pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +26 -9
- pulumi_vault/ad/secret_backend.py +16 -142
- pulumi_vault/ad/secret_library.py +16 -9
- pulumi_vault/ad/secret_role.py +14 -9
- pulumi_vault/alicloud/auth_backend_role.py +76 -190
- pulumi_vault/approle/auth_backend_login.py +12 -7
- pulumi_vault/approle/auth_backend_role.py +77 -191
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
- pulumi_vault/audit.py +30 -21
- pulumi_vault/audit_request_header.py +11 -2
- pulumi_vault/auth_backend.py +66 -14
- pulumi_vault/aws/auth_backend_cert.py +18 -9
- pulumi_vault/aws/auth_backend_client.py +267 -22
- pulumi_vault/aws/auth_backend_config_identity.py +14 -9
- pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +77 -191
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
- pulumi_vault/aws/auth_backend_sts_role.py +14 -9
- pulumi_vault/aws/get_access_credentials.py +38 -9
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +77 -9
- pulumi_vault/aws/secret_backend_role.py +185 -9
- pulumi_vault/aws/secret_backend_static_role.py +20 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +153 -15
- pulumi_vault/azure/auth_backend_role.py +77 -191
- pulumi_vault/azure/backend.py +227 -21
- pulumi_vault/azure/backend_role.py +42 -37
- pulumi_vault/azure/get_access_credentials.py +41 -7
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -267
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +28 -19
- pulumi_vault/consul/secret_backend_role.py +18 -78
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +119 -112
- pulumi_vault/database/secret_backend_role.py +31 -22
- pulumi_vault/database/secret_backend_static_role.py +87 -13
- pulumi_vault/database/secrets_mount.py +427 -136
- pulumi_vault/egp_policy.py +16 -11
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +250 -33
- pulumi_vault/gcp/auth_backend_role.py +77 -269
- pulumi_vault/gcp/get_auth_backend_role.py +43 -5
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -12
- pulumi_vault/gcp/secret_impersonated_account.py +76 -15
- pulumi_vault/gcp/secret_roleset.py +31 -24
- pulumi_vault/gcp/secret_static_account.py +39 -32
- pulumi_vault/generic/endpoint.py +24 -17
- pulumi_vault/generic/get_secret.py +64 -8
- pulumi_vault/generic/secret.py +21 -16
- pulumi_vault/get_auth_backend.py +24 -7
- pulumi_vault/get_auth_backends.py +51 -9
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -11
- pulumi_vault/get_policy_document.py +34 -19
- pulumi_vault/get_raft_autopilot_state.py +29 -10
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +19 -14
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +16 -11
- pulumi_vault/github/user.py +16 -11
- pulumi_vault/identity/entity.py +20 -13
- pulumi_vault/identity/entity_alias.py +20 -13
- pulumi_vault/identity/entity_policies.py +28 -11
- pulumi_vault/identity/get_entity.py +42 -10
- pulumi_vault/identity/get_group.py +47 -9
- pulumi_vault/identity/get_oidc_client_creds.py +21 -7
- pulumi_vault/identity/get_oidc_openid_config.py +39 -9
- pulumi_vault/identity/get_oidc_public_keys.py +29 -10
- pulumi_vault/identity/group.py +58 -39
- pulumi_vault/identity/group_alias.py +16 -9
- pulumi_vault/identity/group_member_entity_ids.py +28 -66
- pulumi_vault/identity/group_member_group_ids.py +40 -19
- pulumi_vault/identity/group_policies.py +20 -7
- pulumi_vault/identity/mfa_duo.py +11 -6
- pulumi_vault/identity/mfa_login_enforcement.py +15 -6
- pulumi_vault/identity/mfa_okta.py +11 -6
- pulumi_vault/identity/mfa_pingid.py +7 -2
- pulumi_vault/identity/mfa_totp.py +7 -2
- pulumi_vault/identity/oidc.py +12 -7
- pulumi_vault/identity/oidc_assignment.py +24 -11
- pulumi_vault/identity/oidc_client.py +36 -23
- pulumi_vault/identity/oidc_key.py +30 -17
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
- pulumi_vault/identity/oidc_provider.py +36 -21
- pulumi_vault/identity/oidc_role.py +42 -21
- pulumi_vault/identity/oidc_scope.py +20 -13
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +45 -40
- pulumi_vault/jwt/auth_backend_role.py +133 -254
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +24 -19
- pulumi_vault/kmip/secret_role.py +14 -9
- pulumi_vault/kmip/secret_scope.py +14 -9
- pulumi_vault/kubernetes/auth_backend_config.py +57 -5
- pulumi_vault/kubernetes/auth_backend_role.py +70 -177
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -11
- pulumi_vault/kubernetes/secret_backend.py +316 -27
- pulumi_vault/kubernetes/secret_backend_role.py +137 -46
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +25 -8
- pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
- pulumi_vault/kv/get_secret_v2.py +85 -9
- pulumi_vault/kv/get_secrets_list.py +24 -11
- pulumi_vault/kv/get_secrets_list_v2.py +37 -15
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +23 -16
- pulumi_vault/kv/secret_backend_v2.py +20 -11
- pulumi_vault/kv/secret_v2.py +59 -50
- pulumi_vault/ldap/auth_backend.py +127 -166
- pulumi_vault/ldap/auth_backend_group.py +14 -9
- pulumi_vault/ldap/auth_backend_user.py +14 -9
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +354 -82
- pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
- pulumi_vault/ldap/secret_backend_library_set.py +16 -9
- pulumi_vault/ldap/secret_backend_static_role.py +73 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +29 -57
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +18 -11
- pulumi_vault/mfa_okta.py +18 -11
- pulumi_vault/mfa_pingid.py +18 -11
- pulumi_vault/mfa_totp.py +24 -17
- pulumi_vault/mongodbatlas/secret_backend.py +20 -15
- pulumi_vault/mongodbatlas/secret_role.py +47 -38
- pulumi_vault/mount.py +391 -51
- pulumi_vault/namespace.py +68 -83
- pulumi_vault/nomad_secret_backend.py +18 -13
- pulumi_vault/nomad_secret_role.py +14 -9
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +485 -39
- pulumi_vault/okta/auth_backend_group.py +14 -9
- pulumi_vault/okta/auth_backend_user.py +14 -9
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +20 -13
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
- pulumi_vault/pkisecret/get_backend_key.py +24 -9
- pulumi_vault/pkisecret/get_backend_keys.py +21 -8
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
- pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
- pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
- pulumi_vault/pkisecret/secret_backend_key.py +14 -9
- pulumi_vault/pkisecret/secret_backend_role.py +21 -14
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +14 -9
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +60 -6
- pulumi_vault/quota_rate_limit.py +56 -2
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +18 -13
- pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
- pulumi_vault/raft_autopilot.py +14 -9
- pulumi_vault/raft_snapshot_agent_config.py +129 -224
- pulumi_vault/rgp_policy.py +14 -9
- pulumi_vault/saml/auth_backend.py +22 -17
- pulumi_vault/saml/auth_backend_role.py +92 -197
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -71
- pulumi_vault/secrets/sync_aws_destination.py +242 -27
- pulumi_vault/secrets/sync_azure_destination.py +92 -31
- pulumi_vault/secrets/sync_config.py +9 -4
- pulumi_vault/secrets/sync_gcp_destination.py +158 -25
- pulumi_vault/secrets/sync_gh_destination.py +189 -13
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +74 -13
- pulumi_vault/ssh/_inputs.py +28 -28
- pulumi_vault/ssh/outputs.py +11 -28
- pulumi_vault/ssh/secret_backend_ca.py +108 -9
- pulumi_vault/ssh/secret_backend_role.py +85 -118
- pulumi_vault/terraformcloud/secret_backend.py +7 -54
- pulumi_vault/terraformcloud/secret_creds.py +14 -20
- pulumi_vault/terraformcloud/secret_role.py +16 -74
- pulumi_vault/token.py +28 -23
- pulumi_vault/tokenauth/auth_backend_role.py +78 -199
- pulumi_vault/transform/alphabet.py +16 -9
- pulumi_vault/transform/get_decode.py +45 -17
- pulumi_vault/transform/get_encode.py +45 -17
- pulumi_vault/transform/role.py +16 -9
- pulumi_vault/transform/template.py +30 -21
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -21
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +27 -93
- pulumi_vault/transit/secret_cache_config.py +12 -7
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
pulumi_vault/kv/secret.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretArgs', 'Secret']
|
@@ -24,7 +29,7 @@ class SecretArgs:
|
|
24
29
|
:param pulumi.Input[str] path: Full path of the KV-V1 secret.
|
25
30
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
26
31
|
The value should not contain leading or trailing forward slashes.
|
27
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
32
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
28
33
|
*Available only for Vault Enterprise*.
|
29
34
|
"""
|
30
35
|
pulumi.set(__self__, "data_json", data_json)
|
@@ -63,7 +68,7 @@ class SecretArgs:
|
|
63
68
|
"""
|
64
69
|
The namespace to provision the resource in.
|
65
70
|
The value should not contain leading or trailing forward slashes.
|
66
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
71
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
67
72
|
*Available only for Vault Enterprise*.
|
68
73
|
"""
|
69
74
|
return pulumi.get(self, "namespace")
|
@@ -76,13 +81,13 @@ class SecretArgs:
|
|
76
81
|
@pulumi.input_type
|
77
82
|
class _SecretState:
|
78
83
|
def __init__(__self__, *,
|
79
|
-
data: Optional[pulumi.Input[Mapping[str,
|
84
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
80
85
|
data_json: Optional[pulumi.Input[str]] = None,
|
81
86
|
namespace: Optional[pulumi.Input[str]] = None,
|
82
87
|
path: Optional[pulumi.Input[str]] = None):
|
83
88
|
"""
|
84
89
|
Input properties used for looking up and filtering Secret resources.
|
85
|
-
:param pulumi.Input[Mapping[str,
|
90
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
|
86
91
|
Vault and whose values are the corresponding values. This map can only
|
87
92
|
represent string data, so any non-string values returned from Vault are
|
88
93
|
serialized as JSON.
|
@@ -90,7 +95,7 @@ class _SecretState:
|
|
90
95
|
written as the secret data at the given path.
|
91
96
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
92
97
|
The value should not contain leading or trailing forward slashes.
|
93
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
98
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
94
99
|
*Available only for Vault Enterprise*.
|
95
100
|
:param pulumi.Input[str] path: Full path of the KV-V1 secret.
|
96
101
|
"""
|
@@ -105,7 +110,7 @@ class _SecretState:
|
|
105
110
|
|
106
111
|
@property
|
107
112
|
@pulumi.getter
|
108
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
113
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
109
114
|
"""
|
110
115
|
A mapping whose keys are the top-level data keys returned from
|
111
116
|
Vault and whose values are the corresponding values. This map can only
|
@@ -115,7 +120,7 @@ class _SecretState:
|
|
115
120
|
return pulumi.get(self, "data")
|
116
121
|
|
117
122
|
@data.setter
|
118
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
123
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
119
124
|
pulumi.set(self, "data", value)
|
120
125
|
|
121
126
|
@property
|
@@ -137,7 +142,7 @@ class _SecretState:
|
|
137
142
|
"""
|
138
143
|
The namespace to provision the resource in.
|
139
144
|
The value should not contain leading or trailing forward slashes.
|
140
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
145
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
141
146
|
*Available only for Vault Enterprise*.
|
142
147
|
"""
|
143
148
|
return pulumi.get(self, "namespace")
|
@@ -195,6 +200,7 @@ class Secret(pulumi.CustomResource):
|
|
195
200
|
"foo": "bar",
|
196
201
|
}))
|
197
202
|
```
|
203
|
+
|
198
204
|
## Required Vault Capabilities
|
199
205
|
|
200
206
|
Use of this resource requires the `create` or `update` capability
|
@@ -207,7 +213,7 @@ class Secret(pulumi.CustomResource):
|
|
207
213
|
KV-V1 secrets can be imported using the `path`, e.g.
|
208
214
|
|
209
215
|
```sh
|
210
|
-
|
216
|
+
$ pulumi import vault:kv/secret:Secret secret kvv1/secret
|
211
217
|
```
|
212
218
|
|
213
219
|
:param str resource_name: The name of the resource.
|
@@ -216,7 +222,7 @@ class Secret(pulumi.CustomResource):
|
|
216
222
|
written as the secret data at the given path.
|
217
223
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
218
224
|
The value should not contain leading or trailing forward slashes.
|
219
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
225
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
220
226
|
*Available only for Vault Enterprise*.
|
221
227
|
:param pulumi.Input[str] path: Full path of the KV-V1 secret.
|
222
228
|
"""
|
@@ -253,6 +259,7 @@ class Secret(pulumi.CustomResource):
|
|
253
259
|
"foo": "bar",
|
254
260
|
}))
|
255
261
|
```
|
262
|
+
|
256
263
|
## Required Vault Capabilities
|
257
264
|
|
258
265
|
Use of this resource requires the `create` or `update` capability
|
@@ -265,7 +272,7 @@ class Secret(pulumi.CustomResource):
|
|
265
272
|
KV-V1 secrets can be imported using the `path`, e.g.
|
266
273
|
|
267
274
|
```sh
|
268
|
-
|
275
|
+
$ pulumi import vault:kv/secret:Secret secret kvv1/secret
|
269
276
|
```
|
270
277
|
|
271
278
|
:param str resource_name: The name of the resource.
|
@@ -315,7 +322,7 @@ class Secret(pulumi.CustomResource):
|
|
315
322
|
def get(resource_name: str,
|
316
323
|
id: pulumi.Input[str],
|
317
324
|
opts: Optional[pulumi.ResourceOptions] = None,
|
318
|
-
data: Optional[pulumi.Input[Mapping[str,
|
325
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
319
326
|
data_json: Optional[pulumi.Input[str]] = None,
|
320
327
|
namespace: Optional[pulumi.Input[str]] = None,
|
321
328
|
path: Optional[pulumi.Input[str]] = None) -> 'Secret':
|
@@ -326,7 +333,7 @@ class Secret(pulumi.CustomResource):
|
|
326
333
|
:param str resource_name: The unique name of the resulting resource.
|
327
334
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
328
335
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
329
|
-
:param pulumi.Input[Mapping[str,
|
336
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
|
330
337
|
Vault and whose values are the corresponding values. This map can only
|
331
338
|
represent string data, so any non-string values returned from Vault are
|
332
339
|
serialized as JSON.
|
@@ -334,7 +341,7 @@ class Secret(pulumi.CustomResource):
|
|
334
341
|
written as the secret data at the given path.
|
335
342
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
336
343
|
The value should not contain leading or trailing forward slashes.
|
337
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
344
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
338
345
|
*Available only for Vault Enterprise*.
|
339
346
|
:param pulumi.Input[str] path: Full path of the KV-V1 secret.
|
340
347
|
"""
|
@@ -350,7 +357,7 @@ class Secret(pulumi.CustomResource):
|
|
350
357
|
|
351
358
|
@property
|
352
359
|
@pulumi.getter
|
353
|
-
def data(self) -> pulumi.Output[Mapping[str,
|
360
|
+
def data(self) -> pulumi.Output[Mapping[str, str]]:
|
354
361
|
"""
|
355
362
|
A mapping whose keys are the top-level data keys returned from
|
356
363
|
Vault and whose values are the corresponding values. This map can only
|
@@ -374,7 +381,7 @@ class Secret(pulumi.CustomResource):
|
|
374
381
|
"""
|
375
382
|
The namespace to provision the resource in.
|
376
383
|
The value should not contain leading or trailing forward slashes.
|
377
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
384
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
378
385
|
*Available only for Vault Enterprise*.
|
379
386
|
"""
|
380
387
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendV2Args', 'SecretBackendV2']
|
@@ -29,7 +34,7 @@ class SecretBackendV2Args:
|
|
29
34
|
:param pulumi.Input[int] max_versions: The number of versions to keep per key.
|
30
35
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
31
36
|
The value should not contain leading or trailing forward slashes.
|
32
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
37
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
33
38
|
*Available only for Vault Enterprise*.
|
34
39
|
"""
|
35
40
|
pulumi.set(__self__, "mount", mount)
|
@@ -98,7 +103,7 @@ class SecretBackendV2Args:
|
|
98
103
|
"""
|
99
104
|
The namespace to provision the resource in.
|
100
105
|
The value should not contain leading or trailing forward slashes.
|
101
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
106
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
102
107
|
*Available only for Vault Enterprise*.
|
103
108
|
"""
|
104
109
|
return pulumi.get(self, "namespace")
|
@@ -126,7 +131,7 @@ class _SecretBackendV2State:
|
|
126
131
|
:param pulumi.Input[str] mount: Path where KV-V2 engine is mounted.
|
127
132
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
128
133
|
The value should not contain leading or trailing forward slashes.
|
129
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
134
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
130
135
|
*Available only for Vault Enterprise*.
|
131
136
|
"""
|
132
137
|
if cas_required is not None:
|
@@ -196,7 +201,7 @@ class _SecretBackendV2State:
|
|
196
201
|
"""
|
197
202
|
The namespace to provision the resource in.
|
198
203
|
The value should not contain leading or trailing forward slashes.
|
199
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
204
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
200
205
|
*Available only for Vault Enterprise*.
|
201
206
|
"""
|
202
207
|
return pulumi.get(self, "namespace")
|
@@ -243,6 +248,7 @@ class SecretBackendV2(pulumi.CustomResource):
|
|
243
248
|
delete_version_after=12600,
|
244
249
|
cas_required=True)
|
245
250
|
```
|
251
|
+
|
246
252
|
## Required Vault Capabilities
|
247
253
|
|
248
254
|
Use of this resource requires the `create` or `update` capability
|
@@ -252,10 +258,11 @@ class SecretBackendV2(pulumi.CustomResource):
|
|
252
258
|
|
253
259
|
## Import
|
254
260
|
|
255
|
-
The KV-V2 secret backend can be imported using its unique ID,
|
261
|
+
The KV-V2 secret backend can be imported using its unique ID,
|
262
|
+
the `${mount}/config`, e.g.
|
256
263
|
|
257
264
|
```sh
|
258
|
-
|
265
|
+
$ pulumi import vault:kv/secretBackendV2:SecretBackendV2 example kvv2/config
|
259
266
|
```
|
260
267
|
|
261
268
|
:param str resource_name: The name of the resource.
|
@@ -268,7 +275,7 @@ class SecretBackendV2(pulumi.CustomResource):
|
|
268
275
|
:param pulumi.Input[str] mount: Path where KV-V2 engine is mounted.
|
269
276
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
270
277
|
The value should not contain leading or trailing forward slashes.
|
271
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
278
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
272
279
|
*Available only for Vault Enterprise*.
|
273
280
|
"""
|
274
281
|
...
|
@@ -303,6 +310,7 @@ class SecretBackendV2(pulumi.CustomResource):
|
|
303
310
|
delete_version_after=12600,
|
304
311
|
cas_required=True)
|
305
312
|
```
|
313
|
+
|
306
314
|
## Required Vault Capabilities
|
307
315
|
|
308
316
|
Use of this resource requires the `create` or `update` capability
|
@@ -312,10 +320,11 @@ class SecretBackendV2(pulumi.CustomResource):
|
|
312
320
|
|
313
321
|
## Import
|
314
322
|
|
315
|
-
The KV-V2 secret backend can be imported using its unique ID,
|
323
|
+
The KV-V2 secret backend can be imported using its unique ID,
|
324
|
+
the `${mount}/config`, e.g.
|
316
325
|
|
317
326
|
```sh
|
318
|
-
|
327
|
+
$ pulumi import vault:kv/secretBackendV2:SecretBackendV2 example kvv2/config
|
319
328
|
```
|
320
329
|
|
321
330
|
:param str resource_name: The name of the resource.
|
@@ -384,7 +393,7 @@ class SecretBackendV2(pulumi.CustomResource):
|
|
384
393
|
:param pulumi.Input[str] mount: Path where KV-V2 engine is mounted.
|
385
394
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
386
395
|
The value should not contain leading or trailing forward slashes.
|
387
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
396
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
388
397
|
*Available only for Vault Enterprise*.
|
389
398
|
"""
|
390
399
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -438,7 +447,7 @@ class SecretBackendV2(pulumi.CustomResource):
|
|
438
447
|
"""
|
439
448
|
The namespace to provision the resource in.
|
440
449
|
The value should not contain leading or trailing forward slashes.
|
441
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
450
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
442
451
|
*Available only for Vault Enterprise*.
|
443
452
|
"""
|
444
453
|
return pulumi.get(self, "namespace")
|