pulumi-vault 6.2.0a1713561465__py3-none-any.whl → 6.2.0a1714114277__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -20
- pulumi_vault/ad/secret_backend.py +0 -4
- pulumi_vault/ad/secret_library.py +0 -4
- pulumi_vault/ad/secret_role.py +0 -4
- pulumi_vault/alicloud/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_login.py +0 -4
- pulumi_vault/approle/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
- pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
- pulumi_vault/audit.py +0 -8
- pulumi_vault/audit_request_header.py +0 -4
- pulumi_vault/aws/auth_backend_client.py +0 -4
- pulumi_vault/aws/auth_backend_config_identity.py +0 -4
- pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -4
- pulumi_vault/aws/auth_backend_role.py +63 -186
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -4
- pulumi_vault/aws/auth_backend_sts_role.py +0 -4
- pulumi_vault/aws/secret_backend_role.py +0 -4
- pulumi_vault/aws/secret_backend_static_role.py +0 -4
- pulumi_vault/azure/auth_backend_config.py +0 -4
- pulumi_vault/azure/auth_backend_role.py +63 -186
- pulumi_vault/azure/backend.py +0 -8
- pulumi_vault/azure/backend_role.py +0 -4
- pulumi_vault/azure/get_access_credentials.py +0 -4
- pulumi_vault/cert_auth_backend_role.py +63 -200
- pulumi_vault/consul/secret_backend.py +0 -8
- pulumi_vault/consul/secret_backend_role.py +0 -4
- pulumi_vault/database/_inputs.py +522 -784
- pulumi_vault/database/outputs.py +522 -784
- pulumi_vault/database/secret_backend_connection.py +0 -4
- pulumi_vault/database/secret_backend_role.py +0 -4
- pulumi_vault/database/secret_backend_static_role.py +0 -4
- pulumi_vault/database/secrets_mount.py +0 -4
- pulumi_vault/egp_policy.py +0 -4
- pulumi_vault/gcp/auth_backend_role.py +63 -264
- pulumi_vault/gcp/get_auth_backend_role.py +0 -4
- pulumi_vault/gcp/secret_backend.py +0 -4
- pulumi_vault/gcp/secret_impersonated_account.py +0 -4
- pulumi_vault/gcp/secret_roleset.py +0 -4
- pulumi_vault/gcp/secret_static_account.py +0 -4
- pulumi_vault/generic/endpoint.py +0 -4
- pulumi_vault/generic/get_secret.py +0 -8
- pulumi_vault/get_auth_backend.py +0 -4
- pulumi_vault/get_auth_backends.py +0 -8
- pulumi_vault/get_namespace.py +0 -12
- pulumi_vault/get_namespaces.py +0 -8
- pulumi_vault/get_nomad_access_token.py +0 -4
- pulumi_vault/get_policy_document.py +0 -4
- pulumi_vault/get_raft_autopilot_state.py +0 -4
- pulumi_vault/github/auth_backend.py +0 -4
- pulumi_vault/github/team.py +0 -4
- pulumi_vault/github/user.py +0 -4
- pulumi_vault/identity/entity.py +0 -4
- pulumi_vault/identity/entity_alias.py +0 -4
- pulumi_vault/identity/entity_policies.py +0 -8
- pulumi_vault/identity/get_entity.py +0 -4
- pulumi_vault/identity/get_group.py +0 -4
- pulumi_vault/identity/get_oidc_client_creds.py +0 -4
- pulumi_vault/identity/get_oidc_openid_config.py +0 -4
- pulumi_vault/identity/get_oidc_public_keys.py +0 -4
- pulumi_vault/identity/group.py +0 -12
- pulumi_vault/identity/group_alias.py +0 -4
- pulumi_vault/identity/group_member_entity_ids.py +0 -8
- pulumi_vault/identity/group_member_group_ids.py +0 -8
- pulumi_vault/identity/group_policies.py +0 -8
- pulumi_vault/identity/mfa_duo.py +0 -4
- pulumi_vault/identity/mfa_login_enforcement.py +0 -4
- pulumi_vault/identity/mfa_okta.py +0 -4
- pulumi_vault/identity/mfa_pingid.py +0 -4
- pulumi_vault/identity/mfa_totp.py +0 -4
- pulumi_vault/identity/oidc.py +0 -4
- pulumi_vault/identity/oidc_assignment.py +0 -4
- pulumi_vault/identity/oidc_client.py +0 -4
- pulumi_vault/identity/oidc_key.py +0 -4
- pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -4
- pulumi_vault/identity/oidc_provider.py +0 -4
- pulumi_vault/identity/oidc_role.py +0 -8
- pulumi_vault/identity/oidc_scope.py +0 -4
- pulumi_vault/jwt/auth_backend.py +0 -12
- pulumi_vault/jwt/auth_backend_role.py +63 -190
- pulumi_vault/kmip/secret_backend.py +0 -4
- pulumi_vault/kmip/secret_role.py +0 -4
- pulumi_vault/kmip/secret_scope.py +0 -4
- pulumi_vault/kubernetes/auth_backend_config.py +0 -4
- pulumi_vault/kubernetes/auth_backend_role.py +56 -172
- pulumi_vault/kubernetes/get_service_account_token.py +0 -4
- pulumi_vault/kubernetes/secret_backend.py +0 -4
- pulumi_vault/kubernetes/secret_backend_role.py +0 -12
- pulumi_vault/kv/get_secret.py +0 -4
- pulumi_vault/kv/get_secret_subkeys_v2.py +0 -4
- pulumi_vault/kv/get_secret_v2.py +0 -4
- pulumi_vault/kv/get_secrets_list.py +0 -4
- pulumi_vault/kv/get_secrets_list_v2.py +0 -4
- pulumi_vault/kv/secret.py +0 -4
- pulumi_vault/kv/secret_backend_v2.py +0 -4
- pulumi_vault/kv/secret_v2.py +0 -4
- pulumi_vault/ldap/auth_backend.py +56 -151
- pulumi_vault/ldap/auth_backend_group.py +0 -4
- pulumi_vault/ldap/auth_backend_user.py +0 -4
- pulumi_vault/ldap/secret_backend.py +0 -4
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
- pulumi_vault/ldap/secret_backend_library_set.py +0 -4
- pulumi_vault/ldap/secret_backend_static_role.py +0 -4
- pulumi_vault/managed/_inputs.py +84 -132
- pulumi_vault/managed/keys.py +7 -28
- pulumi_vault/managed/outputs.py +84 -132
- pulumi_vault/mfa_duo.py +0 -4
- pulumi_vault/mfa_okta.py +0 -4
- pulumi_vault/mfa_pingid.py +0 -4
- pulumi_vault/mfa_totp.py +0 -4
- pulumi_vault/mongodbatlas/secret_backend.py +0 -4
- pulumi_vault/mongodbatlas/secret_role.py +0 -4
- pulumi_vault/mount.py +0 -16
- pulumi_vault/nomad_secret_backend.py +0 -4
- pulumi_vault/nomad_secret_role.py +0 -4
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +0 -4
- pulumi_vault/okta/auth_backend_group.py +0 -4
- pulumi_vault/okta/auth_backend_user.py +0 -4
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +0 -20
- pulumi_vault/password_policy.py +0 -4
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
- pulumi_vault/pkisecret/get_backend_key.py +0 -4
- pulumi_vault/pkisecret/get_backend_keys.py +0 -4
- pulumi_vault/pkisecret/secret_backend_cert.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -4
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/secret_backend_role.py +0 -4
- pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -4
- pulumi_vault/pkisecret/secret_backend_sign.py +0 -4
- pulumi_vault/quota_lease_count.py +0 -4
- pulumi_vault/quota_rate_limit.py +0 -4
- pulumi_vault/rabbitmq/secret_backend.py +0 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +0 -4
- pulumi_vault/raft_autopilot.py +0 -4
- pulumi_vault/raft_snapshot_agent_config.py +91 -292
- pulumi_vault/rgp_policy.py +0 -4
- pulumi_vault/saml/auth_backend.py +0 -4
- pulumi_vault/saml/auth_backend_role.py +56 -172
- pulumi_vault/secrets/sync_association.py +0 -4
- pulumi_vault/secrets/sync_aws_destination.py +0 -4
- pulumi_vault/secrets/sync_azure_destination.py +0 -4
- pulumi_vault/secrets/sync_config.py +0 -4
- pulumi_vault/secrets/sync_gcp_destination.py +0 -4
- pulumi_vault/secrets/sync_gh_destination.py +0 -4
- pulumi_vault/secrets/sync_github_apps.py +0 -4
- pulumi_vault/secrets/sync_vercel_destination.py +0 -4
- pulumi_vault/ssh/_inputs.py +6 -20
- pulumi_vault/ssh/outputs.py +6 -20
- pulumi_vault/ssh/secret_backend_ca.py +0 -4
- pulumi_vault/ssh/secret_backend_role.py +0 -4
- pulumi_vault/terraformcloud/secret_backend.py +0 -4
- pulumi_vault/terraformcloud/secret_creds.py +0 -4
- pulumi_vault/terraformcloud/secret_role.py +0 -4
- pulumi_vault/token.py +0 -4
- pulumi_vault/tokenauth/auth_backend_role.py +56 -172
- pulumi_vault/transform/alphabet.py +0 -4
- pulumi_vault/transform/get_decode.py +0 -4
- pulumi_vault/transform/get_encode.py +0 -4
- pulumi_vault/transform/role.py +0 -4
- pulumi_vault/transform/template.py +0 -4
- pulumi_vault/transit/get_decrypt.py +0 -16
- pulumi_vault/transit/get_encrypt.py +0 -14
- pulumi_vault/transit/secret_backend_key.py +0 -4
- pulumi_vault/transit/secret_cache_config.py +0 -4
- {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1714114277.dist-info/RECORD +252 -0
- pulumi_vault-6.2.0a1713561465.dist-info/RECORD +0 -252
- {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/top_level.txt +0 -0
@@ -47,31 +47,15 @@ class AuthBackendRoleArgs:
|
|
47
47
|
The value should not contain leading or trailing forward slashes.
|
48
48
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
49
49
|
*Available only for Vault Enterprise*.
|
50
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
51
|
-
|
52
|
-
|
53
|
-
:param pulumi.Input[
|
54
|
-
|
55
|
-
|
56
|
-
|
57
|
-
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
58
|
-
Its current value will be referenced at renewal time.
|
59
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
60
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
61
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/kubernetes#token_num_uses)
|
62
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
63
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
64
|
-
token generated using this role should never expire. The token should be renewed within the
|
65
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
66
|
-
value of this field. Specified in seconds.
|
67
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
68
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
50
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
51
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
52
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
53
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
54
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
55
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
56
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
69
57
|
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
70
|
-
:param pulumi.Input[str] token_type: The type of token
|
71
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
72
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
73
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
74
|
-
requests a different type at generation time.
|
58
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
75
59
|
"""
|
76
60
|
pulumi.set(__self__, "bound_service_account_names", bound_service_account_names)
|
77
61
|
pulumi.set(__self__, "bound_service_account_namespaces", bound_service_account_namespaces)
|
@@ -199,9 +183,7 @@ class AuthBackendRoleArgs:
|
|
199
183
|
@pulumi.getter(name="tokenBoundCidrs")
|
200
184
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
201
185
|
"""
|
202
|
-
|
203
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
204
|
-
as well.
|
186
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
205
187
|
"""
|
206
188
|
return pulumi.get(self, "token_bound_cidrs")
|
207
189
|
|
@@ -213,10 +195,7 @@ class AuthBackendRoleArgs:
|
|
213
195
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
214
196
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
215
197
|
"""
|
216
|
-
|
217
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
218
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
219
|
-
`token_max_ttl` would otherwise allow a renewal.
|
198
|
+
Generated Token's Explicit Maximum TTL in seconds
|
220
199
|
"""
|
221
200
|
return pulumi.get(self, "token_explicit_max_ttl")
|
222
201
|
|
@@ -228,8 +207,7 @@ class AuthBackendRoleArgs:
|
|
228
207
|
@pulumi.getter(name="tokenMaxTtl")
|
229
208
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
230
209
|
"""
|
231
|
-
The maximum lifetime
|
232
|
-
Its current value will be referenced at renewal time.
|
210
|
+
The maximum lifetime of the generated token
|
233
211
|
"""
|
234
212
|
return pulumi.get(self, "token_max_ttl")
|
235
213
|
|
@@ -241,8 +219,7 @@ class AuthBackendRoleArgs:
|
|
241
219
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
242
220
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
243
221
|
"""
|
244
|
-
If
|
245
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
222
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
246
223
|
"""
|
247
224
|
return pulumi.get(self, "token_no_default_policy")
|
248
225
|
|
@@ -254,8 +231,7 @@ class AuthBackendRoleArgs:
|
|
254
231
|
@pulumi.getter(name="tokenNumUses")
|
255
232
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
256
233
|
"""
|
257
|
-
The
|
258
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
234
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
259
235
|
"""
|
260
236
|
return pulumi.get(self, "token_num_uses")
|
261
237
|
|
@@ -267,10 +243,7 @@ class AuthBackendRoleArgs:
|
|
267
243
|
@pulumi.getter(name="tokenPeriod")
|
268
244
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
269
245
|
"""
|
270
|
-
|
271
|
-
token generated using this role should never expire. The token should be renewed within the
|
272
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
273
|
-
value of this field. Specified in seconds.
|
246
|
+
Generated Token's Period
|
274
247
|
"""
|
275
248
|
return pulumi.get(self, "token_period")
|
276
249
|
|
@@ -282,8 +255,7 @@ class AuthBackendRoleArgs:
|
|
282
255
|
@pulumi.getter(name="tokenPolicies")
|
283
256
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
284
257
|
"""
|
285
|
-
|
286
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
258
|
+
Generated Token's Policies
|
287
259
|
"""
|
288
260
|
return pulumi.get(self, "token_policies")
|
289
261
|
|
@@ -307,11 +279,7 @@ class AuthBackendRoleArgs:
|
|
307
279
|
@pulumi.getter(name="tokenType")
|
308
280
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
309
281
|
"""
|
310
|
-
The type of token
|
311
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
312
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
313
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
314
|
-
requests a different type at generation time.
|
282
|
+
The type of token to generate, service or batch
|
315
283
|
"""
|
316
284
|
return pulumi.get(self, "token_type")
|
317
285
|
|
@@ -356,31 +324,15 @@ class _AuthBackendRoleState:
|
|
356
324
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
357
325
|
*Available only for Vault Enterprise*.
|
358
326
|
:param pulumi.Input[str] role_name: Name of the role.
|
359
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
360
|
-
|
361
|
-
|
362
|
-
:param pulumi.Input[
|
363
|
-
|
364
|
-
|
365
|
-
|
366
|
-
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
367
|
-
Its current value will be referenced at renewal time.
|
368
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
369
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
370
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/kubernetes#token_num_uses)
|
371
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
372
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
373
|
-
token generated using this role should never expire. The token should be renewed within the
|
374
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
375
|
-
value of this field. Specified in seconds.
|
376
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
377
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
327
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
328
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
329
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
330
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
331
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
332
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
333
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
378
334
|
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
379
|
-
:param pulumi.Input[str] token_type: The type of token
|
380
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
381
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
382
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
383
|
-
requests a different type at generation time.
|
335
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
384
336
|
"""
|
385
337
|
if alias_name_source is not None:
|
386
338
|
pulumi.set(__self__, "alias_name_source", alias_name_source)
|
@@ -511,9 +463,7 @@ class _AuthBackendRoleState:
|
|
511
463
|
@pulumi.getter(name="tokenBoundCidrs")
|
512
464
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
513
465
|
"""
|
514
|
-
|
515
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
516
|
-
as well.
|
466
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
517
467
|
"""
|
518
468
|
return pulumi.get(self, "token_bound_cidrs")
|
519
469
|
|
@@ -525,10 +475,7 @@ class _AuthBackendRoleState:
|
|
525
475
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
526
476
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
527
477
|
"""
|
528
|
-
|
529
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
530
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
531
|
-
`token_max_ttl` would otherwise allow a renewal.
|
478
|
+
Generated Token's Explicit Maximum TTL in seconds
|
532
479
|
"""
|
533
480
|
return pulumi.get(self, "token_explicit_max_ttl")
|
534
481
|
|
@@ -540,8 +487,7 @@ class _AuthBackendRoleState:
|
|
540
487
|
@pulumi.getter(name="tokenMaxTtl")
|
541
488
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
542
489
|
"""
|
543
|
-
The maximum lifetime
|
544
|
-
Its current value will be referenced at renewal time.
|
490
|
+
The maximum lifetime of the generated token
|
545
491
|
"""
|
546
492
|
return pulumi.get(self, "token_max_ttl")
|
547
493
|
|
@@ -553,8 +499,7 @@ class _AuthBackendRoleState:
|
|
553
499
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
554
500
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
555
501
|
"""
|
556
|
-
If
|
557
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
502
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
558
503
|
"""
|
559
504
|
return pulumi.get(self, "token_no_default_policy")
|
560
505
|
|
@@ -566,8 +511,7 @@ class _AuthBackendRoleState:
|
|
566
511
|
@pulumi.getter(name="tokenNumUses")
|
567
512
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
568
513
|
"""
|
569
|
-
The
|
570
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
514
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
571
515
|
"""
|
572
516
|
return pulumi.get(self, "token_num_uses")
|
573
517
|
|
@@ -579,10 +523,7 @@ class _AuthBackendRoleState:
|
|
579
523
|
@pulumi.getter(name="tokenPeriod")
|
580
524
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
581
525
|
"""
|
582
|
-
|
583
|
-
token generated using this role should never expire. The token should be renewed within the
|
584
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
585
|
-
value of this field. Specified in seconds.
|
526
|
+
Generated Token's Period
|
586
527
|
"""
|
587
528
|
return pulumi.get(self, "token_period")
|
588
529
|
|
@@ -594,8 +535,7 @@ class _AuthBackendRoleState:
|
|
594
535
|
@pulumi.getter(name="tokenPolicies")
|
595
536
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
596
537
|
"""
|
597
|
-
|
598
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
538
|
+
Generated Token's Policies
|
599
539
|
"""
|
600
540
|
return pulumi.get(self, "token_policies")
|
601
541
|
|
@@ -619,11 +559,7 @@ class _AuthBackendRoleState:
|
|
619
559
|
@pulumi.getter(name="tokenType")
|
620
560
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
621
561
|
"""
|
622
|
-
The type of token
|
623
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
624
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
625
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
626
|
-
requests a different type at generation time.
|
562
|
+
The type of token to generate, service or batch
|
627
563
|
"""
|
628
564
|
return pulumi.get(self, "token_type")
|
629
565
|
|
@@ -661,7 +597,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
661
597
|
|
662
598
|
## Example Usage
|
663
599
|
|
664
|
-
<!--Start PulumiCodeChooser -->
|
665
600
|
```python
|
666
601
|
import pulumi
|
667
602
|
import pulumi_vault as vault
|
@@ -680,7 +615,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
680
615
|
],
|
681
616
|
audience="vault")
|
682
617
|
```
|
683
|
-
<!--End PulumiCodeChooser -->
|
684
618
|
|
685
619
|
## Import
|
686
620
|
|
@@ -707,31 +641,15 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
707
641
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
708
642
|
*Available only for Vault Enterprise*.
|
709
643
|
:param pulumi.Input[str] role_name: Name of the role.
|
710
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
711
|
-
|
712
|
-
|
713
|
-
:param pulumi.Input[
|
714
|
-
|
715
|
-
|
716
|
-
|
717
|
-
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
718
|
-
Its current value will be referenced at renewal time.
|
719
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
720
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
721
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/kubernetes#token_num_uses)
|
722
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
723
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
724
|
-
token generated using this role should never expire. The token should be renewed within the
|
725
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
726
|
-
value of this field. Specified in seconds.
|
727
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
728
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
644
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
645
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
646
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
647
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
648
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
649
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
650
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
729
651
|
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
730
|
-
:param pulumi.Input[str] token_type: The type of token
|
731
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
732
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
733
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
734
|
-
requests a different type at generation time.
|
652
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
735
653
|
"""
|
736
654
|
...
|
737
655
|
@overload
|
@@ -746,7 +664,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
746
664
|
|
747
665
|
## Example Usage
|
748
666
|
|
749
|
-
<!--Start PulumiCodeChooser -->
|
750
667
|
```python
|
751
668
|
import pulumi
|
752
669
|
import pulumi_vault as vault
|
@@ -765,7 +682,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
765
682
|
],
|
766
683
|
audience="vault")
|
767
684
|
```
|
768
|
-
<!--End PulumiCodeChooser -->
|
769
685
|
|
770
686
|
## Import
|
771
687
|
|
@@ -885,31 +801,15 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
885
801
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
886
802
|
*Available only for Vault Enterprise*.
|
887
803
|
:param pulumi.Input[str] role_name: Name of the role.
|
888
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
889
|
-
|
890
|
-
|
891
|
-
:param pulumi.Input[
|
892
|
-
|
893
|
-
|
894
|
-
|
895
|
-
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
896
|
-
Its current value will be referenced at renewal time.
|
897
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
898
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
899
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/kubernetes#token_num_uses)
|
900
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
901
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
902
|
-
token generated using this role should never expire. The token should be renewed within the
|
903
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
904
|
-
value of this field. Specified in seconds.
|
905
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
906
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
804
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
805
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
806
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
807
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
808
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
809
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
810
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
907
811
|
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
908
|
-
:param pulumi.Input[str] token_type: The type of token
|
909
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
910
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
911
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
912
|
-
requests a different type at generation time.
|
812
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
913
813
|
"""
|
914
814
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
915
815
|
|
@@ -1001,9 +901,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1001
901
|
@pulumi.getter(name="tokenBoundCidrs")
|
1002
902
|
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1003
903
|
"""
|
1004
|
-
|
1005
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
1006
|
-
as well.
|
904
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
1007
905
|
"""
|
1008
906
|
return pulumi.get(self, "token_bound_cidrs")
|
1009
907
|
|
@@ -1011,10 +909,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1011
909
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
1012
910
|
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1013
911
|
"""
|
1014
|
-
|
1015
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
1016
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1017
|
-
`token_max_ttl` would otherwise allow a renewal.
|
912
|
+
Generated Token's Explicit Maximum TTL in seconds
|
1018
913
|
"""
|
1019
914
|
return pulumi.get(self, "token_explicit_max_ttl")
|
1020
915
|
|
@@ -1022,8 +917,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1022
917
|
@pulumi.getter(name="tokenMaxTtl")
|
1023
918
|
def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1024
919
|
"""
|
1025
|
-
The maximum lifetime
|
1026
|
-
Its current value will be referenced at renewal time.
|
920
|
+
The maximum lifetime of the generated token
|
1027
921
|
"""
|
1028
922
|
return pulumi.get(self, "token_max_ttl")
|
1029
923
|
|
@@ -1031,8 +925,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1031
925
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
1032
926
|
def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
|
1033
927
|
"""
|
1034
|
-
If
|
1035
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
928
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
1036
929
|
"""
|
1037
930
|
return pulumi.get(self, "token_no_default_policy")
|
1038
931
|
|
@@ -1040,8 +933,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1040
933
|
@pulumi.getter(name="tokenNumUses")
|
1041
934
|
def token_num_uses(self) -> pulumi.Output[Optional[int]]:
|
1042
935
|
"""
|
1043
|
-
The
|
1044
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
936
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
1045
937
|
"""
|
1046
938
|
return pulumi.get(self, "token_num_uses")
|
1047
939
|
|
@@ -1049,10 +941,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1049
941
|
@pulumi.getter(name="tokenPeriod")
|
1050
942
|
def token_period(self) -> pulumi.Output[Optional[int]]:
|
1051
943
|
"""
|
1052
|
-
|
1053
|
-
token generated using this role should never expire. The token should be renewed within the
|
1054
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1055
|
-
value of this field. Specified in seconds.
|
944
|
+
Generated Token's Period
|
1056
945
|
"""
|
1057
946
|
return pulumi.get(self, "token_period")
|
1058
947
|
|
@@ -1060,8 +949,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1060
949
|
@pulumi.getter(name="tokenPolicies")
|
1061
950
|
def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1062
951
|
"""
|
1063
|
-
|
1064
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
952
|
+
Generated Token's Policies
|
1065
953
|
"""
|
1066
954
|
return pulumi.get(self, "token_policies")
|
1067
955
|
|
@@ -1077,11 +965,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1077
965
|
@pulumi.getter(name="tokenType")
|
1078
966
|
def token_type(self) -> pulumi.Output[Optional[str]]:
|
1079
967
|
"""
|
1080
|
-
The type of token
|
1081
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1082
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
1083
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
1084
|
-
requests a different type at generation time.
|
968
|
+
The type of token to generate, service or batch
|
1085
969
|
"""
|
1086
970
|
return pulumi.get(self, "token_type")
|
1087
971
|
|
@@ -180,7 +180,6 @@ def get_service_account_token(backend: Optional[str] = None,
|
|
180
180
|
"""
|
181
181
|
## Example Usage
|
182
182
|
|
183
|
-
<!--Start PulumiCodeChooser -->
|
184
183
|
```python
|
185
184
|
import pulumi
|
186
185
|
import pulumi_std as std
|
@@ -214,7 +213,6 @@ def get_service_account_token(backend: Optional[str] = None,
|
|
214
213
|
cluster_role_binding=False,
|
215
214
|
ttl="1h")
|
216
215
|
```
|
217
|
-
<!--End PulumiCodeChooser -->
|
218
216
|
|
219
217
|
|
220
218
|
:param str backend: The Kubernetes secret backend to generate service account
|
@@ -269,7 +267,6 @@ def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None
|
|
269
267
|
"""
|
270
268
|
## Example Usage
|
271
269
|
|
272
|
-
<!--Start PulumiCodeChooser -->
|
273
270
|
```python
|
274
271
|
import pulumi
|
275
272
|
import pulumi_std as std
|
@@ -303,7 +300,6 @@ def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None
|
|
303
300
|
cluster_role_binding=False,
|
304
301
|
ttl="1h")
|
305
302
|
```
|
306
|
-
<!--End PulumiCodeChooser -->
|
307
303
|
|
308
304
|
|
309
305
|
:param str backend: The Kubernetes secret backend to generate service account
|
@@ -623,7 +623,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
623
623
|
"""
|
624
624
|
## Example Usage
|
625
625
|
|
626
|
-
<!--Start PulumiCodeChooser -->
|
627
626
|
```python
|
628
627
|
import pulumi
|
629
628
|
import pulumi_std as std
|
@@ -639,7 +638,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
639
638
|
service_account_jwt=std.file(input="/path/to/token").result,
|
640
639
|
disable_local_ca_jwt=False)
|
641
640
|
```
|
642
|
-
<!--End PulumiCodeChooser -->
|
643
641
|
|
644
642
|
## Import
|
645
643
|
|
@@ -688,7 +686,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
688
686
|
"""
|
689
687
|
## Example Usage
|
690
688
|
|
691
|
-
<!--Start PulumiCodeChooser -->
|
692
689
|
```python
|
693
690
|
import pulumi
|
694
691
|
import pulumi_std as std
|
@@ -704,7 +701,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
704
701
|
service_account_jwt=std.file(input="/path/to/token").result,
|
705
702
|
disable_local_ca_jwt=False)
|
706
703
|
```
|
707
|
-
<!--End PulumiCodeChooser -->
|
708
704
|
|
709
705
|
## Import
|
710
706
|
|
@@ -591,7 +591,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
591
591
|
|
592
592
|
Example using `service_account_name` mode:
|
593
593
|
|
594
|
-
<!--Start PulumiCodeChooser -->
|
595
594
|
```python
|
596
595
|
import pulumi
|
597
596
|
import pulumi_std as std
|
@@ -620,11 +619,9 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
620
619
|
"location": "earth",
|
621
620
|
})
|
622
621
|
```
|
623
|
-
<!--End PulumiCodeChooser -->
|
624
622
|
|
625
623
|
Example using `kubernetes_role_name` mode:
|
626
624
|
|
627
|
-
<!--Start PulumiCodeChooser -->
|
628
625
|
```python
|
629
626
|
import pulumi
|
630
627
|
import pulumi_std as std
|
@@ -653,11 +650,9 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
653
650
|
"location": "earth",
|
654
651
|
})
|
655
652
|
```
|
656
|
-
<!--End PulumiCodeChooser -->
|
657
653
|
|
658
654
|
Example using `generated_role_rules` mode:
|
659
655
|
|
660
|
-
<!--Start PulumiCodeChooser -->
|
661
656
|
```python
|
662
657
|
import pulumi
|
663
658
|
import pulumi_std as std
|
@@ -691,7 +686,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
691
686
|
"location": "earth",
|
692
687
|
})
|
693
688
|
```
|
694
|
-
<!--End PulumiCodeChooser -->
|
695
689
|
|
696
690
|
## Import
|
697
691
|
|
@@ -754,7 +748,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
754
748
|
|
755
749
|
Example using `service_account_name` mode:
|
756
750
|
|
757
|
-
<!--Start PulumiCodeChooser -->
|
758
751
|
```python
|
759
752
|
import pulumi
|
760
753
|
import pulumi_std as std
|
@@ -783,11 +776,9 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
783
776
|
"location": "earth",
|
784
777
|
})
|
785
778
|
```
|
786
|
-
<!--End PulumiCodeChooser -->
|
787
779
|
|
788
780
|
Example using `kubernetes_role_name` mode:
|
789
781
|
|
790
|
-
<!--Start PulumiCodeChooser -->
|
791
782
|
```python
|
792
783
|
import pulumi
|
793
784
|
import pulumi_std as std
|
@@ -816,11 +807,9 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
816
807
|
"location": "earth",
|
817
808
|
})
|
818
809
|
```
|
819
|
-
<!--End PulumiCodeChooser -->
|
820
810
|
|
821
811
|
Example using `generated_role_rules` mode:
|
822
812
|
|
823
|
-
<!--Start PulumiCodeChooser -->
|
824
813
|
```python
|
825
814
|
import pulumi
|
826
815
|
import pulumi_std as std
|
@@ -854,7 +843,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
854
843
|
"location": "earth",
|
855
844
|
})
|
856
845
|
```
|
857
|
-
<!--End PulumiCodeChooser -->
|
858
846
|
|
859
847
|
## Import
|
860
848
|
|
pulumi_vault/kv/get_secret.py
CHANGED
@@ -134,7 +134,6 @@ def get_secret(namespace: Optional[str] = None,
|
|
134
134
|
"""
|
135
135
|
## Example Usage
|
136
136
|
|
137
|
-
<!--Start PulumiCodeChooser -->
|
138
137
|
```python
|
139
138
|
import pulumi
|
140
139
|
import json
|
@@ -155,7 +154,6 @@ def get_secret(namespace: Optional[str] = None,
|
|
155
154
|
}))
|
156
155
|
secret_data = vault.kv.get_secret_output(path=secret.path)
|
157
156
|
```
|
158
|
-
<!--End PulumiCodeChooser -->
|
159
157
|
|
160
158
|
## Required Vault Capabilities
|
161
159
|
|
@@ -192,7 +190,6 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
|
192
190
|
"""
|
193
191
|
## Example Usage
|
194
192
|
|
195
|
-
<!--Start PulumiCodeChooser -->
|
196
193
|
```python
|
197
194
|
import pulumi
|
198
195
|
import json
|
@@ -213,7 +210,6 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
|
213
210
|
}))
|
214
211
|
secret_data = vault.kv.get_secret_output(path=secret.path)
|
215
212
|
```
|
216
|
-
<!--End PulumiCodeChooser -->
|
217
213
|
|
218
214
|
## Required Vault Capabilities
|
219
215
|
|