pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +22 -7
- pulumi_vault/ad/secret_backend.py +14 -144
- pulumi_vault/ad/secret_library.py +14 -11
- pulumi_vault/ad/secret_role.py +12 -11
- pulumi_vault/alicloud/auth_backend_role.py +74 -192
- pulumi_vault/approle/auth_backend_login.py +12 -11
- pulumi_vault/approle/auth_backend_role.py +75 -193
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
- pulumi_vault/audit.py +24 -27
- pulumi_vault/audit_request_header.py +11 -6
- pulumi_vault/auth_backend.py +64 -12
- pulumi_vault/aws/auth_backend_cert.py +12 -7
- pulumi_vault/aws/auth_backend_client.py +265 -24
- pulumi_vault/aws/auth_backend_config_identity.py +12 -11
- pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +75 -193
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
- pulumi_vault/aws/auth_backend_sts_role.py +12 -11
- pulumi_vault/aws/get_access_credentials.py +34 -7
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +75 -7
- pulumi_vault/aws/secret_backend_role.py +183 -11
- pulumi_vault/aws/secret_backend_static_role.py +14 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +151 -17
- pulumi_vault/azure/auth_backend_role.py +75 -193
- pulumi_vault/azure/backend.py +223 -29
- pulumi_vault/azure/backend_role.py +42 -41
- pulumi_vault/azure/get_access_credentials.py +39 -11
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -271
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +22 -25
- pulumi_vault/consul/secret_backend_role.py +14 -80
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +117 -114
- pulumi_vault/database/secret_backend_role.py +29 -24
- pulumi_vault/database/secret_backend_static_role.py +85 -15
- pulumi_vault/database/secrets_mount.py +425 -138
- pulumi_vault/egp_policy.py +16 -15
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +248 -35
- pulumi_vault/gcp/auth_backend_role.py +75 -271
- pulumi_vault/gcp/get_auth_backend_role.py +43 -9
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -16
- pulumi_vault/gcp/secret_impersonated_account.py +74 -17
- pulumi_vault/gcp/secret_roleset.py +29 -26
- pulumi_vault/gcp/secret_static_account.py +37 -34
- pulumi_vault/generic/endpoint.py +22 -21
- pulumi_vault/generic/get_secret.py +68 -12
- pulumi_vault/generic/secret.py +19 -14
- pulumi_vault/get_auth_backend.py +24 -11
- pulumi_vault/get_auth_backends.py +33 -11
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -15
- pulumi_vault/get_policy_document.py +34 -23
- pulumi_vault/get_raft_autopilot_state.py +29 -14
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +17 -16
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +14 -13
- pulumi_vault/github/user.py +14 -13
- pulumi_vault/identity/entity.py +18 -15
- pulumi_vault/identity/entity_alias.py +18 -15
- pulumi_vault/identity/entity_policies.py +24 -19
- pulumi_vault/identity/get_entity.py +40 -14
- pulumi_vault/identity/get_group.py +45 -13
- pulumi_vault/identity/get_oidc_client_creds.py +21 -11
- pulumi_vault/identity/get_oidc_openid_config.py +39 -13
- pulumi_vault/identity/get_oidc_public_keys.py +29 -14
- pulumi_vault/identity/group.py +50 -49
- pulumi_vault/identity/group_alias.py +14 -11
- pulumi_vault/identity/group_member_entity_ids.py +24 -74
- pulumi_vault/identity/group_member_group_ids.py +36 -27
- pulumi_vault/identity/group_policies.py +16 -15
- pulumi_vault/identity/mfa_duo.py +9 -8
- pulumi_vault/identity/mfa_login_enforcement.py +13 -8
- pulumi_vault/identity/mfa_okta.py +9 -8
- pulumi_vault/identity/mfa_pingid.py +5 -4
- pulumi_vault/identity/mfa_totp.py +5 -4
- pulumi_vault/identity/oidc.py +12 -11
- pulumi_vault/identity/oidc_assignment.py +22 -13
- pulumi_vault/identity/oidc_client.py +34 -25
- pulumi_vault/identity/oidc_key.py +28 -19
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
- pulumi_vault/identity/oidc_provider.py +34 -23
- pulumi_vault/identity/oidc_role.py +40 -27
- pulumi_vault/identity/oidc_scope.py +18 -15
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +39 -46
- pulumi_vault/jwt/auth_backend_role.py +131 -260
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +22 -21
- pulumi_vault/kmip/secret_role.py +12 -11
- pulumi_vault/kmip/secret_scope.py +12 -11
- pulumi_vault/kubernetes/auth_backend_config.py +55 -7
- pulumi_vault/kubernetes/auth_backend_role.py +68 -179
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -15
- pulumi_vault/kubernetes/secret_backend.py +314 -29
- pulumi_vault/kubernetes/secret_backend_role.py +135 -56
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +23 -12
- pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
- pulumi_vault/kv/get_secret_v2.py +89 -9
- pulumi_vault/kv/get_secrets_list.py +22 -15
- pulumi_vault/kv/get_secrets_list_v2.py +35 -19
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +19 -18
- pulumi_vault/kv/secret_backend_v2.py +12 -11
- pulumi_vault/kv/secret_v2.py +55 -52
- pulumi_vault/ldap/auth_backend.py +125 -168
- pulumi_vault/ldap/auth_backend_group.py +12 -11
- pulumi_vault/ldap/auth_backend_user.py +12 -11
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +352 -84
- pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
- pulumi_vault/ldap/secret_backend_library_set.py +14 -11
- pulumi_vault/ldap/secret_backend_static_role.py +67 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +27 -43
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +16 -13
- pulumi_vault/mfa_okta.py +16 -13
- pulumi_vault/mfa_pingid.py +16 -13
- pulumi_vault/mfa_totp.py +22 -19
- pulumi_vault/mongodbatlas/secret_backend.py +18 -17
- pulumi_vault/mongodbatlas/secret_role.py +41 -38
- pulumi_vault/mount.py +389 -65
- pulumi_vault/namespace.py +26 -21
- pulumi_vault/nomad_secret_backend.py +16 -15
- pulumi_vault/nomad_secret_role.py +12 -11
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +483 -41
- pulumi_vault/okta/auth_backend_group.py +12 -11
- pulumi_vault/okta/auth_backend_user.py +12 -11
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +18 -15
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
- pulumi_vault/pkisecret/get_backend_key.py +24 -13
- pulumi_vault/pkisecret/get_backend_keys.py +21 -12
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
- pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
- pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
- pulumi_vault/pkisecret/secret_backend_key.py +12 -7
- pulumi_vault/pkisecret/secret_backend_role.py +19 -16
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +12 -7
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +58 -8
- pulumi_vault/quota_rate_limit.py +54 -4
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +16 -15
- pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
- pulumi_vault/raft_autopilot.py +12 -11
- pulumi_vault/raft_snapshot_agent_config.py +121 -311
- pulumi_vault/rgp_policy.py +14 -13
- pulumi_vault/saml/auth_backend.py +20 -19
- pulumi_vault/saml/auth_backend_role.py +90 -199
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -75
- pulumi_vault/secrets/sync_aws_destination.py +240 -29
- pulumi_vault/secrets/sync_azure_destination.py +90 -33
- pulumi_vault/secrets/sync_config.py +7 -6
- pulumi_vault/secrets/sync_gcp_destination.py +156 -27
- pulumi_vault/secrets/sync_gh_destination.py +187 -15
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +72 -15
- pulumi_vault/ssh/_inputs.py +28 -32
- pulumi_vault/ssh/outputs.py +11 -32
- pulumi_vault/ssh/secret_backend_ca.py +106 -11
- pulumi_vault/ssh/secret_backend_role.py +83 -120
- pulumi_vault/terraformcloud/secret_backend.py +5 -56
- pulumi_vault/terraformcloud/secret_creds.py +14 -24
- pulumi_vault/terraformcloud/secret_role.py +14 -76
- pulumi_vault/token.py +26 -25
- pulumi_vault/tokenauth/auth_backend_role.py +76 -201
- pulumi_vault/transform/alphabet.py +16 -13
- pulumi_vault/transform/get_decode.py +45 -21
- pulumi_vault/transform/get_encode.py +45 -21
- pulumi_vault/transform/role.py +16 -13
- pulumi_vault/transform/template.py +30 -25
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -25
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +25 -97
- pulumi_vault/transit/secret_cache_config.py +12 -11
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
pulumi_vault/generic/endpoint.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['EndpointArgs', 'Endpoint']
|
@@ -46,7 +51,7 @@ class EndpointArgs:
|
|
46
51
|
many configuration endpoints. Defaults to false.
|
47
52
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
48
53
|
The value should not contain leading or trailing forward slashes.
|
49
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
54
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
50
55
|
*Available only for Vault Enterprise*.
|
51
56
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] write_fields: - (Optional). A list of fields that should be returned
|
52
57
|
in `write_data_json` and `write_data`. If omitted, data returned by
|
@@ -151,7 +156,7 @@ class EndpointArgs:
|
|
151
156
|
"""
|
152
157
|
The namespace to provision the resource in.
|
153
158
|
The value should not contain leading or trailing forward slashes.
|
154
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
159
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
155
160
|
*Available only for Vault Enterprise*.
|
156
161
|
"""
|
157
162
|
return pulumi.get(self, "namespace")
|
@@ -212,7 +217,7 @@ class _EndpointState:
|
|
212
217
|
many configuration endpoints. Defaults to false.
|
213
218
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
214
219
|
The value should not contain leading or trailing forward slashes.
|
215
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
220
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
216
221
|
*Available only for Vault Enterprise*.
|
217
222
|
:param pulumi.Input[str] path: The full logical path at which to write the given
|
218
223
|
data. Consult each backend's documentation to see which endpoints
|
@@ -319,7 +324,7 @@ class _EndpointState:
|
|
319
324
|
"""
|
320
325
|
The namespace to provision the resource in.
|
321
326
|
The value should not contain leading or trailing forward slashes.
|
322
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
327
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
323
328
|
*Available only for Vault Enterprise*.
|
324
329
|
"""
|
325
330
|
return pulumi.get(self, "namespace")
|
@@ -407,7 +412,6 @@ class Endpoint(pulumi.CustomResource):
|
|
407
412
|
"""
|
408
413
|
## Example Usage
|
409
414
|
|
410
|
-
<!--Start PulumiCodeChooser -->
|
411
415
|
```python
|
412
416
|
import pulumi
|
413
417
|
import pulumi_vault as vault
|
@@ -421,8 +425,8 @@ class Endpoint(pulumi.CustomResource):
|
|
421
425
|
"password": "changeme"
|
422
426
|
}
|
423
427
|
\"\"\",
|
424
|
-
opts=pulumi.ResourceOptions(depends_on=[userpass]))
|
425
|
-
u1_token = vault.generic.Endpoint("
|
428
|
+
opts = pulumi.ResourceOptions(depends_on=[userpass]))
|
429
|
+
u1_token = vault.generic.Endpoint("u1_token",
|
426
430
|
path="auth/userpass/login/u1",
|
427
431
|
disable_read=True,
|
428
432
|
disable_delete=True,
|
@@ -430,8 +434,8 @@ class Endpoint(pulumi.CustomResource):
|
|
430
434
|
"password": "changeme"
|
431
435
|
}
|
432
436
|
\"\"\",
|
433
|
-
opts=pulumi.ResourceOptions(depends_on=[u1]))
|
434
|
-
u1_entity = vault.generic.Endpoint("
|
437
|
+
opts = pulumi.ResourceOptions(depends_on=[u1]))
|
438
|
+
u1_entity = vault.generic.Endpoint("u1_entity",
|
435
439
|
disable_read=True,
|
436
440
|
disable_delete=True,
|
437
441
|
path="identity/lookup/entity",
|
@@ -442,10 +446,9 @@ class Endpoint(pulumi.CustomResource):
|
|
442
446
|
"alias_mount_accessor": vault_auth_backend.userpass.accessor
|
443
447
|
}
|
444
448
|
\"\"\",
|
445
|
-
opts=pulumi.ResourceOptions(depends_on=[u1_token]))
|
449
|
+
opts = pulumi.ResourceOptions(depends_on=[u1_token]))
|
446
450
|
pulumi.export("u1Id", u1_entity.write_data["id"])
|
447
451
|
```
|
448
|
-
<!--End PulumiCodeChooser -->
|
449
452
|
|
450
453
|
## Required Vault Capabilities
|
451
454
|
|
@@ -479,7 +482,7 @@ class Endpoint(pulumi.CustomResource):
|
|
479
482
|
many configuration endpoints. Defaults to false.
|
480
483
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
481
484
|
The value should not contain leading or trailing forward slashes.
|
482
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
485
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
483
486
|
*Available only for Vault Enterprise*.
|
484
487
|
:param pulumi.Input[str] path: The full logical path at which to write the given
|
485
488
|
data. Consult each backend's documentation to see which endpoints
|
@@ -502,7 +505,6 @@ class Endpoint(pulumi.CustomResource):
|
|
502
505
|
"""
|
503
506
|
## Example Usage
|
504
507
|
|
505
|
-
<!--Start PulumiCodeChooser -->
|
506
508
|
```python
|
507
509
|
import pulumi
|
508
510
|
import pulumi_vault as vault
|
@@ -516,8 +518,8 @@ class Endpoint(pulumi.CustomResource):
|
|
516
518
|
"password": "changeme"
|
517
519
|
}
|
518
520
|
\"\"\",
|
519
|
-
opts=pulumi.ResourceOptions(depends_on=[userpass]))
|
520
|
-
u1_token = vault.generic.Endpoint("
|
521
|
+
opts = pulumi.ResourceOptions(depends_on=[userpass]))
|
522
|
+
u1_token = vault.generic.Endpoint("u1_token",
|
521
523
|
path="auth/userpass/login/u1",
|
522
524
|
disable_read=True,
|
523
525
|
disable_delete=True,
|
@@ -525,8 +527,8 @@ class Endpoint(pulumi.CustomResource):
|
|
525
527
|
"password": "changeme"
|
526
528
|
}
|
527
529
|
\"\"\",
|
528
|
-
opts=pulumi.ResourceOptions(depends_on=[u1]))
|
529
|
-
u1_entity = vault.generic.Endpoint("
|
530
|
+
opts = pulumi.ResourceOptions(depends_on=[u1]))
|
531
|
+
u1_entity = vault.generic.Endpoint("u1_entity",
|
530
532
|
disable_read=True,
|
531
533
|
disable_delete=True,
|
532
534
|
path="identity/lookup/entity",
|
@@ -537,10 +539,9 @@ class Endpoint(pulumi.CustomResource):
|
|
537
539
|
"alias_mount_accessor": vault_auth_backend.userpass.accessor
|
538
540
|
}
|
539
541
|
\"\"\",
|
540
|
-
opts=pulumi.ResourceOptions(depends_on=[u1_token]))
|
542
|
+
opts = pulumi.ResourceOptions(depends_on=[u1_token]))
|
541
543
|
pulumi.export("u1Id", u1_entity.write_data["id"])
|
542
544
|
```
|
543
|
-
<!--End PulumiCodeChooser -->
|
544
545
|
|
545
546
|
## Required Vault Capabilities
|
546
547
|
|
@@ -644,7 +645,7 @@ class Endpoint(pulumi.CustomResource):
|
|
644
645
|
many configuration endpoints. Defaults to false.
|
645
646
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
646
647
|
The value should not contain leading or trailing forward slashes.
|
647
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
648
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
648
649
|
*Available only for Vault Enterprise*.
|
649
650
|
:param pulumi.Input[str] path: The full logical path at which to write the given
|
650
651
|
data. Consult each backend's documentation to see which endpoints
|
@@ -731,7 +732,7 @@ class Endpoint(pulumi.CustomResource):
|
|
731
732
|
"""
|
732
733
|
The namespace to provision the resource in.
|
733
734
|
The value should not contain leading or trailing forward slashes.
|
734
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
735
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
735
736
|
*Available only for Vault Enterprise*.
|
736
737
|
"""
|
737
738
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -58,7 +63,7 @@ class GetSecretResult:
|
|
58
63
|
|
59
64
|
@property
|
60
65
|
@pulumi.getter
|
61
|
-
def data(self) -> Mapping[str,
|
66
|
+
def data(self) -> Mapping[str, str]:
|
62
67
|
"""
|
63
68
|
A mapping whose keys are the top-level data keys returned from
|
64
69
|
Vault and whose values are the corresponding values. This map can only
|
@@ -162,19 +167,37 @@ def get_secret(namespace: Optional[str] = None,
|
|
162
167
|
|
163
168
|
### Generic secret
|
164
169
|
|
165
|
-
<!--Start PulumiCodeChooser -->
|
166
170
|
```python
|
167
171
|
import pulumi
|
168
172
|
import pulumi_vault as vault
|
169
173
|
|
170
174
|
rundeck_auth = vault.generic.get_secret(path="secret/rundeck_auth")
|
171
175
|
```
|
172
|
-
|
176
|
+
|
177
|
+
### KV
|
178
|
+
|
179
|
+
For this example, consider `example` as a path for a KV engine.
|
180
|
+
|
181
|
+
```python
|
182
|
+
import pulumi
|
183
|
+
import pulumi_vault as vault
|
184
|
+
|
185
|
+
|
186
|
+
def not_implemented(msg):
|
187
|
+
raise NotImplementedError(msg)
|
188
|
+
|
189
|
+
example_creds = vault.generic.get_secret(path="example/creds")
|
190
|
+
example_template = not_implemented("The template_file data resource is not yet supported.")
|
191
|
+
```
|
192
|
+
|
193
|
+
## Required Vault Capabilities
|
194
|
+
|
195
|
+
Use of this resource requires the `read` capability on the given path.
|
173
196
|
|
174
197
|
|
175
198
|
:param str namespace: The namespace of the target resource.
|
176
199
|
The value should not contain leading or trailing forward slashes.
|
177
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
200
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
178
201
|
*Available only for Vault Enterprise*.
|
179
202
|
:param str path: The full logical path from which to request data.
|
180
203
|
To read data from the "generic" secret backend mounted in Vault by
|
@@ -208,32 +231,47 @@ def get_secret(namespace: Optional[str] = None,
|
|
208
231
|
path=pulumi.get(__ret__, 'path'),
|
209
232
|
version=pulumi.get(__ret__, 'version'),
|
210
233
|
with_lease_start_time=pulumi.get(__ret__, 'with_lease_start_time'))
|
211
|
-
|
212
|
-
|
213
|
-
@_utilities.lift_output_func(get_secret)
|
214
234
|
def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
215
235
|
path: Optional[pulumi.Input[str]] = None,
|
216
236
|
version: Optional[pulumi.Input[Optional[int]]] = None,
|
217
237
|
with_lease_start_time: Optional[pulumi.Input[Optional[bool]]] = None,
|
218
|
-
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecretResult]:
|
238
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretResult]:
|
219
239
|
"""
|
220
240
|
## Example Usage
|
221
241
|
|
222
242
|
### Generic secret
|
223
243
|
|
224
|
-
<!--Start PulumiCodeChooser -->
|
225
244
|
```python
|
226
245
|
import pulumi
|
227
246
|
import pulumi_vault as vault
|
228
247
|
|
229
248
|
rundeck_auth = vault.generic.get_secret(path="secret/rundeck_auth")
|
230
249
|
```
|
231
|
-
|
250
|
+
|
251
|
+
### KV
|
252
|
+
|
253
|
+
For this example, consider `example` as a path for a KV engine.
|
254
|
+
|
255
|
+
```python
|
256
|
+
import pulumi
|
257
|
+
import pulumi_vault as vault
|
258
|
+
|
259
|
+
|
260
|
+
def not_implemented(msg):
|
261
|
+
raise NotImplementedError(msg)
|
262
|
+
|
263
|
+
example_creds = vault.generic.get_secret(path="example/creds")
|
264
|
+
example_template = not_implemented("The template_file data resource is not yet supported.")
|
265
|
+
```
|
266
|
+
|
267
|
+
## Required Vault Capabilities
|
268
|
+
|
269
|
+
Use of this resource requires the `read` capability on the given path.
|
232
270
|
|
233
271
|
|
234
272
|
:param str namespace: The namespace of the target resource.
|
235
273
|
The value should not contain leading or trailing forward slashes.
|
236
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
274
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
237
275
|
*Available only for Vault Enterprise*.
|
238
276
|
:param str path: The full logical path from which to request data.
|
239
277
|
To read data from the "generic" secret backend mounted in Vault by
|
@@ -247,4 +285,22 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
|
247
285
|
Note that storing the `lease_start_time` in the TF state will cause a persistent drift
|
248
286
|
on every `pulumi preview` and will require a `pulumi up`.
|
249
287
|
"""
|
250
|
-
|
288
|
+
__args__ = dict()
|
289
|
+
__args__['namespace'] = namespace
|
290
|
+
__args__['path'] = path
|
291
|
+
__args__['version'] = version
|
292
|
+
__args__['withLeaseStartTime'] = with_lease_start_time
|
293
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
294
|
+
__ret__ = pulumi.runtime.invoke_output('vault:generic/getSecret:getSecret', __args__, opts=opts, typ=GetSecretResult)
|
295
|
+
return __ret__.apply(lambda __response__: GetSecretResult(
|
296
|
+
data=pulumi.get(__response__, 'data'),
|
297
|
+
data_json=pulumi.get(__response__, 'data_json'),
|
298
|
+
id=pulumi.get(__response__, 'id'),
|
299
|
+
lease_duration=pulumi.get(__response__, 'lease_duration'),
|
300
|
+
lease_id=pulumi.get(__response__, 'lease_id'),
|
301
|
+
lease_renewable=pulumi.get(__response__, 'lease_renewable'),
|
302
|
+
lease_start_time=pulumi.get(__response__, 'lease_start_time'),
|
303
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
304
|
+
path=pulumi.get(__response__, 'path'),
|
305
|
+
version=pulumi.get(__response__, 'version'),
|
306
|
+
with_lease_start_time=pulumi.get(__response__, 'with_lease_start_time')))
|
pulumi_vault/generic/secret.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretArgs', 'Secret']
|
@@ -37,7 +42,7 @@ class SecretArgs:
|
|
37
42
|
break drift detection. Defaults to false.
|
38
43
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
39
44
|
The value should not contain leading or trailing forward slashes.
|
40
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
45
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
41
46
|
*Available only for Vault Enterprise*.
|
42
47
|
"""
|
43
48
|
pulumi.set(__self__, "data_json", data_json)
|
@@ -113,7 +118,7 @@ class SecretArgs:
|
|
113
118
|
"""
|
114
119
|
The namespace to provision the resource in.
|
115
120
|
The value should not contain leading or trailing forward slashes.
|
116
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
121
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
117
122
|
*Available only for Vault Enterprise*.
|
118
123
|
"""
|
119
124
|
return pulumi.get(self, "namespace")
|
@@ -126,7 +131,7 @@ class SecretArgs:
|
|
126
131
|
@pulumi.input_type
|
127
132
|
class _SecretState:
|
128
133
|
def __init__(__self__, *,
|
129
|
-
data: Optional[pulumi.Input[Mapping[str,
|
134
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
130
135
|
data_json: Optional[pulumi.Input[str]] = None,
|
131
136
|
delete_all_versions: Optional[pulumi.Input[bool]] = None,
|
132
137
|
disable_read: Optional[pulumi.Input[bool]] = None,
|
@@ -134,7 +139,7 @@ class _SecretState:
|
|
134
139
|
path: Optional[pulumi.Input[str]] = None):
|
135
140
|
"""
|
136
141
|
Input properties used for looking up and filtering Secret resources.
|
137
|
-
:param pulumi.Input[Mapping[str,
|
142
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
|
138
143
|
Vault and whose values are the corresponding values. This map can only
|
139
144
|
represent string data, so any non-string values returned from Vault are
|
140
145
|
serialized as JSON.
|
@@ -149,7 +154,7 @@ class _SecretState:
|
|
149
154
|
break drift detection. Defaults to false.
|
150
155
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
151
156
|
The value should not contain leading or trailing forward slashes.
|
152
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
157
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
153
158
|
*Available only for Vault Enterprise*.
|
154
159
|
:param pulumi.Input[str] path: The full logical path at which to write the given data.
|
155
160
|
To write data into the "generic" secret backend mounted in Vault by default,
|
@@ -172,7 +177,7 @@ class _SecretState:
|
|
172
177
|
|
173
178
|
@property
|
174
179
|
@pulumi.getter
|
175
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
180
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
176
181
|
"""
|
177
182
|
A mapping whose keys are the top-level data keys returned from
|
178
183
|
Vault and whose values are the corresponding values. This map can only
|
@@ -182,7 +187,7 @@ class _SecretState:
|
|
182
187
|
return pulumi.get(self, "data")
|
183
188
|
|
184
189
|
@data.setter
|
185
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
190
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
186
191
|
pulumi.set(self, "data", value)
|
187
192
|
|
188
193
|
@property
|
@@ -233,7 +238,7 @@ class _SecretState:
|
|
233
238
|
"""
|
234
239
|
The namespace to provision the resource in.
|
235
240
|
The value should not contain leading or trailing forward slashes.
|
236
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
241
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
237
242
|
*Available only for Vault Enterprise*.
|
238
243
|
"""
|
239
244
|
return pulumi.get(self, "namespace")
|
@@ -292,7 +297,7 @@ class Secret(pulumi.CustomResource):
|
|
292
297
|
break drift detection. Defaults to false.
|
293
298
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
294
299
|
The value should not contain leading or trailing forward slashes.
|
295
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
300
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
296
301
|
*Available only for Vault Enterprise*.
|
297
302
|
:param pulumi.Input[str] path: The full logical path at which to write the given data.
|
298
303
|
To write data into the "generic" secret backend mounted in Vault by default,
|
@@ -366,7 +371,7 @@ class Secret(pulumi.CustomResource):
|
|
366
371
|
def get(resource_name: str,
|
367
372
|
id: pulumi.Input[str],
|
368
373
|
opts: Optional[pulumi.ResourceOptions] = None,
|
369
|
-
data: Optional[pulumi.Input[Mapping[str,
|
374
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
370
375
|
data_json: Optional[pulumi.Input[str]] = None,
|
371
376
|
delete_all_versions: Optional[pulumi.Input[bool]] = None,
|
372
377
|
disable_read: Optional[pulumi.Input[bool]] = None,
|
@@ -379,7 +384,7 @@ class Secret(pulumi.CustomResource):
|
|
379
384
|
:param str resource_name: The unique name of the resulting resource.
|
380
385
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
381
386
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
382
|
-
:param pulumi.Input[Mapping[str,
|
387
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
|
383
388
|
Vault and whose values are the corresponding values. This map can only
|
384
389
|
represent string data, so any non-string values returned from Vault are
|
385
390
|
serialized as JSON.
|
@@ -394,7 +399,7 @@ class Secret(pulumi.CustomResource):
|
|
394
399
|
break drift detection. Defaults to false.
|
395
400
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
396
401
|
The value should not contain leading or trailing forward slashes.
|
397
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
402
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
398
403
|
*Available only for Vault Enterprise*.
|
399
404
|
:param pulumi.Input[str] path: The full logical path at which to write the given data.
|
400
405
|
To write data into the "generic" secret backend mounted in Vault by default,
|
@@ -416,7 +421,7 @@ class Secret(pulumi.CustomResource):
|
|
416
421
|
|
417
422
|
@property
|
418
423
|
@pulumi.getter
|
419
|
-
def data(self) -> pulumi.Output[Mapping[str,
|
424
|
+
def data(self) -> pulumi.Output[Mapping[str, str]]:
|
420
425
|
"""
|
421
426
|
A mapping whose keys are the top-level data keys returned from
|
422
427
|
Vault and whose values are the corresponding values. This map can only
|
@@ -461,7 +466,7 @@ class Secret(pulumi.CustomResource):
|
|
461
466
|
"""
|
462
467
|
The namespace to provision the resource in.
|
463
468
|
The value should not contain leading or trailing forward slashes.
|
464
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
469
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
465
470
|
*Available only for Vault Enterprise*.
|
466
471
|
"""
|
467
472
|
return pulumi.get(self, "namespace")
|
pulumi_vault/get_auth_backend.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -152,19 +157,17 @@ def get_auth_backend(namespace: Optional[str] = None,
|
|
152
157
|
"""
|
153
158
|
## Example Usage
|
154
159
|
|
155
|
-
<!--Start PulumiCodeChooser -->
|
156
160
|
```python
|
157
161
|
import pulumi
|
158
162
|
import pulumi_vault as vault
|
159
163
|
|
160
164
|
example = vault.get_auth_backend(path="userpass")
|
161
165
|
```
|
162
|
-
<!--End PulumiCodeChooser -->
|
163
166
|
|
164
167
|
|
165
168
|
:param str namespace: The namespace of the target resource.
|
166
169
|
The value should not contain leading or trailing forward slashes.
|
167
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
170
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
168
171
|
*Available only for Vault Enterprise*.
|
169
172
|
:param str path: The auth backend mount point.
|
170
173
|
"""
|
@@ -185,29 +188,39 @@ def get_auth_backend(namespace: Optional[str] = None,
|
|
185
188
|
namespace=pulumi.get(__ret__, 'namespace'),
|
186
189
|
path=pulumi.get(__ret__, 'path'),
|
187
190
|
type=pulumi.get(__ret__, 'type'))
|
188
|
-
|
189
|
-
|
190
|
-
@_utilities.lift_output_func(get_auth_backend)
|
191
191
|
def get_auth_backend_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
192
192
|
path: Optional[pulumi.Input[str]] = None,
|
193
|
-
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendResult]:
|
193
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAuthBackendResult]:
|
194
194
|
"""
|
195
195
|
## Example Usage
|
196
196
|
|
197
|
-
<!--Start PulumiCodeChooser -->
|
198
197
|
```python
|
199
198
|
import pulumi
|
200
199
|
import pulumi_vault as vault
|
201
200
|
|
202
201
|
example = vault.get_auth_backend(path="userpass")
|
203
202
|
```
|
204
|
-
<!--End PulumiCodeChooser -->
|
205
203
|
|
206
204
|
|
207
205
|
:param str namespace: The namespace of the target resource.
|
208
206
|
The value should not contain leading or trailing forward slashes.
|
209
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
207
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
210
208
|
*Available only for Vault Enterprise*.
|
211
209
|
:param str path: The auth backend mount point.
|
212
210
|
"""
|
213
|
-
|
211
|
+
__args__ = dict()
|
212
|
+
__args__['namespace'] = namespace
|
213
|
+
__args__['path'] = path
|
214
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
215
|
+
__ret__ = pulumi.runtime.invoke_output('vault:index/getAuthBackend:getAuthBackend', __args__, opts=opts, typ=GetAuthBackendResult)
|
216
|
+
return __ret__.apply(lambda __response__: GetAuthBackendResult(
|
217
|
+
accessor=pulumi.get(__response__, 'accessor'),
|
218
|
+
default_lease_ttl_seconds=pulumi.get(__response__, 'default_lease_ttl_seconds'),
|
219
|
+
description=pulumi.get(__response__, 'description'),
|
220
|
+
id=pulumi.get(__response__, 'id'),
|
221
|
+
listing_visibility=pulumi.get(__response__, 'listing_visibility'),
|
222
|
+
local=pulumi.get(__response__, 'local'),
|
223
|
+
max_lease_ttl_seconds=pulumi.get(__response__, 'max_lease_ttl_seconds'),
|
224
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
225
|
+
path=pulumi.get(__response__, 'path'),
|
226
|
+
type=pulumi.get(__response__, 'type')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -92,19 +97,24 @@ def get_auth_backends(namespace: Optional[str] = None,
|
|
92
97
|
"""
|
93
98
|
## Example Usage
|
94
99
|
|
95
|
-
<!--Start PulumiCodeChooser -->
|
96
100
|
```python
|
97
101
|
import pulumi
|
98
102
|
import pulumi_vault as vault
|
99
103
|
|
100
104
|
example = vault.get_auth_backends()
|
101
105
|
```
|
102
|
-
|
106
|
+
|
107
|
+
```python
|
108
|
+
import pulumi
|
109
|
+
import pulumi_vault as vault
|
110
|
+
|
111
|
+
example_filter = vault.get_auth_backends(type="kubernetes")
|
112
|
+
```
|
103
113
|
|
104
114
|
|
105
115
|
:param str namespace: The namespace of the target resource.
|
106
116
|
The value should not contain leading or trailing forward slashes.
|
107
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
117
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
108
118
|
*Available only for Vault Enterprise*.
|
109
119
|
:param str type: The name of the auth method type. Allows filtering of backends returned by type.
|
110
120
|
"""
|
@@ -120,29 +130,41 @@ def get_auth_backends(namespace: Optional[str] = None,
|
|
120
130
|
namespace=pulumi.get(__ret__, 'namespace'),
|
121
131
|
paths=pulumi.get(__ret__, 'paths'),
|
122
132
|
type=pulumi.get(__ret__, 'type'))
|
123
|
-
|
124
|
-
|
125
|
-
@_utilities.lift_output_func(get_auth_backends)
|
126
133
|
def get_auth_backends_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
127
134
|
type: Optional[pulumi.Input[Optional[str]]] = None,
|
128
|
-
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendsResult]:
|
135
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAuthBackendsResult]:
|
129
136
|
"""
|
130
137
|
## Example Usage
|
131
138
|
|
132
|
-
<!--Start PulumiCodeChooser -->
|
133
139
|
```python
|
134
140
|
import pulumi
|
135
141
|
import pulumi_vault as vault
|
136
142
|
|
137
143
|
example = vault.get_auth_backends()
|
138
144
|
```
|
139
|
-
|
145
|
+
|
146
|
+
```python
|
147
|
+
import pulumi
|
148
|
+
import pulumi_vault as vault
|
149
|
+
|
150
|
+
example_filter = vault.get_auth_backends(type="kubernetes")
|
151
|
+
```
|
140
152
|
|
141
153
|
|
142
154
|
:param str namespace: The namespace of the target resource.
|
143
155
|
The value should not contain leading or trailing forward slashes.
|
144
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
156
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
145
157
|
*Available only for Vault Enterprise*.
|
146
158
|
:param str type: The name of the auth method type. Allows filtering of backends returned by type.
|
147
159
|
"""
|
148
|
-
|
160
|
+
__args__ = dict()
|
161
|
+
__args__['namespace'] = namespace
|
162
|
+
__args__['type'] = type
|
163
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
164
|
+
__ret__ = pulumi.runtime.invoke_output('vault:index/getAuthBackends:getAuthBackends', __args__, opts=opts, typ=GetAuthBackendsResult)
|
165
|
+
return __ret__.apply(lambda __response__: GetAuthBackendsResult(
|
166
|
+
accessors=pulumi.get(__response__, 'accessors'),
|
167
|
+
id=pulumi.get(__response__, 'id'),
|
168
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
169
|
+
paths=pulumi.get(__response__, 'paths'),
|
170
|
+
type=pulumi.get(__response__, 'type')))
|