediate'] diff --git a/sdk/python/pulumi_vault/pkisecret/secret_backend_sign.py b/sdk/python/pulumi_vault/pkisecret/secret_backend_sign.py index 2d319ab4f..f6240113b 100644 --- a/sdk/python/pulumi_vault/pkisecret/secret_backend_sign.py +++ b/sdk/python/pulumi_vault/pkisecret/secret_backend_sign.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretBackendSignArgs', 'SecretBackendSign'] diff --git a/sdk/python/pulumi_vault/plugin.py b/sdk/python/pulumi_vault/plugin.py index 59594461a..a400d2fbe 100644 --- a/sdk/python/pulumi_vault/plugin.py +++ b/sdk/python/pulumi_vault/plugin.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from . import _utilities __all__ = ['PluginArgs', 'Plugin'] diff --git a/sdk/python/pulumi_vault/plugin_pinned_version.py b/sdk/python/pulumi_vault/plugin_pinned_version.py index 76577ecff..e9a31b69f 100644 --- a/sdk/python/pulumi_vault/plugin_pinned_version.py +++ b/sdk/python/pulumi_vault/plugin_pinned_version.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from . import _utilities __all__ = ['PluginPinnedVersionArgs', 'PluginPinnedVersion'] diff --git a/sdk/python/pulumi_vault/policy.py b/sdk/python/pulumi_vault/policy.py index 8998f702e..47eb73db7 100644 --- a/sdk/python/pulumi_vault/policy.py +++ b/sdk/python/pulumi_vault/policy.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from . import _utilities __all__ = ['PolicyArgs', 'Policy'] diff --git a/sdk/python/pulumi_vault/provider.py b/sdk/python/pulumi_vault/provider.py index 020af3bcf..21799d345 100644 --- a/sdk/python/pulumi_vault/provider.py +++ b/sdk/python/pulumi_vault/provider.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from . import _utilities from ._inputs import * diff --git a/sdk/python/pulumi_vault/quota_lease_count.py b/sdk/python/pulumi_vault/quota_lease_count.py index 5932dc207..3b76a0538 100644 --- a/sdk/python/pulumi_vault/quota_lease_count.py +++ b/sdk/python/pulumi_vault/quota_lease_count.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from . import _utilities __all__ = ['QuotaLeaseCountArgs', 'QuotaLeaseCount'] diff --git a/sdk/python/pulumi_vault/quota_rate_limit.py b/sdk/python/pulumi_vault/quota_rate_limit.py index 26839a1a6..19f9a36cf 100644 --- a/sdk/python/pulumi_vault/quota_rate_limit.py +++ b/sdk/python/pulumi_vault/quota_rate_limit.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from . import _utilities __all__ = ['QuotaRateLimitArgs', 'QuotaRateLimit'] diff --git a/sdk/python/pulumi_vault/rabbitmq/_inputs.py b/sdk/python/pulumi_vault/rabbitmq/_inputs.py index e1fe324ba..ba167a419 100644 --- a/sdk/python/pulumi_vault/rabbitmq/_inputs.py +++ b/sdk/python/pulumi_vault/rabbitmq/_inputs.py @@ -4,17 +4,48 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ 'SecretBackendRoleVhostArgs', + 'SecretBackendRoleVhostArgsDict', 'SecretBackendRoleVhostTopicArgs', + 'SecretBackendRoleVhostTopicArgsDict', 'SecretBackendRoleVhostTopicVhostArgs', + 'SecretBackendRoleVhostTopicVhostArgsDict', ] +MYPY = False + +if not MYPY: + class SecretBackendRoleVhostArgsDict(TypedDict): + configure: pulumi.Input[str] + """ + The configure permissions for this vhost. + """ + host: pulumi.Input[str] + """ + The vhost to set permissions for. + """ + read: pulumi.Input[str] + """ + The read permissions for this vhost. + """ + write: pulumi.Input[str] + """ + The write permissions for this vhost. + """ +elif False: + SecretBackendRoleVhostArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretBackendRoleVhostArgs: def __init__(__self__, *, @@ -82,6 +113,19 @@ def write(self, value: pulumi.Input[str]): pulumi.set(self, "write", value) +if not MYPY: + class SecretBackendRoleVhostTopicArgsDict(TypedDict): + host: pulumi.Input[str] + """ + The vhost to set permissions for. + """ + vhosts: NotRequired[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicVhostArgsDict']]]] + """ + Specifies a map of virtual hosts to permissions. + """ +elif False: + SecretBackendRoleVhostTopicArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretBackendRoleVhostTopicArgs: def __init__(__self__, *, @@ -120,6 +164,23 @@ def vhosts(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBacke pulumi.set(self, "vhosts", value) +if not MYPY: + class SecretBackendRoleVhostTopicVhostArgsDict(TypedDict): + read: pulumi.Input[str] + """ + The read permissions for this vhost. + """ + topic: pulumi.Input[str] + """ + The vhost to set permissions for. + """ + write: pulumi.Input[str] + """ + The write permissions for this vhost. + """ +elif False: + SecretBackendRoleVhostTopicVhostArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretBackendRoleVhostTopicVhostArgs: def __init__(__self__, *, diff --git a/sdk/python/pulumi_vault/rabbitmq/outputs.py b/sdk/python/pulumi_vault/rabbitmq/outputs.py index d2dc6d4f4..eebdcbd73 100644 --- a/sdk/python/pulumi_vault/rabbitmq/outputs.py +++ b/sdk/python/pulumi_vault/rabbitmq/outputs.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities from . import outputs diff --git a/sdk/python/pulumi_vault/rabbitmq/secret_backend.py b/sdk/python/pulumi_vault/rabbitmq/secret_backend.py index 7ce709709..6018e336e 100644 --- a/sdk/python/pulumi_vault/rabbitmq/secret_backend.py +++ b/sdk/python/pulumi_vault/rabbitmq/secret_backend.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretBackendArgs', 'SecretBackend'] diff --git a/sdk/python/pulumi_vault/rabbitmq/secret_backend_role.py b/sdk/python/pulumi_vault/rabbitmq/secret_backend_role.py index 68ce5308b..3b831c406 100644 --- a/sdk/python/pulumi_vault/rabbitmq/secret_backend_role.py +++ b/sdk/python/pulumi_vault/rabbitmq/secret_backend_role.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities from . import outputs from ._inputs import * diff --git a/sdk/python/pulumi_vault/raft_autopilot.py b/sdk/python/pulumi_vault/raft_autopilot.py index ff43a0a38..684cb9ae4 100644 --- a/sdk/python/pulumi_vault/raft_autopilot.py +++ b/sdk/python/pulumi_vault/raft_autopilot.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from . import _utilities __all__ = ['RaftAutopilotArgs', 'RaftAutopilot'] diff --git a/sdk/python/pulumi_vault/raft_snapshot_agent_config.py b/sdk/python/pulumi_vault/raft_snapshot_agent_config.py index 059496673..c51400443 100644 --- a/sdk/python/pulumi_vault/raft_snapshot_agent_config.py +++ b/sdk/python/pulumi_vault/raft_snapshot_agent_config.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from . import _utilities __all__ = ['RaftSnapshotAgentConfigArgs', 'RaftSnapshotAgentConfig'] diff --git a/sdk/python/pulumi_vault/rgp_policy.py b/sdk/python/pulumi_vault/rgp_policy.py index 22c472e6a..2020e7def 100644 --- a/sdk/python/pulumi_vault/rgp_policy.py +++ b/sdk/python/pulumi_vault/rgp_policy.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from . import _utilities __all__ = ['RgpPolicyArgs', 'RgpPolicy'] diff --git a/sdk/python/pulumi_vault/saml/auth_backend.py b/sdk/python/pulumi_vault/saml/auth_backend.py index 5cecb0e24..29c2780d5 100644 --- a/sdk/python/pulumi_vault/saml/auth_backend.py +++ b/sdk/python/pulumi_vault/saml/auth_backend.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['AuthBackendArgs', 'AuthBackend'] diff --git a/sdk/python/pulumi_vault/saml/auth_backend_role.py b/sdk/python/pulumi_vault/saml/auth_backend_role.py index 1c75bba51..9bf017195 100644 --- a/sdk/python/pulumi_vault/saml/auth_backend_role.py +++ b/sdk/python/pulumi_vault/saml/auth_backend_role.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole'] diff --git a/sdk/python/pulumi_vault/secrets/_inputs.py b/sdk/python/pulumi_vault/secrets/_inputs.py index d0a59f8c3..e3862d841 100644 --- a/sdk/python/pulumi_vault/secrets/_inputs.py +++ b/sdk/python/pulumi_vault/secrets/_inputs.py @@ -4,15 +4,45 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ 'SyncAssociationMetadataArgs', + 'SyncAssociationMetadataArgsDict', ] +MYPY = False + +if not MYPY: + class SyncAssociationMetadataArgsDict(TypedDict): + sub_key: NotRequired[pulumi.Input[str]] + """ + Subkey of the associated secret. + """ + sync_status: NotRequired[pulumi.Input[str]] + """ + A map of sync statuses for each subkey of the associated secret + (for ex. `{kv_624bea/aws-token/dev: "SYNCED", kv_624bea/aws-token/prod: "SYNCED"}`). + """ + updated_at: NotRequired[pulumi.Input[str]] + """ + A map of duration strings specifying when each subkey of the associated + secret was last updated. + (for ex. + `{kv_624bea/aws-token/dev: "2024-03-21T12:42:02.558533-07:00", + kv_624bea/aws-token/prod: "2024-03-21T12:42:02.558533-07:00"}`). + """ +elif False: + SyncAssociationMetadataArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SyncAssociationMetadataArgs: def __init__(__self__, *, diff --git a/sdk/python/pulumi_vault/secrets/outputs.py b/sdk/python/pulumi_vault/secrets/outputs.py index e659e9910..5553a01f0 100644 --- a/sdk/python/pulumi_vault/secrets/outputs.py +++ b/sdk/python/pulumi_vault/secrets/outputs.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ diff --git a/sdk/python/pulumi_vault/secrets/sync_association.py b/sdk/python/pulumi_vault/secrets/sync_association.py index a54ec9a4b..25a86a5bd 100644 --- a/sdk/python/pulumi_vault/secrets/sync_association.py +++ b/sdk/python/pulumi_vault/secrets/sync_association.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities from . import outputs from ._inputs import * diff --git a/sdk/python/pulumi_vault/secrets/sync_aws_destination.py b/sdk/python/pulumi_vault/secrets/sync_aws_destination.py index b3932cebb..daf102cf5 100644 --- a/sdk/python/pulumi_vault/secrets/sync_aws_destination.py +++ b/sdk/python/pulumi_vault/secrets/sync_aws_destination.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SyncAwsDestinationArgs', 'SyncAwsDestination'] diff --git a/sdk/python/pulumi_vault/secrets/sync_azure_destination.py b/sdk/python/pulumi_vault/secrets/sync_azure_destination.py index f2a7a1b59..c5cf4500e 100644 --- a/sdk/python/pulumi_vault/secrets/sync_azure_destination.py +++ b/sdk/python/pulumi_vault/secrets/sync_azure_destination.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SyncAzureDestinationArgs', 'SyncAzureDestination'] diff --git a/sdk/python/pulumi_vault/secrets/sync_config.py b/sdk/python/pulumi_vault/secrets/sync_config.py index 79d4c9404..816835b58 100644 --- a/sdk/python/pulumi_vault/secrets/sync_config.py +++ b/sdk/python/pulumi_vault/secrets/sync_config.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SyncConfigArgs', 'SyncConfig'] diff --git a/sdk/python/pulumi_vault/secrets/sync_gcp_destination.py b/sdk/python/pulumi_vault/secrets/sync_gcp_destination.py index cc2aa025e..3809415fa 100644 --- a/sdk/python/pulumi_vault/secrets/sync_gcp_destination.py +++ b/sdk/python/pulumi_vault/secrets/sync_gcp_destination.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SyncGcpDestinationArgs', 'SyncGcpDestination'] diff --git a/sdk/python/pulumi_vault/secrets/sync_gh_destination.py b/sdk/python/pulumi_vault/secrets/sync_gh_destination.py index 72d5005d7..8ea83164f 100644 --- a/sdk/python/pulumi_vault/secrets/sync_gh_destination.py +++ b/sdk/python/pulumi_vault/secrets/sync_gh_destination.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SyncGhDestinationArgs', 'SyncGhDestination'] diff --git a/sdk/python/pulumi_vault/secrets/sync_github_apps.py b/sdk/python/pulumi_vault/secrets/sync_github_apps.py index cd7816adf..bfbb7468b 100644 --- a/sdk/python/pulumi_vault/secrets/sync_github_apps.py +++ b/sdk/python/pulumi_vault/secrets/sync_github_apps.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SyncGithubAppsArgs', 'SyncGithubApps'] diff --git a/sdk/python/pulumi_vault/secrets/sync_vercel_destination.py b/sdk/python/pulumi_vault/secrets/sync_vercel_destination.py index 86d5426ed..889a41756 100644 --- a/sdk/python/pulumi_vault/secrets/sync_vercel_destination.py +++ b/sdk/python/pulumi_vault/secrets/sync_vercel_destination.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SyncVercelDestinationArgs', 'SyncVercelDestination'] diff --git a/sdk/python/pulumi_vault/ssh/_inputs.py b/sdk/python/pulumi_vault/ssh/_inputs.py index bbd9f9a41..4644a8de2 100644 --- a/sdk/python/pulumi_vault/ssh/_inputs.py +++ b/sdk/python/pulumi_vault/ssh/_inputs.py @@ -4,15 +4,37 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ 'SecretBackendRoleAllowedUserKeyConfigArgs', + 'SecretBackendRoleAllowedUserKeyConfigArgsDict', ] +MYPY = False + +if not MYPY: + class SecretBackendRoleAllowedUserKeyConfigArgsDict(TypedDict): + lengths: pulumi.Input[Sequence[pulumi.Input[int]]] + """ + List of allowed key lengths, vault-1.10 and above + """ + type: pulumi.Input[str] + """ + Key type, choices: + rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521 + """ +elif False: + SecretBackendRoleAllowedUserKeyConfigArgsDict: TypeAlias = Mapping[str, Any] + @pulumi.input_type class SecretBackendRoleAllowedUserKeyConfigArgs: def __init__(__self__, *, diff --git a/sdk/python/pulumi_vault/ssh/outputs.py b/sdk/python/pulumi_vault/ssh/outputs.py index b1a587b41..f83df816e 100644 --- a/sdk/python/pulumi_vault/ssh/outputs.py +++ b/sdk/python/pulumi_vault/ssh/outputs.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ diff --git a/sdk/python/pulumi_vault/ssh/secret_backend_ca.py b/sdk/python/pulumi_vault/ssh/secret_backend_ca.py index 484d5c9b9..d38387d60 100644 --- a/sdk/python/pulumi_vault/ssh/secret_backend_ca.py +++ b/sdk/python/pulumi_vault/ssh/secret_backend_ca.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretBackendCaArgs', 'SecretBackendCa'] diff --git a/sdk/python/pulumi_vault/ssh/secret_backend_role.py b/sdk/python/pulumi_vault/ssh/secret_backend_role.py index 73e14b723..2c59416d5 100644 --- a/sdk/python/pulumi_vault/ssh/secret_backend_role.py +++ b/sdk/python/pulumi_vault/ssh/secret_backend_role.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities from . import outputs from ._inputs import * diff --git a/sdk/python/pulumi_vault/terraformcloud/secret_backend.py b/sdk/python/pulumi_vault/terraformcloud/secret_backend.py index a476a5ac9..4f1f99dcc 100644 --- a/sdk/python/pulumi_vault/terraformcloud/secret_backend.py +++ b/sdk/python/pulumi_vault/terraformcloud/secret_backend.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretBackendArgs', 'SecretBackend'] diff --git a/sdk/python/pulumi_vault/terraformcloud/secret_creds.py b/sdk/python/pulumi_vault/terraformcloud/secret_creds.py index 90b493323..d953203c3 100644 --- a/sdk/python/pulumi_vault/terraformcloud/secret_creds.py +++ b/sdk/python/pulumi_vault/terraformcloud/secret_creds.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretCredsArgs', 'SecretCreds'] diff --git a/sdk/python/pulumi_vault/terraformcloud/secret_role.py b/sdk/python/pulumi_vault/terraformcloud/secret_role.py index e7549fa4c..a919577eb 100644 --- a/sdk/python/pulumi_vault/terraformcloud/secret_role.py +++ b/sdk/python/pulumi_vault/terraformcloud/secret_role.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretRoleArgs', 'SecretRole'] diff --git a/sdk/python/pulumi_vault/token.py b/sdk/python/pulumi_vault/token.py index 1a52b19f6..4b2a6f72f 100644 --- a/sdk/python/pulumi_vault/token.py +++ b/sdk/python/pulumi_vault/token.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from . import _utilities __all__ = ['TokenArgs', 'Token'] diff --git a/sdk/python/pulumi_vault/tokenauth/auth_backend_role.py b/sdk/python/pulumi_vault/tokenauth/auth_backend_role.py index f16288492..48edcc086 100644 --- a/sdk/python/pulumi_vault/tokenauth/auth_backend_role.py +++ b/sdk/python/pulumi_vault/tokenauth/auth_backend_role.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole'] diff --git a/sdk/python/pulumi_vault/transform/alphabet.py b/sdk/python/pulumi_vault/transform/alphabet.py index 3e58ce7c8..7b0165533 100644 --- a/sdk/python/pulumi_vault/transform/alphabet.py +++ b/sdk/python/pulumi_vault/transform/alphabet.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['AlphabetArgs', 'Alphabet'] diff --git a/sdk/python/pulumi_vault/transform/get_decode.py b/sdk/python/pulumi_vault/transform/get_decode.py index 8a80a3427..dcc969581 100644 --- a/sdk/python/pulumi_vault/transform/get_decode.py +++ b/sdk/python/pulumi_vault/transform/get_decode.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ @@ -203,9 +208,6 @@ def get_decode(batch_inputs: Optional[Sequence[Mapping[str, str]]] = None, transformation=pulumi.get(__ret__, 'transformation'), tweak=pulumi.get(__ret__, 'tweak'), value=pulumi.get(__ret__, 'value')) - - -@_utilities.lift_output_func(get_decode) def get_decode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapping[str, str]]]]] = None, batch_results: Optional[pulumi.Input[Optional[Sequence[Mapping[str, str]]]]] = None, decoded_value: Optional[pulumi.Input[Optional[str]]] = None, @@ -260,4 +262,26 @@ def get_decode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp :param str tweak: The tweak value to use. Only applicable for FPE transformations :param str value: The value in which to decode. """ - ... + __args__ = dict() + __args__['batchInputs'] = batch_inputs + __args__['batchResults'] = batch_results + __args__['decodedValue'] = decoded_value + __args__['namespace'] = namespace + __args__['path'] = path + __args__['roleName'] = role_name + __args__['transformation'] = transformation + __args__['tweak'] = tweak + __args__['value'] = value + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('vault:transform/getDecode:getDecode', __args__, opts=opts, typ=GetDecodeResult) + return __ret__.apply(lambda __response__: GetDecodeResult( + batch_inputs=pulumi.get(__response__, 'batch_inputs'), + batch_results=pulumi.get(__response__, 'batch_results'), + decoded_value=pulumi.get(__response__, 'decoded_value'), + id=pulumi.get(__response__, 'id'), + namespace=pulumi.get(__response__, 'namespace'), + path=pulumi.get(__response__, 'path'), + role_name=pulumi.get(__response__, 'role_name'), + transformation=pulumi.get(__response__, 'transformation'), + tweak=pulumi.get(__response__, 'tweak'), + value=pulumi.get(__response__, 'value'))) diff --git a/sdk/python/pulumi_vault/transform/get_encode.py b/sdk/python/pulumi_vault/transform/get_encode.py index ea68adac4..88fc264c3 100644 --- a/sdk/python/pulumi_vault/transform/get_encode.py +++ b/sdk/python/pulumi_vault/transform/get_encode.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ @@ -205,9 +210,6 @@ def get_encode(batch_inputs: Optional[Sequence[Mapping[str, str]]] = None, transformation=pulumi.get(__ret__, 'transformation'), tweak=pulumi.get(__ret__, 'tweak'), value=pulumi.get(__ret__, 'value')) - - -@_utilities.lift_output_func(get_encode) def get_encode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapping[str, str]]]]] = None, batch_results: Optional[pulumi.Input[Optional[Sequence[Mapping[str, str]]]]] = None, encoded_value: Optional[pulumi.Input[Optional[str]]] = None, @@ -264,4 +266,26 @@ def get_encode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp :param str tweak: The tweak value to use. Only applicable for FPE transformations :param str value: The value in which to encode. """ - ... + __args__ = dict() + __args__['batchInputs'] = batch_inputs + __args__['batchResults'] = batch_results + __args__['encodedValue'] = encoded_value + __args__['namespace'] = namespace + __args__['path'] = path + __args__['roleName'] = role_name + __args__['transformation'] = transformation + __args__['tweak'] = tweak + __args__['value'] = value + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('vault:transform/getEncode:getEncode', __args__, opts=opts, typ=GetEncodeResult) + return __ret__.apply(lambda __response__: GetEncodeResult( + batch_inputs=pulumi.get(__response__, 'batch_inputs'), + batch_results=pulumi.get(__response__, 'batch_results'), + encoded_value=pulumi.get(__response__, 'encoded_value'), + id=pulumi.get(__response__, 'id'), + namespace=pulumi.get(__response__, 'namespace'), + path=pulumi.get(__response__, 'path'), + role_name=pulumi.get(__response__, 'role_name'), + transformation=pulumi.get(__response__, 'transformation'), + tweak=pulumi.get(__response__, 'tweak'), + value=pulumi.get(__response__, 'value'))) diff --git a/sdk/python/pulumi_vault/transform/role.py b/sdk/python/pulumi_vault/transform/role.py index 4abbdc48b..1385316a9 100644 --- a/sdk/python/pulumi_vault/transform/role.py +++ b/sdk/python/pulumi_vault/transform/role.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['RoleArgs', 'Role'] diff --git a/sdk/python/pulumi_vault/transform/template.py b/sdk/python/pulumi_vault/transform/template.py index f7160d90a..82e856466 100644 --- a/sdk/python/pulumi_vault/transform/template.py +++ b/sdk/python/pulumi_vault/transform/template.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['TemplateArgs', 'Template'] diff --git a/sdk/python/pulumi_vault/transform/transformation.py b/sdk/python/pulumi_vault/transform/transformation.py index 8c669f561..2c5bc68ed 100644 --- a/sdk/python/pulumi_vault/transform/transformation.py +++ b/sdk/python/pulumi_vault/transform/transformation.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['TransformationArgs', 'Transformation'] diff --git a/sdk/python/pulumi_vault/transit/get_decrypt.py b/sdk/python/pulumi_vault/transit/get_decrypt.py index ceb46f6db..39e1ea11f 100644 --- a/sdk/python/pulumi_vault/transit/get_decrypt.py +++ b/sdk/python/pulumi_vault/transit/get_decrypt.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ @@ -138,9 +143,6 @@ def get_decrypt(backend: Optional[str] = None, key=pulumi.get(__ret__, 'key'), namespace=pulumi.get(__ret__, 'namespace'), plaintext=pulumi.get(__ret__, 'plaintext')) - - -@_utilities.lift_output_func(get_decrypt) def get_decrypt_output(backend: Optional[pulumi.Input[str]] = None, ciphertext: Optional[pulumi.Input[str]] = None, context: Optional[pulumi.Input[Optional[str]]] = None, @@ -161,4 +163,19 @@ def get_decrypt_output(backend: Optional[pulumi.Input[str]] = None, ciphertext="vault:v1:S3GtnJ5GUNCWV+/pdL9+g1Feu/nzAv+RlmTmE91Tu0rBkeIU8MEb2nSspC/1IQ==") ``` """ - ... + __args__ = dict() + __args__['backend'] = backend + __args__['ciphertext'] = ciphertext + __args__['context'] = context + __args__['key'] = key + __args__['namespace'] = namespace + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('vault:transit/getDecrypt:getDecrypt', __args__, opts=opts, typ=GetDecryptResult) + return __ret__.apply(lambda __response__: GetDecryptResult( + backend=pulumi.get(__response__, 'backend'), + ciphertext=pulumi.get(__response__, 'ciphertext'), + context=pulumi.get(__response__, 'context'), + id=pulumi.get(__response__, 'id'), + key=pulumi.get(__response__, 'key'), + namespace=pulumi.get(__response__, 'namespace'), + plaintext=pulumi.get(__response__, 'plaintext'))) diff --git a/sdk/python/pulumi_vault/transit/get_encrypt.py b/sdk/python/pulumi_vault/transit/get_encrypt.py index 3f18d873b..6dbc81632 100644 --- a/sdk/python/pulumi_vault/transit/get_encrypt.py +++ b/sdk/python/pulumi_vault/transit/get_encrypt.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = [ @@ -139,9 +144,6 @@ def get_encrypt(backend: Optional[str] = None, key_version=pulumi.get(__ret__, 'key_version'), namespace=pulumi.get(__ret__, 'namespace'), plaintext=pulumi.get(__ret__, 'plaintext')) - - -@_utilities.lift_output_func(get_encrypt) def get_encrypt_output(backend: Optional[pulumi.Input[str]] = None, context: Optional[pulumi.Input[Optional[str]]] = None, key: Optional[pulumi.Input[str]] = None, @@ -152,4 +154,21 @@ def get_encrypt_output(backend: Optional[pulumi.Input[str]] = None, """ This is a data source which can be used to encrypt plaintext using a Vault Transit key. """ - ... + __args__ = dict() + __args__['backend'] = backend + __args__['context'] = context + __args__['key'] = key + __args__['keyVersion'] = key_version + __args__['namespace'] = namespace + __args__['plaintext'] = plaintext + opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + __ret__ = pulumi.runtime.invoke_output('vault:transit/getEncrypt:getEncrypt', __args__, opts=opts, typ=GetEncryptResult) + return __ret__.apply(lambda __response__: GetEncryptResult( + backend=pulumi.get(__response__, 'backend'), + ciphertext=pulumi.get(__response__, 'ciphertext'), + context=pulumi.get(__response__, 'context'), + id=pulumi.get(__response__, 'id'), + key=pulumi.get(__response__, 'key'), + key_version=pulumi.get(__response__, 'key_version'), + namespace=pulumi.get(__response__, 'namespace'), + plaintext=pulumi.get(__response__, 'plaintext'))) diff --git a/sdk/python/pulumi_vault/transit/secret_backend_key.py b/sdk/python/pulumi_vault/transit/secret_backend_key.py index 94ad0cc90..c594cc4fa 100644 --- a/sdk/python/pulumi_vault/transit/secret_backend_key.py +++ b/sdk/python/pulumi_vault/transit/secret_backend_key.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretBackendKeyArgs', 'SecretBackendKey'] diff --git a/sdk/python/pulumi_vault/transit/secret_cache_config.py b/sdk/python/pulumi_vault/transit/secret_cache_config.py index 88c8614dd..9cbae5e94 100644 --- a/sdk/python/pulumi_vault/transit/secret_cache_config.py +++ b/sdk/python/pulumi_vault/transit/secret_cache_config.py @@ -4,9 +4,14 @@ import copy import warnings +import sys import pulumi import pulumi.runtime from typing import Any, Mapping, Optional, Sequence, Union, overload +if sys.version_info >= (3, 11): + from typing import NotRequired, TypedDict, TypeAlias +else: + from typing_extensions import NotRequired, TypedDict, TypeAlias from .. import _utilities __all__ = ['SecretCacheConfigArgs', 'SecretCacheConfig'] diff --git a/sdk/python/pyproject.toml b/sdk/python/pyproject.toml index 0b41c6090..8865fb031 100644 --- a/sdk/python/pyproject.toml +++ b/sdk/python/pyproject.toml @@ -1,7 +1,7 @@ [project] name = "pulumi_vault" description = "A Pulumi package for creating and managing HashiCorp Vault cloud resources." - dependencies = ["parver>=0.2.1", "pulumi>=3.0.0,<4.0.0", "semver>=2.8.1"] + dependencies = ["parver>=0.2.1", "pulumi>=3.136.0,<4.0.0", "semver>=2.8.1", "typing-extensions>=4.11; python_version < \"3.11\""] keywords = ["pulumi", "vault"] readme = "README.md" requires-python = ">=3.8"