pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +26 -9
- pulumi_vault/ad/secret_backend.py +16 -142
- pulumi_vault/ad/secret_library.py +16 -9
- pulumi_vault/ad/secret_role.py +14 -9
- pulumi_vault/alicloud/auth_backend_role.py +76 -190
- pulumi_vault/approle/auth_backend_login.py +12 -7
- pulumi_vault/approle/auth_backend_role.py +77 -191
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
- pulumi_vault/audit.py +30 -21
- pulumi_vault/audit_request_header.py +11 -2
- pulumi_vault/auth_backend.py +66 -14
- pulumi_vault/aws/auth_backend_cert.py +18 -9
- pulumi_vault/aws/auth_backend_client.py +267 -22
- pulumi_vault/aws/auth_backend_config_identity.py +14 -9
- pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +77 -191
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
- pulumi_vault/aws/auth_backend_sts_role.py +14 -9
- pulumi_vault/aws/get_access_credentials.py +38 -9
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +77 -9
- pulumi_vault/aws/secret_backend_role.py +185 -9
- pulumi_vault/aws/secret_backend_static_role.py +20 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +153 -15
- pulumi_vault/azure/auth_backend_role.py +77 -191
- pulumi_vault/azure/backend.py +227 -21
- pulumi_vault/azure/backend_role.py +42 -37
- pulumi_vault/azure/get_access_credentials.py +41 -7
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -267
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +28 -19
- pulumi_vault/consul/secret_backend_role.py +18 -78
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +119 -112
- pulumi_vault/database/secret_backend_role.py +31 -22
- pulumi_vault/database/secret_backend_static_role.py +87 -13
- pulumi_vault/database/secrets_mount.py +427 -136
- pulumi_vault/egp_policy.py +16 -11
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +250 -33
- pulumi_vault/gcp/auth_backend_role.py +77 -269
- pulumi_vault/gcp/get_auth_backend_role.py +43 -5
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -12
- pulumi_vault/gcp/secret_impersonated_account.py +76 -15
- pulumi_vault/gcp/secret_roleset.py +31 -24
- pulumi_vault/gcp/secret_static_account.py +39 -32
- pulumi_vault/generic/endpoint.py +24 -17
- pulumi_vault/generic/get_secret.py +64 -8
- pulumi_vault/generic/secret.py +21 -16
- pulumi_vault/get_auth_backend.py +24 -7
- pulumi_vault/get_auth_backends.py +51 -9
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -11
- pulumi_vault/get_policy_document.py +34 -19
- pulumi_vault/get_raft_autopilot_state.py +29 -10
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +19 -14
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +16 -11
- pulumi_vault/github/user.py +16 -11
- pulumi_vault/identity/entity.py +20 -13
- pulumi_vault/identity/entity_alias.py +20 -13
- pulumi_vault/identity/entity_policies.py +28 -11
- pulumi_vault/identity/get_entity.py +42 -10
- pulumi_vault/identity/get_group.py +47 -9
- pulumi_vault/identity/get_oidc_client_creds.py +21 -7
- pulumi_vault/identity/get_oidc_openid_config.py +39 -9
- pulumi_vault/identity/get_oidc_public_keys.py +29 -10
- pulumi_vault/identity/group.py +58 -39
- pulumi_vault/identity/group_alias.py +16 -9
- pulumi_vault/identity/group_member_entity_ids.py +28 -66
- pulumi_vault/identity/group_member_group_ids.py +40 -19
- pulumi_vault/identity/group_policies.py +20 -7
- pulumi_vault/identity/mfa_duo.py +11 -6
- pulumi_vault/identity/mfa_login_enforcement.py +15 -6
- pulumi_vault/identity/mfa_okta.py +11 -6
- pulumi_vault/identity/mfa_pingid.py +7 -2
- pulumi_vault/identity/mfa_totp.py +7 -2
- pulumi_vault/identity/oidc.py +12 -7
- pulumi_vault/identity/oidc_assignment.py +24 -11
- pulumi_vault/identity/oidc_client.py +36 -23
- pulumi_vault/identity/oidc_key.py +30 -17
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
- pulumi_vault/identity/oidc_provider.py +36 -21
- pulumi_vault/identity/oidc_role.py +42 -21
- pulumi_vault/identity/oidc_scope.py +20 -13
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +45 -40
- pulumi_vault/jwt/auth_backend_role.py +133 -254
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +24 -19
- pulumi_vault/kmip/secret_role.py +14 -9
- pulumi_vault/kmip/secret_scope.py +14 -9
- pulumi_vault/kubernetes/auth_backend_config.py +57 -5
- pulumi_vault/kubernetes/auth_backend_role.py +70 -177
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -11
- pulumi_vault/kubernetes/secret_backend.py +316 -27
- pulumi_vault/kubernetes/secret_backend_role.py +137 -46
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +25 -8
- pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
- pulumi_vault/kv/get_secret_v2.py +85 -9
- pulumi_vault/kv/get_secrets_list.py +24 -11
- pulumi_vault/kv/get_secrets_list_v2.py +37 -15
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +23 -16
- pulumi_vault/kv/secret_backend_v2.py +20 -11
- pulumi_vault/kv/secret_v2.py +59 -50
- pulumi_vault/ldap/auth_backend.py +127 -166
- pulumi_vault/ldap/auth_backend_group.py +14 -9
- pulumi_vault/ldap/auth_backend_user.py +14 -9
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +354 -82
- pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
- pulumi_vault/ldap/secret_backend_library_set.py +16 -9
- pulumi_vault/ldap/secret_backend_static_role.py +73 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +29 -57
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +18 -11
- pulumi_vault/mfa_okta.py +18 -11
- pulumi_vault/mfa_pingid.py +18 -11
- pulumi_vault/mfa_totp.py +24 -17
- pulumi_vault/mongodbatlas/secret_backend.py +20 -15
- pulumi_vault/mongodbatlas/secret_role.py +47 -38
- pulumi_vault/mount.py +391 -51
- pulumi_vault/namespace.py +68 -83
- pulumi_vault/nomad_secret_backend.py +18 -13
- pulumi_vault/nomad_secret_role.py +14 -9
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +485 -39
- pulumi_vault/okta/auth_backend_group.py +14 -9
- pulumi_vault/okta/auth_backend_user.py +14 -9
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +20 -13
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
- pulumi_vault/pkisecret/get_backend_key.py +24 -9
- pulumi_vault/pkisecret/get_backend_keys.py +21 -8
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
- pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
- pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
- pulumi_vault/pkisecret/secret_backend_key.py +14 -9
- pulumi_vault/pkisecret/secret_backend_role.py +21 -14
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +14 -9
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +60 -6
- pulumi_vault/quota_rate_limit.py +56 -2
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +18 -13
- pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
- pulumi_vault/raft_autopilot.py +14 -9
- pulumi_vault/raft_snapshot_agent_config.py +129 -224
- pulumi_vault/rgp_policy.py +14 -9
- pulumi_vault/saml/auth_backend.py +22 -17
- pulumi_vault/saml/auth_backend_role.py +92 -197
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -71
- pulumi_vault/secrets/sync_aws_destination.py +242 -27
- pulumi_vault/secrets/sync_azure_destination.py +92 -31
- pulumi_vault/secrets/sync_config.py +9 -4
- pulumi_vault/secrets/sync_gcp_destination.py +158 -25
- pulumi_vault/secrets/sync_gh_destination.py +189 -13
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +74 -13
- pulumi_vault/ssh/_inputs.py +28 -28
- pulumi_vault/ssh/outputs.py +11 -28
- pulumi_vault/ssh/secret_backend_ca.py +108 -9
- pulumi_vault/ssh/secret_backend_role.py +85 -118
- pulumi_vault/terraformcloud/secret_backend.py +7 -54
- pulumi_vault/terraformcloud/secret_creds.py +14 -20
- pulumi_vault/terraformcloud/secret_role.py +16 -74
- pulumi_vault/token.py +28 -23
- pulumi_vault/tokenauth/auth_backend_role.py +78 -199
- pulumi_vault/transform/alphabet.py +16 -9
- pulumi_vault/transform/get_decode.py +45 -17
- pulumi_vault/transform/get_encode.py +45 -17
- pulumi_vault/transform/role.py +16 -9
- pulumi_vault/transform/template.py +30 -21
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -21
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +27 -93
- pulumi_vault/transit/secret_cache_config.py +12 -7
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
pulumi_vault/generic/endpoint.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['EndpointArgs', 'Endpoint']
|
@@ -46,7 +51,7 @@ class EndpointArgs:
|
|
46
51
|
many configuration endpoints. Defaults to false.
|
47
52
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
48
53
|
The value should not contain leading or trailing forward slashes.
|
49
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
54
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
50
55
|
*Available only for Vault Enterprise*.
|
51
56
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] write_fields: - (Optional). A list of fields that should be returned
|
52
57
|
in `write_data_json` and `write_data`. If omitted, data returned by
|
@@ -151,7 +156,7 @@ class EndpointArgs:
|
|
151
156
|
"""
|
152
157
|
The namespace to provision the resource in.
|
153
158
|
The value should not contain leading or trailing forward slashes.
|
154
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
159
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
155
160
|
*Available only for Vault Enterprise*.
|
156
161
|
"""
|
157
162
|
return pulumi.get(self, "namespace")
|
@@ -212,7 +217,7 @@ class _EndpointState:
|
|
212
217
|
many configuration endpoints. Defaults to false.
|
213
218
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
214
219
|
The value should not contain leading or trailing forward slashes.
|
215
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
220
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
216
221
|
*Available only for Vault Enterprise*.
|
217
222
|
:param pulumi.Input[str] path: The full logical path at which to write the given
|
218
223
|
data. Consult each backend's documentation to see which endpoints
|
@@ -319,7 +324,7 @@ class _EndpointState:
|
|
319
324
|
"""
|
320
325
|
The namespace to provision the resource in.
|
321
326
|
The value should not contain leading or trailing forward slashes.
|
322
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
327
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
323
328
|
*Available only for Vault Enterprise*.
|
324
329
|
"""
|
325
330
|
return pulumi.get(self, "namespace")
|
@@ -420,8 +425,8 @@ class Endpoint(pulumi.CustomResource):
|
|
420
425
|
"password": "changeme"
|
421
426
|
}
|
422
427
|
\"\"\",
|
423
|
-
opts=pulumi.ResourceOptions(depends_on=[userpass]))
|
424
|
-
u1_token = vault.generic.Endpoint("
|
428
|
+
opts = pulumi.ResourceOptions(depends_on=[userpass]))
|
429
|
+
u1_token = vault.generic.Endpoint("u1_token",
|
425
430
|
path="auth/userpass/login/u1",
|
426
431
|
disable_read=True,
|
427
432
|
disable_delete=True,
|
@@ -429,8 +434,8 @@ class Endpoint(pulumi.CustomResource):
|
|
429
434
|
"password": "changeme"
|
430
435
|
}
|
431
436
|
\"\"\",
|
432
|
-
opts=pulumi.ResourceOptions(depends_on=[u1]))
|
433
|
-
u1_entity = vault.generic.Endpoint("
|
437
|
+
opts = pulumi.ResourceOptions(depends_on=[u1]))
|
438
|
+
u1_entity = vault.generic.Endpoint("u1_entity",
|
434
439
|
disable_read=True,
|
435
440
|
disable_delete=True,
|
436
441
|
path="identity/lookup/entity",
|
@@ -441,9 +446,10 @@ class Endpoint(pulumi.CustomResource):
|
|
441
446
|
"alias_mount_accessor": vault_auth_backend.userpass.accessor
|
442
447
|
}
|
443
448
|
\"\"\",
|
444
|
-
opts=pulumi.ResourceOptions(depends_on=[u1_token]))
|
449
|
+
opts = pulumi.ResourceOptions(depends_on=[u1_token]))
|
445
450
|
pulumi.export("u1Id", u1_entity.write_data["id"])
|
446
451
|
```
|
452
|
+
|
447
453
|
## Required Vault Capabilities
|
448
454
|
|
449
455
|
Use of this resource requires the `create` or `update` capability
|
@@ -476,7 +482,7 @@ class Endpoint(pulumi.CustomResource):
|
|
476
482
|
many configuration endpoints. Defaults to false.
|
477
483
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
478
484
|
The value should not contain leading or trailing forward slashes.
|
479
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
485
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
480
486
|
*Available only for Vault Enterprise*.
|
481
487
|
:param pulumi.Input[str] path: The full logical path at which to write the given
|
482
488
|
data. Consult each backend's documentation to see which endpoints
|
@@ -512,8 +518,8 @@ class Endpoint(pulumi.CustomResource):
|
|
512
518
|
"password": "changeme"
|
513
519
|
}
|
514
520
|
\"\"\",
|
515
|
-
opts=pulumi.ResourceOptions(depends_on=[userpass]))
|
516
|
-
u1_token = vault.generic.Endpoint("
|
521
|
+
opts = pulumi.ResourceOptions(depends_on=[userpass]))
|
522
|
+
u1_token = vault.generic.Endpoint("u1_token",
|
517
523
|
path="auth/userpass/login/u1",
|
518
524
|
disable_read=True,
|
519
525
|
disable_delete=True,
|
@@ -521,8 +527,8 @@ class Endpoint(pulumi.CustomResource):
|
|
521
527
|
"password": "changeme"
|
522
528
|
}
|
523
529
|
\"\"\",
|
524
|
-
opts=pulumi.ResourceOptions(depends_on=[u1]))
|
525
|
-
u1_entity = vault.generic.Endpoint("
|
530
|
+
opts = pulumi.ResourceOptions(depends_on=[u1]))
|
531
|
+
u1_entity = vault.generic.Endpoint("u1_entity",
|
526
532
|
disable_read=True,
|
527
533
|
disable_delete=True,
|
528
534
|
path="identity/lookup/entity",
|
@@ -533,9 +539,10 @@ class Endpoint(pulumi.CustomResource):
|
|
533
539
|
"alias_mount_accessor": vault_auth_backend.userpass.accessor
|
534
540
|
}
|
535
541
|
\"\"\",
|
536
|
-
opts=pulumi.ResourceOptions(depends_on=[u1_token]))
|
542
|
+
opts = pulumi.ResourceOptions(depends_on=[u1_token]))
|
537
543
|
pulumi.export("u1Id", u1_entity.write_data["id"])
|
538
544
|
```
|
545
|
+
|
539
546
|
## Required Vault Capabilities
|
540
547
|
|
541
548
|
Use of this resource requires the `create` or `update` capability
|
@@ -638,7 +645,7 @@ class Endpoint(pulumi.CustomResource):
|
|
638
645
|
many configuration endpoints. Defaults to false.
|
639
646
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
640
647
|
The value should not contain leading or trailing forward slashes.
|
641
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
648
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
642
649
|
*Available only for Vault Enterprise*.
|
643
650
|
:param pulumi.Input[str] path: The full logical path at which to write the given
|
644
651
|
data. Consult each backend's documentation to see which endpoints
|
@@ -725,7 +732,7 @@ class Endpoint(pulumi.CustomResource):
|
|
725
732
|
"""
|
726
733
|
The namespace to provision the resource in.
|
727
734
|
The value should not contain leading or trailing forward slashes.
|
728
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
735
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
729
736
|
*Available only for Vault Enterprise*.
|
730
737
|
"""
|
731
738
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -58,7 +63,7 @@ class GetSecretResult:
|
|
58
63
|
|
59
64
|
@property
|
60
65
|
@pulumi.getter
|
61
|
-
def data(self) -> Mapping[str,
|
66
|
+
def data(self) -> Mapping[str, str]:
|
62
67
|
"""
|
63
68
|
A mapping whose keys are the top-level data keys returned from
|
64
69
|
Vault and whose values are the corresponding values. This map can only
|
@@ -159,6 +164,7 @@ def get_secret(namespace: Optional[str] = None,
|
|
159
164
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecretResult:
|
160
165
|
"""
|
161
166
|
## Example Usage
|
167
|
+
|
162
168
|
### Generic secret
|
163
169
|
|
164
170
|
```python
|
@@ -167,6 +173,23 @@ def get_secret(namespace: Optional[str] = None,
|
|
167
173
|
|
168
174
|
rundeck_auth = vault.generic.get_secret(path="secret/rundeck_auth")
|
169
175
|
```
|
176
|
+
|
177
|
+
### KV
|
178
|
+
|
179
|
+
For this example, consider `example` as a path for a KV engine.
|
180
|
+
|
181
|
+
```python
|
182
|
+
import pulumi
|
183
|
+
import pulumi_vault as vault
|
184
|
+
|
185
|
+
|
186
|
+
def not_implemented(msg):
|
187
|
+
raise NotImplementedError(msg)
|
188
|
+
|
189
|
+
example_creds = vault.generic.get_secret(path="example/creds")
|
190
|
+
example_template = not_implemented("The template_file data resource is not yet supported.")
|
191
|
+
```
|
192
|
+
|
170
193
|
## Required Vault Capabilities
|
171
194
|
|
172
195
|
Use of this resource requires the `read` capability on the given path.
|
@@ -174,7 +197,7 @@ def get_secret(namespace: Optional[str] = None,
|
|
174
197
|
|
175
198
|
:param str namespace: The namespace of the target resource.
|
176
199
|
The value should not contain leading or trailing forward slashes.
|
177
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
200
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
178
201
|
*Available only for Vault Enterprise*.
|
179
202
|
:param str path: The full logical path from which to request data.
|
180
203
|
To read data from the "generic" secret backend mounted in Vault by
|
@@ -208,16 +231,14 @@ def get_secret(namespace: Optional[str] = None,
|
|
208
231
|
path=pulumi.get(__ret__, 'path'),
|
209
232
|
version=pulumi.get(__ret__, 'version'),
|
210
233
|
with_lease_start_time=pulumi.get(__ret__, 'with_lease_start_time'))
|
211
|
-
|
212
|
-
|
213
|
-
@_utilities.lift_output_func(get_secret)
|
214
234
|
def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
215
235
|
path: Optional[pulumi.Input[str]] = None,
|
216
236
|
version: Optional[pulumi.Input[Optional[int]]] = None,
|
217
237
|
with_lease_start_time: Optional[pulumi.Input[Optional[bool]]] = None,
|
218
|
-
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecretResult]:
|
238
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretResult]:
|
219
239
|
"""
|
220
240
|
## Example Usage
|
241
|
+
|
221
242
|
### Generic secret
|
222
243
|
|
223
244
|
```python
|
@@ -226,6 +247,23 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
|
226
247
|
|
227
248
|
rundeck_auth = vault.generic.get_secret(path="secret/rundeck_auth")
|
228
249
|
```
|
250
|
+
|
251
|
+
### KV
|
252
|
+
|
253
|
+
For this example, consider `example` as a path for a KV engine.
|
254
|
+
|
255
|
+
```python
|
256
|
+
import pulumi
|
257
|
+
import pulumi_vault as vault
|
258
|
+
|
259
|
+
|
260
|
+
def not_implemented(msg):
|
261
|
+
raise NotImplementedError(msg)
|
262
|
+
|
263
|
+
example_creds = vault.generic.get_secret(path="example/creds")
|
264
|
+
example_template = not_implemented("The template_file data resource is not yet supported.")
|
265
|
+
```
|
266
|
+
|
229
267
|
## Required Vault Capabilities
|
230
268
|
|
231
269
|
Use of this resource requires the `read` capability on the given path.
|
@@ -233,7 +271,7 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
|
233
271
|
|
234
272
|
:param str namespace: The namespace of the target resource.
|
235
273
|
The value should not contain leading or trailing forward slashes.
|
236
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
274
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
237
275
|
*Available only for Vault Enterprise*.
|
238
276
|
:param str path: The full logical path from which to request data.
|
239
277
|
To read data from the "generic" secret backend mounted in Vault by
|
@@ -247,4 +285,22 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
|
247
285
|
Note that storing the `lease_start_time` in the TF state will cause a persistent drift
|
248
286
|
on every `pulumi preview` and will require a `pulumi up`.
|
249
287
|
"""
|
250
|
-
|
288
|
+
__args__ = dict()
|
289
|
+
__args__['namespace'] = namespace
|
290
|
+
__args__['path'] = path
|
291
|
+
__args__['version'] = version
|
292
|
+
__args__['withLeaseStartTime'] = with_lease_start_time
|
293
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
294
|
+
__ret__ = pulumi.runtime.invoke_output('vault:generic/getSecret:getSecret', __args__, opts=opts, typ=GetSecretResult)
|
295
|
+
return __ret__.apply(lambda __response__: GetSecretResult(
|
296
|
+
data=pulumi.get(__response__, 'data'),
|
297
|
+
data_json=pulumi.get(__response__, 'data_json'),
|
298
|
+
id=pulumi.get(__response__, 'id'),
|
299
|
+
lease_duration=pulumi.get(__response__, 'lease_duration'),
|
300
|
+
lease_id=pulumi.get(__response__, 'lease_id'),
|
301
|
+
lease_renewable=pulumi.get(__response__, 'lease_renewable'),
|
302
|
+
lease_start_time=pulumi.get(__response__, 'lease_start_time'),
|
303
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
304
|
+
path=pulumi.get(__response__, 'path'),
|
305
|
+
version=pulumi.get(__response__, 'version'),
|
306
|
+
with_lease_start_time=pulumi.get(__response__, 'with_lease_start_time')))
|
pulumi_vault/generic/secret.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretArgs', 'Secret']
|
@@ -37,7 +42,7 @@ class SecretArgs:
|
|
37
42
|
break drift detection. Defaults to false.
|
38
43
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
39
44
|
The value should not contain leading or trailing forward slashes.
|
40
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
45
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
41
46
|
*Available only for Vault Enterprise*.
|
42
47
|
"""
|
43
48
|
pulumi.set(__self__, "data_json", data_json)
|
@@ -113,7 +118,7 @@ class SecretArgs:
|
|
113
118
|
"""
|
114
119
|
The namespace to provision the resource in.
|
115
120
|
The value should not contain leading or trailing forward slashes.
|
116
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
121
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
117
122
|
*Available only for Vault Enterprise*.
|
118
123
|
"""
|
119
124
|
return pulumi.get(self, "namespace")
|
@@ -126,7 +131,7 @@ class SecretArgs:
|
|
126
131
|
@pulumi.input_type
|
127
132
|
class _SecretState:
|
128
133
|
def __init__(__self__, *,
|
129
|
-
data: Optional[pulumi.Input[Mapping[str,
|
134
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
130
135
|
data_json: Optional[pulumi.Input[str]] = None,
|
131
136
|
delete_all_versions: Optional[pulumi.Input[bool]] = None,
|
132
137
|
disable_read: Optional[pulumi.Input[bool]] = None,
|
@@ -134,7 +139,7 @@ class _SecretState:
|
|
134
139
|
path: Optional[pulumi.Input[str]] = None):
|
135
140
|
"""
|
136
141
|
Input properties used for looking up and filtering Secret resources.
|
137
|
-
:param pulumi.Input[Mapping[str,
|
142
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
|
138
143
|
Vault and whose values are the corresponding values. This map can only
|
139
144
|
represent string data, so any non-string values returned from Vault are
|
140
145
|
serialized as JSON.
|
@@ -149,7 +154,7 @@ class _SecretState:
|
|
149
154
|
break drift detection. Defaults to false.
|
150
155
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
151
156
|
The value should not contain leading or trailing forward slashes.
|
152
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
157
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
153
158
|
*Available only for Vault Enterprise*.
|
154
159
|
:param pulumi.Input[str] path: The full logical path at which to write the given data.
|
155
160
|
To write data into the "generic" secret backend mounted in Vault by default,
|
@@ -172,7 +177,7 @@ class _SecretState:
|
|
172
177
|
|
173
178
|
@property
|
174
179
|
@pulumi.getter
|
175
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
180
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
176
181
|
"""
|
177
182
|
A mapping whose keys are the top-level data keys returned from
|
178
183
|
Vault and whose values are the corresponding values. This map can only
|
@@ -182,7 +187,7 @@ class _SecretState:
|
|
182
187
|
return pulumi.get(self, "data")
|
183
188
|
|
184
189
|
@data.setter
|
185
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
190
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
186
191
|
pulumi.set(self, "data", value)
|
187
192
|
|
188
193
|
@property
|
@@ -233,7 +238,7 @@ class _SecretState:
|
|
233
238
|
"""
|
234
239
|
The namespace to provision the resource in.
|
235
240
|
The value should not contain leading or trailing forward slashes.
|
236
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
241
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
237
242
|
*Available only for Vault Enterprise*.
|
238
243
|
"""
|
239
244
|
return pulumi.get(self, "namespace")
|
@@ -276,7 +281,7 @@ class Secret(pulumi.CustomResource):
|
|
276
281
|
Generic secrets can be imported using the `path`, e.g.
|
277
282
|
|
278
283
|
```sh
|
279
|
-
|
284
|
+
$ pulumi import vault:generic/secret:Secret example secret/foo
|
280
285
|
```
|
281
286
|
|
282
287
|
:param str resource_name: The name of the resource.
|
@@ -292,7 +297,7 @@ class Secret(pulumi.CustomResource):
|
|
292
297
|
break drift detection. Defaults to false.
|
293
298
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
294
299
|
The value should not contain leading or trailing forward slashes.
|
295
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
300
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
296
301
|
*Available only for Vault Enterprise*.
|
297
302
|
:param pulumi.Input[str] path: The full logical path at which to write the given data.
|
298
303
|
To write data into the "generic" secret backend mounted in Vault by default,
|
@@ -312,7 +317,7 @@ class Secret(pulumi.CustomResource):
|
|
312
317
|
Generic secrets can be imported using the `path`, e.g.
|
313
318
|
|
314
319
|
```sh
|
315
|
-
|
320
|
+
$ pulumi import vault:generic/secret:Secret example secret/foo
|
316
321
|
```
|
317
322
|
|
318
323
|
:param str resource_name: The name of the resource.
|
@@ -366,7 +371,7 @@ class Secret(pulumi.CustomResource):
|
|
366
371
|
def get(resource_name: str,
|
367
372
|
id: pulumi.Input[str],
|
368
373
|
opts: Optional[pulumi.ResourceOptions] = None,
|
369
|
-
data: Optional[pulumi.Input[Mapping[str,
|
374
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
370
375
|
data_json: Optional[pulumi.Input[str]] = None,
|
371
376
|
delete_all_versions: Optional[pulumi.Input[bool]] = None,
|
372
377
|
disable_read: Optional[pulumi.Input[bool]] = None,
|
@@ -379,7 +384,7 @@ class Secret(pulumi.CustomResource):
|
|
379
384
|
:param str resource_name: The unique name of the resulting resource.
|
380
385
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
381
386
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
382
|
-
:param pulumi.Input[Mapping[str,
|
387
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
|
383
388
|
Vault and whose values are the corresponding values. This map can only
|
384
389
|
represent string data, so any non-string values returned from Vault are
|
385
390
|
serialized as JSON.
|
@@ -394,7 +399,7 @@ class Secret(pulumi.CustomResource):
|
|
394
399
|
break drift detection. Defaults to false.
|
395
400
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
396
401
|
The value should not contain leading or trailing forward slashes.
|
397
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
402
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
398
403
|
*Available only for Vault Enterprise*.
|
399
404
|
:param pulumi.Input[str] path: The full logical path at which to write the given data.
|
400
405
|
To write data into the "generic" secret backend mounted in Vault by default,
|
@@ -416,7 +421,7 @@ class Secret(pulumi.CustomResource):
|
|
416
421
|
|
417
422
|
@property
|
418
423
|
@pulumi.getter
|
419
|
-
def data(self) -> pulumi.Output[Mapping[str,
|
424
|
+
def data(self) -> pulumi.Output[Mapping[str, str]]:
|
420
425
|
"""
|
421
426
|
A mapping whose keys are the top-level data keys returned from
|
422
427
|
Vault and whose values are the corresponding values. This map can only
|
@@ -461,7 +466,7 @@ class Secret(pulumi.CustomResource):
|
|
461
466
|
"""
|
462
467
|
The namespace to provision the resource in.
|
463
468
|
The value should not contain leading or trailing forward slashes.
|
464
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
469
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
465
470
|
*Available only for Vault Enterprise*.
|
466
471
|
"""
|
467
472
|
return pulumi.get(self, "namespace")
|
pulumi_vault/get_auth_backend.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -162,7 +167,7 @@ def get_auth_backend(namespace: Optional[str] = None,
|
|
162
167
|
|
163
168
|
:param str namespace: The namespace of the target resource.
|
164
169
|
The value should not contain leading or trailing forward slashes.
|
165
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
170
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
166
171
|
*Available only for Vault Enterprise*.
|
167
172
|
:param str path: The auth backend mount point.
|
168
173
|
"""
|
@@ -183,12 +188,9 @@ def get_auth_backend(namespace: Optional[str] = None,
|
|
183
188
|
namespace=pulumi.get(__ret__, 'namespace'),
|
184
189
|
path=pulumi.get(__ret__, 'path'),
|
185
190
|
type=pulumi.get(__ret__, 'type'))
|
186
|
-
|
187
|
-
|
188
|
-
@_utilities.lift_output_func(get_auth_backend)
|
189
191
|
def get_auth_backend_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
190
192
|
path: Optional[pulumi.Input[str]] = None,
|
191
|
-
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendResult]:
|
193
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAuthBackendResult]:
|
192
194
|
"""
|
193
195
|
## Example Usage
|
194
196
|
|
@@ -202,8 +204,23 @@ def get_auth_backend_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
|
|
202
204
|
|
203
205
|
:param str namespace: The namespace of the target resource.
|
204
206
|
The value should not contain leading or trailing forward slashes.
|
205
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
207
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
206
208
|
*Available only for Vault Enterprise*.
|
207
209
|
:param str path: The auth backend mount point.
|
208
210
|
"""
|
209
|
-
|
211
|
+
__args__ = dict()
|
212
|
+
__args__['namespace'] = namespace
|
213
|
+
__args__['path'] = path
|
214
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
215
|
+
__ret__ = pulumi.runtime.invoke_output('vault:index/getAuthBackend:getAuthBackend', __args__, opts=opts, typ=GetAuthBackendResult)
|
216
|
+
return __ret__.apply(lambda __response__: GetAuthBackendResult(
|
217
|
+
accessor=pulumi.get(__response__, 'accessor'),
|
218
|
+
default_lease_ttl_seconds=pulumi.get(__response__, 'default_lease_ttl_seconds'),
|
219
|
+
description=pulumi.get(__response__, 'description'),
|
220
|
+
id=pulumi.get(__response__, 'id'),
|
221
|
+
listing_visibility=pulumi.get(__response__, 'listing_visibility'),
|
222
|
+
local=pulumi.get(__response__, 'local'),
|
223
|
+
max_lease_ttl_seconds=pulumi.get(__response__, 'max_lease_ttl_seconds'),
|
224
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
225
|
+
path=pulumi.get(__response__, 'path'),
|
226
|
+
type=pulumi.get(__response__, 'type')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -90,11 +95,26 @@ def get_auth_backends(namespace: Optional[str] = None,
|
|
90
95
|
type: Optional[str] = None,
|
91
96
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetAuthBackendsResult:
|
92
97
|
"""
|
93
|
-
|
98
|
+
## Example Usage
|
99
|
+
|
100
|
+
```python
|
101
|
+
import pulumi
|
102
|
+
import pulumi_vault as vault
|
103
|
+
|
104
|
+
example = vault.get_auth_backends()
|
105
|
+
```
|
106
|
+
|
107
|
+
```python
|
108
|
+
import pulumi
|
109
|
+
import pulumi_vault as vault
|
110
|
+
|
111
|
+
example_filter = vault.get_auth_backends(type="kubernetes")
|
112
|
+
```
|
113
|
+
|
94
114
|
|
95
115
|
:param str namespace: The namespace of the target resource.
|
96
116
|
The value should not contain leading or trailing forward slashes.
|
97
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
117
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
98
118
|
*Available only for Vault Enterprise*.
|
99
119
|
:param str type: The name of the auth method type. Allows filtering of backends returned by type.
|
100
120
|
"""
|
@@ -110,19 +130,41 @@ def get_auth_backends(namespace: Optional[str] = None,
|
|
110
130
|
namespace=pulumi.get(__ret__, 'namespace'),
|
111
131
|
paths=pulumi.get(__ret__, 'paths'),
|
112
132
|
type=pulumi.get(__ret__, 'type'))
|
113
|
-
|
114
|
-
|
115
|
-
@_utilities.lift_output_func(get_auth_backends)
|
116
133
|
def get_auth_backends_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
117
134
|
type: Optional[pulumi.Input[Optional[str]]] = None,
|
118
|
-
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendsResult]:
|
135
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAuthBackendsResult]:
|
119
136
|
"""
|
120
|
-
|
137
|
+
## Example Usage
|
138
|
+
|
139
|
+
```python
|
140
|
+
import pulumi
|
141
|
+
import pulumi_vault as vault
|
142
|
+
|
143
|
+
example = vault.get_auth_backends()
|
144
|
+
```
|
145
|
+
|
146
|
+
```python
|
147
|
+
import pulumi
|
148
|
+
import pulumi_vault as vault
|
149
|
+
|
150
|
+
example_filter = vault.get_auth_backends(type="kubernetes")
|
151
|
+
```
|
152
|
+
|
121
153
|
|
122
154
|
:param str namespace: The namespace of the target resource.
|
123
155
|
The value should not contain leading or trailing forward slashes.
|
124
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
156
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
125
157
|
*Available only for Vault Enterprise*.
|
126
158
|
:param str type: The name of the auth method type. Allows filtering of backends returned by type.
|
127
159
|
"""
|
128
|
-
|
160
|
+
__args__ = dict()
|
161
|
+
__args__['namespace'] = namespace
|
162
|
+
__args__['type'] = type
|
163
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
164
|
+
__ret__ = pulumi.runtime.invoke_output('vault:index/getAuthBackends:getAuthBackends', __args__, opts=opts, typ=GetAuthBackendsResult)
|
165
|
+
return __ret__.apply(lambda __response__: GetAuthBackendsResult(
|
166
|
+
accessors=pulumi.get(__response__, 'accessors'),
|
167
|
+
id=pulumi.get(__response__, 'id'),
|
168
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
169
|
+
paths=pulumi.get(__response__, 'paths'),
|
170
|
+
type=pulumi.get(__response__, 'type')))
|